Hay
Date
Dec. 5, 2024, 2:07 p.m.
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.221933] ==================================================================
[   29.223486] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.224481] Read of size 1 at addr fff00000c64e0000 by task kunit_try_catch/143
[   29.225610] 
[   29.226022] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.227758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.228621] Hardware name: linux,dummy-virt (DT)
[   29.229122] Call trace:
[   29.229510]  show_stack+0x20/0x38 (C)
[   29.230190]  dump_stack_lvl+0x8c/0xd0
[   29.230944]  print_report+0x118/0x5e0
[   29.232212]  kasan_report+0xc8/0x118
[   29.232961]  __asan_report_load1_noabort+0x20/0x30
[   29.233637]  page_alloc_uaf+0x328/0x350
[   29.234234]  kunit_try_run_case+0x14c/0x3d0
[   29.234800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.235955]  kthread+0x24c/0x2d0
[   29.236551]  ret_from_fork+0x10/0x20
[   29.237201] 
[   29.237531] The buggy address belongs to the physical page:
[   29.238799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0
[   29.240292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.241085] page_type: f0(buddy)
[   29.241686] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000
[   29.242596] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   29.243860] page dumped because: kasan: bad access detected
[   29.244478] 
[   29.244813] Memory state around the buggy address:
[   29.245433]  fff00000c64dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.246705]  fff00000c64dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.247660] >fff00000c64e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.248553]                    ^
[   29.249418]  fff00000c64e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.250297]  fff00000c64e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.251150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   63.716839] ==================================================================
[   63.717638] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   63.717638] 
[   63.718597] Use-after-free read at 0x000000005f542089 (in kfence-#198):
[   63.719591]  test_krealloc+0x51c/0x830
[   63.720366]  test_krealloc+0x458/0x830
[   63.721156]  kunit_try_run_case+0x14c/0x3d0
[   63.722015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.722772]  kthread+0x24c/0x2d0
[   63.723419]  ret_from_fork+0x10/0x20
[   63.724041] 
[   63.724394] kfence-#198: 0x000000005f542089-0x000000004f695cd4, size=32, cache=kmalloc-32
[   63.724394] 
[   63.725578] allocated by task 326 on cpu 1 at 63.715803s (0.009766s ago):
[   63.726691]  test_alloc+0x298/0x620
[   63.727390]  test_krealloc+0xc0/0x830
[   63.727956]  kunit_try_run_case+0x14c/0x3d0
[   63.728714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.729472]  kthread+0x24c/0x2d0
[   63.730171]  ret_from_fork+0x10/0x20
[   63.730747] 
[   63.731170] freed by task 326 on cpu 1 at 63.716210s (0.014949s ago):
[   63.732061]  krealloc_noprof+0x148/0x360
[   63.732735]  test_krealloc+0x1dc/0x830
[   63.733362]  kunit_try_run_case+0x14c/0x3d0
[   63.734063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.734889]  kthread+0x24c/0x2d0
[   63.735474]  ret_from_fork+0x10/0x20
[   63.736069] 
[   63.736526] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   63.737802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.738431] Hardware name: linux,dummy-virt (DT)
[   63.739189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.134709] ==================================================================
[   29.136170] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.137313] Read of size 1 at addr fff00000c6490000 by task kunit_try_catch/137
[   29.138901] 
[   29.139205] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.141131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.142107] Hardware name: linux,dummy-virt (DT)
[   29.142767] Call trace:
[   29.143482]  show_stack+0x20/0x38 (C)
[   29.144373]  dump_stack_lvl+0x8c/0xd0
[   29.145038]  print_report+0x118/0x5e0
[   29.145638]  kasan_report+0xc8/0x118
[   29.146252]  __asan_report_load1_noabort+0x20/0x30
[   29.146861]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.147542]  kunit_try_run_case+0x14c/0x3d0
[   29.148134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.149081]  kthread+0x24c/0x2d0
[   29.149553]  ret_from_fork+0x10/0x20
[   29.150089] 
[   29.150515] The buggy address belongs to the physical page:
[   29.151157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490
[   29.153003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.154000] raw: 0bfffe0000000000 ffffc1ffc3192508 fff00000da4e3040 0000000000000000
[   29.154981] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.156458] page dumped because: kasan: bad access detected
[   29.157099] 
[   29.157433] Memory state around the buggy address:
[   29.158287]  fff00000c648ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.159237]  fff00000c648ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160086] >fff00000c6490000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.161412]                    ^
[   29.162004]  fff00000c6490080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.162910]  fff00000c6490100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.163968] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   63.535562] ==================================================================
[   63.536359] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   63.536359] 
[   63.537409] Use-after-free read at 0x00000000c4ebd226 (in kfence-#196):
[   63.538562]  test_memcache_typesafe_by_rcu+0x280/0x560
[   63.539553]  test_memcache_typesafe_by_rcu+0x260/0x560
[   63.540373]  kunit_try_run_case+0x14c/0x3d0
[   63.541204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.542076]  kthread+0x24c/0x2d0
[   63.542524]  ret_from_fork+0x10/0x20
[   63.542969] 
[   63.543252] kfence-#196: 0x00000000c4ebd226-0x00000000373ee0c2, size=32, cache=test
[   63.543252] 
[   63.544386] allocated by task 324 on cpu 0 at 63.509065s (0.035312s ago):
[   63.545298]  test_alloc+0x22c/0x620
[   63.546031]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   63.546834]  kunit_try_run_case+0x14c/0x3d0
[   63.547507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.548341]  kthread+0x24c/0x2d0
[   63.548904]  ret_from_fork+0x10/0x20
[   63.549479] 
[   63.549988] freed by task 324 on cpu 0 at 63.509218s (0.040759s ago):
[   63.551009]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   63.551749]  kunit_try_run_case+0x14c/0x3d0
[   63.552419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.553221]  kthread+0x24c/0x2d0
[   63.553797]  ret_from_fork+0x10/0x20
[   63.554422] 
[   63.554832] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   63.556119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.556759] Hardware name: linux,dummy-virt (DT)
[   63.557489] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   43.975998] ==================================================================
[   43.977310] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   43.977310] 
[   43.978451] Invalid read at 0x00000000ed834bb7:
[   43.979061]  test_invalid_access+0xdc/0x1f0
[   43.980946]  kunit_try_run_case+0x14c/0x3d0
[   43.981688]  kunit_try_run_case+0x14c/0x3d0
[   43.982304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.983079]  kthread+0x24c/0x2d0
[   43.984279]  ret_from_fork+0x10/0x20
[   43.984935] 
[   43.985357] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   43.986764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.987998] Hardware name: linux,dummy-virt (DT)
[   43.989127] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   43.744375] ==================================================================
[   43.745144] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   43.745144] 
[   43.746071] Corrupted memory at 0x000000005173c554 [ ! . . . . . . . . . . . . . . . ] (in kfence-#192):
[   43.748562]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   43.749259]  kunit_try_run_case+0x14c/0x3d0
[   43.749851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.750583]  kthread+0x24c/0x2d0
[   43.751188]  ret_from_fork+0x10/0x20
[   43.751731] 
[   43.752182] kfence-#192: 0x00000000b4e78023-0x00000000774da766, size=73, cache=kmalloc-96
[   43.752182] 
[   43.753371] allocated by task 314 on cpu 0 at 43.743931s (0.009431s ago):
[   43.754335]  test_alloc+0x298/0x620
[   43.754907]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   43.755594]  kunit_try_run_case+0x14c/0x3d0
[   43.756248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.757090]  kthread+0x24c/0x2d0
[   43.757555]  ret_from_fork+0x10/0x20
[   43.758184] 
[   43.758535] freed by task 314 on cpu 0 at 43.744178s (0.014347s ago):
[   43.759401]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   43.760237]  kunit_try_run_case+0x14c/0x3d0
[   43.760857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.761652]  kthread+0x24c/0x2d0
[   43.762162]  ret_from_fork+0x10/0x20
[   43.762686] 
[   43.763058] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   43.764265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.764862] Hardware name: linux,dummy-virt (DT)
[   43.765487] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   43.640202] ==================================================================
[   43.640902] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   43.640902] 
[   43.641963] Out-of-bounds read at 0x0000000002501113 (105B right of kfence-#191):
[   43.642945]  test_kmalloc_aligned_oob_read+0x238/0x468
[   43.643814]  test_kmalloc_aligned_oob_read+0x100/0x468
[   43.644715]  kunit_try_run_case+0x14c/0x3d0
[   43.645343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.646088]  kthread+0x24c/0x2d0
[   43.646611]  ret_from_fork+0x10/0x20
[   43.647193] 
[   43.647512] kfence-#191: 0x00000000c925a462-0x0000000015e77de7, size=73, cache=kmalloc-96
[   43.647512] 
[   43.648631] allocated by task 312 on cpu 1 at 43.639813s (0.008809s ago):
[   43.649485]  test_alloc+0x298/0x620
[   43.650119]  test_kmalloc_aligned_oob_read+0x100/0x468
[   43.650955]  kunit_try_run_case+0x14c/0x3d0
[   43.651522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.652384]  kthread+0x24c/0x2d0
[   43.653022]  ret_from_fork+0x10/0x20
[   43.653532] 
[   43.653959] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   43.655234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.655764] Hardware name: linux,dummy-virt (DT)
[   43.656413] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   39.272266] ==================================================================
[   39.273048] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   39.273048] 
[   39.273971] Corrupted memory at 0x000000003cec2d35 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149):
[   39.277589]  test_corruption+0x278/0x378
[   39.278274]  kunit_try_run_case+0x14c/0x3d0
[   39.278982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.279792]  kthread+0x24c/0x2d0
[   39.280375]  ret_from_fork+0x10/0x20
[   39.280990] 
[   39.281330] kfence-#149: 0x00000000eab72c63-0x0000000094d5f37c, size=32, cache=kmalloc-32
[   39.281330] 
[   39.282550] allocated by task 300 on cpu 1 at 39.271806s (0.010734s ago):
[   39.283603]  test_alloc+0x298/0x620
[   39.284260]  test_corruption+0xdc/0x378
[   39.284936]  kunit_try_run_case+0x14c/0x3d0
[   39.285602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.286411]  kthread+0x24c/0x2d0
[   39.287071]  ret_from_fork+0x10/0x20
[   39.287687] 
[   39.288359] freed by task 300 on cpu 1 at 39.271966s (0.016383s ago):
[   39.288948]  test_corruption+0x278/0x378
[   39.289334]  kunit_try_run_case+0x14c/0x3d0
[   39.289752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.292961]  kthread+0x24c/0x2d0
[   39.293804]  ret_from_fork+0x10/0x20
[   39.295402] 
[   39.296344] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   39.298727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.300143] Hardware name: linux,dummy-virt (DT)
[   39.301407] ==================================================================
[   39.480280] ==================================================================
[   39.481107] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   39.481107] 
[   39.481824] Corrupted memory at 0x00000000d834d574 [ ! ] (in kfence-#151):
[   39.483181]  test_corruption+0x284/0x378
[   39.483764]  kunit_try_run_case+0x14c/0x3d0
[   39.484510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.485309]  kthread+0x24c/0x2d0
[   39.485789]  ret_from_fork+0x10/0x20
[   39.486336] 
[   39.486715] kfence-#151: 0x000000005dc35715-0x00000000e38eaca2, size=32, cache=kmalloc-32
[   39.486715] 
[   39.487804] allocated by task 300 on cpu 1 at 39.479810s (0.007985s ago):
[   39.488674]  test_alloc+0x298/0x620
[   39.489156]  test_corruption+0x198/0x378
[   39.489936]  kunit_try_run_case+0x14c/0x3d0
[   39.490569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.491444]  kthread+0x24c/0x2d0
[   39.491981]  ret_from_fork+0x10/0x20
[   39.492681] 
[   39.493071] freed by task 300 on cpu 1 at 39.479981s (0.013080s ago):
[   39.493891]  test_corruption+0x284/0x378
[   39.494615]  kunit_try_run_case+0x14c/0x3d0
[   39.495365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.495957]  kthread+0x24c/0x2d0
[   39.496533]  ret_from_fork+0x10/0x20
[   39.497118] 
[   39.497592] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   39.498900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.499481] Hardware name: linux,dummy-virt (DT)
[   39.500134] ==================================================================
[   39.584117] ==================================================================
[   39.585013] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   39.585013] 
[   39.585901] Corrupted memory at 0x00000000ee26f81d [ ! . . . . . . . . . . . . . . . ] (in kfence-#152):
[   39.588373]  test_corruption+0x120/0x378
[   39.588957]  kunit_try_run_case+0x14c/0x3d0
[   39.589527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.590417]  kthread+0x24c/0x2d0
[   39.590891]  ret_from_fork+0x10/0x20
[   39.591396] 
[   39.591749] kfence-#152: 0x000000007eea6791-0x00000000ab207009, size=32, cache=test
[   39.591749] 
[   39.592964] allocated by task 302 on cpu 0 at 39.583920s (0.009035s ago):
[   39.593942]  test_alloc+0x22c/0x620
[   39.594462]  test_corruption+0xdc/0x378
[   39.595118]  kunit_try_run_case+0x14c/0x3d0
[   39.595702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.596503]  kthread+0x24c/0x2d0
[   39.596978]  ret_from_fork+0x10/0x20
[   39.597645] 
[   39.598017] freed by task 302 on cpu 0 at 39.583995s (0.014013s ago):
[   39.598776]  test_corruption+0x120/0x378
[   39.599446]  kunit_try_run_case+0x14c/0x3d0
[   39.600163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.600851]  kthread+0x24c/0x2d0
[   39.601426]  ret_from_fork+0x10/0x20
[   39.602047] 
[   39.602372] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   39.603589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.604266] Hardware name: linux,dummy-virt (DT)
[   39.604856] ==================================================================
[   40.000003] ==================================================================
[   40.000824] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.000824] 
[   40.001724] Corrupted memory at 0x00000000abcd8030 [ ! ] (in kfence-#156):
[   40.002917]  test_corruption+0x1d8/0x378
[   40.003572]  kunit_try_run_case+0x14c/0x3d0
[   40.004259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.005005]  kthread+0x24c/0x2d0
[   40.005496]  ret_from_fork+0x10/0x20
[   40.006151] 
[   40.006467] kfence-#156: 0x00000000cceb83fc-0x000000008903fadd, size=32, cache=test
[   40.006467] 
[   40.007577] allocated by task 302 on cpu 0 at 39.999781s (0.007787s ago):
[   40.008460]  test_alloc+0x22c/0x620
[   40.009045]  test_corruption+0x198/0x378
[   40.009682]  kunit_try_run_case+0x14c/0x3d0
[   40.010279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.011022]  kthread+0x24c/0x2d0
[   40.011449]  ret_from_fork+0x10/0x20
[   40.012175] 
[   40.012568] freed by task 302 on cpu 0 at 39.999859s (0.012700s ago):
[   40.013299]  test_corruption+0x1d8/0x378
[   40.013979]  kunit_try_run_case+0x14c/0x3d0
[   40.014554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.015338]  kthread+0x24c/0x2d0
[   40.015831]  ret_from_fork+0x10/0x20
[   40.016423] 
[   40.016785] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   40.017986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.018624] Hardware name: linux,dummy-virt (DT)
[   40.019123] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   39.168295] ==================================================================
[   39.169066] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   39.169066] 
[   39.169968] Invalid free of 0x00000000d2b2d440 (in kfence-#148):
[   39.170661]  test_invalid_addr_free+0xec/0x238
[   39.171413]  kunit_try_run_case+0x14c/0x3d0
[   39.172014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.172783]  kthread+0x24c/0x2d0
[   39.173321]  ret_from_fork+0x10/0x20
[   39.173901] 
[   39.174279] kfence-#148: 0x0000000086488266-0x000000007bcc31dd, size=32, cache=test
[   39.174279] 
[   39.175250] allocated by task 298 on cpu 0 at 39.168197s (0.007044s ago):
[   39.176161]  test_alloc+0x22c/0x620
[   39.176663]  test_invalid_addr_free+0xd4/0x238
[   39.177516]  kunit_try_run_case+0x14c/0x3d0
[   39.178110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.178995]  kthread+0x24c/0x2d0
[   39.179506]  ret_from_fork+0x10/0x20
[   39.180102] 
[   39.180419] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   39.181644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.182238] Hardware name: linux,dummy-virt (DT)
[   39.182838] ==================================================================
[   39.064033] ==================================================================
[   39.064912] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.064912] 
[   39.065785] Invalid free of 0x00000000864907c0 (in kfence-#147):
[   39.066572]  test_invalid_addr_free+0x1ac/0x238
[   39.067272]  kunit_try_run_case+0x14c/0x3d0
[   39.067903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.068649]  kthread+0x24c/0x2d0
[   39.069180]  ret_from_fork+0x10/0x20
[   39.069677] 
[   39.070064] kfence-#147: 0x000000009a3cd0f5-0x00000000a6a3ca1b, size=32, cache=kmalloc-32
[   39.070064] 
[   39.071037] allocated by task 296 on cpu 0 at 39.063844s (0.007184s ago):
[   39.072111]  test_alloc+0x298/0x620
[   39.072602]  test_invalid_addr_free+0xd4/0x238
[   39.073428]  kunit_try_run_case+0x14c/0x3d0
[   39.074178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.074900]  kthread+0x24c/0x2d0
[   39.075384]  ret_from_fork+0x10/0x20
[   39.076045] 
[   39.076471] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   39.077595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.078282] Hardware name: linux,dummy-virt (DT)
[   39.078851] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   38.960248] ==================================================================
[   38.961040] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   38.961040] 
[   38.962087] Invalid free of 0x00000000a1677d62 (in kfence-#146):
[   38.962721]  test_double_free+0x100/0x238
[   38.963475]  kunit_try_run_case+0x14c/0x3d0
[   38.964019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.964565]  kthread+0x24c/0x2d0
[   38.965242]  ret_from_fork+0x10/0x20
[   38.965820] 
[   38.966181] kfence-#146: 0x00000000a1677d62-0x000000004d07bffc, size=32, cache=test
[   38.966181] 
[   38.967256] allocated by task 294 on cpu 1 at 38.959866s (0.007382s ago):
[   38.968235]  test_alloc+0x22c/0x620
[   38.968755]  test_double_free+0xd4/0x238
[   38.969344]  kunit_try_run_case+0x14c/0x3d0
[   38.969970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.970633]  kthread+0x24c/0x2d0
[   38.971230]  ret_from_fork+0x10/0x20
[   38.971796] 
[   38.972161] freed by task 294 on cpu 1 at 38.959967s (0.012185s ago):
[   38.973008]  test_double_free+0xf0/0x238
[   38.973553]  kunit_try_run_case+0x14c/0x3d0
[   38.974243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.974958]  kthread+0x24c/0x2d0
[   38.975436]  ret_from_fork+0x10/0x20
[   38.976112] 
[   38.976510] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.977698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.978334] Hardware name: linux,dummy-virt (DT)
[   38.978965] ==================================================================
[   38.856301] ==================================================================
[   38.857108] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   38.857108] 
[   38.858087] Invalid free of 0x00000000119ff20a (in kfence-#145):
[   38.858840]  test_double_free+0x1bc/0x238
[   38.859529]  kunit_try_run_case+0x14c/0x3d0
[   38.860634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.861360]  kthread+0x24c/0x2d0
[   38.861944]  ret_from_fork+0x10/0x20
[   38.862523] 
[   38.862949] kfence-#145: 0x00000000119ff20a-0x00000000339e45ee, size=32, cache=kmalloc-32
[   38.862949] 
[   38.863981] allocated by task 292 on cpu 0 at 38.855810s (0.008162s ago):
[   38.864905]  test_alloc+0x298/0x620
[   38.865430]  test_double_free+0xd4/0x238
[   38.866005]  kunit_try_run_case+0x14c/0x3d0
[   38.866676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.867361]  kthread+0x24c/0x2d0
[   38.867983]  ret_from_fork+0x10/0x20
[   38.868509] 
[   38.868827] freed by task 292 on cpu 0 at 38.855930s (0.012888s ago):
[   38.869685]  test_double_free+0x1ac/0x238
[   38.870220]  kunit_try_run_case+0x14c/0x3d0
[   38.870913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.871609]  kthread+0x24c/0x2d0
[   38.872184]  ret_from_fork+0x10/0x20
[   38.872629] 
[   38.873097] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.874352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.875007] Hardware name: linux,dummy-virt (DT)
[   38.875699] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   38.544278] ==================================================================
[   38.545141] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.545141] 
[   38.546328] Use-after-free read at 0x00000000a3367d76 (in kfence-#142):
[   38.546995]  test_use_after_free_read+0x114/0x248
[   38.547727]  test_use_after_free_read+0xf0/0x248
[   38.548354]  kunit_try_run_case+0x14c/0x3d0
[   38.549002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.549687]  kthread+0x24c/0x2d0
[   38.550225]  ret_from_fork+0x10/0x20
[   38.550752] 
[   38.551100] kfence-#142: 0x00000000a3367d76-0x00000000f8cfd6d9, size=32, cache=test
[   38.551100] 
[   38.551942] allocated by task 286 on cpu 1 at 38.543981s (0.007952s ago):
[   38.552603]  test_alloc+0x22c/0x620
[   38.553295]  test_use_after_free_read+0xd0/0x248
[   38.554126]  kunit_try_run_case+0x14c/0x3d0
[   38.554987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.555733]  kthread+0x24c/0x2d0
[   38.556260]  ret_from_fork+0x10/0x20
[   38.556953] 
[   38.557342] freed by task 286 on cpu 1 at 38.544061s (0.013271s ago):
[   38.558475]  test_use_after_free_read+0xf0/0x248
[   38.559035]  kunit_try_run_case+0x14c/0x3d0
[   38.559738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.560492]  kthread+0x24c/0x2d0
[   38.560947]  ret_from_fork+0x10/0x20
[   38.561644] 
[   38.561994] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.563322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.563968] Hardware name: linux,dummy-virt (DT)
[   38.564540] ==================================================================
[   38.440370] ==================================================================
[   38.441226] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.441226] 
[   38.442359] Use-after-free read at 0x000000005363260a (in kfence-#141):
[   38.443146]  test_use_after_free_read+0x114/0x248
[   38.443771]  test_use_after_free_read+0x1c0/0x248
[   38.444454]  kunit_try_run_case+0x14c/0x3d0
[   38.445158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.445755]  kthread+0x24c/0x2d0
[   38.446397]  ret_from_fork+0x10/0x20
[   38.447258] 
[   38.448195] kfence-#141: 0x000000005363260a-0x000000008947792c, size=32, cache=kmalloc-32
[   38.448195] 
[   38.449170] allocated by task 284 on cpu 1 at 38.439869s (0.009291s ago):
[   38.450007]  test_alloc+0x298/0x620
[   38.450569]  test_use_after_free_read+0xd0/0x248
[   38.451373]  kunit_try_run_case+0x14c/0x3d0
[   38.451984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.452677]  kthread+0x24c/0x2d0
[   38.453225]  ret_from_fork+0x10/0x20
[   38.453852] 
[   38.454411] freed by task 284 on cpu 1 at 38.439988s (0.014252s ago):
[   38.455429]  test_use_after_free_read+0x1c0/0x248
[   38.456161]  kunit_try_run_case+0x14c/0x3d0
[   38.456721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.457488]  kthread+0x24c/0x2d0
[   38.458111]  ret_from_fork+0x10/0x20
[   38.458868] 
[   38.459273] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.460627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.461264] Hardware name: linux,dummy-virt (DT)
[   38.461909] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   38.332019] ==================================================================
[   38.332868] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.332868] 
[   38.333859] Out-of-bounds write at 0x000000004452669d (1B left of kfence-#140):
[   38.334928]  test_out_of_bounds_write+0x100/0x240
[   38.335625]  test_out_of_bounds_write+0xc8/0x240
[   38.336554]  kunit_try_run_case+0x14c/0x3d0
[   38.337299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.338183]  kthread+0x24c/0x2d0
[   38.338827]  ret_from_fork+0x10/0x20
[   38.339474] 
[   38.339889] kfence-#140: 0x000000008f165d43-0x00000000abfd8761, size=32, cache=test
[   38.339889] 
[   38.341046] allocated by task 282 on cpu 1 at 38.331848s (0.009189s ago):
[   38.342087]  test_alloc+0x22c/0x620
[   38.342823]  test_out_of_bounds_write+0xc8/0x240
[   38.343445]  kunit_try_run_case+0x14c/0x3d0
[   38.344096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.344866]  kthread+0x24c/0x2d0
[   38.345389]  ret_from_fork+0x10/0x20
[   38.346030] 
[   38.346363] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.347495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.348122] Hardware name: linux,dummy-virt (DT)
[   38.348699] ==================================================================
[   38.020120] ==================================================================
[   38.021052] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.021052] 
[   38.022272] Out-of-bounds write at 0x0000000074f38218 (1B left of kfence-#137):
[   38.023204]  test_out_of_bounds_write+0x100/0x240
[   38.024377]  test_out_of_bounds_write+0xc8/0x240
[   38.025063]  kunit_try_run_case+0x14c/0x3d0
[   38.025850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.026559]  kthread+0x24c/0x2d0
[   38.027209]  ret_from_fork+0x10/0x20
[   38.027754] 
[   38.028168] kfence-#137: 0x00000000bbdb1d19-0x000000005fd9b2d9, size=32, cache=kmalloc-32
[   38.028168] 
[   38.029313] allocated by task 280 on cpu 1 at 38.019904s (0.009400s ago):
[   38.030200]  test_alloc+0x298/0x620
[   38.030861]  test_out_of_bounds_write+0xc8/0x240
[   38.031484]  kunit_try_run_case+0x14c/0x3d0
[   38.032179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.032910]  kthread+0x24c/0x2d0
[   38.033506]  ret_from_fork+0x10/0x20
[   38.034078] 
[   38.034415] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   38.035747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.036446] Hardware name: linux,dummy-virt (DT)
[   38.037077] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   37.916042] ==================================================================
[   37.917007] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   37.917007] 
[   37.918009] Out-of-bounds read at 0x00000000225f3778 (32B right of kfence-#136):
[   37.918928]  test_out_of_bounds_read+0x1c8/0x3e0
[   37.919756]  test_out_of_bounds_read+0x198/0x3e0
[   37.920548]  kunit_try_run_case+0x14c/0x3d0
[   37.921130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.921868]  kthread+0x24c/0x2d0
[   37.922493]  ret_from_fork+0x10/0x20
[   37.923060] 
[   37.923397] kfence-#136: 0x00000000a5ab6b24-0x000000008279d173, size=32, cache=test
[   37.923397] 
[   37.924415] allocated by task 278 on cpu 0 at 37.915904s (0.008502s ago):
[   37.925358]  test_alloc+0x22c/0x620
[   37.925927]  test_out_of_bounds_read+0x198/0x3e0
[   37.926557]  kunit_try_run_case+0x14c/0x3d0
[   37.927271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.928020]  kthread+0x24c/0x2d0
[   37.928448]  ret_from_fork+0x10/0x20
[   37.929124] 
[   37.929449] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.930556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.931256] Hardware name: linux,dummy-virt (DT)
[   37.931869] ==================================================================
[   37.500131] ==================================================================
[   37.500850] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   37.500850] 
[   37.501789] Out-of-bounds read at 0x00000000650f0bc7 (32B right of kfence-#132):
[   37.503086]  test_out_of_bounds_read+0x1c8/0x3e0
[   37.503852]  test_out_of_bounds_read+0x198/0x3e0
[   37.504658]  kunit_try_run_case+0x14c/0x3d0
[   37.505305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.505984]  kthread+0x24c/0x2d0
[   37.506605]  ret_from_fork+0x10/0x20
[   37.507220] 
[   37.507564] kfence-#132: 0x0000000055f81137-0x00000000129a2513, size=32, cache=kmalloc-32
[   37.507564] 
[   37.508791] allocated by task 276 on cpu 1 at 37.499801s (0.008981s ago):
[   37.509562]  test_alloc+0x298/0x620
[   37.510192]  test_out_of_bounds_read+0x198/0x3e0
[   37.510940]  kunit_try_run_case+0x14c/0x3d0
[   37.511525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.512321]  kthread+0x24c/0x2d0
[   37.512824]  ret_from_fork+0x10/0x20
[   37.513385] 
[   37.513750] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.514824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.515509] Hardware name: linux,dummy-virt (DT)
[   37.516136] ==================================================================
[   37.397104] ==================================================================
[   37.397981] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.397981] 
[   37.399156] Out-of-bounds read at 0x00000000d55dd1b3 (1B left of kfence-#131):
[   37.400644]  test_out_of_bounds_read+0x114/0x3e0
[   37.401238]  test_out_of_bounds_read+0xdc/0x3e0
[   37.402018]  kunit_try_run_case+0x14c/0x3d0
[   37.402575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.403408]  kthread+0x24c/0x2d0
[   37.403939]  ret_from_fork+0x10/0x20
[   37.404565] 
[   37.405169] kfence-#131: 0x000000002b217142-0x00000000cd330071, size=32, cache=kmalloc-32
[   37.405169] 
[   37.406634] allocated by task 276 on cpu 1 at 37.395927s (0.010587s ago):
[   37.408010]  test_alloc+0x298/0x620
[   37.408566]  test_out_of_bounds_read+0xdc/0x3e0
[   37.409206]  kunit_try_run_case+0x14c/0x3d0
[   37.409793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.410643]  kthread+0x24c/0x2d0
[   37.411175]  ret_from_fork+0x10/0x20
[   37.411845] 
[   37.412286] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.413464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.414038] Hardware name: linux,dummy-virt (DT)
[   37.414626] ==================================================================
[   37.604019] ==================================================================
[   37.605082] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.605082] 
[   37.606077] Out-of-bounds read at 0x000000003f583c71 (1B left of kfence-#133):
[   37.606932]  test_out_of_bounds_read+0x114/0x3e0
[   37.608181]  test_out_of_bounds_read+0xdc/0x3e0
[   37.608713]  kunit_try_run_case+0x14c/0x3d0
[   37.609435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.610278]  kthread+0x24c/0x2d0
[   37.610826]  ret_from_fork+0x10/0x20
[   37.611471] 
[   37.611781] kfence-#133: 0x0000000048b17d69-0x0000000090fcbd1a, size=32, cache=test
[   37.611781] 
[   37.612808] allocated by task 278 on cpu 0 at 37.603853s (0.008945s ago):
[   37.613806]  test_alloc+0x22c/0x620
[   37.614367]  test_out_of_bounds_read+0xdc/0x3e0
[   37.614957]  kunit_try_run_case+0x14c/0x3d0
[   37.615709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.616288]  kthread+0x24c/0x2d0
[   37.616857]  ret_from_fork+0x10/0x20
[   37.617461] 
[   37.617809] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.619078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.619748] Hardware name: linux,dummy-virt (DT)
[   37.620394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   37.142773] ==================================================================
[   37.144546] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   37.145363] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   37.146170] 
[   37.146554] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.147751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.148318] Hardware name: linux,dummy-virt (DT)
[   37.149152] Call trace:
[   37.149687]  show_stack+0x20/0x38 (C)
[   37.150317]  dump_stack_lvl+0x8c/0xd0
[   37.150858]  print_report+0x118/0x5e0
[   37.151631]  kasan_report+0xc8/0x118
[   37.152197]  kasan_check_range+0x100/0x1a8
[   37.152893]  __kasan_check_write+0x20/0x30
[   37.153517]  strncpy_from_user+0x3c/0x2a0
[   37.154103]  copy_user_test_oob+0x5c0/0xec0
[   37.154660]  kunit_try_run_case+0x14c/0x3d0
[   37.155474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.156418]  kthread+0x24c/0x2d0
[   37.156914]  ret_from_fork+0x10/0x20
[   37.157415] 
[   37.157745] Allocated by task 274:
[   37.158175]  kasan_save_stack+0x3c/0x68
[   37.158892]  kasan_save_track+0x20/0x40
[   37.159365]  kasan_save_alloc_info+0x40/0x58
[   37.159958]  __kasan_kmalloc+0xd4/0xd8
[   37.160597]  __kmalloc_noprof+0x188/0x4c8
[   37.161190]  kunit_kmalloc_array+0x34/0x88
[   37.161829]  copy_user_test_oob+0xac/0xec0
[   37.162363]  kunit_try_run_case+0x14c/0x3d0
[   37.163105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.163690]  kthread+0x24c/0x2d0
[   37.164344]  ret_from_fork+0x10/0x20
[   37.164972] 
[   37.165266] The buggy address belongs to the object at fff00000c669bf00
[   37.165266]  which belongs to the cache kmalloc-128 of size 128
[   37.166756] The buggy address is located 0 bytes inside of
[   37.166756]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   37.168151] 
[   37.168453] The buggy address belongs to the physical page:
[   37.169103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   37.170288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.171286] page_type: f5(slab)
[   37.171768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.172731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.173724] page dumped because: kasan: bad access detected
[   37.174484] 
[   37.174800] Memory state around the buggy address:
[   37.175443]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.176358]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.177380] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.178652]                                                                 ^
[   37.179657]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.180550]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.181456] ==================================================================
[   37.183268] ==================================================================
[   37.184027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   37.185098] Write of size 1 at addr fff00000c669bf78 by task kunit_try_catch/274
[   37.186162] 
[   37.186522] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.187938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.188527] Hardware name: linux,dummy-virt (DT)
[   37.189172] Call trace:
[   37.189532]  show_stack+0x20/0x38 (C)
[   37.190000]  dump_stack_lvl+0x8c/0xd0
[   37.190739]  print_report+0x118/0x5e0
[   37.191519]  kasan_report+0xc8/0x118
[   37.192264]  __asan_report_store1_noabort+0x20/0x30
[   37.193051]  strncpy_from_user+0x270/0x2a0
[   37.193688]  copy_user_test_oob+0x5c0/0xec0
[   37.194416]  kunit_try_run_case+0x14c/0x3d0
[   37.195154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.195819]  kthread+0x24c/0x2d0
[   37.196498]  ret_from_fork+0x10/0x20
[   37.197050] 
[   37.197431] Allocated by task 274:
[   37.197972]  kasan_save_stack+0x3c/0x68
[   37.198709]  kasan_save_track+0x20/0x40
[   37.199281]  kasan_save_alloc_info+0x40/0x58
[   37.200069]  __kasan_kmalloc+0xd4/0xd8
[   37.200595]  __kmalloc_noprof+0x188/0x4c8
[   37.201246]  kunit_kmalloc_array+0x34/0x88
[   37.201974]  copy_user_test_oob+0xac/0xec0
[   37.202677]  kunit_try_run_case+0x14c/0x3d0
[   37.203362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.204110]  kthread+0x24c/0x2d0
[   37.204604]  ret_from_fork+0x10/0x20
[   37.205211] 
[   37.205526] The buggy address belongs to the object at fff00000c669bf00
[   37.205526]  which belongs to the cache kmalloc-128 of size 128
[   37.207028] The buggy address is located 0 bytes to the right of
[   37.207028]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   37.208485] 
[   37.208788] The buggy address belongs to the physical page:
[   37.209439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   37.210570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.211476] page_type: f5(slab)
[   37.212002] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.213040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.214013] page dumped because: kasan: bad access detected
[   37.214694] 
[   37.215033] Memory state around the buggy address:
[   37.215597]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.216452]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.217387] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.218275]                                                                 ^
[   37.219134]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.220009]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.220813] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   36.870548] ==================================================================
[   36.872284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   36.873233] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   36.874308] 
[   36.874651] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.876589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.877145] Hardware name: linux,dummy-virt (DT)
[   36.877685] Call trace:
[   36.878193]  show_stack+0x20/0x38 (C)
[   36.878785]  dump_stack_lvl+0x8c/0xd0
[   36.879486]  print_report+0x118/0x5e0
[   36.880100]  kasan_report+0xc8/0x118
[   36.880756]  kasan_check_range+0x100/0x1a8
[   36.881700]  __kasan_check_write+0x20/0x30
[   36.882301]  copy_user_test_oob+0x234/0xec0
[   36.882922]  kunit_try_run_case+0x14c/0x3d0
[   36.883795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.884708]  kthread+0x24c/0x2d0
[   36.885301]  ret_from_fork+0x10/0x20
[   36.885869] 
[   36.886230] Allocated by task 274:
[   36.886776]  kasan_save_stack+0x3c/0x68
[   36.887701]  kasan_save_track+0x20/0x40
[   36.888291]  kasan_save_alloc_info+0x40/0x58
[   36.888964]  __kasan_kmalloc+0xd4/0xd8
[   36.889536]  __kmalloc_noprof+0x188/0x4c8
[   36.890213]  kunit_kmalloc_array+0x34/0x88
[   36.890892]  copy_user_test_oob+0xac/0xec0
[   36.892057]  kunit_try_run_case+0x14c/0x3d0
[   36.892675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.893671]  kthread+0x24c/0x2d0
[   36.894266]  ret_from_fork+0x10/0x20
[   36.894768] 
[   36.895163] The buggy address belongs to the object at fff00000c669bf00
[   36.895163]  which belongs to the cache kmalloc-128 of size 128
[   36.896672] The buggy address is located 0 bytes inside of
[   36.896672]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   36.898339] 
[   36.898538] The buggy address belongs to the physical page:
[   36.898896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   36.899589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.900537] page_type: f5(slab)
[   36.901079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.902011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.903055] page dumped because: kasan: bad access detected
[   36.904043] 
[   36.904358] Memory state around the buggy address:
[   36.904927]  fff00000c669be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.905893]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.906723] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.907989]                                                                 ^
[   36.908829]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.909665]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.910596] ==================================================================
[   36.918104] ==================================================================
[   36.918896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   36.919922] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   36.921844] 
[   36.922579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.924717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.925260] Hardware name: linux,dummy-virt (DT)
[   36.925902] Call trace:
[   36.926357]  show_stack+0x20/0x38 (C)
[   36.926972]  dump_stack_lvl+0x8c/0xd0
[   36.927421]  print_report+0x118/0x5e0
[   36.928416]  kasan_report+0xc8/0x118
[   36.928978]  kasan_check_range+0x100/0x1a8
[   36.929648]  __kasan_check_read+0x20/0x30
[   36.930272]  copy_user_test_oob+0x728/0xec0
[   36.930909]  kunit_try_run_case+0x14c/0x3d0
[   36.931805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.932626]  kthread+0x24c/0x2d0
[   36.933165]  ret_from_fork+0x10/0x20
[   36.933725] 
[   36.934104] Allocated by task 274:
[   36.934697]  kasan_save_stack+0x3c/0x68
[   36.935198]  kasan_save_track+0x20/0x40
[   36.935925]  kasan_save_alloc_info+0x40/0x58
[   36.936501]  __kasan_kmalloc+0xd4/0xd8
[   36.937108]  __kmalloc_noprof+0x188/0x4c8
[   36.937711]  kunit_kmalloc_array+0x34/0x88
[   36.938585]  copy_user_test_oob+0xac/0xec0
[   36.939665]  kunit_try_run_case+0x14c/0x3d0
[   36.940426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.941156]  kthread+0x24c/0x2d0
[   36.941600]  ret_from_fork+0x10/0x20
[   36.942253] 
[   36.942572] The buggy address belongs to the object at fff00000c669bf00
[   36.942572]  which belongs to the cache kmalloc-128 of size 128
[   36.944262] The buggy address is located 0 bytes inside of
[   36.944262]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   36.945691] 
[   36.946052] The buggy address belongs to the physical page:
[   36.946691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   36.948320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.949002] page_type: f5(slab)
[   36.949361] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.950225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.951431] page dumped because: kasan: bad access detected
[   36.952241] 
[   36.952487] Memory state around the buggy address:
[   36.953260]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.954181]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.954995] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.956462]                                                                 ^
[   36.957682]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.958629]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.959595] ==================================================================
[   37.010658] ==================================================================
[   37.011633] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   37.012527] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   37.013790] 
[   37.014253] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.015762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.016476] Hardware name: linux,dummy-virt (DT)
[   37.017544] Call trace:
[   37.018056]  show_stack+0x20/0x38 (C)
[   37.018742]  dump_stack_lvl+0x8c/0xd0
[   37.019728]  print_report+0x118/0x5e0
[   37.020340]  kasan_report+0xc8/0x118
[   37.021048]  kasan_check_range+0x100/0x1a8
[   37.021808]  __kasan_check_read+0x20/0x30
[   37.022511]  copy_user_test_oob+0x3c8/0xec0
[   37.023208]  kunit_try_run_case+0x14c/0x3d0
[   37.023973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.024801]  kthread+0x24c/0x2d0
[   37.025419]  ret_from_fork+0x10/0x20
[   37.026050] 
[   37.026412] Allocated by task 274:
[   37.027052]  kasan_save_stack+0x3c/0x68
[   37.028026]  kasan_save_track+0x20/0x40
[   37.028687]  kasan_save_alloc_info+0x40/0x58
[   37.029381]  __kasan_kmalloc+0xd4/0xd8
[   37.029917]  __kmalloc_noprof+0x188/0x4c8
[   37.030726]  kunit_kmalloc_array+0x34/0x88
[   37.031350]  copy_user_test_oob+0xac/0xec0
[   37.032002]  kunit_try_run_case+0x14c/0x3d0
[   37.032678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.033441]  kthread+0x24c/0x2d0
[   37.034079]  ret_from_fork+0x10/0x20
[   37.034808] 
[   37.035308] The buggy address belongs to the object at fff00000c669bf00
[   37.035308]  which belongs to the cache kmalloc-128 of size 128
[   37.037253] The buggy address is located 0 bytes inside of
[   37.037253]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   37.039215] 
[   37.039582] The buggy address belongs to the physical page:
[   37.040489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   37.041679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.042596] page_type: f5(slab)
[   37.043154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.044332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.045284] page dumped because: kasan: bad access detected
[   37.046043] 
[   37.046555] Memory state around the buggy address:
[   37.047225]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.049178]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.050619] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.051899]                                                                 ^
[   37.052354]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.052767]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.054054] ==================================================================
[   37.098307] ==================================================================
[   37.099059] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   37.100808] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   37.101687] 
[   37.102053] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.103614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.104474] Hardware name: linux,dummy-virt (DT)
[   37.105030] Call trace:
[   37.105475]  show_stack+0x20/0x38 (C)
[   37.106032]  dump_stack_lvl+0x8c/0xd0
[   37.106666]  print_report+0x118/0x5e0
[   37.107412]  kasan_report+0xc8/0x118
[   37.108062]  kasan_check_range+0x100/0x1a8
[   37.108720]  __kasan_check_read+0x20/0x30
[   37.109358]  copy_user_test_oob+0x4a0/0xec0
[   37.110003]  kunit_try_run_case+0x14c/0x3d0
[   37.110651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.111686]  kthread+0x24c/0x2d0
[   37.112204]  ret_from_fork+0x10/0x20
[   37.112856] 
[   37.113253] Allocated by task 274:
[   37.113697]  kasan_save_stack+0x3c/0x68
[   37.114315]  kasan_save_track+0x20/0x40
[   37.115034]  kasan_save_alloc_info+0x40/0x58
[   37.115728]  __kasan_kmalloc+0xd4/0xd8
[   37.116058]  __kmalloc_noprof+0x188/0x4c8
[   37.116349]  kunit_kmalloc_array+0x34/0x88
[   37.116643]  copy_user_test_oob+0xac/0xec0
[   37.117064]  kunit_try_run_case+0x14c/0x3d0
[   37.117901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.118954]  kthread+0x24c/0x2d0
[   37.119782]  ret_from_fork+0x10/0x20
[   37.120938] 
[   37.121209] The buggy address belongs to the object at fff00000c669bf00
[   37.121209]  which belongs to the cache kmalloc-128 of size 128
[   37.122834] The buggy address is located 0 bytes inside of
[   37.122834]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   37.124972] 
[   37.125306] The buggy address belongs to the physical page:
[   37.126281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   37.127498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.128635] page_type: f5(slab)
[   37.129485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.130601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.131851] page dumped because: kasan: bad access detected
[   37.132870] 
[   37.133237] Memory state around the buggy address:
[   37.134128]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.135153]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.136269] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.137087]                                                                 ^
[   37.137779]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.139071]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.140644] ==================================================================
[   37.055830] ==================================================================
[   37.056488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   37.057114] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   37.058036] 
[   37.058393] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   37.059516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.060145] Hardware name: linux,dummy-virt (DT)
[   37.061591] Call trace:
[   37.062115]  show_stack+0x20/0x38 (C)
[   37.062996]  dump_stack_lvl+0x8c/0xd0
[   37.064091]  print_report+0x118/0x5e0
[   37.064919]  kasan_report+0xc8/0x118
[   37.065487]  kasan_check_range+0x100/0x1a8
[   37.066220]  __kasan_check_write+0x20/0x30
[   37.066835]  copy_user_test_oob+0x434/0xec0
[   37.067822]  kunit_try_run_case+0x14c/0x3d0
[   37.068434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.069228]  kthread+0x24c/0x2d0
[   37.069806]  ret_from_fork+0x10/0x20
[   37.070442] 
[   37.070771] Allocated by task 274:
[   37.071548]  kasan_save_stack+0x3c/0x68
[   37.072192]  kasan_save_track+0x20/0x40
[   37.072644]  kasan_save_alloc_info+0x40/0x58
[   37.073362]  __kasan_kmalloc+0xd4/0xd8
[   37.073862]  __kmalloc_noprof+0x188/0x4c8
[   37.074452]  kunit_kmalloc_array+0x34/0x88
[   37.075254]  copy_user_test_oob+0xac/0xec0
[   37.075911]  kunit_try_run_case+0x14c/0x3d0
[   37.076684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.077421]  kthread+0x24c/0x2d0
[   37.077947]  ret_from_fork+0x10/0x20
[   37.078681] 
[   37.079029] The buggy address belongs to the object at fff00000c669bf00
[   37.079029]  which belongs to the cache kmalloc-128 of size 128
[   37.081635] The buggy address is located 0 bytes inside of
[   37.081635]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   37.083121] 
[   37.083472] The buggy address belongs to the physical page:
[   37.084550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   37.085632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.086540] page_type: f5(slab)
[   37.087513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.088413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.089550] page dumped because: kasan: bad access detected
[   37.090235] 
[   37.090605] Memory state around the buggy address:
[   37.091615]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.092483]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.093176] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.094135]                                                                 ^
[   37.095006]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.096046]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.096990] ==================================================================
[   36.967911] ==================================================================
[   36.968663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   36.969473] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274
[   36.970269] 
[   36.970671] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.972167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.972749] Hardware name: linux,dummy-virt (DT)
[   36.973296] Call trace:
[   36.973774]  show_stack+0x20/0x38 (C)
[   36.974439]  dump_stack_lvl+0x8c/0xd0
[   36.975143]  print_report+0x118/0x5e0
[   36.975947]  kasan_report+0xc8/0x118
[   36.976502]  kasan_check_range+0x100/0x1a8
[   36.977137]  __kasan_check_write+0x20/0x30
[   36.977995]  copy_user_test_oob+0x35c/0xec0
[   36.978628]  kunit_try_run_case+0x14c/0x3d0
[   36.979275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.980236]  kthread+0x24c/0x2d0
[   36.980930]  ret_from_fork+0x10/0x20
[   36.981539] 
[   36.981825] Allocated by task 274:
[   36.982478]  kasan_save_stack+0x3c/0x68
[   36.983222]  kasan_save_track+0x20/0x40
[   36.983994]  kasan_save_alloc_info+0x40/0x58
[   36.984981]  __kasan_kmalloc+0xd4/0xd8
[   36.985678]  __kmalloc_noprof+0x188/0x4c8
[   36.986493]  kunit_kmalloc_array+0x34/0x88
[   36.987085]  copy_user_test_oob+0xac/0xec0
[   36.987851]  kunit_try_run_case+0x14c/0x3d0
[   36.988773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.990064]  kthread+0x24c/0x2d0
[   36.991272]  ret_from_fork+0x10/0x20
[   36.992262] 
[   36.992539] The buggy address belongs to the object at fff00000c669bf00
[   36.992539]  which belongs to the cache kmalloc-128 of size 128
[   36.994217] The buggy address is located 0 bytes inside of
[   36.994217]  allocated 120-byte region [fff00000c669bf00, fff00000c669bf78)
[   36.995821] 
[   36.996282] The buggy address belongs to the physical page:
[   36.997002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   36.998078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.999027] page_type: f5(slab)
[   36.999634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.000663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.001618] page dumped because: kasan: bad access detected
[   37.002401] 
[   37.002736] Memory state around the buggy address:
[   37.003523]  fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.004469]  fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.005435] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.006355]                                                                 ^
[   37.007368]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.008452]  fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.009511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   36.798084] ==================================================================
[   36.799507] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   36.800216] Write of size 8 at addr fff00000c669bb78 by task kunit_try_catch/270
[   36.802007] 
[   36.802340] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.803717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.804521] Hardware name: linux,dummy-virt (DT)
[   36.805008] Call trace:
[   36.805568]  show_stack+0x20/0x38 (C)
[   36.806217]  dump_stack_lvl+0x8c/0xd0
[   36.807016]  print_report+0x118/0x5e0
[   36.807927]  kasan_report+0xc8/0x118
[   36.808669]  kasan_check_range+0x100/0x1a8
[   36.809515]  __kasan_check_write+0x20/0x30
[   36.810249]  copy_to_kernel_nofault+0x8c/0x250
[   36.810847]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   36.812219]  kunit_try_run_case+0x14c/0x3d0
[   36.812943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.813651]  kthread+0x24c/0x2d0
[   36.814133]  ret_from_fork+0x10/0x20
[   36.814794] 
[   36.815238] Allocated by task 270:
[   36.815974]  kasan_save_stack+0x3c/0x68
[   36.816548]  kasan_save_track+0x20/0x40
[   36.817112]  kasan_save_alloc_info+0x40/0x58
[   36.817712]  __kasan_kmalloc+0xd4/0xd8
[   36.818706]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.819600]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.820324]  kunit_try_run_case+0x14c/0x3d0
[   36.821716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.822550]  kthread+0x24c/0x2d0
[   36.823509]  ret_from_fork+0x10/0x20
[   36.824467] 
[   36.824738] The buggy address belongs to the object at fff00000c669bb00
[   36.824738]  which belongs to the cache kmalloc-128 of size 128
[   36.826348] The buggy address is located 0 bytes to the right of
[   36.826348]  allocated 120-byte region [fff00000c669bb00, fff00000c669bb78)
[   36.828583] 
[   36.828921] The buggy address belongs to the physical page:
[   36.829637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   36.830584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.831635] page_type: f5(slab)
[   36.832183] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.833111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.834095] page dumped because: kasan: bad access detected
[   36.834802] 
[   36.835381] Memory state around the buggy address:
[   36.836014]  fff00000c669ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.836923]  fff00000c669ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.837864] >fff00000c669bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.838710]                                                                 ^
[   36.840425]  fff00000c669bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.841503]  fff00000c669bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.842403] ==================================================================
[   36.752496] ==================================================================
[   36.753808] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   36.754733] Read of size 8 at addr fff00000c669bb78 by task kunit_try_catch/270
[   36.755747] 
[   36.757000] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.758348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.758940] Hardware name: linux,dummy-virt (DT)
[   36.759757] Call trace:
[   36.760161]  show_stack+0x20/0x38 (C)
[   36.760953]  dump_stack_lvl+0x8c/0xd0
[   36.761545]  print_report+0x118/0x5e0
[   36.762202]  kasan_report+0xc8/0x118
[   36.762863]  __asan_report_load8_noabort+0x20/0x30
[   36.763503]  copy_to_kernel_nofault+0x204/0x250
[   36.764286]  copy_to_kernel_nofault_oob+0x158/0x418
[   36.765466]  kunit_try_run_case+0x14c/0x3d0
[   36.766091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.766870]  kthread+0x24c/0x2d0
[   36.767478]  ret_from_fork+0x10/0x20
[   36.768041] 
[   36.768351] Allocated by task 270:
[   36.768797]  kasan_save_stack+0x3c/0x68
[   36.769530]  kasan_save_track+0x20/0x40
[   36.770219]  kasan_save_alloc_info+0x40/0x58
[   36.770915]  __kasan_kmalloc+0xd4/0xd8
[   36.771580]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.772282]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.772970]  kunit_try_run_case+0x14c/0x3d0
[   36.773729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.774771]  kthread+0x24c/0x2d0
[   36.775702]  ret_from_fork+0x10/0x20
[   36.776595] 
[   36.776931] The buggy address belongs to the object at fff00000c669bb00
[   36.776931]  which belongs to the cache kmalloc-128 of size 128
[   36.778492] The buggy address is located 0 bytes to the right of
[   36.778492]  allocated 120-byte region [fff00000c669bb00, fff00000c669bb78)
[   36.780168] 
[   36.780846] The buggy address belongs to the physical page:
[   36.781741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b
[   36.782943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.784437] page_type: f5(slab)
[   36.785183] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.786153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.787027] page dumped because: kasan: bad access detected
[   36.788046] 
[   36.788380] Memory state around the buggy address:
[   36.789003]  fff00000c669ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.789931]  fff00000c669ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.790865] >fff00000c669bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.791975]                                                                 ^
[   36.792931]  fff00000c669bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.793941]  fff00000c669bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.795353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   32.892427] ==================================================================
[   32.893930] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   32.894870] Read of size 1 at addr ffff800080be7cba by task kunit_try_catch/238
[   32.896469] 
[   32.896774] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.898118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.898415] Hardware name: linux,dummy-virt (DT)
[   32.898709] Call trace:
[   32.898959]  show_stack+0x20/0x38 (C)
[   32.899511]  dump_stack_lvl+0x8c/0xd0
[   32.900309]  print_report+0x2fc/0x5e0
[   32.901676]  kasan_report+0xc8/0x118
[   32.902288]  __asan_report_load1_noabort+0x20/0x30
[   32.903029]  kasan_stack_oob+0x230/0x268
[   32.903705]  kunit_try_run_case+0x14c/0x3d0
[   32.904569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.905137]  kthread+0x24c/0x2d0
[   32.906161]  ret_from_fork+0x10/0x20
[   32.906842] 
[   32.908151] The buggy address belongs to stack of task kunit_try_catch/238
[   32.909299]  and is located at offset 138 in frame:
[   32.909973]  kasan_stack_oob+0x0/0x268
[   32.910709] 
[   32.911137] This frame has 4 objects:
[   32.911791]  [48, 49) '__assertion'
[   32.911962]  [64, 72) 'array'
[   32.912929]  [96, 112) '__assertion'
[   32.913363]  [128, 138) 'stack_array'
[   32.913996] 
[   32.914698] The buggy address belongs to the virtual mapping at
[   32.914698]  [ffff800080be0000, ffff800080be9000) created by:
[   32.914698]  kernel_clone+0x140/0x788
[   32.916751] 
[   32.917053] The buggy address belongs to the physical page:
[   32.918056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657e
[   32.919183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.919947] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.921063] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.922083] page dumped because: kasan: bad access detected
[   32.922768] 
[   32.923138] Memory state around the buggy address:
