Hay
Date
March 19, 2025, 10:35 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   38.435183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   38.665798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   38.681590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   38.446557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   38.470098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   38.406875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   38.002138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-memcmp
[   37.851399] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   68.078268] ==================================================================
[   68.078374] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   68.078374] 
[   68.078495] Use-after-free read at 0x0000000042c83b8e (in kfence-#230):
[   68.078581]  test_krealloc+0x51c/0x830
[   68.078652]  kunit_try_run_case+0x14c/0x3d0
[   68.078727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.078804]  kthread+0x318/0x618
[   68.078875]  ret_from_fork+0x10/0x20
[   68.078953] 
[   68.078995] kfence-#230: 0x0000000042c83b8e-0x000000000c343837, size=32, cache=kmalloc-32
[   68.078995] 
[   68.079099] allocated by task 339 on cpu 1 at 68.077155s (0.001938s ago):
[   68.079205]  test_alloc+0x298/0x620
[   68.079272]  test_krealloc+0xc0/0x830
[   68.079336]  kunit_try_run_case+0x14c/0x3d0
[   68.079405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.079481]  kthread+0x318/0x618
[   68.079545]  ret_from_fork+0x10/0x20
[   68.079611] 
[   68.079652] freed by task 339 on cpu 1 at 68.077618s (0.002029s ago):
[   68.079755]  krealloc_noprof+0x148/0x360
[   68.079818]  test_krealloc+0x1dc/0x830
[   68.079879]  kunit_try_run_case+0x14c/0x3d0
[   68.079948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.080020]  kthread+0x318/0x618
[   68.080096]  ret_from_fork+0x10/0x20
[   68.080165] 
[   68.080225] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   68.080354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.080435] Hardware name: linux,dummy-virt (DT)
[   68.080492] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   67.885200] ==================================================================
[   67.885325] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   67.885325] 
[   67.885462] Use-after-free read at 0x000000004da0d609 (in kfence-#228):
[   67.885549]  test_memcache_typesafe_by_rcu+0x280/0x560
[   67.885629]  kunit_try_run_case+0x14c/0x3d0
[   67.885703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.885780]  kthread+0x318/0x618
[   67.885850]  ret_from_fork+0x10/0x20
[   67.885918] 
[   67.885957] kfence-#228: 0x000000004da0d609-0x00000000f4718c24, size=32, cache=test
[   67.885957] 
[   67.886043] allocated by task 337 on cpu 1 at 67.875717s (0.010321s ago):
[   67.886173]  test_alloc+0x22c/0x620
[   67.886240]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   67.886311]  kunit_try_run_case+0x14c/0x3d0
[   67.886378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.886455]  kthread+0x318/0x618
[   67.886521]  ret_from_fork+0x10/0x20
[   67.886585] 
[   67.886624] freed by task 337 on cpu 1 at 67.875939s (0.010680s ago):
[   67.886717]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   67.886788]  kunit_try_run_case+0x14c/0x3d0
[   67.886855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.886939]  kthread+0x318/0x618
[   67.887007]  ret_from_fork+0x10/0x20
[   67.887090] 
[   67.887157] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   67.887289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.887337] Hardware name: linux,dummy-virt (DT)
[   67.887392] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   48.556968] ==================================================================
[   48.557263] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   48.557263] 
[   48.557524] Invalid read at 0x00000000db67ee06:
[   48.557713]  test_invalid_access+0xdc/0x1f0
[   48.557880]  kunit_try_run_case+0x14c/0x3d0
[   48.558069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.558232]  kthread+0x318/0x618
[   48.558413]  ret_from_fork+0x10/0x20
[   48.558560] 
[   48.558691] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   48.559374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.559554] Hardware name: linux,dummy-virt (DT)
[   48.559740] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   48.313721] ==================================================================
[   48.313838] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   48.313838] 
[   48.313935] Corrupted memory at 0x000000006ffbdfe0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#224):
[   48.314455]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   48.314557]  kunit_try_run_case+0x14c/0x3d0
[   48.314636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.314710]  kthread+0x318/0x618
[   48.314783]  ret_from_fork+0x10/0x20
[   48.314847] 
[   48.314887] kfence-#224: 0x00000000d47ad599-0x000000005a949bcd, size=73, cache=kmalloc-96
[   48.314887] 
[   48.314988] allocated by task 327 on cpu 0 at 48.313207s (0.001775s ago):
[   48.315102]  test_alloc+0x298/0x620
[   48.315171]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   48.315242]  kunit_try_run_case+0x14c/0x3d0
[   48.315311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.315388]  kthread+0x318/0x618
[   48.315452]  ret_from_fork+0x10/0x20
[   48.315518] 
[   48.315559] freed by task 327 on cpu 0 at 48.313486s (0.002068s ago):
[   48.315659]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   48.315730]  kunit_try_run_case+0x14c/0x3d0
[   48.315799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.315875]  kthread+0x318/0x618
[   48.315938]  ret_from_fork+0x10/0x20
[   48.316006] 
[   48.316080] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   48.316215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.316266] Hardware name: linux,dummy-virt (DT)
[   48.316322] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   47.897817] ==================================================================
[   47.897907] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   47.897907] 
[   47.898040] Out-of-bounds read at 0x0000000083b8ee9c (105B right of kfence-#220):
[   47.898164]  test_kmalloc_aligned_oob_read+0x238/0x468
[   47.898241]  kunit_try_run_case+0x14c/0x3d0
[   47.898315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.898392]  kthread+0x318/0x618
[   47.898461]  ret_from_fork+0x10/0x20
[   47.898526] 
[   47.898566] kfence-#220: 0x00000000f0ea748d-0x00000000d42ecf70, size=73, cache=kmalloc-96
[   47.898566] 
[   47.898657] allocated by task 325 on cpu 0 at 47.897368s (0.001284s ago):
[   47.898755]  test_alloc+0x298/0x620
[   47.898820]  test_kmalloc_aligned_oob_read+0x100/0x468
[   47.898891]  kunit_try_run_case+0x14c/0x3d0
[   47.898970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.899043]  kthread+0x318/0x618
[   47.899125]  ret_from_fork+0x10/0x20
[   47.899189] 
[   47.899255] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   47.899392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.899443] Hardware name: linux,dummy-virt (DT)
[   47.899500] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   41.917856] ==================================================================
[   41.918158] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   41.918158] 
[   41.918347] Corrupted memory at 0x00000000cc1884b8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#163):
[   41.922564]  test_corruption+0x278/0x378
[   41.922724]  kunit_try_run_case+0x14c/0x3d0
[   41.922876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.923044]  kthread+0x318/0x618
[   41.923203]  ret_from_fork+0x10/0x20
[   41.923347] 
[   41.923461] kfence-#163: 0x00000000b0a78912-0x00000000669b60e3, size=32, cache=kmalloc-32
[   41.923461] 
[   41.923744] allocated by task 313 on cpu 0 at 41.917205s (0.006521s ago):
[   41.923964]  test_alloc+0x298/0x620
[   41.924172]  test_corruption+0xdc/0x378
[   41.924366]  kunit_try_run_case+0x14c/0x3d0
[   41.924510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.924646]  kthread+0x318/0x618
[   41.924843]  ret_from_fork+0x10/0x20
[   41.925258] 
[   41.925445] freed by task 313 on cpu 0 at 41.917361s (0.008074s ago):
[   41.925651]  test_corruption+0x278/0x378
[   41.925791]  kunit_try_run_case+0x14c/0x3d0
[   41.925944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.926161]  kthread+0x318/0x618
[   41.926297]  ret_from_fork+0x10/0x20
[   41.926426] 
[   41.926538] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.926781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.926875] Hardware name: linux,dummy-virt (DT)
[   41.926987] ==================================================================
[   42.238757] ==================================================================
[   42.240101] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   42.240101] 
[   42.240793] Corrupted memory at 0x00000000eb06b1f7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#166):
[   42.244563]  test_corruption+0x120/0x378
[   42.244718]  kunit_try_run_case+0x14c/0x3d0
[   42.244865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.244997]  kthread+0x318/0x618
[   42.245145]  ret_from_fork+0x10/0x20
[   42.245271] 
[   42.245343] kfence-#166: 0x000000008f2e9ee5-0x00000000c7e3dfc9, size=32, cache=test
[   42.245343] 
[   42.245504] allocated by task 315 on cpu 0 at 42.237367s (0.008128s ago):
[   42.245697]  test_alloc+0x22c/0x620
[   42.245822]  test_corruption+0xdc/0x378
[   42.246325]  kunit_try_run_case+0x14c/0x3d0
[   42.247149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.248358]  kthread+0x318/0x618
[   42.248506]  ret_from_fork+0x10/0x20
[   42.248775] 
[   42.249672] freed by task 315 on cpu 0 at 42.237469s (0.012191s ago):
[   42.250127]  test_corruption+0x120/0x378
[   42.250298]  kunit_try_run_case+0x14c/0x3d0
[   42.250845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.251845]  kthread+0x318/0x618
[   42.253119]  ret_from_fork+0x10/0x20
[   42.253297] 
[   42.253419] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   42.253657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.254207] Hardware name: linux,dummy-virt (DT)
[   42.254350] ==================================================================
[   42.345944] ==================================================================
[   42.346105] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   42.346105] 
[   42.346267] Corrupted memory at 0x00000000618b69a2 [ ! ] (in kfence-#167):
[   42.346574]  test_corruption+0x1d8/0x378
[   42.346702]  kunit_try_run_case+0x14c/0x3d0
[   42.346844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.346995]  kthread+0x318/0x618
[   42.347527]  ret_from_fork+0x10/0x20
[   42.347716] 
[   42.347800] kfence-#167: 0x0000000017095a8c-0x00000000e9a73b56, size=32, cache=test
[   42.347800] 
[   42.347964] allocated by task 315 on cpu 0 at 42.345707s (0.002248s ago):
[   42.348582]  test_alloc+0x22c/0x620
[   42.348773]  test_corruption+0x198/0x378
[   42.348910]  kunit_try_run_case+0x14c/0x3d0
[   42.349084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.349423]  kthread+0x318/0x618
[   42.349575]  ret_from_fork+0x10/0x20
[   42.349964] 
[   42.350129] freed by task 315 on cpu 0 at 42.345804s (0.004293s ago):
[   42.350456]  test_corruption+0x1d8/0x378
[   42.350879]  kunit_try_run_case+0x14c/0x3d0
[   42.351646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.351821]  kthread+0x318/0x618
[   42.351947]  ret_from_fork+0x10/0x20
[   42.352969] 
[   42.353959] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   42.354773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.355739] Hardware name: linux,dummy-virt (DT)
[   42.356044] ==================================================================
[   42.022428] ==================================================================
[   42.022569] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   42.022569] 
[   42.023289] Corrupted memory at 0x000000006fab689a [ ! ] (in kfence-#164):
[   42.024973]  test_corruption+0x284/0x378
[   42.025674]  kunit_try_run_case+0x14c/0x3d0
[   42.025809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.026118]  kthread+0x318/0x618
[   42.026357]  ret_from_fork+0x10/0x20
[   42.026611] 
[   42.027224] kfence-#164: 0x0000000080f9e31e-0x000000008c664082, size=32, cache=kmalloc-32
[   42.027224] 
[   42.027556] allocated by task 313 on cpu 0 at 42.021891s (0.005654s ago):
[   42.028242]  test_alloc+0x298/0x620
[   42.028395]  test_corruption+0x198/0x378
[   42.029035]  kunit_try_run_case+0x14c/0x3d0
[   42.029240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.029480]  kthread+0x318/0x618
[   42.029660]  ret_from_fork+0x10/0x20
[   42.029887] 
[   42.030250] freed by task 313 on cpu 0 at 42.022088s (0.008149s ago):
[   42.030808]  test_corruption+0x284/0x378
[   42.030978]  kunit_try_run_case+0x14c/0x3d0
[   42.031408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.031585]  kthread+0x318/0x618
[   42.031717]  ret_from_fork+0x10/0x20
[   42.032104] 
[   42.032227] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   42.033373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.033496] Hardware name: linux,dummy-virt (DT)
[   42.033691] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   41.809688] ==================================================================
[   41.809822] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   41.809822] 
[   41.809978] Invalid free of 0x00000000e84cb757 (in kfence-#162):
[   41.810160]  test_invalid_addr_free+0xec/0x238
[   41.810295]  kunit_try_run_case+0x14c/0x3d0
[   41.810426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.810573]  kthread+0x318/0x618
[   41.810705]  ret_from_fork+0x10/0x20
[   41.810828] 
[   41.810907] kfence-#162: 0x0000000016a406cf-0x000000002631468c, size=32, cache=test
[   41.810907] 
[   41.811863] allocated by task 311 on cpu 0 at 41.809526s (0.002308s ago):
[   41.813517]  test_alloc+0x22c/0x620
[   41.813648]  test_invalid_addr_free+0xd4/0x238
[   41.814660]  kunit_try_run_case+0x14c/0x3d0
[   41.815345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.816098]  kthread+0x318/0x618
[   41.816963]  ret_from_fork+0x10/0x20
[   41.817700] 
[   41.818233] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.819985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.820567] Hardware name: linux,dummy-virt (DT)
[   41.821545] ==================================================================
[   41.702459] ==================================================================
[   41.702675] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   41.702675] 
[   41.702950] Invalid free of 0x0000000031ae2540 (in kfence-#161):
[   41.703128]  test_invalid_addr_free+0x1ac/0x238
[   41.703333]  kunit_try_run_case+0x14c/0x3d0
[   41.703514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.703735]  kthread+0x318/0x618
[   41.703878]  ret_from_fork+0x10/0x20
[   41.704015] 
[   41.704116] kfence-#161: 0x00000000bdd62e94-0x00000000013364ca, size=32, cache=kmalloc-32
[   41.704116] 
[   41.704358] allocated by task 309 on cpu 0 at 41.702179s (0.002168s ago):
[   41.704605]  test_alloc+0x298/0x620
[   41.704852]  test_invalid_addr_free+0xd4/0x238
[   41.705000]  kunit_try_run_case+0x14c/0x3d0
[   41.705171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.705313]  kthread+0x318/0x618
[   41.705530]  ret_from_fork+0x10/0x20
[   41.705659] 
[   41.705787] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.706041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.706159] Hardware name: linux,dummy-virt (DT)
[   41.706263] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   41.594850] ==================================================================
[   41.595374] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   41.595374] 
[   41.595595] Invalid free of 0x00000000444fb7a2 (in kfence-#160):
[   41.595798]  test_double_free+0x100/0x238
[   41.595971]  kunit_try_run_case+0x14c/0x3d0
[   41.596176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.596462]  kthread+0x318/0x618
[   41.596662]  ret_from_fork+0x10/0x20
[   41.596932] 
[   41.597064] kfence-#160: 0x00000000444fb7a2-0x00000000a768b5c5, size=32, cache=test
[   41.597064] 
[   41.597251] allocated by task 307 on cpu 0 at 41.594429s (0.002812s ago):
[   41.597727]  test_alloc+0x22c/0x620
[   41.597859]  test_double_free+0xd4/0x238
[   41.597979]  kunit_try_run_case+0x14c/0x3d0
[   41.598352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.598512]  kthread+0x318/0x618
[   41.598638]  ret_from_fork+0x10/0x20
[   41.598764] 
[   41.598842] freed by task 307 on cpu 0 at 41.594560s (0.004274s ago):
[   41.599093]  test_double_free+0xf0/0x238
[   41.599218]  kunit_try_run_case+0x14c/0x3d0
[   41.599364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.599596]  kthread+0x318/0x618
[   41.599793]  ret_from_fork+0x10/0x20
[   41.599988] 
[   41.600150] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.600673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.600791] Hardware name: linux,dummy-virt (DT)
[   41.600898] ==================================================================
[   41.493190] ==================================================================
[   41.493767] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   41.493767] 
[   41.494288] Invalid free of 0x000000006303b7ed (in kfence-#159):
[   41.494636]  test_double_free+0x1bc/0x238
[   41.495031]  kunit_try_run_case+0x14c/0x3d0
[   41.495526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.496006]  kthread+0x318/0x618
[   41.496189]  ret_from_fork+0x10/0x20
[   41.496853] 
[   41.497164] kfence-#159: 0x000000006303b7ed-0x00000000bc7a5bc1, size=32, cache=kmalloc-32
[   41.497164] 
[   41.497477] allocated by task 305 on cpu 0 at 41.488478s (0.008988s ago):
[   41.497668]  test_alloc+0x298/0x620
[   41.498335]  test_double_free+0xd4/0x238
[   41.498862]  kunit_try_run_case+0x14c/0x3d0
[   41.499454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.499617]  kthread+0x318/0x618
[   41.499749]  ret_from_fork+0x10/0x20
[   41.499878] 
[   41.500243] freed by task 305 on cpu 0 at 41.488599s (0.011628s ago):
[   41.501161]  test_double_free+0x1ac/0x238
[   41.501758]  kunit_try_run_case+0x14c/0x3d0
[   41.501848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.501925]  kthread+0x318/0x618
[   41.501994]  ret_from_fork+0x10/0x20
[   41.502087] 
[   41.502200] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.502470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.502619] Hardware name: linux,dummy-virt (DT)
[   41.503045] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   41.062641] ==================================================================
[   41.063194] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   41.063194] 
[   41.063588] Use-after-free read at 0x0000000089d90ef1 (in kfence-#155):
[   41.063785]  test_use_after_free_read+0x114/0x248
[   41.064016]  kunit_try_run_case+0x14c/0x3d0
[   41.064271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.064494]  kthread+0x318/0x618
[   41.064674]  ret_from_fork+0x10/0x20
[   41.064881] 
[   41.065001] kfence-#155: 0x0000000089d90ef1-0x000000000670ad60, size=32, cache=kmalloc-32
[   41.065001] 
[   41.065254] allocated by task 297 on cpu 0 at 41.059939s (0.005303s ago):
[   41.066040]  test_alloc+0x298/0x620
[   41.066193]  test_use_after_free_read+0xd0/0x248
[   41.066341]  kunit_try_run_case+0x14c/0x3d0
[   41.066506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.066664]  kthread+0x318/0x618
[   41.066865]  ret_from_fork+0x10/0x20
[   41.067015] 
[   41.068376] freed by task 297 on cpu 0 at 41.060170s (0.007450s ago):
[   41.068930]  test_use_after_free_read+0x1c0/0x248
[   41.069093]  kunit_try_run_case+0x14c/0x3d0
[   41.069322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.069561]  kthread+0x318/0x618
[   41.069763]  ret_from_fork+0x10/0x20
[   41.069940] 
[   41.070106] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.070357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.070457] Hardware name: linux,dummy-virt (DT)
[   41.070562] ==================================================================
[   41.166764] ==================================================================
[   41.166906] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   41.166906] 
[   41.167142] Use-after-free read at 0x000000006fd3fbbf (in kfence-#156):
[   41.167294]  test_use_after_free_read+0x114/0x248
[   41.167433]  kunit_try_run_case+0x14c/0x3d0
[   41.167571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.167717]  kthread+0x318/0x618
[   41.167844]  ret_from_fork+0x10/0x20
[   41.167967] 
[   41.168041] kfence-#156: 0x000000006fd3fbbf-0x00000000ede2df9e, size=32, cache=test
[   41.168041] 
[   41.168230] allocated by task 299 on cpu 0 at 41.166410s (0.001811s ago):
[   41.168471]  test_alloc+0x22c/0x620
[   41.168807]  test_use_after_free_read+0xd0/0x248
[   41.169088]  kunit_try_run_case+0x14c/0x3d0
[   41.169308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.169486]  kthread+0x318/0x618
[   41.169691]  ret_from_fork+0x10/0x20
[   41.169892] 
[   41.169981] freed by task 299 on cpu 0 at 41.166507s (0.003462s ago):
[   41.170264]  test_use_after_free_read+0xf0/0x248
[   41.170429]  kunit_try_run_case+0x14c/0x3d0
[   41.170568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.170718]  kthread+0x318/0x618
[   41.170888]  ret_from_fork+0x10/0x20
[   41.171079] 
[   41.171188] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   41.171435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.171586] Hardware name: linux,dummy-virt (DT)
[   41.171768] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   40.941009] ==================================================================
[   40.941192] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.941192] 
[   40.941425] Out-of-bounds write at 0x00000000eb976bfc (1B left of kfence-#154):
[   40.941633]  test_out_of_bounds_write+0x100/0x240
[   40.942038]  kunit_try_run_case+0x14c/0x3d0
[   40.942442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.942600]  kthread+0x318/0x618
[   40.942737]  ret_from_fork+0x10/0x20
[   40.942868] 
[   40.943296] kfence-#154: 0x000000008d4b1103-0x00000000b8245fd3, size=32, cache=test
[   40.943296] 
[   40.944188] allocated by task 295 on cpu 0 at 40.940816s (0.003315s ago):
[   40.944538]  test_alloc+0x22c/0x620
[   40.944671]  test_out_of_bounds_write+0xc8/0x240
[   40.944981]  kunit_try_run_case+0x14c/0x3d0
[   40.945446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.945939]  kthread+0x318/0x618
[   40.946109]  ret_from_fork+0x10/0x20
[   40.946606] 
[   40.946773] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.947483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.947585] Hardware name: linux,dummy-virt (DT)
[   40.948197] ==================================================================
[   40.522135] ==================================================================
[   40.522275] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.522275] 
[   40.522505] Out-of-bounds write at 0x0000000004dc7420 (1B left of kfence-#150):
[   40.522685]  test_out_of_bounds_write+0x100/0x240
[   40.522834]  kunit_try_run_case+0x14c/0x3d0
[   40.522991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.523150]  kthread+0x318/0x618
[   40.523576]  ret_from_fork+0x10/0x20
[   40.523723] 
[   40.523799] kfence-#150: 0x00000000017a868f-0x00000000fdb0b66f, size=32, cache=kmalloc-32
[   40.523799] 
[   40.523975] allocated by task 293 on cpu 0 at 40.521839s (0.002125s ago):
[   40.524230]  test_alloc+0x298/0x620
[   40.524403]  test_out_of_bounds_write+0xc8/0x240
[   40.524621]  kunit_try_run_case+0x14c/0x3d0
[   40.524760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.525168]  kthread+0x318/0x618
[   40.525356]  ret_from_fork+0x10/0x20
[   40.525476] 
[   40.525592] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.525860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.525997] Hardware name: linux,dummy-virt (DT)
[   40.526152] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   40.417676] ==================================================================
[   40.417869] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   40.417869] 
[   40.418155] Out-of-bounds read at 0x00000000ebc050fe (32B right of kfence-#149):
[   40.418411]  test_out_of_bounds_read+0x1c8/0x3e0
[   40.418623]  kunit_try_run_case+0x14c/0x3d0
[   40.418786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.418965]  kthread+0x318/0x618
[   40.419196]  ret_from_fork+0x10/0x20
[   40.419403] 
[   40.419524] kfence-#149: 0x0000000099d47695-0x0000000012fe5537, size=32, cache=test
[   40.419524] 
[   40.419780] allocated by task 291 on cpu 0 at 40.417520s (0.002251s ago):
[   40.419991]  test_alloc+0x22c/0x620
[   40.420148]  test_out_of_bounds_read+0x198/0x3e0
[   40.420279]  kunit_try_run_case+0x14c/0x3d0
[   40.420427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.420619]  kthread+0x318/0x618
[   40.420763]  ret_from_fork+0x10/0x20
[   40.420882] 
[   40.421120] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.421448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.421544] Hardware name: linux,dummy-virt (DT)
[   40.421648] ==================================================================
[   40.207800] ==================================================================
[   40.208023] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   40.208023] 
[   40.208303] Out-of-bounds read at 0x00000000ab6c582c (32B right of kfence-#147):
[   40.208505]  test_out_of_bounds_read+0x1c8/0x3e0
[   40.208663]  kunit_try_run_case+0x14c/0x3d0
[   40.208844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.209023]  kthread+0x318/0x618
[   40.209233]  ret_from_fork+0x10/0x20
[   40.209496] 
[   40.209584] kfence-#147: 0x00000000ae095a5f-0x00000000d809cb0a, size=32, cache=kmalloc-32
[   40.209584] 
[   40.209750] allocated by task 289 on cpu 0 at 40.207171s (0.002569s ago):
[   40.209943]  test_alloc+0x298/0x620
[   40.210099]  test_out_of_bounds_read+0x198/0x3e0
[   40.210347]  kunit_try_run_case+0x14c/0x3d0
[   40.210620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.210773]  kthread+0x318/0x618
[   40.210896]  ret_from_fork+0x10/0x20
[   40.211035] 
[   40.211172] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.211485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.211594] Hardware name: linux,dummy-virt (DT)
[   40.211709] ==================================================================
[   40.311563] ==================================================================
[   40.311701] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   40.311701] 
[   40.311895] Out-of-bounds read at 0x000000001c1cd4cc (1B left of kfence-#148):
[   40.312484]  test_out_of_bounds_read+0x114/0x3e0
[   40.312648]  kunit_try_run_case+0x14c/0x3d0
[   40.312792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.312941]  kthread+0x318/0x618
[   40.313163]  ret_from_fork+0x10/0x20
[   40.314104] 
[   40.314189] kfence-#148: 0x00000000167cf887-0x00000000f1bf76ae, size=32, cache=test
[   40.314189] 
[   40.314352] allocated by task 291 on cpu 0 at 40.311399s (0.002943s ago):
[   40.314650]  test_alloc+0x22c/0x620
[   40.314777]  test_out_of_bounds_read+0xdc/0x3e0
[   40.315396]  kunit_try_run_case+0x14c/0x3d0
[   40.315576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.316213]  kthread+0x318/0x618
[   40.316739]  ret_from_fork+0x10/0x20
[   40.317029] 
[   40.317168] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.318222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.318326] Hardware name: linux,dummy-virt (DT)
[   40.318406] ==================================================================
[   40.109228] ==================================================================
[   40.109499] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   40.109499] 
[   40.110674] Out-of-bounds read at 0x00000000d7551bd5 (1B left of kfence-#146):
[   40.112780]  test_out_of_bounds_read+0x114/0x3e0
[   40.113041]  kunit_try_run_case+0x14c/0x3d0
[   40.113367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.113522]  kthread+0x318/0x618
[   40.113982]  ret_from_fork+0x10/0x20
[   40.114472] 
[   40.115464] kfence-#146: 0x00000000a327dc9e-0x0000000036fc93b0, size=32, cache=kmalloc-32
[   40.115464] 
[   40.116084] allocated by task 289 on cpu 0 at 40.104994s (0.010813s ago):
[   40.117078]  test_alloc+0x298/0x620
[   40.117436]  test_out_of_bounds_read+0xdc/0x3e0
[   40.117608]  kunit_try_run_case+0x14c/0x3d0
[   40.117747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.117891]  kthread+0x318/0x618
[   40.118024]  ret_from_fork+0x10/0x20
[   40.118330] 
[   40.118530] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   40.119074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.119252] Hardware name: linux,dummy-virt (DT)
[   40.119385] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[  282.695757] ==================================================================
[  282.695848] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[  282.695960] Read of size 12 at addr ffffaabf7d176120 by task kunit_try_catch/3334
[  282.696022] 
[  282.696104] CPU: 1 UID: 0 PID: 3334 Comm: kunit_try_catch Tainted: G    B D W        N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  282.696221] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  282.696261] Hardware name: linux,dummy-virt (DT)
[  282.696311] Call trace:
[  282.696358]  show_stack+0x20/0x38 (C)
[  282.696538]  dump_stack_lvl+0x8c/0xd0
[  282.696685]  print_report+0x2fc/0x5f0
[  282.696813]  kasan_report+0xc8/0x118
[  282.696890]  kasan_check_range+0x100/0x1a8
[  282.696963]  __asan_memcpy+0x3c/0x98
[  282.697036]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[  282.697135]  cs_dsp_mock_bin_add_info+0x18/0x30
[  282.697206]  bin_patch_name_and_info+0x164/0x6b0
[  282.697278]  kunit_try_run_case+0x14c/0x3d0
[  282.697357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  282.697438]  kthread+0x318/0x618
[  282.697514]  ret_from_fork+0x10/0x20
[  282.697594] 
[  282.697628] The buggy address belongs to the variable:
[  282.697665]  __loc.0+0x2c0/0x3a0
[  282.697733] 
[  282.697779] The buggy address belongs to the virtual mapping at
[  282.697779]  [ffffaabf7be30000, ffffaabf7dba0000) created by:
[  282.697779]  paging_init+0x618/0x7c8
[  282.697860] 
[  282.697957] The buggy address belongs to the physical page:
[  282.698002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44f76
[  282.698108] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  282.698207] raw: 03fffe0000002000 ffffc1ffc013dd88 ffffc1ffc013dd88 0000000000000000
[  282.698271] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  282.698318] page dumped because: kasan: bad access detected
[  282.698358] 
[  282.698390] Memory state around the buggy address:
[  282.698439]  ffffaabf7d176000: f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9
[  282.698489]  ffffaabf7d176080: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9
[  282.698539] >ffffaabf7d176100: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00
[  282.698581]                                   ^
[  282.698627]  ffffaabf7d176180: 00 07 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[  282.698680]  ffffaabf7d176200: 00 00 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
[  282.698723] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   39.922603] ==================================================================
[   39.922752] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   39.924429] Write of size 1 at addr fff00000c5dbd078 by task kunit_try_catch/287
[   39.925075] 
[   39.925188] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.925893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.926012] Hardware name: linux,dummy-virt (DT)
[   39.926488] Call trace:
[   39.926649]  show_stack+0x20/0x38 (C)
[   39.927132]  dump_stack_lvl+0x8c/0xd0
[   39.927353]  print_report+0x118/0x5f0
[   39.927534]  kasan_report+0xc8/0x118
[   39.927688]  __asan_report_store1_noabort+0x20/0x30
[   39.928419]  strncpy_from_user+0x270/0x2a0
[   39.928727]  copy_user_test_oob+0x5c0/0xec0
[   39.929434]  kunit_try_run_case+0x14c/0x3d0
[   39.929874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.930205]  kthread+0x318/0x618
[   39.930454]  ret_from_fork+0x10/0x20
[   39.930636] 
[   39.930703] Allocated by task 287:
[   39.930790]  kasan_save_stack+0x3c/0x68
[   39.930958]  kasan_save_track+0x20/0x40
[   39.931112]  kasan_save_alloc_info+0x40/0x58
[   39.931540]  __kasan_kmalloc+0xd4/0xd8
[   39.931693]  __kmalloc_noprof+0x188/0x4c8
[   39.931823]  kunit_kmalloc_array+0x34/0x88
[   39.931972]  copy_user_test_oob+0xac/0xec0
[   39.932131]  kunit_try_run_case+0x14c/0x3d0
[   39.932468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.932930]  kthread+0x318/0x618
[   39.933176]  ret_from_fork+0x10/0x20
[   39.933355] 
[   39.933425] The buggy address belongs to the object at fff00000c5dbd000
[   39.933425]  which belongs to the cache kmalloc-128 of size 128
[   39.933640] The buggy address is located 0 bytes to the right of
[   39.933640]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.933858] 
[   39.933936] The buggy address belongs to the physical page:
[   39.934040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.934715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.934960] page_type: f5(slab)
[   39.935137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.935313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.935469] page dumped because: kasan: bad access detected
[   39.935603] 
[   39.935667] Memory state around the buggy address:
[   39.935776]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.935982]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.936576] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.937180]                                                                 ^
[   39.937688]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.938008]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.938243] ==================================================================
[   39.900088] ==================================================================
[   39.900242] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   39.901186] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.901752] 
[   39.902088] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.902618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.903124] Hardware name: linux,dummy-virt (DT)
[   39.903267] Call trace:
[   39.903344]  show_stack+0x20/0x38 (C)
[   39.903509]  dump_stack_lvl+0x8c/0xd0
[   39.903666]  print_report+0x118/0x5f0
[   39.905503]  kasan_report+0xc8/0x118
[   39.906266]  kasan_check_range+0x100/0x1a8
[   39.906456]  __kasan_check_write+0x20/0x30
[   39.906625]  strncpy_from_user+0x3c/0x2a0
[   39.906789]  copy_user_test_oob+0x5c0/0xec0
[   39.907273]  kunit_try_run_case+0x14c/0x3d0
[   39.908105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.908632]  kthread+0x318/0x618
[   39.909085]  ret_from_fork+0x10/0x20
[   39.909294] 
[   39.909829] Allocated by task 287:
[   39.909957]  kasan_save_stack+0x3c/0x68
[   39.910379]  kasan_save_track+0x20/0x40
[   39.910772]  kasan_save_alloc_info+0x40/0x58
[   39.910960]  __kasan_kmalloc+0xd4/0xd8
[   39.911406]  __kmalloc_noprof+0x188/0x4c8
[   39.911553]  kunit_kmalloc_array+0x34/0x88
[   39.911977]  copy_user_test_oob+0xac/0xec0
[   39.912710]  kunit_try_run_case+0x14c/0x3d0
[   39.912920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.913097]  kthread+0x318/0x618
[   39.913218]  ret_from_fork+0x10/0x20
[   39.913342] 
[   39.913410] The buggy address belongs to the object at fff00000c5dbd000
[   39.913410]  which belongs to the cache kmalloc-128 of size 128
[   39.913615] The buggy address is located 0 bytes inside of
[   39.913615]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.914817] 
[   39.914898] The buggy address belongs to the physical page:
[   39.915595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.916067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.916237] page_type: f5(slab)
[   39.917093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.917717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.918175] page dumped because: kasan: bad access detected
[   39.918302] 
[   39.918364] Memory state around the buggy address:
[   39.918729]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.919384]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.919553] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.919698]                                                                 ^
[   39.919838]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.919994]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.920419] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   39.832123] ==================================================================
[   39.832386] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   39.832971] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.833161] 
[   39.833257] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.833996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.834116] Hardware name: linux,dummy-virt (DT)
[   39.834998] Call trace:
[   39.835134]  show_stack+0x20/0x38 (C)
[   39.835668]  dump_stack_lvl+0x8c/0xd0
[   39.835847]  print_report+0x118/0x5f0
[   39.836479]  kasan_report+0xc8/0x118
[   39.836935]  kasan_check_range+0x100/0x1a8
[   39.837114]  __kasan_check_read+0x20/0x30
[   39.837276]  copy_user_test_oob+0x3c8/0xec0
[   39.837430]  kunit_try_run_case+0x14c/0x3d0
[   39.837582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.837752]  kthread+0x318/0x618
[   39.838384]  ret_from_fork+0x10/0x20
[   39.839592] 
[   39.839904] Allocated by task 287:
[   39.840198]  kasan_save_stack+0x3c/0x68
[   39.840587]  kasan_save_track+0x20/0x40
[   39.840881]  kasan_save_alloc_info+0x40/0x58
[   39.841638]  __kasan_kmalloc+0xd4/0xd8
[   39.841847]  __kmalloc_noprof+0x188/0x4c8
[   39.842018]  kunit_kmalloc_array+0x34/0x88
[   39.842173]  copy_user_test_oob+0xac/0xec0
[   39.842759]  kunit_try_run_case+0x14c/0x3d0
[   39.843449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.844011]  kthread+0x318/0x618
[   39.844743]  ret_from_fork+0x10/0x20
[   39.844885] 
[   39.845070] The buggy address belongs to the object at fff00000c5dbd000
[   39.845070]  which belongs to the cache kmalloc-128 of size 128
[   39.845383] The buggy address is located 0 bytes inside of
[   39.845383]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.846144] 
[   39.846532] The buggy address belongs to the physical page:
[   39.847125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.847310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.848037] page_type: f5(slab)
[   39.848208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.848391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.848542] page dumped because: kasan: bad access detected
[   39.848654] 
[   39.848714] Memory state around the buggy address:
[   39.849385]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.850208]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851001] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.851196]                                                                 ^
[   39.851341]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851497]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.851633] ==================================================================
[   39.780418] ==================================================================
[   39.780569] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   39.780775] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.780989] 
[   39.781155] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.781340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.781460] Hardware name: linux,dummy-virt (DT)
[   39.781571] Call trace:
[   39.781642]  show_stack+0x20/0x38 (C)
[   39.781902]  dump_stack_lvl+0x8c/0xd0
[   39.782079]  print_report+0x118/0x5f0
[   39.782370]  kasan_report+0xc8/0x118
[   39.782629]  kasan_check_range+0x100/0x1a8
[   39.782892]  __kasan_check_read+0x20/0x30
[   39.783172]  copy_user_test_oob+0x728/0xec0
[   39.783441]  kunit_try_run_case+0x14c/0x3d0
[   39.783697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.783977]  kthread+0x318/0x618
[   39.784143]  ret_from_fork+0x10/0x20
[   39.784440] 
[   39.784518] Allocated by task 287:
[   39.784629]  kasan_save_stack+0x3c/0x68
[   39.784765]  kasan_save_track+0x20/0x40
[   39.784918]  kasan_save_alloc_info+0x40/0x58
[   39.785077]  __kasan_kmalloc+0xd4/0xd8
[   39.785265]  __kmalloc_noprof+0x188/0x4c8
[   39.785430]  kunit_kmalloc_array+0x34/0x88
[   39.785575]  copy_user_test_oob+0xac/0xec0
[   39.785732]  kunit_try_run_case+0x14c/0x3d0
[   39.785924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.786134]  kthread+0x318/0x618
[   39.786287]  ret_from_fork+0x10/0x20
[   39.786444] 
[   39.786552] The buggy address belongs to the object at fff00000c5dbd000
[   39.786552]  which belongs to the cache kmalloc-128 of size 128
[   39.786753] The buggy address is located 0 bytes inside of
[   39.786753]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.786980] 
[   39.787076] The buggy address belongs to the physical page:
[   39.787741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.787924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.788116] page_type: f5(slab)
[   39.788255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.788504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.788720] page dumped because: kasan: bad access detected
[   39.788881] 
[   39.789020] Memory state around the buggy address:
[   39.789241]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.789409]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.789579] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.789718]                                                                 ^
[   39.789855]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.790010]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.790295] ==================================================================
[   39.810571] ==================================================================
[   39.811151] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   39.811399] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.811694] 
[   39.811803] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.812618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.812816] Hardware name: linux,dummy-virt (DT)
[   39.812963] Call trace:
[   39.813192]  show_stack+0x20/0x38 (C)
[   39.813460]  dump_stack_lvl+0x8c/0xd0
[   39.813639]  print_report+0x118/0x5f0
[   39.814097]  kasan_report+0xc8/0x118
[   39.814550]  kasan_check_range+0x100/0x1a8
[   39.814758]  __kasan_check_write+0x20/0x30
[   39.814937]  copy_user_test_oob+0x35c/0xec0
[   39.815125]  kunit_try_run_case+0x14c/0x3d0
[   39.815286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.815568]  kthread+0x318/0x618
[   39.815826]  ret_from_fork+0x10/0x20
[   39.816664] 
[   39.816855] Allocated by task 287:
[   39.816982]  kasan_save_stack+0x3c/0x68
[   39.817138]  kasan_save_track+0x20/0x40
[   39.817266]  kasan_save_alloc_info+0x40/0x58
[   39.817396]  __kasan_kmalloc+0xd4/0xd8
[   39.817523]  __kmalloc_noprof+0x188/0x4c8
[   39.817636]  kunit_kmalloc_array+0x34/0x88
[   39.818214]  copy_user_test_oob+0xac/0xec0
[   39.818499]  kunit_try_run_case+0x14c/0x3d0
[   39.818664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.818824]  kthread+0x318/0x618
[   39.819579]  ret_from_fork+0x10/0x20
[   39.820293] 
[   39.820386] The buggy address belongs to the object at fff00000c5dbd000
[   39.820386]  which belongs to the cache kmalloc-128 of size 128
[   39.820851] The buggy address is located 0 bytes inside of
[   39.820851]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.821129] 
[   39.821203] The buggy address belongs to the physical page:
[   39.821313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.822762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.823356] page_type: f5(slab)
[   39.823701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.824078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.824230] page dumped because: kasan: bad access detected
[   39.825187] 
[   39.825589] Memory state around the buggy address:
[   39.826310]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.826561]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.826742] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.826883]                                                                 ^
[   39.827900]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.828077]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.828931] ==================================================================
[   39.855163] ==================================================================
[   39.855454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   39.855605] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.855775] 
[   39.855868] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.856178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.856270] Hardware name: linux,dummy-virt (DT)
[   39.856987] Call trace:
[   39.857389]  show_stack+0x20/0x38 (C)
[   39.857733]  dump_stack_lvl+0x8c/0xd0
[   39.857894]  print_report+0x118/0x5f0
[   39.858076]  kasan_report+0xc8/0x118
[   39.858264]  kasan_check_range+0x100/0x1a8
[   39.858444]  __kasan_check_write+0x20/0x30
[   39.858661]  copy_user_test_oob+0x434/0xec0
