Hay
Date
May 12, 2025, 11:48 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.207895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   19.267832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   19.358680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   19.142250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.147844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[   90.948694] Internal error: Oops: 0000000096000005 [#1]  SMP
[   90.953289] Modules linked in:
[   90.953725] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   90.954201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   90.954392] Hardware name: linux,dummy-virt (DT)
[   90.954727] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   90.955061] pc : kunit_test_null_dereference+0x70/0x170
[   90.955365] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   90.955622] sp : ffff8000820f7d30
[   90.955837] x29: ffff8000820f7d90 x28: 0000000000000000 x27: 0000000000000000
[   90.956291] x26: 1ffe000018231261 x25: 0000000000000000 x24: 0000000000000004
[   90.956654] x23: fff00000c118930c x22: ffffa8e06ce0acd8 x21: fff00000c139d508
[   90.957016] x20: 1ffff0001041efa6 x19: ffff800080087990 x18: 000000006e2a1856
[   90.957383] x17: 000000007f48da98 x16: 0000000000000100 x15: 000000008884be47
[   90.957743] x14: 000000005bb35c1c x13: 1ffe00001b48ad81 x12: fffd8000182d062c
[   90.958079] x11: 1ffe0000182d062b x10: fffd8000182d062b x9 : ffffa8e06ce02140
[   90.958465] x8 : ffff8000820f7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   90.958820] x5 : ffff70001041efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   90.959219] x2 : dfff800000000000 x1 : fff00000c1682880 x0 : ffff800080087990
[   90.959579] Call trace:
[   90.959707]  kunit_test_null_dereference+0x70/0x170 (P)
[   90.959971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   90.960236]  kthread+0x328/0x630
[   90.960493]  ret_from_fork+0x10/0x20
[   90.960897] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   90.961436] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   49.847447] ==================================================================
[   49.847515] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   49.847515] 
[   49.847609] Use-after-free read at 0x00000000a2f1349e (in kfence-#171):
[   49.847663]  test_krealloc+0x51c/0x830
[   49.847708]  kunit_try_run_case+0x170/0x3f0
[   49.847752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.847794]  kthread+0x328/0x630
[   49.847835]  ret_from_fork+0x10/0x20
[   49.847875] 
[   49.847899] kfence-#171: 0x00000000a2f1349e-0x000000004ed040c9, size=32, cache=kmalloc-32
[   49.847899] 
[   49.847953] allocated by task 337 on cpu 1 at 49.846600s (0.001349s ago):
[   49.848022]  test_alloc+0x29c/0x628
[   49.848075]  test_krealloc+0xc0/0x830
[   49.848113]  kunit_try_run_case+0x170/0x3f0
[   49.848151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.848193]  kthread+0x328/0x630
[   49.848231]  ret_from_fork+0x10/0x20
[   49.848268] 
[   49.848292] freed by task 337 on cpu 1 at 49.846987s (0.001300s ago):
[   49.848351]  krealloc_noprof+0x148/0x360
[   49.848390]  test_krealloc+0x1dc/0x830
[   49.848427]  kunit_try_run_case+0x170/0x3f0
[   49.848463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.848504]  kthread+0x328/0x630
[   49.848539]  ret_from_fork+0x10/0x20
[   49.848577] 
[   49.848623] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   49.848704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.848735] Hardware name: linux,dummy-virt (DT)
[   49.848770] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   49.774681] ==================================================================
[   49.774790] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   49.774790] 
[   49.774902] Use-after-free read at 0x000000004b039977 (in kfence-#170):
[   49.774959]  test_memcache_typesafe_by_rcu+0x280/0x560
[   49.775011]  kunit_try_run_case+0x170/0x3f0
[   49.775070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.775116]  kthread+0x328/0x630
[   49.775160]  ret_from_fork+0x10/0x20
[   49.775200] 
[   49.775226] kfence-#170: 0x000000004b039977-0x00000000635159b6, size=32, cache=test
[   49.775226] 
[   49.775279] allocated by task 335 on cpu 0 at 49.742509s (0.032766s ago):
[   49.775351]  test_alloc+0x230/0x628
[   49.775389]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   49.775431]  kunit_try_run_case+0x170/0x3f0
[   49.775467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.775507]  kthread+0x328/0x630
[   49.775545]  ret_from_fork+0x10/0x20
[   49.775581] 
[   49.775604] freed by task 335 on cpu 0 at 49.742677s (0.032923s ago):
[   49.775659]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   49.775701]  kunit_try_run_case+0x170/0x3f0
[   49.775738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.775779]  kthread+0x328/0x630
[   49.775814]  ret_from_fork+0x10/0x20
[   49.775852] 
[   49.775899] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   49.775977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.776007] Hardware name: linux,dummy-virt (DT)
[   49.776049] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   27.819703] ==================================================================
[   27.819893] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   27.819893] 
[   27.820087] Invalid read at 0x00000000e9e653cc:
[   27.820207]  test_invalid_access+0xdc/0x1f0
[   27.820325]  kunit_try_run_case+0x170/0x3f0
[   27.820435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.820539]  kthread+0x328/0x630
[   27.820642]  ret_from_fork+0x10/0x20
[   27.820752] 
[   27.820858] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   27.821060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.821155] Hardware name: linux,dummy-virt (DT)
[   27.821246] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   27.586843] ==================================================================
[   27.586938] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.586938] 
[   27.587004] Corrupted memory at 0x0000000023a7d5e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#165):
[   27.587336]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.587386]  kunit_try_run_case+0x170/0x3f0
[   27.587429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.587472]  kthread+0x328/0x630
[   27.587512]  ret_from_fork+0x10/0x20
[   27.587549] 
[   27.587576] kfence-#165: 0x00000000a23a880c-0x000000004de97bd3, size=73, cache=kmalloc-96
[   27.587576] 
[   27.587631] allocated by task 325 on cpu 1 at 27.586466s (0.001161s ago):
[   27.587696]  test_alloc+0x29c/0x628
[   27.587738]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   27.587781]  kunit_try_run_case+0x170/0x3f0
[   27.587820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.587861]  kthread+0x328/0x630
[   27.587900]  ret_from_fork+0x10/0x20
[   27.587939] 
[   27.587963] freed by task 325 on cpu 1 at 27.586670s (0.001289s ago):
[   27.588024]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.588080]  kunit_try_run_case+0x170/0x3f0
[   27.588120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.588162]  kthread+0x328/0x630
[   27.588201]  ret_from_fork+0x10/0x20
[   27.588240] 
[   27.588282] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   27.588367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.588397] Hardware name: linux,dummy-virt (DT)
[   27.588431] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   27.378725] ==================================================================
[   27.378795] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   27.378795] 
[   27.378895] Out-of-bounds read at 0x000000009f98511c (105B right of kfence-#163):
[   27.378958]  test_kmalloc_aligned_oob_read+0x238/0x468
[   27.379009]  kunit_try_run_case+0x170/0x3f0
[   27.379066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.379110]  kthread+0x328/0x630
[   27.379153]  ret_from_fork+0x10/0x20
[   27.379191] 
[   27.379216] kfence-#163: 0x0000000004ab0743-0x00000000bfb0b80e, size=73, cache=kmalloc-96
[   27.379216] 
[   27.379270] allocated by task 323 on cpu 1 at 27.378428s (0.000837s ago):
[   27.379341]  test_alloc+0x29c/0x628
[   27.379379]  test_kmalloc_aligned_oob_read+0x100/0x468
[   27.379421]  kunit_try_run_case+0x170/0x3f0
[   27.379457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.379499]  kthread+0x328/0x630
[   27.379535]  ret_from_fork+0x10/0x20
[   27.379574] 
[   27.379620] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   27.379700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.379731] Hardware name: linux,dummy-virt (DT)