[   32.924097]  ffff800080be7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.924741]  ffff800080be7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   32.925410] >ffff800080be7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   32.926396]                                         ^
[   32.927227]  ffff800080be7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   32.928301]  ffff800080be7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   32.929388] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   36.672958] ==================================================================
[   36.673600] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   36.675270] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   36.676237] 
[   36.676559] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.678353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.678865] Hardware name: linux,dummy-virt (DT)
[   36.680043] Call trace:
[   36.680378]  show_stack+0x20/0x38 (C)
[   36.680841]  dump_stack_lvl+0x8c/0xd0
[   36.681744]  print_report+0x2fc/0x5e0
[   36.682525]  kasan_report+0xc8/0x118
[   36.683142]  __asan_report_load1_noabort+0x20/0x30
[   36.684549]  vmalloc_oob+0x51c/0x5d0
[   36.685112]  kunit_try_run_case+0x14c/0x3d0
[   36.685731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.686452]  kthread+0x24c/0x2d0
[   36.687121]  ret_from_fork+0x10/0x20
[   36.687686] 
[   36.688049] The buggy address belongs to the virtual mapping at
[   36.688049]  [ffff80008010b000, ffff80008010d000) created by:
[   36.688049]  vmalloc_oob+0x98/0x5d0
[   36.690903] 
[   36.691230] The buggy address belongs to the physical page:
[   36.692293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106690
[   36.693297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.694314] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.695611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.696306] page dumped because: kasan: bad access detected
[   36.696992] 
[   36.697419] Memory state around the buggy address:
[   36.698203]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.699079]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.699847] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.700671]                                                                 ^
[   36.701781]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.702817]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.703640] ==================================================================
[   36.640319] ==================================================================
[   36.641742] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   36.642614] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   36.643946] 
[   36.644597] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.645970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.646736] Hardware name: linux,dummy-virt (DT)
[   36.647454] Call trace:
[   36.647985]  show_stack+0x20/0x38 (C)
[   36.648515]  dump_stack_lvl+0x8c/0xd0
[   36.649102]  print_report+0x2fc/0x5e0
[   36.649745]  kasan_report+0xc8/0x118
[   36.650318]  __asan_report_load1_noabort+0x20/0x30
[   36.651031]  vmalloc_oob+0x578/0x5d0
[   36.651556]  kunit_try_run_case+0x14c/0x3d0
[   36.652688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.653431]  kthread+0x24c/0x2d0
[   36.653947]  ret_from_fork+0x10/0x20
[   36.654662] 
[   36.655008] The buggy address belongs to the virtual mapping at
[   36.655008]  [ffff80008010b000, ffff80008010d000) created by:
[   36.655008]  vmalloc_oob+0x98/0x5d0
[   36.657390] 
[   36.657840] The buggy address belongs to the physical page:
[   36.658586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106690
[   36.659691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.660496] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.661757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.663029] page dumped because: kasan: bad access detected
[   36.664338] 
[   36.664981] Memory state around the buggy address:
[   36.665487]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.666180]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.667063] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.668217]                                                              ^
[   36.669459]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.670514]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.671652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   36.586967] ==================================================================
[   36.587901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.588701] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.589496] 
[   36.589821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.590889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.591591] Hardware name: linux,dummy-virt (DT)
[   36.592302] Call trace:
[   36.592694]  show_stack+0x20/0x38 (C)
[   36.593259]  dump_stack_lvl+0x8c/0xd0
[   36.593928]  print_report+0x118/0x5e0
[   36.594609]  kasan_report+0xc8/0x118
[   36.595252]  kasan_check_range+0x100/0x1a8
[   36.595995]  __kasan_check_write+0x20/0x30
[   36.596563]  kasan_atomics_helper+0x17ec/0x4858
[   36.597276]  kasan_atomics+0x198/0x2e8
[   36.597857]  kunit_try_run_case+0x14c/0x3d0
[   36.598589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.599327]  kthread+0x24c/0x2d0
[   36.599913]  ret_from_fork+0x10/0x20
[   36.600454] 
[   36.600735] Allocated by task 254:
[   36.601326]  kasan_save_stack+0x3c/0x68
[   36.601960]  kasan_save_track+0x20/0x40
[   36.602534]  kasan_save_alloc_info+0x40/0x58
[   36.603096]  __kasan_kmalloc+0xd4/0xd8
[   36.603637]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.604157]  kasan_atomics+0xb8/0x2e8
[   36.604788]  kunit_try_run_case+0x14c/0x3d0
[   36.605416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.606109]  kthread+0x24c/0x2d0
[   36.606604]  ret_from_fork+0x10/0x20
[   36.607265] 
[   36.607560] The buggy address belongs to the object at fff00000c664f800
[   36.607560]  which belongs to the cache kmalloc-64 of size 64
[   36.609051] The buggy address is located 0 bytes to the right of
[   36.609051]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.610477] 
[   36.610798] The buggy address belongs to the physical page:
[   36.611460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.612477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.613256] page_type: f5(slab)
[   36.613773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.614745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.615713] page dumped because: kasan: bad access detected
[   36.616331] 
[   36.616701] Memory state around the buggy address:
[   36.617361]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.618261]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.619220] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.620066]                                      ^
[   36.620716]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.621621]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.622533] ==================================================================
[   35.504552] ==================================================================
[   35.505258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.506270] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.507126] 
[   35.507440] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.508678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.509261] Hardware name: linux,dummy-virt (DT)
[   35.509965] Call trace:
[   35.510311]  show_stack+0x20/0x38 (C)
[   35.510982]  dump_stack_lvl+0x8c/0xd0
[   35.511549]  print_report+0x118/0x5e0
[   35.512191]  kasan_report+0xc8/0x118
[   35.512758]  __asan_report_load8_noabort+0x20/0x30
[   35.513452]  kasan_atomics_helper+0x3f58/0x4858
[   35.514217]  kasan_atomics+0x198/0x2e8
[   35.514790]  kunit_try_run_case+0x14c/0x3d0
[   35.515516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.516289]  kthread+0x24c/0x2d0
[   35.516829]  ret_from_fork+0x10/0x20
[   35.517478] 
[   35.517900] Allocated by task 254:
[   35.518439]  kasan_save_stack+0x3c/0x68
[   35.519044]  kasan_save_track+0x20/0x40
[   35.519617]  kasan_save_alloc_info+0x40/0x58
[   35.520264]  __kasan_kmalloc+0xd4/0xd8
[   35.520723]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.521429]  kasan_atomics+0xb8/0x2e8
[   35.521986]  kunit_try_run_case+0x14c/0x3d0
[   35.522715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.523414]  kthread+0x24c/0x2d0
[   35.524024]  ret_from_fork+0x10/0x20
[   35.524536] 
[   35.524835] The buggy address belongs to the object at fff00000c664f800
[   35.524835]  which belongs to the cache kmalloc-64 of size 64
[   35.526264] The buggy address is located 0 bytes to the right of
[   35.526264]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.527570] 
[   35.527955] The buggy address belongs to the physical page:
[   35.528622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.529647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.530784] page_type: f5(slab)
[   35.531325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.531774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.532907] page dumped because: kasan: bad access detected
[   35.533680] 
[   35.534026] Memory state around the buggy address:
[   35.534740]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.535818]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.536725] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.537679]                                      ^
[   35.538367]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.539275]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.540191] ==================================================================
[   34.136082] ==================================================================
[   34.136926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.138089] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.139864] 
[   34.140777] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.142010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.142589] Hardware name: linux,dummy-virt (DT)
[   34.143365] Call trace:
[   34.144159]  show_stack+0x20/0x38 (C)
[   34.144615]  dump_stack_lvl+0x8c/0xd0
[   34.145199]  print_report+0x118/0x5e0
[   34.145919]  kasan_report+0xc8/0x118
[   34.146986]  kasan_check_range+0x100/0x1a8
[   34.148002]  __kasan_check_read+0x20/0x30
[   34.148568]  kasan_atomics_helper+0x1ec/0x4858
[   34.149301]  kasan_atomics+0x198/0x2e8
[   34.149810]  kunit_try_run_case+0x14c/0x3d0
[   34.150428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.151161]  kthread+0x24c/0x2d0
[   34.151789]  ret_from_fork+0x10/0x20
[   34.152443] 
[   34.152865] Allocated by task 254:
[   34.153569]  kasan_save_stack+0x3c/0x68
[   34.154349]  kasan_save_track+0x20/0x40
[   34.155941]  kasan_save_alloc_info+0x40/0x58
[   34.156479]  __kasan_kmalloc+0xd4/0xd8
[   34.157080]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.157726]  kasan_atomics+0xb8/0x2e8
[   34.158368]  kunit_try_run_case+0x14c/0x3d0
[   34.158945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.159797]  kthread+0x24c/0x2d0
[   34.160759]  ret_from_fork+0x10/0x20
[   34.161681] 
[   34.162297] The buggy address belongs to the object at fff00000c664f800
[   34.162297]  which belongs to the cache kmalloc-64 of size 64
[   34.164162] The buggy address is located 0 bytes to the right of
[   34.164162]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.165571] 
[   34.165866] The buggy address belongs to the physical page:
[   34.166785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.168016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.168816] page_type: f5(slab)
[   34.169320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.172289] page dumped because: kasan: bad access detected
[   34.173231] 
[   34.173411] Memory state around the buggy address:
[   34.173717]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.174789]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.176155] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.177377]                                      ^
[   34.178387]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.178944]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.180370] ==================================================================
[   34.648792] ==================================================================
[   34.649598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   34.650412] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.651449] 
[   34.652042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.653348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.653779] Hardware name: linux,dummy-virt (DT)
[   34.654507] Call trace:
[   34.654865]  show_stack+0x20/0x38 (C)
[   34.655513]  dump_stack_lvl+0x8c/0xd0
[   34.656266]  print_report+0x118/0x5e0
[   34.656773]  kasan_report+0xc8/0x118
[   34.657446]  kasan_check_range+0x100/0x1a8
[   34.658044]  __kasan_check_write+0x20/0x30
[   34.658715]  kasan_atomics_helper+0x61c/0x4858
[   34.659428]  kasan_atomics+0x198/0x2e8
[   34.660122]  kunit_try_run_case+0x14c/0x3d0
[   34.660759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.661516]  kthread+0x24c/0x2d0
[   34.662065]  ret_from_fork+0x10/0x20
[   34.662711] 
[   34.663108] Allocated by task 254:
[   34.663591]  kasan_save_stack+0x3c/0x68
[   34.664206]  kasan_save_track+0x20/0x40
[   34.664761]  kasan_save_alloc_info+0x40/0x58
[   34.665483]  __kasan_kmalloc+0xd4/0xd8
[   34.665999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.666743]  kasan_atomics+0xb8/0x2e8
[   34.667339]  kunit_try_run_case+0x14c/0x3d0
[   34.668067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.668889]  kthread+0x24c/0x2d0
[   34.669315]  ret_from_fork+0x10/0x20
[   34.669921] 
[   34.670319] The buggy address belongs to the object at fff00000c664f800
[   34.670319]  which belongs to the cache kmalloc-64 of size 64
[   34.671679] The buggy address is located 0 bytes to the right of
[   34.671679]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.673093] 
[   34.673466] The buggy address belongs to the physical page:
[   34.674219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.675158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.675965] page_type: f5(slab)
[   34.676422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.677414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.678394] page dumped because: kasan: bad access detected
[   34.679112] 
[   34.679458] Memory state around the buggy address:
[   34.680173]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.680982]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.681964] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.682865]                                      ^
[   34.683520]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.684428]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.685309] ==================================================================
[   34.728077] ==================================================================
[   34.728920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   34.729831] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.731005] 
[   34.731477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.733039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.733704] Hardware name: linux,dummy-virt (DT)
[   34.734418] Call trace:
[   34.734952]  show_stack+0x20/0x38 (C)
[   34.735557]  dump_stack_lvl+0x8c/0xd0
[   34.736289]  print_report+0x118/0x5e0
[   34.736984]  kasan_report+0xc8/0x118
[   34.737611]  kasan_check_range+0x100/0x1a8
[   34.738301]  __kasan_check_write+0x20/0x30
[   34.739005]  kasan_atomics_helper+0x6ec/0x4858
[   34.739801]  kasan_atomics+0x198/0x2e8
[   34.740536]  kunit_try_run_case+0x14c/0x3d0
[   34.741234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742108]  kthread+0x24c/0x2d0
[   34.742630]  ret_from_fork+0x10/0x20
[   34.743293] 
[   34.743626] Allocated by task 254:
[   34.744258]  kasan_save_stack+0x3c/0x68
[   34.744964]  kasan_save_track+0x20/0x40
[   34.745713]  kasan_save_alloc_info+0x40/0x58
[   34.746405]  __kasan_kmalloc+0xd4/0xd8
[   34.747074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.747765]  kasan_atomics+0xb8/0x2e8
[   34.748388]  kunit_try_run_case+0x14c/0x3d0
[   34.749147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.749950]  kthread+0x24c/0x2d0
[   34.750568]  ret_from_fork+0x10/0x20
[   34.751321] 
[   34.751772] The buggy address belongs to the object at fff00000c664f800
[   34.751772]  which belongs to the cache kmalloc-64 of size 64
[   34.753239] The buggy address is located 0 bytes to the right of
[   34.753239]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.754794] 
[   34.755296] The buggy address belongs to the physical page:
[   34.756113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.757109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.757976] page_type: f5(slab)
[   34.758521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.759529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.760476] page dumped because: kasan: bad access detected
[   34.761236] 
[   34.761567] Memory state around the buggy address:
[   34.762343]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.763323]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.764330] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.765246]                                      ^
[   34.765973]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766984]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.767866] ==================================================================
[   36.273066] ==================================================================
[   36.273892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.275764] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.276734] 
[   36.277236] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.278485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.279132] Hardware name: linux,dummy-virt (DT)
[   36.279865] Call trace:
[   36.280443]  show_stack+0x20/0x38 (C)
[   36.281122]  dump_stack_lvl+0x8c/0xd0
[   36.281766]  print_report+0x118/0x5e0
[   36.282423]  kasan_report+0xc8/0x118
[   36.283064]  kasan_check_range+0x100/0x1a8
[   36.283708]  __kasan_check_write+0x20/0x30
[   36.284401]  kasan_atomics_helper+0x15b4/0x4858
[   36.285123]  kasan_atomics+0x198/0x2e8
[   36.285754]  kunit_try_run_case+0x14c/0x3d0
[   36.286450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.287256]  kthread+0x24c/0x2d0
[   36.287857]  ret_from_fork+0x10/0x20
[   36.288577] 
[   36.288922] Allocated by task 254:
[   36.289509]  kasan_save_stack+0x3c/0x68
[   36.290163]  kasan_save_track+0x20/0x40
[   36.290863]  kasan_save_alloc_info+0x40/0x58
[   36.291596]  __kasan_kmalloc+0xd4/0xd8
[   36.292330]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.293042]  kasan_atomics+0xb8/0x2e8
[   36.293594]  kunit_try_run_case+0x14c/0x3d0
[   36.294261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.295100]  kthread+0x24c/0x2d0
[   36.295653]  ret_from_fork+0x10/0x20
[   36.296306] 
[   36.296722] The buggy address belongs to the object at fff00000c664f800
[   36.296722]  which belongs to the cache kmalloc-64 of size 64
[   36.298157] The buggy address is located 0 bytes to the right of
[   36.298157]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.299757] 
[   36.300211] The buggy address belongs to the physical page:
[   36.301055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.302068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.302945] page_type: f5(slab)
[   36.303522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.304477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.305443] page dumped because: kasan: bad access detected
[   36.306227] 
[   36.306693] Memory state around the buggy address:
[   36.307366]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.308385]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.309401] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.310347]                                      ^
[   36.311099]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.312128]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.313038] ==================================================================
[   34.323497] ==================================================================
[   34.324287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.326032] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.327027] 
[   34.327721] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.329042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.329593] Hardware name: linux,dummy-virt (DT)
[   34.330326] Call trace:
[   34.330772]  show_stack+0x20/0x38 (C)
[   34.331908]  dump_stack_lvl+0x8c/0xd0
[   34.332578]  print_report+0x118/0x5e0
[   34.333319]  kasan_report+0xc8/0x118
[   34.333964]  kasan_check_range+0x100/0x1a8
[   34.334599]  __kasan_check_write+0x20/0x30
[   34.335270]  kasan_atomics_helper+0x32c/0x4858
[   34.336233]  kasan_atomics+0x198/0x2e8
[   34.336892]  kunit_try_run_case+0x14c/0x3d0
[   34.337694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.338504]  kthread+0x24c/0x2d0
[   34.339141]  ret_from_fork+0x10/0x20
[   34.339930] 
[   34.340616] Allocated by task 254:
[   34.341312]  kasan_save_stack+0x3c/0x68
[   34.341795]  kasan_save_track+0x20/0x40
[   34.342450]  kasan_save_alloc_info+0x40/0x58
[   34.343749]  __kasan_kmalloc+0xd4/0xd8
[   34.344340]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.344947]  kasan_atomics+0xb8/0x2e8
[   34.345441]  kunit_try_run_case+0x14c/0x3d0
[   34.346080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.346870]  kthread+0x24c/0x2d0
[   34.347447]  ret_from_fork+0x10/0x20
[   34.347998] 
[   34.348274] The buggy address belongs to the object at fff00000c664f800
[   34.348274]  which belongs to the cache kmalloc-64 of size 64
[   34.351078] The buggy address is located 0 bytes to the right of
[   34.351078]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.352442] 
[   34.353250] The buggy address belongs to the physical page:
[   34.354186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.355400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.356675] page_type: f5(slab)
[   34.357787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.358902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.359944] page dumped because: kasan: bad access detected
[   34.360689] 
[   34.361370] Memory state around the buggy address:
[   34.361871]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.362821]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.364150] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.364895]                                      ^
[   34.365622]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.366458]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.367357] ==================================================================
[   34.854270] ==================================================================
[   34.854977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   34.856257] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.857644] 
[   34.858018] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.859424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.860190] Hardware name: linux,dummy-virt (DT)
[   34.860751] Call trace:
[   34.861207]  show_stack+0x20/0x38 (C)
[   34.861509]  dump_stack_lvl+0x8c/0xd0
[   34.861806]  print_report+0x118/0x5e0
[   34.862688]  kasan_report+0xc8/0x118
[   34.863509]  kasan_check_range+0x100/0x1a8
[   34.864131]  __kasan_check_write+0x20/0x30
[   34.864746]  kasan_atomics_helper+0x894/0x4858
[   34.865434]  kasan_atomics+0x198/0x2e8
[   34.866006]  kunit_try_run_case+0x14c/0x3d0
[   34.866702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.867515]  kthread+0x24c/0x2d0
[   34.868011]  ret_from_fork+0x10/0x20
[   34.868518] 
[   34.868861] Allocated by task 254:
[   34.869400]  kasan_save_stack+0x3c/0x68
[   34.870082]  kasan_save_track+0x20/0x40
[   34.870847]  kasan_save_alloc_info+0x40/0x58
[   34.871647]  __kasan_kmalloc+0xd4/0xd8
[   34.872366]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.873052]  kasan_atomics+0xb8/0x2e8
[   34.873708]  kunit_try_run_case+0x14c/0x3d0
[   34.874488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.875290]  kthread+0x24c/0x2d0
[   34.875995]  ret_from_fork+0x10/0x20
[   34.876662] 
[   34.877106] The buggy address belongs to the object at fff00000c664f800
[   34.877106]  which belongs to the cache kmalloc-64 of size 64
[   34.878229] The buggy address is located 0 bytes to the right of
[   34.878229]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.878936] 
[   34.879314] The buggy address belongs to the physical page:
[   34.880102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.880980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.882104] page_type: f5(slab)
[   34.882558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.883572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.884654] page dumped because: kasan: bad access detected
[   34.885456] 
[   34.885934] Memory state around the buggy address:
[   34.886641]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.887656]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.888562] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.889508]                                      ^
[   34.890245]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.891193]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.892199] ==================================================================
[   36.507772] ==================================================================
[   36.508517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.510446] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.512569] 
[   36.513176] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.514391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.514948] Hardware name: linux,dummy-virt (DT)
[   36.515553] Call trace:
[   36.515959]  show_stack+0x20/0x38 (C)
[   36.516528]  dump_stack_lvl+0x8c/0xd0
[   36.517241]  print_report+0x118/0x5e0
[   36.517803]  kasan_report+0xc8/0x118
[   36.518454]  kasan_check_range+0x100/0x1a8
[   36.519091]  __kasan_check_write+0x20/0x30
[   36.519705]  kasan_atomics_helper+0x175c/0x4858
[   36.520386]  kasan_atomics+0x198/0x2e8
[   36.521040]  kunit_try_run_case+0x14c/0x3d0
[   36.521760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.522487]  kthread+0x24c/0x2d0
[   36.523028]  ret_from_fork+0x10/0x20
[   36.523523] 
[   36.523977] Allocated by task 254:
[   36.524530]  kasan_save_stack+0x3c/0x68
[   36.525033]  kasan_save_track+0x20/0x40
[   36.525737]  kasan_save_alloc_info+0x40/0x58
[   36.526350]  __kasan_kmalloc+0xd4/0xd8
[   36.527024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.527641]  kasan_atomics+0xb8/0x2e8
[   36.528124]  kunit_try_run_case+0x14c/0x3d0
[   36.528808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.529582]  kthread+0x24c/0x2d0
[   36.530081]  ret_from_fork+0x10/0x20
[   36.530712] 
[   36.531077] The buggy address belongs to the object at fff00000c664f800
[   36.531077]  which belongs to the cache kmalloc-64 of size 64
[   36.532396] The buggy address is located 0 bytes to the right of
[   36.532396]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.533840] 
[   36.534236] The buggy address belongs to the physical page:
[   36.535134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.536268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.537262] page_type: f5(slab)
[   36.537958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.538846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.539852] page dumped because: kasan: bad access detected
[   36.540552] 
[   36.541105] Memory state around the buggy address:
[   36.541772]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.542663]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.543546] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.544430]                                      ^
[   36.545118]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.546091]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.547024] ==================================================================
[   34.893763] ==================================================================
[   34.894424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   34.896802] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.897989] 
[   34.898442] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.899560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.900138] Hardware name: linux,dummy-virt (DT)
[   34.900996] Call trace:
[   34.901603]  show_stack+0x20/0x38 (C)
[   34.902410]  dump_stack_lvl+0x8c/0xd0
[   34.903206]  print_report+0x118/0x5e0
[   34.903818]  kasan_report+0xc8/0x118
[   34.904284]  __asan_report_load4_noabort+0x20/0x30
[   34.905215]  kasan_atomics_helper+0x42d8/0x4858
[   34.905775]  kasan_atomics+0x198/0x2e8
[   34.906349]  kunit_try_run_case+0x14c/0x3d0
[   34.906986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.907674]  kthread+0x24c/0x2d0
[   34.908264]  ret_from_fork+0x10/0x20
[   34.908779] 
[   34.909138] Allocated by task 254:
[   34.909816]  kasan_save_stack+0x3c/0x68
[   34.910446]  kasan_save_track+0x20/0x40
[   34.911036]  kasan_save_alloc_info+0x40/0x58
[   34.911748]  __kasan_kmalloc+0xd4/0xd8
[   34.912420]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.912961]  kasan_atomics+0xb8/0x2e8
[   34.913574]  kunit_try_run_case+0x14c/0x3d0
[   34.914273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.915082]  kthread+0x24c/0x2d0
[   34.915578]  ret_from_fork+0x10/0x20
[   34.916224] 
[   34.916591] The buggy address belongs to the object at fff00000c664f800
[   34.916591]  which belongs to the cache kmalloc-64 of size 64
[   34.918006] The buggy address is located 0 bytes to the right of
[   34.918006]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.919445] 
[   34.919726] The buggy address belongs to the physical page:
[   34.920489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.921364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.922315] page_type: f5(slab)
[   34.922747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.923705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.924617] page dumped because: kasan: bad access detected
[   34.925318] 
[   34.925627] Memory state around the buggy address:
[   34.926290]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.927182]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.928125] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.928965]                                      ^
[   34.929594]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.930502]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.931325] ==================================================================
[   35.199084] ==================================================================
[   35.200293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.201448] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.202490] 
[   35.202953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.204337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.204912] Hardware name: linux,dummy-virt (DT)
[   35.205509] Call trace:
[   35.206002]  show_stack+0x20/0x38 (C)
[   35.206651]  dump_stack_lvl+0x8c/0xd0
[   35.207289]  print_report+0x118/0x5e0
[   35.207810]  kasan_report+0xc8/0x118
[   35.208453]  __asan_report_load4_noabort+0x20/0x30
[   35.209134]  kasan_atomics_helper+0x3dbc/0x4858
[   35.209761]  kasan_atomics+0x198/0x2e8
[   35.210438]  kunit_try_run_case+0x14c/0x3d0
[   35.211006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211841]  kthread+0x24c/0x2d0
[   35.212503]  ret_from_fork+0x10/0x20
[   35.213041] 
[   35.213417] Allocated by task 254:
[   35.213915]  kasan_save_stack+0x3c/0x68
[   35.214436]  kasan_save_track+0x20/0x40
[   35.215203]  kasan_save_alloc_info+0x40/0x58
[   35.215831]  __kasan_kmalloc+0xd4/0xd8
[   35.216333]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.217111]  kasan_atomics+0xb8/0x2e8
[   35.217649]  kunit_try_run_case+0x14c/0x3d0
[   35.218300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.219081]  kthread+0x24c/0x2d0
[   35.219702]  ret_from_fork+0x10/0x20
[   35.220333] 
[   35.220642] The buggy address belongs to the object at fff00000c664f800
[   35.220642]  which belongs to the cache kmalloc-64 of size 64
[   35.222088] The buggy address is located 0 bytes to the right of
[   35.222088]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.223482] 
[   35.223765] The buggy address belongs to the physical page:
[   35.224523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.225601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226360] page_type: f5(slab)
[   35.226861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.228163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.228900] page dumped because: kasan: bad access detected
[   35.229552] 
[   35.229924] Memory state around the buggy address:
[   35.230630]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.231453]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.232354] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.233305]                                      ^
[   35.233920]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234849]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.235705] ==================================================================
[   34.411566] ==================================================================
[   34.412244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.414379] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.415458] 
[   34.415791] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.417032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417649] Hardware name: linux,dummy-virt (DT)
[   34.418239] Call trace:
[   34.418630]  show_stack+0x20/0x38 (C)
[   34.419325]  dump_stack_lvl+0x8c/0xd0
[   34.419895]  print_report+0x118/0x5e0
[   34.420454]  kasan_report+0xc8/0x118
[   34.421541]  kasan_check_range+0x100/0x1a8
[   34.422063]  __kasan_check_write+0x20/0x30
[   34.422704]  kasan_atomics_helper+0x3ac/0x4858
[   34.423720]  kasan_atomics+0x198/0x2e8
[   34.424315]  kunit_try_run_case+0x14c/0x3d0
[   34.425003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.425805]  kthread+0x24c/0x2d0
[   34.426425]  ret_from_fork+0x10/0x20
[   34.427099] 
[   34.427960] Allocated by task 254:
[   34.428611]  kasan_save_stack+0x3c/0x68
[   34.429268]  kasan_save_track+0x20/0x40
[   34.429958]  kasan_save_alloc_info+0x40/0x58
[   34.430847]  __kasan_kmalloc+0xd4/0xd8
[   34.431855]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.432568]  kasan_atomics+0xb8/0x2e8
[   34.433104]  kunit_try_run_case+0x14c/0x3d0
[   34.433751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.434356]  kthread+0x24c/0x2d0
[   34.434981]  ret_from_fork+0x10/0x20
[   34.435438] 
[   34.435987] The buggy address belongs to the object at fff00000c664f800
[   34.435987]  which belongs to the cache kmalloc-64 of size 64
[   34.437413] The buggy address is located 0 bytes to the right of
[   34.437413]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.438843] 
[   34.439156] The buggy address belongs to the physical page:
[   34.440181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.441057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.441923] page_type: f5(slab)
[   34.442569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.443777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.444767] page dumped because: kasan: bad access detected
[   34.445751] 
[   34.446135] Memory state around the buggy address:
[   34.446909]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.447698]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.448992] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.449917]                                      ^
[   34.450664]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.451744]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.452603] ==================================================================
[   35.313851] ==================================================================
[   35.314645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.315561] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.316519] 
[   35.316921] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.318029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.318697] Hardware name: linux,dummy-virt (DT)
[   35.319328] Call trace:
[   35.319754]  show_stack+0x20/0x38 (C)
[   35.320388]  dump_stack_lvl+0x8c/0xd0
[   35.321118]  print_report+0x118/0x5e0
[   35.321721]  kasan_report+0xc8/0x118
[   35.322366]  kasan_check_range+0x100/0x1a8
[   35.323003]  __kasan_check_write+0x20/0x30
[   35.323697]  kasan_atomics_helper+0xca0/0x4858
[   35.324313]  kasan_atomics+0x198/0x2e8
[   35.324959]  kunit_try_run_case+0x14c/0x3d0
[   35.325758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.326592]  kthread+0x24c/0x2d0
[   35.327094]  ret_from_fork+0x10/0x20
[   35.327650] 
[   35.328063] Allocated by task 254:
[   35.328529]  kasan_save_stack+0x3c/0x68
[   35.329216]  kasan_save_track+0x20/0x40
[   35.329825]  kasan_save_alloc_info+0x40/0x58
[   35.330463]  __kasan_kmalloc+0xd4/0xd8
[   35.331002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.331701]  kasan_atomics+0xb8/0x2e8
[   35.332164]  kunit_try_run_case+0x14c/0x3d0
[   35.332830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.333600]  kthread+0x24c/0x2d0
[   35.334143]  ret_from_fork+0x10/0x20
[   35.334719] 
[   35.335022] The buggy address belongs to the object at fff00000c664f800
[   35.335022]  which belongs to the cache kmalloc-64 of size 64
[   35.336431] The buggy address is located 0 bytes to the right of
[   35.336431]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.337794] 
[   35.338096] The buggy address belongs to the physical page:
[   35.338812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.339835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.340750] page_type: f5(slab)
[   35.341332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.342284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.343170] page dumped because: kasan: bad access detected
[   35.343834] 
[   35.344240] Memory state around the buggy address:
[   35.344913]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.345756]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.346729] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.347564]                                      ^
[   35.348213]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349147]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350026] ==================================================================
[   35.620138] ==================================================================
[   35.621157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.621556] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.622036] 
[   35.622411] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.623767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.624340] Hardware name: linux,dummy-virt (DT)
[   35.625126] Call trace:
[   35.625523]  show_stack+0x20/0x38 (C)
[   35.626149]  dump_stack_lvl+0x8c/0xd0
[   35.626802]  print_report+0x118/0x5e0
[   35.627452]  kasan_report+0xc8/0x118
[   35.628131]  kasan_check_range+0x100/0x1a8
[   35.628712]  __kasan_check_write+0x20/0x30
[   35.629438]  kasan_atomics_helper+0xeb8/0x4858
[   35.630052]  kasan_atomics+0x198/0x2e8
[   35.630743]  kunit_try_run_case+0x14c/0x3d0
[   35.631281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.632150]  kthread+0x24c/0x2d0
[   35.632727]  ret_from_fork+0x10/0x20
[   35.633368] 
[   35.633698] Allocated by task 254:
[   35.634134]  kasan_save_stack+0x3c/0x68
[   35.634828]  kasan_save_track+0x20/0x40
[   35.635499]  kasan_save_alloc_info+0x40/0x58
[   35.636205]  __kasan_kmalloc+0xd4/0xd8
[   35.636776]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.637333]  kasan_atomics+0xb8/0x2e8
[   35.638013]  kunit_try_run_case+0x14c/0x3d0
[   35.638622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.639381]  kthread+0x24c/0x2d0
[   35.639860]  ret_from_fork+0x10/0x20
[   35.640417] 
[   35.640757] The buggy address belongs to the object at fff00000c664f800
[   35.640757]  which belongs to the cache kmalloc-64 of size 64
[   35.642185] The buggy address is located 0 bytes to the right of
[   35.642185]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.643609] 
[   35.643929] The buggy address belongs to the physical page:
[   35.644862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.645782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.646585] page_type: f5(slab)
[   35.647115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.648046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.649049] page dumped because: kasan: bad access detected
[   35.649668] 
[   35.650043] Memory state around the buggy address:
[   35.650572]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.651563]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.652393] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.653347]                                      ^
[   35.654010]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.654850]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.655705] ==================================================================
[   35.851988] ==================================================================
[   35.852813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.853620] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.854401] 
[   35.854810] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.856039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.856676] Hardware name: linux,dummy-virt (DT)
[   35.857363] Call trace:
[   35.857840]  show_stack+0x20/0x38 (C)
[   35.858435]  dump_stack_lvl+0x8c/0xd0
[   35.859100]  print_report+0x118/0x5e0
[   35.859772]  kasan_report+0xc8/0x118
[   35.860427]  kasan_check_range+0x100/0x1a8
[   35.861039]  __kasan_check_write+0x20/0x30
[   35.861738]  kasan_atomics_helper+0x1128/0x4858
[   35.862417]  kasan_atomics+0x198/0x2e8
[   35.863038]  kunit_try_run_case+0x14c/0x3d0
[   35.863631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.864340]  kthread+0x24c/0x2d0
[   35.864921]  ret_from_fork+0x10/0x20
[   35.865493] 
[   35.865769] Allocated by task 254:
[   35.866348]  kasan_save_stack+0x3c/0x68
[   35.866944]  kasan_save_track+0x20/0x40
[   35.867569]  kasan_save_alloc_info+0x40/0x58
[   35.868118]  __kasan_kmalloc+0xd4/0xd8
[   35.868756]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.869309]  kasan_atomics+0xb8/0x2e8
[   35.870083]  kunit_try_run_case+0x14c/0x3d0
[   35.870594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.871444]  kthread+0x24c/0x2d0
[   35.871974]  ret_from_fork+0x10/0x20
[   35.872513] 
[   35.872839] The buggy address belongs to the object at fff00000c664f800
[   35.872839]  which belongs to the cache kmalloc-64 of size 64
[   35.874311] The buggy address is located 0 bytes to the right of
[   35.874311]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.875763] 
[   35.876129] The buggy address belongs to the physical page:
[   35.876919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.877761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.878674] page_type: f5(slab)
[   35.879197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.880131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.881082] page dumped because: kasan: bad access detected
[   35.881731] 
[   35.882111] Memory state around the buggy address:
[   35.882777]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.883628]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.884452] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.885374]                                      ^
[   35.885967]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.886860]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.887692] ==================================================================
[   35.657214] ==================================================================
[   35.658033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.659141] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.660308] 
[   35.660672] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.661868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.662525] Hardware name: linux,dummy-virt (DT)
[   35.663141] Call trace:
[   35.663675]  show_stack+0x20/0x38 (C)
[   35.664340]  dump_stack_lvl+0x8c/0xd0
[   35.664947]  print_report+0x118/0x5e0
[   35.665524]  kasan_report+0xc8/0x118
[   35.666088]  kasan_check_range+0x100/0x1a8
[   35.666687]  __kasan_check_write+0x20/0x30
[   35.667458]  kasan_atomics_helper+0xf20/0x4858
[   35.668092]  kasan_atomics+0x198/0x2e8
[   35.668734]  kunit_try_run_case+0x14c/0x3d0
[   35.669390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.670196]  kthread+0x24c/0x2d0
[   35.670822]  ret_from_fork+0x10/0x20
[   35.671377] 
[   35.671713] Allocated by task 254:
[   35.672205]  kasan_save_stack+0x3c/0x68
[   35.672846]  kasan_save_track+0x20/0x40
[   35.673423]  kasan_save_alloc_info+0x40/0x58
[   35.673972]  __kasan_kmalloc+0xd4/0xd8
[   35.674645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.675298]  kasan_atomics+0xb8/0x2e8
[   35.675951]  kunit_try_run_case+0x14c/0x3d0
[   35.676581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.677437]  kthread+0x24c/0x2d0
[   35.677951]  ret_from_fork+0x10/0x20
[   35.678421] 
[   35.678824] The buggy address belongs to the object at fff00000c664f800
[   35.678824]  which belongs to the cache kmalloc-64 of size 64
[   35.680262] The buggy address is located 0 bytes to the right of
[   35.680262]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.681680] 
[   35.682088] The buggy address belongs to the physical page:
[   35.682906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.683805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.684607] page_type: f5(slab)
[   35.685182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.686142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.687138] page dumped because: kasan: bad access detected
[   35.687799] 
[   35.688138] Memory state around the buggy address:
[   35.688744]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.689588]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.690457] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.691416]                                      ^
[   35.692050]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.692936]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.693758] ==================================================================
[   35.083957] ==================================================================
[   35.084681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.085662] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.086505] 
[   35.086899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.088188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.088679] Hardware name: linux,dummy-virt (DT)
[   35.089436] Call trace:
[   35.089867]  show_stack+0x20/0x38 (C)
[   35.090528]  dump_stack_lvl+0x8c/0xd0
[   35.091219]  print_report+0x118/0x5e0
[   35.091762]  kasan_report+0xc8/0x118
[   35.092521]  kasan_check_range+0x100/0x1a8
[   35.093104]  __kasan_check_write+0x20/0x30
[   35.093839]  kasan_atomics_helper+0xad4/0x4858
[   35.094598]  kasan_atomics+0x198/0x2e8
[   35.095156]  kunit_try_run_case+0x14c/0x3d0
[   35.095778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.096461]  kthread+0x24c/0x2d0
[   35.097110]  ret_from_fork+0x10/0x20
[   35.097695] 
[   35.098053] Allocated by task 254:
[   35.098615]  kasan_save_stack+0x3c/0x68
[   35.099229]  kasan_save_track+0x20/0x40
[   35.099689]  kasan_save_alloc_info+0x40/0x58
[   35.100383]  __kasan_kmalloc+0xd4/0xd8
[   35.100982]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.101496]  kasan_atomics+0xb8/0x2e8
[   35.102149]  kunit_try_run_case+0x14c/0x3d0
[   35.102772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.103543]  kthread+0x24c/0x2d0
[   35.104145]  ret_from_fork+0x10/0x20
[   35.104650] 
[   35.104985] The buggy address belongs to the object at fff00000c664f800
[   35.104985]  which belongs to the cache kmalloc-64 of size 64
[   35.106394] The buggy address is located 0 bytes to the right of
[   35.106394]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.107827] 
[   35.108196] The buggy address belongs to the physical page:
[   35.109097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.109959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.110905] page_type: f5(slab)
[   35.111406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.112362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.113377] page dumped because: kasan: bad access detected
[   35.114058] 
[   35.114424] Memory state around the buggy address:
[   35.115258]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.116043]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.116963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.117797]                                      ^
[   35.118408]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.119344]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.120189] ==================================================================
[   34.368641] ==================================================================
[   34.369533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.370541] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.372217] 
[   34.372708] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.373842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.374531] Hardware name: linux,dummy-virt (DT)
[   34.375035] Call trace:
[   34.375626]  show_stack+0x20/0x38 (C)
[   34.376256]  dump_stack_lvl+0x8c/0xd0
[   34.376866]  print_report+0x118/0x5e0
[   34.377441]  kasan_report+0xc8/0x118
[   34.378236]  __asan_report_store4_noabort+0x20/0x30
[   34.378938]  kasan_atomics_helper+0x3f94/0x4858
[   34.380306]  kasan_atomics+0x198/0x2e8
[   34.380866]  kunit_try_run_case+0x14c/0x3d0
[   34.381523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.382340]  kthread+0x24c/0x2d0
[   34.382994]  ret_from_fork+0x10/0x20
[   34.383824] 
[   34.384260] Allocated by task 254:
[   34.384616]  kasan_save_stack+0x3c/0x68
[   34.385327]  kasan_save_track+0x20/0x40
[   34.385897]  kasan_save_alloc_info+0x40/0x58
[   34.386649]  __kasan_kmalloc+0xd4/0xd8
[   34.387270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.388385]  kasan_atomics+0xb8/0x2e8
[   34.389482]  kunit_try_run_case+0x14c/0x3d0
[   34.390080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.391045]  kthread+0x24c/0x2d0
[   34.391595]  ret_from_fork+0x10/0x20
[   34.392179] 
[   34.392533] The buggy address belongs to the object at fff00000c664f800
[   34.392533]  which belongs to the cache kmalloc-64 of size 64
[   34.394037] The buggy address is located 0 bytes to the right of
[   34.394037]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.395916] 
[   34.396630] The buggy address belongs to the physical page:
[   34.397238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.398386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.399422] page_type: f5(slab)
[   34.399958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.401461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.402513] page dumped because: kasan: bad access detected
[   34.403657] 
[   34.404074] Memory state around the buggy address:
[   34.405161]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.405581]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.406386] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.407800]                                      ^
[   34.408466]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409248]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.410138] ==================================================================
[   36.195622] ==================================================================
[   36.196200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.197759] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.198839] 
[   36.199429] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.200679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.201327] Hardware name: linux,dummy-virt (DT)
[   36.202042] Call trace:
[   36.202520]  show_stack+0x20/0x38 (C)
[   36.203262]  dump_stack_lvl+0x8c/0xd0
[   36.203896]  print_report+0x118/0x5e0
[   36.204469]  kasan_report+0xc8/0x118
[   36.205103]  kasan_check_range+0x100/0x1a8
[   36.205703]  __kasan_check_write+0x20/0x30
[   36.206426]  kasan_atomics_helper+0x14e4/0x4858
[   36.207042]  kasan_atomics+0x198/0x2e8
[   36.207711]  kunit_try_run_case+0x14c/0x3d0
[   36.208368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.209026]  kthread+0x24c/0x2d0
[   36.209700]  ret_from_fork+0x10/0x20
[   36.210297] 
[   36.210611] Allocated by task 254:
[   36.211233]  kasan_save_stack+0x3c/0x68
[   36.211738]  kasan_save_track+0x20/0x40
[   36.212398]  kasan_save_alloc_info+0x40/0x58
[   36.212950]  __kasan_kmalloc+0xd4/0xd8
[   36.213644]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.214243]  kasan_atomics+0xb8/0x2e8
[   36.214946]  kunit_try_run_case+0x14c/0x3d0
[   36.215538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.216170]  kthread+0x24c/0x2d0
[   36.216717]  ret_from_fork+0x10/0x20
[   36.217278] 
[   36.217602] The buggy address belongs to the object at fff00000c664f800
[   36.217602]  which belongs to the cache kmalloc-64 of size 64
[   36.219056] The buggy address is located 0 bytes to the right of
[   36.219056]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.220401] 
[   36.220723] The buggy address belongs to the physical page:
[   36.221556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.222439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.223242] page_type: f5(slab)
[   36.223779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.224675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.225633] page dumped because: kasan: bad access detected
[   36.226321] 
[   36.226623] Memory state around the buggy address:
[   36.227283]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.228143]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.229034] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.229897]                                      ^
[   36.230497]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.231480]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.232196] ==================================================================
[   36.470332] ==================================================================
[   36.471422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.472128] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.472896] 
[   36.473388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.474475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.475164] Hardware name: linux,dummy-virt (DT)
[   36.475796] Call trace:
[   36.476242]  show_stack+0x20/0x38 (C)
[   36.476748]  dump_stack_lvl+0x8c/0xd0
[   36.477414]  print_report+0x118/0x5e0
[   36.477924]  kasan_report+0xc8/0x118
[   36.478586]  __asan_report_load8_noabort+0x20/0x30
[   36.479298]  kasan_atomics_helper+0x3e10/0x4858
[   36.479964]  kasan_atomics+0x198/0x2e8
[   36.480631]  kunit_try_run_case+0x14c/0x3d0
[   36.481165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.481989]  kthread+0x24c/0x2d0
[   36.482527]  ret_from_fork+0x10/0x20
[   36.483085] 
[   36.483398] Allocated by task 254:
[   36.484013]  kasan_save_stack+0x3c/0x68
[   36.484611]  kasan_save_track+0x20/0x40
[   36.485140]  kasan_save_alloc_info+0x40/0x58
[   36.485849]  __kasan_kmalloc+0xd4/0xd8
[   36.486570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.487132]  kasan_atomics+0xb8/0x2e8
[   36.487786]  kunit_try_run_case+0x14c/0x3d0
[   36.488454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.489221]  kthread+0x24c/0x2d0
[   36.489728]  ret_from_fork+0x10/0x20
[   36.490288] 
[   36.490726] The buggy address belongs to the object at fff00000c664f800
[   36.490726]  which belongs to the cache kmalloc-64 of size 64
[   36.492095] The buggy address is located 0 bytes to the right of
[   36.492095]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.493543] 
[   36.493946] The buggy address belongs to the physical page:
[   36.494535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.495645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.496512] page_type: f5(slab)
[   36.496956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.497966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.498942] page dumped because: kasan: bad access detected
[   36.499552] 
[   36.499921] Memory state around the buggy address:
[   36.500569]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501431]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.502258] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.503214]                                      ^
[   36.503932]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.504847]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.505703] ==================================================================
[   35.046785] ==================================================================
[   35.047482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.048634] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.049557] 
[   35.050042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.051093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.051440] Hardware name: linux,dummy-virt (DT)
[   35.051744] Call trace:
[   35.052141]  show_stack+0x20/0x38 (C)
[   35.052953]  dump_stack_lvl+0x8c/0xd0
[   35.053766]  print_report+0x118/0x5e0
[   35.054383]  kasan_report+0xc8/0x118
[   35.055005]  kasan_check_range+0x100/0x1a8
[   35.055702]  __kasan_check_write+0x20/0x30
[   35.056381]  kasan_atomics_helper+0xa6c/0x4858
[   35.057148]  kasan_atomics+0x198/0x2e8
[   35.057820]  kunit_try_run_case+0x14c/0x3d0
[   35.058453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.059220]  kthread+0x24c/0x2d0
[   35.059845]  ret_from_fork+0x10/0x20
[   35.060403] 
[   35.060747] Allocated by task 254:
[   35.061223]  kasan_save_stack+0x3c/0x68
[   35.061839]  kasan_save_track+0x20/0x40
[   35.062420]  kasan_save_alloc_info+0x40/0x58
[   35.063062]  __kasan_kmalloc+0xd4/0xd8
[   35.063576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.064279]  kasan_atomics+0xb8/0x2e8
[   35.064752]  kunit_try_run_case+0x14c/0x3d0
[   35.065490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.066131]  kthread+0x24c/0x2d0
[   35.066693]  ret_from_fork+0x10/0x20
[   35.067200] 
[   35.067594] The buggy address belongs to the object at fff00000c664f800
[   35.067594]  which belongs to the cache kmalloc-64 of size 64
[   35.069063] The buggy address is located 0 bytes to the right of
[   35.069063]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.070494] 
[   35.070814] The buggy address belongs to the physical page:
[   35.071456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.072476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.073319] page_type: f5(slab)
[   35.073845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.074832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.075763] page dumped because: kasan: bad access detected
[   35.076472] 
[   35.076837] Memory state around the buggy address:
[   35.077445]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.078192]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.079268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.080091]                                      ^
[   35.080700]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.081591]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.082498] ==================================================================
[   35.122200] ==================================================================
[   35.122922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.123969] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.125148] 
[   35.125524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.126983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.127600] Hardware name: linux,dummy-virt (DT)
[   35.128163] Call trace:
[   35.128379]  show_stack+0x20/0x38 (C)
[   35.128672]  dump_stack_lvl+0x8c/0xd0
[   35.129053]  print_report+0x118/0x5e0
[   35.129995]  kasan_report+0xc8/0x118
[   35.130627]  __asan_report_load4_noabort+0x20/0x30
[   35.131400]  kasan_atomics_helper+0x3dcc/0x4858
[   35.132195]  kasan_atomics+0x198/0x2e8
[   35.132722]  kunit_try_run_case+0x14c/0x3d0
[   35.133514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.134342]  kthread+0x24c/0x2d0
[   35.134976]  ret_from_fork+0x10/0x20
[   35.135605] 
[   35.136010] Allocated by task 254:
[   35.136600]  kasan_save_stack+0x3c/0x68
[   35.137293]  kasan_save_track+0x20/0x40
[   35.138019]  kasan_save_alloc_info+0x40/0x58
[   35.138710]  __kasan_kmalloc+0xd4/0xd8
[   35.139373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.140079]  kasan_atomics+0xb8/0x2e8
[   35.140682]  kunit_try_run_case+0x14c/0x3d0
[   35.141326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142135]  kthread+0x24c/0x2d0
[   35.142680]  ret_from_fork+0x10/0x20
[   35.143297] 
[   35.143702] The buggy address belongs to the object at fff00000c664f800
[   35.143702]  which belongs to the cache kmalloc-64 of size 64
[   35.145215] The buggy address is located 0 bytes to the right of
[   35.145215]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.146824] 
[   35.147256] The buggy address belongs to the physical page:
[   35.147980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.149054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.149938] page_type: f5(slab)
[   35.150524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.151492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.152433] page dumped because: kasan: bad access detected