[   39.858827]  kunit_try_run_case+0x14c/0x3d0
[   39.859000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.859429]  kthread+0x318/0x618
[   39.859629]  ret_from_fork+0x10/0x20
[   39.859844] 
[   39.859940] Allocated by task 287:
[   39.860102]  kasan_save_stack+0x3c/0x68
[   39.860545]  kasan_save_track+0x20/0x40
[   39.860685]  kasan_save_alloc_info+0x40/0x58
[   39.860829]  __kasan_kmalloc+0xd4/0xd8
[   39.861001]  __kmalloc_noprof+0x188/0x4c8
[   39.861375]  kunit_kmalloc_array+0x34/0x88
[   39.862001]  copy_user_test_oob+0xac/0xec0
[   39.862357]  kunit_try_run_case+0x14c/0x3d0
[   39.862508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.862667]  kthread+0x318/0x618
[   39.862792]  ret_from_fork+0x10/0x20
[   39.862945] 
[   39.863080] The buggy address belongs to the object at fff00000c5dbd000
[   39.863080]  which belongs to the cache kmalloc-128 of size 128
[   39.863356] The buggy address is located 0 bytes inside of
[   39.863356]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.863602] 
[   39.863681] The buggy address belongs to the physical page:
[   39.863858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.864034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.864206] page_type: f5(slab)
[   39.864331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.864581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.864790] page dumped because: kasan: bad access detected
[   39.864967] 
[   39.865041] Memory state around the buggy address:
[   39.865177]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.865333]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.865510] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.865714]                                                                 ^
[   39.865869]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.866075]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.866209] ==================================================================
[   39.750745] ==================================================================
[   39.751074] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   39.751363] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.751592] 
[   39.751714] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.752088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.752227] Hardware name: linux,dummy-virt (DT)
[   39.752373] Call trace:
[   39.752553]  show_stack+0x20/0x38 (C)
[   39.752733]  dump_stack_lvl+0x8c/0xd0
[   39.753396]  print_report+0x118/0x5f0
[   39.753672]  kasan_report+0xc8/0x118
[   39.754229]  kasan_check_range+0x100/0x1a8
[   39.754549]  __kasan_check_write+0x20/0x30
[   39.755164]  copy_user_test_oob+0x234/0xec0
[   39.755754]  kunit_try_run_case+0x14c/0x3d0
[   39.756506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.756873]  kthread+0x318/0x618
[   39.757356]  ret_from_fork+0x10/0x20
[   39.757939] 
[   39.758019] Allocated by task 287:
[   39.758151]  kasan_save_stack+0x3c/0x68
[   39.758290]  kasan_save_track+0x20/0x40
[   39.758413]  kasan_save_alloc_info+0x40/0x58
[   39.758548]  __kasan_kmalloc+0xd4/0xd8
[   39.758667]  __kmalloc_noprof+0x188/0x4c8
[   39.758797]  kunit_kmalloc_array+0x34/0x88
[   39.758934]  copy_user_test_oob+0xac/0xec0
[   39.759089]  kunit_try_run_case+0x14c/0x3d0
[   39.759229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.759379]  kthread+0x318/0x618
[   39.759504]  ret_from_fork+0x10/0x20
[   39.759623] 
[   39.759695] The buggy address belongs to the object at fff00000c5dbd000
[   39.759695]  which belongs to the cache kmalloc-128 of size 128
[   39.759904] The buggy address is located 0 bytes inside of
[   39.759904]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.761022] 
[   39.761139] The buggy address belongs to the physical page:
[   39.761256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.761519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.761932] page_type: f5(slab)
[   39.762772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.764036] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.764262] page dumped because: kasan: bad access detected
[   39.764384] 
[   39.764490] Memory state around the buggy address:
[   39.764772]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.765182]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.765698] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.765859]                                                                 ^
[   39.766237]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.766397]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.766531] ==================================================================
[   39.869221] ==================================================================
[   39.869498] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   39.869666] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287
[   39.869829] 
[   39.869926] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.870225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.870323] Hardware name: linux,dummy-virt (DT)
[   39.870434] Call trace:
[   39.871351]  show_stack+0x20/0x38 (C)
[   39.871644]  dump_stack_lvl+0x8c/0xd0
[   39.871912]  print_report+0x118/0x5f0
[   39.872590]  kasan_report+0xc8/0x118
[   39.873205]  kasan_check_range+0x100/0x1a8
[   39.873394]  __kasan_check_read+0x20/0x30
[   39.873592]  copy_user_test_oob+0x4a0/0xec0
[   39.873768]  kunit_try_run_case+0x14c/0x3d0
[   39.873935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.874336]  kthread+0x318/0x618
[   39.875489]  ret_from_fork+0x10/0x20
[   39.875745] 
[   39.875921] Allocated by task 287:
[   39.876025]  kasan_save_stack+0x3c/0x68
[   39.876274]  kasan_save_track+0x20/0x40
[   39.876418]  kasan_save_alloc_info+0x40/0x58
[   39.876547]  __kasan_kmalloc+0xd4/0xd8
[   39.877169]  __kmalloc_noprof+0x188/0x4c8
[   39.877348]  kunit_kmalloc_array+0x34/0x88
[   39.878107]  copy_user_test_oob+0xac/0xec0
[   39.878271]  kunit_try_run_case+0x14c/0x3d0
[   39.878405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.879349]  kthread+0x318/0x618
[   39.879722]  ret_from_fork+0x10/0x20
[   39.879870] 
[   39.879939] The buggy address belongs to the object at fff00000c5dbd000
[   39.879939]  which belongs to the cache kmalloc-128 of size 128
[   39.880479] The buggy address is located 0 bytes inside of
[   39.880479]  allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078)
[   39.881377] 
[   39.881466] The buggy address belongs to the physical page:
[   39.881588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd
[   39.881754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.881916] page_type: f5(slab)
[   39.883136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.883343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.883491] page dumped because: kasan: bad access detected
[   39.883609] 
[   39.883927] Memory state around the buggy address:
[   39.884618]  fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.885378]  fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.885849] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.886650]                                                                 ^
[   39.887499]  fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.888035]  fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.888200] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   39.648123] ==================================================================
[   39.648300] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   39.648733] Read of size 8 at addr fff00000c5da6f78 by task kunit_try_catch/283
[   39.648995] 
[   39.649194] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.649507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.649608] Hardware name: linux,dummy-virt (DT)
[   39.649717] Call trace:
[   39.649799]  show_stack+0x20/0x38 (C)
[   39.649950]  dump_stack_lvl+0x8c/0xd0
[   39.650544]  print_report+0x118/0x5f0
[   39.650716]  kasan_report+0xc8/0x118
[   39.650882]  __asan_report_load8_noabort+0x20/0x30
[   39.651089]  copy_to_kernel_nofault+0x204/0x250
[   39.651255]  copy_to_kernel_nofault_oob+0x158/0x418
[   39.651431]  kunit_try_run_case+0x14c/0x3d0
[   39.651605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.651880]  kthread+0x318/0x618
[   39.652043]  ret_from_fork+0x10/0x20
[   39.652228] 
[   39.652460] Allocated by task 283:
[   39.652779]  kasan_save_stack+0x3c/0x68
[   39.652915]  kasan_save_track+0x20/0x40
[   39.653033]  kasan_save_alloc_info+0x40/0x58
[   39.653626]  __kasan_kmalloc+0xd4/0xd8
[   39.653781]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.653954]  copy_to_kernel_nofault_oob+0xc8/0x418
[   39.654108]  kunit_try_run_case+0x14c/0x3d0
[   39.654245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.654832]  kthread+0x318/0x618
[   39.654966]  ret_from_fork+0x10/0x20
[   39.655525] 
[   39.655608] The buggy address belongs to the object at fff00000c5da6f00
[   39.655608]  which belongs to the cache kmalloc-128 of size 128
[   39.655802] The buggy address is located 0 bytes to the right of
[   39.655802]  allocated 120-byte region [fff00000c5da6f00, fff00000c5da6f78)
[   39.656622] 
[   39.656706] The buggy address belongs to the physical page:
[   39.656827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   39.657010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.657207] page_type: f5(slab)
[   39.657420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.657695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.657926] page dumped because: kasan: bad access detected
[   39.658101] 
[   39.658179] Memory state around the buggy address:
[   39.658695]  fff00000c5da6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.658941]  fff00000c5da6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.659163] >fff00000c5da6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.659316]                                                                 ^
[   39.659523]  fff00000c5da6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.659742]  fff00000c5da7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.659919] ==================================================================
[   39.661982] ==================================================================
[   39.662154] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   39.662298] Write of size 8 at addr fff00000c5da6f78 by task kunit_try_catch/283
[   39.662468] 
[   39.662568] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.662846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.662950] Hardware name: linux,dummy-virt (DT)
[   39.663553] Call trace:
[   39.663961]  show_stack+0x20/0x38 (C)
[   39.664565]  dump_stack_lvl+0x8c/0xd0
[   39.665006]  print_report+0x118/0x5f0
[   39.665179]  kasan_report+0xc8/0x118
[   39.665334]  kasan_check_range+0x100/0x1a8
[   39.665724]  __kasan_check_write+0x20/0x30
[   39.665945]  copy_to_kernel_nofault+0x8c/0x250
[   39.666150]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   39.666337]  kunit_try_run_case+0x14c/0x3d0
[   39.666612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.666820]  kthread+0x318/0x618
[   39.666975]  ret_from_fork+0x10/0x20
[   39.667196] 
[   39.667268] Allocated by task 283:
[   39.667368]  kasan_save_stack+0x3c/0x68
[   39.667555]  kasan_save_track+0x20/0x40
[   39.668027]  kasan_save_alloc_info+0x40/0x58
[   39.668217]  __kasan_kmalloc+0xd4/0xd8
[   39.668341]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.668491]  copy_to_kernel_nofault_oob+0xc8/0x418
[   39.668636]  kunit_try_run_case+0x14c/0x3d0
[   39.669894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.670140]  kthread+0x318/0x618
[   39.670382]  ret_from_fork+0x10/0x20
[   39.670793] 
[   39.670888] The buggy address belongs to the object at fff00000c5da6f00
[   39.670888]  which belongs to the cache kmalloc-128 of size 128
[   39.671125] The buggy address is located 0 bytes to the right of
[   39.671125]  allocated 120-byte region [fff00000c5da6f00, fff00000c5da6f78)
[   39.671355] 
[   39.672101] The buggy address belongs to the physical page:
[   39.672391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   39.672586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.672746] page_type: f5(slab)
[   39.672866] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.673128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.673484] page dumped because: kasan: bad access detected
[   39.673642] 
[   39.673764] Memory state around the buggy address:
[   39.673881]  fff00000c5da6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.674037]  fff00000c5da6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.674624] >fff00000c5da6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.675033]                                                                 ^
[   39.675211]  fff00000c5da6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.675912]  fff00000c5da7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.676486] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   39.498451] ==================================================================
[   39.498714] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   39.499458] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   39.500353] 
[   39.500656] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.500960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.501208] Hardware name: linux,dummy-virt (DT)
[   39.501451] Call trace:
[   39.501567]  show_stack+0x20/0x38 (C)
[   39.501720]  dump_stack_lvl+0x8c/0xd0
[   39.501874]  print_report+0x2fc/0x5f0
[   39.502023]  kasan_report+0xc8/0x118
[   39.502905]  __asan_report_load1_noabort+0x20/0x30
[   39.503142]  vmalloc_oob+0x51c/0x5d0
[   39.503765]  kunit_try_run_case+0x14c/0x3d0
[   39.504632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.505182]  kthread+0x318/0x618
[   39.505694]  ret_from_fork+0x10/0x20
[   39.506032] 
[   39.506146] The buggy address belongs to the virtual mapping at
[   39.506146]  [ffff80008010b000, ffff80008010d000) created by:
[   39.506146]  vmalloc_oob+0x98/0x5d0
[   39.506407] 
[   39.506475] The buggy address belongs to the physical page:
[   39.506580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db7
[   39.507120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.507691] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.508726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.508967] page dumped because: kasan: bad access detected
[   39.509110] 
[   39.509973] Memory state around the buggy address:
[   39.510272]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.510732]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.511259] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   39.511974]                                                                 ^
[   39.512167]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.512853]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.513044] ==================================================================
[   39.482580] ==================================================================
[   39.482777] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   39.482957] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   39.483142] 
[   39.484591] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.485245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.485476] Hardware name: linux,dummy-virt (DT)
[   39.485868] Call trace:
[   39.486084]  show_stack+0x20/0x38 (C)
[   39.486397]  dump_stack_lvl+0x8c/0xd0
[   39.486576]  print_report+0x2fc/0x5f0
[   39.487266]  kasan_report+0xc8/0x118
[   39.487433]  __asan_report_load1_noabort+0x20/0x30
[   39.488553]  vmalloc_oob+0x578/0x5d0
[   39.488750]  kunit_try_run_case+0x14c/0x3d0
[   39.488906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.489109]  kthread+0x318/0x618
[   39.490152]  ret_from_fork+0x10/0x20
[   39.490880] 
[   39.491010] The buggy address belongs to the virtual mapping at
[   39.491010]  [ffff80008010b000, ffff80008010d000) created by:
[   39.491010]  vmalloc_oob+0x98/0x5d0
[   39.491306] 
[   39.491505] The buggy address belongs to the physical page:
[   39.491951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db7
[   39.492622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.493197] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.493774] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.494046] page dumped because: kasan: bad access detected
[   39.494204] 
[   39.494272] Memory state around the buggy address:
[   39.494385]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.494535]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.494681] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   39.494818]                                                              ^
[   39.494968]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.495138]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.495274] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   39.286388] ==================================================================
[   39.286537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   39.286683] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.286846] 
[   39.286946] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.287245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.287340] Hardware name: linux,dummy-virt (DT)
[   39.287451] Call trace:
[   39.287526]  show_stack+0x20/0x38 (C)
[   39.287687]  dump_stack_lvl+0x8c/0xd0
[   39.287837]  print_report+0x118/0x5f0
[   39.287994]  kasan_report+0xc8/0x118
[   39.288161]  __asan_report_load8_noabort+0x20/0x30
[   39.288358]  kasan_atomics_helper+0x3db0/0x4858
[   39.288620]  kasan_atomics+0x198/0x2e8
[   39.288796]  kunit_try_run_case+0x14c/0x3d0
[   39.288979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.289202]  kthread+0x318/0x618
[   39.289364]  ret_from_fork+0x10/0x20
[   39.289517] 
[   39.289577] Allocated by task 267:
[   39.289670]  kasan_save_stack+0x3c/0x68
[   39.289789]  kasan_save_track+0x20/0x40
[   39.289910]  kasan_save_alloc_info+0x40/0x58
[   39.290041]  __kasan_kmalloc+0xd4/0xd8
[   39.290198]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.290338]  kasan_atomics+0xb8/0x2e8
[   39.290539]  kunit_try_run_case+0x14c/0x3d0
[   39.290726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.291005]  kthread+0x318/0x618
[   39.291173]  ret_from_fork+0x10/0x20
[   39.291308] 
[   39.291377] The buggy address belongs to the object at fff00000c5dafc80
[   39.291377]  which belongs to the cache kmalloc-64 of size 64
[   39.291581] The buggy address is located 0 bytes to the right of
[   39.291581]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.291803] 
[   39.291876] The buggy address belongs to the physical page:
[   39.291979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.292179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.292333] page_type: f5(slab)
[   39.292451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.292631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.292828] page dumped because: kasan: bad access detected
[   39.292971] 
[   39.293034] Memory state around the buggy address:
[   39.293213]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.293410]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.293578] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.293732]                                      ^
[   39.293916]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.294135]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.294264] ==================================================================
[   39.295702] ==================================================================
[   39.295872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   39.296133] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.296388] 
[   39.296500] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.296939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.297074] Hardware name: linux,dummy-virt (DT)
[   39.297176] Call trace:
[   39.297256]  show_stack+0x20/0x38 (C)
[   39.297405]  dump_stack_lvl+0x8c/0xd0
[   39.297610]  print_report+0x118/0x5f0
[   39.297772]  kasan_report+0xc8/0x118
[   39.297917]  kasan_check_range+0x100/0x1a8
[   39.298084]  __kasan_check_write+0x20/0x30
[   39.298229]  kasan_atomics_helper+0x1644/0x4858
[   39.298395]  kasan_atomics+0x198/0x2e8
[   39.298547]  kunit_try_run_case+0x14c/0x3d0
[   39.298705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.298888]  kthread+0x318/0x618
[   39.299145]  ret_from_fork+0x10/0x20
[   39.299364] 
[   39.299431] Allocated by task 267:
[   39.299533]  kasan_save_stack+0x3c/0x68
[   39.299664]  kasan_save_track+0x20/0x40
[   39.299792]  kasan_save_alloc_info+0x40/0x58
[   39.299926]  __kasan_kmalloc+0xd4/0xd8
[   39.300071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.300217]  kasan_atomics+0xb8/0x2e8
[   39.300337]  kunit_try_run_case+0x14c/0x3d0
[   39.300468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.300644]  kthread+0x318/0x618
[   39.300842]  ret_from_fork+0x10/0x20
[   39.301047] 
[   39.301186] The buggy address belongs to the object at fff00000c5dafc80
[   39.301186]  which belongs to the cache kmalloc-64 of size 64
[   39.301482] The buggy address is located 0 bytes to the right of
[   39.301482]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.301696] 
[   39.301764] The buggy address belongs to the physical page:
[   39.302363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.302738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.303017] page_type: f5(slab)
[   39.303157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.303349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.303518] page dumped because: kasan: bad access detected
[   39.303707] 
[   39.303811] Memory state around the buggy address:
[   39.303978]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.304237]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.304804] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.304953]                                      ^
[   39.305159]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.305326]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.305476] ==================================================================
[   39.131540] ==================================================================
[   39.131712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   39.131807] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.131895] 
[   39.131948] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.132144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.132198] Hardware name: linux,dummy-virt (DT)
[   39.132253] Call trace:
[   39.132307]  show_stack+0x20/0x38 (C)
[   39.132531]  dump_stack_lvl+0x8c/0xd0
[   39.132765]  print_report+0x118/0x5f0
[   39.132918]  kasan_report+0xc8/0x118
[   39.133148]  kasan_check_range+0x100/0x1a8
[   39.133898]  __kasan_check_write+0x20/0x30
[   39.134108]  kasan_atomics_helper+0x11f8/0x4858
[   39.134719]  kasan_atomics+0x198/0x2e8
[   39.135144]  kunit_try_run_case+0x14c/0x3d0
[   39.135562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.135771]  kthread+0x318/0x618
[   39.136215]  ret_from_fork+0x10/0x20
[   39.136777] 
[   39.136856] Allocated by task 267:
[   39.137245]  kasan_save_stack+0x3c/0x68
[   39.137393]  kasan_save_track+0x20/0x40
[   39.137523]  kasan_save_alloc_info+0x40/0x58
[   39.137747]  __kasan_kmalloc+0xd4/0xd8
[   39.137890]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.138032]  kasan_atomics+0xb8/0x2e8
[   39.138172]  kunit_try_run_case+0x14c/0x3d0
[   39.138299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.138452]  kthread+0x318/0x618
[   39.138578]  ret_from_fork+0x10/0x20
[   39.138705] 
[   39.138831] The buggy address belongs to the object at fff00000c5dafc80
[   39.138831]  which belongs to the cache kmalloc-64 of size 64
[   39.139174] The buggy address is located 0 bytes to the right of
[   39.139174]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.139518] 
[   39.139606] The buggy address belongs to the physical page:
[   39.139713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.139890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.140044] page_type: f5(slab)
[   39.140172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.140336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.140482] page dumped because: kasan: bad access detected
[   39.140616] 
[   39.140708] Memory state around the buggy address:
[   39.140818]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.140970]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.141147] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.141340]                                      ^
[   39.141661]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.141825]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.142006] ==================================================================
[   39.270530] ==================================================================
[   39.270676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   39.270829] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.271006] 
[   39.271448] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.271748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.271842] Hardware name: linux,dummy-virt (DT)
[   39.272411] Call trace:
[   39.272525]  show_stack+0x20/0x38 (C)
[   39.272710]  dump_stack_lvl+0x8c/0xd0
[   39.272854]  print_report+0x118/0x5f0
[   39.273021]  kasan_report+0xc8/0x118
[   39.273198]  kasan_check_range+0x100/0x1a8
[   39.273861]  __kasan_check_write+0x20/0x30
[   39.274192]  kasan_atomics_helper+0x15b4/0x4858
[   39.274590]  kasan_atomics+0x198/0x2e8
[   39.274784]  kunit_try_run_case+0x14c/0x3d0
[   39.274954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.275655]  kthread+0x318/0x618
[   39.275840]  ret_from_fork+0x10/0x20
[   39.276005] 
[   39.276093] Allocated by task 267:
[   39.276193]  kasan_save_stack+0x3c/0x68
[   39.276342]  kasan_save_track+0x20/0x40
[   39.277147]  kasan_save_alloc_info+0x40/0x58
[   39.277536]  __kasan_kmalloc+0xd4/0xd8
[   39.277860]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.278340]  kasan_atomics+0xb8/0x2e8
[   39.278525]  kunit_try_run_case+0x14c/0x3d0
[   39.278860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.279651]  kthread+0x318/0x618
[   39.279822]  ret_from_fork+0x10/0x20
[   39.280086] 
[   39.280277] The buggy address belongs to the object at fff00000c5dafc80
[   39.280277]  which belongs to the cache kmalloc-64 of size 64
[   39.280768] The buggy address is located 0 bytes to the right of
[   39.280768]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.281179] 
[   39.281370] The buggy address belongs to the physical page:
[   39.281528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.281939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.282377] page_type: f5(slab)
[   39.282525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.283014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.283348] page dumped because: kasan: bad access detected
[   39.283852] 
[   39.284011] Memory state around the buggy address:
[   39.284379]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.284580]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.284736] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.284874]                                      ^
[   39.285662]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.285769]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.285885] ==================================================================
[   38.727139] ==================================================================
[   38.727294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   38.727451] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.727620] 
[   38.727715] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.727992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.729739] Hardware name: linux,dummy-virt (DT)
[   38.729966] Call trace:
[   38.730535]  show_stack+0x20/0x38 (C)
[   38.730958]  dump_stack_lvl+0x8c/0xd0
[   38.731260]  print_report+0x118/0x5f0
[   38.731884]  kasan_report+0xc8/0x118
[   38.732179]  kasan_check_range+0x100/0x1a8
[   38.732356]  __kasan_check_write+0x20/0x30
[   38.732957]  kasan_atomics_helper+0x99c/0x4858
[   38.733429]  kasan_atomics+0x198/0x2e8
[   38.733659]  kunit_try_run_case+0x14c/0x3d0
[   38.733926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.734450]  kthread+0x318/0x618
[   38.734877]  ret_from_fork+0x10/0x20
[   38.735047] 
[   38.735141] Allocated by task 267:
[   38.735241]  kasan_save_stack+0x3c/0x68
[   38.735373]  kasan_save_track+0x20/0x40
[   38.735493]  kasan_save_alloc_info+0x40/0x58
[   38.735639]  __kasan_kmalloc+0xd4/0xd8
[   38.735754]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.735893]  kasan_atomics+0xb8/0x2e8
[   38.736029]  kunit_try_run_case+0x14c/0x3d0
[   38.736183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.736333]  kthread+0x318/0x618
[   38.736925]  ret_from_fork+0x10/0x20
[   38.737098] 
[   38.737165] The buggy address belongs to the object at fff00000c5dafc80
[   38.737165]  which belongs to the cache kmalloc-64 of size 64
[   38.737628] The buggy address is located 0 bytes to the right of
[   38.737628]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.737867] 
[   38.737950] The buggy address belongs to the physical page:
[   38.738070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.738250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.738423] page_type: f5(slab)
[   38.738595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.738822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.738989] page dumped because: kasan: bad access detected
[   38.739166] 
[   38.739251] Memory state around the buggy address:
[   38.739393]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.739539]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.739717] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.740104]                                      ^
[   38.740312]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.740488]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.740585] ==================================================================
[   38.912813] ==================================================================
[   38.912951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   38.913122] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.913283] 
[   38.913383] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.913667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.913769] Hardware name: linux,dummy-virt (DT)
[   38.913869] Call trace:
[   38.913937]  show_stack+0x20/0x38 (C)
[   38.914110]  dump_stack_lvl+0x8c/0xd0
[   38.914256]  print_report+0x118/0x5f0
[   38.914435]  kasan_report+0xc8/0x118
[   38.914593]  kasan_check_range+0x100/0x1a8
[   38.914752]  __kasan_check_read+0x20/0x30
[   38.914911]  kasan_atomics_helper+0xdd4/0x4858
[   38.915135]  kasan_atomics+0x198/0x2e8
[   38.915472]  kunit_try_run_case+0x14c/0x3d0
[   38.915665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.915851]  kthread+0x318/0x618
[   38.916005]  ret_from_fork+0x10/0x20
[   38.918378] 
[   38.918479] Allocated by task 267:
[   38.918612]  kasan_save_stack+0x3c/0x68
[   38.918775]  kasan_save_track+0x20/0x40
[   38.918917]  kasan_save_alloc_info+0x40/0x58
[   38.919082]  __kasan_kmalloc+0xd4/0xd8
[   38.919738]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.920521]  kasan_atomics+0xb8/0x2e8
[   38.920733]  kunit_try_run_case+0x14c/0x3d0
[   38.920886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.921041]  kthread+0x318/0x618
[   38.921732]  ret_from_fork+0x10/0x20
[   38.922441] 
[   38.922551] The buggy address belongs to the object at fff00000c5dafc80
[   38.922551]  which belongs to the cache kmalloc-64 of size 64
[   38.922752] The buggy address is located 0 bytes to the right of
[   38.922752]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.923690] 
[   38.924204] The buggy address belongs to the physical page:
[   38.924438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.925026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.925502] page_type: f5(slab)
[   38.925853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.926045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.926206] page dumped because: kasan: bad access detected
[   38.926319] 
[   38.926860] Memory state around the buggy address:
[   38.927440]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.927917]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.928479] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.929042]                                      ^
[   38.929655]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929831]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929972] ==================================================================
[   39.229611] ==================================================================
[   39.230010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   39.230398] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.230803] 
[   39.230963] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.231353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.231439] Hardware name: linux,dummy-virt (DT)
[   39.231546] Call trace:
[   39.231619]  show_stack+0x20/0x38 (C)
[   39.231850]  dump_stack_lvl+0x8c/0xd0
[   39.232129]  print_report+0x118/0x5f0
[   39.232482]  kasan_report+0xc8/0x118
[   39.233296]  kasan_check_range+0x100/0x1a8
[   39.233561]  __kasan_check_write+0x20/0x30
[   39.233829]  kasan_atomics_helper+0x147c/0x4858
[   39.234007]  kasan_atomics+0x198/0x2e8
[   39.234188]  kunit_try_run_case+0x14c/0x3d0
[   39.234353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.234576]  kthread+0x318/0x618
[   39.234730]  ret_from_fork+0x10/0x20
[   39.236251] 
[   39.236356] Allocated by task 267:
[   39.236990]  kasan_save_stack+0x3c/0x68
[   39.237555]  kasan_save_track+0x20/0x40
[   39.237690]  kasan_save_alloc_info+0x40/0x58
[   39.238044]  __kasan_kmalloc+0xd4/0xd8
[   39.238344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.239296]  kasan_atomics+0xb8/0x2e8
[   39.239675]  kunit_try_run_case+0x14c/0x3d0
[   39.239848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.240073]  kthread+0x318/0x618
[   39.240205]  ret_from_fork+0x10/0x20
[   39.240327] 
[   39.240674] The buggy address belongs to the object at fff00000c5dafc80
[   39.240674]  which belongs to the cache kmalloc-64 of size 64
[   39.240901] The buggy address is located 0 bytes to the right of
[   39.240901]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.241162] 
[   39.241250] The buggy address belongs to the physical page:
[   39.241429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.241701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.241941] page_type: f5(slab)
[   39.242069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.242238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.242390] page dumped because: kasan: bad access detected
[   39.242542] 
[   39.242610] Memory state around the buggy address:
[   39.242722]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.242877]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.243113] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.243248]                                      ^
[   39.243369]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.243522]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.243754] ==================================================================
[   39.041858] ==================================================================
[   39.042015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   39.042193] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.044822] 
[   39.044931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.045929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.046233] Hardware name: linux,dummy-virt (DT)
[   39.046342] Call trace:
[   39.046919]  show_stack+0x20/0x38 (C)
[   39.048017]  dump_stack_lvl+0x8c/0xd0
[   39.048665]  print_report+0x118/0x5f0
[   39.048825]  kasan_report+0xc8/0x118
[   39.048970]  kasan_check_range+0x100/0x1a8
[   39.049566]  __kasan_check_write+0x20/0x30
[   39.050165]  kasan_atomics_helper+0xff0/0x4858
[   39.050347]  kasan_atomics+0x198/0x2e8
[   39.051068]  kunit_try_run_case+0x14c/0x3d0
[   39.051245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.051433]  kthread+0x318/0x618
[   39.051581]  ret_from_fork+0x10/0x20
[   39.051740] 
[   39.052391] Allocated by task 267:
[   39.052678]  kasan_save_stack+0x3c/0x68
[   39.052936]  kasan_save_track+0x20/0x40
[   39.053547]  kasan_save_alloc_info+0x40/0x58
[   39.054103]  __kasan_kmalloc+0xd4/0xd8
[   39.054244]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.054389]  kasan_atomics+0xb8/0x2e8
[   39.054557]  kunit_try_run_case+0x14c/0x3d0
[   39.055586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.056244]  kthread+0x318/0x618
[   39.056550]  ret_from_fork+0x10/0x20
[   39.056953] 
[   39.057211] The buggy address belongs to the object at fff00000c5dafc80
[   39.057211]  which belongs to the cache kmalloc-64 of size 64
[   39.057826] The buggy address is located 0 bytes to the right of
[   39.057826]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.058069] 
[   39.058384] The buggy address belongs to the physical page:
[   39.058669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.058990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.059513] page_type: f5(slab)
[   39.059644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.060462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.060619] page dumped because: kasan: bad access detected
[   39.060756] 
[   39.060870] Memory state around the buggy address:
[   39.060989]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.061176]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.061361] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.061502]                                      ^
[   39.061619]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.061771]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.061910] ==================================================================
[   38.903471] ==================================================================
[   38.903701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   38.903941] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.904137] 
[   38.904243] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.904588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.904720] Hardware name: linux,dummy-virt (DT)
[   38.904828] Call trace:
[   38.904905]  show_stack+0x20/0x38 (C)
[   38.905095]  dump_stack_lvl+0x8c/0xd0
[   38.905434]  print_report+0x118/0x5f0
[   38.905698]  kasan_report+0xc8/0x118
[   38.905938]  __asan_report_load4_noabort+0x20/0x30
[   38.906136]  kasan_atomics_helper+0x3e04/0x4858
[   38.906303]  kasan_atomics+0x198/0x2e8
[   38.906458]  kunit_try_run_case+0x14c/0x3d0
[   38.906636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.906855]  kthread+0x318/0x618
[   38.907046]  ret_from_fork+0x10/0x20
[   38.907229] 
[   38.907297] Allocated by task 267:
[   38.907407]  kasan_save_stack+0x3c/0x68
[   38.907597]  kasan_save_track+0x20/0x40
[   38.907718]  kasan_save_alloc_info+0x40/0x58
[   38.907886]  __kasan_kmalloc+0xd4/0xd8
[   38.908091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.908244]  kasan_atomics+0xb8/0x2e8
[   38.908415]  kunit_try_run_case+0x14c/0x3d0
[   38.908541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.908723]  kthread+0x318/0x618
[   38.908860]  ret_from_fork+0x10/0x20
[   38.909009] 
[   38.909144] The buggy address belongs to the object at fff00000c5dafc80
[   38.909144]  which belongs to the cache kmalloc-64 of size 64
[   38.909352] The buggy address is located 0 bytes to the right of
[   38.909352]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.909574] 
[   38.909650] The buggy address belongs to the physical page:
[   38.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.910163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.910281] page_type: f5(slab)
[   38.910351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.910508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.910653] page dumped because: kasan: bad access detected
[   38.910760] 
[   38.910826] Memory state around the buggy address:
[   38.910992]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.911166]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.911352] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.911571]                                      ^
[   38.911699]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.911852]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.911993] ==================================================================
[   38.850904] ==================================================================
[   38.851075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   38.851420] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.852608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.852917]  show_stack+0x20/0x38 (C)
[   38.853851]  kasan_atomics_helper+0x3de4/0x4858
[   38.855564]  kasan_save_stack+0x3c/0x68
[   38.856416]  kunit_try_run_case+0x14c/0x3d0
[   38.858562] The buggy address is located 0 bytes to the right of
[   38.858562]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.860215] page dumped because: kasan: bad access detected
[   38.860546]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.861888]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.863413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   38.864219] Hardware name: linux,dummy-virt (DT)
[   38.870524]  kasan_save_alloc_info+0x40/0x58
[   38.872417] The buggy address is located 0 bytes to the right of
[   38.872417]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.873766] page dumped because: kasan: bad access detected
[   38.873888] 
[   38.874004] Memory state around the buggy address:
[   38.874166]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.874552]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.874795] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.875018]                                      ^
[   38.875221]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.875466]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.875673] ==================================================================
[   39.245848] ==================================================================
[   39.246001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   39.246174] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.246338] 
[   39.246433] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.246719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.246811] Hardware name: linux,dummy-virt (DT)
[   39.246922] Call trace:
[   39.247007]  show_stack+0x20/0x38 (C)
[   39.247187]  dump_stack_lvl+0x8c/0xd0
[   39.247335]  print_report+0x118/0x5f0
[   39.247491]  kasan_report+0xc8/0x118
[   39.247656]  kasan_check_range+0x100/0x1a8
[   39.247804]  __kasan_check_write+0x20/0x30
[   39.248026]  kasan_atomics_helper+0x14e4/0x4858
[   39.248233]  kasan_atomics+0x198/0x2e8
[   39.248618]  kunit_try_run_case+0x14c/0x3d0
[   39.249531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.249800]  kthread+0x318/0x618
[   39.249992]  ret_from_fork+0x10/0x20
[   39.250182] 
[   39.250314] Allocated by task 267:
[   39.250508]  kasan_save_stack+0x3c/0x68
[   39.250692]  kasan_save_track+0x20/0x40
[   39.250838]  kasan_save_alloc_info+0x40/0x58
[   39.251086]  __kasan_kmalloc+0xd4/0xd8
[   39.251288]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.251482]  kasan_atomics+0xb8/0x2e8
[   39.251612]  kunit_try_run_case+0x14c/0x3d0
[   39.251792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.252029]  kthread+0x318/0x618
[   39.252259]  ret_from_fork+0x10/0x20
[   39.252657] 
[   39.252740] The buggy address belongs to the object at fff00000c5dafc80
[   39.252740]  which belongs to the cache kmalloc-64 of size 64
[   39.252931] The buggy address is located 0 bytes to the right of
[   39.252931]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.253987] 
[   39.254083] The buggy address belongs to the physical page:
[   39.254185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.254335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.254474] page_type: f5(slab)
[   39.254579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.254716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.254853] page dumped because: kasan: bad access detected
[   39.254965] 
[   39.255021] Memory state around the buggy address:
[   39.255146]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.255275]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.255418] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.255538]                                      ^
[   39.255642]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.255781]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.255904] ==================================================================
[   39.011336] ==================================================================
[   39.011575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   39.011818] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.012526] 
[   39.012679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.013044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.013160] Hardware name: linux,dummy-virt (DT)
[   39.013323] Call trace:
[   39.013398]  show_stack+0x20/0x38 (C)
[   39.013608]  dump_stack_lvl+0x8c/0xd0
[   39.013760]  print_report+0x118/0x5f0
[   39.014009]  kasan_report+0xc8/0x118
[   39.014185]  kasan_check_range+0x100/0x1a8
