Hay
Date
Dec. 9, 2024, 6:35 a.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   61.576492] ==================================================================
[   61.577205] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   61.577205] 
[   61.578030] Use-after-free read at 0x000000004a11c74c (in kfence-#188):
[   61.578727]  test_krealloc+0x51c/0x830
[   61.579407]  test_krealloc+0x458/0x830
[   61.579874]  kunit_try_run_case+0x14c/0x3d0
[   61.580381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.581213]  kthread+0x24c/0x2d0
[   61.581866]  ret_from_fork+0x10/0x20
[   61.582357] 
[   61.582798] kfence-#188: 0x000000004a11c74c-0x000000004a065938, size=32, cache=kmalloc-32
[   61.582798] 
[   61.583858] allocated by task 325 on cpu 0 at 61.575550s (0.008298s ago):
[   61.584759]  test_alloc+0x298/0x620
[   61.585481]  test_krealloc+0xc0/0x830
[   61.586131]  kunit_try_run_case+0x14c/0x3d0
[   61.586731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.587391]  kthread+0x24c/0x2d0
[   61.587926]  ret_from_fork+0x10/0x20
[   61.588461] 
[   61.588613] freed by task 325 on cpu 0 at 61.575941s (0.012666s ago):
[   61.589500]  krealloc_noprof+0x148/0x360
[   61.590071]  test_krealloc+0x1dc/0x830
[   61.590544]  kunit_try_run_case+0x14c/0x3d0
[   61.591113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.591776]  kthread+0x24c/0x2d0
[   61.592324]  ret_from_fork+0x10/0x20
[   61.592852] 
[   61.593254] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   61.594424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.594948] Hardware name: linux,dummy-virt (DT)
[   61.595537] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   32.759795] ==================================================================
[   32.760468] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   32.760468] 
[   32.761234] Invalid free of 0x00000000a6545384 (in kfence-#120):
[   32.761893]  test_double_free+0x100/0x238
[   32.762410]  kunit_try_run_case+0x14c/0x3d0
[   32.763039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.763745]  kthread+0x24c/0x2d0
[   32.764220]  ret_from_fork+0x10/0x20
[   32.764780] 
[   32.765136] kfence-#120: 0x00000000a6545384-0x000000002975f454, size=32, cache=test
[   32.765136] 
[   32.766040] allocated by task 293 on cpu 0 at 32.759429s (0.006600s ago):
[   32.766931]  test_alloc+0x22c/0x620
[   32.767492]  test_double_free+0xd4/0x238
[   32.768069]  kunit_try_run_case+0x14c/0x3d0
[   32.768584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.769341]  kthread+0x24c/0x2d0
[   32.769824]  ret_from_fork+0x10/0x20
[   32.770400] 
[   32.770734] freed by task 293 on cpu 0 at 32.759522s (0.011201s ago):
[   32.771485]  test_double_free+0xf0/0x238
[   32.772127]  kunit_try_run_case+0x14c/0x3d0
[   32.772648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.773436]  kthread+0x24c/0x2d0
[   32.773987]  ret_from_fork+0x10/0x20
[   32.774539] 
[   32.774883] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.776032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.776571] Hardware name: linux,dummy-virt (DT)
[   32.777157] ==================================================================
[   32.656008] ==================================================================
[   32.656860] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   32.656860] 
[   32.657559] Invalid free of 0x00000000a76696e7 (in kfence-#119):
[   32.658365]  test_double_free+0x1bc/0x238
[   32.658946]  kunit_try_run_case+0x14c/0x3d0
[   32.659585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.660268]  kthread+0x24c/0x2d0
[   32.660785]  ret_from_fork+0x10/0x20
[   32.661353] 
[   32.661691] kfence-#119: 0x00000000a76696e7-0x00000000983d1e6f, size=32, cache=kmalloc-32
[   32.661691] 
[   32.662687] allocated by task 291 on cpu 1 at 32.655516s (0.007162s ago):
[   32.663653]  test_alloc+0x298/0x620
[   32.664183]  test_double_free+0xd4/0x238
[   32.664825]  kunit_try_run_case+0x14c/0x3d0
[   32.665474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.666150]  kthread+0x24c/0x2d0
[   32.666784]  ret_from_fork+0x10/0x20
[   32.667335] 
[   32.667712] freed by task 291 on cpu 1 at 32.655636s (0.012049s ago):
[   32.668443]  test_double_free+0x1ac/0x238
[   32.669062]  kunit_try_run_case+0x14c/0x3d0
[   32.669631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.670270]  kthread+0x24c/0x2d0
[   32.670864]  ret_from_fork+0x10/0x20
[   32.671369] 
[   32.671739] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.672852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.673367] Hardware name: linux,dummy-virt (DT)
[   32.673947] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   61.492948] ==================================================================
[   61.493582] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   61.493582] 
[   61.494553] Use-after-free read at 0x00000000a6f89458 (in kfence-#187):
[   61.495682]  test_memcache_typesafe_by_rcu+0x280/0x560
[   61.496433]  test_memcache_typesafe_by_rcu+0x260/0x560
[   61.497683]  kunit_try_run_case+0x14c/0x3d0
[   61.498274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.499026]  kthread+0x24c/0x2d0
[   61.499546]  ret_from_fork+0x10/0x20
[   61.500190] 
[   61.500518] kfence-#187: 0x00000000a6f89458-0x0000000010b8f95c, size=32, cache=test
[   61.500518] 
[   61.501579] allocated by task 323 on cpu 1 at 61.471592s (0.029977s ago):
[   61.502651]  test_alloc+0x22c/0x620
[   61.503175]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   61.503787]  kunit_try_run_case+0x14c/0x3d0
[   61.504330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.505033]  kthread+0x24c/0x2d0
[   61.505558]  ret_from_fork+0x10/0x20
[   61.506105] 
[   61.506400] freed by task 323 on cpu 1 at 61.471786s (0.034604s ago):
[   61.507228]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   61.507862]  kunit_try_run_case+0x14c/0x3d0
[   61.508520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.509188]  kthread+0x24c/0x2d0
[   61.509671]  ret_from_fork+0x10/0x20
[   61.510239] 
[   61.510604] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   61.511727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.512241] Hardware name: linux,dummy-virt (DT)
[   61.512764] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   39.337364] ==================================================================
[   39.338377] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   39.338377] 
[   39.339338] Invalid read at 0x00000000af9b9a89:
[   39.340880]  test_invalid_access+0xdc/0x1f0
[   39.341511]  kunit_try_run_case+0x14c/0x3d0
[   39.342307]  kunit_try_run_case+0x14c/0x3d0
[   39.343516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.344143]  kthread+0x24c/0x2d0
[   39.344653]  ret_from_fork+0x10/0x20
[   39.345391] 
[   39.345841] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   39.347385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.348159] Hardware name: linux,dummy-virt (DT)
[   39.349116] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   39.103804] ==================================================================
[   39.104473] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.104473] 
[   39.105369] Corrupted memory at 0x000000006b7d9cdb [ ! . . . . . . . . . . . . . . . ] (in kfence-#181):
[   39.107575]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.108251]  kunit_try_run_case+0x14c/0x3d0
[   39.108828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.109514]  kthread+0x24c/0x2d0
[   39.110017]  ret_from_fork+0x10/0x20
[   39.110545] 
[   39.110864] kfence-#181: 0x000000008e12bd74-0x0000000016e1791a, size=73, cache=kmalloc-96
[   39.110864] 
[   39.111886] allocated by task 313 on cpu 1 at 39.103394s (0.008482s ago):
[   39.112778]  test_alloc+0x298/0x620
[   39.113268]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   39.113913]  kunit_try_run_case+0x14c/0x3d0
[   39.114468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.115129]  kthread+0x24c/0x2d0
[   39.115677]  ret_from_fork+0x10/0x20
[   39.116197] 
[   39.116528] freed by task 313 on cpu 1 at 39.103620s (0.012898s ago):
[   39.117387]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   39.118045]  kunit_try_run_case+0x14c/0x3d0
[   39.118598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.119281]  kthread+0x24c/0x2d0
[   39.119747]  ret_from_fork+0x10/0x20
[   39.120323] 
[   39.120759] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   39.121915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.122433] Hardware name: linux,dummy-virt (DT)
[   39.122999] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   38.999870] ==================================================================
[   39.000547] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   39.000547] 
[   39.001563] Out-of-bounds read at 0x000000008a3e00f3 (105B right of kfence-#180):
[   39.002416]  test_kmalloc_aligned_oob_read+0x238/0x468
[   39.003154]  test_kmalloc_aligned_oob_read+0x100/0x468
[   39.003753]  kunit_try_run_case+0x14c/0x3d0
[   39.004307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.005180]  kthread+0x24c/0x2d0
[   39.005640]  ret_from_fork+0x10/0x20
[   39.006733] 
[   39.007017] kfence-#180: 0x0000000055dfab21-0x000000008dbea06f, size=73, cache=kmalloc-96
[   39.007017] 
[   39.007995] allocated by task 311 on cpu 1 at 38.999472s (0.008512s ago):
[   39.008861]  test_alloc+0x298/0x620
[   39.009373]  test_kmalloc_aligned_oob_read+0x100/0x468
[   39.009941]  kunit_try_run_case+0x14c/0x3d0
[   39.010590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.011336]  kthread+0x24c/0x2d0
[   39.011851]  ret_from_fork+0x10/0x20
[   39.012460] 
[   39.012854] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   39.013921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.014471] Hardware name: linux,dummy-virt (DT)
[   39.015024] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   33.176047] ==================================================================
[   33.176776] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   33.176776] 
[   33.177499] Corrupted memory at 0x00000000208f8d9e [ ! ] (in kfence-#124):
[   33.178608]  test_corruption+0x284/0x378
[   33.179279]  kunit_try_run_case+0x14c/0x3d0
[   33.179907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180571]  kthread+0x24c/0x2d0
[   33.181180]  ret_from_fork+0x10/0x20
[   33.181654] 
[   33.182043] kfence-#124: 0x00000000f3dd9759-0x00000000d3bdd84b, size=32, cache=kmalloc-32
[   33.182043] 
[   33.183062] allocated by task 299 on cpu 1 at 33.175579s (0.007474s ago):
[   33.183823]  test_alloc+0x298/0x620
[   33.184450]  test_corruption+0x198/0x378
[   33.184967]  kunit_try_run_case+0x14c/0x3d0
[   33.185609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.186280]  kthread+0x24c/0x2d0
[   33.186811]  ret_from_fork+0x10/0x20
[   33.187417] 
[   33.187757] freed by task 299 on cpu 1 at 33.175750s (0.011996s ago):
[   33.188518]  test_corruption+0x284/0x378
[   33.189112]  kunit_try_run_case+0x14c/0x3d0
[   33.189677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.190355]  kthread+0x24c/0x2d0
[   33.190883]  ret_from_fork+0x10/0x20
[   33.191425] 
[   33.191798] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   33.192955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.193494] Hardware name: linux,dummy-virt (DT)
[   33.194076] ==================================================================
[   33.279914] ==================================================================
[   33.280688] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   33.280688] 
[   33.281504] Corrupted memory at 0x00000000ba075af4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#125):
[   33.283978]  test_corruption+0x120/0x378
[   33.284578]  kunit_try_run_case+0x14c/0x3d0
[   33.285207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.285908]  kthread+0x24c/0x2d0
[   33.286472]  ret_from_fork+0x10/0x20
[   33.287000] 
[   33.287311] kfence-#125: 0x0000000096908c10-0x000000000a6e7269, size=32, cache=test
[   33.287311] 
[   33.288293] allocated by task 301 on cpu 1 at 33.279649s (0.008634s ago):
[   33.289184]  test_alloc+0x22c/0x620
[   33.289674]  test_corruption+0xdc/0x378
[   33.290314]  kunit_try_run_case+0x14c/0x3d0
[   33.290848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.291585]  kthread+0x24c/0x2d0
[   33.292059]  ret_from_fork+0x10/0x20
[   33.292620] 
[   33.292972] freed by task 301 on cpu 1 at 33.279763s (0.013198s ago):
[   33.293715]  test_corruption+0x120/0x378
[   33.294206]  kunit_try_run_case+0x14c/0x3d0
[   33.294851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.295553]  kthread+0x24c/0x2d0
[   33.296062]  ret_from_fork+0x10/0x20
[   33.296561] 
[   33.296948] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   33.297999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.298542] Hardware name: linux,dummy-virt (DT)
[   33.299126] ==================================================================
[   33.383840] ==================================================================
[   33.384654] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   33.384654] 
[   33.385390] Corrupted memory at 0x000000002d5eca7b [ ! ] (in kfence-#126):
[   33.386496]  test_corruption+0x1d8/0x378
[   33.387178]  kunit_try_run_case+0x14c/0x3d0
[   33.387781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.388447]  kthread+0x24c/0x2d0
[   33.389091]  ret_from_fork+0x10/0x20
[   33.389677] 
[   33.390004] kfence-#126: 0x000000001a06a115-0x000000000acbb084, size=32, cache=test
[   33.390004] 
[   33.391038] allocated by task 301 on cpu 1 at 33.383579s (0.007449s ago):
[   33.391792]  test_alloc+0x22c/0x620
[   33.392346]  test_corruption+0x198/0x378
[   33.392907]  kunit_try_run_case+0x14c/0x3d0
[   33.393531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394288]  kthread+0x24c/0x2d0
[   33.394844]  ret_from_fork+0x10/0x20
[   33.395338] 
[   33.395740] freed by task 301 on cpu 1 at 33.383668s (0.012061s ago):
[   33.396402]  test_corruption+0x1d8/0x378
[   33.396984]  kunit_try_run_case+0x14c/0x3d0
[   33.397624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.398269]  kthread+0x24c/0x2d0
[   33.398730]  ret_from_fork+0x10/0x20
[   33.399307] 
[   33.399727] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   33.400762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.401332] Hardware name: linux,dummy-virt (DT)
[   33.401970] ==================================================================
[   33.072117] ==================================================================
[   33.072834] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   33.072834] 
[   33.073647] Corrupted memory at 0x000000006924fa2b [ ! . . . . . . . . . . . . . . . ] (in kfence-#123):
[   33.076860]  test_corruption+0x278/0x378
[   33.077405]  kunit_try_run_case+0x14c/0x3d0
[   33.078021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.078666]  kthread+0x24c/0x2d0
[   33.079255]  ret_from_fork+0x10/0x20
[   33.079800] 
[   33.080119] kfence-#123: 0x00000000c0770284-0x000000002ba68ec3, size=32, cache=kmalloc-32
[   33.080119] 
[   33.081064] allocated by task 299 on cpu 1 at 33.071674s (0.009381s ago):
[   33.081867]  test_alloc+0x298/0x620
[   33.082507]  test_corruption+0xdc/0x378
[   33.083079]  kunit_try_run_case+0x14c/0x3d0
[   33.083651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.084402]  kthread+0x24c/0x2d0
[   33.084912]  ret_from_fork+0x10/0x20
[   33.085473] 
[   33.085803] freed by task 299 on cpu 1 at 33.071848s (0.013944s ago):
[   33.086648]  test_corruption+0x278/0x378
[   33.087221]  kunit_try_run_case+0x14c/0x3d0
[   33.087829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.088434]  kthread+0x24c/0x2d0
[   33.089026]  ret_from_fork+0x10/0x20
[   33.089550] 
[   33.089963] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   33.091049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.091576] Hardware name: linux,dummy-virt (DT)
[   33.092146] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   32.967729] ==================================================================
[   32.968470] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   32.968470] 
[   32.969253] Invalid free of 0x000000003c915777 (in kfence-#122):
[   32.970032]  test_invalid_addr_free+0xec/0x238
[   32.970625]  kunit_try_run_case+0x14c/0x3d0
[   32.971254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.971864]  kthread+0x24c/0x2d0
[   32.972468]  ret_from_fork+0x10/0x20
[   32.973039] 
[   32.973367] kfence-#122: 0x000000004d84e5be-0x0000000029955738, size=32, cache=test
[   32.973367] 
[   32.974373] allocated by task 297 on cpu 0 at 32.967523s (0.006841s ago):
[   32.975316]  test_alloc+0x22c/0x620
[   32.975830]  test_invalid_addr_free+0xd4/0x238
[   32.976424]  kunit_try_run_case+0x14c/0x3d0
[   32.977123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.977845]  kthread+0x24c/0x2d0
[   32.978300]  ret_from_fork+0x10/0x20
[   32.978872] 
[   32.979286] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.980294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.980894] Hardware name: linux,dummy-virt (DT)
[   32.981477] ==================================================================
[   32.863880] ==================================================================
[   32.864557] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   32.864557] 
[   32.865410] Invalid free of 0x0000000048bcf881 (in kfence-#121):
[   32.866145]  test_invalid_addr_free+0x1ac/0x238
[   32.866728]  kunit_try_run_case+0x14c/0x3d0
[   32.867540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.868276]  kthread+0x24c/0x2d0
[   32.868781]  ret_from_fork+0x10/0x20
[   32.869413] 
[   32.869772] kfence-#121: 0x00000000c21b7c10-0x00000000e30d5b65, size=32, cache=kmalloc-32
[   32.869772] 
[   32.870917] allocated by task 295 on cpu 1 at 32.863511s (0.007396s ago):
[   32.871870]  test_alloc+0x298/0x620
[   32.872493]  test_invalid_addr_free+0xd4/0x238
[   32.873214]  kunit_try_run_case+0x14c/0x3d0
[   32.873854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.874647]  kthread+0x24c/0x2d0
[   32.875191]  ret_from_fork+0x10/0x20
[   32.875772] 
[   32.876174] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.877299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.877911] Hardware name: linux,dummy-virt (DT)
[   32.878553] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   25.185148] ==================================================================
[   25.186163] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   25.187439] Read of size 8 at addr fff00000c63712c0 by task kunit_try_catch/188
[   25.188375] 
[   25.188878] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.190245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.190918] Hardware name: linux,dummy-virt (DT)
[   25.191422] Call trace:
[   25.191765]  show_stack+0x20/0x38 (C)
[   25.192242]  dump_stack_lvl+0x8c/0xd0
[   25.193279]  print_report+0x118/0x5e0
[   25.193892]  kasan_report+0xc8/0x118
[   25.194139]  __asan_report_load8_noabort+0x20/0x30
[   25.194411]  workqueue_uaf+0x480/0x4a8
[   25.194640]  kunit_try_run_case+0x14c/0x3d0
[   25.196018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.196940]  kthread+0x24c/0x2d0
[   25.197517]  ret_from_fork+0x10/0x20
[   25.198183] 
[   25.198467] Allocated by task 188:
[   25.199335]  kasan_save_stack+0x3c/0x68
[   25.200042]  kasan_save_track+0x20/0x40
[   25.200735]  kasan_save_alloc_info+0x40/0x58
[   25.201431]  __kasan_kmalloc+0xd4/0xd8
[   25.202105]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.202834]  workqueue_uaf+0x13c/0x4a8
[   25.203611]  kunit_try_run_case+0x14c/0x3d0
[   25.204092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.205241]  kthread+0x24c/0x2d0
[   25.205941]  ret_from_fork+0x10/0x20
[   25.206615] 
[   25.206956] Freed by task 31:
[   25.207859]  kasan_save_stack+0x3c/0x68
[   25.208434]  kasan_save_track+0x20/0x40
[   25.208989]  kasan_save_free_info+0x4c/0x78
[   25.209559]  __kasan_slab_free+0x6c/0x98
[   25.210138]  kfree+0x114/0x3c8
[   25.210642]  workqueue_uaf_work+0x18/0x30
[   25.211148]  process_one_work+0x530/0xf98
[   25.211777]  worker_thread+0x614/0xf28
[   25.212334]  kthread+0x24c/0x2d0
[   25.212851]  ret_from_fork+0x10/0x20
[   25.213450] 
[   25.213785] Last potentially related work creation:
[   25.214391]  kasan_save_stack+0x3c/0x68
[   25.214975]  kasan_record_aux_stack+0xb4/0xc8
[   25.215641]  __queue_work+0x65c/0xfd8
[   25.216135]  queue_work_on+0xbc/0xf8
[   25.216750]  workqueue_uaf+0x210/0x4a8
[   25.217229]  kunit_try_run_case+0x14c/0x3d0
[   25.217912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.218595]  kthread+0x24c/0x2d0
[   25.219310]  ret_from_fork+0x10/0x20
[   25.219844] 
[   25.220173] The buggy address belongs to the object at fff00000c63712c0
[   25.220173]  which belongs to the cache kmalloc-32 of size 32
[   25.221299] The buggy address is located 0 bytes inside of
[   25.221299]  freed 32-byte region [fff00000c63712c0, fff00000c63712e0)
[   25.222536] 
[   25.222887] The buggy address belongs to the physical page:
[   25.223603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106371
[   25.224434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.225238] page_type: f5(slab)
[   25.225652] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.226418] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.227367] page dumped because: kasan: bad access detected
[   25.228050] 
[   25.228315] Memory state around the buggy address:
[   25.229413]  fff00000c6371180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.230225]  fff00000c6371200: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   25.231246] >fff00000c6371280: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.231958]                                            ^
[   25.232836]  fff00000c6371300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.233664]  fff00000c6371380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.234424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   25.115594] ==================================================================
[   25.116625] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   25.117295] Read of size 4 at addr fff00000c6371180 by task swapper/1/0
[   25.117972] 
[   25.118317] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.119236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.120267] Hardware name: linux,dummy-virt (DT)
[   25.120957] Call trace:
[   25.121324]  show_stack+0x20/0x38 (C)
[   25.121905]  dump_stack_lvl+0x8c/0xd0
[   25.122472]  print_report+0x118/0x5e0
[   25.123268]  kasan_report+0xc8/0x118
[   25.123797]  __asan_report_load4_noabort+0x20/0x30
[   25.124408]  rcu_uaf_reclaim+0x64/0x70
[   25.124981]  rcu_core+0x9f4/0x1e20
[   25.125536]  rcu_core_si+0x18/0x30
[   25.126052]  handle_softirqs+0x374/0xb20
[   25.126590]  __do_softirq+0x1c/0x28
[   25.127096]  ____do_softirq+0x18/0x30
[   25.127649]  call_on_irq_stack+0x24/0x58
[   25.128207]  do_softirq_own_stack+0x24/0x38
[   25.129039]  __irq_exit_rcu+0x1fc/0x318
[   25.129548]  irq_exit_rcu+0x1c/0x80
[   25.130130]  el1_interrupt+0x38/0x58
[   25.130725]  el1h_64_irq_handler+0x18/0x28
[   25.131650]  el1h_64_irq+0x6c/0x70
[   25.132291]  arch_local_irq_enable+0x4/0x8 (P)
[   25.132974]  default_idle_call+0x6c/0x78 (L)
[   25.133622]  do_idle+0x384/0x4e8
[   25.134281]  cpu_startup_entry+0x68/0x80
[   25.135298]  secondary_start_kernel+0x288/0x340
[   25.135841]  __secondary_switched+0xc0/0xc8
[   25.136481] 
[   25.136799] Allocated by task 186:
[   25.137460]  kasan_save_stack+0x3c/0x68
[   25.138052]  kasan_save_track+0x20/0x40
[   25.138672]  kasan_save_alloc_info+0x40/0x58
[   25.139370]  __kasan_kmalloc+0xd4/0xd8
[   25.140118]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.140782]  rcu_uaf+0xb0/0x2d0
[   25.141338]  kunit_try_run_case+0x14c/0x3d0
[   25.141991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.142736]  kthread+0x24c/0x2d0
[   25.143450]  ret_from_fork+0x10/0x20
[   25.144030] 
[   25.144405] Freed by task 0:
[   25.144897]  kasan_save_stack+0x3c/0x68
[   25.145427]  kasan_save_track+0x20/0x40
[   25.146041]  kasan_save_free_info+0x4c/0x78
[   25.146651]  __kasan_slab_free+0x6c/0x98
[   25.147468]  kfree+0x114/0x3c8
[   25.147953]  rcu_uaf_reclaim+0x28/0x70
[   25.148485]  rcu_core+0x9f4/0x1e20
[   25.149207]  rcu_core_si+0x18/0x30
[   25.149764]  handle_softirqs+0x374/0xb20
[   25.150338]  __do_softirq+0x1c/0x28
[   25.151072] 
[   25.151465] Last potentially related work creation:
[   25.152085]  kasan_save_stack+0x3c/0x68
[   25.152689]  kasan_record_aux_stack+0xb4/0xc8
[   25.153398]  __call_rcu_common.constprop.0+0x74/0xa10
[   25.154181]  call_rcu+0x18/0x30
[   25.154690]  rcu_uaf+0x14c/0x2d0
[   25.155530]  kunit_try_run_case+0x14c/0x3d0
[   25.155991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.156286]  kthread+0x24c/0x2d0
[   25.156505]  ret_from_fork+0x10/0x20
[   25.156823] 
[   25.157176] The buggy address belongs to the object at fff00000c6371180
[   25.157176]  which belongs to the cache kmalloc-32 of size 32
[   25.158272] The buggy address is located 0 bytes inside of
[   25.158272]  freed 32-byte region [fff00000c6371180, fff00000c63711a0)
[   25.159487] 
[   25.160173] The buggy address belongs to the physical page:
[   25.160780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106371
[   25.161886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.162953] page_type: f5(slab)
[   25.163694] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.164737] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.165497] page dumped because: kasan: bad access detected
[   25.166170] 
[   25.166549] Memory state around the buggy address:
[   25.167556]  fff00000c6371080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.168247]  fff00000c6371100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.169084] >fff00000c6371180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   25.169887]                    ^
[   25.170404]  fff00000c6371200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.171468]  fff00000c6371280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.172379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   25.044100] ==================================================================
[   25.044998] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   25.045610] Read of size 1 at addr fff00000c6484878 by task kunit_try_catch/184
[   25.046465] 
[   25.046893] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.048028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.048627] Hardware name: linux,dummy-virt (DT)
[   25.049429] Call trace:
[   25.049896]  show_stack+0x20/0x38 (C)
[   25.050520]  dump_stack_lvl+0x8c/0xd0
[   25.051223]  print_report+0x118/0x5e0
[   25.051776]  kasan_report+0xc8/0x118
[   25.052332]  __asan_report_load1_noabort+0x20/0x30
[   25.053229]  ksize_uaf+0x548/0x600
[   25.054086]  kunit_try_run_case+0x14c/0x3d0
[   25.054772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.055473]  kthread+0x24c/0x2d0
[   25.055965]  ret_from_fork+0x10/0x20
[   25.056484] 
[   25.057210] Allocated by task 184:
[   25.057654]  kasan_save_stack+0x3c/0x68
[   25.058484]  kasan_save_track+0x20/0x40
[   25.059247]  kasan_save_alloc_info+0x40/0x58
[   25.059719]  __kasan_kmalloc+0xd4/0xd8
[   25.060331]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.061055]  ksize_uaf+0xb8/0x600
[   25.061581]  kunit_try_run_case+0x14c/0x3d0
[   25.062194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.062862]  kthread+0x24c/0x2d0
[   25.063601]  ret_from_fork+0x10/0x20
[   25.064363] 
[   25.064688] Freed by task 184:
[   25.065146]  kasan_save_stack+0x3c/0x68
[   25.065818]  kasan_save_track+0x20/0x40
[   25.066408]  kasan_save_free_info+0x4c/0x78
[   25.067485]  __kasan_slab_free+0x6c/0x98
[   25.068020]  kfree+0x114/0x3c8
[   25.068410]  ksize_uaf+0x11c/0x600
[   25.068855]  kunit_try_run_case+0x14c/0x3d0
[   25.069290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.070277]  kthread+0x24c/0x2d0
[   25.071623]  ret_from_fork+0x10/0x20
[   25.072070] 
[   25.072494] The buggy address belongs to the object at fff00000c6484800
[   25.072494]  which belongs to the cache kmalloc-128 of size 128
[   25.073829] The buggy address is located 120 bytes inside of
[   25.073829]  freed 128-byte region [fff00000c6484800, fff00000c6484880)
[   25.075457] 
[   25.075791] The buggy address belongs to the physical page:
[   25.076359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484
[   25.077307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.078062] page_type: f5(slab)
[   25.078583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.079913] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.080884] page dumped because: kasan: bad access detected
[   25.081472] 
[   25.081789] Memory state around the buggy address:
[   25.082430]  fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   25.083185]  fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.083970] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.084880]                                                                 ^
[   25.086081]  fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.086823]  fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.087683] ==================================================================
[   24.953475] ==================================================================
[   24.954512] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   24.955259] Read of size 1 at addr fff00000c6484800 by task kunit_try_catch/184
[   24.956007] 
[   24.956309] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.957648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.958284] Hardware name: linux,dummy-virt (DT)
[   24.959296] Call trace:
[   24.959581]  show_stack+0x20/0x38 (C)
[   24.960056]  dump_stack_lvl+0x8c/0xd0
[   24.960488]  print_report+0x118/0x5e0
[   24.960949]  kasan_report+0xc8/0x118
[   24.961784]  __kasan_check_byte+0x54/0x70
[   24.963236]  ksize+0x30/0x88
[   24.963823]  ksize_uaf+0x168/0x600
[   24.964197]  kunit_try_run_case+0x14c/0x3d0
[   24.964917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.965604]  kthread+0x24c/0x2d0
[   24.966174]  ret_from_fork+0x10/0x20
[   24.966717] 
[   24.967388] Allocated by task 184:
[   24.967877]  kasan_save_stack+0x3c/0x68
[   24.968428]  kasan_save_track+0x20/0x40
[   24.969047]  kasan_save_alloc_info+0x40/0x58
[   24.969547]  __kasan_kmalloc+0xd4/0xd8
[   24.970154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.970780]  ksize_uaf+0xb8/0x600
[   24.971625]  kunit_try_run_case+0x14c/0x3d0
[   24.972196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.972896]  kthread+0x24c/0x2d0
[   24.973420]  ret_from_fork+0x10/0x20
[   24.973928] 
[   24.974231] Freed by task 184:
[   24.974645]  kasan_save_stack+0x3c/0x68
[   24.975638]  kasan_save_track+0x20/0x40
[   24.976151]  kasan_save_free_info+0x4c/0x78
[   24.976789]  __kasan_slab_free+0x6c/0x98
[   24.977355]  kfree+0x114/0x3c8
[   24.977914]  ksize_uaf+0x11c/0x600
[   24.978417]  kunit_try_run_case+0x14c/0x3d0
[   24.979464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.980155]  kthread+0x24c/0x2d0
[   24.980661]  ret_from_fork+0x10/0x20
[   24.981136] 
[   24.981455] The buggy address belongs to the object at fff00000c6484800
[   24.981455]  which belongs to the cache kmalloc-128 of size 128
[   24.982680] The buggy address is located 0 bytes inside of
[   24.982680]  freed 128-byte region [fff00000c6484800, fff00000c6484880)
[   24.984267] 
[   24.984574] The buggy address belongs to the physical page:
[   24.985275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484
[   24.986154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.986951] page_type: f5(slab)
[   24.987363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.988544] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.989356] page dumped because: kasan: bad access detected
[   24.990014] 
[   24.990330] Memory state around the buggy address:
[   24.991210]  fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.992078]  fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.992885] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.993653]                    ^
[   24.994073]  fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.995140]  fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.995837] ==================================================================
[   24.997256] ==================================================================
[   24.999080] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   24.999822] Read of size 1 at addr fff00000c6484800 by task kunit_try_catch/184
[   25.000642] 
[   25.001804] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.003543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.004013] Hardware name: linux,dummy-virt (DT)
[   25.004542] Call trace:
[   25.004977]  show_stack+0x20/0x38 (C)
[   25.005481]  dump_stack_lvl+0x8c/0xd0
[   25.006121]  print_report+0x118/0x5e0
[   25.006665]  kasan_report+0xc8/0x118
[   25.007581]  __asan_report_load1_noabort+0x20/0x30
[   25.008285]  ksize_uaf+0x59c/0x600
[   25.008823]  kunit_try_run_case+0x14c/0x3d0
[   25.009518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.010273]  kthread+0x24c/0x2d0
[   25.010828]  ret_from_fork+0x10/0x20
[   25.011622] 
[   25.011942] Allocated by task 184:
[   25.012390]  kasan_save_stack+0x3c/0x68
[   25.013308]  kasan_save_track+0x20/0x40
[   25.013999]  kasan_save_alloc_info+0x40/0x58
[   25.014587]  __kasan_kmalloc+0xd4/0xd8
[   25.015127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.015666]  ksize_uaf+0xb8/0x600
[   25.016327]  kunit_try_run_case+0x14c/0x3d0
[   25.016931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.018100]  kthread+0x24c/0x2d0
[   25.018556]  ret_from_fork+0x10/0x20
[   25.019605] 
[   25.020024] Freed by task 184:
[   25.020585]  kasan_save_stack+0x3c/0x68
[   25.021145]  kasan_save_track+0x20/0x40
[   25.021665]  kasan_save_free_info+0x4c/0x78
[   25.022228]  __kasan_slab_free+0x6c/0x98
[   25.022785]  kfree+0x114/0x3c8
[   25.023615]  ksize_uaf+0x11c/0x600
[   25.024127]  kunit_try_run_case+0x14c/0x3d0
[   25.024692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.025350]  kthread+0x24c/0x2d0
[   25.025570]  ret_from_fork+0x10/0x20
[   25.025902] 
[   25.026264] The buggy address belongs to the object at fff00000c6484800
[   25.026264]  which belongs to the cache kmalloc-128 of size 128
[   25.028332] The buggy address is located 0 bytes inside of
[   25.028332]  freed 128-byte region [fff00000c6484800, fff00000c6484880)
[   25.029371] 
[   25.029606] The buggy address belongs to the physical page:
[   25.030550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484
[   25.032075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.032978] page_type: f5(slab)
[   25.033516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.034444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.035779] page dumped because: kasan: bad access detected
[   25.036349] 
[   25.036572] Memory state around the buggy address:
[   25.037067]  fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   25.037739]  fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.038609] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.040075]                    ^
[   25.040514]  fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041407]  fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.042349] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   32.240164] ==================================================================
[   32.240911] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.240911] 
[   32.241959] Use-after-free read at 0x00000000da1ed975 (in kfence-#115):
[   32.242649]  test_use_after_free_read+0x114/0x248
[   32.243364]  test_use_after_free_read+0x1c0/0x248
[   32.243989]  kunit_try_run_case+0x14c/0x3d0
[   32.244663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.245357]  kthread+0x24c/0x2d0
[   32.245934]  ret_from_fork+0x10/0x20
[   32.246462] 
[   32.246795] kfence-#115: 0x00000000da1ed975-0x00000000e4292113, size=32, cache=kmalloc-32
[   32.246795] 
[   32.247744] allocated by task 283 on cpu 1 at 32.239760s (0.007974s ago):
[   32.248529]  test_alloc+0x298/0x620
[   32.249125]  test_use_after_free_read+0xd0/0x248
[   32.249808]  kunit_try_run_case+0x14c/0x3d0
[   32.250365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.251107]  kthread+0x24c/0x2d0
[   32.251661]  ret_from_fork+0x10/0x20
[   32.252198] 
[   32.252806] freed by task 283 on cpu 1 at 32.239881s (0.012747s ago):
[   32.253638]  test_use_after_free_read+0x1c0/0x248
[   32.254369]  kunit_try_run_case+0x14c/0x3d0
[   32.254953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.255635]  kthread+0x24c/0x2d0
[   32.256151]  ret_from_fork+0x10/0x20
[   32.256760] 
[   32.257129] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.258328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.258863] Hardware name: linux,dummy-virt (DT)
[   32.259453] ==================================================================
[   32.343871] ==================================================================
[   32.344578] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.344578] 
[   32.345620] Use-after-free read at 0x00000000c98a10af (in kfence-#116):
[   32.347107]  test_use_after_free_read+0x114/0x248
[   32.347770]  test_use_after_free_read+0xf0/0x248
[   32.348395]  kunit_try_run_case+0x14c/0x3d0
[   32.349078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.349824]  kthread+0x24c/0x2d0
[   32.350328]  ret_from_fork+0x10/0x20
[   32.350778] 
[   32.351077] kfence-#116: 0x00000000c98a10af-0x00000000499aa45e, size=32, cache=test
[   32.351077] 
[   32.351992] allocated by task 285 on cpu 1 at 32.343552s (0.008430s ago):
[   32.352841]  test_alloc+0x22c/0x620
[   32.353401]  test_use_after_free_read+0xd0/0x248
[   32.354124]  kunit_try_run_case+0x14c/0x3d0
[   32.354798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.355490]  kthread+0x24c/0x2d0
[   32.356015]  ret_from_fork+0x10/0x20
[   32.356532] 
[   32.356874] freed by task 285 on cpu 1 at 32.343640s (0.013225s ago):
[   32.357798]  test_use_after_free_read+0xf0/0x248
[   32.358429]  kunit_try_run_case+0x14c/0x3d0
[   32.359013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.359760]  kthread+0x24c/0x2d0
[   32.360279]  ret_from_fork+0x10/0x20
[   32.360825] 
[   32.361162] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.362256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.362830] Hardware name: linux,dummy-virt (DT)
[   32.363359] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   32.135721] ==================================================================
[   32.136555] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   32.136555] 
[   32.137485] Out-of-bounds write at 0x00000000714f7f92 (1B left of kfence-#114):
[   32.139064]  test_out_of_bounds_write+0x100/0x240
[   32.139746]  test_out_of_bounds_write+0xc8/0x240
[   32.140322]  kunit_try_run_case+0x14c/0x3d0
[   32.140901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.141576]  kthread+0x24c/0x2d0
[   32.142148]  ret_from_fork+0x10/0x20
[   32.142731] 
[   32.143123] kfence-#114: 0x00000000f9071ec4-0x000000002bd30384, size=32, cache=test
[   32.143123] 
[   32.144106] allocated by task 281 on cpu 1 at 32.135558s (0.008536s ago):
[   32.144939]  test_alloc+0x22c/0x620
[   32.145497]  test_out_of_bounds_write+0xc8/0x240
[   32.146151]  kunit_try_run_case+0x14c/0x3d0
[   32.146792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.147458]  kthread+0x24c/0x2d0
[   32.148037]  ret_from_fork+0x10/0x20
[   32.148631] 
[   32.149055] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   32.150160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.150694] Hardware name: linux,dummy-virt (DT)
[   32.151268] ==================================================================
[   31.927794] ==================================================================
[   31.928511] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.928511] 
[   31.929434] Out-of-bounds write at 0x0000000018fa15c2 (1B left of kfence-#112):
[   31.930355]  test_out_of_bounds_write+0x100/0x240
[   31.931394]  test_out_of_bounds_write+0xc8/0x240
[   31.931998]  kunit_try_run_case+0x14c/0x3d0
[   31.932571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.933184]  kthread+0x24c/0x2d0
[   31.933796]  ret_from_fork+0x10/0x20
[   31.934342] 
[   31.934634] kfence-#112: 0x000000008872257d-0x000000004920849b, size=32, cache=kmalloc-32
[   31.934634] 
[   31.935722] allocated by task 279 on cpu 1 at 31.927534s (0.008179s ago):
[   31.936620]  test_alloc+0x298/0x620
[   31.937179]  test_out_of_bounds_write+0xc8/0x240
[   31.937820]  kunit_try_run_case+0x14c/0x3d0
[   31.938358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.939070]  kthread+0x24c/0x2d0
[   31.939508]  ret_from_fork+0x10/0x20
[   31.940105] 
[   31.940447] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.941573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.942091] Hardware name: linux,dummy-virt (DT)
[   31.942709] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   31.615760] ==================================================================
[   31.616556] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   31.616556] 
[   31.617348] Out-of-bounds read at 0x00000000384528b8 (32B right of kfence-#109):
[   31.618218]  test_out_of_bounds_read+0x1c8/0x3e0
[   31.618813]  test_out_of_bounds_read+0x198/0x3e0
[   31.619366]  kunit_try_run_case+0x14c/0x3d0
[   31.620097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.620816]  kthread+0x24c/0x2d0
[   31.621397]  ret_from_fork+0x10/0x20
[   31.621897] 
[   31.622178] kfence-#109: 0x000000008b70dba6-0x0000000032820204, size=32, cache=test
[   31.622178] 
[   31.623368] allocated by task 277 on cpu 0 at 31.615600s (0.007758s ago):
[   31.624254]  test_alloc+0x22c/0x620
[   31.624747]  test_out_of_bounds_read+0x198/0x3e0
[   31.625388]  kunit_try_run_case+0x14c/0x3d0
[   31.626086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.626847]  kthread+0x24c/0x2d0
[   31.627338]  ret_from_fork+0x10/0x20
[   31.627866] 
[   31.628241] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.629353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.629811] Hardware name: linux,dummy-virt (DT)
[   31.630351] ==================================================================
[   31.199681] ==================================================================
[   31.200384] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   31.200384] 
[   31.201223] Out-of-bounds read at 0x00000000d20ef79a (32B right of kfence-#105):
[   31.202080]  test_out_of_bounds_read+0x1c8/0x3e0
[   31.202675]  test_out_of_bounds_read+0x198/0x3e0
[   31.203390]  kunit_try_run_case+0x14c/0x3d0
[   31.203952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.204767]  kthread+0x24c/0x2d0
[   31.205318]  ret_from_fork+0x10/0x20
[   31.205963] 
[   31.206333] kfence-#105: 0x00000000143c15c1-0x00000000bdbc9abd, size=32, cache=kmalloc-32
[   31.206333] 
[   31.207206] allocated by task 275 on cpu 1 at 31.199368s (0.007828s ago):
[   31.208141]  test_alloc+0x298/0x620
[   31.208647]  test_out_of_bounds_read+0x198/0x3e0
[   31.209213]  kunit_try_run_case+0x14c/0x3d0
[   31.209880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.210535]  kthread+0x24c/0x2d0
[   31.211031]  ret_from_fork+0x10/0x20
[   31.211548] 
[   31.211917] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.213013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.213629] Hardware name: linux,dummy-virt (DT)
[   31.214174] ==================================================================
[   31.511675] ==================================================================
[   31.512515] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   31.512515] 
[   31.513312] Out-of-bounds read at 0x0000000038c64668 (1B left of kfence-#108):
[   31.514140]  test_out_of_bounds_read+0x114/0x3e0
[   31.514774]  test_out_of_bounds_read+0xdc/0x3e0
[   31.515460]  kunit_try_run_case+0x14c/0x3d0
[   31.516077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.516869]  kthread+0x24c/0x2d0
[   31.517384]  ret_from_fork+0x10/0x20
[   31.517960] 
[   31.518317] kfence-#108: 0x0000000083c9f546-0x00000000f528438f, size=32, cache=test
[   31.518317] 
[   31.519267] allocated by task 277 on cpu 0 at 31.511521s (0.007734s ago):
[   31.520177]  test_alloc+0x22c/0x620
[   31.520806]  test_out_of_bounds_read+0xdc/0x3e0
[   31.521469]  kunit_try_run_case+0x14c/0x3d0
[   31.522034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.522796]  kthread+0x24c/0x2d0
[   31.523242]  ret_from_fork+0x10/0x20
[   31.523888] 
[   31.524231] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.525413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.526010] Hardware name: linux,dummy-virt (DT)
[   31.526603] ==================================================================
[   30.888749] ==================================================================
[   30.889504] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.889504] 
[   30.890528] Out-of-bounds read at 0x00000000e2002612 (1B left of kfence-#102):
[   30.891821]  test_out_of_bounds_read+0x114/0x3e0
[   30.892464]  test_out_of_bounds_read+0xdc/0x3e0
[   30.893126]  kunit_try_run_case+0x14c/0x3d0
[   30.893762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.894508]  kthread+0x24c/0x2d0
[   30.895037]  ret_from_fork+0x10/0x20
[   30.895618] 
[   30.896217] kfence-#102: 0x00000000d9759466-0x0000000074f1e680, size=32, cache=kmalloc-32
[   30.896217] 
[   30.897564] allocated by task 275 on cpu 1 at 30.887651s (0.009793s ago):
[   30.898896]  test_alloc+0x298/0x620
[   30.899369]  test_out_of_bounds_read+0xdc/0x3e0
[   30.900018]  kunit_try_run_case+0x14c/0x3d0
[   30.900587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.901226]  kthread+0x24c/0x2d0
[   30.901804]  ret_from_fork+0x10/0x20
[   30.902418] 
[   30.902884] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.904028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.904553] Hardware name: linux,dummy-virt (DT)
[   30.905096] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   30.707239] ==================================================================
[   30.708567] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.709753] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.710796] 
[   30.711208] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.712373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.712922] Hardware name: linux,dummy-virt (DT)
[   30.713465] Call trace:
[   30.713825]  show_stack+0x20/0x38 (C)
[   30.714303]  dump_stack_lvl+0x8c/0xd0
[   30.714918]  print_report+0x118/0x5e0
[   30.715418]  kasan_report+0xc8/0x118
[   30.716083]  kasan_check_range+0x100/0x1a8
[   30.716654]  __kasan_check_write+0x20/0x30
[   30.717205]  strncpy_from_user+0x3c/0x2a0
[   30.717863]  copy_user_test_oob+0x5c0/0xec0
[   30.718554]  kunit_try_run_case+0x14c/0x3d0
[   30.719377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.720128]  kthread+0x24c/0x2d0
[   30.720662]  ret_from_fork+0x10/0x20
[   30.721215] 
[   30.721533] Allocated by task 273:
[   30.721991]  kasan_save_stack+0x3c/0x68
[   30.722617]  kasan_save_track+0x20/0x40
[   30.723343]  kasan_save_alloc_info+0x40/0x58
[   30.723784]  __kasan_kmalloc+0xd4/0xd8
[   30.724358]  __kmalloc_noprof+0x188/0x4c8
[   30.725069]  kunit_kmalloc_array+0x34/0x88
[   30.725607]  copy_user_test_oob+0xac/0xec0
[   30.726152]  kunit_try_run_case+0x14c/0x3d0
[   30.726790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.728099]  kthread+0x24c/0x2d0
[   30.728564]  ret_from_fork+0x10/0x20
[   30.729181] 
[   30.729499] The buggy address belongs to the object at fff00000c1313100
[   30.729499]  which belongs to the cache kmalloc-128 of size 128
[   30.731045] The buggy address is located 0 bytes inside of
[   30.731045]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.732479] 
[   30.732868] The buggy address belongs to the physical page:
[   30.733479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.734326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.735409] page_type: f5(slab)
[   30.735926] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.736725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.737586] page dumped because: kasan: bad access detected
[   30.738222] 
[   30.738572] Memory state around the buggy address:
[   30.739499]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.740330]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.741176] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.741963]                                                                 ^
[   30.742741]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.743673]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.744475] ==================================================================
[   30.747430] ==================================================================
[   30.748260] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.748972] Write of size 1 at addr fff00000c1313178 by task kunit_try_catch/273
[   30.749575] 
[   30.749934] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.751106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.751605] Hardware name: linux,dummy-virt (DT)
[   30.752390] Call trace:
[   30.752813]  show_stack+0x20/0x38 (C)
[   30.753522]  dump_stack_lvl+0x8c/0xd0
[   30.754224]  print_report+0x118/0x5e0
[   30.754891]  kasan_report+0xc8/0x118
[   30.755516]  __asan_report_store1_noabort+0x20/0x30
[   30.756278]  strncpy_from_user+0x270/0x2a0
[   30.756972]  copy_user_test_oob+0x5c0/0xec0
[   30.757668]  kunit_try_run_case+0x14c/0x3d0
[   30.758352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.759153]  kthread+0x24c/0x2d0
[   30.759840]  ret_from_fork+0x10/0x20
[   30.760333] 
[   30.760613] Allocated by task 273:
[   30.761399]  kasan_save_stack+0x3c/0x68
[   30.762124]  kasan_save_track+0x20/0x40
[   30.762825]  kasan_save_alloc_info+0x40/0x58
[   30.763515]  __kasan_kmalloc+0xd4/0xd8
[   30.764201]  __kmalloc_noprof+0x188/0x4c8
[   30.764904]  kunit_kmalloc_array+0x34/0x88
[   30.765435]  copy_user_test_oob+0xac/0xec0
[   30.766238]  kunit_try_run_case+0x14c/0x3d0
[   30.766947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.767849]  kthread+0x24c/0x2d0
[   30.768268]  ret_from_fork+0x10/0x20
[   30.768995] 
[   30.769375] The buggy address belongs to the object at fff00000c1313100
[   30.769375]  which belongs to the cache kmalloc-128 of size 128
[   30.770913] The buggy address is located 0 bytes to the right of
[   30.770913]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.772252] 
[   30.772568] The buggy address belongs to the physical page:
[   30.773307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.774204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.774903] page_type: f5(slab)
[   30.775381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.776264] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.777101] page dumped because: kasan: bad access detected
[   30.777742] 
[   30.778064] Memory state around the buggy address:
[   30.778618]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.779375]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.780254] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.781099]                                                                 ^
[   30.781885]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.782645]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.783448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   30.464382] ==================================================================
[   30.465815] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   30.466620] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.467484] 
[   30.468180] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.469376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470059] Hardware name: linux,dummy-virt (DT)
[   30.470687] Call trace:
[   30.471330]  show_stack+0x20/0x38 (C)
[   30.471939]  dump_stack_lvl+0x8c/0xd0
[   30.472626]  print_report+0x118/0x5e0
[   30.473244]  kasan_report+0xc8/0x118
[   30.473902]  kasan_check_range+0x100/0x1a8
[   30.474527]  __kasan_check_write+0x20/0x30
[   30.475374]  copy_user_test_oob+0x234/0xec0
[   30.476057]  kunit_try_run_case+0x14c/0x3d0
[   30.476688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477461]  kthread+0x24c/0x2d0
[   30.478001]  ret_from_fork+0x10/0x20
[   30.478644] 
[   30.479398] Allocated by task 273:
[   30.479933]  kasan_save_stack+0x3c/0x68
[   30.480399]  kasan_save_track+0x20/0x40
[   30.481022]  kasan_save_alloc_info+0x40/0x58
[   30.481617]  __kasan_kmalloc+0xd4/0xd8
[   30.482137]  __kmalloc_noprof+0x188/0x4c8
[   30.482764]  kunit_kmalloc_array+0x34/0x88
[   30.483313]  copy_user_test_oob+0xac/0xec0
[   30.483950]  kunit_try_run_case+0x14c/0x3d0
[   30.484741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.485425]  kthread+0x24c/0x2d0
[   30.486279]  ret_from_fork+0x10/0x20
[   30.486832] 
[   30.487125] The buggy address belongs to the object at fff00000c1313100
[   30.487125]  which belongs to the cache kmalloc-128 of size 128
[   30.488940] The buggy address is located 0 bytes inside of
[   30.488940]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.490129] 
[   30.490448] The buggy address belongs to the physical page:
[   30.491134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.492206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.492899] page_type: f5(slab)
[   30.493479] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.494489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.495487] page dumped because: kasan: bad access detected
[   30.496207] 
[   30.496599] Memory state around the buggy address:
[   30.497189]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.497961]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.498748] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.500190]                                                                 ^
[   30.500883]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.501848]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.502778] ==================================================================
[   30.552819] ==================================================================
[   30.553454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   30.554130] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.554882] 
[   30.555540] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.557022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.557648] Hardware name: linux,dummy-virt (DT)
[   30.558396] Call trace:
[   30.558798]  show_stack+0x20/0x38 (C)
[   30.559578]  dump_stack_lvl+0x8c/0xd0
[   30.560145]  print_report+0x118/0x5e0
[   30.560743]  kasan_report+0xc8/0x118
[   30.561302]  kasan_check_range+0x100/0x1a8
[   30.561895]  __kasan_check_write+0x20/0x30
[   30.562522]  copy_user_test_oob+0x35c/0xec0
[   30.563283]  kunit_try_run_case+0x14c/0x3d0
[   30.563857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.564787]  kthread+0x24c/0x2d0
[   30.565180]  ret_from_fork+0x10/0x20
[   30.565851] 
[   30.566237] Allocated by task 273:
[   30.566664]  kasan_save_stack+0x3c/0x68
[   30.567774]  kasan_save_track+0x20/0x40
[   30.568459]  kasan_save_alloc_info+0x40/0x58
[   30.569257]  __kasan_kmalloc+0xd4/0xd8
[   30.569900]  __kmalloc_noprof+0x188/0x4c8
[   30.570415]  kunit_kmalloc_array+0x34/0x88
[   30.571111]  copy_user_test_oob+0xac/0xec0
[   30.571574]  kunit_try_run_case+0x14c/0x3d0
[   30.572030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.572354]  kthread+0x24c/0x2d0
[   30.572565]  ret_from_fork+0x10/0x20
[   30.572981] 
[   30.573260] The buggy address belongs to the object at fff00000c1313100
[   30.573260]  which belongs to the cache kmalloc-128 of size 128
[   30.574251] The buggy address is located 0 bytes inside of
[   30.574251]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.576212] 
[   30.576639] The buggy address belongs to the physical page:
[   30.577365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.578392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.579090] page_type: f5(slab)
[   30.579518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.580366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.581177] page dumped because: kasan: bad access detected
[   30.581909] 
[   30.582269] Memory state around the buggy address:
[   30.583262]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.584256]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.584996] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.585760]                                                                 ^
[   30.586535]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.587937]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.588813] ==================================================================
[   30.590604] ==================================================================
[   30.591254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   30.592516] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.593793] 
[   30.594260] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.595656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.596397] Hardware name: linux,dummy-virt (DT)
[   30.597018] Call trace:
[   30.597508]  show_stack+0x20/0x38 (C)
[   30.598066]  dump_stack_lvl+0x8c/0xd0
[   30.598551]  print_report+0x118/0x5e0
[   30.599026]  kasan_report+0xc8/0x118
[   30.599526]  kasan_check_range+0x100/0x1a8
[   30.600321]  __kasan_check_read+0x20/0x30
[   30.601279]  copy_user_test_oob+0x3c8/0xec0
[   30.602042]  kunit_try_run_case+0x14c/0x3d0
[   30.602743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.603642]  kthread+0x24c/0x2d0
[   30.604281]  ret_from_fork+0x10/0x20
[   30.604912] 
[   30.605233] Allocated by task 273:
[   30.605681]  kasan_save_stack+0x3c/0x68
[   30.606175]  kasan_save_track+0x20/0x40
[   30.606649]  kasan_save_alloc_info+0x40/0x58
[   30.607238]  __kasan_kmalloc+0xd4/0xd8
[   30.607884]  __kmalloc_noprof+0x188/0x4c8
[   30.608898]  kunit_kmalloc_array+0x34/0x88
[   30.609595]  copy_user_test_oob+0xac/0xec0
[   30.610281]  kunit_try_run_case+0x14c/0x3d0
[   30.611438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.612452]  kthread+0x24c/0x2d0
[   30.612946]  ret_from_fork+0x10/0x20
[   30.613640] 
[   30.614047] The buggy address belongs to the object at fff00000c1313100
[   30.614047]  which belongs to the cache kmalloc-128 of size 128
[   30.615559] The buggy address is located 0 bytes inside of
[   30.615559]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.617008] 
[   30.617342] The buggy address belongs to the physical page:
[   30.617988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.618847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.619629] page_type: f5(slab)
[   30.620112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.620999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.621880] page dumped because: kasan: bad access detected
[   30.622464] 
[   30.622812] Memory state around the buggy address:
[   30.623499]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.624395]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.625202] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.626060]                                                                 ^
[   30.626783]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.628010]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.628922] ==================================================================
[   30.668250] ==================================================================
[   30.668903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   30.670459] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.671390] 
[   30.672474] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.673434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.673983] Hardware name: linux,dummy-virt (DT)
[   30.674565] Call trace:
[   30.675109]  show_stack+0x20/0x38 (C)
[   30.675792]  dump_stack_lvl+0x8c/0xd0
[   30.676368]  print_report+0x118/0x5e0
[   30.677038]  kasan_report+0xc8/0x118
[   30.677677]  kasan_check_range+0x100/0x1a8
[   30.678319]  __kasan_check_read+0x20/0x30
[   30.679014]  copy_user_test_oob+0x4a0/0xec0
[   30.679788]  kunit_try_run_case+0x14c/0x3d0
[   30.680395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681155]  kthread+0x24c/0x2d0
[   30.681649]  ret_from_fork+0x10/0x20
[   30.682199] 
[   30.682506] Allocated by task 273:
[   30.683049]  kasan_save_stack+0x3c/0x68
[   30.683868]  kasan_save_track+0x20/0x40
[   30.684361]  kasan_save_alloc_info+0x40/0x58
[   30.684993]  __kasan_kmalloc+0xd4/0xd8
[   30.685506]  __kmalloc_noprof+0x188/0x4c8
[   30.686064]  kunit_kmalloc_array+0x34/0x88
[   30.686601]  copy_user_test_oob+0xac/0xec0
[   30.687234]  kunit_try_run_case+0x14c/0x3d0
[   30.688231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.688906]  kthread+0x24c/0x2d0
[   30.689456]  ret_from_fork+0x10/0x20
[   30.690024] 
[   30.690354] The buggy address belongs to the object at fff00000c1313100
[   30.690354]  which belongs to the cache kmalloc-128 of size 128
[   30.692535] The buggy address is located 0 bytes inside of
[   30.692535]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.693757] 
[   30.694065] The buggy address belongs to the physical page:
[   30.694674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.695859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.696823] page_type: f5(slab)
[   30.697297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.698256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.699163] page dumped because: kasan: bad access detected
[   30.699794] 
[   30.700144] Memory state around the buggy address:
[   30.700696]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.701794]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.702605] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.703597]                                                                 ^