[   35.153214] 
[   35.153545] Memory state around the buggy address:
[   35.154341]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.155244]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.156203] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.156969]                                      ^
[   35.157555]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.158706]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.159574] ==================================================================
[   35.733422] ==================================================================
[   35.734196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.735134] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.736522] 
[   35.736909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.738110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.738639] Hardware name: linux,dummy-virt (DT)
[   35.739244] Call trace:
[   35.739708]  show_stack+0x20/0x38 (C)
[   35.740280]  dump_stack_lvl+0x8c/0xd0
[   35.740762]  print_report+0x118/0x5e0
[   35.741444]  kasan_report+0xc8/0x118
[   35.742034]  kasan_check_range+0x100/0x1a8
[   35.742637]  __kasan_check_write+0x20/0x30
[   35.743222]  kasan_atomics_helper+0xff0/0x4858
[   35.743926]  kasan_atomics+0x198/0x2e8
[   35.744595]  kunit_try_run_case+0x14c/0x3d0
[   35.745160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.746047]  kthread+0x24c/0x2d0
[   35.746649]  ret_from_fork+0x10/0x20
[   35.747244] 
[   35.747555] Allocated by task 254:
[   35.748144]  kasan_save_stack+0x3c/0x68
[   35.748658]  kasan_save_track+0x20/0x40
[   35.749289]  kasan_save_alloc_info+0x40/0x58
[   35.749903]  __kasan_kmalloc+0xd4/0xd8
[   35.750489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.751112]  kasan_atomics+0xb8/0x2e8
[   35.751635]  kunit_try_run_case+0x14c/0x3d0
[   35.752240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.752976]  kthread+0x24c/0x2d0
[   35.753488]  ret_from_fork+0x10/0x20
[   35.754037] 
[   35.754351] The buggy address belongs to the object at fff00000c664f800
[   35.754351]  which belongs to the cache kmalloc-64 of size 64
[   35.755750] The buggy address is located 0 bytes to the right of
[   35.755750]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.757235] 
[   35.757564] The buggy address belongs to the physical page:
[   35.758281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.759252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.760186] page_type: f5(slab)
[   35.760739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.761657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.762604] page dumped because: kasan: bad access detected
[   35.763282] 
[   35.763617] Memory state around the buggy address:
[   35.764268]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.765074]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.766000] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.766861]                                      ^
[   35.767510]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.768415]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.769308] ==================================================================
[   36.119828] ==================================================================
[   36.120465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.121609] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.122458] 
[   36.122767] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.124027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.124586] Hardware name: linux,dummy-virt (DT)
[   36.125269] Call trace:
[   36.125794]  show_stack+0x20/0x38 (C)
[   36.126389]  dump_stack_lvl+0x8c/0xd0
[   36.127126]  print_report+0x118/0x5e0
[   36.127673]  kasan_report+0xc8/0x118
[   36.128274]  kasan_check_range+0x100/0x1a8
[   36.128826]  __kasan_check_write+0x20/0x30
[   36.129578]  kasan_atomics_helper+0x1414/0x4858
[   36.130329]  kasan_atomics+0x198/0x2e8
[   36.130914]  kunit_try_run_case+0x14c/0x3d0
[   36.131564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132221]  kthread+0x24c/0x2d0
[   36.132862]  ret_from_fork+0x10/0x20
[   36.133391] 
[   36.133761] Allocated by task 254:
[   36.134321]  kasan_save_stack+0x3c/0x68
[   36.134893]  kasan_save_track+0x20/0x40
[   36.135426]  kasan_save_alloc_info+0x40/0x58
[   36.136112]  __kasan_kmalloc+0xd4/0xd8
[   36.136665]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.137576]  kasan_atomics+0xb8/0x2e8
[   36.138339]  kunit_try_run_case+0x14c/0x3d0
[   36.139253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.139948]  kthread+0x24c/0x2d0
[   36.140404]  ret_from_fork+0x10/0x20
[   36.141002] 
[   36.141361] The buggy address belongs to the object at fff00000c664f800
[   36.141361]  which belongs to the cache kmalloc-64 of size 64
[   36.142746] The buggy address is located 0 bytes to the right of
[   36.142746]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.144159] 
[   36.144458] The buggy address belongs to the physical page:
[   36.145175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.146249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.146960] page_type: f5(slab)
[   36.147524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.148443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.149358] page dumped because: kasan: bad access detected
[   36.150045] 
[   36.150339] Memory state around the buggy address:
[   36.151023]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.151832]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.152664] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.153535]                                      ^
[   36.154202]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.155084]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.155936] ==================================================================
[   36.157729] ==================================================================
[   36.158473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.160311] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.161166] 
[   36.161556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.162778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.163321] Hardware name: linux,dummy-virt (DT)
[   36.163917] Call trace:
[   36.164320]  show_stack+0x20/0x38 (C)
[   36.164929]  dump_stack_lvl+0x8c/0xd0
[   36.165495]  print_report+0x118/0x5e0
[   36.166110]  kasan_report+0xc8/0x118
[   36.166768]  kasan_check_range+0x100/0x1a8
[   36.167339]  __kasan_check_write+0x20/0x30
[   36.168111]  kasan_atomics_helper+0x147c/0x4858
[   36.168668]  kasan_atomics+0x198/0x2e8
[   36.169070]  kunit_try_run_case+0x14c/0x3d0
[   36.169747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.170503]  kthread+0x24c/0x2d0
[   36.171038]  ret_from_fork+0x10/0x20
[   36.171510] 
[   36.171892] Allocated by task 254:
[   36.172524]  kasan_save_stack+0x3c/0x68
[   36.173108]  kasan_save_track+0x20/0x40
[   36.173621]  kasan_save_alloc_info+0x40/0x58
[   36.174355]  __kasan_kmalloc+0xd4/0xd8
[   36.174947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.175531]  kasan_atomics+0xb8/0x2e8
[   36.176126]  kunit_try_run_case+0x14c/0x3d0
[   36.176730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.177492]  kthread+0x24c/0x2d0
[   36.178068]  ret_from_fork+0x10/0x20
[   36.178595] 
[   36.178978] The buggy address belongs to the object at fff00000c664f800
[   36.178978]  which belongs to the cache kmalloc-64 of size 64
[   36.180347] The buggy address is located 0 bytes to the right of
[   36.180347]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.181852] 
[   36.182201] The buggy address belongs to the physical page:
[   36.183105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.183927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.184793] page_type: f5(slab)
[   36.185311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.186216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.187172] page dumped because: kasan: bad access detected
[   36.187854] 
[   36.188208] Memory state around the buggy address:
[   36.188944]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.189786]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.190620] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.191529]                                      ^
[   36.192299]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.193168]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.194039] ==================================================================
[   36.082083] ==================================================================
[   36.082947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.084074] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.084892] 
[   36.085283] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.086498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087065] Hardware name: linux,dummy-virt (DT)
[   36.087791] Call trace:
[   36.088317]  show_stack+0x20/0x38 (C)
[   36.088824]  dump_stack_lvl+0x8c/0xd0
[   36.089553]  print_report+0x118/0x5e0
[   36.090150]  kasan_report+0xc8/0x118
[   36.090891]  __asan_report_load8_noabort+0x20/0x30
[   36.091562]  kasan_atomics_helper+0x3f04/0x4858
[   36.092297]  kasan_atomics+0x198/0x2e8
[   36.092900]  kunit_try_run_case+0x14c/0x3d0
[   36.093592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.094362]  kthread+0x24c/0x2d0
[   36.095032]  ret_from_fork+0x10/0x20
[   36.095671] 
[   36.096100] Allocated by task 254:
[   36.096533]  kasan_save_stack+0x3c/0x68
[   36.097259]  kasan_save_track+0x20/0x40
[   36.097801]  kasan_save_alloc_info+0x40/0x58
[   36.098385]  __kasan_kmalloc+0xd4/0xd8
[   36.099041]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.099833]  kasan_atomics+0xb8/0x2e8
[   36.100362]  kunit_try_run_case+0x14c/0x3d0
[   36.101065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.101814]  kthread+0x24c/0x2d0
[   36.102331]  ret_from_fork+0x10/0x20
[   36.102844] 
[   36.103219] The buggy address belongs to the object at fff00000c664f800
[   36.103219]  which belongs to the cache kmalloc-64 of size 64
[   36.104684] The buggy address is located 0 bytes to the right of
[   36.104684]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.106067] 
[   36.106393] The buggy address belongs to the physical page:
[   36.107078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.108021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.108965] page_type: f5(slab)
[   36.109506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.110529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.111457] page dumped because: kasan: bad access detected
[   36.112228] 
[   36.112535] Memory state around the buggy address:
[   36.113190]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.114094]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.115018] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.115819]                                      ^
[   36.116489]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117358]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.118203] ==================================================================
[   34.686837] ==================================================================
[   34.687661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   34.688511] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.689418] 
[   34.689917] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.691470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.692137] Hardware name: linux,dummy-virt (DT)
[   34.692796] Call trace:
[   34.693270]  show_stack+0x20/0x38 (C)
[   34.693983]  dump_stack_lvl+0x8c/0xd0
[   34.694665]  print_report+0x118/0x5e0
[   34.695340]  kasan_report+0xc8/0x118
[   34.695972]  kasan_check_range+0x100/0x1a8
[   34.696665]  __kasan_check_write+0x20/0x30
[   34.697357]  kasan_atomics_helper+0x684/0x4858
[   34.698064]  kasan_atomics+0x198/0x2e8
[   34.698735]  kunit_try_run_case+0x14c/0x3d0
[   34.699488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.700297]  kthread+0x24c/0x2d0
[   34.700977]  ret_from_fork+0x10/0x20
[   34.701607] 
[   34.701901] Allocated by task 254:
[   34.702459]  kasan_save_stack+0x3c/0x68
[   34.703157]  kasan_save_track+0x20/0x40
[   34.703791]  kasan_save_alloc_info+0x40/0x58
[   34.704455]  __kasan_kmalloc+0xd4/0xd8
[   34.705155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.705864]  kasan_atomics+0xb8/0x2e8
[   34.706487]  kunit_try_run_case+0x14c/0x3d0
[   34.707145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.707951]  kthread+0x24c/0x2d0
[   34.708509]  ret_from_fork+0x10/0x20
[   34.709126] 
[   34.709570] The buggy address belongs to the object at fff00000c664f800
[   34.709570]  which belongs to the cache kmalloc-64 of size 64
[   34.710985] The buggy address is located 0 bytes to the right of
[   34.710985]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.712506] 
[   34.712953] The buggy address belongs to the physical page:
[   34.713756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.714813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.715743] page_type: f5(slab)
[   34.716287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.717337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.718277] page dumped because: kasan: bad access detected
[   34.719112] 
[   34.719464] Memory state around the buggy address:
[   34.720215]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.721257]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.722165] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.723041]                                      ^
[   34.723793]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.724825]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.725712] ==================================================================
[   34.932776] ==================================================================
[   34.933406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   34.934523] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.935655] 
[   34.936122] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.937314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.937855] Hardware name: linux,dummy-virt (DT)
[   34.938442] Call trace:
[   34.938946]  show_stack+0x20/0x38 (C)
[   34.939510]  dump_stack_lvl+0x8c/0xd0
[   34.940081]  print_report+0x118/0x5e0
[   34.940743]  kasan_report+0xc8/0x118
[   34.941254]  kasan_check_range+0x100/0x1a8
[   34.941918]  __kasan_check_write+0x20/0x30
[   34.942580]  kasan_atomics_helper+0x934/0x4858
[   34.943261]  kasan_atomics+0x198/0x2e8
[   34.943785]  kunit_try_run_case+0x14c/0x3d0
[   34.944533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.945330]  kthread+0x24c/0x2d0
[   34.945925]  ret_from_fork+0x10/0x20
[   34.946514] 
[   34.946847] Allocated by task 254:
[   34.947369]  kasan_save_stack+0x3c/0x68
[   34.947942]  kasan_save_track+0x20/0x40
[   34.948669]  kasan_save_alloc_info+0x40/0x58
[   34.949249]  __kasan_kmalloc+0xd4/0xd8
[   34.949897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.950525]  kasan_atomics+0xb8/0x2e8
[   34.951107]  kunit_try_run_case+0x14c/0x3d0
[   34.951707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.952386]  kthread+0x24c/0x2d0
[   34.952980]  ret_from_fork+0x10/0x20
[   34.953542] 
[   34.953863] The buggy address belongs to the object at fff00000c664f800
[   34.953863]  which belongs to the cache kmalloc-64 of size 64
[   34.955168] The buggy address is located 0 bytes to the right of
[   34.955168]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.956581] 
[   34.956899] The buggy address belongs to the physical page:
[   34.957594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.958662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.959565] page_type: f5(slab)
[   34.960059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.960950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.961753] page dumped because: kasan: bad access detected
[   34.962588] 
[   34.962957] Memory state around the buggy address:
[   34.963607]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.964508]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.965437] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.966233]                                      ^
[   34.966931]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.967832]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.968741] ==================================================================
[   35.277352] ==================================================================
[   35.278142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.279025] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.279952] 
[   35.280327] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.281689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.282310] Hardware name: linux,dummy-virt (DT)
[   35.283018] Call trace:
[   35.283411]  show_stack+0x20/0x38 (C)
[   35.283992]  dump_stack_lvl+0x8c/0xd0
[   35.284546]  print_report+0x118/0x5e0
[   35.285220]  kasan_report+0xc8/0x118
[   35.285835]  __asan_report_load4_noabort+0x20/0x30
[   35.286582]  kasan_atomics_helper+0x3de4/0x4858
[   35.287313]  kasan_atomics+0x198/0x2e8
[   35.287899]  kunit_try_run_case+0x14c/0x3d0
[   35.288520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.289241]  kthread+0x24c/0x2d0
[   35.289793]  ret_from_fork+0x10/0x20
[   35.290448] 
[   35.290821] Allocated by task 254:
[   35.291323]  kasan_save_stack+0x3c/0x68
[   35.291996]  kasan_save_track+0x20/0x40
[   35.292569]  kasan_save_alloc_info+0x40/0x58
[   35.293192]  __kasan_kmalloc+0xd4/0xd8
[   35.293664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.294393]  kasan_atomics+0xb8/0x2e8
[   35.295014]  kunit_try_run_case+0x14c/0x3d0
[   35.295620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.296403]  kthread+0x24c/0x2d0
[   35.296900]  ret_from_fork+0x10/0x20
[   35.297423] 
[   35.297769] The buggy address belongs to the object at fff00000c664f800
[   35.297769]  which belongs to the cache kmalloc-64 of size 64
[   35.299216] The buggy address is located 0 bytes to the right of
[   35.299216]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.300626] 
[   35.300943] The buggy address belongs to the physical page:
[   35.301504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.302632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.303558] page_type: f5(slab)
[   35.304042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.304956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.305852] page dumped because: kasan: bad access detected
[   35.306553] 
[   35.306900] Memory state around the buggy address:
[   35.307497]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.308396]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.309268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.310128]                                      ^
[   35.310765]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.311682]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.312600] ==================================================================
[   35.928980] ==================================================================
[   35.929801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.930492] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.932429] 
[   35.932802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.934077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.934700] Hardware name: linux,dummy-virt (DT)
[   35.935386] Call trace:
[   35.935905]  show_stack+0x20/0x38 (C)
[   35.936486]  dump_stack_lvl+0x8c/0xd0
[   35.937079]  print_report+0x118/0x5e0
[   35.937591]  kasan_report+0xc8/0x118
[   35.938252]  kasan_check_range+0x100/0x1a8
[   35.938857]  __kasan_check_write+0x20/0x30
[   35.939416]  kasan_atomics_helper+0x11f8/0x4858
[   35.940201]  kasan_atomics+0x198/0x2e8
[   35.940774]  kunit_try_run_case+0x14c/0x3d0
[   35.941462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.942261]  kthread+0x24c/0x2d0
[   35.942905]  ret_from_fork+0x10/0x20
[   35.943491] 
[   35.943850] Allocated by task 254:
[   35.944319]  kasan_save_stack+0x3c/0x68
[   35.944962]  kasan_save_track+0x20/0x40
[   35.945517]  kasan_save_alloc_info+0x40/0x58
[   35.946131]  __kasan_kmalloc+0xd4/0xd8
[   35.946617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.947341]  kasan_atomics+0xb8/0x2e8
[   35.947847]  kunit_try_run_case+0x14c/0x3d0
[   35.948504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.949197]  kthread+0x24c/0x2d0
[   35.949790]  ret_from_fork+0x10/0x20
[   35.950434] 
[   35.950715] The buggy address belongs to the object at fff00000c664f800
[   35.950715]  which belongs to the cache kmalloc-64 of size 64
[   35.952203] The buggy address is located 0 bytes to the right of
[   35.952203]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.953603] 
[   35.953953] The buggy address belongs to the physical page:
[   35.954643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.955651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.956575] page_type: f5(slab)
[   35.957054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.958049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.958986] page dumped because: kasan: bad access detected
[   35.959716] 
[   35.960101] Memory state around the buggy address:
[   35.960758]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.961585]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.962464] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.963430]                                      ^
[   35.964146]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965060]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965892] ==================================================================
[   34.046355] ==================================================================
[   34.048029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.049160] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.050084] 
[   34.050574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.052284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.053129] Hardware name: linux,dummy-virt (DT)
[   34.053928] Call trace:
[   34.054546]  show_stack+0x20/0x38 (C)
[   34.055382]  dump_stack_lvl+0x8c/0xd0
[   34.056230]  print_report+0x118/0x5e0
[   34.056530]  kasan_report+0xc8/0x118
[   34.056813]  __asan_report_load4_noabort+0x20/0x30
[   34.057181]  kasan_atomics_helper+0x40a8/0x4858
[   34.057503]  kasan_atomics+0x198/0x2e8
[   34.057793]  kunit_try_run_case+0x14c/0x3d0
[   34.059468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.060294]  kthread+0x24c/0x2d0
[   34.060919]  ret_from_fork+0x10/0x20
[   34.061372] 
[   34.061757] Allocated by task 254:
[   34.062480]  kasan_save_stack+0x3c/0x68
[   34.063046]  kasan_save_track+0x20/0x40
[   34.064104]  kasan_save_alloc_info+0x40/0x58
[   34.064710]  __kasan_kmalloc+0xd4/0xd8
[   34.065258]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.065808]  kasan_atomics+0xb8/0x2e8
[   34.066494]  kunit_try_run_case+0x14c/0x3d0
[   34.067040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.068174]  kthread+0x24c/0x2d0
[   34.068664]  ret_from_fork+0x10/0x20
[   34.069229] 
[   34.069548] The buggy address belongs to the object at fff00000c664f800
[   34.069548]  which belongs to the cache kmalloc-64 of size 64
[   34.070936] The buggy address is located 0 bytes to the right of
[   34.070936]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.072576] 
[   34.072946] The buggy address belongs to the physical page:
[   34.073627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.074817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.075942] page_type: f5(slab)
[   34.076389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.077382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.078327] page dumped because: kasan: bad access detected
[   34.079017] 
[   34.079708] Memory state around the buggy address:
[   34.080183]  fff00000c664f700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   34.081399]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.082318] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.083146]                                      ^
[   34.083896]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.084841]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.086074] ==================================================================
[   34.089158] ==================================================================
[   34.090114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.090953] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.092319] 
[   34.092603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.094493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.095778] Hardware name: linux,dummy-virt (DT)
[   34.096817] Call trace:
[   34.097159]  show_stack+0x20/0x38 (C)
[   34.098059]  dump_stack_lvl+0x8c/0xd0
[   34.098752]  print_report+0x118/0x5e0
[   34.099706]  kasan_report+0xc8/0x118
[   34.100275]  __asan_report_store4_noabort+0x20/0x30
[   34.100894]  kasan_atomics_helper+0x3f7c/0x4858
[   34.101623]  kasan_atomics+0x198/0x2e8
[   34.102271]  kunit_try_run_case+0x14c/0x3d0
[   34.102992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.103748]  kthread+0x24c/0x2d0
[   34.104294]  ret_from_fork+0x10/0x20
[   34.104903] 
[   34.105195] Allocated by task 254:
[   34.106127]  kasan_save_stack+0x3c/0x68
[   34.106733]  kasan_save_track+0x20/0x40
[   34.107378]  kasan_save_alloc_info+0x40/0x58
[   34.108055]  __kasan_kmalloc+0xd4/0xd8
[   34.108722]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.109288]  kasan_atomics+0xb8/0x2e8
[   34.110054]  kunit_try_run_case+0x14c/0x3d0
[   34.110710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.111693]  kthread+0x24c/0x2d0
[   34.112185]  ret_from_fork+0x10/0x20
[   34.112772] 
[   34.113063] The buggy address belongs to the object at fff00000c664f800
[   34.113063]  which belongs to the cache kmalloc-64 of size 64
[   34.115594] The buggy address is located 0 bytes to the right of
[   34.115594]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.117154] 
[   34.117560] The buggy address belongs to the physical page:
[   34.118462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.119823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.121144] page_type: f5(slab)
[   34.121678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.124053] page dumped because: kasan: bad access detected
[   34.124985] 
[   34.125325] Memory state around the buggy address:
[   34.126390]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.127350]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.129287] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.131002]                                      ^
[   34.132128]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.133224]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.134358] ==================================================================
[   35.580670] ==================================================================
[   35.582072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.583737] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.584974] 
[   35.585645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.587053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.587705] Hardware name: linux,dummy-virt (DT)
[   35.588412] Call trace:
[   35.588841]  show_stack+0x20/0x38 (C)
[   35.589408]  dump_stack_lvl+0x8c/0xd0
[   35.589954]  print_report+0x118/0x5e0
[   35.590493]  kasan_report+0xc8/0x118
[   35.591101]  __asan_report_store8_noabort+0x20/0x30
[   35.591855]  kasan_atomics_helper+0x3e5c/0x4858
[   35.592828]  kasan_atomics+0x198/0x2e8
[   35.593562]  kunit_try_run_case+0x14c/0x3d0
[   35.594196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594696]  kthread+0x24c/0x2d0
[   35.595597]  ret_from_fork+0x10/0x20
[   35.596132] 
[   35.596554] Allocated by task 254:
[   35.597281]  kasan_save_stack+0x3c/0x68
[   35.597914]  kasan_save_track+0x20/0x40
[   35.598439]  kasan_save_alloc_info+0x40/0x58
[   35.599084]  __kasan_kmalloc+0xd4/0xd8
[   35.599639]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.600279]  kasan_atomics+0xb8/0x2e8
[   35.600856]  kunit_try_run_case+0x14c/0x3d0
[   35.601464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.602193]  kthread+0x24c/0x2d0
[   35.602695]  ret_from_fork+0x10/0x20
[   35.603301] 
[   35.603642] The buggy address belongs to the object at fff00000c664f800
[   35.603642]  which belongs to the cache kmalloc-64 of size 64
[   35.605098] The buggy address is located 0 bytes to the right of
[   35.605098]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.606494] 
[   35.606846] The buggy address belongs to the physical page:
[   35.607432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.608495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.609293] page_type: f5(slab)
[   35.609854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.610756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.611757] page dumped because: kasan: bad access detected
[   35.612427] 
[   35.612754] Memory state around the buggy address:
[   35.613380]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.614228]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.615102] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.616111]                                      ^
[   35.616721]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.617610]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.618605] ==================================================================
[   36.350307] ==================================================================
[   36.351161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.352008] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.353588] 
[   36.354108] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.355373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.355997] Hardware name: linux,dummy-virt (DT)
[   36.356653] Call trace:
[   36.357026]  show_stack+0x20/0x38 (C)
[   36.357742]  dump_stack_lvl+0x8c/0xd0
[   36.358395]  print_report+0x118/0x5e0
[   36.359041]  kasan_report+0xc8/0x118
[   36.359669]  kasan_check_range+0x100/0x1a8
[   36.360362]  __kasan_check_write+0x20/0x30
[   36.361053]  kasan_atomics_helper+0x1644/0x4858
[   36.361776]  kasan_atomics+0x198/0x2e8
[   36.362442]  kunit_try_run_case+0x14c/0x3d0
[   36.363143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.363951]  kthread+0x24c/0x2d0
[   36.364545]  ret_from_fork+0x10/0x20
[   36.365204] 
[   36.365544] Allocated by task 254:
[   36.366168]  kasan_save_stack+0x3c/0x68
[   36.366854]  kasan_save_track+0x20/0x40
[   36.367570]  kasan_save_alloc_info+0x40/0x58
[   36.368350]  __kasan_kmalloc+0xd4/0xd8
[   36.369033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.369709]  kasan_atomics+0xb8/0x2e8
[   36.370307]  kunit_try_run_case+0x14c/0x3d0
[   36.371019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.371783]  kthread+0x24c/0x2d0
[   36.372459]  ret_from_fork+0x10/0x20
[   36.373100] 
[   36.373442] The buggy address belongs to the object at fff00000c664f800
[   36.373442]  which belongs to the cache kmalloc-64 of size 64
[   36.375044] The buggy address is located 0 bytes to the right of
[   36.375044]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.376515] 
[   36.376957] The buggy address belongs to the physical page:
[   36.377659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.378785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.379655] page_type: f5(slab)
[   36.380192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.381294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.382435] page dumped because: kasan: bad access detected
[   36.383269] 
[   36.383567] Memory state around the buggy address:
[   36.384170]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.385107]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.386395] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.387449]                                      ^
[   36.388131]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.389077]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.389973] ==================================================================
[   35.541467] ==================================================================
[   35.542645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.543731] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.544620] 
[   35.544961] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.546008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.546659] Hardware name: linux,dummy-virt (DT)
[   35.547379] Call trace:
[   35.547815]  show_stack+0x20/0x38 (C)
[   35.548301]  dump_stack_lvl+0x8c/0xd0
[   35.549120]  print_report+0x118/0x5e0
[   35.549722]  kasan_report+0xc8/0x118
[   35.550305]  kasan_check_range+0x100/0x1a8
[   35.551021]  __kasan_check_write+0x20/0x30
[   35.551695]  kasan_atomics_helper+0xe44/0x4858
[   35.552425]  kasan_atomics+0x198/0x2e8
[   35.552923]  kunit_try_run_case+0x14c/0x3d0
[   35.553669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.554448]  kthread+0x24c/0x2d0
[   35.555025]  ret_from_fork+0x10/0x20
[   35.555632] 
[   35.555962] Allocated by task 254:
[   35.556456]  kasan_save_stack+0x3c/0x68
[   35.557042]  kasan_save_track+0x20/0x40
[   35.557612]  kasan_save_alloc_info+0x40/0x58
[   35.558347]  __kasan_kmalloc+0xd4/0xd8
[   35.558807]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.559584]  kasan_atomics+0xb8/0x2e8
[   35.560282]  kunit_try_run_case+0x14c/0x3d0
[   35.560775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.561533]  kthread+0x24c/0x2d0
[   35.562078]  ret_from_fork+0x10/0x20
[   35.562610] 
[   35.562973] The buggy address belongs to the object at fff00000c664f800
[   35.562973]  which belongs to the cache kmalloc-64 of size 64
[   35.564416] The buggy address is located 0 bytes to the right of
[   35.564416]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.565839] 
[   35.566157] The buggy address belongs to the physical page:
[   35.566947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.567862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.568685] page_type: f5(slab)
[   35.569238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.570262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.571369] page dumped because: kasan: bad access detected
[   35.572129] 
[   35.572452] Memory state around the buggy address:
[   35.573096]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.574180]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.575243] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.576314]                                      ^
[   35.577140]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.578225]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.579273] ==================================================================
[   34.228623] ==================================================================
[   34.229660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.230903] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.232559] 
[   34.233363] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.234784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.235663] Hardware name: linux,dummy-virt (DT)
[   34.236344] Call trace:
[   34.236730]  show_stack+0x20/0x38 (C)
[   34.237177]  dump_stack_lvl+0x8c/0xd0
[   34.238326]  print_report+0x118/0x5e0
[   34.239150]  kasan_report+0xc8/0x118
[   34.240448]  kasan_check_range+0x100/0x1a8
[   34.241385]  __kasan_check_read+0x20/0x30
[   34.242036]  kasan_atomics_helper+0x2b0/0x4858
[   34.242752]  kasan_atomics+0x198/0x2e8
[   34.243684]  kunit_try_run_case+0x14c/0x3d0
[   34.244504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.245213]  kthread+0x24c/0x2d0
[   34.245949]  ret_from_fork+0x10/0x20
[   34.246670] 
[   34.247164] Allocated by task 254:
[   34.248020]  kasan_save_stack+0x3c/0x68
[   34.248493]  kasan_save_track+0x20/0x40
[   34.249408]  kasan_save_alloc_info+0x40/0x58
[   34.250132]  __kasan_kmalloc+0xd4/0xd8
[   34.250957]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.251963]  kasan_atomics+0xb8/0x2e8
[   34.252493]  kunit_try_run_case+0x14c/0x3d0
[   34.253202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.254026]  kthread+0x24c/0x2d0
[   34.254649]  ret_from_fork+0x10/0x20
[   34.255594] 
[   34.256265] The buggy address belongs to the object at fff00000c664f800
[   34.256265]  which belongs to the cache kmalloc-64 of size 64
[   34.257729] The buggy address is located 0 bytes to the right of
[   34.257729]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.259224] 
[   34.259507] The buggy address belongs to the physical page:
[   34.261018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.261922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.262688] page_type: f5(slab)
[   34.263604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.264891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.266141] page dumped because: kasan: bad access detected
[   34.266954] 
[   34.267705] Memory state around the buggy address:
[   34.268508]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.269429]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.270349] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.271600]                                      ^
[   34.272547]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.273667]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.274474] ==================================================================
[   34.811130] ==================================================================
[   34.812831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   34.813921] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.815289] 
[   34.815832] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.817264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.817819] Hardware name: linux,dummy-virt (DT)
[   34.818713] Call trace:
[   34.819172]  show_stack+0x20/0x38 (C)
[   34.820005]  dump_stack_lvl+0x8c/0xd0
[   34.820791]  print_report+0x118/0x5e0
[   34.821595]  kasan_report+0xc8/0x118
[   34.822232]  kasan_check_range+0x100/0x1a8
[   34.823066]  __kasan_check_write+0x20/0x30
[   34.823387]  kasan_atomics_helper+0x7cc/0x4858
[   34.823838]  kasan_atomics+0x198/0x2e8
[   34.825011]  kunit_try_run_case+0x14c/0x3d0
[   34.825650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.826671]  kthread+0x24c/0x2d0
[   34.827385]  ret_from_fork+0x10/0x20
[   34.827987] 
[   34.828365] Allocated by task 254:
[   34.828897]  kasan_save_stack+0x3c/0x68
[   34.829696]  kasan_save_track+0x20/0x40
[   34.830275]  kasan_save_alloc_info+0x40/0x58
[   34.830959]  __kasan_kmalloc+0xd4/0xd8
[   34.831673]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.832348]  kasan_atomics+0xb8/0x2e8
[   34.832994]  kunit_try_run_case+0x14c/0x3d0
[   34.833657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.834459]  kthread+0x24c/0x2d0
[   34.835033]  ret_from_fork+0x10/0x20
[   34.835626] 
[   34.835998] The buggy address belongs to the object at fff00000c664f800
[   34.835998]  which belongs to the cache kmalloc-64 of size 64
[   34.837545] The buggy address is located 0 bytes to the right of
[   34.837545]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.839122] 
[   34.839571] The buggy address belongs to the physical page:
[   34.840450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.841515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.842483] page_type: f5(slab)
[   34.843079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.844083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.845136] page dumped because: kasan: bad access detected
[   34.845869] 
[   34.846369] Memory state around the buggy address:
[   34.847055]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.848071]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.849005] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.849939]                                      ^
[   34.850651]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.851631]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.852554] ==================================================================
[   35.427670] ==================================================================
[   35.428506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.429280] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.430155] 
[   35.430604] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.431892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.432506] Hardware name: linux,dummy-virt (DT)
[   35.433178] Call trace:
[   35.433591]  show_stack+0x20/0x38 (C)
[   35.434226]  dump_stack_lvl+0x8c/0xd0
[   35.434909]  print_report+0x118/0x5e0
[   35.435464]  kasan_report+0xc8/0x118
[   35.435988]  __asan_report_load4_noabort+0x20/0x30
[   35.436816]  kasan_atomics_helper+0x3e04/0x4858
[   35.437485]  kasan_atomics+0x198/0x2e8
[   35.438129]  kunit_try_run_case+0x14c/0x3d0
[   35.438755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.439605]  kthread+0x24c/0x2d0
[   35.440455]  ret_from_fork+0x10/0x20
[   35.441203] 
[   35.441660] Allocated by task 254:
[   35.442503]  kasan_save_stack+0x3c/0x68
[   35.443074]  kasan_save_track+0x20/0x40
[   35.443631]  kasan_save_alloc_info+0x40/0x58
[   35.444257]  __kasan_kmalloc+0xd4/0xd8
[   35.444710]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.445490]  kasan_atomics+0xb8/0x2e8
[   35.446051]  kunit_try_run_case+0x14c/0x3d0
[   35.446665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.447407]  kthread+0x24c/0x2d0
[   35.448012]  ret_from_fork+0x10/0x20
[   35.448645] 
[   35.449040] The buggy address belongs to the object at fff00000c664f800
[   35.449040]  which belongs to the cache kmalloc-64 of size 64
[   35.450394] The buggy address is located 0 bytes to the right of
[   35.450394]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.451773] 
[   35.452105] The buggy address belongs to the physical page:
[   35.452832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.453751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.454560] page_type: f5(slab)
[   35.455113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.456079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.456968] page dumped because: kasan: bad access detected
[   35.457665] 
[   35.458049] Memory state around the buggy address:
[   35.458576]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.459635]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.460559] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.461419]                                      ^
[   35.462017]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462827]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.463797] ==================================================================
[   35.695173] ==================================================================
[   35.696121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.697171] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.698615] 
[   35.699728] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.700856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.701562] Hardware name: linux,dummy-virt (DT)
[   35.702192] Call trace:
[   35.702612]  show_stack+0x20/0x38 (C)
[   35.703164]  dump_stack_lvl+0x8c/0xd0
[   35.703830]  print_report+0x118/0x5e0
[   35.704617]  kasan_report+0xc8/0x118
[   35.705269]  kasan_check_range+0x100/0x1a8
[   35.705863]  __kasan_check_write+0x20/0x30
[   35.706492]  kasan_atomics_helper+0xf88/0x4858
[   35.707218]  kasan_atomics+0x198/0x2e8
[   35.707524]  kunit_try_run_case+0x14c/0x3d0
[   35.707837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.708533]  kthread+0x24c/0x2d0
[   35.709049]  ret_from_fork+0x10/0x20
[   35.709749] 
[   35.710052] Allocated by task 254:
[   35.710656]  kasan_save_stack+0x3c/0x68
[   35.711248]  kasan_save_track+0x20/0x40
[   35.711900]  kasan_save_alloc_info+0x40/0x58
[   35.712579]  __kasan_kmalloc+0xd4/0xd8
[   35.713285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.713907]  kasan_atomics+0xb8/0x2e8
[   35.714397]  kunit_try_run_case+0x14c/0x3d0
[   35.715164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.715955]  kthread+0x24c/0x2d0
[   35.716386]  ret_from_fork+0x10/0x20
[   35.717031] 
[   35.717352] The buggy address belongs to the object at fff00000c664f800
[   35.717352]  which belongs to the cache kmalloc-64 of size 64
[   35.718684] The buggy address is located 0 bytes to the right of
[   35.718684]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.720001] 
[   35.720450] The buggy address belongs to the physical page:
[   35.721132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.722236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.723096] page_type: f5(slab)
[   35.723568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.724557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.725476] page dumped because: kasan: bad access detected
[   35.726109] 
[   35.726458] Memory state around the buggy address:
[   35.727071]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.727986]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.728760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.729655]                                      ^
[   35.730242]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.731144]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.732055] ==================================================================
[   34.454540] ==================================================================
[   34.455368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.457083] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.457866] 
[   34.458272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.460357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.460949] Hardware name: linux,dummy-virt (DT)
[   34.461562] Call trace:
[   34.462014]  show_stack+0x20/0x38 (C)
[   34.462605]  dump_stack_lvl+0x8c/0xd0
[   34.463182]  print_report+0x118/0x5e0
[   34.463844]  kasan_report+0xc8/0x118
[   34.464485]  kasan_check_range+0x100/0x1a8
[   34.465199]  __kasan_check_write+0x20/0x30
[   34.465815]  kasan_atomics_helper+0x414/0x4858
[   34.466477]  kasan_atomics+0x198/0x2e8
[   34.467013]  kunit_try_run_case+0x14c/0x3d0
[   34.467751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.468527]  kthread+0x24c/0x2d0
[   34.469152]  ret_from_fork+0x10/0x20
[   34.469799] 
[   34.470300] Allocated by task 254:
[   34.471078]  kasan_save_stack+0x3c/0x68
[   34.471672]  kasan_save_track+0x20/0x40
[   34.472237]  kasan_save_alloc_info+0x40/0x58
[   34.472784]  __kasan_kmalloc+0xd4/0xd8
[   34.473392]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.473964]  kasan_atomics+0xb8/0x2e8
[   34.474678]  kunit_try_run_case+0x14c/0x3d0
[   34.475345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.476195]  kthread+0x24c/0x2d0
[   34.476848]  ret_from_fork+0x10/0x20
[   34.477596] 
[   34.478117] The buggy address belongs to the object at fff00000c664f800
[   34.478117]  which belongs to the cache kmalloc-64 of size 64
[   34.479523] The buggy address is located 0 bytes to the right of
[   34.479523]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.481059] 
[   34.481635] The buggy address belongs to the physical page:
[   34.482505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.483526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.484433] page_type: f5(slab)
[   34.485004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.485923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.486905] page dumped because: kasan: bad access detected
[   34.487563] 
[   34.487923] Memory state around the buggy address:
[   34.488489]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.489397]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.490342] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.491273]                                      ^
[   34.491902]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.492762]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493640] ==================================================================
[   34.495355] ==================================================================
[   34.496917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.497793] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.498750] 
[   34.499094] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.500539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.501127] Hardware name: linux,dummy-virt (DT)
[   34.501795] Call trace:
[   34.502203]  show_stack+0x20/0x38 (C)
[   34.502952]  dump_stack_lvl+0x8c/0xd0
[   34.503384]  print_report+0x118/0x5e0
[   34.504011]  kasan_report+0xc8/0x118
[   34.504653]  kasan_check_range+0x100/0x1a8
[   34.505372]  __kasan_check_write+0x20/0x30
[   34.506079]  kasan_atomics_helper+0x47c/0x4858
[   34.506758]  kasan_atomics+0x198/0x2e8
[   34.507411]  kunit_try_run_case+0x14c/0x3d0
[   34.508134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.508900]  kthread+0x24c/0x2d0
[   34.509514]  ret_from_fork+0x10/0x20
[   34.510122] 
[   34.510460] Allocated by task 254:
[   34.510909]  kasan_save_stack+0x3c/0x68
[   34.511551]  kasan_save_track+0x20/0x40
[   34.512339]  kasan_save_alloc_info+0x40/0x58
[   34.512923]  __kasan_kmalloc+0xd4/0xd8
[   34.513558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.514187]  kasan_atomics+0xb8/0x2e8
[   34.514807]  kunit_try_run_case+0x14c/0x3d0
[   34.515414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.516210]  kthread+0x24c/0x2d0
[   34.516800]  ret_from_fork+0x10/0x20
[   34.517356] 
[   34.517658] The buggy address belongs to the object at fff00000c664f800
[   34.517658]  which belongs to the cache kmalloc-64 of size 64
[   34.519174] The buggy address is located 0 bytes to the right of
[   34.519174]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.520547] 
[   34.520870] The buggy address belongs to the physical page:
[   34.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.522669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.523442] page_type: f5(slab)
[   34.523982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.524978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.525848] page dumped because: kasan: bad access detected
[   34.526540] 
[   34.526865] Memory state around the buggy address:
[   34.527513]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.528330]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.529289] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.530168]                                      ^
[   34.530797]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.531696]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.532568] ==================================================================
[   34.770511] ==================================================================
[   34.771393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   34.772371] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.773313] 
[   34.773684] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.775017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.775670] Hardware name: linux,dummy-virt (DT)
[   34.776324] Call trace:
[   34.776923]  show_stack+0x20/0x38 (C)
[   34.777764]  dump_stack_lvl+0x8c/0xd0
[   34.778420]  print_report+0x118/0x5e0
[   34.779144]  kasan_report+0xc8/0x118
[   34.779766]  kasan_check_range+0x100/0x1a8
[   34.780462]  __kasan_check_write+0x20/0x30
[   34.781141]  kasan_atomics_helper+0x760/0x4858
[   34.781926]  kasan_atomics+0x198/0x2e8
[   34.782552]  kunit_try_run_case+0x14c/0x3d0
[   34.783261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.784077]  kthread+0x24c/0x2d0
[   34.784672]  ret_from_fork+0x10/0x20
[   34.785308] 
[   34.785739] Allocated by task 254:
[   34.786252]  kasan_save_stack+0x3c/0x68
[   34.786820]  kasan_save_track+0x20/0x40
[   34.787323]  kasan_save_alloc_info+0x40/0x58
[   34.788152]  __kasan_kmalloc+0xd4/0xd8
[   34.788749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.789430]  kasan_atomics+0xb8/0x2e8
[   34.790044]  kunit_try_run_case+0x14c/0x3d0
[   34.790707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.791494]  kthread+0x24c/0x2d0
[   34.792104]  ret_from_fork+0x10/0x20
[   34.792717] 
[   34.793112] The buggy address belongs to the object at fff00000c664f800
[   34.793112]  which belongs to the cache kmalloc-64 of size 64
[   34.794557] The buggy address is located 0 bytes to the right of
[   34.794557]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.796199] 
[   34.796596] The buggy address belongs to the physical page:
[   34.797364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.798413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.799297] page_type: f5(slab)
[   34.799870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.800892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.801806] page dumped because: kasan: bad access detected
[   34.802571] 
[   34.803074] Memory state around the buggy address:
[   34.803794]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.804796]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.805713] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.806620]                                      ^
[   34.807362]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.808302]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.809154] ==================================================================
[   35.237325] ==================================================================
[   35.238106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.239484] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.241400] 
[   35.241840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.243470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.244002] Hardware name: linux,dummy-virt (DT)
[   35.244567] Call trace:
[   35.245038]  show_stack+0x20/0x38 (C)
[   35.245851]  dump_stack_lvl+0x8c/0xd0
[   35.246688]  print_report+0x118/0x5e0
[   35.247214]  kasan_report+0xc8/0x118
[   35.247868]  kasan_check_range+0x100/0x1a8
[   35.248486]  __kasan_check_write+0x20/0x30
[   35.249165]  kasan_atomics_helper+0xc08/0x4858
[   35.249936]  kasan_atomics+0x198/0x2e8
[   35.250452]  kunit_try_run_case+0x14c/0x3d0
[   35.251123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.251888]  kthread+0x24c/0x2d0
[   35.252459]  ret_from_fork+0x10/0x20
[   35.253149] 
[   35.253463] Allocated by task 254:
[   35.254020]  kasan_save_stack+0x3c/0x68
[   35.254571]  kasan_save_track+0x20/0x40
[   35.255505]  kasan_save_alloc_info+0x40/0x58
[   35.256113]  __kasan_kmalloc+0xd4/0xd8
[   35.256664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.257324]  kasan_atomics+0xb8/0x2e8
[   35.257941]  kunit_try_run_case+0x14c/0x3d0
[   35.258594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.259295]  kthread+0x24c/0x2d0
[   35.259903]  ret_from_fork+0x10/0x20
[   35.260485] 
[   35.260834] The buggy address belongs to the object at fff00000c664f800
[   35.260834]  which belongs to the cache kmalloc-64 of size 64
[   35.262300] The buggy address is located 0 bytes to the right of
[   35.262300]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.263699] 
[   35.264058] The buggy address belongs to the physical page:
[   35.264662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.265624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.266515] page_type: f5(slab)
[   35.267074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.267967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.268959] page dumped because: kasan: bad access detected
[   35.269652] 
[   35.269992] Memory state around the buggy address:
[   35.270625]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.271442]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.272269] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.273128]                                      ^
[   35.273916]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.274801]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.275651] ==================================================================
[   36.233535] ==================================================================
[   36.234432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.235459] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.236595] 
[   36.237004] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.238496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.239074] Hardware name: linux,dummy-virt (DT)
[   36.239937] Call trace:
[   36.240360]  show_stack+0x20/0x38 (C)
[   36.241056]  dump_stack_lvl+0x8c/0xd0
[   36.241776]  print_report+0x118/0x5e0
[   36.242505]  kasan_report+0xc8/0x118
[   36.243139]  kasan_check_range+0x100/0x1a8
[   36.243819]  __kasan_check_write+0x20/0x30
[   36.244533]  kasan_atomics_helper+0x154c/0x4858
[   36.245247]  kasan_atomics+0x198/0x2e8
[   36.245897]  kunit_try_run_case+0x14c/0x3d0
[   36.246588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.247408]  kthread+0x24c/0x2d0
[   36.248017]  ret_from_fork+0x10/0x20
[   36.248649] 
[   36.249013] Allocated by task 254:
[   36.249650]  kasan_save_stack+0x3c/0x68
[   36.250287]  kasan_save_track+0x20/0x40
[   36.251014]  kasan_save_alloc_info+0x40/0x58
[   36.251697]  __kasan_kmalloc+0xd4/0xd8
[   36.252318]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.252994]  kasan_atomics+0xb8/0x2e8
[   36.253583]  kunit_try_run_case+0x14c/0x3d0
[   36.254263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.255095]  kthread+0x24c/0x2d0
[   36.255801]  ret_from_fork+0x10/0x20
[   36.256496] 
[   36.257014] The buggy address belongs to the object at fff00000c664f800
[   36.257014]  which belongs to the cache kmalloc-64 of size 64
[   36.258362] The buggy address is located 0 bytes to the right of
[   36.258362]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.259947] 
[   36.260450] The buggy address belongs to the physical page:
[   36.261157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.262347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.262763] page_type: f5(slab)
[   36.263050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.263494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.264024] page dumped because: kasan: bad access detected
[   36.265120] 
[   36.265618] Memory state around the buggy address:
[   36.266282]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.267223]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.268127] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.269030]                                      ^
[   36.269705]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.270617]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.271526] ==================================================================
[   36.043925] ==================================================================
[   36.044687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.045490] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.046586] 
[   36.047031] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.048288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.048868] Hardware name: linux,dummy-virt (DT)
[   36.049556] Call trace:
[   36.049970]  show_stack+0x20/0x38 (C)
[   36.050571]  dump_stack_lvl+0x8c/0xd0
[   36.051097]  print_report+0x118/0x5e0
[   36.051765]  kasan_report+0xc8/0x118
[   36.052298]  kasan_check_range+0x100/0x1a8
[   36.052986]  __kasan_check_write+0x20/0x30
[   36.053686]  kasan_atomics_helper+0x1384/0x4858
[   36.054304]  kasan_atomics+0x198/0x2e8
[   36.055002]  kunit_try_run_case+0x14c/0x3d0
[   36.055631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.056409]  kthread+0x24c/0x2d0
[   36.057013]  ret_from_fork+0x10/0x20
[   36.057621] 
[   36.057917] Allocated by task 254:
[   36.058477]  kasan_save_stack+0x3c/0x68
[   36.059088]  kasan_save_track+0x20/0x40
[   36.059678]  kasan_save_alloc_info+0x40/0x58
[   36.060186]  __kasan_kmalloc+0xd4/0xd8
[   36.060825]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.061370]  kasan_atomics+0xb8/0x2e8
[   36.062003]  kunit_try_run_case+0x14c/0x3d0
[   36.062637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.063434]  kthread+0x24c/0x2d0
[   36.063947]  ret_from_fork+0x10/0x20
[   36.064570] 
[   36.064866] The buggy address belongs to the object at fff00000c664f800
[   36.064866]  which belongs to the cache kmalloc-64 of size 64
[   36.066417] The buggy address is located 0 bytes to the right of
[   36.066417]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.067852] 
[   36.068186] The buggy address belongs to the physical page:
[   36.068897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.069784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.070692] page_type: f5(slab)
[   36.071146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.072148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.073014] page dumped because: kasan: bad access detected
[   36.073679] 
[   36.074023] Memory state around the buggy address:
[   36.074753]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075620]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076947] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.077911]                                      ^
[   36.078745]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.079687]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.080540] ==================================================================
[   34.572991] ==================================================================
[   34.573605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   34.574659] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.575627] 
[   34.576148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.577226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.577701] Hardware name: linux,dummy-virt (DT)
[   34.578481] Call trace:
[   34.578900]  show_stack+0x20/0x38 (C)
[   34.579475]  dump_stack_lvl+0x8c/0xd0
[   34.580039]  print_report+0x118/0x5e0
[   34.580588]  kasan_report+0xc8/0x118
[   34.581096]  kasan_check_range+0x100/0x1a8