[   39.014647]  __kasan_check_write+0x20/0x30
[   39.015232]  kasan_atomics_helper+0xf20/0x4858
[   39.015511]  kasan_atomics+0x198/0x2e8
[   39.015771]  kunit_try_run_case+0x14c/0x3d0
[   39.015978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.016302]  kthread+0x318/0x618
[   39.016466]  ret_from_fork+0x10/0x20
[   39.016677] 
[   39.016789] Allocated by task 267:
[   39.016889]  kasan_save_stack+0x3c/0x68
[   39.017022]  kasan_save_track+0x20/0x40
[   39.017159]  kasan_save_alloc_info+0x40/0x58
[   39.017281]  __kasan_kmalloc+0xd4/0xd8
[   39.017774]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.017947]  kasan_atomics+0xb8/0x2e8
[   39.018518]  kunit_try_run_case+0x14c/0x3d0
[   39.018853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.019113]  kthread+0x318/0x618
[   39.019250]  ret_from_fork+0x10/0x20
[   39.019422] 
[   39.019492] The buggy address belongs to the object at fff00000c5dafc80
[   39.019492]  which belongs to the cache kmalloc-64 of size 64
[   39.019834] The buggy address is located 0 bytes to the right of
[   39.019834]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.020240] 
[   39.020366] The buggy address belongs to the physical page:
[   39.020484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.020652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.020810] page_type: f5(slab)
[   39.020924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.021118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.021265] page dumped because: kasan: bad access detected
[   39.021379] 
[   39.021445] Memory state around the buggy address:
[   39.021583]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.021769]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.021932] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.022127]                                      ^
[   39.022239]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.022705]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.023070] ==================================================================
[   39.112194] ==================================================================
[   39.112349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   39.113446] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.114342] 
[   39.114449] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.114744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.114836] Hardware name: linux,dummy-virt (DT)
[   39.114957] Call trace:
[   39.116313]  show_stack+0x20/0x38 (C)
[   39.117294]  dump_stack_lvl+0x8c/0xd0
[   39.117755]  print_report+0x118/0x5f0
[   39.118449]  kasan_report+0xc8/0x118
[   39.118935]  kasan_check_range+0x100/0x1a8
[   39.119297]  __kasan_check_write+0x20/0x30
[   39.119452]  kasan_atomics_helper+0x1190/0x4858
[   39.119682]  kasan_atomics+0x198/0x2e8
[   39.119858]  kunit_try_run_case+0x14c/0x3d0
[   39.120023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.120436]  kthread+0x318/0x618
[   39.120639]  ret_from_fork+0x10/0x20
[   39.120941] 
[   39.121021] Allocated by task 267:
[   39.121437]  kasan_save_stack+0x3c/0x68
[   39.121584]  kasan_save_track+0x20/0x40
[   39.121703]  kasan_save_alloc_info+0x40/0x58
[   39.122219]  __kasan_kmalloc+0xd4/0xd8
[   39.122627]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.122787]  kasan_atomics+0xb8/0x2e8
[   39.122914]  kunit_try_run_case+0x14c/0x3d0
[   39.123085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.123380]  kthread+0x318/0x618
[   39.123545]  ret_from_fork+0x10/0x20
[   39.123969] 
[   39.124626] The buggy address belongs to the object at fff00000c5dafc80
[   39.124626]  which belongs to the cache kmalloc-64 of size 64
[   39.125126] The buggy address is located 0 bytes to the right of
[   39.125126]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.126098] 
[   39.126220] The buggy address belongs to the physical page:
[   39.126339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.126532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.126703] page_type: f5(slab)
[   39.126826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.127020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.127339] page dumped because: kasan: bad access detected
[   39.127681] 
[   39.127772] Memory state around the buggy address:
[   39.127889]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.128041]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.128204] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.128439]                                      ^
[   39.128565]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.128925]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.129153] ==================================================================
[   39.198133] ==================================================================
[   39.198572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   39.199013] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.199480] 
[   39.199598] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.200030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.200144] Hardware name: linux,dummy-virt (DT)
[   39.200261] Call trace:
[   39.200335]  show_stack+0x20/0x38 (C)
[   39.200511]  dump_stack_lvl+0x8c/0xd0
[   39.200660]  print_report+0x118/0x5f0
[   39.200817]  kasan_report+0xc8/0x118
[   39.200965]  __asan_report_load8_noabort+0x20/0x30
[   39.201150]  kasan_atomics_helper+0x3f04/0x4858
[   39.201325]  kasan_atomics+0x198/0x2e8
[   39.201487]  kunit_try_run_case+0x14c/0x3d0
[   39.203432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.203644]  kthread+0x318/0x618
[   39.203806]  ret_from_fork+0x10/0x20
[   39.204216] 
[   39.204332] Allocated by task 267:
[   39.204458]  kasan_save_stack+0x3c/0x68
[   39.204590]  kasan_save_track+0x20/0x40
[   39.204770]  kasan_save_alloc_info+0x40/0x58
[   39.204987]  __kasan_kmalloc+0xd4/0xd8
[   39.205488]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.206412]  kasan_atomics+0xb8/0x2e8
[   39.206548]  kunit_try_run_case+0x14c/0x3d0
[   39.206679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.207186]  kthread+0x318/0x618
[   39.207403]  ret_from_fork+0x10/0x20
[   39.207586] 
[   39.207687] The buggy address belongs to the object at fff00000c5dafc80
[   39.207687]  which belongs to the cache kmalloc-64 of size 64
[   39.207968] The buggy address is located 0 bytes to the right of
[   39.207968]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.208683] 
[   39.208795] The buggy address belongs to the physical page:
[   39.208997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.209198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.211411] page_type: f5(slab)
[   39.211541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.211714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.211865] page dumped because: kasan: bad access detected
[   39.211979] 
[   39.212045] Memory state around the buggy address:
[   39.213163]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.213310]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.213444] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.213585]                                      ^
[   39.213693]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.213824]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.213944] ==================================================================
[   39.025638] ==================================================================
[   39.025725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   39.025809] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.025895] 
[   39.025944] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.026137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.026233] Hardware name: linux,dummy-virt (DT)
[   39.026383] Call trace:
[   39.026476]  show_stack+0x20/0x38 (C)
[   39.026629]  dump_stack_lvl+0x8c/0xd0
[   39.026780]  print_report+0x118/0x5f0
[   39.026943]  kasan_report+0xc8/0x118
[   39.027109]  kasan_check_range+0x100/0x1a8
[   39.027279]  __kasan_check_write+0x20/0x30
[   39.027433]  kasan_atomics_helper+0xf88/0x4858
[   39.027720]  kasan_atomics+0x198/0x2e8
[   39.028209]  kunit_try_run_case+0x14c/0x3d0
[   39.028433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.028797]  kthread+0x318/0x618
[   39.029410]  ret_from_fork+0x10/0x20
[   39.029667] 
[   39.029922] Allocated by task 267:
[   39.030699]  kasan_save_stack+0x3c/0x68
[   39.030978]  kasan_save_track+0x20/0x40
[   39.031140]  kasan_save_alloc_info+0x40/0x58
[   39.031308]  __kasan_kmalloc+0xd4/0xd8
[   39.031511]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.031745]  kasan_atomics+0xb8/0x2e8
[   39.031954]  kunit_try_run_case+0x14c/0x3d0
[   39.032142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.032285]  kthread+0x318/0x618
[   39.032913]  ret_from_fork+0x10/0x20
[   39.033142] 
[   39.033260] The buggy address belongs to the object at fff00000c5dafc80
[   39.033260]  which belongs to the cache kmalloc-64 of size 64
[   39.033493] The buggy address is located 0 bytes to the right of
[   39.033493]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.033750] 
[   39.033822] The buggy address belongs to the physical page:
[   39.033950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.034158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.034332] page_type: f5(slab)
[   39.034448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.034609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.034753] page dumped because: kasan: bad access detected
[   39.034871] 
[   39.035014] Memory state around the buggy address:
[   39.035389]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.036241]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.037074] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.037295]                                      ^
[   39.037422]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.037566]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.039207] ==================================================================
[   39.412250] ==================================================================
[   39.412512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   39.413015] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.413295] 
[   39.413700] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.414225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.414839] Hardware name: linux,dummy-virt (DT)
[   39.415180] Call trace:
[   39.415366]  show_stack+0x20/0x38 (C)
[   39.415534]  dump_stack_lvl+0x8c/0xd0
[   39.415677]  print_report+0x118/0x5f0
[   39.415827]  kasan_report+0xc8/0x118
[   39.415977]  kasan_check_range+0x100/0x1a8
[   39.416845]  __kasan_check_write+0x20/0x30
[   39.417257]  kasan_atomics_helper+0x17ec/0x4858
[   39.417418]  kasan_atomics+0x198/0x2e8
[   39.417551]  kunit_try_run_case+0x14c/0x3d0
[   39.417692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.417855]  kthread+0x318/0x618
[   39.418135]  ret_from_fork+0x10/0x20
[   39.418316] 
[   39.418387] Allocated by task 267:
[   39.418489]  kasan_save_stack+0x3c/0x68
[   39.418620]  kasan_save_track+0x20/0x40
[   39.422164]  kasan_save_alloc_info+0x40/0x58
[   39.422318]  __kasan_kmalloc+0xd4/0xd8
[   39.422440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.422571]  kasan_atomics+0xb8/0x2e8
[   39.424036]  kunit_try_run_case+0x14c/0x3d0
[   39.424307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.425048]  kthread+0x318/0x618
[   39.425805]  ret_from_fork+0x10/0x20
[   39.425933] 
[   39.426001] The buggy address belongs to the object at fff00000c5dafc80
[   39.426001]  which belongs to the cache kmalloc-64 of size 64
[   39.428490] The buggy address is located 0 bytes to the right of
[   39.428490]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.431044] 
[   39.431142] The buggy address belongs to the physical page:
[   39.431251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.431417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.431578] page_type: f5(slab)
[   39.434081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.434501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.434677] page dumped because: kasan: bad access detected
[   39.434790] 
[   39.434863] Memory state around the buggy address:
[   39.434983]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.436230]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.436557] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.436994]                                      ^
[   39.437201]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.437651]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.438118] ==================================================================
[   38.876110] ==================================================================
[   38.876249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   38.876416] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.876585] 
[   38.876680] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.876956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.877136] Hardware name: linux,dummy-virt (DT)
[   38.877253] Call trace:
[   38.877335]  show_stack+0x20/0x38 (C)
[   38.877496]  dump_stack_lvl+0x8c/0xd0
[   38.877646]  print_report+0x118/0x5f0
[   38.878313]  kasan_report+0xc8/0x118
[   38.878486]  __asan_report_load4_noabort+0x20/0x30
[   38.878669]  kasan_atomics_helper+0x3dd8/0x4858
[   38.878861]  kasan_atomics+0x198/0x2e8
[   38.879152]  kunit_try_run_case+0x14c/0x3d0
[   38.879419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.879628]  kthread+0x318/0x618
[   38.879841]  ret_from_fork+0x10/0x20
[   38.880001] 
[   38.880088] Allocated by task 267:
[   38.880182]  kasan_save_stack+0x3c/0x68
[   38.880308]  kasan_save_track+0x20/0x40
[   38.880433]  kasan_save_alloc_info+0x40/0x58
[   38.880565]  __kasan_kmalloc+0xd4/0xd8
[   38.880690]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.880834]  kasan_atomics+0xb8/0x2e8
[   38.880984]  kunit_try_run_case+0x14c/0x3d0
[   38.881139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.881292]  kthread+0x318/0x618
[   38.881413]  ret_from_fork+0x10/0x20
[   38.881535] 
[   38.881618] The buggy address belongs to the object at fff00000c5dafc80
[   38.881618]  which belongs to the cache kmalloc-64 of size 64
[   38.881956] The buggy address is located 0 bytes to the right of
[   38.881956]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.882253] 
[   38.882329] The buggy address belongs to the physical page:
[   38.882426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.882613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.882768] page_type: f5(slab)
[   38.882861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.883013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.883153] page dumped because: kasan: bad access detected
[   38.883249] 
[   38.883478] Memory state around the buggy address:
[   38.883594]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.884888]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.885047] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.885204]                                      ^
[   38.885316]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.885459]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.885579] ==================================================================
[   39.256689] ==================================================================
[   39.256833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   39.256983] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.257189] 
[   39.257298] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.257674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.257811] Hardware name: linux,dummy-virt (DT)
[   39.257958] Call trace:
[   39.258084]  show_stack+0x20/0x38 (C)
[   39.258243]  dump_stack_lvl+0x8c/0xd0
[   39.258431]  print_report+0x118/0x5f0
[   39.258694]  kasan_report+0xc8/0x118
[   39.258918]  kasan_check_range+0x100/0x1a8
[   39.259097]  __kasan_check_write+0x20/0x30
[   39.259262]  kasan_atomics_helper+0x154c/0x4858
[   39.259433]  kasan_atomics+0x198/0x2e8
[   39.259588]  kunit_try_run_case+0x14c/0x3d0
[   39.259746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.259933]  kthread+0x318/0x618
[   39.260576]  ret_from_fork+0x10/0x20
[   39.261007] 
[   39.261206] Allocated by task 267:
[   39.261375]  kasan_save_stack+0x3c/0x68
[   39.261576]  kasan_save_track+0x20/0x40
[   39.261691]  kasan_save_alloc_info+0x40/0x58
[   39.261852]  __kasan_kmalloc+0xd4/0xd8
[   39.261973]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.262135]  kasan_atomics+0xb8/0x2e8
[   39.262267]  kunit_try_run_case+0x14c/0x3d0
[   39.262676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.262949]  kthread+0x318/0x618
[   39.263187]  ret_from_fork+0x10/0x20
[   39.263396] 
[   39.263517] The buggy address belongs to the object at fff00000c5dafc80
[   39.263517]  which belongs to the cache kmalloc-64 of size 64
[   39.263786] The buggy address is located 0 bytes to the right of
[   39.263786]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.264133] 
[   39.264208] The buggy address belongs to the physical page:
[   39.264313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.264964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.265146] page_type: f5(slab)
[   39.265261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.265414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.265556] page dumped because: kasan: bad access detected
[   39.265662] 
[   39.265726] Memory state around the buggy address:
[   39.265832]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.266680]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.266856] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.266995]                                      ^
[   39.267162]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.267316]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.267662] ==================================================================
[   38.993563] ==================================================================
[   38.994151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   38.994839] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.995316] 
[   38.995435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.995725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.995814] Hardware name: linux,dummy-virt (DT)
[   38.995921] Call trace:
[   38.995996]  show_stack+0x20/0x38 (C)
[   38.997257]  dump_stack_lvl+0x8c/0xd0
[   38.997616]  print_report+0x118/0x5f0
[   38.997793]  kasan_report+0xc8/0x118
[   38.997938]  kasan_check_range+0x100/0x1a8
[   38.998942]  __kasan_check_write+0x20/0x30
[   38.999473]  kasan_atomics_helper+0xeb8/0x4858
[   38.999665]  kasan_atomics+0x198/0x2e8
[   38.999850]  kunit_try_run_case+0x14c/0x3d0
[   39.000021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.000233]  kthread+0x318/0x618
[   39.001303]  ret_from_fork+0x10/0x20
[   39.001534] 
[   39.002352] Allocated by task 267:
[   39.002498]  kasan_save_stack+0x3c/0x68
[   39.002969]  kasan_save_track+0x20/0x40
[   39.003147]  kasan_save_alloc_info+0x40/0x58
[   39.003316]  __kasan_kmalloc+0xd4/0xd8
[   39.003443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.003939]  kasan_atomics+0xb8/0x2e8
[   39.004158]  kunit_try_run_case+0x14c/0x3d0
[   39.004321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.004894]  kthread+0x318/0x618
[   39.005035]  ret_from_fork+0x10/0x20
[   39.005179] 
[   39.005244] The buggy address belongs to the object at fff00000c5dafc80
[   39.005244]  which belongs to the cache kmalloc-64 of size 64
[   39.005473] The buggy address is located 0 bytes to the right of
[   39.005473]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.005694] 
[   39.006129] The buggy address belongs to the physical page:
[   39.006618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.007033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.007233] page_type: f5(slab)
[   39.007393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.007638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.007784] page dumped because: kasan: bad access detected
[   39.007940] 
[   39.008077] Memory state around the buggy address:
[   39.008260]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.008476]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.008656] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.008799]                                      ^
[   39.008938]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.009109]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.009234] ==================================================================
[   39.370310] ==================================================================
[   39.370834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   39.371317] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.371663] 
[   39.372068] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.372356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.372460] Hardware name: linux,dummy-virt (DT)
[   39.372568] Call trace:
[   39.372842]  show_stack+0x20/0x38 (C)
[   39.373728]  dump_stack_lvl+0x8c/0xd0
[   39.373920]  print_report+0x118/0x5f0
[   39.374095]  kasan_report+0xc8/0x118
[   39.374721]  kasan_check_range+0x100/0x1a8
[   39.375627]  __kasan_check_write+0x20/0x30
[   39.376169]  kasan_atomics_helper+0x175c/0x4858
[   39.377098]  kasan_atomics+0x198/0x2e8
[   39.377750]  kunit_try_run_case+0x14c/0x3d0
[   39.377941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.378478]  kthread+0x318/0x618
[   39.378671]  ret_from_fork+0x10/0x20
[   39.378833] 
[   39.378901] Allocated by task 267:
[   39.379008]  kasan_save_stack+0x3c/0x68
[   39.379153]  kasan_save_track+0x20/0x40
[   39.379276]  kasan_save_alloc_info+0x40/0x58
[   39.379412]  __kasan_kmalloc+0xd4/0xd8
[   39.380339]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.381084]  kasan_atomics+0xb8/0x2e8
[   39.381404]  kunit_try_run_case+0x14c/0x3d0
[   39.381718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.382321]  kthread+0x318/0x618
[   39.382887]  ret_from_fork+0x10/0x20
[   39.383041] 
[   39.383567] The buggy address belongs to the object at fff00000c5dafc80
[   39.383567]  which belongs to the cache kmalloc-64 of size 64
[   39.384186] The buggy address is located 0 bytes to the right of
[   39.384186]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.384733] 
[   39.384815] The buggy address belongs to the physical page:
[   39.385342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.386178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.386538] page_type: f5(slab)
[   39.386692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.386854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.387005] page dumped because: kasan: bad access detected
[   39.387964] 
[   39.388410] Memory state around the buggy address:
[   39.388599]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.389152]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.389792] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.390417]                                      ^
[   39.390689]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.390841]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.390985] ==================================================================
[   38.741789] ==================================================================
[   38.741940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   38.742181] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.742465] 
[   38.742574] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.742844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.742952] Hardware name: linux,dummy-virt (DT)
[   38.743081] Call trace:
[   38.743163]  show_stack+0x20/0x38 (C)
[   38.743468]  dump_stack_lvl+0x8c/0xd0
[   38.743643]  print_report+0x118/0x5f0
[   38.743813]  kasan_report+0xc8/0x118
[   38.744087]  kasan_check_range+0x100/0x1a8
[   38.744342]  __kasan_check_write+0x20/0x30
[   38.744549]  kasan_atomics_helper+0xa04/0x4858
[   38.744814]  kasan_atomics+0x198/0x2e8
[   38.744973]  kunit_try_run_case+0x14c/0x3d0
[   38.745487]  kthread+0x318/0x618
[   38.747630]  ret_from_fork+0x10/0x20
[   38.748273] 
[   38.748451] The buggy address belongs to the physical page:
[   38.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.748757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.749010] page_type: f5(slab)
[   38.749154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.749328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.749462] page dumped because: kasan: bad access detected
[   38.749612] 
[   38.749738] Memory state around the buggy address:
[   38.749857]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.750013]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.750186] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.750324]                                      ^
[   38.750508]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.750746]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.750976] ==================================================================
[   39.393495] ==================================================================
[   39.393675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   39.394010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.394264] 
[   39.394369] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.394676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.394774] Hardware name: linux,dummy-virt (DT)
[   39.394880] Call trace:
[   39.394968]  show_stack+0x20/0x38 (C)
[   39.396283]  dump_stack_lvl+0x8c/0xd0
[   39.396858]  print_report+0x118/0x5f0
[   39.397029]  kasan_report+0xc8/0x118
[   39.397365]  __asan_report_load8_noabort+0x20/0x30
[   39.397625]  kasan_atomics_helper+0x3e20/0x4858
[   39.397868]  kasan_atomics+0x198/0x2e8
[   39.398015]  kunit_try_run_case+0x14c/0x3d0
[   39.398630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.398836]  kthread+0x318/0x618
[   39.399433]  ret_from_fork+0x10/0x20
[   39.399642] 
[   39.399711] Allocated by task 267:
[   39.399812]  kasan_save_stack+0x3c/0x68
[   39.399935]  kasan_save_track+0x20/0x40
[   39.400079]  kasan_save_alloc_info+0x40/0x58
[   39.401086]  __kasan_kmalloc+0xd4/0xd8
[   39.401581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.401758]  kasan_atomics+0xb8/0x2e8
[   39.401898]  kunit_try_run_case+0x14c/0x3d0
[   39.402035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.402214]  kthread+0x318/0x618
[   39.402516]  ret_from_fork+0x10/0x20
[   39.403463] 
[   39.403900] The buggy address belongs to the object at fff00000c5dafc80
[   39.403900]  which belongs to the cache kmalloc-64 of size 64
[   39.404386] The buggy address is located 0 bytes to the right of
[   39.404386]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.405133] 
[   39.405210] The buggy address belongs to the physical page:
[   39.405317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.406035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.406783] page_type: f5(slab)
[   39.406934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.407626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.408174] page dumped because: kasan: bad access detected
[   39.408296] 
[   39.408369] Memory state around the buggy address:
[   39.408481]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.408776]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.409481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.409815]                                      ^
[   39.410182]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.410402]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.410533] ==================================================================
[   39.214502] ==================================================================
[   39.214727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   39.214985] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.215270] 
[   39.215432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.215818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.215916] Hardware name: linux,dummy-virt (DT)
[   39.216021] Call trace:
[   39.216410]  show_stack+0x20/0x38 (C)
[   39.216659]  dump_stack_lvl+0x8c/0xd0
[   39.218253]  print_report+0x118/0x5f0
[   39.218389]  kasan_report+0xc8/0x118
[   39.218526]  kasan_check_range+0x100/0x1a8
[   39.218676]  __kasan_check_write+0x20/0x30
[   39.218810]  kasan_atomics_helper+0x1414/0x4858
[   39.219890]  kasan_atomics+0x198/0x2e8
[   39.220187]  kunit_try_run_case+0x14c/0x3d0
[   39.220397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.220945]  kthread+0x318/0x618
[   39.221267]  ret_from_fork+0x10/0x20
[   39.221540] 
[   39.221623] Allocated by task 267:
[   39.221780]  kasan_save_stack+0x3c/0x68
[   39.221934]  kasan_save_track+0x20/0x40
[   39.222046]  kasan_save_alloc_info+0x40/0x58
[   39.222239]  __kasan_kmalloc+0xd4/0xd8
[   39.222398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.222989]  kasan_atomics+0xb8/0x2e8
[   39.223165]  kunit_try_run_case+0x14c/0x3d0
[   39.223358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.223804]  kthread+0x318/0x618
[   39.224102]  ret_from_fork+0x10/0x20
[   39.224248] 
[   39.224398] The buggy address belongs to the object at fff00000c5dafc80
[   39.224398]  which belongs to the cache kmalloc-64 of size 64
[   39.224651] The buggy address is located 0 bytes to the right of
[   39.224651]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.224954] 
[   39.225026] The buggy address belongs to the physical page:
[   39.225152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.225319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.225498] page_type: f5(slab)
[   39.225937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.226233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.226482] page dumped because: kasan: bad access detected
[   39.226645] 
[   39.226708] Memory state around the buggy address:
[   39.226815]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.227118]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.227278] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.227493]                                      ^
[   39.227986]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.228179]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.228315] ==================================================================
[   38.695124] ==================================================================
[   38.695262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   38.695417] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.695584] 
[   38.695685] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.695959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.696077] Hardware name: linux,dummy-virt (DT)
[   38.696178] Call trace:
[   38.696248]  show_stack+0x20/0x38 (C)
[   38.696989]  dump_stack_lvl+0x8c/0xd0
[   38.697219]  print_report+0x118/0x5f0
[   38.697538]  kasan_report+0xc8/0x118
[   38.698029]  __asan_report_load4_noabort+0x20/0x30
[   38.698258]  kasan_atomics_helper+0x42d8/0x4858
[   38.698429]  kasan_atomics+0x198/0x2e8
[   38.698625]  kunit_try_run_case+0x14c/0x3d0
[   38.698890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.699281]  kthread+0x318/0x618
[   38.699978]  ret_from_fork+0x10/0x20
[   38.700237] 
[   38.700306] Allocated by task 267:
[   38.700414]  kasan_save_stack+0x3c/0x68
[   38.700547]  kasan_save_track+0x20/0x40
[   38.700668]  kasan_save_alloc_info+0x40/0x58
[   38.701871]  __kasan_kmalloc+0xd4/0xd8
[   38.701977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.702074]  kasan_atomics+0xb8/0x2e8
[   38.702178]  kunit_try_run_case+0x14c/0x3d0
[   38.702250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.702388]  kthread+0x318/0x618
[   38.702520]  ret_from_fork+0x10/0x20
[   38.702637] 
[   38.702699] The buggy address belongs to the object at fff00000c5dafc80
[   38.702699]  which belongs to the cache kmalloc-64 of size 64
[   38.702942] The buggy address is located 0 bytes to the right of
[   38.702942]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.703304] 
[   38.703515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.703711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.704075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.705150] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.705556]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.709130] 
[   38.709706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.710319]  print_report+0x118/0x5f0
[   38.711422]  kasan_atomics+0x198/0x2e8
[   38.712801] Allocated by task 267:
[   38.713422]  __kasan_kmalloc+0xd4/0xd8
[   38.713541]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.713675]  kasan_atomics+0xb8/0x2e8
[   38.713795]  kunit_try_run_case+0x14c/0x3d0
[   38.713958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.714194]  kthread+0x318/0x618
[   38.714386]  ret_from_fork+0x10/0x20
[   38.715042] 
[   38.715590] The buggy address belongs to the object at fff00000c5dafc80
[   38.715590]  which belongs to the cache kmalloc-64 of size 64
[   38.716674] The buggy address is located 0 bytes to the right of
[   38.716674]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.717555] 
[   38.718166] The buggy address belongs to the physical page:
[   38.718363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.718819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.719044] page_type: f5(slab)
[   38.720303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.720923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.721343] page dumped because: kasan: bad access detected
[   38.721742] 
[   38.722238] Memory state around the buggy address:
[   38.722588]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.723640]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.724223] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.724381]                                      ^
[   38.724622]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.724803]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.725570] ==================================================================
[   39.089657] ==================================================================
[   39.090117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   39.090278] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.090446] 
[   39.090540] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.090826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.090922] Hardware name: linux,dummy-virt (DT)
[   39.091036] Call trace:
[   39.091131]  show_stack+0x20/0x38 (C)
[   39.091279]  dump_stack_lvl+0x8c/0xd0
[   39.091432]  print_report+0x118/0x5f0
[   39.091579]  kasan_report+0xc8/0x118
[   39.091724]  kasan_check_range+0x100/0x1a8
[   39.091873]  __kasan_check_write+0x20/0x30
[   39.092039]  kasan_atomics_helper+0x1128/0x4858
[   39.092234]  kasan_atomics+0x198/0x2e8
[   39.092916]  kunit_try_run_case+0x14c/0x3d0
[   39.093288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.093507]  kthread+0x318/0x618
[   39.094170]  ret_from_fork+0x10/0x20
[   39.094443] 
[   39.094562] Allocated by task 267:
[   39.094664]  kasan_save_stack+0x3c/0x68
[   39.094806]  kasan_save_track+0x20/0x40
[   39.095015]  kasan_save_alloc_info+0x40/0x58
[   39.095338]  __kasan_kmalloc+0xd4/0xd8
[   39.095472]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.095646]  kasan_atomics+0xb8/0x2e8
[   39.095854]  kunit_try_run_case+0x14c/0x3d0
[   39.096274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.097104]  kthread+0x318/0x618
[   39.097260]  ret_from_fork+0x10/0x20
[   39.097391] 
[   39.098347] The buggy address belongs to the object at fff00000c5dafc80
[   39.098347]  which belongs to the cache kmalloc-64 of size 64
[   39.099018] The buggy address is located 0 bytes to the right of
[   39.099018]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.100015] 
[   39.100116] The buggy address belongs to the physical page:
[   39.100228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.101424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.102305] page_type: f5(slab)
[   39.102513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.103684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.104268] page dumped because: kasan: bad access detected
[   39.104697] 
[   39.105541] Memory state around the buggy address:
[   39.106015]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.106235]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.106396] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.107796]                                      ^
[   39.108426]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.109267]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.110156] ==================================================================
[   39.325945] ==================================================================
[   39.326194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   39.326418] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.326585] 
[   39.326679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.326972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.327086] Hardware name: linux,dummy-virt (DT)
[   39.327189] Call trace:
[   39.327259]  show_stack+0x20/0x38 (C)
[   39.327519]  dump_stack_lvl+0x8c/0xd0
[   39.327938]  print_report+0x118/0x5f0
[   39.328130]  kasan_report+0xc8/0x118
[   39.328282]  kasan_check_range+0x100/0x1a8
[   39.328484]  __kasan_check_write+0x20/0x30
[   39.329580]  kasan_atomics_helper+0x16d0/0x4858
[   39.329762]  kasan_atomics+0x198/0x2e8
[   39.330500]  kunit_try_run_case+0x14c/0x3d0
[   39.331076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.331514]  kthread+0x318/0x618
[   39.331700]  ret_from_fork+0x10/0x20
[   39.332799] 
[   39.332966] Allocated by task 267:
[   39.333101]  kasan_save_stack+0x3c/0x68
[   39.333420]  kasan_save_track+0x20/0x40
[   39.333569]  kasan_save_alloc_info+0x40/0x58
[   39.333704]  __kasan_kmalloc+0xd4/0xd8
[   39.333830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.334588]  kasan_atomics+0xb8/0x2e8
[   39.335184]  kunit_try_run_case+0x14c/0x3d0
[   39.335417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.336218]  kthread+0x318/0x618
[   39.336366]  ret_from_fork+0x10/0x20
[   39.336493] 
[   39.336565] The buggy address belongs to the object at fff00000c5dafc80
[   39.336565]  which belongs to the cache kmalloc-64 of size 64
[   39.336765] The buggy address is located 0 bytes to the right of
[   39.336765]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.336989] 
[   39.338659] The buggy address belongs to the physical page:
[   39.339434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.340000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.340930] page_type: f5(slab)
[   39.341075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.341242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.342626] page dumped because: kasan: bad access detected
[   39.342808] 
[   39.342879] Memory state around the buggy address:
[   39.342991]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.344514]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.344861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.346186]                                      ^
[   39.346648]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.346853]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.347890] ==================================================================
[   39.177949] ==================================================================
[   39.178218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   39.178496] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.178650] 
[   39.178741] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.179506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.179741] Hardware name: linux,dummy-virt (DT)
[   39.180588] Call trace:
[   39.180939]  show_stack+0x20/0x38 (C)
[   39.181174]  dump_stack_lvl+0x8c/0xd0
[   39.181663]  print_report+0x118/0x5f0
[   39.181996]  kasan_report+0xc8/0x118
[   39.182194]  kasan_check_range+0x100/0x1a8
[   39.182831]  __kasan_check_write+0x20/0x30
[   39.184133]  kasan_atomics_helper+0x1384/0x4858
[   39.184494]  kasan_atomics+0x198/0x2e8
[   39.184664]  kunit_try_run_case+0x14c/0x3d0
[   39.184830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.185286]  kthread+0x318/0x618
[   39.185778]  ret_from_fork+0x10/0x20
[   39.185944] 
[   39.186013] Allocated by task 267:
[   39.186277]  kasan_save_stack+0x3c/0x68
[   39.186621]  kasan_save_track+0x20/0x40
[   39.187101]  kasan_save_alloc_info+0x40/0x58
[   39.187250]  __kasan_kmalloc+0xd4/0xd8
[   39.187365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.187934]  kasan_atomics+0xb8/0x2e8
[   39.188315]  kunit_try_run_case+0x14c/0x3d0
[   39.189008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.189441]  kthread+0x318/0x618
[   39.189568]  ret_from_fork+0x10/0x20
[   39.189969] 
[   39.190289] The buggy address belongs to the object at fff00000c5dafc80
[   39.190289]  which belongs to the cache kmalloc-64 of size 64
[   39.190624] The buggy address is located 0 bytes to the right of
[   39.190624]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.191344] 
[   39.191594] The buggy address belongs to the physical page:
[   39.192121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.192621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.192927] page_type: f5(slab)
[   39.193459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.193968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.194199] page dumped because: kasan: bad access detected
[   39.194312] 
[   39.195119] Memory state around the buggy address:
[   39.195310]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.195489]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.195642] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.195840]                                      ^
[   39.195963]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.196144]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.196293] ==================================================================
[   39.076925] ==================================================================
[   39.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   39.077547] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.077821] 
[   39.077977] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.078437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.078547] Hardware name: linux,dummy-virt (DT)
[   39.078650] Call trace:
[   39.078746]  show_stack+0x20/0x38 (C)
[   39.078948]  dump_stack_lvl+0x8c/0xd0
[   39.079112]  print_report+0x118/0x5f0
[   39.079253]  kasan_report+0xc8/0x118
[   39.079397]  kasan_check_range+0x100/0x1a8
[   39.079550]  __kasan_check_write+0x20/0x30
[   39.079720]  kasan_atomics_helper+0x10c0/0x4858
[   39.079892]  kasan_atomics+0x198/0x2e8
[   39.080047]  kunit_try_run_case+0x14c/0x3d0
[   39.080907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.081198]  kthread+0x318/0x618
[   39.081362]  ret_from_fork+0x10/0x20
[   39.081519] 
[   39.081588] Allocated by task 267:
[   39.081674]  kasan_save_stack+0x3c/0x68
[   39.081871]  kasan_save_track+0x20/0x40
[   39.082389]  kasan_save_alloc_info+0x40/0x58
[   39.082612]  __kasan_kmalloc+0xd4/0xd8
[   39.082803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.083034]  kasan_atomics+0xb8/0x2e8
[   39.083275]  kunit_try_run_case+0x14c/0x3d0
[   39.083493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.083662]  kthread+0x318/0x618
[   39.083787]  ret_from_fork+0x10/0x20
[   39.083914] 
[   39.083989] The buggy address belongs to the object at fff00000c5dafc80
[   39.083989]  which belongs to the cache kmalloc-64 of size 64
[   39.084196] The buggy address is located 0 bytes to the right of
[   39.084196]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.084478] 
[   39.085011] The buggy address belongs to the physical page:
[   39.085438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.085642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.085866] page_type: f5(slab)
[   39.086086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.086495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.086940] page dumped because: kasan: bad access detected
[   39.087156] 
[   39.087266] Memory state around the buggy address:
[   39.087451]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.087690]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.087929] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.088158]                                      ^
[   39.088342]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.088541]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.088965] ==================================================================
[   39.155389] ==================================================================
[   39.155543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   39.155697] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.155863] 
[   39.155962] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.156268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.156365] Hardware name: linux,dummy-virt (DT)
[   39.159149] Call trace:
[   39.159235]  show_stack+0x20/0x38 (C)
[   39.159395]  dump_stack_lvl+0x8c/0xd0
[   39.159540]  print_report+0x118/0x5f0
[   39.159691]  kasan_report+0xc8/0x118
[   39.159841]  kasan_check_range+0x100/0x1a8
[   39.159988]  __kasan_check_write+0x20/0x30
[   39.160162]  kasan_atomics_helper+0x12d8/0x4858
[   39.160326]  kasan_atomics+0x198/0x2e8
[   39.160484]  kunit_try_run_case+0x14c/0x3d0
[   39.160652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.160827]  kthread+0x318/0x618
[   39.160983]  ret_from_fork+0x10/0x20
