Hay
Date
Dec. 6, 2024, 3:11 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   64.504200] ==================================================================
[   64.505004] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.505004] 
[   64.505759] Use-after-free read at 0x00000000ec28697c (in kfence-#212):
[   64.506943]  test_krealloc+0x51c/0x830
[   64.507505]  test_krealloc+0x458/0x830
[   64.508143]  kunit_try_run_case+0x14c/0x3d0
[   64.508828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.509432]  kthread+0x24c/0x2d0
[   64.510045]  ret_from_fork+0x10/0x20
[   64.510676] 
[   64.511072] kfence-#212: 0x00000000ec28697c-0x00000000b31e3a5c, size=32, cache=kmalloc-32
[   64.511072] 
[   64.512226] allocated by task 326 on cpu 1 at 64.502999s (0.009215s ago):
[   64.513054]  test_alloc+0x298/0x620
[   64.513667]  test_krealloc+0xc0/0x830
[   64.514279]  kunit_try_run_case+0x14c/0x3d0
[   64.514925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.515551]  kthread+0x24c/0x2d0
[   64.516160]  ret_from_fork+0x10/0x20
[   64.516783] 
[   64.517154] freed by task 326 on cpu 1 at 64.503556s (0.013586s ago):
[   64.517926]  krealloc_noprof+0x148/0x360
[   64.518578]  test_krealloc+0x1dc/0x830
[   64.519173]  kunit_try_run_case+0x14c/0x3d0
[   64.519830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.520620]  kthread+0x24c/0x2d0
[   64.521125]  ret_from_fork+0x10/0x20
[   64.521765] 
[   64.522186] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   64.523391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.524018] Hardware name: linux,dummy-virt (DT)
[   64.524653] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   64.333815] ==================================================================
[   64.334583] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.334583] 
[   64.335527] Use-after-free read at 0x000000004ca53444 (in kfence-#210):
[   64.336211]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.336798]  test_memcache_typesafe_by_rcu+0x260/0x560
[   64.337574]  kunit_try_run_case+0x14c/0x3d0
[   64.338139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.338889]  kthread+0x24c/0x2d0
[   64.339447]  ret_from_fork+0x10/0x20
[   64.340054] 
[   64.340356] kfence-#210: 0x000000004ca53444-0x0000000081aa9c1a, size=32, cache=test
[   64.340356] 
[   64.341443] allocated by task 324 on cpu 0 at 64.295407s (0.046023s ago):
[   64.342320]  test_alloc+0x22c/0x620
[   64.342933]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.343611]  kunit_try_run_case+0x14c/0x3d0
[   64.344281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.345055]  kthread+0x24c/0x2d0
[   64.345615]  ret_from_fork+0x10/0x20
[   64.346245] 
[   64.346602] freed by task 324 on cpu 0 at 64.295638s (0.050951s ago):
[   64.347460]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.348211]  kunit_try_run_case+0x14c/0x3d0
[   64.348872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.349656]  kthread+0x24c/0x2d0
[   64.350246]  ret_from_fork+0x10/0x20
[   64.350784] 
[   64.351206] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   64.352237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.352882] Hardware name: linux,dummy-virt (DT)
[   64.353558] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   45.604002] ==================================================================
[   45.605235] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   45.605235] 
[   45.606240] Invalid read at 0x000000000b98070f:
[   45.608289]  test_invalid_access+0xdc/0x1f0
[   45.608916]  kunit_try_run_case+0x14c/0x3d0
[   45.609576]  kunit_try_run_case+0x14c/0x3d0
[   45.610330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.611929]  kthread+0x24c/0x2d0
[   45.612599]  ret_from_fork+0x10/0x20
[   45.613335] 
[   45.613883] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   45.615351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.616003] Hardware name: linux,dummy-virt (DT)
[   45.616711] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   39.127484] ==================================================================
[   39.128310] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   39.128310] 
[   39.129088] Out-of-bounds write at 0x00000000f0d6522c (1B left of kfence-#146):
[   39.130029]  test_out_of_bounds_write+0x100/0x240
[   39.131471]  test_out_of_bounds_write+0xc8/0x240
[   39.132121]  kunit_try_run_case+0x14c/0x3d0
[   39.132754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.133528]  kthread+0x24c/0x2d0
[   39.134021]  ret_from_fork+0x10/0x20
[   39.134655] 
[   39.134996] kfence-#146: 0x0000000003ea21d4-0x00000000d6efede0, size=32, cache=kmalloc-32
[   39.134996] 
[   39.136099] allocated by task 280 on cpu 1 at 39.127194s (0.008894s ago):
[   39.136947]  test_alloc+0x298/0x620
[   39.137461]  test_out_of_bounds_write+0xc8/0x240
[   39.138194]  kunit_try_run_case+0x14c/0x3d0
[   39.138772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.139587]  kthread+0x24c/0x2d0
[   39.140179]  ret_from_fork+0x10/0x20
[   39.140787] 
[   39.141205] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.142356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.142927] Hardware name: linux,dummy-virt (DT)
[   39.143543] ==================================================================
[   39.231353] ==================================================================
[   39.232122] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   39.232122] 
[   39.233054] Out-of-bounds write at 0x00000000c4b497c3 (1B left of kfence-#147):
[   39.234060]  test_out_of_bounds_write+0x100/0x240
[   39.234856]  test_out_of_bounds_write+0xc8/0x240
[   39.235609]  kunit_try_run_case+0x14c/0x3d0
[   39.236218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.237040]  kthread+0x24c/0x2d0
[   39.237583]  ret_from_fork+0x10/0x20
[   39.238245] 
[   39.238678] kfence-#147: 0x00000000ed129c7f-0x00000000a24848fa, size=32, cache=test
[   39.238678] 
[   39.239576] allocated by task 282 on cpu 0 at 39.231166s (0.008397s ago):
[   39.240559]  test_alloc+0x22c/0x620
[   39.241200]  test_out_of_bounds_write+0xc8/0x240
[   39.241918]  kunit_try_run_case+0x14c/0x3d0
[   39.242545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.243359]  kthread+0x24c/0x2d0
[   39.243876]  ret_from_fork+0x10/0x20
[   39.244539] 
[   39.244944] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.246067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.246739] Hardware name: linux,dummy-virt (DT)
[   39.247303] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   45.367645] ==================================================================
[   45.368406] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.368406] 
[   45.369203] Corrupted memory at 0x000000003320c25c [ ! . . . . . . . . . . . . . . . ] (in kfence-#206):
[   45.371970]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.372624]  kunit_try_run_case+0x14c/0x3d0
[   45.373219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.373883]  kthread+0x24c/0x2d0
[   45.374473]  ret_from_fork+0x10/0x20
[   45.375041] 
[   45.375373] kfence-#206: 0x000000002d1f07e8-0x000000005255f76c, size=73, cache=kmalloc-96
[   45.375373] 
[   45.376427] allocated by task 314 on cpu 0 at 45.367126s (0.009290s ago):
[   45.377226]  test_alloc+0x298/0x620
[   45.377829]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   45.378481]  kunit_try_run_case+0x14c/0x3d0
[   45.379070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.379857]  kthread+0x24c/0x2d0
[   45.380435]  ret_from_fork+0x10/0x20
[   45.381060] 
[   45.381428] freed by task 314 on cpu 0 at 45.367380s (0.014037s ago):
[   45.382149]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.382914]  kunit_try_run_case+0x14c/0x3d0
[   45.383583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.384351]  kthread+0x24c/0x2d0
[   45.384941]  ret_from_fork+0x10/0x20
[   45.385488] 
[   45.385949] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   45.387104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.387611] Hardware name: linux,dummy-virt (DT)
[   45.388265] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   45.263502] ==================================================================
[   45.264355] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   45.264355] 
[   45.265329] Out-of-bounds read at 0x0000000016673cbe (105B right of kfence-#205):
[   45.266312]  test_kmalloc_aligned_oob_read+0x238/0x468
[   45.267017]  test_kmalloc_aligned_oob_read+0x100/0x468
[   45.267801]  kunit_try_run_case+0x14c/0x3d0
[   45.268487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.269211]  kthread+0x24c/0x2d0
[   45.269823]  ret_from_fork+0x10/0x20
[   45.270398] 
[   45.270800] kfence-#205: 0x0000000006bd45fe-0x00000000aef7a023, size=73, cache=kmalloc-96
[   45.270800] 
[   45.271798] allocated by task 312 on cpu 1 at 45.263033s (0.008753s ago):
[   45.272746]  test_alloc+0x298/0x620
[   45.273259]  test_kmalloc_aligned_oob_read+0x100/0x468
[   45.274040]  kunit_try_run_case+0x14c/0x3d0
[   45.275478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.276826]  kthread+0x24c/0x2d0
[   45.277751]  ret_from_fork+0x10/0x20
[   45.278197] 
[   45.278562] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   45.279410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.281001] Hardware name: linux,dummy-virt (DT)
[   45.281706] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   41.415355] ==================================================================
[   41.416036] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   41.416036] 
[   41.416875] Corrupted memory at 0x0000000009f227a1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[   41.419600]  test_corruption+0x120/0x378
[   41.420178]  kunit_try_run_case+0x14c/0x3d0
[   41.420859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.421609]  kthread+0x24c/0x2d0
[   41.422204]  ret_from_fork+0x10/0x20
[   41.422799] 
[   41.423188] kfence-#168: 0x00000000928b8394-0x00000000476e3f3e, size=32, cache=test
[   41.423188] 
[   41.424090] allocated by task 302 on cpu 0 at 41.415081s (0.008997s ago):
[   41.425011]  test_alloc+0x22c/0x620
[   41.425506]  test_corruption+0xdc/0x378
[   41.426029]  kunit_try_run_case+0x14c/0x3d0
[   41.426699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.427320]  kthread+0x24c/0x2d0
[   41.427894]  ret_from_fork+0x10/0x20
[   41.428364] 
[   41.428750] freed by task 302 on cpu 0 at 41.415187s (0.013550s ago):
[   41.429529]  test_corruption+0x120/0x378
[   41.430161]  kunit_try_run_case+0x14c/0x3d0
[   41.430848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.431611]  kthread+0x24c/0x2d0
[   41.432172]  ret_from_fork+0x10/0x20
[   41.432673] 
[   41.433086] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   41.434309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.434838] Hardware name: linux,dummy-virt (DT)
[   41.435476] ==================================================================
[   41.103615] ==================================================================
[   41.104353] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   41.104353] 
[   41.105162] Corrupted memory at 0x00000000712da544 [ ! ] (in kfence-#165):
[   41.106454]  test_corruption+0x284/0x378
[   41.107090]  kunit_try_run_case+0x14c/0x3d0
[   41.107718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.108469]  kthread+0x24c/0x2d0
[   41.109063]  ret_from_fork+0x10/0x20
[   41.109583] 
[   41.109930] kfence-#165: 0x000000004de98b11-0x000000002bdcccf8, size=32, cache=kmalloc-32
[   41.109930] 
[   41.111045] allocated by task 300 on cpu 0 at 41.103077s (0.007956s ago):
[   41.111733]  test_alloc+0x298/0x620
[   41.112306]  test_corruption+0x198/0x378
[   41.112950]  kunit_try_run_case+0x14c/0x3d0
[   41.113634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.114230]  kthread+0x24c/0x2d0
[   41.114832]  ret_from_fork+0x10/0x20
[   41.115427] 
[   41.115852] freed by task 300 on cpu 0 at 41.103246s (0.012593s ago):
[   41.116650]  test_corruption+0x284/0x378
[   41.117241]  kunit_try_run_case+0x14c/0x3d0
[   41.117905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.118679]  kthread+0x24c/0x2d0
[   41.119184]  ret_from_fork+0x10/0x20
[   41.119801] 
[   41.120151] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   41.121227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.121760] Hardware name: linux,dummy-virt (DT)
[   41.122423] ==================================================================
[   40.895608] ==================================================================
[   40.896445] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   40.896445] 
[   40.897334] Corrupted memory at 0x00000000e48ee75d [ ! . . . . . . . . . . . . . . . ] (in kfence-#163):
[   40.901391]  test_corruption+0x278/0x378
[   40.902046]  kunit_try_run_case+0x14c/0x3d0
[   40.902642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.903353]  kthread+0x24c/0x2d0
[   40.903953]  ret_from_fork+0x10/0x20
[   40.904481] 
[   40.904876] kfence-#163: 0x00000000f14d94c7-0x00000000ba9d7e53, size=32, cache=kmalloc-32
[   40.904876] 
[   40.905969] allocated by task 300 on cpu 0 at 40.895052s (0.010905s ago):
[   40.906714]  test_alloc+0x298/0x620
[   40.907312]  test_corruption+0xdc/0x378
[   40.907838]  kunit_try_run_case+0x14c/0x3d0
[   40.908453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.909188]  kthread+0x24c/0x2d0
[   40.909776]  ret_from_fork+0x10/0x20
[   40.910298] 
[   40.910684] freed by task 300 on cpu 0 at 40.895219s (0.015452s ago):
[   40.911434]  test_corruption+0x278/0x378
[   40.912001]  kunit_try_run_case+0x14c/0x3d0
[   40.912661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.913427]  kthread+0x24c/0x2d0
[   40.914025]  ret_from_fork+0x10/0x20
[   40.914562] 
[   40.914916] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   40.915993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.916547] Hardware name: linux,dummy-virt (DT)
[   40.917115] ==================================================================
[   41.623244] ==================================================================
[   41.624040] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   41.624040] 
[   41.624785] Corrupted memory at 0x000000008a6f21bb [ ! ] (in kfence-#170):
[   41.625957]  test_corruption+0x1d8/0x378
[   41.626548]  kunit_try_run_case+0x14c/0x3d0
[   41.627225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.627788]  kthread+0x24c/0x2d0
[   41.628372]  ret_from_fork+0x10/0x20
[   41.628977] 
[   41.629340] kfence-#170: 0x0000000074b34bb6-0x00000000c08be4ed, size=32, cache=test
[   41.629340] 
[   41.630344] allocated by task 302 on cpu 0 at 41.622972s (0.007361s ago):
[   41.631284]  test_alloc+0x22c/0x620
[   41.631853]  test_corruption+0x198/0x378
[   41.632400]  kunit_try_run_case+0x14c/0x3d0
[   41.633007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.633588]  kthread+0x24c/0x2d0
[   41.634161]  ret_from_fork+0x10/0x20
[   41.634787] 
[   41.635176] freed by task 302 on cpu 0 at 41.623068s (0.012095s ago):
[   41.635992]  test_corruption+0x1d8/0x378
[   41.636640]  kunit_try_run_case+0x14c/0x3d0
[   41.637305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.637973]  kthread+0x24c/0x2d0
[   41.638458]  ret_from_fork+0x10/0x20
[   41.639085] 
[   41.639493] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   41.640587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.641189] Hardware name: linux,dummy-virt (DT)
[   41.641838] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   40.063231] ==================================================================
[   40.064072] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   40.064072] 
[   40.064771] Invalid free of 0x0000000069c1bae8 (in kfence-#155):
[   40.065569]  test_invalid_addr_free+0xec/0x238
[   40.066220]  kunit_try_run_case+0x14c/0x3d0
[   40.066907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.067476]  kthread+0x24c/0x2d0
[   40.068089]  ret_from_fork+0x10/0x20
[   40.068722] 
[   40.069099] kfence-#155: 0x0000000001eb12f2-0x000000000b799322, size=32, cache=test
[   40.069099] 
[   40.070047] allocated by task 298 on cpu 0 at 40.063026s (0.007009s ago):
[   40.070900]  test_alloc+0x22c/0x620
[   40.071402]  test_invalid_addr_free+0xd4/0x238
[   40.072103]  kunit_try_run_case+0x14c/0x3d0
[   40.072767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.073430]  kthread+0x24c/0x2d0
[   40.074011]  ret_from_fork+0x10/0x20
[   40.074632] 
[   40.074993] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   40.076253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.076811] Hardware name: linux,dummy-virt (DT)
[   40.077455] ==================================================================
[   39.959243] ==================================================================
[   39.960118] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.960118] 
[   39.960875] Invalid free of 0x0000000008728172 (in kfence-#154):
[   39.961707]  test_invalid_addr_free+0x1ac/0x238
[   39.962794]  kunit_try_run_case+0x14c/0x3d0
[   39.963445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.964232]  kthread+0x24c/0x2d0
[   39.964758]  ret_from_fork+0x10/0x20
[   39.965360] 
[   39.965762] kfence-#154: 0x00000000177c53c1-0x000000007b3f5005, size=32, cache=kmalloc-32
[   39.965762] 
[   39.966799] allocated by task 296 on cpu 1 at 39.958997s (0.007790s ago):
[   39.967754]  test_alloc+0x298/0x620
[   39.968223]  test_invalid_addr_free+0xd4/0x238
[   39.968944]  kunit_try_run_case+0x14c/0x3d0
[   39.969632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.970315]  kthread+0x24c/0x2d0
[   39.970928]  ret_from_fork+0x10/0x20
[   39.971554] 
[   39.971967] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.973116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.973762] Hardware name: linux,dummy-virt (DT)
[   39.974300] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   39.751740] ==================================================================
[   39.752619] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   39.752619] 
[   39.753311] Invalid free of 0x000000001bbbfa2f (in kfence-#152):
[   39.754402]  test_double_free+0x1bc/0x238
[   39.755112]  kunit_try_run_case+0x14c/0x3d0
[   39.755826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.756564]  kthread+0x24c/0x2d0
[   39.757101]  ret_from_fork+0x10/0x20
[   39.757699] 
[   39.758047] kfence-#152: 0x000000001bbbfa2f-0x000000008e59599b, size=32, cache=kmalloc-32
[   39.758047] 
[   39.759038] allocated by task 292 on cpu 1 at 39.751164s (0.007862s ago):
[   39.759999]  test_alloc+0x298/0x620
[   39.760568]  test_double_free+0xd4/0x238
[   39.761200]  kunit_try_run_case+0x14c/0x3d0
[   39.761894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.762528]  kthread+0x24c/0x2d0
[   39.763128]  ret_from_fork+0x10/0x20
[   39.763763] 
[   39.764091] freed by task 292 on cpu 1 at 39.751291s (0.012788s ago):
[   39.765023]  test_double_free+0x1ac/0x238
[   39.765576]  kunit_try_run_case+0x14c/0x3d0
[   39.766250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.766893]  kthread+0x24c/0x2d0
[   39.767478]  ret_from_fork+0x10/0x20
[   39.768050] 
[   39.768472] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.769585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.770197] Hardware name: linux,dummy-virt (DT)
[   39.770890] ==================================================================
[   39.855503] ==================================================================
[   39.856315] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   39.856315] 
[   39.857020] Invalid free of 0x0000000079e1b88d (in kfence-#153):
[   39.857817]  test_double_free+0x100/0x238
[   39.858392]  kunit_try_run_case+0x14c/0x3d0
[   39.858988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.859769]  kthread+0x24c/0x2d0
[   39.860231]  ret_from_fork+0x10/0x20
[   39.860854] 
[   39.861226] kfence-#153: 0x0000000079e1b88d-0x00000000e2a57187, size=32, cache=test
[   39.861226] 
[   39.862108] allocated by task 294 on cpu 0 at 39.855098s (0.006998s ago):
[   39.862965]  test_alloc+0x22c/0x620
[   39.863580]  test_double_free+0xd4/0x238
[   39.864199]  kunit_try_run_case+0x14c/0x3d0
[   39.864878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.865464]  kthread+0x24c/0x2d0
[   39.866021]  ret_from_fork+0x10/0x20
[   39.866637] 
[   39.867023] freed by task 294 on cpu 0 at 39.855205s (0.011805s ago):
[   39.867755]  test_double_free+0xf0/0x238
[   39.868371]  kunit_try_run_case+0x14c/0x3d0
[   39.869052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.869832]  kthread+0x24c/0x2d0
[   39.870329]  ret_from_fork+0x10/0x20
[   39.870811] 
[   39.871227] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.872476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.873107] Hardware name: linux,dummy-virt (DT)
[   39.873676] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   39.335854] ==================================================================
[   39.336716] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   39.336716] 
[   39.337947] Use-after-free read at 0x00000000f1237827 (in kfence-#148):
[   39.339201]  test_use_after_free_read+0x114/0x248
[   39.339800]  test_use_after_free_read+0x1c0/0x248
[   39.340550]  kunit_try_run_case+0x14c/0x3d0
[   39.341214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.342043]  kthread+0x24c/0x2d0
[   39.342592]  ret_from_fork+0x10/0x20
[   39.343127] 
[   39.343506] kfence-#148: 0x00000000f1237827-0x0000000096aafa70, size=32, cache=kmalloc-32
[   39.343506] 
[   39.344481] allocated by task 284 on cpu 1 at 39.335195s (0.009275s ago):
[   39.345422]  test_alloc+0x298/0x620
[   39.345908]  test_use_after_free_read+0xd0/0x248
[   39.346632]  kunit_try_run_case+0x14c/0x3d0
[   39.347288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.347900]  kthread+0x24c/0x2d0
[   39.348487]  ret_from_fork+0x10/0x20
[   39.349150] 
[   39.349832] freed by task 284 on cpu 1 at 39.335327s (0.014295s ago):
[   39.350853]  test_use_after_free_read+0x1c0/0x248
[   39.351578]  kunit_try_run_case+0x14c/0x3d0
[   39.352197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.352942]  kthread+0x24c/0x2d0
[   39.353476]  ret_from_fork+0x10/0x20
[   39.354088] 
[   39.354476] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.355609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.356231] Hardware name: linux,dummy-virt (DT)
[   39.356832] ==================================================================
[   39.439651] ==================================================================
[   39.440445] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   39.440445] 
[   39.441405] Use-after-free read at 0x0000000027a1664e (in kfence-#149):
[   39.442432]  test_use_after_free_read+0x114/0x248
[   39.443146]  test_use_after_free_read+0xf0/0x248
[   39.444095]  kunit_try_run_case+0x14c/0x3d0
[   39.444816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.445677]  kthread+0x24c/0x2d0
[   39.446283]  ret_from_fork+0x10/0x20
[   39.447066] 
[   39.447435] kfence-#149: 0x0000000027a1664e-0x00000000c336d6b1, size=32, cache=test
[   39.447435] 
[   39.448439] allocated by task 286 on cpu 0 at 39.439236s (0.009192s ago):
[   39.449298]  test_alloc+0x22c/0x620
[   39.449830]  test_use_after_free_read+0xd0/0x248
[   39.450358]  kunit_try_run_case+0x14c/0x3d0
[   39.451084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.451895]  kthread+0x24c/0x2d0
[   39.452529]  ret_from_fork+0x10/0x20
[   39.453138] 
[   39.453578] freed by task 286 on cpu 0 at 39.439344s (0.014221s ago):
[   39.454469]  test_use_after_free_read+0xf0/0x248
[   39.455227]  kunit_try_run_case+0x14c/0x3d0
[   39.455831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.456649]  kthread+0x24c/0x2d0
[   39.457146]  ret_from_fork+0x10/0x20
[   39.457809] 
[   39.458264] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.459428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.460086] Hardware name: linux,dummy-virt (DT)
[   39.460657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.162372] ==================================================================
[   32.163385] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.164305] Read of size 8 at addr fff00000c671a2c0 by task kunit_try_catch/189
[   32.165480] 
[   32.165914] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.168426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.169097] Hardware name: linux,dummy-virt (DT)
[   32.169692] Call trace:
[   32.170152]  show_stack+0x20/0x38 (C)
[   32.171236]  dump_stack_lvl+0x8c/0xd0
[   32.171809]  print_report+0x118/0x5e0
[   32.172338]  kasan_report+0xc8/0x118
[   32.172995]  __asan_report_load8_noabort+0x20/0x30
[   32.173660]  workqueue_uaf+0x480/0x4a8
[   32.174611]  kunit_try_run_case+0x14c/0x3d0
[   32.175160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.175989]  kthread+0x24c/0x2d0
[   32.176624]  ret_from_fork+0x10/0x20
[   32.177257] 
[   32.177636] Allocated by task 189:
[   32.178218]  kasan_save_stack+0x3c/0x68
[   32.178854]  kasan_save_track+0x20/0x40
[   32.179407]  kasan_save_alloc_info+0x40/0x58
[   32.180130]  __kasan_kmalloc+0xd4/0xd8
[   32.180750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.181431]  workqueue_uaf+0x13c/0x4a8
[   32.183010]  kunit_try_run_case+0x14c/0x3d0
[   32.183640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.184809]  kthread+0x24c/0x2d0
[   32.185547]  ret_from_fork+0x10/0x20
[   32.186318] 
[   32.186985] Freed by task 49:
[   32.187600]  kasan_save_stack+0x3c/0x68
[   32.188358]  kasan_save_track+0x20/0x40
[   32.188958]  kasan_save_free_info+0x4c/0x78
[   32.189615]  __kasan_slab_free+0x6c/0x98
[   32.190221]  kfree+0x114/0x3c8
[   32.190746]  workqueue_uaf_work+0x18/0x30
[   32.191274]  process_one_work+0x530/0xf98
[   32.192621]  worker_thread+0x614/0xf28
[   32.193442]  kthread+0x24c/0x2d0
[   32.194201]  ret_from_fork+0x10/0x20
[   32.194897] 
[   32.195351] Last potentially related work creation:
[   32.196169]  kasan_save_stack+0x3c/0x68
[   32.196876]  kasan_record_aux_stack+0xb4/0xc8
[   32.197575]  __queue_work+0x65c/0xfd8
[   32.198137]  queue_work_on+0xbc/0xf8
[   32.199367]  workqueue_uaf+0x210/0x4a8
[   32.199906]  kunit_try_run_case+0x14c/0x3d0
[   32.200576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.201264]  kthread+0x24c/0x2d0
[   32.202091]  ret_from_fork+0x10/0x20
[   32.203075] 
[   32.203431] The buggy address belongs to the object at fff00000c671a2c0
[   32.203431]  which belongs to the cache kmalloc-32 of size 32
[   32.204626] The buggy address is located 0 bytes inside of
[   32.204626]  freed 32-byte region [fff00000c671a2c0, fff00000c671a2e0)
[   32.205849] 
[   32.206153] The buggy address belongs to the physical page:
[   32.207278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10671a
[   32.208764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.209458] page_type: f5(slab)
[   32.210042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.211112] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.211968] page dumped because: kasan: bad access detected
[   32.212995] 
[   32.213360] Memory state around the buggy address:
[   32.213917]  fff00000c671a180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.215384]  fff00000c671a200: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.216385] >fff00000c671a280: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   32.217221]                                            ^
[   32.218050]  fff00000c671a300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.219004]  fff00000c671a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.220160] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.079186] ==================================================================
[   32.080236] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.081141] Read of size 4 at addr fff00000c66cf640 by task swapper/0/0
[   32.081874] 
[   32.082413] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.083490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.084631] Hardware name: linux,dummy-virt (DT)
[   32.085189] Call trace:
[   32.085737]  show_stack+0x20/0x38 (C)
[   32.086718]  dump_stack_lvl+0x8c/0xd0
[   32.087303]  print_report+0x118/0x5e0
[   32.087926]  kasan_report+0xc8/0x118
[   32.088656]  __asan_report_load4_noabort+0x20/0x30
[   32.089250]  rcu_uaf_reclaim+0x64/0x70
[   32.089900]  rcu_core+0x9f4/0x1e20
[   32.090477]  rcu_core_si+0x18/0x30
[   32.091205]  handle_softirqs+0x374/0xb20
[   32.092309]  __do_softirq+0x1c/0x28
[   32.092863]  ____do_softirq+0x18/0x30
[   32.093646]  call_on_irq_stack+0x24/0x58
[   32.094706]  do_softirq_own_stack+0x24/0x38
[   32.095312]  __irq_exit_rcu+0x1fc/0x318
[   32.096054]  irq_exit_rcu+0x1c/0x80
[   32.096648]  el1_interrupt+0x38/0x58
[   32.097364]  el1h_64_irq_handler+0x18/0x28
[   32.098081]  el1h_64_irq+0x6c/0x70
[   32.099341]  arch_local_irq_enable+0x4/0x8 (P)
[   32.100163]  default_idle_call+0x6c/0x78 (L)
[   32.100909]  do_idle+0x384/0x4e8
[   32.101459]  cpu_startup_entry+0x68/0x80
[   32.101780]  rest_init+0x160/0x188
[   32.102039]  start_kernel+0x308/0x3d0
[   32.103203]  __primary_switched+0x8c/0xa0
[   32.103975] 
[   32.104401] Allocated by task 187:
[   32.105046]  kasan_save_stack+0x3c/0x68
[   32.105673]  kasan_save_track+0x20/0x40
[   32.106594]  kasan_save_alloc_info+0x40/0x58
[   32.107268]  __kasan_kmalloc+0xd4/0xd8
[   32.107809]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.108496]  rcu_uaf+0xb0/0x2d0
[   32.109334]  kunit_try_run_case+0x14c/0x3d0
[   32.110083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.110987]  kthread+0x24c/0x2d0
[   32.111252]  ret_from_fork+0x10/0x20
[   32.111502] 
[   32.112117] Freed by task 0:
[   32.112845]  kasan_save_stack+0x3c/0x68
[   32.113559]  kasan_save_track+0x20/0x40
[   32.114250]  kasan_save_free_info+0x4c/0x78
[   32.115111]  __kasan_slab_free+0x6c/0x98
[   32.116006]  kfree+0x114/0x3c8
[   32.117098]  rcu_uaf_reclaim+0x28/0x70
[   32.117707]  rcu_core+0x9f4/0x1e20
[   32.118255]  rcu_core_si+0x18/0x30
[   32.118840]  handle_softirqs+0x374/0xb20
[   32.119425]  __do_softirq+0x1c/0x28
[   32.120199] 
[   32.120387] Last potentially related work creation:
[   32.120699]  kasan_save_stack+0x3c/0x68
[   32.120968]  kasan_record_aux_stack+0xb4/0xc8
[   32.121246]  __call_rcu_common.constprop.0+0x74/0xa10
[   32.121613]  call_rcu+0x18/0x30
[   32.122685]  rcu_uaf+0x14c/0x2d0
[   32.123285]  kunit_try_run_case+0x14c/0x3d0
[   32.123971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.125706]  kthread+0x24c/0x2d0
[   32.126598]  ret_from_fork+0x10/0x20
[   32.127154] 
[   32.127564] The buggy address belongs to the object at fff00000c66cf640
[   32.127564]  which belongs to the cache kmalloc-32 of size 32
[   32.128686] The buggy address is located 0 bytes inside of
[   32.128686]  freed 32-byte region [fff00000c66cf640, fff00000c66cf660)
[   32.129828] 
[   32.130198] The buggy address belongs to the physical page:
[   32.130954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066cf
[   32.132919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.133719] page_type: f5(slab)
[   32.134274] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.135757] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.136358] page dumped because: kasan: bad access detected
[   32.137124] 
[   32.137477] Memory state around the buggy address:
[   32.138169]  fff00000c66cf500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.139285]  fff00000c66cf580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.140297] >fff00000c66cf600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.141232]                                            ^
[   32.141992]  fff00000c66cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.143127]  fff00000c66cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.144036] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.910624] ==================================================================
[   31.911938] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   31.912728] Read of size 1 at addr fff00000c6779700 by task kunit_try_catch/185
[   31.913536] 
[   31.913976] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.915783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.916343] Hardware name: linux,dummy-virt (DT)
[   31.916983] Call trace:
[   31.917370]  show_stack+0x20/0x38 (C)
[   31.917919]  dump_stack_lvl+0x8c/0xd0
[   31.918725]  print_report+0x118/0x5e0
[   31.919346]  kasan_report+0xc8/0x118
[   31.919795]  __kasan_check_byte+0x54/0x70
[   31.920504]  ksize+0x30/0x88
[   31.921061]  ksize_uaf+0x168/0x600
[   31.921688]  kunit_try_run_case+0x14c/0x3d0
[   31.922271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.923576]  kthread+0x24c/0x2d0
[   31.924155]  ret_from_fork+0x10/0x20
[   31.924759] 
[   31.925082] Allocated by task 185:
[   31.925594]  kasan_save_stack+0x3c/0x68
[   31.926215]  kasan_save_track+0x20/0x40
[   31.927108]  kasan_save_alloc_info+0x40/0x58
[   31.927699]  __kasan_kmalloc+0xd4/0xd8
[   31.928310]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.928937]  ksize_uaf+0xb8/0x600
[   31.929533]  kunit_try_run_case+0x14c/0x3d0
[   31.930139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.931289]  kthread+0x24c/0x2d0
[   31.932003]  ret_from_fork+0x10/0x20
[   31.932379] 
[   31.932768] Freed by task 185:
[   31.933295]  kasan_save_stack+0x3c/0x68
[   31.933857]  kasan_save_track+0x20/0x40
[   31.935054]  kasan_save_free_info+0x4c/0x78
[   31.935660]  __kasan_slab_free+0x6c/0x98
[   31.936328]  kfree+0x114/0x3c8
[   31.936826]  ksize_uaf+0x11c/0x600
[   31.937419]  kunit_try_run_case+0x14c/0x3d0
[   31.938105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.938776]  kthread+0x24c/0x2d0
[   31.939359]  ret_from_fork+0x10/0x20
[   31.940314] 
[   31.940671] The buggy address belongs to the object at fff00000c6779700
[   31.940671]  which belongs to the cache kmalloc-128 of size 128
[   31.941911] The buggy address is located 0 bytes inside of
[   31.941911]  freed 128-byte region [fff00000c6779700, fff00000c6779780)
[   31.943602] 
[   31.943979] The buggy address belongs to the physical page:
[   31.944755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779
[   31.945679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.946573] page_type: f5(slab)
[   31.947118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.948452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.949298] page dumped because: kasan: bad access detected
[   31.949929] 
[   31.950343] Memory state around the buggy address:
[   31.950894]  fff00000c6779600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.952108]  fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.953039] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.953826]                    ^
[   31.954322]  fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.955211]  fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.956077] ==================================================================
[   31.960054] ==================================================================
[   31.961013] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   31.961733] Read of size 1 at addr fff00000c6779700 by task kunit_try_catch/185
[   31.963294] 
[   31.963712] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.965294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.966052] Hardware name: linux,dummy-virt (DT)
[   31.967272] Call trace:
[   31.967642]  show_stack+0x20/0x38 (C)
[   31.968119]  dump_stack_lvl+0x8c/0xd0
[   31.968625]  print_report+0x118/0x5e0
[   31.969270]  kasan_report+0xc8/0x118
[   31.969873]  __asan_report_load1_noabort+0x20/0x30
[   31.970625]  ksize_uaf+0x59c/0x600
[   31.971230]  kunit_try_run_case+0x14c/0x3d0
[   31.971861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.972652]  kthread+0x24c/0x2d0
[   31.973493]  ret_from_fork+0x10/0x20
[   31.974155] 
[   31.975038] Allocated by task 185:
[   31.975467]  kasan_save_stack+0x3c/0x68
[   31.976154]  kasan_save_track+0x20/0x40
[   31.977030]  kasan_save_alloc_info+0x40/0x58
[   31.977542]  __kasan_kmalloc+0xd4/0xd8
[   31.978156]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.979274]  ksize_uaf+0xb8/0x600
[   31.979825]  kunit_try_run_case+0x14c/0x3d0
[   31.980478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.981256]  kthread+0x24c/0x2d0
[   31.981834]  ret_from_fork+0x10/0x20
[   31.982721] 
[   31.983095] Freed by task 185:
[   31.983538]  kasan_save_stack+0x3c/0x68
[   31.984289]  kasan_save_track+0x20/0x40
[   31.984982]  kasan_save_free_info+0x4c/0x78
[   31.985632]  __kasan_slab_free+0x6c/0x98
[   31.986452]  kfree+0x114/0x3c8
[   31.987560]  ksize_uaf+0x11c/0x600
[   31.988139]  kunit_try_run_case+0x14c/0x3d0
[   31.988881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.989762]  kthread+0x24c/0x2d0
[   31.990549]  ret_from_fork+0x10/0x20
[   31.991045] 
[   31.991411] The buggy address belongs to the object at fff00000c6779700
[   31.991411]  which belongs to the cache kmalloc-128 of size 128
[   31.992587] The buggy address is located 0 bytes inside of
[   31.992587]  freed 128-byte region [fff00000c6779700, fff00000c6779780)
[   31.994052] 
[   31.994543] The buggy address belongs to the physical page:
[   31.995711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779
[   31.996456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.997304] page_type: f5(slab)
[   31.997863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.999300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.000213] page dumped because: kasan: bad access detected
[   32.000731] 
[   32.001124] Memory state around the buggy address:
[   32.001827]  fff00000c6779600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.003397]  fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.004391] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.005290]                    ^
[   32.005877]  fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.007628]  fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.008468] ==================================================================
[   32.011061] ==================================================================
[   32.012478] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   32.013227] Read of size 1 at addr fff00000c6779778 by task kunit_try_catch/185
[   32.014148] 
[   32.014607] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.016580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.017076] Hardware name: linux,dummy-virt (DT)
[   32.017383] Call trace:
[   32.017605]  show_stack+0x20/0x38 (C)
[   32.017890]  dump_stack_lvl+0x8c/0xd0
[   32.018160]  print_report+0x118/0x5e0
[   32.018428]  kasan_report+0xc8/0x118
[   32.019042]  __asan_report_load1_noabort+0x20/0x30
[   32.019855]  ksize_uaf+0x548/0x600
[   32.020533]  kunit_try_run_case+0x14c/0x3d0
[   32.021282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.022157]  kthread+0x24c/0x2d0
[   32.022890]  ret_from_fork+0x10/0x20
[   32.023642] 
[   32.023982] Allocated by task 185:
[   32.024479]  kasan_save_stack+0x3c/0x68
[   32.025049]  kasan_save_track+0x20/0x40
[   32.025665]  kasan_save_alloc_info+0x40/0x58
[   32.026288]  __kasan_kmalloc+0xd4/0xd8
[   32.026864]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.027554]  ksize_uaf+0xb8/0x600
[   32.028028]  kunit_try_run_case+0x14c/0x3d0
[   32.028694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.029333]  kthread+0x24c/0x2d0
[   32.029941]  ret_from_fork+0x10/0x20
[   32.030548] 
[   32.030921] Freed by task 185:
[   32.031439]  kasan_save_stack+0x3c/0x68
[   32.032050]  kasan_save_track+0x20/0x40
[   32.032690]  kasan_save_free_info+0x4c/0x78
[   32.033302]  __kasan_slab_free+0x6c/0x98
[   32.033802]  kfree+0x114/0x3c8
[   32.034353]  ksize_uaf+0x11c/0x600
[   32.034927]  kunit_try_run_case+0x14c/0x3d0
[   32.035617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.036421]  kthread+0x24c/0x2d0
[   32.036903]  ret_from_fork+0x10/0x20
[   32.037495] 
[   32.037878] The buggy address belongs to the object at fff00000c6779700
[   32.037878]  which belongs to the cache kmalloc-128 of size 128
[   32.038943] The buggy address is located 120 bytes inside of
[   32.038943]  freed 128-byte region [fff00000c6779700, fff00000c6779780)
[   32.040367] 
[   32.040764] The buggy address belongs to the physical page:
[   32.041431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779
[   32.042197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.043095] page_type: f5(slab)
[   32.043666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.044653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.045501] page dumped because: kasan: bad access detected
[   32.046147] 
[   32.046532] Memory state around the buggy address:
[   32.047208]  fff00000c6779600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.048048]  fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.048751] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.049653]                                                                 ^
[   32.050405]  fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.051248]  fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.052111] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   39.023651] ==================================================================
[   39.024578] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   39.024578] 
[   39.025375] Out-of-bounds read at 0x000000007d404fa9 (32B right of kfence-#145):
[   39.026298]  test_out_of_bounds_read+0x1c8/0x3e0
[   39.026956]  test_out_of_bounds_read+0x198/0x3e0
[   39.027686]  kunit_try_run_case+0x14c/0x3d0
[   39.028255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.029005]  kthread+0x24c/0x2d0
[   39.029543]  ret_from_fork+0x10/0x20
[   39.030164] 
[   39.030545] kfence-#145: 0x00000000fb0f0ad4-0x0000000011ac27bd, size=32, cache=test
[   39.030545] 
[   39.031370] allocated by task 278 on cpu 1 at 39.023454s (0.007903s ago):
[   39.032323]  test_alloc+0x22c/0x620
[   39.032938]  test_out_of_bounds_read+0x198/0x3e0
[   39.033588]  kunit_try_run_case+0x14c/0x3d0
[   39.034258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.034883]  kthread+0x24c/0x2d0
[   39.035456]  ret_from_fork+0x10/0x20
[   39.036037] 
[   39.036450] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   39.037582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.038101] Hardware name: linux,dummy-virt (DT)
[   39.038790] ==================================================================
[   38.815181] ==================================================================
[   38.816020] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.816020] 
[   38.816950] Out-of-bounds read at 0x00000000e1dd7fbc (1B left of kfence-#143):
[   38.817755]  test_out_of_bounds_read+0x114/0x3e0
[   38.818493]  test_out_of_bounds_read+0xdc/0x3e0
[   38.819171]  kunit_try_run_case+0x14c/0x3d0
[   38.819785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.820578]  kthread+0x24c/0x2d0
[   38.821179]  ret_from_fork+0x10/0x20
[   38.821765] 
[   38.822084] kfence-#143: 0x0000000050a4a2c6-0x0000000033ebf5c3, size=32, cache=test
[   38.822084] 
[   38.823211] allocated by task 278 on cpu 1 at 38.815008s (0.008192s ago):
[   38.824258]  test_alloc+0x22c/0x620
[   38.824887]  test_out_of_bounds_read+0xdc/0x3e0
[   38.825598]  kunit_try_run_case+0x14c/0x3d0
[   38.826241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.826862]  kthread+0x24c/0x2d0
[   38.827451]  ret_from_fork+0x10/0x20
[   38.828059] 
[   38.828485] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.829434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.830076] Hardware name: linux,dummy-virt (DT)
[   38.830778] ==================================================================
[   38.711533] ==================================================================
[   38.712433] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   38.712433] 
[   38.713210] Out-of-bounds read at 0x000000001b533283 (32B right of kfence-#142):
[   38.714145]  test_out_of_bounds_read+0x1c8/0x3e0
[   38.714832]  test_out_of_bounds_read+0x198/0x3e0
[   38.715417]  kunit_try_run_case+0x14c/0x3d0
[   38.716100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.716903]  kthread+0x24c/0x2d0
[   38.717506]  ret_from_fork+0x10/0x20
[   38.718084] 
[   38.718478] kfence-#142: 0x00000000846c5d91-0x00000000611b0d29, size=32, cache=kmalloc-32
[   38.718478] 
[   38.719599] allocated by task 276 on cpu 1 at 38.711232s (0.008354s ago):
[   38.720561]  test_alloc+0x298/0x620
[   38.721171]  test_out_of_bounds_read+0x198/0x3e0
[   38.721736]  kunit_try_run_case+0x14c/0x3d0
[   38.722404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.723219]  kthread+0x24c/0x2d0
[   38.723737]  ret_from_fork+0x10/0x20
[   38.724278] 
[   38.724718] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.725894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.726493] Hardware name: linux,dummy-virt (DT)
[   38.727046] ==================================================================
[   38.399473] ==================================================================
[   38.400334] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.400334] 
[   38.401317] Out-of-bounds read at 0x00000000dd7a9143 (1B left of kfence-#139):
[   38.402742]  test_out_of_bounds_read+0x114/0x3e0
[   38.403423]  test_out_of_bounds_read+0xdc/0x3e0
[   38.404039]  kunit_try_run_case+0x14c/0x3d0
[   38.404687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.405379]  kthread+0x24c/0x2d0
[   38.405903]  ret_from_fork+0x10/0x20
[   38.406410] 
[   38.406822] kfence-#139: 0x000000002f110a13-0x0000000032b6379d, size=32, cache=kmalloc-32
[   38.406822] 
[   38.407780] allocated by task 276 on cpu 1 at 38.399013s (0.008755s ago):
[   38.408738]  test_alloc+0x298/0x620
[   38.409294]  test_out_of_bounds_read+0xdc/0x3e0
[   38.409892]  kunit_try_run_case+0x14c/0x3d0
[   38.410585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.411370]  kthread+0x24c/0x2d0
[   38.411994]  ret_from_fork+0x10/0x20
[   38.412584] 
[   38.412968] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.414044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.414686] Hardware name: linux,dummy-virt (DT)
[   38.415296] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[   29.909338] ==================================================================
[   29.910706] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330
[   29.910706] 
[   29.911683] Out-of-bounds read at 0x00000000712d1165 (4096B right of kfence-#97):
[   29.913058]  kmalloc_node_oob_right+0x160/0x330
[   29.913742]  kmalloc_node_oob_right+0xbc/0x330
[   29.914358]  kunit_try_run_case+0x14c/0x3d0
[   29.915003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.915726]  kthread+0x24c/0x2d0
[   29.916306]  ret_from_fork+0x10/0x20
[   29.916811] 
[   29.917558] kfence-#97: 0x00000000a6f1d1db-0x00000000abefa2ae, size=4096, cache=kmalloc-4k
[   29.917558] 
[   29.918950] allocated by task 129 on cpu 0 at 29.907574s (0.011220s ago):
[   29.920480]  kmalloc_node_oob_right+0xbc/0x330
[   29.921107]  kunit_try_run_case+0x14c/0x3d0
[   29.921693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.922371]  kthread+0x24c/0x2d0
[   29.922949]  ret_from_fork+0x10/0x20
[   29.923642] 
[   29.924118] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.925234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.925852] Hardware name: linux,dummy-virt (DT)
[   29.926426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   38.149292] ==================================================================
[   38.149851] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   38.150780] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   38.151687] 
[   38.152121] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.153273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.153910] Hardware name: linux,dummy-virt (DT)
[   38.154499] Call trace:
[   38.154996]  show_stack+0x20/0x38 (C)
[   38.155646]  dump_stack_lvl+0x8c/0xd0
[   38.156352]  print_report+0x118/0x5e0
[   38.156985]  kasan_report+0xc8/0x118
[   38.157604]  kasan_check_range+0x100/0x1a8
[   38.158283]  __kasan_check_write+0x20/0x30
[   38.158930]  strncpy_from_user+0x3c/0x2a0
[   38.159500]  copy_user_test_oob+0x5c0/0xec0
[   38.160144]  kunit_try_run_case+0x14c/0x3d0
[   38.160838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.161650]  kthread+0x24c/0x2d0
[   38.162243]  ret_from_fork+0x10/0x20
[   38.162761] 
[   38.163138] Allocated by task 274:
[   38.163700]  kasan_save_stack+0x3c/0x68
[   38.164194]  kasan_save_track+0x20/0x40
[   38.164847]  kasan_save_alloc_info+0x40/0x58
[   38.165358]  __kasan_kmalloc+0xd4/0xd8
[   38.166027]  __kmalloc_noprof+0x188/0x4c8
[   38.166581]  kunit_kmalloc_array+0x34/0x88
[   38.167237]  copy_user_test_oob+0xac/0xec0
[   38.167805]  kunit_try_run_case+0x14c/0x3d0
[   38.168405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.169174]  kthread+0x24c/0x2d0
[   38.169772]  ret_from_fork+0x10/0x20
[   38.170366] 
[   38.170722] The buggy address belongs to the object at fff00000c66d6400
[   38.170722]  which belongs to the cache kmalloc-128 of size 128
[   38.171917] The buggy address is located 0 bytes inside of
[   38.171917]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.172985] 
[   38.173354] The buggy address belongs to the physical page:
[   38.174098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.175061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.175757] page_type: f5(slab)
[   38.176323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.177292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.178124] page dumped because: kasan: bad access detected
[   38.178891] 
[   38.179251] Memory state around the buggy address:
[   38.179935]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.180649]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.181420] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.182332]                                                                 ^
[   38.183064]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.183912]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.184666] ==================================================================
[   38.186880] ==================================================================
[   38.187776] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   38.188407] Write of size 1 at addr fff00000c66d6478 by task kunit_try_catch/274
[   38.189372] 
[   38.189862] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.190970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.191597] Hardware name: linux,dummy-virt (DT)
[   38.192300] Call trace:
[   38.192823]  show_stack+0x20/0x38 (C)
[   38.193472]  dump_stack_lvl+0x8c/0xd0
[   38.194187]  print_report+0x118/0x5e0
[   38.194783]  kasan_report+0xc8/0x118
[   38.195471]  __asan_report_store1_noabort+0x20/0x30
[   38.196257]  strncpy_from_user+0x270/0x2a0
[   38.196983]  copy_user_test_oob+0x5c0/0xec0
[   38.197732]  kunit_try_run_case+0x14c/0x3d0
[   38.198577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.199374]  kthread+0x24c/0x2d0
[   38.200013]  ret_from_fork+0x10/0x20
[   38.200661] 
[   38.201017] Allocated by task 274:
[   38.201613]  kasan_save_stack+0x3c/0x68
[   38.202228]  kasan_save_track+0x20/0x40
[   38.202868]  kasan_save_alloc_info+0x40/0x58
[   38.203498]  __kasan_kmalloc+0xd4/0xd8
[   38.204145]  __kmalloc_noprof+0x188/0x4c8
[   38.204776]  kunit_kmalloc_array+0x34/0x88
[   38.205421]  copy_user_test_oob+0xac/0xec0
[   38.206077]  kunit_try_run_case+0x14c/0x3d0
[   38.206650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.207419]  kthread+0x24c/0x2d0
[   38.207995]  ret_from_fork+0x10/0x20
[   38.208633] 
[   38.209008] The buggy address belongs to the object at fff00000c66d6400
[   38.209008]  which belongs to the cache kmalloc-128 of size 128
[   38.210334] The buggy address is located 0 bytes to the right of
[   38.210334]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.211718] 
[   38.212156] The buggy address belongs to the physical page:
[   38.212826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.213762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.214540] page_type: f5(slab)
[   38.215097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.215909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.216993] page dumped because: kasan: bad access detected
[   38.217659] 
[   38.218060] Memory state around the buggy address:
[   38.218722]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.219621]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.220560] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.221384]                                                                 ^
[   38.222179]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.223056]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.223895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   38.019225] ==================================================================
[   38.020018] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   38.021437] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   38.022178] 
[   38.022612] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.023694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.024297] Hardware name: linux,dummy-virt (DT)
[   38.024805] Call trace:
[   38.025262]  show_stack+0x20/0x38 (C)
[   38.025948]  dump_stack_lvl+0x8c/0xd0
[   38.026480]  print_report+0x118/0x5e0
[   38.027149]  kasan_report+0xc8/0x118
[   38.027802]  kasan_check_range+0x100/0x1a8
[   38.028415]  __kasan_check_read+0x20/0x30
[   38.029059]  copy_user_test_oob+0x3c8/0xec0
[   38.029719]  kunit_try_run_case+0x14c/0x3d0
[   38.030317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.031112]  kthread+0x24c/0x2d0
[   38.031723]  ret_from_fork+0x10/0x20
[   38.032275] 
[   38.032660] Allocated by task 274:
[   38.033148]  kasan_save_stack+0x3c/0x68
[   38.033781]  kasan_save_track+0x20/0x40
[   38.034269]  kasan_save_alloc_info+0x40/0x58
[   38.034947]  __kasan_kmalloc+0xd4/0xd8
[   38.035494]  __kmalloc_noprof+0x188/0x4c8
[   38.036086]  kunit_kmalloc_array+0x34/0x88
[   38.036751]  copy_user_test_oob+0xac/0xec0
[   38.037281]  kunit_try_run_case+0x14c/0x3d0
[   38.037968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.038751]  kthread+0x24c/0x2d0
[   38.039305]  ret_from_fork+0x10/0x20
[   38.039875] 
[   38.040244] The buggy address belongs to the object at fff00000c66d6400
[   38.040244]  which belongs to the cache kmalloc-128 of size 128
[   38.041406] The buggy address is located 0 bytes inside of
[   38.041406]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.042931] 
[   38.043239] The buggy address belongs to the physical page:
[   38.043960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.044850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.045644] page_type: f5(slab)
[   38.046142] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.047027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.047910] page dumped because: kasan: bad access detected
[   38.048537] 
[   38.048873] Memory state around the buggy address:
[   38.049563]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.050333]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.051193] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.051964]                                                                 ^
[   38.052749]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.053561]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.054353] ==================================================================
[   37.885145] ==================================================================
[   37.886655] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   37.887473] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   37.888403] 
[   37.889549] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.891082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.891957] Hardware name: linux,dummy-virt (DT)
[   37.892887] Call trace:
[   37.893359]  show_stack+0x20/0x38 (C)
[   37.894033]  dump_stack_lvl+0x8c/0xd0
[   37.894743]  print_report+0x118/0x5e0
[   37.895285]  kasan_report+0xc8/0x118
[   37.895995]  kasan_check_range+0x100/0x1a8
[   37.896745]  __kasan_check_write+0x20/0x30
[   37.897483]  copy_user_test_oob+0x234/0xec0
[   37.898324]  kunit_try_run_case+0x14c/0x3d0
[   37.899137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.900002]  kthread+0x24c/0x2d0
[   37.900655]  ret_from_fork+0x10/0x20
[   37.901335] 
[   37.901736] Allocated by task 274:
[   37.902260]  kasan_save_stack+0x3c/0x68
[   37.902993]  kasan_save_track+0x20/0x40
[   37.903654]  kasan_save_alloc_info+0x40/0x58
[   37.904348]  __kasan_kmalloc+0xd4/0xd8
[   37.904910]  __kmalloc_noprof+0x188/0x4c8
[   37.905195]  kunit_kmalloc_array+0x34/0x88
[   37.905461]  copy_user_test_oob+0xac/0xec0
[   37.905936]  kunit_try_run_case+0x14c/0x3d0
[   37.906688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.907501]  kthread+0x24c/0x2d0
[   37.908057]  ret_from_fork+0x10/0x20
[   37.908664] 
[   37.909006] The buggy address belongs to the object at fff00000c66d6400
[   37.909006]  which belongs to the cache kmalloc-128 of size 128
[   37.910339] The buggy address is located 0 bytes inside of
[   37.910339]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   37.911716] 
[   37.912116] The buggy address belongs to the physical page:
[   37.912861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   37.913717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.914712] page_type: f5(slab)
[   37.915295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.916182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.917055] page dumped because: kasan: bad access detected
[   37.917846] 
[   37.918238] Memory state around the buggy address:
[   37.918837]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.919810]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.920711] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.921491]                                                                 ^
[   37.922282]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.923190]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.924066] ==================================================================
[   38.056174] ==================================================================
[   38.057487] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   38.059244] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   38.060125] 
[   38.060581] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.061763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.062327] Hardware name: linux,dummy-virt (DT)
[   38.062961] Call trace:
[   38.063461]  show_stack+0x20/0x38 (C)
[   38.064074]  dump_stack_lvl+0x8c/0xd0
[   38.064765]  print_report+0x118/0x5e0
[   38.065399]  kasan_report+0xc8/0x118
[   38.066114]  kasan_check_range+0x100/0x1a8
[   38.066730]  __kasan_check_write+0x20/0x30
[   38.067471]  copy_user_test_oob+0x434/0xec0
[   38.068143]  kunit_try_run_case+0x14c/0x3d0
[   38.068857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.069695]  kthread+0x24c/0x2d0
[   38.070286]  ret_from_fork+0x10/0x20
[   38.070921] 
[   38.071286] Allocated by task 274:
[   38.071882]  kasan_save_stack+0x3c/0x68
[   38.072425]  kasan_save_track+0x20/0x40
[   38.073060]  kasan_save_alloc_info+0x40/0x58
[   38.073779]  __kasan_kmalloc+0xd4/0xd8
[   38.074368]  __kmalloc_noprof+0x188/0x4c8
[   38.075041]  kunit_kmalloc_array+0x34/0x88
[   38.075592]  copy_user_test_oob+0xac/0xec0
[   38.076307]  kunit_try_run_case+0x14c/0x3d0
[   38.076924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.077705]  kthread+0x24c/0x2d0
[   38.078253]  ret_from_fork+0x10/0x20
[   38.078902] 
[   38.079233] The buggy address belongs to the object at fff00000c66d6400
[   38.079233]  which belongs to the cache kmalloc-128 of size 128
[   38.080566] The buggy address is located 0 bytes inside of
[   38.080566]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.081819] 
[   38.082248] The buggy address belongs to the physical page:
[   38.082954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.083887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.084749] page_type: f5(slab)
[   38.085584] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.086240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.086958] page dumped because: kasan: bad access detected
[   38.087457] 
[   38.090354] Memory state around the buggy address:
[   38.091870]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.093617]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.095485] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.097400]                                                                 ^
[   38.099218]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.101033]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.102807] ==================================================================
[   37.983146] ==================================================================
[   37.983867] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   37.984644] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   37.985373] 
[   37.985864] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.987333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.987724] Hardware name: linux,dummy-virt (DT)
[   37.988388] Call trace:
[   37.988852]  show_stack+0x20/0x38 (C)
[   37.989503]  dump_stack_lvl+0x8c/0xd0
[   37.990155]  print_report+0x118/0x5e0
[   37.990746]  kasan_report+0xc8/0x118
[   37.991391]  kasan_check_range+0x100/0x1a8
[   37.991954]  __kasan_check_write+0x20/0x30
[   37.992655]  copy_user_test_oob+0x35c/0xec0
[   37.993181]  kunit_try_run_case+0x14c/0x3d0
[   37.993892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.994612]  kthread+0x24c/0x2d0
[   37.995224]  ret_from_fork+0x10/0x20
[   37.995910] 