[   34.581804]  __kasan_check_write+0x20/0x30
[   34.582499]  kasan_atomics_helper+0x54c/0x4858
[   34.583252]  kasan_atomics+0x198/0x2e8
[   34.583821]  kunit_try_run_case+0x14c/0x3d0
[   34.584427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.585200]  kthread+0x24c/0x2d0
[   34.585806]  ret_from_fork+0x10/0x20
[   34.586403] 
[   34.586794] Allocated by task 254:
[   34.587362]  kasan_save_stack+0x3c/0x68
[   34.587952]  kasan_save_track+0x20/0x40
[   34.588494]  kasan_save_alloc_info+0x40/0x58
[   34.589173]  __kasan_kmalloc+0xd4/0xd8
[   34.589715]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.590361]  kasan_atomics+0xb8/0x2e8
[   34.590927]  kunit_try_run_case+0x14c/0x3d0
[   34.591556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.592274]  kthread+0x24c/0x2d0
[   34.592774]  ret_from_fork+0x10/0x20
[   34.593410] 
[   34.593743] The buggy address belongs to the object at fff00000c664f800
[   34.593743]  which belongs to the cache kmalloc-64 of size 64
[   34.595140] The buggy address is located 0 bytes to the right of
[   34.595140]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.596738] 
[   34.597042] The buggy address belongs to the physical page:
[   34.597841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.598821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.599675] page_type: f5(slab)
[   34.600211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.601113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.602087] page dumped because: kasan: bad access detected
[   34.602753] 
[   34.603138] Memory state around the buggy address:
[   34.603810]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.604642]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.605508] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.606356]                                      ^
[   34.607117]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.607968]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608809] ==================================================================
[   35.889413] ==================================================================
[   35.890044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.891290] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.892472] 
[   35.892976] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.894736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.895610] Hardware name: linux,dummy-virt (DT)
[   35.896492] Call trace:
[   35.897125]  show_stack+0x20/0x38 (C)
[   35.897936]  dump_stack_lvl+0x8c/0xd0
[   35.898518]  print_report+0x118/0x5e0
[   35.899310]  kasan_report+0xc8/0x118
[   35.900052]  kasan_check_range+0x100/0x1a8
[   35.900647]  __kasan_check_write+0x20/0x30
[   35.901434]  kasan_atomics_helper+0x1190/0x4858
[   35.902098]  kasan_atomics+0x198/0x2e8
[   35.902669]  kunit_try_run_case+0x14c/0x3d0
[   35.903483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.904301]  kthread+0x24c/0x2d0
[   35.904827]  ret_from_fork+0x10/0x20
[   35.905432] 
[   35.905804] Allocated by task 254:
[   35.906422]  kasan_save_stack+0x3c/0x68
[   35.906961]  kasan_save_track+0x20/0x40
[   35.907540]  kasan_save_alloc_info+0x40/0x58
[   35.908230]  __kasan_kmalloc+0xd4/0xd8
[   35.908777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.909410]  kasan_atomics+0xb8/0x2e8
[   35.909898]  kunit_try_run_case+0x14c/0x3d0
[   35.910585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.911383]  kthread+0x24c/0x2d0
[   35.911985]  ret_from_fork+0x10/0x20
[   35.912524] 
[   35.912864] The buggy address belongs to the object at fff00000c664f800
[   35.912864]  which belongs to the cache kmalloc-64 of size 64
[   35.914244] The buggy address is located 0 bytes to the right of
[   35.914244]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.915570] 
[   35.915994] The buggy address belongs to the physical page:
[   35.916660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.917776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.918526] page_type: f5(slab)
[   35.919114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.920063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.921015] page dumped because: kasan: bad access detected
[   35.921670] 
[   35.921989] Memory state around the buggy address:
[   35.922619]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.923427]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.924361] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.925204]                                      ^
[   35.925801]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926703]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.927526] ==================================================================
[   35.770693] ==================================================================
[   35.771679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.772848] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.774001] 
[   35.774457] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.775688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.776370] Hardware name: linux,dummy-virt (DT)
[   35.776964] Call trace:
[   35.777570]  show_stack+0x20/0x38 (C)
[   35.778296]  dump_stack_lvl+0x8c/0xd0
[   35.778968]  print_report+0x118/0x5e0
[   35.779588]  kasan_report+0xc8/0x118
[   35.780219]  kasan_check_range+0x100/0x1a8
[   35.780902]  __kasan_check_write+0x20/0x30
[   35.781522]  kasan_atomics_helper+0x1058/0x4858
[   35.782230]  kasan_atomics+0x198/0x2e8
[   35.782895]  kunit_try_run_case+0x14c/0x3d0
[   35.783580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.784387]  kthread+0x24c/0x2d0
[   35.785007]  ret_from_fork+0x10/0x20
[   35.785655] 
[   35.786028] Allocated by task 254:
[   35.786631]  kasan_save_stack+0x3c/0x68
[   35.787360]  kasan_save_track+0x20/0x40
[   35.787981]  kasan_save_alloc_info+0x40/0x58
[   35.788643]  __kasan_kmalloc+0xd4/0xd8
[   35.789252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.789974]  kasan_atomics+0xb8/0x2e8
[   35.790593]  kunit_try_run_case+0x14c/0x3d0
[   35.791323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.792114]  kthread+0x24c/0x2d0
[   35.792666]  ret_from_fork+0x10/0x20
[   35.793292] 
[   35.793634] The buggy address belongs to the object at fff00000c664f800
[   35.793634]  which belongs to the cache kmalloc-64 of size 64
[   35.795141] The buggy address is located 0 bytes to the right of
[   35.795141]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.796506] 
[   35.796923] The buggy address belongs to the physical page:
[   35.797596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.798658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.799524] page_type: f5(slab)
[   35.800066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.801123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.802106] page dumped because: kasan: bad access detected
[   35.802806] 
[   35.803132] Memory state around the buggy address:
[   35.803834]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.804638]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.805484] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.806333]                                      ^
[   35.807026]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.808119]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.808982] ==================================================================
[   35.465277] ==================================================================
[   35.466282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.468175] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.469376] 
[   35.469697] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.471303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.471899] Hardware name: linux,dummy-virt (DT)
[   35.472535] Call trace:
[   35.473040]  show_stack+0x20/0x38 (C)
[   35.473723]  dump_stack_lvl+0x8c/0xd0
[   35.474452]  print_report+0x118/0x5e0
[   35.474969]  kasan_report+0xc8/0x118
[   35.475507]  kasan_check_range+0x100/0x1a8
[   35.476170]  __kasan_check_read+0x20/0x30
[   35.476752]  kasan_atomics_helper+0xdd4/0x4858
[   35.477396]  kasan_atomics+0x198/0x2e8
[   35.478113]  kunit_try_run_case+0x14c/0x3d0
[   35.478782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.479485]  kthread+0x24c/0x2d0
[   35.480090]  ret_from_fork+0x10/0x20
[   35.480572] 
[   35.480944] Allocated by task 254:
[   35.481446]  kasan_save_stack+0x3c/0x68
[   35.482122]  kasan_save_track+0x20/0x40
[   35.482700]  kasan_save_alloc_info+0x40/0x58
[   35.483744]  __kasan_kmalloc+0xd4/0xd8
[   35.484328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.485025]  kasan_atomics+0xb8/0x2e8
[   35.485594]  kunit_try_run_case+0x14c/0x3d0
[   35.486276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.486985]  kthread+0x24c/0x2d0
[   35.487545]  ret_from_fork+0x10/0x20
[   35.488089] 
[   35.488380] The buggy address belongs to the object at fff00000c664f800
[   35.488380]  which belongs to the cache kmalloc-64 of size 64
[   35.489783] The buggy address is located 0 bytes to the right of
[   35.489783]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.491190] 
[   35.491472] The buggy address belongs to the physical page:
[   35.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.493953] page_type: f5(slab)
[   35.494497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.495489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.496390] page dumped because: kasan: bad access detected
[   35.497055] 
[   35.497384] Memory state around the buggy address:
[   35.497949]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.498870]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.499760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.500621]                                      ^
[   35.501319]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.502183]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.503008] ==================================================================
[   34.181635] ==================================================================
[   34.182575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.184543] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.185559] 
[   34.185926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.187212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.187983] Hardware name: linux,dummy-virt (DT)
[   34.188849] Call trace:
[   34.189452]  show_stack+0x20/0x38 (C)
[   34.190246]  dump_stack_lvl+0x8c/0xd0
[   34.190980]  print_report+0x118/0x5e0
[   34.191772]  kasan_report+0xc8/0x118
[   34.192663]  kasan_check_range+0x100/0x1a8
[   34.193168]  __kasan_check_write+0x20/0x30
[   34.194029]  kasan_atomics_helper+0x24c/0x4858
[   34.194891]  kasan_atomics+0x198/0x2e8
[   34.195986]  kunit_try_run_case+0x14c/0x3d0
[   34.196779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.197578]  kthread+0x24c/0x2d0
[   34.198197]  ret_from_fork+0x10/0x20
[   34.198846] 
[   34.199225] Allocated by task 254:
[   34.199932]  kasan_save_stack+0x3c/0x68
[   34.200595]  kasan_save_track+0x20/0x40
[   34.201260]  kasan_save_alloc_info+0x40/0x58
[   34.201911]  __kasan_kmalloc+0xd4/0xd8
[   34.202537]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.203324]  kasan_atomics+0xb8/0x2e8
[   34.204422]  kunit_try_run_case+0x14c/0x3d0
[   34.205162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.205991]  kthread+0x24c/0x2d0
[   34.206632]  ret_from_fork+0x10/0x20
[   34.207254] 
[   34.207758] The buggy address belongs to the object at fff00000c664f800
[   34.207758]  which belongs to the cache kmalloc-64 of size 64
[   34.209862] The buggy address is located 0 bytes to the right of
[   34.209862]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.211510] 
[   34.212154] The buggy address belongs to the physical page:
[   34.212913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.214031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.214897] page_type: f5(slab)
[   34.215977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.217127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.218166] page dumped because: kasan: bad access detected
[   34.219158] 
[   34.219907] Memory state around the buggy address:
[   34.220576]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.221648]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.222681] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.223917]                                      ^
[   34.224559]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.225370]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.226534] ==================================================================
[   34.610009] ==================================================================
[   34.610761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   34.612080] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.612978] 
[   34.613357] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.614500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.615267] Hardware name: linux,dummy-virt (DT)
[   34.615810] Call trace:
[   34.616307]  show_stack+0x20/0x38 (C)
[   34.617052]  dump_stack_lvl+0x8c/0xd0
[   34.617682]  print_report+0x118/0x5e0
[   34.618278]  kasan_report+0xc8/0x118
[   34.618815]  kasan_check_range+0x100/0x1a8
[   34.619541]  __kasan_check_write+0x20/0x30
[   34.620165]  kasan_atomics_helper+0x5b4/0x4858
[   34.620669]  kasan_atomics+0x198/0x2e8
[   34.621342]  kunit_try_run_case+0x14c/0x3d0
[   34.622065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.622930]  kthread+0x24c/0x2d0
[   34.623469]  ret_from_fork+0x10/0x20
[   34.624136] 
[   34.624412] Allocated by task 254:
[   34.625197]  kasan_save_stack+0x3c/0x68
[   34.625912]  kasan_save_track+0x20/0x40
[   34.626510]  kasan_save_alloc_info+0x40/0x58
[   34.627108]  __kasan_kmalloc+0xd4/0xd8
[   34.627726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.628394]  kasan_atomics+0xb8/0x2e8
[   34.628971]  kunit_try_run_case+0x14c/0x3d0
[   34.629620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.630325]  kthread+0x24c/0x2d0
[   34.630947]  ret_from_fork+0x10/0x20
[   34.631476] 
[   34.631892] The buggy address belongs to the object at fff00000c664f800
[   34.631892]  which belongs to the cache kmalloc-64 of size 64
[   34.633323] The buggy address is located 0 bytes to the right of
[   34.633323]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.634695] 
[   34.635034] The buggy address belongs to the physical page:
[   34.635753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.636699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.637488] page_type: f5(slab)
[   34.638093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.638982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.639902] page dumped because: kasan: bad access detected
[   34.640571] 
[   34.640863] Memory state around the buggy address:
[   34.641501]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.642366]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.643244] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.644115]                                      ^
[   34.644630]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.645609]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.646475] ==================================================================
[   35.008161] ==================================================================
[   35.008839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.010366] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.011319] 
[   35.011755] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.013054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.013738] Hardware name: linux,dummy-virt (DT)
[   35.014294] Call trace:
[   35.014852]  show_stack+0x20/0x38 (C)
[   35.015422]  dump_stack_lvl+0x8c/0xd0
[   35.016016]  print_report+0x118/0x5e0
[   35.016660]  kasan_report+0xc8/0x118
[   35.017255]  kasan_check_range+0x100/0x1a8
[   35.017783]  __kasan_check_write+0x20/0x30
[   35.018504]  kasan_atomics_helper+0xa04/0x4858
[   35.019185]  kasan_atomics+0x198/0x2e8
[   35.019855]  kunit_try_run_case+0x14c/0x3d0
[   35.020508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.021232]  kthread+0x24c/0x2d0
[   35.021787]  ret_from_fork+0x10/0x20
[   35.022496] 
[   35.022823] Allocated by task 254:
[   35.023295]  kasan_save_stack+0x3c/0x68
[   35.023917]  kasan_save_track+0x20/0x40
[   35.024450]  kasan_save_alloc_info+0x40/0x58
[   35.025147]  __kasan_kmalloc+0xd4/0xd8
[   35.025651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.026323]  kasan_atomics+0xb8/0x2e8
[   35.027054]  kunit_try_run_case+0x14c/0x3d0
[   35.027642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.028319]  kthread+0x24c/0x2d0
[   35.028929]  ret_from_fork+0x10/0x20
[   35.029505] 
[   35.029957] The buggy address belongs to the object at fff00000c664f800
[   35.029957]  which belongs to the cache kmalloc-64 of size 64
[   35.031340] The buggy address is located 0 bytes to the right of
[   35.031340]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.032764] 
[   35.033111] The buggy address belongs to the physical page:
[   35.033793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.035020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.036036] page_type: f5(slab)
[   35.036513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.037398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.038474] page dumped because: kasan: bad access detected
[   35.039188] 
[   35.039520] Memory state around the buggy address:
[   35.040175]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.040989]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.041823] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.042752]                                      ^
[   35.043394]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.044253]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.045163] ==================================================================
[   35.161581] ==================================================================
[   35.162320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.163382] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.164219] 
[   35.164599] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.165642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.166424] Hardware name: linux,dummy-virt (DT)
[   35.167077] Call trace:
[   35.167470]  show_stack+0x20/0x38 (C)
[   35.168053]  dump_stack_lvl+0x8c/0xd0
[   35.168687]  print_report+0x118/0x5e0
[   35.169231]  kasan_report+0xc8/0x118
[   35.169700]  kasan_check_range+0x100/0x1a8
[   35.170655]  __kasan_check_write+0x20/0x30
[   35.171314]  kasan_atomics_helper+0xb70/0x4858
[   35.171942]  kasan_atomics+0x198/0x2e8
[   35.172668]  kunit_try_run_case+0x14c/0x3d0
[   35.173323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.174099]  kthread+0x24c/0x2d0
[   35.174616]  ret_from_fork+0x10/0x20
[   35.175184] 
[   35.175602] Allocated by task 254:
[   35.176114]  kasan_save_stack+0x3c/0x68
[   35.176665]  kasan_save_track+0x20/0x40
[   35.177229]  kasan_save_alloc_info+0x40/0x58
[   35.177901]  __kasan_kmalloc+0xd4/0xd8
[   35.178440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.179113]  kasan_atomics+0xb8/0x2e8
[   35.179598]  kunit_try_run_case+0x14c/0x3d0
[   35.180266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.181089]  kthread+0x24c/0x2d0
[   35.181663]  ret_from_fork+0x10/0x20
[   35.182129] 
[   35.182529] The buggy address belongs to the object at fff00000c664f800
[   35.182529]  which belongs to the cache kmalloc-64 of size 64
[   35.183913] The buggy address is located 0 bytes to the right of
[   35.183913]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.185617] 
[   35.185911] The buggy address belongs to the physical page:
[   35.186769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.187594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.188670] page_type: f5(slab)
[   35.189127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.190027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.191052] page dumped because: kasan: bad access detected
[   35.191712] 
[   35.192075] Memory state around the buggy address:
[   35.192709]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.193579]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.194445] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.195267]                                      ^
[   35.195962]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.196837]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.197716] ==================================================================
[   34.276127] ==================================================================
[   34.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.278698] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.280430] 
[   34.280975] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.282251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.282870] Hardware name: linux,dummy-virt (DT)
[   34.283687] Call trace:
[   34.284790]  show_stack+0x20/0x38 (C)
[   34.285671]  dump_stack_lvl+0x8c/0xd0
[   34.286339]  print_report+0x118/0x5e0
[   34.287003]  kasan_report+0xc8/0x118
[   34.287694]  __asan_report_load4_noabort+0x20/0x30
[   34.288650]  kasan_atomics_helper+0x40fc/0x4858
[   34.289372]  kasan_atomics+0x198/0x2e8
[   34.290028]  kunit_try_run_case+0x14c/0x3d0
[   34.290693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.291520]  kthread+0x24c/0x2d0
[   34.292287]  ret_from_fork+0x10/0x20
[   34.292851] 
[   34.293153] Allocated by task 254:
[   34.293680]  kasan_save_stack+0x3c/0x68
[   34.294724]  kasan_save_track+0x20/0x40
[   34.295758]  kasan_save_alloc_info+0x40/0x58
[   34.296651]  __kasan_kmalloc+0xd4/0xd8
[   34.297305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.298013]  kasan_atomics+0xb8/0x2e8
[   34.298629]  kunit_try_run_case+0x14c/0x3d0
[   34.299323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.300166]  kthread+0x24c/0x2d0
[   34.301348]  ret_from_fork+0x10/0x20
[   34.301902] 
[   34.302232] The buggy address belongs to the object at fff00000c664f800
[   34.302232]  which belongs to the cache kmalloc-64 of size 64
[   34.304485] The buggy address is located 0 bytes to the right of
[   34.304485]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.306108] 
[   34.306573] The buggy address belongs to the physical page:
[   34.307473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.309166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.310065] page_type: f5(slab)
[   34.310639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.311758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.313260] page dumped because: kasan: bad access detected
[   34.314090] 
[   34.314448] Memory state around the buggy address:
[   34.315156]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.316732]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317631] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.318621]                                      ^
[   34.319334]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.320770]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.321682] ==================================================================
[   35.390416] ==================================================================
[   35.391089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.392090] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.392924] 
[   35.393239] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.394685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.395225] Hardware name: linux,dummy-virt (DT)
[   35.396191] Call trace:
[   35.396641]  show_stack+0x20/0x38 (C)
[   35.397214]  dump_stack_lvl+0x8c/0xd0
[   35.397827]  print_report+0x118/0x5e0
[   35.398465]  kasan_report+0xc8/0x118
[   35.399025]  kasan_check_range+0x100/0x1a8
[   35.399700]  __kasan_check_write+0x20/0x30
[   35.400363]  kasan_atomics_helper+0xd3c/0x4858
[   35.401056]  kasan_atomics+0x198/0x2e8
[   35.401619]  kunit_try_run_case+0x14c/0x3d0
[   35.402203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.402987]  kthread+0x24c/0x2d0
[   35.403481]  ret_from_fork+0x10/0x20
[   35.404119] 
[   35.404474] Allocated by task 254:
[   35.404967]  kasan_save_stack+0x3c/0x68
[   35.405563]  kasan_save_track+0x20/0x40
[   35.406203]  kasan_save_alloc_info+0x40/0x58
[   35.406822]  __kasan_kmalloc+0xd4/0xd8
[   35.407431]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.408126]  kasan_atomics+0xb8/0x2e8
[   35.408658]  kunit_try_run_case+0x14c/0x3d0
[   35.409360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.409988]  kthread+0x24c/0x2d0
[   35.410589]  ret_from_fork+0x10/0x20
[   35.411154] 
[   35.411460] The buggy address belongs to the object at fff00000c664f800
[   35.411460]  which belongs to the cache kmalloc-64 of size 64
[   35.412894] The buggy address is located 0 bytes to the right of
[   35.412894]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.414237] 
[   35.414607] The buggy address belongs to the physical page:
[   35.415323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.416214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.417110] page_type: f5(slab)
[   35.417690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.418594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.419586] page dumped because: kasan: bad access detected
[   35.420400] 
[   35.420681] Memory state around the buggy address:
[   35.421372]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.422215]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.423048] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.423916]                                      ^
[   35.424534]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.425441]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.426336] ==================================================================
[   36.432764] ==================================================================
[   36.433695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.434324] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.435059] 
[   36.435359] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.436748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.437313] Hardware name: linux,dummy-virt (DT)
[   36.437939] Call trace:
[   36.438469]  show_stack+0x20/0x38 (C)
[   36.439241]  dump_stack_lvl+0x8c/0xd0
[   36.440009]  print_report+0x118/0x5e0
[   36.440781]  kasan_report+0xc8/0x118
[   36.441356]  kasan_check_range+0x100/0x1a8
[   36.442024]  __kasan_check_write+0x20/0x30
[   36.442659]  kasan_atomics_helper+0x16d0/0x4858
[   36.443358]  kasan_atomics+0x198/0x2e8
[   36.443996]  kunit_try_run_case+0x14c/0x3d0
[   36.444601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.445321]  kthread+0x24c/0x2d0
[   36.445898]  ret_from_fork+0x10/0x20
[   36.446563] 
[   36.446910] Allocated by task 254:
[   36.447594]  kasan_save_stack+0x3c/0x68
[   36.448193]  kasan_save_track+0x20/0x40
[   36.448706]  kasan_save_alloc_info+0x40/0x58
[   36.449463]  __kasan_kmalloc+0xd4/0xd8
[   36.450094]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.450710]  kasan_atomics+0xb8/0x2e8
[   36.451250]  kunit_try_run_case+0x14c/0x3d0
[   36.451771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.452657]  kthread+0x24c/0x2d0
[   36.453184]  ret_from_fork+0x10/0x20
[   36.453698] 
[   36.454060] The buggy address belongs to the object at fff00000c664f800
[   36.454060]  which belongs to the cache kmalloc-64 of size 64
[   36.455352] The buggy address is located 0 bytes to the right of
[   36.455352]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.456912] 
[   36.457215] The buggy address belongs to the physical page:
[   36.458018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.458994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.459804] page_type: f5(slab)
[   36.460379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.461312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.462228] page dumped because: kasan: bad access detected
[   36.462938] 
[   36.463306] Memory state around the buggy address:
[   36.464082]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.464896]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.465724] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.466707]                                      ^
[   36.467364]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.468241]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.469189] ==================================================================
[   35.352187] ==================================================================
[   35.352960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.353770] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.354725] 
[   35.355273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.356692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.357335] Hardware name: linux,dummy-virt (DT)
[   35.358474] Call trace:
[   35.358983]  show_stack+0x20/0x38 (C)
[   35.359695]  dump_stack_lvl+0x8c/0xd0
[   35.360294]  print_report+0x118/0x5e0
[   35.360867]  kasan_report+0xc8/0x118
[   35.361464]  __asan_report_load4_noabort+0x20/0x30
[   35.362029]  kasan_atomics_helper+0x3dd8/0x4858
[   35.362768]  kasan_atomics+0x198/0x2e8
[   35.363451]  kunit_try_run_case+0x14c/0x3d0
[   35.364185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.364924]  kthread+0x24c/0x2d0
[   35.365538]  ret_from_fork+0x10/0x20
[   35.366138] 
[   35.366430] Allocated by task 254:
[   35.367123]  kasan_save_stack+0x3c/0x68
[   35.367794]  kasan_save_track+0x20/0x40
[   35.368445]  kasan_save_alloc_info+0x40/0x58
[   35.369091]  __kasan_kmalloc+0xd4/0xd8
[   35.369646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.370336]  kasan_atomics+0xb8/0x2e8
[   35.370861]  kunit_try_run_case+0x14c/0x3d0
[   35.371579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372273]  kthread+0x24c/0x2d0
[   35.372867]  ret_from_fork+0x10/0x20
[   35.373499] 
[   35.373791] The buggy address belongs to the object at fff00000c664f800
[   35.373791]  which belongs to the cache kmalloc-64 of size 64
[   35.375254] The buggy address is located 0 bytes to the right of
[   35.375254]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.376633] 
[   35.377107] The buggy address belongs to the physical page:
[   35.377851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.379104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.379897] page_type: f5(slab)
[   35.380502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.381357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.382367] page dumped because: kasan: bad access detected
[   35.383056] 
[   35.383353] Memory state around the buggy address:
[   35.384046]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.384903]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.385768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.386648]                                      ^
[   35.387264]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.388184]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.389026] ==================================================================
[   35.967570] ==================================================================
[   35.968495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.969323] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.970199] 
[   35.970577] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.971889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.972390] Hardware name: linux,dummy-virt (DT)
[   35.973026] Call trace:
[   35.973519]  show_stack+0x20/0x38 (C)
[   35.974188]  dump_stack_lvl+0x8c/0xd0
[   35.974771]  print_report+0x118/0x5e0
[   35.975429]  kasan_report+0xc8/0x118
[   35.976108]  kasan_check_range+0x100/0x1a8
[   35.976597]  __kasan_check_write+0x20/0x30
[   35.977260]  kasan_atomics_helper+0x126c/0x4858
[   35.977914]  kasan_atomics+0x198/0x2e8
[   35.978592]  kunit_try_run_case+0x14c/0x3d0
[   35.979303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.980026]  kthread+0x24c/0x2d0
[   35.980548]  ret_from_fork+0x10/0x20
[   35.981179] 
[   35.981504] Allocated by task 254:
[   35.982079]  kasan_save_stack+0x3c/0x68
[   35.982604]  kasan_save_track+0x20/0x40
[   35.983289]  kasan_save_alloc_info+0x40/0x58
[   35.983910]  __kasan_kmalloc+0xd4/0xd8
[   35.984377]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.985129]  kasan_atomics+0xb8/0x2e8
[   35.985743]  kunit_try_run_case+0x14c/0x3d0
[   35.986404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.987134]  kthread+0x24c/0x2d0
[   35.987607]  ret_from_fork+0x10/0x20
[   35.988219] 
[   35.988521] The buggy address belongs to the object at fff00000c664f800
[   35.988521]  which belongs to the cache kmalloc-64 of size 64
[   35.989851] The buggy address is located 0 bytes to the right of
[   35.989851]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.991308] 
[   35.991592] The buggy address belongs to the physical page:
[   35.992381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.993237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.994215] page_type: f5(slab)
[   35.994690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.995660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.996565] page dumped because: kasan: bad access detected
[   35.997365] 
[   35.997703] Memory state around the buggy address:
[   35.998422]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.999291]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.000197] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.001058]                                      ^
[   36.001695]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.002631]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.003552] ==================================================================
[   34.534916] ==================================================================
[   34.535793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   34.536667] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.537690] 
[   34.538043] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.539311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.539953] Hardware name: linux,dummy-virt (DT)
[   34.540579] Call trace:
[   34.541012]  show_stack+0x20/0x38 (C)
[   34.541587]  dump_stack_lvl+0x8c/0xd0
[   34.542158]  print_report+0x118/0x5e0
[   34.542849]  kasan_report+0xc8/0x118
[   34.543389]  kasan_check_range+0x100/0x1a8
[   34.544094]  __kasan_check_write+0x20/0x30
[   34.544633]  kasan_atomics_helper+0x4e4/0x4858
[   34.545381]  kasan_atomics+0x198/0x2e8
[   34.546046]  kunit_try_run_case+0x14c/0x3d0
[   34.546698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.547521]  kthread+0x24c/0x2d0
[   34.548152]  ret_from_fork+0x10/0x20
[   34.548716] 
[   34.549184] Allocated by task 254:
[   34.549688]  kasan_save_stack+0x3c/0x68
[   34.550254]  kasan_save_track+0x20/0x40
[   34.550925]  kasan_save_alloc_info+0x40/0x58
[   34.551514]  __kasan_kmalloc+0xd4/0xd8
[   34.552026]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.552688]  kasan_atomics+0xb8/0x2e8
[   34.553179]  kunit_try_run_case+0x14c/0x3d0
[   34.553870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.554608]  kthread+0x24c/0x2d0
[   34.555225]  ret_from_fork+0x10/0x20
[   34.555711] 
[   34.556113] The buggy address belongs to the object at fff00000c664f800
[   34.556113]  which belongs to the cache kmalloc-64 of size 64
[   34.557493] The buggy address is located 0 bytes to the right of
[   34.557493]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.558937] 
[   34.559341] The buggy address belongs to the physical page:
[   34.559905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.560931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.561789] page_type: f5(slab)
[   34.562270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.563282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.564134] page dumped because: kasan: bad access detected
[   34.564951] 
[   34.565310] Memory state around the buggy address:
[   34.565968]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.566974]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.567814] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.568616]                                      ^
[   34.569388]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.570355]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.571221] ==================================================================
[   36.548452] ==================================================================
[   36.549547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.550471] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.551385] 
[   36.551804] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.553121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.553648] Hardware name: linux,dummy-virt (DT)
[   36.554238] Call trace:
[   36.554703]  show_stack+0x20/0x38 (C)
[   36.555290]  dump_stack_lvl+0x8c/0xd0
[   36.555901]  print_report+0x118/0x5e0
[   36.556666]  kasan_report+0xc8/0x118
[   36.557381]  __asan_report_load8_noabort+0x20/0x30
[   36.558127]  kasan_atomics_helper+0x3e20/0x4858
[   36.558894]  kasan_atomics+0x198/0x2e8
[   36.559490]  kunit_try_run_case+0x14c/0x3d0
[   36.560003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.560787]  kthread+0x24c/0x2d0
[   36.561411]  ret_from_fork+0x10/0x20
[   36.562070] 
[   36.562445] Allocated by task 254:
[   36.563116]  kasan_save_stack+0x3c/0x68
[   36.563632]  kasan_save_track+0x20/0x40
[   36.564274]  kasan_save_alloc_info+0x40/0x58
[   36.564933]  __kasan_kmalloc+0xd4/0xd8
[   36.565921]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.566505]  kasan_atomics+0xb8/0x2e8
[   36.567118]  kunit_try_run_case+0x14c/0x3d0
[   36.567826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.568596]  kthread+0x24c/0x2d0
[   36.569121]  ret_from_fork+0x10/0x20
[   36.569604] 
[   36.570064] The buggy address belongs to the object at fff00000c664f800
[   36.570064]  which belongs to the cache kmalloc-64 of size 64
[   36.571444] The buggy address is located 0 bytes to the right of
[   36.571444]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.573102] 
[   36.573377] The buggy address belongs to the physical page:
[   36.574424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.575578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.576502] page_type: f5(slab)
[   36.576972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.577967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.578826] page dumped because: kasan: bad access detected
[   36.579469] 
[   36.579778] Memory state around the buggy address:
[   36.580348]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.581255]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.582129] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.583039]                                      ^
[   36.583675]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.584532]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.585433] ==================================================================
[   35.812098] ==================================================================
[   35.812870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.813698] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.815103] 
[   35.815479] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.816714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.817296] Hardware name: linux,dummy-virt (DT)
[   35.817850] Call trace:
[   35.818326]  show_stack+0x20/0x38 (C)
[   35.819004]  dump_stack_lvl+0x8c/0xd0
[   35.819516]  print_report+0x118/0x5e0
[   35.820198]  kasan_report+0xc8/0x118
[   35.820705]  kasan_check_range+0x100/0x1a8
[   35.821494]  __kasan_check_write+0x20/0x30
[   35.822211]  kasan_atomics_helper+0x10c0/0x4858
[   35.822896]  kasan_atomics+0x198/0x2e8
[   35.823465]  kunit_try_run_case+0x14c/0x3d0
[   35.824118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.824940]  kthread+0x24c/0x2d0
[   35.825571]  ret_from_fork+0x10/0x20
[   35.826129] 
[   35.826445] Allocated by task 254:
[   35.826970]  kasan_save_stack+0x3c/0x68
[   35.827699]  kasan_save_track+0x20/0x40
[   35.828253]  kasan_save_alloc_info+0x40/0x58
[   35.828964]  __kasan_kmalloc+0xd4/0xd8
[   35.829556]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.830271]  kasan_atomics+0xb8/0x2e8
[   35.830857]  kunit_try_run_case+0x14c/0x3d0
[   35.831480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.832254]  kthread+0x24c/0x2d0
[   35.832848]  ret_from_fork+0x10/0x20
[   35.833366] 
[   35.833717] The buggy address belongs to the object at fff00000c664f800
[   35.833717]  which belongs to the cache kmalloc-64 of size 64
[   35.835131] The buggy address is located 0 bytes to the right of
[   35.835131]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.836547] 
[   35.836890] The buggy address belongs to the physical page:
[   35.837528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.838546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.839474] page_type: f5(slab)
[   35.840296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.841214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.842298] page dumped because: kasan: bad access detected
[   35.843117] 
[   35.843630] Memory state around the buggy address:
[   35.844419]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.845523]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.846488] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.847455]                                      ^
[   35.848069]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.848995]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.849834] ==================================================================
[   36.392384] ==================================================================
[   36.393748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.394707] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.396059] 
[   36.396431] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.397999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.398860] Hardware name: linux,dummy-virt (DT)
[   36.399491] Call trace:
[   36.399911]  show_stack+0x20/0x38 (C)
[   36.400453]  dump_stack_lvl+0x8c/0xd0
[   36.401357]  print_report+0x118/0x5e0
[   36.402152]  kasan_report+0xc8/0x118
[   36.402980]  __asan_report_load8_noabort+0x20/0x30
[   36.403718]  kasan_atomics_helper+0x3df4/0x4858
[   36.404340]  kasan_atomics+0x198/0x2e8
[   36.404943]  kunit_try_run_case+0x14c/0x3d0
[   36.405552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.406469]  kthread+0x24c/0x2d0
[   36.406962]  ret_from_fork+0x10/0x20
[   36.407663] 
[   36.408053] Allocated by task 254:
[   36.408565]  kasan_save_stack+0x3c/0x68
[   36.409292]  kasan_save_track+0x20/0x40
[   36.409857]  kasan_save_alloc_info+0x40/0x58
[   36.410667]  __kasan_kmalloc+0xd4/0xd8
[   36.411313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.411973]  kasan_atomics+0xb8/0x2e8
[   36.412594]  kunit_try_run_case+0x14c/0x3d0
[   36.413302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.414121]  kthread+0x24c/0x2d0
[   36.414769]  ret_from_fork+0x10/0x20
[   36.415395] 
[   36.415851] The buggy address belongs to the object at fff00000c664f800
[   36.415851]  which belongs to the cache kmalloc-64 of size 64
[   36.417291] The buggy address is located 0 bytes to the right of
[   36.417291]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.418032] 
[   36.418543] The buggy address belongs to the physical page:
[   36.419425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.420540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.421373] page_type: f5(slab)
[   36.422061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.423128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.424188] page dumped because: kasan: bad access detected
[   36.424956] 
[   36.425291] Memory state around the buggy address:
[   36.426113]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.427049]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.427963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.428812]                                      ^
[   36.429402]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.430343]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.431201] ==================================================================
[   34.970251] ==================================================================
[   34.971041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   34.972225] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.973155] 
[   34.973540] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.974723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.975389] Hardware name: linux,dummy-virt (DT)
[   34.976014] Call trace:
[   34.976362]  show_stack+0x20/0x38 (C)
[   34.977055]  dump_stack_lvl+0x8c/0xd0
[   34.977625]  print_report+0x118/0x5e0
[   34.978234]  kasan_report+0xc8/0x118
[   34.978843]  kasan_check_range+0x100/0x1a8
[   34.979475]  __kasan_check_write+0x20/0x30
[   34.980217]  kasan_atomics_helper+0x99c/0x4858
[   34.980756]  kasan_atomics+0x198/0x2e8
[   34.981483]  kunit_try_run_case+0x14c/0x3d0
[   34.982170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.982947]  kthread+0x24c/0x2d0
[   34.983592]  ret_from_fork+0x10/0x20
[   34.984166] 
[   34.984461] Allocated by task 254:
[   34.984995]  kasan_save_stack+0x3c/0x68
[   34.985640]  kasan_save_track+0x20/0x40
[   34.986418]  kasan_save_alloc_info+0x40/0x58
[   34.986979]  __kasan_kmalloc+0xd4/0xd8
[   34.987633]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.988309]  kasan_atomics+0xb8/0x2e8
[   34.988842]  kunit_try_run_case+0x14c/0x3d0
[   34.989487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.990188]  kthread+0x24c/0x2d0
[   34.990718]  ret_from_fork+0x10/0x20
[   34.991248] 
[   34.991614] The buggy address belongs to the object at fff00000c664f800
[   34.991614]  which belongs to the cache kmalloc-64 of size 64
[   34.993018] The buggy address is located 0 bytes to the right of
[   34.993018]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.994396] 
[   34.994697] The buggy address belongs to the physical page:
[   34.995537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.996467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.997355] page_type: f5(slab)
[   34.997940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.998895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.999767] page dumped because: kasan: bad access detected
[   35.000548] 
[   35.000871] Memory state around the buggy address:
[   35.001507]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.002361]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.003159] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.004019]                                      ^
[   35.004641]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.005609]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.006417] ==================================================================
[   36.004975] ==================================================================
[   36.005718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.006716] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.007633] 
[   36.008042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.009362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.010028] Hardware name: linux,dummy-virt (DT)
[   36.010531] Call trace:
[   36.011060]  show_stack+0x20/0x38 (C)
[   36.011644]  dump_stack_lvl+0x8c/0xd0
[   36.012418]  print_report+0x118/0x5e0
[   36.012934]  kasan_report+0xc8/0x118
[   36.013589]  kasan_check_range+0x100/0x1a8
[   36.014424]  __kasan_check_write+0x20/0x30
[   36.014992]  kasan_atomics_helper+0x12d8/0x4858
[   36.015727]  kasan_atomics+0x198/0x2e8
[   36.016216]  kunit_try_run_case+0x14c/0x3d0
[   36.016990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.017734]  kthread+0x24c/0x2d0
[   36.018308]  ret_from_fork+0x10/0x20
[   36.018933] 
[   36.019315] Allocated by task 254:
[   36.019737]  kasan_save_stack+0x3c/0x68
[   36.020423]  kasan_save_track+0x20/0x40
[   36.020989]  kasan_save_alloc_info+0x40/0x58
[   36.021634]  __kasan_kmalloc+0xd4/0xd8
[   36.022132]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.022897]  kasan_atomics+0xb8/0x2e8
[   36.023409]  kunit_try_run_case+0x14c/0x3d0
[   36.024016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.024781]  kthread+0x24c/0x2d0
[   36.025303]  ret_from_fork+0x10/0x20
[   36.025784] 
[   36.026213] The buggy address belongs to the object at fff00000c664f800
[   36.026213]  which belongs to the cache kmalloc-64 of size 64
[   36.027593] The buggy address is located 0 bytes to the right of
[   36.027593]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.028978] 
[   36.029285] The buggy address belongs to the physical page:
[   36.030396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.031369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.032228] page_type: f5(slab)
[   36.032726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.033646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.034621] page dumped because: kasan: bad access detected
[   36.035331] 
[   36.035712] Memory state around the buggy address:
[   36.036234]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037189]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037993] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038961]                                      ^
[   36.039563]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.040432]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.041299] ==================================================================
[   36.314445] ==================================================================
[   36.315076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.316473] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.317200] 
[   36.317495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.318485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.319009] Hardware name: linux,dummy-virt (DT)
[   36.319661] Call trace:
[   36.320097]  show_stack+0x20/0x38 (C)
[   36.320731]  dump_stack_lvl+0x8c/0xd0
[   36.321349]  print_report+0x118/0x5e0
[   36.321927]  kasan_report+0xc8/0x118
[   36.322460]  __asan_report_load8_noabort+0x20/0x30
[   36.323230]  kasan_atomics_helper+0x3db0/0x4858
[   36.323768]  kasan_atomics+0x198/0x2e8
[   36.324439]  kunit_try_run_case+0x14c/0x3d0
[   36.325143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.326020]  kthread+0x24c/0x2d0
[   36.326544]  ret_from_fork+0x10/0x20
[   36.327217] 
[   36.327547] Allocated by task 254:
[   36.328002]  kasan_save_stack+0x3c/0x68
[   36.328598]  kasan_save_track+0x20/0x40
[   36.329115]  kasan_save_alloc_info+0x40/0x58
[   36.329831]  __kasan_kmalloc+0xd4/0xd8
[   36.330454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.331080]  kasan_atomics+0xb8/0x2e8
[   36.331609]  kunit_try_run_case+0x14c/0x3d0
[   36.332247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.333002]  kthread+0x24c/0x2d0
[   36.333511]  ret_from_fork+0x10/0x20
[   36.334034] 
[   36.334474] The buggy address belongs to the object at fff00000c664f800
[   36.334474]  which belongs to the cache kmalloc-64 of size 64
[   36.335922] The buggy address is located 0 bytes to the right of
[   36.335922]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.337208] 
[   36.337599] The buggy address belongs to the physical page:
[   36.338179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.339220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.340119] page_type: f5(slab)
[   36.340650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.341564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.342520] page dumped because: kasan: bad access detected
[   36.343184] 
[   36.343503] Memory state around the buggy address:
[   36.344136]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.344958]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.345768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.346677]                                      ^
[   36.347316]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.348222]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.349089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.956599] ==================================================================
[   33.958251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   33.959280] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.959977] 
[   33.960274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.961435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.962094] Hardware name: linux,dummy-virt (DT)
[   33.962784] Call trace:
[   33.963191]  show_stack+0x20/0x38 (C)
[   33.963772]  dump_stack_lvl+0x8c/0xd0
[   33.964399]  print_report+0x118/0x5e0
[   33.964970]  kasan_report+0xc8/0x118
[   33.965457]  __asan_report_load8_noabort+0x20/0x30
[   33.966182]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   33.967141]  kasan_bitops_generic+0x11c/0x1c8
[   33.967804]  kunit_try_run_case+0x14c/0x3d0
[   33.968564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.969230]  kthread+0x24c/0x2d0
[   33.969833]  ret_from_fork+0x10/0x20
[   33.970424] 
[   33.970824] Allocated by task 250:
[   33.971427]  kasan_save_stack+0x3c/0x68
[   33.972034]  kasan_save_track+0x20/0x40
[   33.972525]  kasan_save_alloc_info+0x40/0x58
[   33.973243]  __kasan_kmalloc+0xd4/0xd8
[   33.973804]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.974651]  kasan_bitops_generic+0xa0/0x1c8
[   33.975252]  kunit_try_run_case+0x14c/0x3d0
[   33.975928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.976634]  kthread+0x24c/0x2d0
[   33.977221]  ret_from_fork+0x10/0x20
[   33.977685] 
[   33.978079] The buggy address belongs to the object at fff00000c61b4360
[   33.978079]  which belongs to the cache kmalloc-16 of size 16
[   33.979488] The buggy address is located 8 bytes inside of
[   33.979488]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.980823] 
[   33.981145] The buggy address belongs to the physical page:
[   33.981935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.982858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.983675] page_type: f5(slab)
[   33.984206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.985165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.986071] page dumped because: kasan: bad access detected
[   33.986756] 
[   33.987154] Memory state around the buggy address:
[   33.987937]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.988596]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.989486] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.990265]                                                           ^
[   33.991162]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.992092]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.992977] ==================================================================
[   33.919085] ==================================================================
[   33.919853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   33.920861] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.921646] 
[   33.922122] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.923307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.923856] Hardware name: linux,dummy-virt (DT)
[   33.924430] Call trace:
[   33.924977]  show_stack+0x20/0x38 (C)
[   33.925548]  dump_stack_lvl+0x8c/0xd0
[   33.926183]  print_report+0x118/0x5e0
[   33.926745]  kasan_report+0xc8/0x118
[   33.927408]  kasan_check_range+0x100/0x1a8
[   33.928012]  __kasan_check_write+0x20/0x30
[   33.928658]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   33.929386]  kasan_bitops_generic+0x11c/0x1c8
[   33.930141]  kunit_try_run_case+0x14c/0x3d0
[   33.930784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.931599]  kthread+0x24c/0x2d0
[   33.932198]  ret_from_fork+0x10/0x20
[   33.932849] 
[   33.933163] Allocated by task 250:
[   33.933767]  kasan_save_stack+0x3c/0x68
[   33.934425]  kasan_save_track+0x20/0x40
[   33.935027]  kasan_save_alloc_info+0x40/0x58
[   33.935625]  __kasan_kmalloc+0xd4/0xd8
[   33.936193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.936862]  kasan_bitops_generic+0xa0/0x1c8
[   33.937348]  kunit_try_run_case+0x14c/0x3d0
[   33.938029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.938765]  kthread+0x24c/0x2d0
[   33.939249]  ret_from_fork+0x10/0x20
[   33.939765] 
[   33.940149] The buggy address belongs to the object at fff00000c61b4360
[   33.940149]  which belongs to the cache kmalloc-16 of size 16
[   33.941555] The buggy address is located 8 bytes inside of
[   33.941555]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.942964] 
[   33.943412] The buggy address belongs to the physical page:
[   33.944106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.944960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.945818] page_type: f5(slab)
[   33.946353] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.947284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.948161] page dumped because: kasan: bad access detected
[   33.948779] 
[   33.949141] Memory state around the buggy address:
[   33.949660]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.950709]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.951549] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.952379]                                                           ^
[   33.953136]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954065]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954978] ==================================================================
[   33.880421] ==================================================================
[   33.881297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   33.883487] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.884535] 
[   33.885011] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.886457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.887044] Hardware name: linux,dummy-virt (DT)
[   33.887716] Call trace:
[   33.888098]  show_stack+0x20/0x38 (C)
[   33.888728]  dump_stack_lvl+0x8c/0xd0
[   33.889289]  print_report+0x118/0x5e0
[   33.889913]  kasan_report+0xc8/0x118
[   33.890449]  __asan_report_load8_noabort+0x20/0x30
[   33.891230]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   33.891911]  kasan_bitops_generic+0x11c/0x1c8
[   33.892720]  kunit_try_run_case+0x14c/0x3d0
[   33.893368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894151]  kthread+0x24c/0x2d0
[   33.894662]  ret_from_fork+0x10/0x20
[   33.895351] 
[   33.895664] Allocated by task 250:
[   33.896206]  kasan_save_stack+0x3c/0x68
[   33.896773]  kasan_save_track+0x20/0x40
[   33.897290]  kasan_save_alloc_info+0x40/0x58
[   33.898012]  __kasan_kmalloc+0xd4/0xd8
[   33.898766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.899668]  kasan_bitops_generic+0xa0/0x1c8
[   33.900084]  kunit_try_run_case+0x14c/0x3d0
[   33.900593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.901311]  kthread+0x24c/0x2d0
[   33.901786]  ret_from_fork+0x10/0x20
[   33.902476] 
[   33.902794] The buggy address belongs to the object at fff00000c61b4360
[   33.902794]  which belongs to the cache kmalloc-16 of size 16
[   33.904118] The buggy address is located 8 bytes inside of
[   33.904118]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.905426] 
[   33.905792] The buggy address belongs to the physical page:
[   33.906529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.907393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.908334] page_type: f5(slab)
[   33.908827] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.909698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.910726] page dumped because: kasan: bad access detected
[   33.911411] 
[   33.911734] Memory state around the buggy address:
[   33.912456]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.913283]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.914252] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.915090]                                                           ^
[   33.916027]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.916864]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.917703] ==================================================================
[   33.994241] ==================================================================
[   33.995082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   33.996264] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.997285] 
[   33.997607] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.998833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.999495] Hardware name: linux,dummy-virt (DT)
[   34.000142] Call trace:
[   34.000537]  show_stack+0x20/0x38 (C)
[   34.001205]  dump_stack_lvl+0x8c/0xd0
[   34.001778]  print_report+0x118/0x5e0
[   34.002286]  kasan_report+0xc8/0x118
[   34.002988]  __asan_report_load8_noabort+0x20/0x30
[   34.003648]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.004668]  kasan_bitops_generic+0x11c/0x1c8
[   34.005306]  kunit_try_run_case+0x14c/0x3d0
[   34.005822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.006665]  kthread+0x24c/0x2d0
[   34.007279]  ret_from_fork+0x10/0x20
[   34.007768] 
[   34.008178] Allocated by task 250:
[   34.008719]  kasan_save_stack+0x3c/0x68
[   34.009516]  kasan_save_track+0x20/0x40
[   34.010047]  kasan_save_alloc_info+0x40/0x58
[   34.010800]  __kasan_kmalloc+0xd4/0xd8
[   34.011430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.012079]  kasan_bitops_generic+0xa0/0x1c8
[   34.012633]  kunit_try_run_case+0x14c/0x3d0
[   34.013263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.013974]  kthread+0x24c/0x2d0
[   34.014507]  ret_from_fork+0x10/0x20
[   34.015052] 
[   34.015367] The buggy address belongs to the object at fff00000c61b4360
[   34.015367]  which belongs to the cache kmalloc-16 of size 16
[   34.016804] The buggy address is located 8 bytes inside of
[   34.016804]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   34.018220] 