[   30.704253]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.705016]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.705833] ==================================================================
[   30.629967] ==================================================================
[   30.630732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   30.632479] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.633589] 
[   30.634038] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.635382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.636126] Hardware name: linux,dummy-virt (DT)
[   30.636375] Call trace:
[   30.636544]  show_stack+0x20/0x38 (C)
[   30.636904]  dump_stack_lvl+0x8c/0xd0
[   30.637567]  print_report+0x118/0x5e0
[   30.638248]  kasan_report+0xc8/0x118
[   30.638735]  kasan_check_range+0x100/0x1a8
[   30.639374]  __kasan_check_write+0x20/0x30
[   30.640413]  copy_user_test_oob+0x434/0xec0
[   30.641120]  kunit_try_run_case+0x14c/0x3d0
[   30.641773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.642448]  kthread+0x24c/0x2d0
[   30.643084]  ret_from_fork+0x10/0x20
[   30.643792] 
[   30.644120] Allocated by task 273:
[   30.644660]  kasan_save_stack+0x3c/0x68
[   30.645257]  kasan_save_track+0x20/0x40
[   30.645861]  kasan_save_alloc_info+0x40/0x58
[   30.646439]  __kasan_kmalloc+0xd4/0xd8
[   30.647039]  __kmalloc_noprof+0x188/0x4c8
[   30.647798]  kunit_kmalloc_array+0x34/0x88
[   30.648285]  copy_user_test_oob+0xac/0xec0
[   30.648940]  kunit_try_run_case+0x14c/0x3d0
[   30.649509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.650136]  kthread+0x24c/0x2d0
[   30.650672]  ret_from_fork+0x10/0x20
[   30.651680] 
[   30.651944] The buggy address belongs to the object at fff00000c1313100
[   30.651944]  which belongs to the cache kmalloc-128 of size 128
[   30.653014] The buggy address is located 0 bytes inside of
[   30.653014]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.654392] 
[   30.654778] The buggy address belongs to the physical page:
[   30.655766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.656744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.657465] page_type: f5(slab)
[   30.657932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.658822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.659864] page dumped because: kasan: bad access detected
[   30.660560] 
[   30.660915] Memory state around the buggy address:
[   30.661473]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.662262]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663225] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.664225]                                                                 ^
[   30.664892]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.665664]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666472] ==================================================================
[   30.509025] ==================================================================
[   30.509721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   30.510463] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273
[   30.511657] 
[   30.512066] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.513346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.513975] Hardware name: linux,dummy-virt (DT)
[   30.514601] Call trace:
[   30.515240]  show_stack+0x20/0x38 (C)
[   30.515903]  dump_stack_lvl+0x8c/0xd0
[   30.516480]  print_report+0x118/0x5e0
[   30.517154]  kasan_report+0xc8/0x118
[   30.517829]  kasan_check_range+0x100/0x1a8
[   30.518474]  __kasan_check_read+0x20/0x30
[   30.519272]  copy_user_test_oob+0x728/0xec0
[   30.519881]  kunit_try_run_case+0x14c/0x3d0
[   30.520489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.521243]  kthread+0x24c/0x2d0
[   30.521851]  ret_from_fork+0x10/0x20
[   30.522448] 
[   30.522806] Allocated by task 273:
[   30.523537]  kasan_save_stack+0x3c/0x68
[   30.524128]  kasan_save_track+0x20/0x40
[   30.524765]  kasan_save_alloc_info+0x40/0x58
[   30.525452]  __kasan_kmalloc+0xd4/0xd8
[   30.526058]  __kmalloc_noprof+0x188/0x4c8
[   30.526680]  kunit_kmalloc_array+0x34/0x88
[   30.527388]  copy_user_test_oob+0xac/0xec0
[   30.528069]  kunit_try_run_case+0x14c/0x3d0
[   30.528636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.529362]  kthread+0x24c/0x2d0
[   30.529862]  ret_from_fork+0x10/0x20
[   30.530372] 
[   30.530679] The buggy address belongs to the object at fff00000c1313100
[   30.530679]  which belongs to the cache kmalloc-128 of size 128
[   30.532337] The buggy address is located 0 bytes inside of
[   30.532337]  allocated 120-byte region [fff00000c1313100, fff00000c1313178)
[   30.533466] 
[   30.534551] The buggy address belongs to the physical page:
[   30.535600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.536483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.537280] page_type: f5(slab)
[   30.537774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.538551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.539537] page dumped because: kasan: bad access detected
[   30.540341] 
[   30.540569] Memory state around the buggy address:
[   30.541021]  fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.541882]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.542738] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.543948]                                                                 ^
[   30.544745]  fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.545571]  fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.546365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   30.399435] ==================================================================
[   30.400403] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   30.401328] Write of size 8 at addr fff00000c1313078 by task kunit_try_catch/269
[   30.402250] 
[   30.402731] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.404187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.404994] Hardware name: linux,dummy-virt (DT)
[   30.405669] Call trace:
[   30.406145]  show_stack+0x20/0x38 (C)
[   30.406793]  dump_stack_lvl+0x8c/0xd0
[   30.407488]  print_report+0x118/0x5e0
[   30.408338]  kasan_report+0xc8/0x118
[   30.408765]  kasan_check_range+0x100/0x1a8
[   30.409395]  __kasan_check_write+0x20/0x30
[   30.410041]  copy_to_kernel_nofault+0x8c/0x250
[   30.410734]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   30.411521]  kunit_try_run_case+0x14c/0x3d0
[   30.412230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.413027]  kthread+0x24c/0x2d0
[   30.413572]  ret_from_fork+0x10/0x20
[   30.414219] 
[   30.414599] Allocated by task 269:
[   30.415184]  kasan_save_stack+0x3c/0x68
[   30.415795]  kasan_save_track+0x20/0x40
[   30.416393]  kasan_save_alloc_info+0x40/0x58
[   30.416938]  __kasan_kmalloc+0xd4/0xd8
[   30.417588]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.418254]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.418903]  kunit_try_run_case+0x14c/0x3d0
[   30.419646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.420312]  kthread+0x24c/0x2d0
[   30.420997]  ret_from_fork+0x10/0x20
[   30.421450] 
[   30.421815] The buggy address belongs to the object at fff00000c1313000
[   30.421815]  which belongs to the cache kmalloc-128 of size 128
[   30.423470] The buggy address is located 0 bytes to the right of
[   30.423470]  allocated 120-byte region [fff00000c1313000, fff00000c1313078)
[   30.424970] 
[   30.425635] The buggy address belongs to the physical page:
[   30.426479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.427559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.428439] page_type: f5(slab)
[   30.428936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.429834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.430652] page dumped because: kasan: bad access detected
[   30.431304] 
[   30.431623] Memory state around the buggy address:
[   30.432364]  fff00000c1312f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.433241]  fff00000c1312f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.434116] >fff00000c1313000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.435113]                                                                 ^
[   30.436011]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.436827]  fff00000c1313100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.437578] ==================================================================
[   30.356946] ==================================================================
[   30.358446] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   30.359296] Read of size 8 at addr fff00000c1313078 by task kunit_try_catch/269
[   30.360062] 
[   30.360410] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.362631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.363751] Hardware name: linux,dummy-virt (DT)
[   30.364632] Call trace:
[   30.365277]  show_stack+0x20/0x38 (C)
[   30.365930]  dump_stack_lvl+0x8c/0xd0
[   30.366612]  print_report+0x118/0x5e0
[   30.367613]  kasan_report+0xc8/0x118
[   30.368106]  __asan_report_load8_noabort+0x20/0x30
[   30.368776]  copy_to_kernel_nofault+0x204/0x250
[   30.369486]  copy_to_kernel_nofault_oob+0x158/0x418
[   30.370198]  kunit_try_run_case+0x14c/0x3d0
[   30.371152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.371861]  kthread+0x24c/0x2d0
[   30.372433]  ret_from_fork+0x10/0x20
[   30.373023] 
[   30.373393] Allocated by task 269:
[   30.373908]  kasan_save_stack+0x3c/0x68
[   30.374730]  kasan_save_track+0x20/0x40
[   30.375315]  kasan_save_alloc_info+0x40/0x58
[   30.376030]  __kasan_kmalloc+0xd4/0xd8
[   30.376696]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.377359]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.378117]  kunit_try_run_case+0x14c/0x3d0
[   30.378775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.379597]  kthread+0x24c/0x2d0
[   30.380052]  ret_from_fork+0x10/0x20
[   30.380722] 
[   30.381100] The buggy address belongs to the object at fff00000c1313000
[   30.381100]  which belongs to the cache kmalloc-128 of size 128
[   30.382465] The buggy address is located 0 bytes to the right of
[   30.382465]  allocated 120-byte region [fff00000c1313000, fff00000c1313078)
[   30.384379] 
[   30.384618] The buggy address belongs to the physical page:
[   30.385965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313
[   30.386750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.387536] page_type: f5(slab)
[   30.388366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.389234] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.390185] page dumped because: kasan: bad access detected
[   30.390848] 
[   30.391530] Memory state around the buggy address:
[   30.392294]  fff00000c1312f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.393278]  fff00000c1312f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.394210] >fff00000c1313000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.395368]                                                                 ^
[   30.396024]  fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.396900]  fff00000c1313100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.397834] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   30.259818] ==================================================================
[   30.261048] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   30.261854] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257
[   30.262591] 
[   30.262983] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.264014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.264563] Hardware name: linux,dummy-virt (DT)
[   30.265143] Call trace:
[   30.265543]  show_stack+0x20/0x38 (C)
[   30.266092]  dump_stack_lvl+0x8c/0xd0
[   30.266689]  print_report+0x2fc/0x5e0
[   30.267304]  kasan_report+0xc8/0x118
[   30.267794]  __asan_report_load1_noabort+0x20/0x30
[   30.268514]  vmalloc_oob+0x578/0x5d0
[   30.269188]  kunit_try_run_case+0x14c/0x3d0
[   30.270104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.270947]  kthread+0x24c/0x2d0
[   30.271541]  ret_from_fork+0x10/0x20
[   30.272125] 
[   30.272735] The buggy address belongs to the virtual mapping at
[   30.272735]  [ffff80008010b000, ffff80008010d000) created by:
[   30.272735]  vmalloc_oob+0x98/0x5d0
[   30.274108] 
[   30.274448] The buggy address belongs to the physical page:
[   30.275217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101306
[   30.276546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.277338] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.278176] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.279038] page dumped because: kasan: bad access detected
[   30.279902] 
[   30.280140] Memory state around the buggy address:
[   30.280796]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.281789]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.282669] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.283855]                                                              ^
[   30.284211]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.284540]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.285382] ==================================================================
[   30.287127] ==================================================================
[   30.288459] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   30.289451] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257
[   30.290395] 
[   30.290734] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.291833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.292495] Hardware name: linux,dummy-virt (DT)
[   30.293220] Call trace:
[   30.293575]  show_stack+0x20/0x38 (C)
[   30.294099]  dump_stack_lvl+0x8c/0xd0
[   30.294776]  print_report+0x2fc/0x5e0
[   30.295401]  kasan_report+0xc8/0x118
[   30.295942]  __asan_report_load1_noabort+0x20/0x30
[   30.296574]  vmalloc_oob+0x51c/0x5d0
[   30.297142]  kunit_try_run_case+0x14c/0x3d0
[   30.297799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298436]  kthread+0x24c/0x2d0
[   30.299100]  ret_from_fork+0x10/0x20
[   30.299666] 
[   30.300076] The buggy address belongs to the virtual mapping at
[   30.300076]  [ffff80008010b000, ffff80008010d000) created by:
[   30.300076]  vmalloc_oob+0x98/0x5d0
[   30.302523] 
[   30.302945] The buggy address belongs to the physical page:
[   30.303599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101306
[   30.304505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.305688] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.306648] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.307953] page dumped because: kasan: bad access detected
[   30.308908] 
[   30.309229] Memory state around the buggy address:
[   30.310054]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.310912]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.312128] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.312460]                                                                 ^
[   30.313423]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.314216]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.315074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   28.813001] ==================================================================
[   28.814322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   28.815674] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.816732] 
[   28.817036] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.818540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.819056] Hardware name: linux,dummy-virt (DT)
[   28.819577] Call trace:
[   28.820125]  show_stack+0x20/0x38 (C)
[   28.821000]  dump_stack_lvl+0x8c/0xd0
[   28.821560]  print_report+0x118/0x5e0
[   28.822119]  kasan_report+0xc8/0x118
[   28.822651]  kasan_check_range+0x100/0x1a8
[   28.823339]  __kasan_check_write+0x20/0x30
[   28.823934]  kasan_atomics_helper+0xad4/0x4858
[   28.824590]  kasan_atomics+0x198/0x2e8
[   28.825152]  kunit_try_run_case+0x14c/0x3d0
[   28.825770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.826441]  kthread+0x24c/0x2d0
[   28.826978]  ret_from_fork+0x10/0x20
[   28.827560] 
[   28.827902] Allocated by task 253:
[   28.828304]  kasan_save_stack+0x3c/0x68
[   28.828943]  kasan_save_track+0x20/0x40
[   28.829420]  kasan_save_alloc_info+0x40/0x58
[   28.830104]  __kasan_kmalloc+0xd4/0xd8
[   28.830618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.831166]  kasan_atomics+0xb8/0x2e8
[   28.831795]  kunit_try_run_case+0x14c/0x3d0
[   28.832330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.833074]  kthread+0x24c/0x2d0
[   28.833510]  ret_from_fork+0x10/0x20
[   28.834108] 
[   28.834411] The buggy address belongs to the object at fff00000c12e8780
[   28.834411]  which belongs to the cache kmalloc-64 of size 64
[   28.835720] The buggy address is located 0 bytes to the right of
[   28.835720]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.836907] 
[   28.837274] The buggy address belongs to the physical page:
[   28.837955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.838893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.839659] page_type: f5(slab)
[   28.840144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.840927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.841840] page dumped because: kasan: bad access detected
[   28.842519] 
[   28.842864] Memory state around the buggy address:
[   28.843447]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.844164]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.845097] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.845936]                                      ^
[   28.846517]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.847306]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.848100] ==================================================================
[   30.103719] ==================================================================
[   30.104333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.105502] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.106248] 
[   30.106590] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.107833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.108345] Hardware name: linux,dummy-virt (DT)
[   30.108962] Call trace:
[   30.109388]  show_stack+0x20/0x38 (C)
[   30.109929]  dump_stack_lvl+0x8c/0xd0
[   30.110584]  print_report+0x118/0x5e0
[   30.111192]  kasan_report+0xc8/0x118
[   30.111780]  __asan_report_load8_noabort+0x20/0x30
[   30.112457]  kasan_atomics_helper+0x3e10/0x4858
[   30.113099]  kasan_atomics+0x198/0x2e8
[   30.113621]  kunit_try_run_case+0x14c/0x3d0
[   30.114235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.114850]  kthread+0x24c/0x2d0
[   30.115355]  ret_from_fork+0x10/0x20
[   30.115894] 
[   30.116201] Allocated by task 253:
[   30.116774]  kasan_save_stack+0x3c/0x68
[   30.117372]  kasan_save_track+0x20/0x40
[   30.117919]  kasan_save_alloc_info+0x40/0x58
[   30.118475]  __kasan_kmalloc+0xd4/0xd8
[   30.119026]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.119655]  kasan_atomics+0xb8/0x2e8
[   30.120200]  kunit_try_run_case+0x14c/0x3d0
[   30.120866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.121468]  kthread+0x24c/0x2d0
[   30.122018]  ret_from_fork+0x10/0x20
[   30.122557] 
[   30.122875] The buggy address belongs to the object at fff00000c12e8780
[   30.122875]  which belongs to the cache kmalloc-64 of size 64
[   30.124121] The buggy address is located 0 bytes to the right of
[   30.124121]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.125439] 
[   30.125763] The buggy address belongs to the physical page:
[   30.126446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.127391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.128158] page_type: f5(slab)
[   30.128651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.129504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.130380] page dumped because: kasan: bad access detected
[   30.131031] 
[   30.131347] Memory state around the buggy address:
[   30.131914]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.132645]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.133467] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.134252]                                      ^
[   30.134842]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135581]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.136424] ==================================================================
[   30.173548] ==================================================================
[   30.174322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.175243] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.176014] 
[   30.176534] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.177783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.178291] Hardware name: linux,dummy-virt (DT)
[   30.178916] Call trace:
[   30.179340]  show_stack+0x20/0x38 (C)
[   30.179902]  dump_stack_lvl+0x8c/0xd0
[   30.180433]  print_report+0x118/0x5e0
[   30.180981]  kasan_report+0xc8/0x118
[   30.181586]  __asan_report_load8_noabort+0x20/0x30
[   30.182194]  kasan_atomics_helper+0x3e20/0x4858
[   30.182869]  kasan_atomics+0x198/0x2e8
[   30.183448]  kunit_try_run_case+0x14c/0x3d0
[   30.184038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.184728]  kthread+0x24c/0x2d0
[   30.185264]  ret_from_fork+0x10/0x20
[   30.185796] 
[   30.186141] Allocated by task 253:
[   30.186645]  kasan_save_stack+0x3c/0x68
[   30.187202]  kasan_save_track+0x20/0x40
[   30.187776]  kasan_save_alloc_info+0x40/0x58
[   30.188333]  __kasan_kmalloc+0xd4/0xd8
[   30.188878]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.189617]  kasan_atomics+0xb8/0x2e8
[   30.190155]  kunit_try_run_case+0x14c/0x3d0
[   30.190846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191443]  kthread+0x24c/0x2d0
[   30.192026]  ret_from_fork+0x10/0x20
[   30.192549] 
[   30.192892] The buggy address belongs to the object at fff00000c12e8780
[   30.192892]  which belongs to the cache kmalloc-64 of size 64
[   30.194090] The buggy address is located 0 bytes to the right of
[   30.194090]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.195350] 
[   30.195743] The buggy address belongs to the physical page:
[   30.196317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.197257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.198071] page_type: f5(slab)
[   30.198731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.199683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.200632] page dumped because: kasan: bad access detected
[   30.201291] 
[   30.201596] Memory state around the buggy address:
[   30.202164]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.202948]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.203791] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.204554]                                      ^
[   30.205204]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.205992]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.206773] ==================================================================
[   29.715615] ==================================================================
[   29.716322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.717188] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.718249] 
[   29.718593] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.719717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.720235] Hardware name: linux,dummy-virt (DT)
[   29.720792] Call trace:
[   29.721239]  show_stack+0x20/0x38 (C)
[   29.721833]  dump_stack_lvl+0x8c/0xd0
[   29.722474]  print_report+0x118/0x5e0
[   29.723020]  kasan_report+0xc8/0x118
[   29.723587]  kasan_check_range+0x100/0x1a8
[   29.724291]  __kasan_check_write+0x20/0x30
[   29.724889]  kasan_atomics_helper+0x1384/0x4858
[   29.725452]  kasan_atomics+0x198/0x2e8
[   29.726079]  kunit_try_run_case+0x14c/0x3d0
[   29.726654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.727421]  kthread+0x24c/0x2d0
[   29.727986]  ret_from_fork+0x10/0x20
[   29.728544] 
[   29.728875] Allocated by task 253:
[   29.729366]  kasan_save_stack+0x3c/0x68
[   29.729935]  kasan_save_track+0x20/0x40
[   29.730561]  kasan_save_alloc_info+0x40/0x58
[   29.731136]  __kasan_kmalloc+0xd4/0xd8
[   29.731724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.732378]  kasan_atomics+0xb8/0x2e8
[   29.732975]  kunit_try_run_case+0x14c/0x3d0
[   29.733532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.734287]  kthread+0x24c/0x2d0
[   29.734832]  ret_from_fork+0x10/0x20
[   29.735364] 
[   29.735713] The buggy address belongs to the object at fff00000c12e8780
[   29.735713]  which belongs to the cache kmalloc-64 of size 64
[   29.736918] The buggy address is located 0 bytes to the right of
[   29.736918]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.738221] 
[   29.738548] The buggy address belongs to the physical page:
[   29.739277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.740124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.740887] page_type: f5(slab)
[   29.741413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.742262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.743138] page dumped because: kasan: bad access detected
[   29.743788] 
[   29.744123] Memory state around the buggy address:
[   29.744739]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745777]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.746616] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.747585]                                      ^
[   29.748268]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749168]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749984] ==================================================================
[   27.888812] ==================================================================
[   27.890168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   27.891744] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.892639] 
[   27.893110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.894235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.894864] Hardware name: linux,dummy-virt (DT)
[   27.895386] Call trace:
[   27.895812]  show_stack+0x20/0x38 (C)
[   27.896391]  dump_stack_lvl+0x8c/0xd0
[   27.897106]  print_report+0x118/0x5e0
[   27.897691]  kasan_report+0xc8/0x118
[   27.898303]  __asan_report_load4_noabort+0x20/0x30
[   27.899067]  kasan_atomics_helper+0x40a8/0x4858
[   27.899719]  kasan_atomics+0x198/0x2e8
[   27.900372]  kunit_try_run_case+0x14c/0x3d0
[   27.901011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.901783]  kthread+0x24c/0x2d0
[   27.902343]  ret_from_fork+0x10/0x20
[   27.903019] 
[   27.903370] Allocated by task 253:
[   27.903873]  kasan_save_stack+0x3c/0x68
[   27.904568]  kasan_save_track+0x20/0x40
[   27.905189]  kasan_save_alloc_info+0x40/0x58
[   27.905851]  __kasan_kmalloc+0xd4/0xd8
[   27.906443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.907440]  kasan_atomics+0xb8/0x2e8
[   27.908290]  kunit_try_run_case+0x14c/0x3d0
[   27.909341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.910290]  kthread+0x24c/0x2d0
[   27.911007]  ret_from_fork+0x10/0x20
[   27.911503] 
[   27.911822] The buggy address belongs to the object at fff00000c12e8780
[   27.911822]  which belongs to the cache kmalloc-64 of size 64
[   27.913391] The buggy address is located 0 bytes to the right of
[   27.913391]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.914786] 
[   27.915161] The buggy address belongs to the physical page:
[   27.915942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.916952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.917754] page_type: f5(slab)
[   27.918292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.919168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.920233] page dumped because: kasan: bad access detected
[   27.920947] 
[   27.921371] Memory state around the buggy address:
[   27.922029]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.922963]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.924157] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.924820]                                      ^
[   27.925501]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.926421]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.927300] ==================================================================
[   27.967254] ==================================================================
[   27.968057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   27.969017] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.969641] 
[   27.969901] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.971846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.972554] Hardware name: linux,dummy-virt (DT)
[   27.973165] Call trace:
[   27.973431]  show_stack+0x20/0x38 (C)
[   27.973807]  dump_stack_lvl+0x8c/0xd0
[   27.974188]  print_report+0x118/0x5e0
[   27.974595]  kasan_report+0xc8/0x118
[   27.976158]  kasan_check_range+0x100/0x1a8
[   27.976845]  __kasan_check_read+0x20/0x30
[   27.977498]  kasan_atomics_helper+0x1ec/0x4858
[   27.978058]  kasan_atomics+0x198/0x2e8
[   27.978602]  kunit_try_run_case+0x14c/0x3d0
[   27.979576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.980322]  kthread+0x24c/0x2d0
[   27.980987]  ret_from_fork+0x10/0x20
[   27.981589] 
[   27.981969] Allocated by task 253:
[   27.982552]  kasan_save_stack+0x3c/0x68
[   27.983261]  kasan_save_track+0x20/0x40
[   27.983839]  kasan_save_alloc_info+0x40/0x58
[   27.984488]  __kasan_kmalloc+0xd4/0xd8
[   27.985174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.985814]  kasan_atomics+0xb8/0x2e8
[   27.986446]  kunit_try_run_case+0x14c/0x3d0
[   27.987113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.987999]  kthread+0x24c/0x2d0
[   27.988632]  ret_from_fork+0x10/0x20
[   27.989111] 
[   27.989450] The buggy address belongs to the object at fff00000c12e8780
[   27.989450]  which belongs to the cache kmalloc-64 of size 64
[   27.990637] The buggy address is located 0 bytes to the right of
[   27.990637]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.992085] 
[   27.992559] The buggy address belongs to the physical page:
[   27.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.995152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.995808] page_type: f5(slab)
[   27.996531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.997520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.998352] page dumped because: kasan: bad access detected
[   27.999040] 
[   27.999353] Memory state around the buggy address:
[   27.999936]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.000785]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.001865] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.002615]                                      ^
[   28.003333]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.004281]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005058] ==================================================================
[   28.521162] ==================================================================
[   28.521879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   28.523270] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.524845] 
[   28.525221] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.526149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.526381] Hardware name: linux,dummy-virt (DT)
[   28.526623] Call trace:
[   28.526958]  show_stack+0x20/0x38 (C)
[   28.527658]  dump_stack_lvl+0x8c/0xd0
[   28.528256]  print_report+0x118/0x5e0
[   28.528811]  kasan_report+0xc8/0x118
[   28.529464]  kasan_check_range+0x100/0x1a8
[   28.530219]  __kasan_check_write+0x20/0x30
[   28.530828]  kasan_atomics_helper+0x760/0x4858
[   28.531519]  kasan_atomics+0x198/0x2e8
[   28.532105]  kunit_try_run_case+0x14c/0x3d0
[   28.532762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.533615]  kthread+0x24c/0x2d0
[   28.534143]  ret_from_fork+0x10/0x20
[   28.534604] 
[   28.535003] Allocated by task 253:
[   28.535533]  kasan_save_stack+0x3c/0x68
[   28.536257]  kasan_save_track+0x20/0x40
[   28.536828]  kasan_save_alloc_info+0x40/0x58
[   28.537560]  __kasan_kmalloc+0xd4/0xd8
[   28.538179]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.538778]  kasan_atomics+0xb8/0x2e8
[   28.539411]  kunit_try_run_case+0x14c/0x3d0
[   28.540050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.540907]  kthread+0x24c/0x2d0
[   28.541520]  ret_from_fork+0x10/0x20
[   28.542003] 
[   28.542291] The buggy address belongs to the object at fff00000c12e8780
[   28.542291]  which belongs to the cache kmalloc-64 of size 64
[   28.543499] The buggy address is located 0 bytes to the right of
[   28.543499]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.544823] 
[   28.545184] The buggy address belongs to the physical page:
[   28.545830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.546743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.547451] page_type: f5(slab)
[   28.548009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.548832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.549665] page dumped because: kasan: bad access detected
[   28.550351] 
[   28.550660] Memory state around the buggy address:
[   28.551250]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.551977]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.552734] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.553576]                                      ^
[   28.554190]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.554986]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.555815] ==================================================================
[   29.388404] ==================================================================
[   29.389140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.390059] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.390807] 
[   29.391228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.392303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.392961] Hardware name: linux,dummy-virt (DT)
[   29.393491] Call trace:
[   29.393991]  show_stack+0x20/0x38 (C)
[   29.394599]  dump_stack_lvl+0x8c/0xd0
[   29.395165]  print_report+0x118/0x5e0
[   29.395673]  kasan_report+0xc8/0x118
[   29.396280]  kasan_check_range+0x100/0x1a8
[   29.396874]  __kasan_check_write+0x20/0x30
[   29.397460]  kasan_atomics_helper+0xf88/0x4858
[   29.398139]  kasan_atomics+0x198/0x2e8
[   29.398686]  kunit_try_run_case+0x14c/0x3d0
[   29.399263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.400038]  kthread+0x24c/0x2d0
[   29.400571]  ret_from_fork+0x10/0x20
[   29.401147] 
[   29.401499] Allocated by task 253:
[   29.401973]  kasan_save_stack+0x3c/0x68
[   29.402553]  kasan_save_track+0x20/0x40
[   29.403109]  kasan_save_alloc_info+0x40/0x58
[   29.403681]  __kasan_kmalloc+0xd4/0xd8
[   29.404277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.404884]  kasan_atomics+0xb8/0x2e8
[   29.405385]  kunit_try_run_case+0x14c/0x3d0
[   29.405934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.406672]  kthread+0x24c/0x2d0
[   29.407181]  ret_from_fork+0x10/0x20
[   29.407718] 
[   29.408020] The buggy address belongs to the object at fff00000c12e8780
[   29.408020]  which belongs to the cache kmalloc-64 of size 64
[   29.409244] The buggy address is located 0 bytes to the right of
[   29.409244]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.410564] 
[   29.410884] The buggy address belongs to the physical page:
[   29.411532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.412361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.413145] page_type: f5(slab)
[   29.413578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.414497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.415408] page dumped because: kasan: bad access detected
[   29.416042] 
[   29.416345] Memory state around the buggy address:
[   29.417021]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.417790]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.418541] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.419336]                                      ^
[   29.419943]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420798]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.421572] ==================================================================
[   29.529597] ==================================================================
[   29.530297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.531092] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.531753] 
[   29.532058] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.532554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.533193] Hardware name: linux,dummy-virt (DT)
[   29.533970] Call trace:
[   29.534430]  show_stack+0x20/0x38 (C)
[   29.535192]  dump_stack_lvl+0x8c/0xd0
[   29.535825]  print_report+0x118/0x5e0
[   29.536441]  kasan_report+0xc8/0x118
[   29.537066]  kasan_check_range+0x100/0x1a8
[   29.537712]  __kasan_check_write+0x20/0x30
[   29.538308]  kasan_atomics_helper+0x1128/0x4858
[   29.538940]  kasan_atomics+0x198/0x2e8
[   29.539574]  kunit_try_run_case+0x14c/0x3d0
[   29.540227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.540964]  kthread+0x24c/0x2d0
[   29.541526]  ret_from_fork+0x10/0x20
[   29.542113] 
[   29.542469] Allocated by task 253:
[   29.542992]  kasan_save_stack+0x3c/0x68
[   29.543641]  kasan_save_track+0x20/0x40
[   29.544230]  kasan_save_alloc_info+0x40/0x58
[   29.544936]  __kasan_kmalloc+0xd4/0xd8
[   29.545527]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.546157]  kasan_atomics+0xb8/0x2e8
[   29.546737]  kunit_try_run_case+0x14c/0x3d0
[   29.547355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.548134]  kthread+0x24c/0x2d0
[   29.548712]  ret_from_fork+0x10/0x20
[   29.549328] 
[   29.549617] The buggy address belongs to the object at fff00000c12e8780
[   29.549617]  which belongs to the cache kmalloc-64 of size 64
[   29.551213] The buggy address is located 0 bytes to the right of
[   29.551213]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.552512] 
[   29.552982] The buggy address belongs to the physical page:
[   29.553784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.554691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.555459] page_type: f5(slab)
[   29.555959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.556927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.557828] page dumped because: kasan: bad access detected
[   29.558515] 
[   29.558863] Memory state around the buggy address:
[   29.559535]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.560390]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.561234] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.562104]                                      ^
[   29.562749]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563572]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.564354] ==================================================================
[   28.959688] ==================================================================
[   28.960343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   28.961018] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.961859] 
[   28.962111] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.962865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.963246] Hardware name: linux,dummy-virt (DT)
[   28.963653] Call trace:
[   28.964067]  show_stack+0x20/0x38 (C)
[   28.964823]  dump_stack_lvl+0x8c/0xd0
[   28.965469]  print_report+0x118/0x5e0
[   28.966155]  kasan_report+0xc8/0x118
[   28.966893]  kasan_check_range+0x100/0x1a8
[   28.967464]  __kasan_check_write+0x20/0x30
[   28.967978]  kasan_atomics_helper+0xc08/0x4858
[   28.968539]  kasan_atomics+0x198/0x2e8
[   28.969313]  kunit_try_run_case+0x14c/0x3d0
[   28.970074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.970947]  kthread+0x24c/0x2d0
[   28.971560]  ret_from_fork+0x10/0x20
[   28.972222] 
[   28.972625] Allocated by task 253:
[   28.973229]  kasan_save_stack+0x3c/0x68
[   28.973851]  kasan_save_track+0x20/0x40
[   28.974467]  kasan_save_alloc_info+0x40/0x58
[   28.975097]  __kasan_kmalloc+0xd4/0xd8
[   28.975768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.976540]  kasan_atomics+0xb8/0x2e8
[   28.977316]  kunit_try_run_case+0x14c/0x3d0
[   28.977919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.978577]  kthread+0x24c/0x2d0
[   28.979184]  ret_from_fork+0x10/0x20
[   28.979825] 
[   28.980163] The buggy address belongs to the object at fff00000c12e8780
[   28.980163]  which belongs to the cache kmalloc-64 of size 64
[   28.981447] The buggy address is located 0 bytes to the right of
[   28.981447]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.982855] 
[   28.983226] The buggy address belongs to the physical page:
[   28.983944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.984869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.985725] page_type: f5(slab)
[   28.986274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.987190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.988073] page dumped because: kasan: bad access detected
[   28.988728] 
[   28.989146] Memory state around the buggy address:
[   28.989788]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.990534]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.991409] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.992218]                                      ^
[   28.992884]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.993625]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994534] ==================================================================
[   29.177250] ==================================================================
[   29.177911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.178672] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.179445] 
[   29.179843] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.180938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.181543] Hardware name: linux,dummy-virt (DT)
[   29.182055] Call trace:
[   29.182531]  show_stack+0x20/0x38 (C)
[   29.183080]  dump_stack_lvl+0x8c/0xd0
[   29.183640]  print_report+0x118/0x5e0
[   29.184254]  kasan_report+0xc8/0x118
[   29.184816]  kasan_check_range+0x100/0x1a8
[   29.185475]  __kasan_check_read+0x20/0x30
[   29.186078]  kasan_atomics_helper+0xdd4/0x4858
[   29.186712]  kasan_atomics+0x198/0x2e8
[   29.187278]  kunit_try_run_case+0x14c/0x3d0
[   29.187929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.188663]  kthread+0x24c/0x2d0
[   29.189188]  ret_from_fork+0x10/0x20
[   29.189850] 
[   29.190177] Allocated by task 253:
[   29.190741]  kasan_save_stack+0x3c/0x68
[   29.191353]  kasan_save_track+0x20/0x40
[   29.191884]  kasan_save_alloc_info+0x40/0x58
[   29.192478]  __kasan_kmalloc+0xd4/0xd8
[   29.193088]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.193715]  kasan_atomics+0xb8/0x2e8
[   29.194267]  kunit_try_run_case+0x14c/0x3d0
[   29.194845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.195509]  kthread+0x24c/0x2d0
[   29.196013]  ret_from_fork+0x10/0x20
[   29.196521] 
[   29.196849] The buggy address belongs to the object at fff00000c12e8780
[   29.196849]  which belongs to the cache kmalloc-64 of size 64
[   29.198040] The buggy address is located 0 bytes to the right of
[   29.198040]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.199328] 
[   29.199649] The buggy address belongs to the physical page:
[   29.200256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.201121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.201946] page_type: f5(slab)
[   29.202413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.203233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.204021] page dumped because: kasan: bad access detected
[   29.204736] 
[   29.205052] Memory state around the buggy address:
[   29.205618]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.206393]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.207171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.207962]                                      ^
[   29.208556]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.209358]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.210118] ==================================================================
[   29.962054] ==================================================================
[   29.963262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.964116] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.964932] 
[   29.965291] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.966490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.967026] Hardware name: linux,dummy-virt (DT)
[   29.967278] Call trace:
[   29.967444]  show_stack+0x20/0x38 (C)
[   29.967682]  dump_stack_lvl+0x8c/0xd0
[   29.968257]  print_report+0x118/0x5e0
[   29.968891]  kasan_report+0xc8/0x118
[   29.969491]  __asan_report_load8_noabort+0x20/0x30
[   29.970163]  kasan_atomics_helper+0x3db0/0x4858
[   29.970962]  kasan_atomics+0x198/0x2e8
[   29.971639]  kunit_try_run_case+0x14c/0x3d0
[   29.972344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973114]  kthread+0x24c/0x2d0
[   29.973673]  ret_from_fork+0x10/0x20
[   29.974261] 
[   29.974603] Allocated by task 253:
[   29.975152]  kasan_save_stack+0x3c/0x68
[   29.975772]  kasan_save_track+0x20/0x40
[   29.976368]  kasan_save_alloc_info+0x40/0x58
[   29.977004]  __kasan_kmalloc+0xd4/0xd8
[   29.977582]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.978222]  kasan_atomics+0xb8/0x2e8
[   29.978808]  kunit_try_run_case+0x14c/0x3d0
[   29.979430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.980142]  kthread+0x24c/0x2d0
[   29.980677]  ret_from_fork+0x10/0x20
[   29.981281] 
[   29.981625] The buggy address belongs to the object at fff00000c12e8780
[   29.981625]  which belongs to the cache kmalloc-64 of size 64
[   29.982944] The buggy address is located 0 bytes to the right of
[   29.982944]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.984328] 
[   29.984738] The buggy address belongs to the physical page:
[   29.985385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.986397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.987277] page_type: f5(slab)
[   29.987819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.988744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.989606] page dumped because: kasan: bad access detected
[   29.990281] 
[   29.990632] Memory state around the buggy address:
[   29.991301]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.992159]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.992983] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.993792]                                      ^
[   29.994403]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995255]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.996055] ==================================================================
[   30.068427] ==================================================================
[   30.069099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.069863] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.070583] 
[   30.071009] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.072130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.072759] Hardware name: linux,dummy-virt (DT)
[   30.073295] Call trace:
[   30.073695]  show_stack+0x20/0x38 (C)
[   30.074295]  dump_stack_lvl+0x8c/0xd0
[   30.074939]  print_report+0x118/0x5e0
[   30.075542]  kasan_report+0xc8/0x118
[   30.076104]  kasan_check_range+0x100/0x1a8
[   30.076695]  __kasan_check_write+0x20/0x30
[   30.077282]  kasan_atomics_helper+0x16d0/0x4858
[   30.077901]  kasan_atomics+0x198/0x2e8
[   30.078519]  kunit_try_run_case+0x14c/0x3d0
[   30.079147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.079825]  kthread+0x24c/0x2d0
[   30.080401]  ret_from_fork+0x10/0x20
[   30.081006] 
[   30.081309] Allocated by task 253:
[   30.082098]  kasan_save_stack+0x3c/0x68
[   30.082657]  kasan_save_track+0x20/0x40
[   30.083183]  kasan_save_alloc_info+0x40/0x58
[   30.083798]  __kasan_kmalloc+0xd4/0xd8
[   30.084337]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.084988]  kasan_atomics+0xb8/0x2e8
[   30.085491]  kunit_try_run_case+0x14c/0x3d0
[   30.086123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.086856]  kthread+0x24c/0x2d0
[   30.087389]  ret_from_fork+0x10/0x20
[   30.087905] 
[   30.088220] The buggy address belongs to the object at fff00000c12e8780
[   30.088220]  which belongs to the cache kmalloc-64 of size 64
[   30.089448] The buggy address is located 0 bytes to the right of
[   30.089448]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.090733] 
[   30.091051] The buggy address belongs to the physical page:
[   30.091661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.092521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.093262] page_type: f5(slab)
[   30.093784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.094618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.095509] page dumped because: kasan: bad access detected
[   30.096121] 
[   30.096455] Memory state around the buggy address:
[   30.097048]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.097810]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.098625] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.099411]                                      ^
[   30.100018]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.100853]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.101614] ==================================================================
[   28.340078] ==================================================================
[   28.340847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   28.341518] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.342402] 
[   28.342763] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.343851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.344330] Hardware name: linux,dummy-virt (DT)
[   28.345025] Call trace:
[   28.345418]  show_stack+0x20/0x38 (C)
[   28.346005]  dump_stack_lvl+0x8c/0xd0
[   28.346502]  print_report+0x118/0x5e0
[   28.347113]  kasan_report+0xc8/0x118
[   28.347800]  kasan_check_range+0x100/0x1a8
[   28.348391]  __kasan_check_write+0x20/0x30
[   28.348991]  kasan_atomics_helper+0x54c/0x4858
[   28.349561]  kasan_atomics+0x198/0x2e8
[   28.350250]  kunit_try_run_case+0x14c/0x3d0
[   28.350882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.351655]  kthread+0x24c/0x2d0
[   28.352219]  ret_from_fork+0x10/0x20
[   28.352838] 
[   28.353163] Allocated by task 253:
[   28.353684]  kasan_save_stack+0x3c/0x68
[   28.354293]  kasan_save_track+0x20/0x40
[   28.354813]  kasan_save_alloc_info+0x40/0x58
[   28.355410]  __kasan_kmalloc+0xd4/0xd8
[   28.355994]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.356600]  kasan_atomics+0xb8/0x2e8
[   28.357199]  kunit_try_run_case+0x14c/0x3d0
[   28.357795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.358524]  kthread+0x24c/0x2d0
[   28.359066]  ret_from_fork+0x10/0x20
[   28.359608] 
[   28.359959] The buggy address belongs to the object at fff00000c12e8780
[   28.359959]  which belongs to the cache kmalloc-64 of size 64
[   28.361233] The buggy address is located 0 bytes to the right of
[   28.361233]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.362469] 
[   28.362809] The buggy address belongs to the physical page:
[   28.363466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.364299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.365047] page_type: f5(slab)
[   28.365588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.366405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.367252] page dumped because: kasan: bad access detected
[   28.367930] 
[   28.368242] Memory state around the buggy address:
[   28.368841]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.369574]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.370344] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.371115]                                      ^
[   28.371742]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.372526]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373332] ==================================================================
[   28.672354] ==================================================================
[   28.673129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   28.673937] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.674732] 
[   28.675078] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.676192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.676789] Hardware name: linux,dummy-virt (DT)
[   28.677333] Call trace:
[   28.677767]  show_stack+0x20/0x38 (C)
[   28.678342]  dump_stack_lvl+0x8c/0xd0
[   28.678940]  print_report+0x118/0x5e0
[   28.679444]  kasan_report+0xc8/0x118
[   28.680059]  kasan_check_range+0x100/0x1a8
[   28.680643]  __kasan_check_write+0x20/0x30
[   28.681249]  kasan_atomics_helper+0x934/0x4858
[   28.681843]  kasan_atomics+0x198/0x2e8
[   28.682470]  kunit_try_run_case+0x14c/0x3d0
[   28.683026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.683827]  kthread+0x24c/0x2d0
[   28.684393]  ret_from_fork+0x10/0x20
[   28.684944] 
[   28.685260] Allocated by task 253:
[   28.685678]  kasan_save_stack+0x3c/0x68
[   28.686258]  kasan_save_track+0x20/0x40
[   28.686833]  kasan_save_alloc_info+0x40/0x58
[   28.687389]  __kasan_kmalloc+0xd4/0xd8
[   28.688011]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.688581]  kasan_atomics+0xb8/0x2e8
[   28.689160]  kunit_try_run_case+0x14c/0x3d0
[   28.689750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.690406]  kthread+0x24c/0x2d0
[   28.690948]  ret_from_fork+0x10/0x20
[   28.691462] 
[   28.691773] The buggy address belongs to the object at fff00000c12e8780
[   28.691773]  which belongs to the cache kmalloc-64 of size 64
[   28.693005] The buggy address is located 0 bytes to the right of
[   28.693005]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.694294] 
[   28.694654] The buggy address belongs to the physical page:
[   28.695277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.696196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.696938] page_type: f5(slab)
[   28.697524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.698307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.699140] page dumped because: kasan: bad access detected
[   28.699819] 
[   28.700163] Memory state around the buggy address:
[   28.700782]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.701537]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.702345] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.703161]                                      ^
[   28.703795]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.704596]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.705414] ==================================================================
[   28.196141] ==================================================================
[   28.196770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   28.197658] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.198485] 
[   28.198844] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.199963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.200500] Hardware name: linux,dummy-virt (DT)
[   28.201197] Call trace:
[   28.201582]  show_stack+0x20/0x38 (C)
[   28.202205]  dump_stack_lvl+0x8c/0xd0
[   28.202820]  print_report+0x118/0x5e0
[   28.203373]  kasan_report+0xc8/0x118
[   28.204035]  kasan_check_range+0x100/0x1a8
[   28.204683]  __kasan_check_write+0x20/0x30
[   28.205291]  kasan_atomics_helper+0x3ac/0x4858
[   28.205907]  kasan_atomics+0x198/0x2e8
[   28.206509]  kunit_try_run_case+0x14c/0x3d0
[   28.207142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.207893]  kthread+0x24c/0x2d0
[   28.208457]  ret_from_fork+0x10/0x20
[   28.209017] 
[   28.209327] Allocated by task 253:
[   28.209880]  kasan_save_stack+0x3c/0x68
[   28.210417]  kasan_save_track+0x20/0x40
[   28.211002]  kasan_save_alloc_info+0x40/0x58
[   28.211583]  __kasan_kmalloc+0xd4/0xd8
[   28.212102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.212764]  kasan_atomics+0xb8/0x2e8
[   28.213276]  kunit_try_run_case+0x14c/0x3d0
[   28.213881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.214537]  kthread+0x24c/0x2d0
[   28.215040]  ret_from_fork+0x10/0x20
[   28.215536] 
[   28.215928] The buggy address belongs to the object at fff00000c12e8780
[   28.215928]  which belongs to the cache kmalloc-64 of size 64
[   28.217133] The buggy address is located 0 bytes to the right of
[   28.217133]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.218427] 
[   28.218766] The buggy address belongs to the physical page:
[   28.219372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.220323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.221070] page_type: f5(slab)
[   28.221580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.223329] page dumped because: kasan: bad access detected
[   28.223946] 
[   28.224302] Memory state around the buggy address:
[   28.224924]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.225824]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.226535] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.227384]                                      ^
[   28.227993]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.228818]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.229592] ==================================================================
[   28.230928] ==================================================================
[   28.231800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   28.232596] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.233388] 
[   28.233761] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.234771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.235271] Hardware name: linux,dummy-virt (DT)
[   28.235861] Call trace:
[   28.236339]  show_stack+0x20/0x38 (C)
[   28.236970]  dump_stack_lvl+0x8c/0xd0
[   28.237482]  print_report+0x118/0x5e0
[   28.238130]  kasan_report+0xc8/0x118
[   28.238658]  kasan_check_range+0x100/0x1a8
[   28.239329]  __kasan_check_write+0x20/0x30
[   28.239923]  kasan_atomics_helper+0x414/0x4858
[   28.240558]  kasan_atomics+0x198/0x2e8
[   28.241117]  kunit_try_run_case+0x14c/0x3d0
[   28.241795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.242530]  kthread+0x24c/0x2d0
[   28.243120]  ret_from_fork+0x10/0x20
[   28.243688] 
[   28.244040] Allocated by task 253:
[   28.244487]  kasan_save_stack+0x3c/0x68
[   28.245062]  kasan_save_track+0x20/0x40
[   28.245626]  kasan_save_alloc_info+0x40/0x58
[   28.246203]  __kasan_kmalloc+0xd4/0xd8
[   28.246750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.247342]  kasan_atomics+0xb8/0x2e8
[   28.247875]  kunit_try_run_case+0x14c/0x3d0
[   28.248435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.249140]  kthread+0x24c/0x2d0
[   28.249628]  ret_from_fork+0x10/0x20
[   28.250138] 
[   28.250448] The buggy address belongs to the object at fff00000c12e8780
[   28.250448]  which belongs to the cache kmalloc-64 of size 64
[   28.251695] The buggy address is located 0 bytes to the right of
[   28.251695]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.252974] 
[   28.253326] The buggy address belongs to the physical page:
[   28.253936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.254780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.255488] page_type: f5(slab)
[   28.255997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.256821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.257643] page dumped because: kasan: bad access detected
[   28.258328] 
[   28.258652] Memory state around the buggy address:
[   28.259237]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.260006]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.260824] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.261647]                                      ^
[   28.262279]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.263035]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.263833] ==================================================================
[   29.352046] ==================================================================
[   29.353552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.354390] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.355666] 
[   29.356151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.357332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.357993] Hardware name: linux,dummy-virt (DT)
[   29.358568] Call trace:
[   29.359131]  show_stack+0x20/0x38 (C)
[   29.359608]  dump_stack_lvl+0x8c/0xd0
[   29.360152]  print_report+0x118/0x5e0
[   29.360785]  kasan_report+0xc8/0x118
[   29.361403]  kasan_check_range+0x100/0x1a8
[   29.362037]  __kasan_check_write+0x20/0x30
[   29.362621]  kasan_atomics_helper+0xf20/0x4858
[   29.363276]  kasan_atomics+0x198/0x2e8
[   29.363890]  kunit_try_run_case+0x14c/0x3d0
[   29.364442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.365241]  kthread+0x24c/0x2d0
[   29.365759]  ret_from_fork+0x10/0x20
[   29.366368] 
[   29.366721] Allocated by task 253:
[   29.367164]  kasan_save_stack+0x3c/0x68
[   29.367744]  kasan_save_track+0x20/0x40
[   29.368300]  kasan_save_alloc_info+0x40/0x58
[   29.368874]  __kasan_kmalloc+0xd4/0xd8
[   29.369399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.369986]  kasan_atomics+0xb8/0x2e8
[   29.370516]  kunit_try_run_case+0x14c/0x3d0
[   29.371112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.371791]  kthread+0x24c/0x2d0
[   29.372257]  ret_from_fork+0x10/0x20
[   29.372819] 
[   29.373146] The buggy address belongs to the object at fff00000c12e8780
[   29.373146]  which belongs to the cache kmalloc-64 of size 64
[   29.374403] The buggy address is located 0 bytes to the right of
[   29.374403]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.375623] 
[   29.375970] The buggy address belongs to the physical page:
[   29.376655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.377458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.378288] page_type: f5(slab)