[   37.996257] Allocated by task 274:
[   37.996719]  kasan_save_stack+0x3c/0x68
[   37.997326]  kasan_save_track+0x20/0x40
[   37.997950]  kasan_save_alloc_info+0x40/0x58
[   37.998463]  __kasan_kmalloc+0xd4/0xd8
[   37.999104]  __kmalloc_noprof+0x188/0x4c8
[   37.999705]  kunit_kmalloc_array+0x34/0x88
[   38.000356]  copy_user_test_oob+0xac/0xec0
[   38.000992]  kunit_try_run_case+0x14c/0x3d0
[   38.001660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.002298]  kthread+0x24c/0x2d0
[   38.002888]  ret_from_fork+0x10/0x20
[   38.003348] 
[   38.003731] The buggy address belongs to the object at fff00000c66d6400
[   38.003731]  which belongs to the cache kmalloc-128 of size 128
[   38.004906] The buggy address is located 0 bytes inside of
[   38.004906]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.006204] 
[   38.006603] The buggy address belongs to the physical page:
[   38.007277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.008278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.009010] page_type: f5(slab)
[   38.009583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.010406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.011289] page dumped because: kasan: bad access detected
[   38.011957] 
[   38.012302] Memory state around the buggy address:
[   38.012826]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.013757]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.014623] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.015485]                                                                 ^
[   38.016228]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.017096]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.017893] ==================================================================
[   37.933046] ==================================================================
[   37.933819] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   37.934618] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   37.936095] 
[   37.936432] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.937541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.938146] Hardware name: linux,dummy-virt (DT)
[   37.938878] Call trace:
[   37.939229]  show_stack+0x20/0x38 (C)
[   37.939739]  dump_stack_lvl+0x8c/0xd0
[   37.940906]  print_report+0x118/0x5e0
[   37.941548]  kasan_report+0xc8/0x118
[   37.942171]  kasan_check_range+0x100/0x1a8
[   37.942939]  __kasan_check_read+0x20/0x30
[   37.944155]  copy_user_test_oob+0x728/0xec0
[   37.945096]  kunit_try_run_case+0x14c/0x3d0
[   37.946001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.947042]  kthread+0x24c/0x2d0
[   37.947971]  ret_from_fork+0x10/0x20
[   37.948878] 
[   37.949206] Allocated by task 274:
[   37.949731]  kasan_save_stack+0x3c/0x68
[   37.950324]  kasan_save_track+0x20/0x40
[   37.950887]  kasan_save_alloc_info+0x40/0x58
[   37.951863]  __kasan_kmalloc+0xd4/0xd8
[   37.952483]  __kmalloc_noprof+0x188/0x4c8
[   37.953090]  kunit_kmalloc_array+0x34/0x88
[   37.953639]  copy_user_test_oob+0xac/0xec0
[   37.954711]  kunit_try_run_case+0x14c/0x3d0
[   37.955366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.955976]  kthread+0x24c/0x2d0
[   37.956471]  ret_from_fork+0x10/0x20
[   37.957090] 
[   37.957459] The buggy address belongs to the object at fff00000c66d6400
[   37.957459]  which belongs to the cache kmalloc-128 of size 128
[   37.958883] The buggy address is located 0 bytes inside of
[   37.958883]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   37.960169] 
[   37.960770] The buggy address belongs to the physical page:
[   37.961740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   37.962929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.963592] page_type: f5(slab)
[   37.964057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.964798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.965773] page dumped because: kasan: bad access detected
[   37.966598] 
[   37.966977] Memory state around the buggy address:
[   37.968125]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.968963]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.970023] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.971064]                                                                 ^
[   37.972194]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.973129]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.974121] ==================================================================
[   38.106571] ==================================================================
[   38.109657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   38.111620] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274
[   38.113888] 
[   38.114748] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   38.116049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.117332] Hardware name: linux,dummy-virt (DT)
[   38.117977] Call trace:
[   38.118429]  show_stack+0x20/0x38 (C)
[   38.119007]  dump_stack_lvl+0x8c/0xd0
[   38.119677]  print_report+0x118/0x5e0
[   38.120188]  kasan_report+0xc8/0x118
[   38.120846]  kasan_check_range+0x100/0x1a8
[   38.121434]  __kasan_check_read+0x20/0x30
[   38.122052]  copy_user_test_oob+0x4a0/0xec0
[   38.122729]  kunit_try_run_case+0x14c/0x3d0
[   38.123346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.124162]  kthread+0x24c/0x2d0
[   38.124738]  ret_from_fork+0x10/0x20
[   38.125315] 
[   38.125667] Allocated by task 274:
[   38.126158]  kasan_save_stack+0x3c/0x68
[   38.126790]  kasan_save_track+0x20/0x40
[   38.127373]  kasan_save_alloc_info+0x40/0x58
[   38.128015]  __kasan_kmalloc+0xd4/0xd8
[   38.128556]  __kmalloc_noprof+0x188/0x4c8
[   38.129164]  kunit_kmalloc_array+0x34/0x88
[   38.129816]  copy_user_test_oob+0xac/0xec0
[   38.130454]  kunit_try_run_case+0x14c/0x3d0
[   38.131022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.131822]  kthread+0x24c/0x2d0
[   38.132387]  ret_from_fork+0x10/0x20
[   38.133001] 
[   38.133373] The buggy address belongs to the object at fff00000c66d6400
[   38.133373]  which belongs to the cache kmalloc-128 of size 128
[   38.134400] The buggy address is located 0 bytes inside of
[   38.134400]  allocated 120-byte region [fff00000c66d6400, fff00000c66d6478)
[   38.135876] 
[   38.136252] The buggy address belongs to the physical page:
[   38.136915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   38.137674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.138552] page_type: f5(slab)
[   38.139116] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.140058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.140855] page dumped because: kasan: bad access detected
[   38.141558] 
[   38.141913] Memory state around the buggy address:
[   38.142603]  fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.143352]  fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.144247] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.144991]                                                                 ^
[   38.145830]  fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.146581]  fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.147374] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   37.812347] ==================================================================
[   37.813264] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   37.814005] Write of size 8 at addr fff00000c66d6278 by task kunit_try_catch/270
[   37.815483] 
[   37.815870] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.817264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.818030] Hardware name: linux,dummy-virt (DT)
[   37.818655] Call trace:
[   37.819554]  show_stack+0x20/0x38 (C)
[   37.820365]  dump_stack_lvl+0x8c/0xd0
[   37.820969]  print_report+0x118/0x5e0
[   37.821263]  kasan_report+0xc8/0x118
[   37.821563]  kasan_check_range+0x100/0x1a8
[   37.822094]  __kasan_check_write+0x20/0x30
[   37.822827]  copy_to_kernel_nofault+0x8c/0x250
[   37.823572]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   37.824681]  kunit_try_run_case+0x14c/0x3d0
[   37.825381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.826195]  kthread+0x24c/0x2d0
[   37.826828]  ret_from_fork+0x10/0x20
[   37.827468] 
[   37.827811] Allocated by task 270:
[   37.828373]  kasan_save_stack+0x3c/0x68
[   37.828969]  kasan_save_track+0x20/0x40
[   37.829884]  kasan_save_alloc_info+0x40/0x58
[   37.830499]  __kasan_kmalloc+0xd4/0xd8
[   37.831241]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.832014]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.832787]  kunit_try_run_case+0x14c/0x3d0
[   37.833527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.834431]  kthread+0x24c/0x2d0
[   37.835072]  ret_from_fork+0x10/0x20
[   37.835761] 
[   37.836438] The buggy address belongs to the object at fff00000c66d6200
[   37.836438]  which belongs to the cache kmalloc-128 of size 128
[   37.837954] The buggy address is located 0 bytes to the right of
[   37.837954]  allocated 120-byte region [fff00000c66d6200, fff00000c66d6278)
[   37.839236] 
[   37.839630] The buggy address belongs to the physical page:
[   37.840370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   37.842055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.843664] page_type: f5(slab)
[   37.844164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.845129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.846504] page dumped because: kasan: bad access detected
[   37.847136] 
[   37.847442] Memory state around the buggy address:
[   37.848113]  fff00000c66d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.849448]  fff00000c66d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.850749] >fff00000c66d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.851629]                                                                 ^
[   37.852302]  fff00000c66d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.852844]  fff00000c66d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.853775] ==================================================================
[   37.768503] ==================================================================
[   37.770130] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   37.771243] Read of size 8 at addr fff00000c66d6278 by task kunit_try_catch/270
[   37.772106] 
[   37.772462] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.773683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.774396] Hardware name: linux,dummy-virt (DT)
[   37.775359] Call trace:
[   37.775878]  show_stack+0x20/0x38 (C)
[   37.776723]  dump_stack_lvl+0x8c/0xd0
[   37.777496]  print_report+0x118/0x5e0
[   37.778208]  kasan_report+0xc8/0x118
[   37.779038]  __asan_report_load8_noabort+0x20/0x30
[   37.779929]  copy_to_kernel_nofault+0x204/0x250
[   37.780841]  copy_to_kernel_nofault_oob+0x158/0x418
[   37.781745]  kunit_try_run_case+0x14c/0x3d0
[   37.782687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.783401]  kthread+0x24c/0x2d0
[   37.784121]  ret_from_fork+0x10/0x20
[   37.784808] 
[   37.785204] Allocated by task 270:
[   37.785717]  kasan_save_stack+0x3c/0x68
[   37.786735]  kasan_save_track+0x20/0x40
[   37.787836]  kasan_save_alloc_info+0x40/0x58
[   37.788677]  __kasan_kmalloc+0xd4/0xd8
[   37.789200]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.789841]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.791050]  kunit_try_run_case+0x14c/0x3d0
[   37.791725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.792390]  kthread+0x24c/0x2d0
[   37.793366]  ret_from_fork+0x10/0x20
[   37.793938] 
[   37.794443] The buggy address belongs to the object at fff00000c66d6200
[   37.794443]  which belongs to the cache kmalloc-128 of size 128
[   37.795655] The buggy address is located 0 bytes to the right of
[   37.795655]  allocated 120-byte region [fff00000c66d6200, fff00000c66d6278)
[   37.797155] 
[   37.797477] The buggy address belongs to the physical page:
[   37.798299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6
[   37.799686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.800636] page_type: f5(slab)
[   37.801247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.802160] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.803422] page dumped because: kasan: bad access detected
[   37.804130] 
[   37.804554] Memory state around the buggy address:
[   37.805220]  fff00000c66d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.806065]  fff00000c66d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.806996] >fff00000c66d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.808266]                                                                 ^
[   37.809191]  fff00000c66d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.809835]  fff00000c66d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.810841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   37.679042] ==================================================================
[   37.679733] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   37.682019] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   37.685142] 
[   37.685488] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.687732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.690384] Hardware name: linux,dummy-virt (DT)
[   37.692183] Call trace:
[   37.692708]  show_stack+0x20/0x38 (C)
[   37.693369]  dump_stack_lvl+0x8c/0xd0
[   37.694060]  print_report+0x2fc/0x5e0
[   37.694625]  kasan_report+0xc8/0x118
[   37.695283]  __asan_report_load1_noabort+0x20/0x30
[   37.696355]  vmalloc_oob+0x51c/0x5d0
[   37.696872]  kunit_try_run_case+0x14c/0x3d0
[   37.697606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.698325]  kthread+0x24c/0x2d0
[   37.698961]  ret_from_fork+0x10/0x20
[   37.699499] 
[   37.699914] The buggy address belongs to the virtual mapping at
[   37.699914]  [ffff80008010b000, ffff80008010d000) created by:
[   37.699914]  vmalloc_oob+0x98/0x5d0
[   37.701723] 
[   37.702071] The buggy address belongs to the physical page:
[   37.702901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10696b
[   37.703833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.704752] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.705646] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.706681] page dumped because: kasan: bad access detected
[   37.707366] 
[   37.707764] Memory state around the buggy address:
[   37.708668]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.709413]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.710808] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.711638]                                                                 ^
[   37.712532]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.713409]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.714253] ==================================================================
[   37.647532] ==================================================================
[   37.648474] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   37.648878] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   37.649245] 
[   37.649426] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.651105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.652635] Hardware name: linux,dummy-virt (DT)
[   37.653446] Call trace:
[   37.653912]  show_stack+0x20/0x38 (C)
[   37.654650]  dump_stack_lvl+0x8c/0xd0
[   37.655818]  print_report+0x2fc/0x5e0
[   37.656596]  kasan_report+0xc8/0x118
[   37.657266]  __asan_report_load1_noabort+0x20/0x30
[   37.658135]  vmalloc_oob+0x578/0x5d0
[   37.658970]  kunit_try_run_case+0x14c/0x3d0
[   37.659669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.660367]  kthread+0x24c/0x2d0
[   37.661048]  ret_from_fork+0x10/0x20
[   37.661651] 
[   37.662090] The buggy address belongs to the virtual mapping at
[   37.662090]  [ffff80008010b000, ffff80008010d000) created by:
[   37.662090]  vmalloc_oob+0x98/0x5d0
[   37.663926] 
[   37.664276] The buggy address belongs to the physical page:
[   37.664834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10696b
[   37.666465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.667547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.668569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.669610] page dumped because: kasan: bad access detected
[   37.670350] 
[   37.670716] Memory state around the buggy address:
[   37.671377]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.672985]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.674273] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.675472]                                                              ^
[   37.676110]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.676500]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.677474] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.288398] ==================================================================
[   35.289036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   35.289963] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.290976] 
[   35.291432] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.292501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.293182] Hardware name: linux,dummy-virt (DT)
[   35.293913] Call trace:
[   35.294418]  show_stack+0x20/0x38 (C)
[   35.295088]  dump_stack_lvl+0x8c/0xd0
[   35.295830]  print_report+0x118/0x5e0
[   35.296442]  kasan_report+0xc8/0x118
[   35.297155]  kasan_check_range+0x100/0x1a8
[   35.297906]  __kasan_check_read+0x20/0x30
[   35.298598]  kasan_atomics_helper+0x2b0/0x4858
[   35.299290]  kasan_atomics+0x198/0x2e8
[   35.300003]  kunit_try_run_case+0x14c/0x3d0
[   35.300637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301485]  kthread+0x24c/0x2d0
[   35.302075]  ret_from_fork+0x10/0x20
[   35.302729] 
[   35.303230] Allocated by task 254:
[   35.303786]  kasan_save_stack+0x3c/0x68
[   35.304483]  kasan_save_track+0x20/0x40
[   35.305268]  kasan_save_alloc_info+0x40/0x58
[   35.305868]  __kasan_kmalloc+0xd4/0xd8
[   35.306155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.306441]  kasan_atomics+0xb8/0x2e8
[   35.306894]  kunit_try_run_case+0x14c/0x3d0
[   35.307583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.308368]  kthread+0x24c/0x2d0
[   35.308964]  ret_from_fork+0x10/0x20
[   35.309491] 
[   35.309932] The buggy address belongs to the object at fff00000c69ef080
[   35.309932]  which belongs to the cache kmalloc-64 of size 64
[   35.311087] The buggy address is located 0 bytes to the right of
[   35.311087]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.312646] 
[   35.313033] The buggy address belongs to the physical page:
[   35.313852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.314794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.315740] page_type: f5(slab)
[   35.316287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.317194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.318137] page dumped because: kasan: bad access detected
[   35.318907] 
[   35.319272] Memory state around the buggy address:
[   35.320002]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.320874]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.321724] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.322601]                                      ^
[   35.323273]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.324137]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.324841] ==================================================================
[   37.472359] ==================================================================
[   37.473319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.474922] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.475923] 
[   37.476303] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.477375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.478010] Hardware name: linux,dummy-virt (DT)
[   37.478622] Call trace:
[   37.479097]  show_stack+0x20/0x38 (C)
[   37.479717]  dump_stack_lvl+0x8c/0xd0
[   37.480335]  print_report+0x118/0x5e0
[   37.481003]  kasan_report+0xc8/0x118
[   37.481653]  __asan_report_load8_noabort+0x20/0x30
[   37.482333]  kasan_atomics_helper+0x3e10/0x4858
[   37.483035]  kasan_atomics+0x198/0x2e8
[   37.483608]  kunit_try_run_case+0x14c/0x3d0
[   37.484311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.485132]  kthread+0x24c/0x2d0
[   37.485692]  ret_from_fork+0x10/0x20
[   37.486380] 
[   37.486768] Allocated by task 254:
[   37.487344]  kasan_save_stack+0x3c/0x68
[   37.487888]  kasan_save_track+0x20/0x40
[   37.488539]  kasan_save_alloc_info+0x40/0x58
[   37.489192]  __kasan_kmalloc+0xd4/0xd8
[   37.489812]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.490500]  kasan_atomics+0xb8/0x2e8
[   37.491145]  kunit_try_run_case+0x14c/0x3d0
[   37.491736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.492490]  kthread+0x24c/0x2d0
[   37.493097]  ret_from_fork+0x10/0x20
[   37.493678] 
[   37.494050] The buggy address belongs to the object at fff00000c69ef080
[   37.494050]  which belongs to the cache kmalloc-64 of size 64
[   37.495318] The buggy address is located 0 bytes to the right of
[   37.495318]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.496710] 
[   37.497094] The buggy address belongs to the physical page:
[   37.497752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.498769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.499528] page_type: f5(slab)
[   37.500100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.500836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.501811] page dumped because: kasan: bad access detected
[   37.502561] 
[   37.502949] Memory state around the buggy address:
[   37.503593]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.504441]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.505318] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.506131]                                      ^
[   37.506780]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.507630]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.508383] ==================================================================
[   36.052666] ==================================================================
[   36.053437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.054353] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.055384] 
[   36.055874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.057115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.057756] Hardware name: linux,dummy-virt (DT)
[   36.058402] Call trace:
[   36.058850]  show_stack+0x20/0x38 (C)
[   36.059580]  dump_stack_lvl+0x8c/0xd0
[   36.060240]  print_report+0x118/0x5e0
[   36.060917]  kasan_report+0xc8/0x118
[   36.061625]  kasan_check_range+0x100/0x1a8
[   36.062341]  __kasan_check_write+0x20/0x30
[   36.063026]  kasan_atomics_helper+0xa6c/0x4858
[   36.063745]  kasan_atomics+0x198/0x2e8
[   36.064388]  kunit_try_run_case+0x14c/0x3d0
[   36.065113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.065885]  kthread+0x24c/0x2d0
[   36.066431]  ret_from_fork+0x10/0x20
[   36.067043] 
[   36.067371] Allocated by task 254:
[   36.067953]  kasan_save_stack+0x3c/0x68
[   36.068461]  kasan_save_track+0x20/0x40
[   36.069109]  kasan_save_alloc_info+0x40/0x58
[   36.069734]  __kasan_kmalloc+0xd4/0xd8
[   36.070365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.071055]  kasan_atomics+0xb8/0x2e8
[   36.071570]  kunit_try_run_case+0x14c/0x3d0
[   36.072245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072923]  kthread+0x24c/0x2d0
[   36.073497]  ret_from_fork+0x10/0x20
[   36.073985] 
[   36.074357] The buggy address belongs to the object at fff00000c69ef080
[   36.074357]  which belongs to the cache kmalloc-64 of size 64
[   36.075625] The buggy address is located 0 bytes to the right of
[   36.075625]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.076844] 
[   36.077220] The buggy address belongs to the physical page:
[   36.077998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.078799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.079696] page_type: f5(slab)
[   36.080265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.081229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.082196] page dumped because: kasan: bad access detected
[   36.082870] 
[   36.083244] Memory state around the buggy address:
[   36.084130]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.084933]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085998] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.086776]                                      ^
[   36.087088]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.087453]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.088159] ==================================================================
[   35.825236] ==================================================================
[   35.826140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.826973] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.827957] 
[   35.828374] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.829678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.830460] Hardware name: linux,dummy-virt (DT)
[   35.831186] Call trace:
[   35.831676]  show_stack+0x20/0x38 (C)
[   35.832303]  dump_stack_lvl+0x8c/0xd0
[   35.832983]  print_report+0x118/0x5e0
[   35.833535]  kasan_report+0xc8/0x118
[   35.834195]  kasan_check_range+0x100/0x1a8
[   35.834909]  __kasan_check_write+0x20/0x30
[   35.835628]  kasan_atomics_helper+0x7cc/0x4858
[   35.836304]  kasan_atomics+0x198/0x2e8
[   35.836909]  kunit_try_run_case+0x14c/0x3d0
[   35.837565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.838368]  kthread+0x24c/0x2d0
[   35.839008]  ret_from_fork+0x10/0x20
[   35.839650] 
[   35.839967] Allocated by task 254:
[   35.840554]  kasan_save_stack+0x3c/0x68
[   35.841094]  kasan_save_track+0x20/0x40
[   35.841720]  kasan_save_alloc_info+0x40/0x58
[   35.842388]  __kasan_kmalloc+0xd4/0xd8
[   35.842918]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.843636]  kasan_atomics+0xb8/0x2e8
[   35.844130]  kunit_try_run_case+0x14c/0x3d0
[   35.844815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.845498]  kthread+0x24c/0x2d0
[   35.846119]  ret_from_fork+0x10/0x20
[   35.846682] 
[   35.847066] The buggy address belongs to the object at fff00000c69ef080
[   35.847066]  which belongs to the cache kmalloc-64 of size 64
[   35.848158] The buggy address is located 0 bytes to the right of
[   35.848158]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.849466] 
[   35.849863] The buggy address belongs to the physical page:
[   35.850614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.851564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.852310] page_type: f5(slab)
[   35.852895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.853685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.854652] page dumped because: kasan: bad access detected
[   35.855352] 
[   35.855783] Memory state around the buggy address:
[   35.856298]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.857208]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858039] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.858803]                                      ^
[   35.859531]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.860281]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.861222] ==================================================================
[   35.327852] ==================================================================
[   35.328809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.329772] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.330761] 
[   35.331804] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.332875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.333151] Hardware name: linux,dummy-virt (DT)
[   35.333425] Call trace:
[   35.333731]  show_stack+0x20/0x38 (C)
[   35.334472]  dump_stack_lvl+0x8c/0xd0
[   35.335875]  print_report+0x118/0x5e0
[   35.336539]  kasan_report+0xc8/0x118
[   35.337178]  __asan_report_load4_noabort+0x20/0x30
[   35.338580]  kasan_atomics_helper+0x40fc/0x4858
[   35.339378]  kasan_atomics+0x198/0x2e8
[   35.339972]  kunit_try_run_case+0x14c/0x3d0
[   35.340740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.341527]  kthread+0x24c/0x2d0
[   35.342112]  ret_from_fork+0x10/0x20
[   35.342804] 
[   35.343223] Allocated by task 254:
[   35.343849]  kasan_save_stack+0x3c/0x68
[   35.344540]  kasan_save_track+0x20/0x40
[   35.345136]  kasan_save_alloc_info+0x40/0x58
[   35.345868]  __kasan_kmalloc+0xd4/0xd8
[   35.346540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.347189]  kasan_atomics+0xb8/0x2e8
[   35.347872]  kunit_try_run_case+0x14c/0x3d0
[   35.348596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.349297]  kthread+0x24c/0x2d0
[   35.349940]  ret_from_fork+0x10/0x20
[   35.350487] 
[   35.350922] The buggy address belongs to the object at fff00000c69ef080
[   35.350922]  which belongs to the cache kmalloc-64 of size 64
[   35.352232] The buggy address is located 0 bytes to the right of
[   35.352232]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.353570] 
[   35.353997] The buggy address belongs to the physical page:
[   35.354838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.355752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.356700] page_type: f5(slab)
[   35.357310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.358268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.359204] page dumped because: kasan: bad access detected
[   35.359922] 
[   35.360279] Memory state around the buggy address:
[   35.360965]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.361902]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.362787] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.363502]                                      ^
[   35.364262]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365125]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365918] ==================================================================
[   35.711921] ==================================================================
[   35.712694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.713658] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.714505] 
[   35.714955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.716165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.716743] Hardware name: linux,dummy-virt (DT)
[   35.717351] Call trace:
[   35.717765]  show_stack+0x20/0x38 (C)
[   35.718413]  dump_stack_lvl+0x8c/0xd0
[   35.719097]  print_report+0x118/0x5e0
[   35.719771]  kasan_report+0xc8/0x118
[   35.720346]  kasan_check_range+0x100/0x1a8
[   35.721054]  __kasan_check_write+0x20/0x30
[   35.721608]  kasan_atomics_helper+0x684/0x4858
[   35.722334]  kasan_atomics+0x198/0x2e8
[   35.723021]  kunit_try_run_case+0x14c/0x3d0
[   35.723620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.724386]  kthread+0x24c/0x2d0
[   35.724966]  ret_from_fork+0x10/0x20
[   35.725573] 
[   35.725993] Allocated by task 254:
[   35.726580]  kasan_save_stack+0x3c/0x68
[   35.727195]  kasan_save_track+0x20/0x40
[   35.727830]  kasan_save_alloc_info+0x40/0x58
[   35.728434]  __kasan_kmalloc+0xd4/0xd8
[   35.729074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.729716]  kasan_atomics+0xb8/0x2e8
[   35.730334]  kunit_try_run_case+0x14c/0x3d0
[   35.731025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.731726]  kthread+0x24c/0x2d0
[   35.732212]  ret_from_fork+0x10/0x20
[   35.732877] 
[   35.733244] The buggy address belongs to the object at fff00000c69ef080
[   35.733244]  which belongs to the cache kmalloc-64 of size 64
[   35.734495] The buggy address is located 0 bytes to the right of
[   35.734495]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.735756] 
[   35.736130] The buggy address belongs to the physical page:
[   35.736828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.737709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.738541] page_type: f5(slab)
[   35.739065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.739959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.740827] page dumped because: kasan: bad access detected
[   35.741601] 
[   35.741968] Memory state around the buggy address:
[   35.742539]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.743461]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.744297] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.745030]                                      ^
[   35.745779]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.746630]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.747467] ==================================================================
[   35.749069] ==================================================================
[   35.750037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.751366] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.752274] 
[   35.752739] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.754045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.754729] Hardware name: linux,dummy-virt (DT)
[   35.755384] Call trace:
[   35.755898]  show_stack+0x20/0x38 (C)
[   35.756529]  dump_stack_lvl+0x8c/0xd0
[   35.757233]  print_report+0x118/0x5e0
[   35.757940]  kasan_report+0xc8/0x118
[   35.758620]  kasan_check_range+0x100/0x1a8
[   35.759310]  __kasan_check_write+0x20/0x30
[   35.760064]  kasan_atomics_helper+0x6ec/0x4858
[   35.760741]  kasan_atomics+0x198/0x2e8
[   35.761446]  kunit_try_run_case+0x14c/0x3d0
[   35.762151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.763016]  kthread+0x24c/0x2d0
[   35.763681]  ret_from_fork+0x10/0x20
[   35.764304] 
[   35.764649] Allocated by task 254:
[   35.765147]  kasan_save_stack+0x3c/0x68
[   35.765839]  kasan_save_track+0x20/0x40
[   35.766323]  kasan_save_alloc_info+0x40/0x58
[   35.767020]  __kasan_kmalloc+0xd4/0xd8
[   35.767575]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.768283]  kasan_atomics+0xb8/0x2e8
[   35.768848]  kunit_try_run_case+0x14c/0x3d0
[   35.769528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.770217]  kthread+0x24c/0x2d0
[   35.770821]  ret_from_fork+0x10/0x20
[   35.771373] 
[   35.771768] The buggy address belongs to the object at fff00000c69ef080
[   35.771768]  which belongs to the cache kmalloc-64 of size 64
[   35.772840] The buggy address is located 0 bytes to the right of
[   35.772840]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.774328] 
[   35.774709] The buggy address belongs to the physical page:
[   35.775376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.776246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.777144] page_type: f5(slab)
[   35.777733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.778594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.779589] page dumped because: kasan: bad access detected
[   35.780230] 
[   35.780590] Memory state around the buggy address:
[   35.781143]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.781997]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.782805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.783676]                                      ^
[   35.784355]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.785234]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.786095] ==================================================================
[   37.510337] ==================================================================
[   37.511264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.513043] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.514617] 
[   37.515125] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.516384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.516910] Hardware name: linux,dummy-virt (DT)
[   37.517536] Call trace:
[   37.517993]  show_stack+0x20/0x38 (C)
[   37.518629]  dump_stack_lvl+0x8c/0xd0
[   37.519288]  print_report+0x118/0x5e0
[   37.519881]  kasan_report+0xc8/0x118
[   37.520408]  kasan_check_range+0x100/0x1a8
[   37.521127]  __kasan_check_write+0x20/0x30
[   37.521803]  kasan_atomics_helper+0x175c/0x4858
[   37.522466]  kasan_atomics+0x198/0x2e8
[   37.523100]  kunit_try_run_case+0x14c/0x3d0
[   37.523751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.524410]  kthread+0x24c/0x2d0
[   37.525068]  ret_from_fork+0x10/0x20
[   37.525766] 
[   37.526144] Allocated by task 254:
[   37.526715]  kasan_save_stack+0x3c/0x68
[   37.527251]  kasan_save_track+0x20/0x40
[   37.527890]  kasan_save_alloc_info+0x40/0x58
[   37.528425]  __kasan_kmalloc+0xd4/0xd8
[   37.529065]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.529672]  kasan_atomics+0xb8/0x2e8
[   37.530297]  kunit_try_run_case+0x14c/0x3d0
[   37.531003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.531755]  kthread+0x24c/0x2d0
[   37.532256]  ret_from_fork+0x10/0x20
[   37.532885] 
[   37.533263] The buggy address belongs to the object at fff00000c69ef080
[   37.533263]  which belongs to the cache kmalloc-64 of size 64
[   37.534425] The buggy address is located 0 bytes to the right of
[   37.534425]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.535808] 
[   37.536192] The buggy address belongs to the physical page:
[   37.536788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.537781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.538575] page_type: f5(slab)
[   37.539079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.540002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.540752] page dumped because: kasan: bad access detected
[   37.541499] 
[   37.541850] Memory state around the buggy address:
[   37.542435]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.543225]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.544170] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.544968]                                      ^
[   37.545551]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.546456]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.547275] ==================================================================
[   36.857160] ==================================================================
[   36.858010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.858792] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.859782] 
[   36.860192] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.861236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.861887] Hardware name: linux,dummy-virt (DT)
[   36.862575] Call trace:
[   36.863032]  show_stack+0x20/0x38 (C)
[   36.863606]  dump_stack_lvl+0x8c/0xd0
[   36.864269]  print_report+0x118/0x5e0
[   36.864952]  kasan_report+0xc8/0x118
[   36.865505]  kasan_check_range+0x100/0x1a8
[   36.866220]  __kasan_check_write+0x20/0x30
[   36.866939]  kasan_atomics_helper+0x1128/0x4858
[   36.867630]  kasan_atomics+0x198/0x2e8
[   36.868142]  kunit_try_run_case+0x14c/0x3d0
[   36.868875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.869547]  kthread+0x24c/0x2d0
[   36.870156]  ret_from_fork+0x10/0x20
[   36.870840] 
[   36.871221] Allocated by task 254:
[   36.871803]  kasan_save_stack+0x3c/0x68
[   36.872367]  kasan_save_track+0x20/0x40
[   36.872884]  kasan_save_alloc_info+0x40/0x58
[   36.873579]  __kasan_kmalloc+0xd4/0xd8
[   36.874149]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.874777]  kasan_atomics+0xb8/0x2e8
[   36.875371]  kunit_try_run_case+0x14c/0x3d0
[   36.875924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.876718]  kthread+0x24c/0x2d0
[   36.877211]  ret_from_fork+0x10/0x20
[   36.877811] 
[   36.878143] The buggy address belongs to the object at fff00000c69ef080
[   36.878143]  which belongs to the cache kmalloc-64 of size 64
[   36.879543] The buggy address is located 0 bytes to the right of
[   36.879543]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.881261] 
[   36.881620] The buggy address belongs to the physical page:
[   36.882292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.883088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.884012] page_type: f5(slab)
[   36.884275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.884819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.885796] page dumped because: kasan: bad access detected
[   36.886413] 
[   36.886797] Memory state around the buggy address:
[   36.887491]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.888314]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.889114] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.889985]                                      ^
[   36.890710]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.891534]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.892360] ==================================================================
[   36.626931] ==================================================================
[   36.627674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.628460] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.629244] 
[   36.629663] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.630851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.631360] Hardware name: linux,dummy-virt (DT)
[   36.632559] Call trace:
[   36.632940]  show_stack+0x20/0x38 (C)
[   36.633869]  dump_stack_lvl+0x8c/0xd0
[   36.634398]  print_report+0x118/0x5e0
[   36.635011]  kasan_report+0xc8/0x118
[   36.635663]  kasan_check_range+0x100/0x1a8
[   36.636325]  __kasan_check_write+0x20/0x30
[   36.636962]  kasan_atomics_helper+0xeb8/0x4858
[   36.637572]  kasan_atomics+0x198/0x2e8
[   36.638217]  kunit_try_run_case+0x14c/0x3d0
[   36.638874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.639567]  kthread+0x24c/0x2d0
[   36.640157]  ret_from_fork+0x10/0x20
[   36.640766] 
[   36.641146] Allocated by task 254:
[   36.641693]  kasan_save_stack+0x3c/0x68
[   36.642260]  kasan_save_track+0x20/0x40
[   36.642889]  kasan_save_alloc_info+0x40/0x58
[   36.643455]  __kasan_kmalloc+0xd4/0xd8
[   36.644072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.644717]  kasan_atomics+0xb8/0x2e8
[   36.645241]  kunit_try_run_case+0x14c/0x3d0
[   36.645964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.646692]  kthread+0x24c/0x2d0
[   36.647278]  ret_from_fork+0x10/0x20
[   36.647896] 
[   36.648226] The buggy address belongs to the object at fff00000c69ef080
[   36.648226]  which belongs to the cache kmalloc-64 of size 64
[   36.649559] The buggy address is located 0 bytes to the right of
[   36.649559]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.650919] 
[   36.651257] The buggy address belongs to the physical page:
[   36.651929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.652846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.653628] page_type: f5(slab)
[   36.654201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.655040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.656024] page dumped because: kasan: bad access detected
[   36.656758] 
[   36.657128] Memory state around the buggy address:
[   36.657730]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.658545]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.659410] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.660175]                                      ^
[   36.660818]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.661663]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.662570] ==================================================================
[   36.931370] ==================================================================
[   36.932233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.932944] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.933908] 
[   36.934364] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.935649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.936184] Hardware name: linux,dummy-virt (DT)
[   36.936874] Call trace:
[   36.937342]  show_stack+0x20/0x38 (C)
[   36.938032]  dump_stack_lvl+0x8c/0xd0
[   36.938669]  print_report+0x118/0x5e0
[   36.939333]  kasan_report+0xc8/0x118
[   36.939991]  kasan_check_range+0x100/0x1a8
[   36.940604]  __kasan_check_write+0x20/0x30
[   36.941292]  kasan_atomics_helper+0x11f8/0x4858
[   36.941945]  kasan_atomics+0x198/0x2e8
[   36.942543]  kunit_try_run_case+0x14c/0x3d0
[   36.943216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.944065]  kthread+0x24c/0x2d0
[   36.944687]  ret_from_fork+0x10/0x20
[   36.945271] 
[   36.945674] Allocated by task 254:
[   36.946146]  kasan_save_stack+0x3c/0x68
[   36.946808]  kasan_save_track+0x20/0x40
[   36.947404]  kasan_save_alloc_info+0x40/0x58
[   36.948099]  __kasan_kmalloc+0xd4/0xd8
[   36.948612]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.949311]  kasan_atomics+0xb8/0x2e8
[   36.949959]  kunit_try_run_case+0x14c/0x3d0
[   36.950550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.951312]  kthread+0x24c/0x2d0
[   36.951909]  ret_from_fork+0x10/0x20
[   36.952502] 
[   36.952898] The buggy address belongs to the object at fff00000c69ef080
[   36.952898]  which belongs to the cache kmalloc-64 of size 64
[   36.954179] The buggy address is located 0 bytes to the right of
[   36.954179]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.955559] 
[   36.955944] The buggy address belongs to the physical page:
[   36.956588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.957526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.958296] page_type: f5(slab)
[   36.958792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.959690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.960602] page dumped because: kasan: bad access detected
[   36.961350] 
[   36.961742] Memory state around the buggy address:
[   36.962350]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.963292]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.964110] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.965020]                                      ^
[   36.965651]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.966413]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.967260] ==================================================================
[   37.239220] ==================================================================
[   37.239964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.240853] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.241564] 
[   37.242015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.243424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.244060] Hardware name: linux,dummy-virt (DT)
[   37.244796] Call trace:
[   37.245251]  show_stack+0x20/0x38 (C)
[   37.245954]  dump_stack_lvl+0x8c/0xd0
[   37.246669]  print_report+0x118/0x5e0
[   37.247282]  kasan_report+0xc8/0x118
[   37.247970]  kasan_check_range+0x100/0x1a8
[   37.248641]  __kasan_check_write+0x20/0x30
[   37.249348]  kasan_atomics_helper+0x154c/0x4858
[   37.250075]  kasan_atomics+0x198/0x2e8
[   37.250755]  kunit_try_run_case+0x14c/0x3d0
[   37.251463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.252260]  kthread+0x24c/0x2d0
[   37.252865]  ret_from_fork+0x10/0x20
[   37.253546] 
[   37.253902] Allocated by task 254:
[   37.254499]  kasan_save_stack+0x3c/0x68
[   37.255206]  kasan_save_track+0x20/0x40
[   37.255840]  kasan_save_alloc_info+0x40/0x58
[   37.256580]  __kasan_kmalloc+0xd4/0xd8
[   37.257115]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.257864]  kasan_atomics+0xb8/0x2e8
[   37.258410]  kunit_try_run_case+0x14c/0x3d0
[   37.259134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.259895]  kthread+0x24c/0x2d0
[   37.260466]  ret_from_fork+0x10/0x20
[   37.261060] 
[   37.261466] The buggy address belongs to the object at fff00000c69ef080
[   37.261466]  which belongs to the cache kmalloc-64 of size 64
[   37.262770] The buggy address is located 0 bytes to the right of
[   37.262770]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.264104] 
[   37.264488] The buggy address belongs to the physical page:
[   37.265096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.266205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.267232] page_type: f5(slab)
[   37.267994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.269091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.270132] page dumped because: kasan: bad access detected
[   37.271004] 
[   37.271338] Memory state around the buggy address:
[   37.272039]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.273184]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.274080] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.274911]                                      ^
[   37.275627]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.276525]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.277253] ==================================================================
[   37.159976] ==================================================================
[   37.161426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.163096] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.164015] 
[   37.164366] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.165587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.166106] Hardware name: linux,dummy-virt (DT)
[   37.166790] Call trace:
[   37.167230]  show_stack+0x20/0x38 (C)
[   37.167870]  dump_stack_lvl+0x8c/0xd0
[   37.168439]  print_report+0x118/0x5e0
[   37.169111]  kasan_report+0xc8/0x118
[   37.169766]  kasan_check_range+0x100/0x1a8
[   37.170417]  __kasan_check_write+0x20/0x30
[   37.171089]  kasan_atomics_helper+0x147c/0x4858
[   37.171767]  kasan_atomics+0x198/0x2e8
[   37.172330]  kunit_try_run_case+0x14c/0x3d0
[   37.172962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.173786]  kthread+0x24c/0x2d0
[   37.174345]  ret_from_fork+0x10/0x20
[   37.174935] 
[   37.175302] Allocated by task 254:
[   37.175811]  kasan_save_stack+0x3c/0x68
[   37.176448]  kasan_save_track+0x20/0x40
[   37.177027]  kasan_save_alloc_info+0x40/0x58
[   37.177685]  __kasan_kmalloc+0xd4/0xd8
[   37.178284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.179000]  kasan_atomics+0xb8/0x2e8
[   37.179535]  kunit_try_run_case+0x14c/0x3d0
[   37.180216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.180889]  kthread+0x24c/0x2d0
[   37.181433]  ret_from_fork+0x10/0x20
[   37.182064] 
[   37.182425] The buggy address belongs to the object at fff00000c69ef080
[   37.182425]  which belongs to the cache kmalloc-64 of size 64
[   37.183643] The buggy address is located 0 bytes to the right of
[   37.183643]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.184975] 
[   37.185356] The buggy address belongs to the physical page:
[   37.186063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.187097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.187875] page_type: f5(slab)
[   37.188450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.189357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.190326] page dumped because: kasan: bad access detected
[   37.191067] 
[   37.191447] Memory state around the buggy address:
[   37.192064]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.193017]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.193774] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.194680]                                      ^
[   37.195357]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196230]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196924] ==================================================================
[   35.936931] ==================================================================
[   35.937720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.938493] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.939490] 
[   35.939923] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.941053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.941685] Hardware name: linux,dummy-virt (DT)
[   35.942334] Call trace:
[   35.942831]  show_stack+0x20/0x38 (C)
[   35.943439]  dump_stack_lvl+0x8c/0xd0
[   35.943988]  print_report+0x118/0x5e0
[   35.944650]  kasan_report+0xc8/0x118
[   35.945266]  kasan_check_range+0x100/0x1a8
[   35.945895]  __kasan_check_write+0x20/0x30
[   35.946611]  kasan_atomics_helper+0x934/0x4858
[   35.947339]  kasan_atomics+0x198/0x2e8
[   35.947956]  kunit_try_run_case+0x14c/0x3d0
[   35.948571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.949391]  kthread+0x24c/0x2d0
[   35.950019]  ret_from_fork+0x10/0x20
[   35.950561] 
[   35.950944] Allocated by task 254:
[   35.951526]  kasan_save_stack+0x3c/0x68
[   35.952100]  kasan_save_track+0x20/0x40
[   35.952608]  kasan_save_alloc_info+0x40/0x58
[   35.953290]  __kasan_kmalloc+0xd4/0xd8
[   35.953878]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.954591]  kasan_atomics+0xb8/0x2e8
[   35.955095]  kunit_try_run_case+0x14c/0x3d0
[   35.955826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.956625]  kthread+0x24c/0x2d0
[   35.957160]  ret_from_fork+0x10/0x20
[   35.957692] 
[   35.958058] The buggy address belongs to the object at fff00000c69ef080
[   35.958058]  which belongs to the cache kmalloc-64 of size 64
[   35.959284] The buggy address is located 0 bytes to the right of
[   35.959284]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.960651] 
[   35.961032] The buggy address belongs to the physical page:
[   35.961729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.962577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.963430] page_type: f5(slab)
[   35.964018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.964873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.965783] page dumped because: kasan: bad access detected
[   35.966549] 
[   35.966915] Memory state around the buggy address:
[   35.967617]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.968478]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.969312] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.970139]                                      ^
[   35.970864]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.971624]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.972430] ==================================================================
[   36.778529] ==================================================================
[   36.779284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.780341] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.781285] 
[   36.781699] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.782871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.783416] Hardware name: linux,dummy-virt (DT)
[   36.783977] Call trace:
[   36.784441]  show_stack+0x20/0x38 (C)
[   36.785081]  dump_stack_lvl+0x8c/0xd0
[   36.785777]  print_report+0x118/0x5e0
[   36.786343]  kasan_report+0xc8/0x118
[   36.787313]  kasan_check_range+0x100/0x1a8
[   36.788152]  __kasan_check_write+0x20/0x30
[   36.788989]  kasan_atomics_helper+0x1058/0x4858
[   36.789755]  kasan_atomics+0x198/0x2e8
[   36.790406]  kunit_try_run_case+0x14c/0x3d0
[   36.791207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.791989]  kthread+0x24c/0x2d0
[   36.792599]  ret_from_fork+0x10/0x20
[   36.793203] 
[   36.793622] Allocated by task 254:
[   36.794231]  kasan_save_stack+0x3c/0x68
[   36.794872]  kasan_save_track+0x20/0x40
[   36.795555]  kasan_save_alloc_info+0x40/0x58
[   36.796233]  __kasan_kmalloc+0xd4/0xd8
[   36.796917]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.797583]  kasan_atomics+0xb8/0x2e8
[   36.798240]  kunit_try_run_case+0x14c/0x3d0
[   36.798838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.799668]  kthread+0x24c/0x2d0
[   36.800245]  ret_from_fork+0x10/0x20
[   36.800885] 
[   36.801303] The buggy address belongs to the object at fff00000c69ef080
[   36.801303]  which belongs to the cache kmalloc-64 of size 64
[   36.802612] The buggy address is located 0 bytes to the right of
[   36.802612]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.803940] 
[   36.804313] The buggy address belongs to the physical page:
[   36.805035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.806086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.807035] page_type: f5(slab)
[   36.807648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.808550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.809581] page dumped because: kasan: bad access detected
[   36.810260] 
[   36.810625] Memory state around the buggy address:
[   36.811254]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.812476]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813500] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.814286]                                      ^
[   36.814974]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.815789]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816660] ==================================================================
[   36.130276] ==================================================================
[   36.131576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.132446] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.133121] 
[   36.134326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.135565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.136164] Hardware name: linux,dummy-virt (DT)
[   36.136802] Call trace:
[   36.137299]  show_stack+0x20/0x38 (C)
[   36.137998]  dump_stack_lvl+0x8c/0xd0
[   36.138666]  print_report+0x118/0x5e0
[   36.139332]  kasan_report+0xc8/0x118
[   36.139988]  __asan_report_load4_noabort+0x20/0x30
[   36.140717]  kasan_atomics_helper+0x3dcc/0x4858
[   36.141438]  kasan_atomics+0x198/0x2e8
[   36.142079]  kunit_try_run_case+0x14c/0x3d0
[   36.142798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.143604]  kthread+0x24c/0x2d0
[   36.144205]  ret_from_fork+0x10/0x20
[   36.144833] 
[   36.145233] Allocated by task 254:
[   36.145763]  kasan_save_stack+0x3c/0x68
[   36.146442]  kasan_save_track+0x20/0x40
[   36.147114]  kasan_save_alloc_info+0x40/0x58
[   36.147848]  __kasan_kmalloc+0xd4/0xd8
[   36.148379]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.149194]  kasan_atomics+0xb8/0x2e8
[   36.149959]  kunit_try_run_case+0x14c/0x3d0
[   36.150760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.151585]  kthread+0x24c/0x2d0
[   36.152242]  ret_from_fork+0x10/0x20
[   36.152910] 
[   36.153335] The buggy address belongs to the object at fff00000c69ef080
[   36.153335]  which belongs to the cache kmalloc-64 of size 64
[   36.154607] The buggy address is located 0 bytes to the right of
[   36.154607]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.156047] 
[   36.156479] The buggy address belongs to the physical page:
[   36.157140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.158162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.159097] page_type: f5(slab)
[   36.159629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.160641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.161556] page dumped because: kasan: bad access detected
[   36.162215] 
[   36.162651] Memory state around the buggy address:
[   36.163228]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.164158]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.164972] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.165898]                                      ^
[   36.166579]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.167448]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.168298] ==================================================================
[   36.012213] ==================================================================
[   36.013047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.014675] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.015866] 
[   36.016284] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.017754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.018365] Hardware name: linux,dummy-virt (DT)
[   36.019073] Call trace:
[   36.019533]  show_stack+0x20/0x38 (C)
[   36.020289]  dump_stack_lvl+0x8c/0xd0
[   36.021070]  print_report+0x118/0x5e0
[   36.021366]  kasan_report+0xc8/0x118
[   36.021804]  kasan_check_range+0x100/0x1a8
[   36.022619]  __kasan_check_write+0x20/0x30
[   36.023396]  kasan_atomics_helper+0xa04/0x4858
[   36.024252]  kasan_atomics+0x198/0x2e8
[   36.025049]  kunit_try_run_case+0x14c/0x3d0
[   36.025776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.026803]  kthread+0x24c/0x2d0
[   36.027606]  ret_from_fork+0x10/0x20
[   36.028195] 
[   36.028770] Allocated by task 254:
[   36.029254]  kasan_save_stack+0x3c/0x68
[   36.029896]  kasan_save_track+0x20/0x40
[   36.030473]  kasan_save_alloc_info+0x40/0x58
[   36.031121]  __kasan_kmalloc+0xd4/0xd8
[   36.031803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.032400]  kasan_atomics+0xb8/0x2e8
[   36.033076]  kunit_try_run_case+0x14c/0x3d0
[   36.033690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.034488]  kthread+0x24c/0x2d0
[   36.035108]  ret_from_fork+0x10/0x20
[   36.035682] 
[   36.036087] The buggy address belongs to the object at fff00000c69ef080
[   36.036087]  which belongs to the cache kmalloc-64 of size 64
[   36.037223] The buggy address is located 0 bytes to the right of
[   36.037223]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.038623] 
[   36.039018] The buggy address belongs to the physical page:
[   36.039751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.040669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.041587] page_type: f5(slab)
[   36.042124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.043112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.044049] page dumped because: kasan: bad access detected
[   36.044756] 
[   36.045167] Memory state around the buggy address:
[   36.045802]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.046650]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.047581] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.048423]                                      ^
[   36.049078]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050002]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050979] ==================================================================
[   36.893684] ==================================================================