[   39.164688] 
[   39.164766] Allocated by task 267:
[   39.165262]  kasan_save_stack+0x3c/0x68
[   39.166081]  kasan_save_track+0x20/0x40
[   39.166228]  kasan_save_alloc_info+0x40/0x58
[   39.166356]  __kasan_kmalloc+0xd4/0xd8
[   39.166482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.166656]  kasan_atomics+0xb8/0x2e8
[   39.166786]  kunit_try_run_case+0x14c/0x3d0
[   39.166915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.167294]  kthread+0x318/0x618
[   39.167735]  ret_from_fork+0x10/0x20
[   39.168246] 
[   39.168560] The buggy address belongs to the object at fff00000c5dafc80
[   39.168560]  which belongs to the cache kmalloc-64 of size 64
[   39.169145] The buggy address is located 0 bytes to the right of
[   39.169145]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.169362] 
[   39.169441] The buggy address belongs to the physical page:
[   39.169651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.170680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.171241] page_type: f5(slab)
[   39.171648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.172563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.173272] page dumped because: kasan: bad access detected
[   39.173735] 
[   39.174110] Memory state around the buggy address:
[   39.174305]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.174624]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.174772] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.174902]                                      ^
[   39.175030]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.175214]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.176476] ==================================================================
[   38.806575] ==================================================================
[   38.807088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   38.808240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.808453] Call trace:
[   38.810316]  __kasan_check_write+0x20/0x30
[   38.813092]  ret_from_fork+0x10/0x20
[   38.815267]  kthread+0x318/0x618
[   38.815535] 
[   38.817087] page_type: f5(slab)
[   38.817208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.817522] page dumped because: kasan: bad access detected
[   38.819488]                                      ^
[   38.822411] 
[   38.822869] Hardware name: linux,dummy-virt (DT)
[   38.826574]  kthread+0x318/0x618
[   38.830355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.830971]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.831553]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.834288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   38.835197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.835678]  dump_stack_lvl+0x8c/0xd0
[   38.836478]  __kasan_check_write+0x20/0x30
[   38.842812]  __kasan_kmalloc+0xd4/0xd8
[   38.844248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.845481] The buggy address is located 0 bytes to the right of
[   38.845481]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.847641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.848262] page dumped because: kasan: bad access detected
[   38.848390] 
[   38.848462] Memory state around the buggy address:
[   38.848569]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.848712]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.848861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.848998]                                      ^
[   38.849138]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.849289]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.850323] ==================================================================
[   39.349606] ==================================================================
[   39.350108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   39.351010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.351443] 
[   39.351558] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.351829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.351924] Hardware name: linux,dummy-virt (DT)
[   39.352036] Call trace:
[   39.352132]  show_stack+0x20/0x38 (C)
[   39.352294]  dump_stack_lvl+0x8c/0xd0
[   39.353530]  print_report+0x118/0x5f0
[   39.353860]  kasan_report+0xc8/0x118
[   39.354318]  __asan_report_load8_noabort+0x20/0x30
[   39.354916]  kasan_atomics_helper+0x3e10/0x4858
[   39.355288]  kasan_atomics+0x198/0x2e8
[   39.355982]  kunit_try_run_case+0x14c/0x3d0
[   39.356510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.357095]  kthread+0x318/0x618
[   39.357534]  ret_from_fork+0x10/0x20
[   39.358018] 
[   39.358110] Allocated by task 267:
[   39.358214]  kasan_save_stack+0x3c/0x68
[   39.358473]  kasan_save_track+0x20/0x40
[   39.359135]  kasan_save_alloc_info+0x40/0x58
[   39.359764]  __kasan_kmalloc+0xd4/0xd8
[   39.360097]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.360250]  kasan_atomics+0xb8/0x2e8
[   39.360436]  kunit_try_run_case+0x14c/0x3d0
[   39.361152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.361638]  kthread+0x318/0x618
[   39.361766]  ret_from_fork+0x10/0x20
[   39.361889] 
[   39.361957] The buggy address belongs to the object at fff00000c5dafc80
[   39.361957]  which belongs to the cache kmalloc-64 of size 64
[   39.362582] The buggy address is located 0 bytes to the right of
[   39.362582]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.363459] 
[   39.363717] The buggy address belongs to the physical page:
[   39.363838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.364376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.364974] page_type: f5(slab)
[   39.365269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.365736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.365874] page dumped because: kasan: bad access detected
[   39.365982] 
[   39.366045] Memory state around the buggy address:
[   39.366179]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.366329]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.366486] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.367244]                                      ^
[   39.367585]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.368400]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.368556] ==================================================================
[   39.142796] ==================================================================
[   39.143000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   39.143177] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.143335] 
[   39.143431] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.143696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.143849] Hardware name: linux,dummy-virt (DT)
[   39.143976] Call trace:
[   39.144075]  show_stack+0x20/0x38 (C)
[   39.144264]  dump_stack_lvl+0x8c/0xd0
[   39.144449]  print_report+0x118/0x5f0
[   39.144658]  kasan_report+0xc8/0x118
[   39.144901]  kasan_check_range+0x100/0x1a8
[   39.145126]  __kasan_check_write+0x20/0x30
[   39.145322]  kasan_atomics_helper+0x126c/0x4858
[   39.145614]  kasan_atomics+0x198/0x2e8
[   39.145862]  kunit_try_run_case+0x14c/0x3d0
[   39.146137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.146433]  kthread+0x318/0x618
[   39.146622]  ret_from_fork+0x10/0x20
[   39.146773] 
[   39.146840] Allocated by task 267:
[   39.146947]  kasan_save_stack+0x3c/0x68
[   39.147138]  kasan_save_track+0x20/0x40
[   39.147293]  kasan_save_alloc_info+0x40/0x58
[   39.147507]  __kasan_kmalloc+0xd4/0xd8
[   39.147641]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.147780]  kasan_atomics+0xb8/0x2e8
[   39.147911]  kunit_try_run_case+0x14c/0x3d0
[   39.148048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.148215]  kthread+0x318/0x618
[   39.148333]  ret_from_fork+0x10/0x20
[   39.148449] 
[   39.148509] The buggy address belongs to the object at fff00000c5dafc80
[   39.148509]  which belongs to the cache kmalloc-64 of size 64
[   39.148684] The buggy address is located 0 bytes to the right of
[   39.148684]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.149026] 
[   39.149126] The buggy address belongs to the physical page:
[   39.150149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.150358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.150517] page_type: f5(slab)
[   39.151527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.152149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.152742] page dumped because: kasan: bad access detected
[   39.152861] 
[   39.152926] Memory state around the buggy address:
[   39.153036]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.153238]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.153387] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.153523]                                      ^
[   39.153638]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.153789]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.153924] ==================================================================
[   39.062870] ==================================================================
[   39.063030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   39.063206] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.063371] 
[   39.063462] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.063746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.063844] Hardware name: linux,dummy-virt (DT)
[   39.063949] Call trace:
[   39.064024]  show_stack+0x20/0x38 (C)
[   39.064877]  dump_stack_lvl+0x8c/0xd0
[   39.065021]  print_report+0x118/0x5f0
[   39.065201]  kasan_report+0xc8/0x118
[   39.065349]  kasan_check_range+0x100/0x1a8
[   39.065507]  __kasan_check_write+0x20/0x30
[   39.065730]  kasan_atomics_helper+0x1058/0x4858
[   39.065945]  kasan_atomics+0x198/0x2e8
[   39.066327]  kunit_try_run_case+0x14c/0x3d0
[   39.066502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.066736]  kthread+0x318/0x618
[   39.067223]  ret_from_fork+0x10/0x20
[   39.067406] 
[   39.067495] Allocated by task 267:
[   39.067745]  kasan_save_stack+0x3c/0x68
[   39.067933]  kasan_save_track+0x20/0x40
[   39.068617]  kasan_save_alloc_info+0x40/0x58
[   39.068768]  __kasan_kmalloc+0xd4/0xd8
[   39.068884]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.069027]  kasan_atomics+0xb8/0x2e8
[   39.069213]  kunit_try_run_case+0x14c/0x3d0
[   39.069574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.070298]  kthread+0x318/0x618
[   39.070989]  ret_from_fork+0x10/0x20
[   39.071233] 
[   39.071309] The buggy address belongs to the object at fff00000c5dafc80
[   39.071309]  which belongs to the cache kmalloc-64 of size 64
[   39.071510] The buggy address is located 0 bytes to the right of
[   39.071510]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.071725] 
[   39.071794] The buggy address belongs to the physical page:
[   39.071905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.072098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.072262] page_type: f5(slab)
[   39.072461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.072616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.073178] page dumped because: kasan: bad access detected
[   39.073639] 
[   39.073864] Memory state around the buggy address:
[   39.073997]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.074167]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.074320] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.074487]                                      ^
[   39.074610]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.075374]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.075908] ==================================================================
[   39.306628] ==================================================================
[   39.306841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   39.307000] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.307191] 
[   39.307762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.308797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.309036] Hardware name: linux,dummy-virt (DT)
[   39.309423] Call trace:
[   39.309572]  show_stack+0x20/0x38 (C)
[   39.309726]  dump_stack_lvl+0x8c/0xd0
[   39.309878]  print_report+0x118/0x5f0
[   39.310025]  kasan_report+0xc8/0x118
[   39.310208]  __asan_report_load8_noabort+0x20/0x30
[   39.310377]  kasan_atomics_helper+0x3df4/0x4858
[   39.310545]  kasan_atomics+0x198/0x2e8
[   39.310705]  kunit_try_run_case+0x14c/0x3d0
[   39.310868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.312270]  kthread+0x318/0x618
[   39.312588]  ret_from_fork+0x10/0x20
[   39.312757] 
[   39.312826] Allocated by task 267:
[   39.312926]  kasan_save_stack+0x3c/0x68
[   39.313159]  kasan_save_track+0x20/0x40
[   39.314140]  kasan_save_alloc_info+0x40/0x58
[   39.314836]  __kasan_kmalloc+0xd4/0xd8
[   39.315014]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.315336]  kasan_atomics+0xb8/0x2e8
[   39.315915]  kunit_try_run_case+0x14c/0x3d0
[   39.316466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.316911]  kthread+0x318/0x618
[   39.317126]  ret_from_fork+0x10/0x20
[   39.317457] 
[   39.317703] The buggy address belongs to the object at fff00000c5dafc80
[   39.317703]  which belongs to the cache kmalloc-64 of size 64
[   39.318557] The buggy address is located 0 bytes to the right of
[   39.318557]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.318880] 
[   39.319506] The buggy address belongs to the physical page:
[   39.319711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.320409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.321003] page_type: f5(slab)
[   39.321276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.321611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.321972] page dumped because: kasan: bad access detected
[   39.322355] 
[   39.322733] Memory state around the buggy address:
[   39.323229]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.324284]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.324544] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.324707]                                      ^
[   39.324854]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.325041]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.325287] ==================================================================
[   38.752819] ==================================================================
[   38.752968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   38.753197] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.753459] 
[   38.753629] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.754089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.754231] Hardware name: linux,dummy-virt (DT)
[   38.754328] Call trace:
[   38.754402]  show_stack+0x20/0x38 (C)
[   38.754554]  dump_stack_lvl+0x8c/0xd0
[   38.754719]  print_report+0x118/0x5f0
[   38.754977]  kasan_report+0xc8/0x118
[   38.755221]  kasan_check_range+0x100/0x1a8
[   38.755394]  __kasan_check_write+0x20/0x30
[   38.755691]  kasan_atomics_helper+0xa6c/0x4858
[   38.755881]  kasan_atomics+0x198/0x2e8
[   38.756046]  kunit_try_run_case+0x14c/0x3d0
[   38.756294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.756543]  kthread+0x318/0x618
[   38.756795]  ret_from_fork+0x10/0x20
[   38.756953] 
[   38.757024] Allocated by task 267:
[   38.757140]  kasan_save_stack+0x3c/0x68
[   38.757309]  kasan_save_track+0x20/0x40
[   38.757444]  kasan_save_alloc_info+0x40/0x58
[   38.757570]  __kasan_kmalloc+0xd4/0xd8
[   38.757686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.757832]  kasan_atomics+0xb8/0x2e8
[   38.758048]  kunit_try_run_case+0x14c/0x3d0
[   38.758742] The buggy address belongs to the object at fff00000c5dafc80
[   38.758742]  which belongs to the cache kmalloc-64 of size 64
[   38.759455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.759626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.759785] page_type: f5(slab)
[   38.759903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.760085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.760817]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.763508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   38.782068] 
[   38.783450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.783690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.785166] page_type: f5(slab)
[   38.785999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.786346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.787636] page dumped because: kasan: bad access detected
[   38.787986] 
[   38.788343] Memory state around the buggy address:
[   38.788889]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.789042]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.789494] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.790463]                                      ^
[   38.791263]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.791592]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.791788] ==================================================================
[   38.954965] ==================================================================
[   38.955146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   38.955302] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.955469] 
[   38.955562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.957523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.957709] Hardware name: linux,dummy-virt (DT)
[   38.958016] Call trace:
[   38.958165]  show_stack+0x20/0x38 (C)
[   38.958503]  dump_stack_lvl+0x8c/0xd0
[   38.958665]  print_report+0x118/0x5f0
[   38.958820]  kasan_report+0xc8/0x118
[   38.959040]  kasan_check_range+0x100/0x1a8
[   38.959927]  __kasan_check_write+0x20/0x30
[   38.960601]  kasan_atomics_helper+0xe44/0x4858
[   38.961613]  kasan_atomics+0x198/0x2e8
[   38.961857]  kunit_try_run_case+0x14c/0x3d0
[   38.962460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.963258]  kthread+0x318/0x618
[   38.963452]  ret_from_fork+0x10/0x20
[   38.964091] 
[   38.964172] Allocated by task 267:
[   38.964278]  kasan_save_stack+0x3c/0x68
[   38.964430]  kasan_save_track+0x20/0x40
[   38.965731]  kasan_save_alloc_info+0x40/0x58
[   38.965910]  __kasan_kmalloc+0xd4/0xd8
[   38.966837]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.967352]  kasan_atomics+0xb8/0x2e8
[   38.967968]  kunit_try_run_case+0x14c/0x3d0
[   38.968142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.969362]  kthread+0x318/0x618
[   38.969520]  ret_from_fork+0x10/0x20
[   38.969711] 
[   38.970337] The buggy address belongs to the object at fff00000c5dafc80
[   38.970337]  which belongs to the cache kmalloc-64 of size 64
[   38.971030] The buggy address is located 0 bytes to the right of
[   38.971030]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.971364] 
[   38.972421] The buggy address belongs to the physical page:
[   38.972712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.972909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.973092] page_type: f5(slab)
[   38.974097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.974491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.975468] page dumped because: kasan: bad access detected
[   38.975967] 
[   38.976076] Memory state around the buggy address:
[   38.976351]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.976588]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.976739] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.977270]                                      ^
[   38.978073]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.978427]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.978641] ==================================================================
[   38.886171] ==================================================================
[   38.886304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   38.886454] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.886611] 
[   38.886707] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.886996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.889335] Hardware name: linux,dummy-virt (DT)
[   38.889752] Call trace:
[   38.890514]  show_stack+0x20/0x38 (C)
[   38.890688]  dump_stack_lvl+0x8c/0xd0
[   38.890843]  print_report+0x118/0x5f0
[   38.891012]  kasan_report+0xc8/0x118
[   38.891183]  kasan_check_range+0x100/0x1a8
[   38.891340]  __kasan_check_write+0x20/0x30
[   38.891495]  kasan_atomics_helper+0xd3c/0x4858
[   38.891656]  kasan_atomics+0x198/0x2e8
[   38.891806]  kunit_try_run_case+0x14c/0x3d0
[   38.891964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.894597]  kthread+0x318/0x618
[   38.894770]  ret_from_fork+0x10/0x20
[   38.894942] 
[   38.895010] Allocated by task 267:
[   38.895130]  kasan_save_stack+0x3c/0x68
[   38.895253]  kasan_save_track+0x20/0x40
[   38.895384]  kasan_save_alloc_info+0x40/0x58
[   38.895522]  __kasan_kmalloc+0xd4/0xd8
[   38.895645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.895783]  kasan_atomics+0xb8/0x2e8
[   38.895912]  kunit_try_run_case+0x14c/0x3d0
[   38.896046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.898021]  kthread+0x318/0x618
[   38.898941]  ret_from_fork+0x10/0x20
[   38.899205] 
[   38.899280] The buggy address belongs to the object at fff00000c5dafc80
[   38.899280]  which belongs to the cache kmalloc-64 of size 64
[   38.899542] The buggy address is located 0 bytes to the right of
[   38.899542]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.899880] 
[   38.900000] The buggy address belongs to the physical page:
[   38.900137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.900400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.900551] page_type: f5(slab)
[   38.900668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.900880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.901028] page dumped because: kasan: bad access detected
[   38.901168] 
[   38.901236] Memory state around the buggy address:
[   38.901350]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.901500]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.901688] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.901823]                                      ^
[   38.901933]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.902146]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.902287] ==================================================================
[   38.980267] ==================================================================
[   38.980561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   38.980748] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.980982] 
[   38.981209] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.981588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.981709] Hardware name: linux,dummy-virt (DT)
[   38.981887] Call trace:
[   38.981998]  show_stack+0x20/0x38 (C)
[   38.982189]  dump_stack_lvl+0x8c/0xd0
[   38.982340]  print_report+0x118/0x5f0
[   38.982486]  kasan_report+0xc8/0x118
[   38.982673]  __asan_report_store8_noabort+0x20/0x30
[   38.982857]  kasan_atomics_helper+0x3e5c/0x4858
[   38.983037]  kasan_atomics+0x198/0x2e8
[   38.983214]  kunit_try_run_case+0x14c/0x3d0
[   38.983375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.983572]  kthread+0x318/0x618
[   38.983787]  ret_from_fork+0x10/0x20
[   38.983967] 
[   38.984078] Allocated by task 267:
[   38.984177]  kasan_save_stack+0x3c/0x68
[   38.984358]  kasan_save_track+0x20/0x40
[   38.984510]  kasan_save_alloc_info+0x40/0x58
[   38.984696]  __kasan_kmalloc+0xd4/0xd8
[   38.984826]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.984985]  kasan_atomics+0xb8/0x2e8
[   38.985158]  kunit_try_run_case+0x14c/0x3d0
[   38.985283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.985739]  kthread+0x318/0x618
[   38.985898]  ret_from_fork+0x10/0x20
[   38.986037] 
[   38.986132] The buggy address belongs to the object at fff00000c5dafc80
[   38.986132]  which belongs to the cache kmalloc-64 of size 64
[   38.986366] The buggy address is located 0 bytes to the right of
[   38.986366]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.986586] 
[   38.986659] The buggy address belongs to the physical page:
[   38.986768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.987408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.987615] page_type: f5(slab)
[   38.987742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.988419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.988595] page dumped because: kasan: bad access detected
[   38.988711] 
[   38.989398] Memory state around the buggy address:
[   38.989793]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.990305]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.990481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.990626]                                      ^
[   38.991435]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.992177]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.992758] ==================================================================
[   38.931930] ==================================================================
[   38.932110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   38.932271] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.932976] 
[   38.933287] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.933955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.934401] Hardware name: linux,dummy-virt (DT)
[   38.934882] Call trace:
[   38.935363]  show_stack+0x20/0x38 (C)
[   38.935622]  dump_stack_lvl+0x8c/0xd0
[   38.935835]  print_report+0x118/0x5f0
[   38.936157]  kasan_report+0xc8/0x118
[   38.936342]  __asan_report_load8_noabort+0x20/0x30
[   38.936655]  kasan_atomics_helper+0x3f58/0x4858
[   38.936871]  kasan_atomics+0x198/0x2e8
[   38.937041]  kunit_try_run_case+0x14c/0x3d0
[   38.937231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.937407]  kthread+0x318/0x618
[   38.938985]  ret_from_fork+0x10/0x20
[   38.939647] 
[   38.939762] Allocated by task 267:
[   38.939868]  kasan_save_stack+0x3c/0x68
[   38.940005]  kasan_save_track+0x20/0x40
[   38.940153]  kasan_save_alloc_info+0x40/0x58
[   38.940284]  __kasan_kmalloc+0xd4/0xd8
[   38.942099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.942369]  kasan_atomics+0xb8/0x2e8
[   38.943139]  kunit_try_run_case+0x14c/0x3d0
[   38.943530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.943709]  kthread+0x318/0x618
[   38.944451]  ret_from_fork+0x10/0x20
[   38.944605] 
[   38.944674] The buggy address belongs to the object at fff00000c5dafc80
[   38.944674]  which belongs to the cache kmalloc-64 of size 64
[   38.945575] The buggy address is located 0 bytes to the right of
[   38.945575]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.946703] 
[   38.946822] The buggy address belongs to the physical page:
[   38.946952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.947678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.948271] page_type: f5(slab)
[   38.948695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.948935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.949522] page dumped because: kasan: bad access detected
[   38.950081] 
[   38.950175] Memory state around the buggy address:
[   38.950819]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.951012]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.951193] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.951332]                                      ^
[   38.952030]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.952776]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.953295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   37.756273] ==================================================================
[   37.756575] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   37.757153] Read of size 1 at addr ffff800080947b5f by task kunit_try_catch/253
[   37.757350] 
[   37.757502] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.757795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.757883] Hardware name: linux,dummy-virt (DT)
[   37.757993] Call trace:
[   37.758125]  show_stack+0x20/0x38 (C)
[   37.758299]  dump_stack_lvl+0x8c/0xd0
[   37.758884]  print_report+0x2fc/0x5f0
[   37.759109]  kasan_report+0xc8/0x118
[   37.759268]  __asan_report_load1_noabort+0x20/0x30
[   37.759444]  kasan_alloca_oob_left+0x2b8/0x310
[   37.759682]  kunit_try_run_case+0x14c/0x3d0
[   37.759877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.760078]  kthread+0x318/0x618
[   37.760655]  ret_from_fork+0x10/0x20
[   37.760850] 
[   37.760924] The buggy address belongs to stack of task kunit_try_catch/253
[   37.761147] 
[   37.761236] The buggy address belongs to the virtual mapping at
[   37.761236]  [ffff800080940000, ffff800080949000) created by:
[   37.761236]  kernel_clone+0x140/0x788
[   37.762007] 
[   37.762140] The buggy address belongs to the physical page:
[   37.762274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10693d
[   37.762455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.762691] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.762903] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.763120] page dumped because: kasan: bad access detected
[   37.763234] 
[   37.763639] Memory state around the buggy address:
[   37.763784]  ffff800080947a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.763999]  ffff800080947a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.764219] >ffff800080947b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   37.764423]                                                     ^
[   37.764566]  ffff800080947b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   37.764996]  ffff800080947c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.765143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   37.714312] ==================================================================
[   37.714572] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   37.714740] Read of size 1 at addr ffff800080947c2a by task kunit_try_catch/251
[   37.714899] 
[   37.715010] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.715705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.715871] Hardware name: linux,dummy-virt (DT)
[   37.716163] Call trace:
[   37.716265]  show_stack+0x20/0x38 (C)
[   37.716440]  dump_stack_lvl+0x8c/0xd0
[   37.716601]  print_report+0x2fc/0x5f0
[   37.716756]  kasan_report+0xc8/0x118
[   37.716901]  __asan_report_load1_noabort+0x20/0x30
[   37.717222]  kasan_stack_oob+0x230/0x268
[   37.717406]  kunit_try_run_case+0x14c/0x3d0
[   37.717580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.717756]  kthread+0x318/0x618
[   37.718141]  ret_from_fork+0x10/0x20
[   37.718319] 
[   37.718498] The buggy address belongs to stack of task kunit_try_catch/251
[   37.719037]  and is located at offset 138 in frame:
[   37.719184]  kasan_stack_oob+0x0/0x268
[   37.719540] 
[   37.719667] This frame has 4 objects:
[   37.720073]  [48, 49) '__assertion'
[   37.720772]  [64, 72) 'array'
[   37.720929]  [96, 112) '__assertion'
[   37.721102]  [128, 138) 'stack_array'
[   37.721242] 
[   37.721354] The buggy address belongs to the virtual mapping at
[   37.721354]  [ffff800080940000, ffff800080949000) created by:
[   37.721354]  kernel_clone+0x140/0x788
[   37.721972] 
[   37.722085] The buggy address belongs to the physical page:
[   37.722201] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10693d
[   37.722734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.723353] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.723632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.724027] page dumped because: kasan: bad access detected
[   37.724247] 
[   37.724326] Memory state around the buggy address:
[   37.724484]  ffff800080947b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.725009]  ffff800080947b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   37.725234] >ffff800080947c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   37.725379]                                   ^
[   37.725490]  ffff800080947c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   37.725747]  ffff800080947d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.726338] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   37.673267] ==================================================================
[   37.673436] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   37.673623] Read of size 1 at addr ffffaabf8001704d by task kunit_try_catch/247
[   37.673789] 
[   37.673900] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.674186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.674276] Hardware name: linux,dummy-virt (DT)
[   37.674413] Call trace:
[   37.674489]  show_stack+0x20/0x38 (C)
[   37.674642]  dump_stack_lvl+0x8c/0xd0
[   37.674832]  print_report+0x2fc/0x5f0
[   37.674985]  kasan_report+0xc8/0x118
[   37.675386]  __asan_report_load1_noabort+0x20/0x30
[   37.675905]  kasan_global_oob_right+0x230/0x270
[   37.676109]  kunit_try_run_case+0x14c/0x3d0
[   37.676662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.676867]  kthread+0x318/0x618
[   37.677018]  ret_from_fork+0x10/0x20
[   37.677245] 
[   37.677458] The buggy address belongs to the variable:
[   37.677598]  global_array+0xd/0x40
[   37.677748] 
[   37.678323] The buggy address belongs to the virtual mapping at
[   37.678323]  [ffffaabf7e160000, ffffaabf800d1000) created by:
[   37.678323]  paging_init+0x668/0x7c8
[   37.678705] 
[   37.679257] The buggy address belongs to the physical page:
[   37.679435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47e17
[   37.679627] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   37.679959] raw: 03fffe0000002000 ffffc1ffc01f85c8 ffffc1ffc01f85c8 0000000000000000
[   37.680224] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.680412] page dumped because: kasan: bad access detected
[   37.680515] 
[   37.680570] Memory state around the buggy address:
[   37.681162]  ffffaabf80016f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.681457]  ffffaabf80016f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.681609] >ffffaabf80017000: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   37.681732]                                               ^
[   37.681880]  ffffaabf80017080: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   37.682394]  ffffaabf80017100: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   37.682578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   37.631733] ==================================================================
[   37.631965] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   37.632305] Free of addr fff00000c780c001 by task kunit_try_catch/245
[   37.632743] 
[   37.633166] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.634248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.634717] Hardware name: linux,dummy-virt (DT)
[   37.634835] Call trace:
[   37.634905]  show_stack+0x20/0x38 (C)
[   37.635095]  dump_stack_lvl+0x8c/0xd0
[   37.635243]  print_report+0x118/0x5f0
[   37.635387]  kasan_report_invalid_free+0xb0/0xd8
[   37.637718]  __kasan_mempool_poison_object+0xfc/0x150
[   37.638300]  mempool_free+0x28c/0x328
[   37.639028]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   37.640661]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   37.641067]  kunit_try_run_case+0x14c/0x3d0
[   37.641657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.642266]  kthread+0x318/0x618
[   37.643324]  ret_from_fork+0x10/0x20
[   37.643914] 
[   37.643983] The buggy address belongs to the physical page:
[   37.644104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780c
[   37.644290] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.646180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.646739] page_type: f8(unknown)
[   37.647993] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.648382] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.649075] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.649259] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.649427] head: 0bfffe0000000002 ffffc1ffc31e0301 00000000ffffffff 00000000ffffffff
[   37.649593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.649714] page dumped because: kasan: bad access detected
[   37.651113] 
[   37.651660] Memory state around the buggy address:
[   37.652114]  fff00000c780bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.653210]  fff00000c780bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.653691] >fff00000c780c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.654072]                    ^
[   37.654759]  fff00000c780c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.655120]  fff00000c780c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.655237] ==================================================================
[   37.593705] ==================================================================
[   37.593919] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   37.594161] Free of addr fff00000c5da6c01 by task kunit_try_catch/243
[   37.594311] 
[   37.594439] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.594733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.594830] Hardware name: linux,dummy-virt (DT)
[   37.595159] Call trace:
[   37.595246]  show_stack+0x20/0x38 (C)
[   37.595404]  dump_stack_lvl+0x8c/0xd0
[   37.595651]  print_report+0x118/0x5f0
[   37.595973]  kasan_report_invalid_free+0xb0/0xd8
[   37.596503]  check_slab_allocation+0xfc/0x108
[   37.596802]  __kasan_mempool_poison_object+0x78/0x150
[   37.596966]  mempool_free+0x28c/0x328
[   37.597128]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   37.597306]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.597479]  kunit_try_run_case+0x14c/0x3d0
[   37.598349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.598674]  kthread+0x318/0x618
[   37.599336]  ret_from_fork+0x10/0x20
[   37.599816] 
[   37.599883] Allocated by task 243:
[   37.600227]  kasan_save_stack+0x3c/0x68
[   37.600649]  kasan_save_track+0x20/0x40
[   37.601045]  kasan_save_alloc_info+0x40/0x58
[   37.601643]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.601793]  remove_element+0x130/0x1f8
[   37.601952]  mempool_alloc_preallocated+0x58/0xc0
[   37.602376]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   37.602809]  mempool_kmalloc_invalid_free+0xb8/0x110
[   37.603297]  kunit_try_run_case+0x14c/0x3d0
[   37.603439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.603907]  kthread+0x318/0x618
[   37.604324]  ret_from_fork+0x10/0x20
[   37.604853] 
[   37.604928] The buggy address belongs to the object at fff00000c5da6c00
[   37.604928]  which belongs to the cache kmalloc-128 of size 128
[   37.605423] The buggy address is located 1 bytes inside of
[   37.605423]  128-byte region [fff00000c5da6c00, fff00000c5da6c80)
[   37.606178] 
[   37.606650] The buggy address belongs to the physical page:
[   37.606762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   37.608127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.608300] page_type: f5(slab)
[   37.608689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.608917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.609079] page dumped because: kasan: bad access detected
[   37.609184] 
[   37.609236] Memory state around the buggy address:
[   37.609329]  fff00000c5da6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.609467]  fff00000c5da6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610387] >fff00000c5da6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.610492]                    ^
[   37.610544]  fff00000c5da6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610654]  fff00000c5da6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.610832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   37.563087] ==================================================================
[   37.563277] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.563453] Free of addr fff00000c7804000 by task kunit_try_catch/241
[   37.563597] 
[   37.563733] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.564453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.564545] Hardware name: linux,dummy-virt (DT)
[   37.564670] Call trace:
[   37.564745]  show_stack+0x20/0x38 (C)
[   37.564895]  dump_stack_lvl+0x8c/0xd0
[   37.565044]  print_report+0x118/0x5f0
[   37.565201]  kasan_report_invalid_free+0xb0/0xd8
[   37.565727]  __kasan_mempool_poison_pages+0xe0/0xe8
[   37.566003]  mempool_free+0x24c/0x328
[   37.566189]  mempool_double_free_helper+0x150/0x2e0
[   37.566381]  mempool_page_alloc_double_free+0xb4/0x110
[   37.566659]  kunit_try_run_case+0x14c/0x3d0
[   37.566822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.567084]  kthread+0x318/0x618
[   37.567230]  ret_from_fork+0x10/0x20
[   37.567938] 
[   37.568070] The buggy address belongs to the physical page:
[   37.568199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   37.568402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.568636] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.568873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.569011] page dumped because: kasan: bad access detected
[   37.569131] 
[   37.569442] Memory state around the buggy address:
[   37.569593]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.569805]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.569952] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570160]                    ^
[   37.570256]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570443]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570578] ==================================================================
[   37.441570] ==================================================================
[   37.442412] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.442665] Free of addr fff00000c5da6800 by task kunit_try_catch/237
[   37.442908] 
[   37.443095] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.443378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.443470] Hardware name: linux,dummy-virt (DT)
[   37.443647] Call trace:
[   37.444329]  show_stack+0x20/0x38 (C)
[   37.444617]  dump_stack_lvl+0x8c/0xd0
[   37.444853]  print_report+0x118/0x5f0
[   37.444999]  kasan_report_invalid_free+0xb0/0xd8
[   37.445173]  check_slab_allocation+0xd4/0x108
[   37.445901]  __kasan_mempool_poison_object+0x78/0x150
[   37.446678]  mempool_free+0x28c/0x328
[   37.446866]  mempool_double_free_helper+0x150/0x2e0
[   37.447047]  mempool_kmalloc_double_free+0xb8/0x110
[   37.447247]  kunit_try_run_case+0x14c/0x3d0
[   37.448350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.448662]  kthread+0x318/0x618
[   37.449083]  ret_from_fork+0x10/0x20
[   37.449674] 
[   37.449754] Allocated by task 237:
[   37.449940]  kasan_save_stack+0x3c/0x68
[   37.450594]  kasan_save_track+0x20/0x40
[   37.450764]  kasan_save_alloc_info+0x40/0x58
[   37.450891]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.451636]  remove_element+0x130/0x1f8
[   37.452048]  mempool_alloc_preallocated+0x58/0xc0
[   37.452511]  mempool_double_free_helper+0x94/0x2e0
[   37.452705]  mempool_kmalloc_double_free+0xb8/0x110
[   37.452832]  kunit_try_run_case+0x14c/0x3d0
[   37.452946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.453093]  kthread+0x318/0x618
[   37.453842]  ret_from_fork+0x10/0x20
[   37.454093] 
[   37.454157] Freed by task 237:
[   37.454753]  kasan_save_stack+0x3c/0x68
[   37.454890]  kasan_save_track+0x20/0x40
[   37.455126]  kasan_save_free_info+0x4c/0x78
[   37.455817]  __kasan_mempool_poison_object+0xc0/0x150
[   37.455979]  mempool_free+0x28c/0x328
[   37.456127]  mempool_double_free_helper+0x100/0x2e0
[   37.456267]  mempool_kmalloc_double_free+0xb8/0x110
[   37.457006]  kunit_try_run_case+0x14c/0x3d0
[   37.457285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.458042]  kthread+0x318/0x618
[   37.458324]  ret_from_fork+0x10/0x20
[   37.458521] 
[   37.458585] The buggy address belongs to the object at fff00000c5da6800
[   37.458585]  which belongs to the cache kmalloc-128 of size 128
[   37.459087] The buggy address is located 0 bytes inside of
[   37.459087]  128-byte region [fff00000c5da6800, fff00000c5da6880)
[   37.459282] 
[   37.459346] The buggy address belongs to the physical page:
[   37.459939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   37.460258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.460866] page_type: f5(slab)
[   37.460993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.461182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.461437] page dumped because: kasan: bad access detected
[   37.461643] 
[   37.461719] Memory state around the buggy address:
[   37.462329]  fff00000c5da6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.462507]  fff00000c5da6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.463314] >fff00000c5da6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.463567]                    ^
[   37.463935]  fff00000c5da6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.464370]  fff00000c5da6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.464613] ==================================================================
[   37.524177] ==================================================================
[   37.524359] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.524544] Free of addr fff00000c7804000 by task kunit_try_catch/239
[   37.524684] 
[   37.525354] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.525720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.525820] Hardware name: linux,dummy-virt (DT)
[   37.525923] Call trace:
[   37.525990]  show_stack+0x20/0x38 (C)
[   37.526431]  dump_stack_lvl+0x8c/0xd0
[   37.527032]  print_report+0x118/0x5f0
[   37.527209]  kasan_report_invalid_free+0xb0/0xd8
[   37.527922]  __kasan_mempool_poison_object+0x14c/0x150
[   37.528146]  mempool_free+0x28c/0x328