[   27.379767] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   21.658665] ==================================================================
[   21.658747] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   21.658747] 
[   21.658813] Corrupted memory at 0x00000000afb8e7a5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#108):
[   21.659128]  test_corruption+0x278/0x378
[   21.659177]  kunit_try_run_case+0x170/0x3f0
[   21.659221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659264]  kthread+0x328/0x630
[   21.659306]  ret_from_fork+0x10/0x20
[   21.659345] 
[   21.659368] kfence-#108: 0x00000000106a56f1-0x0000000026f0997b, size=32, cache=kmalloc-32
[   21.659368] 
[   21.659425] allocated by task 311 on cpu 1 at 21.658472s (0.000949s ago):
[   21.659487]  test_alloc+0x29c/0x628
[   21.659527]  test_corruption+0xdc/0x378
[   21.659563]  kunit_try_run_case+0x170/0x3f0
[   21.659602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659643]  kthread+0x328/0x630
[   21.659679]  ret_from_fork+0x10/0x20
[   21.659715] 
[   21.659738] freed by task 311 on cpu 1 at 21.658579s (0.001155s ago):
[   21.659796]  test_corruption+0x278/0x378
[   21.659833]  kunit_try_run_case+0x170/0x3f0
[   21.659870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659910]  kthread+0x328/0x630
[   21.659947]  ret_from_fork+0x10/0x20
[   21.659984] 
[   21.660027] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.660118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.660148] Hardware name: linux,dummy-virt (DT)
[   21.660182] ==================================================================
[   21.970945] ==================================================================
[   21.971086] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   21.971086] 
[   21.971156] Corrupted memory at 0x000000004ee2c1c8 [ ! ] (in kfence-#111):
[   21.971297]  test_corruption+0x284/0x378
[   21.971344]  kunit_try_run_case+0x170/0x3f0
[   21.971386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.971429]  kthread+0x328/0x630
[   21.971468]  ret_from_fork+0x10/0x20
[   21.971507] 
[   21.971530] kfence-#111: 0x00000000bbe87463-0x000000007b233d5a, size=32, cache=kmalloc-32
[   21.971530] 
[   21.971586] allocated by task 311 on cpu 1 at 21.970525s (0.001058s ago):
[   21.971650]  test_alloc+0x29c/0x628
[   21.971690]  test_corruption+0x198/0x378
[   21.971727]  kunit_try_run_case+0x170/0x3f0
[   21.971764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.971803]  kthread+0x328/0x630
[   21.971842]  ret_from_fork+0x10/0x20
[   21.971879] 
[   21.971901] freed by task 311 on cpu 1 at 21.970683s (0.001214s ago):
[   21.971959]  test_corruption+0x284/0x378
[   21.971998]  kunit_try_run_case+0x170/0x3f0
[   21.972035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.972089]  kthread+0x328/0x630
[   21.972128]  ret_from_fork+0x10/0x20
[   21.972165] 
[   21.972207] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.972285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.972316] Hardware name: linux,dummy-virt (DT)
[   21.972351] ==================================================================
[   22.698749] ==================================================================
[   22.698927] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   22.698927] 
[   22.699023] Corrupted memory at 0x0000000073290a23 [ ! . . . . . . . . . . . . . . . ] (in kfence-#118):
[   22.699341]  test_corruption+0x120/0x378
[   22.699391]  kunit_try_run_case+0x170/0x3f0
[   22.699434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.699477]  kthread+0x328/0x630
[   22.699515]  ret_from_fork+0x10/0x20
[   22.699553] 
[   22.699576] kfence-#118: 0x00000000b67e8002-0x0000000042d19729, size=32, cache=test
[   22.699576] 
[   22.699633] allocated by task 313 on cpu 1 at 22.698511s (0.001119s ago):
[   22.699698]  test_alloc+0x230/0x628
[   22.699739]  test_corruption+0xdc/0x378
[   22.699778]  kunit_try_run_case+0x170/0x3f0
[   22.699814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.699854]  kthread+0x328/0x630
[   22.699890]  ret_from_fork+0x10/0x20
[   22.699928] 
[   22.699953] freed by task 313 on cpu 1 at 22.698604s (0.001345s ago):
[   22.700010]  test_corruption+0x120/0x378
[   22.700057]  kunit_try_run_case+0x170/0x3f0
[   22.700097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.700138]  kthread+0x328/0x630
[   22.700176]  ret_from_fork+0x10/0x20
[   22.700212] 
[   22.700259] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   22.700336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.700366] Hardware name: linux,dummy-virt (DT)
[   22.700398] ==================================================================
[   23.010775] ==================================================================
[   23.010943] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   23.010943] 
[   23.011062] Corrupted memory at 0x000000001dfa8df5 [ ! ] (in kfence-#121):
[   23.011186]  test_corruption+0x1d8/0x378
[   23.011233]  kunit_try_run_case+0x170/0x3f0
[   23.011276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.011318]  kthread+0x328/0x630
[   23.011359]  ret_from_fork+0x10/0x20
[   23.011396] 
[   23.011421] kfence-#121: 0x00000000a57fa0bf-0x0000000084dabe98, size=32, cache=test
[   23.011421] 
[   23.011477] allocated by task 313 on cpu 1 at 23.010536s (0.000937s ago):
[   23.011542]  test_alloc+0x230/0x628
[   23.011582]  test_corruption+0x198/0x378
[   23.011621]  kunit_try_run_case+0x170/0x3f0
[   23.011659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.011700]  kthread+0x328/0x630
[   23.011737]  ret_from_fork+0x10/0x20
[   23.011774] 
[   23.011798] freed by task 313 on cpu 1 at 23.010632s (0.001162s ago):
[   23.011856]  test_corruption+0x1d8/0x378
[   23.011895]  kunit_try_run_case+0x170/0x3f0
[   23.011932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.011973]  kthread+0x328/0x630
[   23.012010]  ret_from_fork+0x10/0x20
[   23.012058] 
[   23.012101] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   23.012180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.012210] Hardware name: linux,dummy-virt (DT)
[   23.012244] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   21.554505] ==================================================================
[   21.554595] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   21.554595] 
[   21.554659] Invalid free of 0x00000000bf68c757 (in kfence-#107):
[   21.554712]  test_invalid_addr_free+0xec/0x238
[   21.554759]  kunit_try_run_case+0x170/0x3f0
[   21.554800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.554840]  kthread+0x328/0x630
[   21.554879]  ret_from_fork+0x10/0x20
[   21.554917] 
[   21.554941] kfence-#107: 0x000000000df7af08-0x000000000fa48d90, size=32, cache=test
[   21.554941] 
[   21.554993] allocated by task 309 on cpu 1 at 21.554391s (0.000598s ago):
[   21.555067]  test_alloc+0x230/0x628
[   21.555108]  test_invalid_addr_free+0xd4/0x238
[   21.555149]  kunit_try_run_case+0x170/0x3f0
[   21.555185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.555227]  kthread+0x328/0x630
[   21.555264]  ret_from_fork+0x10/0x20
[   21.555302] 
[   21.555343] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.555423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.555453] Hardware name: linux,dummy-virt (DT)
[   21.555486] ==================================================================
[   21.450626] ==================================================================
[   21.450703] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   21.450703] 
[   21.450768] Invalid free of 0x0000000048dc97a3 (in kfence-#106):
[   21.450825]  test_invalid_addr_free+0x1ac/0x238
[   21.450874]  kunit_try_run_case+0x170/0x3f0
[   21.450919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.450961]  kthread+0x328/0x630
[   21.451006]  ret_from_fork+0x10/0x20
[   21.451072] 
[   21.451100] kfence-#106: 0x00000000a335a609-0x00000000f57d7805, size=32, cache=kmalloc-32
[   21.451100] 
[   21.451156] allocated by task 307 on cpu 1 at 21.450478s (0.000674s ago):
[   21.451222]  test_alloc+0x29c/0x628
[   21.451261]  test_invalid_addr_free+0xd4/0x238
[   21.451302]  kunit_try_run_case+0x170/0x3f0
[   21.451341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.451381]  kthread+0x328/0x630
[   21.451417]  ret_from_fork+0x10/0x20
[   21.451456] 
[   21.451501] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.451585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.451613] Hardware name: linux,dummy-virt (DT)