[   34.018594] The buggy address belongs to the physical page:
[   34.019413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   34.020516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.021428] page_type: f5(slab)
[   34.022020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.022981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.023861] page dumped because: kasan: bad access detected
[   34.024563] 
[   34.024846] Memory state around the buggy address:
[   34.025531]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.026363]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.027293] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   34.028136]                                                           ^
[   34.028954]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029931]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030822] ==================================================================
[   33.723104] ==================================================================
[   33.724270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   33.725355] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.727199] 
[   33.727563] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.728751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.729306] Hardware name: linux,dummy-virt (DT)
[   33.729932] Call trace:
[   33.730410]  show_stack+0x20/0x38 (C)
[   33.731004]  dump_stack_lvl+0x8c/0xd0
[   33.731625]  print_report+0x118/0x5e0
[   33.732233]  kasan_report+0xc8/0x118
[   33.732804]  __asan_report_load8_noabort+0x20/0x30
[   33.733464]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   33.734205]  kasan_bitops_generic+0x11c/0x1c8
[   33.734861]  kunit_try_run_case+0x14c/0x3d0
[   33.735529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.737136]  kthread+0x24c/0x2d0
[   33.737750]  ret_from_fork+0x10/0x20
[   33.738281] 
[   33.738645] Allocated by task 250:
[   33.739109]  kasan_save_stack+0x3c/0x68
[   33.739755]  kasan_save_track+0x20/0x40
[   33.740576]  kasan_save_alloc_info+0x40/0x58
[   33.741366]  __kasan_kmalloc+0xd4/0xd8
[   33.742050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.742653]  kasan_bitops_generic+0xa0/0x1c8
[   33.743237]  kunit_try_run_case+0x14c/0x3d0
[   33.744073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744929]  kthread+0x24c/0x2d0
[   33.745530]  ret_from_fork+0x10/0x20
[   33.746196] 
[   33.746568] The buggy address belongs to the object at fff00000c61b4360
[   33.746568]  which belongs to the cache kmalloc-16 of size 16
[   33.747887] The buggy address is located 8 bytes inside of
[   33.747887]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.749350] 
[   33.749727] The buggy address belongs to the physical page:
[   33.750468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.751549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.752605] page_type: f5(slab)
[   33.753197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.754249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.755210] page dumped because: kasan: bad access detected
[   33.755951] 
[   33.756341] Memory state around the buggy address:
[   33.757060]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.757986]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.758982] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.759928]                                                           ^
[   33.760651]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.761483]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.762431] ==================================================================
[   33.763947] ==================================================================
[   33.764679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   33.765752] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.766856] 
[   33.768161] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.769313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.769802] Hardware name: linux,dummy-virt (DT)
[   33.770346] Call trace:
[   33.770711]  show_stack+0x20/0x38 (C)
[   33.771324]  dump_stack_lvl+0x8c/0xd0
[   33.772012]  print_report+0x118/0x5e0
[   33.772593]  kasan_report+0xc8/0x118
[   33.773264]  kasan_check_range+0x100/0x1a8
[   33.773780]  __kasan_check_write+0x20/0x30
[   33.774490]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   33.775308]  kasan_bitops_generic+0x11c/0x1c8
[   33.775984]  kunit_try_run_case+0x14c/0x3d0
[   33.776613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.777388]  kthread+0x24c/0x2d0
[   33.778067]  ret_from_fork+0x10/0x20
[   33.778668] 
[   33.778994] Allocated by task 250:
[   33.779689]  kasan_save_stack+0x3c/0x68
[   33.780179]  kasan_save_track+0x20/0x40
[   33.780903]  kasan_save_alloc_info+0x40/0x58
[   33.781442]  __kasan_kmalloc+0xd4/0xd8
[   33.782064]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.782749]  kasan_bitops_generic+0xa0/0x1c8
[   33.783411]  kunit_try_run_case+0x14c/0x3d0
[   33.784037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.784733]  kthread+0x24c/0x2d0
[   33.785252]  ret_from_fork+0x10/0x20
[   33.785790] 
[   33.786130] The buggy address belongs to the object at fff00000c61b4360
[   33.786130]  which belongs to the cache kmalloc-16 of size 16
[   33.787537] The buggy address is located 8 bytes inside of
[   33.787537]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.788998] 
[   33.789298] The buggy address belongs to the physical page:
[   33.790122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.791002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.791864] page_type: f5(slab)
[   33.792412] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.793366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.794262] page dumped because: kasan: bad access detected
[   33.795033] 
[   33.795331] Memory state around the buggy address:
[   33.795922]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.796796]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.797684] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.798571]                                                           ^
[   33.799367]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.800248]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.801144] ==================================================================
[   33.841720] ==================================================================
[   33.843112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   33.844142] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.845016] 
[   33.845345] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.846563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.847148] Hardware name: linux,dummy-virt (DT)
[   33.847798] Call trace:
[   33.848237]  show_stack+0x20/0x38 (C)
[   33.849115]  dump_stack_lvl+0x8c/0xd0
[   33.849634]  print_report+0x118/0x5e0
[   33.850176]  kasan_report+0xc8/0x118
[   33.850894]  kasan_check_range+0x100/0x1a8
[   33.851482]  __kasan_check_write+0x20/0x30
[   33.852203]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   33.853043]  kasan_bitops_generic+0x11c/0x1c8
[   33.853749]  kunit_try_run_case+0x14c/0x3d0
[   33.854465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.855224]  kthread+0x24c/0x2d0
[   33.855818]  ret_from_fork+0x10/0x20
[   33.856370] 
[   33.856746] Allocated by task 250:
[   33.857276]  kasan_save_stack+0x3c/0x68
[   33.857810]  kasan_save_track+0x20/0x40
[   33.858474]  kasan_save_alloc_info+0x40/0x58
[   33.859100]  __kasan_kmalloc+0xd4/0xd8
[   33.859648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.860275]  kasan_bitops_generic+0xa0/0x1c8
[   33.860929]  kunit_try_run_case+0x14c/0x3d0
[   33.861483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.862270]  kthread+0x24c/0x2d0
[   33.862869]  ret_from_fork+0x10/0x20
[   33.863716] 
[   33.864067] The buggy address belongs to the object at fff00000c61b4360
[   33.864067]  which belongs to the cache kmalloc-16 of size 16
[   33.865472] The buggy address is located 8 bytes inside of
[   33.865472]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.866868] 
[   33.867174] The buggy address belongs to the physical page:
[   33.867993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.868836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.869717] page_type: f5(slab)
[   33.870225] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.871254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.872224] page dumped because: kasan: bad access detected
[   33.872891] 
[   33.873235] Memory state around the buggy address:
[   33.873861]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.874705]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.875609] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.876449]                                                           ^
[   33.877224]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.878201]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879038] ==================================================================
[   33.684789] ==================================================================
[   33.686067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   33.687083] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.687825] 
[   33.688219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.689225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.689852] Hardware name: linux,dummy-virt (DT)
[   33.690606] Call trace:
[   33.691032]  show_stack+0x20/0x38 (C)
[   33.691607]  dump_stack_lvl+0x8c/0xd0
[   33.692203]  print_report+0x118/0x5e0
[   33.692768]  kasan_report+0xc8/0x118
[   33.693333]  kasan_check_range+0x100/0x1a8
[   33.693861]  __kasan_check_write+0x20/0x30
[   33.694402]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   33.695399]  kasan_bitops_generic+0x11c/0x1c8
[   33.696174]  kunit_try_run_case+0x14c/0x3d0
[   33.697045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.697707]  kthread+0x24c/0x2d0
[   33.698380]  ret_from_fork+0x10/0x20
[   33.699088] 
[   33.699423] Allocated by task 250:
[   33.699845]  kasan_save_stack+0x3c/0x68
[   33.700541]  kasan_save_track+0x20/0x40
[   33.701132]  kasan_save_alloc_info+0x40/0x58
[   33.701712]  __kasan_kmalloc+0xd4/0xd8
[   33.702354]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.703105]  kasan_bitops_generic+0xa0/0x1c8
[   33.703759]  kunit_try_run_case+0x14c/0x3d0
[   33.704383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.705092]  kthread+0x24c/0x2d0
[   33.705582]  ret_from_fork+0x10/0x20
[   33.706128] 
[   33.706515] The buggy address belongs to the object at fff00000c61b4360
[   33.706515]  which belongs to the cache kmalloc-16 of size 16
[   33.707909] The buggy address is located 8 bytes inside of
[   33.707909]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.709284] 
[   33.709605] The buggy address belongs to the physical page:
[   33.710426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.711357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.712182] page_type: f5(slab)
[   33.712652] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.713553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.714513] page dumped because: kasan: bad access detected
[   33.715192] 
[   33.715505] Memory state around the buggy address:
[   33.716152]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.717014]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.717852] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.718720]                                                           ^
[   33.719625]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.720505]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.721378] ==================================================================
[   33.802524] ==================================================================
[   33.803630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   33.804966] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.806305] 
[   33.806729] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.808111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.808642] Hardware name: linux,dummy-virt (DT)
[   33.809249] Call trace:
[   33.809627]  show_stack+0x20/0x38 (C)
[   33.810422]  dump_stack_lvl+0x8c/0xd0
[   33.811246]  print_report+0x118/0x5e0
[   33.811790]  kasan_report+0xc8/0x118
[   33.812441]  __asan_report_load8_noabort+0x20/0x30
[   33.813118]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   33.813950]  kasan_bitops_generic+0x11c/0x1c8
[   33.814682]  kunit_try_run_case+0x14c/0x3d0
[   33.815316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.816085]  kthread+0x24c/0x2d0
[   33.816688]  ret_from_fork+0x10/0x20
[   33.817182] 
[   33.817566] Allocated by task 250:
[   33.818193]  kasan_save_stack+0x3c/0x68
[   33.818773]  kasan_save_track+0x20/0x40
[   33.819260]  kasan_save_alloc_info+0x40/0x58
[   33.820026]  __kasan_kmalloc+0xd4/0xd8
[   33.820732]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.821349]  kasan_bitops_generic+0xa0/0x1c8
[   33.822081]  kunit_try_run_case+0x14c/0x3d0
[   33.822675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823374]  kthread+0x24c/0x2d0
[   33.824028]  ret_from_fork+0x10/0x20
[   33.824567] 
[   33.825004] The buggy address belongs to the object at fff00000c61b4360
[   33.825004]  which belongs to the cache kmalloc-16 of size 16
[   33.826434] The buggy address is located 8 bytes inside of
[   33.826434]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.827866] 
[   33.828184] The buggy address belongs to the physical page:
[   33.828980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.829806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.830728] page_type: f5(slab)
[   33.831166] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.832151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.833139] page dumped because: kasan: bad access detected
[   33.833823] 
[   33.834199] Memory state around the buggy address:
[   33.834836]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.835659]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.836544] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.837471]                                                           ^
[   33.838287]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839158]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   33.478827] ==================================================================
[   33.479778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.480696] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.482347] 
[   33.482830] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.484049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.484578] Hardware name: linux,dummy-virt (DT)
[   33.485181] Call trace:
[   33.485562]  show_stack+0x20/0x38 (C)
[   33.486189]  dump_stack_lvl+0x8c/0xd0
[   33.486785]  print_report+0x118/0x5e0
[   33.487364]  kasan_report+0xc8/0x118
[   33.487934]  kasan_check_range+0x100/0x1a8
[   33.488582]  __kasan_check_write+0x20/0x30
[   33.489227]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.489939]  kasan_bitops_generic+0x110/0x1c8
[   33.490580]  kunit_try_run_case+0x14c/0x3d0
[   33.491219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.492015]  kthread+0x24c/0x2d0
[   33.492628]  ret_from_fork+0x10/0x20
[   33.493277] 
[   33.493659] Allocated by task 250:
[   33.494193]  kasan_save_stack+0x3c/0x68
[   33.494973]  kasan_save_track+0x20/0x40
[   33.495479]  kasan_save_alloc_info+0x40/0x58
[   33.496221]  __kasan_kmalloc+0xd4/0xd8
[   33.496765]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.497508]  kasan_bitops_generic+0xa0/0x1c8
[   33.498129]  kunit_try_run_case+0x14c/0x3d0
[   33.498738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.499449]  kthread+0x24c/0x2d0
[   33.500200]  ret_from_fork+0x10/0x20
[   33.500734] 
[   33.501074] The buggy address belongs to the object at fff00000c61b4360
[   33.501074]  which belongs to the cache kmalloc-16 of size 16
[   33.502750] The buggy address is located 8 bytes inside of
[   33.502750]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.504357] 
[   33.504655] The buggy address belongs to the physical page:
[   33.505442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.506687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507710] page_type: f5(slab)
[   33.508330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.509253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.510458] page dumped because: kasan: bad access detected
[   33.511430] 
[   33.512377] Memory state around the buggy address:
[   33.512979]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.513842]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.514764] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.515636]                                                           ^
[   33.516447]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.517347]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.518317] ==================================================================
[   33.558209] ==================================================================
[   33.559535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   33.560434] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.561422] 
[   33.561752] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.564153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.564637] Hardware name: linux,dummy-virt (DT)
[   33.565369] Call trace:
[   33.565914]  show_stack+0x20/0x38 (C)
[   33.566688]  dump_stack_lvl+0x8c/0xd0
[   33.567269]  print_report+0x118/0x5e0
[   33.567825]  kasan_report+0xc8/0x118
[   33.568557]  kasan_check_range+0x100/0x1a8
[   33.569169]  __kasan_check_write+0x20/0x30
[   33.569783]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   33.570545]  kasan_bitops_generic+0x110/0x1c8
[   33.571228]  kunit_try_run_case+0x14c/0x3d0
[   33.571905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572692]  kthread+0x24c/0x2d0
[   33.573302]  ret_from_fork+0x10/0x20
[   33.573892] 
[   33.574234] Allocated by task 250:
[   33.574687]  kasan_save_stack+0x3c/0x68
[   33.575371]  kasan_save_track+0x20/0x40
[   33.575978]  kasan_save_alloc_info+0x40/0x58
[   33.576610]  __kasan_kmalloc+0xd4/0xd8
[   33.577193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.577852]  kasan_bitops_generic+0xa0/0x1c8
[   33.578465]  kunit_try_run_case+0x14c/0x3d0
[   33.579059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.579831]  kthread+0x24c/0x2d0
[   33.580371]  ret_from_fork+0x10/0x20
[   33.580922] 
[   33.581247] The buggy address belongs to the object at fff00000c61b4360
[   33.581247]  which belongs to the cache kmalloc-16 of size 16
[   33.582702] The buggy address is located 8 bytes inside of
[   33.582702]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.584046] 
[   33.584358] The buggy address belongs to the physical page:
[   33.585042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.586059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.586786] page_type: f5(slab)
[   33.587401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.588337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.589239] page dumped because: kasan: bad access detected
[   33.589909] 
[   33.590246] Memory state around the buggy address:
[   33.590831]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.591658]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.592580] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.593535]                                                           ^
[   33.594346]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.595280]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.596198] ==================================================================
[   33.362400] ==================================================================
[   33.363206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.364146] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.365087] 
[   33.365592] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.366800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.367336] Hardware name: linux,dummy-virt (DT)
[   33.367938] Call trace:
[   33.368402]  show_stack+0x20/0x38 (C)
[   33.369096]  dump_stack_lvl+0x8c/0xd0
[   33.369663]  print_report+0x118/0x5e0
[   33.370221]  kasan_report+0xc8/0x118
[   33.370798]  kasan_check_range+0x100/0x1a8
[   33.371412]  __kasan_check_write+0x20/0x30
[   33.372051]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.372827]  kasan_bitops_generic+0x110/0x1c8
[   33.373377]  kunit_try_run_case+0x14c/0x3d0
[   33.374128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.374940]  kthread+0x24c/0x2d0
[   33.375477]  ret_from_fork+0x10/0x20
[   33.376155] 
[   33.376451] Allocated by task 250:
[   33.376969]  kasan_save_stack+0x3c/0x68
[   33.377422]  kasan_save_track+0x20/0x40
[   33.378061]  kasan_save_alloc_info+0x40/0x58
[   33.378972]  __kasan_kmalloc+0xd4/0xd8
[   33.379531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.380202]  kasan_bitops_generic+0xa0/0x1c8
[   33.380947]  kunit_try_run_case+0x14c/0x3d0
[   33.381540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.382245]  kthread+0x24c/0x2d0
[   33.382781]  ret_from_fork+0x10/0x20
[   33.383288] 
[   33.383603] The buggy address belongs to the object at fff00000c61b4360
[   33.383603]  which belongs to the cache kmalloc-16 of size 16
[   33.384996] The buggy address is located 8 bytes inside of
[   33.384996]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.386421] 
[   33.386781] The buggy address belongs to the physical page:
[   33.387564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.388508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.389341] page_type: f5(slab)
[   33.389962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.390906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.391796] page dumped because: kasan: bad access detected
[   33.392512] 
[   33.392827] Memory state around the buggy address:
[   33.393502]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.394348]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.395255] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.396094]                                                           ^
[   33.396870]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397727]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.398602] ==================================================================
[   33.520930] ==================================================================
[   33.521652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   33.522560] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.523575] 
[   33.524065] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.525235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.525914] Hardware name: linux,dummy-virt (DT)
[   33.526490] Call trace:
[   33.527051]  show_stack+0x20/0x38 (C)
[   33.527648]  dump_stack_lvl+0x8c/0xd0
[   33.528231]  print_report+0x118/0x5e0
[   33.528842]  kasan_report+0xc8/0x118
[   33.529393]  __asan_report_load8_noabort+0x20/0x30
[   33.530074]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   33.530945]  kasan_bitops_generic+0x110/0x1c8
[   33.531703]  kunit_try_run_case+0x14c/0x3d0
[   33.532361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.532996]  kthread+0x24c/0x2d0
[   33.533568]  ret_from_fork+0x10/0x20
[   33.534159] 
[   33.534627] Allocated by task 250:
[   33.535077]  kasan_save_stack+0x3c/0x68
[   33.535762]  kasan_save_track+0x20/0x40
[   33.536354]  kasan_save_alloc_info+0x40/0x58
[   33.537061]  __kasan_kmalloc+0xd4/0xd8
[   33.537557]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.538311]  kasan_bitops_generic+0xa0/0x1c8
[   33.538889]  kunit_try_run_case+0x14c/0x3d0
[   33.539557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.540275]  kthread+0x24c/0x2d0
[   33.540778]  ret_from_fork+0x10/0x20
[   33.541379] 
[   33.541770] The buggy address belongs to the object at fff00000c61b4360
[   33.541770]  which belongs to the cache kmalloc-16 of size 16
[   33.543212] The buggy address is located 8 bytes inside of
[   33.543212]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.544551] 
[   33.544915] The buggy address belongs to the physical page:
[   33.545674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.546554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.547449] page_type: f5(slab)
[   33.548012] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.549009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.549913] page dumped because: kasan: bad access detected
[   33.550569] 
[   33.550930] Memory state around the buggy address:
[   33.551564]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.552354]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.553296] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.554113]                                                           ^
[   33.555008]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.555891]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.556749] ==================================================================
[   33.600092] ==================================================================
[   33.600854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   33.601699] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.602613] 
[   33.603092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.604387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.605071] Hardware name: linux,dummy-virt (DT)
[   33.605653] Call trace:
[   33.606573]  show_stack+0x20/0x38 (C)
[   33.607197]  dump_stack_lvl+0x8c/0xd0
[   33.607794]  print_report+0x118/0x5e0
[   33.608374]  kasan_report+0xc8/0x118
[   33.609405]  kasan_check_range+0x100/0x1a8
[   33.610053]  __kasan_check_write+0x20/0x30
[   33.610649]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   33.611489]  kasan_bitops_generic+0x110/0x1c8
[   33.613058]  kunit_try_run_case+0x14c/0x3d0
[   33.614128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.615302]  kthread+0x24c/0x2d0
[   33.616028]  ret_from_fork+0x10/0x20
[   33.616761] 
[   33.617205] Allocated by task 250:
[   33.617901]  kasan_save_stack+0x3c/0x68
[   33.618700]  kasan_save_track+0x20/0x40
[   33.619494]  kasan_save_alloc_info+0x40/0x58
[   33.620371]  __kasan_kmalloc+0xd4/0xd8
[   33.621102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.621632]  kasan_bitops_generic+0xa0/0x1c8
[   33.622300]  kunit_try_run_case+0x14c/0x3d0
[   33.622990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.623671]  kthread+0x24c/0x2d0
[   33.624217]  ret_from_fork+0x10/0x20
[   33.624733] 
[   33.625393] The buggy address belongs to the object at fff00000c61b4360
[   33.625393]  which belongs to the cache kmalloc-16 of size 16
[   33.627002] The buggy address is located 8 bytes inside of
[   33.627002]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.628527] 
[   33.628840] The buggy address belongs to the physical page:
[   33.629695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.630727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.631618] page_type: f5(slab)
[   33.632203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.633205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.634155] page dumped because: kasan: bad access detected
[   33.634928] 
[   33.635276] Memory state around the buggy address:
[   33.635992]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.637071]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.637970] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.638894]                                                           ^
[   33.639750]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.640618]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.641540] ==================================================================
[   33.643341] ==================================================================
[   33.644241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   33.645515] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.647119] 
[   33.647493] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.648800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.649411] Hardware name: linux,dummy-virt (DT)
[   33.650097] Call trace:
[   33.650534]  show_stack+0x20/0x38 (C)
[   33.651219]  dump_stack_lvl+0x8c/0xd0
[   33.651943]  print_report+0x118/0x5e0
[   33.652564]  kasan_report+0xc8/0x118
[   33.653249]  __asan_report_load8_noabort+0x20/0x30
[   33.653982]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   33.654802]  kasan_bitops_generic+0x110/0x1c8
[   33.655572]  kunit_try_run_case+0x14c/0x3d0
[   33.656334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.657225]  kthread+0x24c/0x2d0
[   33.657856]  ret_from_fork+0x10/0x20
[   33.658609] 
[   33.659304] Allocated by task 250:
[   33.659687]  kasan_save_stack+0x3c/0x68
[   33.660154]  kasan_save_track+0x20/0x40
[   33.660603]  kasan_save_alloc_info+0x40/0x58
[   33.661169]  __kasan_kmalloc+0xd4/0xd8
[   33.662418]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.663291]  kasan_bitops_generic+0xa0/0x1c8
[   33.663916]  kunit_try_run_case+0x14c/0x3d0
[   33.664497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.665452]  kthread+0x24c/0x2d0
[   33.666334]  ret_from_fork+0x10/0x20
[   33.667008] 
[   33.667306] The buggy address belongs to the object at fff00000c61b4360
[   33.667306]  which belongs to the cache kmalloc-16 of size 16
[   33.668638] The buggy address is located 8 bytes inside of
[   33.668638]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.670467] 
[   33.670840] The buggy address belongs to the physical page:
[   33.671519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.672510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.673283] page_type: f5(slab)
[   33.673760] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.674695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.675507] page dumped because: kasan: bad access detected
[   33.676329] 
[   33.676680] Memory state around the buggy address:
[   33.677344]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.678271]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.679204] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.679931]                                                           ^
[   33.680906]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.681828]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.682623] ==================================================================
[   33.400769] ==================================================================
[   33.401604] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.402483] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.404136] 
[   33.404489] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.405694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.406332] Hardware name: linux,dummy-virt (DT)
[   33.406974] Call trace:
[   33.407409]  show_stack+0x20/0x38 (C)
[   33.408018]  dump_stack_lvl+0x8c/0xd0
[   33.408671]  print_report+0x118/0x5e0
[   33.409725]  kasan_report+0xc8/0x118
[   33.410502]  __asan_report_load8_noabort+0x20/0x30
[   33.411344]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.412097]  kasan_bitops_generic+0x110/0x1c8
[   33.412732]  kunit_try_run_case+0x14c/0x3d0
[   33.413388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.414227]  kthread+0x24c/0x2d0
[   33.414736]  ret_from_fork+0x10/0x20
[   33.415391] 
[   33.415805] Allocated by task 250:
[   33.416384]  kasan_save_stack+0x3c/0x68
[   33.416974]  kasan_save_track+0x20/0x40
[   33.417472]  kasan_save_alloc_info+0x40/0x58
[   33.418201]  __kasan_kmalloc+0xd4/0xd8
[   33.418803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.419515]  kasan_bitops_generic+0xa0/0x1c8
[   33.420109]  kunit_try_run_case+0x14c/0x3d0
[   33.420769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.421504]  kthread+0x24c/0x2d0
[   33.422000]  ret_from_fork+0x10/0x20
[   33.422548] 
[   33.422933] The buggy address belongs to the object at fff00000c61b4360
[   33.422933]  which belongs to the cache kmalloc-16 of size 16
[   33.424368] The buggy address is located 8 bytes inside of
[   33.424368]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.425693] 
[   33.426031] The buggy address belongs to the physical page:
[   33.426667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.427701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.428560] page_type: f5(slab)
[   33.429009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.429952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.430926] page dumped because: kasan: bad access detected
[   33.431575] 
[   33.431921] Memory state around the buggy address:
[   33.432601]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.433423]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.434301] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.435244]                                                           ^
[   33.436071]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.436941]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.437785] ==================================================================
[   33.283192] ==================================================================
[   33.284449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.285498] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.286663] 
[   33.287127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.288499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.289041] Hardware name: linux,dummy-virt (DT)
[   33.289582] Call trace:
[   33.290102]  show_stack+0x20/0x38 (C)
[   33.290832]  dump_stack_lvl+0x8c/0xd0
[   33.291487]  print_report+0x118/0x5e0
[   33.292059]  kasan_report+0xc8/0x118
[   33.292665]  kasan_check_range+0x100/0x1a8
[   33.293365]  __kasan_check_write+0x20/0x30
[   33.294011]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.294734]  kasan_bitops_generic+0x110/0x1c8
[   33.295433]  kunit_try_run_case+0x14c/0x3d0
[   33.296068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.296836]  kthread+0x24c/0x2d0
[   33.297307]  ret_from_fork+0x10/0x20
[   33.297972] 
[   33.298337] Allocated by task 250:
[   33.298792]  kasan_save_stack+0x3c/0x68
[   33.299511]  kasan_save_track+0x20/0x40
[   33.300170]  kasan_save_alloc_info+0x40/0x58
[   33.300801]  __kasan_kmalloc+0xd4/0xd8
[   33.301342]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.302102]  kasan_bitops_generic+0xa0/0x1c8
[   33.302604]  kunit_try_run_case+0x14c/0x3d0
[   33.303383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.304142]  kthread+0x24c/0x2d0
[   33.304603]  ret_from_fork+0x10/0x20
[   33.305155] 
[   33.305530] The buggy address belongs to the object at fff00000c61b4360
[   33.305530]  which belongs to the cache kmalloc-16 of size 16
[   33.306978] The buggy address is located 8 bytes inside of
[   33.306978]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.308300] 
[   33.308605] The buggy address belongs to the physical page:
[   33.309446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.310322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.311276] page_type: f5(slab)
[   33.311733] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.312762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.313689] page dumped because: kasan: bad access detected
[   33.314417] 
[   33.314739] Memory state around the buggy address:
[   33.315430]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.316571]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.317435] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.318546]                                                           ^
[   33.319525]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.320510]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.321356] ==================================================================
[   33.439947] ==================================================================
[   33.440897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.441820] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.442519] 
[   33.442868] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.444118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.444673] Hardware name: linux,dummy-virt (DT)
[   33.445302] Call trace:
[   33.445787]  show_stack+0x20/0x38 (C)
[   33.446331]  dump_stack_lvl+0x8c/0xd0
[   33.446954]  print_report+0x118/0x5e0
[   33.447589]  kasan_report+0xc8/0x118
[   33.448209]  kasan_check_range+0x100/0x1a8
[   33.448813]  __kasan_check_write+0x20/0x30
[   33.449443]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.450149]  kasan_bitops_generic+0x110/0x1c8
[   33.450865]  kunit_try_run_case+0x14c/0x3d0
[   33.451510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.452307]  kthread+0x24c/0x2d0
[   33.452851]  ret_from_fork+0x10/0x20
[   33.453446] 
[   33.453726] Allocated by task 250:
[   33.454379]  kasan_save_stack+0x3c/0x68
[   33.454894]  kasan_save_track+0x20/0x40
[   33.455510]  kasan_save_alloc_info+0x40/0x58
[   33.456318]  __kasan_kmalloc+0xd4/0xd8
[   33.456856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.457593]  kasan_bitops_generic+0xa0/0x1c8
[   33.458204]  kunit_try_run_case+0x14c/0x3d0
[   33.458922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.459552]  kthread+0x24c/0x2d0
[   33.460172]  ret_from_fork+0x10/0x20
[   33.460707] 
[   33.461033] The buggy address belongs to the object at fff00000c61b4360
[   33.461033]  which belongs to the cache kmalloc-16 of size 16
[   33.462455] The buggy address is located 8 bytes inside of
[   33.462455]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.463785] 
[   33.464159] The buggy address belongs to the physical page:
[   33.464924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.465815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.466669] page_type: f5(slab)
[   33.467176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.468208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.469154] page dumped because: kasan: bad access detected
[   33.469801] 
[   33.470115] Memory state around the buggy address:
[   33.470717]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.471845]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.472806] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.473668]                                                           ^
[   33.474511]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.475404]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.476248] ==================================================================
[   33.323052] ==================================================================
[   33.324983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.326003] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250
[   33.327058] 
[   33.327536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.328808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.329426] Hardware name: linux,dummy-virt (DT)
[   33.330038] Call trace:
[   33.330434]  show_stack+0x20/0x38 (C)
[   33.331064]  dump_stack_lvl+0x8c/0xd0
[   33.331603]  print_report+0x118/0x5e0
[   33.332300]  kasan_report+0xc8/0x118
[   33.332924]  __asan_report_load8_noabort+0x20/0x30
[   33.333729]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.334486]  kasan_bitops_generic+0x110/0x1c8
[   33.335139]  kunit_try_run_case+0x14c/0x3d0
[   33.335793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.336566]  kthread+0x24c/0x2d0
[   33.337164]  ret_from_fork+0x10/0x20
[   33.337700] 
[   33.338031] Allocated by task 250:
[   33.338535]  kasan_save_stack+0x3c/0x68
[   33.339212]  kasan_save_track+0x20/0x40
[   33.339780]  kasan_save_alloc_info+0x40/0x58
[   33.340418]  __kasan_kmalloc+0xd4/0xd8
[   33.340980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.341640]  kasan_bitops_generic+0xa0/0x1c8
[   33.342242]  kunit_try_run_case+0x14c/0x3d0
[   33.342766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.343582]  kthread+0x24c/0x2d0
[   33.344112]  ret_from_fork+0x10/0x20
[   33.344595] 
[   33.345076] The buggy address belongs to the object at fff00000c61b4360
[   33.345076]  which belongs to the cache kmalloc-16 of size 16
[   33.346513] The buggy address is located 8 bytes inside of
[   33.346513]  allocated 9-byte region [fff00000c61b4360, fff00000c61b4369)
[   33.347827] 
[   33.348197] The buggy address belongs to the physical page:
[   33.348938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   33.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.350726] page_type: f5(slab)
[   33.351299] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.352169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.353116] page dumped because: kasan: bad access detected
[   33.353797] 
[   33.354156] Memory state around the buggy address:
[   33.354742]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.355673]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.356512] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   33.357376]                                                           ^
[   33.358168]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359001]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359823] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   33.230703] ==================================================================
[   33.232978] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   33.233899] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248
[   33.234744] 
[   33.235102] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.236572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.237164] Hardware name: linux,dummy-virt (DT)
[   33.237680] Call trace:
[   33.238181]  show_stack+0x20/0x38 (C)
[   33.238896]  dump_stack_lvl+0x8c/0xd0
[   33.239477]  print_report+0x118/0x5e0
[   33.240122]  kasan_report+0xc8/0x118
[   33.240675]  __asan_report_load1_noabort+0x20/0x30
[   33.241339]  strnlen+0x80/0x88
[   33.241914]  kasan_strings+0x364/0x8d8
[   33.242552]  kunit_try_run_case+0x14c/0x3d0
[   33.243221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.243973]  kthread+0x24c/0x2d0
[   33.244521]  ret_from_fork+0x10/0x20
[   33.245083] 
[   33.245416] Allocated by task 248:
[   33.245951]  kasan_save_stack+0x3c/0x68
[   33.246587]  kasan_save_track+0x20/0x40
[   33.247170]  kasan_save_alloc_info+0x40/0x58
[   33.247796]  __kasan_kmalloc+0xd4/0xd8
[   33.248373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.248904]  kasan_strings+0xb0/0x8d8
[   33.249531]  kunit_try_run_case+0x14c/0x3d0
[   33.250081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.250924]  kthread+0x24c/0x2d0
[   33.251526]  ret_from_fork+0x10/0x20
[   33.252110] 
[   33.252403] Freed by task 248:
[   33.252921]  kasan_save_stack+0x3c/0x68
[   33.253573]  kasan_save_track+0x20/0x40
[   33.254174]  kasan_save_free_info+0x4c/0x78
[   33.254796]  __kasan_slab_free+0x6c/0x98
[   33.255357]  kfree+0x114/0x3c8
[   33.255808]  kasan_strings+0x124/0x8d8
[   33.256489]  kunit_try_run_case+0x14c/0x3d0
[   33.257111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.257673]  kthread+0x24c/0x2d0
[   33.258234]  ret_from_fork+0x10/0x20
[   33.258899] 
[   33.259194] The buggy address belongs to the object at fff00000c63d1e40
[   33.259194]  which belongs to the cache kmalloc-32 of size 32
[   33.260621] The buggy address is located 16 bytes inside of
[   33.260621]  freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60)
[   33.262041] 
[   33.262391] The buggy address belongs to the physical page:
[   33.263077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   33.264021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.264774] page_type: f5(slab)
[   33.265349] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.266221] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.267261] page dumped because: kasan: bad access detected
[   33.267971] 
[   33.268277] Memory state around the buggy address:
[   33.268920]  fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.269843]  fff00000c63d1d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.270692] >fff00000c63d1e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.271588]                                                  ^
[   33.272383]  fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.273303]  fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.274117] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   33.183185] ==================================================================
[   33.184120] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   33.185033] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248
[   33.186097] 
[   33.186499] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.188021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.188733] Hardware name: linux,dummy-virt (DT)
[   33.189424] Call trace:
[   33.189892]  show_stack+0x20/0x38 (C)
[   33.190634]  dump_stack_lvl+0x8c/0xd0
[   33.191281]  print_report+0x118/0x5e0
[   33.191922]  kasan_report+0xc8/0x118
[   33.192549]  __asan_report_load1_noabort+0x20/0x30
[   33.193314]  strlen+0xa8/0xb0
[   33.193901]  kasan_strings+0x304/0x8d8
[   33.194518]  kunit_try_run_case+0x14c/0x3d0
[   33.195230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196134]  kthread+0x24c/0x2d0
[   33.196736]  ret_from_fork+0x10/0x20
[   33.197506] 
[   33.197822] Allocated by task 248:
[   33.198345]  kasan_save_stack+0x3c/0x68
[   33.199345]  kasan_save_track+0x20/0x40
[   33.199803]  kasan_save_alloc_info+0x40/0x58
[   33.200626]  __kasan_kmalloc+0xd4/0xd8
[   33.201363]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.202176]  kasan_strings+0xb0/0x8d8
[   33.202928]  kunit_try_run_case+0x14c/0x3d0
[   33.203588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.204464]  kthread+0x24c/0x2d0
[   33.204988]  ret_from_fork+0x10/0x20
[   33.205511] 
[   33.205817] Freed by task 248:
[   33.206774]  kasan_save_stack+0x3c/0x68
[   33.207531]  kasan_save_track+0x20/0x40
[   33.208226]  kasan_save_free_info+0x4c/0x78
[   33.209016]  __kasan_slab_free+0x6c/0x98
[   33.209750]  kfree+0x114/0x3c8
[   33.210437]  kasan_strings+0x124/0x8d8
[   33.211203]  kunit_try_run_case+0x14c/0x3d0
[   33.211798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.212606]  kthread+0x24c/0x2d0
[   33.213301]  ret_from_fork+0x10/0x20
[   33.213800] 
[   33.214214] The buggy address belongs to the object at fff00000c63d1e40
[   33.214214]  which belongs to the cache kmalloc-32 of size 32
[   33.215527] The buggy address is located 16 bytes inside of
[   33.215527]  freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60)
[   33.216938] 
[   33.217228] The buggy address belongs to the physical page:
[   33.218066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   33.218978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.219814] page_type: f5(slab)
[   33.220414] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.221382] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.222291] page dumped because: kasan: bad access detected
[   33.222983] 
[   33.223344] Memory state around the buggy address:
[   33.224082]  fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.224943]  fff00000c63d1d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.225829] >fff00000c63d1e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.226689]                                                  ^
[   33.227351]  fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.228351]  fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.229177] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   33.131681] ==================================================================
[   33.132630] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   33.133396] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248
[   33.134391] 
[   33.134666] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.135649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.137270] Hardware name: linux,dummy-virt (DT)
[   33.138281] Call trace:
[   33.138949]  show_stack+0x20/0x38 (C)
[   33.139627]  dump_stack_lvl+0x8c/0xd0
[   33.140347]  print_report+0x118/0x5e0
[   33.141240]  kasan_report+0xc8/0x118
[   33.141964]  __asan_report_load1_noabort+0x20/0x30
[   33.142774]  kasan_strings+0x838/0x8d8
[   33.143480]  kunit_try_run_case+0x14c/0x3d0
[   33.144266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.145103]  kthread+0x24c/0x2d0
[   33.145592]  ret_from_fork+0x10/0x20
[   33.146146] 
[   33.146471] Allocated by task 248:
[   33.147099]  kasan_save_stack+0x3c/0x68
[   33.147722]  kasan_save_track+0x20/0x40
[   33.148554]  kasan_save_alloc_info+0x40/0x58
[   33.149245]  __kasan_kmalloc+0xd4/0xd8
[   33.150004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.150747]  kasan_strings+0xb0/0x8d8
[   33.151454]  kunit_try_run_case+0x14c/0x3d0
[   33.152202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.153058]  kthread+0x24c/0x2d0
[   33.153676]  ret_from_fork+0x10/0x20
[   33.154407] 
[   33.154971] Freed by task 248:
[   33.155596]  kasan_save_stack+0x3c/0x68
[   33.156327]  kasan_save_track+0x20/0x40
[   33.157020]  kasan_save_free_info+0x4c/0x78
[   33.157671]  __kasan_slab_free+0x6c/0x98
[   33.158417]  kfree+0x114/0x3c8
[   33.159034]  kasan_strings+0x124/0x8d8
[   33.159710]  kunit_try_run_case+0x14c/0x3d0
[   33.160441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.161372]  kthread+0x24c/0x2d0
[   33.162021]  ret_from_fork+0x10/0x20
[   33.162728] 
[   33.163197] The buggy address belongs to the object at fff00000c63d1e40
[   33.163197]  which belongs to the cache kmalloc-32 of size 32
[   33.164783] The buggy address is located 16 bytes inside of
[   33.164783]  freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60)
[   33.165465] 
[   33.165638] The buggy address belongs to the physical page:
[   33.166049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   33.167504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.168592] page_type: f5(slab)
[   33.169342] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.170342] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.171323] page dumped because: kasan: bad access detected
[   33.172095] 
[   33.172427] Memory state around the buggy address:
[   33.173468]  fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.174436]  fff00000c63d1d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.175520] >fff00000c63d1e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.176556]                                                  ^
[   33.177154]  fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.178307]  fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.179359] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   33.086946] ==================================================================
[   33.089130] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.089949] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248
[   33.090738] 
[   33.091173] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.092472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.093057] Hardware name: linux,dummy-virt (DT)
[   33.093658] Call trace:
[   33.094095]  show_stack+0x20/0x38 (C)
[   33.094766]  dump_stack_lvl+0x8c/0xd0
[   33.095361]  print_report+0x118/0x5e0
[   33.095966]  kasan_report+0xc8/0x118
[   33.096458]  __asan_report_load1_noabort+0x20/0x30
[   33.097260]  strcmp+0xc0/0xc8
[   33.097818]  kasan_strings+0x228/0x8d8
[   33.098382]  kunit_try_run_case+0x14c/0x3d0
[   33.099036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.099810]  kthread+0x24c/0x2d0
[   33.100403]  ret_from_fork+0x10/0x20
[   33.101019] 
[   33.101395] Allocated by task 248:
[   33.101946]  kasan_save_stack+0x3c/0x68
[   33.102461]  kasan_save_track+0x20/0x40
[   33.103113]  kasan_save_alloc_info+0x40/0x58
[   33.103691]  __kasan_kmalloc+0xd4/0xd8
[   33.104236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.104966]  kasan_strings+0xb0/0x8d8
[   33.105555]  kunit_try_run_case+0x14c/0x3d0
[   33.106161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.106822]  kthread+0x24c/0x2d0
[   33.107381]  ret_from_fork+0x10/0x20
[   33.107941] 
[   33.108257] Freed by task 248:
[   33.108836]  kasan_save_stack+0x3c/0x68
[   33.109399]  kasan_save_track+0x20/0x40
[   33.110036]  kasan_save_free_info+0x4c/0x78
[   33.110650]  __kasan_slab_free+0x6c/0x98
[   33.111125]  kfree+0x114/0x3c8
[   33.111670]  kasan_strings+0x124/0x8d8
[   33.112302]  kunit_try_run_case+0x14c/0x3d0
[   33.112827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.113372]  kthread+0x24c/0x2d0
[   33.113795]  ret_from_fork+0x10/0x20
[   33.114481] 
[   33.114813] The buggy address belongs to the object at fff00000c63d1e40
[   33.114813]  which belongs to the cache kmalloc-32 of size 32
[   33.116071] The buggy address is located 16 bytes inside of
[   33.116071]  freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60)
[   33.117470] 
[   33.117785] The buggy address belongs to the physical page:
[   33.118476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   33.119527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.120281] page_type: f5(slab)
[   33.120808] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.121749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.122705] page dumped because: kasan: bad access detected
[   33.123408] 
[   33.123751] Memory state around the buggy address:
[   33.124409]  fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.125287]  fff00000c63d1d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.126080] >fff00000c63d1e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.126947]                                                  ^
[   33.127754]  fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.128633]  fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.129534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   33.033104] ==================================================================
[   33.034546] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.035896] Read of size 1 at addr fff00000c63d1d98 by task kunit_try_catch/246
[   33.037013] 
[   33.037475] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.038797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.039657] Hardware name: linux,dummy-virt (DT)
[   33.040277] Call trace:
[   33.040732]  show_stack+0x20/0x38 (C)
[   33.041378]  dump_stack_lvl+0x8c/0xd0
[   33.041936]  print_report+0x118/0x5e0
[   33.042614]  kasan_report+0xc8/0x118
[   33.043242]  __asan_report_load1_noabort+0x20/0x30
[   33.043917]  memcmp+0x198/0x1d8
[   33.044447]  kasan_memcmp+0x16c/0x300
[   33.045353]  kunit_try_run_case+0x14c/0x3d0
[   33.045953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.046746]  kthread+0x24c/0x2d0
[   33.047535]  ret_from_fork+0x10/0x20
[   33.048142] 
[   33.048511] Allocated by task 246:
[   33.049044]  kasan_save_stack+0x3c/0x68
[   33.049621]  kasan_save_track+0x20/0x40
[   33.050222]  kasan_save_alloc_info+0x40/0x58
[   33.050786]  __kasan_kmalloc+0xd4/0xd8
[   33.051630]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.052219]  kasan_memcmp+0xbc/0x300
[   33.052828]  kunit_try_run_case+0x14c/0x3d0
[   33.053497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.054311]  kthread+0x24c/0x2d0
[   33.054827]  ret_from_fork+0x10/0x20
[   33.056177] 
[   33.056537] The buggy address belongs to the object at fff00000c63d1d80
[   33.056537]  which belongs to the cache kmalloc-32 of size 32
[   33.057960] The buggy address is located 0 bytes to the right of
[   33.057960]  allocated 24-byte region [fff00000c63d1d80, fff00000c63d1d98)
[   33.059774] 
[   33.060123] The buggy address belongs to the physical page:
[   33.060894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   33.061773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.062748] page_type: f5(slab)
[   33.063484] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.064463] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.065403] page dumped because: kasan: bad access detected
[   33.066216] 
[   33.066586] Memory state around the buggy address:
[   33.067436]  fff00000c63d1c80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.068418]  fff00000c63d1d00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.069303] >fff00000c63d1d80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.070182]                             ^
[   33.070655]  fff00000c63d1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.071864]  fff00000c63d1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.072739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   32.979110] ==================================================================
[   32.980475] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   32.982200] Read of size 1 at addr ffff800080c17bea by task kunit_try_catch/242
[   32.983117] 
[   32.983527] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.984623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.985320] Hardware name: linux,dummy-virt (DT)
[   32.986464] Call trace:
[   32.986958]  show_stack+0x20/0x38 (C)
[   32.987539]  dump_stack_lvl+0x8c/0xd0
[   32.988647]  print_report+0x2fc/0x5e0
[   32.989483]  kasan_report+0xc8/0x118
[   32.990079]  __asan_report_load1_noabort+0x20/0x30
[   32.990928]  kasan_alloca_oob_right+0x2e4/0x348
[   32.992033]  kunit_try_run_case+0x14c/0x3d0
[   32.992608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.993446]  kthread+0x24c/0x2d0
[   32.994003]  ret_from_fork+0x10/0x20
[   32.994583] 
[   32.995052] The buggy address belongs to stack of task kunit_try_catch/242
[   32.996230] 
[   32.997142] The buggy address belongs to the virtual mapping at
[   32.997142]  [ffff800080c10000, ffff800080c19000) created by:
[   32.997142]  kernel_clone+0x140/0x788
[   32.999093] 
[   32.999753] The buggy address belongs to the physical page:
[   33.000598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664d
[   33.001636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.002634] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.003926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.005355] page dumped because: kasan: bad access detected
[   33.006068] 
[   33.006484] Memory state around the buggy address:
[   33.007646]  ffff800080c17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.008608]  ffff800080c17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.009534] >ffff800080c17b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.010434]                                                           ^
[   33.011853]  ffff800080c17c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.012583]  ffff800080c17c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.013518] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   32.937809] ==================================================================
[   32.939201] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   32.940208] Read of size 1 at addr ffff800080a27bdf by task kunit_try_catch/240
[   32.941089] 
[   32.941515] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.942617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.943276] Hardware name: linux,dummy-virt (DT)
[   32.944142] Call trace:
[   32.945127]  show_stack+0x20/0x38 (C)
[   32.945743]  dump_stack_lvl+0x8c/0xd0
[   32.946494]  print_report+0x2fc/0x5e0
[   32.947170]  kasan_report+0xc8/0x118
[   32.947753]  __asan_report_load1_noabort+0x20/0x30
[   32.948476]  kasan_alloca_oob_left+0x2b8/0x310
[   32.949498]  kunit_try_run_case+0x14c/0x3d0
[   32.950329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.951197]  kthread+0x24c/0x2d0
[   32.952239]  ret_from_fork+0x10/0x20
[   32.953094] 
[   32.953382] The buggy address belongs to stack of task kunit_try_catch/240
[   32.954312] 
[   32.954684] The buggy address belongs to the virtual mapping at
[   32.954684]  [ffff800080a20000, ffff800080a29000) created by:
[   32.954684]  kernel_clone+0x140/0x788
[   32.956380] 
[   32.956810] The buggy address belongs to the physical page:
[   32.957863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e1
[   32.958913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.959959] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.960843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.961928] page dumped because: kasan: bad access detected
[   32.962657] 
[   32.963047] Memory state around the buggy address:
[   32.964002]  ffff800080a27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.964845]  ffff800080a27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.965733] >ffff800080a27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   32.966666]                                                     ^
[   32.967732]  ffff800080a27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   32.968517]  ffff800080a27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   32.969490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   29.173089] ==================================================================
[   29.174238] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.175037] Free of addr fff00000c644c001 by task kunit_try_catch/139
[   29.176924] 
[   29.177232] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.178606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.179282] Hardware name: linux,dummy-virt (DT)
[   29.179966] Call trace:
[   29.180585]  show_stack+0x20/0x38 (C)
[   29.181236]  dump_stack_lvl+0x8c/0xd0
[   29.181897]  print_report+0x118/0x5e0
[   29.182649]  kasan_report_invalid_free+0xb0/0xd8
[   29.183649]  __kasan_kfree_large+0x5c/0xa8
[   29.184399]  free_large_kmalloc+0x58/0x140
[   29.185003]  kfree+0x270/0x3c8
[   29.185594]  kmalloc_large_invalid_free+0x108/0x270
[   29.186291]  kunit_try_run_case+0x14c/0x3d0
[   29.186944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.187652]  kthread+0x24c/0x2d0
[   29.188453]  ret_from_fork+0x10/0x20
[   29.189053] 
[   29.189366] The buggy address belongs to the physical page:
[   29.190047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.190841] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.192241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.193226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.194260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.195149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.196168] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.197429] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.198568] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.199356] page dumped because: kasan: bad access detected
[   29.199779] 
[   29.200448] Memory state around the buggy address:
[   29.201125]  fff00000c644bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201907]  fff00000c644bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.203005] >fff00000c644c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.204086]                    ^
[   29.204551]  fff00000c644c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.205486]  fff00000c644c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.206408] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   32.842456] ==================================================================
[   32.843995] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   32.845117] Read of size 1 at addr ffffa4b337ee402d by task kunit_try_catch/234
[   32.846384] 
[   32.846756] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.848783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.849572] Hardware name: linux,dummy-virt (DT)
[   32.850305] Call trace:
[   32.850915]  show_stack+0x20/0x38 (C)
[   32.851688]  dump_stack_lvl+0x8c/0xd0
[   32.852699]  print_report+0x2fc/0x5e0
[   32.853321]  kasan_report+0xc8/0x118
[   32.853892]  __asan_report_load1_noabort+0x20/0x30
[   32.854589]  kasan_global_oob_right+0x230/0x270
[   32.855429]  kunit_try_run_case+0x14c/0x3d0
[   32.856017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.856850]  kthread+0x24c/0x2d0
[   32.857548]  ret_from_fork+0x10/0x20
[   32.858107] 
[   32.858561] The buggy address belongs to the variable:
[   32.859463]  global_array+0xd/0x40
[   32.860085] 
[   32.860502] The buggy address belongs to the virtual mapping at
[   32.860502]  [ffffa4b336220000, ffffa4b337fa1000) created by:
[   32.860502]  paging_init+0x668/0x7c8
[   32.862148] 
[   32.862758] The buggy address belongs to the physical page:
[   32.864355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478e4
[   32.865191] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   32.866119] raw: 03fffe0000002000 ffffc1ffc01e3908 ffffc1ffc01e3908 0000000000000000
[   32.867041] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.867951] page dumped because: kasan: bad access detected
[   32.868650] 
[   32.869177] Memory state around the buggy address:
[   32.869777]  ffffa4b337ee3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.870672]  ffffa4b337ee3f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   32.871393] >ffffa4b337ee4000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   32.872955]                                   ^
[   32.873480]  ffffa4b337ee4080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   32.874529]  ffffa4b337ee4100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   32.875383] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   32.797290] ==================================================================
[   32.798829] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   32.800298] Free of addr fff00000c6610001 by task kunit_try_catch/232
[   32.800922] 
[   32.801392] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.803251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.803939] Hardware name: linux,dummy-virt (DT)
[   32.804927] Call trace:
[   32.805381]  show_stack+0x20/0x38 (C)
[   32.806149]  dump_stack_lvl+0x8c/0xd0
[   32.806826]  print_report+0x118/0x5e0
[   32.807713]  kasan_report_invalid_free+0xb0/0xd8
[   32.808655]  __kasan_mempool_poison_object+0xfc/0x150
[   32.809370]  mempool_free+0x28c/0x328
[   32.809835]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   32.810675]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   32.811421]  kunit_try_run_case+0x14c/0x3d0
[   32.812045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812838]  kthread+0x24c/0x2d0
[   32.814198]  ret_from_fork+0x10/0x20
[   32.814991] 
[   32.815353] The buggy address belongs to the physical page:
[   32.816495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   32.817398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.818295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.819163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.820418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.821180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.822285] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.823365] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000
[   32.824357] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.825275] page dumped because: kasan: bad access detected
[   32.825954] 
[   32.826260] Memory state around the buggy address:
[   32.826919]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.828265]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829158] >fff00000c6610000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.829842]                    ^
[   32.830926]  fff00000c6610080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.831943]  fff00000c6610100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.833115] ==================================================================
[   32.744352] ==================================================================
[   32.745519] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   32.746423] Free of addr fff00000c6567801 by task kunit_try_catch/230
[   32.747073] 
[   32.747537] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.749212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.749769] Hardware name: linux,dummy-virt (DT)
[   32.750615] Call trace:
[   32.751050]  show_stack+0x20/0x38 (C)
[   32.751714]  dump_stack_lvl+0x8c/0xd0
[   32.752453]  print_report+0x118/0x5e0
[   32.752981]  kasan_report_invalid_free+0xb0/0xd8
[   32.753677]  check_slab_allocation+0xfc/0x108
[   32.754310]  __kasan_mempool_poison_object+0x78/0x150
[   32.755028]  mempool_free+0x28c/0x328
[   32.755822]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   32.756506]  mempool_kmalloc_invalid_free+0xb8/0x110
[   32.757294]  kunit_try_run_case+0x14c/0x3d0
[   32.757936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.758706]  kthread+0x24c/0x2d0
[   32.759582]  ret_from_fork+0x10/0x20
[   32.760086] 
[   32.760454] Allocated by task 230:
[   32.761018]  kasan_save_stack+0x3c/0x68
[   32.761525]  kasan_save_track+0x20/0x40
[   32.762236]  kasan_save_alloc_info+0x40/0x58
[   32.762794]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.763864]  remove_element+0x130/0x1f8
[   32.764866]  mempool_alloc_preallocated+0x58/0xc0
[   32.765373]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   32.766277]  mempool_kmalloc_invalid_free+0xb8/0x110
[   32.767120]  kunit_try_run_case+0x14c/0x3d0
[   32.767950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.768980]  kthread+0x24c/0x2d0
[   32.769685]  ret_from_fork+0x10/0x20
[   32.770535] 
[   32.770967] The buggy address belongs to the object at fff00000c6567800
[   32.770967]  which belongs to the cache kmalloc-128 of size 128
[   32.772440] The buggy address is located 1 bytes inside of
[   32.772440]  128-byte region [fff00000c6567800, fff00000c6567880)
[   32.773769] 
[   32.774223] The buggy address belongs to the physical page:
[   32.775954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106567
[   32.776840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.777748] page_type: f5(slab)
[   32.778266] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.779342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.780232] page dumped because: kasan: bad access detected
[   32.781028] 
[   32.781336] Memory state around the buggy address:
[   32.781911]  fff00000c6567700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.782772]  fff00000c6567780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.784417] >fff00000c6567800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.785360]                    ^
[   32.785780]  fff00000c6567880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.786997]  fff00000c6567900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.788250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   32.600271] ==================================================================
[   32.601506] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.602168] Free of addr fff00000c6567300 by task kunit_try_catch/224
[   32.603023] 
[   32.603850] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.604995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.605620] Hardware name: linux,dummy-virt (DT)
[   32.606221] Call trace:
[   32.606631]  show_stack+0x20/0x38 (C)
[   32.607147]  dump_stack_lvl+0x8c/0xd0
[   32.608014]  print_report+0x118/0x5e0
[   32.608515]  kasan_report_invalid_free+0xb0/0xd8
[   32.609282]  check_slab_allocation+0xd4/0x108
[   32.609949]  __kasan_mempool_poison_object+0x78/0x150
[   32.610735]  mempool_free+0x28c/0x328
[   32.611411]  mempool_double_free_helper+0x150/0x2e0
[   32.612072]  mempool_kmalloc_double_free+0xb8/0x110
[   32.612808]  kunit_try_run_case+0x14c/0x3d0
[   32.613481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614285]  kthread+0x24c/0x2d0
[   32.614763]  ret_from_fork+0x10/0x20
[   32.615475] 
[   32.615841] Allocated by task 224:
[   32.616300]  kasan_save_stack+0x3c/0x68
[   32.617175]  kasan_save_track+0x20/0x40
[   32.617652]  kasan_save_alloc_info+0x40/0x58
[   32.618300]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.619073]  remove_element+0x130/0x1f8
[   32.619639]  mempool_alloc_preallocated+0x58/0xc0
[   32.620275]  mempool_double_free_helper+0x94/0x2e0
[   32.621387]  mempool_kmalloc_double_free+0xb8/0x110
[   32.622193]  kunit_try_run_case+0x14c/0x3d0
[   32.622861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.623489]  kthread+0x24c/0x2d0
[   32.624385]  ret_from_fork+0x10/0x20
[   32.624912] 
[   32.625232] Freed by task 224:
[   32.625727]  kasan_save_stack+0x3c/0x68
[   32.626295]  kasan_save_track+0x20/0x40
[   32.626855]  kasan_save_free_info+0x4c/0x78
[   32.627679]  __kasan_mempool_poison_object+0xc0/0x150
[   32.628535]  mempool_free+0x28c/0x328
[   32.628986]  mempool_double_free_helper+0x100/0x2e0
[   32.629722]  mempool_kmalloc_double_free+0xb8/0x110
[   32.630469]  kunit_try_run_case+0x14c/0x3d0
[   32.631090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.632142]  kthread+0x24c/0x2d0
[   32.633063]  ret_from_fork+0x10/0x20
[   32.633531] 
[   32.633812] The buggy address belongs to the object at fff00000c6567300
[   32.633812]  which belongs to the cache kmalloc-128 of size 128
[   32.635550] The buggy address is located 0 bytes inside of
[   32.635550]  128-byte region [fff00000c6567300, fff00000c6567380)
[   32.637010] 
[   32.637355] The buggy address belongs to the physical page:
[   32.638025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106567
[   32.639010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.640360] page_type: f5(slab)
[   32.640915] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.642146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.643476] page dumped because: kasan: bad access detected
[   32.644258] 
[   32.644601] Memory state around the buggy address:
[   32.645412]  fff00000c6567200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.646463]  fff00000c6567280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.647687] >fff00000c6567300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.648771]                    ^
[   32.649488]  fff00000c6567380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.650524]  fff00000c6567400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.651347] ==================================================================
[   32.661507] ==================================================================
[   32.662682] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.663823] Free of addr fff00000c660c000 by task kunit_try_catch/226
[   32.665355] 
[   32.666005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.667277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.667867] Hardware name: linux,dummy-virt (DT)
[   32.668746] Call trace:
[   32.669271]  show_stack+0x20/0x38 (C)
[   32.670002]  dump_stack_lvl+0x8c/0xd0
[   32.670700]  print_report+0x118/0x5e0
[   32.671137]  kasan_report_invalid_free+0xb0/0xd8
[   32.672418]  __kasan_mempool_poison_object+0x14c/0x150
[   32.673114]  mempool_free+0x28c/0x328
[   32.673664]  mempool_double_free_helper+0x150/0x2e0
[   32.674620]  mempool_kmalloc_large_double_free+0xb8/0x110
[   32.675625]  kunit_try_run_case+0x14c/0x3d0
[   32.676172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.676926]  kthread+0x24c/0x2d0
[   32.677407]  ret_from_fork+0x10/0x20
[   32.678055] 
[   32.678438] The buggy address belongs to the physical page:
[   32.679018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   32.680642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.681727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.682764] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.683829] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.684796] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.685688] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.686626] head: 0bfffe0000000002 ffffc1ffc3198301 ffffffffffffffff 0000000000000000
[   32.688343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.689029] page dumped because: kasan: bad access detected
[   32.689591] 
[   32.689977] Memory state around the buggy address:
[   32.690544]  fff00000c660bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.691422]  fff00000c660bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.692428] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693454]                    ^
[   32.693907]  fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694732]  fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.695765] ==================================================================
[   32.705798] ==================================================================
[   32.707028] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.707863] Free of addr fff00000c65d0000 by task kunit_try_catch/228
[   32.708551] 
[   32.709027] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.709982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.710644] Hardware name: linux,dummy-virt (DT)
[   32.711804] Call trace:
[   32.712230]  show_stack+0x20/0x38 (C)
[   32.712954]  dump_stack_lvl+0x8c/0xd0
[   32.713591]  print_report+0x118/0x5e0
[   32.714310]  kasan_report_invalid_free+0xb0/0xd8
[   32.715004]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.715951]  mempool_free+0x24c/0x328
[   32.716460]  mempool_double_free_helper+0x150/0x2e0
[   32.717266]  mempool_page_alloc_double_free+0xb4/0x110
[   32.717999]  kunit_try_run_case+0x14c/0x3d0
[   32.718555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.719476]  kthread+0x24c/0x2d0
[   32.720054]  ret_from_fork+0x10/0x20
[   32.720669] 
[   32.721272] The buggy address belongs to the physical page:
[   32.721982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   32.723010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.724220] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.725154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.726042] page dumped because: kasan: bad access detected
[   32.726671] 
[   32.727038] Memory state around the buggy address:
[   32.727972]  fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.728888]  fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729753] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.730637]                    ^
[   32.731125]  fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.732141]  fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.732548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.560290] ==================================================================
[   32.561453] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.562124] Read of size 1 at addr fff00000c65d0000 by task kunit_try_catch/222
[   32.563066] 
[   32.563808] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.565518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.565949] Hardware name: linux,dummy-virt (DT)
[   32.567237] Call trace:
[   32.567759]  show_stack+0x20/0x38 (C)
[   32.568488]  dump_stack_lvl+0x8c/0xd0
[   32.569355]  print_report+0x118/0x5e0
[   32.569997]  kasan_report+0xc8/0x118
[   32.570656]  __asan_report_load1_noabort+0x20/0x30
[   32.571658]  mempool_uaf_helper+0x314/0x340
[   32.572386]  mempool_page_alloc_uaf+0xb8/0x118
[   32.573127]  kunit_try_run_case+0x14c/0x3d0
[   32.573961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.574865]  kthread+0x24c/0x2d0
[   32.575489]  ret_from_fork+0x10/0x20
[   32.576110] 
[   32.576443] The buggy address belongs to the physical page:
[   32.577288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   32.578293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.579307] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.580319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.581299] page dumped because: kasan: bad access detected
[   32.582159] 
[   32.582744] Memory state around the buggy address:
[   32.583413]  fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584725]  fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.585365] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.587074]                    ^
[   32.587977]  fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.589011]  fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.590061] ==================================================================
[   32.438414] ==================================================================
[   32.440201] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.440987] Read of size 1 at addr fff00000c65d0000 by task kunit_try_catch/218
[   32.441671] 
[   32.442211] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.444161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.444934] Hardware name: linux,dummy-virt (DT)
[   32.445504] Call trace:
[   32.445962]  show_stack+0x20/0x38 (C)
[   32.446558]  dump_stack_lvl+0x8c/0xd0
[   32.448007]  print_report+0x118/0x5e0
[   32.448504]  kasan_report+0xc8/0x118
[   32.449083]  __asan_report_load1_noabort+0x20/0x30
[   32.449905]  mempool_uaf_helper+0x314/0x340
[   32.450544]  mempool_kmalloc_large_uaf+0xbc/0x118
[   32.451209]  kunit_try_run_case+0x14c/0x3d0
[   32.452387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.453204]  kthread+0x24c/0x2d0
[   32.453734]  ret_from_fork+0x10/0x20
[   32.454514] 
[   32.455029] The buggy address belongs to the physical page:
[   32.456221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   32.457259] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.458465] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.459367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.460437] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.461777] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.462837] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.464256] head: 0bfffe0000000002 ffffc1ffc3197401 ffffffffffffffff 0000000000000000
[   32.465094] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.466029] page dumped because: kasan: bad access detected
[   32.466664] 
[   32.467162] Memory state around the buggy address:
[   32.468506]  fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.469707]  fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470647] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.471659]                    ^
[   32.472565]  fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.473721]  fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.474730] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.485870] ==================================================================
[   32.487035] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.488136] Read of size 1 at addr fff00000c63b8240 by task kunit_try_catch/220
[   32.489046] 
[   32.489431] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.490739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.491335] Hardware name: linux,dummy-virt (DT)
[   32.492797] Call trace:
[   32.493221]  show_stack+0x20/0x38 (C)
[   32.493716]  dump_stack_lvl+0x8c/0xd0
[   32.494317]  print_report+0x118/0x5e0
[   32.494944]  kasan_report+0xc8/0x118
[   32.495704]  __asan_report_load1_noabort+0x20/0x30
[   32.496740]  mempool_uaf_helper+0x314/0x340
[   32.497417]  mempool_slab_uaf+0xb8/0x110
[   32.497923]  kunit_try_run_case+0x14c/0x3d0
[   32.498618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.499302]  kthread+0x24c/0x2d0
[   32.499798]  ret_from_fork+0x10/0x20
[   32.500259] 
[   32.500514] Allocated by task 220:
[   32.500971]  kasan_save_stack+0x3c/0x68
[   32.501823]  kasan_save_track+0x20/0x40
[   32.502657]  kasan_save_alloc_info+0x40/0x58
[   32.503362]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.504239]  remove_element+0x16c/0x1f8
[   32.504702]  mempool_alloc_preallocated+0x58/0xc0
[   32.505380]  mempool_uaf_helper+0xa4/0x340
[   32.505976]  mempool_slab_uaf+0xb8/0x110
[   32.506633]  kunit_try_run_case+0x14c/0x3d0
[   32.507611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.508809]  kthread+0x24c/0x2d0
[   32.509536]  ret_from_fork+0x10/0x20
[   32.510360] 
[   32.510688] Freed by task 220:
[   32.511134]  kasan_save_stack+0x3c/0x68
[   32.512404]  kasan_save_track+0x20/0x40
[   32.512999]  kasan_save_free_info+0x4c/0x78
[   32.513510]  __kasan_mempool_poison_object+0xc0/0x150
[   32.514293]  mempool_free+0x28c/0x328
[   32.514919]  mempool_uaf_helper+0x104/0x340
[   32.515659]  mempool_slab_uaf+0xb8/0x110
[   32.516314]  kunit_try_run_case+0x14c/0x3d0
[   32.516930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.517635]  kthread+0x24c/0x2d0
[   32.518859]  ret_from_fork+0x10/0x20
[   32.519767] 
[   32.520036] The buggy address belongs to the object at fff00000c63b8240
[   32.520036]  which belongs to the cache test_cache of size 123
[   32.521455] The buggy address is located 0 bytes inside of
[   32.521455]  freed 123-byte region [fff00000c63b8240, fff00000c63b82bb)
[   32.522775] 
[   32.523080] The buggy address belongs to the physical page:
[   32.524618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b8
[   32.525563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.526545] page_type: f5(slab)
[   32.527093] raw: 0bfffe0000000000 fff00000c63a83c0 dead000000000122 0000000000000000
[   32.528446] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.529298] page dumped because: kasan: bad access detected
[   32.529948] 
[   32.530252] Memory state around the buggy address:
[   32.531068]  fff00000c63b8100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532322]  fff00000c63b8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.533831] >fff00000c63b8200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.534864]                                            ^
[   32.535981]  fff00000c63b8280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.536807]  fff00000c63b8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537603] ==================================================================
[   32.378336] ==================================================================
[   32.380178] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.381101] Read of size 1 at addr fff00000c64e4d00 by task kunit_try_catch/216
[   32.381944] 
[   32.382388] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.383981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.384315] Hardware name: linux,dummy-virt (DT)
[   32.384616] Call trace:
[   32.384824]  show_stack+0x20/0x38 (C)
[   32.385305]  dump_stack_lvl+0x8c/0xd0
[   32.385988]  print_report+0x118/0x5e0
[   32.386631]  kasan_report+0xc8/0x118
[   32.387117]  __asan_report_load1_noabort+0x20/0x30
[   32.387663]  mempool_uaf_helper+0x314/0x340
[   32.388562]  mempool_kmalloc_uaf+0xbc/0x118
[   32.389294]  kunit_try_run_case+0x14c/0x3d0
[   32.390222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.390894]  kthread+0x24c/0x2d0
[   32.391869]  ret_from_fork+0x10/0x20
[   32.393271] 
[   32.393775] Allocated by task 216:
[   32.394249]  kasan_save_stack+0x3c/0x68
[   32.395044]  kasan_save_track+0x20/0x40
[   32.396114]  kasan_save_alloc_info+0x40/0x58
[   32.396732]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.397528]  remove_element+0x130/0x1f8
[   32.398185]  mempool_alloc_preallocated+0x58/0xc0
[   32.398937]  mempool_uaf_helper+0xa4/0x340
[   32.399666]  mempool_kmalloc_uaf+0xbc/0x118
[   32.400474]  kunit_try_run_case+0x14c/0x3d0
[   32.401107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.401805]  kthread+0x24c/0x2d0
[   32.402391]  ret_from_fork+0x10/0x20
[   32.402960] 
[   32.403315] Freed by task 216:
[   32.403843]  kasan_save_stack+0x3c/0x68
[   32.404319]  kasan_save_track+0x20/0x40
[   32.405069]  kasan_save_free_info+0x4c/0x78
[   32.405691]  __kasan_mempool_poison_object+0xc0/0x150
[   32.406713]  mempool_free+0x28c/0x328
[   32.407569]  mempool_uaf_helper+0x104/0x340
[   32.408271]  mempool_kmalloc_uaf+0xbc/0x118
[   32.408831]  kunit_try_run_case+0x14c/0x3d0
[   32.409474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.410299]  kthread+0x24c/0x2d0
[   32.410822]  ret_from_fork+0x10/0x20
[   32.411783] 
[   32.412103] The buggy address belongs to the object at fff00000c64e4d00
[   32.412103]  which belongs to the cache kmalloc-128 of size 128
[   32.413398] The buggy address is located 0 bytes inside of
[   32.413398]  freed 128-byte region [fff00000c64e4d00, fff00000c64e4d80)
[   32.414725] 
[   32.415100] The buggy address belongs to the physical page:
[   32.416212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   32.417138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.417978] page_type: f5(slab)
[   32.418488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.420037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.421000] page dumped because: kasan: bad access detected
[   32.421631] 
[   32.421939] Memory state around the buggy address:
[   32.422668]  fff00000c64e4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.424026]  fff00000c64e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.424925] >fff00000c64e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.425833]                    ^
[   32.426282]  fff00000c64e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.427518]  fff00000c64e4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.428401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.268588] ==================================================================
[   32.269815] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.270808] Read of size 1 at addr fff00000c65d2001 by task kunit_try_catch/212
[   32.271902] 
[   32.272196] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.274060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.274568] Hardware name: linux,dummy-virt (DT)
[   32.275224] Call trace:
[   32.275839]  show_stack+0x20/0x38 (C)
[   32.276640]  dump_stack_lvl+0x8c/0xd0
[   32.277195]  print_report+0x118/0x5e0
[   32.277919]  kasan_report+0xc8/0x118
[   32.278476]  __asan_report_load1_noabort+0x20/0x30
[   32.279772]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.280563]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   32.281266]  kunit_try_run_case+0x14c/0x3d0
[   32.281982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.282711]  kthread+0x24c/0x2d0
[   32.283467]  ret_from_fork+0x10/0x20
[   32.284539] 
[   32.284795] The buggy address belongs to the physical page:
[   32.285680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   32.286687] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.287974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.289033] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.289853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.290854] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.292360] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.293429] head: 0bfffe0000000002 ffffc1ffc3197401 ffffffffffffffff 0000000000000000
[   32.294448] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.295802] page dumped because: kasan: bad access detected
[   32.296948] 
[   32.297440] Memory state around the buggy address:
[   32.298229]  fff00000c65d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.299785]  fff00000c65d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.300559] >fff00000c65d2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.301519]                    ^
[   32.302102]  fff00000c65d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.303124]  fff00000c65d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.304249] ==================================================================
[   32.215794] ==================================================================
[   32.217323] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.218213] Read of size 1 at addr fff00000c64e2073 by task kunit_try_catch/210
[   32.219140] 
[   32.219807] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.220732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221662] Hardware name: linux,dummy-virt (DT)
[   32.222940] Call trace:
[   32.223476]  show_stack+0x20/0x38 (C)
[   32.224230]  dump_stack_lvl+0x8c/0xd0
[   32.224996]  print_report+0x118/0x5e0
[   32.225726]  kasan_report+0xc8/0x118
[   32.226445]  __asan_report_load1_noabort+0x20/0x30
[   32.227174]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.228040]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.228691]  kunit_try_run_case+0x14c/0x3d0
[   32.229431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.230206]  kthread+0x24c/0x2d0
[   32.230776]  ret_from_fork+0x10/0x20
[   32.231386] 
[   32.231805] Allocated by task 210:
[   32.232514]  kasan_save_stack+0x3c/0x68
[   32.233107]  kasan_save_track+0x20/0x40
[   32.233642]  kasan_save_alloc_info+0x40/0x58
[   32.234341]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.234961]  remove_element+0x130/0x1f8
[   32.235630]  mempool_alloc_preallocated+0x58/0xc0
[   32.236594]  mempool_oob_right_helper+0x98/0x2f0
[   32.237174]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.238078]  kunit_try_run_case+0x14c/0x3d0
[   32.238830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.240264]  kthread+0x24c/0x2d0
[   32.240834]  ret_from_fork+0x10/0x20
[   32.241533] 
[   32.242029] The buggy address belongs to the object at fff00000c64e2000
[   32.242029]  which belongs to the cache kmalloc-128 of size 128
[   32.243083] The buggy address is located 0 bytes to the right of
[   32.243083]  allocated 115-byte region [fff00000c64e2000, fff00000c64e2073)
[   32.244993] 
[   32.245336] The buggy address belongs to the physical page:
[   32.246112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e2
[   32.247101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.248244] page_type: f5(slab)
[   32.248842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.249929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.250870] page dumped because: kasan: bad access detected
[   32.251798] 
[   32.252292] Memory state around the buggy address:
[   32.253095]  fff00000c64e1f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.254098]  fff00000c64e1f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.255136] >fff00000c64e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.256199]                                                              ^
[   32.257346]  fff00000c64e2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.258075]  fff00000c64e2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.258501] ==================================================================
[   32.316764] ==================================================================
[   32.318053] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.318838] Read of size 1 at addr fff00000c63cf2bb by task kunit_try_catch/214
[   32.319616] 
[   32.320037] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.322093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.322788] Hardware name: linux,dummy-virt (DT)
[   32.323684] Call trace:
[   32.324095]  show_stack+0x20/0x38 (C)
[   32.324671]  dump_stack_lvl+0x8c/0xd0
[   32.325246]  print_report+0x118/0x5e0
[   32.326532]  kasan_report+0xc8/0x118
[   32.327123]  __asan_report_load1_noabort+0x20/0x30
[   32.327944]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.328720]  mempool_slab_oob_right+0xb8/0x110
[   32.329542]  kunit_try_run_case+0x14c/0x3d0
[   32.330219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.331028]  kthread+0x24c/0x2d0
[   32.331615]  ret_from_fork+0x10/0x20
[   32.332828] 
[   32.333266] Allocated by task 214:
[   32.333734]  kasan_save_stack+0x3c/0x68
[   32.334477]  kasan_save_track+0x20/0x40
[   32.335146]  kasan_save_alloc_info+0x40/0x58
[   32.335707]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.336347]  remove_element+0x16c/0x1f8
[   32.337173]  mempool_alloc_preallocated+0x58/0xc0
[   32.337817]  mempool_oob_right_helper+0x98/0x2f0
[   32.338482]  mempool_slab_oob_right+0xb8/0x110
[   32.339200]  kunit_try_run_case+0x14c/0x3d0
[   32.340406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.341102]  kthread+0x24c/0x2d0
[   32.341533]  ret_from_fork+0x10/0x20
[   32.342298] 
[   32.342695] The buggy address belongs to the object at fff00000c63cf240
[   32.342695]  which belongs to the cache test_cache of size 123
[   32.344716] The buggy address is located 0 bytes to the right of
[   32.344716]  allocated 123-byte region [fff00000c63cf240, fff00000c63cf2bb)
[   32.346194] 
[   32.346547] The buggy address belongs to the physical page:
[   32.347927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cf
[   32.348921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.349711] page_type: f5(slab)
[   32.350162] raw: 0bfffe0000000000 fff00000c63a8280 dead000000000122 0000000000000000
[   32.351096] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.352110] page dumped because: kasan: bad access detected
[   32.352780] 
[   32.353196] Memory state around the buggy address:
[   32.353770]  fff00000c63cf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.354618]  fff00000c63cf200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.356186] >fff00000c63cf280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.357731]                                         ^
[   32.358427]  fff00000c63cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.359336]  fff00000c63cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.360432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   31.592028] ==================================================================
[   31.593523] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   31.594564] Read of size 1 at addr fff00000c56a0dc0 by task kunit_try_catch/204
[   31.595801] 
[   31.596424] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.597663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.598295] Hardware name: linux,dummy-virt (DT)
[   31.598972] Call trace:
[   31.599924]  show_stack+0x20/0x38 (C)
[   31.600696]  dump_stack_lvl+0x8c/0xd0
[   31.601662]  print_report+0x118/0x5e0
[   31.602387]  kasan_report+0xc8/0x118
[   31.603144]  __kasan_check_byte+0x54/0x70
[   31.604025]  kmem_cache_destroy+0x34/0x218
[   31.604826]  kmem_cache_double_destroy+0x17c/0x2f8
[   31.605656]  kunit_try_run_case+0x14c/0x3d0
[   31.606261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.607077]  kthread+0x24c/0x2d0
[   31.607746]  ret_from_fork+0x10/0x20
[   31.608357] 
[   31.608740] Allocated by task 204:
[   31.609842]  kasan_save_stack+0x3c/0x68
[   31.610452]  kasan_save_track+0x20/0x40
[   31.611024]  kasan_save_alloc_info+0x40/0x58
[   31.611538]  __kasan_slab_alloc+0xa8/0xb0
[   31.612642]  kmem_cache_alloc_noprof+0x108/0x398
[   31.613259]  __kmem_cache_create_args+0x18c/0x2b0
[   31.614037]  kmem_cache_double_destroy+0xc8/0x2f8
[   31.614701]  kunit_try_run_case+0x14c/0x3d0
[   31.615394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.616187]  kthread+0x24c/0x2d0
[   31.616691]  ret_from_fork+0x10/0x20
[   31.617218] 
[   31.617548] Freed by task 204:
[   31.618798]  kasan_save_stack+0x3c/0x68
[   31.619698]  kasan_save_track+0x20/0x40
[   31.620357]  kasan_save_free_info+0x4c/0x78
[   31.621043]  __kasan_slab_free+0x6c/0x98
[   31.621583]  kmem_cache_free+0x118/0x470
[   31.622200]  slab_kmem_cache_release+0x38/0x50
[   31.622868]  kmem_cache_release+0x1c/0x30
[   31.623794]  kobject_put+0x17c/0x430
[   31.624317]  sysfs_slab_release+0x1c/0x30
[   31.624897]  kmem_cache_destroy+0x118/0x218
[   31.625536]  kmem_cache_double_destroy+0x130/0x2f8
[   31.626564]  kunit_try_run_case+0x14c/0x3d0
[   31.627250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.627986]  kthread+0x24c/0x2d0
[   31.628523]  ret_from_fork+0x10/0x20
[   31.629150] 
[   31.629526] The buggy address belongs to the object at fff00000c56a0dc0
[   31.629526]  which belongs to the cache kmem_cache of size 208
[   31.630966] The buggy address is located 0 bytes inside of
[   31.630966]  freed 208-byte region [fff00000c56a0dc0, fff00000c56a0e90)
[   31.632753] 
[   31.633055] The buggy address belongs to the physical page:
[   31.633787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056a0
[   31.635581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.636433] page_type: f5(slab)
[   31.636924] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.637818] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.639013] page dumped because: kasan: bad access detected
[   31.640426] 
[   31.640752] Memory state around the buggy address:
[   31.641361]  fff00000c56a0c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.642197]  fff00000c56a0d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.643544] >fff00000c56a0d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.644456]                                            ^
[   31.645157]  fff00000c56a0e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.646056]  fff00000c56a0e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.646985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.472502] ==================================================================
[   31.473737] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   31.474521] Read of size 1 at addr fff00000c638b000 by task kunit_try_catch/202
[   31.475578] 
[   31.476106] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.477554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.478099] Hardware name: linux,dummy-virt (DT)
[   31.478820] Call trace:
[   31.479455]  show_stack+0x20/0x38 (C)
[   31.480182]  dump_stack_lvl+0x8c/0xd0
[   31.480775]  print_report+0x118/0x5e0
[   31.481472]  kasan_report+0xc8/0x118
[   31.482135]  __asan_report_load1_noabort+0x20/0x30
[   31.482918]  kmem_cache_rcu_uaf+0x390/0x468
[   31.483715]  kunit_try_run_case+0x14c/0x3d0
[   31.484537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.485550]  kthread+0x24c/0x2d0
[   31.486187]  ret_from_fork+0x10/0x20
[   31.486928] 
[   31.487449] Allocated by task 202:
[   31.488085]  kasan_save_stack+0x3c/0x68
[   31.488655]  kasan_save_track+0x20/0x40
[   31.489305]  kasan_save_alloc_info+0x40/0x58
[   31.489859]  __kasan_slab_alloc+0xa8/0xb0
[   31.490575]  kmem_cache_alloc_noprof+0x108/0x398
[   31.491452]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.492023]  kunit_try_run_case+0x14c/0x3d0
[   31.492619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.493600]  kthread+0x24c/0x2d0
[   31.494217]  ret_from_fork+0x10/0x20
[   31.494776] 
[   31.495162] Freed by task 0:
[   31.495770]  kasan_save_stack+0x3c/0x68
[   31.496616]  kasan_save_track+0x20/0x40
[   31.497131]  kasan_save_free_info+0x4c/0x78
[   31.497713]  __kasan_slab_free+0x6c/0x98
[   31.498192]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.498950]  rcu_core+0x9f4/0x1e20
[   31.499745]  rcu_core_si+0x18/0x30
[   31.500631]  handle_softirqs+0x374/0xb20
[   31.501383]  __do_softirq+0x1c/0x28
[   31.502094] 
[   31.502558] Last potentially related work creation:
[   31.503347]  kasan_save_stack+0x3c/0x68
[   31.503944]  kasan_record_aux_stack+0xb4/0xc8
[   31.504701]  kmem_cache_free+0x28c/0x470
[   31.505283]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.506142]  kunit_try_run_case+0x14c/0x3d0
[   31.506830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.507668]  kthread+0x24c/0x2d0
[   31.508262]  ret_from_fork+0x10/0x20
[   31.508949] 
[   31.509319] The buggy address belongs to the object at fff00000c638b000
[   31.509319]  which belongs to the cache test_cache of size 200
[   31.510811] The buggy address is located 0 bytes inside of
[   31.510811]  freed 200-byte region [fff00000c638b000, fff00000c638b0c8)
[   31.513180] 
[   31.513658] The buggy address belongs to the physical page:
[   31.514592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b
[   31.515802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.516941] page_type: f5(slab)
[   31.517476] raw: 0bfffe0000000000 fff00000c56a0c80 dead000000000122 0000000000000000
[   31.518496] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.519584] page dumped because: kasan: bad access detected
[   31.520495] 
[   31.520994] Memory state around the buggy address:
[   31.521712]  fff00000c638af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.522760]  fff00000c638af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.524050] >fff00000c638b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.525413]                    ^
[   31.525666]  fff00000c638b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.526598]  fff00000c638b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.527735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.339085] ==================================================================
[   31.341487] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   31.342174] Free of addr fff00000c63bc001 by task kunit_try_catch/200
[   31.343120] 
[   31.344348] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.345205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.346388] Hardware name: linux,dummy-virt (DT)
[   31.347675] Call trace:
[   31.348418]  show_stack+0x20/0x38 (C)
[   31.348733]  dump_stack_lvl+0x8c/0xd0
[   31.349129]  print_report+0x118/0x5e0
[   31.349672]  kasan_report_invalid_free+0xb0/0xd8
[   31.350533]  check_slab_allocation+0xfc/0x108
[   31.351212]  __kasan_slab_pre_free+0x2c/0x48
[   31.352102]  kmem_cache_free+0xf0/0x470
[   31.352971]  kmem_cache_invalid_free+0x184/0x3b8
[   31.353754]  kunit_try_run_case+0x14c/0x3d0
[   31.354491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.355442]  kthread+0x24c/0x2d0
[   31.356412]  ret_from_fork+0x10/0x20
[   31.356945] 
[   31.357338] Allocated by task 200:
[   31.357817]  kasan_save_stack+0x3c/0x68
[   31.358390]  kasan_save_track+0x20/0x40
[   31.359053]  kasan_save_alloc_info+0x40/0x58
[   31.359974]  __kasan_slab_alloc+0xa8/0xb0
[   31.360562]  kmem_cache_alloc_noprof+0x108/0x398
[   31.361246]  kmem_cache_invalid_free+0x12c/0x3b8
[   31.361858]  kunit_try_run_case+0x14c/0x3d0
[   31.362445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.363219]  kthread+0x24c/0x2d0
[   31.363726]  ret_from_fork+0x10/0x20
[   31.364272] 
[   31.364562] The buggy address belongs to the object at fff00000c63bc000
[   31.364562]  which belongs to the cache test_cache of size 200
[   31.366551] The buggy address is located 1 bytes inside of
[   31.366551]  200-byte region [fff00000c63bc000, fff00000c63bc0c8)
[   31.368128] 
[   31.368624] The buggy address belongs to the physical page:
[   31.369528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   31.370438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.371489] page_type: f5(slab)
[   31.372379] raw: 0bfffe0000000000 fff00000c56a0b40 dead000000000122 0000000000000000
[   31.373161] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.374072] page dumped because: kasan: bad access detected
[   31.374782] 
[   31.375140] Memory state around the buggy address:
[   31.376077]  fff00000c63bbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.377018]  fff00000c63bbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.378014] >fff00000c63bc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.378933]                    ^
[   31.379367]  fff00000c63bc080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.380840]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.381698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.270965] ==================================================================
[   31.271697] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.273346] Free of addr fff00000c6530000 by task kunit_try_catch/198
[   31.274121] 
[   31.274483] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.275610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.276406] Hardware name: linux,dummy-virt (DT)
[   31.277330] Call trace:
[   31.277917]  show_stack+0x20/0x38 (C)
[   31.278668]  dump_stack_lvl+0x8c/0xd0
[   31.279579]  print_report+0x118/0x5e0
[   31.280183]  kasan_report_invalid_free+0xb0/0xd8
[   31.280809]  check_slab_allocation+0xd4/0x108
[   31.281360]  __kasan_slab_pre_free+0x2c/0x48
[   31.282076]  kmem_cache_free+0xf0/0x470
[   31.282670]  kmem_cache_double_free+0x190/0x3c8
[   31.283735]  kunit_try_run_case+0x14c/0x3d0
[   31.284384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.285209]  kthread+0x24c/0x2d0
[   31.285757]  ret_from_fork+0x10/0x20
[   31.286252] 
[   31.286632] Allocated by task 198:
[   31.287968]  kasan_save_stack+0x3c/0x68
[   31.288520]  kasan_save_track+0x20/0x40
[   31.289113]  kasan_save_alloc_info+0x40/0x58
[   31.289778]  __kasan_slab_alloc+0xa8/0xb0
[   31.290392]  kmem_cache_alloc_noprof+0x108/0x398
[   31.291044]  kmem_cache_double_free+0x12c/0x3c8
[   31.291632]  kunit_try_run_case+0x14c/0x3d0
[   31.292538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.293253]  kthread+0x24c/0x2d0
[   31.293769]  ret_from_fork+0x10/0x20
[   31.294465] 
[   31.294831] Freed by task 198:
[   31.295651]  kasan_save_stack+0x3c/0x68
[   31.296158]  kasan_save_track+0x20/0x40
[   31.296809]  kasan_save_free_info+0x4c/0x78
[   31.297381]  __kasan_slab_free+0x6c/0x98
[   31.298001]  kmem_cache_free+0x118/0x470
[   31.298591]  kmem_cache_double_free+0x140/0x3c8
[   31.299134]  kunit_try_run_case+0x14c/0x3d0
[   31.300089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.300752]  kthread+0x24c/0x2d0
[   31.301380]  ret_from_fork+0x10/0x20
[   31.302011] 
[   31.302392] The buggy address belongs to the object at fff00000c6530000
[   31.302392]  which belongs to the cache test_cache of size 200
[   31.304384] The buggy address is located 0 bytes inside of
[   31.304384]  200-byte region [fff00000c6530000, fff00000c65300c8)
[   31.305849] 
[   31.306325] The buggy address belongs to the physical page:
[   31.307328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   31.308560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.309553] page_type: f5(slab)
[   31.310034] raw: 0bfffe0000000000 fff00000c1608a00 dead000000000122 0000000000000000
[   31.311194] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.312434] page dumped because: kasan: bad access detected
[   31.313301] 
[   31.313644] Memory state around the buggy address:
[   31.314348]  fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.315420]  fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.316574] >fff00000c6530000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.317384]                    ^
[   31.317793]  fff00000c6530080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.318834]  fff00000c6530100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.320090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.190945] ==================================================================
[   31.192547] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   31.193810] Read of size 1 at addr fff00000c65650c8 by task kunit_try_catch/196
[   31.194981] 
[   31.195385] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.196677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.197343] Hardware name: linux,dummy-virt (DT)
[   31.198004] Call trace:
[   31.198395]  show_stack+0x20/0x38 (C)
[   31.198965]  dump_stack_lvl+0x8c/0xd0
[   31.199504]  print_report+0x118/0x5e0
[   31.200371]  kasan_report+0xc8/0x118
[   31.200912]  __asan_report_load1_noabort+0x20/0x30
[   31.201656]  kmem_cache_oob+0x33c/0x428
[   31.202327]  kunit_try_run_case+0x14c/0x3d0
[   31.202957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.203941]  kthread+0x24c/0x2d0
[   31.204449]  ret_from_fork+0x10/0x20
[   31.205109] 
[   31.205528] Allocated by task 196:
[   31.206056]  kasan_save_stack+0x3c/0x68
[   31.206805]  kasan_save_track+0x20/0x40
[   31.207730]  kasan_save_alloc_info+0x40/0x58
[   31.208211]  __kasan_slab_alloc+0xa8/0xb0
[   31.208749]  kmem_cache_alloc_noprof+0x108/0x398
[   31.209409]  kmem_cache_oob+0x12c/0x428
[   31.210424]  kunit_try_run_case+0x14c/0x3d0
[   31.211409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.212122]  kthread+0x24c/0x2d0
[   31.212690]  ret_from_fork+0x10/0x20
[   31.213355] 
[   31.213712] The buggy address belongs to the object at fff00000c6565000
[   31.213712]  which belongs to the cache test_cache of size 200
[   31.215160] The buggy address is located 0 bytes to the right of
[   31.215160]  allocated 200-byte region [fff00000c6565000, fff00000c65650c8)
[   31.216765] 
[   31.217193] The buggy address belongs to the physical page:
[   31.217949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106565
[   31.218862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.219986] page_type: f5(slab)
[   31.220515] raw: 0bfffe0000000000 fff00000c16088c0 dead000000000122 0000000000000000
[   31.221507] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.222527] page dumped because: kasan: bad access detected
[   31.223187] 
[   31.223939] Memory state around the buggy address:
[   31.224572]  fff00000c6564f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.225441]  fff00000c6565000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.226547] >fff00000c6565080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.227445]                                               ^
[   31.228054]  fff00000c6565100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.229151]  fff00000c6565180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.230030] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.109007] ==================================================================
[   31.109932] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.111114] Read of size 8 at addr fff00000c655f1c0 by task kunit_try_catch/189
[   31.111980] 
[   31.112330] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.114319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.115241] Hardware name: linux,dummy-virt (DT)
[   31.116294] Call trace:
[   31.116606]  show_stack+0x20/0x38 (C)
[   31.117507]  dump_stack_lvl+0x8c/0xd0
[   31.118197]  print_report+0x118/0x5e0
[   31.118844]  kasan_report+0xc8/0x118
[   31.119562]  __asan_report_load8_noabort+0x20/0x30
[   31.120477]  workqueue_uaf+0x480/0x4a8
[   31.121209]  kunit_try_run_case+0x14c/0x3d0
[   31.122063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.122816]  kthread+0x24c/0x2d0
[   31.124102]  ret_from_fork+0x10/0x20
[   31.124641] 
[   31.124981] Allocated by task 189:
[   31.125525]  kasan_save_stack+0x3c/0x68
[   31.126181]  kasan_save_track+0x20/0x40
[   31.126772]  kasan_save_alloc_info+0x40/0x58
[   31.127592]  __kasan_kmalloc+0xd4/0xd8
[   31.128302]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.128847]  workqueue_uaf+0x13c/0x4a8
[   31.129359]  kunit_try_run_case+0x14c/0x3d0
[   31.130064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.130671]  kthread+0x24c/0x2d0
[   31.131330]  ret_from_fork+0x10/0x20
[   31.132097] 
[   31.132475] Freed by task 31:
[   31.132995]  kasan_save_stack+0x3c/0x68
[   31.133694]  kasan_save_track+0x20/0x40
[   31.134342]  kasan_save_free_info+0x4c/0x78
[   31.134938]  __kasan_slab_free+0x6c/0x98
[   31.135892]  kfree+0x114/0x3c8
[   31.136335]  workqueue_uaf_work+0x18/0x30
[   31.137028]  process_one_work+0x530/0xf98
[   31.137621]  worker_thread+0x614/0xf28
[   31.138383]  kthread+0x24c/0x2d0
[   31.138855]  ret_from_fork+0x10/0x20
[   31.139862] 
[   31.140232] Last potentially related work creation:
[   31.140823]  kasan_save_stack+0x3c/0x68
[   31.141450]  kasan_record_aux_stack+0xb4/0xc8
[   31.142111]  __queue_work+0x65c/0xfd8
[   31.142636]  queue_work_on+0xbc/0xf8
[   31.143490]  workqueue_uaf+0x210/0x4a8
[   31.144036]  kunit_try_run_case+0x14c/0x3d0
[   31.144637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.145419]  kthread+0x24c/0x2d0
[   31.146031]  ret_from_fork+0x10/0x20
[   31.146603] 
[   31.146933] The buggy address belongs to the object at fff00000c655f1c0
[   31.146933]  which belongs to the cache kmalloc-32 of size 32
[   31.149128] The buggy address is located 0 bytes inside of
[   31.149128]  freed 32-byte region [fff00000c655f1c0, fff00000c655f1e0)
[   31.150613] 
[   31.150925] The buggy address belongs to the physical page:
[   31.151893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655f
[   31.152822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.153735] page_type: f5(slab)
[   31.154216] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.155131] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.156255] page dumped because: kasan: bad access detected
[   31.157112] 
[   31.157485] Memory state around the buggy address:
[   31.158226]  fff00000c655f080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.159457]  fff00000c655f100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.160370] >fff00000c655f180: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   31.161280]                                            ^
[   31.162003]  fff00000c655f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.162828]  fff00000c655f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.163947] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.027778] ==================================================================
[   31.028927] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.029504] Read of size 4 at addr fff00000c63c1600 by task swapper/0/0
[   31.030921] 
[   31.031258] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   31.032793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.033566] Hardware name: linux,dummy-virt (DT)
[   31.034145] Call trace:
[   31.034696]  show_stack+0x20/0x38 (C)
[   31.035236]  dump_stack_lvl+0x8c/0xd0
[   31.035901]  print_report+0x118/0x5e0
[   31.036434]  kasan_report+0xc8/0x118
[   31.037263]  __asan_report_load4_noabort+0x20/0x30
[   31.037895]  rcu_uaf_reclaim+0x64/0x70
[   31.038546]  rcu_core+0x9f4/0x1e20
[   31.039253]  rcu_core_si+0x18/0x30
[   31.039793]  handle_softirqs+0x374/0xb20
[   31.040430]  __do_softirq+0x1c/0x28
[   31.040998]  ____do_softirq+0x18/0x30
[   31.041598]  call_on_irq_stack+0x24/0x58
[   31.042332]  do_softirq_own_stack+0x24/0x38
[   31.042955]  __irq_exit_rcu+0x1fc/0x318
[   31.043765]  irq_exit_rcu+0x1c/0x80
[   31.044721]  el1_interrupt+0x38/0x58
[   31.045339]  el1h_64_irq_handler+0x18/0x28
[   31.045975]  el1h_64_irq+0x6c/0x70
[   31.046690]  arch_local_irq_enable+0x4/0x8 (P)
[   31.047827]  default_idle_call+0x6c/0x78 (L)
[   31.048586]  do_idle+0x384/0x4e8
[   31.049067]  cpu_startup_entry+0x64/0x80
[   31.049746]  rest_init+0x160/0x188
[   31.050400]  start_kernel+0x308/0x3d0
[   31.050952]  __primary_switched+0x8c/0xa0
[   31.051923] 
[   31.052268] Allocated by task 187:
[   31.053333]  kasan_save_stack+0x3c/0x68
[   31.053952]  kasan_save_track+0x20/0x40
[   31.054717]  kasan_save_alloc_info+0x40/0x58
[   31.055813]  __kasan_kmalloc+0xd4/0xd8
[   31.057072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.058115]  rcu_uaf+0xb0/0x2d0
[   31.058894]  kunit_try_run_case+0x14c/0x3d0
[   31.060020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.060663]  kthread+0x24c/0x2d0
[   31.061146]  ret_from_fork+0x10/0x20
[   31.061672] 
[   31.062026] Freed by task 0:
[   31.062540]  kasan_save_stack+0x3c/0x68
[   31.063060]  kasan_save_track+0x20/0x40
[   31.063718]  kasan_save_free_info+0x4c/0x78
[   31.064795]  __kasan_slab_free+0x6c/0x98
[   31.065553]  kfree+0x114/0x3c8
[   31.066012]  rcu_uaf_reclaim+0x28/0x70
[   31.066751]  rcu_core+0x9f4/0x1e20
[   31.067222]  rcu_core_si+0x18/0x30
[   31.067837]  handle_softirqs+0x374/0xb20
[   31.068453]  __do_softirq+0x1c/0x28
[   31.069349] 
[   31.069709] Last potentially related work creation:
[   31.070343]  kasan_save_stack+0x3c/0x68
[   31.070956]  kasan_record_aux_stack+0xb4/0xc8
[   31.072080]  __call_rcu_common.constprop.0+0x74/0xa10
[   31.073102]  call_rcu+0x18/0x30
[   31.073547]  rcu_uaf+0x14c/0x2d0
[   31.074097]  kunit_try_run_case+0x14c/0x3d0
[   31.074699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.075783]  kthread+0x24c/0x2d0
[   31.076290]  ret_from_fork+0x10/0x20
[   31.076848] 
[   31.077181] The buggy address belongs to the object at fff00000c63c1600
[   31.077181]  which belongs to the cache kmalloc-32 of size 32
[   31.078608] The buggy address is located 0 bytes inside of
[   31.078608]  freed 32-byte region [fff00000c63c1600, fff00000c63c1620)
[   31.080399] 
[   31.080742] The buggy address belongs to the physical page:
[   31.081573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c1
[   31.082570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.083352] page_type: f5(slab)
[   31.084355] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.085340] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.086240] page dumped because: kasan: bad access detected
[   31.086867] 
[   31.087245] Memory state around the buggy address:
[   31.087913]  fff00000c63c1500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.088660]  fff00000c63c1580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.090203] >fff00000c63c1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.091287]                    ^
[   31.092250]  fff00000c63c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.093309]  fff00000c63c1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.094352] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.958180] ==================================================================
[   30.959117] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   30.960289] Read of size 1 at addr fff00000c653d178 by task kunit_try_catch/185
[   30.961210] 
[   30.961554] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.962836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.963630] Hardware name: linux,dummy-virt (DT)
[   30.964382] Call trace:
[   30.964851]  show_stack+0x20/0x38 (C)
[   30.965612]  dump_stack_lvl+0x8c/0xd0
[   30.966257]  print_report+0x118/0x5e0
[   30.966894]  kasan_report+0xc8/0x118
[   30.967532]  __asan_report_load1_noabort+0x20/0x30
[   30.968277]  ksize_uaf+0x548/0x600
[   30.968895]  kunit_try_run_case+0x14c/0x3d0
[   30.969570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.970402]  kthread+0x24c/0x2d0
[   30.970936]  ret_from_fork+0x10/0x20
[   30.971392] 
[   30.971816] Allocated by task 185:
[   30.972416]  kasan_save_stack+0x3c/0x68
[   30.973144]  kasan_save_track+0x20/0x40
[   30.973776]  kasan_save_alloc_info+0x40/0x58
[   30.974496]  __kasan_kmalloc+0xd4/0xd8
[   30.975143]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.975965]  ksize_uaf+0xb8/0x600
[   30.976528]  kunit_try_run_case+0x14c/0x3d0
[   30.977327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.978080]  kthread+0x24c/0x2d0
[   30.978638]  ret_from_fork+0x10/0x20
[   30.979273] 
[   30.979604] Freed by task 185:
[   30.980255]  kasan_save_stack+0x3c/0x68
[   30.980960]  kasan_save_track+0x20/0x40
[   30.981696]  kasan_save_free_info+0x4c/0x78
[   30.982392]  __kasan_slab_free+0x6c/0x98
[   30.983079]  kfree+0x114/0x3c8
[   30.983585]  ksize_uaf+0x11c/0x600
[   30.984254]  kunit_try_run_case+0x14c/0x3d0
[   30.984934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.985726]  kthread+0x24c/0x2d0
[   30.986280]  ret_from_fork+0x10/0x20
[   30.986934] 
[   30.987376] The buggy address belongs to the object at fff00000c653d100
[   30.987376]  which belongs to the cache kmalloc-128 of size 128
[   30.988893] The buggy address is located 120 bytes inside of
[   30.988893]  freed 128-byte region [fff00000c653d100, fff00000c653d180)
[   30.990346] 
[   30.990811] The buggy address belongs to the physical page:
[   30.991533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.992586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.993467] page_type: f5(slab)
[   30.994032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.995076] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.996042] page dumped because: kasan: bad access detected
[   30.996789] 
[   30.997151] Memory state around the buggy address:
[   30.997892]  fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.998902]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.999898] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.000747]                                                                 ^
[   31.001669]  fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.002720]  fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.003665] ==================================================================
[   30.858031] ==================================================================
[   30.859346] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   30.860174] Read of size 1 at addr fff00000c653d100 by task kunit_try_catch/185
[   30.861182] 
[   30.862422] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.863935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.864489] Hardware name: linux,dummy-virt (DT)
[   30.865049] Call trace:
[   30.865782]  show_stack+0x20/0x38 (C)