[   37.528563]  mempool_double_free_helper+0x150/0x2e0
[   37.529269]  mempool_kmalloc_large_double_free+0xb8/0x110
[   37.529463]  kunit_try_run_case+0x14c/0x3d0
[   37.529615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.529769]  kthread+0x318/0x618
[   37.531116]  ret_from_fork+0x10/0x20
[   37.531298] 
[   37.531366] The buggy address belongs to the physical page:
[   37.531473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   37.531650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.531807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.531994] page_type: f8(unknown)
[   37.532229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.532485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.533115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.533389] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.533569] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff
[   37.534006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.534166] page dumped because: kasan: bad access detected
[   37.534344] 
[   37.534517] Memory state around the buggy address:
[   37.534744]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.534956]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535136] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535257]                    ^
[   37.535351]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535499]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535639] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   37.258304] ==================================================================
[   37.258486] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.259041] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/231
[   37.259736] 
[   37.259855] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.261012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.261517] Hardware name: linux,dummy-virt (DT)
[   37.261820] Call trace:
[   37.262098]  show_stack+0x20/0x38 (C)
[   37.262825]  dump_stack_lvl+0x8c/0xd0
[   37.263122]  print_report+0x118/0x5f0
[   37.263340]  kasan_report+0xc8/0x118
[   37.263501]  __asan_report_load1_noabort+0x20/0x30
[   37.263668]  mempool_uaf_helper+0x314/0x340
[   37.263828]  mempool_kmalloc_large_uaf+0xbc/0x118
[   37.263985]  kunit_try_run_case+0x14c/0x3d0
[   37.264702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.264929]  kthread+0x318/0x618
[   37.265342]  ret_from_fork+0x10/0x20
[   37.265845] 
[   37.266030] The buggy address belongs to the physical page:
[   37.266236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   37.266428] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.266580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.266751] page_type: f8(unknown)
[   37.266877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.267920] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.268456] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.269087] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.269625] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff
[   37.269811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.269949] page dumped because: kasan: bad access detected
[   37.270332] 
[   37.270823] Memory state around the buggy address:
[   37.271045]  fff00000c77fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.271283]  fff00000c77fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.271963] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.272388]                    ^
[   37.272745]  fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.272978]  fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.273237] ==================================================================
[   37.402469] ==================================================================
[   37.402665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.402860] Read of size 1 at addr fff00000c7804000 by task kunit_try_catch/235
[   37.403028] 
[   37.403160] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.403553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.403651] Hardware name: linux,dummy-virt (DT)
[   37.404216] Call trace:
[   37.404376]  show_stack+0x20/0x38 (C)
[   37.404856]  dump_stack_lvl+0x8c/0xd0
[   37.405382]  print_report+0x118/0x5f0
[   37.406088]  kasan_report+0xc8/0x118
[   37.406242]  __asan_report_load1_noabort+0x20/0x30
[   37.407318]  mempool_uaf_helper+0x314/0x340
[   37.407815]  mempool_page_alloc_uaf+0xb8/0x118
[   37.408492]  kunit_try_run_case+0x14c/0x3d0
[   37.409078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.409302]  kthread+0x318/0x618
[   37.410245]  ret_from_fork+0x10/0x20
[   37.410570] 
[   37.411141] The buggy address belongs to the physical page:
[   37.411543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   37.411902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.412129] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.412303] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.412487] page dumped because: kasan: bad access detected
[   37.412589] 
[   37.412645] Memory state around the buggy address:
[   37.412811]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.412949]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.413109] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.413302]                    ^
[   37.413470]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.413702]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.413903] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   37.203804] ==================================================================
[   37.204087] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.204268] Read of size 1 at addr fff00000c5da6400 by task kunit_try_catch/229
[   37.204547] 
[   37.204665] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.204951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.205088] Hardware name: linux,dummy-virt (DT)
[   37.205242] Call trace:
[   37.205347]  show_stack+0x20/0x38 (C)
[   37.205549]  dump_stack_lvl+0x8c/0xd0
[   37.205707]  print_report+0x118/0x5f0
[   37.205837]  kasan_report+0xc8/0x118
[   37.205974]  __asan_report_load1_noabort+0x20/0x30
[   37.206158]  mempool_uaf_helper+0x314/0x340
[   37.206310]  mempool_kmalloc_uaf+0xbc/0x118
[   37.206470]  kunit_try_run_case+0x14c/0x3d0
[   37.206639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.206821]  kthread+0x318/0x618
[   37.207043]  ret_from_fork+0x10/0x20
[   37.207226] 
[   37.207286] Allocated by task 229:
[   37.207515]  kasan_save_stack+0x3c/0x68
[   37.207648]  kasan_save_track+0x20/0x40
[   37.207846]  kasan_save_alloc_info+0x40/0x58
[   37.208070]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.208226]  remove_element+0x130/0x1f8
[   37.208418]  mempool_alloc_preallocated+0x58/0xc0
[   37.208554]  mempool_uaf_helper+0xa4/0x340
[   37.209112]  mempool_kmalloc_uaf+0xbc/0x118
[   37.209369]  kunit_try_run_case+0x14c/0x3d0
[   37.209715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.209864]  kthread+0x318/0x618
[   37.210137]  ret_from_fork+0x10/0x20
[   37.210269] 
[   37.210326] Freed by task 229:
[   37.210463]  kasan_save_stack+0x3c/0x68
[   37.210667]  kasan_save_track+0x20/0x40
[   37.210850]  kasan_save_free_info+0x4c/0x78
[   37.211021]  __kasan_mempool_poison_object+0xc0/0x150
[   37.211189]  mempool_free+0x28c/0x328
[   37.211385]  mempool_uaf_helper+0x104/0x340
[   37.211578]  mempool_kmalloc_uaf+0xbc/0x118
[   37.211787]  kunit_try_run_case+0x14c/0x3d0
[   37.211951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.212114]  kthread+0x318/0x618
[   37.212224]  ret_from_fork+0x10/0x20
[   37.212406] 
[   37.212571] The buggy address belongs to the object at fff00000c5da6400
[   37.212571]  which belongs to the cache kmalloc-128 of size 128
[   37.212766] The buggy address is located 0 bytes inside of
[   37.212766]  freed 128-byte region [fff00000c5da6400, fff00000c5da6480)
[   37.212967] 
[   37.213036] The buggy address belongs to the physical page:
[   37.213180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   37.213460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.213715] page_type: f5(slab)
[   37.213878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.214037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.214179] page dumped because: kasan: bad access detected
[   37.214277] 
[   37.214333] Memory state around the buggy address:
[   37.214439]  fff00000c5da6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.214624]  fff00000c5da6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.214852] >fff00000c5da6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.215078]                    ^
[   37.215165]  fff00000c5da6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.215358]  fff00000c5da6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.215494] ==================================================================
[   37.312457] ==================================================================
[   37.312805] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.312969] Read of size 1 at addr fff00000c5dab240 by task kunit_try_catch/233
[   37.313152] 
[   37.313408] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.313850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.313953] Hardware name: linux,dummy-virt (DT)
[   37.314080] Call trace:
[   37.314157]  show_stack+0x20/0x38 (C)
[   37.314320]  dump_stack_lvl+0x8c/0xd0
[   37.314476]  print_report+0x118/0x5f0
[   37.314627]  kasan_report+0xc8/0x118
[   37.314772]  __asan_report_load1_noabort+0x20/0x30
[   37.314943]  mempool_uaf_helper+0x314/0x340
[   37.315611]  mempool_slab_uaf+0xb8/0x110
[   37.315805]  kunit_try_run_case+0x14c/0x3d0
[   37.315971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.316532]  kthread+0x318/0x618
[   37.316794]  ret_from_fork+0x10/0x20
[   37.317044] 
[   37.317169] Allocated by task 233:
[   37.317294]  kasan_save_stack+0x3c/0x68
[   37.317411]  kasan_save_track+0x20/0x40
[   37.317551]  kasan_save_alloc_info+0x40/0x58
[   37.317672]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.317803]  remove_element+0x16c/0x1f8
[   37.317935]  mempool_alloc_preallocated+0x58/0xc0
[   37.318134]  mempool_uaf_helper+0xa4/0x340
[   37.318270]  mempool_slab_uaf+0xb8/0x110
[   37.318418]  kunit_try_run_case+0x14c/0x3d0
[   37.318555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.318713]  kthread+0x318/0x618
[   37.318891]  ret_from_fork+0x10/0x20
[   37.319035] 
[   37.319143] Freed by task 233:
[   37.319227]  kasan_save_stack+0x3c/0x68
[   37.319384]  kasan_save_track+0x20/0x40
[   37.319491]  kasan_save_free_info+0x4c/0x78
[   37.319605]  __kasan_mempool_poison_object+0xc0/0x150
[   37.319740]  mempool_free+0x28c/0x328
[   37.319851]  mempool_uaf_helper+0x104/0x340
[   37.319979]  mempool_slab_uaf+0xb8/0x110
[   37.320186]  kunit_try_run_case+0x14c/0x3d0
[   37.320419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.320618]  kthread+0x318/0x618
[   37.320774]  ret_from_fork+0x10/0x20
[   37.320893] 
[   37.320962] The buggy address belongs to the object at fff00000c5dab240
[   37.320962]  which belongs to the cache test_cache of size 123
[   37.321184] The buggy address is located 0 bytes inside of
[   37.321184]  freed 123-byte region [fff00000c5dab240, fff00000c5dab2bb)
[   37.321391] 
[   37.321466] The buggy address belongs to the physical page:
[   37.321615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dab
[   37.321777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.321928] page_type: f5(slab)
[   37.322042] raw: 0bfffe0000000000 fff00000c5d9a780 dead000000000122 0000000000000000
[   37.322218] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.322382] page dumped because: kasan: bad access detected
[   37.322484] 
[   37.322546] Memory state around the buggy address:
[   37.322645]  fff00000c5dab100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.322844]  fff00000c5dab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.323031] >fff00000c5dab200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.323253]                                            ^
[   37.323434]  fff00000c5dab280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.323657]  fff00000c5dab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.323866] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   37.063660] ==================================================================
[   37.063934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   37.064205] Read of size 1 at addr fff00000c5da6073 by task kunit_try_catch/223
[   37.064418] 
[   37.064536] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.065076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.065212] Hardware name: linux,dummy-virt (DT)
[   37.065271] Call trace:
[   37.065314]  show_stack+0x20/0x38 (C)
[   37.065407]  dump_stack_lvl+0x8c/0xd0
[   37.065491]  print_report+0x118/0x5f0
[   37.065565]  kasan_report+0xc8/0x118
[   37.065642]  __asan_report_load1_noabort+0x20/0x30
[   37.065726]  mempool_oob_right_helper+0x2ac/0x2f0
[   37.065807]  mempool_kmalloc_oob_right+0xbc/0x118
[   37.065892]  kunit_try_run_case+0x14c/0x3d0
[   37.065977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.066095]  kthread+0x318/0x618
[   37.066260]  ret_from_fork+0x10/0x20
[   37.066439] 
[   37.066536] Allocated by task 223:
[   37.066632]  kasan_save_stack+0x3c/0x68
[   37.066762]  kasan_save_track+0x20/0x40
[   37.066878]  kasan_save_alloc_info+0x40/0x58
[   37.067015]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.067165]  remove_element+0x130/0x1f8
[   37.067319]  mempool_alloc_preallocated+0x58/0xc0
[   37.067543]  mempool_oob_right_helper+0x98/0x2f0
[   37.067765]  mempool_kmalloc_oob_right+0xbc/0x118
[   37.067975]  kunit_try_run_case+0x14c/0x3d0
[   37.068141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.068275]  kthread+0x318/0x618
[   37.068795]  ret_from_fork+0x10/0x20
[   37.068962] 
[   37.069083] The buggy address belongs to the object at fff00000c5da6000
[   37.069083]  which belongs to the cache kmalloc-128 of size 128
[   37.069278] The buggy address is located 0 bytes to the right of
[   37.069278]  allocated 115-byte region [fff00000c5da6000, fff00000c5da6073)
[   37.069475] 
[   37.069565] The buggy address belongs to the physical page:
[   37.069672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   37.069850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.070021] page_type: f5(slab)
[   37.070244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.070509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.070704] page dumped because: kasan: bad access detected
[   37.070806] 
[   37.070898] Memory state around the buggy address:
[   37.071088]  fff00000c5da5f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   37.071232]  fff00000c5da5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.071366] >fff00000c5da6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   37.071491]                                                              ^
[   37.071979]  fff00000c5da6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.072379]  fff00000c5da6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   37.072555] ==================================================================
[   37.141797] ==================================================================
[   37.142021] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   37.142249] Read of size 1 at addr fff00000c5daa2bb by task kunit_try_catch/227
[   37.142450] 
[   37.142592] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.142940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.143038] Hardware name: linux,dummy-virt (DT)
[   37.143176] Call trace:
[   37.143284]  show_stack+0x20/0x38 (C)
[   37.143466]  dump_stack_lvl+0x8c/0xd0
[   37.143669]  print_report+0x118/0x5f0
[   37.143890]  kasan_report+0xc8/0x118
[   37.144109]  __asan_report_load1_noabort+0x20/0x30
[   37.144258]  mempool_oob_right_helper+0x2ac/0x2f0
[   37.144650]  mempool_slab_oob_right+0xb8/0x110
[   37.144845]  kunit_try_run_case+0x14c/0x3d0
[   37.145012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.145209]  kthread+0x318/0x618
[   37.145432]  ret_from_fork+0x10/0x20
[   37.145578] 
[   37.145634] Allocated by task 227:
[   37.145930]  kasan_save_stack+0x3c/0x68
[   37.146080]  kasan_save_track+0x20/0x40
[   37.146206]  kasan_save_alloc_info+0x40/0x58
[   37.146352]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.146495]  remove_element+0x16c/0x1f8
[   37.146698]  mempool_alloc_preallocated+0x58/0xc0
[   37.146837]  mempool_oob_right_helper+0x98/0x2f0
[   37.146976]  mempool_slab_oob_right+0xb8/0x110
[   37.147126]  kunit_try_run_case+0x14c/0x3d0
[   37.147248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.147390]  kthread+0x318/0x618
[   37.147515]  ret_from_fork+0x10/0x20
[   37.147631] 
[   37.147688] The buggy address belongs to the object at fff00000c5daa240
[   37.147688]  which belongs to the cache test_cache of size 123
[   37.147901] The buggy address is located 0 bytes to the right of
[   37.147901]  allocated 123-byte region [fff00000c5daa240, fff00000c5daa2bb)
[   37.148441] 
[   37.148553] The buggy address belongs to the physical page:
[   37.148764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daa
[   37.149002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.149288] page_type: f5(slab)
[   37.149450] raw: 0bfffe0000000000 fff00000c5d9a640 dead000000000122 0000000000000000
[   37.149628] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.149755] page dumped because: kasan: bad access detected
[   37.150544] 
[   37.150637] Memory state around the buggy address:
[   37.150913]  fff00000c5daa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.151127]  fff00000c5daa200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   37.151285] >fff00000c5daa280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   37.151437]                                         ^
[   37.151630]  fff00000c5daa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.151857]  fff00000c5daa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.152006] ==================================================================
[   37.099859] ==================================================================
[   37.100040] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   37.100225] Read of size 1 at addr fff00000c7802001 by task kunit_try_catch/225
[   37.100473] 
[   37.100577] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.101129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.101255] Hardware name: linux,dummy-virt (DT)
[   37.101352] Call trace:
[   37.101396]  show_stack+0x20/0x38 (C)
[   37.101480]  dump_stack_lvl+0x8c/0xd0
[   37.101560]  print_report+0x118/0x5f0
[   37.101632]  kasan_report+0xc8/0x118
[   37.101705]  __asan_report_load1_noabort+0x20/0x30
[   37.101784]  mempool_oob_right_helper+0x2ac/0x2f0
[   37.101868]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   37.101951]  kunit_try_run_case+0x14c/0x3d0
[   37.102030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.102229]  kthread+0x318/0x618
[   37.103280]  ret_from_fork+0x10/0x20
[   37.103485] 
[   37.103553] The buggy address belongs to the physical page:
[   37.103657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   37.104125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.104305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.104965] page_type: f8(unknown)
[   37.105141] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.105770] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.105949] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.106135] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.106303] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff
[   37.106468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.106609] page dumped because: kasan: bad access detected
[   37.106706] 
[   37.106771] Memory state around the buggy address:
[   37.106877]  fff00000c7801f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.107035]  fff00000c7801f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.109164] >fff00000c7802000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   37.109419]                    ^
[   37.109644]  fff00000c7802080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   37.110183]  fff00000c7802100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   37.110549] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   36.334639] ==================================================================
[   36.335282] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   36.336122] Read of size 1 at addr fff00000c5d9a280 by task kunit_try_catch/217
[   36.336294] 
[   36.336575] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   36.337507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.337725] Hardware name: linux,dummy-virt (DT)
[   36.338003] Call trace:
[   36.338128]  show_stack+0x20/0x38 (C)
[   36.338863]  dump_stack_lvl+0x8c/0xd0
[   36.339246]  print_report+0x118/0x5f0
[   36.339852]  kasan_report+0xc8/0x118
[   36.340041]  __kasan_check_byte+0x54/0x70
[   36.340211]  kmem_cache_destroy+0x34/0x220
[   36.341070]  kmem_cache_double_destroy+0x17c/0x2f8
[   36.341186]  kunit_try_run_case+0x14c/0x3d0
[   36.341276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.341366]  kthread+0x318/0x618
[   36.341442]  ret_from_fork+0x10/0x20
[   36.341523] 
[   36.341557] Allocated by task 217:
[   36.341606]  kasan_save_stack+0x3c/0x68
[   36.341673]  kasan_save_track+0x20/0x40
[   36.341730]  kasan_save_alloc_info+0x40/0x58
[   36.341795]  __kasan_slab_alloc+0xa8/0xb0
[   36.341856]  kmem_cache_alloc_noprof+0x108/0x398
[   36.341918]  __kmem_cache_create_args+0x178/0x280
[   36.341988]  kmem_cache_double_destroy+0xc8/0x2f8
[   36.342077]  kunit_try_run_case+0x14c/0x3d0
[   36.342280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.342470]  kthread+0x318/0x618
[   36.342571]  ret_from_fork+0x10/0x20
[   36.342673] 
[   36.342729] Freed by task 217:
[   36.342808]  kasan_save_stack+0x3c/0x68
[   36.343010]  kasan_save_track+0x20/0x40
[   36.343217]  kasan_save_free_info+0x4c/0x78
[   36.343415]  __kasan_slab_free+0x6c/0x98
[   36.343593]  kmem_cache_free+0x260/0x490
[   36.343772]  slab_kmem_cache_release+0x38/0x50
[   36.343888]  kmem_cache_release+0x1c/0x30
[   36.344015]  kobject_put+0x17c/0x428
[   36.344149]  sysfs_slab_release+0x1c/0x30
[   36.344300]  kmem_cache_destroy+0x118/0x220
[   36.344777]  kmem_cache_double_destroy+0x130/0x2f8
[   36.344924]  kunit_try_run_case+0x14c/0x3d0
[   36.345133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.345302]  kthread+0x318/0x618
[   36.345422]  ret_from_fork+0x10/0x20
[   36.345543] 
[   36.345619] The buggy address belongs to the object at fff00000c5d9a280
[   36.345619]  which belongs to the cache kmem_cache of size 208
[   36.345855] The buggy address is located 0 bytes inside of
[   36.345855]  freed 208-byte region [fff00000c5d9a280, fff00000c5d9a350)
[   36.346104] 
[   36.346171] The buggy address belongs to the physical page:
[   36.346394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9a
[   36.346724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.348349] page_type: f5(slab)
[   36.348514] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   36.348688] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   36.348830] page dumped because: kasan: bad access detected
[   36.348938] 
[   36.349001] Memory state around the buggy address:
[   36.349129]  fff00000c5d9a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.349284]  fff00000c5d9a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.349423] >fff00000c5d9a280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.349553]                    ^
[   36.349642]  fff00000c5d9a300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   36.350491]  fff00000c5d9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.350625] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   35.917584] ==================================================================
[   35.917812] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   35.918003] Read of size 1 at addr fff00000c5d9e000 by task kunit_try_catch/215
[   35.918176] 
[   35.918286] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   35.918571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.918661] Hardware name: linux,dummy-virt (DT)
[   35.918766] Call trace:
[   35.918844]  show_stack+0x20/0x38 (C)
[   35.919018]  dump_stack_lvl+0x8c/0xd0
[   35.920528]  print_report+0x118/0x5f0
[   35.920684]  kasan_report+0xc8/0x118
[   35.920831]  __asan_report_load1_noabort+0x20/0x30
[   35.921072]  kmem_cache_rcu_uaf+0x390/0x468
[   35.921268]  kunit_try_run_case+0x14c/0x3d0
[   35.921444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.921607]  kthread+0x318/0x618
[   35.921757]  ret_from_fork+0x10/0x20
[   35.921913] 
[   35.922296] Allocated by task 215:
[   35.922407]  kasan_save_stack+0x3c/0x68
[   35.922859]  kasan_save_track+0x20/0x40
[   35.923155]  kasan_save_alloc_info+0x40/0x58
[   35.923434]  __kasan_slab_alloc+0xa8/0xb0
[   35.923569]  kmem_cache_alloc_noprof+0x108/0x398
[   35.923700]  kmem_cache_rcu_uaf+0x12c/0x468
[   35.923826]  kunit_try_run_case+0x14c/0x3d0
[   35.924549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924870]  kthread+0x318/0x618
[   35.925004]  ret_from_fork+0x10/0x20
[   35.925291] 
[   35.925368] Freed by task 0:
[   35.925453]  kasan_save_stack+0x3c/0x68
[   35.925570]  kasan_save_track+0x20/0x40
[   35.925675]  kasan_save_free_info+0x4c/0x78
[   35.926047]  __kasan_slab_free+0x6c/0x98
[   35.926988]  slab_free_after_rcu_debug+0xd4/0x2f8
[   35.927170]  rcu_core+0x9f4/0x1e58
[   35.927293]  rcu_core_si+0x18/0x30
[   35.927404]  handle_softirqs+0x374/0xb20
[   35.927531]  __do_softirq+0x1c/0x28
[   35.927908] 
[   35.928251] Last potentially related work creation:
[   35.928350]  kasan_save_stack+0x3c/0x68
[   35.928480]  kasan_record_aux_stack+0xb4/0xc8
[   35.928611]  kmem_cache_free+0x120/0x490
[   35.928724]  kmem_cache_rcu_uaf+0x16c/0x468
[   35.928853]  kunit_try_run_case+0x14c/0x3d0
[   35.929080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.929326]  kthread+0x318/0x618
[   35.929839]  ret_from_fork+0x10/0x20
[   35.929977] 
[   35.930072] The buggy address belongs to the object at fff00000c5d9e000
[   35.930072]  which belongs to the cache test_cache of size 200
[   35.930491] The buggy address is located 0 bytes inside of
[   35.930491]  freed 200-byte region [fff00000c5d9e000, fff00000c5d9e0c8)
[   35.931259] 
[   35.931427] The buggy address belongs to the physical page:
[   35.931556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9e
[   35.932040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.932254] page_type: f5(slab)
[   35.933268] raw: 0bfffe0000000000 fff00000c5d9a140 dead000000000122 0000000000000000
[   35.933454] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   35.933599] page dumped because: kasan: bad access detected
[   35.933708] 
[   35.933760] Memory state around the buggy address:
[   35.933858]  fff00000c5d9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.933994]  fff00000c5d9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.938119] >fff00000c5d9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.938644]                    ^
[   35.938769]  fff00000c5d9e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   35.938932]  fff00000c5d9e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.939078] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   35.499526] ==================================================================
[   35.500797] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   35.501549] Free of addr fff00000c5d9c001 by task kunit_try_catch/213
[   35.502270] 
[   35.502760] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   35.504536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.504657] Hardware name: linux,dummy-virt (DT)
[   35.504758] Call trace:
[   35.505570]  show_stack+0x20/0x38 (C)
[   35.506346]  dump_stack_lvl+0x8c/0xd0
[   35.507144]  print_report+0x118/0x5f0
[   35.507429]  kasan_report_invalid_free+0xb0/0xd8
[   35.507591]  check_slab_allocation+0xfc/0x108
[   35.507748]  __kasan_slab_pre_free+0x2c/0x48
[   35.507905]  kmem_cache_free+0xf0/0x490
[   35.509215]  kmem_cache_invalid_free+0x184/0x3b8
[   35.510184]  kunit_try_run_case+0x14c/0x3d0
[   35.511279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.512267]  kthread+0x318/0x618
[   35.512448]  ret_from_fork+0x10/0x20
[   35.512613] 
[   35.512677] Allocated by task 213:
[   35.513911]  kasan_save_stack+0x3c/0x68
[   35.514369]  kasan_save_track+0x20/0x40
[   35.514500]  kasan_save_alloc_info+0x40/0x58
[   35.514900]  __kasan_slab_alloc+0xa8/0xb0
[   35.515868]  kmem_cache_alloc_noprof+0x108/0x398
[   35.516562]  kmem_cache_invalid_free+0x12c/0x3b8
[   35.517149]  kunit_try_run_case+0x14c/0x3d0
[   35.517649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.517823]  kthread+0x318/0x618
[   35.517938]  ret_from_fork+0x10/0x20
[   35.518074] 
[   35.518315] The buggy address belongs to the object at fff00000c5d9c000
[   35.518315]  which belongs to the cache test_cache of size 200
[   35.519120] The buggy address is located 1 bytes inside of
[   35.519120]  200-byte region [fff00000c5d9c000, fff00000c5d9c0c8)
[   35.519346] 
[   35.519412] The buggy address belongs to the physical page:
[   35.519516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9c
[   35.520336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.520762] page_type: f5(slab)
[   35.521086] raw: 0bfffe0000000000 fff00000c5d9a000 dead000000000122 0000000000000000
[   35.521248] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   35.521380] page dumped because: kasan: bad access detected
[   35.521483] 
[   35.522113] Memory state around the buggy address:
[   35.522243]  fff00000c5d9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   35.522637]  fff00000c5d9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.523314] >fff00000c5d9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.523648]                    ^
[   35.523964]  fff00000c5d9c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   35.524245]  fff00000c5d9c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.524401] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   35.394572] ==================================================================
[   35.394839] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   35.395133] Free of addr fff00000c5d9a000 by task kunit_try_catch/211
[   35.395326] 
[   35.395512] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   35.396041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.396405] Hardware name: linux,dummy-virt (DT)
[   35.396574] Call trace:
[   35.396665]  show_stack+0x20/0x38 (C)
[   35.397704]  dump_stack_lvl+0x8c/0xd0
[   35.397870]  print_report+0x118/0x5f0
[   35.398032]  kasan_report_invalid_free+0xb0/0xd8
[   35.398206]  check_slab_allocation+0xd4/0x108
[   35.398353]  __kasan_slab_pre_free+0x2c/0x48
[   35.398499]  kmem_cache_free+0xf0/0x490
[   35.398649]  kmem_cache_double_free+0x190/0x3c8
[   35.398801]  kunit_try_run_case+0x14c/0x3d0
[   35.398971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.399510]  kthread+0x318/0x618
[   35.399661]  ret_from_fork+0x10/0x20
[   35.399812] 
[   35.399869] Allocated by task 211:
[   35.399962]  kasan_save_stack+0x3c/0x68
[   35.400126]  kasan_save_track+0x20/0x40
[   35.400399]  kasan_save_alloc_info+0x40/0x58
[   35.400771]  __kasan_slab_alloc+0xa8/0xb0
[   35.400915]  kmem_cache_alloc_noprof+0x108/0x398
[   35.401041]  kmem_cache_double_free+0x12c/0x3c8
[   35.401187]  kunit_try_run_case+0x14c/0x3d0
[   35.401313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.401455]  kthread+0x318/0x618
[   35.401566]  ret_from_fork+0x10/0x20
[   35.401682] 
[   35.401739] Freed by task 211:
[   35.401826]  kasan_save_stack+0x3c/0x68
[   35.401936]  kasan_save_track+0x20/0x40
[   35.402073]  kasan_save_free_info+0x4c/0x78
[   35.402201]  __kasan_slab_free+0x6c/0x98
[   35.402304]  kmem_cache_free+0x260/0x490
[   35.402537]  kmem_cache_double_free+0x140/0x3c8
[   35.402741]  kunit_try_run_case+0x14c/0x3d0
[   35.402870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.403019]  kthread+0x318/0x618
[   35.403257]  ret_from_fork+0x10/0x20
[   35.403390] 
[   35.403453] The buggy address belongs to the object at fff00000c5d9a000
[   35.403453]  which belongs to the cache test_cache of size 200
[   35.403656] The buggy address is located 0 bytes inside of
[   35.403656]  200-byte region [fff00000c5d9a000, fff00000c5d9a0c8)
[   35.404134] 
[   35.404927] The buggy address belongs to the physical page:
[   35.405036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9a
[   35.405940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.406239] page_type: f5(slab)
[   35.406383] raw: 0bfffe0000000000 fff00000c10a5dc0 dead000000000122 0000000000000000
[   35.406774] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   35.409027] page dumped because: kasan: bad access detected
[   35.411164] 
[   35.411639] Memory state around the buggy address:
[   35.412142]  fff00000c5d99f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.412302]  fff00000c5d99f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.412444] >fff00000c5d9a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.412572]                    ^
[   35.412654]  fff00000c5d9a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   35.412791]  fff00000c5d9a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.412914] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   35.177567] ==================================================================
[   35.178245] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   35.178432] Read of size 1 at addr fff00000c5d980c8 by task kunit_try_catch/209
[   35.178592] 
[   35.178730] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   35.179019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.179134] Hardware name: linux,dummy-virt (DT)
[   35.179349] Call trace:
[   35.179438]  show_stack+0x20/0x38 (C)
[   35.179609]  dump_stack_lvl+0x8c/0xd0
[   35.179758]  print_report+0x118/0x5f0
[   35.179906]  kasan_report+0xc8/0x118
[   35.180046]  __asan_report_load1_noabort+0x20/0x30
[   35.180230]  kmem_cache_oob+0x33c/0x428
[   35.181035]  kunit_try_run_case+0x14c/0x3d0
[   35.182072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.183319]  kthread+0x318/0x618
[   35.184316]  ret_from_fork+0x10/0x20
[   35.185121] 
[   35.185188] Allocated by task 209:
[   35.185274]  kasan_save_stack+0x3c/0x68
[   35.185401]  kasan_save_track+0x20/0x40
[   35.186474]  kasan_save_alloc_info+0x40/0x58
[   35.186741]  __kasan_slab_alloc+0xa8/0xb0
[   35.186877]  kmem_cache_alloc_noprof+0x108/0x398
[   35.187008]  kmem_cache_oob+0x12c/0x428
[   35.187578]  kunit_try_run_case+0x14c/0x3d0
[   35.187745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.187897]  kthread+0x318/0x618
[   35.188010]  ret_from_fork+0x10/0x20
[   35.188151] 
[   35.188218] The buggy address belongs to the object at fff00000c5d98000
[   35.188218]  which belongs to the cache test_cache of size 200
[   35.188677] The buggy address is located 0 bytes to the right of
[   35.188677]  allocated 200-byte region [fff00000c5d98000, fff00000c5d980c8)
[   35.189688] 
[   35.189783] The buggy address belongs to the physical page:
[   35.190000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d98
[   35.190316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.190589] page_type: f5(slab)
[   35.190727] raw: 0bfffe0000000000 fff00000c10a5c80 dead000000000122 0000000000000000
[   35.191196] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   35.191652] page dumped because: kasan: bad access detected
[   35.191789] 
[   35.192182] Memory state around the buggy address:
[   35.192629]  fff00000c5d97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.192787]  fff00000c5d98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.192933] >fff00000c5d98080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   35.193418]                                               ^
[   35.193671]  fff00000c5d98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.194044]  fff00000c5d98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.194212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   35.073664] ==================================================================
[   35.074110] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   35.074282] Read of size 8 at addr fff00000c5d93440 by task kunit_try_catch/202
[   35.074455] 
[   35.074564] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   35.074846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.074939] Hardware name: linux,dummy-virt (DT)
[   35.075034] Call trace:
[   35.075119]  show_stack+0x20/0x38 (C)
[   35.075273]  dump_stack_lvl+0x8c/0xd0
[   35.075425]  print_report+0x118/0x5f0
[   35.075566]  kasan_report+0xc8/0x118
[   35.076085]  __asan_report_load8_noabort+0x20/0x30
[   35.077104]  workqueue_uaf+0x480/0x4a8
[   35.077289]  kunit_try_run_case+0x14c/0x3d0
[   35.077449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.077615]  kthread+0x318/0x618
[   35.077774]  ret_from_fork+0x10/0x20
[   35.078158] 
[   35.078280] Allocated by task 202:
[   35.078624]  kasan_save_stack+0x3c/0x68
[   35.079358]  kasan_save_track+0x20/0x40
[   35.079520]  kasan_save_alloc_info+0x40/0x58
[   35.079739]  __kasan_kmalloc+0xd4/0xd8
[   35.079873]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.080016]  workqueue_uaf+0x13c/0x4a8
[   35.080158]  kunit_try_run_case+0x14c/0x3d0
[   35.080290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.080511]  kthread+0x318/0x618
[   35.080722]  ret_from_fork+0x10/0x20
[   35.080943] 
[   35.081018] Freed by task 50:
[   35.081148]  kasan_save_stack+0x3c/0x68
[   35.081963]  kasan_save_track+0x20/0x40
[   35.082485]  kasan_save_free_info+0x4c/0x78
[   35.083138]  __kasan_slab_free+0x6c/0x98
[   35.083339]  kfree+0x214/0x3c8
[   35.084395]  workqueue_uaf_work+0x18/0x30
[   35.085797]  process_one_work+0x530/0xf98
[   35.086722]  worker_thread+0x644/0xf48
[   35.086799]  kthread+0x318/0x618
[   35.086859]  ret_from_fork+0x10/0x20
[   35.087030] 
[   35.087117] Last potentially related work creation:
[   35.087217]  kasan_save_stack+0x3c/0x68
[   35.087614]  kasan_record_aux_stack+0xb4/0xc8
[   35.087749]  __queue_work+0x65c/0x1018
[   35.087867]  queue_work_on+0xbc/0xf8
[   35.087983]  workqueue_uaf+0x210/0x4a8
[   35.088120]  kunit_try_run_case+0x14c/0x3d0
[   35.088307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.088913]  kthread+0x318/0x618
[   35.089192]  ret_from_fork+0x10/0x20
[   35.089580] 
[   35.089635] The buggy address belongs to the object at fff00000c5d93440
[   35.089635]  which belongs to the cache kmalloc-32 of size 32
[   35.089741] The buggy address is located 0 bytes inside of
[   35.089741]  freed 32-byte region [fff00000c5d93440, fff00000c5d93460)
[   35.089841] 
[   35.089875] The buggy address belongs to the physical page:
[   35.089929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d93
[   35.090015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.090157] page_type: f5(slab)
[   35.090645] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.090872] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.091093] page dumped because: kasan: bad access detected
[   35.091259] 
[   35.091321] Memory state around the buggy address:
[   35.091432]  fff00000c5d93300: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   35.091599]  fff00000c5d93380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.091747] >fff00000c5d93400: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   35.091880]                                            ^
[   35.091993]  fff00000c5d93480: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.092146]  fff00000c5d93500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.092270] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   34.984165] ==================================================================
[   34.985304] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   34.985478] Read of size 4 at addr fff00000c5d93200 by task swapper/1/0
[   34.985628] 
[   34.985731] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.986008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.988113] Hardware name: linux,dummy-virt (DT)
[   34.988380] Call trace:
[   34.988997]  show_stack+0x20/0x38 (C)
[   34.989562]  dump_stack_lvl+0x8c/0xd0
[   34.990035]  print_report+0x118/0x5f0
[   34.990289]  kasan_report+0xc8/0x118
[   34.990840]  __asan_report_load4_noabort+0x20/0x30
[   34.991363]  rcu_uaf_reclaim+0x64/0x70
[   34.991523]  rcu_core+0x9f4/0x1e58
[   34.991667]  rcu_core_si+0x18/0x30
[   34.991797]  handle_softirqs+0x374/0xb20
[   34.991954]  __do_softirq+0x1c/0x28
[   34.993357]  ____do_softirq+0x18/0x30
[   34.994482]  call_on_irq_stack+0x24/0x58
[   34.994961]  do_softirq_own_stack+0x24/0x38
[   34.995152]  __irq_exit_rcu+0x1fc/0x318
[   34.995303]  irq_exit_rcu+0x1c/0x80
[   34.995448]  el1_interrupt+0x38/0x58
[   34.996485]  el1h_64_irq_handler+0x18/0x28
[   34.996866]  el1h_64_irq+0x6c/0x70
[   34.999933]  finish_task_switch.isra.0+0x120/0x5f8 (P)
[   35.000385]  __schedule+0xa90/0x2628
[   35.000546]  schedule_idle+0x60/0xa8
[   35.000692]  do_idle+0x2c4/0x4e8
[   35.000830]  cpu_startup_entry+0x64/0x80
[   35.000969]  secondary_start_kernel+0x288/0x340
[   35.003228]  __secondary_switched+0xc0/0xc8
[   35.003633] 
[   35.003723] Allocated by task 200:
[   35.004022]  kasan_save_stack+0x3c/0x68
[   35.004517]  kasan_save_track+0x20/0x40
[   35.004648]  kasan_save_alloc_info+0x40/0x58
[   35.005151]  __kasan_kmalloc+0xd4/0xd8
[   35.005308]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.005442]  rcu_uaf+0xb0/0x2d0
[   35.005546]  kunit_try_run_case+0x14c/0x3d0
[   35.005666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.006328]  kthread+0x318/0x618
[   35.006930]  ret_from_fork+0x10/0x20
[   35.007324] 
[   35.007410] Freed by task 0:
[   35.007490]  kasan_save_stack+0x3c/0x68
[   35.007622]  kasan_save_track+0x20/0x40
[   35.008252]  kasan_save_free_info+0x4c/0x78
[   35.008559]  __kasan_slab_free+0x6c/0x98
[   35.008899]  kfree+0x214/0x3c8
[   35.009770]  rcu_uaf_reclaim+0x28/0x70
[   35.010244]  rcu_core+0x9f4/0x1e58
[   35.011100]  rcu_core_si+0x18/0x30
[   35.011247]  handle_softirqs+0x374/0xb20
[   35.011314]  __do_softirq+0x1c/0x28
[   35.011376] 
[   35.011425] Last potentially related work creation:
[   35.011482]  kasan_save_stack+0x3c/0x68
[   35.011543]  kasan_record_aux_stack+0xb4/0xc8
[   35.011609]  __call_rcu_common.constprop.0+0x70/0x8b0
[   35.011676]  call_rcu+0x18/0x30
[   35.011730]  rcu_uaf+0x14c/0x2d0
[   35.011787]  kunit_try_run_case+0x14c/0x3d0
[   35.011852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.011923]  kthread+0x318/0x618
[   35.011982]  ret_from_fork+0x10/0x20
[   35.012078] 
[   35.012306] The buggy address belongs to the object at fff00000c5d93200
[   35.012306]  which belongs to the cache kmalloc-32 of size 32
[   35.012872] The buggy address is located 0 bytes inside of
[   35.012872]  freed 32-byte region [fff00000c5d93200, fff00000c5d93220)
[   35.013472] 
[   35.013546] The buggy address belongs to the physical page:
[   35.014254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d93
[   35.014524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.015122] page_type: f5(slab)
[   35.015301] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.015475] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.015746] page dumped because: kasan: bad access detected
[   35.016013] 
[   35.016242] Memory state around the buggy address:
[   35.016478]  fff00000c5d93100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.016922]  fff00000c5d93180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   35.017476] >fff00000c5d93200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.017747]                    ^
[   35.018036]  fff00000c5d93280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.018346]  fff00000c5d93300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.018495] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   34.775216] ==================================================================
[   34.775362] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   34.775525] Read of size 1 at addr fff00000c6818d00 by task kunit_try_catch/198
[   34.775684] 
[   34.775771] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.776043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.776153] Hardware name: linux,dummy-virt (DT)
[   34.776252] Call trace:
[   34.776320]  show_stack+0x20/0x38 (C)
[   34.776472]  dump_stack_lvl+0x8c/0xd0
[   34.776614]  print_report+0x118/0x5f0
[   34.776758]  kasan_report+0xc8/0x118
[   34.776898]  __asan_report_load1_noabort+0x20/0x30
[   34.777119]  ksize_uaf+0x59c/0x600
[   34.777515]  kunit_try_run_case+0x14c/0x3d0
[   34.777722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.777896]  kthread+0x318/0x618
[   34.778049]  ret_from_fork+0x10/0x20
[   34.778319] 
[   34.778417] Allocated by task 198:
[   34.778522]  kasan_save_stack+0x3c/0x68
[   34.778637]  kasan_save_track+0x20/0x40
[   34.778750]  kasan_save_alloc_info+0x40/0x58
[   34.778907]  __kasan_kmalloc+0xd4/0xd8
[   34.779137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.779284]  ksize_uaf+0xb8/0x600
[   34.779399]  kunit_try_run_case+0x14c/0x3d0
[   34.779524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.779686]  kthread+0x318/0x618
[   34.779860]  ret_from_fork+0x10/0x20
[   34.779977] 
[   34.780312] Freed by task 198:
[   34.780453]  kasan_save_stack+0x3c/0x68
[   34.780583]  kasan_save_track+0x20/0x40