[   36.895146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.895969] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.896796] 
[   36.897207] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.898441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.899036] Hardware name: linux,dummy-virt (DT)
[   36.899633] Call trace:
[   36.900028]  show_stack+0x20/0x38 (C)
[   36.900700]  dump_stack_lvl+0x8c/0xd0
[   36.901328]  print_report+0x118/0x5e0
[   36.901996]  kasan_report+0xc8/0x118
[   36.902581]  kasan_check_range+0x100/0x1a8
[   36.903281]  __kasan_check_write+0x20/0x30
[   36.903846]  kasan_atomics_helper+0x1190/0x4858
[   36.904498]  kasan_atomics+0x198/0x2e8
[   36.905175]  kunit_try_run_case+0x14c/0x3d0
[   36.905768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.906604]  kthread+0x24c/0x2d0
[   36.907230]  ret_from_fork+0x10/0x20
[   36.907880] 
[   36.908210] Allocated by task 254:
[   36.908798]  kasan_save_stack+0x3c/0x68
[   36.909388]  kasan_save_track+0x20/0x40
[   36.909986]  kasan_save_alloc_info+0x40/0x58
[   36.910534]  __kasan_kmalloc+0xd4/0xd8
[   36.911166]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.911841]  kasan_atomics+0xb8/0x2e8
[   36.912372]  kunit_try_run_case+0x14c/0x3d0
[   36.913045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.913650]  kthread+0x24c/0x2d0
[   36.914229]  ret_from_fork+0x10/0x20
[   36.914855] 
[   36.915227] The buggy address belongs to the object at fff00000c69ef080
[   36.915227]  which belongs to the cache kmalloc-64 of size 64
[   36.916469] The buggy address is located 0 bytes to the right of
[   36.916469]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.917697] 
[   36.918081] The buggy address belongs to the physical page:
[   36.918854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.919742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.920505] page_type: f5(slab)
[   36.921096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.921988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.922940] page dumped because: kasan: bad access detected
[   36.923700] 
[   36.924018] Memory state around the buggy address:
[   36.924677]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.925450]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.926283] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.927079]                                      ^
[   36.927737]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.928588]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.929412] ==================================================================
[   37.317446] ==================================================================
[   37.319113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.320094] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.321057] 
[   37.321546] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.322885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.323592] Hardware name: linux,dummy-virt (DT)
[   37.324235] Call trace:
[   37.324790]  show_stack+0x20/0x38 (C)
[   37.325525]  dump_stack_lvl+0x8c/0xd0
[   37.326185]  print_report+0x118/0x5e0
[   37.326854]  kasan_report+0xc8/0x118
[   37.327559]  __asan_report_load8_noabort+0x20/0x30
[   37.328352]  kasan_atomics_helper+0x3db0/0x4858
[   37.329210]  kasan_atomics+0x198/0x2e8
[   37.329778]  kunit_try_run_case+0x14c/0x3d0
[   37.330366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.331249]  kthread+0x24c/0x2d0
[   37.331861]  ret_from_fork+0x10/0x20
[   37.332402] 
[   37.332732] Allocated by task 254:
[   37.333268]  kasan_save_stack+0x3c/0x68
[   37.333873]  kasan_save_track+0x20/0x40
[   37.334506]  kasan_save_alloc_info+0x40/0x58
[   37.335067]  __kasan_kmalloc+0xd4/0xd8
[   37.335754]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.336342]  kasan_atomics+0xb8/0x2e8
[   37.336980]  kunit_try_run_case+0x14c/0x3d0
[   37.337578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.338353]  kthread+0x24c/0x2d0
[   37.338963]  ret_from_fork+0x10/0x20
[   37.339478] 
[   37.339875] The buggy address belongs to the object at fff00000c69ef080
[   37.339875]  which belongs to the cache kmalloc-64 of size 64
[   37.341120] The buggy address is located 0 bytes to the right of
[   37.341120]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.342428] 
[   37.342843] The buggy address belongs to the physical page:
[   37.343553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.344499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.345396] page_type: f5(slab)
[   37.346011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.346909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.347887] page dumped because: kasan: bad access detected
[   37.348591] 
[   37.348970] Memory state around the buggy address:
[   37.349669]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.350445]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.351303] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.352086]                                      ^
[   37.352723]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.353504]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.354362] ==================================================================
[   35.672403] ==================================================================
[   35.673230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.674473] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.676146] 
[   35.676810] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.677887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.678491] Hardware name: linux,dummy-virt (DT)
[   35.679115] Call trace:
[   35.679529]  show_stack+0x20/0x38 (C)
[   35.680124]  dump_stack_lvl+0x8c/0xd0
[   35.680704]  print_report+0x118/0x5e0
[   35.681351]  kasan_report+0xc8/0x118
[   35.681972]  kasan_check_range+0x100/0x1a8
[   35.682650]  __kasan_check_write+0x20/0x30
[   35.683238]  kasan_atomics_helper+0x61c/0x4858
[   35.683922]  kasan_atomics+0x198/0x2e8
[   35.684607]  kunit_try_run_case+0x14c/0x3d0
[   35.685315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.686052]  kthread+0x24c/0x2d0
[   35.686672]  ret_from_fork+0x10/0x20
[   35.687274] 
[   35.687682] Allocated by task 254:
[   35.688244]  kasan_save_stack+0x3c/0x68
[   35.688810]  kasan_save_track+0x20/0x40
[   35.689430]  kasan_save_alloc_info+0x40/0x58
[   35.690080]  __kasan_kmalloc+0xd4/0xd8
[   35.690717]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.691343]  kasan_atomics+0xb8/0x2e8
[   35.691977]  kunit_try_run_case+0x14c/0x3d0
[   35.692667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.693673]  kthread+0x24c/0x2d0
[   35.694286]  ret_from_fork+0x10/0x20
[   35.694785] 
[   35.695169] The buggy address belongs to the object at fff00000c69ef080
[   35.695169]  which belongs to the cache kmalloc-64 of size 64
[   35.696448] The buggy address is located 0 bytes to the right of
[   35.696448]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.697704] 
[   35.698084] The buggy address belongs to the physical page:
[   35.698829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.699731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.700550] page_type: f5(slab)
[   35.701058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.701938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.702841] page dumped because: kasan: bad access detected
[   35.703599] 
[   35.703922] Memory state around the buggy address:
[   35.704534]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.705381]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.706375] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.707253]                                      ^
[   35.708140]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709161]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.710095] ==================================================================
[   35.974636] ==================================================================
[   35.975729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.976625] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.977420] 
[   35.977831] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.979015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.979528] Hardware name: linux,dummy-virt (DT)
[   35.980204] Call trace:
[   35.980623]  show_stack+0x20/0x38 (C)
[   35.981274]  dump_stack_lvl+0x8c/0xd0
[   35.981960]  print_report+0x118/0x5e0
[   35.982620]  kasan_report+0xc8/0x118
[   35.983235]  kasan_check_range+0x100/0x1a8
[   35.983868]  __kasan_check_write+0x20/0x30
[   35.984584]  kasan_atomics_helper+0x99c/0x4858
[   35.985262]  kasan_atomics+0x198/0x2e8
[   35.985896]  kunit_try_run_case+0x14c/0x3d0
[   35.986489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.987338]  kthread+0x24c/0x2d0
[   35.987949]  ret_from_fork+0x10/0x20
[   35.988622] 
[   35.988995] Allocated by task 254:
[   35.989455]  kasan_save_stack+0x3c/0x68
[   35.990101]  kasan_save_track+0x20/0x40
[   35.990638]  kasan_save_alloc_info+0x40/0x58
[   35.991312]  __kasan_kmalloc+0xd4/0xd8
[   35.991876]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.992469]  kasan_atomics+0xb8/0x2e8
[   35.993106]  kunit_try_run_case+0x14c/0x3d0
[   35.993777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.994472]  kthread+0x24c/0x2d0
[   35.994994]  ret_from_fork+0x10/0x20
[   35.995553] 
[   35.995960] The buggy address belongs to the object at fff00000c69ef080
[   35.995960]  which belongs to the cache kmalloc-64 of size 64
[   35.997150] The buggy address is located 0 bytes to the right of
[   35.997150]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.998399] 
[   35.998800] The buggy address belongs to the physical page:
[   35.999575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.000387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.001164] page_type: f5(slab)
[   36.001756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.002604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.003529] page dumped because: kasan: bad access detected
[   36.004217] 
[   36.004560] Memory state around the buggy address:
[   36.005134]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.006062]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.006826] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.007749]                                      ^
[   36.008387]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.009193]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.010060] ==================================================================
[   37.083463] ==================================================================
[   37.084309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.085243] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.086576] 
[   37.086961] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.088094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.088664] Hardware name: linux,dummy-virt (DT)
[   37.089182] Call trace:
[   37.089675]  show_stack+0x20/0x38 (C)
[   37.090318]  dump_stack_lvl+0x8c/0xd0
[   37.090954]  print_report+0x118/0x5e0
[   37.091605]  kasan_report+0xc8/0x118
[   37.092211]  __asan_report_load8_noabort+0x20/0x30
[   37.092965]  kasan_atomics_helper+0x3f04/0x4858
[   37.093693]  kasan_atomics+0x198/0x2e8
[   37.094337]  kunit_try_run_case+0x14c/0x3d0
[   37.095017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.095775]  kthread+0x24c/0x2d0
[   37.096337]  ret_from_fork+0x10/0x20
[   37.097007] 
[   37.097383] Allocated by task 254:
[   37.097880]  kasan_save_stack+0x3c/0x68
[   37.098546]  kasan_save_track+0x20/0x40
[   37.099195]  kasan_save_alloc_info+0x40/0x58
[   37.099816]  __kasan_kmalloc+0xd4/0xd8
[   37.100415]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.101044]  kasan_atomics+0xb8/0x2e8
[   37.101672]  kunit_try_run_case+0x14c/0x3d0
[   37.102379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.103043]  kthread+0x24c/0x2d0
[   37.103650]  ret_from_fork+0x10/0x20
[   37.104251] 
[   37.104632] The buggy address belongs to the object at fff00000c69ef080
[   37.104632]  which belongs to the cache kmalloc-64 of size 64
[   37.105860] The buggy address is located 0 bytes to the right of
[   37.105860]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.107105] 
[   37.107485] The buggy address belongs to the physical page:
[   37.108207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.109133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.109978] page_type: f5(slab)
[   37.110497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.111472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.112231] page dumped because: kasan: bad access detected
[   37.113161] 
[   37.113492] Memory state around the buggy address:
[   37.114116]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.114920]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.115857] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.116753]                                      ^
[   37.117458]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.118316]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.119205] ==================================================================
[   35.248841] ==================================================================
[   35.249587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   35.250635] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.251699] 
[   35.252139] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.253071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.253688] Hardware name: linux,dummy-virt (DT)
[   35.254416] Call trace:
[   35.255013]  show_stack+0x20/0x38 (C)
[   35.255760]  dump_stack_lvl+0x8c/0xd0
[   35.256471]  print_report+0x118/0x5e0
[   35.257158]  kasan_report+0xc8/0x118
[   35.257818]  kasan_check_range+0x100/0x1a8
[   35.258598]  __kasan_check_write+0x20/0x30
[   35.259314]  kasan_atomics_helper+0x24c/0x4858
[   35.260136]  kasan_atomics+0x198/0x2e8
[   35.260852]  kunit_try_run_case+0x14c/0x3d0
[   35.261529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262351]  kthread+0x24c/0x2d0
[   35.262965]  ret_from_fork+0x10/0x20
[   35.263626] 
[   35.264015] Allocated by task 254:
[   35.264652]  kasan_save_stack+0x3c/0x68
[   35.265259]  kasan_save_track+0x20/0x40
[   35.265965]  kasan_save_alloc_info+0x40/0x58
[   35.266564]  __kasan_kmalloc+0xd4/0xd8
[   35.267227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.267876]  kasan_atomics+0xb8/0x2e8
[   35.268542]  kunit_try_run_case+0x14c/0x3d0
[   35.269156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.269961]  kthread+0x24c/0x2d0
[   35.270538]  ret_from_fork+0x10/0x20
[   35.271133] 
[   35.271569] The buggy address belongs to the object at fff00000c69ef080
[   35.271569]  which belongs to the cache kmalloc-64 of size 64
[   35.272858] The buggy address is located 0 bytes to the right of
[   35.272858]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.274193] 
[   35.274622] The buggy address belongs to the physical page:
[   35.275307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.276409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.277228] page_type: f5(slab)
[   35.277842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.278739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.279686] page dumped because: kasan: bad access detected
[   35.280393] 
[   35.280785] Memory state around the buggy address:
[   35.281379]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.282311]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.283174] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.284085]                                      ^
[   35.284753]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285641]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.286499] ==================================================================
[   36.361876] ==================================================================
[   36.362733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.363554] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.364276] 
[   36.364712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.365929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.366570] Hardware name: linux,dummy-virt (DT)
[   36.367088] Call trace:
[   36.368045]  show_stack+0x20/0x38 (C)
[   36.368652]  dump_stack_lvl+0x8c/0xd0
[   36.369248]  print_report+0x118/0x5e0
[   36.369841]  kasan_report+0xc8/0x118
[   36.370404]  __asan_report_load4_noabort+0x20/0x30
[   36.371193]  kasan_atomics_helper+0x3dd8/0x4858
[   36.371927]  kasan_atomics+0x198/0x2e8
[   36.372545]  kunit_try_run_case+0x14c/0x3d0
[   36.373176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.374001]  kthread+0x24c/0x2d0
[   36.374559]  ret_from_fork+0x10/0x20
[   36.375132] 
[   36.375487] Allocated by task 254:
[   36.376047]  kasan_save_stack+0x3c/0x68
[   36.376706]  kasan_save_track+0x20/0x40
[   36.377236]  kasan_save_alloc_info+0x40/0x58
[   36.377907]  __kasan_kmalloc+0xd4/0xd8
[   36.378448]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.379152]  kasan_atomics+0xb8/0x2e8
[   36.379781]  kunit_try_run_case+0x14c/0x3d0
[   36.380335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.381107]  kthread+0x24c/0x2d0
[   36.381654]  ret_from_fork+0x10/0x20
[   36.382268] 
[   36.382672] The buggy address belongs to the object at fff00000c69ef080
[   36.382672]  which belongs to the cache kmalloc-64 of size 64
[   36.383894] The buggy address is located 0 bytes to the right of
[   36.383894]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.385090] 
[   36.385470] The buggy address belongs to the physical page:
[   36.386216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.387087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.387987] page_type: f5(slab)
[   36.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.389361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.390331] page dumped because: kasan: bad access detected
[   36.391034] 
[   36.391376] Memory state around the buggy address:
[   36.392089]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.392933]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.393872] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.394640]                                      ^
[   36.395306]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.396282]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.397094] ==================================================================
[   36.171264] ==================================================================
[   36.172023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   36.172743] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.173656] 
[   36.174091] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.175583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.176266] Hardware name: linux,dummy-virt (DT)
[   36.176897] Call trace:
[   36.177381]  show_stack+0x20/0x38 (C)
[   36.177988]  dump_stack_lvl+0x8c/0xd0
[   36.178692]  print_report+0x118/0x5e0
[   36.179332]  kasan_report+0xc8/0x118
[   36.179976]  kasan_check_range+0x100/0x1a8
[   36.180668]  __kasan_check_write+0x20/0x30
[   36.181359]  kasan_atomics_helper+0xb70/0x4858
[   36.182053]  kasan_atomics+0x198/0x2e8
[   36.182727]  kunit_try_run_case+0x14c/0x3d0
[   36.183424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.184236]  kthread+0x24c/0x2d0
[   36.184849]  ret_from_fork+0x10/0x20
[   36.185444] 
[   36.185877] Allocated by task 254:
[   36.186390]  kasan_save_stack+0x3c/0x68
[   36.187094]  kasan_save_track+0x20/0x40
[   36.187719]  kasan_save_alloc_info+0x40/0x58
[   36.188427]  __kasan_kmalloc+0xd4/0xd8
[   36.189008]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.189753]  kasan_atomics+0xb8/0x2e8
[   36.190338]  kunit_try_run_case+0x14c/0x3d0
[   36.191066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191771]  kthread+0x24c/0x2d0
[   36.192387]  ret_from_fork+0x10/0x20
[   36.192971] 
[   36.193395] The buggy address belongs to the object at fff00000c69ef080
[   36.193395]  which belongs to the cache kmalloc-64 of size 64
[   36.194729] The buggy address is located 0 bytes to the right of
[   36.194729]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.196159] 
[   36.196500] The buggy address belongs to the physical page:
[   36.197259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.198209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.199103] page_type: f5(slab)
[   36.199620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.200606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.201504] page dumped because: kasan: bad access detected
[   36.202217] 
[   36.202624] Memory state around the buggy address:
[   36.203224]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.204144]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.205053] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.206022]                                      ^
[   36.206676]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.207612]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.208388] ==================================================================
[   35.368458] ==================================================================
[   35.369246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.370068] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.370933] 
[   35.371310] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.372486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.373128] Hardware name: linux,dummy-virt (DT)
[   35.373707] Call trace:
[   35.374114]  show_stack+0x20/0x38 (C)
[   35.374789]  dump_stack_lvl+0x8c/0xd0
[   35.375450]  print_report+0x118/0x5e0
[   35.376067]  kasan_report+0xc8/0x118
[   35.376664]  kasan_check_range+0x100/0x1a8
[   35.377250]  __kasan_check_write+0x20/0x30
[   35.377961]  kasan_atomics_helper+0x32c/0x4858
[   35.378634]  kasan_atomics+0x198/0x2e8
[   35.379219]  kunit_try_run_case+0x14c/0x3d0
[   35.379957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380707]  kthread+0x24c/0x2d0
[   35.381319]  ret_from_fork+0x10/0x20
[   35.381984] 
[   35.382367] Allocated by task 254:
[   35.382910]  kasan_save_stack+0x3c/0x68
[   35.383567]  kasan_save_track+0x20/0x40
[   35.384095]  kasan_save_alloc_info+0x40/0x58
[   35.384771]  __kasan_kmalloc+0xd4/0xd8
[   35.385237]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.385940]  kasan_atomics+0xb8/0x2e8
[   35.386468]  kunit_try_run_case+0x14c/0x3d0
[   35.387181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.387968]  kthread+0x24c/0x2d0
[   35.388466]  ret_from_fork+0x10/0x20
[   35.389098] 
[   35.389426] The buggy address belongs to the object at fff00000c69ef080
[   35.389426]  which belongs to the cache kmalloc-64 of size 64
[   35.390744] The buggy address is located 0 bytes to the right of
[   35.390744]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.391956] 
[   35.392343] The buggy address belongs to the physical page:
[   35.393102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.393948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.394806] page_type: f5(slab)
[   35.395324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.396215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.397195] page dumped because: kasan: bad access detected
[   35.397907] 
[   35.398284] Memory state around the buggy address:
[   35.398993]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.399743]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.400693] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.401416]                                      ^
[   35.402132]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.402915]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.403789] ==================================================================
[   36.703609] ==================================================================
[   36.704399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.705334] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.706203] 
[   36.706628] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.708015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.708643] Hardware name: linux,dummy-virt (DT)
[   36.709254] Call trace:
[   36.709657]  show_stack+0x20/0x38 (C)
[   36.710268]  dump_stack_lvl+0x8c/0xd0
[   36.710952]  print_report+0x118/0x5e0
[   36.711621]  kasan_report+0xc8/0x118
[   36.712267]  kasan_check_range+0x100/0x1a8
[   36.712960]  __kasan_check_write+0x20/0x30
[   36.713663]  kasan_atomics_helper+0xf88/0x4858
[   36.714338]  kasan_atomics+0x198/0x2e8
[   36.715023]  kunit_try_run_case+0x14c/0x3d0
[   36.715784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.716477]  kthread+0x24c/0x2d0
[   36.717113]  ret_from_fork+0x10/0x20
[   36.717733] 
[   36.718079] Allocated by task 254:
[   36.718661]  kasan_save_stack+0x3c/0x68
[   36.719303]  kasan_save_track+0x20/0x40
[   36.719913]  kasan_save_alloc_info+0x40/0x58
[   36.720580]  __kasan_kmalloc+0xd4/0xd8
[   36.721201]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.721905]  kasan_atomics+0xb8/0x2e8
[   36.722391]  kunit_try_run_case+0x14c/0x3d0
[   36.723094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.723833]  kthread+0x24c/0x2d0
[   36.724363]  ret_from_fork+0x10/0x20
[   36.724995] 
[   36.725306] The buggy address belongs to the object at fff00000c69ef080
[   36.725306]  which belongs to the cache kmalloc-64 of size 64
[   36.726642] The buggy address is located 0 bytes to the right of
[   36.726642]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.727903] 
[   36.728278] The buggy address belongs to the physical page:
[   36.729036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.729857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.730753] page_type: f5(slab)
[   36.731275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.732200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.733160] page dumped because: kasan: bad access detected
[   36.733782] 
[   36.734152] Memory state around the buggy address:
[   36.734860]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.735736]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.736476] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.737349]                                      ^
[   36.737972]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738803]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.739646] ==================================================================
[   36.968754] ==================================================================
[   36.969692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.970670] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.971472] 
[   36.971903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.973054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.973662] Hardware name: linux,dummy-virt (DT)
[   36.974272] Call trace:
[   36.974687]  show_stack+0x20/0x38 (C)
[   36.975293]  dump_stack_lvl+0x8c/0xd0
[   36.975948]  print_report+0x118/0x5e0
[   36.976622]  kasan_report+0xc8/0x118
[   36.977274]  kasan_check_range+0x100/0x1a8
[   36.977984]  __kasan_check_write+0x20/0x30
[   36.978589]  kasan_atomics_helper+0x126c/0x4858
[   36.979324]  kasan_atomics+0x198/0x2e8
[   36.979886]  kunit_try_run_case+0x14c/0x3d0
[   36.980627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.981361]  kthread+0x24c/0x2d0
[   36.981969]  ret_from_fork+0x10/0x20
[   36.982641] 
[   36.983019] Allocated by task 254:
[   36.983611]  kasan_save_stack+0x3c/0x68
[   36.984192]  kasan_save_track+0x20/0x40
[   36.984740]  kasan_save_alloc_info+0x40/0x58
[   36.985422]  __kasan_kmalloc+0xd4/0xd8
[   36.986028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.986738]  kasan_atomics+0xb8/0x2e8
[   36.987266]  kunit_try_run_case+0x14c/0x3d0
[   36.987957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.988658]  kthread+0x24c/0x2d0
[   36.989195]  ret_from_fork+0x10/0x20
[   36.989807] 
[   36.990180] The buggy address belongs to the object at fff00000c69ef080
[   36.990180]  which belongs to the cache kmalloc-64 of size 64
[   36.991469] The buggy address is located 0 bytes to the right of
[   36.991469]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.992709] 
[   36.993094] The buggy address belongs to the physical page:
[   36.993858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.994693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.995538] page_type: f5(slab)
[   36.996028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.996981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.997839] page dumped because: kasan: bad access detected
[   36.998378] 
[   36.998769] Memory state around the buggy address:
[   36.999457]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.000304]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.001219] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.002066]                                      ^
[   37.002783]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.003541]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.004398] ==================================================================
[   35.559076] ==================================================================
[   35.560006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.561071] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.562012] 
[   35.562397] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.563535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.564154] Hardware name: linux,dummy-virt (DT)
[   35.564743] Call trace:
[   35.565214]  show_stack+0x20/0x38 (C)
[   35.565888]  dump_stack_lvl+0x8c/0xd0
[   35.566485]  print_report+0x118/0x5e0
[   35.567050]  kasan_report+0xc8/0x118
[   35.567696]  kasan_check_range+0x100/0x1a8
[   35.568384]  __kasan_check_write+0x20/0x30
[   35.569017]  kasan_atomics_helper+0x4e4/0x4858
[   35.569757]  kasan_atomics+0x198/0x2e8
[   35.570355]  kunit_try_run_case+0x14c/0x3d0
[   35.570942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.571759]  kthread+0x24c/0x2d0
[   35.572343]  ret_from_fork+0x10/0x20
[   35.573018] 
[   35.573394] Allocated by task 254:
[   35.573898]  kasan_save_stack+0x3c/0x68
[   35.574556]  kasan_save_track+0x20/0x40
[   35.575119]  kasan_save_alloc_info+0x40/0x58
[   35.575728]  __kasan_kmalloc+0xd4/0xd8
[   35.576353]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.577015]  kasan_atomics+0xb8/0x2e8
[   35.577659]  kunit_try_run_case+0x14c/0x3d0
[   35.578322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.579026]  kthread+0x24c/0x2d0
[   35.579591]  ret_from_fork+0x10/0x20
[   35.580118] 
[   35.580497] The buggy address belongs to the object at fff00000c69ef080
[   35.580497]  which belongs to the cache kmalloc-64 of size 64
[   35.581971] The buggy address is located 0 bytes to the right of
[   35.581971]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.583233] 
[   35.583628] The buggy address belongs to the physical page:
[   35.584205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.585221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.586067] page_type: f5(slab)
[   35.586647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.587547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.588299] page dumped because: kasan: bad access detected
[   35.588966] 
[   35.589334] Memory state around the buggy address:
[   35.589857]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.590796]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.591665] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.592355]                                      ^
[   35.593073]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.593888]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.594772] ==================================================================
[   35.207633] ==================================================================
[   35.208605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   35.209653] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.211069] 
[   35.211416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.212737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.213377] Hardware name: linux,dummy-virt (DT)
[   35.214119] Call trace:
[   35.214717]  show_stack+0x20/0x38 (C)
[   35.215354]  dump_stack_lvl+0x8c/0xd0
[   35.216110]  print_report+0x118/0x5e0
[   35.216762]  kasan_report+0xc8/0x118
[   35.217454]  kasan_check_range+0x100/0x1a8
[   35.218171]  __kasan_check_read+0x20/0x30
[   35.218891]  kasan_atomics_helper+0x1ec/0x4858
[   35.219651]  kasan_atomics+0x198/0x2e8
[   35.220298]  kunit_try_run_case+0x14c/0x3d0
[   35.221019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.221840]  kthread+0x24c/0x2d0
[   35.222494]  ret_from_fork+0x10/0x20
[   35.223151] 
[   35.223525] Allocated by task 254:
[   35.224125]  kasan_save_stack+0x3c/0x68
[   35.224817]  kasan_save_track+0x20/0x40
[   35.225386]  kasan_save_alloc_info+0x40/0x58
[   35.226144]  __kasan_kmalloc+0xd4/0xd8
[   35.226694]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.227435]  kasan_atomics+0xb8/0x2e8
[   35.228038]  kunit_try_run_case+0x14c/0x3d0
[   35.228766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.229528]  kthread+0x24c/0x2d0
[   35.230086]  ret_from_fork+0x10/0x20
[   35.230754] 
[   35.231154] The buggy address belongs to the object at fff00000c69ef080
[   35.231154]  which belongs to the cache kmalloc-64 of size 64
[   35.232526] The buggy address is located 0 bytes to the right of
[   35.232526]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.233916] 
[   35.234251] The buggy address belongs to the physical page:
[   35.235036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.235999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.236903] page_type: f5(slab)
[   35.237462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.238415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.239341] page dumped because: kasan: bad access detected
[   35.240028] 
[   35.240414] Memory state around the buggy address:
[   35.241006]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.241962]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.242850] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.243721]                                      ^
[   35.244396]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.245263]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.246135] ==================================================================
[   36.741070] ==================================================================
[   36.741889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.742719] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.743669] 
[   36.744059] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.745296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.745868] Hardware name: linux,dummy-virt (DT)
[   36.746564] Call trace:
[   36.747034]  show_stack+0x20/0x38 (C)
[   36.747709]  dump_stack_lvl+0x8c/0xd0
[   36.748312]  print_report+0x118/0x5e0
[   36.748944]  kasan_report+0xc8/0x118
[   36.749606]  kasan_check_range+0x100/0x1a8
[   36.750306]  __kasan_check_write+0x20/0x30
[   36.751030]  kasan_atomics_helper+0xff0/0x4858
[   36.751741]  kasan_atomics+0x198/0x2e8
[   36.752252]  kunit_try_run_case+0x14c/0x3d0
[   36.752987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.753812]  kthread+0x24c/0x2d0
[   36.754408]  ret_from_fork+0x10/0x20
[   36.755089] 
[   36.755424] Allocated by task 254:
[   36.755962]  kasan_save_stack+0x3c/0x68
[   36.756618]  kasan_save_track+0x20/0x40
[   36.757194]  kasan_save_alloc_info+0x40/0x58
[   36.757817]  __kasan_kmalloc+0xd4/0xd8
[   36.758306]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.759024]  kasan_atomics+0xb8/0x2e8
[   36.759656]  kunit_try_run_case+0x14c/0x3d0
[   36.760341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.761136]  kthread+0x24c/0x2d0
[   36.761654]  ret_from_fork+0x10/0x20
[   36.762259] 
[   36.762653] The buggy address belongs to the object at fff00000c69ef080
[   36.762653]  which belongs to the cache kmalloc-64 of size 64
[   36.763798] The buggy address is located 0 bytes to the right of
[   36.763798]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.765045] 
[   36.765419] The buggy address belongs to the physical page:
[   36.766218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.767134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.767940] page_type: f5(slab)
[   36.768537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.769409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.770146] page dumped because: kasan: bad access detected
[   36.770931] 
[   36.771302] Memory state around the buggy address:
[   36.771863]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.772773]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.773592] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.774376]                                      ^
[   36.775096]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.775934]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.776700] ==================================================================
[   37.397941] ==================================================================
[   37.398920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.399780] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.401148] 
[   37.401441] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.402551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.403102] Hardware name: linux,dummy-virt (DT)
[   37.403726] Call trace:
[   37.404090]  show_stack+0x20/0x38 (C)
[   37.404750]  dump_stack_lvl+0x8c/0xd0
[   37.405331]  print_report+0x118/0x5e0
[   37.405998]  kasan_report+0xc8/0x118
[   37.406530]  __asan_report_load8_noabort+0x20/0x30
[   37.407288]  kasan_atomics_helper+0x3df4/0x4858
[   37.407999]  kasan_atomics+0x198/0x2e8
[   37.408671]  kunit_try_run_case+0x14c/0x3d0
[   37.409316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.410106]  kthread+0x24c/0x2d0
[   37.410609]  ret_from_fork+0x10/0x20
[   37.411245] 
[   37.411636] Allocated by task 254:
[   37.412208]  kasan_save_stack+0x3c/0x68
[   37.412764]  kasan_save_track+0x20/0x40
[   37.413327]  kasan_save_alloc_info+0x40/0x58
[   37.414007]  __kasan_kmalloc+0xd4/0xd8
[   37.414653]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.415207]  kasan_atomics+0xb8/0x2e8
[   37.415882]  kunit_try_run_case+0x14c/0x3d0
[   37.416434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.417247]  kthread+0x24c/0x2d0
[   37.417782]  ret_from_fork+0x10/0x20
[   37.418320] 
[   37.418712] The buggy address belongs to the object at fff00000c69ef080
[   37.418712]  which belongs to the cache kmalloc-64 of size 64
[   37.419864] The buggy address is located 0 bytes to the right of
[   37.419864]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.421150] 
[   37.421821] The buggy address belongs to the physical page:
[   37.422671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.423575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.424357] page_type: f5(slab)
[   37.425083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.426181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.427085] page dumped because: kasan: bad access detected
[   37.427865] 
[   37.428202] Memory state around the buggy address:
[   37.428742]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.429681]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.430448] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.431283]                                      ^
[   37.431972]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.432794]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.433545] ==================================================================
[   37.587561] ==================================================================
[   37.588318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.589324] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.590667] 
[   37.591134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.592432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.593115] Hardware name: linux,dummy-virt (DT)
[   37.593767] Call trace:
[   37.594272]  show_stack+0x20/0x38 (C)
[   37.594988]  dump_stack_lvl+0x8c/0xd0
[   37.595692]  print_report+0x118/0x5e0
[   37.596373]  kasan_report+0xc8/0x118
[   37.597001]  kasan_check_range+0x100/0x1a8
[   37.597727]  __kasan_check_write+0x20/0x30
[   37.598427]  kasan_atomics_helper+0x17ec/0x4858
[   37.599155]  kasan_atomics+0x198/0x2e8
[   37.599858]  kunit_try_run_case+0x14c/0x3d0
[   37.600576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.601363]  kthread+0x24c/0x2d0
[   37.601967]  ret_from_fork+0x10/0x20
[   37.602598] 
[   37.603016] Allocated by task 254:
[   37.603644]  kasan_save_stack+0x3c/0x68
[   37.604189]  kasan_save_track+0x20/0x40
[   37.604880]  kasan_save_alloc_info+0x40/0x58
[   37.605489]  __kasan_kmalloc+0xd4/0xd8
[   37.606196]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.606846]  kasan_atomics+0xb8/0x2e8
[   37.607450]  kunit_try_run_case+0x14c/0x3d0
[   37.608156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.608953]  kthread+0x24c/0x2d0
[   37.609498]  ret_from_fork+0x10/0x20
[   37.610117] 
[   37.610503] The buggy address belongs to the object at fff00000c69ef080
[   37.610503]  which belongs to the cache kmalloc-64 of size 64
[   37.611850] The buggy address is located 0 bytes to the right of
[   37.611850]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.613394] 
[   37.613745] The buggy address belongs to the physical page:
[   37.614532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.615463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.616390] page_type: f5(slab)
[   37.617025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.618000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.619327] page dumped because: kasan: bad access detected
[   37.619850] 
[   37.620130] Memory state around the buggy address:
[   37.620764]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.621830]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.622807] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.623779]                                      ^
[   37.624536]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.625565]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.626414] ==================================================================
[   35.863099] ==================================================================
[   35.863992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.864886] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.865828] 
[   35.866257] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.867399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.868040] Hardware name: linux,dummy-virt (DT)
[   35.868604] Call trace:
[   35.869080]  show_stack+0x20/0x38 (C)
[   35.869709]  dump_stack_lvl+0x8c/0xd0
[   35.870373]  print_report+0x118/0x5e0
[   35.870956]  kasan_report+0xc8/0x118
[   35.871553]  kasan_check_range+0x100/0x1a8
[   35.872093]  __kasan_check_write+0x20/0x30
[   35.872805]  kasan_atomics_helper+0x894/0x4858
[   35.873561]  kasan_atomics+0x198/0x2e8
[   35.874218]  kunit_try_run_case+0x14c/0x3d0
[   35.874956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.875771]  kthread+0x24c/0x2d0
[   35.876366]  ret_from_fork+0x10/0x20
[   35.876974] 
[   35.877302] Allocated by task 254:
[   35.877817]  kasan_save_stack+0x3c/0x68
[   35.878453]  kasan_save_track+0x20/0x40
[   35.879124]  kasan_save_alloc_info+0x40/0x58
[   35.879775]  __kasan_kmalloc+0xd4/0xd8
[   35.880374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.881059]  kasan_atomics+0xb8/0x2e8
[   35.881696]  kunit_try_run_case+0x14c/0x3d0
[   35.882293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.883070]  kthread+0x24c/0x2d0
[   35.883543]  ret_from_fork+0x10/0x20
[   35.884144] 
[   35.884528] The buggy address belongs to the object at fff00000c69ef080
[   35.884528]  which belongs to the cache kmalloc-64 of size 64
[   35.885839] The buggy address is located 0 bytes to the right of
[   35.885839]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.887113] 
[   35.887438] The buggy address belongs to the physical page:
[   35.888215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.889076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.889911] page_type: f5(slab)
[   35.890455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.891374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.892314] page dumped because: kasan: bad access detected
[   35.892873] 
[   35.893250] Memory state around the buggy address:
[   35.893957]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.894822]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.895805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.896679]                                      ^
[   35.897374]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.898143]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.899063] ==================================================================
[   35.518719] ==================================================================
[   35.519550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   35.520466] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.521340] 
[   35.521801] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.523373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.524062] Hardware name: linux,dummy-virt (DT)
[   35.524777] Call trace:
[   35.525286]  show_stack+0x20/0x38 (C)
[   35.525981]  dump_stack_lvl+0x8c/0xd0
[   35.526615]  print_report+0x118/0x5e0
[   35.527323]  kasan_report+0xc8/0x118
[   35.527939]  kasan_check_range+0x100/0x1a8
[   35.528677]  __kasan_check_write+0x20/0x30
[   35.529335]  kasan_atomics_helper+0x47c/0x4858
[   35.530043]  kasan_atomics+0x198/0x2e8
[   35.530688]  kunit_try_run_case+0x14c/0x3d0
[   35.531398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.532195]  kthread+0x24c/0x2d0
[   35.532827]  ret_from_fork+0x10/0x20
[   35.533463] 
[   35.533843] Allocated by task 254:
[   35.534451]  kasan_save_stack+0x3c/0x68
[   35.535087]  kasan_save_track+0x20/0x40
[   35.535823]  kasan_save_alloc_info+0x40/0x58
[   35.536711]  __kasan_kmalloc+0xd4/0xd8
[   35.537538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.538436]  kasan_atomics+0xb8/0x2e8
[   35.539249]  kunit_try_run_case+0x14c/0x3d0
[   35.539986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.540800]  kthread+0x24c/0x2d0
[   35.541269]  ret_from_fork+0x10/0x20
[   35.541816] 
[   35.542197] The buggy address belongs to the object at fff00000c69ef080
[   35.542197]  which belongs to the cache kmalloc-64 of size 64
[   35.543549] The buggy address is located 0 bytes to the right of
[   35.543549]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.544700] 
[   35.545086] The buggy address belongs to the physical page:
[   35.545889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.546853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.547648] page_type: f5(slab)
[   35.548226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.549110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.549906] page dumped because: kasan: bad access detected
[   35.550638] 
[   35.551080] Memory state around the buggy address:
[   35.551644]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.552576]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.553387] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.554149]                                      ^
[   35.554863]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.555610]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.556495] ==================================================================
[   35.119324] ==================================================================
[   35.120920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.121811] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.122693] 
[   35.123076] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.124243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.124917] Hardware name: linux,dummy-virt (DT)
[   35.125834] Call trace:
[   35.126181]  show_stack+0x20/0x38 (C)
[   35.127288]  dump_stack_lvl+0x8c/0xd0
[   35.127853]  print_report+0x118/0x5e0
[   35.128495]  kasan_report+0xc8/0x118
[   35.129023]  __asan_report_load4_noabort+0x20/0x30
[   35.129799]  kasan_atomics_helper+0x40a8/0x4858
[   35.130760]  kasan_atomics+0x198/0x2e8
[   35.131336]  kunit_try_run_case+0x14c/0x3d0
[   35.132036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.132813]  kthread+0x24c/0x2d0
[   35.133414]  ret_from_fork+0x10/0x20
[   35.134035] 
[   35.134605] Allocated by task 254:
[   35.135221]  kasan_save_stack+0x3c/0x68
[   35.136077]  kasan_save_track+0x20/0x40
[   35.137110]  kasan_save_alloc_info+0x40/0x58
[   35.137772]  __kasan_kmalloc+0xd4/0xd8
[   35.139610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.140649]  kasan_atomics+0xb8/0x2e8
[   35.141529]  kunit_try_run_case+0x14c/0x3d0
[   35.142039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.143258]  kthread+0x24c/0x2d0
[   35.143821]  ret_from_fork+0x10/0x20
[   35.144497] 
[   35.144912] The buggy address belongs to the object at fff00000c69ef080
[   35.144912]  which belongs to the cache kmalloc-64 of size 64
[   35.146225] The buggy address is located 0 bytes to the right of
[   35.146225]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.147450] 
[   35.148166] The buggy address belongs to the physical page:
[   35.149142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.150025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.150859] page_type: f5(slab)
[   35.151556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.152568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.153601] page dumped because: kasan: bad access detected
[   35.154395] 
[   35.154877] Memory state around the buggy address:
[   35.155662]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.156649]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.157360] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.158238]                                      ^
[   35.158896]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.159673]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.160610] ==================================================================
[   36.513252] ==================================================================
[   36.514038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.515042] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.515864] 
[   36.516266] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.517427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.518014] Hardware name: linux,dummy-virt (DT)
[   36.518899] Call trace:
[   36.519859]  show_stack+0x20/0x38 (C)
[   36.520844]  dump_stack_lvl+0x8c/0xd0
[   36.521493]  print_report+0x118/0x5e0
[   36.522151]  kasan_report+0xc8/0x118
[   36.522732]  __asan_report_load8_noabort+0x20/0x30
[   36.523419]  kasan_atomics_helper+0x3f58/0x4858
[   36.524146]  kasan_atomics+0x198/0x2e8
[   36.524819]  kunit_try_run_case+0x14c/0x3d0
[   36.525454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.526331]  kthread+0x24c/0x2d0
[   36.526901]  ret_from_fork+0x10/0x20
[   36.527471] 
[   36.527806] Allocated by task 254:
[   36.528370]  kasan_save_stack+0x3c/0x68
[   36.528883]  kasan_save_track+0x20/0x40
[   36.529541]  kasan_save_alloc_info+0x40/0x58
[   36.530168]  __kasan_kmalloc+0xd4/0xd8
[   36.530759]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.531460]  kasan_atomics+0xb8/0x2e8
[   36.531992]  kunit_try_run_case+0x14c/0x3d0
[   36.532697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.533487]  kthread+0x24c/0x2d0
[   36.534026]  ret_from_fork+0x10/0x20
[   36.534619] 
[   36.534999] The buggy address belongs to the object at fff00000c69ef080
[   36.534999]  which belongs to the cache kmalloc-64 of size 64
[   36.536195] The buggy address is located 0 bytes to the right of
[   36.536195]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.537438] 
[   36.537839] The buggy address belongs to the physical page:
[   36.538926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.539936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.540791] page_type: f5(slab)
[   36.541324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.542265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.543193] page dumped because: kasan: bad access detected
[   36.543822] 
[   36.544201] Memory state around the buggy address:
[   36.544899]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.545874]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.546609] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.547490]                                      ^
[   36.548137]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.548987]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549724] ==================================================================
[   37.434975] ==================================================================
[   37.435770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.436741] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.437670] 
[   37.438007] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.439352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.439944] Hardware name: linux,dummy-virt (DT)
[   37.440621] Call trace:
[   37.441088]  show_stack+0x20/0x38 (C)
[   37.441759]  dump_stack_lvl+0x8c/0xd0
[   37.442287]  print_report+0x118/0x5e0
[   37.442964]  kasan_report+0xc8/0x118
[   37.443643]  kasan_check_range+0x100/0x1a8
[   37.444227]  __kasan_check_write+0x20/0x30
[   37.444927]  kasan_atomics_helper+0x16d0/0x4858
[   37.445596]  kasan_atomics+0x198/0x2e8
[   37.446247]  kunit_try_run_case+0x14c/0x3d0
[   37.446843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.447687]  kthread+0x24c/0x2d0
[   37.448212]  ret_from_fork+0x10/0x20
[   37.448880] 
[   37.449250] Allocated by task 254:
[   37.449821]  kasan_save_stack+0x3c/0x68
[   37.450311]  kasan_save_track+0x20/0x40
[   37.450963]  kasan_save_alloc_info+0x40/0x58
[   37.451541]  __kasan_kmalloc+0xd4/0xd8
[   37.452181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.452824]  kasan_atomics+0xb8/0x2e8
[   37.453435]  kunit_try_run_case+0x14c/0x3d0
[   37.454037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.454780]  kthread+0x24c/0x2d0
[   37.455384]  ret_from_fork+0x10/0x20
[   37.455942] 
[   37.456313] The buggy address belongs to the object at fff00000c69ef080
[   37.456313]  which belongs to the cache kmalloc-64 of size 64
[   37.457584] The buggy address is located 0 bytes to the right of
[   37.457584]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.458780] 
[   37.459170] The buggy address belongs to the physical page:
[   37.459938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.460819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.461597] page_type: f5(slab)
[   37.462150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.463180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.463967] page dumped because: kasan: bad access detected
[   37.464698] 
[   37.465050] Memory state around the buggy address:
[   37.465619]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.466452]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.467390] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.468266]                                      ^
[   37.468950]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.469841]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.470721] ==================================================================
[   36.474964] ==================================================================
[   36.475900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.476281] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.477149] 
[   36.477758] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.479191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.479592] Hardware name: linux,dummy-virt (DT)
[   36.480568] Call trace:
[   36.481036]  show_stack+0x20/0x38 (C)
[   36.481672]  dump_stack_lvl+0x8c/0xd0
[   36.482229]  print_report+0x118/0x5e0
[   36.482912]  kasan_report+0xc8/0x118
[   36.483557]  kasan_check_range+0x100/0x1a8
[   36.484256]  __kasan_check_read+0x20/0x30
[   36.484970]  kasan_atomics_helper+0xdd4/0x4858
[   36.485748]  kasan_atomics+0x198/0x2e8
[   36.486426]  kunit_try_run_case+0x14c/0x3d0
[   36.487267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.488133]  kthread+0x24c/0x2d0
[   36.488724]  ret_from_fork+0x10/0x20
[   36.489258] 
[   36.489661] Allocated by task 254:
[   36.490159]  kasan_save_stack+0x3c/0x68
[   36.490796]  kasan_save_track+0x20/0x40
[   36.491446]  kasan_save_alloc_info+0x40/0x58
[   36.492123]  __kasan_kmalloc+0xd4/0xd8
[   36.492644]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.493339]  kasan_atomics+0xb8/0x2e8
[   36.493904]  kunit_try_run_case+0x14c/0x3d0
[   36.494606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.495394]  kthread+0x24c/0x2d0
[   36.495945]  ret_from_fork+0x10/0x20
[   36.496556] 
[   36.496939] The buggy address belongs to the object at fff00000c69ef080
[   36.496939]  which belongs to the cache kmalloc-64 of size 64
[   36.498176] The buggy address is located 0 bytes to the right of
[   36.498176]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.499597] 
[   36.499979] The buggy address belongs to the physical page:
[   36.500585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.501612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.502303] page_type: f5(slab)
[   36.502910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.503736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.504646] page dumped because: kasan: bad access detected
[   36.505304] 
[   36.505681] Memory state around the buggy address:
[   36.506400]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.507276]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.508123] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.508859]                                      ^
[   36.509579]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.510356]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.511232] ==================================================================
[   37.355866] ==================================================================
[   37.356812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.357750] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.358783] 
[   37.359220] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.360584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.361251] Hardware name: linux,dummy-virt (DT)
[   37.362003] Call trace:
[   37.362480]  show_stack+0x20/0x38 (C)
[   37.363291]  dump_stack_lvl+0x8c/0xd0
[   37.364037]  print_report+0x118/0x5e0
[   37.364808]  kasan_report+0xc8/0x118
[   37.365491]  kasan_check_range+0x100/0x1a8
[   37.366275]  __kasan_check_write+0x20/0x30
[   37.367090]  kasan_atomics_helper+0x1644/0x4858
[   37.367865]  kasan_atomics+0x198/0x2e8
[   37.368578]  kunit_try_run_case+0x14c/0x3d0
[   37.369370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.370206]  kthread+0x24c/0x2d0
[   37.370740]  ret_from_fork+0x10/0x20
[   37.371388] 
[   37.371769] Allocated by task 254:
[   37.372282]  kasan_save_stack+0x3c/0x68
[   37.372950]  kasan_save_track+0x20/0x40
[   37.373636]  kasan_save_alloc_info+0x40/0x58
[   37.374269]  __kasan_kmalloc+0xd4/0xd8
[   37.374942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.375569]  kasan_atomics+0xb8/0x2e8
[   37.376253]  kunit_try_run_case+0x14c/0x3d0
[   37.376923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.377708]  kthread+0x24c/0x2d0
[   37.378275]  ret_from_fork+0x10/0x20
[   37.378940] 
[   37.379303] The buggy address belongs to the object at fff00000c69ef080
[   37.379303]  which belongs to the cache kmalloc-64 of size 64
[   37.380568] The buggy address is located 0 bytes to the right of
[   37.380568]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.381902] 
[   37.382267] The buggy address belongs to the physical page:
[   37.382978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.384021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.384873] page_type: f5(slab)
[   37.385480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.386444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.387384] page dumped because: kasan: bad access detected
[   37.388086] 
[   37.388479] Memory state around the buggy address:
[   37.389103]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.390088]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.391163] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.392189]                                      ^
[   37.393005]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.394021]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.395029] ==================================================================
[   37.198504] ==================================================================
[   37.199269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.200098] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.201037] 
[   37.201376] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.202475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.203361] Hardware name: linux,dummy-virt (DT)
[   37.204058] Call trace:
[   37.204544]  show_stack+0x20/0x38 (C)
[   37.205155]  dump_stack_lvl+0x8c/0xd0
[   37.205702]  print_report+0x118/0x5e0
[   37.206347]  kasan_report+0xc8/0x118
[   37.207024]  kasan_check_range+0x100/0x1a8
[   37.207661]  __kasan_check_write+0x20/0x30
[   37.208307]  kasan_atomics_helper+0x14e4/0x4858
[   37.208914]  kasan_atomics+0x198/0x2e8
[   37.209576]  kunit_try_run_case+0x14c/0x3d0
[   37.210288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.211120]  kthread+0x24c/0x2d0
[   37.211777]  ret_from_fork+0x10/0x20
[   37.212323] 
[   37.213048] Allocated by task 254:
[   37.213713]  kasan_save_stack+0x3c/0x68
[   37.214335]  kasan_save_track+0x20/0x40
[   37.215050]  kasan_save_alloc_info+0x40/0x58
[   37.215802]  __kasan_kmalloc+0xd4/0xd8
[   37.216526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.217145]  kasan_atomics+0xb8/0x2e8
[   37.217819]  kunit_try_run_case+0x14c/0x3d0
[   37.218455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.219247]  kthread+0x24c/0x2d0
[   37.219823]  ret_from_fork+0x10/0x20
[   37.220442] 
[   37.220880] The buggy address belongs to the object at fff00000c69ef080
[   37.220880]  which belongs to the cache kmalloc-64 of size 64
[   37.222180] The buggy address is located 0 bytes to the right of
[   37.222180]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.223574] 
[   37.223975] The buggy address belongs to the physical page:
[   37.224742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.225784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.226679] page_type: f5(slab)
[   37.227172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.228121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.229068] page dumped because: kasan: bad access detected
[   37.229764] 
[   37.230161] Memory state around the buggy address:
[   37.230894]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.231812]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.232663] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.233557]                                      ^
[   37.234251]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.235140]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.236017] ==================================================================
[   37.279206] ==================================================================
[   37.280009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.281773] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.282980] 
[   37.283365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.284492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.285096] Hardware name: linux,dummy-virt (DT)
[   37.285678] Call trace:
[   37.286181]  show_stack+0x20/0x38 (C)
[   37.286785]  dump_stack_lvl+0x8c/0xd0
[   37.287452]  print_report+0x118/0x5e0
[   37.288103]  kasan_report+0xc8/0x118
[   37.288701]  kasan_check_range+0x100/0x1a8
[   37.289284]  __kasan_check_write+0x20/0x30
[   37.289994]  kasan_atomics_helper+0x15b4/0x4858
[   37.290655]  kasan_atomics+0x198/0x2e8
[   37.291326]  kunit_try_run_case+0x14c/0x3d0
[   37.291961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.292778]  kthread+0x24c/0x2d0
[   37.293398]  ret_from_fork+0x10/0x20
[   37.294010] 
[   37.294339] Allocated by task 254:
[   37.294845]  kasan_save_stack+0x3c/0x68
[   37.295486]  kasan_save_track+0x20/0x40
[   37.296104]  kasan_save_alloc_info+0x40/0x58
[   37.296938]  __kasan_kmalloc+0xd4/0xd8
[   37.297440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.298160]  kasan_atomics+0xb8/0x2e8
[   37.298791]  kunit_try_run_case+0x14c/0x3d0
[   37.299450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.300093]  kthread+0x24c/0x2d0
[   37.300685]  ret_from_fork+0x10/0x20
[   37.301294] 
[   37.301689] The buggy address belongs to the object at fff00000c69ef080
[   37.301689]  which belongs to the cache kmalloc-64 of size 64
[   37.302898] The buggy address is located 0 bytes to the right of
[   37.302898]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.304256] 
[   37.304605] The buggy address belongs to the physical page:
[   37.305317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.306285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.307133] page_type: f5(slab)
[   37.307688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.308612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.309525] page dumped because: kasan: bad access detected
[   37.310131] 
[   37.310498] Memory state around the buggy address:
[   37.311110]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.312014]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.312725] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.313642]                                      ^
[   37.314253]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.315066]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.316020] ==================================================================
[   36.248123] ==================================================================
[   36.248771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   36.249685] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.250559] 
[   36.250977] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.251993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.252630] Hardware name: linux,dummy-virt (DT)
[   36.253308] Call trace:
[   36.253806]  show_stack+0x20/0x38 (C)
[   36.254356]  dump_stack_lvl+0x8c/0xd0
[   36.255021]  print_report+0x118/0x5e0
[   36.255602]  kasan_report+0xc8/0x118
[   36.256269]  kasan_check_range+0x100/0x1a8
[   36.256824]  __kasan_check_write+0x20/0x30
[   36.257537]  kasan_atomics_helper+0xc08/0x4858
[   36.258264]  kasan_atomics+0x198/0x2e8
[   36.258909]  kunit_try_run_case+0x14c/0x3d0
[   36.259647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.260471]  kthread+0x24c/0x2d0
[   36.261054]  ret_from_fork+0x10/0x20
[   36.261621] 
[   36.262003] Allocated by task 254:
[   36.262489]  kasan_save_stack+0x3c/0x68
[   36.263156]  kasan_save_track+0x20/0x40
[   36.263736]  kasan_save_alloc_info+0x40/0x58
[   36.264360]  __kasan_kmalloc+0xd4/0xd8
[   36.264922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.265641]  kasan_atomics+0xb8/0x2e8
[   36.266165]  kunit_try_run_case+0x14c/0x3d0
[   36.266860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.267638]  kthread+0x24c/0x2d0
[   36.268219]  ret_from_fork+0x10/0x20
[   36.268793] 
[   36.269110] The buggy address belongs to the object at fff00000c69ef080
[   36.269110]  which belongs to the cache kmalloc-64 of size 64
[   36.270412] The buggy address is located 0 bytes to the right of
[   36.270412]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.271721] 
[   36.272104] The buggy address belongs to the physical page:
[   36.272822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.273689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.274419] page_type: f5(slab)
[   36.275027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.275954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.276925] page dumped because: kasan: bad access detected
[   36.277592] 
[   36.277965] Memory state around the buggy address:
[   36.278674]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.279504]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.280302] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.281065]                                      ^
[   36.281770]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.282548]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.283315] ==================================================================
[   37.006006] ==================================================================
[   37.006956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.007679] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.008658] 
[   37.009063] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.010136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.010718] Hardware name: linux,dummy-virt (DT)
[   37.011398] Call trace:
[   37.011888]  show_stack+0x20/0x38 (C)
[   37.012501]  dump_stack_lvl+0x8c/0xd0
[   37.013124]  print_report+0x118/0x5e0
[   37.013802]  kasan_report+0xc8/0x118
[   37.014351]  kasan_check_range+0x100/0x1a8
[   37.015085]  __kasan_check_write+0x20/0x30
[   37.015784]  kasan_atomics_helper+0x12d8/0x4858
[   37.016377]  kasan_atomics+0x198/0x2e8
[   37.017050]  kunit_try_run_case+0x14c/0x3d0
[   37.017753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.018589]  kthread+0x24c/0x2d0
[   37.019086]  ret_from_fork+0x10/0x20
[   37.019765] 
[   37.020144] Allocated by task 254:
[   37.020719]  kasan_save_stack+0x3c/0x68
[   37.021214]  kasan_save_track+0x20/0x40
[   37.021852]  kasan_save_alloc_info+0x40/0x58
[   37.022553]  __kasan_kmalloc+0xd4/0xd8
[   37.023188]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.023861]  kasan_atomics+0xb8/0x2e8
[   37.024407]  kunit_try_run_case+0x14c/0x3d0
[   37.025102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.025894]  kthread+0x24c/0x2d0
[   37.026427]  ret_from_fork+0x10/0x20
[   37.026981] 
[   37.027347] The buggy address belongs to the object at fff00000c69ef080
[   37.027347]  which belongs to the cache kmalloc-64 of size 64
[   37.028587] The buggy address is located 0 bytes to the right of
[   37.028587]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.029957] 
[   37.030283] The buggy address belongs to the physical page:
[   37.031001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.031849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.032732] page_type: f5(slab)
[   37.033273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.034155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.035032] page dumped because: kasan: bad access detected
[   37.035886] 
[   37.036547] Memory state around the buggy address:
[   37.037183]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.038068]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.038979] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.039996]                                      ^
[   37.040594]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.041473]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.042465] ==================================================================
[   36.284721] ==================================================================
[   36.285454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   36.286422] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.287422] 
[   36.287853] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.288968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.289566] Hardware name: linux,dummy-virt (DT)
[   36.290094] Call trace:
[   36.290576]  show_stack+0x20/0x38 (C)
[   36.291234]  dump_stack_lvl+0x8c/0xd0
[   36.291870]  print_report+0x118/0x5e0
[   36.292381]  kasan_report+0xc8/0x118
[   36.293037]  __asan_report_load4_noabort+0x20/0x30
[   36.293794]  kasan_atomics_helper+0x3de4/0x4858
[   36.294349]  kasan_atomics+0x198/0x2e8
[   36.295014]  kunit_try_run_case+0x14c/0x3d0
[   36.295763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.296482]  kthread+0x24c/0x2d0
[   36.297112]  ret_from_fork+0x10/0x20
[   36.297746] 
[   36.298132] Allocated by task 254:
[   36.298714]  kasan_save_stack+0x3c/0x68
[   36.299271]  kasan_save_track+0x20/0x40
[   36.299931]  kasan_save_alloc_info+0x40/0x58
[   36.300568]  __kasan_kmalloc+0xd4/0xd8
[   36.301147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.301847]  kasan_atomics+0xb8/0x2e8
[   36.302458]  kunit_try_run_case+0x14c/0x3d0
[   36.303046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.303810]  kthread+0x24c/0x2d0
[   36.304355]  ret_from_fork+0x10/0x20
[   36.304894] 
[   36.305274] The buggy address belongs to the object at fff00000c69ef080
[   36.305274]  which belongs to the cache kmalloc-64 of size 64
[   36.307013] The buggy address is located 0 bytes to the right of
[   36.307013]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.308313] 
[   36.309089] The buggy address belongs to the physical page:
[   36.309861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.310572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.311463] page_type: f5(slab)
[   36.312044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.313025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.314046] page dumped because: kasan: bad access detected
[   36.314677] 
[   36.315005] Memory state around the buggy address:
[   36.315751]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.316558]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.317486] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.318211]                                      ^
[   36.318926]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.319709]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320456] ==================================================================
[   35.788143] ==================================================================
[   35.788981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.789724] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.791016] 
[   35.791421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.792543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.793173] Hardware name: linux,dummy-virt (DT)
[   35.793878] Call trace:
[   35.794398]  show_stack+0x20/0x38 (C)
[   35.795004]  dump_stack_lvl+0x8c/0xd0
[   35.795674]  print_report+0x118/0x5e0
[   35.796360]  kasan_report+0xc8/0x118
[   35.796933]  kasan_check_range+0x100/0x1a8
[   35.797633]  __kasan_check_write+0x20/0x30
[   35.798213]  kasan_atomics_helper+0x760/0x4858
[   35.798998]  kasan_atomics+0x198/0x2e8
[   35.799955]  kunit_try_run_case+0x14c/0x3d0
[   35.800575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.801243]  kthread+0x24c/0x2d0
[   35.801807]  ret_from_fork+0x10/0x20
[   35.802387] 
[   35.802785] Allocated by task 254:
[   35.803333]  kasan_save_stack+0x3c/0x68
[   35.803990]  kasan_save_track+0x20/0x40
[   35.804642]  kasan_save_alloc_info+0x40/0x58
[   35.805166]  __kasan_kmalloc+0xd4/0xd8
[   35.805841]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.806416]  kasan_atomics+0xb8/0x2e8
[   35.807062]  kunit_try_run_case+0x14c/0x3d0
[   35.807669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.808305]  kthread+0x24c/0x2d0
[   35.808912]  ret_from_fork+0x10/0x20
[   35.809468] 
[   35.809811] The buggy address belongs to the object at fff00000c69ef080
[   35.809811]  which belongs to the cache kmalloc-64 of size 64
[   35.811008] The buggy address is located 0 bytes to the right of
[   35.811008]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.812339] 
[   35.812743] The buggy address belongs to the physical page:
[   35.813319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.814243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.815063] page_type: f5(slab)
[   35.815573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.816616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.817386] page dumped because: kasan: bad access detected
[   35.818154] 
[   35.818468] Memory state around the buggy address:
[   35.819084]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.819961]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.820722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.821476]                                      ^
[   35.822198]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.822973]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.823905] ==================================================================
[   35.900810] ==================================================================
[   35.901645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.902424] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.903316] 
[   35.903703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.904830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.905320] Hardware name: linux,dummy-virt (DT)
[   35.906020] Call trace:
[   35.906488]  show_stack+0x20/0x38 (C)
[   35.907161]  dump_stack_lvl+0x8c/0xd0
[   35.907739]  print_report+0x118/0x5e0
[   35.908385]  kasan_report+0xc8/0x118
[   35.908951]  __asan_report_load4_noabort+0x20/0x30
[   35.909704]  kasan_atomics_helper+0x42d8/0x4858
[   35.910268]  kasan_atomics+0x198/0x2e8
[   35.910941]  kunit_try_run_case+0x14c/0x3d0
[   35.911538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.912316]  kthread+0x24c/0x2d0
[   35.912861]  ret_from_fork+0x10/0x20
[   35.913526] 
[   35.913897] Allocated by task 254:
[   35.914455]  kasan_save_stack+0x3c/0x68
[   35.915041]  kasan_save_track+0x20/0x40
[   35.915715]  kasan_save_alloc_info+0x40/0x58
[   35.916245]  __kasan_kmalloc+0xd4/0xd8
[   35.916893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.917548]  kasan_atomics+0xb8/0x2e8
[   35.918168]  kunit_try_run_case+0x14c/0x3d0
[   35.918753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.919585]  kthread+0x24c/0x2d0
[   35.920131]  ret_from_fork+0x10/0x20
[   35.920629] 
[   35.921008] The buggy address belongs to the object at fff00000c69ef080
[   35.921008]  which belongs to the cache kmalloc-64 of size 64
[   35.922312] The buggy address is located 0 bytes to the right of
[   35.922312]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.923739] 
[   35.924094] The buggy address belongs to the physical page:
[   35.924855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.925737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.926623] page_type: f5(slab)
[   35.927171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.928013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.928861] page dumped because: kasan: bad access detected
[   35.929628] 
[   35.929951] Memory state around the buggy address:
[   35.930530]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.931375]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.932203] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.933023]                                      ^
[   35.933661]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.934606]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935292] ==================================================================
[   37.120741] ==================================================================
[   37.121485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.122501] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.123492] 
[   37.123956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.125113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.125797] Hardware name: linux,dummy-virt (DT)
[   37.126359] Call trace:
[   37.126881]  show_stack+0x20/0x38 (C)
[   37.127529]  dump_stack_lvl+0x8c/0xd0
[   37.128203]  print_report+0x118/0x5e0
[   37.128892]  kasan_report+0xc8/0x118
[   37.129569]  kasan_check_range+0x100/0x1a8
[   37.130330]  __kasan_check_write+0x20/0x30
[   37.130959]  kasan_atomics_helper+0x1414/0x4858
[   37.131795]  kasan_atomics+0x198/0x2e8
[   37.132430]  kunit_try_run_case+0x14c/0x3d0
[   37.133198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.133969]  kthread+0x24c/0x2d0
[   37.134643]  ret_from_fork+0x10/0x20
[   37.135279] 
[   37.135672] Allocated by task 254:
[   37.136276]  kasan_save_stack+0x3c/0x68
[   37.136890]  kasan_save_track+0x20/0x40
[   37.137582]  kasan_save_alloc_info+0x40/0x58
[   37.138202]  __kasan_kmalloc+0xd4/0xd8
[   37.138893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.139559]  kasan_atomics+0xb8/0x2e8
[   37.140211]  kunit_try_run_case+0x14c/0x3d0
[   37.140799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141601]  kthread+0x24c/0x2d0
[   37.142196]  ret_from_fork+0x10/0x20
[   37.142798] 
[   37.143220] The buggy address belongs to the object at fff00000c69ef080
[   37.143220]  which belongs to the cache kmalloc-64 of size 64
[   37.144487] The buggy address is located 0 bytes to the right of
[   37.144487]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.145847] 
[   37.146220] The buggy address belongs to the physical page:
[   37.146883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.147851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.148745] page_type: f5(slab)
[   37.149280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.150251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.151200] page dumped because: kasan: bad access detected
[   37.151899] 
[   37.152298] Memory state around the buggy address:
[   37.152940]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.153864]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.154736] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.155616]                                      ^
[   37.156228]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.157107]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.157996] ==================================================================
[   35.481423] ==================================================================
[   35.482566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.483611] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.484503] 
[   35.484865] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.486008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.486617] Hardware name: linux,dummy-virt (DT)
[   35.487130] Call trace:
[   35.487620]  show_stack+0x20/0x38 (C)
[   35.488279]  dump_stack_lvl+0x8c/0xd0
[   35.488905]  print_report+0x118/0x5e0
[   35.489421]  kasan_report+0xc8/0x118
[   35.490077]  kasan_check_range+0x100/0x1a8
[   35.490791]  __kasan_check_write+0x20/0x30
[   35.491363]  kasan_atomics_helper+0x414/0x4858
[   35.492095]  kasan_atomics+0x198/0x2e8
[   35.492707]  kunit_try_run_case+0x14c/0x3d0
[   35.493417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.494156]  kthread+0x24c/0x2d0
[   35.494731]  ret_from_fork+0x10/0x20
[   35.495305] 
[   35.495706] Allocated by task 254:
[   35.496171]  kasan_save_stack+0x3c/0x68
[   35.496823]  kasan_save_track+0x20/0x40
[   35.497398]  kasan_save_alloc_info+0x40/0x58
[   35.498069]  __kasan_kmalloc+0xd4/0xd8
[   35.498576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.499280]  kasan_atomics+0xb8/0x2e8
[   35.499786]  kunit_try_run_case+0x14c/0x3d0
[   35.500455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.501101]  kthread+0x24c/0x2d0
[   35.501642]  ret_from_fork+0x10/0x20
[   35.502245] 
[   35.502646] The buggy address belongs to the object at fff00000c69ef080
[   35.502646]  which belongs to the cache kmalloc-64 of size 64
[   35.503918] The buggy address is located 0 bytes to the right of
[   35.503918]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.505027] 
[   35.505443] The buggy address belongs to the physical page:
[   35.506219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.507196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.507939] page_type: f5(slab)
[   35.508567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.509484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.510396] page dumped because: kasan: bad access detected
[   35.511114] 
[   35.511491] Memory state around the buggy address:
[   35.512205]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.513048]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.513951] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.514818]                                      ^
[   35.515436]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.516340]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.517201] ==================================================================
[   35.405667] ==================================================================
[   35.406736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   35.407801] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.408477] 
[   35.408913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.410100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.410597] Hardware name: linux,dummy-virt (DT)
[   35.411282] Call trace:
[   35.411777]  show_stack+0x20/0x38 (C)
[   35.412429]  dump_stack_lvl+0x8c/0xd0
[   35.413109]  print_report+0x118/0x5e0
[   35.413750]  kasan_report+0xc8/0x118
[   35.414260]  __asan_report_store4_noabort+0x20/0x30
[   35.415046]  kasan_atomics_helper+0x3f94/0x4858
[   35.415807]  kasan_atomics+0x198/0x2e8
[   35.416457]  kunit_try_run_case+0x14c/0x3d0
[   35.417175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418004]  kthread+0x24c/0x2d0
[   35.418572]  ret_from_fork+0x10/0x20
[   35.419159] 
[   35.419542] Allocated by task 254:
[   35.420085]  kasan_save_stack+0x3c/0x68
[   35.420756]  kasan_save_track+0x20/0x40
[   35.421376]  kasan_save_alloc_info+0x40/0x58
[   35.422025]  __kasan_kmalloc+0xd4/0xd8
[   35.422671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.423376]  kasan_atomics+0xb8/0x2e8
[   35.423961]  kunit_try_run_case+0x14c/0x3d0
[   35.424619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.425413]  kthread+0x24c/0x2d0
[   35.425978]  ret_from_fork+0x10/0x20
[   35.426607] 
[   35.426966] The buggy address belongs to the object at fff00000c69ef080
[   35.426966]  which belongs to the cache kmalloc-64 of size 64
[   35.428243] The buggy address is located 0 bytes to the right of
[   35.428243]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.429545] 
[   35.429928] The buggy address belongs to the physical page:
[   35.430632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.431473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.432345] page_type: f5(slab)
[   35.432896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.433780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.434647] page dumped because: kasan: bad access detected
[   35.435307] 
[   35.435691] Memory state around the buggy address:
[   35.436389]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.437138]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.438046] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.438877]                                      ^
[   35.439428]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440378]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.441152] ==================================================================
[   36.819357] ==================================================================
[   36.820413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.821240] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.822203] 
[   36.822660] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.823960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.824609] Hardware name: linux,dummy-virt (DT)
[   36.825302] Call trace:
[   36.825747]  show_stack+0x20/0x38 (C)
[   36.826404]  dump_stack_lvl+0x8c/0xd0
[   36.827007]  print_report+0x118/0x5e0
[   36.827594]  kasan_report+0xc8/0x118
[   36.828248]  kasan_check_range+0x100/0x1a8
[   36.828964]  __kasan_check_write+0x20/0x30
[   36.829672]  kasan_atomics_helper+0x10c0/0x4858
[   36.830288]  kasan_atomics+0x198/0x2e8
[   36.830968]  kunit_try_run_case+0x14c/0x3d0
[   36.831629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.832436]  kthread+0x24c/0x2d0
[   36.833067]  ret_from_fork+0x10/0x20
[   36.833694] 
[   36.834040] Allocated by task 254:
[   36.834620]  kasan_save_stack+0x3c/0x68
[   36.835197]  kasan_save_track+0x20/0x40
[   36.835796]  kasan_save_alloc_info+0x40/0x58
[   36.836367]  __kasan_kmalloc+0xd4/0xd8
[   36.836971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.837558]  kasan_atomics+0xb8/0x2e8
[   36.838191]  kunit_try_run_case+0x14c/0x3d0
[   36.838882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.839657]  kthread+0x24c/0x2d0
[   36.840245]  ret_from_fork+0x10/0x20
[   36.840878] 
[   36.841264] The buggy address belongs to the object at fff00000c69ef080
[   36.841264]  which belongs to the cache kmalloc-64 of size 64
[   36.842348] The buggy address is located 0 bytes to the right of
[   36.842348]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.843718] 
[   36.844090] The buggy address belongs to the physical page:
[   36.844853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.845707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.846530] page_type: f5(slab)
[   36.847066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.848071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.848883] page dumped because: kasan: bad access detected
[   36.849708] 
[   36.850005] Memory state around the buggy address:
[   36.850710]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.851560]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.852338] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.853163]                                      ^
[   36.853746]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.854681]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.855491] ==================================================================
[   36.551253] ==================================================================
[   36.552086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.552820] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.553766] 
[   36.554210] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.555277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.555941] Hardware name: linux,dummy-virt (DT)
[   36.556571] Call trace:
[   36.557037]  show_stack+0x20/0x38 (C)
[   36.557662]  dump_stack_lvl+0x8c/0xd0
[   36.558319]  print_report+0x118/0x5e0
[   36.559003]  kasan_report+0xc8/0x118
[   36.559643]  kasan_check_range+0x100/0x1a8
[   36.560167]  __kasan_check_write+0x20/0x30
[   36.560881]  kasan_atomics_helper+0xe44/0x4858
[   36.561620]  kasan_atomics+0x198/0x2e8
[   36.562215]  kunit_try_run_case+0x14c/0x3d0
[   36.562884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.563637]  kthread+0x24c/0x2d0
[   36.564262]  ret_from_fork+0x10/0x20
[   36.564837] 
[   36.565220] Allocated by task 254:
[   36.565814]  kasan_save_stack+0x3c/0x68
[   36.566444]  kasan_save_track+0x20/0x40
[   36.566973]  kasan_save_alloc_info+0x40/0x58
[   36.567671]  __kasan_kmalloc+0xd4/0xd8
[   36.568304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.568888]  kasan_atomics+0xb8/0x2e8
[   36.569776]  kunit_try_run_case+0x14c/0x3d0
[   36.570406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.571131]  kthread+0x24c/0x2d0
[   36.571729]  ret_from_fork+0x10/0x20
[   36.572268] 
[   36.572661] The buggy address belongs to the object at fff00000c69ef080
[   36.572661]  which belongs to the cache kmalloc-64 of size 64
[   36.573848] The buggy address is located 0 bytes to the right of
[   36.573848]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.575113] 
[   36.575483] The buggy address belongs to the physical page:
[   36.576278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.577105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.577955] page_type: f5(slab)
[   36.578550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.579388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.580362] page dumped because: kasan: bad access detected
[   36.581082] 
[   36.581456] Memory state around the buggy address:
[   36.582097]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.582943]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.583785] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.584544]                                      ^
[   36.585232]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.586080]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.586928] ==================================================================
[   37.548824] ==================================================================
[   37.549767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.550857] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.552051] 
[   37.552782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.554207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.554670] Hardware name: linux,dummy-virt (DT)
[   37.555143] Call trace:
[   37.555591]  show_stack+0x20/0x38 (C)
[   37.556111]  dump_stack_lvl+0x8c/0xd0
[   37.556405]  print_report+0x118/0x5e0
[   37.557178]  kasan_report+0xc8/0x118
[   37.557875]  __asan_report_load8_noabort+0x20/0x30
[   37.558724]  kasan_atomics_helper+0x3e20/0x4858
[   37.559529]  kasan_atomics+0x198/0x2e8
[   37.560104]  kunit_try_run_case+0x14c/0x3d0
[   37.560823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.561637]  kthread+0x24c/0x2d0
[   37.562246]  ret_from_fork+0x10/0x20
[   37.562827] 
[   37.563203] Allocated by task 254:
[   37.563691]  kasan_save_stack+0x3c/0x68
[   37.564331]  kasan_save_track+0x20/0x40
[   37.565032]  kasan_save_alloc_info+0x40/0x58
[   37.565797]  __kasan_kmalloc+0xd4/0xd8
[   37.566335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.567092]  kasan_atomics+0xb8/0x2e8
[   37.567681]  kunit_try_run_case+0x14c/0x3d0
[   37.568398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.569158]  kthread+0x24c/0x2d0
[   37.569806]  ret_from_fork+0x10/0x20
[   37.570374] 
[   37.570811] The buggy address belongs to the object at fff00000c69ef080
[   37.570811]  which belongs to the cache kmalloc-64 of size 64
[   37.572127] The buggy address is located 0 bytes to the right of
[   37.572127]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.573485] 
[   37.573927] The buggy address belongs to the physical page:
[   37.574638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.575640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.576603] page_type: f5(slab)
[   37.577126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.578098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.579008] page dumped because: kasan: bad access detected
[   37.579748] 
[   37.580159] Memory state around the buggy address:
[   37.580860]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.581777]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.582642] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.583542]                                      ^
[   37.584158]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.585083]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.585997] ==================================================================
[   36.588661] ==================================================================
[   36.589716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.590910] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.591702] 
[   36.592108] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.593407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.593934] Hardware name: linux,dummy-virt (DT)
[   36.594631] Call trace:
[   36.595104]  show_stack+0x20/0x38 (C)
[   36.595796]  dump_stack_lvl+0x8c/0xd0
[   36.596351]  print_report+0x118/0x5e0
[   36.597004]  kasan_report+0xc8/0x118
[   36.597566]  __asan_report_store8_noabort+0x20/0x30
[   36.598326]  kasan_atomics_helper+0x3e5c/0x4858
[   36.598940]  kasan_atomics+0x198/0x2e8
[   36.599604]  kunit_try_run_case+0x14c/0x3d0
[   36.600316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.601783]  kthread+0x24c/0x2d0
[   36.602339]  ret_from_fork+0x10/0x20
[   36.602885] 
[   36.603265] Allocated by task 254:
[   36.603840]  kasan_save_stack+0x3c/0x68
[   36.604453]  kasan_save_track+0x20/0x40
[   36.605106]  kasan_save_alloc_info+0x40/0x58
[   36.605846]  __kasan_kmalloc+0xd4/0xd8
[   36.606469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.607097]  kasan_atomics+0xb8/0x2e8
[   36.607714]  kunit_try_run_case+0x14c/0x3d0
[   36.608399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.609191]  kthread+0x24c/0x2d0
[   36.609719]  ret_from_fork+0x10/0x20
[   36.610302] 
[   36.610693] The buggy address belongs to the object at fff00000c69ef080
[   36.610693]  which belongs to the cache kmalloc-64 of size 64
[   36.611897] The buggy address is located 0 bytes to the right of
[   36.611897]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.613247] 
[   36.613649] The buggy address belongs to the physical page:
[   36.614301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.615333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.616141] page_type: f5(slab)
[   36.616671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.617601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.618371] page dumped because: kasan: bad access detected
[   36.619140] 
[   36.619535] Memory state around the buggy address:
[   36.620180]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.621126]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.621887] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.622771]                                      ^
[   36.623429]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.624315]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.625171] ==================================================================
[   37.045413] ==================================================================
[   37.046393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.047404] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.048446] 
[   37.048944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.049775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.050396] Hardware name: linux,dummy-virt (DT)
[   37.051112] Call trace:
[   37.051584]  show_stack+0x20/0x38 (C)
[   37.052247]  dump_stack_lvl+0x8c/0xd0
[   37.052827]  print_report+0x118/0x5e0
[   37.053729]  kasan_report+0xc8/0x118
[   37.054271]  kasan_check_range+0x100/0x1a8
[   37.054928]  __kasan_check_write+0x20/0x30
[   37.055619]  kasan_atomics_helper+0x1384/0x4858
[   37.056281]  kasan_atomics+0x198/0x2e8
[   37.056950]  kunit_try_run_case+0x14c/0x3d0
[   37.057567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.058357]  kthread+0x24c/0x2d0
[   37.058918]  ret_from_fork+0x10/0x20
[   37.059584] 
[   37.059953] Allocated by task 254:
[   37.060449]  kasan_save_stack+0x3c/0x68
[   37.061114]  kasan_save_track+0x20/0x40
[   37.061734]  kasan_save_alloc_info+0x40/0x58
[   37.062419]  __kasan_kmalloc+0xd4/0xd8
[   37.063074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.063685]  kasan_atomics+0xb8/0x2e8
[   37.064263]  kunit_try_run_case+0x14c/0x3d0
[   37.064956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.065751]  kthread+0x24c/0x2d0
[   37.066276]  ret_from_fork+0x10/0x20
[   37.066864] 
[   37.067248] The buggy address belongs to the object at fff00000c69ef080
[   37.067248]  which belongs to the cache kmalloc-64 of size 64
[   37.068426] The buggy address is located 0 bytes to the right of
[   37.068426]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.069870] 
[   37.070253] The buggy address belongs to the physical page:
[   37.071041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.071868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.072727] page_type: f5(slab)
[   37.073307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.074292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.075150] page dumped because: kasan: bad access detected
[   37.075905] 
[   37.076282] Memory state around the buggy address:
[   37.076939]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.077879]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.078780] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.079638]                                      ^
[   37.080326]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.081114]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.081904] ==================================================================
[   35.596223] ==================================================================
[   35.597234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.598425] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.599456] 
[   35.599918] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.601185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.601741] Hardware name: linux,dummy-virt (DT)
[   35.602416] Call trace:
[   35.602943]  show_stack+0x20/0x38 (C)
[   35.603565]  dump_stack_lvl+0x8c/0xd0
[   35.604261]  print_report+0x118/0x5e0
[   35.604893]  kasan_report+0xc8/0x118
[   35.605472]  kasan_check_range+0x100/0x1a8
[   35.606167]  __kasan_check_write+0x20/0x30
[   35.606821]  kasan_atomics_helper+0x54c/0x4858
[   35.607558]  kasan_atomics+0x198/0x2e8
[   35.608221]  kunit_try_run_case+0x14c/0x3d0
[   35.608955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.609652]  kthread+0x24c/0x2d0
[   35.610257]  ret_from_fork+0x10/0x20
[   35.610927] 
[   35.611280] Allocated by task 254:
[   35.611831]  kasan_save_stack+0x3c/0x68
[   35.612462]  kasan_save_track+0x20/0x40
[   35.613184]  kasan_save_alloc_info+0x40/0x58
[   35.613855]  __kasan_kmalloc+0xd4/0xd8
[   35.614413]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.615066]  kasan_atomics+0xb8/0x2e8
[   35.615584]  kunit_try_run_case+0x14c/0x3d0
[   35.616302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.617098]  kthread+0x24c/0x2d0
[   35.617699]  ret_from_fork+0x10/0x20
[   35.618177] 
[   35.618577] The buggy address belongs to the object at fff00000c69ef080
[   35.618577]  which belongs to the cache kmalloc-64 of size 64
[   35.619686] The buggy address is located 0 bytes to the right of
[   35.619686]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.621141] 
[   35.621541] The buggy address belongs to the physical page:
[   35.622138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.623153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.624054] page_type: f5(slab)
[   35.624536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.625437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.626311] page dumped because: kasan: bad access detected
[   35.627087] 
[   35.627395] Memory state around the buggy address:
[   35.628013]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.628858]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.629722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.630468]                                      ^
[   35.631161]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.631955]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.632818] ==================================================================
[   35.635238] ==================================================================
[   35.636199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.637054] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.637905] 
[   35.638340] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.639286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.639920] Hardware name: linux,dummy-virt (DT)
[   35.640614] Call trace:
[   35.641084]  show_stack+0x20/0x38 (C)
[   35.641765]  dump_stack_lvl+0x8c/0xd0
[   35.642317]  print_report+0x118/0x5e0
[   35.642989]  kasan_report+0xc8/0x118
[   35.643622]  kasan_check_range+0x100/0x1a8
[   35.644251]  __kasan_check_write+0x20/0x30
[   35.644859]  kasan_atomics_helper+0x5b4/0x4858
[   35.645506]  kasan_atomics+0x198/0x2e8
[   35.646161]  kunit_try_run_case+0x14c/0x3d0
[   35.646786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.647638]  kthread+0x24c/0x2d0
[   35.648227]  ret_from_fork+0x10/0x20
[   35.648814] 
[   35.649181] Allocated by task 254:
[   35.649720]  kasan_save_stack+0x3c/0x68
[   35.650357]  kasan_save_track+0x20/0x40
[   35.650923]  kasan_save_alloc_info+0x40/0x58
[   35.651627]  __kasan_kmalloc+0xd4/0xd8
[   35.652252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.652808]  kasan_atomics+0xb8/0x2e8
[   35.653435]  kunit_try_run_case+0x14c/0x3d0
[   35.654125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.654880]  kthread+0x24c/0x2d0
[   35.655467]  ret_from_fork+0x10/0x20
[   35.656122] 
[   35.656503] The buggy address belongs to the object at fff00000c69ef080
[   35.656503]  which belongs to the cache kmalloc-64 of size 64
[   35.657644] The buggy address is located 0 bytes to the right of
[   35.657644]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.658844] 
[   35.659221] The buggy address belongs to the physical page:
[   35.659965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.660929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.661676] page_type: f5(slab)
[   35.662212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.663226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.663990] page dumped because: kasan: bad access detected
[   35.664752] 
[   35.665132] Memory state around the buggy address:
[   35.665718]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.666615]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.667571] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.668265]                                      ^
[   35.668976]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.669772]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670558] ==================================================================
[   36.091041] ==================================================================
[   36.091874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.092788] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.093462] 
[   36.093893] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.095101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.095752] Hardware name: linux,dummy-virt (DT)
[   36.096287] Call trace:
[   36.096765]  show_stack+0x20/0x38 (C)
[   36.097399]  dump_stack_lvl+0x8c/0xd0
[   36.098078]  print_report+0x118/0x5e0
[   36.098682]  kasan_report+0xc8/0x118
[   36.099343]  kasan_check_range+0x100/0x1a8
[   36.100035]  __kasan_check_write+0x20/0x30
[   36.100750]  kasan_atomics_helper+0xad4/0x4858
[   36.101408]  kasan_atomics+0x198/0x2e8
[   36.102016]  kunit_try_run_case+0x14c/0x3d0
[   36.102704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.103555]  kthread+0x24c/0x2d0
[   36.104136]  ret_from_fork+0x10/0x20
[   36.104732] 
[   36.105162] Allocated by task 254:
[   36.105629]  kasan_save_stack+0x3c/0x68
[   36.106217]  kasan_save_track+0x20/0x40
[   36.106829]  kasan_save_alloc_info+0x40/0x58
[   36.107458]  __kasan_kmalloc+0xd4/0xd8
[   36.108068]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.109150]  kasan_atomics+0xb8/0x2e8
[   36.109674]  kunit_try_run_case+0x14c/0x3d0
[   36.110255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.111032]  kthread+0x24c/0x2d0
[   36.111620]  ret_from_fork+0x10/0x20
[   36.112267] 
[   36.112664] The buggy address belongs to the object at fff00000c69ef080
[   36.112664]  which belongs to the cache kmalloc-64 of size 64
[   36.113919] The buggy address is located 0 bytes to the right of
[   36.113919]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.115249] 
[   36.115675] The buggy address belongs to the physical page:
[   36.116431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.117447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.118320] page_type: f5(slab)
[   36.118924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.119953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.120982] page dumped because: kasan: bad access detected
[   36.121772] 
[   36.122201] Memory state around the buggy address:
[   36.122864]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.123869]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.124800] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.125776]                                      ^
[   36.126345]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.127318]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128300] ==================================================================
[   36.210102] ==================================================================
[   36.210797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   36.211792] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.212692] 
[   36.213081] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.214146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.214796] Hardware name: linux,dummy-virt (DT)
[   36.215489] Call trace:
[   36.215986]  show_stack+0x20/0x38 (C)
[   36.216649]  dump_stack_lvl+0x8c/0xd0
[   36.217264]  print_report+0x118/0x5e0
[   36.217787]  kasan_report+0xc8/0x118
[   36.218420]  __asan_report_load4_noabort+0x20/0x30
[   36.219133]  kasan_atomics_helper+0x3dbc/0x4858
[   36.219869]  kasan_atomics+0x198/0x2e8
[   36.220438]  kunit_try_run_case+0x14c/0x3d0
[   36.221075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.221851]  kthread+0x24c/0x2d0
[   36.222457]  ret_from_fork+0x10/0x20
[   36.223126] 
[   36.223440] Allocated by task 254:
[   36.224026]  kasan_save_stack+0x3c/0x68
[   36.224628]  kasan_save_track+0x20/0x40
[   36.225158]  kasan_save_alloc_info+0x40/0x58
[   36.225874]  __kasan_kmalloc+0xd4/0xd8
[   36.226496]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.227128]  kasan_atomics+0xb8/0x2e8
[   36.227775]  kunit_try_run_case+0x14c/0x3d0
[   36.228444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.229202]  kthread+0x24c/0x2d0
[   36.229772]  ret_from_fork+0x10/0x20
[   36.230381] 
[   36.230758] The buggy address belongs to the object at fff00000c69ef080
[   36.230758]  which belongs to the cache kmalloc-64 of size 64
[   36.231956] The buggy address is located 0 bytes to the right of
[   36.231956]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.233185] 
[   36.233592] The buggy address belongs to the physical page:
[   36.234331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.235183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.236010] page_type: f5(slab)
[   36.236584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.237466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.238317] page dumped because: kasan: bad access detected
[   36.238962] 
[   36.239338] Memory state around the buggy address:
[   36.240041]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.240847]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.241626] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.242427]                                      ^
[   36.243151]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.243916]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.244569] ==================================================================
[   36.398494] ==================================================================
[   36.399859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.400841] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.401704] 
[   36.402098] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.403363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.403863] Hardware name: linux,dummy-virt (DT)
[   36.404551] Call trace:
[   36.404947]  show_stack+0x20/0x38 (C)
[   36.405622]  dump_stack_lvl+0x8c/0xd0
[   36.406225]  print_report+0x118/0x5e0
[   36.406828]  kasan_report+0xc8/0x118
[   36.407483]  kasan_check_range+0x100/0x1a8
[   36.408196]  __kasan_check_write+0x20/0x30
[   36.408836]  kasan_atomics_helper+0xd3c/0x4858
[   36.409586]  kasan_atomics+0x198/0x2e8
[   36.410243]  kunit_try_run_case+0x14c/0x3d0
[   36.410984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.411741]  kthread+0x24c/0x2d0
[   36.412245]  ret_from_fork+0x10/0x20
[   36.412914] 
[   36.413285] Allocated by task 254:
[   36.413836]  kasan_save_stack+0x3c/0x68
[   36.414468]  kasan_save_track+0x20/0x40
[   36.415048]  kasan_save_alloc_info+0x40/0x58
[   36.415668]  __kasan_kmalloc+0xd4/0xd8
[   36.416330]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.416909]  kasan_atomics+0xb8/0x2e8
[   36.417538]  kunit_try_run_case+0x14c/0x3d0
[   36.418115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.418874]  kthread+0x24c/0x2d0
[   36.419452]  ret_from_fork+0x10/0x20
[   36.420017] 
[   36.420346] The buggy address belongs to the object at fff00000c69ef080
[   36.420346]  which belongs to the cache kmalloc-64 of size 64
[   36.421640] The buggy address is located 0 bytes to the right of
[   36.421640]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.422871] 
[   36.423252] The buggy address belongs to the physical page:
[   36.423953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.424903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.425775] page_type: f5(slab)
[   36.426317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.427244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.428015] page dumped because: kasan: bad access detected
[   36.428772] 
[   36.429147] Memory state around the buggy address:
[   36.430110]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.430965]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.431786] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.432603]                                      ^
[   36.433239]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.434089]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.434915] ==================================================================
[   35.443206] ==================================================================
[   35.443876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   35.444500] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.445319] 
[   35.445750] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.447927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.448493] Hardware name: linux,dummy-virt (DT)
[   35.449200] Call trace:
[   35.449673]  show_stack+0x20/0x38 (C)
[   35.450219]  dump_stack_lvl+0x8c/0xd0
[   35.450912]  print_report+0x118/0x5e0
[   35.451585]  kasan_report+0xc8/0x118
[   35.452205]  kasan_check_range+0x100/0x1a8
[   35.452848]  __kasan_check_write+0x20/0x30
[   35.453481]  kasan_atomics_helper+0x3ac/0x4858
[   35.454123]  kasan_atomics+0x198/0x2e8
[   35.454737]  kunit_try_run_case+0x14c/0x3d0
[   35.455400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.456103]  kthread+0x24c/0x2d0
[   35.456732]  ret_from_fork+0x10/0x20
[   35.457373] 
[   35.457734] Allocated by task 254:
[   35.458243]  kasan_save_stack+0x3c/0x68
[   35.458868]  kasan_save_track+0x20/0x40
[   35.459488]  kasan_save_alloc_info+0x40/0x58
[   35.460178]  __kasan_kmalloc+0xd4/0xd8
[   35.460822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.461533]  kasan_atomics+0xb8/0x2e8
[   35.462055]  kunit_try_run_case+0x14c/0x3d0
[   35.463208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.464075]  kthread+0x24c/0x2d0
[   35.464551]  ret_from_fork+0x10/0x20
[   35.465150] 
[   35.465557] The buggy address belongs to the object at fff00000c69ef080
[   35.465557]  which belongs to the cache kmalloc-64 of size 64
[   35.466771] The buggy address is located 0 bytes to the right of
[   35.466771]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.468029] 
[   35.468412] The buggy address belongs to the physical page:
[   35.469180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.470076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.470779] page_type: f5(slab)
[   35.471359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.472241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.473092] page dumped because: kasan: bad access detected
[   35.473883] 
[   35.474287] Memory state around the buggy address:
[   35.474997]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.475977]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.476848] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.477574]                                      ^
[   35.478271]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479051]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479845] ==================================================================
[   36.664179] ==================================================================
[   36.665139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.665840] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.666927] 
[   36.667338] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.668702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.669343] Hardware name: linux,dummy-virt (DT)
[   36.670072] Call trace:
[   36.670595]  show_stack+0x20/0x38 (C)
[   36.671280]  dump_stack_lvl+0x8c/0xd0
[   36.671888]  print_report+0x118/0x5e0
[   36.672577]  kasan_report+0xc8/0x118
[   36.673120]  kasan_check_range+0x100/0x1a8
[   36.673834]  __kasan_check_write+0x20/0x30
[   36.674452]  kasan_atomics_helper+0xf20/0x4858
[   36.675101]  kasan_atomics+0x198/0x2e8
[   36.675746]  kunit_try_run_case+0x14c/0x3d0
[   36.676460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.677281]  kthread+0x24c/0x2d0
[   36.677926]  ret_from_fork+0x10/0x20
[   36.678594] 
[   36.678990] Allocated by task 254:
[   36.679426]  kasan_save_stack+0x3c/0x68
[   36.680270]  kasan_save_track+0x20/0x40
[   36.680868]  kasan_save_alloc_info+0x40/0x58
[   36.681418]  __kasan_kmalloc+0xd4/0xd8
[   36.681906]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.682408]  kasan_atomics+0xb8/0x2e8
[   36.682885]  kunit_try_run_case+0x14c/0x3d0
[   36.683572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684336]  kthread+0x24c/0x2d0
[   36.684870]  ret_from_fork+0x10/0x20
[   36.685472] 
[   36.685865] The buggy address belongs to the object at fff00000c69ef080
[   36.685865]  which belongs to the cache kmalloc-64 of size 64
[   36.686855] The buggy address is located 0 bytes to the right of
[   36.686855]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.687820] 
[   36.688092] The buggy address belongs to the physical page:
[   36.688593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.689633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.690539] page_type: f5(slab)
[   36.691118] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.692142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.693108] page dumped because: kasan: bad access detected
[   36.693823] 
[   36.694191] Memory state around the buggy address:
[   36.694903]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.696734]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.698015] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.698834]                                      ^
[   36.699437]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700249]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.701080] ==================================================================
[   36.322177] ==================================================================
[   36.323053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   36.324003] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.324792] 
[   36.325137] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.326453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.327095] Hardware name: linux,dummy-virt (DT)
[   36.327788] Call trace:
[   36.328212]  show_stack+0x20/0x38 (C)
[   36.328890]  dump_stack_lvl+0x8c/0xd0
[   36.329573]  print_report+0x118/0x5e0
[   36.330179]  kasan_report+0xc8/0x118
[   36.330809]  kasan_check_range+0x100/0x1a8
[   36.331526]  __kasan_check_write+0x20/0x30
[   36.332219]  kasan_atomics_helper+0xca0/0x4858
[   36.332915]  kasan_atomics+0x198/0x2e8
[   36.333561]  kunit_try_run_case+0x14c/0x3d0
[   36.334280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.335143]  kthread+0x24c/0x2d0
[   36.335722]  ret_from_fork+0x10/0x20
[   36.336348] 
[   36.336939] Allocated by task 254:
[   36.337495]  kasan_save_stack+0x3c/0x68
[   36.338155]  kasan_save_track+0x20/0x40
[   36.338758]  kasan_save_alloc_info+0x40/0x58
[   36.339482]  __kasan_kmalloc+0xd4/0xd8
[   36.340075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.340795]  kasan_atomics+0xb8/0x2e8
[   36.341457]  kunit_try_run_case+0x14c/0x3d0
[   36.342160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.343019]  kthread+0x24c/0x2d0
[   36.343571]  ret_from_fork+0x10/0x20
[   36.344139] 
[   36.344458] The buggy address belongs to the object at fff00000c69ef080
[   36.344458]  which belongs to the cache kmalloc-64 of size 64
[   36.345688] The buggy address is located 0 bytes to the right of
[   36.345688]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.347030] 
[   36.347410] The buggy address belongs to the physical page:
[   36.348117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.348981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.349815] page_type: f5(slab)
[   36.350313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.351195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.352066] page dumped because: kasan: bad access detected
[   36.352743] 
[   36.353111] Memory state around the buggy address:
[   36.353647]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.354539]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.355273] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.356183]                                      ^
[   36.356806]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.357692]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.358532] ==================================================================
[   36.436231] ==================================================================
[   36.437054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.438436] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.439289] 
[   36.439711] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.440856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.441392] Hardware name: linux,dummy-virt (DT)
[   36.442089] Call trace:
[   36.442563]  show_stack+0x20/0x38 (C)
[   36.443121]  dump_stack_lvl+0x8c/0xd0
[   36.443750]  print_report+0x118/0x5e0
[   36.444284]  kasan_report+0xc8/0x118
[   36.444937]  __asan_report_load4_noabort+0x20/0x30
[   36.445732]  kasan_atomics_helper+0x3e04/0x4858
[   36.446471]  kasan_atomics+0x198/0x2e8
[   36.447127]  kunit_try_run_case+0x14c/0x3d0
[   36.447766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.448502]  kthread+0x24c/0x2d0
[   36.449014]  ret_from_fork+0x10/0x20
[   36.449677] 
[   36.450018] Allocated by task 254:
[   36.450599]  kasan_save_stack+0x3c/0x68
[   36.451225]  kasan_save_track+0x20/0x40
[   36.451824]  kasan_save_alloc_info+0x40/0x58
[   36.452416]  __kasan_kmalloc+0xd4/0xd8
[   36.453063]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.453695]  kasan_atomics+0xb8/0x2e8
[   36.454249]  kunit_try_run_case+0x14c/0x3d0
[   36.454952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.455721]  kthread+0x24c/0x2d0
[   36.456240]  ret_from_fork+0x10/0x20
[   36.456876] 
[   36.457251] The buggy address belongs to the object at fff00000c69ef080
[   36.457251]  which belongs to the cache kmalloc-64 of size 64
[   36.458441] The buggy address is located 0 bytes to the right of
[   36.458441]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.459857] 
[   36.460219] The buggy address belongs to the physical page:
[   36.460993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.461921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.462793] page_type: f5(slab)