[   21.451648] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   21.242817] ==================================================================
[   21.242943] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   21.242943] 
[   21.243014] Invalid free of 0x00000000304509bc (in kfence-#104):
[   21.243101]  test_double_free+0x1bc/0x238
[   21.243151]  kunit_try_run_case+0x170/0x3f0
[   21.243194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.243237]  kthread+0x328/0x630
[   21.243277]  ret_from_fork+0x10/0x20
[   21.243315] 
[   21.243340] kfence-#104: 0x00000000304509bc-0x0000000096f48a84, size=32, cache=kmalloc-32
[   21.243340] 
[   21.243395] allocated by task 303 on cpu 0 at 21.242543s (0.000848s ago):
[   21.243459]  test_alloc+0x29c/0x628
[   21.243499]  test_double_free+0xd4/0x238
[   21.243538]  kunit_try_run_case+0x170/0x3f0
[   21.243577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.243618]  kthread+0x328/0x630
[   21.243655]  ret_from_fork+0x10/0x20
[   21.243694] 
[   21.243717] freed by task 303 on cpu 0 at 21.242623s (0.001090s ago):
[   21.243777]  test_double_free+0x1ac/0x238
[   21.243817]  kunit_try_run_case+0x170/0x3f0
[   21.243855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.243896]  kthread+0x328/0x630
[   21.243934]  ret_from_fork+0x10/0x20
[   21.243972] 
[   21.244017] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.244108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.244136] Hardware name: linux,dummy-virt (DT)
[   21.244169] ==================================================================
[   21.346686] ==================================================================
[   21.346778] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   21.346778] 
[   21.346844] Invalid free of 0x00000000a73bcd9a (in kfence-#105):
[   21.346899]  test_double_free+0x100/0x238
[   21.346945]  kunit_try_run_case+0x170/0x3f0
[   21.346988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347031]  kthread+0x328/0x630
[   21.347094]  ret_from_fork+0x10/0x20
[   21.347137] 
[   21.347162] kfence-#105: 0x00000000a73bcd9a-0x00000000613b457c, size=32, cache=test
[   21.347162] 
[   21.347217] allocated by task 305 on cpu 0 at 21.346434s (0.000779s ago):
[   21.347281]  test_alloc+0x230/0x628
[   21.347322]  test_double_free+0xd4/0x238
[   21.347360]  kunit_try_run_case+0x170/0x3f0
[   21.347398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347439]  kthread+0x328/0x630
[   21.347475]  ret_from_fork+0x10/0x20
[   21.347514] 
[   21.347538] freed by task 305 on cpu 0 at 21.346496s (0.001037s ago):
[   21.347598]  test_double_free+0xf0/0x238
[   21.347636]  kunit_try_run_case+0x170/0x3f0
[   21.347674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347714]  kthread+0x328/0x630
[   21.347752]  ret_from_fork+0x10/0x20
[   21.347788] 
[   21.347831] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   21.347912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.347942] Hardware name: linux,dummy-virt (DT)
[   21.347976] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   20.930548] ==================================================================
[   20.930655] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.930655] 
[   20.930753] Use-after-free read at 0x00000000b968c94d (in kfence-#101):
[   20.930813]  test_use_after_free_read+0x114/0x248
[   20.930868]  kunit_try_run_case+0x170/0x3f0
[   20.930916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.930965]  kthread+0x328/0x630
[   20.931013]  ret_from_fork+0x10/0x20
[   20.931069] 
[   20.931097] kfence-#101: 0x00000000b968c94d-0x00000000e88ed70f, size=32, cache=test
[   20.931097] 
[   20.931158] allocated by task 297 on cpu 0 at 20.930360s (0.000795s ago):
[   20.931237]  test_alloc+0x230/0x628
[   20.931283]  test_use_after_free_read+0xd0/0x248
[   20.931329]  kunit_try_run_case+0x170/0x3f0
[   20.931371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.931417]  kthread+0x328/0x630
[   20.931459]  ret_from_fork+0x10/0x20
[   20.931499] 
[   20.931527] freed by task 297 on cpu 0 at 20.930417s (0.001106s ago):
[   20.931642]  test_use_after_free_read+0xf0/0x248
[   20.931689]  kunit_try_run_case+0x170/0x3f0
[   20.931729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.931774]  kthread+0x328/0x630
[   20.931812]  ret_from_fork+0x10/0x20
[   20.931853] 
[   20.931897] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.931990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.932021] Hardware name: linux,dummy-virt (DT)
[   20.932068] ==================================================================
[   20.828166] ==================================================================
[   20.828280] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.828280] 
[   20.828808] Use-after-free read at 0x00000000f0010944 (in kfence-#100):
[   20.828905]  test_use_after_free_read+0x114/0x248
[   20.829492]  kunit_try_run_case+0x170/0x3f0
[   20.829570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.829865]  kthread+0x328/0x630
[   20.829928]  ret_from_fork+0x10/0x20
[   20.830144] 
[   20.830231] kfence-#100: 0x00000000f0010944-0x000000006293033e, size=32, cache=kmalloc-32
[   20.830231] 
[   20.830304] allocated by task 295 on cpu 0 at 20.827628s (0.002672s ago):
[   20.830394]  test_alloc+0x29c/0x628
[   20.830760]  test_use_after_free_read+0xd0/0x248
[   20.830825]  kunit_try_run_case+0x170/0x3f0
[   20.830871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.830917]  kthread+0x328/0x630
[   20.830955]  ret_from_fork+0x10/0x20
[   20.831017] 
[   20.831060] freed by task 295 on cpu 0 at 20.827719s (0.003336s ago):
[   20.831145]  test_use_after_free_read+0x1c0/0x248
[   20.831191]  kunit_try_run_case+0x170/0x3f0
[   20.831232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.831278]  kthread+0x328/0x630
[   20.831317]  ret_from_fork+0x10/0x20
[   20.831358] 
[   20.831408] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.831503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.831552] Hardware name: linux,dummy-virt (DT)
[   20.831590] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   20.514818] ==================================================================
[   20.514885] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.514885] 
[   20.514971] Out-of-bounds write at 0x00000000b4061e8c (1B left of kfence-#97):
[   20.515028]  test_out_of_bounds_write+0x100/0x240
[   20.515099]  kunit_try_run_case+0x170/0x3f0
[   20.515189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.515270]  kthread+0x328/0x630
[   20.515350]  ret_from_fork+0x10/0x20
[   20.515425] 
[   20.515476] kfence-#97: 0x00000000a9eed16a-0x00000000c36fc0b3, size=32, cache=kmalloc-32
[   20.515476] 
[   20.515548] allocated by task 291 on cpu 0 at 20.514676s (0.000868s ago):
[   20.515668]  test_alloc+0x29c/0x628
[   20.515752]  test_out_of_bounds_write+0xc8/0x240
[   20.515800]  kunit_try_run_case+0x170/0x3f0
[   20.515837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.515878]  kthread+0x328/0x630
[   20.515915]  ret_from_fork+0x10/0x20
[   20.515955] 
[   20.515998] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.516090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.516121] Hardware name: linux,dummy-virt (DT)
[   20.516192] ==================================================================
[   20.722858] ==================================================================
[   20.722945] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.722945] 
[   20.723037] Out-of-bounds write at 0x00000000c2bee07f (1B left of kfence-#99):
[   20.723110]  test_out_of_bounds_write+0x100/0x240
[   20.723159]  kunit_try_run_case+0x170/0x3f0
[   20.723202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.723244]  kthread+0x328/0x630
[   20.723283]  ret_from_fork+0x10/0x20
[   20.723321] 
[   20.723347] kfence-#99: 0x00000000ce7d9867-0x00000000e3daef2d, size=32, cache=test
[   20.723347] 
[   20.723403] allocated by task 293 on cpu 0 at 20.722759s (0.000640s ago):
[   20.723479]  test_alloc+0x230/0x628
[   20.723523]  test_out_of_bounds_write+0xc8/0x240
[   20.723565]  kunit_try_run_case+0x170/0x3f0
[   20.723604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.723648]  kthread+0x328/0x630
[   20.723686]  ret_from_fork+0x10/0x20
[   20.723725] 
[   20.723769] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.723860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.723891] Hardware name: linux,dummy-virt (DT)
[   20.723926] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   20.205142] ==================================================================
[   20.205234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   20.205234] 