[   29.378812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.380555] page dumped because: kasan: bad access detected
[   29.381232] 
[   29.381539] Memory state around the buggy address:
[   29.382054]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.382865]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.383659] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.384503]                                      ^
[   29.385106]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.385916]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386689] ==================================================================
[   29.565902] ==================================================================
[   29.566539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.567547] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.568600] 
[   29.568945] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.570574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.571319] Hardware name: linux,dummy-virt (DT)
[   29.571888] Call trace:
[   29.572352]  show_stack+0x20/0x38 (C)
[   29.573044]  dump_stack_lvl+0x8c/0xd0
[   29.573712]  print_report+0x118/0x5e0
[   29.574277]  kasan_report+0xc8/0x118
[   29.574936]  kasan_check_range+0x100/0x1a8
[   29.575589]  __kasan_check_write+0x20/0x30
[   29.576224]  kasan_atomics_helper+0x1190/0x4858
[   29.576898]  kasan_atomics+0x198/0x2e8
[   29.577484]  kunit_try_run_case+0x14c/0x3d0
[   29.578143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.578979]  kthread+0x24c/0x2d0
[   29.579565]  ret_from_fork+0x10/0x20
[   29.580185] 
[   29.580565] Allocated by task 253:
[   29.581131]  kasan_save_stack+0x3c/0x68
[   29.581836]  kasan_save_track+0x20/0x40
[   29.582384]  kasan_save_alloc_info+0x40/0x58
[   29.583059]  __kasan_kmalloc+0xd4/0xd8
[   29.583625]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.584272]  kasan_atomics+0xb8/0x2e8
[   29.584870]  kunit_try_run_case+0x14c/0x3d0
[   29.585485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.586207]  kthread+0x24c/0x2d0
[   29.586753]  ret_from_fork+0x10/0x20
[   29.587310] 
[   29.587638] The buggy address belongs to the object at fff00000c12e8780
[   29.587638]  which belongs to the cache kmalloc-64 of size 64
[   29.589003] The buggy address is located 0 bytes to the right of
[   29.589003]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.590345] 
[   29.590659] The buggy address belongs to the physical page:
[   29.591318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.592290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.593097] page_type: f5(slab)
[   29.593631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.594512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.595407] page dumped because: kasan: bad access detected
[   29.596144] 
[   29.596505] Memory state around the buggy address:
[   29.597152]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598061]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598903] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.599723]                                      ^
[   29.600329]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.601183]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.601995] ==================================================================
[   29.105885] ==================================================================
[   29.106612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.107547] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.108327] 
[   29.108732] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.109880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.110440] Hardware name: linux,dummy-virt (DT)
[   29.111089] Call trace:
[   29.111481]  show_stack+0x20/0x38 (C)
[   29.112110]  dump_stack_lvl+0x8c/0xd0
[   29.112663]  print_report+0x118/0x5e0
[   29.113225]  kasan_report+0xc8/0x118
[   29.113804]  kasan_check_range+0x100/0x1a8
[   29.114443]  __kasan_check_write+0x20/0x30
[   29.115077]  kasan_atomics_helper+0xd3c/0x4858
[   29.115743]  kasan_atomics+0x198/0x2e8
[   29.116280]  kunit_try_run_case+0x14c/0x3d0
[   29.116927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.117586]  kthread+0x24c/0x2d0
[   29.118215]  ret_from_fork+0x10/0x20
[   29.118778] 
[   29.119143] Allocated by task 253:
[   29.119642]  kasan_save_stack+0x3c/0x68
[   29.120494]  kasan_save_track+0x20/0x40
[   29.121017]  kasan_save_alloc_info+0x40/0x58
[   29.121598]  __kasan_kmalloc+0xd4/0xd8
[   29.122294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.122862]  kasan_atomics+0xb8/0x2e8
[   29.123384]  kunit_try_run_case+0x14c/0x3d0
[   29.123949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.124658]  kthread+0x24c/0x2d0
[   29.125224]  ret_from_fork+0x10/0x20
[   29.125760] 
[   29.126141] The buggy address belongs to the object at fff00000c12e8780
[   29.126141]  which belongs to the cache kmalloc-64 of size 64
[   29.127368] The buggy address is located 0 bytes to the right of
[   29.127368]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.128629] 
[   29.128987] The buggy address belongs to the physical page:
[   29.129664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.130544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.131311] page_type: f5(slab)
[   29.131834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.132648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.133515] page dumped because: kasan: bad access detected
[   29.134146] 
[   29.134477] Memory state around the buggy address:
[   29.135139]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.135931]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.136785] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.137554]                                      ^
[   29.138182]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.138964]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139738] ==================================================================
[   29.142365] ==================================================================
[   29.143180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.143857] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.144508] 
[   29.145160] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.146886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.147554] Hardware name: linux,dummy-virt (DT)
[   29.148374] Call trace:
[   29.148910]  show_stack+0x20/0x38 (C)
[   29.149409]  dump_stack_lvl+0x8c/0xd0
[   29.149912]  print_report+0x118/0x5e0
[   29.150389]  kasan_report+0xc8/0x118
[   29.150998]  __asan_report_load4_noabort+0x20/0x30
[   29.151659]  kasan_atomics_helper+0x3e04/0x4858
[   29.152377]  kasan_atomics+0x198/0x2e8
[   29.152990]  kunit_try_run_case+0x14c/0x3d0
[   29.153613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.154264]  kthread+0x24c/0x2d0
[   29.154864]  ret_from_fork+0x10/0x20
[   29.155419] 
[   29.155788] Allocated by task 253:
[   29.156253]  kasan_save_stack+0x3c/0x68
[   29.156846]  kasan_save_track+0x20/0x40
[   29.157419]  kasan_save_alloc_info+0x40/0x58
[   29.157982]  __kasan_kmalloc+0xd4/0xd8
[   29.158592]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.159177]  kasan_atomics+0xb8/0x2e8
[   29.159807]  kunit_try_run_case+0x14c/0x3d0
[   29.160376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.161085]  kthread+0x24c/0x2d0
[   29.161573]  ret_from_fork+0x10/0x20
[   29.162048] 
[   29.162406] The buggy address belongs to the object at fff00000c12e8780
[   29.162406]  which belongs to the cache kmalloc-64 of size 64
[   29.163634] The buggy address is located 0 bytes to the right of
[   29.163634]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.164916] 
[   29.165240] The buggy address belongs to the physical page:
[   29.165930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.166805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.167555] page_type: f5(slab)
[   29.168016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.168904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.169741] page dumped because: kasan: bad access detected
[   29.170357] 
[   29.170708] Memory state around the buggy address:
[   29.171289]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.172029]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.172796] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.173647]                                      ^
[   29.174253]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175057]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175840] ==================================================================
[   29.493352] ==================================================================
[   29.494326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.496002] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.496937] 
[   29.497361] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.498372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.499099] Hardware name: linux,dummy-virt (DT)
[   29.499802] Call trace:
[   29.500295]  show_stack+0x20/0x38 (C)
[   29.500956]  dump_stack_lvl+0x8c/0xd0
[   29.501607]  print_report+0x118/0x5e0
[   29.502186]  kasan_report+0xc8/0x118
[   29.502740]  kasan_check_range+0x100/0x1a8
[   29.503325]  __kasan_check_write+0x20/0x30
[   29.503882]  kasan_atomics_helper+0x10c0/0x4858
[   29.504568]  kasan_atomics+0x198/0x2e8
[   29.505161]  kunit_try_run_case+0x14c/0x3d0
[   29.505846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.506546]  kthread+0x24c/0x2d0
[   29.507105]  ret_from_fork+0x10/0x20
[   29.507723] 
[   29.508038] Allocated by task 253:
[   29.508513]  kasan_save_stack+0x3c/0x68
[   29.509075]  kasan_save_track+0x20/0x40
[   29.509578]  kasan_save_alloc_info+0x40/0x58
[   29.510248]  __kasan_kmalloc+0xd4/0xd8
[   29.510833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.511426]  kasan_atomics+0xb8/0x2e8
[   29.511975]  kunit_try_run_case+0x14c/0x3d0
[   29.512535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.513146]  kthread+0x24c/0x2d0
[   29.513680]  ret_from_fork+0x10/0x20
[   29.514377] 
[   29.514676] The buggy address belongs to the object at fff00000c12e8780
[   29.514676]  which belongs to the cache kmalloc-64 of size 64
[   29.515937] The buggy address is located 0 bytes to the right of
[   29.515937]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.517241] 
[   29.517580] The buggy address belongs to the physical page:
[   29.518154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.518981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.519788] page_type: f5(slab)
[   29.520259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.521184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.521974] page dumped because: kasan: bad access detected
[   29.522618] 
[   29.522962] Memory state around the buggy address:
[   29.523559]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.524305]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.525115] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.525917]                                      ^
[   29.526559]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527325]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528103] ==================================================================
[   29.317335] ==================================================================
[   29.317959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.318960] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.319765] 
[   29.320110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.321197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.321673] Hardware name: linux,dummy-virt (DT)
[   29.322361] Call trace:
[   29.322757]  show_stack+0x20/0x38 (C)
[   29.323279]  dump_stack_lvl+0x8c/0xd0
[   29.323876]  print_report+0x118/0x5e0
[   29.324524]  kasan_report+0xc8/0x118
[   29.325058]  kasan_check_range+0x100/0x1a8
[   29.325664]  __kasan_check_write+0x20/0x30
[   29.326362]  kasan_atomics_helper+0xeb8/0x4858
[   29.327018]  kasan_atomics+0x198/0x2e8
[   29.327563]  kunit_try_run_case+0x14c/0x3d0
[   29.328155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.328847]  kthread+0x24c/0x2d0
[   29.329438]  ret_from_fork+0x10/0x20
[   29.330039] 
[   29.330327] Allocated by task 253:
[   29.330840]  kasan_save_stack+0x3c/0x68
[   29.331440]  kasan_save_track+0x20/0x40
[   29.332024]  kasan_save_alloc_info+0x40/0x58
[   29.332584]  __kasan_kmalloc+0xd4/0xd8
[   29.333174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.333694]  kasan_atomics+0xb8/0x2e8
[   29.334329]  kunit_try_run_case+0x14c/0x3d0
[   29.334923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.335515]  kthread+0x24c/0x2d0
[   29.336077]  ret_from_fork+0x10/0x20
[   29.336629] 
[   29.336947] The buggy address belongs to the object at fff00000c12e8780
[   29.336947]  which belongs to the cache kmalloc-64 of size 64
[   29.338237] The buggy address is located 0 bytes to the right of
[   29.338237]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.339491] 
[   29.339848] The buggy address belongs to the physical page:
[   29.340468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.341241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.342147] page_type: f5(slab)
[   29.342606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.343542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.344364] page dumped because: kasan: bad access detected
[   29.345029] 
[   29.345348] Memory state around the buggy address:
[   29.345924]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.346733]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.347543] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.348283]                                      ^
[   29.348870]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.349725]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.350523] ==================================================================
[   29.603921] ==================================================================
[   29.604454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.605440] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.606258] 
[   29.606637] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.607903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.608517] Hardware name: linux,dummy-virt (DT)
[   29.609188] Call trace:
[   29.609635]  show_stack+0x20/0x38 (C)
[   29.610197]  dump_stack_lvl+0x8c/0xd0
[   29.610932]  print_report+0x118/0x5e0
[   29.611499]  kasan_report+0xc8/0x118
[   29.612173]  kasan_check_range+0x100/0x1a8
[   29.612877]  __kasan_check_write+0x20/0x30
[   29.613514]  kasan_atomics_helper+0x11f8/0x4858
[   29.614199]  kasan_atomics+0x198/0x2e8
[   29.614803]  kunit_try_run_case+0x14c/0x3d0
[   29.615449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.616188]  kthread+0x24c/0x2d0
[   29.616766]  ret_from_fork+0x10/0x20
[   29.617364] 
[   29.617653] Allocated by task 253:
[   29.618189]  kasan_save_stack+0x3c/0x68
[   29.618809]  kasan_save_track+0x20/0x40
[   29.619433]  kasan_save_alloc_info+0x40/0x58
[   29.620088]  __kasan_kmalloc+0xd4/0xd8
[   29.620721]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.621634]  kasan_atomics+0xb8/0x2e8
[   29.622050]  kunit_try_run_case+0x14c/0x3d0
[   29.622839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.624111]  kthread+0x24c/0x2d0
[   29.624780]  ret_from_fork+0x10/0x20
[   29.625493] 
[   29.626493] The buggy address belongs to the object at fff00000c12e8780
[   29.626493]  which belongs to the cache kmalloc-64 of size 64
[   29.628547] The buggy address is located 0 bytes to the right of
[   29.628547]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.629843] 
[   29.630227] The buggy address belongs to the physical page:
[   29.630868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.631902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.632679] page_type: f5(slab)
[   29.633223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.634152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.635015] page dumped because: kasan: bad access detected
[   29.635713] 
[   29.636097] Memory state around the buggy address:
[   29.636746]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.637501]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.638397] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.639218]                                      ^
[   29.639856]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.640695]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.641496] ==================================================================
[   28.557256] ==================================================================
[   28.557985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   28.559014] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.559778] 
[   28.560152] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.561204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.561861] Hardware name: linux,dummy-virt (DT)
[   28.562727] Call trace:
[   28.563202]  show_stack+0x20/0x38 (C)
[   28.563947]  dump_stack_lvl+0x8c/0xd0
[   28.564623]  print_report+0x118/0x5e0
[   28.565317]  kasan_report+0xc8/0x118
[   28.565970]  kasan_check_range+0x100/0x1a8
[   28.566635]  __kasan_check_write+0x20/0x30
[   28.567332]  kasan_atomics_helper+0x7cc/0x4858
[   28.568042]  kasan_atomics+0x198/0x2e8
[   28.568723]  kunit_try_run_case+0x14c/0x3d0
[   28.569485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.570292]  kthread+0x24c/0x2d0
[   28.570889]  ret_from_fork+0x10/0x20
[   28.571525] 
[   28.571956] Allocated by task 253:
[   28.572512]  kasan_save_stack+0x3c/0x68
[   28.573173]  kasan_save_track+0x20/0x40
[   28.573835]  kasan_save_alloc_info+0x40/0x58
[   28.574519]  __kasan_kmalloc+0xd4/0xd8
[   28.575131]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.575813]  kasan_atomics+0xb8/0x2e8
[   28.576501]  kunit_try_run_case+0x14c/0x3d0
[   28.577194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.577947]  kthread+0x24c/0x2d0
[   28.578528]  ret_from_fork+0x10/0x20
[   28.579139] 
[   28.579516] The buggy address belongs to the object at fff00000c12e8780
[   28.579516]  which belongs to the cache kmalloc-64 of size 64
[   28.580940] The buggy address is located 0 bytes to the right of
[   28.580940]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.582447] 
[   28.582905] The buggy address belongs to the physical page:
[   28.583582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.584577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.585411] page_type: f5(slab)
[   28.586010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.587158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.588061] page dumped because: kasan: bad access detected
[   28.588828] 
[   28.589265] Memory state around the buggy address:
[   28.589968]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.590902]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.591780] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.592589]                                      ^
[   28.593283]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.594152]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.594981] ==================================================================
[   29.643185] ==================================================================
[   29.644062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.644795] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.645643] 
[   29.645971] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.647496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.648129] Hardware name: linux,dummy-virt (DT)
[   29.648580] Call trace:
[   29.649024]  show_stack+0x20/0x38 (C)
[   29.649660]  dump_stack_lvl+0x8c/0xd0
[   29.650208]  print_report+0x118/0x5e0
[   29.650820]  kasan_report+0xc8/0x118
[   29.651386]  kasan_check_range+0x100/0x1a8
[   29.652025]  __kasan_check_write+0x20/0x30
[   29.652684]  kasan_atomics_helper+0x126c/0x4858
[   29.653393]  kasan_atomics+0x198/0x2e8
[   29.653932]  kunit_try_run_case+0x14c/0x3d0
[   29.654505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.655245]  kthread+0x24c/0x2d0
[   29.655843]  ret_from_fork+0x10/0x20
[   29.656398] 
[   29.656783] Allocated by task 253:
[   29.657217]  kasan_save_stack+0x3c/0x68
[   29.657822]  kasan_save_track+0x20/0x40
[   29.658483]  kasan_save_alloc_info+0x40/0x58
[   29.659015]  __kasan_kmalloc+0xd4/0xd8
[   29.659630]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.660237]  kasan_atomics+0xb8/0x2e8
[   29.660778]  kunit_try_run_case+0x14c/0x3d0
[   29.661345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.662022]  kthread+0x24c/0x2d0
[   29.662491]  ret_from_fork+0x10/0x20
[   29.663066] 
[   29.663370] The buggy address belongs to the object at fff00000c12e8780
[   29.663370]  which belongs to the cache kmalloc-64 of size 64
[   29.664528] The buggy address is located 0 bytes to the right of
[   29.664528]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.666212] 
[   29.666467] The buggy address belongs to the physical page:
[   29.666970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.667612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.668346] page_type: f5(slab)
[   29.669282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.670283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.670981] page dumped because: kasan: bad access detected
[   29.671634] 
[   29.672089] Memory state around the buggy address:
[   29.672783]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.673725]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.674471] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.675396]                                      ^
[   29.675940]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.677090]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.678034] ==================================================================
[   28.046793] ==================================================================
[   28.047786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   28.048862] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.049859] 
[   28.050170] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.051558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.052406] Hardware name: linux,dummy-virt (DT)
[   28.053088] Call trace:
[   28.053621]  show_stack+0x20/0x38 (C)
[   28.054328]  dump_stack_lvl+0x8c/0xd0
[   28.055065]  print_report+0x118/0x5e0
[   28.055607]  kasan_report+0xc8/0x118
[   28.056240]  kasan_check_range+0x100/0x1a8
[   28.056981]  __kasan_check_read+0x20/0x30
[   28.057648]  kasan_atomics_helper+0x2b0/0x4858
[   28.058400]  kasan_atomics+0x198/0x2e8
[   28.059109]  kunit_try_run_case+0x14c/0x3d0
[   28.059807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.060547]  kthread+0x24c/0x2d0
[   28.061138]  ret_from_fork+0x10/0x20
[   28.061765] 
[   28.062092] Allocated by task 253:
[   28.062596]  kasan_save_stack+0x3c/0x68
[   28.063312]  kasan_save_track+0x20/0x40
[   28.063944]  kasan_save_alloc_info+0x40/0x58
[   28.064544]  __kasan_kmalloc+0xd4/0xd8
[   28.065181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.065896]  kasan_atomics+0xb8/0x2e8
[   28.066417]  kunit_try_run_case+0x14c/0x3d0
[   28.067057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.068006]  kthread+0x24c/0x2d0
[   28.068730]  ret_from_fork+0x10/0x20
[   28.069548] 
[   28.070139] The buggy address belongs to the object at fff00000c12e8780
[   28.070139]  which belongs to the cache kmalloc-64 of size 64
[   28.071568] The buggy address is located 0 bytes to the right of
[   28.071568]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.072924] 
[   28.073244] The buggy address belongs to the physical page:
[   28.073997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.075239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.075998] page_type: f5(slab)
[   28.076523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.077418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.078268] page dumped because: kasan: bad access detected
[   28.078942] 
[   28.079288] Memory state around the buggy address:
[   28.080217]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.080983]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.081904] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.082740]                                      ^
[   28.083454]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.084260]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.085253] ==================================================================
[   29.822237] ==================================================================
[   29.822895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.823847] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.824636] 
[   29.825004] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.826157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.826667] Hardware name: linux,dummy-virt (DT)
[   29.827201] Call trace:
[   29.827591]  show_stack+0x20/0x38 (C)
[   29.828205]  dump_stack_lvl+0x8c/0xd0
[   29.828827]  print_report+0x118/0x5e0
[   29.829384]  kasan_report+0xc8/0x118
[   29.829970]  kasan_check_range+0x100/0x1a8
[   29.830625]  __kasan_check_write+0x20/0x30
[   29.831440]  kasan_atomics_helper+0x147c/0x4858
[   29.832144]  kasan_atomics+0x198/0x2e8
[   29.832693]  kunit_try_run_case+0x14c/0x3d0
[   29.833229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.833882]  kthread+0x24c/0x2d0
[   29.834400]  ret_from_fork+0x10/0x20
[   29.834977] 
[   29.835344] Allocated by task 253:
[   29.835800]  kasan_save_stack+0x3c/0x68
[   29.836402]  kasan_save_track+0x20/0x40
[   29.836959]  kasan_save_alloc_info+0x40/0x58
[   29.837587]  __kasan_kmalloc+0xd4/0xd8
[   29.838137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.838798]  kasan_atomics+0xb8/0x2e8
[   29.839328]  kunit_try_run_case+0x14c/0x3d0
[   29.839901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.840518]  kthread+0x24c/0x2d0
[   29.841135]  ret_from_fork+0x10/0x20
[   29.841604] 
[   29.841950] The buggy address belongs to the object at fff00000c12e8780
[   29.841950]  which belongs to the cache kmalloc-64 of size 64
[   29.843245] The buggy address is located 0 bytes to the right of
[   29.843245]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.844507] 
[   29.844853] The buggy address belongs to the physical page:
[   29.845611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.846506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.847259] page_type: f5(slab)
[   29.847762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.848601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.849460] page dumped because: kasan: bad access detected
[   29.850101] 
[   29.850409] Memory state around the buggy address:
[   29.851015]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851795]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.852525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.853366]                                      ^
[   29.854028]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.854805]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.855553] ==================================================================
[   29.857100] ==================================================================
[   29.857835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.858453] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.859507] 
[   29.859906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.861123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.861640] Hardware name: linux,dummy-virt (DT)
[   29.862235] Call trace:
[   29.862667]  show_stack+0x20/0x38 (C)
[   29.863221]  dump_stack_lvl+0x8c/0xd0
[   29.863789]  print_report+0x118/0x5e0
[   29.864319]  kasan_report+0xc8/0x118
[   29.864949]  kasan_check_range+0x100/0x1a8
[   29.865660]  __kasan_check_write+0x20/0x30
[   29.866264]  kasan_atomics_helper+0x14e4/0x4858
[   29.867042]  kasan_atomics+0x198/0x2e8
[   29.867651]  kunit_try_run_case+0x14c/0x3d0
[   29.868248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.868905]  kthread+0x24c/0x2d0
[   29.869511]  ret_from_fork+0x10/0x20
[   29.870085] 
[   29.870427] Allocated by task 253:
[   29.870906]  kasan_save_stack+0x3c/0x68
[   29.871501]  kasan_save_track+0x20/0x40
[   29.872028]  kasan_save_alloc_info+0x40/0x58
[   29.872548]  __kasan_kmalloc+0xd4/0xd8
[   29.873142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.873903]  kasan_atomics+0xb8/0x2e8
[   29.874446]  kunit_try_run_case+0x14c/0x3d0
[   29.874997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.875726]  kthread+0x24c/0x2d0
[   29.876215]  ret_from_fork+0x10/0x20
[   29.876755] 
[   29.877066] The buggy address belongs to the object at fff00000c12e8780
[   29.877066]  which belongs to the cache kmalloc-64 of size 64
[   29.878219] The buggy address is located 0 bytes to the right of
[   29.878219]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.879414] 
[   29.879804] The buggy address belongs to the physical page:
[   29.880464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.881297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.882073] page_type: f5(slab)
[   29.882628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.883453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.884333] page dumped because: kasan: bad access detected
[   29.885021] 
[   29.885345] Memory state around the buggy address:
[   29.885959]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.886735]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.887525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.888301]                                      ^
[   29.888907]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889669]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.890508] ==================================================================
[   28.125057] ==================================================================
[   28.125843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.127550] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.128421] 
[   28.128764] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.129923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.130462] Hardware name: linux,dummy-virt (DT)
[   28.131123] Call trace:
[   28.131531]  show_stack+0x20/0x38 (C)
[   28.132100]  dump_stack_lvl+0x8c/0xd0
[   28.132816]  print_report+0x118/0x5e0
[   28.133302]  kasan_report+0xc8/0x118
[   28.133800]  kasan_check_range+0x100/0x1a8
[   28.134395]  __kasan_check_write+0x20/0x30
[   28.135169]  kasan_atomics_helper+0x32c/0x4858
[   28.135883]  kasan_atomics+0x198/0x2e8
[   28.136479]  kunit_try_run_case+0x14c/0x3d0
[   28.137140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.137826]  kthread+0x24c/0x2d0
[   28.138339]  ret_from_fork+0x10/0x20
[   28.138878] 
[   28.139250] Allocated by task 253:
[   28.139685]  kasan_save_stack+0x3c/0x68
[   28.140315]  kasan_save_track+0x20/0x40
[   28.140877]  kasan_save_alloc_info+0x40/0x58
[   28.141438]  __kasan_kmalloc+0xd4/0xd8
[   28.141992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.142588]  kasan_atomics+0xb8/0x2e8
[   28.143166]  kunit_try_run_case+0x14c/0x3d0
[   28.143767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.144459]  kthread+0x24c/0x2d0
[   28.144948]  ret_from_fork+0x10/0x20
[   28.145469] 
[   28.145805] The buggy address belongs to the object at fff00000c12e8780
[   28.145805]  which belongs to the cache kmalloc-64 of size 64
[   28.147029] The buggy address is located 0 bytes to the right of
[   28.147029]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.148202] 
[   28.148579] The buggy address belongs to the physical page:
[   28.149182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.150110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.150841] page_type: f5(slab)
[   28.151302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.152107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.152984] page dumped because: kasan: bad access detected
[   28.153624] 
[   28.153863] Memory state around the buggy address:
[   28.154452]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.155304]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.156057] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.156968]                                      ^
[   28.157474]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.158345]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.159104] ==================================================================
[   29.422742] ==================================================================
[   29.423524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.424423] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.425333] 
[   29.425724] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.426785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.427269] Hardware name: linux,dummy-virt (DT)
[   29.427842] Call trace:
[   29.428285]  show_stack+0x20/0x38 (C)
[   29.428813]  dump_stack_lvl+0x8c/0xd0
[   29.429492]  print_report+0x118/0x5e0
[   29.430006]  kasan_report+0xc8/0x118
[   29.430672]  kasan_check_range+0x100/0x1a8
[   29.431252]  __kasan_check_write+0x20/0x30
[   29.431921]  kasan_atomics_helper+0xff0/0x4858
[   29.432539]  kasan_atomics+0x198/0x2e8
[   29.433152]  kunit_try_run_case+0x14c/0x3d0
[   29.433777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434506]  kthread+0x24c/0x2d0
[   29.435026]  ret_from_fork+0x10/0x20
[   29.435596] 
[   29.435937] Allocated by task 253:
[   29.436375]  kasan_save_stack+0x3c/0x68
[   29.437034]  kasan_save_track+0x20/0x40
[   29.437589]  kasan_save_alloc_info+0x40/0x58
[   29.438304]  __kasan_kmalloc+0xd4/0xd8
[   29.438861]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.439411]  kasan_atomics+0xb8/0x2e8
[   29.439979]  kunit_try_run_case+0x14c/0x3d0
[   29.440624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.441304]  kthread+0x24c/0x2d0
[   29.441754]  ret_from_fork+0x10/0x20
[   29.442350] 
[   29.442681] The buggy address belongs to the object at fff00000c12e8780
[   29.442681]  which belongs to the cache kmalloc-64 of size 64
[   29.443820] The buggy address is located 0 bytes to the right of
[   29.443820]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.445157] 
[   29.445527] The buggy address belongs to the physical page:
[   29.446104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.447048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.447787] page_type: f5(slab)
[   29.448367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.449227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.450146] page dumped because: kasan: bad access detected
[   29.450867] 
[   29.451172] Memory state around the buggy address:
[   29.451692]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.452497]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.453297] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.454157]                                      ^
[   29.454744]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.455527]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.456306] ==================================================================
[   29.245899] ==================================================================
[   29.246645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.247373] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.248317] 
[   29.248772] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.251084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.251648] Hardware name: linux,dummy-virt (DT)
[   29.252412] Call trace:
[   29.252830]  show_stack+0x20/0x38 (C)
[   29.253474]  dump_stack_lvl+0x8c/0xd0
[   29.254082]  print_report+0x118/0x5e0
[   29.254679]  kasan_report+0xc8/0x118
[   29.255290]  kasan_check_range+0x100/0x1a8
[   29.255908]  __kasan_check_write+0x20/0x30
[   29.256506]  kasan_atomics_helper+0xe44/0x4858
[   29.257220]  kasan_atomics+0x198/0x2e8
[   29.257827]  kunit_try_run_case+0x14c/0x3d0
[   29.258474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259212]  kthread+0x24c/0x2d0
[   29.259760]  ret_from_fork+0x10/0x20
[   29.260314] 
[   29.260642] Allocated by task 253:
[   29.261145]  kasan_save_stack+0x3c/0x68
[   29.261650]  kasan_save_track+0x20/0x40
[   29.262299]  kasan_save_alloc_info+0x40/0x58
[   29.262867]  __kasan_kmalloc+0xd4/0xd8
[   29.263439]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.264113]  kasan_atomics+0xb8/0x2e8
[   29.264636]  kunit_try_run_case+0x14c/0x3d0
[   29.265228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.265869]  kthread+0x24c/0x2d0
[   29.266400]  ret_from_fork+0x10/0x20
[   29.266932] 
[   29.267250] The buggy address belongs to the object at fff00000c12e8780
[   29.267250]  which belongs to the cache kmalloc-64 of size 64
[   29.268507] The buggy address is located 0 bytes to the right of
[   29.268507]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.269822] 
[   29.270183] The buggy address belongs to the physical page:
[   29.270752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.271743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.272522] page_type: f5(slab)
[   29.273178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.274051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.274891] page dumped because: kasan: bad access detected
[   29.275486] 
[   29.275816] Memory state around the buggy address:
[   29.276393]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.277289]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.278023] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.278907]                                      ^
[   29.279553]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.280336]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.281176] ==================================================================
[   28.849655] ==================================================================
[   28.850473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   28.851241] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.852740] 
[   28.853243] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.854360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.855007] Hardware name: linux,dummy-virt (DT)
[   28.855629] Call trace:
[   28.856066]  show_stack+0x20/0x38 (C)
[   28.856721]  dump_stack_lvl+0x8c/0xd0
[   28.857351]  print_report+0x118/0x5e0
[   28.857940]  kasan_report+0xc8/0x118
[   28.858410]  __asan_report_load4_noabort+0x20/0x30
[   28.859113]  kasan_atomics_helper+0x3dcc/0x4858
[   28.859667]  kasan_atomics+0x198/0x2e8
[   28.860289]  kunit_try_run_case+0x14c/0x3d0
[   28.860929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.861732]  kthread+0x24c/0x2d0
[   28.862240]  ret_from_fork+0x10/0x20
[   28.862784] 
[   28.863160] Allocated by task 253:
[   28.863670]  kasan_save_stack+0x3c/0x68
[   28.864218]  kasan_save_track+0x20/0x40
[   28.864791]  kasan_save_alloc_info+0x40/0x58
[   28.865430]  __kasan_kmalloc+0xd4/0xd8
[   28.865915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.866610]  kasan_atomics+0xb8/0x2e8
[   28.867133]  kunit_try_run_case+0x14c/0x3d0
[   28.867686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.868355]  kthread+0x24c/0x2d0
[   28.868920]  ret_from_fork+0x10/0x20
[   28.869420] 
[   28.869787] The buggy address belongs to the object at fff00000c12e8780
[   28.869787]  which belongs to the cache kmalloc-64 of size 64
[   28.871006] The buggy address is located 0 bytes to the right of
[   28.871006]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.872255] 
[   28.872615] The buggy address belongs to the physical page:
[   28.873334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.874268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.875012] page_type: f5(slab)
[   28.875482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.876338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.877127] page dumped because: kasan: bad access detected
[   28.877811] 
[   28.878122] Memory state around the buggy address:
[   28.878680]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.879475]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.880276] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.881065]                                      ^
[   28.881678]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882555]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.883380] ==================================================================
[   30.138114] ==================================================================
[   30.138865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.139808] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.141441] 
[   30.141906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.142993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.143490] Hardware name: linux,dummy-virt (DT)
[   30.144106] Call trace:
[   30.144515]  show_stack+0x20/0x38 (C)
[   30.145075]  dump_stack_lvl+0x8c/0xd0
[   30.145720]  print_report+0x118/0x5e0
[   30.146268]  kasan_report+0xc8/0x118
[   30.146793]  kasan_check_range+0x100/0x1a8
[   30.147433]  __kasan_check_write+0x20/0x30
[   30.148061]  kasan_atomics_helper+0x175c/0x4858
[   30.148694]  kasan_atomics+0x198/0x2e8
[   30.149284]  kunit_try_run_case+0x14c/0x3d0
[   30.149919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.150667]  kthread+0x24c/0x2d0
[   30.151214]  ret_from_fork+0x10/0x20
[   30.151763] 
[   30.152087] Allocated by task 253:
[   30.152547]  kasan_save_stack+0x3c/0x68
[   30.153173]  kasan_save_track+0x20/0x40
[   30.153736]  kasan_save_alloc_info+0x40/0x58
[   30.154364]  __kasan_kmalloc+0xd4/0xd8
[   30.154910]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.155488]  kasan_atomics+0xb8/0x2e8
[   30.156153]  kunit_try_run_case+0x14c/0x3d0
[   30.156743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.157447]  kthread+0x24c/0x2d0
[   30.157911]  ret_from_fork+0x10/0x20
[   30.158448] 
[   30.158812] The buggy address belongs to the object at fff00000c12e8780
[   30.158812]  which belongs to the cache kmalloc-64 of size 64
[   30.159980] The buggy address is located 0 bytes to the right of
[   30.159980]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.161298] 
[   30.161636] The buggy address belongs to the physical page:
[   30.162275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.163148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.163869] page_type: f5(slab)
[   30.164321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.165256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.166066] page dumped because: kasan: bad access detected
[   30.166729] 
[   30.167047] Memory state around the buggy address:
[   30.167604]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.168404]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.169149] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.169974]                                      ^
[   30.170561]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171335]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.172056] ==================================================================
[   27.929632] ==================================================================
[   27.930312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   27.931117] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.932785] 
[   27.933263] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.935162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.936001] Hardware name: linux,dummy-virt (DT)
[   27.936575] Call trace:
[   27.936853]  show_stack+0x20/0x38 (C)
[   27.937543]  dump_stack_lvl+0x8c/0xd0
[   27.938145]  print_report+0x118/0x5e0
[   27.938834]  kasan_report+0xc8/0x118
[   27.939432]  __asan_report_store4_noabort+0x20/0x30
[   27.940184]  kasan_atomics_helper+0x3f7c/0x4858
[   27.940868]  kasan_atomics+0x198/0x2e8
[   27.941469]  kunit_try_run_case+0x14c/0x3d0
[   27.942117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.942904]  kthread+0x24c/0x2d0
[   27.943517]  ret_from_fork+0x10/0x20
[   27.944225] 
[   27.944462] Allocated by task 253:
[   27.945186]  kasan_save_stack+0x3c/0x68
[   27.945845]  kasan_save_track+0x20/0x40
[   27.946467]  kasan_save_alloc_info+0x40/0x58
[   27.947126]  __kasan_kmalloc+0xd4/0xd8
[   27.947622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.948420]  kasan_atomics+0xb8/0x2e8
[   27.949035]  kunit_try_run_case+0x14c/0x3d0
[   27.949665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.950389]  kthread+0x24c/0x2d0
[   27.951002]  ret_from_fork+0x10/0x20
[   27.951561] 
[   27.951933] The buggy address belongs to the object at fff00000c12e8780
[   27.951933]  which belongs to the cache kmalloc-64 of size 64
[   27.953408] The buggy address is located 0 bytes to the right of
[   27.953408]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.954472] 
[   27.954742] The buggy address belongs to the physical page:
[   27.955483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.956323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.957372] page_type: f5(slab)
[   27.958024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.959180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.960012] page dumped because: kasan: bad access detected
[   27.960339] 
[   27.960480] Memory state around the buggy address:
[   27.960776]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.961322]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.962292] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.963137]                                      ^
[   27.963816]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.964740]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.965548] ==================================================================
[   29.786318] ==================================================================
[   29.787011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.788191] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.789876] 
[   29.790278] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.791583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.792116] Hardware name: linux,dummy-virt (DT)
[   29.792693] Call trace:
[   29.793114]  show_stack+0x20/0x38 (C)
[   29.793642]  dump_stack_lvl+0x8c/0xd0
[   29.794244]  print_report+0x118/0x5e0
[   29.794804]  kasan_report+0xc8/0x118
[   29.795396]  kasan_check_range+0x100/0x1a8
[   29.796016]  __kasan_check_write+0x20/0x30
[   29.796671]  kasan_atomics_helper+0x1414/0x4858
[   29.797352]  kasan_atomics+0x198/0x2e8
[   29.797992]  kunit_try_run_case+0x14c/0x3d0
[   29.798584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.799251]  kthread+0x24c/0x2d0
[   29.799819]  ret_from_fork+0x10/0x20
[   29.800221] 
[   29.800596] Allocated by task 253:
[   29.801113]  kasan_save_stack+0x3c/0x68
[   29.801630]  kasan_save_track+0x20/0x40
[   29.802227]  kasan_save_alloc_info+0x40/0x58
[   29.802885]  __kasan_kmalloc+0xd4/0xd8
[   29.803410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.803974]  kasan_atomics+0xb8/0x2e8
[   29.804559]  kunit_try_run_case+0x14c/0x3d0
[   29.805148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.805795]  kthread+0x24c/0x2d0
[   29.806338]  ret_from_fork+0x10/0x20
[   29.806890] 
[   29.807203] The buggy address belongs to the object at fff00000c12e8780
[   29.807203]  which belongs to the cache kmalloc-64 of size 64
[   29.808473] The buggy address is located 0 bytes to the right of
[   29.808473]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.809690] 
[   29.810021] The buggy address belongs to the physical page:
[   29.810712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.811527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.812358] page_type: f5(slab)
[   29.812910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.813758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.814583] page dumped because: kasan: bad access detected
[   29.815253] 
[   29.815573] Memory state around the buggy address:
[   29.816161]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816910]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.817749] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.818530]                                      ^
[   29.819183]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.819972]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.820818] ==================================================================
[   28.412064] ==================================================================
[   28.412945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   28.413648] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.414323] 
[   28.414549] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.415577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.416181] Hardware name: linux,dummy-virt (DT)
[   28.416729] Call trace:
[   28.417209]  show_stack+0x20/0x38 (C)
[   28.417852]  dump_stack_lvl+0x8c/0xd0
[   28.418488]  print_report+0x118/0x5e0
[   28.419239]  kasan_report+0xc8/0x118
[   28.419811]  kasan_check_range+0x100/0x1a8
[   28.420532]  __kasan_check_write+0x20/0x30
[   28.421220]  kasan_atomics_helper+0x61c/0x4858
[   28.422003]  kasan_atomics+0x198/0x2e8
[   28.422658]  kunit_try_run_case+0x14c/0x3d0
[   28.423377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.424167]  kthread+0x24c/0x2d0
[   28.424670]  ret_from_fork+0x10/0x20
[   28.425332] 
[   28.425679] Allocated by task 253:
[   28.426171]  kasan_save_stack+0x3c/0x68
[   28.426754]  kasan_save_track+0x20/0x40
[   28.427275]  kasan_save_alloc_info+0x40/0x58
[   28.427798]  __kasan_kmalloc+0xd4/0xd8
[   28.428365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.428898]  kasan_atomics+0xb8/0x2e8
[   28.429499]  kunit_try_run_case+0x14c/0x3d0
[   28.430095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.430755]  kthread+0x24c/0x2d0
[   28.431272]  ret_from_fork+0x10/0x20
[   28.431834] 
[   28.432125] The buggy address belongs to the object at fff00000c12e8780
[   28.432125]  which belongs to the cache kmalloc-64 of size 64
[   28.433352] The buggy address is located 0 bytes to the right of
[   28.433352]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.434629] 
[   28.434949] The buggy address belongs to the physical page:
[   28.435563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.436489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.437350] page_type: f5(slab)
[   28.437870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.438762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.439501] page dumped because: kasan: bad access detected
[   28.440219] 
[   28.440559] Memory state around the buggy address:
[   28.441154]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.441969]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.442792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.443575]                                      ^
[   28.444187]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.444981]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445793] ==================================================================
[   29.458906] ==================================================================
[   29.459747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.460434] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.461223] 
[   29.461601] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.462677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.463333] Hardware name: linux,dummy-virt (DT)
[   29.463859] Call trace:
[   29.464335]  show_stack+0x20/0x38 (C)
[   29.464962]  dump_stack_lvl+0x8c/0xd0
[   29.465517]  print_report+0x118/0x5e0
[   29.466050]  kasan_report+0xc8/0x118
[   29.466646]  kasan_check_range+0x100/0x1a8
[   29.467217]  __kasan_check_write+0x20/0x30
[   29.467837]  kasan_atomics_helper+0x1058/0x4858
[   29.468495]  kasan_atomics+0x198/0x2e8
[   29.469111]  kunit_try_run_case+0x14c/0x3d0
[   29.469763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470472]  kthread+0x24c/0x2d0
[   29.471081]  ret_from_fork+0x10/0x20
[   29.471587] 
[   29.471944] Allocated by task 253:
[   29.472416]  kasan_save_stack+0x3c/0x68
[   29.473081]  kasan_save_track+0x20/0x40
[   29.473614]  kasan_save_alloc_info+0x40/0x58
[   29.474184]  __kasan_kmalloc+0xd4/0xd8
[   29.474653]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.475323]  kasan_atomics+0xb8/0x2e8
[   29.475845]  kunit_try_run_case+0x14c/0x3d0
[   29.476367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.477110]  kthread+0x24c/0x2d0
[   29.477594]  ret_from_fork+0x10/0x20
[   29.478125] 
[   29.478445] The buggy address belongs to the object at fff00000c12e8780
[   29.478445]  which belongs to the cache kmalloc-64 of size 64
[   29.479607] The buggy address is located 0 bytes to the right of
[   29.479607]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.480862] 
[   29.481197] The buggy address belongs to the physical page:
[   29.481762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.482658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.483464] page_type: f5(slab)
[   29.483950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.484871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.485673] page dumped because: kasan: bad access detected
[   29.486318] 
[   29.486668] Memory state around the buggy address:
[   29.487265]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.488041]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.488846] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.489691]                                      ^
[   29.490287]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491085]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491839] ==================================================================
[   30.032731] ==================================================================
[   30.033567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.034560] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.035630] 
[   30.035983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.037041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.037529] Hardware name: linux,dummy-virt (DT)
[   30.038164] Call trace:
[   30.038590]  show_stack+0x20/0x38 (C)
[   30.039245]  dump_stack_lvl+0x8c/0xd0
[   30.039839]  print_report+0x118/0x5e0
[   30.040430]  kasan_report+0xc8/0x118
[   30.040998]  __asan_report_load8_noabort+0x20/0x30
[   30.041675]  kasan_atomics_helper+0x3df4/0x4858
[   30.042292]  kasan_atomics+0x198/0x2e8
[   30.042883]  kunit_try_run_case+0x14c/0x3d0
[   30.043484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.044210]  kthread+0x24c/0x2d0
[   30.044819]  ret_from_fork+0x10/0x20
[   30.045402] 
[   30.045739] Allocated by task 253:
[   30.046164]  kasan_save_stack+0x3c/0x68
[   30.046733]  kasan_save_track+0x20/0x40
[   30.047295]  kasan_save_alloc_info+0x40/0x58
[   30.047914]  __kasan_kmalloc+0xd4/0xd8
[   30.048494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.049111]  kasan_atomics+0xb8/0x2e8
[   30.049680]  kunit_try_run_case+0x14c/0x3d0
[   30.050315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.051031]  kthread+0x24c/0x2d0
[   30.051548]  ret_from_fork+0x10/0x20
[   30.052073] 
[   30.052403] The buggy address belongs to the object at fff00000c12e8780
[   30.052403]  which belongs to the cache kmalloc-64 of size 64
[   30.053610] The buggy address is located 0 bytes to the right of
[   30.053610]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.054919] 
[   30.055284] The buggy address belongs to the physical page:
[   30.055879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.056784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.057491] page_type: f5(slab)
[   30.058024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.058816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.059736] page dumped because: kasan: bad access detected
[   30.060355] 
[   30.060676] Memory state around the buggy address:
[   30.061267]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062043]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062826] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.063592]                                      ^
[   30.064189]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065016]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065775] ==================================================================
[   28.885834] ==================================================================
[   28.886760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   28.887740] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.888531] 
[   28.888931] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.890212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.890443] Hardware name: linux,dummy-virt (DT)
[   28.890685] Call trace:
[   28.890883]  show_stack+0x20/0x38 (C)
[   28.891131]  dump_stack_lvl+0x8c/0xd0
[   28.891372]  print_report+0x118/0x5e0
[   28.891611]  kasan_report+0xc8/0x118
[   28.892591]  kasan_check_range+0x100/0x1a8
[   28.893548]  __kasan_check_write+0x20/0x30
[   28.894383]  kasan_atomics_helper+0xb70/0x4858
[   28.895173]  kasan_atomics+0x198/0x2e8
[   28.895667]  kunit_try_run_case+0x14c/0x3d0
[   28.896384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.897158]  kthread+0x24c/0x2d0
[   28.897802]  ret_from_fork+0x10/0x20
[   28.898400] 
[   28.898839] Allocated by task 253:
[   28.899511]  kasan_save_stack+0x3c/0x68
[   28.900087]  kasan_save_track+0x20/0x40
[   28.900717]  kasan_save_alloc_info+0x40/0x58
[   28.901367]  __kasan_kmalloc+0xd4/0xd8
[   28.901972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.902651]  kasan_atomics+0xb8/0x2e8
[   28.903289]  kunit_try_run_case+0x14c/0x3d0
[   28.903955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.904724]  kthread+0x24c/0x2d0
[   28.905257]  ret_from_fork+0x10/0x20
[   28.905827] 
[   28.906204] The buggy address belongs to the object at fff00000c12e8780
[   28.906204]  which belongs to the cache kmalloc-64 of size 64
[   28.907494] The buggy address is located 0 bytes to the right of
[   28.907494]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.908793] 
[   28.909199] The buggy address belongs to the physical page:
[   28.909880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.911617] page_type: f5(slab)
[   28.912098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.913014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.913888] page dumped because: kasan: bad access detected
[   28.914558] 
[   28.914887] Memory state around the buggy address:
[   28.915534]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.916355]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.917262] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.918061]                                      ^
[   28.918715]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.919589]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.920402] ==================================================================
[   28.482601] ==================================================================
[   28.483330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   28.485621] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.486842] 
[   28.487266] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.488526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.489048] Hardware name: linux,dummy-virt (DT)
[   28.489590] Call trace:
[   28.489997]  show_stack+0x20/0x38 (C)
[   28.490871]  dump_stack_lvl+0x8c/0xd0
[   28.491448]  print_report+0x118/0x5e0
[   28.492149]  kasan_report+0xc8/0x118
[   28.492657]  kasan_check_range+0x100/0x1a8
[   28.493208]  __kasan_check_write+0x20/0x30
[   28.493795]  kasan_atomics_helper+0x6ec/0x4858
[   28.494448]  kasan_atomics+0x198/0x2e8
[   28.495089]  kunit_try_run_case+0x14c/0x3d0
[   28.495773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.496636]  kthread+0x24c/0x2d0
[   28.497157]  ret_from_fork+0x10/0x20
[   28.497918] 
[   28.498218] Allocated by task 253:
[   28.498675]  kasan_save_stack+0x3c/0x68
[   28.499237]  kasan_save_track+0x20/0x40
[   28.500022]  kasan_save_alloc_info+0x40/0x58
[   28.500657]  __kasan_kmalloc+0xd4/0xd8
[   28.501445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.502088]  kasan_atomics+0xb8/0x2e8
[   28.502789]  kunit_try_run_case+0x14c/0x3d0
[   28.503494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.504279]  kthread+0x24c/0x2d0
[   28.504810]  ret_from_fork+0x10/0x20
[   28.505309] 
[   28.505645] The buggy address belongs to the object at fff00000c12e8780
[   28.505645]  which belongs to the cache kmalloc-64 of size 64
[   28.506875] The buggy address is located 0 bytes to the right of
[   28.506875]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.508062] 
[   28.508406] The buggy address belongs to the physical page:
[   28.509087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.509913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.510761] page_type: f5(slab)
[   28.511285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.512159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.513033] page dumped because: kasan: bad access detected
[   28.513695] 
[   28.514038] Memory state around the buggy address:
[   28.514652]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.515426]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.516171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.516963]                                      ^
[   28.517583]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.518431]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.519213] ==================================================================
[   29.751563] ==================================================================
[   29.752261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.753041] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.753967] 
[   29.754303] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.755352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.756095] Hardware name: linux,dummy-virt (DT)
[   29.756736] Call trace:
[   29.757220]  show_stack+0x20/0x38 (C)