[   36.463376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.464221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.465189] page dumped because: kasan: bad access detected
[   36.465936] 
[   36.466317] Memory state around the buggy address:
[   36.466958]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.467793]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.468625] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.469403]                                      ^
[   36.470108]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.470939]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.471861] ==================================================================
[   35.162576] ==================================================================
[   35.163669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   35.164545] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.165654] 
[   35.166200] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.167768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.168213] Hardware name: linux,dummy-virt (DT)
[   35.168754] Call trace:
[   35.169295]  show_stack+0x20/0x38 (C)
[   35.170001]  dump_stack_lvl+0x8c/0xd0
[   35.170692]  print_report+0x118/0x5e0
[   35.171826]  kasan_report+0xc8/0x118
[   35.172482]  __asan_report_store4_noabort+0x20/0x30
[   35.173379]  kasan_atomics_helper+0x3f7c/0x4858
[   35.174133]  kasan_atomics+0x198/0x2e8
[   35.174833]  kunit_try_run_case+0x14c/0x3d0
[   35.175808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.176600]  kthread+0x24c/0x2d0
[   35.177204]  ret_from_fork+0x10/0x20
[   35.177910] 
[   35.178204] Allocated by task 254:
[   35.179175]  kasan_save_stack+0x3c/0x68
[   35.179828]  kasan_save_track+0x20/0x40
[   35.180373]  kasan_save_alloc_info+0x40/0x58
[   35.181634]  __kasan_kmalloc+0xd4/0xd8
[   35.182435]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.183307]  kasan_atomics+0xb8/0x2e8
[   35.183907]  kunit_try_run_case+0x14c/0x3d0
[   35.184215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184571]  kthread+0x24c/0x2d0
[   35.185072]  ret_from_fork+0x10/0x20
[   35.185824] 
[   35.186248] The buggy address belongs to the object at fff00000c69ef080
[   35.186248]  which belongs to the cache kmalloc-64 of size 64
[   35.187645] The buggy address is located 0 bytes to the right of
[   35.187645]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.189100] 
[   35.189419] The buggy address belongs to the physical page:
[   35.190304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.191270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.192113] page_type: f5(slab)
[   35.192739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.194617] page dumped because: kasan: bad access detected
[   35.195271] 
[   35.195729] Memory state around the buggy address:
[   35.196467]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.197326]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.198750] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.199652]                                      ^
[   35.200129]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.201778]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.907738] ==================================================================
[   34.908986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.909754] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.910848] 
[   34.911274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.912658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.913231] Hardware name: linux,dummy-virt (DT)
[   34.913944] Call trace:
[   34.914454]  show_stack+0x20/0x38 (C)
[   34.915076]  dump_stack_lvl+0x8c/0xd0
[   34.915819]  print_report+0x118/0x5e0
[   34.916448]  kasan_report+0xc8/0x118
[   34.917181]  kasan_check_range+0x100/0x1a8
[   34.917833]  __kasan_check_write+0x20/0x30
[   34.918586]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.919428]  kasan_bitops_generic+0x11c/0x1c8
[   34.920146]  kunit_try_run_case+0x14c/0x3d0
[   34.920848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.921638]  kthread+0x24c/0x2d0
[   34.922233]  ret_from_fork+0x10/0x20
[   34.922913] 
[   34.923307] Allocated by task 250:
[   34.923925]  kasan_save_stack+0x3c/0x68
[   34.924499]  kasan_save_track+0x20/0x40
[   34.925184]  kasan_save_alloc_info+0x40/0x58
[   34.925830]  __kasan_kmalloc+0xd4/0xd8
[   34.926487]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.927138]  kasan_bitops_generic+0xa0/0x1c8
[   34.927864]  kunit_try_run_case+0x14c/0x3d0
[   34.928660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.929287]  kthread+0x24c/0x2d0
[   34.929919]  ret_from_fork+0x10/0x20
[   34.930652] 
[   34.930985] The buggy address belongs to the object at fff00000c5b518c0
[   34.930985]  which belongs to the cache kmalloc-16 of size 16
[   34.932157] The buggy address is located 8 bytes inside of
[   34.932157]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.933006] 
[   34.933317] The buggy address belongs to the physical page:
[   34.933874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.934856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.935600] page_type: f5(slab)
[   34.936215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.937039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.938012] page dumped because: kasan: bad access detected
[   34.938711] 
[   34.939051] Memory state around the buggy address:
[   34.939709]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.940433]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.941302] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.942140]                                               ^
[   34.942847]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.943633]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.944431] ==================================================================
[   34.946112] ==================================================================
[   34.947051] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.948145] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.948929] 
[   34.949338] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.950474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.951060] Hardware name: linux,dummy-virt (DT)
[   34.951636] Call trace:
[   34.952099]  show_stack+0x20/0x38 (C)
[   34.952703]  dump_stack_lvl+0x8c/0xd0
[   34.953331]  print_report+0x118/0x5e0
[   34.953956]  kasan_report+0xc8/0x118
[   34.954609]  __asan_report_load8_noabort+0x20/0x30
[   34.955224]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.956139]  kasan_bitops_generic+0x11c/0x1c8
[   34.956766]  kunit_try_run_case+0x14c/0x3d0
[   34.957481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.958307]  kthread+0x24c/0x2d0
[   34.958942]  ret_from_fork+0x10/0x20
[   34.959561] 
[   34.959873] Allocated by task 250:
[   34.960440]  kasan_save_stack+0x3c/0x68
[   34.961102]  kasan_save_track+0x20/0x40
[   34.961662]  kasan_save_alloc_info+0x40/0x58
[   34.962350]  __kasan_kmalloc+0xd4/0xd8
[   34.963004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.963566]  kasan_bitops_generic+0xa0/0x1c8
[   34.964233]  kunit_try_run_case+0x14c/0x3d0
[   34.964894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.965593]  kthread+0x24c/0x2d0
[   34.966219]  ret_from_fork+0x10/0x20
[   34.966851] 
[   34.967223] The buggy address belongs to the object at fff00000c5b518c0
[   34.967223]  which belongs to the cache kmalloc-16 of size 16
[   34.968488] The buggy address is located 8 bytes inside of
[   34.968488]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.969609] 
[   34.969980] The buggy address belongs to the physical page:
[   34.970755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.971554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.972427] page_type: f5(slab)
[   34.973011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.973875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.974769] page dumped because: kasan: bad access detected
[   34.975553] 
[   34.975967] Memory state around the buggy address:
[   34.976528]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.977450]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.978181] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.979117]                                               ^
[   34.979768]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.980671]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.981531] ==================================================================
[   35.063205] ==================================================================
[   35.063959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.064952] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   35.065674] 
[   35.066081] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.067790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.068343] Hardware name: linux,dummy-virt (DT)
[   35.069077] Call trace:
[   35.069573]  show_stack+0x20/0x38 (C)
[   35.070228]  dump_stack_lvl+0x8c/0xd0
[   35.070748]  print_report+0x118/0x5e0
[   35.071340]  kasan_report+0xc8/0x118
[   35.071897]  __asan_report_load8_noabort+0x20/0x30
[   35.072696]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.073618]  kasan_bitops_generic+0x11c/0x1c8
[   35.074332]  kunit_try_run_case+0x14c/0x3d0
[   35.075097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075736]  kthread+0x24c/0x2d0
[   35.076347]  ret_from_fork+0x10/0x20
[   35.077022] 
[   35.077426] Allocated by task 250:
[   35.077893]  kasan_save_stack+0x3c/0x68
[   35.078469]  kasan_save_track+0x20/0x40
[   35.079072]  kasan_save_alloc_info+0x40/0x58
[   35.079653]  __kasan_kmalloc+0xd4/0xd8
[   35.080267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.080871]  kasan_bitops_generic+0xa0/0x1c8
[   35.081442]  kunit_try_run_case+0x14c/0x3d0
[   35.082116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.082847]  kthread+0x24c/0x2d0
[   35.083449]  ret_from_fork+0x10/0x20
[   35.084085] 
[   35.084451] The buggy address belongs to the object at fff00000c5b518c0
[   35.084451]  which belongs to the cache kmalloc-16 of size 16
[   35.085652] The buggy address is located 8 bytes inside of
[   35.085652]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.087030] 
[   35.087416] The buggy address belongs to the physical page:
[   35.088185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.089054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.089828] page_type: f5(slab)
[   35.090392] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.091220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.092110] page dumped because: kasan: bad access detected
[   35.092864] 
[   35.093240] Memory state around the buggy address:
[   35.093898]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.094655]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.095606] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.096394]                                               ^
[   35.097146]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098020]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098892] ==================================================================
[   34.753084] ==================================================================
[   34.754033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.755174] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.756117] 
[   34.756665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.757757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.758933] Hardware name: linux,dummy-virt (DT)
[   34.759807] Call trace:
[   34.760297]  show_stack+0x20/0x38 (C)
[   34.761032]  dump_stack_lvl+0x8c/0xd0
[   34.761724]  print_report+0x118/0x5e0
[   34.762390]  kasan_report+0xc8/0x118
[   34.763070]  kasan_check_range+0x100/0x1a8
[   34.763670]  __kasan_check_write+0x20/0x30
[   34.764401]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.765289]  kasan_bitops_generic+0x11c/0x1c8
[   34.766023]  kunit_try_run_case+0x14c/0x3d0
[   34.766797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.767500]  kthread+0x24c/0x2d0
[   34.768181]  ret_from_fork+0x10/0x20
[   34.768892] 
[   34.769280] Allocated by task 250:
[   34.769946]  kasan_save_stack+0x3c/0x68
[   34.770695]  kasan_save_track+0x20/0x40
[   34.771327]  kasan_save_alloc_info+0x40/0x58
[   34.772015]  __kasan_kmalloc+0xd4/0xd8
[   34.772552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.773296]  kasan_bitops_generic+0xa0/0x1c8
[   34.774032]  kunit_try_run_case+0x14c/0x3d0
[   34.774697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775454]  kthread+0x24c/0x2d0
[   34.776077]  ret_from_fork+0x10/0x20
[   34.776701] 
[   34.777078] The buggy address belongs to the object at fff00000c5b518c0
[   34.777078]  which belongs to the cache kmalloc-16 of size 16
[   34.778298] The buggy address is located 8 bytes inside of
[   34.778298]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.779764] 
[   34.780185] The buggy address belongs to the physical page:
[   34.780916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.781886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.782654] page_type: f5(slab)
[   34.783162] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.784176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.784961] page dumped because: kasan: bad access detected
[   34.785726] 
[   34.786093] Memory state around the buggy address:
[   34.786726]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.787500]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.788432] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.789254]                                               ^
[   34.790015]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.790918]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.791805] ==================================================================
[   34.983490] ==================================================================
[   34.984745] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.986330] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.987318] 
[   34.988141] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.989322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989883] Hardware name: linux,dummy-virt (DT)
[   34.990481] Call trace:
[   34.991217]  show_stack+0x20/0x38 (C)
[   34.991770]  dump_stack_lvl+0x8c/0xd0
[   34.992427]  print_report+0x118/0x5e0
[   34.993125]  kasan_report+0xc8/0x118
[   34.993787]  kasan_check_range+0x100/0x1a8
[   34.994460]  __kasan_check_write+0x20/0x30
[   34.995166]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.996041]  kasan_bitops_generic+0x11c/0x1c8
[   34.996756]  kunit_try_run_case+0x14c/0x3d0
[   34.997443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.998252]  kthread+0x24c/0x2d0
[   34.998831]  ret_from_fork+0x10/0x20
[   34.999415] 
[   34.999834] Allocated by task 250:
[   35.000412]  kasan_save_stack+0x3c/0x68
[   35.001139]  kasan_save_track+0x20/0x40
[   35.001675]  kasan_save_alloc_info+0x40/0x58
[   35.002444]  __kasan_kmalloc+0xd4/0xd8
[   35.003128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.003803]  kasan_bitops_generic+0xa0/0x1c8
[   35.004506]  kunit_try_run_case+0x14c/0x3d0
[   35.005127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.005913]  kthread+0x24c/0x2d0
[   35.006476]  ret_from_fork+0x10/0x20
[   35.007094] 
[   35.007526] The buggy address belongs to the object at fff00000c5b518c0
[   35.007526]  which belongs to the cache kmalloc-16 of size 16
[   35.008816] The buggy address is located 8 bytes inside of
[   35.008816]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.010116] 
[   35.010540] The buggy address belongs to the physical page:
[   35.011196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.012182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.012871] page_type: f5(slab)
[   35.013439] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.014339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.015364] page dumped because: kasan: bad access detected
[   35.016140] 
[   35.016627] Memory state around the buggy address:
[   35.017209]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.018066]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.019046] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.019983]                                               ^
[   35.020723]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.021650]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.022578] ==================================================================
[   34.830996] ==================================================================
[   34.831787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.833122] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.834017] 
[   34.834423] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.835807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.836420] Hardware name: linux,dummy-virt (DT)
[   34.837006] Call trace:
[   34.837477]  show_stack+0x20/0x38 (C)
[   34.838151]  dump_stack_lvl+0x8c/0xd0
[   34.838732]  print_report+0x118/0x5e0
[   34.839381]  kasan_report+0xc8/0x118
[   34.839990]  kasan_check_range+0x100/0x1a8
[   34.840641]  __kasan_check_write+0x20/0x30
[   34.841273]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.841985]  kasan_bitops_generic+0x11c/0x1c8
[   34.842715]  kunit_try_run_case+0x14c/0x3d0
[   34.843425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.844211]  kthread+0x24c/0x2d0
[   34.844840]  ret_from_fork+0x10/0x20
[   34.845456] 
[   34.845842] Allocated by task 250:
[   34.846410]  kasan_save_stack+0x3c/0x68
[   34.846967]  kasan_save_track+0x20/0x40
[   34.847580]  kasan_save_alloc_info+0x40/0x58
[   34.848203]  __kasan_kmalloc+0xd4/0xd8
[   34.848846]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.849450]  kasan_bitops_generic+0xa0/0x1c8
[   34.850061]  kunit_try_run_case+0x14c/0x3d0
[   34.850753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.851428]  kthread+0x24c/0x2d0
[   34.852024]  ret_from_fork+0x10/0x20
[   34.852586] 
[   34.852944] The buggy address belongs to the object at fff00000c5b518c0
[   34.852944]  which belongs to the cache kmalloc-16 of size 16
[   34.854273] The buggy address is located 8 bytes inside of
[   34.854273]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.855453] 
[   34.855837] The buggy address belongs to the physical page:
[   34.856597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.857433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.858181] page_type: f5(slab)
[   34.858774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.859783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.860713] page dumped because: kasan: bad access detected
[   34.861422] 
[   34.861814] Memory state around the buggy address:
[   34.862468]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.863276]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.864119] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.864955]                                               ^
[   34.865694]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.866450]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.867335] ==================================================================
[   35.023934] ==================================================================
[   35.025061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.026285] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   35.027719] 
[   35.027993] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.029457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.030169] Hardware name: linux,dummy-virt (DT)
[   35.031002] Call trace:
[   35.031402]  show_stack+0x20/0x38 (C)
[   35.031977]  dump_stack_lvl+0x8c/0xd0
[   35.032661]  print_report+0x118/0x5e0
[   35.033343]  kasan_report+0xc8/0x118
[   35.034069]  __asan_report_load8_noabort+0x20/0x30
[   35.034852]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.035227]  kasan_bitops_generic+0x11c/0x1c8
[   35.035544]  kunit_try_run_case+0x14c/0x3d0
[   35.036111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.036885]  kthread+0x24c/0x2d0
[   35.037537]  ret_from_fork+0x10/0x20
[   35.038204] 
[   35.038460] Allocated by task 250:
[   35.038996]  kasan_save_stack+0x3c/0x68
[   35.039676]  kasan_save_track+0x20/0x40
[   35.040354]  kasan_save_alloc_info+0x40/0x58
[   35.041104]  __kasan_kmalloc+0xd4/0xd8
[   35.041845]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.042683]  kasan_bitops_generic+0xa0/0x1c8
[   35.043411]  kunit_try_run_case+0x14c/0x3d0
[   35.044030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.044376]  kthread+0x24c/0x2d0
[   35.044749]  ret_from_fork+0x10/0x20
[   35.045500] 
[   35.045960] The buggy address belongs to the object at fff00000c5b518c0
[   35.045960]  which belongs to the cache kmalloc-16 of size 16
[   35.047563] The buggy address is located 8 bytes inside of
[   35.047563]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   35.048835] 
[   35.049147] The buggy address belongs to the physical page:
[   35.049867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   35.050806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.051608] page_type: f5(slab)
[   35.052184] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.053092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.053873] page dumped because: kasan: bad access detected
[   35.054634] 
[   35.054961] Memory state around the buggy address:
[   35.055609]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.056481]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.057278] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.058116]                                               ^
[   35.058819]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.059727]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060479] ==================================================================
[   34.793661] ==================================================================
[   34.794677] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.795566] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.796270] 
[   34.796700] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.797899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.798543] Hardware name: linux,dummy-virt (DT)
[   34.799213] Call trace:
[   34.799698]  show_stack+0x20/0x38 (C)
[   34.800253]  dump_stack_lvl+0x8c/0xd0
[   34.800927]  print_report+0x118/0x5e0
[   34.801547]  kasan_report+0xc8/0x118
[   34.802048]  __asan_report_load8_noabort+0x20/0x30
[   34.802822]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.803561]  kasan_bitops_generic+0x11c/0x1c8
[   34.804274]  kunit_try_run_case+0x14c/0x3d0
[   34.804993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.805812]  kthread+0x24c/0x2d0
[   34.806330]  ret_from_fork+0x10/0x20
[   34.807003] 
[   34.807383] Allocated by task 250:
[   34.807847]  kasan_save_stack+0x3c/0x68
[   34.808483]  kasan_save_track+0x20/0x40
[   34.809068]  kasan_save_alloc_info+0x40/0x58
[   34.809779]  __kasan_kmalloc+0xd4/0xd8
[   34.810402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.811094]  kasan_bitops_generic+0xa0/0x1c8
[   34.811686]  kunit_try_run_case+0x14c/0x3d0
[   34.812375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.813186]  kthread+0x24c/0x2d0
[   34.813744]  ret_from_fork+0x10/0x20
[   34.814367] 
[   34.814767] The buggy address belongs to the object at fff00000c5b518c0
[   34.814767]  which belongs to the cache kmalloc-16 of size 16
[   34.815909] The buggy address is located 8 bytes inside of
[   34.815909]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.817343] 
[   34.817708] The buggy address belongs to the physical page:
[   34.818446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.819329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.820127] page_type: f5(slab)
[   34.820700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.821417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.822393] page dumped because: kasan: bad access detected
[   34.823134] 
[   34.823538] Memory state around the buggy address:
[   34.824157]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.825103]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.825851] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.826717]                                               ^
[   34.827381]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.828237]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.829048] ==================================================================
[   34.870679] ==================================================================
[   34.871425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.872346] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.873063] 
[   34.873465] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.874724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.875353] Hardware name: linux,dummy-virt (DT)
[   34.875939] Call trace:
[   34.876407]  show_stack+0x20/0x38 (C)
[   34.877066]  dump_stack_lvl+0x8c/0xd0
[   34.877733]  print_report+0x118/0x5e0
[   34.878311]  kasan_report+0xc8/0x118
[   34.878858]  __asan_report_load8_noabort+0x20/0x30
[   34.879576]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.880362]  kasan_bitops_generic+0x11c/0x1c8
[   34.881035]  kunit_try_run_case+0x14c/0x3d0
[   34.881692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.882523]  kthread+0x24c/0x2d0
[   34.883127]  ret_from_fork+0x10/0x20
[   34.883699] 
[   34.884083] Allocated by task 250:
[   34.884673]  kasan_save_stack+0x3c/0x68
[   34.885307]  kasan_save_track+0x20/0x40
[   34.885875]  kasan_save_alloc_info+0x40/0x58
[   34.886554]  __kasan_kmalloc+0xd4/0xd8
[   34.887190]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.887809]  kasan_bitops_generic+0xa0/0x1c8
[   34.888486]  kunit_try_run_case+0x14c/0x3d0
[   34.889106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.889842]  kthread+0x24c/0x2d0
[   34.890429]  ret_from_fork+0x10/0x20
[   34.891009] 
[   34.891398] The buggy address belongs to the object at fff00000c5b518c0
[   34.891398]  which belongs to the cache kmalloc-16 of size 16
[   34.892659] The buggy address is located 8 bytes inside of
[   34.892659]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.893814] 
[   34.894190] The buggy address belongs to the physical page:
[   34.894957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.895978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.896760] page_type: f5(slab)
[   34.897398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.898651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.899311] page dumped because: kasan: bad access detected
[   34.900013] 
[   34.900433] Memory state around the buggy address:
[   34.901075]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.901990]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.902829] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.903889]                                               ^
[   34.904213]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.904667]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.905698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   34.633721] ==================================================================
[   34.634730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.635869] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.636611] 
[   34.637024] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.638244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.638928] Hardware name: linux,dummy-virt (DT)
[   34.639665] Call trace:
[   34.640155]  show_stack+0x20/0x38 (C)
[   34.640837]  dump_stack_lvl+0x8c/0xd0
[   34.641558]  print_report+0x118/0x5e0
[   34.642256]  kasan_report+0xc8/0x118
[   34.642917]  kasan_check_range+0x100/0x1a8
[   34.643582]  __kasan_check_write+0x20/0x30
[   34.644209]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.645040]  kasan_bitops_generic+0x110/0x1c8
[   34.645749]  kunit_try_run_case+0x14c/0x3d0
[   34.646434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.647270]  kthread+0x24c/0x2d0
[   34.647910]  ret_from_fork+0x10/0x20
[   34.648317] 
[   34.648788] Allocated by task 250:
[   34.649533]  kasan_save_stack+0x3c/0x68
[   34.650199]  kasan_save_track+0x20/0x40
[   34.650838]  kasan_save_alloc_info+0x40/0x58
[   34.651613]  __kasan_kmalloc+0xd4/0xd8
[   34.652295]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.652948]  kasan_bitops_generic+0xa0/0x1c8
[   34.653591]  kunit_try_run_case+0x14c/0x3d0
[   34.654246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.655018]  kthread+0x24c/0x2d0
[   34.655620]  ret_from_fork+0x10/0x20
[   34.656198] 
[   34.656630] The buggy address belongs to the object at fff00000c5b518c0
[   34.656630]  which belongs to the cache kmalloc-16 of size 16
[   34.658022] The buggy address is located 8 bytes inside of
[   34.658022]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.659329] 
[   34.659738] The buggy address belongs to the physical page:
[   34.660541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.661482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.662362] page_type: f5(slab)
[   34.662934] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.663912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.664831] page dumped because: kasan: bad access detected
[   34.665507] 
[   34.665917] Memory state around the buggy address:
[   34.666668]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.667454]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.668404] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.669246]                                               ^
[   34.669955]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.670784]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.671626] ==================================================================
[   34.353003] ==================================================================
[   34.354558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.355542] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.356411] 
[   34.356919] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.358229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.358801] Hardware name: linux,dummy-virt (DT)
[   34.359433] Call trace:
[   34.359868]  show_stack+0x20/0x38 (C)
[   34.360475]  dump_stack_lvl+0x8c/0xd0
[   34.361219]  print_report+0x118/0x5e0
[   34.361862]  kasan_report+0xc8/0x118
[   34.362766]  kasan_check_range+0x100/0x1a8
[   34.363368]  __kasan_check_write+0x20/0x30
[   34.364075]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.364790]  kasan_bitops_generic+0x110/0x1c8
[   34.365492]  kunit_try_run_case+0x14c/0x3d0
[   34.366150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.366983]  kthread+0x24c/0x2d0
[   34.367586]  ret_from_fork+0x10/0x20
[   34.368158] 
[   34.368743] Allocated by task 250:
[   34.369397]  kasan_save_stack+0x3c/0x68
[   34.370066]  kasan_save_track+0x20/0x40
[   34.370795]  kasan_save_alloc_info+0x40/0x58
[   34.371481]  __kasan_kmalloc+0xd4/0xd8
[   34.372120]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.372768]  kasan_bitops_generic+0xa0/0x1c8
[   34.373373]  kunit_try_run_case+0x14c/0x3d0
[   34.374012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.375262]  kthread+0x24c/0x2d0
[   34.375922]  ret_from_fork+0x10/0x20
[   34.376482] 
[   34.376878] The buggy address belongs to the object at fff00000c5b518c0
[   34.376878]  which belongs to the cache kmalloc-16 of size 16
[   34.378196] The buggy address is located 8 bytes inside of
[   34.378196]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.379332] 
[   34.379733] The buggy address belongs to the physical page:
[   34.380417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.381773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.382538] page_type: f5(slab)
[   34.383122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.383958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.384872] page dumped because: kasan: bad access detected
[   34.385461] 
[   34.385838] Memory state around the buggy address:
[   34.386496]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.387322]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.388186] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.388913]                                               ^
[   34.389696]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.390485]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.391260] ==================================================================
[   34.393249] ==================================================================
[   34.395189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.395942] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.397593] 
[   34.398092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.399532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.400152] Hardware name: linux,dummy-virt (DT)
[   34.400779] Call trace:
[   34.401184]  show_stack+0x20/0x38 (C)
[   34.402076]  dump_stack_lvl+0x8c/0xd0
[   34.402753]  print_report+0x118/0x5e0
[   34.403456]  kasan_report+0xc8/0x118
[   34.404126]  __asan_report_load8_noabort+0x20/0x30
[   34.404887]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.405674]  kasan_bitops_generic+0x110/0x1c8
[   34.406261]  kunit_try_run_case+0x14c/0x3d0
[   34.406973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.407793]  kthread+0x24c/0x2d0
[   34.408393]  ret_from_fork+0x10/0x20
[   34.409038] 
[   34.409403] Allocated by task 250:
[   34.410022]  kasan_save_stack+0x3c/0x68
[   34.410607]  kasan_save_track+0x20/0x40
[   34.411287]  kasan_save_alloc_info+0x40/0x58
[   34.411881]  __kasan_kmalloc+0xd4/0xd8
[   34.412568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.413209]  kasan_bitops_generic+0xa0/0x1c8
[   34.413945]  kunit_try_run_case+0x14c/0x3d0
[   34.414587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.415405]  kthread+0x24c/0x2d0
[   34.416007]  ret_from_fork+0x10/0x20
[   34.416613] 
[   34.416976] The buggy address belongs to the object at fff00000c5b518c0
[   34.416976]  which belongs to the cache kmalloc-16 of size 16
[   34.418225] The buggy address is located 8 bytes inside of
[   34.418225]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.419574] 
[   34.419993] The buggy address belongs to the physical page:
[   34.420778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.421794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.422676] page_type: f5(slab)
[   34.423221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.424154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.425097] page dumped because: kasan: bad access detected
[   34.425807] 
[   34.426226] Memory state around the buggy address:
[   34.426927]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.427823]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.428695] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.429552]                                               ^
[   34.430353]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431311]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.432216] ==================================================================
[   34.674355] ==================================================================
[   34.675438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.676549] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.677263] 
[   34.677653] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.679215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.679682] Hardware name: linux,dummy-virt (DT)
[   34.680193] Call trace:
[   34.680588]  show_stack+0x20/0x38 (C)
[   34.681265]  dump_stack_lvl+0x8c/0xd0
[   34.682016]  print_report+0x118/0x5e0
[   34.682597]  kasan_report+0xc8/0x118
[   34.683285]  kasan_check_range+0x100/0x1a8
[   34.683922]  __kasan_check_write+0x20/0x30
[   34.684660]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.685535]  kasan_bitops_generic+0x110/0x1c8
[   34.686170]  kunit_try_run_case+0x14c/0x3d0
[   34.686949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.687779]  kthread+0x24c/0x2d0
[   34.688395]  ret_from_fork+0x10/0x20
[   34.689025] 
[   34.689442] Allocated by task 250:
[   34.690056]  kasan_save_stack+0x3c/0x68
[   34.690737]  kasan_save_track+0x20/0x40
[   34.691304]  kasan_save_alloc_info+0x40/0x58
[   34.692027]  __kasan_kmalloc+0xd4/0xd8
[   34.692720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.693320]  kasan_bitops_generic+0xa0/0x1c8
[   34.694043]  kunit_try_run_case+0x14c/0x3d0
[   34.694842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.695441]  kthread+0x24c/0x2d0
[   34.696007]  ret_from_fork+0x10/0x20
[   34.696690] 
[   34.697062] The buggy address belongs to the object at fff00000c5b518c0
[   34.697062]  which belongs to the cache kmalloc-16 of size 16
[   34.698436] The buggy address is located 8 bytes inside of
[   34.698436]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.699849] 
[   34.700258] The buggy address belongs to the physical page:
[   34.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.701905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.702745] page_type: f5(slab)
[   34.703301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.704301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.705257] page dumped because: kasan: bad access detected
[   34.705966] 
[   34.706348] Memory state around the buggy address:
[   34.707008]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.708036]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.709075] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.709961]                                               ^
[   34.710782]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.711625]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.712502] ==================================================================
[   34.595982] ==================================================================
[   34.596731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.597549] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.598453] 
[   34.598890] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.600030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.600559] Hardware name: linux,dummy-virt (DT)
[   34.601186] Call trace:
[   34.601686]  show_stack+0x20/0x38 (C)
[   34.602355]  dump_stack_lvl+0x8c/0xd0
[   34.602939]  print_report+0x118/0x5e0
[   34.603639]  kasan_report+0xc8/0x118
[   34.604272]  __asan_report_load8_noabort+0x20/0x30
[   34.604904]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.605732]  kasan_bitops_generic+0x110/0x1c8
[   34.606290]  kunit_try_run_case+0x14c/0x3d0
[   34.607008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.607680]  kthread+0x24c/0x2d0
[   34.608283]  ret_from_fork+0x10/0x20
[   34.608941] 
[   34.609314] Allocated by task 250:
[   34.609784]  kasan_save_stack+0x3c/0x68
[   34.610394]  kasan_save_track+0x20/0x40
[   34.611061]  kasan_save_alloc_info+0x40/0x58
[   34.611755]  __kasan_kmalloc+0xd4/0xd8
[   34.612399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.613011]  kasan_bitops_generic+0xa0/0x1c8
[   34.613657]  kunit_try_run_case+0x14c/0x3d0
[   34.614264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.614971]  kthread+0x24c/0x2d0
[   34.615573]  ret_from_fork+0x10/0x20
[   34.616219] 
[   34.616619] The buggy address belongs to the object at fff00000c5b518c0
[   34.616619]  which belongs to the cache kmalloc-16 of size 16
[   34.617776] The buggy address is located 8 bytes inside of
[   34.617776]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.618992] 
[   34.619371] The buggy address belongs to the physical page:
[   34.620131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.620982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.621796] page_type: f5(slab)
[   34.622371] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.623285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.624172] page dumped because: kasan: bad access detected
[   34.624928] 
[   34.625275] Memory state around the buggy address:
[   34.625884]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.626774]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.627636] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.628315]                                               ^
[   34.629114]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.629934]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.630840] ==================================================================
[   34.556056] ==================================================================
[   34.556885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.559283] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.560158] 
[   34.560501] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.561616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.562228] Hardware name: linux,dummy-virt (DT)
[   34.562762] Call trace:
[   34.563243]  show_stack+0x20/0x38 (C)
[   34.564178]  dump_stack_lvl+0x8c/0xd0
[   34.564819]  print_report+0x118/0x5e0
[   34.565429]  kasan_report+0xc8/0x118
[   34.566033]  kasan_check_range+0x100/0x1a8
[   34.566730]  __kasan_check_write+0x20/0x30
[   34.567342]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.568159]  kasan_bitops_generic+0x110/0x1c8
[   34.568975]  kunit_try_run_case+0x14c/0x3d0
[   34.569644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.570310]  kthread+0x24c/0x2d0
[   34.570943]  ret_from_fork+0x10/0x20
[   34.571546] 
[   34.571924] Allocated by task 250:
[   34.572403]  kasan_save_stack+0x3c/0x68
[   34.573047]  kasan_save_track+0x20/0x40
[   34.573642]  kasan_save_alloc_info+0x40/0x58
[   34.574209]  __kasan_kmalloc+0xd4/0xd8
[   34.574852]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.575407]  kasan_bitops_generic+0xa0/0x1c8
[   34.576123]  kunit_try_run_case+0x14c/0x3d0
[   34.576679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.577465]  kthread+0x24c/0x2d0
[   34.577982]  ret_from_fork+0x10/0x20
[   34.578525] 
[   34.578910] The buggy address belongs to the object at fff00000c5b518c0
[   34.578910]  which belongs to the cache kmalloc-16 of size 16
[   34.580059] The buggy address is located 8 bytes inside of
[   34.580059]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.581283] 
[   34.581690] The buggy address belongs to the physical page:
[   34.582416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.583446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.584271] page_type: f5(slab)
[   34.584854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.585776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.586706] page dumped because: kasan: bad access detected
[   34.587453] 
[   34.587804] Memory state around the buggy address:
[   34.588317]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.589249]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.590029] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.590837]                                               ^
[   34.591637]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.592361]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.593276] ==================================================================
[   34.476019] ==================================================================
[   34.477078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.477978] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.479205] 
[   34.479838] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.481217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.481881] Hardware name: linux,dummy-virt (DT)
[   34.482631] Call trace:
[   34.483132]  show_stack+0x20/0x38 (C)
[   34.483870]  dump_stack_lvl+0x8c/0xd0
[   34.484410]  print_report+0x118/0x5e0
[   34.484932]  kasan_report+0xc8/0x118
[   34.485589]  __asan_report_load8_noabort+0x20/0x30
[   34.486297]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.487092]  kasan_bitops_generic+0x110/0x1c8
[   34.487803]  kunit_try_run_case+0x14c/0x3d0
[   34.488498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.489263]  kthread+0x24c/0x2d0
[   34.489780]  ret_from_fork+0x10/0x20
[   34.490406] 
[   34.490805] Allocated by task 250:
[   34.491280]  kasan_save_stack+0x3c/0x68
[   34.491937]  kasan_save_track+0x20/0x40
[   34.492500]  kasan_save_alloc_info+0x40/0x58
[   34.493210]  __kasan_kmalloc+0xd4/0xd8
[   34.493857]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.494459]  kasan_bitops_generic+0xa0/0x1c8
[   34.495123]  kunit_try_run_case+0x14c/0x3d0
[   34.495851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.496617]  kthread+0x24c/0x2d0
[   34.497166]  ret_from_fork+0x10/0x20
[   34.497708] 
[   34.498086] The buggy address belongs to the object at fff00000c5b518c0
[   34.498086]  which belongs to the cache kmalloc-16 of size 16
[   34.499311] The buggy address is located 8 bytes inside of
[   34.499311]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.500637] 
[   34.500960] The buggy address belongs to the physical page:
[   34.501830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.502764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.503856] page_type: f5(slab)
[   34.504447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.505397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.506355] page dumped because: kasan: bad access detected
[   34.507029] 
[   34.507411] Memory state around the buggy address:
[   34.508035]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.508818]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.509602] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.510371]                                               ^
[   34.511172]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.512127]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.512894] ==================================================================
[   34.436341] ==================================================================
[   34.437120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.437914] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.439309] 
[   34.439824] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.441093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.441806] Hardware name: linux,dummy-virt (DT)
[   34.442438] Call trace:
[   34.442969]  show_stack+0x20/0x38 (C)
[   34.443677]  dump_stack_lvl+0x8c/0xd0
[   34.444255]  print_report+0x118/0x5e0
[   34.444979]  kasan_report+0xc8/0x118
[   34.445630]  kasan_check_range+0x100/0x1a8
[   34.446251]  __kasan_check_write+0x20/0x30
[   34.447012]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.447821]  kasan_bitops_generic+0x110/0x1c8
[   34.448548]  kunit_try_run_case+0x14c/0x3d0
[   34.449288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450173]  kthread+0x24c/0x2d0
[   34.450758]  ret_from_fork+0x10/0x20
[   34.451456] 
[   34.451887] Allocated by task 250:
[   34.452363]  kasan_save_stack+0x3c/0x68
[   34.453063]  kasan_save_track+0x20/0x40
[   34.453706]  kasan_save_alloc_info+0x40/0x58
[   34.454267]  __kasan_kmalloc+0xd4/0xd8
[   34.454782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.455416]  kasan_bitops_generic+0xa0/0x1c8
[   34.455955]  kunit_try_run_case+0x14c/0x3d0
[   34.456648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457279]  kthread+0x24c/0x2d0
[   34.457875]  ret_from_fork+0x10/0x20
[   34.458487] 
[   34.458869] The buggy address belongs to the object at fff00000c5b518c0
[   34.458869]  which belongs to the cache kmalloc-16 of size 16
[   34.460160] The buggy address is located 8 bytes inside of
[   34.460160]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.461387] 
[   34.461788] The buggy address belongs to the physical page:
[   34.462558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.463472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.464249] page_type: f5(slab)
[   34.464779] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.465735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.466636] page dumped because: kasan: bad access detected
[   34.467329] 
[   34.467690] Memory state around the buggy address:
[   34.468200]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469146]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469867] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.470779]                                               ^
[   34.471469]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.472273]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.473121] ==================================================================
[   34.715947] ==================================================================
[   34.716753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.717652] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.718461] 
[   34.719234] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.720302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.720880] Hardware name: linux,dummy-virt (DT)
[   34.721452] Call trace:
[   34.721931]  show_stack+0x20/0x38 (C)
[   34.722587]  dump_stack_lvl+0x8c/0xd0
[   34.723176]  print_report+0x118/0x5e0
[   34.723730]  kasan_report+0xc8/0x118
[   34.724372]  __asan_report_load8_noabort+0x20/0x30
[   34.725047]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.725792]  kasan_bitops_generic+0x110/0x1c8
[   34.726418]  kunit_try_run_case+0x14c/0x3d0
[   34.727080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.727739]  kthread+0x24c/0x2d0
[   34.728338]  ret_from_fork+0x10/0x20
[   34.728929] 
[   34.729305] Allocated by task 250:
[   34.729819]  kasan_save_stack+0x3c/0x68
[   34.730456]  kasan_save_track+0x20/0x40
[   34.731087]  kasan_save_alloc_info+0x40/0x58
[   34.731717]  __kasan_kmalloc+0xd4/0xd8
[   34.732252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.732969]  kasan_bitops_generic+0xa0/0x1c8
[   34.733544]  kunit_try_run_case+0x14c/0x3d0
[   34.734213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.734875]  kthread+0x24c/0x2d0
[   34.735462]  ret_from_fork+0x10/0x20
[   34.736075] 
[   34.736433] The buggy address belongs to the object at fff00000c5b518c0
[   34.736433]  which belongs to the cache kmalloc-16 of size 16
[   34.737764] The buggy address is located 8 bytes inside of
[   34.737764]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.738981] 
[   34.739357] The buggy address belongs to the physical page:
[   34.740118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.740908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.741816] page_type: f5(slab)
[   34.742382] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.743356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.744164] page dumped because: kasan: bad access detected
[   34.744867] 
[   34.745240] Memory state around the buggy address:
[   34.745863]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.746657]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.747599] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.748384]                                               ^
[   34.749098]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.749955]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.750839] ==================================================================
[   34.516926] ==================================================================
[   34.517706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.518450] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250
[   34.519533] 
[   34.520137] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.521473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.522151] Hardware name: linux,dummy-virt (DT)
[   34.522708] Call trace:
[   34.523632]  show_stack+0x20/0x38 (C)
[   34.524675]  dump_stack_lvl+0x8c/0xd0
[   34.525266]  print_report+0x118/0x5e0
[   34.525929]  kasan_report+0xc8/0x118
[   34.526884]  kasan_check_range+0x100/0x1a8
[   34.527418]  __kasan_check_write+0x20/0x30
[   34.528140]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.528807]  kasan_bitops_generic+0x110/0x1c8
[   34.529533]  kunit_try_run_case+0x14c/0x3d0
[   34.530160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.530975]  kthread+0x24c/0x2d0
[   34.531619]  ret_from_fork+0x10/0x20
[   34.532202] 
[   34.532597] Allocated by task 250:
[   34.533031]  kasan_save_stack+0x3c/0x68
[   34.533695]  kasan_save_track+0x20/0x40
[   34.534256]  kasan_save_alloc_info+0x40/0x58
[   34.534959]  __kasan_kmalloc+0xd4/0xd8
[   34.535489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.536239]  kasan_bitops_generic+0xa0/0x1c8
[   34.536866]  kunit_try_run_case+0x14c/0x3d0
[   34.537381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.538332]  kthread+0x24c/0x2d0
[   34.538730]  ret_from_fork+0x10/0x20
[   34.539339] 
[   34.539725] The buggy address belongs to the object at fff00000c5b518c0
[   34.539725]  which belongs to the cache kmalloc-16 of size 16
[   34.540926] The buggy address is located 8 bytes inside of
[   34.540926]  allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9)
[   34.542263] 
[   34.542606] The buggy address belongs to the physical page:
[   34.543327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   34.544244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.544928] page_type: f5(slab)
[   34.545493] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.546435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.547419] page dumped because: kasan: bad access detected
[   34.548034] 
[   34.548409] Memory state around the buggy address:
[   34.549112]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.549861]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.550749] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   34.551480]                                               ^
[   34.552278]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.553113]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.553996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   34.300203] ==================================================================
[   34.301299] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   34.302239] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248
[   34.303046] 
[   34.303442] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.304778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.305317] Hardware name: linux,dummy-virt (DT)
[   34.306125] Call trace:
[   34.306532]  show_stack+0x20/0x38 (C)
[   34.307151]  dump_stack_lvl+0x8c/0xd0
[   34.307810]  print_report+0x118/0x5e0
[   34.308462]  kasan_report+0xc8/0x118
[   34.309131]  __asan_report_load1_noabort+0x20/0x30
[   34.309869]  strnlen+0x80/0x88
[   34.310456]  kasan_strings+0x364/0x8d8
[   34.311111]  kunit_try_run_case+0x14c/0x3d0
[   34.311734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.312560]  kthread+0x24c/0x2d0
[   34.313051]  ret_from_fork+0x10/0x20
[   34.313738] 
[   34.314112] Allocated by task 248:
[   34.314694]  kasan_save_stack+0x3c/0x68
[   34.315326]  kasan_save_track+0x20/0x40
[   34.316000]  kasan_save_alloc_info+0x40/0x58
[   34.316638]  __kasan_kmalloc+0xd4/0xd8
[   34.317266]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.317903]  kasan_strings+0xb0/0x8d8
[   34.318538]  kunit_try_run_case+0x14c/0x3d0
[   34.319085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.319900]  kthread+0x24c/0x2d0
[   34.320483]  ret_from_fork+0x10/0x20
[   34.321101] 
[   34.321481] Freed by task 248:
[   34.321927]  kasan_save_stack+0x3c/0x68
[   34.322578]  kasan_save_track+0x20/0x40
[   34.323225]  kasan_save_free_info+0x4c/0x78
[   34.323898]  __kasan_slab_free+0x6c/0x98
[   34.324453]  kfree+0x114/0x3c8
[   34.325044]  kasan_strings+0x124/0x8d8
[   34.325693]  kunit_try_run_case+0x14c/0x3d0
[   34.326250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.327056]  kthread+0x24c/0x2d0
[   34.327661]  ret_from_fork+0x10/0x20
[   34.328144] 
[   34.328536] The buggy address belongs to the object at fff00000c69e4d00
[   34.328536]  which belongs to the cache kmalloc-32 of size 32
[   34.329813] The buggy address is located 16 bytes inside of
[   34.329813]  freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20)
[   34.331179] 
[   34.331572] The buggy address belongs to the physical page:
[   34.332308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   34.333222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.333943] page_type: f5(slab)
[   34.334505] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.335404] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.336227] page dumped because: kasan: bad access detected
[   34.337001] 
[   34.337322] Memory state around the buggy address:
[   34.337933]  fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.338771]  fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.339734] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.340457]                          ^
[   34.341071]  fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.341847]  fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.342681] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   34.249714] ==================================================================
[   34.250982] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   34.251738] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248
[   34.252505] 
[   34.253459] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.254641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.255128] Hardware name: linux,dummy-virt (DT)
[   34.255758] Call trace:
[   34.256227]  show_stack+0x20/0x38 (C)
[   34.256895]  dump_stack_lvl+0x8c/0xd0
[   34.257556]  print_report+0x118/0x5e0
[   34.258158]  kasan_report+0xc8/0x118
[   34.259127]  __asan_report_load1_noabort+0x20/0x30
[   34.259889]  strlen+0xa8/0xb0
[   34.260257]  kasan_strings+0x304/0x8d8
[   34.260924]  kunit_try_run_case+0x14c/0x3d0
[   34.261569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.262624]  kthread+0x24c/0x2d0
[   34.263394]  ret_from_fork+0x10/0x20
[   34.264010] 
[   34.264367] Allocated by task 248:
[   34.264825]  kasan_save_stack+0x3c/0x68
[   34.265466]  kasan_save_track+0x20/0x40
[   34.266007]  kasan_save_alloc_info+0x40/0x58
[   34.266911]  __kasan_kmalloc+0xd4/0xd8
[   34.267874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.268844]  kasan_strings+0xb0/0x8d8
[   34.269722]  kunit_try_run_case+0x14c/0x3d0
[   34.270142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.271185]  kthread+0x24c/0x2d0
[   34.271764]  ret_from_fork+0x10/0x20
[   34.272269] 
[   34.272641] Freed by task 248:
[   34.273165]  kasan_save_stack+0x3c/0x68
[   34.273822]  kasan_save_track+0x20/0x40
[   34.274767]  kasan_save_free_info+0x4c/0x78
[   34.275410]  __kasan_slab_free+0x6c/0x98
[   34.275967]  kfree+0x114/0x3c8
[   34.276548]  kasan_strings+0x124/0x8d8
[   34.277165]  kunit_try_run_case+0x14c/0x3d0
[   34.277842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278492]  kthread+0x24c/0x2d0
[   34.279101]  ret_from_fork+0x10/0x20
[   34.279731] 
[   34.280101] The buggy address belongs to the object at fff00000c69e4d00
[   34.280101]  which belongs to the cache kmalloc-32 of size 32
[   34.281472] The buggy address is located 16 bytes inside of
[   34.281472]  freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20)
[   34.283010] 
[   34.283385] The buggy address belongs to the physical page:
[   34.284034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   34.285176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.286006] page_type: f5(slab)
[   34.287173] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.288677] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.289549] page dumped because: kasan: bad access detected
[   34.290227] 
[   34.290590] Memory state around the buggy address:
[   34.291289]  fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.292390]  fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.293224] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.294501]                          ^
[   34.295108]  fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.296014]  fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.296943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   34.200195] ==================================================================
[   34.200952] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   34.201745] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248
[   34.202998] 
[   34.203360] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.204234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.204886] Hardware name: linux,dummy-virt (DT)
[   34.205498] Call trace:
[   34.205910]  show_stack+0x20/0x38 (C)
[   34.206872]  dump_stack_lvl+0x8c/0xd0
[   34.207548]  print_report+0x118/0x5e0
[   34.208147]  kasan_report+0xc8/0x118
[   34.208748]  __asan_report_load1_noabort+0x20/0x30
[   34.209525]  kasan_strings+0x838/0x8d8
[   34.210147]  kunit_try_run_case+0x14c/0x3d0
[   34.211004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.211814]  kthread+0x24c/0x2d0
[   34.212421]  ret_from_fork+0x10/0x20
[   34.213040] 
[   34.213423] Allocated by task 248:
[   34.213965]  kasan_save_stack+0x3c/0x68
[   34.214822]  kasan_save_track+0x20/0x40
[   34.215610]  kasan_save_alloc_info+0x40/0x58
[   34.216288]  __kasan_kmalloc+0xd4/0xd8
[   34.217001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.217786]  kasan_strings+0xb0/0x8d8
[   34.218593]  kunit_try_run_case+0x14c/0x3d0
[   34.219294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.220210]  kthread+0x24c/0x2d0
[   34.220804]  ret_from_fork+0x10/0x20
[   34.221639] 
[   34.222350] Freed by task 248:
[   34.223044]  kasan_save_stack+0x3c/0x68
[   34.223782]  kasan_save_track+0x20/0x40
[   34.224290]  kasan_save_free_info+0x4c/0x78
[   34.224979]  __kasan_slab_free+0x6c/0x98
[   34.225551]  kfree+0x114/0x3c8
[   34.226046]  kasan_strings+0x124/0x8d8
[   34.226574]  kunit_try_run_case+0x14c/0x3d0