[   20.205344] Out-of-bounds read at 0x00000000193cecd2 (32B right of kfence-#94):
[   20.205405]  test_out_of_bounds_read+0x1c8/0x3e0
[   20.205454]  kunit_try_run_case+0x170/0x3f0
[   20.205496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.205538]  kthread+0x328/0x630
[   20.205579]  ret_from_fork+0x10/0x20
[   20.205618] 
[   20.205643] kfence-#94: 0x00000000dce77df6-0x00000000db2f43cb, size=32, cache=kmalloc-32
[   20.205643] 
[   20.205695] allocated by task 287 on cpu 0 at 20.204870s (0.000821s ago):
[   20.205763]  test_alloc+0x29c/0x628
[   20.205803]  test_out_of_bounds_read+0x198/0x3e0
[   20.205841]  kunit_try_run_case+0x170/0x3f0
[   20.205877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.210125]  kthread+0x328/0x630
[   20.210651]  ret_from_fork+0x10/0x20
[   20.211011] 
[   20.211190] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.211285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.211317] Hardware name: linux,dummy-virt (DT)
[   20.212098] ==================================================================
[   19.996963] ==================================================================
[   19.997221] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   19.997221] 
[   19.997858] Out-of-bounds read at 0x000000002b0ff27e (1B left of kfence-#92):
[   19.998243]  test_out_of_bounds_read+0x114/0x3e0
[   19.998545]  kunit_try_run_case+0x170/0x3f0
[   19.998799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.998863]  kthread+0x328/0x630
[   19.998922]  ret_from_fork+0x10/0x20
[   19.999140] 
[   19.999234] kfence-#92: 0x00000000201f8987-0x0000000031333c96, size=32, cache=kmalloc-32
[   19.999234] 
[   19.999388] allocated by task 287 on cpu 0 at 19.995327s (0.004056s ago):
[   19.999523]  test_alloc+0x29c/0x628
[   19.999578]  test_out_of_bounds_read+0xdc/0x3e0
[   19.999700]  kunit_try_run_case+0x170/0x3f0
[   19.999854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.000006]  kthread+0x328/0x630
[   20.000196]  ret_from_fork+0x10/0x20
[   20.000400] 
[   20.000691] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.000877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.000988] Hardware name: linux,dummy-virt (DT)
[   20.001063] ==================================================================
[   20.411320] ==================================================================
[   20.411942] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   20.411942] 
[   20.412072] Out-of-bounds read at 0x00000000233dad02 (32B right of kfence-#96):
[   20.412136]  test_out_of_bounds_read+0x1c8/0x3e0
[   20.412615]  kunit_try_run_case+0x170/0x3f0
[   20.412897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.412962]  kthread+0x328/0x630
[   20.413008]  ret_from_fork+0x10/0x20
[   20.413220] 
[   20.413256] kfence-#96: 0x00000000bf25a7fd-0x0000000061b0a8e4, size=32, cache=test
[   20.413256] 
[   20.413405] allocated by task 289 on cpu 0 at 20.411229s (0.002171s ago):
[   20.413482]  test_alloc+0x230/0x628
[   20.413523]  test_out_of_bounds_read+0x198/0x3e0
[   20.413630]  kunit_try_run_case+0x170/0x3f0
[   20.413696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.413744]  kthread+0x328/0x630
[   20.414092]  ret_from_fork+0x10/0x20
[   20.414385] 
[   20.414523] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.414629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.414815] Hardware name: linux,dummy-virt (DT)
[   20.414885] ==================================================================
[   20.308153] ==================================================================
[   20.308232] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.308232] 
[   20.308312] Out-of-bounds read at 0x0000000032b274bf (1B left of kfence-#95):
[   20.308369]  test_out_of_bounds_read+0x114/0x3e0
[   20.308416]  kunit_try_run_case+0x170/0x3f0
[   20.308698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.308772]  kthread+0x328/0x630
[   20.308989]  ret_from_fork+0x10/0x20
[   20.309059] 
[   20.309260] kfence-#95: 0x0000000040bc5ddb-0x00000000f52f52b0, size=32, cache=test
[   20.309260] 
[   20.309328] allocated by task 289 on cpu 0 at 20.308059s (0.001264s ago):
[   20.309809]  test_alloc+0x230/0x628
[   20.310076]  test_out_of_bounds_read+0xdc/0x3e0
[   20.310444]  kunit_try_run_case+0x170/0x3f0
[   20.310507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.310742]  kthread+0x328/0x630
[   20.310793]  ret_from_fork+0x10/0x20
[   20.311139] 
[   20.311333] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   20.311595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.311792] Hardware name: linux,dummy-virt (DT)
[   20.311878] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_4
[   16.736627] ==================================================================
[   16.736767] BUG: KFENCE: memory corruption in kmalloc_oob_memset_4+0x170/0x300
[   16.736767] 
[   16.736892] Corrupted memory at 0x00000000b5f03cb3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#66):
[   16.742249]  kmalloc_oob_memset_4+0x170/0x300
[   16.742575]  kunit_try_run_case+0x170/0x3f0
[   16.742671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.742775]  kthread+0x328/0x630
[   16.742846]  ret_from_fork+0x10/0x20
[   16.743122] 
[   16.743657] kfence-#66: 0x0000000070e56bc7-0x00000000baf79b0e, size=120, cache=kmalloc-128
[   16.743657] 
[   16.744624] allocated by task 174 on cpu 1 at 16.730863s (0.013358s ago):
[   16.744907]  kmalloc_oob_memset_4+0xb0/0x300
[   16.745032]  kunit_try_run_case+0x170/0x3f0
[   16.745127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.745217]  kthread+0x328/0x630
[   16.745289]  ret_from_fork+0x10/0x20
[   16.745424] 
[   16.745836] freed by task 174 on cpu 1 at 16.735697s (0.009828s ago):
[   16.746207]  kmalloc_oob_memset_4+0x170/0x300
[   16.746384]  kunit_try_run_case+0x170/0x3f0
[   16.746556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.746791]  kthread+0x328/0x630
[   16.746923]  ret_from_fork+0x10/0x20
[   16.747447] 
[   16.747586] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.747859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.747934] Hardware name: linux,dummy-virt (DT)
[   16.748013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   19.708559] ==================================================================
[   19.708624] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   19.708691] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.708744] 
[   19.708776] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.708861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.708891] Hardware name: linux,dummy-virt (DT)
[   19.708922] Call trace:
[   19.708946]  show_stack+0x20/0x38 (C)
[   19.708997]  dump_stack_lvl+0x8c/0xd0
[   19.709061]  print_report+0x118/0x608
[   19.709114]  kasan_report+0xdc/0x128
[   19.709161]  kasan_check_range+0x100/0x1a8
[   19.709208]  __kasan_check_write+0x20/0x30
[   19.709256]  strncpy_from_user+0x3c/0x2a0
[   19.709303]  copy_user_test_oob+0x5c0/0xec8
[   19.709349]  kunit_try_run_case+0x170/0x3f0
[   19.709396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.709447]  kthread+0x328/0x630
[   19.709492]  ret_from_fork+0x10/0x20
[   19.709539] 
[   19.709561] Allocated by task 285:
[   19.709589]  kasan_save_stack+0x3c/0x68
[   19.709633]  kasan_save_track+0x20/0x40
[   19.709671]  kasan_save_alloc_info+0x40/0x58
[   19.709710]  __kasan_kmalloc+0xd4/0xd8
[   19.709745]  __kmalloc_noprof+0x190/0x4d0
[   19.709783]  kunit_kmalloc_array+0x34/0x88
[   19.709820]  copy_user_test_oob+0xac/0xec8
[   19.709973]  kunit_try_run_case+0x170/0x3f0
[   19.710065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.710122]  kthread+0x328/0x630
[   19.710171]  ret_from_fork+0x10/0x20
[   19.710226] 
[   19.710248] The buggy address belongs to the object at fff00000c78d3c00
[   19.710248]  which belongs to the cache kmalloc-128 of size 128
[   19.710322] The buggy address is located 0 bytes inside of
[   19.710322]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.710894] 
[   19.710925] The buggy address belongs to the physical page:
[   19.711141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.711257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.711371] page_type: f5(slab)
[   19.711487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.711736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.712066] page dumped because: kasan: bad access detected
[   19.712117] 
[   19.712153] Memory state around the buggy address:
[   19.712198]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.712242]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712299] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.712508]                                                                 ^
[   19.712557]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712737]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712796] ==================================================================
[   19.713494] ==================================================================
[   19.713667] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   19.713732] Write of size 1 at addr fff00000c78d3c78 by task kunit_try_catch/285
[   19.713795] 
[   19.714095] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.714457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.714613] Hardware name: linux,dummy-virt (DT)
[   19.714659] Call trace:
[   19.714747]  show_stack+0x20/0x38 (C)
[   19.715014]  dump_stack_lvl+0x8c/0xd0
[   19.715136]  print_report+0x118/0x608
[   19.715398]  kasan_report+0xdc/0x128
[   19.715462]  __asan_report_store1_noabort+0x20/0x30
[   19.715658]  strncpy_from_user+0x270/0x2a0
[   19.715742]  copy_user_test_oob+0x5c0/0xec8
[   19.715950]  kunit_try_run_case+0x170/0x3f0
[   19.716023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.716137]  kthread+0x328/0x630
[   19.716326]  ret_from_fork+0x10/0x20
[   19.716384] 
[   19.716407] Allocated by task 285:
[   19.717077]  kasan_save_stack+0x3c/0x68
[   19.717136]  kasan_save_track+0x20/0x40
[   19.717185]  kasan_save_alloc_info+0x40/0x58
[   19.717229]  __kasan_kmalloc+0xd4/0xd8
[   19.717308]  __kmalloc_noprof+0x190/0x4d0
[   19.717409]  kunit_kmalloc_array+0x34/0x88
[   19.717628]  copy_user_test_oob+0xac/0xec8
[   19.717763]  kunit_try_run_case+0x170/0x3f0
[   19.717808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.717856]  kthread+0x328/0x630
[   19.718205]  ret_from_fork+0x10/0x20
[   19.718366] 
[   19.718427] The buggy address belongs to the object at fff00000c78d3c00
[   19.718427]  which belongs to the cache kmalloc-128 of size 128
[   19.718577] The buggy address is located 0 bytes to the right of
[   19.718577]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.718728] 
[   19.718809] The buggy address belongs to the physical page:
[   19.718931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.719092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.719147] page_type: f5(slab)
[   19.719190] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.719242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.719283] page dumped because: kasan: bad access detected
[   19.719465] 
[   19.719493] Memory state around the buggy address:
[   19.719681]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.719758]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.719986] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.720050]                                                                 ^
[   19.720101]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.720163]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.720205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   19.672309] ==================================================================
[   19.672378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.672438] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.672491] 
[   19.672526] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.672611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.672641] Hardware name: linux,dummy-virt (DT)
[   19.672673] Call trace:
[   19.672697]  show_stack+0x20/0x38 (C)
[   19.672746]  dump_stack_lvl+0x8c/0xd0
[   19.672794]  print_report+0x118/0x608
[   19.672838]  kasan_report+0xdc/0x128
[   19.672883]  kasan_check_range+0x100/0x1a8
[   19.672930]  __kasan_check_read+0x20/0x30
[   19.672975]  copy_user_test_oob+0x728/0xec8
[   19.673021]  kunit_try_run_case+0x170/0x3f0
[   19.673576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.673876]  kthread+0x328/0x630
[   19.674155]  ret_from_fork+0x10/0x20
[   19.674215] 
[   19.674240] Allocated by task 285:
[   19.674271]  kasan_save_stack+0x3c/0x68
[   19.674316]  kasan_save_track+0x20/0x40
[   19.674354]  kasan_save_alloc_info+0x40/0x58
[   19.674394]  __kasan_kmalloc+0xd4/0xd8
[   19.674685]  __kmalloc_noprof+0x190/0x4d0
[   19.674729]  kunit_kmalloc_array+0x34/0x88
[   19.674767]  copy_user_test_oob+0xac/0xec8
[   19.674803]  kunit_try_run_case+0x170/0x3f0
[   19.674839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.674883]  kthread+0x328/0x630
[   19.675000]  ret_from_fork+0x10/0x20
[   19.675061] 
[   19.675099] The buggy address belongs to the object at fff00000c78d3c00
[   19.675099]  which belongs to the cache kmalloc-128 of size 128
[   19.675171] The buggy address is located 0 bytes inside of
[   19.675171]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.675832] 
[   19.675873] The buggy address belongs to the physical page:
[   19.675912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.675980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.676035] page_type: f5(slab)
[   19.676092] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.676145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.676187] page dumped because: kasan: bad access detected
[   19.676221] 
[   19.676563] Memory state around the buggy address:
[   19.676640]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.676687]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.676836] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.676876]                                                                 ^
[   19.677443]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.677635]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.677949] ==================================================================
[   19.684289] ==================================================================
[   19.684362] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.684429] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.684488] 
[   19.684522] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.684608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.684638] Hardware name: linux,dummy-virt (DT)
[   19.684671] Call trace:
[   19.684696]  show_stack+0x20/0x38 (C)
[   19.684746]  dump_stack_lvl+0x8c/0xd0
[   19.684794]  print_report+0x118/0x608
[   19.684840]  kasan_report+0xdc/0x128
[   19.684884]  kasan_check_range+0x100/0x1a8
[   19.684932]  __kasan_check_write+0x20/0x30
[   19.684979]  copy_user_test_oob+0x35c/0xec8
[   19.685023]  kunit_try_run_case+0x170/0x3f0
[   19.685083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.685135]  kthread+0x328/0x630
[   19.685179]  ret_from_fork+0x10/0x20
[   19.685228] 
[   19.685248] Allocated by task 285:
[   19.685277]  kasan_save_stack+0x3c/0x68
[   19.685951]  kasan_save_track+0x20/0x40
[   19.686017]  kasan_save_alloc_info+0x40/0x58
[   19.686075]  __kasan_kmalloc+0xd4/0xd8
[   19.686113]  __kmalloc_noprof+0x190/0x4d0
[   19.686153]  kunit_kmalloc_array+0x34/0x88
[   19.686312]  copy_user_test_oob+0xac/0xec8
[   19.686358]  kunit_try_run_case+0x170/0x3f0
[   19.686398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686505]  kthread+0x328/0x630
[   19.686548]  ret_from_fork+0x10/0x20
[   19.686835] 
[   19.686900] The buggy address belongs to the object at fff00000c78d3c00
[   19.686900]  which belongs to the cache kmalloc-128 of size 128
[   19.687472] The buggy address is located 0 bytes inside of
[   19.687472]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.687608] 
[   19.687634] The buggy address belongs to the physical page:
[   19.687667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.687719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.687769] page_type: f5(slab)
[   19.687811] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.687863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.688903] page dumped because: kasan: bad access detected
[   19.689098] 
[   19.689124] Memory state around the buggy address:
[   19.689163]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.689211]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.689255] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.689293]                                                                 ^
[   19.689333]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.689376]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.689414] ==================================================================
[   19.701251] ==================================================================
[   19.701318] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.701378] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.701430] 