[   29.757799]  dump_stack_lvl+0x8c/0xd0
[   29.758299]  print_report+0x118/0x5e0
[   29.758890]  kasan_report+0xc8/0x118
[   29.759536]  __asan_report_load8_noabort+0x20/0x30
[   29.760177]  kasan_atomics_helper+0x3f04/0x4858
[   29.760876]  kasan_atomics+0x198/0x2e8
[   29.761352]  kunit_try_run_case+0x14c/0x3d0
[   29.762054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.762724]  kthread+0x24c/0x2d0
[   29.763307]  ret_from_fork+0x10/0x20
[   29.763892] 
[   29.764205] Allocated by task 253:
[   29.764715]  kasan_save_stack+0x3c/0x68
[   29.765345]  kasan_save_track+0x20/0x40
[   29.765962]  kasan_save_alloc_info+0x40/0x58
[   29.766600]  __kasan_kmalloc+0xd4/0xd8
[   29.767159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.767729]  kasan_atomics+0xb8/0x2e8
[   29.768327]  kunit_try_run_case+0x14c/0x3d0
[   29.769014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769671]  kthread+0x24c/0x2d0
[   29.770217]  ret_from_fork+0x10/0x20
[   29.770751] 
[   29.771047] The buggy address belongs to the object at fff00000c12e8780
[   29.771047]  which belongs to the cache kmalloc-64 of size 64
[   29.772293] The buggy address is located 0 bytes to the right of
[   29.772293]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.773615] 
[   29.773954] The buggy address belongs to the physical page:
[   29.774661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.775557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.776361] page_type: f5(slab)
[   29.776861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.777626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.778469] page dumped because: kasan: bad access detected
[   29.779157] 
[   29.779469] Memory state around the buggy address:
[   29.780029]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780814]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.781610] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.782415]                                      ^
[   29.783014]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.783764]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784567] ==================================================================
[   28.636962] ==================================================================
[   28.637733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.638553] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.639938] 
[   28.640359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.641564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.642147] Hardware name: linux,dummy-virt (DT)
[   28.642754] Call trace:
[   28.643198]  show_stack+0x20/0x38 (C)
[   28.643850]  dump_stack_lvl+0x8c/0xd0
[   28.644485]  print_report+0x118/0x5e0
[   28.645144]  kasan_report+0xc8/0x118
[   28.645750]  __asan_report_load4_noabort+0x20/0x30
[   28.646450]  kasan_atomics_helper+0x42d8/0x4858
[   28.647107]  kasan_atomics+0x198/0x2e8
[   28.647660]  kunit_try_run_case+0x14c/0x3d0
[   28.648291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.649010]  kthread+0x24c/0x2d0
[   28.649532]  ret_from_fork+0x10/0x20
[   28.650105] 
[   28.650450] Allocated by task 253:
[   28.650984]  kasan_save_stack+0x3c/0x68
[   28.651560]  kasan_save_track+0x20/0x40
[   28.652088]  kasan_save_alloc_info+0x40/0x58
[   28.652761]  __kasan_kmalloc+0xd4/0xd8
[   28.653240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.653933]  kasan_atomics+0xb8/0x2e8
[   28.654428]  kunit_try_run_case+0x14c/0x3d0
[   28.655072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.655767]  kthread+0x24c/0x2d0
[   28.656314]  ret_from_fork+0x10/0x20
[   28.656836] 
[   28.657171] The buggy address belongs to the object at fff00000c12e8780
[   28.657171]  which belongs to the cache kmalloc-64 of size 64
[   28.658332] The buggy address is located 0 bytes to the right of
[   28.658332]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.659458] 
[   28.659818] The buggy address belongs to the physical page:
[   28.660548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.661346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.662135] page_type: f5(slab)
[   28.662647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.663584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.664427] page dumped because: kasan: bad access detected
[   28.665117] 
[   28.665406] Memory state around the buggy address:
[   28.666030]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.666880]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.667653] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.668411]                                      ^
[   28.669015]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.669803]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.670534] ==================================================================
[   29.211255] ==================================================================
[   29.212007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.212881] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.213593] 
[   29.213983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.215081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.215736] Hardware name: linux,dummy-virt (DT)
[   29.216229] Call trace:
[   29.216717]  show_stack+0x20/0x38 (C)
[   29.217317]  dump_stack_lvl+0x8c/0xd0
[   29.217864]  print_report+0x118/0x5e0
[   29.218542]  kasan_report+0xc8/0x118
[   29.219103]  __asan_report_load8_noabort+0x20/0x30
[   29.219784]  kasan_atomics_helper+0x3f58/0x4858
[   29.220406]  kasan_atomics+0x198/0x2e8
[   29.220960]  kunit_try_run_case+0x14c/0x3d0
[   29.221555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.222318]  kthread+0x24c/0x2d0
[   29.222795]  ret_from_fork+0x10/0x20
[   29.223441] 
[   29.223800] Allocated by task 253:
[   29.224312]  kasan_save_stack+0x3c/0x68
[   29.224965]  kasan_save_track+0x20/0x40
[   29.225550]  kasan_save_alloc_info+0x40/0x58
[   29.226163]  __kasan_kmalloc+0xd4/0xd8
[   29.226750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.227378]  kasan_atomics+0xb8/0x2e8
[   29.227966]  kunit_try_run_case+0x14c/0x3d0
[   29.228556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.229263]  kthread+0x24c/0x2d0
[   29.229801]  ret_from_fork+0x10/0x20
[   29.230344] 
[   29.230653] The buggy address belongs to the object at fff00000c12e8780
[   29.230653]  which belongs to the cache kmalloc-64 of size 64
[   29.231861] The buggy address is located 0 bytes to the right of
[   29.231861]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.233199] 
[   29.233528] The buggy address belongs to the physical page:
[   29.234209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.235098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.235824] page_type: f5(slab)
[   29.236380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.237263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.238111] page dumped because: kasan: bad access detected
[   29.238679] 
[   29.239078] Memory state around the buggy address:
[   29.239639]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.240504]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.241301] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.242140]                                      ^
[   29.242694]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.243536]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244314] ==================================================================
[   28.375184] ==================================================================
[   28.376300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   28.378123] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.379449] 
[   28.380113] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.381017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.381500] Hardware name: linux,dummy-virt (DT)
[   28.382206] Call trace:
[   28.382563]  show_stack+0x20/0x38 (C)
[   28.383193]  dump_stack_lvl+0x8c/0xd0
[   28.383826]  print_report+0x118/0x5e0
[   28.384502]  kasan_report+0xc8/0x118
[   28.385215]  kasan_check_range+0x100/0x1a8
[   28.385898]  __kasan_check_write+0x20/0x30
[   28.386322]  kasan_atomics_helper+0x5b4/0x4858
[   28.387012]  kasan_atomics+0x198/0x2e8
[   28.387512]  kunit_try_run_case+0x14c/0x3d0
[   28.388202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.388892]  kthread+0x24c/0x2d0
[   28.389443]  ret_from_fork+0x10/0x20
[   28.389982] 
[   28.390313] Allocated by task 253:
[   28.390833]  kasan_save_stack+0x3c/0x68
[   28.391379]  kasan_save_track+0x20/0x40
[   28.391863]  kasan_save_alloc_info+0x40/0x58
[   28.392469]  __kasan_kmalloc+0xd4/0xd8
[   28.392974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.393640]  kasan_atomics+0xb8/0x2e8
[   28.394158]  kunit_try_run_case+0x14c/0x3d0
[   28.394678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.395438]  kthread+0x24c/0x2d0
[   28.395890]  ret_from_fork+0x10/0x20
[   28.396502] 
[   28.396856] The buggy address belongs to the object at fff00000c12e8780
[   28.396856]  which belongs to the cache kmalloc-64 of size 64
[   28.398003] The buggy address is located 0 bytes to the right of
[   28.398003]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.399293] 
[   28.399624] The buggy address belongs to the physical page:
[   28.400301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.401211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.401929] page_type: f5(slab)
[   28.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.403302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.404144] page dumped because: kasan: bad access detected
[   28.404845] 
[   28.405413] Memory state around the buggy address:
[   28.406051]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.406844]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.407552] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.408443]                                      ^
[   28.409039]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.409897]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.410683] ==================================================================
[   29.892032] ==================================================================
[   29.892684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.893485] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.894488] 
[   29.895184] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.896316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.896849] Hardware name: linux,dummy-virt (DT)
[   29.897359] Call trace:
[   29.897813]  show_stack+0x20/0x38 (C)
[   29.898406]  dump_stack_lvl+0x8c/0xd0
[   29.899089]  print_report+0x118/0x5e0
[   29.899656]  kasan_report+0xc8/0x118
[   29.900209]  kasan_check_range+0x100/0x1a8
[   29.900939]  __kasan_check_write+0x20/0x30
[   29.901513]  kasan_atomics_helper+0x154c/0x4858
[   29.902129]  kasan_atomics+0x198/0x2e8
[   29.902678]  kunit_try_run_case+0x14c/0x3d0
[   29.903290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.904048]  kthread+0x24c/0x2d0
[   29.904593]  ret_from_fork+0x10/0x20
[   29.905177] 
[   29.905475] Allocated by task 253:
[   29.905931]  kasan_save_stack+0x3c/0x68
[   29.906517]  kasan_save_track+0x20/0x40
[   29.907002]  kasan_save_alloc_info+0x40/0x58
[   29.907641]  __kasan_kmalloc+0xd4/0xd8
[   29.908311]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.908896]  kasan_atomics+0xb8/0x2e8
[   29.909472]  kunit_try_run_case+0x14c/0x3d0
[   29.910040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.910793]  kthread+0x24c/0x2d0
[   29.911300]  ret_from_fork+0x10/0x20
[   29.911850] 
[   29.912192] The buggy address belongs to the object at fff00000c12e8780
[   29.912192]  which belongs to the cache kmalloc-64 of size 64
[   29.913386] The buggy address is located 0 bytes to the right of
[   29.913386]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.914687] 
[   29.915054] The buggy address belongs to the physical page:
[   29.915673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.916531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.917290] page_type: f5(slab)
[   29.917807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.918621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.919476] page dumped because: kasan: bad access detected
[   29.920126] 
[   29.920443] Memory state around the buggy address:
[   29.921097]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.921873]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.922638] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.923410]                                      ^
[   29.924018]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924818]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.925626] ==================================================================
[   29.680688] ==================================================================
[   29.681581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.682607] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.683903] 
[   29.684169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.685289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.685837] Hardware name: linux,dummy-virt (DT)
[   29.686437] Call trace:
[   29.686823]  show_stack+0x20/0x38 (C)
[   29.687420]  dump_stack_lvl+0x8c/0xd0
[   29.687975]  print_report+0x118/0x5e0
[   29.688519]  kasan_report+0xc8/0x118
[   29.689113]  kasan_check_range+0x100/0x1a8
[   29.689715]  __kasan_check_write+0x20/0x30
[   29.690294]  kasan_atomics_helper+0x12d8/0x4858
[   29.690939]  kasan_atomics+0x198/0x2e8
[   29.691491]  kunit_try_run_case+0x14c/0x3d0
[   29.692083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.692810]  kthread+0x24c/0x2d0
[   29.693333]  ret_from_fork+0x10/0x20
[   29.693889] 
[   29.694235] Allocated by task 253:
[   29.694743]  kasan_save_stack+0x3c/0x68
[   29.695286]  kasan_save_track+0x20/0x40
[   29.695758]  kasan_save_alloc_info+0x40/0x58
[   29.696437]  __kasan_kmalloc+0xd4/0xd8
[   29.696966]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.697575]  kasan_atomics+0xb8/0x2e8
[   29.698131]  kunit_try_run_case+0x14c/0x3d0
[   29.698760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.699411]  kthread+0x24c/0x2d0
[   29.699909]  ret_from_fork+0x10/0x20
[   29.700488] 
[   29.700823] The buggy address belongs to the object at fff00000c12e8780
[   29.700823]  which belongs to the cache kmalloc-64 of size 64
[   29.702105] The buggy address is located 0 bytes to the right of
[   29.702105]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.703306] 
[   29.703658] The buggy address belongs to the physical page:
[   29.704246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.705151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.705888] page_type: f5(slab)
[   29.706393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.707243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.708035] page dumped because: kasan: bad access detected
[   29.708670] 
[   29.709038] Memory state around the buggy address:
[   29.709641]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710420]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.711206] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.711960]                                      ^
[   29.712624]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.713502]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.714249] ==================================================================
[   28.265725] ==================================================================
[   28.266381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   28.267259] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.268119] 
[   28.268517] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.269820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.270253] Hardware name: linux,dummy-virt (DT)
[   28.271165] Call trace:
[   28.271611]  show_stack+0x20/0x38 (C)
[   28.272444]  dump_stack_lvl+0x8c/0xd0
[   28.273547]  print_report+0x118/0x5e0
[   28.274188]  kasan_report+0xc8/0x118
[   28.274741]  kasan_check_range+0x100/0x1a8
[   28.275360]  __kasan_check_write+0x20/0x30
[   28.275995]  kasan_atomics_helper+0x47c/0x4858
[   28.276682]  kasan_atomics+0x198/0x2e8
[   28.277263]  kunit_try_run_case+0x14c/0x3d0
[   28.277898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.278570]  kthread+0x24c/0x2d0
[   28.279142]  ret_from_fork+0x10/0x20
[   28.279730] 
[   28.280125] Allocated by task 253:
[   28.280684]  kasan_save_stack+0x3c/0x68
[   28.281236]  kasan_save_track+0x20/0x40
[   28.281945]  kasan_save_alloc_info+0x40/0x58
[   28.282577]  __kasan_kmalloc+0xd4/0xd8
[   28.283174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.283775]  kasan_atomics+0xb8/0x2e8
[   28.284376]  kunit_try_run_case+0x14c/0x3d0
[   28.285211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.285944]  kthread+0x24c/0x2d0
[   28.286463]  ret_from_fork+0x10/0x20
[   28.287040] 
[   28.287388] The buggy address belongs to the object at fff00000c12e8780
[   28.287388]  which belongs to the cache kmalloc-64 of size 64
[   28.288717] The buggy address is located 0 bytes to the right of
[   28.288717]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.290051] 
[   28.290497] The buggy address belongs to the physical page:
[   28.291169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.292055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.292929] page_type: f5(slab)
[   28.293477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.294400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.295232] page dumped because: kasan: bad access detected
[   28.295964] 
[   28.296349] Memory state around the buggy address:
[   28.297006]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.297937]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.298712] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.299597]                                      ^
[   28.300209]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301150]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301879] ==================================================================
[   28.087296] ==================================================================
[   28.088690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   28.089716] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.091043] 
[   28.091529] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.092631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.093290] Hardware name: linux,dummy-virt (DT)
[   28.093844] Call trace:
[   28.094194]  show_stack+0x20/0x38 (C)
[   28.094679]  dump_stack_lvl+0x8c/0xd0
[   28.095576]  print_report+0x118/0x5e0
[   28.096277]  kasan_report+0xc8/0x118
[   28.096935]  __asan_report_load4_noabort+0x20/0x30
[   28.097669]  kasan_atomics_helper+0x40fc/0x4858
[   28.098434]  kasan_atomics+0x198/0x2e8
[   28.099102]  kunit_try_run_case+0x14c/0x3d0
[   28.099646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.100521]  kthread+0x24c/0x2d0
[   28.101198]  ret_from_fork+0x10/0x20
[   28.101898] 
[   28.102361] Allocated by task 253:
[   28.103008]  kasan_save_stack+0x3c/0x68
[   28.103634]  kasan_save_track+0x20/0x40
[   28.104299]  kasan_save_alloc_info+0x40/0x58
[   28.104844]  __kasan_kmalloc+0xd4/0xd8
[   28.105324]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.106154]  kasan_atomics+0xb8/0x2e8
[   28.106757]  kunit_try_run_case+0x14c/0x3d0
[   28.107390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.108155]  kthread+0x24c/0x2d0
[   28.108676]  ret_from_fork+0x10/0x20
[   28.109219] 
[   28.109520] The buggy address belongs to the object at fff00000c12e8780
[   28.109520]  which belongs to the cache kmalloc-64 of size 64
[   28.110759] The buggy address is located 0 bytes to the right of
[   28.110759]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.112023] 
[   28.112337] The buggy address belongs to the physical page:
[   28.112971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.113860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.114592] page_type: f5(slab)
[   28.115069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.115949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.116762] page dumped because: kasan: bad access detected
[   28.117396] 
[   28.117744] Memory state around the buggy address:
[   28.118300]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119057]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.120600]                                      ^
[   28.121229]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122046]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122817] ==================================================================
[   29.033719] ==================================================================
[   29.034396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.035633] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.037412] 
[   29.037731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.039135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.039632] Hardware name: linux,dummy-virt (DT)
[   29.040203] Call trace:
[   29.040625]  show_stack+0x20/0x38 (C)
[   29.041226]  dump_stack_lvl+0x8c/0xd0
[   29.041792]  print_report+0x118/0x5e0
[   29.042344]  kasan_report+0xc8/0x118
[   29.042862]  kasan_check_range+0x100/0x1a8
[   29.043512]  __kasan_check_write+0x20/0x30
[   29.044109]  kasan_atomics_helper+0xca0/0x4858
[   29.044980]  kasan_atomics+0x198/0x2e8
[   29.045618]  kunit_try_run_case+0x14c/0x3d0
[   29.046197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.047035]  kthread+0x24c/0x2d0
[   29.047605]  ret_from_fork+0x10/0x20
[   29.048157] 
[   29.048486] Allocated by task 253:
[   29.049317]  kasan_save_stack+0x3c/0x68
[   29.050088]  kasan_save_track+0x20/0x40
[   29.050713]  kasan_save_alloc_info+0x40/0x58
[   29.051549]  __kasan_kmalloc+0xd4/0xd8
[   29.052055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.052560]  kasan_atomics+0xb8/0x2e8
[   29.053189]  kunit_try_run_case+0x14c/0x3d0
[   29.053795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.054551]  kthread+0x24c/0x2d0
[   29.055052]  ret_from_fork+0x10/0x20
[   29.055555] 
[   29.055871] The buggy address belongs to the object at fff00000c12e8780
[   29.055871]  which belongs to the cache kmalloc-64 of size 64
[   29.057893] The buggy address is located 0 bytes to the right of
[   29.057893]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.059080] 
[   29.059413] The buggy address belongs to the physical page:
[   29.060123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.060985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.061689] page_type: f5(slab)
[   29.062219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.063118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.063894] page dumped because: kasan: bad access detected
[   29.064532] 
[   29.064867] Memory state around the buggy address:
[   29.065443]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066261]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066991] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.067809]                                      ^
[   29.068418]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069248]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.070052] ==================================================================
[   28.741967] ==================================================================
[   28.743319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   28.744311] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.745342] 
[   28.745692] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.747004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.747563] Hardware name: linux,dummy-virt (DT)
[   28.748320] Call trace:
[   28.748813]  show_stack+0x20/0x38 (C)
[   28.749488]  dump_stack_lvl+0x8c/0xd0
[   28.750104]  print_report+0x118/0x5e0
[   28.750677]  kasan_report+0xc8/0x118
[   28.751393]  kasan_check_range+0x100/0x1a8
[   28.752046]  __kasan_check_write+0x20/0x30
[   28.752693]  kasan_atomics_helper+0xa04/0x4858
[   28.753339]  kasan_atomics+0x198/0x2e8
[   28.754008]  kunit_try_run_case+0x14c/0x3d0
[   28.754659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.755416]  kthread+0x24c/0x2d0
[   28.755965]  ret_from_fork+0x10/0x20
[   28.756550] 
[   28.756919] Allocated by task 253:
[   28.757432]  kasan_save_stack+0x3c/0x68
[   28.757987]  kasan_save_track+0x20/0x40
[   28.758601]  kasan_save_alloc_info+0x40/0x58
[   28.759123]  __kasan_kmalloc+0xd4/0xd8
[   28.759674]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.760320]  kasan_atomics+0xb8/0x2e8
[   28.760922]  kunit_try_run_case+0x14c/0x3d0
[   28.761496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.762149]  kthread+0x24c/0x2d0
[   28.762717]  ret_from_fork+0x10/0x20
[   28.763218] 
[   28.763544] The buggy address belongs to the object at fff00000c12e8780
[   28.763544]  which belongs to the cache kmalloc-64 of size 64
[   28.764681] The buggy address is located 0 bytes to the right of
[   28.764681]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.766035] 
[   28.766344] The buggy address belongs to the physical page:
[   28.767032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.767950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.768755] page_type: f5(slab)
[   28.769269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.770063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.770981] page dumped because: kasan: bad access detected
[   28.771530] 
[   28.771873] Memory state around the buggy address:
[   28.772468]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.773338]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.774164] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.774948]                                      ^
[   28.775561]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.776333]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.777165] ==================================================================
[   28.447081] ==================================================================
[   28.447864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   28.448911] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.449754] 
[   28.450182] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.451341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.451968] Hardware name: linux,dummy-virt (DT)
[   28.452640] Call trace:
[   28.453061]  show_stack+0x20/0x38 (C)
[   28.453685]  dump_stack_lvl+0x8c/0xd0
[   28.454334]  print_report+0x118/0x5e0
[   28.454969]  kasan_report+0xc8/0x118
[   28.455593]  kasan_check_range+0x100/0x1a8
[   28.456211]  __kasan_check_write+0x20/0x30
[   28.456770]  kasan_atomics_helper+0x684/0x4858
[   28.457408]  kasan_atomics+0x198/0x2e8
[   28.458035]  kunit_try_run_case+0x14c/0x3d0
[   28.458677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.459377]  kthread+0x24c/0x2d0
[   28.459936]  ret_from_fork+0x10/0x20
[   28.460511] 
[   28.460844] Allocated by task 253:
[   28.461370]  kasan_save_stack+0x3c/0x68
[   28.461966]  kasan_save_track+0x20/0x40
[   28.462460]  kasan_save_alloc_info+0x40/0x58
[   28.463025]  __kasan_kmalloc+0xd4/0xd8
[   28.463611]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.464232]  kasan_atomics+0xb8/0x2e8
[   28.464768]  kunit_try_run_case+0x14c/0x3d0
[   28.465332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.466067]  kthread+0x24c/0x2d0
[   28.466560]  ret_from_fork+0x10/0x20
[   28.467068] 
[   28.467382] The buggy address belongs to the object at fff00000c12e8780
[   28.467382]  which belongs to the cache kmalloc-64 of size 64
[   28.468556] The buggy address is located 0 bytes to the right of
[   28.468556]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.469851] 
[   28.470153] The buggy address belongs to the physical page:
[   28.470812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.471666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.472538] page_type: f5(slab)
[   28.473023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.473911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.474692] page dumped because: kasan: bad access detected
[   28.475327] 
[   28.475680] Memory state around the buggy address:
[   28.476278]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.477011]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.477900] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.478735]                                      ^
[   28.479304]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480147]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480946] ==================================================================
[   29.927042] ==================================================================
[   29.927849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.928901] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.929791] 
[   29.930168] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.931458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.932077] Hardware name: linux,dummy-virt (DT)
[   29.932736] Call trace:
[   29.933187]  show_stack+0x20/0x38 (C)
[   29.933870]  dump_stack_lvl+0x8c/0xd0
[   29.934491]  print_report+0x118/0x5e0
[   29.935048]  kasan_report+0xc8/0x118
[   29.935724]  kasan_check_range+0x100/0x1a8
[   29.936325]  __kasan_check_write+0x20/0x30
[   29.937078]  kasan_atomics_helper+0x15b4/0x4858
[   29.937674]  kasan_atomics+0x198/0x2e8
[   29.938261]  kunit_try_run_case+0x14c/0x3d0
[   29.938843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.939649]  kthread+0x24c/0x2d0
[   29.940165]  ret_from_fork+0x10/0x20
[   29.940762] 
[   29.941097] Allocated by task 253:
[   29.941535]  kasan_save_stack+0x3c/0x68
[   29.942148]  kasan_save_track+0x20/0x40
[   29.942726]  kasan_save_alloc_info+0x40/0x58
[   29.943294]  __kasan_kmalloc+0xd4/0xd8
[   29.943772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.944490]  kasan_atomics+0xb8/0x2e8
[   29.945010]  kunit_try_run_case+0x14c/0x3d0
[   29.945664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.946326]  kthread+0x24c/0x2d0
[   29.946865]  ret_from_fork+0x10/0x20
[   29.947371] 
[   29.947684] The buggy address belongs to the object at fff00000c12e8780
[   29.947684]  which belongs to the cache kmalloc-64 of size 64
[   29.948865] The buggy address is located 0 bytes to the right of
[   29.948865]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.950111] 
[   29.950412] The buggy address belongs to the physical page:
[   29.950999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.951928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.952563] page_type: f5(slab)
[   29.952999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.953872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.954651] page dumped because: kasan: bad access detected
[   29.955284] 
[   29.955506] Memory state around the buggy address:
[   29.955979]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.956629]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.957789] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.958542]                                      ^
[   29.959040]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.959916]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.960678] ==================================================================
[   28.597228] ==================================================================
[   28.597984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   28.599287] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.600524] 
[   28.601085] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.602249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.602733] Hardware name: linux,dummy-virt (DT)
[   28.603686] Call trace:
[   28.604306]  show_stack+0x20/0x38 (C)
[   28.604926]  dump_stack_lvl+0x8c/0xd0
[   28.605600]  print_report+0x118/0x5e0
[   28.606273]  kasan_report+0xc8/0x118
[   28.606925]  kasan_check_range+0x100/0x1a8
[   28.607617]  __kasan_check_write+0x20/0x30
[   28.608306]  kasan_atomics_helper+0x894/0x4858
[   28.609088]  kasan_atomics+0x198/0x2e8
[   28.609758]  kunit_try_run_case+0x14c/0x3d0
[   28.610430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.611241]  kthread+0x24c/0x2d0
[   28.611859]  ret_from_fork+0x10/0x20
[   28.612507] 
[   28.612923] Allocated by task 253:
[   28.613481]  kasan_save_stack+0x3c/0x68
[   28.613993]  kasan_save_track+0x20/0x40
[   28.614480]  kasan_save_alloc_info+0x40/0x58
[   28.615085]  __kasan_kmalloc+0xd4/0xd8
[   28.615756]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.616394]  kasan_atomics+0xb8/0x2e8
[   28.617006]  kunit_try_run_case+0x14c/0x3d0
[   28.617645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.618403]  kthread+0x24c/0x2d0
[   28.618902]  ret_from_fork+0x10/0x20
[   28.619393] 
[   28.619689] The buggy address belongs to the object at fff00000c12e8780
[   28.619689]  which belongs to the cache kmalloc-64 of size 64
[   28.621221] The buggy address is located 0 bytes to the right of
[   28.621221]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.622403] 
[   28.622689] The buggy address belongs to the physical page:
[   28.623801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.624826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.625733] page_type: f5(slab)
[   28.626381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.627376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.628346] page dumped because: kasan: bad access detected
[   28.629140] 
[   28.629610] Memory state around the buggy address:
[   28.630267]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.631215]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.632083] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.632979]                                      ^
[   28.633644]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.634514]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.635343] ==================================================================
[   28.922647] ==================================================================
[   28.923674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   28.924420] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.925334] 
[   28.925873] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.927109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.927680] Hardware name: linux,dummy-virt (DT)
[   28.928415] Call trace:
[   28.928914]  show_stack+0x20/0x38 (C)
[   28.929541]  dump_stack_lvl+0x8c/0xd0
[   28.930237]  print_report+0x118/0x5e0
[   28.930891]  kasan_report+0xc8/0x118
[   28.931509]  __asan_report_load4_noabort+0x20/0x30
[   28.932274]  kasan_atomics_helper+0x3dbc/0x4858
[   28.932988]  kasan_atomics+0x198/0x2e8
[   28.933610]  kunit_try_run_case+0x14c/0x3d0
[   28.934290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.935039]  kthread+0x24c/0x2d0
[   28.935598]  ret_from_fork+0x10/0x20
[   28.936200] 
[   28.936529] Allocated by task 253:
[   28.937045]  kasan_save_stack+0x3c/0x68
[   28.937687]  kasan_save_track+0x20/0x40
[   28.938323]  kasan_save_alloc_info+0x40/0x58
[   28.938965]  __kasan_kmalloc+0xd4/0xd8
[   28.939554]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.940195]  kasan_atomics+0xb8/0x2e8
[   28.940779]  kunit_try_run_case+0x14c/0x3d0
[   28.941421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.942144]  kthread+0x24c/0x2d0
[   28.942746]  ret_from_fork+0x10/0x20
[   28.943308] 
[   28.943647] The buggy address belongs to the object at fff00000c12e8780
[   28.943647]  which belongs to the cache kmalloc-64 of size 64
[   28.945010] The buggy address is located 0 bytes to the right of
[   28.945010]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.946367] 
[   28.946754] The buggy address belongs to the physical page:
[   28.947438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.948384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.949173] page_type: f5(slab)
[   28.949678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.950608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.951475] page dumped because: kasan: bad access detected
[   28.952120] 
[   28.952413] Memory state around the buggy address:
[   28.953081]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954127]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954952] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.955759]                                      ^
[   28.956338]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.957174]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.957981] ==================================================================
[   28.303561] ==================================================================
[   28.304400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   28.305157] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.306782] 
[   28.307230] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.308353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.308914] Hardware name: linux,dummy-virt (DT)
[   28.309493] Call trace:
[   28.309909]  show_stack+0x20/0x38 (C)
[   28.310548]  dump_stack_lvl+0x8c/0xd0
[   28.311138]  print_report+0x118/0x5e0
[   28.311827]  kasan_report+0xc8/0x118
[   28.312429]  kasan_check_range+0x100/0x1a8
[   28.313063]  __kasan_check_write+0x20/0x30
[   28.313759]  kasan_atomics_helper+0x4e4/0x4858
[   28.314408]  kasan_atomics+0x198/0x2e8
[   28.315120]  kunit_try_run_case+0x14c/0x3d0
[   28.315760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.316540]  kthread+0x24c/0x2d0
[   28.317152]  ret_from_fork+0x10/0x20
[   28.317771] 
[   28.318123] Allocated by task 253:
[   28.318620]  kasan_save_stack+0x3c/0x68
[   28.319213]  kasan_save_track+0x20/0x40
[   28.319817]  kasan_save_alloc_info+0x40/0x58
[   28.320487]  __kasan_kmalloc+0xd4/0xd8
[   28.321072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.321772]  kasan_atomics+0xb8/0x2e8
[   28.322338]  kunit_try_run_case+0x14c/0x3d0
[   28.322937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.323694]  kthread+0x24c/0x2d0
[   28.324196]  ret_from_fork+0x10/0x20
[   28.324826] 
[   28.325168] The buggy address belongs to the object at fff00000c12e8780
[   28.325168]  which belongs to the cache kmalloc-64 of size 64
[   28.326440] The buggy address is located 0 bytes to the right of
[   28.326440]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.327834] 
[   28.328304] The buggy address belongs to the physical page:
[   28.328998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.329695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.330484] page_type: f5(slab)
[   28.331027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.331869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.332727] page dumped because: kasan: bad access detected
[   28.333376] 
[   28.333680] Memory state around the buggy address:
[   28.334273]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335018]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335847] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.336587]                                      ^
[   28.337229]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.337970]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.338837] ==================================================================
[   28.007845] ==================================================================
[   28.008670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   28.009341] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.010117] 
[   28.010479] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.011729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.012690] Hardware name: linux,dummy-virt (DT)
[   28.013411] Call trace:
[   28.013946]  show_stack+0x20/0x38 (C)
[   28.014458]  dump_stack_lvl+0x8c/0xd0
[   28.015034]  print_report+0x118/0x5e0
[   28.015675]  kasan_report+0xc8/0x118
[   28.016221]  kasan_check_range+0x100/0x1a8
[   28.016807]  __kasan_check_write+0x20/0x30
[   28.017401]  kasan_atomics_helper+0x24c/0x4858
[   28.018077]  kasan_atomics+0x198/0x2e8
[   28.018616]  kunit_try_run_case+0x14c/0x3d0
[   28.019484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.020212]  kthread+0x24c/0x2d0
[   28.020720]  ret_from_fork+0x10/0x20
[   28.021341] 
[   28.021664] Allocated by task 253:
[   28.022150]  kasan_save_stack+0x3c/0x68
[   28.022778]  kasan_save_track+0x20/0x40
[   28.023403]  kasan_save_alloc_info+0x40/0x58
[   28.024014]  __kasan_kmalloc+0xd4/0xd8
[   28.024542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.025126]  kasan_atomics+0xb8/0x2e8
[   28.025692]  kunit_try_run_case+0x14c/0x3d0
[   28.026204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.026989]  kthread+0x24c/0x2d0
[   28.027553]  ret_from_fork+0x10/0x20
[   28.028122] 
[   28.028449] The buggy address belongs to the object at fff00000c12e8780
[   28.028449]  which belongs to the cache kmalloc-64 of size 64
[   28.030849] The buggy address is located 0 bytes to the right of
[   28.030849]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.032252] 
[   28.032562] The buggy address belongs to the physical page:
[   28.033215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.034451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.035475] page_type: f5(slab)
[   28.035926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.036628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.037643] page dumped because: kasan: bad access detected
[   28.038232] 
[   28.038516] Memory state around the buggy address:
[   28.039223]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.040558]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.041504] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.042329]                                      ^
[   28.043165]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.044129]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.045089] ==================================================================
[   30.209518] ==================================================================
[   30.210177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.210914] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.211671] 
[   30.212087] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.213254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.213812] Hardware name: linux,dummy-virt (DT)
[   30.214361] Call trace:
[   30.214755]  show_stack+0x20/0x38 (C)
[   30.215321]  dump_stack_lvl+0x8c/0xd0
[   30.215915]  print_report+0x118/0x5e0
[   30.216380]  kasan_report+0xc8/0x118
[   30.216827]  kasan_check_range+0x100/0x1a8
[   30.217444]  __kasan_check_write+0x20/0x30
[   30.218159]  kasan_atomics_helper+0x17ec/0x4858
[   30.218888]  kasan_atomics+0x198/0x2e8
[   30.219481]  kunit_try_run_case+0x14c/0x3d0
[   30.220149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220917]  kthread+0x24c/0x2d0
[   30.221464]  ret_from_fork+0x10/0x20
[   30.222016] 
[   30.222341] Allocated by task 253:
[   30.222866]  kasan_save_stack+0x3c/0x68
[   30.223471]  kasan_save_track+0x20/0x40
[   30.224113]  kasan_save_alloc_info+0x40/0x58
[   30.224726]  __kasan_kmalloc+0xd4/0xd8
[   30.225352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.225966]  kasan_atomics+0xb8/0x2e8
[   30.226528]  kunit_try_run_case+0x14c/0x3d0
[   30.227160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.227872]  kthread+0x24c/0x2d0
[   30.228440]  ret_from_fork+0x10/0x20
[   30.229024] 
[   30.229392] The buggy address belongs to the object at fff00000c12e8780
[   30.229392]  which belongs to the cache kmalloc-64 of size 64
[   30.230690] The buggy address is located 0 bytes to the right of
[   30.230690]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.232060] 
[   30.232463] The buggy address belongs to the physical page:
[   30.233188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.234215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.234998] page_type: f5(slab)
[   30.235582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.236528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.237381] page dumped because: kasan: bad access detected
[   30.238069] 
[   30.238439] Memory state around the buggy address:
[   30.239033]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.239944]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.240784] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.241595]                                      ^
[   30.242216]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.243045]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.243866] ==================================================================
[   29.071933] ==================================================================
[   29.072663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.073452] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.074463] 
[   29.074816] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.075887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.076384] Hardware name: linux,dummy-virt (DT)
[   29.076990] Call trace:
[   29.077477]  show_stack+0x20/0x38 (C)
[   29.078057]  dump_stack_lvl+0x8c/0xd0
[   29.078655]  print_report+0x118/0x5e0
[   29.079216]  kasan_report+0xc8/0x118
[   29.079788]  __asan_report_load4_noabort+0x20/0x30
[   29.080481]  kasan_atomics_helper+0x3dd8/0x4858
[   29.081165]  kasan_atomics+0x198/0x2e8
[   29.081693]  kunit_try_run_case+0x14c/0x3d0
[   29.082272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.083006]  kthread+0x24c/0x2d0
[   29.083571]  ret_from_fork+0x10/0x20
[   29.084144] 
[   29.084476] Allocated by task 253:
[   29.084988]  kasan_save_stack+0x3c/0x68
[   29.085536]  kasan_save_track+0x20/0x40
[   29.086124]  kasan_save_alloc_info+0x40/0x58
[   29.086748]  __kasan_kmalloc+0xd4/0xd8
[   29.087243]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.087987]  kasan_atomics+0xb8/0x2e8
[   29.088451]  kunit_try_run_case+0x14c/0x3d0
[   29.089130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.089693]  kthread+0x24c/0x2d0
[   29.090204]  ret_from_fork+0x10/0x20
[   29.090715] 
[   29.091099] The buggy address belongs to the object at fff00000c12e8780
[   29.091099]  which belongs to the cache kmalloc-64 of size 64
[   29.092314] The buggy address is located 0 bytes to the right of
[   29.092314]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.093630] 
[   29.093962] The buggy address belongs to the physical page:
[   29.094528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.095458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.096183] page_type: f5(slab)
[   29.096760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.097582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.098375] page dumped because: kasan: bad access detected
[   29.099043] 
[   29.099368] Memory state around the buggy address:
[   29.099977]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.100765]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.101530] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.102367]                                      ^
[   29.102956]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.103813]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.104574] ==================================================================
[   28.995815] ==================================================================
[   28.996630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   28.997807] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.998627] 
[   28.999033] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.000210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.000850] Hardware name: linux,dummy-virt (DT)
[   29.001512] Call trace:
[   29.002000]  show_stack+0x20/0x38 (C)
[   29.002629]  dump_stack_lvl+0x8c/0xd0
[   29.003274]  print_report+0x118/0x5e0
[   29.003871]  kasan_report+0xc8/0x118
[   29.004459]  __asan_report_load4_noabort+0x20/0x30
[   29.005194]  kasan_atomics_helper+0x3de4/0x4858
[   29.005804]  kasan_atomics+0x198/0x2e8
[   29.006450]  kunit_try_run_case+0x14c/0x3d0
[   29.007121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007855]  kthread+0x24c/0x2d0
[   29.008391]  ret_from_fork+0x10/0x20
[   29.009105] 
[   29.009587] Allocated by task 253:
[   29.010034]  kasan_save_stack+0x3c/0x68
[   29.010587]  kasan_save_track+0x20/0x40
[   29.011239]  kasan_save_alloc_info+0x40/0x58
[   29.011942]  __kasan_kmalloc+0xd4/0xd8
[   29.012589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.013311]  kasan_atomics+0xb8/0x2e8
[   29.013797]  kunit_try_run_case+0x14c/0x3d0
[   29.014305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.014956]  kthread+0x24c/0x2d0
[   29.015540]  ret_from_fork+0x10/0x20
[   29.016306] 
[   29.016745] The buggy address belongs to the object at fff00000c12e8780
[   29.016745]  which belongs to the cache kmalloc-64 of size 64
[   29.018194] The buggy address is located 0 bytes to the right of
[   29.018194]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.019726] 
[   29.020155] The buggy address belongs to the physical page:
[   29.020936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.021909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.022786] page_type: f5(slab)
[   29.023326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.024277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.025165] page dumped because: kasan: bad access detected
[   29.025898] 
[   29.026284] Memory state around the buggy address:
[   29.026988]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027868]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.028776] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.029571]                                      ^
[   29.030291]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.031147]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.032006] ==================================================================
[   28.160888] ==================================================================
[   28.161658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   28.162455] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.164053] 
[   28.164474] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.165685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.166229] Hardware name: linux,dummy-virt (DT)
[   28.166832] Call trace:
[   28.167275]  show_stack+0x20/0x38 (C)
[   28.167855]  dump_stack_lvl+0x8c/0xd0
[   28.168492]  print_report+0x118/0x5e0
[   28.169008]  kasan_report+0xc8/0x118
[   28.169591]  __asan_report_store4_noabort+0x20/0x30
[   28.170303]  kasan_atomics_helper+0x3f94/0x4858
[   28.170982]  kasan_atomics+0x198/0x2e8
[   28.171460]  kunit_try_run_case+0x14c/0x3d0
[   28.172110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.172810]  kthread+0x24c/0x2d0
[   28.173338]  ret_from_fork+0x10/0x20
[   28.173927] 
[   28.174232] Allocated by task 253:
[   28.174754]  kasan_save_stack+0x3c/0x68
[   28.175318]  kasan_save_track+0x20/0x40
[   28.175889]  kasan_save_alloc_info+0x40/0x58
[   28.176443]  __kasan_kmalloc+0xd4/0xd8
[   28.177054]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.177760]  kasan_atomics+0xb8/0x2e8
[   28.178233]  kunit_try_run_case+0x14c/0x3d0
[   28.178861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.179482]  kthread+0x24c/0x2d0
[   28.180062]  ret_from_fork+0x10/0x20
[   28.180573] 
[   28.180930] The buggy address belongs to the object at fff00000c12e8780
[   28.180930]  which belongs to the cache kmalloc-64 of size 64
[   28.182154] The buggy address is located 0 bytes to the right of
[   28.182154]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.183393] 
[   28.183763] The buggy address belongs to the physical page:
[   28.184440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.185377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.186117] page_type: f5(slab)
[   28.186635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.187438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.188214] page dumped because: kasan: bad access detected
[   28.188900] 
[   28.189231] Memory state around the buggy address:
[   28.189798]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.190570]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.191388] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.192256]                                      ^
[   28.192777]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.193582]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.194372] ==================================================================
[   28.707394] ==================================================================
[   28.708381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.709313] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.710097] 
[   28.710495] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.712284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.712820] Hardware name: linux,dummy-virt (DT)
[   28.713407] Call trace:
[   28.713848]  show_stack+0x20/0x38 (C)
[   28.714346]  dump_stack_lvl+0x8c/0xd0
[   28.714906]  print_report+0x118/0x5e0
[   28.715453]  kasan_report+0xc8/0x118
[   28.715969]  kasan_check_range+0x100/0x1a8
[   28.716645]  __kasan_check_write+0x20/0x30
[   28.717304]  kasan_atomics_helper+0x99c/0x4858
[   28.717958]  kasan_atomics+0x198/0x2e8
[   28.718581]  kunit_try_run_case+0x14c/0x3d0
[   28.719244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.719955]  kthread+0x24c/0x2d0
[   28.720570]  ret_from_fork+0x10/0x20
[   28.721135] 
[   28.721471] Allocated by task 253:
[   28.721998]  kasan_save_stack+0x3c/0x68
[   28.722511]  kasan_save_track+0x20/0x40
[   28.723113]  kasan_save_alloc_info+0x40/0x58
[   28.723639]  __kasan_kmalloc+0xd4/0xd8
[   28.724249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.724851]  kasan_atomics+0xb8/0x2e8
[   28.725458]  kunit_try_run_case+0x14c/0x3d0
[   28.726024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.726781]  kthread+0x24c/0x2d0
[   28.727288]  ret_from_fork+0x10/0x20
[   28.727763] 
[   28.728117] The buggy address belongs to the object at fff00000c12e8780
[   28.728117]  which belongs to the cache kmalloc-64 of size 64
[   28.729432] The buggy address is located 0 bytes to the right of
[   28.729432]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.730716] 
[   28.731025] The buggy address belongs to the physical page:
[   28.731753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.732598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.733356] page_type: f5(slab)
[   28.733924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.734744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.735582] page dumped because: kasan: bad access detected
[   28.736206] 
[   28.736548] Memory state around the buggy address:
[   28.737097]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.737960]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.738799] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.739588]                                      ^
[   28.740087]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740424]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740799] ==================================================================
[   29.282410] ==================================================================
[   29.283556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.284418] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.285254] 
[   29.285630] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.286685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287279] Hardware name: linux,dummy-virt (DT)
[   29.287856] Call trace:
[   29.288305]  show_stack+0x20/0x38 (C)
[   29.288933]  dump_stack_lvl+0x8c/0xd0
[   29.289523]  print_report+0x118/0x5e0
[   29.290107]  kasan_report+0xc8/0x118
[   29.290667]  __asan_report_store8_noabort+0x20/0x30
[   29.291347]  kasan_atomics_helper+0x3e5c/0x4858
[   29.291969]  kasan_atomics+0x198/0x2e8
[   29.292503]  kunit_try_run_case+0x14c/0x3d0
[   29.293188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.293885]  kthread+0x24c/0x2d0
[   29.294404]  ret_from_fork+0x10/0x20
[   29.294985] 
[   29.295331] Allocated by task 253:
[   29.295835]  kasan_save_stack+0x3c/0x68
[   29.296349]  kasan_save_track+0x20/0x40
[   29.296982]  kasan_save_alloc_info+0x40/0x58
[   29.297538]  __kasan_kmalloc+0xd4/0xd8
[   29.298089]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.298715]  kasan_atomics+0xb8/0x2e8
[   29.299234]  kunit_try_run_case+0x14c/0x3d0
[   29.299826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.300540]  kthread+0x24c/0x2d0
[   29.301058]  ret_from_fork+0x10/0x20
[   29.301581] 
[   29.301934] The buggy address belongs to the object at fff00000c12e8780
[   29.301934]  which belongs to the cache kmalloc-64 of size 64
[   29.303207] The buggy address is located 0 bytes to the right of
[   29.303207]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.304555] 
[   29.304913] The buggy address belongs to the physical page:
[   29.305547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.306558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.307276] page_type: f5(slab)
[   29.307844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.308674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.309576] page dumped because: kasan: bad access detected
[   29.310270] 
[   29.310580] Memory state around the buggy address:
[   29.311135]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.311899]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312735] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.313481]                                      ^
[   29.314095]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.314915]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315688] ==================================================================
[   28.778604] ==================================================================
[   28.779354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   28.780135] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.780816] 
[   28.781219] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.782354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.782863] Hardware name: linux,dummy-virt (DT)
[   28.783525] Call trace:
[   28.783956]  show_stack+0x20/0x38 (C)
[   28.784490]  dump_stack_lvl+0x8c/0xd0
[   28.785064]  print_report+0x118/0x5e0
[   28.785721]  kasan_report+0xc8/0x118
[   28.786241]  kasan_check_range+0x100/0x1a8
[   28.786811]  __kasan_check_write+0x20/0x30
[   28.787416]  kasan_atomics_helper+0xa6c/0x4858
[   28.788076]  kasan_atomics+0x198/0x2e8
[   28.788662]  kunit_try_run_case+0x14c/0x3d0
[   28.789302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.790044]  kthread+0x24c/0x2d0
[   28.790560]  ret_from_fork+0x10/0x20
[   28.791122] 
[   28.791472] Allocated by task 253:
[   28.791957]  kasan_save_stack+0x3c/0x68
[   28.792480]  kasan_save_track+0x20/0x40
[   28.793097]  kasan_save_alloc_info+0x40/0x58
[   28.793609]  __kasan_kmalloc+0xd4/0xd8
[   28.794218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.794825]  kasan_atomics+0xb8/0x2e8
[   28.795351]  kunit_try_run_case+0x14c/0x3d0
[   28.795876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.796506]  kthread+0x24c/0x2d0
[   28.797096]  ret_from_fork+0x10/0x20
[   28.797647] 
[   28.798042] The buggy address belongs to the object at fff00000c12e8780
[   28.798042]  which belongs to the cache kmalloc-64 of size 64
[   28.799283] The buggy address is located 0 bytes to the right of
[   28.799283]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.800536] 
[   28.800892] The buggy address belongs to the physical page:
[   28.801517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.802470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.803262] page_type: f5(slab)
[   28.803750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.804593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.805507] page dumped because: kasan: bad access detected
[   28.806175] 
[   28.806497] Memory state around the buggy address:
[   28.807138]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.807925]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.808676] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.809485]                                      ^
[   28.810026]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.810364]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.810686] ==================================================================
[   29.997733] ==================================================================
[   29.998389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.999452] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.000480] 
[   30.000859] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.002264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.002642] Hardware name: linux,dummy-virt (DT)
[   30.003145] Call trace:
[   30.003615]  show_stack+0x20/0x38 (C)
[   30.004185]  dump_stack_lvl+0x8c/0xd0
[   30.004771]  print_report+0x118/0x5e0
[   30.005368]  kasan_report+0xc8/0x118
[   30.005879]  kasan_check_range+0x100/0x1a8
[   30.006571]  __kasan_check_write+0x20/0x30
[   30.007278]  kasan_atomics_helper+0x1644/0x4858
[   30.007905]  kasan_atomics+0x198/0x2e8
[   30.008433]  kunit_try_run_case+0x14c/0x3d0
[   30.009134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.009945]  kthread+0x24c/0x2d0
[   30.010488]  ret_from_fork+0x10/0x20
[   30.011089] 
[   30.011439] Allocated by task 253:
[   30.011898]  kasan_save_stack+0x3c/0x68
[   30.012458]  kasan_save_track+0x20/0x40
[   30.013111]  kasan_save_alloc_info+0x40/0x58
[   30.013681]  __kasan_kmalloc+0xd4/0xd8
[   30.014259]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.014919]  kasan_atomics+0xb8/0x2e8
[   30.015469]  kunit_try_run_case+0x14c/0x3d0
[   30.016072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.016804]  kthread+0x24c/0x2d0
[   30.017283]  ret_from_fork+0x10/0x20
[   30.017927] 
[   30.018232] The buggy address belongs to the object at fff00000c12e8780
[   30.018232]  which belongs to the cache kmalloc-64 of size 64
[   30.019379] The buggy address is located 0 bytes to the right of
[   30.019379]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.020468] 