[   30.866500]  dump_stack_lvl+0x8c/0xd0
[   30.867098]  print_report+0x118/0x5e0
[   30.867656]  kasan_report+0xc8/0x118
[   30.868200]  __kasan_check_byte+0x54/0x70
[   30.869441]  ksize+0x30/0x88
[   30.869899]  ksize_uaf+0x168/0x600
[   30.870503]  kunit_try_run_case+0x14c/0x3d0
[   30.871478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.872526]  kthread+0x24c/0x2d0
[   30.872948]  ret_from_fork+0x10/0x20
[   30.873548] 
[   30.874023] Allocated by task 185:
[   30.874604]  kasan_save_stack+0x3c/0x68
[   30.875120]  kasan_save_track+0x20/0x40
[   30.875843]  kasan_save_alloc_info+0x40/0x58
[   30.876856]  __kasan_kmalloc+0xd4/0xd8
[   30.877918]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.878630]  ksize_uaf+0xb8/0x600
[   30.879255]  kunit_try_run_case+0x14c/0x3d0
[   30.879924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.880681]  kthread+0x24c/0x2d0
[   30.881369]  ret_from_fork+0x10/0x20
[   30.881987] 
[   30.882463] Freed by task 185:
[   30.883123]  kasan_save_stack+0x3c/0x68
[   30.884168]  kasan_save_track+0x20/0x40
[   30.884668]  kasan_save_free_info+0x4c/0x78
[   30.885179]  __kasan_slab_free+0x6c/0x98
[   30.886109]  kfree+0x114/0x3c8
[   30.886714]  ksize_uaf+0x11c/0x600
[   30.887147]  kunit_try_run_case+0x14c/0x3d0
[   30.888085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.889401]  kthread+0x24c/0x2d0
[   30.889862]  ret_from_fork+0x10/0x20
[   30.890483] 
[   30.890840] The buggy address belongs to the object at fff00000c653d100
[   30.890840]  which belongs to the cache kmalloc-128 of size 128
[   30.893273] The buggy address is located 0 bytes inside of
[   30.893273]  freed 128-byte region [fff00000c653d100, fff00000c653d180)
[   30.894919] 
[   30.895286] The buggy address belongs to the physical page:
[   30.896310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.897391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.898422] page_type: f5(slab)
[   30.899108] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.900650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.901682] page dumped because: kasan: bad access detected
[   30.902425] 
[   30.902707] Memory state around the buggy address:
[   30.903350]  fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.904281]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.905409] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.906345]                    ^
[   30.906865]  fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.908834]  fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.909640] ==================================================================
[   30.911310] ==================================================================
[   30.912411] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   30.914440] Read of size 1 at addr fff00000c653d100 by task kunit_try_catch/185
[   30.915340] 
[   30.915658] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.917053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.917641] Hardware name: linux,dummy-virt (DT)
[   30.918838] Call trace:
[   30.919674]  show_stack+0x20/0x38 (C)
[   30.920157]  dump_stack_lvl+0x8c/0xd0
[   30.920758]  print_report+0x118/0x5e0
[   30.921441]  kasan_report+0xc8/0x118
[   30.922036]  __asan_report_load1_noabort+0x20/0x30
[   30.922685]  ksize_uaf+0x59c/0x600
[   30.923303]  kunit_try_run_case+0x14c/0x3d0
[   30.924171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.925336]  kthread+0x24c/0x2d0
[   30.926068]  ret_from_fork+0x10/0x20
[   30.926922] 
[   30.927239] Allocated by task 185:
[   30.927699]  kasan_save_stack+0x3c/0x68
[   30.928336]  kasan_save_track+0x20/0x40
[   30.928941]  kasan_save_alloc_info+0x40/0x58
[   30.929558]  __kasan_kmalloc+0xd4/0xd8
[   30.930069]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.930745]  ksize_uaf+0xb8/0x600
[   30.931286]  kunit_try_run_case+0x14c/0x3d0
[   30.932054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.932660]  kthread+0x24c/0x2d0
[   30.933304]  ret_from_fork+0x10/0x20
[   30.933909] 
[   30.934316] Freed by task 185:
[   30.934774]  kasan_save_stack+0x3c/0x68
[   30.935421]  kasan_save_track+0x20/0x40
[   30.935985]  kasan_save_free_info+0x4c/0x78
[   30.936570]  __kasan_slab_free+0x6c/0x98
[   30.937235]  kfree+0x114/0x3c8
[   30.937720]  ksize_uaf+0x11c/0x600
[   30.938319]  kunit_try_run_case+0x14c/0x3d0
[   30.938957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.939611]  kthread+0x24c/0x2d0
[   30.940251]  ret_from_fork+0x10/0x20
[   30.940781] 
[   30.941098] The buggy address belongs to the object at fff00000c653d100
[   30.941098]  which belongs to the cache kmalloc-128 of size 128
[   30.942466] The buggy address is located 0 bytes inside of
[   30.942466]  freed 128-byte region [fff00000c653d100, fff00000c653d180)
[   30.943909] 
[   30.944199] The buggy address belongs to the physical page:
[   30.944839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.945850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.946786] page_type: f5(slab)
[   30.947251] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.948119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.949159] page dumped because: kasan: bad access detected
[   30.949805] 
[   30.950142] Memory state around the buggy address:
[   30.950746]  fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.951628]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.952419] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.953344]                    ^
[   30.953904]  fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.954672]  fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.955606] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.721333] ==================================================================
[   30.722667] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   30.723520] Read of size 1 at addr fff00000c653d073 by task kunit_try_catch/183
[   30.724725] 
[   30.725129] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.726447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.727320] Hardware name: linux,dummy-virt (DT)
[   30.728407] Call trace:
[   30.728819]  show_stack+0x20/0x38 (C)
[   30.729509]  dump_stack_lvl+0x8c/0xd0
[   30.730133]  print_report+0x118/0x5e0
[   30.730807]  kasan_report+0xc8/0x118
[   30.731741]  __asan_report_load1_noabort+0x20/0x30
[   30.732945]  ksize_unpoisons_memory+0x638/0x750
[   30.733803]  kunit_try_run_case+0x14c/0x3d0
[   30.734468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.735682]  kthread+0x24c/0x2d0
[   30.736419]  ret_from_fork+0x10/0x20
[   30.737082] 
[   30.737405] Allocated by task 183:
[   30.738058]  kasan_save_stack+0x3c/0x68
[   30.738694]  kasan_save_track+0x20/0x40
[   30.739456]  kasan_save_alloc_info+0x40/0x58
[   30.740215]  __kasan_kmalloc+0xd4/0xd8
[   30.740789]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.741368]  ksize_unpoisons_memory+0xc0/0x750
[   30.741855]  kunit_try_run_case+0x14c/0x3d0
[   30.742585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.743315]  kthread+0x24c/0x2d0
[   30.744079]  ret_from_fork+0x10/0x20
[   30.745042] 
[   30.745320] The buggy address belongs to the object at fff00000c653d000
[   30.745320]  which belongs to the cache kmalloc-128 of size 128
[   30.746584] The buggy address is located 0 bytes to the right of
[   30.746584]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.748179] 
[   30.748589] The buggy address belongs to the physical page:
[   30.749157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.750928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.751867] page_type: f5(slab)
[   30.752384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.753275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.754427] page dumped because: kasan: bad access detected
[   30.755480] 
[   30.756101] Memory state around the buggy address:
[   30.756591]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.757453]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.758475] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.759287]                                                              ^
[   30.760329]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.760744]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.761683] ==================================================================
[   30.764250] ==================================================================
[   30.765177] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   30.765836] Read of size 1 at addr fff00000c653d078 by task kunit_try_catch/183
[   30.767668] 
[   30.767967] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.769233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.769746] Hardware name: linux,dummy-virt (DT)
[   30.770349] Call trace:
[   30.770960]  show_stack+0x20/0x38 (C)
[   30.771751]  dump_stack_lvl+0x8c/0xd0
[   30.772559]  print_report+0x118/0x5e0
[   30.773212]  kasan_report+0xc8/0x118
[   30.773804]  __asan_report_load1_noabort+0x20/0x30
[   30.774628]  ksize_unpoisons_memory+0x628/0x750
[   30.775748]  kunit_try_run_case+0x14c/0x3d0
[   30.776502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.777217]  kthread+0x24c/0x2d0
[   30.777724]  ret_from_fork+0x10/0x20
[   30.778384] 
[   30.778747] Allocated by task 183:
[   30.779314]  kasan_save_stack+0x3c/0x68
[   30.780466]  kasan_save_track+0x20/0x40
[   30.781296]  kasan_save_alloc_info+0x40/0x58
[   30.781934]  __kasan_kmalloc+0xd4/0xd8
[   30.782628]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.783193]  ksize_unpoisons_memory+0xc0/0x750
[   30.784182]  kunit_try_run_case+0x14c/0x3d0
[   30.784699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.785473]  kthread+0x24c/0x2d0
[   30.786072]  ret_from_fork+0x10/0x20
[   30.786625] 
[   30.786923] The buggy address belongs to the object at fff00000c653d000
[   30.786923]  which belongs to the cache kmalloc-128 of size 128
[   30.788983] The buggy address is located 5 bytes to the right of
[   30.788983]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.790468] 
[   30.790772] The buggy address belongs to the physical page:
[   30.792289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.792774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.793193] page_type: f5(slab)
[   30.793443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.794104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.795607] page dumped because: kasan: bad access detected
[   30.797033] 
[   30.797701] Memory state around the buggy address:
[   30.798553]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.800190]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.800807] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.801890]                                                                 ^
[   30.802941]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.804104]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.805260] ==================================================================
[   30.806635] ==================================================================
[   30.807595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   30.808710] Read of size 1 at addr fff00000c653d07f by task kunit_try_catch/183
[   30.809623] 
[   30.810138] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.812091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.812800] Hardware name: linux,dummy-virt (DT)
[   30.813631] Call trace:
[   30.814060]  show_stack+0x20/0x38 (C)
[   30.814769]  dump_stack_lvl+0x8c/0xd0
[   30.815758]  print_report+0x118/0x5e0
[   30.816620]  kasan_report+0xc8/0x118
[   30.817425]  __asan_report_load1_noabort+0x20/0x30
[   30.818022]  ksize_unpoisons_memory+0x6a0/0x750
[   30.818708]  kunit_try_run_case+0x14c/0x3d0
[   30.819598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.820356]  kthread+0x24c/0x2d0
[   30.820938]  ret_from_fork+0x10/0x20
[   30.821541] 
[   30.821824] Allocated by task 183:
[   30.822562]  kasan_save_stack+0x3c/0x68
[   30.823085]  kasan_save_track+0x20/0x40
[   30.824376]  kasan_save_alloc_info+0x40/0x58
[   30.825017]  __kasan_kmalloc+0xd4/0xd8
[   30.825656]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.826169]  ksize_unpoisons_memory+0xc0/0x750
[   30.826845]  kunit_try_run_case+0x14c/0x3d0
[   30.827479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.828574]  kthread+0x24c/0x2d0
[   30.829074]  ret_from_fork+0x10/0x20
[   30.829685] 
[   30.830060] The buggy address belongs to the object at fff00000c653d000
[   30.830060]  which belongs to the cache kmalloc-128 of size 128
[   30.832232] The buggy address is located 12 bytes to the right of
[   30.832232]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.833647] 
[   30.833973] The buggy address belongs to the physical page:
[   30.834825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.836145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.837011] page_type: f5(slab)
[   30.837557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.838725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.839749] page dumped because: kasan: bad access detected
[   30.840850] 
[   30.841224] Memory state around the buggy address:
[   30.841806]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.842701]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.843666] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.844588]                                                                 ^
[   30.845729]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.846615]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.662329] ==================================================================
[   30.663212] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.664597] Free of addr fff00000c61b4340 by task kunit_try_catch/181
[   30.665476] 
[   30.665936] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.667104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.667638] Hardware name: linux,dummy-virt (DT)
[   30.670550] Call trace:
[   30.670975]  show_stack+0x20/0x38 (C)
[   30.671892]  dump_stack_lvl+0x8c/0xd0
[   30.672473]  print_report+0x118/0x5e0
[   30.673063]  kasan_report_invalid_free+0xb0/0xd8
[   30.673708]  check_slab_allocation+0xd4/0x108
[   30.674431]  __kasan_slab_pre_free+0x2c/0x48
[   30.675055]  kfree+0xe8/0x3c8
[   30.675780]  kfree_sensitive+0x3c/0xb0
[   30.676352]  kmalloc_double_kzfree+0x168/0x308
[   30.676973]  kunit_try_run_case+0x14c/0x3d0
[   30.677672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.678486]  kthread+0x24c/0x2d0
[   30.678961]  ret_from_fork+0x10/0x20
[   30.679836] 
[   30.680361] Allocated by task 181:
[   30.680754]  kasan_save_stack+0x3c/0x68
[   30.681321]  kasan_save_track+0x20/0x40
[   30.681839]  kasan_save_alloc_info+0x40/0x58
[   30.682607]  __kasan_kmalloc+0xd4/0xd8
[   30.683119]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.684282]  kmalloc_double_kzfree+0xb8/0x308
[   30.684598]  kunit_try_run_case+0x14c/0x3d0
[   30.684927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.685681]  kthread+0x24c/0x2d0
[   30.686437]  ret_from_fork+0x10/0x20
[   30.686982] 
[   30.687644] Freed by task 181:
[   30.688281]  kasan_save_stack+0x3c/0x68
[   30.688992]  kasan_save_track+0x20/0x40
[   30.689724]  kasan_save_free_info+0x4c/0x78
[   30.690501]  __kasan_slab_free+0x6c/0x98
[   30.691512]  kfree+0x114/0x3c8
[   30.692002]  kfree_sensitive+0x80/0xb0
[   30.692703]  kmalloc_double_kzfree+0x11c/0x308
[   30.693436]  kunit_try_run_case+0x14c/0x3d0
[   30.693971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.694771]  kthread+0x24c/0x2d0
[   30.695605]  ret_from_fork+0x10/0x20
[   30.696196] 
[   30.696533] The buggy address belongs to the object at fff00000c61b4340
[   30.696533]  which belongs to the cache kmalloc-16 of size 16
[   30.697951] The buggy address is located 0 bytes inside of
[   30.697951]  16-byte region [fff00000c61b4340, fff00000c61b4350)
[   30.699515] 
[   30.699920] The buggy address belongs to the physical page:
[   30.700633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   30.701603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.702387] page_type: f5(slab)
[   30.702841] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.704310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.705198] page dumped because: kasan: bad access detected
[   30.705811] 
[   30.706527] Memory state around the buggy address:
[   30.707140]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.708171]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.709026] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.709797]                                            ^
[   30.710449]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.711467]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.712275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.611041] ==================================================================
[   30.613177] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.614214] Read of size 1 at addr fff00000c61b4340 by task kunit_try_catch/181
[   30.615655] 
[   30.616005] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.617590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.618238] Hardware name: linux,dummy-virt (DT)
[   30.618940] Call trace:
[   30.619482]  show_stack+0x20/0x38 (C)
[   30.620484]  dump_stack_lvl+0x8c/0xd0
[   30.621123]  print_report+0x118/0x5e0
[   30.621741]  kasan_report+0xc8/0x118
[   30.622344]  __kasan_check_byte+0x54/0x70
[   30.622962]  kfree_sensitive+0x30/0xb0
[   30.623555]  kmalloc_double_kzfree+0x168/0x308
[   30.624180]  kunit_try_run_case+0x14c/0x3d0
[   30.625117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.626022]  kthread+0x24c/0x2d0
[   30.626562]  ret_from_fork+0x10/0x20
[   30.627409] 
[   30.627697] Allocated by task 181:
[   30.628225]  kasan_save_stack+0x3c/0x68
[   30.628839]  kasan_save_track+0x20/0x40
[   30.629420]  kasan_save_alloc_info+0x40/0x58
[   30.629941]  __kasan_kmalloc+0xd4/0xd8
[   30.630640]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.631649]  kmalloc_double_kzfree+0xb8/0x308
[   30.632227]  kunit_try_run_case+0x14c/0x3d0
[   30.632809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.633559]  kthread+0x24c/0x2d0
[   30.634190]  ret_from_fork+0x10/0x20
[   30.634727] 
[   30.635088] Freed by task 181:
[   30.635633]  kasan_save_stack+0x3c/0x68
[   30.636443]  kasan_save_track+0x20/0x40
[   30.637030]  kasan_save_free_info+0x4c/0x78
[   30.637695]  __kasan_slab_free+0x6c/0x98
[   30.638271]  kfree+0x114/0x3c8
[   30.638724]  kfree_sensitive+0x80/0xb0
[   30.639704]  kmalloc_double_kzfree+0x11c/0x308
[   30.640312]  kunit_try_run_case+0x14c/0x3d0
[   30.640986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641688]  kthread+0x24c/0x2d0
[   30.642267]  ret_from_fork+0x10/0x20
[   30.642817] 
[   30.643146] The buggy address belongs to the object at fff00000c61b4340
[   30.643146]  which belongs to the cache kmalloc-16 of size 16
[   30.644768] The buggy address is located 0 bytes inside of
[   30.644768]  freed 16-byte region [fff00000c61b4340, fff00000c61b4350)
[   30.646125] 
[   30.646440] The buggy address belongs to the physical page:
[   30.647591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   30.648687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.649608] page_type: f5(slab)
[   30.650068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.651060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.652245] page dumped because: kasan: bad access detected
[   30.652922] 
[   30.653249] Memory state around the buggy address:
[   30.653830]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.654670]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.655628] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.656723]                                            ^
[   30.657564]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658404]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.659530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   29.981906] ==================================================================
[   29.983128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   29.983869] Write of size 16 at addr fff00000c61b42a0 by task kunit_try_catch/155
[   29.984793] 
[   29.985967] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.987539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.988190] Hardware name: linux,dummy-virt (DT)
[   29.988735] Call trace:
[   29.989246]  show_stack+0x20/0x38 (C)
[   29.989818]  dump_stack_lvl+0x8c/0xd0
[   29.990611]  print_report+0x118/0x5e0
[   29.991074]  kasan_report+0xc8/0x118
[   29.992060]  __asan_report_store16_noabort+0x20/0x30
[   29.992710]  kmalloc_oob_16+0x3a0/0x3f8
[   29.993318]  kunit_try_run_case+0x14c/0x3d0
[   29.993919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.994658]  kthread+0x24c/0x2d0
[   29.995437]  ret_from_fork+0x10/0x20
[   29.996105] 
[   29.996435] Allocated by task 155:
[   29.997018]  kasan_save_stack+0x3c/0x68
[   29.997578]  kasan_save_track+0x20/0x40
[   29.998170]  kasan_save_alloc_info+0x40/0x58
[   29.998760]  __kasan_kmalloc+0xd4/0xd8
[   29.999633]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.000210]  kmalloc_oob_16+0xb4/0x3f8
[   30.000844]  kunit_try_run_case+0x14c/0x3d0
[   30.001531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.002318]  kthread+0x24c/0x2d0
[   30.002896]  ret_from_fork+0x10/0x20
[   30.003851] 
[   30.004130] The buggy address belongs to the object at fff00000c61b42a0
[   30.004130]  which belongs to the cache kmalloc-16 of size 16
[   30.005392] The buggy address is located 0 bytes inside of
[   30.005392]  allocated 13-byte region [fff00000c61b42a0, fff00000c61b42ad)
[   30.006784] 
[   30.007162] The buggy address belongs to the physical page:
[   30.007780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   30.008836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.009823] page_type: f5(slab)
[   30.010359] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.011522] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.012625] page dumped because: kasan: bad access detected
[   30.013420] 
[   30.013946] Memory state around the buggy address:
[   30.014709]  fff00000c61b4180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   30.016046]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.017052] >fff00000c61b4280: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   30.018163]                                   ^
[   30.018809]  fff00000c61b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.019949]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.020852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.489282] ==================================================================
[   30.490384] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.491215] Write of size 33 at addr fff00000c64e7d00 by task kunit_try_catch/175
[   30.491921] 
[   30.492217] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.494151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.494697] Hardware name: linux,dummy-virt (DT)
[   30.495312] Call trace:
[   30.495723]  show_stack+0x20/0x38 (C)
[   30.496496]  dump_stack_lvl+0x8c/0xd0
[   30.497039]  print_report+0x118/0x5e0
[   30.497640]  kasan_report+0xc8/0x118
[   30.498612]  kasan_check_range+0x100/0x1a8
[   30.499388]  __asan_memset+0x34/0x78
[   30.499861]  kmalloc_uaf_memset+0x170/0x310
[   30.500771]  kunit_try_run_case+0x14c/0x3d0
[   30.501426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.502245]  kthread+0x24c/0x2d0
[   30.502919]  ret_from_fork+0x10/0x20
[   30.503701] 
[   30.504291] Allocated by task 175:
[   30.504796]  kasan_save_stack+0x3c/0x68
[   30.505435]  kasan_save_track+0x20/0x40
[   30.506019]  kasan_save_alloc_info+0x40/0x58
[   30.506638]  __kasan_kmalloc+0xd4/0xd8
[   30.507386]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.508040]  kmalloc_uaf_memset+0xb8/0x310
[   30.508636]  kunit_try_run_case+0x14c/0x3d0
[   30.509217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.510108]  kthread+0x24c/0x2d0
[   30.510853]  ret_from_fork+0x10/0x20
[   30.511462] 
[   30.511764] Freed by task 175:
[   30.512255]  kasan_save_stack+0x3c/0x68
[   30.512855]  kasan_save_track+0x20/0x40
[   30.513966]  kasan_save_free_info+0x4c/0x78
[   30.514588]  __kasan_slab_free+0x6c/0x98
[   30.515057]  kfree+0x114/0x3c8
[   30.515610]  kmalloc_uaf_memset+0x11c/0x310
[   30.516650]  kunit_try_run_case+0x14c/0x3d0
[   30.517470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.518235]  kthread+0x24c/0x2d0
[   30.518732]  ret_from_fork+0x10/0x20
[   30.519495] 
[   30.519797] The buggy address belongs to the object at fff00000c64e7d00
[   30.519797]  which belongs to the cache kmalloc-64 of size 64
[   30.521216] The buggy address is located 0 bytes inside of
[   30.521216]  freed 64-byte region [fff00000c64e7d00, fff00000c64e7d40)
[   30.522821] 
[   30.523141] The buggy address belongs to the physical page:
[   30.524624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7
[   30.525583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.526340] page_type: f5(slab)
[   30.526952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.528231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.529149] page dumped because: kasan: bad access detected
[   30.529795] 
[   30.530111] Memory state around the buggy address:
[   30.530756]  fff00000c64e7c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.532394]  fff00000c64e7c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.533376] >fff00000c64e7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.534261]                    ^
[   30.534720]  fff00000c64e7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.535811]  fff00000c64e7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.536647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.384990] ==================================================================
[   30.386189] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.387030] Read of size 64 at addr fff00000c63c2104 by task kunit_try_catch/171
[   30.388628] 
[   30.389015] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.390327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.390858] Hardware name: linux,dummy-virt (DT)
[   30.391647] Call trace:
[   30.392182]  show_stack+0x20/0x38 (C)
[   30.392734]  dump_stack_lvl+0x8c/0xd0
[   30.393390]  print_report+0x118/0x5e0
[   30.393991]  kasan_report+0xc8/0x118
[   30.394572]  kasan_check_range+0x100/0x1a8
[   30.395264]  __asan_memmove+0x3c/0x98
[   30.395808]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.396491]  kunit_try_run_case+0x14c/0x3d0
[   30.397135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.398071]  kthread+0x24c/0x2d0
[   30.398552]  ret_from_fork+0x10/0x20
[   30.399181] 
[   30.399829] Allocated by task 171:
[   30.400235]  kasan_save_stack+0x3c/0x68
[   30.400807]  kasan_save_track+0x20/0x40
[   30.401364]  kasan_save_alloc_info+0x40/0x58
[   30.401891]  __kasan_kmalloc+0xd4/0xd8
[   30.402502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.403054]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   30.403930]  kunit_try_run_case+0x14c/0x3d0
[   30.405113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.405791]  kthread+0x24c/0x2d0
[   30.406306]  ret_from_fork+0x10/0x20
[   30.406789] 
[   30.407147] The buggy address belongs to the object at fff00000c63c2100
[   30.407147]  which belongs to the cache kmalloc-64 of size 64
[   30.408512] The buggy address is located 4 bytes inside of
[   30.408512]  allocated 64-byte region [fff00000c63c2100, fff00000c63c2140)
[   30.410361] 
[   30.410718] The buggy address belongs to the physical page:
[   30.411262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c2
[   30.412490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.413366] page_type: f5(slab)
[   30.413957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.414909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.416111] page dumped because: kasan: bad access detected
[   30.416802] 
[   30.417149] Memory state around the buggy address:
[   30.417725]  fff00000c63c2000: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.418663]  fff00000c63c2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.419864] >fff00000c63c2100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.420772]                                            ^
[   30.421476]  fff00000c63c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.422461]  fff00000c63c2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.423425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.334339] ==================================================================
[   30.335459] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.336544] Read of size 18446744073709551614 at addr fff00000c64e7504 by task kunit_try_catch/169
[   30.337827] 
[   30.338748] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.340163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.340719] Hardware name: linux,dummy-virt (DT)
[   30.341425] Call trace:
[   30.341800]  show_stack+0x20/0x38 (C)
[   30.342655]  dump_stack_lvl+0x8c/0xd0
[   30.343747]  print_report+0x118/0x5e0
[   30.344353]  kasan_report+0xc8/0x118
[   30.344919]  kasan_check_range+0x100/0x1a8
[   30.345547]  __asan_memmove+0x3c/0x98
[   30.346202]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.347013]  kunit_try_run_case+0x14c/0x3d0
[   30.348086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.348752]  kthread+0x24c/0x2d0
[   30.349261]  ret_from_fork+0x10/0x20
[   30.349810] 
[   30.350162] Allocated by task 169:
[   30.350674]  kasan_save_stack+0x3c/0x68
[   30.351238]  kasan_save_track+0x20/0x40
[   30.351940]  kasan_save_alloc_info+0x40/0x58
[   30.352571]  __kasan_kmalloc+0xd4/0xd8
[   30.353244]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.354155]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.354904]  kunit_try_run_case+0x14c/0x3d0
[   30.355908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.356533]  kthread+0x24c/0x2d0
[   30.357240]  ret_from_fork+0x10/0x20
[   30.357693] 
[   30.358080] The buggy address belongs to the object at fff00000c64e7500
[   30.358080]  which belongs to the cache kmalloc-64 of size 64
[   30.359463] The buggy address is located 4 bytes inside of
[   30.359463]  64-byte region [fff00000c64e7500, fff00000c64e7540)
[   30.361084] 
[   30.361382] The buggy address belongs to the physical page:
[   30.362199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7
[   30.363186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.364633] page_type: f5(slab)
[   30.365110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.366040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.367025] page dumped because: kasan: bad access detected
[   30.368076] 
[   30.368418] Memory state around the buggy address:
[   30.369024]  fff00000c64e7400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.369990]  fff00000c64e7480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.370889] >fff00000c64e7500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.371829]                    ^
[   30.372413]  fff00000c64e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.373440]  fff00000c64e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.374686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   30.286211] ==================================================================
[   30.287411] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.288164] Write of size 16 at addr fff00000c63de269 by task kunit_try_catch/167
[   30.290169] 
[   30.290550] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.291712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.292344] Hardware name: linux,dummy-virt (DT)
[   30.292933] Call trace:
[   30.293297]  show_stack+0x20/0x38 (C)
[   30.293904]  dump_stack_lvl+0x8c/0xd0
[   30.294448]  print_report+0x118/0x5e0
[   30.295121]  kasan_report+0xc8/0x118
[   30.295648]  kasan_check_range+0x100/0x1a8
[   30.296300]  __asan_memset+0x34/0x78
[   30.296896]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.297497]  kunit_try_run_case+0x14c/0x3d0
[   30.298148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298998]  kthread+0x24c/0x2d0
[   30.299516]  ret_from_fork+0x10/0x20
[   30.300097] 
[   30.300490] Allocated by task 167:
[   30.301021]  kasan_save_stack+0x3c/0x68
[   30.301593]  kasan_save_track+0x20/0x40
[   30.302231]  kasan_save_alloc_info+0x40/0x58
[   30.302866]  __kasan_kmalloc+0xd4/0xd8
[   30.303402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.304052]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.304642]  kunit_try_run_case+0x14c/0x3d0
[   30.305306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.306017]  kthread+0x24c/0x2d0
[   30.306619]  ret_from_fork+0x10/0x20
[   30.307080] 
[   30.307487] The buggy address belongs to the object at fff00000c63de200
[   30.307487]  which belongs to the cache kmalloc-128 of size 128
[   30.308953] The buggy address is located 105 bytes inside of
[   30.308953]  allocated 120-byte region [fff00000c63de200, fff00000c63de278)
[   30.310352] 
[   30.310657] The buggy address belongs to the physical page:
[   30.311363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   30.312293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.313168] page_type: f5(slab)
[   30.313710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.314680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.315638] page dumped because: kasan: bad access detected
[   30.316374] 
[   30.316678] Memory state around the buggy address:
[   30.317363]  fff00000c63de100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.318175]  fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.319048] >fff00000c63de200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.319830]                                                                 ^
[   30.320643]  fff00000c63de280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.321525]  fff00000c63de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.322415] ==================================================================
[   30.138478] ==================================================================
[   30.139720] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.140921] Write of size 2 at addr fff00000c63c0e77 by task kunit_try_catch/161
[   30.141793] 
[   30.142181] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.143905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.144417] Hardware name: linux,dummy-virt (DT)
[   30.145018] Call trace:
[   30.145410]  show_stack+0x20/0x38 (C)
[   30.145999]  dump_stack_lvl+0x8c/0xd0
[   30.146732]  print_report+0x118/0x5e0
[   30.147446]  kasan_report+0xc8/0x118
[   30.148079]  kasan_check_range+0x100/0x1a8
[   30.148607]  __asan_memset+0x34/0x78
[   30.149290]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.149934]  kunit_try_run_case+0x14c/0x3d0
[   30.150559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.151360]  kthread+0x24c/0x2d0
[   30.152080]  ret_from_fork+0x10/0x20
[   30.152555] 
[   30.152929] Allocated by task 161:
[   30.153613]  kasan_save_stack+0x3c/0x68
[   30.154153]  kasan_save_track+0x20/0x40
[   30.154818]  kasan_save_alloc_info+0x40/0x58
[   30.156246]  __kasan_kmalloc+0xd4/0xd8
[   30.156981]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.157506]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.158105]  kunit_try_run_case+0x14c/0x3d0
[   30.158623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.159443]  kthread+0x24c/0x2d0
[   30.159860]  ret_from_fork+0x10/0x20
[   30.160518] 
[   30.160811] The buggy address belongs to the object at fff00000c63c0e00
[   30.160811]  which belongs to the cache kmalloc-128 of size 128
[   30.162585] The buggy address is located 119 bytes inside of
[   30.162585]  allocated 120-byte region [fff00000c63c0e00, fff00000c63c0e78)
[   30.164322] 
[   30.164579] The buggy address belongs to the physical page:
[   30.165410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c0
[   30.166508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.167378] page_type: f5(slab)
[   30.168410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.169332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.170213] page dumped because: kasan: bad access detected
[   30.170945] 
[   30.171275] Memory state around the buggy address:
[   30.171837]  fff00000c63c0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.172858]  fff00000c63c0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173808] >fff00000c63c0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.174638]                                                                 ^
[   30.175796]  fff00000c63c0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.176708]  fff00000c63c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177549] ==================================================================
[   30.240339] ==================================================================
[   30.241485] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.242273] Write of size 8 at addr fff00000c63de171 by task kunit_try_catch/165
[   30.243103] 
[   30.243520] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.244778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.245502] Hardware name: linux,dummy-virt (DT)
[   30.246627] Call trace:
[   30.247058]  show_stack+0x20/0x38 (C)
[   30.248105]  dump_stack_lvl+0x8c/0xd0
[   30.248901]  print_report+0x118/0x5e0
[   30.249601]  kasan_report+0xc8/0x118
[   30.250188]  kasan_check_range+0x100/0x1a8
[   30.250911]  __asan_memset+0x34/0x78
[   30.251603]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.252282]  kunit_try_run_case+0x14c/0x3d0
[   30.252820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.253595]  kthread+0x24c/0x2d0
[   30.254164]  ret_from_fork+0x10/0x20
[   30.254739] 
[   30.255116] Allocated by task 165:
[   30.255658]  kasan_save_stack+0x3c/0x68
[   30.256216]  kasan_save_track+0x20/0x40
[   30.256783]  kasan_save_alloc_info+0x40/0x58
[   30.257553]  __kasan_kmalloc+0xd4/0xd8
[   30.258195]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.259051]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.259618]  kunit_try_run_case+0x14c/0x3d0
[   30.260308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.261058]  kthread+0x24c/0x2d0
[   30.261629]  ret_from_fork+0x10/0x20
[   30.262152] 
[   30.262580] The buggy address belongs to the object at fff00000c63de100
[   30.262580]  which belongs to the cache kmalloc-128 of size 128
[   30.264075] The buggy address is located 113 bytes inside of
[   30.264075]  allocated 120-byte region [fff00000c63de100, fff00000c63de178)
[   30.265458] 
[   30.265867] The buggy address belongs to the physical page:
[   30.266549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   30.267598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.268418] page_type: f5(slab)
[   30.268854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.269895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.270792] page dumped because: kasan: bad access detected
[   30.271455] 
[   30.271769] Memory state around the buggy address:
[   30.272456]  fff00000c63de000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.273343]  fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.274170] >fff00000c63de100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.275079]                                                                 ^
[   30.275870]  fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.276773]  fff00000c63de200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.277659] ==================================================================
[   30.189995] ==================================================================
[   30.191697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.192901] Write of size 4 at addr fff00000c63de075 by task kunit_try_catch/163
[   30.193823] 
[   30.194420] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.195949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.196473] Hardware name: linux,dummy-virt (DT)
[   30.197203] Call trace:
[   30.197596]  show_stack+0x20/0x38 (C)
[   30.198165]  dump_stack_lvl+0x8c/0xd0
[   30.198865]  print_report+0x118/0x5e0
[   30.199495]  kasan_report+0xc8/0x118
[   30.200355]  kasan_check_range+0x100/0x1a8
[   30.201011]  __asan_memset+0x34/0x78
[   30.201675]  kmalloc_oob_memset_4+0x150/0x300
[   30.202332]  kunit_try_run_case+0x14c/0x3d0
[   30.203067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.203799]  kthread+0x24c/0x2d0
[   30.204371]  ret_from_fork+0x10/0x20
[   30.205169] 
[   30.205686] Allocated by task 163:
[   30.206221]  kasan_save_stack+0x3c/0x68
[   30.206964]  kasan_save_track+0x20/0x40
[   30.207626]  kasan_save_alloc_info+0x40/0x58
[   30.208209]  __kasan_kmalloc+0xd4/0xd8
[   30.208836]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.209943]  kmalloc_oob_memset_4+0xb0/0x300
[   30.210585]  kunit_try_run_case+0x14c/0x3d0
[   30.211205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.211840]  kthread+0x24c/0x2d0
[   30.212619]  ret_from_fork+0x10/0x20
[   30.213066] 
[   30.213420] The buggy address belongs to the object at fff00000c63de000
[   30.213420]  which belongs to the cache kmalloc-128 of size 128
[   30.215056] The buggy address is located 117 bytes inside of
[   30.215056]  allocated 120-byte region [fff00000c63de000, fff00000c63de078)
[   30.216751] 
[   30.217168] The buggy address belongs to the physical page:
[   30.217817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   30.218928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.219972] page_type: f5(slab)
[   30.220439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.221422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.222384] page dumped because: kasan: bad access detected
[   30.223161] 
[   30.223764] Memory state around the buggy address:
[   30.224382]  fff00000c63ddf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.225257]  fff00000c63ddf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.226153] >fff00000c63de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.227023]                                                                 ^
[   30.228595]  fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.229463]  fff00000c63de100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.088325] ==================================================================
[   30.089585] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.090558] Write of size 128 at addr fff00000c63ed000 by task kunit_try_catch/159
[   30.091660] 
[   30.092919] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.094094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.094605] Hardware name: linux,dummy-virt (DT)
[   30.095577] Call trace:
[   30.095993]  show_stack+0x20/0x38 (C)
[   30.096542]  dump_stack_lvl+0x8c/0xd0
[   30.097127]  print_report+0x118/0x5e0
[   30.097716]  kasan_report+0xc8/0x118
[   30.098347]  kasan_check_range+0x100/0x1a8
[   30.098959]  __asan_memset+0x34/0x78
[   30.099686]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.100240]  kunit_try_run_case+0x14c/0x3d0
[   30.101045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.101758]  kthread+0x24c/0x2d0
[   30.102855]  ret_from_fork+0x10/0x20
[   30.103399] 
[   30.103770] Allocated by task 159:
[   30.104327]  kasan_save_stack+0x3c/0x68
[   30.105256]  kasan_save_track+0x20/0x40
[   30.105837]  kasan_save_alloc_info+0x40/0x58
[   30.106463]  __kasan_kmalloc+0xd4/0xd8
[   30.107093]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.107986]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.108689]  kunit_try_run_case+0x14c/0x3d0
[   30.109584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.110480]  kthread+0x24c/0x2d0
[   30.111168]  ret_from_fork+0x10/0x20
[   30.111693] 
[   30.112008] The buggy address belongs to the object at fff00000c63ed000
[   30.112008]  which belongs to the cache kmalloc-128 of size 128
[   30.113762] The buggy address is located 0 bytes inside of
[   30.113762]  allocated 120-byte region [fff00000c63ed000, fff00000c63ed078)
[   30.115447] 
[   30.115814] The buggy address belongs to the physical page:
[   30.116502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ed
[   30.117948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.118587] page_type: f5(slab)
[   30.119143] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.120110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.121349] page dumped because: kasan: bad access detected
[   30.122046] 
[   30.122345] Memory state around the buggy address:
[   30.123098]  fff00000c63ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.124396]  fff00000c63ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.125174] >fff00000c63ed000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.125926]                                                                 ^
[   30.126821]  fff00000c63ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.127719]  fff00000c63ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.128554] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.546067] ==================================================================
[   30.547570] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.548737] Read of size 1 at addr fff00000c64e7e28 by task kunit_try_catch/177
[   30.549678] 
[   30.550104] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.551829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.552444] Hardware name: linux,dummy-virt (DT)
[   30.553097] Call trace:
[   30.553583]  show_stack+0x20/0x38 (C)
[   30.554180]  dump_stack_lvl+0x8c/0xd0
[   30.554825]  print_report+0x118/0x5e0
[   30.555787]  kasan_report+0xc8/0x118
[   30.556452]  __asan_report_load1_noabort+0x20/0x30
[   30.557101]  kmalloc_uaf2+0x3f4/0x468
[   30.557700]  kunit_try_run_case+0x14c/0x3d0
[   30.558611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.559893]  kthread+0x24c/0x2d0
[   30.560491]  ret_from_fork+0x10/0x20
[   30.561152] 
[   30.561588] Allocated by task 177:
[   30.562076]  kasan_save_stack+0x3c/0x68
[   30.562780]  kasan_save_track+0x20/0x40
[   30.563832]  kasan_save_alloc_info+0x40/0x58
[   30.564455]  __kasan_kmalloc+0xd4/0xd8
[   30.565110]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.565851]  kmalloc_uaf2+0xc4/0x468
[   30.566542]  kunit_try_run_case+0x14c/0x3d0
[   30.567137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.568214]  kthread+0x24c/0x2d0
[   30.568766]  ret_from_fork+0x10/0x20
[   30.569440] 
[   30.569866] Freed by task 177:
[   30.570432]  kasan_save_stack+0x3c/0x68
[   30.570955]  kasan_save_track+0x20/0x40
[   30.571854]  kasan_save_free_info+0x4c/0x78
[   30.572640]  __kasan_slab_free+0x6c/0x98
[   30.573533]  kfree+0x114/0x3c8
[   30.574017]  kmalloc_uaf2+0x134/0x468
[   30.574708]  kunit_try_run_case+0x14c/0x3d0
[   30.575459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.576397]  kthread+0x24c/0x2d0
[   30.577066]  ret_from_fork+0x10/0x20
[   30.577570] 
[   30.578009] The buggy address belongs to the object at fff00000c64e7e00
[   30.578009]  which belongs to the cache kmalloc-64 of size 64
[   30.579616] The buggy address is located 40 bytes inside of
[   30.579616]  freed 64-byte region [fff00000c64e7e00, fff00000c64e7e40)
[   30.581350] 
[   30.581833] The buggy address belongs to the physical page:
[   30.582732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7
[   30.584241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.585010] page_type: f5(slab)
[   30.585588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.586520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.587622] page dumped because: kasan: bad access detected
[   30.588662] 
[   30.589242] Memory state around the buggy address:
[   30.589900]  fff00000c64e7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.590623]  fff00000c64e7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.591618] >fff00000c64e7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.592571]                                   ^
[   30.593027]  fff00000c64e7e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.594006]  fff00000c64e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.594951] ==================================================================
[   30.031569] ==================================================================
[   30.032797] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.033534] Read of size 16 at addr fff00000c61b4300 by task kunit_try_catch/157
[   30.034742] 
[   30.035159] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.036525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.037473] Hardware name: linux,dummy-virt (DT)
[   30.038280] Call trace:
[   30.038655]  show_stack+0x20/0x38 (C)
[   30.039504]  dump_stack_lvl+0x8c/0xd0
[   30.040190]  print_report+0x118/0x5e0
[   30.040891]  kasan_report+0xc8/0x118
[   30.041430]  __asan_report_load16_noabort+0x20/0x30
[   30.042039]  kmalloc_uaf_16+0x3bc/0x438
[   30.042696]  kunit_try_run_case+0x14c/0x3d0
[   30.043257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.044225]  kthread+0x24c/0x2d0
[   30.044766]  ret_from_fork+0x10/0x20
[   30.045374] 
[   30.045711] Allocated by task 157:
[   30.046328]  kasan_save_stack+0x3c/0x68
[   30.047093]  kasan_save_track+0x20/0x40
[   30.047850]  kasan_save_alloc_info+0x40/0x58
[   30.048527]  __kasan_kmalloc+0xd4/0xd8
[   30.049107]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.049658]  kmalloc_uaf_16+0x140/0x438
[   30.050298]  kunit_try_run_case+0x14c/0x3d0
[   30.050919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.051949]  kthread+0x24c/0x2d0
[   30.052379]  ret_from_fork+0x10/0x20
[   30.053281] 
[   30.053695] Freed by task 157:
[   30.054113]  kasan_save_stack+0x3c/0x68
[   30.054774]  kasan_save_track+0x20/0x40
[   30.055328]  kasan_save_free_info+0x4c/0x78
[   30.056026]  __kasan_slab_free+0x6c/0x98
[   30.056807]  kfree+0x114/0x3c8
[   30.057566]  kmalloc_uaf_16+0x190/0x438
[   30.058102]  kunit_try_run_case+0x14c/0x3d0
[   30.058663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059776]  kthread+0x24c/0x2d0
[   30.060305]  ret_from_fork+0x10/0x20
[   30.060870] 
[   30.061207] The buggy address belongs to the object at fff00000c61b4300
[   30.061207]  which belongs to the cache kmalloc-16 of size 16
[   30.062534] The buggy address is located 0 bytes inside of
[   30.062534]  freed 16-byte region [fff00000c61b4300, fff00000c61b4310)
[   30.064033] 
[   30.064568] The buggy address belongs to the physical page:
[   30.065422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   30.066536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.067941] page_type: f5(slab)
[   30.068615] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.069526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.070599] page dumped because: kasan: bad access detected
[   30.071426] 
[   30.072286] Memory state around the buggy address:
[   30.073305]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.074212]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   30.075136] >fff00000c61b4300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.076060]                    ^
[   30.076832]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.077917]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.078919] ==================================================================
[   30.433372] ==================================================================
[   30.434584] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.435348] Read of size 1 at addr fff00000c61b4328 by task kunit_try_catch/173
[   30.436312] 
[   30.436686] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.438440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.439451] Hardware name: linux,dummy-virt (DT)
[   30.440177] Call trace:
[   30.440612]  show_stack+0x20/0x38 (C)
[   30.441546]  dump_stack_lvl+0x8c/0xd0
[   30.442338]  print_report+0x118/0x5e0
[   30.443124]  kasan_report+0xc8/0x118
[   30.443704]  __asan_report_load1_noabort+0x20/0x30
[   30.444510]  kmalloc_uaf+0x300/0x338
[   30.445213]  kunit_try_run_case+0x14c/0x3d0
[   30.446102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.446920]  kthread+0x24c/0x2d0
[   30.447785]  ret_from_fork+0x10/0x20
[   30.448303] 
[   30.448696] Allocated by task 173:
[   30.449163]  kasan_save_stack+0x3c/0x68
[   30.449757]  kasan_save_track+0x20/0x40
[   30.450542]  kasan_save_alloc_info+0x40/0x58
[   30.451219]  __kasan_kmalloc+0xd4/0xd8
[   30.451913]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.452515]  kmalloc_uaf+0xb8/0x338
[   30.452782]  kunit_try_run_case+0x14c/0x3d0
[   30.453707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.454667]  kthread+0x24c/0x2d0
[   30.455161]  ret_from_fork+0x10/0x20
[   30.455738] 
[   30.456751] Freed by task 173:
[   30.457275]  kasan_save_stack+0x3c/0x68
[   30.457801]  kasan_save_track+0x20/0x40
[   30.458421]  kasan_save_free_info+0x4c/0x78
[   30.459026]  __kasan_slab_free+0x6c/0x98
[   30.459543]  kfree+0x114/0x3c8
[   30.460110]  kmalloc_uaf+0x11c/0x338
[   30.460634]  kunit_try_run_case+0x14c/0x3d0
[   30.461364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.462078]  kthread+0x24c/0x2d0
[   30.462651]  ret_from_fork+0x10/0x20
[   30.463168] 
[   30.463557] The buggy address belongs to the object at fff00000c61b4320
[   30.463557]  which belongs to the cache kmalloc-16 of size 16
[   30.465045] The buggy address is located 8 bytes inside of
[   30.465045]  freed 16-byte region [fff00000c61b4320, fff00000c61b4330)
[   30.466520] 
[   30.466836] The buggy address belongs to the physical page:
[   30.467836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   30.468705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.469634] page_type: f5(slab)
[   30.470130] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.471162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.472228] page dumped because: kasan: bad access detected
[   30.472903] 
[   30.473243] Memory state around the buggy address:
[   30.473797]  fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.474717]  fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.475796] >fff00000c61b4300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.476713]                                   ^
[   30.477388]  fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.478264]  fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.479224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   29.858672] ==================================================================
[   29.860557] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   29.861689] Read of size 1 at addr fff00000c18fba00 by task kunit_try_catch/153
[   29.862626] 
[   29.863029] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.864987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.865916] Hardware name: linux,dummy-virt (DT)
[   29.866719] Call trace:
[   29.867098]  show_stack+0x20/0x38 (C)
[   29.867933]  dump_stack_lvl+0x8c/0xd0
[   29.868797]  print_report+0x118/0x5e0
[   29.869504]  kasan_report+0xc8/0x118
[   29.870189]  __kasan_check_byte+0x54/0x70
[   29.870919]  krealloc_noprof+0x44/0x360
[   29.871463]  krealloc_uaf+0x180/0x520
[   29.872447]  kunit_try_run_case+0x14c/0x3d0
[   29.873023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873829]  kthread+0x24c/0x2d0
[   29.874431]  ret_from_fork+0x10/0x20
[   29.874981] 
[   29.875608] Allocated by task 153:
[   29.876209]  kasan_save_stack+0x3c/0x68
[   29.876867]  kasan_save_track+0x20/0x40
[   29.877543]  kasan_save_alloc_info+0x40/0x58
[   29.878087]  __kasan_kmalloc+0xd4/0xd8
[   29.878818]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.879750]  krealloc_uaf+0xc8/0x520
[   29.880542]  kunit_try_run_case+0x14c/0x3d0
[   29.881144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.881817]  kthread+0x24c/0x2d0
[   29.882395]  ret_from_fork+0x10/0x20
[   29.882975] 
[   29.883910] Freed by task 153:
[   29.884352]  kasan_save_stack+0x3c/0x68
[   29.884849]  kasan_save_track+0x20/0x40
[   29.885565]  kasan_save_free_info+0x4c/0x78
[   29.886305]  __kasan_slab_free+0x6c/0x98
[   29.887025]  kfree+0x114/0x3c8
[   29.887536]  krealloc_uaf+0x12c/0x520
[   29.888219]  kunit_try_run_case+0x14c/0x3d0
[   29.888697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.889786]  kthread+0x24c/0x2d0
[   29.890282]  ret_from_fork+0x10/0x20
[   29.890812] 
[   29.891549] The buggy address belongs to the object at fff00000c18fba00
[   29.891549]  which belongs to the cache kmalloc-256 of size 256
[   29.892956] The buggy address is located 0 bytes inside of
[   29.892956]  freed 256-byte region [fff00000c18fba00, fff00000c18fbb00)
[   29.894565] 
[   29.894943] The buggy address belongs to the physical page:
[   29.896014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1018fa
[   29.897039] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.897964] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.898828] page_type: f5(slab)
[   29.899628] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.900455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.901455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.902329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.903389] head: 0bfffe0000000001 ffffc1ffc3063e81 ffffffffffffffff 0000000000000000
[   29.904598] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.905512] page dumped because: kasan: bad access detected
[   29.906351] 
[   29.906683] Memory state around the buggy address:
[   29.907683]  fff00000c18fb900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.908610]  fff00000c18fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.909459] >fff00000c18fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.910297]                    ^
[   29.910748]  fff00000c18fba80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.911988]  fff00000c18fbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.912813] ==================================================================
[   29.914394] ==================================================================
[   29.915048] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   29.916805] Read of size 1 at addr fff00000c18fba00 by task kunit_try_catch/153
[   29.917819] 
[   29.918492] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.920175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.920736] Hardware name: linux,dummy-virt (DT)
[   29.921818] Call trace:
[   29.922188]  show_stack+0x20/0x38 (C)
[   29.922898]  dump_stack_lvl+0x8c/0xd0
[   29.923970]  print_report+0x118/0x5e0
[   29.925107]  kasan_report+0xc8/0x118
[   29.925843]  __asan_report_load1_noabort+0x20/0x30
[   29.926648]  krealloc_uaf+0x4c8/0x520
[   29.927667]  kunit_try_run_case+0x14c/0x3d0
[   29.928591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.929711]  kthread+0x24c/0x2d0
[   29.930232]  ret_from_fork+0x10/0x20
[   29.930739] 
[   29.931161] Allocated by task 153:
[   29.932071]  kasan_save_stack+0x3c/0x68
[   29.932655]  kasan_save_track+0x20/0x40
[   29.933449]  kasan_save_alloc_info+0x40/0x58
[   29.934013]  __kasan_kmalloc+0xd4/0xd8
[   29.934618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.935416]  krealloc_uaf+0xc8/0x520
[   29.935845]  kunit_try_run_case+0x14c/0x3d0
[   29.936528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.937685]  kthread+0x24c/0x2d0
[   29.938181]  ret_from_fork+0x10/0x20
[   29.938806] 
[   29.939156] Freed by task 153:
[   29.939965]  kasan_save_stack+0x3c/0x68
[   29.940473]  kasan_save_track+0x20/0x40
[   29.941135]  kasan_save_free_info+0x4c/0x78
[   29.941734]  __kasan_slab_free+0x6c/0x98
[   29.942323]  kfree+0x114/0x3c8
[   29.942843]  krealloc_uaf+0x12c/0x520
[   29.944206]  kunit_try_run_case+0x14c/0x3d0
[   29.945009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.945822]  kthread+0x24c/0x2d0
[   29.946562]  ret_from_fork+0x10/0x20
[   29.947317] 
[   29.947853] The buggy address belongs to the object at fff00000c18fba00
[   29.947853]  which belongs to the cache kmalloc-256 of size 256
[   29.949445] The buggy address is located 0 bytes inside of
[   29.949445]  freed 256-byte region [fff00000c18fba00, fff00000c18fbb00)
[   29.951007] 
[   29.951979] The buggy address belongs to the physical page:
[   29.953088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1018fa
[   29.954233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.955355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.956461] page_type: f5(slab)
[   29.956986] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.958124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.959079] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.960416] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.961457] head: 0bfffe0000000001 ffffc1ffc3063e81 ffffffffffffffff 0000000000000000
[   29.962451] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.963479] page dumped because: kasan: bad access detected
[   29.964478] 
[   29.964950] Memory state around the buggy address:
[   29.965717]  fff00000c18fb900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.966705]  fff00000c18fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.967729] >fff00000c18fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.968521]                    ^
[   29.969188]  fff00000c18fba80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.970547]  fff00000c18fbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.971660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   29.674160] ==================================================================
[   29.675331] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.677486] Write of size 1 at addr fff00000c644e0c9 by task kunit_try_catch/151
[   29.678379] 
[   29.678706] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.680433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.681041] Hardware name: linux,dummy-virt (DT)
[   29.681625] Call trace:
[   29.682025]  show_stack+0x20/0x38 (C)
[   29.682544]  dump_stack_lvl+0x8c/0xd0
[   29.683085]  print_report+0x118/0x5e0
[   29.683683]  kasan_report+0xc8/0x118
[   29.684424]  __asan_report_store1_noabort+0x20/0x30