[   19.701462] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.701553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.701581] Hardware name: linux,dummy-virt (DT)
[   19.701614] Call trace:
[   19.701638]  show_stack+0x20/0x38 (C)
[   19.701690]  dump_stack_lvl+0x8c/0xd0
[   19.701738]  print_report+0x118/0x608
[   19.701785]  kasan_report+0xdc/0x128
[   19.701828]  kasan_check_range+0x100/0x1a8
[   19.701875]  __kasan_check_read+0x20/0x30
[   19.702411]  copy_user_test_oob+0x4a0/0xec8
[   19.702500]  kunit_try_run_case+0x170/0x3f0
[   19.702571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.702778]  kthread+0x328/0x630
[   19.702875]  ret_from_fork+0x10/0x20
[   19.702930] 
[   19.703136] Allocated by task 285:
[   19.703411]  kasan_save_stack+0x3c/0x68
[   19.703569]  kasan_save_track+0x20/0x40
[   19.703614]  kasan_save_alloc_info+0x40/0x58
[   19.703920]  __kasan_kmalloc+0xd4/0xd8
[   19.704257]  __kmalloc_noprof+0x190/0x4d0
[   19.704309]  kunit_kmalloc_array+0x34/0x88
[   19.704454]  copy_user_test_oob+0xac/0xec8
[   19.704503]  kunit_try_run_case+0x170/0x3f0
[   19.704666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704759]  kthread+0x328/0x630
[   19.704924]  ret_from_fork+0x10/0x20
[   19.705207] 
[   19.705245] The buggy address belongs to the object at fff00000c78d3c00
[   19.705245]  which belongs to the cache kmalloc-128 of size 128
[   19.705310] The buggy address is located 0 bytes inside of
[   19.705310]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.705385] 
[   19.705805] The buggy address belongs to the physical page:
[   19.705963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.706029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.706096] page_type: f5(slab)
[   19.706150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.706203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.706448] page dumped because: kasan: bad access detected
[   19.706643] 
[   19.706673] Memory state around the buggy address:
[   19.706806]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.706939]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706986] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.707242]                                                                 ^
[   19.707403]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.707793]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.707846] ==================================================================
[   19.696861] ==================================================================
[   19.696985] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.697060] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.697115] 
[   19.697147] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.697234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.697262] Hardware name: linux,dummy-virt (DT)
[   19.697295] Call trace:
[   19.697319]  show_stack+0x20/0x38 (C)
[   19.697369]  dump_stack_lvl+0x8c/0xd0
[   19.697417]  print_report+0x118/0x608
[   19.697464]  kasan_report+0xdc/0x128
[   19.697508]  kasan_check_range+0x100/0x1a8
[   19.697556]  __kasan_check_write+0x20/0x30
[   19.697604]  copy_user_test_oob+0x434/0xec8
[   19.697649]  kunit_try_run_case+0x170/0x3f0
[   19.697695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.697746]  kthread+0x328/0x630
[   19.697790]  ret_from_fork+0x10/0x20
[   19.697838] 
[   19.697860] Allocated by task 285:
[   19.697925]  kasan_save_stack+0x3c/0x68
[   19.697972]  kasan_save_track+0x20/0x40
[   19.698010]  kasan_save_alloc_info+0x40/0x58
[   19.698060]  __kasan_kmalloc+0xd4/0xd8
[   19.698101]  __kmalloc_noprof+0x190/0x4d0
[   19.698139]  kunit_kmalloc_array+0x34/0x88
[   19.698175]  copy_user_test_oob+0xac/0xec8
[   19.698211]  kunit_try_run_case+0x170/0x3f0
[   19.698346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.698647]  kthread+0x328/0x630
[   19.698734]  ret_from_fork+0x10/0x20
[   19.698792] 
[   19.698820] The buggy address belongs to the object at fff00000c78d3c00
[   19.698820]  which belongs to the cache kmalloc-128 of size 128
[   19.699243] The buggy address is located 0 bytes inside of
[   19.699243]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.699435] 
[   19.699552] The buggy address belongs to the physical page:
[   19.699590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.699663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.699718] page_type: f5(slab)
[   19.699758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.699943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.700025] page dumped because: kasan: bad access detected
[   19.700074] 
[   19.700096] Memory state around the buggy address:
[   19.700130]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.700175]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700234] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.700413]                                                                 ^
[   19.700456]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700520]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700560] ==================================================================
[   19.690940] ==================================================================
[   19.691015] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.691084] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.691138] 
[   19.691681] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.691829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.691946] Hardware name: linux,dummy-virt (DT)
[   19.691990] Call trace:
[   19.692023]  show_stack+0x20/0x38 (C)
[   19.692110]  dump_stack_lvl+0x8c/0xd0
[   19.692164]  print_report+0x118/0x608
[   19.692212]  kasan_report+0xdc/0x128
[   19.692505]  kasan_check_range+0x100/0x1a8
[   19.692611]  __kasan_check_read+0x20/0x30
[   19.692679]  copy_user_test_oob+0x3c8/0xec8
[   19.692729]  kunit_try_run_case+0x170/0x3f0
[   19.692897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.692977]  kthread+0x328/0x630
[   19.693027]  ret_from_fork+0x10/0x20
[   19.693139] 
[   19.693176] Allocated by task 285:
[   19.693211]  kasan_save_stack+0x3c/0x68
[   19.693469]  kasan_save_track+0x20/0x40
[   19.693569]  kasan_save_alloc_info+0x40/0x58
[   19.693657]  __kasan_kmalloc+0xd4/0xd8
[   19.693701]  __kmalloc_noprof+0x190/0x4d0
[   19.693738]  kunit_kmalloc_array+0x34/0x88
[   19.693852]  copy_user_test_oob+0xac/0xec8
[   19.693910]  kunit_try_run_case+0x170/0x3f0
[   19.693954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.694019]  kthread+0x328/0x630
[   19.694074]  ret_from_fork+0x10/0x20
[   19.694114] 
[   19.694137] The buggy address belongs to the object at fff00000c78d3c00
[   19.694137]  which belongs to the cache kmalloc-128 of size 128
[   19.694208] The buggy address is located 0 bytes inside of
[   19.694208]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.694278] 
[   19.694336] The buggy address belongs to the physical page:
[   19.694526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.694647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.694842] page_type: f5(slab)
[   19.694894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.694956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.695126] page dumped because: kasan: bad access detected
[   19.695167] 
[   19.695191] Memory state around the buggy address:
[   19.695227]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.695272]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.695440] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.695907]                                                                 ^
[   19.696132]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.696350]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.696400] ==================================================================
[   19.656083] ==================================================================
[   19.656177] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.656257] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285
[   19.656945] 
[   19.657017] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.657357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.657448] Hardware name: linux,dummy-virt (DT)
[   19.657508] Call trace:
[   19.657543]  show_stack+0x20/0x38 (C)
[   19.657831]  dump_stack_lvl+0x8c/0xd0
[   19.657994]  print_report+0x118/0x608
[   19.658060]  kasan_report+0xdc/0x128
[   19.658227]  kasan_check_range+0x100/0x1a8
[   19.658423]  __kasan_check_write+0x20/0x30
[   19.658691]  copy_user_test_oob+0x234/0xec8