[   34.780701]  kasan_save_free_info+0x4c/0x78
[   34.780832]  __kasan_slab_free+0x6c/0x98
[   34.780993]  kfree+0x214/0x3c8
[   34.781129]  ksize_uaf+0x11c/0x600
[   34.781250]  kunit_try_run_case+0x14c/0x3d0
[   34.781379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.781636]  kthread+0x318/0x618
[   34.781812]  ret_from_fork+0x10/0x20
[   34.782005] 
[   34.782111] The buggy address belongs to the object at fff00000c6818d00
[   34.782111]  which belongs to the cache kmalloc-128 of size 128
[   34.782329] The buggy address is located 0 bytes inside of
[   34.782329]  freed 128-byte region [fff00000c6818d00, fff00000c6818d80)
[   34.782565] 
[   34.782630] The buggy address belongs to the physical page:
[   34.782729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.782892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.783095] page_type: f5(slab)
[   34.783244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.783459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.783635] page dumped because: kasan: bad access detected
[   34.783762] 
[   34.783863] Memory state around the buggy address:
[   34.783986]  fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.784167]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.784303] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.784481]                    ^
[   34.784617]  fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.784755]  fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.784883] ==================================================================
[   34.759404] ==================================================================
[   34.759560] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   34.759740] Read of size 1 at addr fff00000c6818d00 by task kunit_try_catch/198
[   34.759954] 
[   34.760112] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.760549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.760737] Hardware name: linux,dummy-virt (DT)
[   34.760866] Call trace:
[   34.760938]  show_stack+0x20/0x38 (C)
[   34.761103]  dump_stack_lvl+0x8c/0xd0
[   34.761252]  print_report+0x118/0x5f0
[   34.761409]  kasan_report+0xc8/0x118
[   34.761656]  __kasan_check_byte+0x54/0x70
[   34.761837]  ksize+0x30/0x88
[   34.761977]  ksize_uaf+0x168/0x600
[   34.762200]  kunit_try_run_case+0x14c/0x3d0
[   34.762433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.762708]  kthread+0x318/0x618
[   34.762941]  ret_from_fork+0x10/0x20
[   34.763660] 
[   34.763730] Allocated by task 198:
[   34.763817]  kasan_save_stack+0x3c/0x68
[   34.763945]  kasan_save_track+0x20/0x40
[   34.764080]  kasan_save_alloc_info+0x40/0x58
[   34.764582]  __kasan_kmalloc+0xd4/0xd8
[   34.764717]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.764848]  ksize_uaf+0xb8/0x600
[   34.764959]  kunit_try_run_case+0x14c/0x3d0
[   34.765145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.765366]  kthread+0x318/0x618
[   34.765497]  ret_from_fork+0x10/0x20
[   34.765680] 
[   34.765786] Freed by task 198:
[   34.765878]  kasan_save_stack+0x3c/0x68
[   34.766031]  kasan_save_track+0x20/0x40
[   34.766244]  kasan_save_free_info+0x4c/0x78
[   34.766452]  __kasan_slab_free+0x6c/0x98
[   34.766590]  kfree+0x214/0x3c8
[   34.766702]  ksize_uaf+0x11c/0x600
[   34.766815]  kunit_try_run_case+0x14c/0x3d0
[   34.766954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.767115]  kthread+0x318/0x618
[   34.767233]  ret_from_fork+0x10/0x20
[   34.768022] 
[   34.768116] The buggy address belongs to the object at fff00000c6818d00
[   34.768116]  which belongs to the cache kmalloc-128 of size 128
[   34.768310] The buggy address is located 0 bytes inside of
[   34.768310]  freed 128-byte region [fff00000c6818d00, fff00000c6818d80)
[   34.769374] 
[   34.769448] The buggy address belongs to the physical page:
[   34.769547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.769740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.769965] page_type: f5(slab)
[   34.770105] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.770277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.770428] page dumped because: kasan: bad access detected
[   34.770574] 
[   34.770630] Memory state around the buggy address:
[   34.770744]  fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.770980]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.771154] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.771282]                    ^
[   34.771373]  fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.772075]  fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.772326] ==================================================================
[   34.786873] ==================================================================
[   34.787025] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   34.787191] Read of size 1 at addr fff00000c6818d78 by task kunit_try_catch/198
[   34.787351] 
[   34.787437] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.788657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.788788] Hardware name: linux,dummy-virt (DT)
[   34.789527] Call trace:
[   34.789678]  show_stack+0x20/0x38 (C)
[   34.789888]  dump_stack_lvl+0x8c/0xd0
[   34.790067]  print_report+0x118/0x5f0
[   34.790217]  kasan_report+0xc8/0x118
[   34.790354]  __asan_report_load1_noabort+0x20/0x30
[   34.790513]  ksize_uaf+0x548/0x600
[   34.790661]  kunit_try_run_case+0x14c/0x3d0
[   34.790825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.791046]  kthread+0x318/0x618
[   34.791279]  ret_from_fork+0x10/0x20
[   34.791476] 
[   34.791536] Allocated by task 198:
[   34.791680]  kasan_save_stack+0x3c/0x68
[   34.791862]  kasan_save_track+0x20/0x40
[   34.791977]  kasan_save_alloc_info+0x40/0x58
[   34.792140]  __kasan_kmalloc+0xd4/0xd8
[   34.792254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.792495]  ksize_uaf+0xb8/0x600
[   34.792649]  kunit_try_run_case+0x14c/0x3d0
[   34.792779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.792926]  kthread+0x318/0x618
[   34.793047]  ret_from_fork+0x10/0x20
[   34.793203] 
[   34.793290] Freed by task 198:
[   34.793434]  kasan_save_stack+0x3c/0x68
[   34.793618]  kasan_save_track+0x20/0x40
[   34.793808]  kasan_save_free_info+0x4c/0x78
[   34.794006]  __kasan_slab_free+0x6c/0x98
[   34.794154]  kfree+0x214/0x3c8
[   34.794267]  ksize_uaf+0x11c/0x600
[   34.794380]  kunit_try_run_case+0x14c/0x3d0
[   34.794533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.794726]  kthread+0x318/0x618
[   34.794917]  ret_from_fork+0x10/0x20
[   34.795148] 
[   34.795209] The buggy address belongs to the object at fff00000c6818d00
[   34.795209]  which belongs to the cache kmalloc-128 of size 128
[   34.795773] The buggy address is located 120 bytes inside of
[   34.795773]  freed 128-byte region [fff00000c6818d00, fff00000c6818d80)
[   34.796086] 
[   34.796157] The buggy address belongs to the physical page:
[   34.796253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.796447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.796619] page_type: f5(slab)
[   34.796847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.797121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.797764] page dumped because: kasan: bad access detected
[   34.797945] 
[   34.798008] Memory state around the buggy address:
[   34.798129]  fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.798276]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.798422] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.798554]                                                                 ^
[   34.798705]  fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.798840]  fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.799390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   34.684488] ==================================================================
[   34.684656] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   34.684918] Read of size 1 at addr fff00000c6818c73 by task kunit_try_catch/196
[   34.685111] 
[   34.685207] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.685485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.685578] Hardware name: linux,dummy-virt (DT)
[   34.685681] Call trace:
[   34.685747]  show_stack+0x20/0x38 (C)
[   34.685906]  dump_stack_lvl+0x8c/0xd0
[   34.686069]  print_report+0x118/0x5f0
[   34.686736]  kasan_report+0xc8/0x118
[   34.686876]  __asan_report_load1_noabort+0x20/0x30
[   34.688845]  ksize_unpoisons_memory+0x638/0x750
[   34.689954]  kunit_try_run_case+0x14c/0x3d0
[   34.690677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.691173]  kthread+0x318/0x618
[   34.691386]  ret_from_fork+0x10/0x20
[   34.691544] 
[   34.691600] Allocated by task 196:
[   34.692260]  kasan_save_stack+0x3c/0x68
[   34.692745]  kasan_save_track+0x20/0x40
[   34.693209]  kasan_save_alloc_info+0x40/0x58
[   34.693908]  __kasan_kmalloc+0xd4/0xd8
[   34.694078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.694217]  ksize_unpoisons_memory+0xc0/0x750
[   34.694375]  kunit_try_run_case+0x14c/0x3d0
[   34.695341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.695527]  kthread+0x318/0x618
[   34.695640]  ret_from_fork+0x10/0x20
[   34.696043] 
[   34.696466] The buggy address belongs to the object at fff00000c6818c00
[   34.696466]  which belongs to the cache kmalloc-128 of size 128
[   34.696677] The buggy address is located 0 bytes to the right of
[   34.696677]  allocated 115-byte region [fff00000c6818c00, fff00000c6818c73)
[   34.696878] 
[   34.697278] The buggy address belongs to the physical page:
[   34.697811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.697990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.698525] page_type: f5(slab)
[   34.698773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.699044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.699208] page dumped because: kasan: bad access detected
[   34.699319] 
[   34.699376] Memory state around the buggy address:
[   34.699841]  fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.700187]  fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700339] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.700539]                                                              ^
[   34.700691]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700887]  fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.701020] ==================================================================
[   34.703110] ==================================================================
[   34.703243] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   34.703393] Read of size 1 at addr fff00000c6818c78 by task kunit_try_catch/196
[   34.703580] 
[   34.703895] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.704196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.704281] Hardware name: linux,dummy-virt (DT)
[   34.704683] Call trace:
[   34.704826]  show_stack+0x20/0x38 (C)
[   34.705460]  dump_stack_lvl+0x8c/0xd0
[   34.705704]  print_report+0x118/0x5f0
[   34.706398]  kasan_report+0xc8/0x118
[   34.706905]  __asan_report_load1_noabort+0x20/0x30
[   34.707225]  ksize_unpoisons_memory+0x628/0x750
[   34.707499]  kunit_try_run_case+0x14c/0x3d0
[   34.707997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.708220]  kthread+0x318/0x618
[   34.708878]  ret_from_fork+0x10/0x20
[   34.708994] 
[   34.709028] Allocated by task 196:
[   34.709472]  kasan_save_stack+0x3c/0x68
[   34.709630]  kasan_save_track+0x20/0x40
[   34.709753]  kasan_save_alloc_info+0x40/0x58
[   34.709880]  __kasan_kmalloc+0xd4/0xd8
[   34.709990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.710286]  ksize_unpoisons_memory+0xc0/0x750
[   34.710430]  kunit_try_run_case+0x14c/0x3d0
[   34.710564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.710717]  kthread+0x318/0x618
[   34.710845]  ret_from_fork+0x10/0x20
[   34.711005] 
[   34.711091] The buggy address belongs to the object at fff00000c6818c00
[   34.711091]  which belongs to the cache kmalloc-128 of size 128
[   34.711374] The buggy address is located 5 bytes to the right of
[   34.711374]  allocated 115-byte region [fff00000c6818c00, fff00000c6818c73)
[   34.711719] 
[   34.711821] The buggy address belongs to the physical page:
[   34.711974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.712189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.712390] page_type: f5(slab)
[   34.712506] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.712681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.712845] page dumped because: kasan: bad access detected
[   34.712949] 
[   34.713004] Memory state around the buggy address:
[   34.713147]  fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.713445]  fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.713627] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.713754]                                                                 ^
[   34.713882]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.714026]  fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.714197] ==================================================================
[   34.716776] ==================================================================
[   34.716920] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   34.717095] Read of size 1 at addr fff00000c6818c7f by task kunit_try_catch/196
[   34.717253] 
[   34.717477] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.717808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.717949] Hardware name: linux,dummy-virt (DT)
[   34.718085] Call trace:
[   34.718182]  show_stack+0x20/0x38 (C)
[   34.718372]  dump_stack_lvl+0x8c/0xd0
[   34.718531]  print_report+0x118/0x5f0
[   34.718907]  kasan_report+0xc8/0x118
[   34.719114]  __asan_report_load1_noabort+0x20/0x30
[   34.719363]  ksize_unpoisons_memory+0x6a0/0x750
[   34.719617]  kunit_try_run_case+0x14c/0x3d0
[   34.719861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.720157]  kthread+0x318/0x618
[   34.720390]  ret_from_fork+0x10/0x20
[   34.720602] 
[   34.720658] Allocated by task 196:
[   34.720767]  kasan_save_stack+0x3c/0x68
[   34.720961]  kasan_save_track+0x20/0x40
[   34.721121]  kasan_save_alloc_info+0x40/0x58
[   34.721240]  __kasan_kmalloc+0xd4/0xd8
[   34.721795]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.722020]  ksize_unpoisons_memory+0xc0/0x750
[   34.722213]  kunit_try_run_case+0x14c/0x3d0
[   34.722377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.722664]  kthread+0x318/0x618
[   34.722873]  ret_from_fork+0x10/0x20
[   34.723021] 
[   34.723098] The buggy address belongs to the object at fff00000c6818c00
[   34.723098]  which belongs to the cache kmalloc-128 of size 128
[   34.723338] The buggy address is located 12 bytes to the right of
[   34.723338]  allocated 115-byte region [fff00000c6818c00, fff00000c6818c73)
[   34.723593] 
[   34.723660] The buggy address belongs to the physical page:
[   34.723764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.723923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.724153] page_type: f5(slab)
[   34.724544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.724737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.725492] page dumped because: kasan: bad access detected
[   34.725606] 
[   34.725666] Memory state around the buggy address:
[   34.726638]  fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.727192]  fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.727490] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.727756]                                                                 ^
[   34.728260]  fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.728846]  fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.729130] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   34.643350] ==================================================================
[   34.643532] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   34.643670] Free of addr fff00000c5d8b060 by task kunit_try_catch/194
[   34.643810] 
[   34.643904] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.644237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.644329] Hardware name: linux,dummy-virt (DT)
[   34.644734] Call trace:
[   34.645041]  show_stack+0x20/0x38 (C)
[   34.645357]  dump_stack_lvl+0x8c/0xd0
[   34.645574]  print_report+0x118/0x5f0
[   34.645757]  kasan_report_invalid_free+0xb0/0xd8
[   34.645919]  check_slab_allocation+0xd4/0x108
[   34.646089]  __kasan_slab_pre_free+0x2c/0x48
[   34.646270]  kfree+0xe8/0x3c8
[   34.646420]  kfree_sensitive+0x3c/0xb0
[   34.646556]  kmalloc_double_kzfree+0x168/0x308
[   34.646716]  kunit_try_run_case+0x14c/0x3d0
[   34.647244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.647441]  kthread+0x318/0x618
[   34.647589]  ret_from_fork+0x10/0x20
[   34.647743] 
[   34.647803] Allocated by task 194:
[   34.647904]  kasan_save_stack+0x3c/0x68
[   34.648074]  kasan_save_track+0x20/0x40
[   34.648185]  kasan_save_alloc_info+0x40/0x58
[   34.648612]  __kasan_kmalloc+0xd4/0xd8
[   34.648892]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.649218]  kmalloc_double_kzfree+0xb8/0x308
[   34.649382]  kunit_try_run_case+0x14c/0x3d0
[   34.649516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.649665]  kthread+0x318/0x618
[   34.650246]  ret_from_fork+0x10/0x20
[   34.650745] 
[   34.650952] Freed by task 194:
[   34.651178]  kasan_save_stack+0x3c/0x68
[   34.651365]  kasan_save_track+0x20/0x40
[   34.651588]  kasan_save_free_info+0x4c/0x78
[   34.652357]  __kasan_slab_free+0x6c/0x98
[   34.652869]  kfree+0x214/0x3c8
[   34.653391]  kfree_sensitive+0x80/0xb0
[   34.653540]  kmalloc_double_kzfree+0x11c/0x308
[   34.653672]  kunit_try_run_case+0x14c/0x3d0
[   34.654213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.654827]  kthread+0x318/0x618
[   34.654995]  ret_from_fork+0x10/0x20
[   34.655140] 
[   34.655211] The buggy address belongs to the object at fff00000c5d8b060
[   34.655211]  which belongs to the cache kmalloc-16 of size 16
[   34.655421] The buggy address is located 0 bytes inside of
[   34.655421]  16-byte region [fff00000c5d8b060, fff00000c5d8b070)
[   34.655730] 
[   34.655839] The buggy address belongs to the physical page:
[   34.655972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b
[   34.656161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.656332] page_type: f5(slab)
[   34.656520] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.656730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.656907] page dumped because: kasan: bad access detected
[   34.657421] 
[   34.657491] Memory state around the buggy address:
[   34.657594]  fff00000c5d8af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.657730]  fff00000c5d8af80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   34.658092] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.658227]                                                        ^
[   34.658352]  fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.658559]  fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.658764] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   34.620096] ==================================================================
[   34.620279] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   34.621414] Read of size 1 at addr fff00000c5d8b060 by task kunit_try_catch/194
[   34.621689] 
[   34.621857] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.622568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.622677] Hardware name: linux,dummy-virt (DT)
[   34.622789] Call trace:
[   34.623133]  show_stack+0x20/0x38 (C)
[   34.623799]  dump_stack_lvl+0x8c/0xd0
[   34.624020]  print_report+0x118/0x5f0
[   34.624408]  kasan_report+0xc8/0x118
[   34.624865]  __kasan_check_byte+0x54/0x70
[   34.625080]  kfree_sensitive+0x30/0xb0
[   34.625667]  kmalloc_double_kzfree+0x168/0x308
[   34.626072]  kunit_try_run_case+0x14c/0x3d0
[   34.626265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.626434]  kthread+0x318/0x618
[   34.627354]  ret_from_fork+0x10/0x20
[   34.627524] 
[   34.627713] Allocated by task 194:
[   34.628308]  kasan_save_stack+0x3c/0x68
[   34.628721]  kasan_save_track+0x20/0x40
[   34.629089]  kasan_save_alloc_info+0x40/0x58
[   34.629293]  __kasan_kmalloc+0xd4/0xd8
[   34.629786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.629974]  kmalloc_double_kzfree+0xb8/0x308
[   34.630503]  kunit_try_run_case+0x14c/0x3d0
[   34.630804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.631329]  kthread+0x318/0x618
[   34.631790]  ret_from_fork+0x10/0x20
[   34.632178] 
[   34.632252] Freed by task 194:
[   34.632534]  kasan_save_stack+0x3c/0x68
[   34.632754]  kasan_save_track+0x20/0x40
[   34.632880]  kasan_save_free_info+0x4c/0x78
[   34.633006]  __kasan_slab_free+0x6c/0x98
[   34.633453]  kfree+0x214/0x3c8
[   34.633705]  kfree_sensitive+0x80/0xb0
[   34.633903]  kmalloc_double_kzfree+0x11c/0x308
[   34.634073]  kunit_try_run_case+0x14c/0x3d0
[   34.634373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.634780]  kthread+0x318/0x618
[   34.634985]  ret_from_fork+0x10/0x20
[   34.635258] 
[   34.635329] The buggy address belongs to the object at fff00000c5d8b060
[   34.635329]  which belongs to the cache kmalloc-16 of size 16
[   34.635810] The buggy address is located 0 bytes inside of
[   34.635810]  freed 16-byte region [fff00000c5d8b060, fff00000c5d8b070)
[   34.636188] 
[   34.636367] The buggy address belongs to the physical page:
[   34.636485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b
[   34.636813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.637313] page_type: f5(slab)
[   34.637467] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.637624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.637756] page dumped because: kasan: bad access detected
[   34.638004] 
[   34.638221] Memory state around the buggy address:
[   34.638451]  fff00000c5d8af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.638629]  fff00000c5d8af80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   34.639282] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.639573]                                                        ^
[   34.639832]  fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.640010]  fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.640269] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   34.548774] ==================================================================
[   34.549098] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   34.549255] Read of size 1 at addr fff00000c5d89da8 by task kunit_try_catch/190
[   34.549420] 
[   34.549510] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.550110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.550367] Hardware name: linux,dummy-virt (DT)
[   34.550610] Call trace:
[   34.550856]  show_stack+0x20/0x38 (C)
[   34.551196]  dump_stack_lvl+0x8c/0xd0
[   34.551467]  print_report+0x118/0x5f0
[   34.551980]  kasan_report+0xc8/0x118
[   34.552430]  __asan_report_load1_noabort+0x20/0x30
[   34.552699]  kmalloc_uaf2+0x3f4/0x468
[   34.553147]  kunit_try_run_case+0x14c/0x3d0
[   34.553660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.554268]  kthread+0x318/0x618
[   34.554651]  ret_from_fork+0x10/0x20
[   34.555232] 
[   34.555323] Allocated by task 190:
[   34.555426]  kasan_save_stack+0x3c/0x68
[   34.555919]  kasan_save_track+0x20/0x40
[   34.556338]  kasan_save_alloc_info+0x40/0x58
[   34.557103]  __kasan_kmalloc+0xd4/0xd8
[   34.557225]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.557378]  kmalloc_uaf2+0xc4/0x468
[   34.557495]  kunit_try_run_case+0x14c/0x3d0
[   34.557624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.557763]  kthread+0x318/0x618
[   34.557865]  ret_from_fork+0x10/0x20
[   34.558566] 
[   34.558643] Freed by task 190:
[   34.558895]  kasan_save_stack+0x3c/0x68
[   34.559047]  kasan_save_track+0x20/0x40
[   34.559191]  kasan_save_free_info+0x4c/0x78
[   34.559312]  __kasan_slab_free+0x6c/0x98
[   34.559572]  kfree+0x214/0x3c8
[   34.560012]  kmalloc_uaf2+0x134/0x468
[   34.560530]  kunit_try_run_case+0x14c/0x3d0
[   34.560688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.560842]  kthread+0x318/0x618
[   34.561144]  ret_from_fork+0x10/0x20
[   34.561417] 
[   34.561482] The buggy address belongs to the object at fff00000c5d89d80
[   34.561482]  which belongs to the cache kmalloc-64 of size 64
[   34.561981] The buggy address is located 40 bytes inside of
[   34.561981]  freed 64-byte region [fff00000c5d89d80, fff00000c5d89dc0)
[   34.562613] 
[   34.562707] The buggy address belongs to the physical page:
[   34.562859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89
[   34.563403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.563590] page_type: f5(slab)
[   34.563712] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.564264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.564575] page dumped because: kasan: bad access detected
[   34.564986] 
[   34.565297] Memory state around the buggy address:
[   34.565546]  fff00000c5d89c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.565706]  fff00000c5d89d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.565897] >fff00000c5d89d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.566220]                                   ^
[   34.566496]  fff00000c5d89e00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   34.566663]  fff00000c5d89e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.566793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   34.499710] ==================================================================
[   34.499870] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   34.500025] Write of size 33 at addr fff00000c5d89c00 by task kunit_try_catch/188
[   34.501976] 
[   34.503044] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.504820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.505477] Hardware name: linux,dummy-virt (DT)
[   34.505779] Call trace:
[   34.506046]  show_stack+0x20/0x38 (C)
[   34.506834]  dump_stack_lvl+0x8c/0xd0
[   34.507563]  print_report+0x118/0x5f0
[   34.508272]  kasan_report+0xc8/0x118
[   34.509550]  kasan_check_range+0x100/0x1a8
[   34.509819]  __asan_memset+0x34/0x78
[   34.509967]  kmalloc_uaf_memset+0x170/0x310
[   34.510145]  kunit_try_run_case+0x14c/0x3d0
[   34.510785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.511886]  kthread+0x318/0x618
[   34.512583]  ret_from_fork+0x10/0x20
[   34.513281] 
[   34.513605] Allocated by task 188:
[   34.513701]  kasan_save_stack+0x3c/0x68
[   34.514558]  kasan_save_track+0x20/0x40
[   34.514693]  kasan_save_alloc_info+0x40/0x58
[   34.515425]  __kasan_kmalloc+0xd4/0xd8
[   34.515869]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.516832]  kmalloc_uaf_memset+0xb8/0x310
[   34.516985]  kunit_try_run_case+0x14c/0x3d0
[   34.517860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.518398]  kthread+0x318/0x618
[   34.518547]  ret_from_fork+0x10/0x20
[   34.518668] 
[   34.518729] Freed by task 188:
[   34.519415]  kasan_save_stack+0x3c/0x68
[   34.519784]  kasan_save_track+0x20/0x40
[   34.520648]  kasan_save_free_info+0x4c/0x78
[   34.521617]  __kasan_slab_free+0x6c/0x98
[   34.521831]  kfree+0x214/0x3c8
[   34.522208]  kmalloc_uaf_memset+0x11c/0x310
[   34.522686]  kunit_try_run_case+0x14c/0x3d0
[   34.522990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.523757]  kthread+0x318/0x618
[   34.524689]  ret_from_fork+0x10/0x20
[   34.525314] 
[   34.525590] The buggy address belongs to the object at fff00000c5d89c00
[   34.525590]  which belongs to the cache kmalloc-64 of size 64
[   34.526081] The buggy address is located 0 bytes inside of
[   34.526081]  freed 64-byte region [fff00000c5d89c00, fff00000c5d89c40)
[   34.526299] 
[   34.526373] The buggy address belongs to the physical page:
[   34.527396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89
[   34.528268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.528459] page_type: f5(slab)
[   34.528583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.528746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.529506] page dumped because: kasan: bad access detected
[   34.529867] 
[   34.530163] Memory state around the buggy address:
[   34.530320]  fff00000c5d89b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.530464]  fff00000c5d89b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.530606] >fff00000c5d89c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.530728]                    ^
[   34.530815]  fff00000c5d89c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.531032]  fff00000c5d89d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.531230] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   34.456239] ==================================================================
[   34.456499] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   34.456673] Read of size 1 at addr fff00000c5d8b048 by task kunit_try_catch/186
[   34.456921] 
[   34.457097] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.457529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.457679] Hardware name: linux,dummy-virt (DT)
[   34.457782] Call trace:
[   34.457852]  show_stack+0x20/0x38 (C)
[   34.458003]  dump_stack_lvl+0x8c/0xd0
[   34.458166]  print_report+0x118/0x5f0
[   34.458302]  kasan_report+0xc8/0x118
[   34.458462]  __asan_report_load1_noabort+0x20/0x30
[   34.458617]  kmalloc_uaf+0x300/0x338
[   34.458759]  kunit_try_run_case+0x14c/0x3d0
[   34.458914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.459129]  kthread+0x318/0x618
[   34.459435]  ret_from_fork+0x10/0x20
[   34.459607] 
[   34.459683] Allocated by task 186:
[   34.459819]  kasan_save_stack+0x3c/0x68
[   34.459952]  kasan_save_track+0x20/0x40
[   34.460129]  kasan_save_alloc_info+0x40/0x58
[   34.460299]  __kasan_kmalloc+0xd4/0xd8
[   34.460460]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.460617]  kmalloc_uaf+0xb8/0x338
[   34.460870]  kunit_try_run_case+0x14c/0x3d0
[   34.461170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.461375]  kthread+0x318/0x618
[   34.461492]  ret_from_fork+0x10/0x20
[   34.461599] 
[   34.461662] Freed by task 186:
[   34.461760]  kasan_save_stack+0x3c/0x68
[   34.461889]  kasan_save_track+0x20/0x40
[   34.462558]  kasan_save_free_info+0x4c/0x78
[   34.462719]  __kasan_slab_free+0x6c/0x98
[   34.462843]  kfree+0x214/0x3c8
[   34.463047]  kmalloc_uaf+0x11c/0x338
[   34.463746]  kunit_try_run_case+0x14c/0x3d0
[   34.463897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.464152]  kthread+0x318/0x618
[   34.464521]  ret_from_fork+0x10/0x20
[   34.464792] 
[   34.464878] The buggy address belongs to the object at fff00000c5d8b040
[   34.464878]  which belongs to the cache kmalloc-16 of size 16
[   34.465078] The buggy address is located 8 bytes inside of
[   34.465078]  freed 16-byte region [fff00000c5d8b040, fff00000c5d8b050)
[   34.465849] 
[   34.465918] The buggy address belongs to the physical page:
[   34.466025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b
[   34.466215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.466425] page_type: f5(slab)
[   34.466542] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.466706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.466849] page dumped because: kasan: bad access detected
[   34.466964] 
[   34.467024] Memory state around the buggy address:
[   34.467727]  fff00000c5d8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.468015]  fff00000c5d8af80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   34.468878] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   34.469186]                                               ^
[   34.469317]  fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.469497]  fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.469634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   34.415293] ==================================================================
[   34.415970] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   34.416178] Read of size 64 at addr fff00000c5d89904 by task kunit_try_catch/184
[   34.416340] 
[   34.416436] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.417342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417451] Hardware name: linux,dummy-virt (DT)
[   34.417555] Call trace:
[   34.417629]  show_stack+0x20/0x38 (C)
[   34.417779]  dump_stack_lvl+0x8c/0xd0
[   34.417928]  print_report+0x118/0x5f0
[   34.418676]  kasan_report+0xc8/0x118
[   34.418952]  kasan_check_range+0x100/0x1a8
[   34.419153]  __asan_memmove+0x3c/0x98
[   34.419374]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   34.419579]  kunit_try_run_case+0x14c/0x3d0
[   34.419739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.419982]  kthread+0x318/0x618
[   34.420217]  ret_from_fork+0x10/0x20
[   34.420423] 
[   34.420517] Allocated by task 184:
[   34.420667]  kasan_save_stack+0x3c/0x68
[   34.420872]  kasan_save_track+0x20/0x40
[   34.420984]  kasan_save_alloc_info+0x40/0x58
[   34.421154]  __kasan_kmalloc+0xd4/0xd8
[   34.421270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.421445]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   34.421583]  kunit_try_run_case+0x14c/0x3d0
[   34.421785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.421945]  kthread+0x318/0x618
[   34.422142]  ret_from_fork+0x10/0x20
[   34.422304] 
[   34.422408] The buggy address belongs to the object at fff00000c5d89900
[   34.422408]  which belongs to the cache kmalloc-64 of size 64
[   34.422712] The buggy address is located 4 bytes inside of
[   34.422712]  allocated 64-byte region [fff00000c5d89900, fff00000c5d89940)
[   34.422942] 
[   34.423016] The buggy address belongs to the physical page:
[   34.423134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89
[   34.423305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.423460] page_type: f5(slab)
[   34.423571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.423734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.423878] page dumped because: kasan: bad access detected
[   34.423984] 
[   34.424047] Memory state around the buggy address:
[   34.424600]  fff00000c5d89800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.425044]  fff00000c5d89880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.425392] >fff00000c5d89900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   34.425884]                                            ^
[   34.426278]  fff00000c5d89980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.427220]  fff00000c5d89a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.427755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   34.356211] ==================================================================
[   34.356413] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   34.356568] Read of size 18446744073709551614 at addr fff00000c5d89704 by task kunit_try_catch/182
[   34.356883] 
[   34.356998] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.357335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.357422] Hardware name: linux,dummy-virt (DT)
[   34.358016] Call trace:
[   34.358114]  show_stack+0x20/0x38 (C)
[   34.358272]  dump_stack_lvl+0x8c/0xd0
[   34.358415]  print_report+0x118/0x5f0
[   34.358610]  kasan_report+0xc8/0x118
[   34.358749]  kasan_check_range+0x100/0x1a8
[   34.358910]  __asan_memmove+0x3c/0x98
[   34.359095]  kmalloc_memmove_negative_size+0x154/0x2e0
[   34.359270]  kunit_try_run_case+0x14c/0x3d0
[   34.359444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.359670]  kthread+0x318/0x618
[   34.359813]  ret_from_fork+0x10/0x20
[   34.360034] 
[   34.360117] Allocated by task 182:
[   34.360203]  kasan_save_stack+0x3c/0x68
[   34.360459]  kasan_save_track+0x20/0x40
[   34.360611]  kasan_save_alloc_info+0x40/0x58
[   34.360912]  __kasan_kmalloc+0xd4/0xd8
[   34.361267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.361523]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   34.361665]  kunit_try_run_case+0x14c/0x3d0
[   34.362315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.362670]  kthread+0x318/0x618
[   34.362811]  ret_from_fork+0x10/0x20
[   34.363415] 
[   34.363488] The buggy address belongs to the object at fff00000c5d89700
[   34.363488]  which belongs to the cache kmalloc-64 of size 64
[   34.364008] The buggy address is located 4 bytes inside of
[   34.364008]  64-byte region [fff00000c5d89700, fff00000c5d89740)
[   34.364541] 
[   34.364940] The buggy address belongs to the physical page:
[   34.365082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89
[   34.365610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.365781] page_type: f5(slab)
[   34.366107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.366590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.366745] page dumped because: kasan: bad access detected
[   34.366851] 
[   34.367531] Memory state around the buggy address:
[   34.367790]  fff00000c5d89600: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   34.368217]  fff00000c5d89680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.368569] >fff00000c5d89700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   34.368692]                    ^
[   34.368784]  fff00000c5d89780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.369478]  fff00000c5d89800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.369891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   34.311864] ==================================================================
[   34.312019] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   34.312819] Write of size 16 at addr fff00000c6818b69 by task kunit_try_catch/180
[   34.313185] 
[   34.313464] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.313848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.314274] Hardware name: linux,dummy-virt (DT)
[   34.314398] Call trace:
[   34.314471]  show_stack+0x20/0x38 (C)
[   34.314623]  dump_stack_lvl+0x8c/0xd0
[   34.314817]  print_report+0x118/0x5f0
[   34.314978]  kasan_report+0xc8/0x118
[   34.315134]  kasan_check_range+0x100/0x1a8
[   34.315370]  __asan_memset+0x34/0x78
[   34.315813]  kmalloc_oob_memset_16+0x150/0x2f8
[   34.316124]  kunit_try_run_case+0x14c/0x3d0
[   34.316629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.317102]  kthread+0x318/0x618
[   34.317489]  ret_from_fork+0x10/0x20
[   34.317637] 
[   34.319114] Allocated by task 180:
[   34.319212]  kasan_save_stack+0x3c/0x68
[   34.319335]  kasan_save_track+0x20/0x40
[   34.319444]  kasan_save_alloc_info+0x40/0x58
[   34.319562]  __kasan_kmalloc+0xd4/0xd8
[   34.319671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.319785]  kmalloc_oob_memset_16+0xb0/0x2f8
[   34.319901]  kunit_try_run_case+0x14c/0x3d0
[   34.320012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320175]  kthread+0x318/0x618
[   34.320427]  ret_from_fork+0x10/0x20
[   34.320614] 
[   34.320743] The buggy address belongs to the object at fff00000c6818b00
[   34.320743]  which belongs to the cache kmalloc-128 of size 128
[   34.320930] The buggy address is located 105 bytes inside of
[   34.320930]  allocated 120-byte region [fff00000c6818b00, fff00000c6818b78)
[   34.321218] 
[   34.321481] The buggy address belongs to the physical page:
[   34.323412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.323589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.324524] page_type: f5(slab)
[   34.324631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.324806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.324939] page dumped because: kasan: bad access detected
[   34.325036] 
[   34.325117] Memory state around the buggy address:
[   34.325216]  fff00000c6818a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.325353]  fff00000c6818a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.325488] >fff00000c6818b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.325604]                                                                 ^
[   34.325727]  fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.325856]  fff00000c6818c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.325973] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   34.267400] ==================================================================
[   34.267680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   34.267838] Write of size 8 at addr fff00000c6818a71 by task kunit_try_catch/178
[   34.267994] 
[   34.268104] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.268603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.268935] Hardware name: linux,dummy-virt (DT)
[   34.269399] Call trace:
[   34.269479]  show_stack+0x20/0x38 (C)
[   34.269747]  dump_stack_lvl+0x8c/0xd0
[   34.269997]  print_report+0x118/0x5f0
[   34.270522]  kasan_report+0xc8/0x118
[   34.270696]  kasan_check_range+0x100/0x1a8
[   34.270846]  __asan_memset+0x34/0x78
[   34.271204]  kmalloc_oob_memset_8+0x150/0x2f8
[   34.271841]  kunit_try_run_case+0x14c/0x3d0
[   34.272025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.272649]  kthread+0x318/0x618
[   34.272977]  ret_from_fork+0x10/0x20
[   34.273554] 
[   34.273666] Allocated by task 178:
[   34.273756]  kasan_save_stack+0x3c/0x68
[   34.274184]  kasan_save_track+0x20/0x40
[   34.274307]  kasan_save_alloc_info+0x40/0x58
[   34.274439]  __kasan_kmalloc+0xd4/0xd8
[   34.274706]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.275293]  kmalloc_oob_memset_8+0xb0/0x2f8
[   34.275787]  kunit_try_run_case+0x14c/0x3d0
[   34.275925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.276085]  kthread+0x318/0x618
[   34.276203]  ret_from_fork+0x10/0x20
[   34.276450] 
[   34.276770] The buggy address belongs to the object at fff00000c6818a00
[   34.276770]  which belongs to the cache kmalloc-128 of size 128
[   34.277421] The buggy address is located 113 bytes inside of
[   34.277421]  allocated 120-byte region [fff00000c6818a00, fff00000c6818a78)
[   34.277759] 
[   34.277821] The buggy address belongs to the physical page:
[   34.278197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.278480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.278633] page_type: f5(slab)
[   34.278878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.279428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.279794] page dumped because: kasan: bad access detected
[   34.280025] 
[   34.280109] Memory state around the buggy address:
[   34.280553]  fff00000c6818900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.280709]  fff00000c6818980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.280851] >fff00000c6818a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.281335]                                                                 ^
[   34.281675]  fff00000c6818a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.281963]  fff00000c6818b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.282108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   34.227938] ==================================================================
[   34.228111] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   34.228257] Write of size 4 at addr fff00000c6818975 by task kunit_try_catch/176
[   34.228420] 
[   34.228512] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.228787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.228874] Hardware name: linux,dummy-virt (DT)
[   34.228972] Call trace:
[   34.229039]  show_stack+0x20/0x38 (C)
[   34.229345]  dump_stack_lvl+0x8c/0xd0
[   34.229529]  print_report+0x118/0x5f0
[   34.229667]  kasan_report+0xc8/0x118
[   34.229803]  kasan_check_range+0x100/0x1a8
[   34.230027]  __asan_memset+0x34/0x78
[   34.230203]  kmalloc_oob_memset_4+0x150/0x300
[   34.230355]  kunit_try_run_case+0x14c/0x3d0
[   34.230499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.230700]  kthread+0x318/0x618
[   34.230843]  ret_from_fork+0x10/0x20
[   34.231072] 
[   34.231232] Allocated by task 176:
[   34.231387]  kasan_save_stack+0x3c/0x68
[   34.231542]  kasan_save_track+0x20/0x40
[   34.231657]  kasan_save_alloc_info+0x40/0x58
[   34.231774]  __kasan_kmalloc+0xd4/0xd8
[   34.231885]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.232015]  kmalloc_oob_memset_4+0xb0/0x300
[   34.232163]  kunit_try_run_case+0x14c/0x3d0
[   34.232286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.232440]  kthread+0x318/0x618
[   34.232556]  ret_from_fork+0x10/0x20
[   34.232671] 
[   34.232769] The buggy address belongs to the object at fff00000c6818900
[   34.232769]  which belongs to the cache kmalloc-128 of size 128
[   34.233027] The buggy address is located 117 bytes inside of
[   34.233027]  allocated 120-byte region [fff00000c6818900, fff00000c6818978)
[   34.233299] 
[   34.233397] The buggy address belongs to the physical page:
[   34.233498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.233659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.233796] page_type: f5(slab)
[   34.233930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.234621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.234864] page dumped because: kasan: bad access detected
[   34.234974] 
[   34.235528] Memory state around the buggy address:
[   34.235733]  fff00000c6818800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.236395]  fff00000c6818880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.237410] >fff00000c6818900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.237710]                                                                 ^
[   34.238103]  fff00000c6818980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.239264]  fff00000c6818a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.239745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   33.667873] ==================================================================