[   30.020850] The buggy address belongs to the physical page:
[   30.021585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.022457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.023199] page_type: f5(slab)
[   30.023659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.024525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.025403] page dumped because: kasan: bad access detected
[   30.026065] 
[   30.026391] Memory state around the buggy address:
[   30.026918]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027727]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.028456] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.029286]                                      ^
[   30.029865]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030650]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.031406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   27.581814] ==================================================================
[   27.582546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.583466] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.584202] 
[   27.584560] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.585751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.586289] Hardware name: linux,dummy-virt (DT)
[   27.586891] Call trace:
[   27.587224]  show_stack+0x20/0x38 (C)
[   27.587820]  dump_stack_lvl+0x8c/0xd0
[   27.588409]  print_report+0x118/0x5e0
[   27.589095]  kasan_report+0xc8/0x118
[   27.589633]  __asan_report_load8_noabort+0x20/0x30
[   27.590271]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.591005]  kasan_bitops_generic+0x11c/0x1c8
[   27.591548]  kunit_try_run_case+0x14c/0x3d0
[   27.592243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.592966]  kthread+0x24c/0x2d0
[   27.593508]  ret_from_fork+0x10/0x20
[   27.594079] 
[   27.594389] Allocated by task 249:
[   27.594938]  kasan_save_stack+0x3c/0x68
[   27.595516]  kasan_save_track+0x20/0x40
[   27.596113]  kasan_save_alloc_info+0x40/0x58
[   27.596760]  __kasan_kmalloc+0xd4/0xd8
[   27.597289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.597928]  kasan_bitops_generic+0xa0/0x1c8
[   27.598522]  kunit_try_run_case+0x14c/0x3d0
[   27.599096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.599800]  kthread+0x24c/0x2d0
[   27.600252]  ret_from_fork+0x10/0x20
[   27.600853] 
[   27.601219] The buggy address belongs to the object at fff00000c11118e0
[   27.601219]  which belongs to the cache kmalloc-16 of size 16
[   27.602402] The buggy address is located 8 bytes inside of
[   27.602402]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.603617] 
[   27.603998] The buggy address belongs to the physical page:
[   27.604601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.605361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.606156] page_type: f5(slab)
[   27.606625] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.607374] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.608341] page dumped because: kasan: bad access detected
[   27.609031] 
[   27.609365] Memory state around the buggy address:
[   27.609978]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.610817]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.611566] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.612292]                                                           ^
[   27.613048]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.613937]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.614741] ==================================================================
[   27.765033] ==================================================================
[   27.765664] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.766444] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.766890] 
[   27.767303] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.768432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.769067] Hardware name: linux,dummy-virt (DT)
[   27.769758] Call trace:
[   27.770198]  show_stack+0x20/0x38 (C)
[   27.770802]  dump_stack_lvl+0x8c/0xd0
[   27.771446]  print_report+0x118/0x5e0
[   27.772110]  kasan_report+0xc8/0x118
[   27.772785]  kasan_check_range+0x100/0x1a8
[   27.773397]  __kasan_check_write+0x20/0x30
[   27.774116]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.774901]  kasan_bitops_generic+0x11c/0x1c8
[   27.775554]  kunit_try_run_case+0x14c/0x3d0
[   27.776186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.776952]  kthread+0x24c/0x2d0
[   27.777516]  ret_from_fork+0x10/0x20
[   27.778136] 
[   27.778491] Allocated by task 249:
[   27.778982]  kasan_save_stack+0x3c/0x68
[   27.779659]  kasan_save_track+0x20/0x40
[   27.780294]  kasan_save_alloc_info+0x40/0x58
[   27.780945]  __kasan_kmalloc+0xd4/0xd8
[   27.781528]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.782124]  kasan_bitops_generic+0xa0/0x1c8
[   27.782674]  kunit_try_run_case+0x14c/0x3d0
[   27.783348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.784089]  kthread+0x24c/0x2d0
[   27.784641]  ret_from_fork+0x10/0x20
[   27.785233] 
[   27.785570] The buggy address belongs to the object at fff00000c11118e0
[   27.785570]  which belongs to the cache kmalloc-16 of size 16
[   27.786900] The buggy address is located 8 bytes inside of
[   27.786900]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.788233] 
[   27.788627] The buggy address belongs to the physical page:
[   27.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.790265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.791047] page_type: f5(slab)
[   27.791582] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.792501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.793355] page dumped because: kasan: bad access detected
[   27.794047] 
[   27.794410] Memory state around the buggy address:
[   27.795018]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.795953]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.796805] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.797594]                                                           ^
[   27.798368]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.799198]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.799987] ==================================================================
[   27.616115] ==================================================================
[   27.617063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.618638] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.619459] 
[   27.619787] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.620990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.621866] Hardware name: linux,dummy-virt (DT)
[   27.622385] Call trace:
[   27.623166]  show_stack+0x20/0x38 (C)
[   27.623571]  dump_stack_lvl+0x8c/0xd0
[   27.624282]  print_report+0x118/0x5e0
[   27.624981]  kasan_report+0xc8/0x118
[   27.625667]  kasan_check_range+0x100/0x1a8
[   27.626371]  __kasan_check_write+0x20/0x30
[   27.627088]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.627930]  kasan_bitops_generic+0x11c/0x1c8
[   27.628646]  kunit_try_run_case+0x14c/0x3d0
[   27.629387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.630204]  kthread+0x24c/0x2d0
[   27.630844]  ret_from_fork+0x10/0x20
[   27.631529] 
[   27.632037] Allocated by task 249:
[   27.632512]  kasan_save_stack+0x3c/0x68
[   27.633045]  kasan_save_track+0x20/0x40
[   27.633613]  kasan_save_alloc_info+0x40/0x58
[   27.634168]  __kasan_kmalloc+0xd4/0xd8
[   27.634819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.635433]  kasan_bitops_generic+0xa0/0x1c8
[   27.636168]  kunit_try_run_case+0x14c/0x3d0
[   27.636835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.637540]  kthread+0x24c/0x2d0
[   27.638097]  ret_from_fork+0x10/0x20
[   27.638680] 
[   27.639066] The buggy address belongs to the object at fff00000c11118e0
[   27.639066]  which belongs to the cache kmalloc-16 of size 16
[   27.640389] The buggy address is located 8 bytes inside of
[   27.640389]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.641677] 
[   27.642039] The buggy address belongs to the physical page:
[   27.642737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.643679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.644465] page_type: f5(slab)
[   27.645018] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.645951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.646789] page dumped because: kasan: bad access detected
[   27.647439] 
[   27.647772] Memory state around the buggy address:
[   27.648424]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.649258]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.650126] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.650956]                                                           ^
[   27.651739]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.652560]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.653382] ==================================================================
[   27.801749] ==================================================================
[   27.803058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   27.804743] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.805597] 
[   27.805967] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.807213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.807807] Hardware name: linux,dummy-virt (DT)
[   27.808427] Call trace:
[   27.808879]  show_stack+0x20/0x38 (C)
[   27.809468]  dump_stack_lvl+0x8c/0xd0
[   27.810071]  print_report+0x118/0x5e0
[   27.810661]  kasan_report+0xc8/0x118
[   27.811261]  __asan_report_load8_noabort+0x20/0x30
[   27.811945]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   27.812739]  kasan_bitops_generic+0x11c/0x1c8
[   27.813372]  kunit_try_run_case+0x14c/0x3d0
[   27.814013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.814751]  kthread+0x24c/0x2d0
[   27.815298]  ret_from_fork+0x10/0x20
[   27.815907] 
[   27.816273] Allocated by task 249:
[   27.816786]  kasan_save_stack+0x3c/0x68
[   27.817399]  kasan_save_track+0x20/0x40
[   27.818024]  kasan_save_alloc_info+0x40/0x58
[   27.818650]  __kasan_kmalloc+0xd4/0xd8
[   27.819240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.819899]  kasan_bitops_generic+0xa0/0x1c8
[   27.820513]  kunit_try_run_case+0x14c/0x3d0
[   27.821139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.821858]  kthread+0x24c/0x2d0
[   27.822399]  ret_from_fork+0x10/0x20
[   27.822996] 
[   27.823345] The buggy address belongs to the object at fff00000c11118e0
[   27.823345]  which belongs to the cache kmalloc-16 of size 16
[   27.824627] The buggy address is located 8 bytes inside of
[   27.824627]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.825950] 
[   27.826337] The buggy address belongs to the physical page:
[   27.827009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.827934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.828756] page_type: f5(slab)
[   27.829195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.830116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.830971] page dumped because: kasan: bad access detected
[   27.831654] 
[   27.831994] Memory state around the buggy address:
[   27.832630]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.833552]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.834365] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.835200]                                                           ^
[   27.835993]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.836819]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.837604] ==================================================================
[   27.654616] ==================================================================
[   27.655801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.657120] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.657887] 
[   27.658309] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.659447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.660116] Hardware name: linux,dummy-virt (DT)
[   27.660920] Call trace:
[   27.661341]  show_stack+0x20/0x38 (C)
[   27.662090]  dump_stack_lvl+0x8c/0xd0
[   27.662768]  print_report+0x118/0x5e0
[   27.663315]  kasan_report+0xc8/0x118
[   27.663769]  __asan_report_load8_noabort+0x20/0x30
[   27.664404]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.665266]  kasan_bitops_generic+0x11c/0x1c8
[   27.665918]  kunit_try_run_case+0x14c/0x3d0
[   27.666568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.667309]  kthread+0x24c/0x2d0
[   27.667878]  ret_from_fork+0x10/0x20
[   27.668473] 
[   27.668868] Allocated by task 249:
[   27.669367]  kasan_save_stack+0x3c/0x68
[   27.669899]  kasan_save_track+0x20/0x40
[   27.670484]  kasan_save_alloc_info+0x40/0x58
[   27.671052]  __kasan_kmalloc+0xd4/0xd8
[   27.671616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.672210]  kasan_bitops_generic+0xa0/0x1c8
[   27.672854]  kunit_try_run_case+0x14c/0x3d0
[   27.673482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.674131]  kthread+0x24c/0x2d0
[   27.674728]  ret_from_fork+0x10/0x20
[   27.675209] 
[   27.675584] The buggy address belongs to the object at fff00000c11118e0
[   27.675584]  which belongs to the cache kmalloc-16 of size 16
[   27.676867] The buggy address is located 8 bytes inside of
[   27.676867]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.678060] 
[   27.678386] The buggy address belongs to the physical page:
[   27.679001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.680008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.680768] page_type: f5(slab)
[   27.681198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.682056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.682817] page dumped because: kasan: bad access detected
[   27.683375] 
[   27.683763] Memory state around the buggy address:
[   27.684410]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.685304]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.686008] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.686905]                                                           ^
[   27.687639]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.688434]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.689158] ==================================================================
[   27.543264] ==================================================================
[   27.543908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.544809] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.545854] 
[   27.546210] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.548458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.549103] Hardware name: linux,dummy-virt (DT)
[   27.549793] Call trace:
[   27.550322]  show_stack+0x20/0x38 (C)
[   27.551206]  dump_stack_lvl+0x8c/0xd0
[   27.551730]  print_report+0x118/0x5e0
[   27.552423]  kasan_report+0xc8/0x118
[   27.552969]  kasan_check_range+0x100/0x1a8
[   27.553510]  __kasan_check_write+0x20/0x30
[   27.554054]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.554982]  kasan_bitops_generic+0x11c/0x1c8
[   27.555841]  kunit_try_run_case+0x14c/0x3d0
[   27.556457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.557351]  kthread+0x24c/0x2d0
[   27.557842]  ret_from_fork+0x10/0x20
[   27.558333] 
[   27.558625] Allocated by task 249:
[   27.560084]  kasan_save_stack+0x3c/0x68
[   27.560541]  kasan_save_track+0x20/0x40
[   27.561100]  kasan_save_alloc_info+0x40/0x58
[   27.561646]  __kasan_kmalloc+0xd4/0xd8
[   27.562425]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.563433]  kasan_bitops_generic+0xa0/0x1c8
[   27.564131]  kunit_try_run_case+0x14c/0x3d0
[   27.564772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.565442]  kthread+0x24c/0x2d0
[   27.565957]  ret_from_fork+0x10/0x20
[   27.566480] 
[   27.566848] The buggy address belongs to the object at fff00000c11118e0
[   27.566848]  which belongs to the cache kmalloc-16 of size 16
[   27.568129] The buggy address is located 8 bytes inside of
[   27.568129]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.569332] 
[   27.569673] The buggy address belongs to the physical page:
[   27.570334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.571247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.571941] page_type: f5(slab)
[   27.572446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.573300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.574151] page dumped because: kasan: bad access detected
[   27.574783] 
[   27.575101] Memory state around the buggy address:
[   27.575620]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.576530]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.577316] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.578158]                                                           ^
[   27.578894]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.579626]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.580456] ==================================================================
[   27.839407] ==================================================================
[   27.840064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   27.841118] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.842037] 
[   27.842361] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.843792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.844300] Hardware name: linux,dummy-virt (DT)
[   27.845068] Call trace:
[   27.845367]  show_stack+0x20/0x38 (C)
[   27.846164]  dump_stack_lvl+0x8c/0xd0
[   27.846691]  print_report+0x118/0x5e0
[   27.847231]  kasan_report+0xc8/0x118
[   27.847981]  __asan_report_load8_noabort+0x20/0x30
[   27.848650]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   27.849418]  kasan_bitops_generic+0x11c/0x1c8
[   27.849946]  kunit_try_run_case+0x14c/0x3d0
[   27.850542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.851323]  kthread+0x24c/0x2d0
[   27.851911]  ret_from_fork+0x10/0x20
[   27.852502] 
[   27.852885] Allocated by task 249:
[   27.853435]  kasan_save_stack+0x3c/0x68
[   27.854057]  kasan_save_track+0x20/0x40
[   27.854692]  kasan_save_alloc_info+0x40/0x58
[   27.855373]  __kasan_kmalloc+0xd4/0xd8
[   27.855961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.856627]  kasan_bitops_generic+0xa0/0x1c8
[   27.857280]  kunit_try_run_case+0x14c/0x3d0
[   27.857912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.858643]  kthread+0x24c/0x2d0
[   27.859273]  ret_from_fork+0x10/0x20
[   27.859875] 
[   27.860218] The buggy address belongs to the object at fff00000c11118e0
[   27.860218]  which belongs to the cache kmalloc-16 of size 16
[   27.861539] The buggy address is located 8 bytes inside of
[   27.861539]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.862899] 
[   27.863294] The buggy address belongs to the physical page:
[   27.863928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.864934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.865759] page_type: f5(slab)
[   27.866293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.867199] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.868047] page dumped because: kasan: bad access detected
[   27.868741] 
[   27.869085] Memory state around the buggy address:
[   27.869733]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.870618]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.871462] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.872276]                                                           ^
[   27.873102]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.873939]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.874786] ==================================================================
[   27.690946] ==================================================================
[   27.691550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.692629] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.693838] 
[   27.694302] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.695507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.696166] Hardware name: linux,dummy-virt (DT)
[   27.696873] Call trace:
[   27.697339]  show_stack+0x20/0x38 (C)
[   27.697833]  dump_stack_lvl+0x8c/0xd0
[   27.698589]  print_report+0x118/0x5e0
[   27.699345]  kasan_report+0xc8/0x118
[   27.700033]  kasan_check_range+0x100/0x1a8
[   27.700769]  __kasan_check_write+0x20/0x30
[   27.701267]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.701921]  kasan_bitops_generic+0x11c/0x1c8
[   27.702456]  kunit_try_run_case+0x14c/0x3d0
[   27.703283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.704109]  kthread+0x24c/0x2d0
[   27.704782]  ret_from_fork+0x10/0x20
[   27.705294] 
[   27.705577] Allocated by task 249:
[   27.706060]  kasan_save_stack+0x3c/0x68
[   27.706550]  kasan_save_track+0x20/0x40
[   27.707152]  kasan_save_alloc_info+0x40/0x58
[   27.707654]  __kasan_kmalloc+0xd4/0xd8
[   27.708282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.708967]  kasan_bitops_generic+0xa0/0x1c8
[   27.709580]  kunit_try_run_case+0x14c/0x3d0
[   27.710220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.710988]  kthread+0x24c/0x2d0
[   27.711588]  ret_from_fork+0x10/0x20
[   27.712113] 
[   27.712460] The buggy address belongs to the object at fff00000c11118e0
[   27.712460]  which belongs to the cache kmalloc-16 of size 16
[   27.713687] The buggy address is located 8 bytes inside of
[   27.713687]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.715035] 
[   27.715424] The buggy address belongs to the physical page:
[   27.716127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.717098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.717897] page_type: f5(slab)
[   27.718435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.719337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.720192] page dumped because: kasan: bad access detected
[   27.720878] 
[   27.721203] Memory state around the buggy address:
[   27.721852]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.722769]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.723589] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.724371]                                                           ^
[   27.725155]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.725993]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.726793] ==================================================================
[   27.728378] ==================================================================
[   27.729047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.730586] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.732476] 
[   27.732981] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.734180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.734732] Hardware name: linux,dummy-virt (DT)
[   27.735302] Call trace:
[   27.735808]  show_stack+0x20/0x38 (C)
[   27.736431]  dump_stack_lvl+0x8c/0xd0
[   27.737076]  print_report+0x118/0x5e0
[   27.737653]  kasan_report+0xc8/0x118
[   27.738256]  __asan_report_load8_noabort+0x20/0x30
[   27.738956]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.739723]  kasan_bitops_generic+0x11c/0x1c8
[   27.740363]  kunit_try_run_case+0x14c/0x3d0
[   27.741005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.741770]  kthread+0x24c/0x2d0
[   27.742346]  ret_from_fork+0x10/0x20
[   27.742873] 
[   27.743168] Allocated by task 249:
[   27.743730]  kasan_save_stack+0x3c/0x68
[   27.744282]  kasan_save_track+0x20/0x40
[   27.744833]  kasan_save_alloc_info+0x40/0x58
[   27.745388]  __kasan_kmalloc+0xd4/0xd8
[   27.745927]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.746511]  kasan_bitops_generic+0xa0/0x1c8
[   27.747147]  kunit_try_run_case+0x14c/0x3d0
[   27.747749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.748510]  kthread+0x24c/0x2d0
[   27.749091]  ret_from_fork+0x10/0x20
[   27.749598] 
[   27.749910] The buggy address belongs to the object at fff00000c11118e0
[   27.749910]  which belongs to the cache kmalloc-16 of size 16
[   27.751050] The buggy address is located 8 bytes inside of
[   27.751050]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.752049] 
[   27.752416] The buggy address belongs to the physical page:
[   27.753216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.754091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.754983] page_type: f5(slab)
[   27.755537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.756332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.757161] page dumped because: kasan: bad access detected
[   27.757859] 
[   27.758165] Memory state around the buggy address:
[   27.758738]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.759513]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.760223] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.761027]                                                           ^
[   27.761815]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.762572]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.763315] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   27.421625] ==================================================================
[   27.422614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.424227] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.425283] 
[   27.425694] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.427546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.428036] Hardware name: linux,dummy-virt (DT)
[   27.428574] Call trace:
[   27.428996]  show_stack+0x20/0x38 (C)
[   27.429643]  dump_stack_lvl+0x8c/0xd0
[   27.430255]  print_report+0x118/0x5e0
[   27.430987]  kasan_report+0xc8/0x118
[   27.431475]  kasan_check_range+0x100/0x1a8
[   27.432218]  __kasan_check_write+0x20/0x30
[   27.433082]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.433785]  kasan_bitops_generic+0x110/0x1c8
[   27.434414]  kunit_try_run_case+0x14c/0x3d0
[   27.435254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.436351]  kthread+0x24c/0x2d0
[   27.437074]  ret_from_fork+0x10/0x20
[   27.437616] 
[   27.437956] Allocated by task 249:
[   27.438533]  kasan_save_stack+0x3c/0x68
[   27.439156]  kasan_save_track+0x20/0x40
[   27.439952]  kasan_save_alloc_info+0x40/0x58
[   27.440676]  __kasan_kmalloc+0xd4/0xd8
[   27.441306]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.441978]  kasan_bitops_generic+0xa0/0x1c8
[   27.442717]  kunit_try_run_case+0x14c/0x3d0
[   27.443475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.444314]  kthread+0x24c/0x2d0
[   27.445042]  ret_from_fork+0x10/0x20
[   27.445583] 
[   27.445826] The buggy address belongs to the object at fff00000c11118e0
[   27.445826]  which belongs to the cache kmalloc-16 of size 16
[   27.448147] The buggy address is located 8 bytes inside of
[   27.448147]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.449212] 
[   27.449430] The buggy address belongs to the physical page:
[   27.450479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.451564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.452343] page_type: f5(slab)
[   27.453050] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.454066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.455097] page dumped because: kasan: bad access detected
[   27.456012] 
[   27.456294] Memory state around the buggy address:
[   27.456883]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.457669]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.458362] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.459279]                                                           ^
[   27.460815]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.461600]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.462326] ==================================================================
[   27.175431] ==================================================================
[   27.177090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.177957] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.179223] 
[   27.179892] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.181076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.181901] Hardware name: linux,dummy-virt (DT)
[   27.182446] Call trace:
[   27.182837]  show_stack+0x20/0x38 (C)
[   27.183632]  dump_stack_lvl+0x8c/0xd0
[   27.184212]  print_report+0x118/0x5e0
[   27.185034]  kasan_report+0xc8/0x118
[   27.185742]  __asan_report_load8_noabort+0x20/0x30
[   27.186509]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.187883]  kasan_bitops_generic+0x110/0x1c8
[   27.188501]  kunit_try_run_case+0x14c/0x3d0
[   27.189160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.189954]  kthread+0x24c/0x2d0
[   27.190584]  ret_from_fork+0x10/0x20
[   27.191415] 
[   27.191917] Allocated by task 249:
[   27.192136]  kasan_save_stack+0x3c/0x68
[   27.192375]  kasan_save_track+0x20/0x40
[   27.192620]  kasan_save_alloc_info+0x40/0x58
[   27.193044]  __kasan_kmalloc+0xd4/0xd8
[   27.193833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.194456]  kasan_bitops_generic+0xa0/0x1c8
[   27.195093]  kunit_try_run_case+0x14c/0x3d0
[   27.195753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.196573]  kthread+0x24c/0x2d0
[   27.197631]  ret_from_fork+0x10/0x20
[   27.198366] 
[   27.198736] The buggy address belongs to the object at fff00000c11118e0
[   27.198736]  which belongs to the cache kmalloc-16 of size 16
[   27.200040] The buggy address is located 8 bytes inside of
[   27.200040]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.201291] 
[   27.201628] The buggy address belongs to the physical page:
[   27.202345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.203228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.204096] page_type: f5(slab)
[   27.204596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.205805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.206800] page dumped because: kasan: bad access detected
[   27.207523] 
[   27.207795] Memory state around the buggy address:
[   27.208564]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.209323]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.210034] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.211041]                                                           ^
[   27.212235]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.213294]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.214109] ==================================================================
[   27.463841] ==================================================================
[   27.464536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.465416] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.466270] 
[   27.466766] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.468017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.468779] Hardware name: linux,dummy-virt (DT)
[   27.469460] Call trace:
[   27.469929]  show_stack+0x20/0x38 (C)
[   27.470588]  dump_stack_lvl+0x8c/0xd0
[   27.471317]  print_report+0x118/0x5e0
[   27.472125]  kasan_report+0xc8/0x118
[   27.472874]  kasan_check_range+0x100/0x1a8
[   27.473818]  __kasan_check_write+0x20/0x30
[   27.474200]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.474495]  kasan_bitops_generic+0x110/0x1c8
[   27.474825]  kunit_try_run_case+0x14c/0x3d0
[   27.475631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.476414]  kthread+0x24c/0x2d0
[   27.477100]  ret_from_fork+0x10/0x20
[   27.477810] 
[   27.478265] Allocated by task 249:
[   27.479006]  kasan_save_stack+0x3c/0x68
[   27.479448]  kasan_save_track+0x20/0x40
[   27.480507]  kasan_save_alloc_info+0x40/0x58
[   27.481206]  __kasan_kmalloc+0xd4/0xd8
[   27.481894]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.482432]  kasan_bitops_generic+0xa0/0x1c8
[   27.483558]  kunit_try_run_case+0x14c/0x3d0
[   27.484056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.484858]  kthread+0x24c/0x2d0
[   27.485421]  ret_from_fork+0x10/0x20
[   27.486126] 
[   27.486408] The buggy address belongs to the object at fff00000c11118e0
[   27.486408]  which belongs to the cache kmalloc-16 of size 16
[   27.488437] The buggy address is located 8 bytes inside of
[   27.488437]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.489555] 
[   27.489952] The buggy address belongs to the physical page:
[   27.490630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.491936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.492720] page_type: f5(slab)
[   27.493191] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.494097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.495183] page dumped because: kasan: bad access detected
[   27.495821] 
[   27.496130] Memory state around the buggy address:
[   27.497323]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.498016]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.498814] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.499904]                                                           ^
[   27.500653]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.501509]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.502287] ==================================================================
[   27.296362] ==================================================================
[   27.297122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.298548] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.299731] 
[   27.300007] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.301607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.302134] Hardware name: linux,dummy-virt (DT)
[   27.302713] Call trace:
[   27.303424]  show_stack+0x20/0x38 (C)
[   27.303993]  dump_stack_lvl+0x8c/0xd0
[   27.304575]  print_report+0x118/0x5e0
[   27.305186]  kasan_report+0xc8/0x118
[   27.305745]  kasan_check_range+0x100/0x1a8
[   27.306302]  __kasan_check_write+0x20/0x30
[   27.307177]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.307816]  kasan_bitops_generic+0x110/0x1c8
[   27.308480]  kunit_try_run_case+0x14c/0x3d0
[   27.309605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.310328]  kthread+0x24c/0x2d0
[   27.311236]  ret_from_fork+0x10/0x20
[   27.311731] 
[   27.312019] Allocated by task 249:
[   27.312536]  kasan_save_stack+0x3c/0x68
[   27.313086]  kasan_save_track+0x20/0x40
[   27.313632]  kasan_save_alloc_info+0x40/0x58
[   27.314179]  __kasan_kmalloc+0xd4/0xd8
[   27.315542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.316030]  kasan_bitops_generic+0xa0/0x1c8
[   27.316596]  kunit_try_run_case+0x14c/0x3d0
[   27.317239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.317982]  kthread+0x24c/0x2d0
[   27.318489]  ret_from_fork+0x10/0x20
[   27.319029] 
[   27.319369] The buggy address belongs to the object at fff00000c11118e0
[   27.319369]  which belongs to the cache kmalloc-16 of size 16
[   27.320905] The buggy address is located 8 bytes inside of
[   27.320905]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.322132] 
[   27.322479] The buggy address belongs to the physical page:
[   27.323927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.324933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.325761] page_type: f5(slab)
[   27.326265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.327222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.328106] page dumped because: kasan: bad access detected
[   27.328801] 
[   27.329154] Memory state around the buggy address:
[   27.329745]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.330550]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.331641] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.332555]                                                           ^
[   27.333315]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.334069]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.334884] ==================================================================
[   27.504468] ==================================================================
[   27.505226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.505919] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.506842] 
[   27.507170] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.508407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.509050] Hardware name: linux,dummy-virt (DT)
[   27.509635] Call trace:
[   27.510757]  show_stack+0x20/0x38 (C)
[   27.511542]  dump_stack_lvl+0x8c/0xd0
[   27.512021]  print_report+0x118/0x5e0
[   27.512526]  kasan_report+0xc8/0x118
[   27.513318]  __asan_report_load8_noabort+0x20/0x30
[   27.514152]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.514931]  kasan_bitops_generic+0x110/0x1c8
[   27.515496]  kunit_try_run_case+0x14c/0x3d0
[   27.515852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.516769]  kthread+0x24c/0x2d0
[   27.517227]  ret_from_fork+0x10/0x20
[   27.517772] 
[   27.518152] Allocated by task 249:
[   27.518814]  kasan_save_stack+0x3c/0x68
[   27.519457]  kasan_save_track+0x20/0x40
[   27.520128]  kasan_save_alloc_info+0x40/0x58
[   27.520825]  __kasan_kmalloc+0xd4/0xd8
[   27.521495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.522218]  kasan_bitops_generic+0xa0/0x1c8
[   27.522898]  kunit_try_run_case+0x14c/0x3d0
[   27.523555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.524303]  kthread+0x24c/0x2d0
[   27.524913]  ret_from_fork+0x10/0x20
[   27.525537] 
[   27.525972] The buggy address belongs to the object at fff00000c11118e0
[   27.525972]  which belongs to the cache kmalloc-16 of size 16
[   27.527376] The buggy address is located 8 bytes inside of
[   27.527376]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.528802] 
[   27.529230] The buggy address belongs to the physical page:
[   27.529939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.530896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.531725] page_type: f5(slab)
[   27.532284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.533239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.534013] page dumped because: kasan: bad access detected
[   27.534788] 
[   27.535075] Memory state around the buggy address:
[   27.535646]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.536426]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.537176] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.538026]                                                           ^
[   27.538855]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.539789]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.540666] ==================================================================
[   27.215994] ==================================================================
[   27.217114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.218058] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.219646] 
[   27.220171] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.221411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.221996] Hardware name: linux,dummy-virt (DT)
[   27.222755] Call trace:
[   27.223132]  show_stack+0x20/0x38 (C)
[   27.223650]  dump_stack_lvl+0x8c/0xd0
[   27.224570]  print_report+0x118/0x5e0
[   27.225200]  kasan_report+0xc8/0x118
[   27.225791]  kasan_check_range+0x100/0x1a8
[   27.226432]  __kasan_check_write+0x20/0x30
[   27.227162]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.227755]  kasan_bitops_generic+0x110/0x1c8
[   27.228432]  kunit_try_run_case+0x14c/0x3d0
[   27.229717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.230474]  kthread+0x24c/0x2d0
[   27.231303]  ret_from_fork+0x10/0x20
[   27.231765] 
[   27.232137] Allocated by task 249:
[   27.232682]  kasan_save_stack+0x3c/0x68
[   27.233328]  kasan_save_track+0x20/0x40
[   27.233942]  kasan_save_alloc_info+0x40/0x58
[   27.234627]  __kasan_kmalloc+0xd4/0xd8
[   27.235494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.235963]  kasan_bitops_generic+0xa0/0x1c8
[   27.236854]  kunit_try_run_case+0x14c/0x3d0
[   27.237567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.238439]  kthread+0x24c/0x2d0
[   27.239136]  ret_from_fork+0x10/0x20
[   27.240025] 
[   27.240264] The buggy address belongs to the object at fff00000c11118e0
[   27.240264]  which belongs to the cache kmalloc-16 of size 16
[   27.241811] The buggy address is located 8 bytes inside of
[   27.241811]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.243140] 
[   27.243521] The buggy address belongs to the physical page:
[   27.244683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.245442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.246282] page_type: f5(slab)
[   27.246502] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.247239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.247995] page dumped because: kasan: bad access detected
[   27.248644] 
[   27.249305] Memory state around the buggy address:
[   27.250004]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.250775]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.251526] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.252687]                                                           ^
[   27.253421]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.254413]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.255406] ==================================================================
[   27.256783] ==================================================================
[   27.258052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.258892] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.259615] 
[   27.260759] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.261804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.262297] Hardware name: linux,dummy-virt (DT)
[   27.263056] Call trace:
[   27.263842]  show_stack+0x20/0x38 (C)
[   27.264373]  dump_stack_lvl+0x8c/0xd0
[   27.264918]  print_report+0x118/0x5e0
[   27.265397]  kasan_report+0xc8/0x118
[   27.266052]  __asan_report_load8_noabort+0x20/0x30
[   27.266687]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.267505]  kasan_bitops_generic+0x110/0x1c8
[   27.268128]  kunit_try_run_case+0x14c/0x3d0
[   27.268689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.269957]  kthread+0x24c/0x2d0
[   27.270516]  ret_from_fork+0x10/0x20
[   27.271001] 
[   27.271585] Allocated by task 249:
[   27.272060]  kasan_save_stack+0x3c/0x68
[   27.272788]  kasan_save_track+0x20/0x40
[   27.273320]  kasan_save_alloc_info+0x40/0x58
[   27.273878]  __kasan_kmalloc+0xd4/0xd8
[   27.274544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.275241]  kasan_bitops_generic+0xa0/0x1c8
[   27.276021]  kunit_try_run_case+0x14c/0x3d0
[   27.276622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.277283]  kthread+0x24c/0x2d0
[   27.278056]  ret_from_fork+0x10/0x20
[   27.278531] 
[   27.279331] The buggy address belongs to the object at fff00000c11118e0
[   27.279331]  which belongs to the cache kmalloc-16 of size 16
[   27.280779] The buggy address is located 8 bytes inside of
[   27.280779]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.282076] 
[   27.282412] The buggy address belongs to the physical page:
[   27.283530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.284730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.285472] page_type: f5(slab)
[   27.286043] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.287396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.288224] page dumped because: kasan: bad access detected
[   27.288879] 
[   27.289188] Memory state around the buggy address:
[   27.289764]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.290581]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.291666] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.292471]                                                           ^
[   27.293441]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.293822]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.294735] ==================================================================
[   27.379832] ==================================================================
[   27.380520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.381778] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.383316] 
[   27.383745] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.384915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.385540] Hardware name: linux,dummy-virt (DT)
[   27.386246] Call trace:
[   27.386747]  show_stack+0x20/0x38 (C)
[   27.387440]  dump_stack_lvl+0x8c/0xd0
[   27.388041]  print_report+0x118/0x5e0
[   27.388724]  kasan_report+0xc8/0x118
[   27.389377]  __asan_report_load8_noabort+0x20/0x30
[   27.390267]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.391644]  kasan_bitops_generic+0x110/0x1c8
[   27.392257]  kunit_try_run_case+0x14c/0x3d0
[   27.392826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.393885]  kthread+0x24c/0x2d0
[   27.394437]  ret_from_fork+0x10/0x20
[   27.394685] 
[   27.395306] Allocated by task 249:
[   27.395673]  kasan_save_stack+0x3c/0x68
[   27.396516]  kasan_save_track+0x20/0x40
[   27.397179]  kasan_save_alloc_info+0x40/0x58
[   27.397797]  __kasan_kmalloc+0xd4/0xd8
[   27.398402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.399154]  kasan_bitops_generic+0xa0/0x1c8
[   27.399961]  kunit_try_run_case+0x14c/0x3d0
[   27.400713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.401529]  kthread+0x24c/0x2d0
[   27.402049]  ret_from_fork+0x10/0x20
[   27.402991] 
[   27.403448] The buggy address belongs to the object at fff00000c11118e0
[   27.403448]  which belongs to the cache kmalloc-16 of size 16
[   27.404938] The buggy address is located 8 bytes inside of
[   27.404938]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.406399] 
[   27.407340] The buggy address belongs to the physical page:
[   27.407899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.408897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.409778] page_type: f5(slab)
[   27.410403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.411533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.412691] page dumped because: kasan: bad access detected
[   27.413329] 
[   27.413852] Memory state around the buggy address:
[   27.414559]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.415470]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.416540] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.417436]                                                           ^
[   27.418258]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.419178]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.420453] ==================================================================
[   27.336231] ==================================================================
[   27.337385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.338228] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.339577] 
[   27.339913] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.341033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.342005] Hardware name: linux,dummy-virt (DT)
[   27.342664] Call trace:
[   27.343220]  show_stack+0x20/0x38 (C)
[   27.344249]  dump_stack_lvl+0x8c/0xd0
[   27.345007]  print_report+0x118/0x5e0
[   27.345608]  kasan_report+0xc8/0x118
[   27.346234]  kasan_check_range+0x100/0x1a8
[   27.346934]  __kasan_check_write+0x20/0x30
[   27.347588]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.348308]  kasan_bitops_generic+0x110/0x1c8
[   27.349407]  kunit_try_run_case+0x14c/0x3d0
[   27.350027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.350774]  kthread+0x24c/0x2d0
[   27.351492]  ret_from_fork+0x10/0x20
[   27.352230] 
[   27.352561] Allocated by task 249:
[   27.353178]  kasan_save_stack+0x3c/0x68
[   27.353831]  kasan_save_track+0x20/0x40
[   27.354408]  kasan_save_alloc_info+0x40/0x58
[   27.355627]  __kasan_kmalloc+0xd4/0xd8
[   27.356184]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.356798]  kasan_bitops_generic+0xa0/0x1c8
[   27.357517]  kunit_try_run_case+0x14c/0x3d0
[   27.358148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.358868]  kthread+0x24c/0x2d0
[   27.359370]  ret_from_fork+0x10/0x20
[   27.359968] 
[   27.360301] The buggy address belongs to the object at fff00000c11118e0
[   27.360301]  which belongs to the cache kmalloc-16 of size 16
[   27.361940] The buggy address is located 8 bytes inside of
[   27.361940]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.363311] 
[   27.364223] The buggy address belongs to the physical page:
[   27.365112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.366121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.367279] page_type: f5(slab)
[   27.367723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.368598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.369525] page dumped because: kasan: bad access detected
[   27.370133] 
[   27.370416] Memory state around the buggy address:
[   27.371827]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.372692]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.373517] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.374503]                                                           ^
[   27.375574]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.376342]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.377077] ==================================================================
[   27.134544] ==================================================================
[   27.135784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.137489] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249
[   27.138264] 
[   27.138620] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.140009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.140500] Hardware name: linux,dummy-virt (DT)
[   27.141128] Call trace:
[   27.141850]  show_stack+0x20/0x38 (C)
[   27.142562]  dump_stack_lvl+0x8c/0xd0
[   27.143363]  print_report+0x118/0x5e0
[   27.144120]  kasan_report+0xc8/0x118
[   27.144736]  kasan_check_range+0x100/0x1a8
[   27.145339]  __kasan_check_write+0x20/0x30
[   27.145912]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.146759]  kasan_bitops_generic+0x110/0x1c8
[   27.147571]  kunit_try_run_case+0x14c/0x3d0
[   27.148330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.149068]  kthread+0x24c/0x2d0
[   27.149608]  ret_from_fork+0x10/0x20
[   27.150261] 
[   27.150647] Allocated by task 249:
[   27.151648]  kasan_save_stack+0x3c/0x68
[   27.152250]  kasan_save_track+0x20/0x40
[   27.152791]  kasan_save_alloc_info+0x40/0x58
[   27.153387]  __kasan_kmalloc+0xd4/0xd8
[   27.153986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.154557]  kasan_bitops_generic+0xa0/0x1c8
[   27.155260]  kunit_try_run_case+0x14c/0x3d0
[   27.155986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.156717]  kthread+0x24c/0x2d0
[   27.157263]  ret_from_fork+0x10/0x20
[   27.157955] 
[   27.158278] The buggy address belongs to the object at fff00000c11118e0
[   27.158278]  which belongs to the cache kmalloc-16 of size 16
[   27.159738] The buggy address is located 8 bytes inside of
[   27.159738]  allocated 9-byte region [fff00000c11118e0, fff00000c11118e9)
[   27.160913] 
[   27.161218] The buggy address belongs to the physical page:
[   27.161872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111
[   27.162763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.163541] page_type: f5(slab)
[   27.164523] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.165523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.166472] page dumped because: kasan: bad access detected
[   27.167561] 
[   27.167743] Memory state around the buggy address:
[   27.168396]  fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc
[   27.169341]  fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   27.170256] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.171169]                                                           ^
[   27.172221]  fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.173130]  fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.173987] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   24.872837] ==================================================================
[   24.873522] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   24.874329] Read of size 1 at addr fff00000c63a3278 by task kunit_try_catch/182
[   24.876189] 
[   24.876514] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.877550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.878252] Hardware name: linux,dummy-virt (DT)
[   24.879054] Call trace:
[   24.879399]  show_stack+0x20/0x38 (C)
[   24.880023]  dump_stack_lvl+0x8c/0xd0
[   24.880562]  print_report+0x118/0x5e0
[   24.881130]  kasan_report+0xc8/0x118
[   24.881642]  __asan_report_load1_noabort+0x20/0x30
[   24.882274]  ksize_unpoisons_memory+0x628/0x750
[   24.883156]  kunit_try_run_case+0x14c/0x3d0
[   24.883938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.884729]  kthread+0x24c/0x2d0
[   24.885241]  ret_from_fork+0x10/0x20
[   24.885885] 
[   24.886232] Allocated by task 182:
[   24.886725]  kasan_save_stack+0x3c/0x68
[   24.887558]  kasan_save_track+0x20/0x40
[   24.888169]  kasan_save_alloc_info+0x40/0x58
[   24.888844]  __kasan_kmalloc+0xd4/0xd8
[   24.889358]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.889892]  ksize_unpoisons_memory+0xc0/0x750
[   24.890448]  kunit_try_run_case+0x14c/0x3d0
[   24.891345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.892025]  kthread+0x24c/0x2d0
[   24.892512]  ret_from_fork+0x10/0x20
[   24.893042] 
[   24.893371] The buggy address belongs to the object at fff00000c63a3200
[   24.893371]  which belongs to the cache kmalloc-128 of size 128
[   24.894610] The buggy address is located 5 bytes to the right of
[   24.894610]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.896306] 
[   24.896849] The buggy address belongs to the physical page:
[   24.897571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.898459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.899306] page_type: f5(slab)
[   24.899770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.900632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.901524] page dumped because: kasan: bad access detected
[   24.902197] 
[   24.902487] Memory state around the buggy address:
[   24.903282]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.904060]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.904860] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.905639]                                                                 ^
[   24.906459]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.907501]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.908260] ==================================================================
[   24.836191] ==================================================================
[   24.837333] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   24.838289] Read of size 1 at addr fff00000c63a3273 by task kunit_try_catch/182
[   24.839186] 
[   24.839921] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.841094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.841497] Hardware name: linux,dummy-virt (DT)
[   24.841939] Call trace:
[   24.842219]  show_stack+0x20/0x38 (C)
[   24.842612]  dump_stack_lvl+0x8c/0xd0
[   24.843219]  print_report+0x118/0x5e0
[   24.843892]  kasan_report+0xc8/0x118
[   24.844645]  __asan_report_load1_noabort+0x20/0x30
[   24.845186]  ksize_unpoisons_memory+0x638/0x750
[   24.845980]  kunit_try_run_case+0x14c/0x3d0
[   24.846753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.847991]  kthread+0x24c/0x2d0
[   24.848551]  ret_from_fork+0x10/0x20
[   24.849148] 
[   24.849503] Allocated by task 182:
[   24.850132]  kasan_save_stack+0x3c/0x68
[   24.850855]  kasan_save_track+0x20/0x40
[   24.851689]  kasan_save_alloc_info+0x40/0x58
[   24.852351]  __kasan_kmalloc+0xd4/0xd8
[   24.853027]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.853667]  ksize_unpoisons_memory+0xc0/0x750
[   24.854310]  kunit_try_run_case+0x14c/0x3d0
[   24.855181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.855858]  kthread+0x24c/0x2d0
[   24.856352]  ret_from_fork+0x10/0x20
[   24.856886] 
[   24.857230] The buggy address belongs to the object at fff00000c63a3200
[   24.857230]  which belongs to the cache kmalloc-128 of size 128
[   24.858429] The buggy address is located 0 bytes to the right of
[   24.858429]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.860488] 
[   24.860767] The buggy address belongs to the physical page:
[   24.861097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.861460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.861901] page_type: f5(slab)
[   24.862369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.863085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.864202] page dumped because: kasan: bad access detected
[   24.865006] 
[   24.865324] Memory state around the buggy address:
[   24.866101]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.867106]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.867876] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.868544]                                                              ^
[   24.869404]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.870285]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.871383] ==================================================================
[   24.909393] ==================================================================
[   24.910158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   24.912040] Read of size 1 at addr fff00000c63a327f by task kunit_try_catch/182
[   24.912824] 
[   24.913112] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.914375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.915080] Hardware name: linux,dummy-virt (DT)
[   24.915755] Call trace:
[   24.916157]  show_stack+0x20/0x38 (C)
[   24.916789]  dump_stack_lvl+0x8c/0xd0
[   24.917358]  print_report+0x118/0x5e0
[   24.917936]  kasan_report+0xc8/0x118
[   24.918527]  __asan_report_load1_noabort+0x20/0x30
[   24.919403]  ksize_unpoisons_memory+0x6a0/0x750
[   24.920048]  kunit_try_run_case+0x14c/0x3d0
[   24.920633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.921445]  kthread+0x24c/0x2d0
[   24.922118]  ret_from_fork+0x10/0x20
[   24.922653] 
[   24.923270] Allocated by task 182:
[   24.923761]  kasan_save_stack+0x3c/0x68
[   24.924308]  kasan_save_track+0x20/0x40
[   24.924888]  kasan_save_alloc_info+0x40/0x58
[   24.925539]  __kasan_kmalloc+0xd4/0xd8
[   24.926033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.926752]  ksize_unpoisons_memory+0xc0/0x750
[   24.927577]  kunit_try_run_case+0x14c/0x3d0
[   24.928173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.928863]  kthread+0x24c/0x2d0
[   24.929350]  ret_from_fork+0x10/0x20
[   24.929842] 
[   24.930191] The buggy address belongs to the object at fff00000c63a3200
[   24.930191]  which belongs to the cache kmalloc-128 of size 128
[   24.931405] The buggy address is located 12 bytes to the right of
[   24.931405]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.933278] 
[   24.933619] The buggy address belongs to the physical page:
[   24.934231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.935052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.935905] page_type: f5(slab)
[   24.936363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.937510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.938262] page dumped because: kasan: bad access detected
[   24.939057] 
[   24.939407] Memory state around the buggy address:
[   24.939969]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.940712]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.941451] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.942292]                                                                 ^
[   24.943174]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.944156]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.944871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   27.080969] ==================================================================
[   27.081625] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   27.082201] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247
[   27.082872] 
[   27.083213] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.084325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.085083] Hardware name: linux,dummy-virt (DT)
[   27.085674] Call trace:
[   27.086158]  show_stack+0x20/0x38 (C)
[   27.086678]  dump_stack_lvl+0x8c/0xd0
[   27.088116]  print_report+0x118/0x5e0
[   27.088716]  kasan_report+0xc8/0x118
[   27.089268]  __asan_report_load1_noabort+0x20/0x30
[   27.089999]  strnlen+0x80/0x88
[   27.090560]  kasan_strings+0x364/0x8d8
[   27.091184]  kunit_try_run_case+0x14c/0x3d0
[   27.091656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.092417]  kthread+0x24c/0x2d0
[   27.093165]  ret_from_fork+0x10/0x20
[   27.093713] 
[   27.094033] Allocated by task 247:
[   27.094572]  kasan_save_stack+0x3c/0x68
[   27.095194]  kasan_save_track+0x20/0x40
[   27.096489]  kasan_save_alloc_info+0x40/0x58
[   27.097083]  __kasan_kmalloc+0xd4/0xd8
[   27.097595]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.098205]  kasan_strings+0xb0/0x8d8
[   27.098771]  kunit_try_run_case+0x14c/0x3d0
[   27.099366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.100233]  kthread+0x24c/0x2d0
[   27.100788]  ret_from_fork+0x10/0x20
[   27.101327] 
[   27.101687] Freed by task 247:
[   27.102160]  kasan_save_stack+0x3c/0x68
[   27.102839]  kasan_save_track+0x20/0x40
[   27.104142]  kasan_save_free_info+0x4c/0x78
[   27.104741]  __kasan_slab_free+0x6c/0x98
[   27.105296]  kfree+0x114/0x3c8
[   27.105985]  kasan_strings+0x124/0x8d8
[   27.106460]  kunit_try_run_case+0x14c/0x3d0
[   27.107106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.108100]  kthread+0x24c/0x2d0
[   27.108615]  ret_from_fork+0x10/0x20
[   27.109160] 
[   27.109515] The buggy address belongs to the object at fff00000c1204c40
[   27.109515]  which belongs to the cache kmalloc-32 of size 32
[   27.110817] The buggy address is located 16 bytes inside of
[   27.110817]  freed 32-byte region [fff00000c1204c40, fff00000c1204c60)
[   27.112670] 
[   27.112988] The buggy address belongs to the physical page:
[   27.113682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   27.114620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.115793] page_type: f5(slab)
[   27.116262] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.117124] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.117958] page dumped because: kasan: bad access detected
[   27.118615] 
[   27.119646] Memory state around the buggy address:
[   27.120243]  fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.121122]  fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   27.121920] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.122718]                                                  ^
[   27.123357]  fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.124306]  fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.125235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   27.030890] ==================================================================
[   27.032777] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   27.033332] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247
[   27.034615] 
[   27.035048] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.036226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.037123] Hardware name: linux,dummy-virt (DT)
[   27.037812] Call trace:
[   27.038170]  show_stack+0x20/0x38 (C)
[   27.038652]  dump_stack_lvl+0x8c/0xd0
[   27.039529]  print_report+0x118/0x5e0
[   27.040176]  kasan_report+0xc8/0x118
[   27.041047]  __asan_report_load1_noabort+0x20/0x30
[   27.041997]  strlen+0xa8/0xb0
[   27.042758]  kasan_strings+0x304/0x8d8
[   27.043562]  kunit_try_run_case+0x14c/0x3d0
[   27.044304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.045151]  kthread+0x24c/0x2d0
[   27.045678]  ret_from_fork+0x10/0x20
[   27.046447] 
[   27.046778] Allocated by task 247:
[   27.047725]  kasan_save_stack+0x3c/0x68
[   27.048252]  kasan_save_track+0x20/0x40
[   27.048768]  kasan_save_alloc_info+0x40/0x58
[   27.049292]  __kasan_kmalloc+0xd4/0xd8
[   27.050328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.051529]  kasan_strings+0xb0/0x8d8
[   27.052034]  kunit_try_run_case+0x14c/0x3d0
[   27.052672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.053409]  kthread+0x24c/0x2d0
[   27.053954]  ret_from_fork+0x10/0x20
[   27.054433] 
[   27.054752] Freed by task 247:
[   27.055893]  kasan_save_stack+0x3c/0x68
[   27.056482]  kasan_save_track+0x20/0x40
[   27.057037]  kasan_save_free_info+0x4c/0x78
[   27.057611]  __kasan_slab_free+0x6c/0x98
[   27.058162]  kfree+0x114/0x3c8
[   27.058616]  kasan_strings+0x124/0x8d8
[   27.059196]  kunit_try_run_case+0x14c/0x3d0
[   27.060256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.060982]  kthread+0x24c/0x2d0
[   27.061486]  ret_from_fork+0x10/0x20
[   27.062015] 
[   27.062392] The buggy address belongs to the object at fff00000c1204c40
[   27.062392]  which belongs to the cache kmalloc-32 of size 32
[   27.064116] The buggy address is located 16 bytes inside of
[   27.064116]  freed 32-byte region [fff00000c1204c40, fff00000c1204c60)
[   27.065177] 
[   27.065515] The buggy address belongs to the physical page:
[   27.066653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   27.067881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.068774] page_type: f5(slab)
[   27.069382] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.070330] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.071077] page dumped because: kasan: bad access detected
[   27.071692] 
[   27.072770] Memory state around the buggy address:
[   27.073453]  fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.074456]  fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   27.075734] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.076437]                                                  ^
[   27.077196]  fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.077976]  fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.078731] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   26.986058] ==================================================================
[   26.986659] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   26.988048] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247
[   26.988768] 
[   26.989110] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.990173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.990652] Hardware name: linux,dummy-virt (DT)
[   26.991673] Call trace:
[   26.992042]  show_stack+0x20/0x38 (C)
[   26.992580]  dump_stack_lvl+0x8c/0xd0
[   26.993380]  print_report+0x118/0x5e0
[   26.993967]  kasan_report+0xc8/0x118
[   26.994474]  __asan_report_load1_noabort+0x20/0x30
[   26.995338]  kasan_strings+0x838/0x8d8
[   26.996034]  kunit_try_run_case+0x14c/0x3d0
[   26.996809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.997113]  kthread+0x24c/0x2d0
[   26.997341]  ret_from_fork+0x10/0x20
[   26.997579] 
[   26.997755] Allocated by task 247:
[   26.998086]  kasan_save_stack+0x3c/0x68
[   26.998749]  kasan_save_track+0x20/0x40
[   26.999580]  kasan_save_alloc_info+0x40/0x58
[   27.000792]  __kasan_kmalloc+0xd4/0xd8
[   27.001863]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.002625]  kasan_strings+0xb0/0x8d8
[   27.003384]  kunit_try_run_case+0x14c/0x3d0
[   27.004007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.004959]  kthread+0x24c/0x2d0
[   27.005439]  ret_from_fork+0x10/0x20
[   27.005892] 
[   27.006264] Freed by task 247:
[   27.006738]  kasan_save_stack+0x3c/0x68
[   27.007631]  kasan_save_track+0x20/0x40
[   27.008588]  kasan_save_free_info+0x4c/0x78
[   27.009146]  __kasan_slab_free+0x6c/0x98
[   27.009640]  kfree+0x114/0x3c8
[   27.010109]  kasan_strings+0x124/0x8d8
[   27.010609]  kunit_try_run_case+0x14c/0x3d0
[   27.011681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.012365]  kthread+0x24c/0x2d0
[   27.012849]  ret_from_fork+0x10/0x20
[   27.013416] 
[   27.013720] The buggy address belongs to the object at fff00000c1204c40
[   27.013720]  which belongs to the cache kmalloc-32 of size 32
[   27.014906] The buggy address is located 16 bytes inside of
[   27.014906]  freed 32-byte region [fff00000c1204c40, fff00000c1204c60)
[   27.016931] 
[   27.017250] The buggy address belongs to the physical page:
[   27.017878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   27.018805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.019508] page_type: f5(slab)
[   27.020018] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.021119] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   27.022019] page dumped because: kasan: bad access detected
[   27.022716] 
[   27.023054] Memory state around the buggy address:
[   27.024314]  fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.025171]  fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   27.025899] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.026731]                                                  ^
[   27.027593]  fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.028412]  fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.029366] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   26.938403] ==================================================================
[   26.940726] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   26.941254] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247
[   26.941929] 
[   26.942523] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.943633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.944279] Hardware name: linux,dummy-virt (DT)
[   26.945564] Call trace:
[   26.946368]  show_stack+0x20/0x38 (C)
[   26.947327]  dump_stack_lvl+0x8c/0xd0
[   26.947858]  print_report+0x118/0x5e0
[   26.948426]  kasan_report+0xc8/0x118
[   26.949113]  __asan_report_load1_noabort+0x20/0x30
[   26.949828]  strcmp+0xc0/0xc8
[   26.950358]  kasan_strings+0x228/0x8d8
[   26.951576]  kunit_try_run_case+0x14c/0x3d0
[   26.952240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.952962]  kthread+0x24c/0x2d0
[   26.953511]  ret_from_fork+0x10/0x20
[   26.954122] 
[   26.954449] Allocated by task 247:
[   26.955050]  kasan_save_stack+0x3c/0x68
[   26.955819]  kasan_save_track+0x20/0x40
[   26.956590]  kasan_save_alloc_info+0x40/0x58
[   26.957215]  __kasan_kmalloc+0xd4/0xd8
[   26.957740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.958424]  kasan_strings+0xb0/0x8d8
[   26.959077]  kunit_try_run_case+0x14c/0x3d0
[   26.960322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.960647]  kthread+0x24c/0x2d0
[   26.961346]  ret_from_fork+0x10/0x20
[   26.961976] 
[   26.962341] Freed by task 247:
[   26.962905]  kasan_save_stack+0x3c/0x68
[   26.963556]  kasan_save_track+0x20/0x40
[   26.964403]  kasan_save_free_info+0x4c/0x78
[   26.964946]  __kasan_slab_free+0x6c/0x98
[   26.965435]  kfree+0x114/0x3c8
[   26.965887]  kasan_strings+0x124/0x8d8
[   26.966381]  kunit_try_run_case+0x14c/0x3d0
[   26.967108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.968244]  kthread+0x24c/0x2d0
[   26.968640]  ret_from_fork+0x10/0x20
[   26.969133] 
[   26.969486] The buggy address belongs to the object at fff00000c1204c40
[   26.969486]  which belongs to the cache kmalloc-32 of size 32
[   26.970635] The buggy address is located 16 bytes inside of
[   26.970635]  freed 32-byte region [fff00000c1204c40, fff00000c1204c60)
[   26.971854] 
[   26.972151] The buggy address belongs to the physical page:
[   26.973169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   26.974133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.975251] page_type: f5(slab)
[   26.975950] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   26.977007] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   26.977815] page dumped because: kasan: bad access detected
[   26.978471] 
[   26.978796] Memory state around the buggy address:
[   26.979675]  fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.980424]  fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   26.981155] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   26.981997]                                                  ^
[   26.982679]  fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.983722]  fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   26.984460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   26.877071] ==================================================================
[   26.878180] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   26.879429] Read of size 1 at addr ffff800080b77bea by task kunit_try_catch/241
[   26.880846] 
[   26.881158] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.882510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.883161] Hardware name: linux,dummy-virt (DT)
[   26.883813] Call trace:
[   26.884286]  show_stack+0x20/0x38 (C)
[   26.884939]  dump_stack_lvl+0x8c/0xd0
[   26.885581]  print_report+0x2fc/0x5e0
[   26.886244]  kasan_report+0xc8/0x118
[   26.886881]  __asan_report_load1_noabort+0x20/0x30
[   26.887637]  kasan_alloca_oob_right+0x2e4/0x348
[   26.888340]  kunit_try_run_case+0x14c/0x3d0
[   26.889046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.889856]  kthread+0x24c/0x2d0
[   26.890300]  ret_from_fork+0x10/0x20
[   26.890789] 
[   26.891076] The buggy address belongs to stack of task kunit_try_catch/241
[   26.891882] 
[   26.892172] The buggy address belongs to the virtual mapping at
[   26.892172]  [ffff800080b70000, ffff800080b79000) created by:
[   26.892172]  kernel_clone+0x140/0x788
[   26.894184] 
[   26.894578] The buggy address belongs to the physical page:
[   26.895341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e6
[   26.896398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.897304] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.898260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.899160] page dumped because: kasan: bad access detected
[   26.899886] 
[   26.900320] Memory state around the buggy address:
[   26.901023]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.901876]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.902739] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   26.903558]                                                           ^
[   26.904343]  ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   26.905241]  ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.906084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   26.842155] ==================================================================
[   26.843615] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   26.844365] Read of size 1 at addr ffff800080b57bdf by task kunit_try_catch/239
[   26.845034] 
[   26.845267] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.846102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.846767] Hardware name: linux,dummy-virt (DT)
[   26.847475] Call trace:
[   26.848589]  show_stack+0x20/0x38 (C)
[   26.849104]  dump_stack_lvl+0x8c/0xd0
[   26.849727]  print_report+0x2fc/0x5e0
[   26.850233]  kasan_report+0xc8/0x118
[   26.851082]  __asan_report_load1_noabort+0x20/0x30
[   26.851801]  kasan_alloca_oob_left+0x2b8/0x310
[   26.852385]  kunit_try_run_case+0x14c/0x3d0
[   26.853037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.853744]  kthread+0x24c/0x2d0
[   26.854268]  ret_from_fork+0x10/0x20
[   26.855005] 
[   26.855401] The buggy address belongs to stack of task kunit_try_catch/239
[   26.856154] 
[   26.856515] The buggy address belongs to the virtual mapping at
[   26.856515]  [ffff800080b50000, ffff800080b59000) created by:
[   26.856515]  kernel_clone+0x140/0x788
[   26.858018] 
[   26.858358] The buggy address belongs to the physical page:
[   26.859159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012d1
[   26.860016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.860869] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.861733] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.862553] page dumped because: kasan: bad access detected
[   26.863387] 
[   26.863815] Memory state around the buggy address:
[   26.864403]  ffff800080b57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.865145]  ffff800080b57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.865980] >ffff800080b57b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   26.866627]                                                     ^
[   26.868069]  ffff800080b57c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   26.868682]  ffff800080b57c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.869392] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   26.796593] ==================================================================
[   26.798312] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   26.800045] Read of size 1 at addr ffff800080b37cba by task kunit_try_catch/237
[   26.800764] 
[   26.801107] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.802261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.802888] Hardware name: linux,dummy-virt (DT)
[   26.803541] Call trace:
[   26.803939]  show_stack+0x20/0x38 (C)
[   26.804572]  dump_stack_lvl+0x8c/0xd0
[   26.805434]  print_report+0x2fc/0x5e0
[   26.806088]  kasan_report+0xc8/0x118
[   26.806713]  __asan_report_load1_noabort+0x20/0x30
[   26.807387]  kasan_stack_oob+0x230/0x268
[   26.808071]  kunit_try_run_case+0x14c/0x3d0
[   26.808856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.809602]  kthread+0x24c/0x2d0
[   26.810228]  ret_from_fork+0x10/0x20
[   26.811123] 
[   26.811456] The buggy address belongs to stack of task kunit_try_catch/237
[   26.812399]  and is located at offset 138 in frame:
[   26.813102]  kasan_stack_oob+0x0/0x268
[   26.813935] 
[   26.814252] This frame has 4 objects:
[   26.815188]  [48, 49) '__assertion'
[   26.815289]  [64, 72) 'array'
[   26.815691]  [96, 112) '__assertion'
[   26.816227]  [128, 138) 'stack_array'
[   26.816886] 
[   26.817650] The buggy address belongs to the virtual mapping at
[   26.817650]  [ffff800080b30000, ffff800080b39000) created by:
[   26.817650]  kernel_clone+0x140/0x788
[   26.820087] 
[   26.820478] The buggy address belongs to the physical page:
[   26.821187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bd
[   26.822181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.823494] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.824321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.825286] page dumped because: kasan: bad access detected
[   26.826000] 
[   26.826328] Memory state around the buggy address:
[   26.827055]  ffff800080b37b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.828095]  ffff800080b37c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   26.829022] >ffff800080b37c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   26.829828]                                         ^
[   26.830527]  ffff800080b37d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   26.831545]  ffff800080b37d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.832361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   26.752751] ==================================================================
[   26.753839] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   26.754525] Read of size 1 at addr ffffa2c369d21fed by task kunit_try_catch/233
[   26.755370] 
[   26.755772] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.757093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.757653] Hardware name: linux,dummy-virt (DT)
[   26.758229] Call trace:
[   26.758646]  show_stack+0x20/0x38 (C)
[   26.759649]  dump_stack_lvl+0x8c/0xd0
[   26.760277]  print_report+0x2fc/0x5e0
[   26.760878]  kasan_report+0xc8/0x118
[   26.761350]  __asan_report_load1_noabort+0x20/0x30
[   26.762103]  kasan_global_oob_right+0x230/0x270
[   26.762732]  kunit_try_run_case+0x14c/0x3d0
[   26.763562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.764266]  kthread+0x24c/0x2d0
[   26.764806]  ret_from_fork+0x10/0x20
[   26.765339] 
[   26.765766] The buggy address belongs to the variable:
[   26.766326]  global_array+0xd/0x40
[   26.767315] 
[   26.767823] The buggy address belongs to the virtual mapping at
[   26.767823]  [ffffa2c368050000, ffffa2c369dd1000) created by:
[   26.767823]  paging_init+0x668/0x7c8
[   26.769235] 
[   26.769914] The buggy address belongs to the physical page:
[   26.770586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47921
[   26.771678] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   26.772411] raw: 03fffe0000002000 ffffc1ffc01e4848 ffffc1ffc01e4848 0000000000000000
[   26.773231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.774078] page dumped because: kasan: bad access detected
[   26.774758] 
[   26.775801] Memory state around the buggy address:
[   26.776593]  ffffa2c369d21e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.777553]  ffffa2c369d21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.778434] >ffffa2c369d21f80: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   26.779622]                                                           ^
[   26.780541]  ffffa2c369d22000: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   26.781380]  ffffa2c369d22080: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   26.782185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   26.666005] ==================================================================
[   26.667024] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.667927] Free of addr fff00000c1244101 by task kunit_try_catch/229
[   26.668618] 
[   26.668983] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.670659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.671192] Hardware name: linux,dummy-virt (DT)
[   26.671801] Call trace:
[   26.672157]  show_stack+0x20/0x38 (C)
[   26.672820]  dump_stack_lvl+0x8c/0xd0
[   26.673336]  print_report+0x118/0x5e0
[   26.673897]  kasan_report_invalid_free+0xb0/0xd8
[   26.674512]  check_slab_allocation+0xfc/0x108
[   26.675122]  __kasan_mempool_poison_object+0x78/0x150
[   26.675777]  mempool_free+0x28c/0x328
[   26.676396]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.677122]  mempool_kmalloc_invalid_free+0xb8/0x110
[   26.677790]  kunit_try_run_case+0x14c/0x3d0
[   26.678455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.679183]  kthread+0x24c/0x2d0
[   26.679768]  ret_from_fork+0x10/0x20
[   26.680248] 
[   26.680574] Allocated by task 229:
[   26.681109]  kasan_save_stack+0x3c/0x68
[   26.681655]  kasan_save_track+0x20/0x40
[   26.682235]  kasan_save_alloc_info+0x40/0x58
[   26.682767]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.683466]  remove_element+0x130/0x1f8
[   26.684058]  mempool_alloc_preallocated+0x58/0xc0
[   26.684637]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   26.685300]  mempool_kmalloc_invalid_free+0xb8/0x110
[   26.685930]  kunit_try_run_case+0x14c/0x3d0
[   26.686567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.687226]  kthread+0x24c/0x2d0
[   26.687742]  ret_from_fork+0x10/0x20
[   26.688232] 
[   26.688599] The buggy address belongs to the object at fff00000c1244100
[   26.688599]  which belongs to the cache kmalloc-128 of size 128
[   26.689889] The buggy address is located 1 bytes inside of
[   26.689889]  128-byte region [fff00000c1244100, fff00000c1244180)
[   26.691034] 
[   26.691404] The buggy address belongs to the physical page:
[   26.692062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101244
[   26.693004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.693712] page_type: f5(slab)
[   26.694231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.695049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.695930] page dumped because: kasan: bad access detected
[   26.696553] 
[   26.696906] Memory state around the buggy address:
[   26.697468]  fff00000c1244000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.698230]  fff00000c1244080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.698995] >fff00000c1244100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.699785]                    ^
[   26.700234]  fff00000c1244180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701007]  fff00000c1244200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.701790] ==================================================================
[   26.712862] ==================================================================
[   26.713868] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.714659] Free of addr fff00000c658c001 by task kunit_try_catch/231
[   26.715744] 
[   26.716794] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.717873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.718457] Hardware name: linux,dummy-virt (DT)
[   26.719302] Call trace:
[   26.719671]  show_stack+0x20/0x38 (C)
[   26.720279]  dump_stack_lvl+0x8c/0xd0
[   26.720886]  print_report+0x118/0x5e0
[   26.721562]  kasan_report_invalid_free+0xb0/0xd8
[   26.722282]  __kasan_mempool_poison_object+0xfc/0x150
[   26.723050]  mempool_free+0x28c/0x328
[   26.724095]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.725060]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   26.725791]  kunit_try_run_case+0x14c/0x3d0
[   26.726437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.727206]  kthread+0x24c/0x2d0
[   26.728195]  ret_from_fork+0x10/0x20
[   26.728793] 
[   26.728943] The buggy address belongs to the physical page:
[   26.729209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c
[   26.729569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.730179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.731195] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.732524] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.733217] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.733759] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.734922] head: 0bfffe0000000002 ffffc1ffc3196301 ffffffffffffffff 0000000000000000
[   26.736538] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.737529] page dumped because: kasan: bad access detected
[   26.738322] 
[   26.738687] Memory state around the buggy address:
[   26.739265]  fff00000c658bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.740514]  fff00000c658bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.741152] >fff00000c658c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.742184]                    ^
[   26.742752]  fff00000c658c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.743931]  fff00000c658c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.744668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   26.592596] ==================================================================
[   26.593834] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.594496] Free of addr fff00000c657c000 by task kunit_try_catch/225
[   26.595093] 
[   26.595909] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.597043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.597607] Hardware name: linux,dummy-virt (DT)
[   26.598228] Call trace:
[   26.598627]  show_stack+0x20/0x38 (C)
[   26.599292]  dump_stack_lvl+0x8c/0xd0
[   26.599964]  print_report+0x118/0x5e0
[   26.600567]  kasan_report_invalid_free+0xb0/0xd8
[   26.601261]  __kasan_mempool_poison_object+0x14c/0x150
[   26.602026]  mempool_free+0x28c/0x328
[   26.602684]  mempool_double_free_helper+0x150/0x2e0
[   26.603580]  mempool_kmalloc_large_double_free+0xb8/0x110
[   26.604312]  kunit_try_run_case+0x14c/0x3d0
[   26.604968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.605743]  kthread+0x24c/0x2d0
[   26.606294]  ret_from_fork+0x10/0x20
[   26.607063] 
[   26.607368] The buggy address belongs to the physical page:
[   26.608029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   26.609030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.609864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.610733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.611730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.612552] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.613460] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.614298] head: 0bfffe0000000002 ffffc1ffc3195f01 ffffffffffffffff 0000000000000000
[   26.615319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.616452] page dumped because: kasan: bad access detected
[   26.617128] 
[   26.617421] Memory state around the buggy address:
[   26.618074]  fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.619100]  fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.619829] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.620769]                    ^
[   26.621181]  fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.621941]  fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.622642] ==================================================================
[   26.632154] ==================================================================
[   26.633269] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.634147] Free of addr fff00000c657c000 by task kunit_try_catch/227
[   26.634904] 
[   26.635509] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.636904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.637431] Hardware name: linux,dummy-virt (DT)
[   26.638052] Call trace:
[   26.638515]  show_stack+0x20/0x38 (C)
[   26.639152]  dump_stack_lvl+0x8c/0xd0
[   26.639869]  print_report+0x118/0x5e0
[   26.640452]  kasan_report_invalid_free+0xb0/0xd8
[   26.641171]  __kasan_mempool_poison_pages+0xe0/0xe8
[   26.641783]  mempool_free+0x24c/0x328
[   26.642200]  mempool_double_free_helper+0x150/0x2e0
[   26.643135]  mempool_page_alloc_double_free+0xb4/0x110
[   26.643781]  kunit_try_run_case+0x14c/0x3d0
[   26.644438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.645102]  kthread+0x24c/0x2d0
[   26.645714]  ret_from_fork+0x10/0x20
[   26.646204] 
[   26.646526] The buggy address belongs to the physical page:
[   26.647381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   26.648463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.649278] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.650121] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.650997] page dumped because: kasan: bad access detected
[   26.651565] 
[   26.651892] Memory state around the buggy address:
[   26.652463]  fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.653659]  fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.654437] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.655374]                    ^
[   26.655760]  fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.657028]  fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.657771] ==================================================================
[   26.532676] ==================================================================
[   26.533975] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.534664] Free of addr fff00000c1288000 by task kunit_try_catch/223
[   26.536543] 
[   26.536913] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.538048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.538799] Hardware name: linux,dummy-virt (DT)
[   26.539379] Call trace:
[   26.539672]  show_stack+0x20/0x38 (C)
[   26.540135]  dump_stack_lvl+0x8c/0xd0
[   26.540535]  print_report+0x118/0x5e0
[   26.541476]  kasan_report_invalid_free+0xb0/0xd8
[   26.542347]  check_slab_allocation+0xd4/0x108
[   26.543174]  __kasan_mempool_poison_object+0x78/0x150
[   26.543992]  mempool_free+0x28c/0x328
[   26.544662]  mempool_double_free_helper+0x150/0x2e0
[   26.545391]  mempool_kmalloc_double_free+0xb8/0x110
[   26.546131]  kunit_try_run_case+0x14c/0x3d0
[   26.546882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.547807]  kthread+0x24c/0x2d0
[   26.548821]  ret_from_fork+0x10/0x20
[   26.549474] 
[   26.549938] Allocated by task 223:
[   26.550541]  kasan_save_stack+0x3c/0x68
[   26.551260]  kasan_save_track+0x20/0x40
[   26.552114]  kasan_save_alloc_info+0x40/0x58
[   26.552740]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.553466]  remove_element+0x130/0x1f8
[   26.553965]  mempool_alloc_preallocated+0x58/0xc0
[   26.554670]  mempool_double_free_helper+0x94/0x2e0
[   26.555356]  mempool_kmalloc_double_free+0xb8/0x110
[   26.556518]  kunit_try_run_case+0x14c/0x3d0
[   26.557120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.557784]  kthread+0x24c/0x2d0
[   26.558310]  ret_from_fork+0x10/0x20
[   26.558875] 
[   26.559224] Freed by task 223:
[   26.559835]  kasan_save_stack+0x3c/0x68
[   26.560470]  kasan_save_track+0x20/0x40
[   26.561006]  kasan_save_free_info+0x4c/0x78
[   26.561500]  __kasan_mempool_poison_object+0xc0/0x150
[   26.562234]  mempool_free+0x28c/0x328
[   26.563533]  mempool_double_free_helper+0x100/0x2e0
[   26.564136]  mempool_kmalloc_double_free+0xb8/0x110
[   26.564845]  kunit_try_run_case+0x14c/0x3d0
[   26.565486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.566213]  kthread+0x24c/0x2d0
[   26.566781]  ret_from_fork+0x10/0x20
[   26.567604] 
[   26.567969] The buggy address belongs to the object at fff00000c1288000
[   26.567969]  which belongs to the cache kmalloc-128 of size 128
[   26.569268] The buggy address is located 0 bytes inside of
[   26.569268]  128-byte region [fff00000c1288000, fff00000c1288080)
[   26.570579] 
[   26.570960] The buggy address belongs to the physical page:
[   26.572315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101288
[   26.573247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.574059] page_type: f5(slab)
[   26.574653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.575598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.576713] page dumped because: kasan: bad access detected
[   26.577365] 
[   26.577743] Memory state around the buggy address:
[   26.578290]  fff00000c1287f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.579288]  fff00000c1287f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.580397] >fff00000c1288000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.581403]                    ^
[   26.582332]  fff00000c1288080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.583139]  fff00000c1288100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.584293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   23.342605] ==================================================================
[   23.344225] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   23.344754] Free of addr fff00000c64a8001 by task kunit_try_catch/138
[   23.345310] 
[   23.345572] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.348019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.348555] Hardware name: linux,dummy-virt (DT)
[   23.349254] Call trace:
[   23.349773]  show_stack+0x20/0x38 (C)
[   23.350267]  dump_stack_lvl+0x8c/0xd0
[   23.350796]  print_report+0x118/0x5e0
[   23.351445]  kasan_report_invalid_free+0xb0/0xd8
[   23.352199]  __kasan_kfree_large+0x5c/0xa8
[   23.352869]  free_large_kmalloc+0x58/0x140
[   23.353403]  kfree+0x270/0x3c8
[   23.353917]  kmalloc_large_invalid_free+0x108/0x270
[   23.354532]  kunit_try_run_case+0x14c/0x3d0
[   23.355162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.356138]  kthread+0x24c/0x2d0
[   23.356797]  ret_from_fork+0x10/0x20
[   23.357336] 
[   23.357728] The buggy address belongs to the physical page:
[   23.358355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a8
[   23.359423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.360577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.361573] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.362447] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.363820] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.364752] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.365637] head: 0bfffe0000000002 ffffc1ffc3192a01 ffffffffffffffff 0000000000000000
[   23.366531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.367629] page dumped because: kasan: bad access detected
[   23.368190] 
[   23.368557] Memory state around the buggy address:
[   23.369364]  fff00000c64a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.370188]  fff00000c64a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.371020] >fff00000c64a8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.372210]                    ^
[   23.372732]  fff00000c64a8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.373446]  fff00000c64a8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.374531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   26.398728] ==================================================================
[   26.400744] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   26.401441] Read of size 1 at addr fff00000c6574000 by task kunit_try_catch/217
[   26.402383] 
[   26.402776] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.404209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.404807] Hardware name: linux,dummy-virt (DT)
[   26.405442] Call trace:
[   26.405989]  show_stack+0x20/0x38 (C)
[   26.406646]  dump_stack_lvl+0x8c/0xd0
[   26.407401]  print_report+0x118/0x5e0
[   26.407906]  kasan_report+0xc8/0x118
[   26.408563]  __asan_report_load1_noabort+0x20/0x30
[   26.409228]  mempool_uaf_helper+0x314/0x340
[   26.409929]  mempool_kmalloc_large_uaf+0xbc/0x118
[   26.410674]  kunit_try_run_case+0x14c/0x3d0
[   26.411435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.412120]  kthread+0x24c/0x2d0
[   26.412648]  ret_from_fork+0x10/0x20
[   26.413218] 
[   26.413561] The buggy address belongs to the physical page:
[   26.414183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   26.415229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.416040] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.416834] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.417683] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.418509] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.419436] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.420208] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   26.420873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.421561] page dumped because: kasan: bad access detected
[   26.422207] 
[   26.422522] Memory state around the buggy address:
[   26.423520]  fff00000c6573f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.424294]  fff00000c6573f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.425213] >fff00000c6574000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.426113]                    ^
[   26.426541]  fff00000c6574080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.427501]  fff00000c6574100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.428289] ==================================================================
[   26.500632] ==================================================================
[   26.501679] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   26.502474] Read of size 1 at addr fff00000c657c000 by task kunit_try_catch/221
[   26.503160] 
[   26.503523] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.504674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.505254] Hardware name: linux,dummy-virt (DT)
[   26.506275] Call trace:
[   26.506749]  show_stack+0x20/0x38 (C)
[   26.507574]  dump_stack_lvl+0x8c/0xd0
[   26.508051]  print_report+0x118/0x5e0
[   26.508598]  kasan_report+0xc8/0x118
[   26.509165]  __asan_report_load1_noabort+0x20/0x30
[   26.509828]  mempool_uaf_helper+0x314/0x340
[   26.510407]  mempool_page_alloc_uaf+0xb8/0x118
[   26.511181]  kunit_try_run_case+0x14c/0x3d0
[   26.511816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.512501]  kthread+0x24c/0x2d0
[   26.513040]  ret_from_fork+0x10/0x20
[   26.513540] 
[   26.513899] The buggy address belongs to the physical page:
[   26.514499] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   26.515372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.516168] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.517278] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.518149] page dumped because: kasan: bad access detected
[   26.518868] 
[   26.519632] Memory state around the buggy address:
[   26.520148]  fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.521077]  fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.521927] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.522675]                    ^
[   26.523475]  fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.524271]  fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.525037] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   26.438473] ==================================================================
[   26.439590] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   26.440760] Read of size 1 at addr fff00000c1287240 by task kunit_try_catch/219
[   26.441401] 
[   26.441733] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.443605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.444353] Hardware name: linux,dummy-virt (DT)
[   26.445138] Call trace:
[   26.445420]  show_stack+0x20/0x38 (C)
[   26.446063]  dump_stack_lvl+0x8c/0xd0
[   26.446747]  print_report+0x118/0x5e0
[   26.447675]  kasan_report+0xc8/0x118
[   26.448296]  __asan_report_load1_noabort+0x20/0x30
[   26.449008]  mempool_uaf_helper+0x314/0x340
[   26.449627]  mempool_slab_uaf+0xb8/0x110
[   26.450248]  kunit_try_run_case+0x14c/0x3d0
[   26.450947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.451780]  kthread+0x24c/0x2d0
[   26.452509]  ret_from_fork+0x10/0x20
[   26.453167] 
[   26.453553] Allocated by task 219:
[   26.454133]  kasan_save_stack+0x3c/0x68
[   26.454717]  kasan_save_track+0x20/0x40
[   26.455589]  kasan_save_alloc_info+0x40/0x58
[   26.456137]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.456794]  remove_element+0x16c/0x1f8
[   26.457358]  mempool_alloc_preallocated+0x58/0xc0
[   26.458066]  mempool_uaf_helper+0xa4/0x340
[   26.458662]  mempool_slab_uaf+0xb8/0x110
[   26.459407]  kunit_try_run_case+0x14c/0x3d0
[   26.459865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.460158]  kthread+0x24c/0x2d0
[   26.460371]  ret_from_fork+0x10/0x20
[   26.460596] 
[   26.460826] Freed by task 219:
[   26.461971]  kasan_save_stack+0x3c/0x68
[   26.462548]  kasan_save_track+0x20/0x40
[   26.463424]  kasan_save_free_info+0x4c/0x78
[   26.464100]  __kasan_mempool_poison_object+0xc0/0x150
[   26.464779]  mempool_free+0x28c/0x328
[   26.465334]  mempool_uaf_helper+0x104/0x340
[   26.465944]  mempool_slab_uaf+0xb8/0x110
[   26.466541]  kunit_try_run_case+0x14c/0x3d0
[   26.467354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.468188]  kthread+0x24c/0x2d0
[   26.468681]  ret_from_fork+0x10/0x20
[   26.469290] 
[   26.469927] The buggy address belongs to the object at fff00000c1287240
[   26.469927]  which belongs to the cache test_cache of size 123
[   26.471150] The buggy address is located 0 bytes inside of
[   26.471150]  freed 123-byte region [fff00000c1287240, fff00000c12872bb)
[   26.472555] 
[   26.472874] The buggy address belongs to the physical page:
[   26.473503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101287
[   26.474637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.475923] page_type: f5(slab)
[   26.476405] raw: 0bfffe0000000000 fff00000c1162780 dead000000000122 0000000000000000
[   26.477184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.478176] page dumped because: kasan: bad access detected
[   26.478791] 
[   26.479131] Memory state around the buggy address:
[   26.480076]  fff00000c1287100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.481005]  fff00000c1287180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.481798] >fff00000c1287200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   26.482613]                                            ^
[   26.483889]  fff00000c1287280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484716]  fff00000c1287300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.485484] ==================================================================
[   26.342230] ==================================================================
[   26.343792] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   26.344923] Read of size 1 at addr fff00000c648b900 by task kunit_try_catch/215
[   26.346091] 
[   26.346395] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.347555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.348060] Hardware name: linux,dummy-virt (DT)
[   26.348850] Call trace:
[   26.349427]  show_stack+0x20/0x38 (C)
[   26.349927]  dump_stack_lvl+0x8c/0xd0
[   26.350542]  print_report+0x118/0x5e0
[   26.351175]  kasan_report+0xc8/0x118
[   26.351828]  __asan_report_load1_noabort+0x20/0x30
[   26.352508]  mempool_uaf_helper+0x314/0x340
[   26.353082]  mempool_kmalloc_uaf+0xbc/0x118
[   26.353750]  kunit_try_run_case+0x14c/0x3d0
[   26.354362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.355444]  kthread+0x24c/0x2d0
[   26.355997]  ret_from_fork+0x10/0x20
[   26.356521] 
[   26.356836] Allocated by task 215:
[   26.357298]  kasan_save_stack+0x3c/0x68
[   26.358134]  kasan_save_track+0x20/0x40
[   26.358691]  kasan_save_alloc_info+0x40/0x58
[   26.359219]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.360252]  remove_element+0x130/0x1f8
[   26.360812]  mempool_alloc_preallocated+0x58/0xc0
[   26.361486]  mempool_uaf_helper+0xa4/0x340
[   26.362125]  mempool_kmalloc_uaf+0xbc/0x118
[   26.362800]  kunit_try_run_case+0x14c/0x3d0
[   26.363755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.364559]  kthread+0x24c/0x2d0
[   26.365190]  ret_from_fork+0x10/0x20
[   26.365860] 
[   26.366304] Freed by task 215:
[   26.366886]  kasan_save_stack+0x3c/0x68
[   26.367635]  kasan_save_track+0x20/0x40
[   26.368279]  kasan_save_free_info+0x4c/0x78
[   26.368929]  __kasan_mempool_poison_object+0xc0/0x150
[   26.369613]  mempool_free+0x28c/0x328
[   26.370023]  mempool_uaf_helper+0x104/0x340
[   26.371128]  mempool_kmalloc_uaf+0xbc/0x118
[   26.371645]  kunit_try_run_case+0x14c/0x3d0
[   26.372242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.372895]  kthread+0x24c/0x2d0
[   26.373427]  ret_from_fork+0x10/0x20
[   26.374088] 
[   26.374436] The buggy address belongs to the object at fff00000c648b900
[   26.374436]  which belongs to the cache kmalloc-128 of size 128
[   26.375963] The buggy address is located 0 bytes inside of
[   26.375963]  freed 128-byte region [fff00000c648b900, fff00000c648b980)
[   26.377032] 
[   26.377365] The buggy address belongs to the physical page:
[   26.377929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648b
[   26.378894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.379840] page_type: f5(slab)
[   26.380517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.381228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.382181] page dumped because: kasan: bad access detected
[   26.382774] 
[   26.383142] Memory state around the buggy address:
[   26.384024]  fff00000c648b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.385081]  fff00000c648b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.385989] >fff00000c648b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.386720]                    ^
[   26.387295]  fff00000c648b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.388254]  fff00000c648ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.389067] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   26.247313] ==================================================================
[   26.248393] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.249095] Read of size 1 at addr fff00000c6576001 by task kunit_try_catch/211
[   26.250171] 
[   26.250583] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.252180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.253012] Hardware name: linux,dummy-virt (DT)
[   26.253581] Call trace:
[   26.253943]  show_stack+0x20/0x38 (C)
[   26.254415]  dump_stack_lvl+0x8c/0xd0
[   26.255217]  print_report+0x118/0x5e0
[   26.255871]  kasan_report+0xc8/0x118
[   26.256626]  __asan_report_load1_noabort+0x20/0x30
[   26.257325]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.258047]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   26.258850]  kunit_try_run_case+0x14c/0x3d0
[   26.259638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.260481]  kthread+0x24c/0x2d0
[   26.260964]  ret_from_fork+0x10/0x20
[   26.261447] 
[   26.261800] The buggy address belongs to the physical page:
[   26.262403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   26.263880] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.264634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.265633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.266613] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.267569] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.268682] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.269604] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   26.270574] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.272079] page dumped because: kasan: bad access detected
[   26.272825] 
[   26.273219] Memory state around the buggy address:
[   26.273943]  fff00000c6575f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.274849]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.275658] >fff00000c6576000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.276376]                    ^
[   26.276842]  fff00000c6576080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.277585]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.278362] ==================================================================
[   26.199638] ==================================================================
[   26.200659] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.201484] Read of size 1 at addr fff00000c6514673 by task kunit_try_catch/209
[   26.202181] 
[   26.202520] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.204041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.204584] Hardware name: linux,dummy-virt (DT)
[   26.205135] Call trace:
[   26.205530]  show_stack+0x20/0x38 (C)
[   26.206126]  dump_stack_lvl+0x8c/0xd0
[   26.206676]  print_report+0x118/0x5e0
[   26.207410]  kasan_report+0xc8/0x118
[   26.207978]  __asan_report_load1_noabort+0x20/0x30
[   26.208657]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.209355]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.209966]  kunit_try_run_case+0x14c/0x3d0
[   26.210596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.211461]  kthread+0x24c/0x2d0
[   26.211990]  ret_from_fork+0x10/0x20
[   26.212541] 
[   26.212937] Allocated by task 209:
[   26.213389]  kasan_save_stack+0x3c/0x68
[   26.213959]  kasan_save_track+0x20/0x40
[   26.214483]  kasan_save_alloc_info+0x40/0x58
[   26.215599]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.216201]  remove_element+0x130/0x1f8
[   26.216757]  mempool_alloc_preallocated+0x58/0xc0
[   26.217393]  mempool_oob_right_helper+0x98/0x2f0
[   26.218030]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.218645]  kunit_try_run_case+0x14c/0x3d0
[   26.219508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.220187]  kthread+0x24c/0x2d0
[   26.220721]  ret_from_fork+0x10/0x20
[   26.221226] 
[   26.221528] The buggy address belongs to the object at fff00000c6514600
[   26.221528]  which belongs to the cache kmalloc-128 of size 128
[   26.222772] The buggy address is located 0 bytes to the right of
[   26.222772]  allocated 115-byte region [fff00000c6514600, fff00000c6514673)
[   26.224300] 
[   26.224658] The buggy address belongs to the physical page:
[   26.225199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106514
[   26.226189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.226889] page_type: f5(slab)
[   26.227725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.228555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.229397] page dumped because: kasan: bad access detected
[   26.230038] 
[   26.230374] Memory state around the buggy address:
[   26.230980]  fff00000c6514500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.231995]  fff00000c6514580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.232642] >fff00000c6514600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.233291]                                                              ^
[   26.234563]  fff00000c6514680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235518]  fff00000c6514700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.236395] ==================================================================
[   26.288955] ==================================================================
[   26.290269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.291238] Read of size 1 at addr fff00000c12042bb by task kunit_try_catch/213
[   26.292213] 
[   26.292687] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.293855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.294510] Hardware name: linux,dummy-virt (DT)
[   26.295112] Call trace:
[   26.295463]  show_stack+0x20/0x38 (C)
[   26.296193]  dump_stack_lvl+0x8c/0xd0
[   26.296762]  print_report+0x118/0x5e0
[   26.297411]  kasan_report+0xc8/0x118
[   26.298078]  __asan_report_load1_noabort+0x20/0x30
[   26.298722]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.299341]  mempool_slab_oob_right+0xb8/0x110
[   26.299981]  kunit_try_run_case+0x14c/0x3d0
[   26.300571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.301348]  kthread+0x24c/0x2d0
[   26.301884]  ret_from_fork+0x10/0x20
[   26.302409] 
[   26.302743] Allocated by task 213:
[   26.303190]  kasan_save_stack+0x3c/0x68
[   26.303856]  kasan_save_track+0x20/0x40
[   26.304393]  kasan_save_alloc_info+0x40/0x58
[   26.305046]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.305648]  remove_element+0x16c/0x1f8
[   26.306281]  mempool_alloc_preallocated+0x58/0xc0
[   26.306901]  mempool_oob_right_helper+0x98/0x2f0
[   26.307486]  mempool_slab_oob_right+0xb8/0x110
[   26.308052]  kunit_try_run_case+0x14c/0x3d0
[   26.308630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.309306]  kthread+0x24c/0x2d0
[   26.309790]  ret_from_fork+0x10/0x20
[   26.310342] 
[   26.310625] The buggy address belongs to the object at fff00000c1204240
[   26.310625]  which belongs to the cache test_cache of size 123
[   26.311793] The buggy address is located 0 bytes to the right of
[   26.311793]  allocated 123-byte region [fff00000c1204240, fff00000c12042bb)
[   26.313077] 
[   26.313422] The buggy address belongs to the physical page:
[   26.314050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   26.314979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.315732] page_type: f5(slab)
[   26.316191] raw: 0bfffe0000000000 fff00000c5798640 dead000000000122 0000000000000000
[   26.316995] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.317874] page dumped because: kasan: bad access detected
[   26.318527] 
[   26.318885] Memory state around the buggy address:
[   26.319436]  fff00000c1204180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.320210]  fff00000c1204200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.321004] >fff00000c1204280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.321773]                                         ^
[   26.322357]  fff00000c1204300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323184]  fff00000c1204380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   25.589538] ==================================================================
[   25.590748] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   25.591895] Read of size 1 at addr fff00000c5798500 by task kunit_try_catch/203
[   25.592638] 
[   25.593021] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.594065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.594743] Hardware name: linux,dummy-virt (DT)
[   25.595671] Call trace:
[   25.595992]  show_stack+0x20/0x38 (C)
[   25.596529]  dump_stack_lvl+0x8c/0xd0
[   25.597268]  print_report+0x118/0x5e0
[   25.597844]  kasan_report+0xc8/0x118
[   25.598459]  __kasan_check_byte+0x54/0x70
[   25.599076]  kmem_cache_destroy+0x34/0x218
[   25.599725]  kmem_cache_double_destroy+0x17c/0x2f8
[   25.600377]  kunit_try_run_case+0x14c/0x3d0
[   25.601359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.602178]  kthread+0x24c/0x2d0
[   25.602670]  ret_from_fork+0x10/0x20
[   25.603732] 
[   25.604021] Allocated by task 203:
[   25.604463]  kasan_save_stack+0x3c/0x68
[   25.605030]  kasan_save_track+0x20/0x40
[   25.605533]  kasan_save_alloc_info+0x40/0x58
[   25.606125]  __kasan_slab_alloc+0xa8/0xb0
[   25.606668]  kmem_cache_alloc_noprof+0x108/0x398
[   25.607803]  __kmem_cache_create_args+0x18c/0x2b0
[   25.608539]  kmem_cache_double_destroy+0xc8/0x2f8
[   25.609566]  kunit_try_run_case+0x14c/0x3d0
[   25.610157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.611194]  kthread+0x24c/0x2d0
[   25.611758]  ret_from_fork+0x10/0x20
[   25.612293] 
[   25.612662] Freed by task 203:
[   25.613117]  kasan_save_stack+0x3c/0x68
[   25.613688]  kasan_save_track+0x20/0x40
[   25.614195]  kasan_save_free_info+0x4c/0x78
[   25.614862]  __kasan_slab_free+0x6c/0x98
[   25.615394]  kmem_cache_free+0x118/0x470
[   25.615962]  slab_kmem_cache_release+0x38/0x50
[   25.616649]  kmem_cache_release+0x1c/0x30
[   25.617853]  kobject_put+0x17c/0x430
[   25.618452]  sysfs_slab_release+0x1c/0x30
[   25.619202]  kmem_cache_destroy+0x118/0x218
[   25.619920]  kmem_cache_double_destroy+0x130/0x2f8
[   25.620396]  kunit_try_run_case+0x14c/0x3d0
[   25.620848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.621355]  kthread+0x24c/0x2d0
[   25.621766]  ret_from_fork+0x10/0x20
[   25.622725] 
[   25.623451] The buggy address belongs to the object at fff00000c5798500
[   25.623451]  which belongs to the cache kmem_cache of size 208
[   25.625328] The buggy address is located 0 bytes inside of
[   25.625328]  freed 208-byte region [fff00000c5798500, fff00000c57985d0)
[   25.626471] 
[   25.626900] The buggy address belongs to the physical page:
[   25.627722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105798
[   25.628589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.629302] page_type: f5(slab)
[   25.630033] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   25.630982] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   25.631739] page dumped because: kasan: bad access detected
[   25.632324] 
[   25.632686] Memory state around the buggy address:
[   25.633837]  fff00000c5798400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.634565]  fff00000c5798480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.635759] >fff00000c5798500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.636458]                    ^
[   25.636987]  fff00000c5798580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   25.637788]  fff00000c5798600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.638589] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   25.499364] ==================================================================
[   25.500570] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   25.501328] Read of size 1 at addr fff00000c6524000 by task kunit_try_catch/201
[   25.502298] 
[   25.502828] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.504018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.504738] Hardware name: linux,dummy-virt (DT)
[   25.505411] Call trace:
[   25.505813]  show_stack+0x20/0x38 (C)
[   25.506290]  dump_stack_lvl+0x8c/0xd0
[   25.506852]  print_report+0x118/0x5e0
[   25.507420]  kasan_report+0xc8/0x118
[   25.507985]  __asan_report_load1_noabort+0x20/0x30
[   25.508794]  kmem_cache_rcu_uaf+0x390/0x468
[   25.509438]  kunit_try_run_case+0x14c/0x3d0
[   25.510126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.510934]  kthread+0x24c/0x2d0
[   25.511521]  ret_from_fork+0x10/0x20
[   25.512157] 
[   25.512533] Allocated by task 201:
[   25.513107]  kasan_save_stack+0x3c/0x68
[   25.513755]  kasan_save_track+0x20/0x40
[   25.514362]  kasan_save_alloc_info+0x40/0x58
[   25.515036]  __kasan_slab_alloc+0xa8/0xb0
[   25.515663]  kmem_cache_alloc_noprof+0x108/0x398
[   25.516363]  kmem_cache_rcu_uaf+0x12c/0x468
[   25.517018]  kunit_try_run_case+0x14c/0x3d0
[   25.517678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.518418]  kthread+0x24c/0x2d0
[   25.519030]  ret_from_fork+0x10/0x20
[   25.519692] 
[   25.520087] Freed by task 0:
[   25.520632]  kasan_save_stack+0x3c/0x68
[   25.521282]  kasan_save_track+0x20/0x40
[   25.521917]  kasan_save_free_info+0x4c/0x78
[   25.522550]  __kasan_slab_free+0x6c/0x98
[   25.523172]  slab_free_after_rcu_debug+0xd4/0x2f8
[   25.523864]  rcu_core+0x9f4/0x1e20
[   25.524445]  rcu_core_si+0x18/0x30
[   25.525023]  handle_softirqs+0x374/0xb20
[   25.525650]  __do_softirq+0x1c/0x28
[   25.526244] 
[   25.526618] Last potentially related work creation:
[   25.527348]  kasan_save_stack+0x3c/0x68
[   25.527996]  kasan_record_aux_stack+0xb4/0xc8
[   25.528658]  kmem_cache_free+0x28c/0x470
[   25.529295]  kmem_cache_rcu_uaf+0x16c/0x468
[   25.529946]  kunit_try_run_case+0x14c/0x3d0
[   25.530600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.531349]  kthread+0x24c/0x2d0
[   25.531934]  ret_from_fork+0x10/0x20
[   25.532549] 
[   25.532860] The buggy address belongs to the object at fff00000c6524000
[   25.532860]  which belongs to the cache test_cache of size 200
[   25.534053] The buggy address is located 0 bytes inside of
[   25.534053]  freed 200-byte region [fff00000c6524000, fff00000c65240c8)
[   25.535530] 
[   25.535958] The buggy address belongs to the physical page:
[   25.536822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524
[   25.537806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.538638] page_type: f5(slab)
[   25.539194] raw: 0bfffe0000000000 fff00000c57983c0 dead000000000122 0000000000000000
[   25.540159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   25.541023] page dumped because: kasan: bad access detected
[   25.541748] 
[   25.542134] Memory state around the buggy address:
[   25.542835]  fff00000c6523f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.543676]  fff00000c6523f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.544515] >fff00000c6524000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.545388]                    ^
[   25.545929]  fff00000c6524080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   25.546799]  fff00000c6524100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.547639] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   25.394358] ==================================================================
[   25.395953] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   25.396878] Free of addr fff00000c650b001 by task kunit_try_catch/199
[   25.397976] 
[   25.398250] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.400138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.400749] Hardware name: linux,dummy-virt (DT)
[   25.401351] Call trace:
[   25.401745]  show_stack+0x20/0x38 (C)
[   25.402262]  dump_stack_lvl+0x8c/0xd0
[   25.402869]  print_report+0x118/0x5e0
[   25.403423]  kasan_report_invalid_free+0xb0/0xd8
[   25.404047]  check_slab_allocation+0xfc/0x108
[   25.404647]  __kasan_slab_pre_free+0x2c/0x48
[   25.405510]  kmem_cache_free+0xf0/0x470
[   25.406101]  kmem_cache_invalid_free+0x184/0x3b8
[   25.406742]  kunit_try_run_case+0x14c/0x3d0
[   25.407906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.408627]  kthread+0x24c/0x2d0
[   25.409137]  ret_from_fork+0x10/0x20
[   25.409677] 
[   25.410029] Allocated by task 199:
[   25.410525]  kasan_save_stack+0x3c/0x68
[   25.411320]  kasan_save_track+0x20/0x40
[   25.411905]  kasan_save_alloc_info+0x40/0x58
[   25.412618]  __kasan_slab_alloc+0xa8/0xb0
[   25.413209]  kmem_cache_alloc_noprof+0x108/0x398
[   25.413879]  kmem_cache_invalid_free+0x12c/0x3b8
[   25.414469]  kunit_try_run_case+0x14c/0x3d0
[   25.415014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.416288]  kthread+0x24c/0x2d0
[   25.416821]  ret_from_fork+0x10/0x20
[   25.417385] 
[   25.417692] The buggy address belongs to the object at fff00000c650b000
[   25.417692]  which belongs to the cache test_cache of size 200
[   25.418828] The buggy address is located 1 bytes inside of
[   25.418828]  200-byte region [fff00000c650b000, fff00000c650b0c8)
[   25.420540] 
[   25.420798] The buggy address belongs to the physical page:
[   25.421305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650b