[   34.227343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228265]  kthread+0x24c/0x2d0
[   34.228955]  ret_from_fork+0x10/0x20
[   34.229554] 
[   34.229940] The buggy address belongs to the object at fff00000c69e4d00
[   34.229940]  which belongs to the cache kmalloc-32 of size 32
[   34.231676] The buggy address is located 16 bytes inside of
[   34.231676]  freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20)
[   34.232759] 
[   34.233139] The buggy address belongs to the physical page:
[   34.233801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   34.234897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.235713] page_type: f5(slab)
[   34.236263] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.237199] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.238178] page dumped because: kasan: bad access detected
[   34.239106] 
[   34.239454] Memory state around the buggy address:
[   34.240112]  fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.241965]  fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.243069] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.243872]                          ^
[   34.244365]  fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.245604]  fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.246618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   34.148178] ==================================================================
[   34.150109] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   34.151910] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248
[   34.152770] 
[   34.153181] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.154683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.155317] Hardware name: linux,dummy-virt (DT)
[   34.155997] Call trace:
[   34.156442]  show_stack+0x20/0x38 (C)
[   34.157068]  dump_stack_lvl+0x8c/0xd0
[   34.157708]  print_report+0x118/0x5e0
[   34.158659]  kasan_report+0xc8/0x118
[   34.159202]  __asan_report_load1_noabort+0x20/0x30
[   34.159994]  strcmp+0xc0/0xc8
[   34.160575]  kasan_strings+0x228/0x8d8
[   34.161150]  kunit_try_run_case+0x14c/0x3d0
[   34.161831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.162898]  kthread+0x24c/0x2d0
[   34.163426]  ret_from_fork+0x10/0x20
[   34.164080] 
[   34.164415] Allocated by task 248:
[   34.164963]  kasan_save_stack+0x3c/0x68
[   34.165614]  kasan_save_track+0x20/0x40
[   34.166441]  kasan_save_alloc_info+0x40/0x58
[   34.167149]  __kasan_kmalloc+0xd4/0xd8
[   34.167707]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.168392]  kasan_strings+0xb0/0x8d8
[   34.169028]  kunit_try_run_case+0x14c/0x3d0
[   34.169710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.170936]  kthread+0x24c/0x2d0
[   34.171391]  ret_from_fork+0x10/0x20
[   34.172016] 
[   34.172365] Freed by task 248:
[   34.173372]  kasan_save_stack+0x3c/0x68
[   34.173949]  kasan_save_track+0x20/0x40
[   34.174870]  kasan_save_free_info+0x4c/0x78
[   34.175562]  __kasan_slab_free+0x6c/0x98
[   34.176199]  kfree+0x114/0x3c8
[   34.176769]  kasan_strings+0x124/0x8d8
[   34.177298]  kunit_try_run_case+0x14c/0x3d0
[   34.177980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.179069]  kthread+0x24c/0x2d0
[   34.179611]  ret_from_fork+0x10/0x20
[   34.180223] 
[   34.180561] The buggy address belongs to the object at fff00000c69e4d00
[   34.180561]  which belongs to the cache kmalloc-32 of size 32
[   34.181821] The buggy address is located 16 bytes inside of
[   34.181821]  freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20)
[   34.183371] 
[   34.183733] The buggy address belongs to the physical page:
[   34.184469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   34.185397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.186503] page_type: f5(slab)
[   34.187086] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.188007] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.188898] page dumped because: kasan: bad access detected
[   34.189635] 
[   34.190008] Memory state around the buggy address:
[   34.191182]  fff00000c69e4c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   34.192002]  fff00000c69e4c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.193415] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.194248]                          ^
[   34.194841]  fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.196030]  fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.196825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   34.093760] ==================================================================
[   34.094880] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   34.095582] Read of size 1 at addr fff00000c69e4c58 by task kunit_try_catch/246
[   34.096415] 
[   34.096851] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.098723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.099321] Hardware name: linux,dummy-virt (DT)
[   34.100063] Call trace:
[   34.100544]  show_stack+0x20/0x38 (C)
[   34.101210]  dump_stack_lvl+0x8c/0xd0
[   34.101817]  print_report+0x118/0x5e0
[   34.102744]  kasan_report+0xc8/0x118
[   34.103343]  __asan_report_load1_noabort+0x20/0x30
[   34.104021]  memcmp+0x198/0x1d8
[   34.104594]  kasan_memcmp+0x16c/0x300
[   34.105169]  kunit_try_run_case+0x14c/0x3d0
[   34.105911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.106974]  kthread+0x24c/0x2d0
[   34.107544]  ret_from_fork+0x10/0x20
[   34.108180] 
[   34.108579] Allocated by task 246:
[   34.109012]  kasan_save_stack+0x3c/0x68
[   34.109676]  kasan_save_track+0x20/0x40
[   34.110714]  kasan_save_alloc_info+0x40/0x58
[   34.111346]  __kasan_kmalloc+0xd4/0xd8
[   34.111929]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.112566]  kasan_memcmp+0xbc/0x300
[   34.113065]  kunit_try_run_case+0x14c/0x3d0
[   34.113760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.114797]  kthread+0x24c/0x2d0
[   34.115353]  ret_from_fork+0x10/0x20
[   34.115937] 
[   34.116291] The buggy address belongs to the object at fff00000c69e4c40
[   34.116291]  which belongs to the cache kmalloc-32 of size 32
[   34.117481] The buggy address is located 0 bytes to the right of
[   34.117481]  allocated 24-byte region [fff00000c69e4c40, fff00000c69e4c58)
[   34.119160] 
[   34.119562] The buggy address belongs to the physical page:
[   34.120194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   34.121113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.121897] page_type: f5(slab)
[   34.122774] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.123618] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   34.124468] page dumped because: kasan: bad access detected
[   34.125183] 
[   34.125578] Memory state around the buggy address:
[   34.126148]  fff00000c69e4b00: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.127402]  fff00000c69e4b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   34.128216] >fff00000c69e4c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.129084]                                                     ^
[   34.129813]  fff00000c69e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.131129]  fff00000c69e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.131902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.777868] ==================================================================
[   31.779035] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   31.780469] Read of size 1 at addr fff00000c66fc373 by task kunit_try_catch/183
[   31.781266] 
[   31.782244] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.783444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.784075] Hardware name: linux,dummy-virt (DT)
[   31.784830] Call trace:
[   31.785418]  show_stack+0x20/0x38 (C)
[   31.786013]  dump_stack_lvl+0x8c/0xd0
[   31.787003]  print_report+0x118/0x5e0
[   31.787549]  kasan_report+0xc8/0x118
[   31.788136]  __asan_report_load1_noabort+0x20/0x30
[   31.788810]  ksize_unpoisons_memory+0x638/0x750
[   31.789540]  kunit_try_run_case+0x14c/0x3d0
[   31.790100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.791201]  kthread+0x24c/0x2d0
[   31.791695]  ret_from_fork+0x10/0x20
[   31.792334] 
[   31.792724] Allocated by task 183:
[   31.793205]  kasan_save_stack+0x3c/0x68
[   31.793861]  kasan_save_track+0x20/0x40
[   31.794760]  kasan_save_alloc_info+0x40/0x58
[   31.795367]  __kasan_kmalloc+0xd4/0xd8
[   31.796033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.796707]  ksize_unpoisons_memory+0xc0/0x750
[   31.797363]  kunit_try_run_case+0x14c/0x3d0
[   31.797983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.798704]  kthread+0x24c/0x2d0
[   31.799297]  ret_from_fork+0x10/0x20
[   31.799842] 
[   31.800212] The buggy address belongs to the object at fff00000c66fc300
[   31.800212]  which belongs to the cache kmalloc-128 of size 128
[   31.802677] The buggy address is located 0 bytes to the right of
[   31.802677]  allocated 115-byte region [fff00000c66fc300, fff00000c66fc373)
[   31.803975] 
[   31.804353] The buggy address belongs to the physical page:
[   31.804989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc
[   31.805937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.807086] page_type: f5(slab)
[   31.807675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.808471] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.809358] page dumped because: kasan: bad access detected
[   31.810104] 
[   31.810774] Memory state around the buggy address:
[   31.811423]  fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.812303]  fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.813183] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.814078]                                                              ^
[   31.815262]  fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.816105]  fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.816914] ==================================================================
[   31.820120] ==================================================================
[   31.820885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   31.821649] Read of size 1 at addr fff00000c66fc378 by task kunit_try_catch/183
[   31.823003] 
[   31.823622] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.824797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.825412] Hardware name: linux,dummy-virt (DT)
[   31.826078] Call trace:
[   31.826440]  show_stack+0x20/0x38 (C)
[   31.827324]  dump_stack_lvl+0x8c/0xd0
[   31.827899]  print_report+0x118/0x5e0
[   31.828559]  kasan_report+0xc8/0x118
[   31.829202]  __asan_report_load1_noabort+0x20/0x30
[   31.829900]  ksize_unpoisons_memory+0x628/0x750
[   31.830671]  kunit_try_run_case+0x14c/0x3d0
[   31.831287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.832043]  kthread+0x24c/0x2d0
[   31.832667]  ret_from_fork+0x10/0x20
[   31.833294] 
[   31.833622] Allocated by task 183:
[   31.834183]  kasan_save_stack+0x3c/0x68
[   31.834763]  kasan_save_track+0x20/0x40
[   31.835694]  kasan_save_alloc_info+0x40/0x58
[   31.836335]  __kasan_kmalloc+0xd4/0xd8
[   31.836932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.837654]  ksize_unpoisons_memory+0xc0/0x750
[   31.838703]  kunit_try_run_case+0x14c/0x3d0
[   31.839281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.840051]  kthread+0x24c/0x2d0
[   31.840603]  ret_from_fork+0x10/0x20
[   31.841207] 
[   31.841590] The buggy address belongs to the object at fff00000c66fc300
[   31.841590]  which belongs to the cache kmalloc-128 of size 128
[   31.843043] The buggy address is located 5 bytes to the right of
[   31.843043]  allocated 115-byte region [fff00000c66fc300, fff00000c66fc373)
[   31.844691] 
[   31.845038] The buggy address belongs to the physical page:
[   31.845588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc
[   31.846940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.847863] page_type: f5(slab)
[   31.848329] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.849084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.850233] page dumped because: kasan: bad access detected
[   31.851091] 
[   31.851430] Memory state around the buggy address:
[   31.852059]  fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.852840]  fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.853805] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.854964]                                                                 ^
[   31.855978]  fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.857011]  fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.858003] ==================================================================
[   31.860067] ==================================================================
[   31.860780] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   31.861689] Read of size 1 at addr fff00000c66fc37f by task kunit_try_catch/183
[   31.863375] 
[   31.863802] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.864915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.865546] Hardware name: linux,dummy-virt (DT)
[   31.866258] Call trace:
[   31.866724]  show_stack+0x20/0x38 (C)
[   31.867307]  dump_stack_lvl+0x8c/0xd0
[   31.868226]  print_report+0x118/0x5e0
[   31.868882]  kasan_report+0xc8/0x118
[   31.869531]  __asan_report_load1_noabort+0x20/0x30
[   31.870143]  ksize_unpoisons_memory+0x6a0/0x750
[   31.871120]  kunit_try_run_case+0x14c/0x3d0
[   31.871838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.872481]  kthread+0x24c/0x2d0
[   31.873097]  ret_from_fork+0x10/0x20
[   31.873706] 
[   31.874048] Allocated by task 183:
[   31.874558]  kasan_save_stack+0x3c/0x68
[   31.875094]  kasan_save_track+0x20/0x40
[   31.876004]  kasan_save_alloc_info+0x40/0x58
[   31.876642]  __kasan_kmalloc+0xd4/0xd8
[   31.877183]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.877898]  ksize_unpoisons_memory+0xc0/0x750
[   31.878899]  kunit_try_run_case+0x14c/0x3d0
[   31.879409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.880210]  kthread+0x24c/0x2d0
[   31.880892]  ret_from_fork+0x10/0x20
[   31.881503] 
[   31.881890] The buggy address belongs to the object at fff00000c66fc300
[   31.881890]  which belongs to the cache kmalloc-128 of size 128
[   31.883426] The buggy address is located 12 bytes to the right of
[   31.883426]  allocated 115-byte region [fff00000c66fc300, fff00000c66fc373)
[   31.884677] 
[   31.885050] The buggy address belongs to the physical page:
[   31.885882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc
[   31.886931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.887807] page_type: f5(slab)
[   31.888320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.889734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.891098] page dumped because: kasan: bad access detected
[   31.891824] 
[   31.892457] Memory state around the buggy address:
[   31.893248]  fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.894410]  fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.895283] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.896058]                                                                 ^
[   31.897195]  fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.898219]  fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.899286] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   34.039561] ==================================================================
[   34.040745] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   34.041574] Read of size 1 at addr ffff800080c27bea by task kunit_try_catch/242
[   34.042420] 
[   34.042912] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.045214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.045940] Hardware name: linux,dummy-virt (DT)
[   34.046896] Call trace:
[   34.047377]  show_stack+0x20/0x38 (C)
[   34.048057]  dump_stack_lvl+0x8c/0xd0
[   34.048734]  print_report+0x2fc/0x5e0
[   34.049393]  kasan_report+0xc8/0x118
[   34.050044]  __asan_report_load1_noabort+0x20/0x30
[   34.051043]  kasan_alloca_oob_right+0x2e4/0x348
[   34.051740]  kunit_try_run_case+0x14c/0x3d0
[   34.052451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.053197]  kthread+0x24c/0x2d0
[   34.053823]  ret_from_fork+0x10/0x20
[   34.054742] 
[   34.055090] The buggy address belongs to stack of task kunit_try_catch/242
[   34.055917] 
[   34.056316] The buggy address belongs to the virtual mapping at
[   34.056316]  [ffff800080c20000, ffff800080c29000) created by:
[   34.056316]  kernel_clone+0x140/0x788
[   34.057862] 
[   34.058474] The buggy address belongs to the physical page:
[   34.059270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61
[   34.060191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.061825] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.062787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.063722] page dumped because: kasan: bad access detected
[   34.064361] 
[   34.064752] Memory state around the buggy address:
[   34.065435]  ffff800080c27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.066855]  ffff800080c27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.067772] >ffff800080c27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.068599]                                                           ^
[   34.069338]  ffff800080c27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   34.070155]  ffff800080c27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   34.071293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   33.996474] ==================================================================
[   33.997586] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.998447] Read of size 1 at addr ffff800080c27bdf by task kunit_try_catch/240
[   33.999381] 
[   34.000701] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   34.001904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.003661] Hardware name: linux,dummy-virt (DT)
[   34.004187] Call trace:
[   34.004669]  show_stack+0x20/0x38 (C)
[   34.005306]  dump_stack_lvl+0x8c/0xd0
[   34.005951]  print_report+0x2fc/0x5e0
[   34.006657]  kasan_report+0xc8/0x118
[   34.007225]  __asan_report_load1_noabort+0x20/0x30
[   34.008399]  kasan_alloca_oob_left+0x2b8/0x310
[   34.009123]  kunit_try_run_case+0x14c/0x3d0
[   34.009818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.011040]  kthread+0x24c/0x2d0
[   34.011704]  ret_from_fork+0x10/0x20
[   34.012225] 
[   34.012622] The buggy address belongs to stack of task kunit_try_catch/240
[   34.013408] 
[   34.014062] The buggy address belongs to the virtual mapping at
[   34.014062]  [ffff800080c20000, ffff800080c29000) created by:
[   34.014062]  kernel_clone+0x140/0x788
[   34.016043] 
[   34.016503] The buggy address belongs to the physical page:
[   34.017262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61
[   34.018122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.019977] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.020873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.021739] page dumped because: kasan: bad access detected
[   34.022655] 
[   34.023035] Memory state around the buggy address:
[   34.023749]  ffff800080c27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.024696]  ffff800080c27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.025477] >ffff800080c27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.026275]                                                     ^
[   34.027368]  ffff800080c27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   34.028303]  ffff800080c27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   34.029210] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   33.948789] ==================================================================
[   33.950884] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   33.951582] Read of size 1 at addr ffff800080c27cba by task kunit_try_catch/238
[   33.953255] 
[   33.953724] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.955265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.955958] Hardware name: linux,dummy-virt (DT)
[   33.956642] Call trace:
[   33.957063]  show_stack+0x20/0x38 (C)
[   33.957695]  dump_stack_lvl+0x8c/0xd0
[   33.958431]  print_report+0x2fc/0x5e0
[   33.959447]  kasan_report+0xc8/0x118
[   33.960127]  __asan_report_load1_noabort+0x20/0x30
[   33.960998]  kasan_stack_oob+0x230/0x268
[   33.961610]  kunit_try_run_case+0x14c/0x3d0
[   33.962369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963120]  kthread+0x24c/0x2d0
[   33.964128]  ret_from_fork+0x10/0x20
[   33.964707] 
[   33.965331] The buggy address belongs to stack of task kunit_try_catch/238
[   33.966349]  and is located at offset 138 in frame:
[   33.967255]  kasan_stack_oob+0x0/0x268
[   33.968051] 
[   33.968472] This frame has 4 objects:
[   33.969184]  [48, 49) '__assertion'
[   33.969376]  [64, 72) 'array'
[   33.969914]  [96, 112) '__assertion'
[   33.970423]  [128, 138) 'stack_array'
[   33.971237] 
[   33.971970] The buggy address belongs to the virtual mapping at
[   33.971970]  [ffff800080c20000, ffff800080c29000) created by:
[   33.971970]  kernel_clone+0x140/0x788
[   33.973723] 
[   33.974098] The buggy address belongs to the physical page:
[   33.975208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61
[   33.976163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.977034] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.977921] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.979187] page dumped because: kasan: bad access detected
[   33.979860] 
[   33.980222] Memory state around the buggy address:
[   33.980763]  ffff800080c27b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.981684]  ffff800080c27c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   33.982906] >ffff800080c27c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   33.983640]                                         ^
[   33.984351]  ffff800080c27d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   33.985119]  ffff800080c27d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.985976] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   33.896764] ==================================================================
[   33.898043] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.899423] Read of size 1 at addr ffffa4990632202d by task kunit_try_catch/234
[   33.900267] 
[   33.900749] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.901989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.902656] Hardware name: linux,dummy-virt (DT)
[   33.903799] Call trace:
[   33.904125]  show_stack+0x20/0x38 (C)
[   33.904787]  dump_stack_lvl+0x8c/0xd0
[   33.905400]  print_report+0x2fc/0x5e0
[   33.906096]  kasan_report+0xc8/0x118
[   33.907155]  __asan_report_load1_noabort+0x20/0x30
[   33.907815]  kasan_global_oob_right+0x230/0x270
[   33.908437]  kunit_try_run_case+0x14c/0x3d0
[   33.909078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.909797]  kthread+0x24c/0x2d0
[   33.910708]  ret_from_fork+0x10/0x20
[   33.911473] 
[   33.911926] The buggy address belongs to the variable:
[   33.912604]  global_array+0xd/0x40
[   33.913220] 
[   33.913795] The buggy address belongs to the virtual mapping at
[   33.913795]  [ffffa49904650000, ffffa499063d1000) created by:
[   33.913795]  paging_init+0x668/0x7c8
[   33.915725] 
[   33.916402] The buggy address belongs to the physical page:
[   33.917161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47922
[   33.918193] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.919579] raw: 03fffe0000002000 ffffc1ffc01e4888 ffffc1ffc01e4888 0000000000000000
[   33.920572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.921548] page dumped because: kasan: bad access detected
[   33.922311] 
[   33.923129] Memory state around the buggy address:
[   33.923782]  ffffa49906321f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.924663]  ffffa49906321f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   33.925619] >ffffa49906322000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   33.926800]                                   ^
[   33.927575]  ffffa49906322080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   33.928432]  ffffa49906322100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   33.929325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.795149] ==================================================================
[   33.796753] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.797610] Free of addr fff00000c6711b01 by task kunit_try_catch/230
[   33.798286] 
[   33.798780] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.800116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.801195] Hardware name: linux,dummy-virt (DT)
[   33.801809] Call trace:
[   33.802470]  show_stack+0x20/0x38 (C)
[   33.803249]  dump_stack_lvl+0x8c/0xd0
[   33.803947]  print_report+0x118/0x5e0
[   33.804577]  kasan_report_invalid_free+0xb0/0xd8
[   33.805118]  check_slab_allocation+0xfc/0x108
[   33.805901]  __kasan_mempool_poison_object+0x78/0x150
[   33.806731]  mempool_free+0x28c/0x328
[   33.807469]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.808185]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.808936]  kunit_try_run_case+0x14c/0x3d0
[   33.809650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.810403]  kthread+0x24c/0x2d0
[   33.811073]  ret_from_fork+0x10/0x20
[   33.811690] 
[   33.812090] Allocated by task 230:
[   33.812675]  kasan_save_stack+0x3c/0x68
[   33.813234]  kasan_save_track+0x20/0x40
[   33.813754]  kasan_save_alloc_info+0x40/0x58
[   33.814356]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.815053]  remove_element+0x130/0x1f8
[   33.815732]  mempool_alloc_preallocated+0x58/0xc0
[   33.816404]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   33.817086]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.817840]  kunit_try_run_case+0x14c/0x3d0
[   33.818503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.819233]  kthread+0x24c/0x2d0
[   33.819836]  ret_from_fork+0x10/0x20
[   33.820435] 
[   33.820812] The buggy address belongs to the object at fff00000c6711b00
[   33.820812]  which belongs to the cache kmalloc-128 of size 128
[   33.822045] The buggy address is located 1 bytes inside of
[   33.822045]  128-byte region [fff00000c6711b00, fff00000c6711b80)
[   33.823265] 
[   33.823668] The buggy address belongs to the physical page:
[   33.824323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106711
[   33.825295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.826157] page_type: f5(slab)
[   33.826681] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.827619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.828412] page dumped because: kasan: bad access detected
[   33.829030] 
[   33.829394] Memory state around the buggy address:
[   33.830057]  fff00000c6711a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.830876]  fff00000c6711a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.831820] >fff00000c6711b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.832658]                    ^
[   33.833108]  fff00000c6711b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.833962]  fff00000c6711c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.834764] ==================================================================
[   33.849127] ==================================================================
[   33.850219] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.851408] Free of addr fff00000c6b20001 by task kunit_try_catch/232
[   33.852291] 
[   33.852726] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.853710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.854483] Hardware name: linux,dummy-virt (DT)
[   33.855489] Call trace:
[   33.856005]  show_stack+0x20/0x38 (C)
[   33.856667]  dump_stack_lvl+0x8c/0xd0
[   33.857246]  print_report+0x118/0x5e0
[   33.857830]  kasan_report_invalid_free+0xb0/0xd8
[   33.858853]  __kasan_mempool_poison_object+0xfc/0x150
[   33.859989]  mempool_free+0x28c/0x328
[   33.860542]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.861315]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   33.862042]  kunit_try_run_case+0x14c/0x3d0
[   33.862703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.863451]  kthread+0x24c/0x2d0
[   33.864672]  ret_from_fork+0x10/0x20
[   33.865223] 
[   33.865625] The buggy address belongs to the physical page:
[   33.866424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20
[   33.867725] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.868673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.869644] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.870468] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.871921] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.872834] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.873917] head: 0bfffe0000000002 ffffc1ffc31ac801 ffffffffffffffff 0000000000000000
[   33.875389] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.876268] page dumped because: kasan: bad access detected
[   33.877005] 
[   33.877411] Memory state around the buggy address:
[   33.878052]  fff00000c6b1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879290]  fff00000c6b1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.880128] >fff00000c6b20000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.881584]                    ^
[   33.882111]  fff00000c6b20080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.883400]  fff00000c6b20100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.884246] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.650637] ==================================================================
[   33.651842] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.652538] Free of addr fff00000c69f2600 by task kunit_try_catch/224
[   33.653340] 
[   33.653696] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.654875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.655480] Hardware name: linux,dummy-virt (DT)
[   33.656182] Call trace:
[   33.656625]  show_stack+0x20/0x38 (C)
[   33.657152]  dump_stack_lvl+0x8c/0xd0
[   33.657743]  print_report+0x118/0x5e0
[   33.658291]  kasan_report_invalid_free+0xb0/0xd8
[   33.659046]  check_slab_allocation+0xd4/0x108
[   33.659630]  __kasan_mempool_poison_object+0x78/0x150
[   33.660376]  mempool_free+0x28c/0x328
[   33.660936]  mempool_double_free_helper+0x150/0x2e0
[   33.661668]  mempool_kmalloc_double_free+0xb8/0x110
[   33.662417]  kunit_try_run_case+0x14c/0x3d0
[   33.663135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.663837]  kthread+0x24c/0x2d0
[   33.664430]  ret_from_fork+0x10/0x20
[   33.665029] 
[   33.665404] Allocated by task 224:
[   33.666013]  kasan_save_stack+0x3c/0x68
[   33.666587]  kasan_save_track+0x20/0x40
[   33.667228]  kasan_save_alloc_info+0x40/0x58
[   33.667880]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.668616]  remove_element+0x130/0x1f8
[   33.669243]  mempool_alloc_preallocated+0x58/0xc0
[   33.669963]  mempool_double_free_helper+0x94/0x2e0
[   33.670608]  mempool_kmalloc_double_free+0xb8/0x110
[   33.671341]  kunit_try_run_case+0x14c/0x3d0
[   33.671877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.672676]  kthread+0x24c/0x2d0
[   33.673139]  ret_from_fork+0x10/0x20
[   33.673761] 
[   33.674134] Freed by task 224:
[   33.674659]  kasan_save_stack+0x3c/0x68
[   33.675256]  kasan_save_track+0x20/0x40
[   33.675872]  kasan_save_free_info+0x4c/0x78
[   33.676575]  __kasan_mempool_poison_object+0xc0/0x150
[   33.677325]  mempool_free+0x28c/0x328
[   33.677923]  mempool_double_free_helper+0x100/0x2e0
[   33.678481]  mempool_kmalloc_double_free+0xb8/0x110
[   33.679240]  kunit_try_run_case+0x14c/0x3d0
[   33.679899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.680669]  kthread+0x24c/0x2d0
[   33.681122]  ret_from_fork+0x10/0x20
[   33.681735] 
[   33.682117] The buggy address belongs to the object at fff00000c69f2600
[   33.682117]  which belongs to the cache kmalloc-128 of size 128
[   33.683199] The buggy address is located 0 bytes inside of
[   33.683199]  128-byte region [fff00000c69f2600, fff00000c69f2680)
[   33.684558] 
[   33.684885] The buggy address belongs to the physical page:
[   33.685643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069f2
[   33.686573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.687370] page_type: f5(slab)
[   33.687947] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.688787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.689575] page dumped because: kasan: bad access detected
[   33.690322] 
[   33.690711] Memory state around the buggy address:
[   33.691306]  fff00000c69f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.692106]  fff00000c69f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.692924] >fff00000c69f2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.693834]                    ^
[   33.694324]  fff00000c69f2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.695040]  fff00000c69f2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.695964] ==================================================================
[   33.707304] ==================================================================
[   33.708572] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.709276] Free of addr fff00000c6b30000 by task kunit_try_catch/226
[   33.709931] 
[   33.710336] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.711669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.712257] Hardware name: linux,dummy-virt (DT)
[   33.712910] Call trace:
[   33.713473]  show_stack+0x20/0x38 (C)
[   33.714490]  dump_stack_lvl+0x8c/0xd0
[   33.715160]  print_report+0x118/0x5e0
[   33.715702]  kasan_report_invalid_free+0xb0/0xd8
[   33.716417]  __kasan_mempool_poison_object+0x14c/0x150
[   33.718873]  mempool_free+0x28c/0x328
[   33.719682]  mempool_double_free_helper+0x150/0x2e0
[   33.720529]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.721349]  kunit_try_run_case+0x14c/0x3d0
[   33.722165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.722964]  kthread+0x24c/0x2d0
[   33.723526]  ret_from_fork+0x10/0x20
[   33.724118] 
[   33.724464] The buggy address belongs to the physical page:
[   33.725095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30
[   33.726818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.727658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.729039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.729869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.730924] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.731842] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.732911] head: 0bfffe0000000002 ffffc1ffc31acc01 ffffffffffffffff 0000000000000000
[   33.733837] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.735417] page dumped because: kasan: bad access detected
[   33.736125] 
[   33.736564] Memory state around the buggy address:
[   33.737320]  fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.738485]  fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.739250] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.740205]                    ^
[   33.740689]  fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.741068]  fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.741419] ==================================================================
[   33.752243] ==================================================================
[   33.753528] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.754468] Free of addr fff00000c6b30000 by task kunit_try_catch/228
[   33.755572] 
[   33.756976] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.758065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.758681] Hardware name: linux,dummy-virt (DT)
[   33.759723] Call trace:
[   33.760186]  show_stack+0x20/0x38 (C)
[   33.760852]  dump_stack_lvl+0x8c/0xd0
[   33.761548]  print_report+0x118/0x5e0
[   33.762152]  kasan_report_invalid_free+0xb0/0xd8
[   33.763716]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.764440]  mempool_free+0x24c/0x328
[   33.765034]  mempool_double_free_helper+0x150/0x2e0
[   33.765823]  mempool_page_alloc_double_free+0xb4/0x110
[   33.766635]  kunit_try_run_case+0x14c/0x3d0
[   33.767634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.768452]  kthread+0x24c/0x2d0
[   33.769063]  ret_from_fork+0x10/0x20
[   33.769714] 
[   33.770086] The buggy address belongs to the physical page:
[   33.771705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30
[   33.772669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.773474] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.774862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.775756] page dumped because: kasan: bad access detected
[   33.776450] 
[   33.776875] Memory state around the buggy address:
[   33.777441]  fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.778904]  fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.780164] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.780977]                    ^
[   33.781578]  fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.782693]  fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.783460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   30.181870] ==================================================================
[   30.183250] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.184233] Free of addr fff00000c6220001 by task kunit_try_catch/139
[   30.184957] 
[   30.185364] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.186806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.187289] Hardware name: linux,dummy-virt (DT)
[   30.187779] Call trace:
[   30.188136]  show_stack+0x20/0x38 (C)
[   30.188705]  dump_stack_lvl+0x8c/0xd0
[   30.189402]  print_report+0x118/0x5e0
[   30.190158]  kasan_report_invalid_free+0xb0/0xd8
[   30.191399]  __kasan_kfree_large+0x5c/0xa8
[   30.192266]  free_large_kmalloc+0x58/0x140
[   30.192989]  kfree+0x270/0x3c8
[   30.193438]  kmalloc_large_invalid_free+0x108/0x270
[   30.194394]  kunit_try_run_case+0x14c/0x3d0
[   30.195051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.195804]  kthread+0x24c/0x2d0
[   30.196375]  ret_from_fork+0x10/0x20
[   30.197352] 
[   30.197704] The buggy address belongs to the physical page:
[   30.198821] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.199666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.200547] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.201409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.202299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.203088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.204002] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.205370] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.206503] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.207344] page dumped because: kasan: bad access detected
[   30.208556] 
[   30.208867] Memory state around the buggy address:
[   30.209604]  fff00000c621ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210435]  fff00000c621ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.211179] >fff00000c6220000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.211991]                    ^
[   30.212571]  fff00000c6220080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.213401]  fff00000c6220100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.214365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   33.491768] ==================================================================
[   33.492924] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.493675] Read of size 1 at addr fff00000c6b30000 by task kunit_try_catch/218
[   33.494836] 
[   33.495724] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.496870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.497436] Hardware name: linux,dummy-virt (DT)
[   33.498002] Call trace:
[   33.498416]  show_stack+0x20/0x38 (C)
[   33.499476]  dump_stack_lvl+0x8c/0xd0
[   33.500097]  print_report+0x118/0x5e0
[   33.500635]  kasan_report+0xc8/0x118
[   33.501268]  __asan_report_load1_noabort+0x20/0x30
[   33.502038]  mempool_uaf_helper+0x314/0x340
[   33.503008]  mempool_kmalloc_large_uaf+0xbc/0x118
[   33.503597]  kunit_try_run_case+0x14c/0x3d0
[   33.504483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505356]  kthread+0x24c/0x2d0
[   33.505974]  ret_from_fork+0x10/0x20
[   33.506950] 
[   33.507325] The buggy address belongs to the physical page:
[   33.508261] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30
[   33.509298] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.510359] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.511251] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.512983] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.513944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.515262] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.515884] head: 0bfffe0000000002 ffffc1ffc31acc01 ffffffffffffffff 0000000000000000
[   33.516817] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.517715] page dumped because: kasan: bad access detected
[   33.518842] 
[   33.519621] Memory state around the buggy address:
[   33.520249]  fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.521154]  fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.522128] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.523309]                    ^
[   33.524058]  fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.525035]  fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.525951] ==================================================================
[   33.612016] ==================================================================
[   33.613276] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.614718] Read of size 1 at addr fff00000c6b20000 by task kunit_try_catch/222
[   33.615947] 
[   33.616276] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.617437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.617912] Hardware name: linux,dummy-virt (DT)
[   33.618680] Call trace:
[   33.619147]  show_stack+0x20/0x38 (C)
[   33.619808]  dump_stack_lvl+0x8c/0xd0
[   33.620322]  print_report+0x118/0x5e0
[   33.620975]  kasan_report+0xc8/0x118
[   33.621528]  __asan_report_load1_noabort+0x20/0x30
[   33.622214]  mempool_uaf_helper+0x314/0x340
[   33.622851]  mempool_page_alloc_uaf+0xb8/0x118
[   33.623545]  kunit_try_run_case+0x14c/0x3d0
[   33.624228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624979]  kthread+0x24c/0x2d0
[   33.625585]  ret_from_fork+0x10/0x20
[   33.626248] 
[   33.626592] The buggy address belongs to the physical page:
[   33.627323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20
[   33.628171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.629036] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.629911] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.630728] page dumped because: kasan: bad access detected
[   33.631460] 
[   33.631849] Memory state around the buggy address:
[   33.632496]  fff00000c6b1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.633321]  fff00000c6b1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.634169] >fff00000c6b20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.634976]                    ^
[   33.635457]  fff00000c6b20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.636397]  fff00000c6b20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.637098] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   33.428863] ==================================================================
[   33.430184] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.431562] Read of size 1 at addr fff00000c69c6f00 by task kunit_try_catch/216
[   33.432412] 
[   33.433175] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.434299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.434985] Hardware name: linux,dummy-virt (DT)
[   33.435616] Call trace:
[   33.436032]  show_stack+0x20/0x38 (C)
[   33.436792]  dump_stack_lvl+0x8c/0xd0
[   33.437447]  print_report+0x118/0x5e0
[   33.438127]  kasan_report+0xc8/0x118
[   33.438728]  __asan_report_load1_noabort+0x20/0x30
[   33.439914]  mempool_uaf_helper+0x314/0x340
[   33.440529]  mempool_kmalloc_uaf+0xbc/0x118
[   33.441188]  kunit_try_run_case+0x14c/0x3d0
[   33.441876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.442856]  kthread+0x24c/0x2d0
[   33.443397]  ret_from_fork+0x10/0x20
[   33.443986] 
[   33.444320] Allocated by task 216:
[   33.445538]  kasan_save_stack+0x3c/0x68
[   33.446084]  kasan_save_track+0x20/0x40
[   33.446740]  kasan_save_alloc_info+0x40/0x58
[   33.447319]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.448373]  remove_element+0x130/0x1f8
[   33.448905]  mempool_alloc_preallocated+0x58/0xc0
[   33.449633]  mempool_uaf_helper+0xa4/0x340
[   33.451232]  mempool_kmalloc_uaf+0xbc/0x118
[   33.451745]  kunit_try_run_case+0x14c/0x3d0
[   33.452409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.453031]  kthread+0x24c/0x2d0
[   33.453615]  ret_from_fork+0x10/0x20
[   33.454248] 
[   33.454580] Freed by task 216:
[   33.455108]  kasan_save_stack+0x3c/0x68
[   33.455715]  kasan_save_track+0x20/0x40
[   33.456325]  kasan_save_free_info+0x4c/0x78
[   33.457253]  __kasan_mempool_poison_object+0xc0/0x150
[   33.458021]  mempool_free+0x28c/0x328
[   33.458913]  mempool_uaf_helper+0x104/0x340
[   33.459527]  mempool_kmalloc_uaf+0xbc/0x118
[   33.460089]  kunit_try_run_case+0x14c/0x3d0
[   33.460669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.461451]  kthread+0x24c/0x2d0
[   33.461932]  ret_from_fork+0x10/0x20
[   33.462836] 
[   33.463208] The buggy address belongs to the object at fff00000c69c6f00
[   33.463208]  which belongs to the cache kmalloc-128 of size 128
[   33.464446] The buggy address is located 0 bytes inside of
[   33.464446]  freed 128-byte region [fff00000c69c6f00, fff00000c69c6f80)
[   33.465735] 
[   33.466108] The buggy address belongs to the physical page:
[   33.467004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069c6
[   33.468044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.468933] page_type: f5(slab)
[   33.469428] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.470632] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   33.471600] page dumped because: kasan: bad access detected
[   33.472266] 
[   33.473170] Memory state around the buggy address:
[   33.474026]  fff00000c69c6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.475339]  fff00000c69c6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.476054] >fff00000c69c6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.477039]                    ^
[   33.477607]  fff00000c69c6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.478854]  fff00000c69c7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.479694] ==================================================================
[   33.540598] ==================================================================
[   33.541722] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.543065] Read of size 1 at addr fff00000c69e2240 by task kunit_try_catch/220
[   33.544027] 
[   33.544406] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.545374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.545986] Hardware name: linux,dummy-virt (DT)
[   33.547102] Call trace:
[   33.547572]  show_stack+0x20/0x38 (C)
[   33.548213]  dump_stack_lvl+0x8c/0xd0
[   33.548868]  print_report+0x118/0x5e0
[   33.549389]  kasan_report+0xc8/0x118
[   33.550032]  __asan_report_load1_noabort+0x20/0x30
[   33.551158]  mempool_uaf_helper+0x314/0x340
[   33.551809]  mempool_slab_uaf+0xb8/0x110
[   33.552459]  kunit_try_run_case+0x14c/0x3d0
[   33.553108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.553830]  kthread+0x24c/0x2d0
[   33.554847]  ret_from_fork+0x10/0x20
[   33.555438] 
[   33.555817] Allocated by task 220:
[   33.556314]  kasan_save_stack+0x3c/0x68
[   33.556974]  kasan_save_track+0x20/0x40
[   33.557479]  kasan_save_alloc_info+0x40/0x58
[   33.558597]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.559314]  remove_element+0x16c/0x1f8
[   33.559862]  mempool_alloc_preallocated+0x58/0xc0
[   33.560592]  mempool_uaf_helper+0xa4/0x340
[   33.561155]  mempool_slab_uaf+0xb8/0x110
[   33.561806]  kunit_try_run_case+0x14c/0x3d0
[   33.562757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.563563]  kthread+0x24c/0x2d0
[   33.564088]  ret_from_fork+0x10/0x20
[   33.564707] 
[   33.565055] Freed by task 220:
[   33.565537]  kasan_save_stack+0x3c/0x68
[   33.566164]  kasan_save_track+0x20/0x40
[   33.567200]  kasan_save_free_info+0x4c/0x78
[   33.567805]  __kasan_mempool_poison_object+0xc0/0x150
[   33.568427]  mempool_free+0x28c/0x328
[   33.569069]  mempool_uaf_helper+0x104/0x340
[   33.569686]  mempool_slab_uaf+0xb8/0x110
[   33.570204]  kunit_try_run_case+0x14c/0x3d0
[   33.570910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.571622]  kthread+0x24c/0x2d0
[   33.572184]  ret_from_fork+0x10/0x20
[   33.573171] 
[   33.573550] The buggy address belongs to the object at fff00000c69e2240
[   33.573550]  which belongs to the cache test_cache of size 123
[   33.575110] The buggy address is located 0 bytes inside of
[   33.575110]  freed 123-byte region [fff00000c69e2240, fff00000c69e22bb)
[   33.576448] 
[   33.576844] The buggy address belongs to the physical page:
[   33.577426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e2
[   33.578402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.579837] page_type: f5(slab)
[   33.580394] raw: 0bfffe0000000000 fff00000c13faa00 dead000000000122 0000000000000000
[   33.581204] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.582487] page dumped because: kasan: bad access detected
[   33.583262] 
[   33.583651] Memory state around the buggy address:
[   33.584286]  fff00000c69e2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.585723]  fff00000c69e2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.586802] >fff00000c69e2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.587449]                                            ^
[   33.588196]  fff00000c69e2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.589249]  fff00000c69e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.590063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   33.258944] ==================================================================
[   33.260043] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.261111] Read of size 1 at addr fff00000c69c6773 by task kunit_try_catch/210
[   33.261800] 
[   33.262139] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.263272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.264121] Hardware name: linux,dummy-virt (DT)
[   33.265419] Call trace:
[   33.265946]  show_stack+0x20/0x38 (C)
[   33.266899]  dump_stack_lvl+0x8c/0xd0
[   33.267404]  print_report+0x118/0x5e0
[   33.268463]  kasan_report+0xc8/0x118
[   33.269465]  __asan_report_load1_noabort+0x20/0x30
[   33.270563]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.271234]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.271841]  kunit_try_run_case+0x14c/0x3d0
[   33.272620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.273370]  kthread+0x24c/0x2d0
[   33.274042]  ret_from_fork+0x10/0x20
[   33.274952] 
[   33.275270] Allocated by task 210:
[   33.275711]  kasan_save_stack+0x3c/0x68
[   33.276339]  kasan_save_track+0x20/0x40
[   33.277081]  kasan_save_alloc_info+0x40/0x58
[   33.278084]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.278924]  remove_element+0x130/0x1f8
[   33.279917]  mempool_alloc_preallocated+0x58/0xc0
[   33.280659]  mempool_oob_right_helper+0x98/0x2f0
[   33.281367]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.282085]  kunit_try_run_case+0x14c/0x3d0
[   33.282876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.284112]  kthread+0x24c/0x2d0
[   33.284813]  ret_from_fork+0x10/0x20
[   33.285412] 
[   33.285909] The buggy address belongs to the object at fff00000c69c6700
[   33.285909]  which belongs to the cache kmalloc-128 of size 128
[   33.287716] The buggy address is located 0 bytes to the right of
[   33.287716]  allocated 115-byte region [fff00000c69c6700, fff00000c69c6773)
[   33.289179] 
[   33.289617] The buggy address belongs to the physical page:
[   33.290237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069c6
[   33.291717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.292877] page_type: f5(slab)
[   33.293767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.295426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.296371] page dumped because: kasan: bad access detected
[   33.296963] 
[   33.297284] Memory state around the buggy address:
[   33.297868]  fff00000c69c6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.299106]  fff00000c69c6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.299884] >fff00000c69c6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.300619]                                                              ^
[   33.301384]  fff00000c69c6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.302238]  fff00000c69c6800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.303045] ==================================================================
[   33.364970] ==================================================================
[   33.366213] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.367060] Read of size 1 at addr fff00000c69e42bb by task kunit_try_catch/214
[   33.368302] 
[   33.368755] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.370129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.371108] Hardware name: linux,dummy-virt (DT)
[   33.371755] Call trace:
[   33.372152]  show_stack+0x20/0x38 (C)
[   33.372678]  dump_stack_lvl+0x8c/0xd0
[   33.373333]  print_report+0x118/0x5e0
[   33.374032]  kasan_report+0xc8/0x118
[   33.374962]  __asan_report_load1_noabort+0x20/0x30
[   33.375805]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.376665]  mempool_slab_oob_right+0xb8/0x110
[   33.377474]  kunit_try_run_case+0x14c/0x3d0
[   33.378560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.379348]  kthread+0x24c/0x2d0
[   33.379870]  ret_from_fork+0x10/0x20
[   33.380373] 
[   33.380802] Allocated by task 214:
[   33.381409]  kasan_save_stack+0x3c/0x68
[   33.382066]  kasan_save_track+0x20/0x40
[   33.383060]  kasan_save_alloc_info+0x40/0x58
[   33.383804]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.384543]  remove_element+0x16c/0x1f8
[   33.385165]  mempool_alloc_preallocated+0x58/0xc0
[   33.385856]  mempool_oob_right_helper+0x98/0x2f0
[   33.386872]  mempool_slab_oob_right+0xb8/0x110
[   33.387761]  kunit_try_run_case+0x14c/0x3d0
[   33.388528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.389322]  kthread+0x24c/0x2d0
[   33.389875]  ret_from_fork+0x10/0x20
[   33.390378] 
[   33.390773] The buggy address belongs to the object at fff00000c69e4240
[   33.390773]  which belongs to the cache test_cache of size 123
[   33.392068] The buggy address is located 0 bytes to the right of
[   33.392068]  allocated 123-byte region [fff00000c69e4240, fff00000c69e42bb)
[   33.393754] 
[   33.394233] The buggy address belongs to the physical page:
[   33.394959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4
[   33.396282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.397152] page_type: f5(slab)
[   33.397656] raw: 0bfffe0000000000 fff00000c13fa8c0 dead000000000122 0000000000000000
[   33.398920] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.399909] page dumped because: kasan: bad access detected
[   33.400800] 
[   33.401342] Memory state around the buggy address:
[   33.402135]  fff00000c69e4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.403196]  fff00000c69e4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.403645] >fff00000c69e4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.404624]                                         ^
[   33.405262]  fff00000c69e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.406134]  fff00000c69e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.406972] ==================================================================
[   33.315480] ==================================================================
[   33.316636] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.317527] Read of size 1 at addr fff00000c6a8e001 by task kunit_try_catch/212
[   33.319476] 
[   33.319904] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   33.320993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.321621] Hardware name: linux,dummy-virt (DT)
[   33.322145] Call trace:
[   33.323180]  show_stack+0x20/0x38 (C)
[   33.323887]  dump_stack_lvl+0x8c/0xd0
[   33.324450]  print_report+0x118/0x5e0
[   33.325113]  kasan_report+0xc8/0x118
[   33.325724]  __asan_report_load1_noabort+0x20/0x30
[   33.326526]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.327751]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   33.328423]  kunit_try_run_case+0x14c/0x3d0
[   33.329009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.329704]  kthread+0x24c/0x2d0
[   33.330550]  ret_from_fork+0x10/0x20
[   33.331457] 
[   33.331991] The buggy address belongs to the physical page:
[   33.332599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a8c
[   33.333467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.334363] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.335833] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.336901] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.337780] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.338821] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.339725] head: 0bfffe0000000002 ffffc1ffc31aa301 ffffffffffffffff 0000000000000000
[   33.340705] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.341682] page dumped because: kasan: bad access detected
[   33.342630] 
[   33.343241] Memory state around the buggy address:
[   33.344208]  fff00000c6a8df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.345120]  fff00000c6a8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.346048] >fff00000c6a8e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.346984]                    ^
[   33.347666]  fff00000c6a8e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.348416]  fff00000c6a8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.349355] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.636794] ==================================================================
[   32.637479] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   32.637906] Read of size 1 at addr fff00000c13fa640 by task kunit_try_catch/204
[   32.638469] 
[   32.638888] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.640157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.640839] Hardware name: linux,dummy-virt (DT)
[   32.641565] Call trace:
[   32.642078]  show_stack+0x20/0x38 (C)
[   32.642760]  dump_stack_lvl+0x8c/0xd0
[   32.643382]  print_report+0x118/0x5e0
[   32.643992]  kasan_report+0xc8/0x118
[   32.644491]  __kasan_check_byte+0x54/0x70
[   32.645271]  kmem_cache_destroy+0x34/0x218
[   32.646046]  kmem_cache_double_destroy+0x17c/0x2f8
[   32.646822]  kunit_try_run_case+0x14c/0x3d0
[   32.647628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.648321]  kthread+0x24c/0x2d0
[   32.648979]  ret_from_fork+0x10/0x20
[   32.649648] 
[   32.650019] Allocated by task 204:
[   32.650581]  kasan_save_stack+0x3c/0x68
[   32.651203]  kasan_save_track+0x20/0x40
[   32.651849]  kasan_save_alloc_info+0x40/0x58
[   32.652482]  __kasan_slab_alloc+0xa8/0xb0
[   32.653113]  kmem_cache_alloc_noprof+0x108/0x398
[   32.653814]  __kmem_cache_create_args+0x18c/0x2b0
[   32.654501]  kmem_cache_double_destroy+0xc8/0x2f8
[   32.655168]  kunit_try_run_case+0x14c/0x3d0
[   32.655889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.656621]  kthread+0x24c/0x2d0
[   32.657196]  ret_from_fork+0x10/0x20
[   32.657707] 
[   32.658112] Freed by task 204:
[   32.658676]  kasan_save_stack+0x3c/0x68
[   32.659297]  kasan_save_track+0x20/0x40
[   32.659913]  kasan_save_free_info+0x4c/0x78
[   32.660626]  __kasan_slab_free+0x6c/0x98
[   32.661229]  kmem_cache_free+0x118/0x470
[   32.661924]  slab_kmem_cache_release+0x38/0x50
[   32.662531]  kmem_cache_release+0x1c/0x30
[   32.663211]  kobject_put+0x17c/0x430
[   32.663728]  sysfs_slab_release+0x1c/0x30
[   32.664401]  kmem_cache_destroy+0x118/0x218
[   32.665033]  kmem_cache_double_destroy+0x130/0x2f8
[   32.665778]  kunit_try_run_case+0x14c/0x3d0
[   32.666422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.667198]  kthread+0x24c/0x2d0
[   32.667790]  ret_from_fork+0x10/0x20
[   32.668334] 
[   32.668739] The buggy address belongs to the object at fff00000c13fa640
[   32.668739]  which belongs to the cache kmem_cache of size 208
[   32.669996] The buggy address is located 0 bytes inside of
[   32.669996]  freed 208-byte region [fff00000c13fa640, fff00000c13fa710)
[   32.671315] 
[   32.671752] The buggy address belongs to the physical page:
[   32.672436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1013fa
[   32.673504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.674341] page_type: f5(slab)
[   32.674890] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.675869] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.676776] page dumped because: kasan: bad access detected
[   32.677477] 
[   32.677884] Memory state around the buggy address:
[   32.678616]  fff00000c13fa500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.679546]  fff00000c13fa580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.680412] >fff00000c13fa600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.681311]                                            ^
[   32.681999]  fff00000c13fa680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.682893]  fff00000c13fa700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.683743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.535556] ==================================================================
[   32.536935] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   32.537944] Read of size 1 at addr fff00000c69b9000 by task kunit_try_catch/202