[   33.669300] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   33.669601] Read of size 1 at addr fff00000c7760000 by task kunit_try_catch/156
[   33.671038] 
[   33.671296] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.672131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.672349] Hardware name: linux,dummy-virt (DT)
[   33.672571] Call trace:
[   33.672682]  show_stack+0x20/0x38 (C)
[   33.672860]  dump_stack_lvl+0x8c/0xd0
[   33.673150]  print_report+0x118/0x5f0
[   33.673848]  kasan_report+0xc8/0x118
[   33.674006]  __asan_report_load1_noabort+0x20/0x30
[   33.674277]  page_alloc_uaf+0x328/0x350
[   33.674750]  kunit_try_run_case+0x14c/0x3d0
[   33.675038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.675250]  kthread+0x318/0x618
[   33.675404]  ret_from_fork+0x10/0x20
[   33.676193] 
[   33.676300] The buggy address belongs to the physical page:
[   33.676509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760
[   33.677198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.677507] page_type: f0(buddy)
[   33.678172] raw: 0bfffe0000000000 fff00000ff6160c8 fff00000ff6160c8 0000000000000000
[   33.678433] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   33.678590] page dumped because: kasan: bad access detected
[   33.678796] 
[   33.678856] Memory state around the buggy address:
[   33.679096]  fff00000c775ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.679260]  fff00000c775ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.679398] >fff00000c7760000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.679524]                    ^
[   33.680280]  fff00000c7760080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.680558]  fff00000c7760100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.680746] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   34.201802] ==================================================================
[   34.201946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   34.202119] Write of size 2 at addr fff00000c6818877 by task kunit_try_catch/174
[   34.202261] 
[   34.202346] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.202580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.202660] Hardware name: linux,dummy-virt (DT)
[   34.202756] Call trace:
[   34.202821]  show_stack+0x20/0x38 (C)
[   34.202985]  dump_stack_lvl+0x8c/0xd0
[   34.203155]  print_report+0x118/0x5f0
[   34.203308]  kasan_report+0xc8/0x118
[   34.203533]  kasan_check_range+0x100/0x1a8
[   34.203766]  __asan_memset+0x34/0x78
[   34.203991]  kmalloc_oob_memset_2+0x150/0x2f8
[   34.204163]  kunit_try_run_case+0x14c/0x3d0
[   34.204303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.204872]  kthread+0x318/0x618
[   34.205172]  ret_from_fork+0x10/0x20
[   34.205457] 
[   34.205556] Allocated by task 174:
[   34.205645]  kasan_save_stack+0x3c/0x68
[   34.205765]  kasan_save_track+0x20/0x40
[   34.206170]  kasan_save_alloc_info+0x40/0x58
[   34.206297]  __kasan_kmalloc+0xd4/0xd8
[   34.206655]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.206857]  kmalloc_oob_memset_2+0xb0/0x2f8
[   34.207084]  kunit_try_run_case+0x14c/0x3d0
[   34.207209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.207363]  kthread+0x318/0x618
[   34.207543]  ret_from_fork+0x10/0x20
[   34.207722] 
[   34.207826] The buggy address belongs to the object at fff00000c6818800
[   34.207826]  which belongs to the cache kmalloc-128 of size 128
[   34.208106] The buggy address is located 119 bytes inside of
[   34.208106]  allocated 120-byte region [fff00000c6818800, fff00000c6818878)
[   34.208291] 
[   34.208421] The buggy address belongs to the physical page:
[   34.209402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.209562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.209715] page_type: f5(slab)
[   34.209799] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.209881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.209947] page dumped because: kasan: bad access detected
[   34.209999] 
[   34.210028] Memory state around the buggy address:
[   34.210118]  fff00000c6818700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.210262]  fff00000c6818780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.210464] >fff00000c6818800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.210608]                                                                 ^
[   34.210740]  fff00000c6818880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.211141]  fff00000c6818900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.211478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   34.161965] ==================================================================
[   34.162148] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   34.162299] Write of size 128 at addr fff00000c6818700 by task kunit_try_catch/172
[   34.162487] 
[   34.162596] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.162877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.162973] Hardware name: linux,dummy-virt (DT)
[   34.163093] Call trace:
[   34.163162]  show_stack+0x20/0x38 (C)
[   34.163315]  dump_stack_lvl+0x8c/0xd0
[   34.163457]  print_report+0x118/0x5f0
[   34.163591]  kasan_report+0xc8/0x118
[   34.163729]  kasan_check_range+0x100/0x1a8
[   34.164468]  __asan_memset+0x34/0x78
[   34.164712]  kmalloc_oob_in_memset+0x144/0x2d0
[   34.164940]  kunit_try_run_case+0x14c/0x3d0
[   34.165299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.165864]  kthread+0x318/0x618
[   34.166035]  ret_from_fork+0x10/0x20
[   34.166202] 
[   34.166258] Allocated by task 172:
[   34.166343]  kasan_save_stack+0x3c/0x68
[   34.166643]  kasan_save_track+0x20/0x40
[   34.167254]  kasan_save_alloc_info+0x40/0x58
[   34.167594]  __kasan_kmalloc+0xd4/0xd8
[   34.167862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.168307]  kmalloc_oob_in_memset+0xb0/0x2d0
[   34.168762]  kunit_try_run_case+0x14c/0x3d0
[   34.168922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.169088]  kthread+0x318/0x618
[   34.169197]  ret_from_fork+0x10/0x20
[   34.169301] 
[   34.169362] The buggy address belongs to the object at fff00000c6818700
[   34.169362]  which belongs to the cache kmalloc-128 of size 128
[   34.169531] The buggy address is located 0 bytes inside of
[   34.169531]  allocated 120-byte region [fff00000c6818700, fff00000c6818778)
[   34.170427] 
[   34.170564] The buggy address belongs to the physical page:
[   34.170670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   34.170825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.170984] page_type: f5(slab)
[   34.171118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.171746] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.171971] page dumped because: kasan: bad access detected
[   34.172097] 
[   34.172156] Memory state around the buggy address:
[   34.172402]  fff00000c6818600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.172510]  fff00000c6818680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.172582] >fff00000c6818700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.172687]                                                                 ^
[   34.172818]  fff00000c6818780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173038]  fff00000c6818800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173376] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   34.123367] ==================================================================
[   34.123581] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   34.123737] Read of size 16 at addr fff00000c5d8b020 by task kunit_try_catch/170
[   34.123892] 
[   34.124044] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.124419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.124556] Hardware name: linux,dummy-virt (DT)
[   34.124671] Call trace:
[   34.124778]  show_stack+0x20/0x38 (C)
[   34.124979]  dump_stack_lvl+0x8c/0xd0
[   34.125193]  print_report+0x118/0x5f0
[   34.125375]  kasan_report+0xc8/0x118
[   34.125558]  __asan_report_load16_noabort+0x20/0x30
[   34.125719]  kmalloc_uaf_16+0x3bc/0x438
[   34.125859]  kunit_try_run_case+0x14c/0x3d0
[   34.126006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.126204]  kthread+0x318/0x618
[   34.126365]  ret_from_fork+0x10/0x20
[   34.126509] 
[   34.126642] Allocated by task 170:
[   34.126763]  kasan_save_stack+0x3c/0x68
[   34.126899]  kasan_save_track+0x20/0x40
[   34.127173]  kasan_save_alloc_info+0x40/0x58
[   34.127312]  __kasan_kmalloc+0xd4/0xd8
[   34.127439]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.127631]  kmalloc_uaf_16+0x140/0x438
[   34.127750]  kunit_try_run_case+0x14c/0x3d0
[   34.127890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.128026]  kthread+0x318/0x618
[   34.128205]  ret_from_fork+0x10/0x20
[   34.128383] 
[   34.128444] Freed by task 170:
[   34.128519]  kasan_save_stack+0x3c/0x68
[   34.128708]  kasan_save_track+0x20/0x40
[   34.128860]  kasan_save_free_info+0x4c/0x78
[   34.129040]  __kasan_slab_free+0x6c/0x98
[   34.129179]  kfree+0x214/0x3c8
[   34.129287]  kmalloc_uaf_16+0x190/0x438
[   34.129402]  kunit_try_run_case+0x14c/0x3d0
[   34.129619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129771]  kthread+0x318/0x618
[   34.129884]  ret_from_fork+0x10/0x20
[   34.130161] 
[   34.130278] The buggy address belongs to the object at fff00000c5d8b020
[   34.130278]  which belongs to the cache kmalloc-16 of size 16
[   34.131010] The buggy address is located 0 bytes inside of
[   34.131010]  freed 16-byte region [fff00000c5d8b020, fff00000c5d8b030)
[   34.131721] 
[   34.131973] The buggy address belongs to the physical page:
[   34.132320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b
[   34.133298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.133576] page_type: f5(slab)
[   34.133777] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.133944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.134091] page dumped because: kasan: bad access detected
[   34.134195] 
[   34.134816] Memory state around the buggy address:
[   34.135295]  fff00000c5d8af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.136168]  fff00000c5d8af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.136483] >fff00000c5d8b000: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   34.136981]                                ^
[   34.137507]  fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.137667]  fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138103] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   34.082424] ==================================================================
[   34.082613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   34.082772] Write of size 16 at addr fff00000c5c8efc0 by task kunit_try_catch/168
[   34.082937] 
[   34.083232] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.083600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.083681] Hardware name: linux,dummy-virt (DT)
[   34.083987] Call trace:
[   34.084406]  show_stack+0x20/0x38 (C)
[   34.084668]  dump_stack_lvl+0x8c/0xd0
[   34.084914]  print_report+0x118/0x5f0
[   34.085079]  kasan_report+0xc8/0x118
[   34.085234]  __asan_report_store16_noabort+0x20/0x30
[   34.085486]  kmalloc_oob_16+0x3a0/0x3f8
[   34.085699]  kunit_try_run_case+0x14c/0x3d0
[   34.086072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.086606]  kthread+0x318/0x618
[   34.086803]  ret_from_fork+0x10/0x20
[   34.087114] 
[   34.087222] Allocated by task 168:
[   34.087806]  kasan_save_stack+0x3c/0x68
[   34.087943]  kasan_save_track+0x20/0x40
[   34.088076]  kasan_save_alloc_info+0x40/0x58
[   34.088192]  __kasan_kmalloc+0xd4/0xd8
[   34.088304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.088442]  kmalloc_oob_16+0xb4/0x3f8
[   34.089926]  kunit_try_run_case+0x14c/0x3d0
[   34.090078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.090227]  kthread+0x318/0x618
[   34.090342]  ret_from_fork+0x10/0x20
[   34.090457] 
[   34.090519] The buggy address belongs to the object at fff00000c5c8efc0
[   34.090519]  which belongs to the cache kmalloc-16 of size 16
[   34.090975] The buggy address is located 0 bytes inside of
[   34.090975]  allocated 13-byte region [fff00000c5c8efc0, fff00000c5c8efcd)
[   34.091629] 
[   34.092029] The buggy address belongs to the physical page:
[   34.092236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c8e
[   34.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.092731] page_type: f5(slab)
[   34.092863] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.093027] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.093169] page dumped because: kasan: bad access detected
[   34.093261] 
[   34.093316] Memory state around the buggy address:
[   34.093430]  fff00000c5c8ee80: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[   34.093572]  fff00000c5c8ef00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   34.093712] >fff00000c5c8ef80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   34.094137]                                               ^
[   34.094696]  fff00000c5c8f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.095347]  fff00000c5c8f080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   34.095733] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   34.017497] ==================================================================
[   34.017670] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   34.017814] Read of size 1 at addr fff00000c4a4a800 by task kunit_try_catch/166
[   34.017966] 
[   34.018076] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.018348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.018433] Hardware name: linux,dummy-virt (DT)
[   34.018531] Call trace:
[   34.018597]  show_stack+0x20/0x38 (C)
[   34.018744]  dump_stack_lvl+0x8c/0xd0
[   34.019262]  print_report+0x118/0x5f0
[   34.019456]  kasan_report+0xc8/0x118
[   34.019668]  __kasan_check_byte+0x54/0x70
[   34.019895]  krealloc_noprof+0x44/0x360
[   34.020140]  krealloc_uaf+0x180/0x520
[   34.020501]  kunit_try_run_case+0x14c/0x3d0
[   34.020901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.021435]  kthread+0x318/0x618
[   34.022112]  ret_from_fork+0x10/0x20
[   34.022314] 
[   34.022374] Allocated by task 166:
[   34.022459]  kasan_save_stack+0x3c/0x68
[   34.022579]  kasan_save_track+0x20/0x40
[   34.023005]  kasan_save_alloc_info+0x40/0x58
[   34.023170]  __kasan_kmalloc+0xd4/0xd8
[   34.023355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.023539]  krealloc_uaf+0xc8/0x520
[   34.023711]  kunit_try_run_case+0x14c/0x3d0
[   34.023885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.024089]  kthread+0x318/0x618
[   34.024264]  ret_from_fork+0x10/0x20
[   34.024419] 
[   34.024480] Freed by task 166:
[   34.024566]  kasan_save_stack+0x3c/0x68
[   34.024678]  kasan_save_track+0x20/0x40
[   34.024786]  kasan_save_free_info+0x4c/0x78
[   34.024919]  __kasan_slab_free+0x6c/0x98
[   34.025032]  kfree+0x214/0x3c8
[   34.025514]  krealloc_uaf+0x12c/0x520
[   34.025677]  kunit_try_run_case+0x14c/0x3d0
[   34.025840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.025989]  kthread+0x318/0x618
[   34.026429]  ret_from_fork+0x10/0x20
[   34.026642] 
[   34.026745] The buggy address belongs to the object at fff00000c4a4a800
[   34.026745]  which belongs to the cache kmalloc-256 of size 256
[   34.027014] The buggy address is located 0 bytes inside of
[   34.027014]  freed 256-byte region [fff00000c4a4a800, fff00000c4a4a900)
[   34.027239] 
[   34.027304] The buggy address belongs to the physical page:
[   34.027404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   34.027564] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.027727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.027933] page_type: f5(slab)
[   34.028065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.028217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.028626] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.028966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.029249] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   34.029515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.029644] page dumped because: kasan: bad access detected
[   34.029743] 
[   34.029836] Memory state around the buggy address:
[   34.029931]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030307]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030514] >fff00000c4a4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.030710]                    ^
[   34.030807]  fff00000c4a4a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.030954]  fff00000c4a4a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.031101] ==================================================================
[   34.032255] ==================================================================
[   34.032403] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   34.032542] Read of size 1 at addr fff00000c4a4a800 by task kunit_try_catch/166
[   34.032693] 
[   34.032781] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   34.033024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.033127] Hardware name: linux,dummy-virt (DT)
[   34.033223] Call trace:
[   34.033341]  show_stack+0x20/0x38 (C)
[   34.033953]  dump_stack_lvl+0x8c/0xd0
[   34.034514]  print_report+0x118/0x5f0
[   34.034702]  kasan_report+0xc8/0x118
[   34.034847]  __asan_report_load1_noabort+0x20/0x30
[   34.035023]  krealloc_uaf+0x4c8/0x520
[   34.035191]  kunit_try_run_case+0x14c/0x3d0
[   34.035437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.035705]  kthread+0x318/0x618
[   34.035905]  ret_from_fork+0x10/0x20
[   34.036088] 
[   34.036143] Allocated by task 166:
[   34.036230]  kasan_save_stack+0x3c/0x68
[   34.036394]  kasan_save_track+0x20/0x40
[   34.036581]  kasan_save_alloc_info+0x40/0x58
[   34.036736]  __kasan_kmalloc+0xd4/0xd8
[   34.037092]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.037624]  krealloc_uaf+0xc8/0x520
[   34.037911]  kunit_try_run_case+0x14c/0x3d0
[   34.038037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.038540]  kthread+0x318/0x618
[   34.038687]  ret_from_fork+0x10/0x20
[   34.038819] 
[   34.038880] Freed by task 166:
[   34.038975]  kasan_save_stack+0x3c/0x68
[   34.039129]  kasan_save_track+0x20/0x40
[   34.039290]  kasan_save_free_info+0x4c/0x78
[   34.039421]  __kasan_slab_free+0x6c/0x98
[   34.039538]  kfree+0x214/0x3c8
[   34.039645]  krealloc_uaf+0x12c/0x520
[   34.039763]  kunit_try_run_case+0x14c/0x3d0
[   34.039887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.040029]  kthread+0x318/0x618
[   34.040163]  ret_from_fork+0x10/0x20
[   34.040288] 
[   34.040342] The buggy address belongs to the object at fff00000c4a4a800
[   34.040342]  which belongs to the cache kmalloc-256 of size 256
[   34.040549] The buggy address is located 0 bytes inside of
[   34.040549]  freed 256-byte region [fff00000c4a4a800, fff00000c4a4a900)
[   34.040768] 
[   34.041195] The buggy address belongs to the physical page:
[   34.041347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   34.041548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.041698] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.041860] page_type: f5(slab)
[   34.041971] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.042172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.042352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.042539] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.042698] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   34.043087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.043418] page dumped because: kasan: bad access detected
[   34.043578] 
[   34.043635] Memory state around the buggy address:
[   34.043749]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.043883]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.044075] >fff00000c4a4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.044506]                    ^
[   34.044564]  fff00000c4a4a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.044694]  fff00000c4a4a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.044818] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   33.801744] ==================================================================
[   33.802080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   33.802227] Write of size 1 at addr fff00000c4a4a6da by task kunit_try_catch/160
[   33.802684] 
[   33.802955] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.803475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.803557] Hardware name: linux,dummy-virt (DT)
[   33.803687] Call trace:
[   33.803753]  show_stack+0x20/0x38 (C)
[   33.804007]  dump_stack_lvl+0x8c/0xd0
[   33.804178]  print_report+0x118/0x5f0
[   33.804439]  kasan_report+0xc8/0x118
[   33.804651]  __asan_report_store1_noabort+0x20/0x30
[   33.804898]  krealloc_less_oob_helper+0xa80/0xc50
[   33.805085]  krealloc_less_oob+0x20/0x38
[   33.805255]  kunit_try_run_case+0x14c/0x3d0
[   33.805476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.805686]  kthread+0x318/0x618
[   33.805865]  ret_from_fork+0x10/0x20
[   33.806016] 
[   33.806124] Allocated by task 160:
[   33.806218]  kasan_save_stack+0x3c/0x68
[   33.806339]  kasan_save_track+0x20/0x40
[   33.806453]  kasan_save_alloc_info+0x40/0x58
[   33.806573]  __kasan_krealloc+0x118/0x178
[   33.806687]  krealloc_noprof+0x128/0x360
[   33.806795]  krealloc_less_oob_helper+0x168/0xc50
[   33.806932]  krealloc_less_oob+0x20/0x38
[   33.807075]  kunit_try_run_case+0x14c/0x3d0
[   33.807202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.807338]  kthread+0x318/0x618
[   33.807449]  ret_from_fork+0x10/0x20
[   33.807564] 
[   33.807624] The buggy address belongs to the object at fff00000c4a4a600
[   33.807624]  which belongs to the cache kmalloc-256 of size 256
[   33.807808] The buggy address is located 17 bytes to the right of
[   33.807808]  allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9)
[   33.808014] 
[   33.808098] The buggy address belongs to the physical page:
[   33.808191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.808574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.808724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.808885] page_type: f5(slab)
[   33.808997] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.809241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.809459] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.809678] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.809889] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.810048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.810190] page dumped because: kasan: bad access detected
[   33.810323] 
[   33.810381] Memory state around the buggy address:
[   33.810582]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.810722]  fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.810859] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.811120]                                                     ^
[   33.811257]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811398]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811526] ==================================================================
[   33.813265] ==================================================================
[   33.813391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   33.813639] Write of size 1 at addr fff00000c4a4a6ea by task kunit_try_catch/160
[   33.813787] 
[   33.813876] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.814209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.814469] Hardware name: linux,dummy-virt (DT)
[   33.814737] Call trace:
[   33.814849]  show_stack+0x20/0x38 (C)
[   33.815034]  dump_stack_lvl+0x8c/0xd0
[   33.815195]  print_report+0x118/0x5f0
[   33.815467]  kasan_report+0xc8/0x118
[   33.815608]  __asan_report_store1_noabort+0x20/0x30
[   33.815793]  krealloc_less_oob_helper+0xae4/0xc50
[   33.815987]  krealloc_less_oob+0x20/0x38
[   33.816185]  kunit_try_run_case+0x14c/0x3d0
[   33.816417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.816795]  kthread+0x318/0x618
[   33.817550]  ret_from_fork+0x10/0x20
[   33.817742] 
[   33.817877] Allocated by task 160:
[   33.817975]  kasan_save_stack+0x3c/0x68
[   33.818118]  kasan_save_track+0x20/0x40
[   33.820109]  kasan_save_alloc_info+0x40/0x58
[   33.820219]  __kasan_krealloc+0x118/0x178
[   33.820282]  krealloc_noprof+0x128/0x360
[   33.820387]  krealloc_less_oob_helper+0x168/0xc50
[   33.820516]  krealloc_less_oob+0x20/0x38
[   33.820639]  kunit_try_run_case+0x14c/0x3d0
[   33.820763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.820951]  kthread+0x318/0x618
[   33.821196]  ret_from_fork+0x10/0x20
[   33.821455] 
[   33.821535] The buggy address belongs to the object at fff00000c4a4a600
[   33.821535]  which belongs to the cache kmalloc-256 of size 256
[   33.822030] The buggy address is located 33 bytes to the right of
[   33.822030]  allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9)
[   33.823575] 
[   33.823640] The buggy address belongs to the physical page:
[   33.824287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.824520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.824661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.824812] page_type: f5(slab)
[   33.824921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.827035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.827899] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.828638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.828840] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.828988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.829963] page dumped because: kasan: bad access detected
[   33.830144] 
[   33.830202] Memory state around the buggy address:
[   33.831688]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.831916]  fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.832441] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.833360]                                                           ^
[   33.833503]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.833642]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.833905] ==================================================================
[   33.978871] ==================================================================
[   33.979013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   33.979173] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/164
[   33.979329] 
[   33.979416] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.980524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.980659] Hardware name: linux,dummy-virt (DT)
[   33.980874] Call trace:
[   33.981535]  show_stack+0x20/0x38 (C)
[   33.981706]  dump_stack_lvl+0x8c/0xd0
[   33.981858]  print_report+0x118/0x5f0
[   33.982000]  kasan_report+0xc8/0x118
[   33.982160]  __asan_report_store1_noabort+0x20/0x30
[   33.984250]  krealloc_less_oob_helper+0xa58/0xc50
[   33.985300]  krealloc_large_less_oob+0x20/0x38
[   33.985675]  kunit_try_run_case+0x14c/0x3d0
[   33.986612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.987027]  kthread+0x318/0x618
[   33.987207]  ret_from_fork+0x10/0x20
[   33.987356] 
[   33.987416] The buggy address belongs to the physical page:
[   33.988704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.990194] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.990547] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.991079] page_type: f8(unknown)
[   33.991421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.991971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.992694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.992971] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.993657] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.994457] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.994599] page dumped because: kasan: bad access detected
[   33.994694] 
[   33.994749] Memory state around the buggy address:
[   33.994849]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.995003]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.996877] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   33.997266]                                                           ^
[   33.997652]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.997856]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.997971] ==================================================================
[   33.931629] ==================================================================
[   33.931776] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   33.931914] Write of size 1 at addr fff00000c774e0d0 by task kunit_try_catch/164
[   33.932108] 
[   33.932196] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.932951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.933045] Hardware name: linux,dummy-virt (DT)
[   33.933168] Call trace:
[   33.933235]  show_stack+0x20/0x38 (C)
[   33.933412]  dump_stack_lvl+0x8c/0xd0
[   33.933645]  print_report+0x118/0x5f0
[   33.933796]  kasan_report+0xc8/0x118
[   33.933966]  __asan_report_store1_noabort+0x20/0x30
[   33.934143]  krealloc_less_oob_helper+0xb9c/0xc50
[   33.934461]  krealloc_large_less_oob+0x20/0x38
[   33.934939]  kunit_try_run_case+0x14c/0x3d0
[   33.935229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.935467]  kthread+0x318/0x618
[   33.935671]  ret_from_fork+0x10/0x20
[   33.935887] 
[   33.935960] The buggy address belongs to the physical page:
[   33.936141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.936423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.936588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.936743] page_type: f8(unknown)
[   33.936852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.937461] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.937637] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.937883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.938164] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.938409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.938556] page dumped because: kasan: bad access detected
[   33.938651] 
[   33.938707] Memory state around the buggy address:
[   33.938805]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.938954]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.939112] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   33.939243]                                                  ^
[   33.939357]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.939499]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.939637] ==================================================================
[   33.957712] ==================================================================
[   33.957835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   33.957972] Write of size 1 at addr fff00000c774e0ea by task kunit_try_catch/164
[   33.960352] 
[   33.960487] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.960736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.960821] Hardware name: linux,dummy-virt (DT)
[   33.960916] Call trace:
[   33.960980]  show_stack+0x20/0x38 (C)
[   33.961463]  dump_stack_lvl+0x8c/0xd0
[   33.961648]  print_report+0x118/0x5f0
[   33.962785]  kasan_report+0xc8/0x118
[   33.962960]  __asan_report_store1_noabort+0x20/0x30
[   33.963543]  krealloc_less_oob_helper+0xae4/0xc50
[   33.964500]  krealloc_large_less_oob+0x20/0x38
[   33.964657]  kunit_try_run_case+0x14c/0x3d0
[   33.964808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.964978]  kthread+0x318/0x618
[   33.966302]  ret_from_fork+0x10/0x20
[   33.966545] 
[   33.966646] The buggy address belongs to the physical page:
[   33.966832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.967025] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.967190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.967351] page_type: f8(unknown)
[   33.967466] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.967985] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.968981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.969217] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.969636] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.970136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.970797] page dumped because: kasan: bad access detected
[   33.970909] 
[   33.971433] Memory state around the buggy address:
[   33.971640]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.971880]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.972569] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   33.972714]                                                           ^
[   33.973370]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.973633]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.973791] ==================================================================
[   33.763945] ==================================================================
[   33.764045] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   33.764503] Write of size 1 at addr fff00000c4a4a6c9 by task kunit_try_catch/160
[   33.764678] 
[   33.764776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.765044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.765149] Hardware name: linux,dummy-virt (DT)
[   33.765240] Call trace:
[   33.765300]  show_stack+0x20/0x38 (C)
[   33.765493]  dump_stack_lvl+0x8c/0xd0
[   33.765640]  print_report+0x118/0x5f0
[   33.765783]  kasan_report+0xc8/0x118
[   33.765916]  __asan_report_store1_noabort+0x20/0x30
[   33.766371]  krealloc_less_oob_helper+0xa48/0xc50
[   33.766605]  krealloc_less_oob+0x20/0x38
[   33.766811]  kunit_try_run_case+0x14c/0x3d0
[   33.767028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.767265]  kthread+0x318/0x618
[   33.767447]  ret_from_fork+0x10/0x20
[   33.767684] 
[   33.767787] Allocated by task 160:
[   33.767880]  kasan_save_stack+0x3c/0x68
[   33.767998]  kasan_save_track+0x20/0x40
[   33.768128]  kasan_save_alloc_info+0x40/0x58
[   33.768249]  __kasan_krealloc+0x118/0x178
[   33.768422]  krealloc_noprof+0x128/0x360
[   33.768534]  krealloc_less_oob_helper+0x168/0xc50
[   33.768662]  krealloc_less_oob+0x20/0x38
[   33.769080]  kunit_try_run_case+0x14c/0x3d0
[   33.769250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.769416]  kthread+0x318/0x618
[   33.769579]  ret_from_fork+0x10/0x20
[   33.769712] 
[   33.769775] The buggy address belongs to the object at fff00000c4a4a600
[   33.769775]  which belongs to the cache kmalloc-256 of size 256
[   33.769962] The buggy address is located 0 bytes to the right of
[   33.769962]  allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9)
[   33.770178] 
[   33.770238] The buggy address belongs to the physical page:
[   33.770369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.770722] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.770912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.771150] page_type: f5(slab)
[   33.771312] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.771467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.771627] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.771789] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.771950] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.772144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.772272] page dumped because: kasan: bad access detected
[   33.772411] 
[   33.772474] Memory state around the buggy address:
[   33.772885]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.773082]  fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.773219] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.773335]                                               ^
[   33.773450]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.773581]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.773986] ==================================================================
[   33.778390] ==================================================================
[   33.778520] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   33.778659] Write of size 1 at addr fff00000c4a4a6d0 by task kunit_try_catch/160
[   33.778816] 
[   33.778902] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.779905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.779998] Hardware name: linux,dummy-virt (DT)
[   33.780803] Call trace:
[   33.781214]  show_stack+0x20/0x38 (C)
[   33.781614]  dump_stack_lvl+0x8c/0xd0
[   33.782242]  print_report+0x118/0x5f0
[   33.782419]  kasan_report+0xc8/0x118
[   33.782564]  __asan_report_store1_noabort+0x20/0x30
[   33.782725]  krealloc_less_oob_helper+0xb9c/0xc50
[   33.782901]  krealloc_less_oob+0x20/0x38
[   33.784404]  kunit_try_run_case+0x14c/0x3d0
[   33.784593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.784769]  kthread+0x318/0x618
[   33.784911]  ret_from_fork+0x10/0x20
[   33.785075] 
[   33.785131] Allocated by task 160:
[   33.785213]  kasan_save_stack+0x3c/0x68
[   33.785324]  kasan_save_track+0x20/0x40
[   33.785427]  kasan_save_alloc_info+0x40/0x58
[   33.785536]  __kasan_krealloc+0x118/0x178
[   33.785638]  krealloc_noprof+0x128/0x360
[   33.785734]  krealloc_less_oob_helper+0x168/0xc50
[   33.785857]  krealloc_less_oob+0x20/0x38
[   33.785975]  kunit_try_run_case+0x14c/0x3d0
[   33.789398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.789579]  kthread+0x318/0x618
[   33.789692]  ret_from_fork+0x10/0x20
[   33.789803] 
[   33.789862] The buggy address belongs to the object at fff00000c4a4a600
[   33.789862]  which belongs to the cache kmalloc-256 of size 256
[   33.790031] The buggy address is located 7 bytes to the right of
[   33.790031]  allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9)
[   33.790224] 
[   33.790276] The buggy address belongs to the physical page:
[   33.790357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.790495] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.790629] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.790776] page_type: f5(slab)
[   33.790887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.794003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.794724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.794906] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.795100] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.795253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.795380] page dumped because: kasan: bad access detected
[   33.795480] 
[   33.795536] Memory state around the buggy address:
[   33.795631]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.795762]  fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.795893] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.796018]                                                  ^
[   33.796144]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796284]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796414] ==================================================================
[   33.921551] ==================================================================
[   33.921695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   33.921874] Write of size 1 at addr fff00000c774e0c9 by task kunit_try_catch/164
[   33.922027] 
[   33.922143] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.922917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.923087] Hardware name: linux,dummy-virt (DT)
[   33.923248] Call trace:
[   33.923355]  show_stack+0x20/0x38 (C)
[   33.923603]  dump_stack_lvl+0x8c/0xd0
[   33.923748]  print_report+0x118/0x5f0
[   33.923888]  kasan_report+0xc8/0x118
[   33.924028]  __asan_report_store1_noabort+0x20/0x30
[   33.924201]  krealloc_less_oob_helper+0xa48/0xc50
[   33.924463]  krealloc_large_less_oob+0x20/0x38
[   33.925130]  kunit_try_run_case+0x14c/0x3d0
[   33.925410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.925584]  kthread+0x318/0x618
[   33.925762]  ret_from_fork+0x10/0x20
[   33.926031] 
[   33.926121] The buggy address belongs to the physical page:
[   33.926457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.926685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.926863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.927034] page_type: f8(unknown)
[   33.927234] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.927431] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.927634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.927881] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.928085] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.928236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.928457] page dumped because: kasan: bad access detected
[   33.928883] 
[   33.929018] Memory state around the buggy address:
[   33.929180]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.929312]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.929477] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   33.929655]                                               ^
[   33.929784]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.929924]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.930048] ==================================================================
[   33.837027] ==================================================================
[   33.837209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   33.837354] Write of size 1 at addr fff00000c4a4a6eb by task kunit_try_catch/160
[   33.837497] 
[   33.837579] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.837811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.837892] Hardware name: linux,dummy-virt (DT)
[   33.837978] Call trace:
[   33.838041]  show_stack+0x20/0x38 (C)
[   33.838244]  dump_stack_lvl+0x8c/0xd0
[   33.838481]  print_report+0x118/0x5f0
[   33.838634]  kasan_report+0xc8/0x118
[   33.838774]  __asan_report_store1_noabort+0x20/0x30
[   33.838942]  krealloc_less_oob_helper+0xa58/0xc50
[   33.839115]  krealloc_less_oob+0x20/0x38
[   33.839265]  kunit_try_run_case+0x14c/0x3d0
[   33.839415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.839582]  kthread+0x318/0x618
[   33.839728]  ret_from_fork+0x10/0x20
[   33.839876] 
[   33.839934] Allocated by task 160:
[   33.840020]  kasan_save_stack+0x3c/0x68
[   33.840166]  kasan_save_track+0x20/0x40
[   33.840316]  kasan_save_alloc_info+0x40/0x58
[   33.840446]  __kasan_krealloc+0x118/0x178
[   33.840578]  krealloc_noprof+0x128/0x360
[   33.840697]  krealloc_less_oob_helper+0x168/0xc50
[   33.840863]  krealloc_less_oob+0x20/0x38
[   33.841032]  kunit_try_run_case+0x14c/0x3d0
[   33.841201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.841347]  kthread+0x318/0x618
[   33.841469]  ret_from_fork+0x10/0x20
[   33.841585] 
[   33.841677] The buggy address belongs to the object at fff00000c4a4a600
[   33.841677]  which belongs to the cache kmalloc-256 of size 256
[   33.841855] The buggy address is located 34 bytes to the right of
[   33.841855]  allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9)
[   33.842048] 
[   33.842130] The buggy address belongs to the physical page:
[   33.842216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.842373] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.842523] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.842681] page_type: f5(slab)
[   33.842786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.843007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.843241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.843393] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.843546] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.843698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.843876] page dumped because: kasan: bad access detected
[   33.843979] 
[   33.844037] Memory state around the buggy address:
[   33.844201]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.844483]  fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.844591] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   33.844708]                                                           ^
[   33.845010]  fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.845405]  fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.845732] ==================================================================
[   33.943313] ==================================================================
[   33.943497] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   33.943956] Write of size 1 at addr fff00000c774e0da by task kunit_try_catch/164
[   33.944146] 
[   33.944235] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.945197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.945798] Hardware name: linux,dummy-virt (DT)
[   33.945916] Call trace:
[   33.945981]  show_stack+0x20/0x38 (C)
[   33.946227]  dump_stack_lvl+0x8c/0xd0
[   33.946521]  print_report+0x118/0x5f0
[   33.946805]  kasan_report+0xc8/0x118
[   33.947028]  __asan_report_store1_noabort+0x20/0x30
[   33.947216]  krealloc_less_oob_helper+0xa80/0xc50
[   33.947975]  krealloc_large_less_oob+0x20/0x38
[   33.948335]  kunit_try_run_case+0x14c/0x3d0
[   33.948666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.948909]  kthread+0x318/0x618
[   33.949377]  ret_from_fork+0x10/0x20
[   33.949546] 
[   33.949605] The buggy address belongs to the physical page:
[   33.949697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.949852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.950448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.950758] page_type: f8(unknown)
[   33.951014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.951315] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.951995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.952481] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.953110] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.953306] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.953441] page dumped because: kasan: bad access detected
[   33.954237] 
[   33.954300] Memory state around the buggy address:
[   33.954395]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.954538]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.954678] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   33.954843]                                                     ^
[   33.955144]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.955453]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.955610] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   33.863989] ==================================================================
[   33.865666] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   33.865845] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/162
[   33.865995] 
[   33.866104] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.868702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.869150] Hardware name: linux,dummy-virt (DT)
[   33.869454] Call trace:
[   33.869725]  show_stack+0x20/0x38 (C)
[   33.870105]  dump_stack_lvl+0x8c/0xd0
[   33.870629]  print_report+0x118/0x5f0
[   33.870947]  kasan_report+0xc8/0x118
[   33.872037]  __asan_report_store1_noabort+0x20/0x30
[   33.873146]  krealloc_more_oob_helper+0x614/0x680
[   33.873486]  krealloc_large_more_oob+0x20/0x38
[   33.874831]  kunit_try_run_case+0x14c/0x3d0
[   33.875042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.875655]  kthread+0x318/0x618
[   33.875844]  ret_from_fork+0x10/0x20
[   33.875995] 
[   33.876074] The buggy address belongs to the physical page:
[   33.876172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.876338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.877783] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.878089] page_type: f8(unknown)
[   33.878208] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.878839] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.879016] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.879192] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.879349] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.879500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.879643] page dumped because: kasan: bad access detected
[   33.879753] 
[   33.879865] Memory state around the buggy address:
[   33.880014]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.880178]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.880318] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   33.880579]                                                           ^
[   33.881002]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.881907]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.882048] ==================================================================
[   33.698289] ==================================================================
[   33.698468] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   33.698619] Write of size 1 at addr fff00000c4a4a4eb by task kunit_try_catch/158
[   33.698795] 
[   33.698887] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.699235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.699375] Hardware name: linux,dummy-virt (DT)
[   33.699480] Call trace:
[   33.699550]  show_stack+0x20/0x38 (C)
[   33.699707]  dump_stack_lvl+0x8c/0xd0
[   33.699851]  print_report+0x118/0x5f0
[   33.699987]  kasan_report+0xc8/0x118
[   33.700165]  __asan_report_store1_noabort+0x20/0x30
[   33.700438]  krealloc_more_oob_helper+0x614/0x680
[   33.700621]  krealloc_more_oob+0x20/0x38
[   33.700825]  kunit_try_run_case+0x14c/0x3d0
[   33.701360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.701985]  kthread+0x318/0x618
[   33.702174]  ret_from_fork+0x10/0x20
[   33.702470] 
[   33.702533] Allocated by task 158:
[   33.702662]  kasan_save_stack+0x3c/0x68
[   33.702964]  kasan_save_track+0x20/0x40
[   33.703378]  kasan_save_alloc_info+0x40/0x58
[   33.703752]  __kasan_krealloc+0x118/0x178
[   33.704202]  krealloc_noprof+0x128/0x360
[   33.705028]  krealloc_more_oob_helper+0x168/0x680
[   33.705733]  krealloc_more_oob+0x20/0x38
[   33.706529]  kunit_try_run_case+0x14c/0x3d0
[   33.707044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.707225]  kthread+0x318/0x618
[   33.707521]  ret_from_fork+0x10/0x20
[   33.708026] 
[   33.708158] The buggy address belongs to the object at fff00000c4a4a400
[   33.708158]  which belongs to the cache kmalloc-256 of size 256
[   33.708582] The buggy address is located 0 bytes to the right of
[   33.708582]  allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb)
[   33.708807] 
[   33.709001] The buggy address belongs to the physical page:
[   33.709256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.709803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.709969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.710153] page_type: f5(slab)
[   33.710424] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.710590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.710880] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.711344] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.712001] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.712447] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.712596] page dumped because: kasan: bad access detected
[   33.712722] 
[   33.712810] Memory state around the buggy address:
[   33.712933]  fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713096]  fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.713239] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.713366]                                                           ^
[   33.713491]  fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713629]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.713865] ==================================================================
[   33.883979] ==================================================================
[   33.885940] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   33.886335] Write of size 1 at addr fff00000c774e0f0 by task kunit_try_catch/162
[   33.886567] 
[   33.886671] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.887468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.887558] Hardware name: linux,dummy-virt (DT)
[   33.887659] Call trace:
[   33.887727]  show_stack+0x20/0x38 (C)
[   33.887877]  dump_stack_lvl+0x8c/0xd0
[   33.888021]  print_report+0x118/0x5f0
[   33.888185]  kasan_report+0xc8/0x118
[   33.888323]  __asan_report_store1_noabort+0x20/0x30
[   33.888479]  krealloc_more_oob_helper+0x5c8/0x680
[   33.890087]  krealloc_large_more_oob+0x20/0x38
[   33.890314]  kunit_try_run_case+0x14c/0x3d0
[   33.890568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.890775]  kthread+0x318/0x618
[   33.890933]  ret_from_fork+0x10/0x20
[   33.891103] 
[   33.891164] The buggy address belongs to the physical page:
[   33.891275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   33.891462] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.891608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.891765] page_type: f8(unknown)
[   33.891893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.892194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.892438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.892653] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.892870] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   33.893072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.893196] page dumped because: kasan: bad access detected
[   33.893353] 
[   33.893414] Memory state around the buggy address:
[   33.893502]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893639]  fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.893836] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   33.893987]                                                              ^
[   33.894152]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.894345]  fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.894537] ==================================================================
[   33.718320] ==================================================================
[   33.718592] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   33.719093] Write of size 1 at addr fff00000c4a4a4f0 by task kunit_try_catch/158
[   33.719684] 
[   33.719809] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.720221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.720340] Hardware name: linux,dummy-virt (DT)
[   33.720991] Call trace:
[   33.721334]  show_stack+0x20/0x38 (C)
[   33.721484]  dump_stack_lvl+0x8c/0xd0
[   33.721622]  print_report+0x118/0x5f0
[   33.721760]  kasan_report+0xc8/0x118
[   33.721898]  __asan_report_store1_noabort+0x20/0x30
[   33.722079]  krealloc_more_oob_helper+0x5c8/0x680
[   33.722523]  krealloc_more_oob+0x20/0x38
[   33.723769]  kunit_try_run_case+0x14c/0x3d0
[   33.724003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.724728]  kthread+0x318/0x618
[   33.724905]  ret_from_fork+0x10/0x20
[   33.725627] 
[   33.725760] Allocated by task 158:
[   33.725962]  kasan_save_stack+0x3c/0x68
[   33.726254]  kasan_save_track+0x20/0x40
[   33.726379]  kasan_save_alloc_info+0x40/0x58
[   33.726615]  __kasan_krealloc+0x118/0x178
[   33.726730]  krealloc_noprof+0x128/0x360
[   33.726847]  krealloc_more_oob_helper+0x168/0x680
[   33.726995]  krealloc_more_oob+0x20/0x38
[   33.727143]  kunit_try_run_case+0x14c/0x3d0
[   33.727266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727406]  kthread+0x318/0x618
[   33.727587]  ret_from_fork+0x10/0x20
[   33.727697] 
[   33.727756] The buggy address belongs to the object at fff00000c4a4a400
[   33.727756]  which belongs to the cache kmalloc-256 of size 256
[   33.727941] The buggy address is located 5 bytes to the right of
[   33.727941]  allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb)
[   33.728440] 
[   33.728511] The buggy address belongs to the physical page:
[   33.728599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a
[   33.728758] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.728902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.729099] page_type: f5(slab)
[   33.729398] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.729559] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.729771] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   33.730024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.730269] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff
[   33.730429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.730560] page dumped because: kasan: bad access detected
[   33.730656] 
[   33.730715] Memory state around the buggy address:
[   33.730815]  fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.730966]  fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.731122] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   33.731233]                                                              ^
[   33.731361]  fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.731501]  fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.731620] ==================================================================
Failure - kunit/wmfw_too_short_for_block_header_wmfw_too_short_for_block_header
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0xc0
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0xf5
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0x33
(no logs available)
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   33.598337] ==================================================================
[   33.598572] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   33.598749] Free of addr fff00000c7748001 by task kunit_try_catch/152
[   33.598887] 
[   33.598988] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.599564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.599684] Hardware name: linux,dummy-virt (DT)
[   33.599792] Call trace:
[   33.599905]  show_stack+0x20/0x38 (C)
[   33.600099]  dump_stack_lvl+0x8c/0xd0
[   33.600248]  print_report+0x118/0x5f0
[   33.600393]  kasan_report_invalid_free+0xb0/0xd8
[   33.600611]  __kasan_kfree_large+0x5c/0xa8
[   33.600766]  free_large_kmalloc+0x64/0x190
[   33.600927]  kfree+0x270/0x3c8
[   33.601119]  kmalloc_large_invalid_free+0x108/0x270
[   33.601684]  kunit_try_run_case+0x14c/0x3d0
[   33.601930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.602147]  kthread+0x318/0x618
[   33.602296]  ret_from_fork+0x10/0x20
[   33.602785] 
[   33.603043] The buggy address belongs to the physical page:
[   33.603320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107748
[   33.603816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.604223] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.604417] page_type: f8(unknown)
[   33.604538] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.604753] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.604921] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.605088] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.605270] head: 0bfffe0000000002 ffffc1ffc31dd201 00000000ffffffff 00000000ffffffff
[   33.605506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.605722] page dumped because: kasan: bad access detected
[   33.605883] 
[   33.605977] Memory state around the buggy address:
[   33.606151]  fff00000c7747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.606372]  fff00000c7747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.606619] >fff00000c7748000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.607029]                    ^
[   33.607143]  fff00000c7748080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.607615]  fff00000c7748100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.608160] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   33.567126] ==================================================================
[   33.567542] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   33.567957] Read of size 1 at addr fff00000c7748000 by task kunit_try_catch/150
[   33.568164] 
[   33.568263] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.568529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.568617] Hardware name: linux,dummy-virt (DT)
[   33.568718] Call trace:
[   33.568785]  show_stack+0x20/0x38 (C)
[   33.568931]  dump_stack_lvl+0x8c/0xd0
[   33.569893]  print_report+0x118/0x5f0
[   33.570174]  kasan_report+0xc8/0x118
[   33.570320]  __asan_report_load1_noabort+0x20/0x30
[   33.570477]  kmalloc_large_uaf+0x2cc/0x2f8
[   33.570917]  kunit_try_run_case+0x14c/0x3d0
[   33.571861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572463]  kthread+0x318/0x618
[   33.572619]  ret_from_fork+0x10/0x20
[   33.572938] 
[   33.573273] The buggy address belongs to the physical page:
[   33.573723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107748
[   33.574071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.574572] raw: 0bfffe0000000000 ffffc1ffc31dd308 fff00000da45ec40 0000000000000000
[   33.575110] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   33.575478] page dumped because: kasan: bad access detected
[   33.575670] 
[   33.576072] Memory state around the buggy address:
[   33.576339]  fff00000c7747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.576660]  fff00000c7747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.576821] >fff00000c7748000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.576934]                    ^
[   33.577020]  fff00000c7748080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.578142]  fff00000c7748100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.578518] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   33.531222] ==================================================================
[   33.532656] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   33.532821] Write of size 1 at addr fff00000c76e600a by task kunit_try_catch/148
[   33.532975] 
[   33.533154] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.534038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.534230] Hardware name: linux,dummy-virt (DT)
[   33.534433] Call trace:
[   33.534550]  show_stack+0x20/0x38 (C)
[   33.534804]  dump_stack_lvl+0x8c/0xd0
[   33.535046]  print_report+0x118/0x5f0
[   33.535295]  kasan_report+0xc8/0x118
[   33.535432]  __asan_report_store1_noabort+0x20/0x30
[   33.535603]  kmalloc_large_oob_right+0x278/0x2b8
[   33.535858]  kunit_try_run_case+0x14c/0x3d0
[   33.536018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.536809]  kthread+0x318/0x618
[   33.536981]  ret_from_fork+0x10/0x20
[   33.537397] 
[   33.537577] The buggy address belongs to the physical page:
[   33.537689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e4
[   33.537855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.538001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.538212] page_type: f8(unknown)
[   33.538320] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.538504] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.538763] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.538933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   33.539128] head: 0bfffe0000000002 ffffc1ffc31db901 00000000ffffffff 00000000ffffffff
[   33.539274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.539850] page dumped because: kasan: bad access detected
[   33.540018] 
[   33.540100] Memory state around the buggy address:
[   33.540206]  fff00000c76e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.540340]  fff00000c76e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.540524] >fff00000c76e6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.540967]                       ^
[   33.541220]  fff00000c76e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.541443]  fff00000c76e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.541646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   33.487545] ==================================================================
[   33.488256] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   33.488708] Write of size 1 at addr fff00000c68a5f00 by task kunit_try_catch/146
[   33.488857] 
[   33.489169] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.489527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.489884] Hardware name: linux,dummy-virt (DT)
[   33.490149] Call trace:
[   33.490222]  show_stack+0x20/0x38 (C)
[   33.490794]  dump_stack_lvl+0x8c/0xd0
[   33.490981]  print_report+0x118/0x5f0
[   33.491352]  kasan_report+0xc8/0x118
[   33.491899]  __asan_report_store1_noabort+0x20/0x30
[   33.492111]  kmalloc_big_oob_right+0x2a4/0x2f0
[   33.492266]  kunit_try_run_case+0x14c/0x3d0
[   33.492421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.492593]  kthread+0x318/0x618
[   33.493267]  ret_from_fork+0x10/0x20
[   33.493540] 
[   33.493606] Allocated by task 146:
[   33.493692]  kasan_save_stack+0x3c/0x68
[   33.494085]  kasan_save_track+0x20/0x40
[   33.494399]  kasan_save_alloc_info+0x40/0x58
[   33.494639]  __kasan_kmalloc+0xd4/0xd8
[   33.495280]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.495764]  kmalloc_big_oob_right+0xb8/0x2f0
[   33.496160]  kunit_try_run_case+0x14c/0x3d0
[   33.496292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496909]  kthread+0x318/0x618
[   33.497046]  ret_from_fork+0x10/0x20
[   33.497193] 
[   33.497542] The buggy address belongs to the object at fff00000c68a4000
[   33.497542]  which belongs to the cache kmalloc-8k of size 8192
[   33.497747] The buggy address is located 0 bytes to the right of
[   33.497747]  allocated 7936-byte region [fff00000c68a4000, fff00000c68a5f00)
[   33.498200] 
[   33.498461] The buggy address belongs to the physical page:
[   33.498659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a0
[   33.498829] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.498984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.499166] page_type: f5(slab)
[   33.499281] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   33.499441] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   33.499602] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   33.499760] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   33.499921] head: 0bfffe0000000003 ffffc1ffc31a2801 00000000ffffffff 00000000ffffffff
[   33.501118] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   33.501274] page dumped because: kasan: bad access detected
[   33.501370] 
[   33.501448] Memory state around the buggy address:
[   33.501547]  fff00000c68a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.501683]  fff00000c68a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.501823] >fff00000c68a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.502279]                    ^
[   33.502397]  fff00000c68a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.502675]  fff00000c68a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.502804] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   33.438189] ==================================================================
[   33.438343] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   33.438503] Write of size 1 at addr fff00000c6818578 by task kunit_try_catch/144
[   33.438824] 
[   33.438967] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.439259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.439346] Hardware name: linux,dummy-virt (DT)
[   33.439446] Call trace:
[   33.439539]  show_stack+0x20/0x38 (C)
[   33.439710]  dump_stack_lvl+0x8c/0xd0
[   33.439876]  print_report+0x118/0x5f0
[   33.440081]  kasan_report+0xc8/0x118
[   33.440217]  __asan_report_store1_noabort+0x20/0x30
[   33.440467]  kmalloc_track_caller_oob_right+0x414/0x490
[   33.440653]  kunit_try_run_case+0x14c/0x3d0
[   33.440854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.441197]  kthread+0x318/0x618
[   33.441426]  ret_from_fork+0x10/0x20
[   33.441656] 
[   33.441719] Allocated by task 144:
[   33.441812]  kasan_save_stack+0x3c/0x68
[   33.441932]  kasan_save_track+0x20/0x40
[   33.442046]  kasan_save_alloc_info+0x40/0x58
[   33.442182]  __kasan_kmalloc+0xd4/0xd8
[   33.442282]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   33.442412]  kmalloc_track_caller_oob_right+0xa8/0x490
[   33.442548]  kunit_try_run_case+0x14c/0x3d0
[   33.442689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.442822]  kthread+0x318/0x618
[   33.443097]  ret_from_fork+0x10/0x20
[   33.443221] 
[   33.443279] The buggy address belongs to the object at fff00000c6818500
[   33.443279]  which belongs to the cache kmalloc-128 of size 128
[   33.443559] The buggy address is located 0 bytes to the right of
[   33.443559]  allocated 120-byte region [fff00000c6818500, fff00000c6818578)
[   33.443803] 
[   33.443920] The buggy address belongs to the physical page:
[   33.444022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   33.444212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.444391] page_type: f5(slab)
[   33.444501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.444652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.444783] page dumped because: kasan: bad access detected
[   33.444893] 
[   33.444948] Memory state around the buggy address:
[   33.445043]  fff00000c6818400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.445197]  fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.445410] >fff00000c6818500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.445563]                                                                 ^
[   33.445695]  fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.445863]  fff00000c6818600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.446072] ==================================================================
[   33.447881] ==================================================================
[   33.448007] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   33.448297] Write of size 1 at addr fff00000c6818678 by task kunit_try_catch/144
[   33.448524] 
[   33.448678] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.449158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.449262] Hardware name: linux,dummy-virt (DT)
[   33.449366] Call trace:
[   33.449425]  show_stack+0x20/0x38 (C)
[   33.449639]  dump_stack_lvl+0x8c/0xd0
[   33.449825]  print_report+0x118/0x5f0
[   33.449965]  kasan_report+0xc8/0x118
[   33.450178]  __asan_report_store1_noabort+0x20/0x30
[   33.450352]  kmalloc_track_caller_oob_right+0x420/0x490
[   33.450612]  kunit_try_run_case+0x14c/0x3d0
[   33.450851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.451375]  kthread+0x318/0x618
[   33.451540]  ret_from_fork+0x10/0x20
[   33.451681] 
[   33.451772] Allocated by task 144:
[   33.452098]  kasan_save_stack+0x3c/0x68
[   33.452431]  kasan_save_track+0x20/0x40
[   33.452602]  kasan_save_alloc_info+0x40/0x58
[   33.452735]  __kasan_kmalloc+0xd4/0xd8
[   33.452899]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   33.453080]  kmalloc_track_caller_oob_right+0x184/0x490
[   33.453308]  kunit_try_run_case+0x14c/0x3d0
[   33.453467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.453632]  kthread+0x318/0x618
[   33.453746]  ret_from_fork+0x10/0x20
[   33.453859] 
[   33.453922] The buggy address belongs to the object at fff00000c6818600
[   33.453922]  which belongs to the cache kmalloc-128 of size 128
[   33.454135] The buggy address is located 0 bytes to the right of
[   33.454135]  allocated 120-byte region [fff00000c6818600, fff00000c6818678)
[   33.454503] 
[   33.454568] The buggy address belongs to the physical page:
[   33.454661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   33.455129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.455323] page_type: f5(slab)
[   33.455485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.455690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.455897] page dumped because: kasan: bad access detected
[   33.456074] 
[   33.456166] Memory state around the buggy address:
[   33.456316]  fff00000c6818500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.456584]  fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.456741] >fff00000c6818600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.456858]                                                                 ^
[   33.457307]  fff00000c6818680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.457525]  fff00000c6818700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.457673] ==================================================================
Failure - kunit/_wmfw_too_short_for_block_payload
_wmfw_too_short_for_block_payload fail
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   33.387013] ==================================================================
[   33.387214] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   33.387762] Read of size 1 at addr fff00000c687d000 by task kunit_try_catch/142
[   33.387998] 
[   33.388145] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.388510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.388647] Hardware name: linux,dummy-virt (DT)
[   33.388751] Call trace:
[   33.388818]  show_stack+0x20/0x38 (C)
[   33.389171]  dump_stack_lvl+0x8c/0xd0
[   33.389376]  print_report+0x118/0x5f0
[   33.389898]  kasan_report+0xc8/0x118
[   33.390087]  __asan_report_load1_noabort+0x20/0x30
[   33.390354]  kmalloc_node_oob_right+0x2f4/0x330
[   33.390561]  kunit_try_run_case+0x14c/0x3d0
[   33.390720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.390890]  kthread+0x318/0x618
[   33.391068]  ret_from_fork+0x10/0x20
[   33.391215] 
[   33.391641] Allocated by task 142:
[   33.391862]  kasan_save_stack+0x3c/0x68
[   33.391944]  kasan_save_track+0x20/0x40
[   33.392008]  kasan_save_alloc_info+0x40/0x58
[   33.392188]  __kasan_kmalloc+0xd4/0xd8
[   33.392362]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   33.392502]  kmalloc_node_oob_right+0xbc/0x330
[   33.392626]  kunit_try_run_case+0x14c/0x3d0
[   33.392746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.393208]  kthread+0x318/0x618
[   33.393380]  ret_from_fork+0x10/0x20
[   33.393533] 
[   33.393623] The buggy address belongs to the object at fff00000c687c000
[   33.393623]  which belongs to the cache kmalloc-4k of size 4096
[   33.393866] The buggy address is located 0 bytes to the right of
[   33.393866]  allocated 4096-byte region [fff00000c687c000, fff00000c687d000)
[   33.394183] 
[   33.394286] The buggy address belongs to the physical page:
[   33.394512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106878
[   33.395145] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.395303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.395523] page_type: f5(slab)
[   33.395714] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   33.395892] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   33.396134] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   33.396348] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   33.396512] head: 0bfffe0000000003 ffffc1ffc31a1e01 00000000ffffffff 00000000ffffffff
[   33.397214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   33.397496] page dumped because: kasan: bad access detected
[   33.397602] 
[   33.397657] Memory state around the buggy address:
[   33.397750]  fff00000c687cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.397881]  fff00000c687cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.398011] >fff00000c687d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.398144]                    ^
[   33.398226]  fff00000c687d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.398354]  fff00000c687d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.399101] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   33.349940] ==================================================================
[   33.350189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   33.350340] Read of size 1 at addr fff00000c5c8ef9f by task kunit_try_catch/140
[   33.350497] 
[   33.350587] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.350847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.350941] Hardware name: linux,dummy-virt (DT)
[   33.351040] Call trace:
[   33.351154]  show_stack+0x20/0x38 (C)
[   33.351303]  dump_stack_lvl+0x8c/0xd0
[   33.351562]  print_report+0x118/0x5f0
[   33.351744]  kasan_report+0xc8/0x118
[   33.351988]  __asan_report_load1_noabort+0x20/0x30
[   33.352162]  kmalloc_oob_left+0x2ec/0x320
[   33.352316]  kunit_try_run_case+0x14c/0x3d0
[   33.352531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.352857]  kthread+0x318/0x618
[   33.353117]  ret_from_fork+0x10/0x20
[   33.353270] 
[   33.353362] Allocated by task 26:
[   33.353448]  kasan_save_stack+0x3c/0x68
[   33.353674]  kasan_save_track+0x20/0x40
[   33.353860]  kasan_save_alloc_info+0x40/0x58
[   33.354066]  __kasan_kmalloc+0xd4/0xd8
[   33.354227]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   33.354398]  kstrdup+0x54/0xc8
[   33.354532]  devtmpfs_work_loop+0x38c/0x5a0
[   33.354703]  devtmpfsd+0x50/0x58
[   33.354835]  kthread+0x318/0x618
[   33.355025]  ret_from_fork+0x10/0x20
[   33.355154] 
[   33.355235] Freed by task 26:
[   33.355465]  kasan_save_stack+0x3c/0x68
[   33.355603]  kasan_save_track+0x20/0x40
[   33.355719]  kasan_save_free_info+0x4c/0x78
[   33.355856]  __kasan_slab_free+0x6c/0x98
[   33.356021]  kfree+0x214/0x3c8
[   33.356194]  devtmpfs_work_loop+0x484/0x5a0
[   33.356340]  devtmpfsd+0x50/0x58
[   33.356472]  kthread+0x318/0x618
[   33.356594]  ret_from_fork+0x10/0x20
[   33.356907] 
[   33.357164] The buggy address belongs to the object at fff00000c5c8ef80
[   33.357164]  which belongs to the cache kmalloc-16 of size 16
[   33.357572] The buggy address is located 15 bytes to the right of
[   33.357572]  allocated 16-byte region [fff00000c5c8ef80, fff00000c5c8ef90)
[   33.357770] 
[   33.357832] The buggy address belongs to the physical page:
[   33.358708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c8e
[   33.358901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.359086] page_type: f5(slab)
[   33.359197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.359356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.359490] page dumped because: kasan: bad access detected
[   33.359590] 
[   33.359647] Memory state around the buggy address:
[   33.359744]  fff00000c5c8ee80: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[   33.359880]  fff00000c5c8ef00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   33.361000] >fff00000c5c8ef80: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   33.361348]                             ^
[   33.362129]  fff00000c5c8f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.362294]  fff00000c5c8f080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   33.362408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   33.292935] ==================================================================
[   33.293660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   33.295071] Write of size 1 at addr fff00000c6818473 by task kunit_try_catch/138
[   33.295256] 
[   33.296557] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.296984] Tainted: [N]=TEST
[   33.297108] Hardware name: linux,dummy-virt (DT)
[   33.297611] Call trace:
[   33.297857]  show_stack+0x20/0x38 (C)
[   33.298107]  dump_stack_lvl+0x8c/0xd0
[   33.298218]  print_report+0x118/0x5f0
[   33.298295]  kasan_report+0xc8/0x118
[   33.298368]  __asan_report_store1_noabort+0x20/0x30
[   33.298449]  kmalloc_oob_right+0x5a4/0x660
[   33.298527]  kunit_try_run_case+0x14c/0x3d0
[   33.298609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.298696]  kthread+0x318/0x618
[   33.298771]  ret_from_fork+0x10/0x20
[   33.299028] 
[   33.299108] Allocated by task 138:
[   33.299301]  kasan_save_stack+0x3c/0x68
[   33.299406]  kasan_save_track+0x20/0x40
[   33.299469]  kasan_save_alloc_info+0x40/0x58
[   33.299532]  __kasan_kmalloc+0xd4/0xd8
[   33.299589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.299658]  kmalloc_oob_right+0xb0/0x660
[   33.299719]  kunit_try_run_case+0x14c/0x3d0
[   33.299783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.299855]  kthread+0x318/0x618
[   33.299912]  ret_from_fork+0x10/0x20
[   33.300006] 
[   33.300120] The buggy address belongs to the object at fff00000c6818400
[   33.300120]  which belongs to the cache kmalloc-128 of size 128
[   33.300274] The buggy address is located 0 bytes to the right of
[   33.300274]  allocated 115-byte region [fff00000c6818400, fff00000c6818473)
[   33.300459] 
[   33.300684] The buggy address belongs to the physical page:
[   33.301191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   33.301870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.302375] page_type: f5(slab)
[   33.302854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.302970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.303168] page dumped because: kasan: bad access detected
[   33.303242] 
[   33.303285] Memory state around the buggy address:
[   33.303647]  fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.303769]  fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.303863] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.303954]                                                              ^
[   33.304102]  fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.304175]  fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.304281] ==================================================================
[   33.305688] ==================================================================
[   33.305929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   33.306091] Write of size 1 at addr fff00000c6818478 by task kunit_try_catch/138
[   33.306247] 
[   33.306333] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.306593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.306678] Hardware name: linux,dummy-virt (DT)
[   33.306776] Call trace:
[   33.306842]  show_stack+0x20/0x38 (C)
[   33.307001]  dump_stack_lvl+0x8c/0xd0
[   33.310020]  print_report+0x118/0x5f0
[   33.310190]  kasan_report+0xc8/0x118
[   33.310330]  __asan_report_store1_noabort+0x20/0x30
[   33.310481]  kmalloc_oob_right+0x538/0x660
[   33.310629]  kunit_try_run_case+0x14c/0x3d0
[   33.311653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.312133]  kthread+0x318/0x618
[   33.312590]  ret_from_fork+0x10/0x20
[   33.312763] 
[   33.312820] Allocated by task 138:
[   33.312901]  kasan_save_stack+0x3c/0x68
[   33.313394]  kasan_save_track+0x20/0x40
[   33.313537]  kasan_save_alloc_info+0x40/0x58
[   33.313662]  __kasan_kmalloc+0xd4/0xd8
[   33.313957]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.314313]  kmalloc_oob_right+0xb0/0x660
[   33.314703]  kunit_try_run_case+0x14c/0x3d0
[   33.315154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.315319]  kthread+0x318/0x618
[   33.315447]  ret_from_fork+0x10/0x20
[   33.315576] 
[   33.315636] The buggy address belongs to the object at fff00000c6818400
[   33.315636]  which belongs to the cache kmalloc-128 of size 128
[   33.315878] The buggy address is located 5 bytes to the right of
[   33.315878]  allocated 115-byte region [fff00000c6818400, fff00000c6818473)
[   33.316206] 
[   33.316266] The buggy address belongs to the physical page:
[   33.316412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   33.316572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.316720] page_type: f5(slab)
[   33.316831] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.316979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.317133] page dumped because: kasan: bad access detected
[   33.317248] 
[   33.317341] Memory state around the buggy address:
[   33.317470]  fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.317624]  fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.317815] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.317988]                                                                 ^
[   33.318170]  fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.318304]  fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.318421] ==================================================================
[   33.319152] ==================================================================
[   33.319277] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   33.319470] Read of size 1 at addr fff00000c6818480 by task kunit_try_catch/138
[   33.319794] 
[   33.319945] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   33.320918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.321247] Hardware name: linux,dummy-virt (DT)
[   33.321367] Call trace:
[   33.321549]  show_stack+0x20/0x38 (C)
[   33.321716]  dump_stack_lvl+0x8c/0xd0
[   33.321860]  print_report+0x118/0x5f0
[   33.322001]  kasan_report+0xc8/0x118
[   33.322158]  __asan_report_load1_noabort+0x20/0x30
[   33.323224]  kmalloc_oob_right+0x5d0/0x660
[   33.323389]  kunit_try_run_case+0x14c/0x3d0
[   33.323540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.323709]  kthread+0x318/0x618
[   33.323852]  ret_from_fork+0x10/0x20
[   33.324006] 
[   33.324121] Allocated by task 138:
[   33.324226]  kasan_save_stack+0x3c/0x68
[   33.324399]  kasan_save_track+0x20/0x40
[   33.324582]  kasan_save_alloc_info+0x40/0x58
[   33.324708]  __kasan_kmalloc+0xd4/0xd8
[   33.324817]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.324935]  kmalloc_oob_right+0xb0/0x660
[   33.325112]  kunit_try_run_case+0x14c/0x3d0
[   33.325236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.325374]  kthread+0x318/0x618
[   33.325486]  ret_from_fork+0x10/0x20
[   33.325650] 
[   33.325723] The buggy address belongs to the object at fff00000c6818400
[   33.325723]  which belongs to the cache kmalloc-128 of size 128
[   33.326007] The buggy address is located 13 bytes to the right of
[   33.326007]  allocated 115-byte region [fff00000c6818400, fff00000c6818473)
[   33.326271] 
[   33.326329] The buggy address belongs to the physical page:
[   33.326423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818
[   33.326585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.326733] page_type: f5(slab)
[   33.326888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.327302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.327714] page dumped because: kasan: bad access detected
[   33.327835] 
[   33.327890] Memory state around the buggy address:
[   33.327984]  fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328349]  fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.328552] >fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328685]                    ^
[   33.328775]  fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328944]  fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.329122] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  147.125253] WARNING: CPU: 1 PID: 668 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  147.127173] Modules linked in:
[  147.128226] CPU: 1 UID: 0 PID: 668 Comm: kunit_try_catch Tainted: G    B D W        N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  147.129284] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  147.129999] Hardware name: linux,dummy-virt (DT)
[  147.131236] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  147.132185] pc : intlog10+0x38/0x48
[  147.133095] lr : intlog10_test+0xe4/0x200
[  147.134158] sp : ffff8000823b7c10
[  147.134750] x29: ffff8000823b7c90 x28: 0000000000000000 x27: 0000000000000000
[  147.135874] x26: 1ffe000019182ea1 x25: 0000000000000000 x24: ffff8000800879a8
[  147.136993] x23: fff00000c1933cc0 x22: 0000000000000000 x21: 1ffff00010476f82
[  147.138486] x20: ffffaabf7c0d66e0 x19: ffff800080087990 x18: 0000000053f3a723
[  147.139496] x17: 00000000f3c6eb01 x16: fff00000c096e03c x15: fff00000ff616b48
[  147.140543] x14: fff00000ff615dc0 x13: 1ffe00001b48720d x12: ffff7557efffc361
[  147.141843] x11: 1ffff557efffc360 x10: ffff7557efffc360 x9 : ffffaabf7960233c
[  147.142834] x8 : ffffaabf7ffe1b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  147.143826] x5 : ffff700010476f82 x4 : 1ffff00010010f3a x3 : 1ffff557ef81acdc
[  147.144969] x2 : 1ffff557ef81acdc x1 : 0000000000000003 x0 : 0000000000000000
[  147.145796] Call trace:
[  147.146489]  intlog10+0x38/0x48 (P)
[  147.147221]  kunit_try_run_case+0x14c/0x3d0
[  147.148017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.148771]  kthread+0x318/0x618
[  147.149375]  ret_from_fork+0x10/0x20
[  147.149836] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  147.001025] WARNING: CPU: 1 PID: 650 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  147.003255] Modules linked in:
[  147.003963] CPU: 1 UID: 0 PID: 650 Comm: kunit_try_catch Tainted: G    B D          N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  147.005685] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  147.006406] Hardware name: linux,dummy-virt (DT)
[  147.006908] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  147.007786] pc : intlog2+0xd8/0xf8
[  147.008412] lr : intlog2_test+0xe4/0x200
[  147.009429] sp : ffff8000822d7c10
[  147.009906] x29: ffff8000822d7c90 x28: 0000000000000000 x27: 0000000000000000
[  147.010908] x26: 1ffe000018b9f061 x25: 0000000000000000 x24: ffff8000800879a8
[  147.011975] x23: fff00000c14ebcc0 x22: 0000000000000000 x21: 1ffff0001045af82
[  147.013311] x20: ffffaabf7c0d65e0 x19: ffff800080087990 x18: 00000000445304d0
[  147.014340] x17: 000000001464bfbd x16: fff00000c096e03c x15: fff00000ff616b48
[  147.015372] x14: fff00000ff615dc0 x13: 1ffe00001b48720d x12: ffff7557efffc361
[  147.016461] x11: 1ffff557efffc360 x10: ffff7557efffc360 x9 : ffffaabf7960253c
[  147.017738] x8 : ffffaabf7ffe1b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  147.018753] x5 : ffff70001045af82 x4 : 1ffff00010010f3a x3 : 1ffff557ef81acbc
[  147.019781] x2 : 1ffff557ef81acbc x1 : 0000000000000003 x0 : 0000000000000000
[  147.020845] Call trace:
[  147.021242]  intlog2+0xd8/0xf8 (P)
[  147.021826]  kunit_try_run_case+0x14c/0x3d0
[  147.022854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.023556]  kthread+0x318/0x618
[  147.024076]  ret_from_fork+0x10/0x20
[  147.025016] ---[ end trace 0000000000000000 ]---
Failure - kunit/wmfw_too_short_for_block_header_cs_dsp_wmfwV2_err_adsp2_16bit
(no logs available)
Failure - kunit/wmfw_block_payload_len_garbage_wmfw_block_payload_len_garbage
(no logs available)
Failure - kunit/wmfw_block_payload_len_garbage_block_type0xff
(no logs available)
[  145.105875] Internal error: Oops: 0000000096000005 [#1]  SMP
[  145.113693] Modules linked in:
[  145.114848] CPU: 1 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  145.116422] Tainted: [B]=BAD_PAGE, [N]=TEST
[  145.117072] Hardware name: linux,dummy-virt (DT)
[  145.118045] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  145.119292] pc : kunit_test_null_dereference+0x70/0x170
[  145.120102] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  145.121152] sp : ffff800081f77d30
[  145.121658] x29: ffff800081f77d90 x28: 0000000000000000 x27: 0000000000000000
[  145.122939] x26: 1ffe000018b8ab41 x25: 0000000000000000 x24: fff00000c5bc8900
[  145.123850] x23: ffffaabf795e5b88 x22: ffffaabf795eea38 x21: fff00000c5bc8908
[  145.125283] x20: 1ffff000103eefa6 x19: ffff800080087990 x18: 000000008f402c82
[  145.126326] x17: 00000000d9987b92 x16: 00000000cb7f1d0d x15: 1ffe00001b48b5d0
[  145.127320] x14: dfff800000000000 x13: 0000000000000000 x12: fffd8000196b811c
[  145.128323] x11: 1ffe0000196b811b x10: fffd8000196b811b x9 : ffffaabf795e5c10
[  145.129569] x8 : ffff800081f77c28 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  145.130667] x5 : ffff7000103eefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  145.131656] x2 : dfff800000000000 x1 : fff00000cb5c0000 x0 : ffff800080087990
[  145.132796] Call trace:
[  145.133304]  kunit_test_null_dereference+0x70/0x170 (P)
[  145.133986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  145.134706]  kthread+0x318/0x618
[  145.135280]  ret_from_fork+0x10/0x20
[  145.136442] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  145.137683] ---[ end trace 0000000000000000 ]---