[   19.658845]  kunit_try_run_case+0x170/0x3f0
[   19.659075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659181]  kthread+0x328/0x630
[   19.659467]  ret_from_fork+0x10/0x20
[   19.659548] 
[   19.659725] Allocated by task 285:
[   19.659812]  kasan_save_stack+0x3c/0x68
[   19.660004]  kasan_save_track+0x20/0x40
[   19.660065]  kasan_save_alloc_info+0x40/0x58
[   19.660248]  __kasan_kmalloc+0xd4/0xd8
[   19.660332]  __kmalloc_noprof+0x190/0x4d0
[   19.660379]  kunit_kmalloc_array+0x34/0x88
[   19.660548]  copy_user_test_oob+0xac/0xec8
[   19.660603]  kunit_try_run_case+0x170/0x3f0
[   19.660642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.661015]  kthread+0x328/0x630
[   19.661084]  ret_from_fork+0x10/0x20
[   19.661143] 
[   19.661307] The buggy address belongs to the object at fff00000c78d3c00
[   19.661307]  which belongs to the cache kmalloc-128 of size 128
[   19.661408] The buggy address is located 0 bytes inside of
[   19.661408]  allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78)
[   19.661518] 
[   19.661762] The buggy address belongs to the physical page:
[   19.661867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.662021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.662089] page_type: f5(slab)
[   19.662135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.662428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.662578] page dumped because: kasan: bad access detected
[   19.662709] 
[   19.662737] Memory state around the buggy address:
[   19.662776]  fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.662822]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.662886] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.662928]                                                                 ^
[   19.662969]  fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.663293]  fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.663473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   19.621127] ==================================================================
[   19.621197] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.621266] Read of size 8 at addr fff00000c78d3b78 by task kunit_try_catch/281
[   19.621317] 
[   19.621353] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.621440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.621468] Hardware name: linux,dummy-virt (DT)
[   19.621501] Call trace:
[   19.621526]  show_stack+0x20/0x38 (C)
[   19.621577]  dump_stack_lvl+0x8c/0xd0
[   19.621625]  print_report+0x118/0x608
[   19.621681]  kasan_report+0xdc/0x128
[   19.621769]  __asan_report_load8_noabort+0x20/0x30
[   19.621873]  copy_to_kernel_nofault+0x204/0x250
[   19.621961]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.622113]  kunit_try_run_case+0x170/0x3f0
[   19.622261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622315]  kthread+0x328/0x630
[   19.622362]  ret_from_fork+0x10/0x20
[   19.622408] 
[   19.622430] Allocated by task 281:
[   19.622461]  kasan_save_stack+0x3c/0x68
[   19.622503]  kasan_save_track+0x20/0x40
[   19.622542]  kasan_save_alloc_info+0x40/0x58
[   19.622654]  __kasan_kmalloc+0xd4/0xd8
[   19.622848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.622898]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.622943]  kunit_try_run_case+0x170/0x3f0
[   19.622981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.623072]  kthread+0x328/0x630
[   19.623125]  ret_from_fork+0x10/0x20
[   19.623195] 
[   19.623238] The buggy address belongs to the object at fff00000c78d3b00
[   19.623238]  which belongs to the cache kmalloc-128 of size 128
[   19.623296] The buggy address is located 0 bytes to the right of
[   19.623296]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   19.623358] 
[   19.623393] The buggy address belongs to the physical page:
[   19.623430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.623495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.623547] page_type: f5(slab)
[   19.623599] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.623661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.623743] page dumped because: kasan: bad access detected
[   19.623777] 
[   19.623832] Memory state around the buggy address:
[   19.624026]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.624101]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.624337] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.624384]                                                                 ^
[   19.624486]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.624555]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.624659] ==================================================================
[   19.625159] ==================================================================
[   19.625211] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.625269] Write of size 8 at addr fff00000c78d3b78 by task kunit_try_catch/281
[   19.625319] 
[   19.625352] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.625438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.625624] Hardware name: linux,dummy-virt (DT)
[   19.625755] Call trace:
[   19.625783]  show_stack+0x20/0x38 (C)
[   19.625838]  dump_stack_lvl+0x8c/0xd0
[   19.625914]  print_report+0x118/0x608
[   19.626282]  kasan_report+0xdc/0x128
[   19.626346]  kasan_check_range+0x100/0x1a8
[   19.626396]  __kasan_check_write+0x20/0x30
[   19.626467]  copy_to_kernel_nofault+0x8c/0x250
[   19.626845]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.626920]  kunit_try_run_case+0x170/0x3f0
[   19.627079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.627155]  kthread+0x328/0x630
[   19.627207]  ret_from_fork+0x10/0x20
[   19.627259] 
[   19.627280] Allocated by task 281:
[   19.627311]  kasan_save_stack+0x3c/0x68
[   19.627357]  kasan_save_track+0x20/0x40
[   19.627419]  kasan_save_alloc_info+0x40/0x58
[   19.627477]  __kasan_kmalloc+0xd4/0xd8
[   19.627518]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.627558]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.627602]  kunit_try_run_case+0x170/0x3f0
[   19.627638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.627682]  kthread+0x328/0x630
[   19.627727]  ret_from_fork+0x10/0x20
[   19.627770] 
[   19.627792] The buggy address belongs to the object at fff00000c78d3b00
[   19.627792]  which belongs to the cache kmalloc-128 of size 128
[   19.627852] The buggy address is located 0 bytes to the right of
[   19.627852]  allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78)
[   19.627927] 
[   19.627975] The buggy address belongs to the physical page:
[   19.628013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   19.628078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.628130] page_type: f5(slab)
[   19.628172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.628225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.628269] page dumped because: kasan: bad access detected
[   19.628316] 
[   19.628338] Memory state around the buggy address:
[   19.628372]  fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.628418]  fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628462] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.628500]                                                                 ^
[   19.628542]  fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628585]  fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   19.587230] ==================================================================
[   19.587291] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.587351] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   19.587404] 
[   19.587436] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.587524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.587554] Hardware name: linux,dummy-virt (DT)
[   19.587586] Call trace:
[   19.587611]  show_stack+0x20/0x38 (C)
[   19.587663]  dump_stack_lvl+0x8c/0xd0
[   19.587711]  print_report+0x310/0x608
[   19.587757]  kasan_report+0xdc/0x128
[   19.587802]  __asan_report_load1_noabort+0x20/0x30
[   19.587854]  vmalloc_oob+0x51c/0x5d0
[   19.587902]  kunit_try_run_case+0x170/0x3f0
[   19.587949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.587999]  kthread+0x328/0x630
[   19.588064]  ret_from_fork+0x10/0x20
[   19.588171] 
[   19.588227] The buggy address belongs to the virtual mapping at
[   19.588227]  [ffff8000800fe000, ffff800080100000) created by:
[   19.588227]  vmalloc_oob+0x98/0x5d0
[   19.588394] 
[   19.588423] The buggy address belongs to the physical page:
[   19.588456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653e