[   32.539148] 
[   32.539566] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.540557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.541065] Hardware name: linux,dummy-virt (DT)
[   32.541667] Call trace:
[   32.542067]  show_stack+0x20/0x38 (C)
[   32.542933]  dump_stack_lvl+0x8c/0xd0
[   32.543591]  print_report+0x118/0x5e0
[   32.544154]  kasan_report+0xc8/0x118
[   32.544870]  __asan_report_load1_noabort+0x20/0x30
[   32.545618]  kmem_cache_rcu_uaf+0x390/0x468
[   32.546479]  kunit_try_run_case+0x14c/0x3d0
[   32.547107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.547764]  kthread+0x24c/0x2d0
[   32.548355]  ret_from_fork+0x10/0x20
[   32.548936] 
[   32.549283] Allocated by task 202:
[   32.549859]  kasan_save_stack+0x3c/0x68
[   32.550675]  kasan_save_track+0x20/0x40
[   32.551302]  kasan_save_alloc_info+0x40/0x58
[   32.551890]  __kasan_slab_alloc+0xa8/0xb0
[   32.552584]  kmem_cache_alloc_noprof+0x108/0x398
[   32.553279]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.553963]  kunit_try_run_case+0x14c/0x3d0
[   32.554856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.555558]  kthread+0x24c/0x2d0
[   32.556143]  ret_from_fork+0x10/0x20
[   32.556732] 
[   32.557072] Freed by task 0:
[   32.557462]  kasan_save_stack+0x3c/0x68
[   32.558111]  kasan_save_track+0x20/0x40
[   32.559618]  kasan_save_free_info+0x4c/0x78
[   32.560388]  __kasan_slab_free+0x6c/0x98
[   32.561136]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.561745]  rcu_core+0x9f4/0x1e20
[   32.562232]  rcu_core_si+0x18/0x30
[   32.562829]  handle_softirqs+0x374/0xb20
[   32.563349]  __do_softirq+0x1c/0x28
[   32.564245] 
[   32.564626] Last potentially related work creation:
[   32.565203]  kasan_save_stack+0x3c/0x68
[   32.565876]  kasan_record_aux_stack+0xb4/0xc8
[   32.566806]  kmem_cache_free+0x28c/0x470
[   32.567385]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.567968]  kunit_try_run_case+0x14c/0x3d0
[   32.568656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.569370]  kthread+0x24c/0x2d0
[   32.569920]  ret_from_fork+0x10/0x20
[   32.570791] 
[   32.571128] The buggy address belongs to the object at fff00000c69b9000
[   32.571128]  which belongs to the cache test_cache of size 200
[   32.572343] The buggy address is located 0 bytes inside of
[   32.572343]  freed 200-byte region [fff00000c69b9000, fff00000c69b90c8)
[   32.573552] 
[   32.573925] The buggy address belongs to the physical page:
[   32.574920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b9
[   32.575745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.576638] page_type: f5(slab)
[   32.577193] raw: 0bfffe0000000000 fff00000c5b4c280 dead000000000122 0000000000000000
[   32.578022] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.579250] page dumped because: kasan: bad access detected
[   32.579809] 
[   32.580178] Memory state around the buggy address:
[   32.580816]  fff00000c69b8f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.581592]  fff00000c69b8f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.582457] >fff00000c69b9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.583530]                    ^
[   32.583990]  fff00000c69b9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.584923]  fff00000c69b9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.585871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   32.417701] ==================================================================
[   32.419050] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   32.420694] Free of addr fff00000c69bb001 by task kunit_try_catch/200
[   32.421568] 
[   32.421957] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.423596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.424144] Hardware name: linux,dummy-virt (DT)
[   32.424816] Call trace:
[   32.425315]  show_stack+0x20/0x38 (C)
[   32.425947]  dump_stack_lvl+0x8c/0xd0
[   32.426874]  print_report+0x118/0x5e0
[   32.427632]  kasan_report_invalid_free+0xb0/0xd8
[   32.428391]  check_slab_allocation+0xfc/0x108
[   32.429054]  __kasan_slab_pre_free+0x2c/0x48
[   32.429769]  kmem_cache_free+0xf0/0x470
[   32.430853]  kmem_cache_invalid_free+0x184/0x3b8
[   32.431597]  kunit_try_run_case+0x14c/0x3d0
[   32.432228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.432971]  kthread+0x24c/0x2d0
[   32.433631]  ret_from_fork+0x10/0x20
[   32.434202] 
[   32.434660] Allocated by task 200:
[   32.435600]  kasan_save_stack+0x3c/0x68
[   32.436186]  kasan_save_track+0x20/0x40
[   32.436749]  kasan_save_alloc_info+0x40/0x58
[   32.437409]  __kasan_slab_alloc+0xa8/0xb0
[   32.438065]  kmem_cache_alloc_noprof+0x108/0x398
[   32.438638]  kmem_cache_invalid_free+0x12c/0x3b8
[   32.439341]  kunit_try_run_case+0x14c/0x3d0
[   32.440425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.441142]  kthread+0x24c/0x2d0
[   32.441690]  ret_from_fork+0x10/0x20
[   32.442242] 
[   32.442588] The buggy address belongs to the object at fff00000c69bb000
[   32.442588]  which belongs to the cache test_cache of size 200
[   32.444398] The buggy address is located 1 bytes inside of
[   32.444398]  200-byte region [fff00000c69bb000, fff00000c69bb0c8)
[   32.446050] 
[   32.446626] The buggy address belongs to the physical page:
[   32.447390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bb
[   32.448412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.449421] page_type: f5(slab)
[   32.450109] raw: 0bfffe0000000000 fff00000c13fa500 dead000000000122 0000000000000000
[   32.451322] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.452552] page dumped because: kasan: bad access detected
[   32.453400] 
[   32.453739] Memory state around the buggy address:
[   32.454399]  fff00000c69baf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.455343]  fff00000c69baf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.456197] >fff00000c69bb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.457362]                    ^
[   32.457875]  fff00000c69bb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.459093]  fff00000c69bb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.459899] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   32.341161] ==================================================================
[   32.342090] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   32.343525] Free of addr fff00000c6725000 by task kunit_try_catch/198
[   32.344395] 
[   32.345425] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.346461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.347433] Hardware name: linux,dummy-virt (DT)
[   32.348250] Call trace:
[   32.348939]  show_stack+0x20/0x38 (C)
[   32.349603]  dump_stack_lvl+0x8c/0xd0
[   32.350438]  print_report+0x118/0x5e0
[   32.351051]  kasan_report_invalid_free+0xb0/0xd8
[   32.351704]  check_slab_allocation+0xd4/0x108
[   32.352325]  __kasan_slab_pre_free+0x2c/0x48
[   32.352941]  kmem_cache_free+0xf0/0x470
[   32.353543]  kmem_cache_double_free+0x190/0x3c8
[   32.354228]  kunit_try_run_case+0x14c/0x3d0
[   32.355164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.355777]  kthread+0x24c/0x2d0
[   32.356252]  ret_from_fork+0x10/0x20
[   32.357068] 
[   32.357543] Allocated by task 198:
[   32.358208]  kasan_save_stack+0x3c/0x68
[   32.359128]  kasan_save_track+0x20/0x40
[   32.359768]  kasan_save_alloc_info+0x40/0x58
[   32.360449]  __kasan_slab_alloc+0xa8/0xb0
[   32.361063]  kmem_cache_alloc_noprof+0x108/0x398
[   32.361761]  kmem_cache_double_free+0x12c/0x3c8
[   32.362571]  kunit_try_run_case+0x14c/0x3d0
[   32.363472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364076]  kthread+0x24c/0x2d0
[   32.364765]  ret_from_fork+0x10/0x20
[   32.365369] 
[   32.365894] Freed by task 198:
[   32.366485]  kasan_save_stack+0x3c/0x68
[   32.367352]  kasan_save_track+0x20/0x40
[   32.368034]  kasan_save_free_info+0x4c/0x78
[   32.368779]  __kasan_slab_free+0x6c/0x98
[   32.369404]  kmem_cache_free+0x118/0x470
[   32.370151]  kmem_cache_double_free+0x140/0x3c8
[   32.371147]  kunit_try_run_case+0x14c/0x3d0
[   32.371775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.372920]  kthread+0x24c/0x2d0
[   32.373620]  ret_from_fork+0x10/0x20
[   32.374419] 
[   32.375209] The buggy address belongs to the object at fff00000c6725000
[   32.375209]  which belongs to the cache test_cache of size 200
[   32.376713] The buggy address is located 0 bytes inside of
[   32.376713]  200-byte region [fff00000c6725000, fff00000c67250c8)
[   32.377837] 
[   32.378237] The buggy address belongs to the physical page:
[   32.379331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106725
[   32.380375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.381391] page_type: f5(slab)
[   32.381978] raw: 0bfffe0000000000 fff00000c5b4c140 dead000000000122 0000000000000000
[   32.383395] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.384548] page dumped because: kasan: bad access detected
[   32.385167] 
[   32.385541] Memory state around the buggy address:
[   32.386235]  fff00000c6724f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.387008]  fff00000c6724f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.387905] >fff00000c6725000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.388857]                    ^
[   32.389399]  fff00000c6725080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.390077]  fff00000c6725100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.390727] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.253445] ==================================================================
[   32.254470] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   32.255660] Read of size 1 at addr fff00000c67300c8 by task kunit_try_catch/196
[   32.257233] 
[   32.257713] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   32.259258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.259992] Hardware name: linux,dummy-virt (DT)
[   32.260489] Call trace:
[   32.261016]  show_stack+0x20/0x38 (C)
[   32.261618]  dump_stack_lvl+0x8c/0xd0
[   32.262464]  print_report+0x118/0x5e0
[   32.263068]  kasan_report+0xc8/0x118
[   32.263639]  __asan_report_load1_noabort+0x20/0x30
[   32.264403]  kmem_cache_oob+0x33c/0x428
[   32.265039]  kunit_try_run_case+0x14c/0x3d0
[   32.265750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.266842]  kthread+0x24c/0x2d0
[   32.267225]  ret_from_fork+0x10/0x20
[   32.268110] 
[   32.268697] Allocated by task 196:
[   32.269233]  kasan_save_stack+0x3c/0x68
[   32.269807]  kasan_save_track+0x20/0x40
[   32.270885]  kasan_save_alloc_info+0x40/0x58
[   32.271551]  __kasan_slab_alloc+0xa8/0xb0
[   32.272172]  kmem_cache_alloc_noprof+0x108/0x398
[   32.272996]  kmem_cache_oob+0x12c/0x428
[   32.273632]  kunit_try_run_case+0x14c/0x3d0
[   32.274145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275384]  kthread+0x24c/0x2d0
[   32.276389]  ret_from_fork+0x10/0x20
[   32.276952] 
[   32.277344] The buggy address belongs to the object at fff00000c6730000
[   32.277344]  which belongs to the cache test_cache of size 200
[   32.278980] The buggy address is located 0 bytes to the right of
[   32.278980]  allocated 200-byte region [fff00000c6730000, fff00000c67300c8)
[   32.280347] 
[   32.280707] The buggy address belongs to the physical page:
[   32.281446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730
[   32.282503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.283357] page_type: f5(slab)
[   32.283979] raw: 0bfffe0000000000 fff00000c13fa3c0 dead000000000122 0000000000000000
[   32.284845] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.285826] page dumped because: kasan: bad access detected
[   32.286444] 
[   32.286971] Memory state around the buggy address:
[   32.287908]  fff00000c672ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.288798]  fff00000c6730000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.289813] >fff00000c6730080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.290947]                                               ^
[   32.291616]  fff00000c6730100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.292409]  fff00000c6730180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.293293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.715362] ==================================================================
[   31.716164] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.716964] Free of addr fff00000c5b518a0 by task kunit_try_catch/181
[   31.717757] 
[   31.718137] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.720473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.721056] Hardware name: linux,dummy-virt (DT)
[   31.721701] Call trace:
[   31.722092]  show_stack+0x20/0x38 (C)
[   31.722960]  dump_stack_lvl+0x8c/0xd0
[   31.723660]  print_report+0x118/0x5e0
[   31.724346]  kasan_report_invalid_free+0xb0/0xd8
[   31.725031]  check_slab_allocation+0xd4/0x108
[   31.725818]  __kasan_slab_pre_free+0x2c/0x48
[   31.726919]  kfree+0xe8/0x3c8
[   31.727483]  kfree_sensitive+0x3c/0xb0
[   31.728103]  kmalloc_double_kzfree+0x168/0x308
[   31.728724]  kunit_try_run_case+0x14c/0x3d0
[   31.729419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.730136]  kthread+0x24c/0x2d0
[   31.730908]  ret_from_fork+0x10/0x20
[   31.731493] 
[   31.731888] Allocated by task 181:
[   31.732434]  kasan_save_stack+0x3c/0x68
[   31.733027]  kasan_save_track+0x20/0x40
[   31.733564]  kasan_save_alloc_info+0x40/0x58
[   31.734130]  __kasan_kmalloc+0xd4/0xd8
[   31.734749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.735870]  kmalloc_double_kzfree+0xb8/0x308
[   31.736386]  kunit_try_run_case+0x14c/0x3d0
[   31.737068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.737787]  kthread+0x24c/0x2d0
[   31.738372]  ret_from_fork+0x10/0x20
[   31.739541] 
[   31.739914] Freed by task 181:
[   31.740437]  kasan_save_stack+0x3c/0x68
[   31.740931]  kasan_save_track+0x20/0x40
[   31.741591]  kasan_save_free_info+0x4c/0x78
[   31.742860]  __kasan_slab_free+0x6c/0x98
[   31.743404]  kfree+0x114/0x3c8
[   31.743943]  kfree_sensitive+0x80/0xb0
[   31.744601]  kmalloc_double_kzfree+0x11c/0x308
[   31.745184]  kunit_try_run_case+0x14c/0x3d0
[   31.745736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.746684]  kthread+0x24c/0x2d0
[   31.747277]  ret_from_fork+0x10/0x20
[   31.748046] 
[   31.748407] The buggy address belongs to the object at fff00000c5b518a0
[   31.748407]  which belongs to the cache kmalloc-16 of size 16
[   31.749705] The buggy address is located 0 bytes inside of
[   31.749705]  16-byte region [fff00000c5b518a0, fff00000c5b518b0)
[   31.751288] 
[   31.751722] The buggy address belongs to the physical page:
[   31.752441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   31.753447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.754538] page_type: f5(slab)
[   31.755122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.756077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.756981] page dumped because: kasan: bad access detected
[   31.757684] 
[   31.758092] Memory state around the buggy address:
[   31.759740]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.760602]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.761477] >fff00000c5b51880: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.762413]                                ^
[   31.763278]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.764128]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.765295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   31.664136] ==================================================================
[   31.665493] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.666936] Read of size 1 at addr fff00000c5b518a0 by task kunit_try_catch/181
[   31.668054] 
[   31.668676] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.669990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.670626] Hardware name: linux,dummy-virt (DT)
[   31.671587] Call trace:
[   31.672042]  show_stack+0x20/0x38 (C)
[   31.672766]  dump_stack_lvl+0x8c/0xd0
[   31.673398]  print_report+0x118/0x5e0
[   31.674059]  kasan_report+0xc8/0x118
[   31.674908]  __kasan_check_byte+0x54/0x70
[   31.675572]  kfree_sensitive+0x30/0xb0
[   31.676286]  kmalloc_double_kzfree+0x168/0x308
[   31.677010]  kunit_try_run_case+0x14c/0x3d0
[   31.677719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.678568]  kthread+0x24c/0x2d0
[   31.679152]  ret_from_fork+0x10/0x20
[   31.679815] 
[   31.680162] Allocated by task 181:
[   31.680811]  kasan_save_stack+0x3c/0x68
[   31.681484]  kasan_save_track+0x20/0x40
[   31.682050]  kasan_save_alloc_info+0x40/0x58
[   31.683058]  __kasan_kmalloc+0xd4/0xd8
[   31.683838]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.684546]  kmalloc_double_kzfree+0xb8/0x308
[   31.685265]  kunit_try_run_case+0x14c/0x3d0
[   31.685987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686977]  kthread+0x24c/0x2d0
[   31.687567]  ret_from_fork+0x10/0x20
[   31.688427] 
[   31.688909] Freed by task 181:
[   31.689530]  kasan_save_stack+0x3c/0x68
[   31.690150]  kasan_save_track+0x20/0x40
[   31.690698]  kasan_save_free_info+0x4c/0x78
[   31.691292]  __kasan_slab_free+0x6c/0x98
[   31.692184]  kfree+0x114/0x3c8
[   31.692752]  kfree_sensitive+0x80/0xb0
[   31.693318]  kmalloc_double_kzfree+0x11c/0x308
[   31.693959]  kunit_try_run_case+0x14c/0x3d0
[   31.694880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.695718]  kthread+0x24c/0x2d0
[   31.696274]  ret_from_fork+0x10/0x20
[   31.696931] 
[   31.697310] The buggy address belongs to the object at fff00000c5b518a0
[   31.697310]  which belongs to the cache kmalloc-16 of size 16
[   31.698985] The buggy address is located 0 bytes inside of
[   31.698985]  freed 16-byte region [fff00000c5b518a0, fff00000c5b518b0)
[   31.700250] 
[   31.700677] The buggy address belongs to the physical page:
[   31.701328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   31.702555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.703344] page_type: f5(slab)
[   31.703840] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.704896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.705784] page dumped because: kasan: bad access detected
[   31.706099] 
[   31.706720] Memory state around the buggy address:
[   31.707212]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.708400]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.709424] >fff00000c5b51880: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.710335]                                ^
[   31.710859]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.711848]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.712648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   31.535848] ==================================================================
[   31.536893] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   31.537797] Write of size 33 at addr fff00000c66d2400 by task kunit_try_catch/175
[   31.538448] 
[   31.538885] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.540479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.541100] Hardware name: linux,dummy-virt (DT)
[   31.541617] Call trace:
[   31.542085]  show_stack+0x20/0x38 (C)
[   31.543048]  dump_stack_lvl+0x8c/0xd0
[   31.543706]  print_report+0x118/0x5e0
[   31.544295]  kasan_report+0xc8/0x118
[   31.544870]  kasan_check_range+0x100/0x1a8
[   31.545446]  __asan_memset+0x34/0x78
[   31.546102]  kmalloc_uaf_memset+0x170/0x310
[   31.547051]  kunit_try_run_case+0x14c/0x3d0
[   31.547701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.548483]  kthread+0x24c/0x2d0
[   31.549048]  ret_from_fork+0x10/0x20
[   31.549638] 
[   31.549986] Allocated by task 175:
[   31.550793]  kasan_save_stack+0x3c/0x68
[   31.551324]  kasan_save_track+0x20/0x40
[   31.551973]  kasan_save_alloc_info+0x40/0x58
[   31.552657]  __kasan_kmalloc+0xd4/0xd8
[   31.553235]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.553775]  kmalloc_uaf_memset+0xb8/0x310
[   31.554721]  kunit_try_run_case+0x14c/0x3d0
[   31.555365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.556143]  kthread+0x24c/0x2d0
[   31.556743]  ret_from_fork+0x10/0x20
[   31.557339] 
[   31.557718] Freed by task 175:
[   31.559206]  kasan_save_stack+0x3c/0x68
[   31.559792]  kasan_save_track+0x20/0x40
[   31.560456]  kasan_save_free_info+0x4c/0x78
[   31.561061]  __kasan_slab_free+0x6c/0x98
[   31.561680]  kfree+0x114/0x3c8
[   31.562236]  kmalloc_uaf_memset+0x11c/0x310
[   31.562966]  kunit_try_run_case+0x14c/0x3d0
[   31.563772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.564619]  kthread+0x24c/0x2d0
[   31.565262]  ret_from_fork+0x10/0x20
[   31.565911] 
[   31.566595] The buggy address belongs to the object at fff00000c66d2400
[   31.566595]  which belongs to the cache kmalloc-64 of size 64
[   31.567877] The buggy address is located 0 bytes inside of
[   31.567877]  freed 64-byte region [fff00000c66d2400, fff00000c66d2440)
[   31.569158] 
[   31.569589] The buggy address belongs to the physical page:
[   31.570495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2
[   31.571483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.572335] page_type: f5(slab)
[   31.572819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.573790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.575011] page dumped because: kasan: bad access detected
[   31.575716] 
[   31.576101] Memory state around the buggy address:
[   31.576856]  fff00000c66d2300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.577685]  fff00000c66d2380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.579006] >fff00000c66d2400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.579946]                    ^
[   31.580695]  fff00000c66d2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.581710]  fff00000c66d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.582452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   31.425348] ==================================================================
[   31.426634] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   31.428712] Read of size 64 at addr fff00000c66d2104 by task kunit_try_catch/171
[   31.429648] 
[   31.430023] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.431626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.432132] Hardware name: linux,dummy-virt (DT)
[   31.432806] Call trace:
[   31.433178]  show_stack+0x20/0x38 (C)
[   31.433853]  dump_stack_lvl+0x8c/0xd0
[   31.434762]  print_report+0x118/0x5e0
[   31.435372]  kasan_report+0xc8/0x118
[   31.435951]  kasan_check_range+0x100/0x1a8
[   31.436601]  __asan_memmove+0x3c/0x98
[   31.437171]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   31.437911]  kunit_try_run_case+0x14c/0x3d0
[   31.438869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.440081]  kthread+0x24c/0x2d0
[   31.440649]  ret_from_fork+0x10/0x20
[   31.441257] 
[   31.441620] Allocated by task 171:
[   31.442045]  kasan_save_stack+0x3c/0x68
[   31.443614]  kasan_save_track+0x20/0x40
[   31.444131]  kasan_save_alloc_info+0x40/0x58
[   31.444784]  __kasan_kmalloc+0xd4/0xd8
[   31.445398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.446058]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   31.447004]  kunit_try_run_case+0x14c/0x3d0
[   31.447671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.448433]  kthread+0x24c/0x2d0
[   31.449016]  ret_from_fork+0x10/0x20
[   31.449571] 
[   31.449948] The buggy address belongs to the object at fff00000c66d2100
[   31.449948]  which belongs to the cache kmalloc-64 of size 64
[   31.451443] The buggy address is located 4 bytes inside of
[   31.451443]  allocated 64-byte region [fff00000c66d2100, fff00000c66d2140)
[   31.452679] 
[   31.453053] The buggy address belongs to the physical page:
[   31.453791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2
[   31.454990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.455872] page_type: f5(slab)
[   31.456359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.457367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.458501] page dumped because: kasan: bad access detected
[   31.459277] 
[   31.459657] Memory state around the buggy address:
[   31.460208]  fff00000c66d2000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.461111]  fff00000c66d2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.461900] >fff00000c66d2100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.463640]                                            ^
[   31.464217]  fff00000c66d2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.465134]  fff00000c66d2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.465936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   31.373332] ==================================================================
[   31.374610] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   31.375595] Read of size 18446744073709551614 at addr fff00000c66d2084 by task kunit_try_catch/169
[   31.376554] 
[   31.376970] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.378579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.379074] Hardware name: linux,dummy-virt (DT)
[   31.379747] Call trace:
[   31.380169]  show_stack+0x20/0x38 (C)
[   31.380810]  dump_stack_lvl+0x8c/0xd0
[   31.381333]  print_report+0x118/0x5e0
[   31.381993]  kasan_report+0xc8/0x118
[   31.382906]  kasan_check_range+0x100/0x1a8
[   31.383491]  __asan_memmove+0x3c/0x98
[   31.384158]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.384919]  kunit_try_run_case+0x14c/0x3d0
[   31.385645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.386693]  kthread+0x24c/0x2d0
[   31.387276]  ret_from_fork+0x10/0x20
[   31.387930] 
[   31.388337] Allocated by task 169:
[   31.388912]  kasan_save_stack+0x3c/0x68
[   31.389565]  kasan_save_track+0x20/0x40
[   31.390122]  kasan_save_alloc_info+0x40/0x58
[   31.391141]  __kasan_kmalloc+0xd4/0xd8
[   31.391817]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.392498]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   31.393098]  kunit_try_run_case+0x14c/0x3d0
[   31.393803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.395048]  kthread+0x24c/0x2d0
[   31.395619]  ret_from_fork+0x10/0x20
[   31.396288] 
[   31.396686] The buggy address belongs to the object at fff00000c66d2080
[   31.396686]  which belongs to the cache kmalloc-64 of size 64
[   31.398133] The buggy address is located 4 bytes inside of
[   31.398133]  64-byte region [fff00000c66d2080, fff00000c66d20c0)
[   31.399292] 
[   31.400294] The buggy address belongs to the physical page:
[   31.401011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2
[   31.402024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.403033] page_type: f5(slab)
[   31.403500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.404273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.405231] page dumped because: kasan: bad access detected
[   31.405981] 
[   31.406506] Memory state around the buggy address:
[   31.407378]  fff00000c66d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.408222]  fff00000c66d2000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.409055] >fff00000c66d2080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.409808]                    ^
[   31.410290]  fff00000c66d2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.411189]  fff00000c66d2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.412102] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   31.318964] ==================================================================
[   31.320252] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   31.321164] Write of size 16 at addr fff00000c6779069 by task kunit_try_catch/167
[   31.321916] 
[   31.322342] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.323556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.323984] Hardware name: linux,dummy-virt (DT)
[   31.324682] Call trace:
[   31.325375]  show_stack+0x20/0x38 (C)
[   31.326051]  dump_stack_lvl+0x8c/0xd0
[   31.326751]  print_report+0x118/0x5e0
[   31.327415]  kasan_report+0xc8/0x118
[   31.328634]  kasan_check_range+0x100/0x1a8
[   31.329148]  __asan_memset+0x34/0x78
[   31.329667]  kmalloc_oob_memset_16+0x150/0x2f8
[   31.331149]  kunit_try_run_case+0x14c/0x3d0
[   31.331995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.332922]  kthread+0x24c/0x2d0
[   31.333495]  ret_from_fork+0x10/0x20
[   31.334387] 
[   31.335362] Allocated by task 167:
[   31.336026]  kasan_save_stack+0x3c/0x68
[   31.336668]  kasan_save_track+0x20/0x40
[   31.337195]  kasan_save_alloc_info+0x40/0x58
[   31.337818]  __kasan_kmalloc+0xd4/0xd8
[   31.338645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.339319]  kmalloc_oob_memset_16+0xb0/0x2f8
[   31.339963]  kunit_try_run_case+0x14c/0x3d0
[   31.340617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.341234]  kthread+0x24c/0x2d0
[   31.341821]  ret_from_fork+0x10/0x20
[   31.342333] 
[   31.343478] The buggy address belongs to the object at fff00000c6779000
[   31.343478]  which belongs to the cache kmalloc-128 of size 128
[   31.344949] The buggy address is located 105 bytes inside of
[   31.344949]  allocated 120-byte region [fff00000c6779000, fff00000c6779078)
[   31.346204] 
[   31.347043] The buggy address belongs to the physical page:
[   31.347489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779
[   31.348530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.349311] page_type: f5(slab)
[   31.349828] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.351203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.352146] page dumped because: kasan: bad access detected
[   31.352891] 
[   31.353257] Memory state around the buggy address:
[   31.353935]  fff00000c6778f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.355217]  fff00000c6778f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356039] >fff00000c6779000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.356894]                                                                 ^
[   31.357727]  fff00000c6779080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359395]  fff00000c6779100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.360197] ==================================================================
[   31.265308] ==================================================================
[   31.266733] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   31.268075] Write of size 8 at addr fff00000c6728f71 by task kunit_try_catch/165
[   31.269637] 
[   31.270136] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.271702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.272158] Hardware name: linux,dummy-virt (DT)
[   31.272842] Call trace:
[   31.273301]  show_stack+0x20/0x38 (C)
[   31.273943]  dump_stack_lvl+0x8c/0xd0
[   31.274559]  print_report+0x118/0x5e0
[   31.275293]  kasan_report+0xc8/0x118
[   31.276780]  kasan_check_range+0x100/0x1a8
[   31.277443]  __asan_memset+0x34/0x78
[   31.278054]  kmalloc_oob_memset_8+0x150/0x2f8
[   31.279202]  kunit_try_run_case+0x14c/0x3d0
[   31.280040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.280958]  kthread+0x24c/0x2d0
[   31.281562]  ret_from_fork+0x10/0x20
[   31.282606] 
[   31.283023] Allocated by task 165:
[   31.283747]  kasan_save_stack+0x3c/0x68
[   31.284624]  kasan_save_track+0x20/0x40
[   31.285696]  kasan_save_alloc_info+0x40/0x58
[   31.286230]  __kasan_kmalloc+0xd4/0xd8
[   31.286874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.287882]  kmalloc_oob_memset_8+0xb0/0x2f8
[   31.288616]  kunit_try_run_case+0x14c/0x3d0
[   31.289232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.289962]  kthread+0x24c/0x2d0
[   31.290869]  ret_from_fork+0x10/0x20
[   31.291327] 
[   31.291634] The buggy address belongs to the object at fff00000c6728f00
[   31.291634]  which belongs to the cache kmalloc-128 of size 128
[   31.292186] The buggy address is located 113 bytes inside of
[   31.292186]  allocated 120-byte region [fff00000c6728f00, fff00000c6728f78)
[   31.293129] 
[   31.294010] The buggy address belongs to the physical page:
[   31.295490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728
[   31.296435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.297173] page_type: f5(slab)
[   31.297698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.298578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.299415] page dumped because: kasan: bad access detected
[   31.300608] 
[   31.300944] Memory state around the buggy address:
[   31.301463]  fff00000c6728e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.303076]  fff00000c6728e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.304095] >fff00000c6728f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.304854]                                                                 ^
[   31.305739]  fff00000c6728f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307069]  fff00000c6729000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.307892] ==================================================================
[   31.159691] ==================================================================
[   31.161033] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   31.161963] Write of size 2 at addr fff00000c6702377 by task kunit_try_catch/161
[   31.162640] 
[   31.163052] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.165050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.165882] Hardware name: linux,dummy-virt (DT)
[   31.166839] Call trace:
[   31.167471]  show_stack+0x20/0x38 (C)
[   31.168124]  dump_stack_lvl+0x8c/0xd0
[   31.168765]  print_report+0x118/0x5e0
[   31.169536]  kasan_report+0xc8/0x118
[   31.170084]  kasan_check_range+0x100/0x1a8
[   31.171041]  __asan_memset+0x34/0x78
[   31.171816]  kmalloc_oob_memset_2+0x150/0x2f8
[   31.172476]  kunit_try_run_case+0x14c/0x3d0
[   31.173210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.174028]  kthread+0x24c/0x2d0
[   31.174922]  ret_from_fork+0x10/0x20
[   31.175548] 
[   31.175895] Allocated by task 161:
[   31.176393]  kasan_save_stack+0x3c/0x68
[   31.177038]  kasan_save_track+0x20/0x40
[   31.177687]  kasan_save_alloc_info+0x40/0x58
[   31.178678]  __kasan_kmalloc+0xd4/0xd8
[   31.179345]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.179980]  kmalloc_oob_memset_2+0xb0/0x2f8
[   31.180685]  kunit_try_run_case+0x14c/0x3d0
[   31.181229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.182008]  kthread+0x24c/0x2d0
[   31.182898]  ret_from_fork+0x10/0x20
[   31.184101] 
[   31.184466] The buggy address belongs to the object at fff00000c6702300
[   31.184466]  which belongs to the cache kmalloc-128 of size 128
[   31.186110] The buggy address is located 119 bytes inside of
[   31.186110]  allocated 120-byte region [fff00000c6702300, fff00000c6702378)
[   31.187687] 
[   31.188062] The buggy address belongs to the physical page:
[   31.188823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106702
[   31.189665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.190884] page_type: f5(slab)
[   31.191447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.192324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.193147] page dumped because: kasan: bad access detected
[   31.193805] 
[   31.194166] Memory state around the buggy address:
[   31.194846]  fff00000c6702200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.195762]  fff00000c6702280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.196763] >fff00000c6702300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.197678]                                                                 ^
[   31.198762]  fff00000c6702380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.199561]  fff00000c6702400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.200345] ==================================================================
[   31.211771] ==================================================================
[   31.212895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   31.213833] Write of size 4 at addr fff00000c6728d75 by task kunit_try_catch/163
[   31.215173] 
[   31.216287] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.217443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.217925] Hardware name: linux,dummy-virt (DT)
[   31.218840] Call trace:
[   31.219194]  show_stack+0x20/0x38 (C)
[   31.220080]  dump_stack_lvl+0x8c/0xd0
[   31.221005]  print_report+0x118/0x5e0
[   31.221946]  kasan_report+0xc8/0x118
[   31.222907]  kasan_check_range+0x100/0x1a8
[   31.223485]  __asan_memset+0x34/0x78
[   31.224137]  kmalloc_oob_memset_4+0x150/0x300
[   31.224708]  kunit_try_run_case+0x14c/0x3d0
[   31.225400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.226139]  kthread+0x24c/0x2d0
[   31.226922]  ret_from_fork+0x10/0x20
[   31.227421] 
[   31.228603] Allocated by task 163:
[   31.229191]  kasan_save_stack+0x3c/0x68
[   31.229763]  kasan_save_track+0x20/0x40
[   31.230784]  kasan_save_alloc_info+0x40/0x58
[   31.231467]  __kasan_kmalloc+0xd4/0xd8
[   31.232022]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.232656]  kmalloc_oob_memset_4+0xb0/0x300
[   31.233225]  kunit_try_run_case+0x14c/0x3d0
[   31.233847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.234919]  kthread+0x24c/0x2d0
[   31.235537]  ret_from_fork+0x10/0x20
[   31.236555] 
[   31.236854] The buggy address belongs to the object at fff00000c6728d00
[   31.236854]  which belongs to the cache kmalloc-128 of size 128
[   31.238101] The buggy address is located 117 bytes inside of
[   31.238101]  allocated 120-byte region [fff00000c6728d00, fff00000c6728d78)
[   31.239767] 
[   31.240135] The buggy address belongs to the physical page:
[   31.240811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728
[   31.241839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.242770] page_type: f5(slab)
[   31.243352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.244333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.245758] page dumped because: kasan: bad access detected
[   31.246889] 
[   31.247186] Memory state around the buggy address:
[   31.247691]  fff00000c6728c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.248905]  fff00000c6728c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.249852] >fff00000c6728d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.250889]                                                                 ^
[   31.251634]  fff00000c6728d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.252561]  fff00000c6728e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.253492] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   31.108198] ==================================================================
[   31.109323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.110285] Write of size 128 at addr fff00000c6728900 by task kunit_try_catch/159
[   31.111830] 
[   31.112254] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.113663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.114328] Hardware name: linux,dummy-virt (DT)
[   31.115277] Call trace:
[   31.115688]  show_stack+0x20/0x38 (C)
[   31.116581]  dump_stack_lvl+0x8c/0xd0
[   31.117336]  print_report+0x118/0x5e0
[   31.118086]  kasan_report+0xc8/0x118
[   31.118917]  kasan_check_range+0x100/0x1a8
[   31.119732]  __asan_memset+0x34/0x78
[   31.120405]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.121162]  kunit_try_run_case+0x14c/0x3d0
[   31.121860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.122915]  kthread+0x24c/0x2d0
[   31.123481]  ret_from_fork+0x10/0x20
[   31.124096] 
[   31.124459] Allocated by task 159:
[   31.125014]  kasan_save_stack+0x3c/0x68
[   31.125603]  kasan_save_track+0x20/0x40
[   31.126258]  kasan_save_alloc_info+0x40/0x58
[   31.126818]  __kasan_kmalloc+0xd4/0xd8
[   31.127427]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.128123]  kmalloc_oob_in_memset+0xb0/0x2d0
[   31.129155]  kunit_try_run_case+0x14c/0x3d0
[   31.129724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.130869]  kthread+0x24c/0x2d0
[   31.131386]  ret_from_fork+0x10/0x20
[   31.131995] 
[   31.132363] The buggy address belongs to the object at fff00000c6728900
[   31.132363]  which belongs to the cache kmalloc-128 of size 128
[   31.133403] The buggy address is located 0 bytes inside of
[   31.133403]  allocated 120-byte region [fff00000c6728900, fff00000c6728978)
[   31.134803] 
[   31.135126] The buggy address belongs to the physical page:
[   31.136615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728
[   31.137482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.138274] page_type: f5(slab)
[   31.138843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.139742] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.140941] page dumped because: kasan: bad access detected
[   31.141712] 
[   31.142039] Memory state around the buggy address:
[   31.142943]  fff00000c6728800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.143716]  fff00000c6728880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.144839] >fff00000c6728900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.145693]                                                                 ^
[   31.146577]  fff00000c6728980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.147449]  fff00000c6728a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.148165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   31.476198] ==================================================================
[   31.477328] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   31.478137] Read of size 1 at addr fff00000c66bc228 by task kunit_try_catch/173
[   31.478969] 
[   31.479376] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.480427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.481857] Hardware name: linux,dummy-virt (DT)
[   31.482661] Call trace:
[   31.483409]  show_stack+0x20/0x38 (C)
[   31.484059]  dump_stack_lvl+0x8c/0xd0
[   31.484676]  print_report+0x118/0x5e0
[   31.485267]  kasan_report+0xc8/0x118
[   31.485794]  __asan_report_load1_noabort+0x20/0x30
[   31.487060]  kmalloc_uaf+0x300/0x338
[   31.487624]  kunit_try_run_case+0x14c/0x3d0
[   31.488337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.489165]  kthread+0x24c/0x2d0
[   31.489755]  ret_from_fork+0x10/0x20
[   31.490352] 
[   31.490742] Allocated by task 173:
[   31.491555]  kasan_save_stack+0x3c/0x68
[   31.492172]  kasan_save_track+0x20/0x40
[   31.493011]  kasan_save_alloc_info+0x40/0x58
[   31.493624]  __kasan_kmalloc+0xd4/0xd8
[   31.494945]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.495705]  kmalloc_uaf+0xb8/0x338
[   31.496320]  kunit_try_run_case+0x14c/0x3d0
[   31.496898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.497235]  kthread+0x24c/0x2d0
[   31.497474]  ret_from_fork+0x10/0x20
[   31.497972] 
[   31.498322] Freed by task 173:
[   31.498870]  kasan_save_stack+0x3c/0x68
[   31.499393]  kasan_save_track+0x20/0x40
[   31.500294]  kasan_save_free_info+0x4c/0x78
[   31.500886]  __kasan_slab_free+0x6c/0x98
[   31.501493]  kfree+0x114/0x3c8
[   31.501952]  kmalloc_uaf+0x11c/0x338
[   31.503368]  kunit_try_run_case+0x14c/0x3d0
[   31.503946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.504731]  kthread+0x24c/0x2d0
[   31.505348]  ret_from_fork+0x10/0x20
[   31.506003] 
[   31.506833] The buggy address belongs to the object at fff00000c66bc220
[   31.506833]  which belongs to the cache kmalloc-16 of size 16
[   31.508200] The buggy address is located 8 bytes inside of
[   31.508200]  freed 16-byte region [fff00000c66bc220, fff00000c66bc230)
[   31.509438] 
[   31.509832] The buggy address belongs to the physical page:
[   31.510642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066bc
[   31.511679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.513279] page_type: f5(slab)
[   31.513855] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.515207] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.516050] page dumped because: kasan: bad access detected
[   31.516727] 
[   31.517091] Memory state around the buggy address:
[   31.517644]  fff00000c66bc100: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   31.518634]  fff00000c66bc180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.520435] >fff00000c66bc200: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.521192]                                   ^
[   31.521817]  fff00000c66bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.522934]  fff00000c66bc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.523740] ==================================================================
[   31.593940] ==================================================================
[   31.595016] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   31.595863] Read of size 1 at addr fff00000c6729d28 by task kunit_try_catch/177
[   31.596849] 
[   31.597767] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.599503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.600024] Hardware name: linux,dummy-virt (DT)
[   31.600734] Call trace:
[   31.601135]  show_stack+0x20/0x38 (C)
[   31.601793]  dump_stack_lvl+0x8c/0xd0
[   31.602783]  print_report+0x118/0x5e0
[   31.603436]  kasan_report+0xc8/0x118
[   31.604087]  __asan_report_load1_noabort+0x20/0x30
[   31.604934]  kmalloc_uaf2+0x3f4/0x468
[   31.605476]  kunit_try_run_case+0x14c/0x3d0
[   31.606100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.607350]  kthread+0x24c/0x2d0
[   31.607961]  ret_from_fork+0x10/0x20
[   31.608577] 
[   31.608949] Allocated by task 177:
[   31.609561]  kasan_save_stack+0x3c/0x68
[   31.610150]  kasan_save_track+0x20/0x40
[   31.611211]  kasan_save_alloc_info+0x40/0x58
[   31.611890]  __kasan_kmalloc+0xd4/0xd8
[   31.612526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.613182]  kmalloc_uaf2+0xc4/0x468
[   31.613831]  kunit_try_run_case+0x14c/0x3d0
[   31.614531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.615308]  kthread+0x24c/0x2d0
[   31.615797]  ret_from_fork+0x10/0x20
[   31.616354] 
[   31.616753] Freed by task 177:
[   31.617557]  kasan_save_stack+0x3c/0x68
[   31.618329]  kasan_save_track+0x20/0x40
[   31.619231]  kasan_save_free_info+0x4c/0x78
[   31.620125]  __kasan_slab_free+0x6c/0x98
[   31.620947]  kfree+0x114/0x3c8
[   31.621393]  kmalloc_uaf2+0x134/0x468
[   31.622015]  kunit_try_run_case+0x14c/0x3d0
[   31.623198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.624029]  kthread+0x24c/0x2d0
[   31.624692]  ret_from_fork+0x10/0x20
[   31.625188] 
[   31.625495] The buggy address belongs to the object at fff00000c6729d00
[   31.625495]  which belongs to the cache kmalloc-64 of size 64
[   31.627080] The buggy address is located 40 bytes inside of
[   31.627080]  freed 64-byte region [fff00000c6729d00, fff00000c6729d40)
[   31.629299] 
[   31.629701] The buggy address belongs to the physical page:
[   31.630465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106729
[   31.631582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.632638] page_type: f5(slab)
[   31.633044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.633999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.635306] page dumped because: kasan: bad access detected
[   31.635976] 
[   31.636306] Memory state around the buggy address:
[   31.636845]  fff00000c6729c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.637679]  fff00000c6729c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.638695] >fff00000c6729d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.639786]                                   ^
[   31.640419]  fff00000c6729d80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.641143]  fff00000c6729e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.642022] ==================================================================
[   31.049941] ==================================================================
[   31.051037] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.051872] Read of size 16 at addr fff00000c5b51880 by task kunit_try_catch/157
[   31.052713] 
[   31.053101] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.054210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.055175] Hardware name: linux,dummy-virt (DT)
[   31.055789] Call trace:
[   31.056241]  show_stack+0x20/0x38 (C)
[   31.056878]  dump_stack_lvl+0x8c/0xd0
[   31.057376]  print_report+0x118/0x5e0
[   31.058015]  kasan_report+0xc8/0x118
[   31.058645]  __asan_report_load16_noabort+0x20/0x30
[   31.059338]  kmalloc_uaf_16+0x3bc/0x438
[   31.060151]  kunit_try_run_case+0x14c/0x3d0
[   31.060878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.061693]  kthread+0x24c/0x2d0
[   31.062765]  ret_from_fork+0x10/0x20
[   31.063360] 
[   31.063736] Allocated by task 157:
[   31.064240]  kasan_save_stack+0x3c/0x68
[   31.064789]  kasan_save_track+0x20/0x40
[   31.065330]  kasan_save_alloc_info+0x40/0x58
[   31.065894]  __kasan_kmalloc+0xd4/0xd8
[   31.066416]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.067420]  kmalloc_uaf_16+0x140/0x438
[   31.068159]  kunit_try_run_case+0x14c/0x3d0
[   31.068879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.069626]  kthread+0x24c/0x2d0
[   31.070207]  ret_from_fork+0x10/0x20
[   31.071135] 
[   31.071425] Freed by task 157:
[   31.071951]  kasan_save_stack+0x3c/0x68
[   31.072649]  kasan_save_track+0x20/0x40
[   31.073907]  kasan_save_free_info+0x4c/0x78
[   31.074390]  __kasan_slab_free+0x6c/0x98
[   31.075089]  kfree+0x114/0x3c8
[   31.075727]  kmalloc_uaf_16+0x190/0x438
[   31.076342]  kunit_try_run_case+0x14c/0x3d0
[   31.076983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.077812]  kthread+0x24c/0x2d0
[   31.078366]  ret_from_fork+0x10/0x20
[   31.078979] 
[   31.079348] The buggy address belongs to the object at fff00000c5b51880
[   31.079348]  which belongs to the cache kmalloc-16 of size 16
[   31.081126] The buggy address is located 0 bytes inside of
[   31.081126]  freed 16-byte region [fff00000c5b51880, fff00000c5b51890)
[   31.082666] 
[   31.083175] The buggy address belongs to the physical page:
[   31.084010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   31.085073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.086150] page_type: f5(slab)
[   31.086622] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.087740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.088769] page dumped because: kasan: bad access detected
[   31.089396] 
[   31.089744] Memory state around the buggy address:
[   31.090414]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.091495]  fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   31.092499] >fff00000c5b51880: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.093490]                    ^
[   31.094235]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.095299]  fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.096326] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   30.999089] ==================================================================
[   31.000358] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.001161] Write of size 16 at addr fff00000c5b51820 by task kunit_try_catch/155
[   31.002145] 
[   31.002882] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.004146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.004908] Hardware name: linux,dummy-virt (DT)
[   31.005674] Call trace:
[   31.006111]  show_stack+0x20/0x38 (C)
[   31.007482]  dump_stack_lvl+0x8c/0xd0
[   31.008175]  print_report+0x118/0x5e0
[   31.008748]  kasan_report+0xc8/0x118
[   31.009408]  __asan_report_store16_noabort+0x20/0x30
[   31.010130]  kmalloc_oob_16+0x3a0/0x3f8
[   31.011035]  kunit_try_run_case+0x14c/0x3d0
[   31.011743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.012432]  kthread+0x24c/0x2d0
[   31.013020]  ret_from_fork+0x10/0x20
[   31.013704] 
[   31.014112] Allocated by task 155:
[   31.014987]  kasan_save_stack+0x3c/0x68
[   31.015725]  kasan_save_track+0x20/0x40
[   31.016384]  kasan_save_alloc_info+0x40/0x58
[   31.017089]  __kasan_kmalloc+0xd4/0xd8
[   31.017737]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.018683]  kmalloc_oob_16+0xb4/0x3f8
[   31.019877]  kunit_try_run_case+0x14c/0x3d0
[   31.020556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.021258]  kthread+0x24c/0x2d0
[   31.021850]  ret_from_fork+0x10/0x20
[   31.022471] 
[   31.022804] The buggy address belongs to the object at fff00000c5b51820
[   31.022804]  which belongs to the cache kmalloc-16 of size 16
[   31.024112] The buggy address is located 0 bytes inside of
[   31.024112]  allocated 13-byte region [fff00000c5b51820, fff00000c5b5182d)
[   31.025491] 
[   31.025947] The buggy address belongs to the physical page:
[   31.026682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   31.027823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.028573] page_type: f5(slab)
[   31.029173] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.030089] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.031056] page dumped because: kasan: bad access detected
[   31.032064] 
[   31.032540] Memory state around the buggy address:
[   31.033157]  fff00000c5b51700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.034028]  fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.035299] >fff00000c5b51800: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   31.036133]                                   ^
[   31.036717]  fff00000c5b51880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.037503]  fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.933941] ==================================================================
[   30.934881] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.936084] Read of size 1 at addr fff00000c1920800 by task kunit_try_catch/153
[   30.936820] 
[   30.937350] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.938770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.939342] Hardware name: linux,dummy-virt (DT)
[   30.939991] Call trace:
[   30.940429]  show_stack+0x20/0x38 (C)
[   30.941157]  dump_stack_lvl+0x8c/0xd0
[   30.941811]  print_report+0x118/0x5e0
[   30.942740]  kasan_report+0xc8/0x118
[   30.943470]  __asan_report_load1_noabort+0x20/0x30
[   30.944113]  krealloc_uaf+0x4c8/0x520
[   30.944801]  kunit_try_run_case+0x14c/0x3d0
[   30.945431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.946557]  kthread+0x24c/0x2d0
[   30.947055]  ret_from_fork+0x10/0x20
[   30.947685] 
[   30.948075] Allocated by task 153:
[   30.948597]  kasan_save_stack+0x3c/0x68
[   30.949266]  kasan_save_track+0x20/0x40
[   30.949890]  kasan_save_alloc_info+0x40/0x58
[   30.950856]  __kasan_kmalloc+0xd4/0xd8
[   30.951425]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.952102]  krealloc_uaf+0xc8/0x520
[   30.952701]  kunit_try_run_case+0x14c/0x3d0
[   30.953320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.954054]  kthread+0x24c/0x2d0
[   30.954656]  ret_from_fork+0x10/0x20
[   30.955247] 
[   30.955636] Freed by task 153:
[   30.956148]  kasan_save_stack+0x3c/0x68
[   30.957112]  kasan_save_track+0x20/0x40
[   30.958261]  kasan_save_free_info+0x4c/0x78
[   30.959212]  __kasan_slab_free+0x6c/0x98
[   30.960077]  kfree+0x114/0x3c8
[   30.960801]  krealloc_uaf+0x12c/0x520
[   30.961550]  kunit_try_run_case+0x14c/0x3d0
[   30.962436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.963145]  kthread+0x24c/0x2d0
[   30.963489]  ret_from_fork+0x10/0x20
[   30.964496] 
[   30.964878] The buggy address belongs to the object at fff00000c1920800
[   30.964878]  which belongs to the cache kmalloc-256 of size 256
[   30.966105] The buggy address is located 0 bytes inside of
[   30.966105]  freed 256-byte region [fff00000c1920800, fff00000c1920900)
[   30.967904] 
[   30.968356] The buggy address belongs to the physical page:
[   30.969140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   30.970076] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.971256] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.972238] page_type: f5(slab)
[   30.972824] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.973865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.974977] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.976431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.977443] head: 0bfffe0000000001 ffffc1ffc3064801 ffffffffffffffff 0000000000000000
[   30.978600] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.979533] page dumped because: kasan: bad access detected
[   30.980315] 
[   30.980785] Memory state around the buggy address:
[   30.981492]  fff00000c1920700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.982532]  fff00000c1920780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.983552] >fff00000c1920800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.984426]                    ^
[   30.984932]  fff00000c1920880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.985830]  fff00000c1920900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.986979] ==================================================================
[   30.879429] ==================================================================
[   30.880568] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.881456] Read of size 1 at addr fff00000c1920800 by task kunit_try_catch/153
[   30.882280] 
[   30.883109] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.884411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.884798] Hardware name: linux,dummy-virt (DT)
[   30.885464] Call trace:
[   30.885867]  show_stack+0x20/0x38 (C)
[   30.886741]  dump_stack_lvl+0x8c/0xd0
[   30.887497]  print_report+0x118/0x5e0
[   30.888181]  kasan_report+0xc8/0x118
[   30.888782]  __kasan_check_byte+0x54/0x70
[   30.889477]  krealloc_noprof+0x44/0x360
[   30.890189]  krealloc_uaf+0x180/0x520
[   30.891139]  kunit_try_run_case+0x14c/0x3d0
[   30.891801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.892531]  kthread+0x24c/0x2d0
[   30.893139]  ret_from_fork+0x10/0x20
[   30.893771] 
[   30.894146] Allocated by task 153:
[   30.894597]  kasan_save_stack+0x3c/0x68
[   30.895236]  kasan_save_track+0x20/0x40
[   30.895789]  kasan_save_alloc_info+0x40/0x58
[   30.896442]  __kasan_kmalloc+0xd4/0xd8
[   30.897313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.897887]  krealloc_uaf+0xc8/0x520
[   30.899206]  kunit_try_run_case+0x14c/0x3d0
[   30.899862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.900586]  kthread+0x24c/0x2d0
[   30.901090]  ret_from_fork+0x10/0x20
[   30.901727] 
[   30.902088] Freed by task 153:
[   30.902498]  kasan_save_stack+0x3c/0x68
[   30.903375]  kasan_save_track+0x20/0x40
[   30.904026]  kasan_save_free_info+0x4c/0x78
[   30.904653]  __kasan_slab_free+0x6c/0x98
[   30.905138]  kfree+0x114/0x3c8
[   30.905764]  krealloc_uaf+0x12c/0x520
[   30.906672]  kunit_try_run_case+0x14c/0x3d0
[   30.907333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.908106]  kthread+0x24c/0x2d0
[   30.908731]  ret_from_fork+0x10/0x20
[   30.909304] 
[   30.909694] The buggy address belongs to the object at fff00000c1920800
[   30.909694]  which belongs to the cache kmalloc-256 of size 256
[   30.911653] The buggy address is located 0 bytes inside of
[   30.911653]  freed 256-byte region [fff00000c1920800, fff00000c1920900)
[   30.913069] 
[   30.913422] The buggy address belongs to the physical page:
[   30.914210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   30.915528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.916458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.917331] page_type: f5(slab)
[   30.917878] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.919033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.920074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.920817] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.921860] head: 0bfffe0000000001 ffffc1ffc3064801 ffffffffffffffff 0000000000000000
[   30.922690] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.923935] page dumped because: kasan: bad access detected
[   30.924684] 
[   30.925398] Memory state around the buggy address:
[   30.926029]  fff00000c1920700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927387]  fff00000c1920780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.928219] >fff00000c1920800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.929282]                    ^
[   30.929794]  fff00000c1920880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.931031]  fff00000c1920900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.931804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.838981] ==================================================================
[   30.839646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.840594] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/151
[   30.841407] 
[   30.841843] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.843147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.843810] Hardware name: linux,dummy-virt (DT)
[   30.844406] Call trace:
[   30.844892]  show_stack+0x20/0x38 (C)
[   30.845450]  dump_stack_lvl+0x8c/0xd0
[   30.846142]  print_report+0x118/0x5e0
[   30.846825]  kasan_report+0xc8/0x118
[   30.847496]  __asan_report_store1_noabort+0x20/0x30
[   30.848264]  krealloc_less_oob_helper+0xa58/0xc50
[   30.848906]  krealloc_large_less_oob+0x20/0x38
[   30.849677]  kunit_try_run_case+0x14c/0x3d0
[   30.850348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.851125]  kthread+0x24c/0x2d0
[   30.851790]  ret_from_fork+0x10/0x20
[   30.852438] 
[   30.852832] The buggy address belongs to the physical page:
[   30.853447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.854481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.855397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.856308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.857221] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.858159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.859115] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.860089] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.861008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.861906] page dumped because: kasan: bad access detected