[   25.422728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.424466] page_type: f5(slab)
[   25.425191] raw: 0bfffe0000000000 fff00000c11623c0 dead000000000122 0000000000000000
[   25.426049] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   25.427371] page dumped because: kasan: bad access detected
[   25.428003] 
[   25.428323] Memory state around the buggy address:
[   25.428886]  fff00000c650af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.429617]  fff00000c650af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.430518] >fff00000c650b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.431425]                    ^
[   25.431812]  fff00000c650b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.432409]  fff00000c650b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.434534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   25.332219] ==================================================================
[   25.333093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   25.333948] Free of addr fff00000c6519000 by task kunit_try_catch/197
[   25.334744] 
[   25.335509] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.336979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.337587] Hardware name: linux,dummy-virt (DT)
[   25.338299] Call trace:
[   25.338660]  show_stack+0x20/0x38 (C)
[   25.339395]  dump_stack_lvl+0x8c/0xd0
[   25.340204]  print_report+0x118/0x5e0
[   25.340749]  kasan_report_invalid_free+0xb0/0xd8
[   25.341401]  check_slab_allocation+0xd4/0x108
[   25.342020]  __kasan_slab_pre_free+0x2c/0x48
[   25.342632]  kmem_cache_free+0xf0/0x470
[   25.343227]  kmem_cache_double_free+0x190/0x3c8
[   25.344070]  kunit_try_run_case+0x14c/0x3d0
[   25.344795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.345544]  kthread+0x24c/0x2d0
[   25.346106]  ret_from_fork+0x10/0x20
[   25.346736] 
[   25.347046] Allocated by task 197:
[   25.347543]  kasan_save_stack+0x3c/0x68
[   25.348084]  kasan_save_track+0x20/0x40
[   25.348663]  kasan_save_alloc_info+0x40/0x58
[   25.349489]  __kasan_slab_alloc+0xa8/0xb0
[   25.350116]  kmem_cache_alloc_noprof+0x108/0x398
[   25.350768]  kmem_cache_double_free+0x12c/0x3c8
[   25.351974]  kunit_try_run_case+0x14c/0x3d0
[   25.352591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.353322]  kthread+0x24c/0x2d0
[   25.353840]  ret_from_fork+0x10/0x20
[   25.354380] 
[   25.354770] Freed by task 197:
[   25.355521]  kasan_save_stack+0x3c/0x68
[   25.356063]  kasan_save_track+0x20/0x40
[   25.356737]  kasan_save_free_info+0x4c/0x78
[   25.357296]  __kasan_slab_free+0x6c/0x98
[   25.357960]  kmem_cache_free+0x118/0x470
[   25.358575]  kmem_cache_double_free+0x140/0x3c8
[   25.359469]  kunit_try_run_case+0x14c/0x3d0
[   25.360087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.360823]  kthread+0x24c/0x2d0
[   25.361350]  ret_from_fork+0x10/0x20
[   25.361933] 
[   25.362282] The buggy address belongs to the object at fff00000c6519000
[   25.362282]  which belongs to the cache test_cache of size 200
[   25.363849] The buggy address is located 0 bytes inside of
[   25.363849]  200-byte region [fff00000c6519000, fff00000c65190c8)
[   25.365050] 
[   25.365470] The buggy address belongs to the physical page:
[   25.366148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106519
[   25.367184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.368043] page_type: f5(slab)
[   25.368575] raw: 0bfffe0000000000 fff00000c5798280 dead000000000122 0000000000000000
[   25.369458] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   25.370381] page dumped because: kasan: bad access detected
[   25.371449] 
[   25.371857] Memory state around the buggy address:
[   25.372382]  fff00000c6518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.373233]  fff00000c6518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.374045] >fff00000c6519000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.374890]                    ^
[   25.375510]  fff00000c6519080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   25.376553]  fff00000c6519100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.377418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   25.257485] ==================================================================
[   25.258740] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   25.259734] Read of size 1 at addr fff00000c648b0c8 by task kunit_try_catch/195
[   25.260972] 
[   25.261453] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   25.262600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.263335] Hardware name: linux,dummy-virt (DT)
[   25.263910] Call trace:
[   25.264258]  show_stack+0x20/0x38 (C)
[   25.264887]  dump_stack_lvl+0x8c/0xd0
[   25.265446]  print_report+0x118/0x5e0
[   25.266047]  kasan_report+0xc8/0x118
[   25.266550]  __asan_report_load1_noabort+0x20/0x30
[   25.267478]  kmem_cache_oob+0x33c/0x428
[   25.268058]  kunit_try_run_case+0x14c/0x3d0
[   25.268756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.269420]  kthread+0x24c/0x2d0
[   25.269958]  ret_from_fork+0x10/0x20
[   25.270572] 
[   25.270903] Allocated by task 195:
[   25.271451]  kasan_save_stack+0x3c/0x68
[   25.272276]  kasan_save_track+0x20/0x40
[   25.272868]  kasan_save_alloc_info+0x40/0x58
[   25.273527]  __kasan_slab_alloc+0xa8/0xb0
[   25.274076]  kmem_cache_alloc_noprof+0x108/0x398
[   25.275484]  kmem_cache_oob+0x12c/0x428
[   25.276090]  kunit_try_run_case+0x14c/0x3d0
[   25.276578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.277247]  kthread+0x24c/0x2d0
[   25.277756]  ret_from_fork+0x10/0x20
[   25.278278] 
[   25.278576] The buggy address belongs to the object at fff00000c648b000
[   25.278576]  which belongs to the cache test_cache of size 200
[   25.280225] The buggy address is located 0 bytes to the right of
[   25.280225]  allocated 200-byte region [fff00000c648b000, fff00000c648b0c8)
[   25.281480] 
[   25.281806] The buggy address belongs to the physical page:
[   25.282405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648b
[   25.283575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.284402] page_type: f5(slab)
[   25.284867] raw: 0bfffe0000000000 fff00000c5798140 dead000000000122 0000000000000000
[   25.285673] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   25.286505] page dumped because: kasan: bad access detected
[   25.287166] 
[   25.287509] Memory state around the buggy address:
[   25.288281]  fff00000c648af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.288992]  fff00000c648b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.289867] >fff00000c648b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.290638]                                               ^
[   25.291357]  fff00000c648b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.292393]  fff00000c648b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.293186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   24.781801] ==================================================================
[   24.782489] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   24.783059] Free of addr fff00000c6361200 by task kunit_try_catch/180
[   24.783366] 
[   24.783511] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.784602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.785625] Hardware name: linux,dummy-virt (DT)
[   24.786354] Call trace:
[   24.786808]  show_stack+0x20/0x38 (C)
[   24.787668]  dump_stack_lvl+0x8c/0xd0
[   24.788285]  print_report+0x118/0x5e0
[   24.788874]  kasan_report_invalid_free+0xb0/0xd8
[   24.789607]  check_slab_allocation+0xd4/0x108
[   24.790307]  __kasan_slab_pre_free+0x2c/0x48
[   24.790940]  kfree+0xe8/0x3c8
[   24.791635]  kfree_sensitive+0x3c/0xb0
[   24.792252]  kmalloc_double_kzfree+0x168/0x308
[   24.792944]  kunit_try_run_case+0x14c/0x3d0
[   24.793585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.794297]  kthread+0x24c/0x2d0
[   24.794874]  ret_from_fork+0x10/0x20
[   24.795535] 
[   24.795837] Allocated by task 180:
[   24.796321]  kasan_save_stack+0x3c/0x68
[   24.797396]  kasan_save_track+0x20/0x40
[   24.797980]  kasan_save_alloc_info+0x40/0x58
[   24.798519]  __kasan_kmalloc+0xd4/0xd8
[   24.799092]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.799765]  kmalloc_double_kzfree+0xb8/0x308
[   24.800429]  kunit_try_run_case+0x14c/0x3d0
[   24.801017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.802289]  kthread+0x24c/0x2d0
[   24.802799]  ret_from_fork+0x10/0x20
[   24.803397] 
[   24.803834] Freed by task 180:
[   24.804442]  kasan_save_stack+0x3c/0x68
[   24.805133]  kasan_save_track+0x20/0x40
[   24.805623]  kasan_save_free_info+0x4c/0x78
[   24.806174]  __kasan_slab_free+0x6c/0x98
[   24.806695]  kfree+0x114/0x3c8
[   24.807389]  kfree_sensitive+0x80/0xb0
[   24.807947]  kmalloc_double_kzfree+0x11c/0x308
[   24.808568]  kunit_try_run_case+0x14c/0x3d0
[   24.809176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.809843]  kthread+0x24c/0x2d0
[   24.810370]  ret_from_fork+0x10/0x20
[   24.810885] 
[   24.811370] The buggy address belongs to the object at fff00000c6361200
[   24.811370]  which belongs to the cache kmalloc-16 of size 16
[   24.812734] The buggy address is located 0 bytes inside of
[   24.812734]  16-byte region [fff00000c6361200, fff00000c6361210)
[   24.813945] 
[   24.814256] The buggy address belongs to the physical page:
[   24.815097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   24.816171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.816960] page_type: f5(slab)
[   24.817377] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.818223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.819275] page dumped because: kasan: bad access detected
[   24.819911] 
[   24.820152] Memory state around the buggy address:
[   24.820658]  fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.821773]  fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.822466] >fff00000c6361200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.823452]                    ^
[   24.824006]  fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.824890]  fff00000c6361300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.825560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   24.736064] ==================================================================
[   24.737018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   24.737864] Read of size 1 at addr fff00000c6361200 by task kunit_try_catch/180
[   24.738754] 
[   24.739087] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.740033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.740644] Hardware name: linux,dummy-virt (DT)
[   24.742008] Call trace:
[   24.742370]  show_stack+0x20/0x38 (C)
[   24.743206]  dump_stack_lvl+0x8c/0xd0
[   24.743736]  print_report+0x118/0x5e0
[   24.744267]  kasan_report+0xc8/0x118
[   24.744828]  __kasan_check_byte+0x54/0x70
[   24.745373]  kfree_sensitive+0x30/0xb0
[   24.746009]  kmalloc_double_kzfree+0x168/0x308
[   24.746626]  kunit_try_run_case+0x14c/0x3d0
[   24.747503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.748210]  kthread+0x24c/0x2d0
[   24.748747]  ret_from_fork+0x10/0x20
[   24.749265] 
[   24.749627] Allocated by task 180:
[   24.750121]  kasan_save_stack+0x3c/0x68
[   24.750714]  kasan_save_track+0x20/0x40
[   24.751486]  kasan_save_alloc_info+0x40/0x58
[   24.752068]  __kasan_kmalloc+0xd4/0xd8
[   24.752641]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.753225]  kmalloc_double_kzfree+0xb8/0x308
[   24.753756]  kunit_try_run_case+0x14c/0x3d0
[   24.754395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.755280]  kthread+0x24c/0x2d0
[   24.755756]  ret_from_fork+0x10/0x20
[   24.756301] 
[   24.756625] Freed by task 180:
[   24.757068]  kasan_save_stack+0x3c/0x68
[   24.757580]  kasan_save_track+0x20/0x40
[   24.758171]  kasan_save_free_info+0x4c/0x78
[   24.758686]  __kasan_slab_free+0x6c/0x98
[   24.760018]  kfree+0x114/0x3c8
[   24.760460]  kfree_sensitive+0x80/0xb0
[   24.761043]  kmalloc_double_kzfree+0x11c/0x308
[   24.761627]  kunit_try_run_case+0x14c/0x3d0
[   24.762252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.763103]  kthread+0x24c/0x2d0
[   24.763655]  ret_from_fork+0x10/0x20
[   24.764200] 
[   24.764496] The buggy address belongs to the object at fff00000c6361200
[   24.764496]  which belongs to the cache kmalloc-16 of size 16
[   24.765746] The buggy address is located 0 bytes inside of
[   24.765746]  freed 16-byte region [fff00000c6361200, fff00000c6361210)
[   24.767151] 
[   24.767503] The buggy address belongs to the physical page:
[   24.768094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   24.768976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.769816] page_type: f5(slab)
[   24.770322] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.771301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.772210] page dumped because: kasan: bad access detected
[   24.772946] 
[   24.773307] Memory state around the buggy address:
[   24.773893]  fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.774718]  fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.775778] >fff00000c6361200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.776572]                    ^
[   24.777075]  fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.777932]  fff00000c6361300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.778850] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   24.625111] ==================================================================
[   24.626102] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   24.626913] Write of size 33 at addr fff00000c125ae00 by task kunit_try_catch/174
[   24.628855] 
[   24.629216] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.630396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.631001] Hardware name: linux,dummy-virt (DT)
[   24.631549] Call trace:
[   24.632011]  show_stack+0x20/0x38 (C)
[   24.632575]  dump_stack_lvl+0x8c/0xd0
[   24.633583]  print_report+0x118/0x5e0
[   24.634365]  kasan_report+0xc8/0x118
[   24.634916]  kasan_check_range+0x100/0x1a8
[   24.635594]  __asan_memset+0x34/0x78
[   24.636210]  kmalloc_uaf_memset+0x170/0x310
[   24.636916]  kunit_try_run_case+0x14c/0x3d0
[   24.637507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.638379]  kthread+0x24c/0x2d0
[   24.639110]  ret_from_fork+0x10/0x20
[   24.639640] 
[   24.639935] Allocated by task 174:
[   24.640495]  kasan_save_stack+0x3c/0x68
[   24.641214]  kasan_save_track+0x20/0x40
[   24.641844]  kasan_save_alloc_info+0x40/0x58
[   24.642428]  __kasan_kmalloc+0xd4/0xd8
[   24.643046]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.643722]  kmalloc_uaf_memset+0xb8/0x310
[   24.644301]  kunit_try_run_case+0x14c/0x3d0
[   24.644969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.645675]  kthread+0x24c/0x2d0
[   24.646220]  ret_from_fork+0x10/0x20
[   24.646835] 
[   24.647161] Freed by task 174:
[   24.647694]  kasan_save_stack+0x3c/0x68
[   24.648289]  kasan_save_track+0x20/0x40
[   24.648911]  kasan_save_free_info+0x4c/0x78
[   24.649529]  __kasan_slab_free+0x6c/0x98
[   24.650145]  kfree+0x114/0x3c8
[   24.650637]  kmalloc_uaf_memset+0x11c/0x310
[   24.651294]  kunit_try_run_case+0x14c/0x3d0
[   24.651909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.652670]  kthread+0x24c/0x2d0
[   24.653237]  ret_from_fork+0x10/0x20
[   24.653845] 
[   24.654166] The buggy address belongs to the object at fff00000c125ae00
[   24.654166]  which belongs to the cache kmalloc-64 of size 64
[   24.655448] The buggy address is located 0 bytes inside of
[   24.655448]  freed 64-byte region [fff00000c125ae00, fff00000c125ae40)
[   24.656576] 
[   24.656978] The buggy address belongs to the physical page:
[   24.657562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a
[   24.658687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.659603] page_type: f5(slab)
[   24.660120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.661088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.661957] page dumped because: kasan: bad access detected
[   24.662652] 
[   24.662993] Memory state around the buggy address:
[   24.663642]  fff00000c125ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.664520]  fff00000c125ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.665412] >fff00000c125ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.666254]                    ^
[   24.666759]  fff00000c125ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667573]  fff00000c125af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.668377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   24.489809] ==================================================================
[   24.491235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   24.492285] Read of size 64 at addr fff00000c6487184 by task kunit_try_catch/170
[   24.493285] 
[   24.493615] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.495656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.496207] Hardware name: linux,dummy-virt (DT)
[   24.497250] Call trace:
[   24.497828]  show_stack+0x20/0x38 (C)
[   24.498488]  dump_stack_lvl+0x8c/0xd0
[   24.499270]  print_report+0x118/0x5e0
[   24.499978]  kasan_report+0xc8/0x118
[   24.500784]  kasan_check_range+0x100/0x1a8
[   24.501334]  __asan_memmove+0x3c/0x98
[   24.501909]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   24.502680]  kunit_try_run_case+0x14c/0x3d0
[   24.503669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.504692]  kthread+0x24c/0x2d0
[   24.505276]  ret_from_fork+0x10/0x20
[   24.505887] 
[   24.506250] Allocated by task 170:
[   24.506797]  kasan_save_stack+0x3c/0x68
[   24.507608]  kasan_save_track+0x20/0x40
[   24.508654]  kasan_save_alloc_info+0x40/0x58
[   24.509274]  __kasan_kmalloc+0xd4/0xd8
[   24.509911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.510621]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   24.511313]  kunit_try_run_case+0x14c/0x3d0
[   24.512218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.512981]  kthread+0x24c/0x2d0
[   24.513549]  ret_from_fork+0x10/0x20
[   24.514128] 
[   24.514494] The buggy address belongs to the object at fff00000c6487180
[   24.514494]  which belongs to the cache kmalloc-64 of size 64
[   24.516029] The buggy address is located 4 bytes inside of
[   24.516029]  allocated 64-byte region [fff00000c6487180, fff00000c64871c0)
[   24.517336] 
[   24.517758] The buggy address belongs to the physical page:
[   24.518534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106487
[   24.519503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.520493] page_type: f5(slab)
[   24.521011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.521612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.522227] page dumped because: kasan: bad access detected
[   24.524010] 
[   24.524460] Memory state around the buggy address:
[   24.525255]  fff00000c6487080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.526332]  fff00000c6487100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.527101] >fff00000c6487180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.527811]                                            ^
[   24.528866]  fff00000c6487200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.529951]  fff00000c6487280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.531104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   24.441590] ==================================================================
[   24.442578] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   24.444277] Read of size 18446744073709551614 at addr fff00000c125ad04 by task kunit_try_catch/168
[   24.445239] 
[   24.445602] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.447580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.447970] Hardware name: linux,dummy-virt (DT)
[   24.448481] Call trace:
[   24.448910]  show_stack+0x20/0x38 (C)
[   24.449479]  dump_stack_lvl+0x8c/0xd0
[   24.450277]  print_report+0x118/0x5e0
[   24.451014]  kasan_report+0xc8/0x118
[   24.451603]  kasan_check_range+0x100/0x1a8
[   24.452216]  __asan_memmove+0x3c/0x98
[   24.452468]  kmalloc_memmove_negative_size+0x154/0x2e0
[   24.452868]  kunit_try_run_case+0x14c/0x3d0
[   24.453683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.454455]  kthread+0x24c/0x2d0
[   24.455015]  ret_from_fork+0x10/0x20
[   24.455625] 
[   24.456029] Allocated by task 168:
[   24.456534]  kasan_save_stack+0x3c/0x68
[   24.457155]  kasan_save_track+0x20/0x40
[   24.457788]  kasan_save_alloc_info+0x40/0x58
[   24.458442]  __kasan_kmalloc+0xd4/0xd8
[   24.459221]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.459864]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   24.460485]  kunit_try_run_case+0x14c/0x3d0
[   24.461127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.461781]  kthread+0x24c/0x2d0
[   24.462371]  ret_from_fork+0x10/0x20
[   24.462963] 
[   24.463477] The buggy address belongs to the object at fff00000c125ad00
[   24.463477]  which belongs to the cache kmalloc-64 of size 64
[   24.464810] The buggy address is located 4 bytes inside of
[   24.464810]  64-byte region [fff00000c125ad00, fff00000c125ad40)
[   24.466013] 
[   24.466412] The buggy address belongs to the physical page:
[   24.467385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a
[   24.468338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.469180] page_type: f5(slab)
[   24.469773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.470613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.471719] page dumped because: kasan: bad access detected
[   24.472389] 
[   24.472798] Memory state around the buggy address:
[   24.473406]  fff00000c125ac00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   24.474197]  fff00000c125ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.475181] >fff00000c125ad00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.476534]                    ^
[   24.476930]  fff00000c125ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.477488]  fff00000c125ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.478188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   24.300837] ==================================================================
[   24.301769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   24.302474] Write of size 4 at addr fff00000c639f875 by task kunit_try_catch/162
[   24.303433] 
[   24.303827] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.305167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.305664] Hardware name: linux,dummy-virt (DT)
[   24.306275] Call trace:
[   24.307988]  show_stack+0x20/0x38 (C)
[   24.308497]  dump_stack_lvl+0x8c/0xd0
[   24.309052]  print_report+0x118/0x5e0
[   24.309620]  kasan_report+0xc8/0x118
[   24.310237]  kasan_check_range+0x100/0x1a8
[   24.311220]  __asan_memset+0x34/0x78
[   24.311758]  kmalloc_oob_memset_4+0x150/0x300
[   24.312357]  kunit_try_run_case+0x14c/0x3d0
[   24.313010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.313632]  kthread+0x24c/0x2d0
[   24.314198]  ret_from_fork+0x10/0x20
[   24.314780] 
[   24.315779] Allocated by task 162:
[   24.316354]  kasan_save_stack+0x3c/0x68
[   24.317074]  kasan_save_track+0x20/0x40
[   24.317685]  kasan_save_alloc_info+0x40/0x58
[   24.318357]  __kasan_kmalloc+0xd4/0xd8
[   24.318874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.319390]  kmalloc_oob_memset_4+0xb0/0x300
[   24.319953]  kunit_try_run_case+0x14c/0x3d0
[   24.320548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.321369]  kthread+0x24c/0x2d0
[   24.322196]  ret_from_fork+0x10/0x20
[   24.322726] 
[   24.323068] The buggy address belongs to the object at fff00000c639f800
[   24.323068]  which belongs to the cache kmalloc-128 of size 128
[   24.325021] The buggy address is located 117 bytes inside of
[   24.325021]  allocated 120-byte region [fff00000c639f800, fff00000c639f878)
[   24.326337] 
[   24.326690] The buggy address belongs to the physical page:
[   24.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.328718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.329482] page_type: f5(slab)
[   24.330010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.330791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.332246] page dumped because: kasan: bad access detected
[   24.333013] 
[   24.333320] Memory state around the buggy address:
[   24.333890]  fff00000c639f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.334619]  fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.335508] >fff00000c639f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.336742]                                                                 ^
[   24.337420]  fff00000c639f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.338095]  fff00000c639f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.339180] ==================================================================
[   24.349716] ==================================================================
[   24.350798] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   24.352573] Write of size 8 at addr fff00000c6387b71 by task kunit_try_catch/164
[   24.353288] 
[   24.353688] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.354814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.355551] Hardware name: linux,dummy-virt (DT)
[   24.356185] Call trace:
[   24.356617]  show_stack+0x20/0x38 (C)
[   24.357139]  dump_stack_lvl+0x8c/0xd0
[   24.357812]  print_report+0x118/0x5e0
[   24.358455]  kasan_report+0xc8/0x118
[   24.359284]  kasan_check_range+0x100/0x1a8
[   24.360057]  __asan_memset+0x34/0x78
[   24.360632]  kmalloc_oob_memset_8+0x150/0x2f8
[   24.361302]  kunit_try_run_case+0x14c/0x3d0
[   24.361930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.362680]  kthread+0x24c/0x2d0
[   24.363381]  ret_from_fork+0x10/0x20
[   24.363961] 
[   24.364249] Allocated by task 164:
[   24.364678]  kasan_save_stack+0x3c/0x68
[   24.365303]  kasan_save_track+0x20/0x40
[   24.365820]  kasan_save_alloc_info+0x40/0x58
[   24.366387]  __kasan_kmalloc+0xd4/0xd8
[   24.367071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.368063]  kmalloc_oob_memset_8+0xb0/0x2f8
[   24.368721]  kunit_try_run_case+0x14c/0x3d0
[   24.369298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.370069]  kthread+0x24c/0x2d0
[   24.370557]  ret_from_fork+0x10/0x20
[   24.371368] 
[   24.371692] The buggy address belongs to the object at fff00000c6387b00
[   24.371692]  which belongs to the cache kmalloc-128 of size 128
[   24.372798] The buggy address is located 113 bytes inside of
[   24.372798]  allocated 120-byte region [fff00000c6387b00, fff00000c6387b78)
[   24.374659] 
[   24.375125] The buggy address belongs to the physical page:
[   24.376381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106387
[   24.377166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.377766] page_type: f5(slab)
[   24.378263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.379453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.380267] page dumped because: kasan: bad access detected
[   24.380961] 
[   24.381288] Memory state around the buggy address:
[   24.381939]  fff00000c6387a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.383076]  fff00000c6387a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383802] >fff00000c6387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.384614]                                                                 ^
[   24.385416]  fff00000c6387b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.386291]  fff00000c6387c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.387239] ==================================================================
[   24.394876] ==================================================================
[   24.396278] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   24.397056] Write of size 16 at addr fff00000c639fb69 by task kunit_try_catch/166
[   24.398390] 
[   24.398715] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.399789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.400313] Hardware name: linux,dummy-virt (DT)
[   24.401119] Call trace:
[   24.401461]  show_stack+0x20/0x38 (C)
[   24.402287]  dump_stack_lvl+0x8c/0xd0
[   24.403237]  print_report+0x118/0x5e0
[   24.403774]  kasan_report+0xc8/0x118
[   24.404278]  kasan_check_range+0x100/0x1a8
[   24.404924]  __asan_memset+0x34/0x78
[   24.405444]  kmalloc_oob_memset_16+0x150/0x2f8
[   24.406031]  kunit_try_run_case+0x14c/0x3d0
[   24.406684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.408056]  kthread+0x24c/0x2d0
[   24.408546]  ret_from_fork+0x10/0x20
[   24.409168] 
[   24.409452] Allocated by task 166:
[   24.409955]  kasan_save_stack+0x3c/0x68
[   24.410559]  kasan_save_track+0x20/0x40
[   24.411469]  kasan_save_alloc_info+0x40/0x58
[   24.411895]  __kasan_kmalloc+0xd4/0xd8
[   24.412434]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.413012]  kmalloc_oob_memset_16+0xb0/0x2f8
[   24.413561]  kunit_try_run_case+0x14c/0x3d0
[   24.414274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.415417]  kthread+0x24c/0x2d0
[   24.415793]  ret_from_fork+0x10/0x20
[   24.416390] 
[   24.416763] The buggy address belongs to the object at fff00000c639fb00
[   24.416763]  which belongs to the cache kmalloc-128 of size 128
[   24.418002] The buggy address is located 105 bytes inside of
[   24.418002]  allocated 120-byte region [fff00000c639fb00, fff00000c639fb78)
[   24.419241] 
[   24.419605] The buggy address belongs to the physical page:
[   24.420180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.421090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.422112] page_type: f5(slab)
[   24.422665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.424255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.425206] page dumped because: kasan: bad access detected
[   24.425889] 
[   24.426206] Memory state around the buggy address:
[   24.426963]  fff00000c639fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.427869]  fff00000c639fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.428654] >fff00000c639fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.429566]                                                                 ^
[   24.430427]  fff00000c639fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431416]  fff00000c639fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431967] ==================================================================
[   24.252155] ==================================================================
[   24.253347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   24.254071] Write of size 2 at addr fff00000c639f777 by task kunit_try_catch/160
[   24.254670] 
[   24.255764] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.257092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.257782] Hardware name: linux,dummy-virt (DT)
[   24.258499] Call trace:
[   24.259387]  show_stack+0x20/0x38 (C)
[   24.259911]  dump_stack_lvl+0x8c/0xd0
[   24.260485]  print_report+0x118/0x5e0
[   24.261364]  kasan_report+0xc8/0x118
[   24.262035]  kasan_check_range+0x100/0x1a8
[   24.262557]  __asan_memset+0x34/0x78
[   24.263595]  kmalloc_oob_memset_2+0x150/0x2f8
[   24.264225]  kunit_try_run_case+0x14c/0x3d0
[   24.265094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.266126]  kthread+0x24c/0x2d0
[   24.266782]  ret_from_fork+0x10/0x20
[   24.267492] 
[   24.268057] Allocated by task 160:
[   24.268590]  kasan_save_stack+0x3c/0x68
[   24.269141]  kasan_save_track+0x20/0x40
[   24.269787]  kasan_save_alloc_info+0x40/0x58
[   24.270454]  __kasan_kmalloc+0xd4/0xd8
[   24.270945]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.272201]  kmalloc_oob_memset_2+0xb0/0x2f8
[   24.272912]  kunit_try_run_case+0x14c/0x3d0
[   24.273512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274209]  kthread+0x24c/0x2d0
[   24.274780]  ret_from_fork+0x10/0x20
[   24.275445] 
[   24.275790] The buggy address belongs to the object at fff00000c639f700
[   24.275790]  which belongs to the cache kmalloc-128 of size 128
[   24.277084] The buggy address is located 119 bytes inside of
[   24.277084]  allocated 120-byte region [fff00000c639f700, fff00000c639f778)
[   24.278733] 
[   24.279752] The buggy address belongs to the physical page:
[   24.280252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.281106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.281865] page_type: f5(slab)
[   24.282325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.283269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.284144] page dumped because: kasan: bad access detected
[   24.284805] 
[   24.285108] Memory state around the buggy address:
[   24.285643]  fff00000c639f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.286445]  fff00000c639f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287588] >fff00000c639f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.288317]                                                                 ^
[   24.289224]  fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290282]  fff00000c639f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.291164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.206563] ==================================================================
[   24.207779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   24.208548] Write of size 128 at addr fff00000c639f600 by task kunit_try_catch/158
[   24.210220] 
[   24.210649] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.212092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.212740] Hardware name: linux,dummy-virt (DT)
[   24.213408] Call trace:
[   24.213841]  show_stack+0x20/0x38 (C)
[   24.214431]  dump_stack_lvl+0x8c/0xd0
[   24.215140]  print_report+0x118/0x5e0
[   24.215664]  kasan_report+0xc8/0x118
[   24.216198]  kasan_check_range+0x100/0x1a8
[   24.216780]  __asan_memset+0x34/0x78
[   24.217487]  kmalloc_oob_in_memset+0x144/0x2d0
[   24.218238]  kunit_try_run_case+0x14c/0x3d0
[   24.219018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.219767]  kthread+0x24c/0x2d0
[   24.220262]  ret_from_fork+0x10/0x20
[   24.220822] 
[   24.221129] Allocated by task 158:
[   24.221612]  kasan_save_stack+0x3c/0x68
[   24.222129]  kasan_save_track+0x20/0x40
[   24.222693]  kasan_save_alloc_info+0x40/0x58
[   24.223327]  __kasan_kmalloc+0xd4/0xd8
[   24.224254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.224825]  kmalloc_oob_in_memset+0xb0/0x2d0
[   24.225399]  kunit_try_run_case+0x14c/0x3d0
[   24.225986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.226585]  kthread+0x24c/0x2d0
[   24.227369]  ret_from_fork+0x10/0x20
[   24.227834] 
[   24.228164] The buggy address belongs to the object at fff00000c639f600
[   24.228164]  which belongs to the cache kmalloc-128 of size 128
[   24.229509] The buggy address is located 0 bytes inside of
[   24.229509]  allocated 120-byte region [fff00000c639f600, fff00000c639f678)
[   24.230782] 
[   24.231456] The buggy address belongs to the physical page:
[   24.232099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.233030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.233764] page_type: f5(slab)
[   24.234222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.235308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.236148] page dumped because: kasan: bad access detected
[   24.236829] 
[   24.237125] Memory state around the buggy address:
[   24.237760]  fff00000c639f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.238479]  fff00000c639f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.239724] >fff00000c639f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.240515]                                                                 ^
[   24.241303]  fff00000c639f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.242117]  fff00000c639f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.242891] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   24.154123] ==================================================================
[   24.155481] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   24.156991] Read of size 16 at addr fff00000c63611c0 by task kunit_try_catch/156
[   24.157781] 
[   24.158111] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.159693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.160198] Hardware name: linux,dummy-virt (DT)
[   24.160896] Call trace:
[   24.161253]  show_stack+0x20/0x38 (C)
[   24.162321]  dump_stack_lvl+0x8c/0xd0
[   24.163257]  print_report+0x118/0x5e0
[   24.163924]  kasan_report+0xc8/0x118
[   24.164590]  __asan_report_load16_noabort+0x20/0x30
[   24.165217]  kmalloc_uaf_16+0x3bc/0x438
[   24.165752]  kunit_try_run_case+0x14c/0x3d0
[   24.166380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.167021]  kthread+0x24c/0x2d0
[   24.167781]  ret_from_fork+0x10/0x20
[   24.168300] 
[   24.168681] Allocated by task 156:
[   24.169139]  kasan_save_stack+0x3c/0x68
[   24.169772]  kasan_save_track+0x20/0x40
[   24.170298]  kasan_save_alloc_info+0x40/0x58
[   24.170927]  __kasan_kmalloc+0xd4/0xd8
[   24.171442]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.171936]  kmalloc_uaf_16+0x140/0x438
[   24.172895]  kunit_try_run_case+0x14c/0x3d0
[   24.173467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.174078]  kthread+0x24c/0x2d0
[   24.174499]  ret_from_fork+0x10/0x20
[   24.175013] 
[   24.175284] Freed by task 156:
[   24.176239]  kasan_save_stack+0x3c/0x68
[   24.176882]  kasan_save_track+0x20/0x40
[   24.177511]  kasan_save_free_info+0x4c/0x78
[   24.178170]  __kasan_slab_free+0x6c/0x98
[   24.179097]  kfree+0x114/0x3c8
[   24.179579]  kmalloc_uaf_16+0x190/0x438
[   24.180164]  kunit_try_run_case+0x14c/0x3d0
[   24.180851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181610]  kthread+0x24c/0x2d0
[   24.182148]  ret_from_fork+0x10/0x20
[   24.182378] 
[   24.182515] The buggy address belongs to the object at fff00000c63611c0
[   24.182515]  which belongs to the cache kmalloc-16 of size 16
[   24.183890] The buggy address is located 0 bytes inside of
[   24.183890]  freed 16-byte region [fff00000c63611c0, fff00000c63611d0)
[   24.185319] 
[   24.185686] The buggy address belongs to the physical page:
[   24.186326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   24.187516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.188263] page_type: f5(slab)
[   24.188804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.189630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.190449] page dumped because: kasan: bad access detected
[   24.191288] 
[   24.191595] Memory state around the buggy address:
[   24.192285]  fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.193175]  fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.193928] >fff00000c6361180: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   24.194748]                                            ^
[   24.195674]  fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.196499]  fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.197292] ==================================================================
[   24.678121] ==================================================================
[   24.679154] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   24.679944] Read of size 1 at addr fff00000c125aea8 by task kunit_try_catch/176
[   24.680794] 
[   24.681234] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.682508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.683072] Hardware name: linux,dummy-virt (DT)
[   24.683762] Call trace:
[   24.684201]  show_stack+0x20/0x38 (C)
[   24.684868]  dump_stack_lvl+0x8c/0xd0
[   24.685468]  print_report+0x118/0x5e0
[   24.686073]  kasan_report+0xc8/0x118
[   24.686628]  __asan_report_load1_noabort+0x20/0x30
[   24.687325]  kmalloc_uaf2+0x3f4/0x468
[   24.687906]  kunit_try_run_case+0x14c/0x3d0
[   24.688535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.689269]  kthread+0x24c/0x2d0
[   24.689835]  ret_from_fork+0x10/0x20
[   24.690402] 
[   24.690776] Allocated by task 176:
[   24.691296]  kasan_save_stack+0x3c/0x68
[   24.691962]  kasan_save_track+0x20/0x40
[   24.692577]  kasan_save_alloc_info+0x40/0x58
[   24.693228]  __kasan_kmalloc+0xd4/0xd8
[   24.693869]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.694560]  kmalloc_uaf2+0xc4/0x468
[   24.695113]  kunit_try_run_case+0x14c/0x3d0
[   24.695756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.696450]  kthread+0x24c/0x2d0
[   24.697015]  ret_from_fork+0x10/0x20
[   24.697576] 
[   24.697893] Freed by task 176:
[   24.698406]  kasan_save_stack+0x3c/0x68
[   24.699036]  kasan_save_track+0x20/0x40
[   24.699574]  kasan_save_free_info+0x4c/0x78
[   24.700232]  __kasan_slab_free+0x6c/0x98
[   24.700856]  kfree+0x114/0x3c8
[   24.701348]  kmalloc_uaf2+0x134/0x468
[   24.701946]  kunit_try_run_case+0x14c/0x3d0
[   24.702585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703277]  kthread+0x24c/0x2d0
[   24.703817]  ret_from_fork+0x10/0x20
[   24.704404] 
[   24.704824] The buggy address belongs to the object at fff00000c125ae80
[   24.704824]  which belongs to the cache kmalloc-64 of size 64
[   24.706104] The buggy address is located 40 bytes inside of
[   24.706104]  freed 64-byte region [fff00000c125ae80, fff00000c125aec0)
[   24.707402] 
[   24.707774] The buggy address belongs to the physical page:
[   24.708420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a
[   24.709345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.710159] page_type: f5(slab)
[   24.710689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.711621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.712456] page dumped because: kasan: bad access detected
[   24.713149] 
[   24.713473] Memory state around the buggy address:
[   24.714179]  fff00000c125ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.715042]  fff00000c125ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.715886] >fff00000c125ae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.716681]                                   ^
[   24.717327]  fff00000c125af00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   24.718185]  fff00000c125af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.718990] ==================================================================
[   24.550411] ==================================================================
[   24.554020] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   24.556388] Read of size 1 at addr fff00000c63611e8 by task kunit_try_catch/172
[   24.559018] 
[   24.559609] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.561976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.563221] Hardware name: linux,dummy-virt (DT)
[   24.564912] Call trace:
[   24.566019]  show_stack+0x20/0x38 (C)
[   24.566654]  dump_stack_lvl+0x8c/0xd0
[   24.569204]  print_report+0x118/0x5e0
[   24.570373]  kasan_report+0xc8/0x118
[   24.570799]  __asan_report_load1_noabort+0x20/0x30
[   24.571270]  kmalloc_uaf+0x300/0x338
[   24.571655]  kunit_try_run_case+0x14c/0x3d0
[   24.573632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.575551]  kthread+0x24c/0x2d0
[   24.576969]  ret_from_fork+0x10/0x20
[   24.579079] 
[   24.579547] Allocated by task 172:
[   24.580884]  kasan_save_stack+0x3c/0x68
[   24.582322]  kasan_save_track+0x20/0x40
[   24.583626]  kasan_save_alloc_info+0x40/0x58
[   24.584223]  __kasan_kmalloc+0xd4/0xd8
[   24.584819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.585484]  kmalloc_uaf+0xb8/0x338
[   24.586058]  kunit_try_run_case+0x14c/0x3d0
[   24.586529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.588581]  kthread+0x24c/0x2d0
[   24.589080]  ret_from_fork+0x10/0x20
[   24.589754] 
[   24.590118] Freed by task 172:
[   24.590665]  kasan_save_stack+0x3c/0x68
[   24.591364]  kasan_save_track+0x20/0x40
[   24.592011]  kasan_save_free_info+0x4c/0x78
[   24.592983]  __kasan_slab_free+0x6c/0x98
[   24.593643]  kfree+0x114/0x3c8
[   24.594211]  kmalloc_uaf+0x11c/0x338
[   24.595081]  kunit_try_run_case+0x14c/0x3d0
[   24.595829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.596554]  kthread+0x24c/0x2d0
[   24.597079]  ret_from_fork+0x10/0x20
[   24.597692] 
[   24.598085] The buggy address belongs to the object at fff00000c63611e0
[   24.598085]  which belongs to the cache kmalloc-16 of size 16
[   24.600102] The buggy address is located 8 bytes inside of
[   24.600102]  freed 16-byte region [fff00000c63611e0, fff00000c63611f0)
[   24.600960] 
[   24.601201] The buggy address belongs to the physical page:
[   24.601650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   24.602377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.603088] page_type: f5(slab)
[   24.603965] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.604874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.605909] page dumped because: kasan: bad access detected
[   24.606590] 
[   24.608288] Memory state around the buggy address:
[   24.609047]  fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.610251]  fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.611234] >fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.611794]                                                           ^
[   24.612311]  fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.612954]  fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.613664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   24.108995] ==================================================================
[   24.109990] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   24.110746] Write of size 16 at addr fff00000c6361160 by task kunit_try_catch/154
[   24.111716] 
[   24.112479] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.114036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.114998] Hardware name: linux,dummy-virt (DT)
[   24.115650] Call trace:
[   24.116112]  show_stack+0x20/0x38 (C)
[   24.116732]  dump_stack_lvl+0x8c/0xd0
[   24.117317]  print_report+0x118/0x5e0
[   24.117866]  kasan_report+0xc8/0x118
[   24.118389]  __asan_report_store16_noabort+0x20/0x30
[   24.119130]  kmalloc_oob_16+0x3a0/0x3f8
[   24.119600]  kunit_try_run_case+0x14c/0x3d0
[   24.120265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.121076]  kthread+0x24c/0x2d0
[   24.121623]  ret_from_fork+0x10/0x20
[   24.122208] 
[   24.122598] Allocated by task 154:
[   24.123186]  kasan_save_stack+0x3c/0x68
[   24.123824]  kasan_save_track+0x20/0x40
[   24.124469]  kasan_save_alloc_info+0x40/0x58
[   24.125164]  __kasan_kmalloc+0xd4/0xd8
[   24.125788]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.126436]  kmalloc_oob_16+0xb4/0x3f8
[   24.127193]  kunit_try_run_case+0x14c/0x3d0
[   24.127984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.128775]  kthread+0x24c/0x2d0
[   24.129247]  ret_from_fork+0x10/0x20
[   24.130034] 
[   24.130352] The buggy address belongs to the object at fff00000c6361160
[   24.130352]  which belongs to the cache kmalloc-16 of size 16
[   24.132107] The buggy address is located 0 bytes inside of
[   24.132107]  allocated 13-byte region [fff00000c6361160, fff00000c636116d)
[   24.133417] 
[   24.133641] The buggy address belongs to the physical page:
[   24.134651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   24.135882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.136629] page_type: f5(slab)
[   24.137112] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.137940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.138775] page dumped because: kasan: bad access detected
[   24.139346] 
[   24.139661] Memory state around the buggy address:
[   24.140519]  fff00000c6361000: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   24.141292]  fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.142117] >fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   24.143081]                                                           ^
[   24.143824]  fff00000c6361180: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.144603]  fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.145376] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   23.995981] ==================================================================
[   23.997118] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   23.997942] Read of size 1 at addr fff00000c0973600 by task kunit_try_catch/152
[   23.998813] 
[   23.999646] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.000922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.001489] Hardware name: linux,dummy-virt (DT)
[   24.002361] Call trace:
[   24.003298]  show_stack+0x20/0x38 (C)
[   24.003879]  dump_stack_lvl+0x8c/0xd0
[   24.004440]  print_report+0x118/0x5e0
[   24.005025]  kasan_report+0xc8/0x118
[   24.005561]  __kasan_check_byte+0x54/0x70
[   24.006192]  krealloc_noprof+0x44/0x360
[   24.006770]  krealloc_uaf+0x180/0x520
[   24.007336]  kunit_try_run_case+0x14c/0x3d0
[   24.008323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.008998]  kthread+0x24c/0x2d0
[   24.009399]  ret_from_fork+0x10/0x20
[   24.010406] 
[   24.010792] Allocated by task 152:
[   24.011353]  kasan_save_stack+0x3c/0x68
[   24.012212]  kasan_save_track+0x20/0x40
[   24.012811]  kasan_save_alloc_info+0x40/0x58
[   24.013482]  __kasan_kmalloc+0xd4/0xd8
[   24.014091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.014733]  krealloc_uaf+0xc8/0x520
[   24.015343]  kunit_try_run_case+0x14c/0x3d0
[   24.016006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.017427]  kthread+0x24c/0x2d0
[   24.017870]  ret_from_fork+0x10/0x20
[   24.018380] 
[   24.018722] Freed by task 152:
[   24.019532]  kasan_save_stack+0x3c/0x68
[   24.020079]  kasan_save_track+0x20/0x40
[   24.020613]  kasan_save_free_info+0x4c/0x78
[   24.021176]  __kasan_slab_free+0x6c/0x98
[   24.021753]  kfree+0x114/0x3c8
[   24.022210]  krealloc_uaf+0x12c/0x520
[   24.022748]  kunit_try_run_case+0x14c/0x3d0
[   24.024037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.024729]  kthread+0x24c/0x2d0
[   24.025238]  ret_from_fork+0x10/0x20
[   24.025795] 
[   24.026143] The buggy address belongs to the object at fff00000c0973600
[   24.026143]  which belongs to the cache kmalloc-256 of size 256
[   24.027517] The buggy address is located 0 bytes inside of
[   24.027517]  freed 256-byte region [fff00000c0973600, fff00000c0973700)
[   24.029198] 
[   24.029428] The buggy address belongs to the physical page:
[   24.030181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   24.031647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.032786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.033523] page_type: f5(slab)
[   24.034062] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.035269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.036017] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.036901] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.037808] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   24.038650] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.040087] page dumped because: kasan: bad access detected
[   24.040721] 
[   24.041041] Memory state around the buggy address:
[   24.041635]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.042436]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.043634] >fff00000c0973600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.044534]                    ^
[   24.045154]  fff00000c0973680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.046195]  fff00000c0973700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.047950] ==================================================================
[   24.051410] ==================================================================
[   24.052269] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   24.052933] Read of size 1 at addr fff00000c0973600 by task kunit_try_catch/152
[   24.053535] 
[   24.053938] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.055123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.055833] Hardware name: linux,dummy-virt (DT)
[   24.057181] Call trace:
[   24.057613]  show_stack+0x20/0x38 (C)
[   24.058284]  dump_stack_lvl+0x8c/0xd0
[   24.059193]  print_report+0x118/0x5e0
[   24.059662]  kasan_report+0xc8/0x118
[   24.060084]  __asan_report_load1_noabort+0x20/0x30
[   24.060579]  krealloc_uaf+0x4c8/0x520
[   24.061454]  kunit_try_run_case+0x14c/0x3d0
[   24.062027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.062799]  kthread+0x24c/0x2d0
[   24.063651]  ret_from_fork+0x10/0x20
[   24.064100] 
[   24.064503] Allocated by task 152:
[   24.065285]  kasan_save_stack+0x3c/0x68
[   24.065870]  kasan_save_track+0x20/0x40
[   24.066409]  kasan_save_alloc_info+0x40/0x58
[   24.067027]  __kasan_kmalloc+0xd4/0xd8
[   24.067569]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.068566]  krealloc_uaf+0xc8/0x520
[   24.069121]  kunit_try_run_case+0x14c/0x3d0
[   24.069686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.070368]  kthread+0x24c/0x2d0
[   24.070936]  ret_from_fork+0x10/0x20
[   24.072070] 
[   24.072390] Freed by task 152:
[   24.072858]  kasan_save_stack+0x3c/0x68
[   24.073387]  kasan_save_track+0x20/0x40
[   24.073964]  kasan_save_free_info+0x4c/0x78
[   24.074523]  __kasan_slab_free+0x6c/0x98
[   24.075149]  kfree+0x114/0x3c8
[   24.075597]  krealloc_uaf+0x12c/0x520
[   24.076113]  kunit_try_run_case+0x14c/0x3d0
[   24.076652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.077725]  kthread+0x24c/0x2d0
[   24.078208]  ret_from_fork+0x10/0x20
[   24.078753] 
[   24.079082] The buggy address belongs to the object at fff00000c0973600
[   24.079082]  which belongs to the cache kmalloc-256 of size 256
[   24.081009] The buggy address is located 0 bytes inside of
[   24.081009]  freed 256-byte region [fff00000c0973600, fff00000c0973700)
[   24.082166] 
[   24.082479] The buggy address belongs to the physical page:
[   24.083441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   24.084165] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.084972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.085799] page_type: f5(slab)
[   24.086233] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.087887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.088603] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.089471] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.090365] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   24.091428] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.092575] page dumped because: kasan: bad access detected
[   24.093455] 
[   24.093762] Memory state around the buggy address:
[   24.094291]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.095203]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.096239] >fff00000c0973600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.097255]                    ^
[   24.097888]  fff00000c0973680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.098762]  fff00000c0973700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.099798] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   23.568856] ==================================================================
[   23.569591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.570339] Write of size 1 at addr fff00000c09734d0 by task kunit_try_catch/146
[   23.571130] 
[   23.571890] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.573107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.573660] Hardware name: linux,dummy-virt (DT)
[   23.574261] Call trace:
[   23.574743]  show_stack+0x20/0x38 (C)
[   23.575806]  dump_stack_lvl+0x8c/0xd0
[   23.576314]  print_report+0x118/0x5e0
[   23.576856]  kasan_report+0xc8/0x118
[   23.577391]  __asan_report_store1_noabort+0x20/0x30
[   23.578106]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.578785]  krealloc_less_oob+0x20/0x38
[   23.579607]  kunit_try_run_case+0x14c/0x3d0
[   23.580185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.580894]  kthread+0x24c/0x2d0
[   23.581462]  ret_from_fork+0x10/0x20
[   23.581976] 
[   23.582301] Allocated by task 146:
[   23.583608]  kasan_save_stack+0x3c/0x68
[   23.584061]  kasan_save_track+0x20/0x40
[   23.584596]  kasan_save_alloc_info+0x40/0x58
[   23.585213]  __kasan_krealloc+0x118/0x178
[   23.585786]  krealloc_noprof+0x128/0x360
[   23.586356]  krealloc_less_oob_helper+0x168/0xc50
[   23.587220]  krealloc_less_oob+0x20/0x38
[   23.587772]  kunit_try_run_case+0x14c/0x3d0
[   23.588311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.589194]  kthread+0x24c/0x2d0
[   23.589682]  ret_from_fork+0x10/0x20
[   23.590203] 
[   23.590513] The buggy address belongs to the object at fff00000c0973400
[   23.590513]  which belongs to the cache kmalloc-256 of size 256
[   23.592344] The buggy address is located 7 bytes to the right of
[   23.592344]  allocated 201-byte region [fff00000c0973400, fff00000c09734c9)
[   23.593536] 
[   23.593901] The buggy address belongs to the physical page:
[   23.594472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   23.595329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.596235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.597016] page_type: f5(slab)
[   23.598104] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.600331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.601389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.602246] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.603153] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   23.604057] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.605106] page dumped because: kasan: bad access detected
[   23.605690] 
[   23.606014] Memory state around the buggy address:
[   23.606578]  fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.608120]  fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.608956] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.609766]                                                  ^
[   23.610390]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.611273]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.612338] ==================================================================
[   23.829668] ==================================================================
[   23.830717] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.831491] Write of size 1 at addr fff00000c64620c9 by task kunit_try_catch/150
[   23.832629] 
[   23.832957] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.834264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.835145] Hardware name: linux,dummy-virt (DT)
[   23.835687] Call trace:
[   23.836077]  show_stack+0x20/0x38 (C)
[   23.836661]  dump_stack_lvl+0x8c/0xd0
[   23.837209]  print_report+0x118/0x5e0
[   23.837809]  kasan_report+0xc8/0x118
[   23.838353]  __asan_report_store1_noabort+0x20/0x30
[   23.839278]  krealloc_less_oob_helper+0xa48/0xc50
[   23.839869]  krealloc_large_less_oob+0x20/0x38
[   23.840513]  kunit_try_run_case+0x14c/0x3d0
[   23.841181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.841931]  kthread+0x24c/0x2d0
[   23.842518]  ret_from_fork+0x10/0x20
[   23.843274] 
[   23.843595] The buggy address belongs to the physical page:
[   23.844144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   23.845093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.845865] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.846744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.847804] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.848628] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.849502] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.850384] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000
[   23.851455] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.852321] page dumped because: kasan: bad access detected
[   23.852974] 
[   23.853281] Memory state around the buggy address:
[   23.853860]  fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.854630]  fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.855657] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.856365]                                               ^
[   23.857085]  fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.857931]  fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.858685] ==================================================================
[   23.860405] ==================================================================
[   23.861161] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.862518] Write of size 1 at addr fff00000c64620d0 by task kunit_try_catch/150
[   23.863949] 
[   23.864265] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.865248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.865884] Hardware name: linux,dummy-virt (DT)
[   23.866472] Call trace:
[   23.866872]  show_stack+0x20/0x38 (C)
[   23.868001]  dump_stack_lvl+0x8c/0xd0
[   23.868511]  print_report+0x118/0x5e0
[   23.869100]  kasan_report+0xc8/0x118
[   23.869714]  __asan_report_store1_noabort+0x20/0x30
[   23.870314]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.871258]  krealloc_large_less_oob+0x20/0x38
[   23.871820]  kunit_try_run_case+0x14c/0x3d0
[   23.872478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.873176]  kthread+0x24c/0x2d0
[   23.873659]  ret_from_fork+0x10/0x20
[   23.874259] 
[   23.874566] The buggy address belongs to the physical page:
[   23.875404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   23.876274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.877118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.877986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.878803] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.879611] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.880515] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.881485] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000
[   23.882451] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.883459] page dumped because: kasan: bad access detected
[   23.884117] 
[   23.884395] Memory state around the buggy address:
[   23.884939]  fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.885642]  fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.887109] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.887762]                                                  ^
[   23.888362]  fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.889746]  fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.890508] ==================================================================