[   29.685514]  krealloc_less_oob_helper+0xa48/0xc50
[   29.686062]  krealloc_large_less_oob+0x20/0x38
[   29.686761]  kunit_try_run_case+0x14c/0x3d0
[   29.687423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688203]  kthread+0x24c/0x2d0
[   29.688784]  ret_from_fork+0x10/0x20
[   29.689585] 
[   29.689927] The buggy address belongs to the physical page:
[   29.690616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.692028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.692899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.693736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.694806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.695701] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.696956] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.697819] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.698768] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.700001] page dumped because: kasan: bad access detected
[   29.700722] 
[   29.701117] Memory state around the buggy address:
[   29.701954]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.702766]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.703689] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.704931]                                               ^
[   29.705646]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.706545]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.707555] ==================================================================
[   29.370784] ==================================================================
[   29.372699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.373441] Write of size 1 at addr fff00000c09762c9 by task kunit_try_catch/147
[   29.374260] 
[   29.374669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.375865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.376437] Hardware name: linux,dummy-virt (DT)
[   29.377202] Call trace:
[   29.377720]  show_stack+0x20/0x38 (C)
[   29.378325]  dump_stack_lvl+0x8c/0xd0
[   29.378857]  print_report+0x118/0x5e0
[   29.379523]  kasan_report+0xc8/0x118
[   29.380113]  __asan_report_store1_noabort+0x20/0x30
[   29.380870]  krealloc_less_oob_helper+0xa48/0xc50
[   29.381459]  krealloc_less_oob+0x20/0x38
[   29.382196]  kunit_try_run_case+0x14c/0x3d0
[   29.382794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.383607]  kthread+0x24c/0x2d0
[   29.384134]  ret_from_fork+0x10/0x20
[   29.384719] 
[   29.385048] Allocated by task 147:
[   29.385559]  kasan_save_stack+0x3c/0x68
[   29.386237]  kasan_save_track+0x20/0x40
[   29.386861]  kasan_save_alloc_info+0x40/0x58
[   29.387471]  __kasan_krealloc+0x118/0x178
[   29.388097]  krealloc_noprof+0x128/0x360
[   29.388641]  krealloc_less_oob_helper+0x168/0xc50
[   29.389305]  krealloc_less_oob+0x20/0x38
[   29.389902]  kunit_try_run_case+0x14c/0x3d0
[   29.390558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.391314]  kthread+0x24c/0x2d0
[   29.391845]  ret_from_fork+0x10/0x20
[   29.392422] 
[   29.392732] The buggy address belongs to the object at fff00000c0976200
[   29.392732]  which belongs to the cache kmalloc-256 of size 256
[   29.394121] The buggy address is located 0 bytes to the right of
[   29.394121]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.395561] 
[   29.395856] The buggy address belongs to the physical page:
[   29.396479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.397475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.398522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.399388] page_type: f5(slab)
[   29.400110] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.401242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.402171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.403096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.404003] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.404902] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.405909] page dumped because: kasan: bad access detected
[   29.406663] 
[   29.407053] Memory state around the buggy address:
[   29.407668]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.408525]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.409437] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.410301]                                               ^
[   29.410982]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.411847]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.412736] ==================================================================
[   29.708911] ==================================================================
[   29.709604] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.711217] Write of size 1 at addr fff00000c644e0d0 by task kunit_try_catch/151
[   29.711971] 
[   29.713439] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.714592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.715179] Hardware name: linux,dummy-virt (DT)
[   29.715755] Call trace:
[   29.716270]  show_stack+0x20/0x38 (C)
[   29.716790]  dump_stack_lvl+0x8c/0xd0
[   29.717928]  print_report+0x118/0x5e0
[   29.718479]  kasan_report+0xc8/0x118
[   29.719132]  __asan_report_store1_noabort+0x20/0x30
[   29.720311]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.721034]  krealloc_large_less_oob+0x20/0x38
[   29.721723]  kunit_try_run_case+0x14c/0x3d0
[   29.722318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.723050]  kthread+0x24c/0x2d0
[   29.724149]  ret_from_fork+0x10/0x20
[   29.724809] 
[   29.725151] The buggy address belongs to the physical page:
[   29.725791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.726704] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.727672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.728812] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.730194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.731595] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.732559] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.733371] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.734349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.735327] page dumped because: kasan: bad access detected
[   29.736432] 
[   29.736718] Memory state around the buggy address:
[   29.737206]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.737903]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.738743] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.740305]                                                  ^
[   29.741008]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.741891]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.742738] ==================================================================
[   29.814951] ==================================================================
[   29.816299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.818143] Write of size 1 at addr fff00000c644e0eb by task kunit_try_catch/151
[   29.819120] 
[   29.819398] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.820802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.821362] Hardware name: linux,dummy-virt (DT)
[   29.821957] Call trace:
[   29.822482]  show_stack+0x20/0x38 (C)
[   29.823106]  dump_stack_lvl+0x8c/0xd0
[   29.823816]  print_report+0x118/0x5e0
[   29.824318]  kasan_report+0xc8/0x118
[   29.825437]  __asan_report_store1_noabort+0x20/0x30
[   29.826095]  krealloc_less_oob_helper+0xa58/0xc50
[   29.826751]  krealloc_large_less_oob+0x20/0x38
[   29.828015]  kunit_try_run_case+0x14c/0x3d0
[   29.828555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.829350]  kthread+0x24c/0x2d0
[   29.829846]  ret_from_fork+0x10/0x20
[   29.830507] 
[   29.830839] The buggy address belongs to the physical page:
[   29.832303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.833204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.834139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.834999] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.836256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.837462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.838382] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.840104] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.841014] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.841836] page dumped because: kasan: bad access detected
[   29.842691] 
[   29.843048] Memory state around the buggy address:
[   29.844408]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.845303]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.846186] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.847069]                                                           ^
[   29.848396]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.849295]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.850168] ==================================================================
[   29.744669] ==================================================================
[   29.745743] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.747958] Write of size 1 at addr fff00000c644e0da by task kunit_try_catch/151
[   29.748698] 
[   29.749199] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.750426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.750903] Hardware name: linux,dummy-virt (DT)
[   29.752601] Call trace:
[   29.753008]  show_stack+0x20/0x38 (C)
[   29.753611]  dump_stack_lvl+0x8c/0xd0
[   29.754160]  print_report+0x118/0x5e0
[   29.754703]  kasan_report+0xc8/0x118
[   29.755346]  __asan_report_store1_noabort+0x20/0x30
[   29.756009]  krealloc_less_oob_helper+0xa80/0xc50
[   29.756730]  krealloc_large_less_oob+0x20/0x38
[   29.757803]  kunit_try_run_case+0x14c/0x3d0
[   29.758437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.759409]  kthread+0x24c/0x2d0
[   29.760399]  ret_from_fork+0x10/0x20
[   29.760974] 
[   29.761292] The buggy address belongs to the physical page:
[   29.761965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.762722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.764069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.765337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.766177] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.767156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.768197] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.769607] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.770908] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.771762] page dumped because: kasan: bad access detected
[   29.772443] 
[   29.772743] Memory state around the buggy address:
[   29.773803]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.774636]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.775931] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.776721]                                                     ^
[   29.777573]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.779068]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.780261] ==================================================================
[   29.549001] ==================================================================
[   29.549769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.551577] Write of size 1 at addr fff00000c09762eb by task kunit_try_catch/147
[   29.553269] 
[   29.553806] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.554978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.555494] Hardware name: linux,dummy-virt (DT)
[   29.556079] Call trace:
[   29.556525]  show_stack+0x20/0x38 (C)
[   29.557264]  dump_stack_lvl+0x8c/0xd0
[   29.558010]  print_report+0x118/0x5e0
[   29.558581]  kasan_report+0xc8/0x118
[   29.559151]  __asan_report_store1_noabort+0x20/0x30
[   29.559707]  krealloc_less_oob_helper+0xa58/0xc50
[   29.560459]  krealloc_less_oob+0x20/0x38
[   29.561082]  kunit_try_run_case+0x14c/0x3d0
[   29.561781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562518]  kthread+0x24c/0x2d0
[   29.563169]  ret_from_fork+0x10/0x20
[   29.563792] 
[   29.564126] Allocated by task 147:
[   29.564622]  kasan_save_stack+0x3c/0x68
[   29.565179]  kasan_save_track+0x20/0x40
[   29.565740]  kasan_save_alloc_info+0x40/0x58
[   29.566281]  __kasan_krealloc+0x118/0x178
[   29.566962]  krealloc_noprof+0x128/0x360
[   29.567543]  krealloc_less_oob_helper+0x168/0xc50
[   29.568227]  krealloc_less_oob+0x20/0x38
[   29.568799]  kunit_try_run_case+0x14c/0x3d0
[   29.569376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.570238]  kthread+0x24c/0x2d0
[   29.570724]  ret_from_fork+0x10/0x20
[   29.571374] 
[   29.571699] The buggy address belongs to the object at fff00000c0976200
[   29.571699]  which belongs to the cache kmalloc-256 of size 256
[   29.573176] The buggy address is located 34 bytes to the right of
[   29.573176]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.574468] 
[   29.574945] The buggy address belongs to the physical page:
[   29.575500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.576474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.577380] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.578234] page_type: f5(slab)
[   29.578763] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.579749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.580746] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.581785] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.582636] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.583548] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.584426] page dumped because: kasan: bad access detected
[   29.585129] 
[   29.585442] Memory state around the buggy address:
[   29.586126]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586992]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.587808] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.588619]                                                           ^
[   29.589477]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.590344]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.591187] ==================================================================
[   29.460976] ==================================================================
[   29.461681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.462296] Write of size 1 at addr fff00000c09762da by task kunit_try_catch/147
[   29.463105] 
[   29.463491] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.464606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.465310] Hardware name: linux,dummy-virt (DT)
[   29.466019] Call trace:
[   29.466401]  show_stack+0x20/0x38 (C)
[   29.467035]  dump_stack_lvl+0x8c/0xd0
[   29.467637]  print_report+0x118/0x5e0
[   29.468404]  kasan_report+0xc8/0x118
[   29.469000]  __asan_report_store1_noabort+0x20/0x30
[   29.469757]  krealloc_less_oob_helper+0xa80/0xc50
[   29.470480]  krealloc_less_oob+0x20/0x38
[   29.471184]  kunit_try_run_case+0x14c/0x3d0
[   29.471730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.472464]  kthread+0x24c/0x2d0
[   29.473079]  ret_from_fork+0x10/0x20
[   29.473702] 
[   29.474137] Allocated by task 147:
[   29.474685]  kasan_save_stack+0x3c/0x68
[   29.475322]  kasan_save_track+0x20/0x40
[   29.475813]  kasan_save_alloc_info+0x40/0x58
[   29.476448]  __kasan_krealloc+0x118/0x178
[   29.477141]  krealloc_noprof+0x128/0x360
[   29.477731]  krealloc_less_oob_helper+0x168/0xc50
[   29.478328]  krealloc_less_oob+0x20/0x38
[   29.478949]  kunit_try_run_case+0x14c/0x3d0
[   29.479568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.480325]  kthread+0x24c/0x2d0
[   29.480817]  ret_from_fork+0x10/0x20
[   29.481441] 
[   29.481890] The buggy address belongs to the object at fff00000c0976200
[   29.481890]  which belongs to the cache kmalloc-256 of size 256
[   29.483339] The buggy address is located 17 bytes to the right of
[   29.483339]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.484730] 
[   29.485048] The buggy address belongs to the physical page:
[   29.485811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.486742] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.487722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.488573] page_type: f5(slab)
[   29.489044] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.489942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.490930] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.492040] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.492866] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.493751] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.494799] page dumped because: kasan: bad access detected
[   29.495473] 
[   29.495816] Memory state around the buggy address:
[   29.496471]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.497524]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.498591] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.499572]                                                     ^
[   29.500507]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501479]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.502271] ==================================================================
[   29.503907] ==================================================================
[   29.505562] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.506665] Write of size 1 at addr fff00000c09762ea by task kunit_try_catch/147
[   29.507850] 
[   29.508294] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.509566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.510128] Hardware name: linux,dummy-virt (DT)
[   29.510682] Call trace:
[   29.511144]  show_stack+0x20/0x38 (C)
[   29.511702]  dump_stack_lvl+0x8c/0xd0
[   29.512820]  print_report+0x118/0x5e0
[   29.513687]  kasan_report+0xc8/0x118
[   29.514419]  __asan_report_store1_noabort+0x20/0x30
[   29.515264]  krealloc_less_oob_helper+0xae4/0xc50
[   29.516095]  krealloc_less_oob+0x20/0x38
[   29.516662]  kunit_try_run_case+0x14c/0x3d0
[   29.517236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.518084]  kthread+0x24c/0x2d0
[   29.518652]  ret_from_fork+0x10/0x20
[   29.519369] 
[   29.519609] Allocated by task 147:
[   29.520198]  kasan_save_stack+0x3c/0x68
[   29.520787]  kasan_save_track+0x20/0x40
[   29.521440]  kasan_save_alloc_info+0x40/0x58
[   29.522180]  __kasan_krealloc+0x118/0x178
[   29.522835]  krealloc_noprof+0x128/0x360
[   29.523447]  krealloc_less_oob_helper+0x168/0xc50
[   29.524121]  krealloc_less_oob+0x20/0x38
[   29.524724]  kunit_try_run_case+0x14c/0x3d0
[   29.525309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.526075]  kthread+0x24c/0x2d0
[   29.526653]  ret_from_fork+0x10/0x20
[   29.527182] 
[   29.527518] The buggy address belongs to the object at fff00000c0976200
[   29.527518]  which belongs to the cache kmalloc-256 of size 256
[   29.529020] The buggy address is located 33 bytes to the right of
[   29.529020]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.530431] 
[   29.530711] The buggy address belongs to the physical page:
[   29.531505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.532405] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.533331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.534153] page_type: f5(slab)
[   29.534684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.535563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.536583] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.537599] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.538535] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.539589] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.540541] page dumped because: kasan: bad access detected
[   29.541220] 
[   29.541555] Memory state around the buggy address:
[   29.542144]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.543059]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.543892] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.544734]                                                           ^
[   29.545639]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.546602]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.547513] ==================================================================
[   29.414662] ==================================================================
[   29.416408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.417304] Write of size 1 at addr fff00000c09762d0 by task kunit_try_catch/147
[   29.418103] 
[   29.419167] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.420541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.421096] Hardware name: linux,dummy-virt (DT)
[   29.421648] Call trace:
[   29.422781]  show_stack+0x20/0x38 (C)
[   29.423384]  dump_stack_lvl+0x8c/0xd0
[   29.423934]  print_report+0x118/0x5e0
[   29.424513]  kasan_report+0xc8/0x118
[   29.425394]  __asan_report_store1_noabort+0x20/0x30
[   29.426027]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.426663]  krealloc_less_oob+0x20/0x38
[   29.427682]  kunit_try_run_case+0x14c/0x3d0
[   29.428335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.429281]  kthread+0x24c/0x2d0
[   29.429997]  ret_from_fork+0x10/0x20
[   29.430650] 
[   29.431021] Allocated by task 147:
[   29.431712]  kasan_save_stack+0x3c/0x68
[   29.432900]  kasan_save_track+0x20/0x40
[   29.433518]  kasan_save_alloc_info+0x40/0x58
[   29.434205]  __kasan_krealloc+0x118/0x178
[   29.434841]  krealloc_noprof+0x128/0x360
[   29.435413]  krealloc_less_oob_helper+0x168/0xc50
[   29.436043]  krealloc_less_oob+0x20/0x38
[   29.436631]  kunit_try_run_case+0x14c/0x3d0
[   29.437223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.437978]  kthread+0x24c/0x2d0
[   29.438450]  ret_from_fork+0x10/0x20
[   29.439084] 
[   29.439491] The buggy address belongs to the object at fff00000c0976200
[   29.439491]  which belongs to the cache kmalloc-256 of size 256
[   29.440930] The buggy address is located 7 bytes to the right of
[   29.440930]  allocated 201-byte region [fff00000c0976200, fff00000c09762c9)
[   29.442280] 
[   29.442652] The buggy address belongs to the physical page:
[   29.443355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.444293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.445198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.446085] page_type: f5(slab)
[   29.446556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.447428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.448446] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.449410] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.450359] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.451302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.452190] page dumped because: kasan: bad access detected
[   29.452843] 
[   29.453197] Memory state around the buggy address:
[   29.453940]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454898]  fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.455692] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.456608]                                                  ^
[   29.457307]  fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458171]  fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.459132] ==================================================================
[   29.781608] ==================================================================
[   29.782433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.784090] Write of size 1 at addr fff00000c644e0ea by task kunit_try_catch/151
[   29.785052] 
[   29.785422] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.786600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.787130] Hardware name: linux,dummy-virt (DT)
[   29.788128] Call trace:
[   29.788449]  show_stack+0x20/0x38 (C)
[   29.789161]  dump_stack_lvl+0x8c/0xd0
[   29.789702]  print_report+0x118/0x5e0
[   29.790312]  kasan_report+0xc8/0x118
[   29.790863]  __asan_report_store1_noabort+0x20/0x30
[   29.792334]  krealloc_less_oob_helper+0xae4/0xc50
[   29.793028]  krealloc_large_less_oob+0x20/0x38
[   29.793657]  kunit_try_run_case+0x14c/0x3d0
[   29.794336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.795526]  kthread+0x24c/0x2d0
[   29.796163]  ret_from_fork+0x10/0x20
[   29.796740] 
[   29.797117] The buggy address belongs to the physical page:
[   29.797862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c
[   29.798766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.800001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.801040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.801841] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.803057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.804216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.805412] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000
[   29.806321] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.807120] page dumped because: kasan: bad access detected
[   29.807891] 
[   29.808190] Memory state around the buggy address:
[   29.809546]  fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.810183]  fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.810612] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   29.811035]                                                           ^
[   29.811416]  fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.811819]  fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.813448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.313080] ==================================================================
[   29.314262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.315141] Write of size 1 at addr fff00000c09760f0 by task kunit_try_catch/145
[   29.316547] 
[   29.316978] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.318215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.318831] Hardware name: linux,dummy-virt (DT)
[   29.320309] Call trace:
[   29.320717]  show_stack+0x20/0x38 (C)
[   29.321479]  dump_stack_lvl+0x8c/0xd0
[   29.322012]  print_report+0x118/0x5e0
[   29.322608]  kasan_report+0xc8/0x118
[   29.323158]  __asan_report_store1_noabort+0x20/0x30
[   29.324120]  krealloc_more_oob_helper+0x5c8/0x680
[   29.325163]  krealloc_more_oob+0x20/0x38
[   29.325783]  kunit_try_run_case+0x14c/0x3d0
[   29.326535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.327338]  kthread+0x24c/0x2d0
[   29.327805]  ret_from_fork+0x10/0x20
[   29.328415] 
[   29.328777] Allocated by task 145:
[   29.329718]  kasan_save_stack+0x3c/0x68
[   29.330311]  kasan_save_track+0x20/0x40
[   29.331055]  kasan_save_alloc_info+0x40/0x58
[   29.331976]  __kasan_krealloc+0x118/0x178
[   29.332543]  krealloc_noprof+0x128/0x360
[   29.333241]  krealloc_more_oob_helper+0x168/0x680
[   29.333896]  krealloc_more_oob+0x20/0x38
[   29.334455]  kunit_try_run_case+0x14c/0x3d0
[   29.335051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.336528]  kthread+0x24c/0x2d0
[   29.337084]  ret_from_fork+0x10/0x20
[   29.337666] 
[   29.338070] The buggy address belongs to the object at fff00000c0976000
[   29.338070]  which belongs to the cache kmalloc-256 of size 256
[   29.339271] The buggy address is located 5 bytes to the right of
[   29.339271]  allocated 235-byte region [fff00000c0976000, fff00000c09760eb)
[   29.341278] 
[   29.341626] The buggy address belongs to the physical page:
[   29.342492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.344004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.344776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.345758] page_type: f5(slab)
[   29.346324] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.347227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.348124] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.349056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.350188] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.351223] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.352761] page dumped because: kasan: bad access detected
[   29.353479] 
[   29.353765] Memory state around the buggy address:
[   29.354407]  fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.355119]  fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.356433] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.357314]                                                              ^
[   29.358147]  fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.359132]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.360909] ==================================================================
[   29.636408] ==================================================================
[   29.637191] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.637978] Write of size 1 at addr fff00000c64920f0 by task kunit_try_catch/149
[   29.638852] 
[   29.639208] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.640577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.641264] Hardware name: linux,dummy-virt (DT)
[   29.641869] Call trace:
[   29.642302]  show_stack+0x20/0x38 (C)
[   29.642774]  dump_stack_lvl+0x8c/0xd0
[   29.643465]  print_report+0x118/0x5e0
[   29.644026]  kasan_report+0xc8/0x118
[   29.644712]  __asan_report_store1_noabort+0x20/0x30
[   29.645408]  krealloc_more_oob_helper+0x5c8/0x680
[   29.645974]  krealloc_large_more_oob+0x20/0x38
[   29.646695]  kunit_try_run_case+0x14c/0x3d0
[   29.647391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.648103]  kthread+0x24c/0x2d0
[   29.648698]  ret_from_fork+0x10/0x20
[   29.649262] 
[   29.649617] The buggy address belongs to the physical page:
[   29.650395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490
[   29.651292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.652156] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.653074] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.654088] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.655015] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.655986] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.657075] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000
[   29.657967] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.658829] page dumped because: kasan: bad access detected
[   29.659495] 
[   29.659797] Memory state around the buggy address:
[   29.660407]  fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.661294]  fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.662261] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.663301]                                                              ^
[   29.664121]  fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.665043]  fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.665866] ==================================================================
[   29.260824] ==================================================================
[   29.262074] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.262988] Write of size 1 at addr fff00000c09760eb by task kunit_try_catch/145
[   29.263800] 
[   29.264277] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.266255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.267032] Hardware name: linux,dummy-virt (DT)
[   29.268075] Call trace:
[   29.268571]  show_stack+0x20/0x38 (C)
[   29.269196]  dump_stack_lvl+0x8c/0xd0
[   29.269770]  print_report+0x118/0x5e0
[   29.270382]  kasan_report+0xc8/0x118
[   29.271101]  __asan_report_store1_noabort+0x20/0x30
[   29.272023]  krealloc_more_oob_helper+0x614/0x680
[   29.272815]  krealloc_more_oob+0x20/0x38
[   29.273360]  kunit_try_run_case+0x14c/0x3d0
[   29.274508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.275313]  kthread+0x24c/0x2d0
[   29.276110]  ret_from_fork+0x10/0x20
[   29.276958] 
[   29.277330] Allocated by task 145:
[   29.277838]  kasan_save_stack+0x3c/0x68
[   29.278350]  kasan_save_track+0x20/0x40
[   29.279071]  kasan_save_alloc_info+0x40/0x58
[   29.280125]  __kasan_krealloc+0x118/0x178
[   29.281016]  krealloc_noprof+0x128/0x360
[   29.281610]  krealloc_more_oob_helper+0x168/0x680
[   29.282262]  krealloc_more_oob+0x20/0x38
[   29.283033]  kunit_try_run_case+0x14c/0x3d0
[   29.283652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.284665]  kthread+0x24c/0x2d0
[   29.285394]  ret_from_fork+0x10/0x20
[   29.285982] 
[   29.286312] The buggy address belongs to the object at fff00000c0976000
[   29.286312]  which belongs to the cache kmalloc-256 of size 256
[   29.288742] The buggy address is located 0 bytes to the right of
[   29.288742]  allocated 235-byte region [fff00000c0976000, fff00000c09760eb)
[   29.290120] 
[   29.290491] The buggy address belongs to the physical page:
[   29.291225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976
[   29.292631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.293505] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.294331] page_type: f5(slab)
[   29.294856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.295997] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.297226] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.298094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.299098] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000
[   29.300475] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.301361] page dumped because: kasan: bad access detected
[   29.302211] 
[   29.302706] Memory state around the buggy address:
[   29.303483]  fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304568]  fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.305810] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.306892]                                                           ^
[   29.308258]  fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.309352]  fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.310186] ==================================================================
[   29.601786] ==================================================================
[   29.602974] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.603845] Write of size 1 at addr fff00000c64920eb by task kunit_try_catch/149
[   29.604687] 
[   29.605146] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.606476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.606935] Hardware name: linux,dummy-virt (DT)
[   29.608532] Call trace:
[   29.608905]  show_stack+0x20/0x38 (C)
[   29.609611]  dump_stack_lvl+0x8c/0xd0
[   29.610104]  print_report+0x118/0x5e0
[   29.610733]  kasan_report+0xc8/0x118
[   29.611598]  __asan_report_store1_noabort+0x20/0x30
[   29.612270]  krealloc_more_oob_helper+0x614/0x680
[   29.613006]  krealloc_large_more_oob+0x20/0x38
[   29.613745]  kunit_try_run_case+0x14c/0x3d0
[   29.614344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.615178]  kthread+0x24c/0x2d0
[   29.615788]  ret_from_fork+0x10/0x20
[   29.616345] 
[   29.616766] The buggy address belongs to the physical page:
[   29.617312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490
[   29.618504] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.619477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.620393] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.621432] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.622332] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.623267] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.624190] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000
[   29.625058] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.625964] page dumped because: kasan: bad access detected
[   29.626665] 
[   29.627079] Memory state around the buggy address:
[   29.627671]  fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.628630]  fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.629575] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.630409]                                                           ^
[   29.631213]  fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.632095]  fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.633140] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.090504] ==================================================================
[   29.092057] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.093047] Write of size 1 at addr fff00000c649200a by task kunit_try_catch/135
[   29.094315] 
[   29.094807] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.096780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097407] Hardware name: linux,dummy-virt (DT)
[   29.098014] Call trace:
[   29.098405]  show_stack+0x20/0x38 (C)
[   29.098962]  dump_stack_lvl+0x8c/0xd0
[   29.100371]  print_report+0x118/0x5e0
[   29.101009]  kasan_report+0xc8/0x118
[   29.101715]  __asan_report_store1_noabort+0x20/0x30
[   29.102567]  kmalloc_large_oob_right+0x278/0x2b8
[   29.103477]  kunit_try_run_case+0x14c/0x3d0
[   29.104432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.105311]  kthread+0x24c/0x2d0
[   29.105942]  ret_from_fork+0x10/0x20
[   29.106593] 
[   29.107015] The buggy address belongs to the physical page:
[   29.108081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490
[   29.109046] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.110243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.111127] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.112329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.113261] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.114227] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.116128] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000
[   29.117003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.117836] page dumped because: kasan: bad access detected
[   29.118468] 
[   29.118769] Memory state around the buggy address:
[   29.119929]  fff00000c6491f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.120802]  fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.121696] >fff00000c6492000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.122574]                       ^
[   29.123116]  fff00000c6492080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.124406]  fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.125138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.038862] ==================================================================
[   29.040329] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.041554] Write of size 1 at addr fff00000c6489f00 by task kunit_try_catch/133
[   29.042390] 
[   29.042760] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   29.043959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.044488] Hardware name: linux,dummy-virt (DT)
[   29.045356] Call trace:
[   29.045838]  show_stack+0x20/0x38 (C)
[   29.046487]  dump_stack_lvl+0x8c/0xd0
[   29.047005]  print_report+0x118/0x5e0
[   29.047863]  kasan_report+0xc8/0x118
[   29.048442]  __asan_report_store1_noabort+0x20/0x30
[   29.049198]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.049936]  kunit_try_run_case+0x14c/0x3d0
[   29.050510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.051618]  kthread+0x24c/0x2d0
[   29.052126]  ret_from_fork+0x10/0x20
[   29.052682] 
[   29.053028] Allocated by task 133:
[   29.053438]  kasan_save_stack+0x3c/0x68
[   29.054200]  kasan_save_track+0x20/0x40
[   29.054779]  kasan_save_alloc_info+0x40/0x58
[   29.055421]  __kasan_kmalloc+0xd4/0xd8
[   29.056242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.056849]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.057553]  kunit_try_run_case+0x14c/0x3d0
[   29.058146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.059071]  kthread+0x24c/0x2d0
[   29.059994]  ret_from_fork+0x10/0x20
[   29.060588] 
[   29.060989] The buggy address belongs to the object at fff00000c6488000
[   29.060989]  which belongs to the cache kmalloc-8k of size 8192
[   29.062119] The buggy address is located 0 bytes to the right of
[   29.062119]  allocated 7936-byte region [fff00000c6488000, fff00000c6489f00)
[   29.063534] 
[   29.063850] The buggy address belongs to the physical page:
[   29.064480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106488
[   29.065470] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.066666] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.067515] page_type: f5(slab)
[   29.068246] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.069189] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.070094] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.070996] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.072155] head: 0bfffe0000000003 ffffc1ffc3192201 ffffffffffffffff 0000000000000000
[   29.073083] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.073967] page dumped because: kasan: bad access detected
[   29.074693] 
[   29.075028] Memory state around the buggy address:
[   29.075898]  fff00000c6489e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.076818]  fff00000c6489e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.077754] >fff00000c6489f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.078649]                    ^
[   29.079146]  fff00000c6489f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.080733]  fff00000c648a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.081504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   28.989574] ==================================================================
[   28.990386] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   28.991605] Write of size 1 at addr fff00000c62b1e78 by task kunit_try_catch/131
[   28.992458] 
[   28.992859] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.994112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.994698] Hardware name: linux,dummy-virt (DT)
[   28.995573] Call trace:
[   28.996251]  show_stack+0x20/0x38 (C)
[   28.996792]  dump_stack_lvl+0x8c/0xd0
[   28.997462]  print_report+0x118/0x5e0
[   28.998085]  kasan_report+0xc8/0x118
[   28.998586]  __asan_report_store1_noabort+0x20/0x30
[   28.999657]  kmalloc_track_caller_oob_right+0x420/0x490
[   29.000401]  kunit_try_run_case+0x14c/0x3d0
[   29.001050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.001865]  kthread+0x24c/0x2d0
[   29.002459]  ret_from_fork+0x10/0x20
[   29.003140] 
[   29.003668] Allocated by task 131:
[   29.004147]  kasan_save_stack+0x3c/0x68
[   29.004754]  kasan_save_track+0x20/0x40
[   29.005417]  kasan_save_alloc_info+0x40/0x58
[   29.005916]  __kasan_kmalloc+0xd4/0xd8
[   29.006562]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.007570]  kmalloc_track_caller_oob_right+0x184/0x490
[   29.008436]  kunit_try_run_case+0x14c/0x3d0
[   29.009007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.009637]  kthread+0x24c/0x2d0
[   29.010256]  ret_from_fork+0x10/0x20
[   29.010732] 
[   29.011155] The buggy address belongs to the object at fff00000c62b1e00
[   29.011155]  which belongs to the cache kmalloc-128 of size 128
[   29.013305] The buggy address is located 0 bytes to the right of
[   29.013305]  allocated 120-byte region [fff00000c62b1e00, fff00000c62b1e78)
[   29.014922] 
[   29.015520] The buggy address belongs to the physical page:
[   29.016340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b1
[   29.017373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.018255] page_type: f5(slab)
[   29.018902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.020185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.021056] page dumped because: kasan: bad access detected
[   29.021719] 
[   29.022036] Memory state around the buggy address:
[   29.022808]  fff00000c62b1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.023870]  fff00000c62b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.025312] >fff00000c62b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.026414]                                                                 ^
[   29.027605]  fff00000c62b1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.028757]  fff00000c62b1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.029648] ==================================================================
[   28.946624] ==================================================================
[   28.948146] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   28.949043] Write of size 1 at addr fff00000c62b1d78 by task kunit_try_catch/131
[   28.949897] 
[   28.950229] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.951409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.952205] Hardware name: linux,dummy-virt (DT)
[   28.952818] Call trace:
[   28.953301]  show_stack+0x20/0x38 (C)
[   28.953836]  dump_stack_lvl+0x8c/0xd0
[   28.954492]  print_report+0x118/0x5e0
[   28.955042]  kasan_report+0xc8/0x118
[   28.955745]  __asan_report_store1_noabort+0x20/0x30
[   28.956376]  kmalloc_track_caller_oob_right+0x414/0x490
[   28.957404]  kunit_try_run_case+0x14c/0x3d0
[   28.958160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.958836]  kthread+0x24c/0x2d0
[   28.959582]  ret_from_fork+0x10/0x20
[   28.960217] 
[   28.960544] Allocated by task 131:
[   28.961175]  kasan_save_stack+0x3c/0x68
[   28.961678]  kasan_save_track+0x20/0x40
[   28.962401]  kasan_save_alloc_info+0x40/0x58
[   28.962990]  __kasan_kmalloc+0xd4/0xd8
[   28.963960]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   28.964643]  kmalloc_track_caller_oob_right+0xa8/0x490
[   28.965632]  kunit_try_run_case+0x14c/0x3d0
[   28.966215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.966976]  kthread+0x24c/0x2d0
[   28.967640]  ret_from_fork+0x10/0x20
[   28.968851] 
[   28.969133] The buggy address belongs to the object at fff00000c62b1d00
[   28.969133]  which belongs to the cache kmalloc-128 of size 128
[   28.970477] The buggy address is located 0 bytes to the right of
[   28.970477]  allocated 120-byte region [fff00000c62b1d00, fff00000c62b1d78)
[   28.972065] 
[   28.972424] The buggy address belongs to the physical page:
[   28.973083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b1
[   28.974248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.975067] page_type: f5(slab)
[   28.975783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.976763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.977614] page dumped because: kasan: bad access detected
[   28.978226] 
[   28.978579] Memory state around the buggy address:
[   28.979612]  fff00000c62b1c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.980387]  fff00000c62b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.981322] >fff00000c62b1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.982219]                                                                 ^
[   28.983093]  fff00000c62b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.984278]  fff00000c62b1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.985116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   28.893670] ==================================================================
[   28.895133] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   28.896184] Read of size 1 at addr fff00000c64a9000 by task kunit_try_catch/129
[   28.897369] 
[   28.897746] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.898937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.899736] Hardware name: linux,dummy-virt (DT)
[   28.900420] Call trace:
[   28.900769]  show_stack+0x20/0x38 (C)
[   28.901375]  dump_stack_lvl+0x8c/0xd0
[   28.901908]  print_report+0x118/0x5e0
[   28.902568]  kasan_report+0xc8/0x118
[   28.903795]  __asan_report_load1_noabort+0x20/0x30
[   28.904375]  kmalloc_node_oob_right+0x2f4/0x330
[   28.905043]  kunit_try_run_case+0x14c/0x3d0
[   28.905701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.906321]  kthread+0x24c/0x2d0
[   28.907217]  ret_from_fork+0x10/0x20
[   28.907922] 
[   28.908338] Allocated by task 129:
[   28.908863]  kasan_save_stack+0x3c/0x68
[   28.909543]  kasan_save_track+0x20/0x40
[   28.910347]  kasan_save_alloc_info+0x40/0x58
[   28.910952]  __kasan_kmalloc+0xd4/0xd8
[   28.911422]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   28.912322]  kmalloc_node_oob_right+0xbc/0x330
[   28.912953]  kunit_try_run_case+0x14c/0x3d0
[   28.913646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.914730]  kthread+0x24c/0x2d0
[   28.915650]  ret_from_fork+0x10/0x20
[   28.916356] 
[   28.916691] The buggy address belongs to the object at fff00000c64a8000
[   28.916691]  which belongs to the cache kmalloc-4k of size 4096
[   28.918123] The buggy address is located 0 bytes to the right of
[   28.918123]  allocated 4096-byte region [fff00000c64a8000, fff00000c64a9000)
[   28.919527] 
[   28.920194] The buggy address belongs to the physical page:
[   28.920826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a8
[   28.922260] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.923183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.924397] page_type: f5(slab)
[   28.924846] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   28.925812] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   28.926702] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   28.927983] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   28.928906] head: 0bfffe0000000003 ffffc1ffc3192a01 ffffffffffffffff 0000000000000000
[   28.929783] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   28.930623] page dumped because: kasan: bad access detected
[   28.931695] 
[   28.931975] Memory state around the buggy address:
[   28.932590]  fff00000c64a8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.933447]  fff00000c64a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.934420] >fff00000c64a9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.935478]                    ^
[   28.936207]  fff00000c64a9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.936929]  fff00000c64a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.937863] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   28.842251] ==================================================================
[   28.843578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   28.844666] Read of size 1 at addr fff00000c5f6079f by task kunit_try_catch/127
[   28.846255] 
[   28.846610] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.847942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.848426] Hardware name: linux,dummy-virt (DT)
[   28.849038] Call trace:
[   28.849487]  show_stack+0x20/0x38 (C)
[   28.850102]  dump_stack_lvl+0x8c/0xd0
[   28.850612]  print_report+0x118/0x5e0
[   28.851273]  kasan_report+0xc8/0x118
[   28.851825]  __asan_report_load1_noabort+0x20/0x30
[   28.852515]  kmalloc_oob_left+0x2ec/0x320
[   28.853035]  kunit_try_run_case+0x14c/0x3d0
[   28.853715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.854420]  kthread+0x24c/0x2d0
[   28.855033]  ret_from_fork+0x10/0x20
[   28.855670] 
[   28.855996] Allocated by task 28:
[   28.856517]  kasan_save_stack+0x3c/0x68
[   28.857066]  kasan_save_track+0x20/0x40
[   28.857546]  kasan_save_alloc_info+0x40/0x58
[   28.858265]  __kasan_kmalloc+0xd4/0xd8
[   28.858853]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   28.859685]  kstrdup+0x54/0xc8
[   28.860224]  devtmpfs_work_loop+0x384/0x590
[   28.860892]  devtmpfsd+0x50/0x58
[   28.861372]  kthread+0x24c/0x2d0
[   28.861921]  ret_from_fork+0x10/0x20
[   28.862443] 
[   28.862773] Freed by task 28:
[   28.863366]  kasan_save_stack+0x3c/0x68
[   28.864013]  kasan_save_track+0x20/0x40
[   28.864636]  kasan_save_free_info+0x4c/0x78
[   28.865277]  __kasan_slab_free+0x6c/0x98
[   28.865739]  kfree+0x114/0x3c8
[   28.866340]  devtmpfs_work_loop+0x498/0x590
[   28.866988]  devtmpfsd+0x50/0x58
[   28.867467]  kthread+0x24c/0x2d0
[   28.867937]  ret_from_fork+0x10/0x20
[   28.868581] 
[   28.868964] The buggy address belongs to the object at fff00000c5f60780
[   28.868964]  which belongs to the cache kmalloc-16 of size 16
[   28.870401] The buggy address is located 15 bytes to the right of
[   28.870401]  allocated 16-byte region [fff00000c5f60780, fff00000c5f60790)
[   28.871841] 
[   28.872379] The buggy address belongs to the physical page:
[   28.873095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f60
[   28.874007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.874817] page_type: f5(slab)
[   28.875317] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.876218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.877061] page dumped because: kasan: bad access detected
[   28.877807] 
[   28.878267] Memory state around the buggy address:
[   28.878804]  fff00000c5f60680: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.879772]  fff00000c5f60700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.880616] >fff00000c5f60780: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   28.881457]                             ^
[   28.881987]  fff00000c5f60800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882808]  fff00000c5f60880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.883735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   28.794488] ==================================================================
[   28.795337] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   28.796261] Read of size 1 at addr fff00000c6397d80 by task kunit_try_catch/125
[   28.797233] 
[   28.797670] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.798824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.799863] Hardware name: linux,dummy-virt (DT)
[   28.800575] Call trace:
[   28.801049]  show_stack+0x20/0x38 (C)
[   28.801566]  dump_stack_lvl+0x8c/0xd0
[   28.802251]  print_report+0x118/0x5e0
[   28.802826]  kasan_report+0xc8/0x118
[   28.803377]  __asan_report_load1_noabort+0x20/0x30
[   28.804723]  kmalloc_oob_right+0x5d0/0x660
[   28.805411]  kunit_try_run_case+0x14c/0x3d0
[   28.806073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.806805]  kthread+0x24c/0x2d0
[   28.807450]  ret_from_fork+0x10/0x20
[   28.807992] 
[   28.808357] Allocated by task 125:
[   28.808836]  kasan_save_stack+0x3c/0x68
[   28.810400]  kasan_save_track+0x20/0x40
[   28.810973]  kasan_save_alloc_info+0x40/0x58
[   28.811775]  __kasan_kmalloc+0xd4/0xd8
[   28.812383]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.813023]  kmalloc_oob_right+0xb0/0x660
[   28.813718]  kunit_try_run_case+0x14c/0x3d0
[   28.814482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.815704]  kthread+0x24c/0x2d0
[   28.816147]  ret_from_fork+0x10/0x20
[   28.816649] 
[   28.817022] The buggy address belongs to the object at fff00000c6397d00
[   28.817022]  which belongs to the cache kmalloc-128 of size 128
[   28.818408] The buggy address is located 13 bytes to the right of
[   28.818408]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.819835] 
[   28.820542] The buggy address belongs to the physical page:
[   28.821254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.822307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.823115] page_type: f5(slab)
[   28.824295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.825231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.826115] page dumped because: kasan: bad access detected
[   28.826734] 
[   28.827096] Memory state around the buggy address:
[   28.827711]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.828964]  fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.829794] >fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.830847]                    ^
[   28.831675]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.832574]  fff00000c6397e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.833524] ==================================================================
[   28.701270] ==================================================================
[   28.702711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.704855] Write of size 1 at addr fff00000c6397d73 by task kunit_try_catch/125
[   28.705762] 
[   28.707551] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241205 #1
[   28.708952] Tainted: [N]=TEST
[   28.709452] Hardware name: linux,dummy-virt (DT)
[   28.710562] Call trace:
[   28.711255]  show_stack+0x20/0x38 (C)
[   28.712295]  dump_stack_lvl+0x8c/0xd0
[   28.712895]  print_report+0x118/0x5e0
[   28.713428]  kasan_report+0xc8/0x118
[   28.714043]  __asan_report_store1_noabort+0x20/0x30
[   28.714770]  kmalloc_oob_right+0x5a4/0x660
[   28.715697]  kunit_try_run_case+0x14c/0x3d0
[   28.716149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.716920]  kthread+0x24c/0x2d0
[   28.717383]  ret_from_fork+0x10/0x20
[   28.718308] 
[   28.718696] Allocated by task 125:
[   28.719367]  kasan_save_stack+0x3c/0x68
[   28.720296]  kasan_save_track+0x20/0x40
[   28.720731]  kasan_save_alloc_info+0x40/0x58
[   28.721318]  __kasan_kmalloc+0xd4/0xd8
[   28.721925]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.722506]  kmalloc_oob_right+0xb0/0x660
[   28.723160]  kunit_try_run_case+0x14c/0x3d0
[   28.723783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.725250]  kthread+0x24c/0x2d0
[   28.725742]  ret_from_fork+0x10/0x20
[   28.726398] 
[   28.726802] The buggy address belongs to the object at fff00000c6397d00
[   28.726802]  which belongs to the cache kmalloc-128 of size 128
[   28.728685] The buggy address is located 0 bytes to the right of
[   28.728685]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.730225] 
[   28.730705] The buggy address belongs to the physical page:
[   28.732141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.733402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.734727] page_type: f5(slab)
[   28.735944] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.736868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.737943] page dumped because: kasan: bad access detected
[   28.738677] 
[   28.739023] Memory state around the buggy address:
[   28.740359]  fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.741292]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742239] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.743563]                                                              ^
[   28.744650]  fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.745406]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.746338] ==================================================================
[   28.751248] ==================================================================
[   28.752676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   28.753530] Write of size 1 at addr fff00000c6397d78 by task kunit_try_catch/125
[   28.754423] 
[   28.754765] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.756795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.757299] Hardware name: linux,dummy-virt (DT)
[   28.757925] Call trace:
[   28.758297]  show_stack+0x20/0x38 (C)
[   28.759024]  dump_stack_lvl+0x8c/0xd0
[   28.759667]  print_report+0x118/0x5e0
[   28.760356]  kasan_report+0xc8/0x118
[   28.761295]  __asan_report_store1_noabort+0x20/0x30
[   28.761866]  kmalloc_oob_right+0x538/0x660
[   28.762621]  kunit_try_run_case+0x14c/0x3d0
[   28.763803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.764497]  kthread+0x24c/0x2d0
[   28.765073]  ret_from_fork+0x10/0x20
[   28.765603] 
[   28.765995] Allocated by task 125:
[   28.766542]  kasan_save_stack+0x3c/0x68
[   28.767085]  kasan_save_track+0x20/0x40
[   28.768483]  kasan_save_alloc_info+0x40/0x58
[   28.769323]  __kasan_kmalloc+0xd4/0xd8
[   28.769932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.770549]  kmalloc_oob_right+0xb0/0x660
[   28.771145]  kunit_try_run_case+0x14c/0x3d0
[   28.771994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.773127]  kthread+0x24c/0x2d0
[   28.773685]  ret_from_fork+0x10/0x20
[   28.774282] 
[   28.774666] The buggy address belongs to the object at fff00000c6397d00
[   28.774666]  which belongs to the cache kmalloc-128 of size 128
[   28.776385] The buggy address is located 5 bytes to the right of
[   28.776385]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.777841] 
[   28.778635] The buggy address belongs to the physical page:
[   28.779858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.781039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.781903] page_type: f5(slab)
[   28.782375] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.783772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.784530] page dumped because: kasan: bad access detected
[   28.784863] 
[   28.785508] Memory state around the buggy address:
[   28.786150]  fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.786979]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.788317] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.789170]                                                                 ^
[   28.790034]  fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790934]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.791972] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  143.578026] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  143.579010] Modules linked in:
[  143.580853] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[  143.581999] Tainted: [B]=BAD_PAGE, [N]=TEST
[  143.582667] Hardware name: linux,dummy-virt (DT)
[  143.583644] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  143.584912] pc : kunit_test_null_dereference+0x70/0x170
[  143.585613] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  143.586431] sp : ffff800083487dc0
[  143.586867] x29: ffff800083487e20 x28: 0000000000000000 x27: 0000000000000000
[  143.588360] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000cbfab400
[  143.589417] x23: ffffa4b3319c3020 x22: ffffa4b3319cbbe0 x21: fff00000cbfab408
[  143.590465] x20: 1ffff00010690fb8 x19: ffff8000800879f0 x18: 00000000248aa35a
[  143.591777] x17: 0000000000000001 x16: fff00000da500d60 x15: 0000000000000000
[  143.593500] x14: 1ffe00001b4a0190 x13: 0000000000000000 x12: fffd800019928b3b
[  143.594615] x11: 1ffe000019928b3a x10: fffd800019928b3a x9 : ffffa4b3319c30a8
[  143.596335] x8 : ffff800083487cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  143.597524] x5 : ffff700010690fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  143.598378] x2 : dfff800000000000 x1 : fff00000cc945100 x0 : ffff8000800879f0
[  143.599721] Call trace:
[  143.600523]  kunit_test_null_dereference+0x70/0x170 (P)
[  143.601572]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  143.602247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  143.603057]  kthread+0x24c/0x2d0
[  143.603829]  ret_from_fork+0x10/0x20
[  143.605221] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  143.606513] ---[ end trace 0000000000000000 ]---