[   30.862592] 
[   30.862987] Memory state around the buggy address:
[   30.863706]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.864477]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.865395] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.866233]                                                           ^
[   30.867051]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.867910]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.868755] ==================================================================
[   30.423809] ==================================================================
[   30.424661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.425545] Write of size 1 at addr fff00000c0c136d0 by task kunit_try_catch/147
[   30.426773] 
[   30.427161] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.428323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.428886] Hardware name: linux,dummy-virt (DT)
[   30.429544] Call trace:
[   30.430063]  show_stack+0x20/0x38 (C)
[   30.431045]  dump_stack_lvl+0x8c/0xd0
[   30.431726]  print_report+0x118/0x5e0
[   30.432340]  kasan_report+0xc8/0x118
[   30.432950]  __asan_report_store1_noabort+0x20/0x30
[   30.433752]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.434788]  krealloc_less_oob+0x20/0x38
[   30.435406]  kunit_try_run_case+0x14c/0x3d0
[   30.436150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.436870]  kthread+0x24c/0x2d0
[   30.437503]  ret_from_fork+0x10/0x20
[   30.438137] 
[   30.438804] Allocated by task 147:
[   30.439356]  kasan_save_stack+0x3c/0x68
[   30.440049]  kasan_save_track+0x20/0x40
[   30.440695]  kasan_save_alloc_info+0x40/0x58
[   30.441322]  __kasan_krealloc+0x118/0x178
[   30.442014]  krealloc_noprof+0x128/0x360
[   30.443576]  krealloc_less_oob_helper+0x168/0xc50
[   30.444238]  krealloc_less_oob+0x20/0x38
[   30.444922]  kunit_try_run_case+0x14c/0x3d0
[   30.445589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.446582]  kthread+0x24c/0x2d0
[   30.447155]  ret_from_fork+0x10/0x20
[   30.447838] 
[   30.448239] The buggy address belongs to the object at fff00000c0c13600
[   30.448239]  which belongs to the cache kmalloc-256 of size 256
[   30.449570] The buggy address is located 7 bytes to the right of
[   30.449570]  allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9)
[   30.451211] 
[   30.451639] The buggy address belongs to the physical page:
[   30.452248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.453241] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.454112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.455324] page_type: f5(slab)
[   30.455856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.456787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.457724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.459064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.460037] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.460910] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.461817] page dumped because: kasan: bad access detected
[   30.462877] 
[   30.463179] Memory state around the buggy address:
[   30.464289]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.465040]  fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.466208] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.467465]                                                  ^
[   30.468202]  fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.469158]  fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.470074] ==================================================================
[   30.564173] ==================================================================
[   30.565156] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.567060] Write of size 1 at addr fff00000c0c136eb by task kunit_try_catch/147
[   30.568017] 
[   30.568484] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.570038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.570589] Hardware name: linux,dummy-virt (DT)
[   30.571182] Call trace:
[   30.571605]  show_stack+0x20/0x38 (C)
[   30.572207]  dump_stack_lvl+0x8c/0xd0
[   30.572825]  print_report+0x118/0x5e0
[   30.573367]  kasan_report+0xc8/0x118
[   30.574012]  __asan_report_store1_noabort+0x20/0x30
[   30.574698]  krealloc_less_oob_helper+0xa58/0xc50
[   30.575374]  krealloc_less_oob+0x20/0x38
[   30.575929]  kunit_try_run_case+0x14c/0x3d0
[   30.576638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.577369]  kthread+0x24c/0x2d0
[   30.577976]  ret_from_fork+0x10/0x20
[   30.578613] 
[   30.578998] Allocated by task 147:
[   30.579562]  kasan_save_stack+0x3c/0x68
[   30.580068]  kasan_save_track+0x20/0x40
[   30.580715]  kasan_save_alloc_info+0x40/0x58
[   30.581303]  __kasan_krealloc+0x118/0x178
[   30.581833]  krealloc_noprof+0x128/0x360
[   30.582457]  krealloc_less_oob_helper+0x168/0xc50
[   30.583135]  krealloc_less_oob+0x20/0x38
[   30.583657]  kunit_try_run_case+0x14c/0x3d0
[   30.584314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.585022]  kthread+0x24c/0x2d0
[   30.585584]  ret_from_fork+0x10/0x20
[   30.586256] 
[   30.586675] The buggy address belongs to the object at fff00000c0c13600
[   30.586675]  which belongs to the cache kmalloc-256 of size 256
[   30.587962] The buggy address is located 34 bytes to the right of
[   30.587962]  allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9)
[   30.589107] 
[   30.589414] The buggy address belongs to the physical page:
[   30.590070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.591010] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.591805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.592677] page_type: f5(slab)
[   30.593178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.594099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.594973] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.595901] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.596740] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.597611] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.598457] page dumped because: kasan: bad access detected
[   30.599193] 
[   30.599572] Memory state around the buggy address:
[   30.600148]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.601075]  fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.601786] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.602700]                                                           ^
[   30.603409]  fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.604275]  fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.605058] ==================================================================
[   30.731681] ==================================================================
[   30.732504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.734388] Write of size 1 at addr fff00000c62220d0 by task kunit_try_catch/151
[   30.736144] 
[   30.736499] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.737691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.738439] Hardware name: linux,dummy-virt (DT)
[   30.739774] Call trace:
[   30.740128]  show_stack+0x20/0x38 (C)
[   30.740785]  dump_stack_lvl+0x8c/0xd0
[   30.741360]  print_report+0x118/0x5e0
[   30.742004]  kasan_report+0xc8/0x118
[   30.743018]  __asan_report_store1_noabort+0x20/0x30
[   30.743603]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.744245]  krealloc_large_less_oob+0x20/0x38
[   30.744958]  kunit_try_run_case+0x14c/0x3d0
[   30.745689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.746735]  kthread+0x24c/0x2d0
[   30.747227]  ret_from_fork+0x10/0x20
[   30.748566] 
[   30.749068] The buggy address belongs to the physical page:
[   30.749875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.751140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.752003] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.753114] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.754006] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.755054] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.755959] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.757138] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.758257] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.759657] page dumped because: kasan: bad access detected
[   30.760192] 
[   30.760364] Memory state around the buggy address:
[   30.760752]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.761741]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.762738] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.764472]                                                  ^
[   30.765154]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.766037]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.767237] ==================================================================
[   30.517983] ==================================================================
[   30.519339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.520181] Write of size 1 at addr fff00000c0c136ea by task kunit_try_catch/147
[   30.520958] 
[   30.521358] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.523174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.523436] Hardware name: linux,dummy-virt (DT)
[   30.523899] Call trace:
[   30.524358]  show_stack+0x20/0x38 (C)
[   30.525106]  dump_stack_lvl+0x8c/0xd0
[   30.525804]  print_report+0x118/0x5e0
[   30.526434]  kasan_report+0xc8/0x118
[   30.527240]  __asan_report_store1_noabort+0x20/0x30
[   30.528037]  krealloc_less_oob_helper+0xae4/0xc50
[   30.528816]  krealloc_less_oob+0x20/0x38
[   30.529560]  kunit_try_run_case+0x14c/0x3d0
[   30.530600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.531391]  kthread+0x24c/0x2d0
[   30.531912]  ret_from_fork+0x10/0x20
[   30.532452] 
[   30.532887] Allocated by task 147:
[   30.533442]  kasan_save_stack+0x3c/0x68
[   30.534220]  kasan_save_track+0x20/0x40
[   30.534943]  kasan_save_alloc_info+0x40/0x58
[   30.535889]  __kasan_krealloc+0x118/0x178
[   30.536956]  krealloc_noprof+0x128/0x360
[   30.537874]  krealloc_less_oob_helper+0x168/0xc50
[   30.538748]  krealloc_less_oob+0x20/0x38
[   30.539476]  kunit_try_run_case+0x14c/0x3d0
[   30.540098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.540805]  kthread+0x24c/0x2d0
[   30.541300]  ret_from_fork+0x10/0x20
[   30.541839] 
[   30.542221] The buggy address belongs to the object at fff00000c0c13600
[   30.542221]  which belongs to the cache kmalloc-256 of size 256
[   30.543899] The buggy address is located 33 bytes to the right of
[   30.543899]  allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9)
[   30.545274] 
[   30.545697] The buggy address belongs to the physical page:
[   30.546371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.547306] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.548114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.548891] page_type: f5(slab)
[   30.549456] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.551585] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.552397] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.553263] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.554224] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.555091] page dumped because: kasan: bad access detected
[   30.556021] 
[   30.556306] Memory state around the buggy address:
[   30.557153]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.558082]  fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.559297] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.560036]                                                           ^
[   30.560849]  fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.561589]  fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.562663] ==================================================================
[   30.472136] ==================================================================
[   30.472969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.473771] Write of size 1 at addr fff00000c0c136da by task kunit_try_catch/147
[   30.474975] 
[   30.475389] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.476749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.477559] Hardware name: linux,dummy-virt (DT)
[   30.478543] Call trace:
[   30.479426]  show_stack+0x20/0x38 (C)
[   30.479929]  dump_stack_lvl+0x8c/0xd0
[   30.480444]  print_report+0x118/0x5e0
[   30.481028]  kasan_report+0xc8/0x118
[   30.481560]  __asan_report_store1_noabort+0x20/0x30
[   30.482287]  krealloc_less_oob_helper+0xa80/0xc50
[   30.483178]  krealloc_less_oob+0x20/0x38
[   30.483844]  kunit_try_run_case+0x14c/0x3d0
[   30.484482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.485205]  kthread+0x24c/0x2d0
[   30.485779]  ret_from_fork+0x10/0x20
[   30.486386] 
[   30.486920] Allocated by task 147:
[   30.487407]  kasan_save_stack+0x3c/0x68
[   30.488134]  kasan_save_track+0x20/0x40
[   30.488635]  kasan_save_alloc_info+0x40/0x58
[   30.489301]  __kasan_krealloc+0x118/0x178
[   30.489965]  krealloc_noprof+0x128/0x360
[   30.491030]  krealloc_less_oob_helper+0x168/0xc50
[   30.491700]  krealloc_less_oob+0x20/0x38
[   30.492216]  kunit_try_run_case+0x14c/0x3d0
[   30.492875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493607]  kthread+0x24c/0x2d0
[   30.494081]  ret_from_fork+0x10/0x20
[   30.495342] 
[   30.495751] The buggy address belongs to the object at fff00000c0c13600
[   30.495751]  which belongs to the cache kmalloc-256 of size 256
[   30.496974] The buggy address is located 17 bytes to the right of
[   30.496974]  allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9)
[   30.498255] 
[   30.499101] The buggy address belongs to the physical page:
[   30.499865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.500659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.501635] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.502386] page_type: f5(slab)
[   30.503185] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.504087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.504993] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.505995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.507101] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.508003] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.508848] page dumped because: kasan: bad access detected
[   30.509499] 
[   30.509844] Memory state around the buggy address:
[   30.510393]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.511581]  fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.512430] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.513222]                                                     ^
[   30.513933]  fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.515341]  fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.516133] ==================================================================
[   30.376154] ==================================================================
[   30.377177] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.378092] Write of size 1 at addr fff00000c0c136c9 by task kunit_try_catch/147
[   30.379045] 
[   30.379392] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.381055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.381555] Hardware name: linux,dummy-virt (DT)
[   30.382498] Call trace:
[   30.382939]  show_stack+0x20/0x38 (C)
[   30.383604]  dump_stack_lvl+0x8c/0xd0
[   30.384243]  print_report+0x118/0x5e0
[   30.384904]  kasan_report+0xc8/0x118
[   30.385476]  __asan_report_store1_noabort+0x20/0x30
[   30.386143]  krealloc_less_oob_helper+0xa48/0xc50
[   30.387195]  krealloc_less_oob+0x20/0x38
[   30.387863]  kunit_try_run_case+0x14c/0x3d0
[   30.388567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.389354]  kthread+0x24c/0x2d0
[   30.389878]  ret_from_fork+0x10/0x20
[   30.390802] 
[   30.391186] Allocated by task 147:
[   30.391685]  kasan_save_stack+0x3c/0x68
[   30.392283]  kasan_save_track+0x20/0x40
[   30.392931]  kasan_save_alloc_info+0x40/0x58
[   30.393616]  __kasan_krealloc+0x118/0x178
[   30.394155]  krealloc_noprof+0x128/0x360
[   30.395090]  krealloc_less_oob_helper+0x168/0xc50
[   30.395796]  krealloc_less_oob+0x20/0x38
[   30.396391]  kunit_try_run_case+0x14c/0x3d0
[   30.397018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.397628]  kthread+0x24c/0x2d0
[   30.399069]  ret_from_fork+0x10/0x20
[   30.399684] 
[   30.400056] The buggy address belongs to the object at fff00000c0c13600
[   30.400056]  which belongs to the cache kmalloc-256 of size 256
[   30.401278] The buggy address is located 0 bytes to the right of
[   30.401278]  allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9)
[   30.403043] 
[   30.403463] The buggy address belongs to the physical page:
[   30.404281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.405366] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.406360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.407216] page_type: f5(slab)
[   30.407698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.408994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.409924] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.411101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.412026] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.412966] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.413769] page dumped because: kasan: bad access detected
[   30.414827] 
[   30.415385] Memory state around the buggy address:
[   30.416051]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.416891]  fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.417754] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.418683]                                               ^
[   30.419573]  fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.420204]  fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.421131] ==================================================================
[   30.769904] ==================================================================
[   30.770893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.771713] Write of size 1 at addr fff00000c62220da by task kunit_try_catch/151
[   30.772724] 
[   30.773140] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.774647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.775529] Hardware name: linux,dummy-virt (DT)
[   30.776216] Call trace:
[   30.776697]  show_stack+0x20/0x38 (C)
[   30.777365]  dump_stack_lvl+0x8c/0xd0
[   30.778088]  print_report+0x118/0x5e0
[   30.778931]  kasan_report+0xc8/0x118
[   30.779411]  __asan_report_store1_noabort+0x20/0x30
[   30.780379]  krealloc_less_oob_helper+0xa80/0xc50
[   30.781343]  krealloc_large_less_oob+0x20/0x38
[   30.782157]  kunit_try_run_case+0x14c/0x3d0
[   30.783168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.783906]  kthread+0x24c/0x2d0
[   30.784427]  ret_from_fork+0x10/0x20
[   30.785340] 
[   30.785941] The buggy address belongs to the physical page:
[   30.787164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.787957] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.788535] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.789482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.790940] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.791752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.792680] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.793572] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.794741] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.795908] page dumped because: kasan: bad access detected
[   30.796558] 
[   30.796930] Memory state around the buggy address:
[   30.797501]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.798504]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.799561] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.800453]                                                     ^
[   30.801210]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.802052]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.803330] ==================================================================
[   30.697188] ==================================================================
[   30.698333] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.699598] Write of size 1 at addr fff00000c62220c9 by task kunit_try_catch/151
[   30.701318] 
[   30.701773] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.703304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.703939] Hardware name: linux,dummy-virt (DT)
[   30.704672] Call trace:
[   30.705219]  show_stack+0x20/0x38 (C)
[   30.705981]  dump_stack_lvl+0x8c/0xd0
[   30.707110]  print_report+0x118/0x5e0
[   30.707749]  kasan_report+0xc8/0x118
[   30.708354]  __asan_report_store1_noabort+0x20/0x30
[   30.709075]  krealloc_less_oob_helper+0xa48/0xc50
[   30.709798]  krealloc_large_less_oob+0x20/0x38
[   30.710503]  kunit_try_run_case+0x14c/0x3d0
[   30.711530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.712311]  kthread+0x24c/0x2d0
[   30.712893]  ret_from_fork+0x10/0x20
[   30.713370] 
[   30.713829] The buggy address belongs to the physical page:
[   30.714980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.715939] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.716804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.717610] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.718577] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.719712] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.720582] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.721434] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.722349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.723119] page dumped because: kasan: bad access detected
[   30.723868] 
[   30.724178] Memory state around the buggy address:
[   30.724865]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.725634]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.726425] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.727480]                                               ^
[   30.728419]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.729273]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.729992] ==================================================================
[   30.804596] ==================================================================
[   30.805473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.806221] Write of size 1 at addr fff00000c62220ea by task kunit_try_catch/151
[   30.807232] 
[   30.807655] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.808765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.809371] Hardware name: linux,dummy-virt (DT)
[   30.810007] Call trace:
[   30.810989]  show_stack+0x20/0x38 (C)
[   30.811499]  dump_stack_lvl+0x8c/0xd0
[   30.812186]  print_report+0x118/0x5e0
[   30.812874]  kasan_report+0xc8/0x118
[   30.813555]  __asan_report_store1_noabort+0x20/0x30
[   30.814345]  krealloc_less_oob_helper+0xae4/0xc50
[   30.815178]  krealloc_large_less_oob+0x20/0x38
[   30.815924]  kunit_try_run_case+0x14c/0x3d0
[   30.816722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.817608]  kthread+0x24c/0x2d0
[   30.818229]  ret_from_fork+0x10/0x20
[   30.818943] 
[   30.819471] The buggy address belongs to the physical page:
[   30.820289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.821330] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.822162] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.823180] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.823973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.824963] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.825900] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.826845] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.827776] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.828690] page dumped because: kasan: bad access detected
[   30.829397] 
[   30.829837] Memory state around the buggy address:
[   30.830428]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.831402]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.832252] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.833172]                                                           ^
[   30.833974]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.834807]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.835697] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.319477] ==================================================================
[   30.320972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.321931] Write of size 1 at addr fff00000c0c134f0 by task kunit_try_catch/145
[   30.323337] 
[   30.323735] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.324966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.325549] Hardware name: linux,dummy-virt (DT)
[   30.326223] Call trace:
[   30.326613]  show_stack+0x20/0x38 (C)
[   30.327260]  dump_stack_lvl+0x8c/0xd0
[   30.327908]  print_report+0x118/0x5e0
[   30.328482]  kasan_report+0xc8/0x118
[   30.329318]  __asan_report_store1_noabort+0x20/0x30
[   30.329956]  krealloc_more_oob_helper+0x5c8/0x680
[   30.330972]  krealloc_more_oob+0x20/0x38
[   30.331554]  kunit_try_run_case+0x14c/0x3d0
[   30.332236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.332900]  kthread+0x24c/0x2d0
[   30.333484]  ret_from_fork+0x10/0x20
[   30.334141] 
[   30.334783] Allocated by task 145:
[   30.335287]  kasan_save_stack+0x3c/0x68
[   30.335924]  kasan_save_track+0x20/0x40
[   30.336465]  kasan_save_alloc_info+0x40/0x58
[   30.337150]  __kasan_krealloc+0x118/0x178
[   30.337800]  krealloc_noprof+0x128/0x360
[   30.338653]  krealloc_more_oob_helper+0x168/0x680
[   30.339292]  krealloc_more_oob+0x20/0x38
[   30.339922]  kunit_try_run_case+0x14c/0x3d0
[   30.340541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.341238]  kthread+0x24c/0x2d0
[   30.341781]  ret_from_fork+0x10/0x20
[   30.343170] 
[   30.343423] The buggy address belongs to the object at fff00000c0c13400
[   30.343423]  which belongs to the cache kmalloc-256 of size 256
[   30.344756] The buggy address is located 5 bytes to the right of
[   30.344756]  allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb)
[   30.345936] 
[   30.346635] The buggy address belongs to the physical page:
[   30.347338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.348270] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.349059] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.349928] page_type: f5(slab)
[   30.350715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.351640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.352534] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.353468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.354389] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.355341] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.356219] page dumped because: kasan: bad access detected
[   30.356823] 
[   30.357193] Memory state around the buggy address:
[   30.357854]  fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359090]  fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.359862] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.360725]                                                              ^
[   30.361531]  fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.362344]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.363027] ==================================================================
[   30.273328] ==================================================================
[   30.274086] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.275399] Write of size 1 at addr fff00000c0c134eb by task kunit_try_catch/145
[   30.276057] 
[   30.276399] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.277466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.278056] Hardware name: linux,dummy-virt (DT)
[   30.278957] Call trace:
[   30.279379]  show_stack+0x20/0x38 (C)
[   30.280037]  dump_stack_lvl+0x8c/0xd0
[   30.280914]  print_report+0x118/0x5e0
[   30.281450]  kasan_report+0xc8/0x118
[   30.282094]  __asan_report_store1_noabort+0x20/0x30
[   30.283045]  krealloc_more_oob_helper+0x614/0x680
[   30.283767]  krealloc_more_oob+0x20/0x38
[   30.284413]  kunit_try_run_case+0x14c/0x3d0
[   30.285098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285832]  kthread+0x24c/0x2d0
[   30.286737]  ret_from_fork+0x10/0x20
[   30.287285] 
[   30.287682] Allocated by task 145:
[   30.288174]  kasan_save_stack+0x3c/0x68
[   30.288828]  kasan_save_track+0x20/0x40
[   30.289307]  kasan_save_alloc_info+0x40/0x58
[   30.289993]  __kasan_krealloc+0x118/0x178
[   30.291013]  krealloc_noprof+0x128/0x360
[   30.291648]  krealloc_more_oob_helper+0x168/0x680
[   30.292260]  krealloc_more_oob+0x20/0x38
[   30.292870]  kunit_try_run_case+0x14c/0x3d0
[   30.293419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.294208]  kthread+0x24c/0x2d0
[   30.294775]  ret_from_fork+0x10/0x20
[   30.295273] 
[   30.295681] The buggy address belongs to the object at fff00000c0c13400
[   30.295681]  which belongs to the cache kmalloc-256 of size 256
[   30.297864] The buggy address is located 0 bytes to the right of
[   30.297864]  allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb)
[   30.299638] 
[   30.299980] The buggy address belongs to the physical page:
[   30.300648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12
[   30.301505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.302282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.303535] page_type: f5(slab)
[   30.304076] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.304915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.305838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.307165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.308133] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000
[   30.308978] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.309824] page dumped because: kasan: bad access detected
[   30.310974] 
[   30.311340] Memory state around the buggy address:
[   30.312013]  fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.312842]  fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.313623] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.314350]                                                           ^
[   30.315578]  fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.316531]  fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.317465] ==================================================================
[   30.618766] ==================================================================
[   30.619998] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.620963] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/149
[   30.621631] 
[   30.622041] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.623881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.624535] Hardware name: linux,dummy-virt (DT)
[   30.625151] Call trace:
[   30.625806]  show_stack+0x20/0x38 (C)
[   30.626550]  dump_stack_lvl+0x8c/0xd0
[   30.627386]  print_report+0x118/0x5e0
[   30.627961]  kasan_report+0xc8/0x118
[   30.628584]  __asan_report_store1_noabort+0x20/0x30
[   30.629220]  krealloc_more_oob_helper+0x614/0x680
[   30.629937]  krealloc_large_more_oob+0x20/0x38
[   30.630667]  kunit_try_run_case+0x14c/0x3d0
[   30.631310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.632127]  kthread+0x24c/0x2d0
[   30.632835]  ret_from_fork+0x10/0x20
[   30.633557] 
[   30.633942] The buggy address belongs to the physical page:
[   30.635017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.635950] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.636843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.637802] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.639248] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.640205] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.641102] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.641850] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.643064] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.644128] page dumped because: kasan: bad access detected
[   30.644795] 
[   30.645149] Memory state around the buggy address:
[   30.646166]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.647391]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.648334] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.649176]                                                           ^
[   30.649906]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.650674]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.651500] ==================================================================
[   30.653378] ==================================================================
[   30.654563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.655912] Write of size 1 at addr fff00000c62220f0 by task kunit_try_catch/149
[   30.656735] 
[   30.657172] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.658589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.660245] Hardware name: linux,dummy-virt (DT)
[   30.660995] Call trace:
[   30.661585]  show_stack+0x20/0x38 (C)
[   30.662657]  dump_stack_lvl+0x8c/0xd0
[   30.663154]  print_report+0x118/0x5e0
[   30.664051]  kasan_report+0xc8/0x118
[   30.664715]  __asan_report_store1_noabort+0x20/0x30
[   30.665331]  krealloc_more_oob_helper+0x5c8/0x680
[   30.666072]  krealloc_large_more_oob+0x20/0x38
[   30.666723]  kunit_try_run_case+0x14c/0x3d0
[   30.667650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.668615]  kthread+0x24c/0x2d0
[   30.669195]  ret_from_fork+0x10/0x20
[   30.669805] 
[   30.670142] The buggy address belongs to the physical page:
[   30.671415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.672348] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.673184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.674055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.674959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.675695] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.676694] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.677697] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000
[   30.679003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.679992] page dumped because: kasan: bad access detected
[   30.680798] 
[   30.680971] Memory state around the buggy address:
[   30.681310]  fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.682249]  fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.684153] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.685086]                                                              ^
[   30.685954]  fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.687083]  fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.688107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.234832] ==================================================================
[   30.236390] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.237142] Read of size 1 at addr fff00000c6a90000 by task kunit_try_catch/143
[   30.237793] 
[   30.239262] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.240339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.240848] Hardware name: linux,dummy-virt (DT)
[   30.241482] Call trace:
[   30.241965]  show_stack+0x20/0x38 (C)
[   30.242943]  dump_stack_lvl+0x8c/0xd0
[   30.243455]  print_report+0x118/0x5e0
[   30.244110]  kasan_report+0xc8/0x118
[   30.244742]  __asan_report_load1_noabort+0x20/0x30
[   30.245637]  page_alloc_uaf+0x328/0x350
[   30.246414]  kunit_try_run_case+0x14c/0x3d0
[   30.247098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.247832]  kthread+0x24c/0x2d0
[   30.248420]  ret_from_fork+0x10/0x20
[   30.249250] 
[   30.249609] The buggy address belongs to the physical page:
[   30.250495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a90
[   30.251461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.252254] page_type: f0(buddy)
[   30.252731] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   30.253713] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   30.254843] page dumped because: kasan: bad access detected
[   30.255543] 
[   30.255908] Memory state around the buggy address:
[   30.256454]  fff00000c6a8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.258045]  fff00000c6a8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.259230] >fff00000c6a90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.259979]                    ^
[   30.260533]  fff00000c6a90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.261343]  fff00000c6a90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.262145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.141970] ==================================================================
[   30.143643] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.144572] Read of size 1 at addr fff00000c6220000 by task kunit_try_catch/137
[   30.145391] 
[   30.145847] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.147181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.148118] Hardware name: linux,dummy-virt (DT)
[   30.148790] Call trace:
[   30.149232]  show_stack+0x20/0x38 (C)
[   30.149859]  dump_stack_lvl+0x8c/0xd0
[   30.150702]  print_report+0x118/0x5e0
[   30.151322]  kasan_report+0xc8/0x118
[   30.151836]  __asan_report_load1_noabort+0x20/0x30
[   30.152928]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.153708]  kunit_try_run_case+0x14c/0x3d0
[   30.154600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.155338]  kthread+0x24c/0x2d0
[   30.155948]  ret_from_fork+0x10/0x20
[   30.156641] 
[   30.157040] The buggy address belongs to the physical page:
[   30.157876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220
[   30.158675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.159610] raw: 0bfffe0000000000 ffffc1ffc3188908 fff00000da4dc040 0000000000000000
[   30.160781] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.161604] page dumped because: kasan: bad access detected
[   30.162615] 
[   30.162986] Memory state around the buggy address:
[   30.163613]  fff00000c621ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.164404]  fff00000c621ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.165903] >fff00000c6220000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.166716]                    ^
[   30.167239]  fff00000c6220080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.168947]  fff00000c6220100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.169703] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.096895] ==================================================================
[   30.097834] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.098849] Write of size 1 at addr fff00000c69fe00a by task kunit_try_catch/135
[   30.100399] 
[   30.100708] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.101947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.103190] Hardware name: linux,dummy-virt (DT)
[   30.103833] Call trace:
[   30.104258]  show_stack+0x20/0x38 (C)
[   30.105041]  dump_stack_lvl+0x8c/0xd0
[   30.105696]  print_report+0x118/0x5e0
[   30.106729]  kasan_report+0xc8/0x118
[   30.107295]  __asan_report_store1_noabort+0x20/0x30
[   30.108065]  kmalloc_large_oob_right+0x278/0x2b8
[   30.108735]  kunit_try_run_case+0x14c/0x3d0
[   30.109404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.110128]  kthread+0x24c/0x2d0
[   30.110998]  ret_from_fork+0x10/0x20
[   30.111601] 
[   30.111939] The buggy address belongs to the physical page:
[   30.112627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069fc
[   30.113591] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.114693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.115588] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.117326] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.119066] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.120039] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.121036] head: 0bfffe0000000002 ffffc1ffc31a7f01 ffffffffffffffff 0000000000000000
[   30.122053] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.123348] page dumped because: kasan: bad access detected
[   30.124172] 
[   30.124501] Memory state around the buggy address:
[   30.125383]  fff00000c69fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.126423]  fff00000c69fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.127674] >fff00000c69fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.128644]                       ^
[   30.129210]  fff00000c69fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.129967]  fff00000c69fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.130593] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.035153] ==================================================================
[   30.036657] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.037439] Write of size 1 at addr fff00000c13bdf00 by task kunit_try_catch/133
[   30.038098] 
[   30.038500] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.039891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.040336] Hardware name: linux,dummy-virt (DT)
[   30.041452] Call trace:
[   30.041953]  show_stack+0x20/0x38 (C)
[   30.042719]  dump_stack_lvl+0x8c/0xd0
[   30.043680]  print_report+0x118/0x5e0
[   30.044242]  kasan_report+0xc8/0x118
[   30.044795]  __asan_report_store1_noabort+0x20/0x30
[   30.045461]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.046458]  kunit_try_run_case+0x14c/0x3d0
[   30.047135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.048332]  kthread+0x24c/0x2d0
[   30.049013]  ret_from_fork+0x10/0x20
[   30.049599] 
[   30.049971] Allocated by task 133:
[   30.050959]  kasan_save_stack+0x3c/0x68
[   30.051594]  kasan_save_track+0x20/0x40
[   30.052120]  kasan_save_alloc_info+0x40/0x58
[   30.052695]  __kasan_kmalloc+0xd4/0xd8
[   30.053384]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.054178]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.054971]  kunit_try_run_case+0x14c/0x3d0
[   30.056829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.057857]  kthread+0x24c/0x2d0
[   30.058897]  ret_from_fork+0x10/0x20
[   30.059378] 
[   30.059879] The buggy address belongs to the object at fff00000c13bc000
[   30.059879]  which belongs to the cache kmalloc-8k of size 8192
[   30.060793] The buggy address is located 0 bytes to the right of
[   30.060793]  allocated 7936-byte region [fff00000c13bc000, fff00000c13bdf00)
[   30.061839] 
[   30.062481] The buggy address belongs to the physical page:
[   30.063349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1013b8
[   30.064363] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.066953] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.068009] page_type: f5(slab)
[   30.068600] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.069682] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.070902] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.071907] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.073527] head: 0bfffe0000000003 ffffc1ffc304ee01 ffffffffffffffff 0000000000000000
[   30.074558] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   30.075638] page dumped because: kasan: bad access detected
[   30.076563] 
[   30.076899] Memory state around the buggy address:
[   30.077995]  fff00000c13bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.078759]  fff00000c13bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.080255] >fff00000c13bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.081274]                    ^
[   30.081964]  fff00000c13bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083182]  fff00000c13be000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.084038] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.983161] ==================================================================
[   29.984069] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   29.984952] Write of size 1 at addr fff00000c69ae878 by task kunit_try_catch/131
[   29.985774] 
[   29.986097] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.987540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.988180] Hardware name: linux,dummy-virt (DT)
[   29.988816] Call trace:
[   29.989173]  show_stack+0x20/0x38 (C)
[   29.989814]  dump_stack_lvl+0x8c/0xd0
[   29.990491]  print_report+0x118/0x5e0
[   29.991164]  kasan_report+0xc8/0x118
[   29.991808]  __asan_report_store1_noabort+0x20/0x30
[   29.992440]  kmalloc_track_caller_oob_right+0x420/0x490
[   29.993286]  kunit_try_run_case+0x14c/0x3d0
[   29.993933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.995850]  kthread+0x24c/0x2d0
[   29.996400]  ret_from_fork+0x10/0x20
[   29.996950] 
[   29.997312] Allocated by task 131:
[   29.997862]  kasan_save_stack+0x3c/0x68
[   29.998476]  kasan_save_track+0x20/0x40
[   29.998997]  kasan_save_alloc_info+0x40/0x58
[   30.000069]  __kasan_kmalloc+0xd4/0xd8
[   30.000621]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.001410]  kmalloc_track_caller_oob_right+0x184/0x490
[   30.002021]  kunit_try_run_case+0x14c/0x3d0
[   30.003390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.004124]  kthread+0x24c/0x2d0
[   30.004674]  ret_from_fork+0x10/0x20
[   30.005259] 
[   30.005664] The buggy address belongs to the object at fff00000c69ae800
[   30.005664]  which belongs to the cache kmalloc-128 of size 128
[   30.007164] The buggy address is located 0 bytes to the right of
[   30.007164]  allocated 120-byte region [fff00000c69ae800, fff00000c69ae878)
[   30.008400] 
[   30.008993] The buggy address belongs to the physical page:
[   30.009689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ae
[   30.011780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.012563] page_type: f5(slab)
[   30.013046] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.013840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.015166] page dumped because: kasan: bad access detected
[   30.015791] 
[   30.016152] Memory state around the buggy address:
[   30.016837]  fff00000c69ae700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.017609]  fff00000c69ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.019329] >fff00000c69ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.020072]                                                                 ^
[   30.020942]  fff00000c69ae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.021689]  fff00000c69ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.022635] ==================================================================
[   29.941836] ==================================================================
[   29.943553] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   29.944761] Write of size 1 at addr fff00000c69ae778 by task kunit_try_catch/131
[   29.945984] 
[   29.947449] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.948548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.949151] Hardware name: linux,dummy-virt (DT)
[   29.949684] Call trace:
[   29.950143]  show_stack+0x20/0x38 (C)
[   29.950805]  dump_stack_lvl+0x8c/0xd0
[   29.951394]  print_report+0x118/0x5e0
[   29.952382]  kasan_report+0xc8/0x118
[   29.952974]  __asan_report_store1_noabort+0x20/0x30
[   29.953567]  kmalloc_track_caller_oob_right+0x414/0x490
[   29.954563]  kunit_try_run_case+0x14c/0x3d0
[   29.955662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.956488]  kthread+0x24c/0x2d0
[   29.957025]  ret_from_fork+0x10/0x20
[   29.957667] 
[   29.958027] Allocated by task 131:
[   29.958745]  kasan_save_stack+0x3c/0x68
[   29.959391]  kasan_save_track+0x20/0x40
[   29.960033]  kasan_save_alloc_info+0x40/0x58
[   29.960864]  __kasan_kmalloc+0xd4/0xd8
[   29.961446]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.962766]  kmalloc_track_caller_oob_right+0xa8/0x490
[   29.963603]  kunit_try_run_case+0x14c/0x3d0
[   29.964270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.965082]  kthread+0x24c/0x2d0
[   29.965629]  ret_from_fork+0x10/0x20
[   29.966229] 
[   29.966591] The buggy address belongs to the object at fff00000c69ae700
[   29.966591]  which belongs to the cache kmalloc-128 of size 128
[   29.967845] The buggy address is located 0 bytes to the right of
[   29.967845]  allocated 120-byte region [fff00000c69ae700, fff00000c69ae778)
[   29.969135] 
[   29.969526] The buggy address belongs to the physical page:
[   29.970179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ae
[   29.971134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.972151] page_type: f5(slab)
[   29.972632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.973561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.974564] page dumped because: kasan: bad access detected
[   29.975190] 
[   29.975660] Memory state around the buggy address:
[   29.976326]  fff00000c69ae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.977256]  fff00000c69ae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.978060] >fff00000c69ae700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.978946]                                                                 ^
[   29.979654]  fff00000c69ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.980607]  fff00000c69ae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.981229] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.851125] ==================================================================
[   29.852499] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.853317] Read of size 1 at addr fff00000c5b517ff by task kunit_try_catch/127
[   29.854350] 
[   29.855077] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.856558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.857235] Hardware name: linux,dummy-virt (DT)
[   29.857874] Call trace:
[   29.858692]  show_stack+0x20/0x38 (C)
[   29.859259]  dump_stack_lvl+0x8c/0xd0
[   29.859846]  print_report+0x118/0x5e0
[   29.860475]  kasan_report+0xc8/0x118
[   29.861057]  __asan_report_load1_noabort+0x20/0x30
[   29.861757]  kmalloc_oob_left+0x2ec/0x320
[   29.862598]  kunit_try_run_case+0x14c/0x3d0
[   29.863247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.864037]  kthread+0x24c/0x2d0
[   29.864760]  ret_from_fork+0x10/0x20
[   29.865334] 
[   29.865693] Allocated by task 28:
[   29.866552]  kasan_save_stack+0x3c/0x68
[   29.867163]  kasan_save_track+0x20/0x40
[   29.867721]  kasan_save_alloc_info+0x40/0x58
[   29.868335]  __kasan_kmalloc+0xd4/0xd8
[   29.868908]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.869576]  kstrdup+0x54/0xc8
[   29.870132]  devtmpfs_work_loop+0x384/0x590
[   29.871118]  devtmpfsd+0x50/0x58
[   29.871660]  kthread+0x24c/0x2d0
[   29.872158]  ret_from_fork+0x10/0x20
[   29.872728] 
[   29.873131] Freed by task 28:
[   29.873690]  kasan_save_stack+0x3c/0x68
[   29.874797]  kasan_save_track+0x20/0x40
[   29.875693]  kasan_save_free_info+0x4c/0x78
[   29.876256]  __kasan_slab_free+0x6c/0x98
[   29.876773]  kfree+0x114/0x3c8
[   29.877319]  devtmpfs_work_loop+0x498/0x590
[   29.878288]  devtmpfsd+0x50/0x58
[   29.878839]  kthread+0x24c/0x2d0
[   29.879371]  ret_from_fork+0x10/0x20
[   29.879981] 
[   29.880361] The buggy address belongs to the object at fff00000c5b517e0
[   29.880361]  which belongs to the cache kmalloc-16 of size 16
[   29.881656] The buggy address is located 15 bytes to the right of
[   29.881656]  allocated 16-byte region [fff00000c5b517e0, fff00000c5b517f0)
[   29.882957] 
[   29.883305] The buggy address belongs to the physical page:
[   29.884062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51
[   29.884974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.885856] page_type: f5(slab)
[   29.886422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.887811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.888659] page dumped because: kasan: bad access detected
[   29.889302] 
[   29.890003] Memory state around the buggy address:
[   29.890834]  fff00000c5b51680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.891616]  fff00000c5b51700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.892422] >fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.893229]                                                                 ^
[   29.894049]  fff00000c5b51800: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894788]  fff00000c5b51880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.895651] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.804808] ==================================================================
[   29.805793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.806899] Read of size 1 at addr fff00000c66f7580 by task kunit_try_catch/125
[   29.808143] 
[   29.808720] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.809873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.810335] Hardware name: linux,dummy-virt (DT)
[   29.810848] Call trace:
[   29.811295]  show_stack+0x20/0x38 (C)
[   29.811897]  dump_stack_lvl+0x8c/0xd0
[   29.812457]  print_report+0x118/0x5e0
[   29.813102]  kasan_report+0xc8/0x118
[   29.813710]  __asan_report_load1_noabort+0x20/0x30
[   29.814447]  kmalloc_oob_right+0x5d0/0x660
[   29.815036]  kunit_try_run_case+0x14c/0x3d0
[   29.815779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.816526]  kthread+0x24c/0x2d0
[   29.817068]  ret_from_fork+0x10/0x20
[   29.817665] 
[   29.818001] Allocated by task 125:
[   29.818560]  kasan_save_stack+0x3c/0x68
[   29.819203]  kasan_save_track+0x20/0x40
[   29.819782]  kasan_save_alloc_info+0x40/0x58
[   29.820411]  __kasan_kmalloc+0xd4/0xd8
[   29.821050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.821615]  kmalloc_oob_right+0xb0/0x660
[   29.822257]  kunit_try_run_case+0x14c/0x3d0
[   29.822953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.823714]  kthread+0x24c/0x2d0
[   29.824250]  ret_from_fork+0x10/0x20
[   29.824865] 
[   29.825232] The buggy address belongs to the object at fff00000c66f7500
[   29.825232]  which belongs to the cache kmalloc-128 of size 128
[   29.826532] The buggy address is located 13 bytes to the right of
[   29.826532]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.827614] 
[   29.827986] The buggy address belongs to the physical page:
[   29.828738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.830463] page_type: f5(slab)
[   29.831050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.831894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.832824] page dumped because: kasan: bad access detected
[   29.833574] 
[   29.833944] Memory state around the buggy address:
[   29.834494]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.835324]  fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.836118] >fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.837015]                    ^
[   29.837758]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.838700]  fff00000c66f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.839449] ==================================================================
[   29.721153] ==================================================================
[   29.722692] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.725165] Write of size 1 at addr fff00000c66f7573 by task kunit_try_catch/125
[   29.726060] 
[   29.728086] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241206 #1
[   29.729541] Tainted: [N]=TEST
[   29.730003] Hardware name: linux,dummy-virt (DT)
[   29.731201] Call trace:
[   29.731961]  show_stack+0x20/0x38 (C)
[   29.732776]  dump_stack_lvl+0x8c/0xd0
[   29.733429]  print_report+0x118/0x5e0
[   29.734013]  kasan_report+0xc8/0x118
[   29.734584]  __asan_report_store1_noabort+0x20/0x30
[   29.735266]  kmalloc_oob_right+0x5a4/0x660
[   29.735982]  kunit_try_run_case+0x14c/0x3d0
[   29.736625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.737297]  kthread+0x24c/0x2d0
[   29.737909]  ret_from_fork+0x10/0x20
[   29.738837] 
[   29.739278] Allocated by task 125:
[   29.740139]  kasan_save_stack+0x3c/0x68
[   29.740880]  kasan_save_track+0x20/0x40
[   29.741416]  kasan_save_alloc_info+0x40/0x58
[   29.742032]  __kasan_kmalloc+0xd4/0xd8
[   29.742596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.743221]  kmalloc_oob_right+0xb0/0x660
[   29.743806]  kunit_try_run_case+0x14c/0x3d0
[   29.744333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.745129]  kthread+0x24c/0x2d0
[   29.745698]  ret_from_fork+0x10/0x20
[   29.746257] 
[   29.746779] The buggy address belongs to the object at fff00000c66f7500
[   29.746779]  which belongs to the cache kmalloc-128 of size 128
[   29.748065] The buggy address is located 0 bytes to the right of
[   29.748065]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.749292] 
[   29.749917] The buggy address belongs to the physical page:
[   29.750971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.752309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.753672] page_type: f5(slab)
[   29.754823] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.755687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.756735] page dumped because: kasan: bad access detected
[   29.757456] 
[   29.757823] Memory state around the buggy address:
[   29.759082]  fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.759970]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.760819] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.761698]                                                              ^
[   29.762633]  fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.763414]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.764274] ==================================================================
[   29.768134] ==================================================================
[   29.769222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.770003] Write of size 1 at addr fff00000c66f7578 by task kunit_try_catch/125
[   29.770922] 
[   29.771332] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.772447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.773154] Hardware name: linux,dummy-virt (DT)
[   29.773863] Call trace:
[   29.774262]  show_stack+0x20/0x38 (C)
[   29.774966]  dump_stack_lvl+0x8c/0xd0
[   29.775267]  print_report+0x118/0x5e0
[   29.775568]  kasan_report+0xc8/0x118
[   29.776228]  __asan_report_store1_noabort+0x20/0x30
[   29.777244]  kmalloc_oob_right+0x538/0x660
[   29.777868]  kunit_try_run_case+0x14c/0x3d0
[   29.778471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.779214]  kthread+0x24c/0x2d0
[   29.779782]  ret_from_fork+0x10/0x20
[   29.780356] 
[   29.780718] Allocated by task 125:
[   29.781265]  kasan_save_stack+0x3c/0x68
[   29.781805]  kasan_save_track+0x20/0x40
[   29.782437]  kasan_save_alloc_info+0x40/0x58
[   29.783049]  __kasan_kmalloc+0xd4/0xd8
[   29.783692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.784371]  kmalloc_oob_right+0xb0/0x660
[   29.785028]  kunit_try_run_case+0x14c/0x3d0
[   29.785659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.786395]  kthread+0x24c/0x2d0
[   29.786903]  ret_from_fork+0x10/0x20
[   29.787500] 
[   29.787887] The buggy address belongs to the object at fff00000c66f7500
[   29.787887]  which belongs to the cache kmalloc-128 of size 128
[   29.789106] The buggy address is located 5 bytes to the right of
[   29.789106]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.790387] 
[   29.790784] The buggy address belongs to the physical page:
[   29.791492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.792341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.793170] page_type: f5(slab)
[   29.793710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.794617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.795445] page dumped because: kasan: bad access detected
[   29.796169] 
[   29.796492] Memory state around the buggy address:
[   29.797163]  fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.797957]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798796] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.799722]                                                                 ^
[   29.800560]  fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801378]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.802201] ==================================================================
Failure - kunit - check_workingset_xarray
(no logs available)
Failure - kunit - check_xas_conflict_get_order_check_xa_alloc
(no logs available)
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  145.283402] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  145.284368] Modules linked in:
[  145.285713] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[  145.287555] Tainted: [B]=BAD_PAGE, [N]=TEST
[  145.288135] Hardware name: linux,dummy-virt (DT)
[  145.289396] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  145.290695] pc : kunit_test_null_dereference+0x70/0x170
[  145.291214] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  145.291955] sp : ffff8000834b7dc0
[  145.292575] x29: ffff8000834b7e20 x28: 0000000000000000 x27: 0000000000000000
[  145.293852] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6b61c80
[  145.295040] x23: ffffa498ffdc56e0 x22: ffffa498ffdce2a0 x21: fff00000c6b61c88
[  145.296401] x20: 1ffff00010696fb8 x19: ffff8000800879f0 x18: 000000005c0f8582
[  145.297470] x17: 0000000000000001 x16: 0000000000000100 x15: fff00000da4e93d8
[  145.298701] x14: 1ffe00001b49f390 x13: 0000000000000000 x12: fffd80001990ddc3
[  145.299417] x11: 1ffe00001990ddc2 x10: fffd80001990ddc2 x9 : ffffa498ffdc5768
[  145.300621] x8 : ffff8000834b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  145.301698] x5 : ffff700010696fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  145.303487] x2 : dfff800000000000 x1 : fff00000cc86e540 x0 : ffff8000800879f0
[  145.304665] Call trace:
[  145.305124]  kunit_test_null_dereference+0x70/0x170 (P)
[  145.305875]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  145.306737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  145.307447]  kthread+0x24c/0x2d0
[  145.308098]  ret_from_fork+0x10/0x20
[  145.309200] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  145.310631] ---[ end trace 0000000000000000 ]---