[   23.523683] ==================================================================
[   23.524812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.525507] Write of size 1 at addr fff00000c09734c9 by task kunit_try_catch/146
[   23.526407] 
[   23.526748] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.527996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.528483] Hardware name: linux,dummy-virt (DT)
[   23.528974] Call trace:
[   23.529359]  show_stack+0x20/0x38 (C)
[   23.530219]  dump_stack_lvl+0x8c/0xd0
[   23.530873]  print_report+0x118/0x5e0
[   23.531504]  kasan_report+0xc8/0x118
[   23.532131]  __asan_report_store1_noabort+0x20/0x30
[   23.533059]  krealloc_less_oob_helper+0xa48/0xc50
[   23.533671]  krealloc_less_oob+0x20/0x38
[   23.534264]  kunit_try_run_case+0x14c/0x3d0
[   23.534790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.536419]  kthread+0x24c/0x2d0
[   23.536953]  ret_from_fork+0x10/0x20
[   23.537622] 
[   23.537984] Allocated by task 146:
[   23.538451]  kasan_save_stack+0x3c/0x68
[   23.539318]  kasan_save_track+0x20/0x40
[   23.539797]  kasan_save_alloc_info+0x40/0x58
[   23.540309]  __kasan_krealloc+0x118/0x178
[   23.541025]  krealloc_noprof+0x128/0x360
[   23.541647]  krealloc_less_oob_helper+0x168/0xc50
[   23.542338]  krealloc_less_oob+0x20/0x38
[   23.543431]  kunit_try_run_case+0x14c/0x3d0
[   23.544051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.544746]  kthread+0x24c/0x2d0
[   23.545305]  ret_from_fork+0x10/0x20
[   23.545920] 
[   23.546264] The buggy address belongs to the object at fff00000c0973400
[   23.546264]  which belongs to the cache kmalloc-256 of size 256
[   23.548246] The buggy address is located 0 bytes to the right of
[   23.548246]  allocated 201-byte region [fff00000c0973400, fff00000c09734c9)
[   23.549695] 
[   23.550177] The buggy address belongs to the physical page:
[   23.550953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   23.552052] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.553302] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.554148] page_type: f5(slab)
[   23.554651] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.555553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.556326] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.557485] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.558362] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   23.559315] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.559883] page dumped because: kasan: bad access detected
[   23.560152] 
[   23.560283] Memory state around the buggy address:
[   23.560523]  fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.561260]  fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.562319] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.563721]                                               ^
[   23.564450]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.565379]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.566362] ==================================================================
[   23.705291] ==================================================================
[   23.705936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.707829] Write of size 1 at addr fff00000c09734eb by task kunit_try_catch/146
[   23.708660] 
[   23.709007] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.710081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.710637] Hardware name: linux,dummy-virt (DT)
[   23.711992] Call trace:
[   23.712412]  show_stack+0x20/0x38 (C)
[   23.713037]  dump_stack_lvl+0x8c/0xd0
[   23.713577]  print_report+0x118/0x5e0
[   23.714104]  kasan_report+0xc8/0x118
[   23.714717]  __asan_report_store1_noabort+0x20/0x30
[   23.715734]  krealloc_less_oob_helper+0xa58/0xc50
[   23.716224]  krealloc_less_oob+0x20/0x38
[   23.716861]  kunit_try_run_case+0x14c/0x3d0
[   23.717413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.718359]  kthread+0x24c/0x2d0
[   23.719143]  ret_from_fork+0x10/0x20
[   23.719660] 
[   23.719984] Allocated by task 146:
[   23.720421]  kasan_save_stack+0x3c/0x68
[   23.720949]  kasan_save_track+0x20/0x40
[   23.721527]  kasan_save_alloc_info+0x40/0x58
[   23.722104]  __kasan_krealloc+0x118/0x178
[   23.722603]  krealloc_noprof+0x128/0x360
[   23.723307]  krealloc_less_oob_helper+0x168/0xc50
[   23.724544]  krealloc_less_oob+0x20/0x38
[   23.725079]  kunit_try_run_case+0x14c/0x3d0
[   23.725659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.726376]  kthread+0x24c/0x2d0
[   23.727199]  ret_from_fork+0x10/0x20
[   23.727560] 
[   23.727950] The buggy address belongs to the object at fff00000c0973400
[   23.727950]  which belongs to the cache kmalloc-256 of size 256
[   23.729117] The buggy address is located 34 bytes to the right of
[   23.729117]  allocated 201-byte region [fff00000c0973400, fff00000c09734c9)
[   23.730380] 
[   23.730721] The buggy address belongs to the physical page:
[   23.731437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   23.732518] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.733759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.735078] page_type: f5(slab)
[   23.735684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.736558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.737454] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.738335] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.739516] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   23.740355] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.741123] page dumped because: kasan: bad access detected
[   23.741687] 
[   23.742658] Memory state around the buggy address:
[   23.743211]  fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.744012]  fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.744935] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.746178]                                                           ^
[   23.746881]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.748274]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.749149] ==================================================================
[   23.614559] ==================================================================
[   23.615389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.616152] Write of size 1 at addr fff00000c09734da by task kunit_try_catch/146
[   23.617593] 
[   23.617899] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.619425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.619874] Hardware name: linux,dummy-virt (DT)
[   23.620517] Call trace:
[   23.620992]  show_stack+0x20/0x38 (C)
[   23.621607]  dump_stack_lvl+0x8c/0xd0
[   23.622202]  print_report+0x118/0x5e0
[   23.622795]  kasan_report+0xc8/0x118
[   23.623357]  __asan_report_store1_noabort+0x20/0x30
[   23.624561]  krealloc_less_oob_helper+0xa80/0xc50
[   23.625245]  krealloc_less_oob+0x20/0x38
[   23.625956]  kunit_try_run_case+0x14c/0x3d0
[   23.626664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.627504]  kthread+0x24c/0x2d0
[   23.628398]  ret_from_fork+0x10/0x20
[   23.628970] 
[   23.629479] Allocated by task 146:
[   23.630051]  kasan_save_stack+0x3c/0x68
[   23.630769]  kasan_save_track+0x20/0x40
[   23.631209]  kasan_save_alloc_info+0x40/0x58
[   23.631661]  __kasan_krealloc+0x118/0x178
[   23.632157]  krealloc_noprof+0x128/0x360
[   23.633075]  krealloc_less_oob_helper+0x168/0xc50
[   23.633745]  krealloc_less_oob+0x20/0x38
[   23.634396]  kunit_try_run_case+0x14c/0x3d0
[   23.635060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.635909]  kthread+0x24c/0x2d0
[   23.636415]  ret_from_fork+0x10/0x20
[   23.636971] 
[   23.637333] The buggy address belongs to the object at fff00000c0973400
[   23.637333]  which belongs to the cache kmalloc-256 of size 256
[   23.639315] The buggy address is located 17 bytes to the right of
[   23.639315]  allocated 201-byte region [fff00000c0973400, fff00000c09734c9)
[   23.640718] 
[   23.641041] The buggy address belongs to the physical page:
[   23.641694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   23.642716] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.643842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.644222] page_type: f5(slab)
[   23.644426] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.644891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.646128] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.647367] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.648488] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   23.649504] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.651285] page dumped because: kasan: bad access detected
[   23.652147] 
[   23.652363] Memory state around the buggy address:
[   23.653140]  fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.653979]  fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.654847] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.656033]                                                     ^
[   23.657150]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.658122]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.659039] ==================================================================
[   23.891782] ==================================================================
[   23.892590] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.893403] Write of size 1 at addr fff00000c64620da by task kunit_try_catch/150
[   23.894215] 
[   23.894533] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.897156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.897721] Hardware name: linux,dummy-virt (DT)
[   23.898271] Call trace:
[   23.898737]  show_stack+0x20/0x38 (C)
[   23.899501]  dump_stack_lvl+0x8c/0xd0
[   23.899956]  print_report+0x118/0x5e0
[   23.900362]  kasan_report+0xc8/0x118
[   23.900776]  __asan_report_store1_noabort+0x20/0x30
[   23.901269]  krealloc_less_oob_helper+0xa80/0xc50
[   23.902325]  krealloc_large_less_oob+0x20/0x38
[   23.903418]  kunit_try_run_case+0x14c/0x3d0
[   23.903948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.904743]  kthread+0x24c/0x2d0
[   23.905278]  ret_from_fork+0x10/0x20
[   23.905803] 
[   23.906154] The buggy address belongs to the physical page:
[   23.906749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   23.907690] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.908506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.909549] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.910405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.911297] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.912314] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.913168] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000
[   23.913963] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.914781] page dumped because: kasan: bad access detected
[   23.916026] 
[   23.916318] Memory state around the buggy address:
[   23.916876]  fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.917684]  fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.918475] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.919452]                                                     ^
[   23.920043]  fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.920893]  fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.921627] ==================================================================
[   23.956447] ==================================================================
[   23.957129] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.958068] Write of size 1 at addr fff00000c64620eb by task kunit_try_catch/150
[   23.959074] 
[   23.959346] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.961444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.962167] Hardware name: linux,dummy-virt (DT)
[   23.963348] Call trace:
[   23.963827]  show_stack+0x20/0x38 (C)
[   23.964510]  dump_stack_lvl+0x8c/0xd0
[   23.965198]  print_report+0x118/0x5e0
[   23.965829]  kasan_report+0xc8/0x118
[   23.966473]  __asan_report_store1_noabort+0x20/0x30
[   23.967480]  krealloc_less_oob_helper+0xa58/0xc50
[   23.967958]  krealloc_large_less_oob+0x20/0x38
[   23.968770]  kunit_try_run_case+0x14c/0x3d0
[   23.969354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.970208]  kthread+0x24c/0x2d0
[   23.970743]  ret_from_fork+0x10/0x20
[   23.971549] 
[   23.971906] The buggy address belongs to the physical page:
[   23.972552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   23.973470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.974374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.975390] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.976161] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.977062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.977977] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.978856] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000
[   23.980077] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.981177] page dumped because: kasan: bad access detected
[   23.981448] 
[   23.981580] Memory state around the buggy address:
[   23.982005]  fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.983446]  fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.984342] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.985192]                                                           ^
[   23.985961]  fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.986773]  fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.987726] ==================================================================
[   23.661481] ==================================================================
[   23.662166] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.663155] Write of size 1 at addr fff00000c09734ea by task kunit_try_catch/146
[   23.664765] 
[   23.665033] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.665545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.665844] Hardware name: linux,dummy-virt (DT)
[   23.666369] Call trace:
[   23.666785]  show_stack+0x20/0x38 (C)
[   23.667944]  dump_stack_lvl+0x8c/0xd0
[   23.668556]  print_report+0x118/0x5e0
[   23.669224]  kasan_report+0xc8/0x118
[   23.669910]  __asan_report_store1_noabort+0x20/0x30
[   23.670652]  krealloc_less_oob_helper+0xae4/0xc50
[   23.671466]  krealloc_less_oob+0x20/0x38
[   23.672442]  kunit_try_run_case+0x14c/0x3d0
[   23.672834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.673779]  kthread+0x24c/0x2d0
[   23.674388]  ret_from_fork+0x10/0x20
[   23.675281] 
[   23.675626] Allocated by task 146:
[   23.676280]  kasan_save_stack+0x3c/0x68
[   23.676904]  kasan_save_track+0x20/0x40
[   23.677481]  kasan_save_alloc_info+0x40/0x58
[   23.678135]  __kasan_krealloc+0x118/0x178
[   23.678763]  krealloc_noprof+0x128/0x360
[   23.679472]  krealloc_less_oob_helper+0x168/0xc50
[   23.680346]  krealloc_less_oob+0x20/0x38
[   23.680590]  kunit_try_run_case+0x14c/0x3d0
[   23.681282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.681919]  kthread+0x24c/0x2d0
[   23.682337]  ret_from_fork+0x10/0x20
[   23.682903] 
[   23.683541] The buggy address belongs to the object at fff00000c0973400
[   23.683541]  which belongs to the cache kmalloc-256 of size 256
[   23.685323] The buggy address is located 33 bytes to the right of
[   23.685323]  allocated 201-byte region [fff00000c0973400, fff00000c09734c9)
[   23.686578] 
[   23.686877] The buggy address belongs to the physical page:
[   23.687538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   23.688401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.689671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.690118] page_type: f5(slab)
[   23.690325] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.690667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.691838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.692632] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.693545] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   23.694560] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.695694] page dumped because: kasan: bad access detected
[   23.696336] 
[   23.696649] Memory state around the buggy address:
[   23.697205]  fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.698418]  fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.699727] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.700696]                                                           ^
[   23.701411]  fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.702297]  fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.703196] ==================================================================
[   23.922757] ==================================================================
[   23.924569] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.925449] Write of size 1 at addr fff00000c64620ea by task kunit_try_catch/150
[   23.926804] 
[   23.927362] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.928446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.928949] Hardware name: linux,dummy-virt (DT)
[   23.929470] Call trace:
[   23.929866]  show_stack+0x20/0x38 (C)
[   23.930455]  dump_stack_lvl+0x8c/0xd0
[   23.930935]  print_report+0x118/0x5e0
[   23.931848]  kasan_report+0xc8/0x118
[   23.932439]  __asan_report_store1_noabort+0x20/0x30
[   23.933185]  krealloc_less_oob_helper+0xae4/0xc50
[   23.933895]  krealloc_large_less_oob+0x20/0x38
[   23.934540]  kunit_try_run_case+0x14c/0x3d0
[   23.935281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.936245]  kthread+0x24c/0x2d0
[   23.936909]  ret_from_fork+0x10/0x20
[   23.937585] 
[   23.938039] The buggy address belongs to the physical page:
[   23.938753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460
[   23.939809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.940565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.941608] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.942395] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.943475] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.944556] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.945730] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000
[   23.946490] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.947247] page dumped because: kasan: bad access detected
[   23.947721] 
[   23.947974] Memory state around the buggy address:
[   23.948395]  fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.949878]  fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.950829] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.951874]                                                           ^
[   23.952571]  fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.953338]  fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.954315] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   23.789585] ==================================================================
[   23.790358] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   23.791280] Write of size 1 at addr fff00000c645e0f0 by task kunit_try_catch/148
[   23.792492] 
[   23.792842] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.794530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.795493] Hardware name: linux,dummy-virt (DT)
[   23.796094] Call trace:
[   23.796550]  show_stack+0x20/0x38 (C)
[   23.797214]  dump_stack_lvl+0x8c/0xd0
[   23.797903]  print_report+0x118/0x5e0
[   23.798562]  kasan_report+0xc8/0x118
[   23.799497]  __asan_report_store1_noabort+0x20/0x30
[   23.800090]  krealloc_more_oob_helper+0x5c8/0x680
[   23.800754]  krealloc_large_more_oob+0x20/0x38
[   23.801347]  kunit_try_run_case+0x14c/0x3d0
[   23.802034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.802719]  kthread+0x24c/0x2d0
[   23.803329]  ret_from_fork+0x10/0x20
[   23.804158] 
[   23.804528] The buggy address belongs to the physical page:
[   23.805185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10645c
[   23.806036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.807318] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.808210] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.809047] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.809918] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.810759] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.811885] head: 0bfffe0000000002 ffffc1ffc3191701 ffffffffffffffff 0000000000000000
[   23.812737] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.813447] page dumped because: kasan: bad access detected
[   23.813768] 
[   23.814052] Memory state around the buggy address:
[   23.814562]  fff00000c645df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.815858]  fff00000c645e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.816458] >fff00000c645e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.817337]                                                              ^
[   23.818372]  fff00000c645e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.819518]  fff00000c645e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.820690] ==================================================================
[   23.472019] ==================================================================
[   23.472715] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   23.473663] Write of size 1 at addr fff00000c4598af0 by task kunit_try_catch/144
[   23.474550] 
[   23.474972] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.477115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.477623] Hardware name: linux,dummy-virt (DT)
[   23.478272] Call trace:
[   23.478659]  show_stack+0x20/0x38 (C)
[   23.479410]  dump_stack_lvl+0x8c/0xd0
[   23.479972]  print_report+0x118/0x5e0
[   23.480474]  kasan_report+0xc8/0x118
[   23.481085]  __asan_report_store1_noabort+0x20/0x30
[   23.482284]  krealloc_more_oob_helper+0x5c8/0x680
[   23.483018]  krealloc_more_oob+0x20/0x38
[   23.483565]  kunit_try_run_case+0x14c/0x3d0
[   23.484242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.484955]  kthread+0x24c/0x2d0
[   23.485529]  ret_from_fork+0x10/0x20
[   23.486068] 
[   23.486382] Allocated by task 144:
[   23.487156]  kasan_save_stack+0x3c/0x68
[   23.487656]  kasan_save_track+0x20/0x40
[   23.488181]  kasan_save_alloc_info+0x40/0x58
[   23.488764]  __kasan_krealloc+0x118/0x178
[   23.489273]  krealloc_noprof+0x128/0x360
[   23.489889]  krealloc_more_oob_helper+0x168/0x680
[   23.490458]  krealloc_more_oob+0x20/0x38
[   23.491015]  kunit_try_run_case+0x14c/0x3d0
[   23.492223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.492945]  kthread+0x24c/0x2d0
[   23.493509]  ret_from_fork+0x10/0x20
[   23.494150] 
[   23.494421] The buggy address belongs to the object at fff00000c4598a00
[   23.494421]  which belongs to the cache kmalloc-256 of size 256
[   23.496044] The buggy address is located 5 bytes to the right of
[   23.496044]  allocated 235-byte region [fff00000c4598a00, fff00000c4598aeb)
[   23.497769] 
[   23.498116] The buggy address belongs to the physical page:
[   23.498854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104598
[   23.500023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.500904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.501738] page_type: f5(slab)
[   23.502173] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.503039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.503965] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.504828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.505757] head: 0bfffe0000000001 ffffc1ffc3116601 ffffffffffffffff 0000000000000000
[   23.506614] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.507509] page dumped because: kasan: bad access detected
[   23.508174] 
[   23.508461] Memory state around the buggy address:
[   23.509244]  fff00000c4598980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.509982]  fff00000c4598a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.510780] >fff00000c4598a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.512024]                                                              ^
[   23.512752]  fff00000c4598b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.513606]  fff00000c4598b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.514471] ==================================================================
[   23.425666] ==================================================================
[   23.426719] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   23.427931] Write of size 1 at addr fff00000c4598aeb by task kunit_try_catch/144
[   23.428728] 
[   23.429150] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.430299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.430939] Hardware name: linux,dummy-virt (DT)
[   23.431952] Call trace:
[   23.432446]  show_stack+0x20/0x38 (C)
[   23.433130]  dump_stack_lvl+0x8c/0xd0
[   23.433773]  print_report+0x118/0x5e0
[   23.434426]  kasan_report+0xc8/0x118
[   23.435071]  __asan_report_store1_noabort+0x20/0x30
[   23.435770]  krealloc_more_oob_helper+0x614/0x680
[   23.436883]  krealloc_more_oob+0x20/0x38
[   23.437554]  kunit_try_run_case+0x14c/0x3d0
[   23.438184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.439100]  kthread+0x24c/0x2d0
[   23.439721]  ret_from_fork+0x10/0x20
[   23.440363] 
[   23.440801] Allocated by task 144:
[   23.441363]  kasan_save_stack+0x3c/0x68
[   23.442066]  kasan_save_track+0x20/0x40
[   23.442676]  kasan_save_alloc_info+0x40/0x58
[   23.443536]  __kasan_krealloc+0x118/0x178
[   23.444176]  krealloc_noprof+0x128/0x360
[   23.444911]  krealloc_more_oob_helper+0x168/0x680
[   23.445649]  krealloc_more_oob+0x20/0x38
[   23.446286]  kunit_try_run_case+0x14c/0x3d0
[   23.447249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.448002]  kthread+0x24c/0x2d0
[   23.448581]  ret_from_fork+0x10/0x20
[   23.449216] 
[   23.449568] The buggy address belongs to the object at fff00000c4598a00
[   23.449568]  which belongs to the cache kmalloc-256 of size 256
[   23.451076] The buggy address is located 0 bytes to the right of
[   23.451076]  allocated 235-byte region [fff00000c4598a00, fff00000c4598aeb)
[   23.452436] 
[   23.453000] The buggy address belongs to the physical page:
[   23.453527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104598
[   23.454672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.455862] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.456838] page_type: f5(slab)
[   23.457460] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.458466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.459565] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.460602] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.461496] head: 0bfffe0000000001 ffffc1ffc3116601 ffffffffffffffff 0000000000000000
[   23.462390] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.463455] page dumped because: kasan: bad access detected
[   23.463984] 
[   23.464200] Memory state around the buggy address:
[   23.464651]  fff00000c4598980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.465461]  fff00000c4598a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.466353] >fff00000c4598a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.467279]                                                           ^
[   23.468347]  fff00000c4598b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.469131]  fff00000c4598b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.469905] ==================================================================
[   23.756469] ==================================================================
[   23.757907] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   23.758612] Write of size 1 at addr fff00000c645e0eb by task kunit_try_catch/148
[   23.760588] 
[   23.761024] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.762170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.763251] Hardware name: linux,dummy-virt (DT)
[   23.763931] Call trace:
[   23.764314]  show_stack+0x20/0x38 (C)
[   23.764841]  dump_stack_lvl+0x8c/0xd0
[   23.765389]  print_report+0x118/0x5e0
[   23.766000]  kasan_report+0xc8/0x118
[   23.766511]  __asan_report_store1_noabort+0x20/0x30
[   23.767146]  krealloc_more_oob_helper+0x614/0x680
[   23.767943]  krealloc_large_more_oob+0x20/0x38
[   23.768521]  kunit_try_run_case+0x14c/0x3d0
[   23.769218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.769918]  kthread+0x24c/0x2d0
[   23.770431]  ret_from_fork+0x10/0x20
[   23.771241] 
[   23.771543] The buggy address belongs to the physical page:
[   23.772159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10645c
[   23.773008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.773878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.774665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.775504] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.776331] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.777301] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.778232] head: 0bfffe0000000002 ffffc1ffc3191701 ffffffffffffffff 0000000000000000
[   23.779300] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.780334] page dumped because: kasan: bad access detected
[   23.780971] 
[   23.781456] Memory state around the buggy address:
[   23.782201]  fff00000c645df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.783244]  fff00000c645e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.783966] >fff00000c645e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.784692]                                                           ^
[   23.785382]  fff00000c645e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.786142]  fff00000c645e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.787109] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   23.390388] ==================================================================
[   23.392097] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   23.392754] Read of size 1 at addr fff00000c64c0000 by task kunit_try_catch/142
[   23.393444] 
[   23.393787] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.394868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.395520] Hardware name: linux,dummy-virt (DT)
[   23.397194] Call trace:
[   23.397586]  show_stack+0x20/0x38 (C)
[   23.398137]  dump_stack_lvl+0x8c/0xd0
[   23.398678]  print_report+0x118/0x5e0
[   23.399660]  kasan_report+0xc8/0x118
[   23.400357]  __asan_report_load1_noabort+0x20/0x30
[   23.400995]  page_alloc_uaf+0x328/0x350
[   23.401539]  kunit_try_run_case+0x14c/0x3d0
[   23.402132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402849]  kthread+0x24c/0x2d0
[   23.403421]  ret_from_fork+0x10/0x20
[   23.404014] 
[   23.404331] The buggy address belongs to the physical page:
[   23.405363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c0
[   23.406205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.407053] page_type: f0(buddy)
[   23.407542] raw: 0bfffe0000000000 fff00000ff6151b0 fff00000ff6151b0 0000000000000000
[   23.408338] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   23.409539] page dumped because: kasan: bad access detected
[   23.410190] 
[   23.410521] Memory state around the buggy address:
[   23.411214]  fff00000c64bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.412387]  fff00000c64bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.413455] >fff00000c64c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.414161]                    ^
[   23.414603]  fff00000c64c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.415769]  fff00000c64c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.416684] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   23.309940] ==================================================================
[   23.311541] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   23.312839] Read of size 1 at addr fff00000c6454000 by task kunit_try_catch/136
[   23.313943] 
[   23.314393] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.315135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.315661] Hardware name: linux,dummy-virt (DT)
[   23.316545] Call trace:
[   23.316988]  show_stack+0x20/0x38 (C)
[   23.317579]  dump_stack_lvl+0x8c/0xd0
[   23.318202]  print_report+0x118/0x5e0
[   23.319017]  kasan_report+0xc8/0x118
[   23.319570]  __asan_report_load1_noabort+0x20/0x30
[   23.320266]  kmalloc_large_uaf+0x2cc/0x2f8
[   23.320909]  kunit_try_run_case+0x14c/0x3d0
[   23.321532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.322291]  kthread+0x24c/0x2d0
[   23.322859]  ret_from_fork+0x10/0x20
[   23.323609] 
[   23.323966] The buggy address belongs to the physical page:
[   23.324681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454
[   23.325590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.326407] raw: 0bfffe0000000000 ffffc1ffc3191608 fff00000da4ff040 0000000000000000
[   23.327308] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   23.328118] page dumped because: kasan: bad access detected
[   23.329156] 
[   23.329491] Memory state around the buggy address:
[   23.330012]  fff00000c6453f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.330733]  fff00000c6453f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.332043] >fff00000c6454000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.332859]                    ^
[   23.333310]  fff00000c6454080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.334095]  fff00000c6454100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.334925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   23.273190] ==================================================================
[   23.274161] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   23.274881] Write of size 1 at addr fff00000c645600a by task kunit_try_catch/134
[   23.276043] 
[   23.276384] CPU: 1 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.277170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.277813] Hardware name: linux,dummy-virt (DT)
[   23.278310] Call trace:
[   23.278803]  show_stack+0x20/0x38 (C)
[   23.279325]  dump_stack_lvl+0x8c/0xd0
[   23.279897]  print_report+0x118/0x5e0
[   23.280429]  kasan_report+0xc8/0x118
[   23.281030]  __asan_report_store1_noabort+0x20/0x30
[   23.281652]  kmalloc_large_oob_right+0x278/0x2b8
[   23.282411]  kunit_try_run_case+0x14c/0x3d0
[   23.283358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.284035]  kthread+0x24c/0x2d0
[   23.284570]  ret_from_fork+0x10/0x20
[   23.285133] 
[   23.285490] The buggy address belongs to the physical page:
[   23.286193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454
[   23.287177] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.288061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.288912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.289766] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.290566] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.291589] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.292344] head: 0bfffe0000000002 ffffc1ffc3191501 ffffffffffffffff 0000000000000000
[   23.293154] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.294003] page dumped because: kasan: bad access detected
[   23.294634] 
[   23.294943] Memory state around the buggy address:
[   23.295896]  fff00000c6455f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.296687]  fff00000c6455f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.297468] >fff00000c6456000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.298243]                       ^
[   23.298676]  fff00000c6456080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.299689]  fff00000c6456100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.300541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   23.223996] ==================================================================
[   23.225058] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   23.225865] Write of size 1 at addr fff00000c5dc5f00 by task kunit_try_catch/132
[   23.226751] 
[   23.227176] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.228493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.229266] Hardware name: linux,dummy-virt (DT)
[   23.229757] Call trace:
[   23.230144]  show_stack+0x20/0x38 (C)
[   23.230853]  dump_stack_lvl+0x8c/0xd0
[   23.232208]  print_report+0x118/0x5e0
[   23.232785]  kasan_report+0xc8/0x118
[   23.233440]  __asan_report_store1_noabort+0x20/0x30
[   23.234269]  kmalloc_big_oob_right+0x2a4/0x2f0
[   23.235231]  kunit_try_run_case+0x14c/0x3d0
[   23.235815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.236620]  kthread+0x24c/0x2d0
[   23.237209]  ret_from_fork+0x10/0x20
[   23.237792] 
[   23.238093] Allocated by task 132:
[   23.238609]  kasan_save_stack+0x3c/0x68
[   23.239464]  kasan_save_track+0x20/0x40
[   23.240047]  kasan_save_alloc_info+0x40/0x58
[   23.240720]  __kasan_kmalloc+0xd4/0xd8
[   23.241317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.241956]  kmalloc_big_oob_right+0xb8/0x2f0
[   23.242587]  kunit_try_run_case+0x14c/0x3d0
[   23.243378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.243882]  kthread+0x24c/0x2d0
[   23.244241]  ret_from_fork+0x10/0x20
[   23.244656] 
[   23.245132] The buggy address belongs to the object at fff00000c5dc4000
[   23.245132]  which belongs to the cache kmalloc-8k of size 8192
[   23.246738] The buggy address is located 0 bytes to the right of
[   23.246738]  allocated 7936-byte region [fff00000c5dc4000, fff00000c5dc5f00)
[   23.248356] 
[   23.248749] The buggy address belongs to the physical page:
[   23.249383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dc0
[   23.250412] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.251567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.252475] page_type: f5(slab)
[   23.253293] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   23.254241] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   23.255214] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   23.256063] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   23.257003] head: 0bfffe0000000003 ffffc1ffc3177001 ffffffffffffffff 0000000000000000
[   23.257743] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   23.258797] page dumped because: kasan: bad access detected
[   23.259517] 
[   23.259816] Memory state around the buggy address:
[   23.260472]  fff00000c5dc5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.261265]  fff00000c5dc5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.262175] >fff00000c5dc5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.262937]                    ^
[   23.263889]  fff00000c5dc5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.264534]  fff00000c5dc6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.265421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   23.178797] ==================================================================
[   23.179763] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   23.180482] Write of size 1 at addr fff00000c6391578 by task kunit_try_catch/130
[   23.181322] 
[   23.181730] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.182835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.183868] Hardware name: linux,dummy-virt (DT)
[   23.184446] Call trace:
[   23.184889]  show_stack+0x20/0x38 (C)
[   23.185468]  dump_stack_lvl+0x8c/0xd0
[   23.186351]  print_report+0x118/0x5e0
[   23.187214]  kasan_report+0xc8/0x118
[   23.187883]  __asan_report_store1_noabort+0x20/0x30
[   23.188594]  kmalloc_track_caller_oob_right+0x420/0x490
[   23.189197]  kunit_try_run_case+0x14c/0x3d0
[   23.189954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.190731]  kthread+0x24c/0x2d0
[   23.191429]  ret_from_fork+0x10/0x20
[   23.191976] 
[   23.192308] Allocated by task 130:
[   23.193365]  kasan_save_stack+0x3c/0x68
[   23.193868]  kasan_save_track+0x20/0x40
[   23.194356]  kasan_save_alloc_info+0x40/0x58
[   23.195203]  __kasan_kmalloc+0xd4/0xd8
[   23.195626]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   23.196293]  kmalloc_track_caller_oob_right+0x184/0x490
[   23.196941]  kunit_try_run_case+0x14c/0x3d0
[   23.197552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.198249]  kthread+0x24c/0x2d0
[   23.198723]  ret_from_fork+0x10/0x20
[   23.199880] 
[   23.200206] The buggy address belongs to the object at fff00000c6391500
[   23.200206]  which belongs to the cache kmalloc-128 of size 128
[   23.201410] The buggy address is located 0 bytes to the right of
[   23.201410]  allocated 120-byte region [fff00000c6391500, fff00000c6391578)
[   23.202693] 
[   23.203057] The buggy address belongs to the physical page:
[   23.204042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106391
[   23.204919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.205676] page_type: f5(slab)
[   23.206253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.207717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.208493] page dumped because: kasan: bad access detected
[   23.209187] 
[   23.209487] Memory state around the buggy address:
[   23.210573]  fff00000c6391400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.211607]  fff00000c6391480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212406] >fff00000c6391500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.213178]                                                                 ^
[   23.214076]  fff00000c6391580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.214751]  fff00000c6391600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.215880] ==================================================================
[   23.140034] ==================================================================
[   23.141098] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   23.141898] Write of size 1 at addr fff00000c6391478 by task kunit_try_catch/130
[   23.142671] 
[   23.143496] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.144955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.145660] Hardware name: linux,dummy-virt (DT)
[   23.146420] Call trace:
[   23.147382]  show_stack+0x20/0x38 (C)
[   23.148190]  dump_stack_lvl+0x8c/0xd0
[   23.148907]  print_report+0x118/0x5e0
[   23.149396]  kasan_report+0xc8/0x118
[   23.149911]  __asan_report_store1_noabort+0x20/0x30
[   23.150580]  kmalloc_track_caller_oob_right+0x414/0x490
[   23.151791]  kunit_try_run_case+0x14c/0x3d0
[   23.152290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.153161]  kthread+0x24c/0x2d0
[   23.153738]  ret_from_fork+0x10/0x20
[   23.154271] 
[   23.154583] Allocated by task 130:
[   23.155172]  kasan_save_stack+0x3c/0x68
[   23.155691]  kasan_save_track+0x20/0x40
[   23.156212]  kasan_save_alloc_info+0x40/0x58
[   23.156836]  __kasan_kmalloc+0xd4/0xd8
[   23.157556]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   23.158128]  kmalloc_track_caller_oob_right+0xa8/0x490
[   23.158881]  kunit_try_run_case+0x14c/0x3d0
[   23.159429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.160162]  kthread+0x24c/0x2d0
[   23.160666]  ret_from_fork+0x10/0x20
[   23.161732] 
[   23.162063] The buggy address belongs to the object at fff00000c6391400
[   23.162063]  which belongs to the cache kmalloc-128 of size 128
[   23.163605] The buggy address is located 0 bytes to the right of
[   23.163605]  allocated 120-byte region [fff00000c6391400, fff00000c6391478)
[   23.164815] 
[   23.165141] The buggy address belongs to the physical page:
[   23.165801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106391
[   23.166682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.168101] page_type: f5(slab)
[   23.168556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.169359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.170264] page dumped because: kasan: bad access detected
[   23.170910] 
[   23.171228] Memory state around the buggy address:
[   23.171814]  fff00000c6391300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   23.172547]  fff00000c6391380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.173393] >fff00000c6391400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.174483]                                                                 ^
[   23.175588]  fff00000c6391480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.176341]  fff00000c6391500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.177125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   23.090193] ==================================================================
[   23.091452] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   23.092672] Read of size 1 at addr fff00000c63cf000 by task kunit_try_catch/128
[   23.093542] 
[   23.093951] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.095090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.095819] Hardware name: linux,dummy-virt (DT)
[   23.096348] Call trace:
[   23.096782]  show_stack+0x20/0x38 (C)
[   23.097311]  dump_stack_lvl+0x8c/0xd0
[   23.097841]  print_report+0x118/0x5e0
[   23.098390]  kasan_report+0xc8/0x118
[   23.099229]  __asan_report_load1_noabort+0x20/0x30
[   23.100077]  kmalloc_node_oob_right+0x2f4/0x330
[   23.100781]  kunit_try_run_case+0x14c/0x3d0
[   23.101426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.102156]  kthread+0x24c/0x2d0
[   23.102648]  ret_from_fork+0x10/0x20
[   23.103185] 
[   23.103506] Allocated by task 128:
[   23.104390]  kasan_save_stack+0x3c/0x68
[   23.104922]  kasan_save_track+0x20/0x40
[   23.105518]  kasan_save_alloc_info+0x40/0x58
[   23.106123]  __kasan_kmalloc+0xd4/0xd8
[   23.106580]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   23.107445]  kmalloc_node_oob_right+0xbc/0x330
[   23.108078]  kunit_try_run_case+0x14c/0x3d0
[   23.108631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.109316]  kthread+0x24c/0x2d0
[   23.109847]  ret_from_fork+0x10/0x20
[   23.110352] 
[   23.110646] The buggy address belongs to the object at fff00000c63ce000
[   23.110646]  which belongs to the cache kmalloc-4k of size 4096
[   23.112388] The buggy address is located 0 bytes to the right of
[   23.112388]  allocated 4096-byte region [fff00000c63ce000, fff00000c63cf000)
[   23.114044] 
[   23.114506] The buggy address belongs to the physical page:
[   23.115442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c8
[   23.116713] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.117422] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.118281] page_type: f5(slab)
[   23.118798] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   23.119860] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   23.120672] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   23.121609] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   23.122501] head: 0bfffe0000000003 ffffc1ffc318f201 ffffffffffffffff 0000000000000000
[   23.123553] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   23.124388] page dumped because: kasan: bad access detected
[   23.125031] 
[   23.125351] Memory state around the buggy address:
[   23.125914]  fff00000c63cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.126614]  fff00000c63cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.127485] >fff00000c63cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128577]                    ^
[   23.129140]  fff00000c63cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.130061]  fff00000c63cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.131058] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   23.014117] ==================================================================
[   23.015596] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   23.016787] Read of size 1 at addr fff00000c636113f by task kunit_try_catch/126
[   23.017559] 
[   23.018089] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   23.019378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.020090] Hardware name: linux,dummy-virt (DT)
[   23.020621] Call trace:
[   23.021075]  show_stack+0x20/0x38 (C)
[   23.021602]  dump_stack_lvl+0x8c/0xd0
[   23.022146]  print_report+0x118/0x5e0
[   23.022775]  kasan_report+0xc8/0x118
[   23.023727]  __asan_report_load1_noabort+0x20/0x30
[   23.024347]  kmalloc_oob_left+0x2ec/0x320
[   23.024911]  kunit_try_run_case+0x14c/0x3d0
[   23.025545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.026254]  kthread+0x24c/0x2d0
[   23.026768]  ret_from_fork+0x10/0x20
[   23.027283] 
[   23.027572] Allocated by task 1:
[   23.028251]  kasan_save_stack+0x3c/0x68
[   23.028730]  kasan_save_track+0x20/0x40
[   23.029280]  kasan_save_alloc_info+0x40/0x58
[   23.029893]  __kasan_kmalloc+0xd4/0xd8
[   23.030415]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   23.031506]  kvasprintf+0xcc/0x170
[   23.031973]  kasprintf+0xa8/0xe8
[   23.032422]  input_devnode+0x84/0xb8
[   23.033021]  device_get_devnode+0x114/0x258
[   23.033578]  dev_uevent+0x334/0x5b8
[   23.034118]  kobject_uevent_env+0x424/0xc98
[   23.034649]  kobject_uevent+0x14/0x20
[   23.035342]  device_add+0xc00/0x12b8
[   23.035855]  cdev_device_add+0xdc/0x208
[   23.036453]  evdev_connect+0x2e0/0x410
[   23.037079]  input_attach_handler.isra.0+0xec/0x1d8
[   23.037788]  input_register_device+0x48c/0x9d8
[   23.038351]  gpio_keys_probe+0xabc/0x1ec8
[   23.039079]  platform_probe+0xcc/0x198
[   23.039628]  really_probe+0x188/0x7f0
[   23.040163]  __driver_probe_device+0x164/0x378
[   23.040759]  driver_probe_device+0x64/0x180
[   23.041456]  __driver_attach+0x1cc/0x478
[   23.042034]  bus_for_each_dev+0x104/0x198
[   23.042568]  driver_attach+0x44/0x68
[   23.043047]  bus_add_driver+0x23c/0x4e8
[   23.043882]  driver_register+0xf8/0x3d0
[   23.044448]  __platform_driver_register+0x64/0x98
[   23.045126]  gpio_keys_init+0x24/0x38
[   23.045609]  do_one_initcall+0xcc/0x628
[   23.046253]  kernel_init_freeable+0x3e0/0x8b0
[   23.046871]  kernel_init+0x2c/0x1f8
[   23.047527]  ret_from_fork+0x10/0x20
[   23.048043] 
[   23.048416] Freed by task 1:
[   23.048912]  kasan_save_stack+0x3c/0x68
[   23.049467]  kasan_save_track+0x20/0x40
[   23.049999]  kasan_save_free_info+0x4c/0x78
[   23.050589]  __kasan_slab_free+0x6c/0x98
[   23.051649]  kfree+0x114/0x3c8
[   23.052198]  dev_uevent+0x368/0x5b8
[   23.052756]  kobject_uevent_env+0x424/0xc98
[   23.053321]  kobject_uevent+0x14/0x20
[   23.053831]  device_add+0xc00/0x12b8
[   23.054361]  cdev_device_add+0xdc/0x208
[   23.055334]  evdev_connect+0x2e0/0x410
[   23.055967]  input_attach_handler.isra.0+0xec/0x1d8
[   23.056560]  input_register_device+0x48c/0x9d8
[   23.057262]  gpio_keys_probe+0xabc/0x1ec8
[   23.057805]  platform_probe+0xcc/0x198
[   23.058323]  really_probe+0x188/0x7f0
[   23.058820]  __driver_probe_device+0x164/0x378
[   23.059419]  driver_probe_device+0x64/0x180
[   23.060220]  __driver_attach+0x1cc/0x478
[   23.060865]  bus_for_each_dev+0x104/0x198
[   23.061378]  driver_attach+0x44/0x68
[   23.061956]  bus_add_driver+0x23c/0x4e8
[   23.062518]  driver_register+0xf8/0x3d0
[   23.062998]  __platform_driver_register+0x64/0x98
[   23.063759]  gpio_keys_init+0x24/0x38
[   23.064537]  do_one_initcall+0xcc/0x628
[   23.065040]  kernel_init_freeable+0x3e0/0x8b0
[   23.065611]  kernel_init+0x2c/0x1f8
[   23.066133]  ret_from_fork+0x10/0x20
[   23.066725] 
[   23.067257] The buggy address belongs to the object at fff00000c6361120
[   23.067257]  which belongs to the cache kmalloc-16 of size 16
[   23.068479] The buggy address is located 15 bytes to the right of
[   23.068479]  allocated 16-byte region [fff00000c6361120, fff00000c6361130)
[   23.069756] 
[   23.070096] The buggy address belongs to the physical page:
[   23.070681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   23.071691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.072816] page_type: f5(slab)
[   23.073275] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.074120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.075293] page dumped because: kasan: bad access detected
[   23.076028] 
[   23.076348] Memory state around the buggy address:
[   23.076998]  fff00000c6361000: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   23.077765]  fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.078492] >fff00000c6361100: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   23.079509]                                         ^
[   23.080116]  fff00000c6361180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.081030]  fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.081948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   22.886487] ==================================================================
[   22.887918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   22.889451] Write of size 1 at addr fff00000c126df73 by task kunit_try_catch/124
[   22.890326] 
[   22.891847] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc2-next-20241209 #1
[   22.893059] Tainted: [N]=TEST
[   22.893522] Hardware name: linux,dummy-virt (DT)
[   22.894469] Call trace:
[   22.895130]  show_stack+0x20/0x38 (C)
[   22.895990]  dump_stack_lvl+0x8c/0xd0
[   22.896499]  print_report+0x118/0x5e0
[   22.897020]  kasan_report+0xc8/0x118
[   22.897578]  __asan_report_store1_noabort+0x20/0x30
[   22.898217]  kmalloc_oob_right+0x5a4/0x660
[   22.898877]  kunit_try_run_case+0x14c/0x3d0
[   22.899504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.900564]  kthread+0x24c/0x2d0
[   22.901093]  ret_from_fork+0x10/0x20
[   22.901926] 
[   22.902344] Allocated by task 124:
[   22.903266]  kasan_save_stack+0x3c/0x68
[   22.903818]  kasan_save_track+0x20/0x40
[   22.904366]  kasan_save_alloc_info+0x40/0x58
[   22.904989]  __kasan_kmalloc+0xd4/0xd8
[   22.905484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.906118]  kmalloc_oob_right+0xb0/0x660
[   22.906665]  kunit_try_run_case+0x14c/0x3d0
[   22.907328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.907946]  kthread+0x24c/0x2d0
[   22.908798]  ret_from_fork+0x10/0x20
[   22.909537] 
[   22.910109] The buggy address belongs to the object at fff00000c126df00
[   22.910109]  which belongs to the cache kmalloc-128 of size 128
[   22.912031] The buggy address is located 0 bytes to the right of
[   22.912031]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.913300] 
[   22.913822] The buggy address belongs to the physical page:
[   22.914806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.916028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.917013] page_type: f5(slab)
[   22.918097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.918893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.920054] page dumped because: kasan: bad access detected
[   22.920777] 
[   22.921084] Memory state around the buggy address:
[   22.922113]  fff00000c126de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.923198]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.924339] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.925216]                                                              ^
[   22.926076]  fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.926847]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.927944] ==================================================================
[   22.930691] ==================================================================
[   22.931811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   22.932440] Write of size 1 at addr fff00000c126df78 by task kunit_try_catch/124
[   22.933032] 
[   22.933420] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.934801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.935554] Hardware name: linux,dummy-virt (DT)
[   22.936153] Call trace:
[   22.936632]  show_stack+0x20/0x38 (C)
[   22.937917]  dump_stack_lvl+0x8c/0xd0
[   22.938639]  print_report+0x118/0x5e0
[   22.939440]  kasan_report+0xc8/0x118
[   22.940152]  __asan_report_store1_noabort+0x20/0x30
[   22.940791]  kmalloc_oob_right+0x538/0x660
[   22.941273]  kunit_try_run_case+0x14c/0x3d0
[   22.941970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.942631]  kthread+0x24c/0x2d0
[   22.943559]  ret_from_fork+0x10/0x20
[   22.944009] 
[   22.944286] Allocated by task 124:
[   22.944632]  kasan_save_stack+0x3c/0x68
[   22.945237]  kasan_save_track+0x20/0x40
[   22.945918]  kasan_save_alloc_info+0x40/0x58
[   22.946483]  __kasan_kmalloc+0xd4/0xd8
[   22.947051]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.947932]  kmalloc_oob_right+0xb0/0x660
[   22.948499]  kunit_try_run_case+0x14c/0x3d0
[   22.949084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.949789]  kthread+0x24c/0x2d0
[   22.950155]  ret_from_fork+0x10/0x20
[   22.950815] 
[   22.951159] The buggy address belongs to the object at fff00000c126df00
[   22.951159]  which belongs to the cache kmalloc-128 of size 128
[   22.953294] The buggy address is located 5 bytes to the right of
[   22.953294]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.954639] 
[   22.955192] The buggy address belongs to the physical page:
[   22.956004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.956755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.957478] page_type: f5(slab)
[   22.958028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.958886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.959687] page dumped because: kasan: bad access detected
[   22.960358] 
[   22.961018] Memory state around the buggy address:
[   22.961614]  fff00000c126de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.962673]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.964099] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.965099]                                                                 ^
[   22.965879]  fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.966783]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.967584] ==================================================================
[   22.969889] ==================================================================
[   22.970841] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   22.972105] Read of size 1 at addr fff00000c126df80 by task kunit_try_catch/124
[   22.973248] 
[   22.973551] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.975023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.975633] Hardware name: linux,dummy-virt (DT)
[   22.976131] Call trace:
[   22.976642]  show_stack+0x20/0x38 (C)
[   22.977416]  dump_stack_lvl+0x8c/0xd0
[   22.977963]  print_report+0x118/0x5e0
[   22.978718]  kasan_report+0xc8/0x118
[   22.979367]  __asan_report_load1_noabort+0x20/0x30
[   22.980158]  kmalloc_oob_right+0x5d0/0x660
[   22.980824]  kunit_try_run_case+0x14c/0x3d0
[   22.981089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.981379]  kthread+0x24c/0x2d0
[   22.981599]  ret_from_fork+0x10/0x20
[   22.981855] 
[   22.981993] Allocated by task 124:
[   22.982190]  kasan_save_stack+0x3c/0x68
[   22.982425]  kasan_save_track+0x20/0x40
[   22.982649]  kasan_save_alloc_info+0x40/0x58
[   22.984179]  __kasan_kmalloc+0xd4/0xd8
[   22.984667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.985184]  kmalloc_oob_right+0xb0/0x660
[   22.986013]  kunit_try_run_case+0x14c/0x3d0
[   22.986920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.987607]  kthread+0x24c/0x2d0
[   22.988463]  ret_from_fork+0x10/0x20
[   22.989019] 
[   22.989545] The buggy address belongs to the object at fff00000c126df00
[   22.989545]  which belongs to the cache kmalloc-128 of size 128
[   22.991110] The buggy address is located 13 bytes to the right of
[   22.991110]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.992447] 
[   22.993058] The buggy address belongs to the physical page:
[   22.993723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.994780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.995680] page_type: f5(slab)
[   22.996501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.997342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.998156] page dumped because: kasan: bad access detected
[   22.998820] 
[   22.999164] Memory state around the buggy address:
[   22.999877]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.001411]  fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.002259] >fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.003107]                    ^
[   23.003521]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.004803]  fff00000c126e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.005631] ==================================================================
Failure - kunit - check_workingset_xarray
(no logs available)
Failure - kunit - check_xas_conflict_get_order_check_xa_alloc
(no logs available)
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  126.876783] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  126.877817] Modules linked in:
[  126.878671] CPU: 0 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[  126.880116] Tainted: [B]=BAD_PAGE, [N]=TEST
[  126.881152] Hardware name: linux,dummy-virt (DT)
[  126.882002] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  126.882880] pc : kunit_test_null_dereference+0x70/0x170
[  126.883668] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  126.884387] sp : ffff800080fe7dc0
[  126.884862] x29: ffff800080fe7e20 x28: 0000000000000000 x27: 0000000000000000
[  126.885871] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c7987d80
[  126.887182] x23: ffffa2c3637c5840 x22: ffffa2c3637ce400 x21: fff00000c7987d88
[  126.888534] x20: 1ffff000101fcfb8 x19: ffff8000800879f0 x18: 00000000b00261a5
[  126.889587] x17: 0000000000000001 x16: fff00000da4d8d60 x15: 0000000000000000
[  126.890591] x14: 1ffe00001b49b190 x13: 0000000000000000 x12: fffd800018e7911b
[  126.891665] x11: 1ffe000018e7911a x10: fffd800018e7911a x9 : ffffa2c3637c58c8
[  126.892958] x8 : ffff800080fe7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  126.894090] x5 : ffff7000101fcfb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  126.895405] x2 : dfff800000000000 x1 : fff00000c73c8000 x0 : ffff8000800879f0
[  126.896288] Call trace:
[  126.896928]  kunit_test_null_dereference+0x70/0x170 (P)
[  126.897679]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  126.898561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  126.899420]  kthread+0x24c/0x2d0
[  126.900150]  ret_from_fork+0x10/0x20
[  126.901202] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  126.902546] ---[ end trace 0000000000000000 ]---