[   19.588509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.588570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.588622] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.588664] page dumped because: kasan: bad access detected
[   19.588698] 
[   19.588719] Memory state around the buggy address:
[   19.588751]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.588795]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.588838] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.588876]                                                                 ^
[   19.588917]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.588960]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.588998] ==================================================================
[   19.583366] ==================================================================
[   19.583448] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.583514] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   19.583566] 
[   19.583601] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.583687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.583715] Hardware name: linux,dummy-virt (DT)
[   19.583748] Call trace:
[   19.583773]  show_stack+0x20/0x38 (C)
[   19.583824]  dump_stack_lvl+0x8c/0xd0
[   19.583873]  print_report+0x310/0x608
[   19.583917]  kasan_report+0xdc/0x128
[   19.583961]  __asan_report_load1_noabort+0x20/0x30
[   19.584011]  vmalloc_oob+0x578/0x5d0
[   19.584079]  kunit_try_run_case+0x170/0x3f0
[   19.584184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.584289]  kthread+0x328/0x630
[   19.584384]  ret_from_fork+0x10/0x20
[   19.584481] 
[   19.584540] The buggy address belongs to the virtual mapping at
[   19.584540]  [ffff8000800fe000, ffff800080100000) created by:
[   19.584540]  vmalloc_oob+0x98/0x5d0
[   19.584687] 
[   19.584883] The buggy address belongs to the physical page:
[   19.584927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653e
[   19.584984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.585060] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.585331] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.585707] page dumped because: kasan: bad access detected
[   19.585752] 
[   19.585775] Memory state around the buggy address:
[   19.585812]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.585857]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.585959] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.586012]                                                              ^
[   19.586066]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.586174]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.586428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.486628] ==================================================================
[   19.486678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.486730] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.486780] 
[   19.486812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.486898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.486928] Hardware name: linux,dummy-virt (DT)
[   19.486960] Call trace:
[   19.486985]  show_stack+0x20/0x38 (C)
[   19.487037]  dump_stack_lvl+0x8c/0xd0
[   19.487100]  print_report+0x118/0x608
[   19.487150]  kasan_report+0xdc/0x128
[   19.487194]  kasan_check_range+0x100/0x1a8
[   19.487241]  __kasan_check_write+0x20/0x30
[   19.487289]  kasan_atomics_helper+0x12d8/0x4858
[   19.487337]  kasan_atomics+0x198/0x2e0
[   19.487382]  kunit_try_run_case+0x170/0x3f0
[   19.487429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487482]  kthread+0x328/0x630
[   19.487527]  ret_from_fork+0x10/0x20
[   19.487576] 
[   19.487597] Allocated by task 265:
[   19.487628]  kasan_save_stack+0x3c/0x68
[   19.487671]  kasan_save_track+0x20/0x40
[   19.487710]  kasan_save_alloc_info+0x40/0x58
[   19.487751]  __kasan_kmalloc+0xd4/0xd8
[   19.487789]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.487827]  kasan_atomics+0xb8/0x2e0
[   19.487864]  kunit_try_run_case+0x170/0x3f0
[   19.487903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487947]  kthread+0x328/0x630
[   19.487983]  ret_from_fork+0x10/0x20
[   19.488020] 
[   19.488069] The buggy address belongs to the object at fff00000c788e780
[   19.488069]  which belongs to the cache kmalloc-64 of size 64
[   19.488189] The buggy address is located 0 bytes to the right of
[   19.488189]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.488319] 
[   19.488347] The buggy address belongs to the physical page:
[   19.488380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.488431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.488478] page_type: f5(slab)
[   19.488516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.488566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.488607] page dumped because: kasan: bad access detected
[   19.488639] 
[   19.488660] Memory state around the buggy address:
[   19.488691]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.488734]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.488776] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.488813]                                      ^
[   19.488853]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.488934]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.489009] ==================================================================
[   19.469239] ==================================================================
[   19.469533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.469727] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.469862] 
[   19.469909] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.469999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.470030] Hardware name: linux,dummy-virt (DT)
[   19.470074] Call trace:
[   19.470100]  show_stack+0x20/0x38 (C)
[   19.470153]  dump_stack_lvl+0x8c/0xd0
[   19.470621]  print_report+0x118/0x608
[   19.470722]  kasan_report+0xdc/0x128
[   19.471098]  kasan_check_range+0x100/0x1a8
[   19.471385]  __kasan_check_write+0x20/0x30
[   19.471448]  kasan_atomics_helper+0x11f8/0x4858
[   19.471507]  kasan_atomics+0x198/0x2e0
[   19.471716]  kunit_try_run_case+0x170/0x3f0
[   19.471821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.472009]  kthread+0x328/0x630
[   19.472192]  ret_from_fork+0x10/0x20
[   19.472341] 
[   19.472367] Allocated by task 265:
[   19.472567]  kasan_save_stack+0x3c/0x68
[   19.472618]  kasan_save_track+0x20/0x40
[   19.472658]  kasan_save_alloc_info+0x40/0x58
[   19.472699]  __kasan_kmalloc+0xd4/0xd8
[   19.472737]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.472874]  kasan_atomics+0xb8/0x2e0
[   19.473155]  kunit_try_run_case+0x170/0x3f0
[   19.473284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.473465]  kthread+0x328/0x630
[   19.473676]  ret_from_fork+0x10/0x20
[   19.473865] 
[   19.473982] The buggy address belongs to the object at fff00000c788e780
[   19.473982]  which belongs to the cache kmalloc-64 of size 64
[   19.474486] The buggy address is located 0 bytes to the right of
[   19.474486]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.474561] 
[   19.474597] The buggy address belongs to the physical page:
[   19.475061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.475523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.475821] page_type: f5(slab)
[   19.475928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.476242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.476291] page dumped because: kasan: bad access detected
[   19.476585] 
[   19.476641] Memory state around the buggy address:
[   19.476680]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.477034]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.477095] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.477136]                                      ^
[   19.477176]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.478180]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.478550] ==================================================================
[   19.499668] ==================================================================
[   19.499734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.499802] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.499879] 
[   19.499939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.500080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.500112] Hardware name: linux,dummy-virt (DT)
[   19.500144] Call trace:
[   19.500194]  show_stack+0x20/0x38 (C)
[   19.500290]  dump_stack_lvl+0x8c/0xd0
[   19.500386]  print_report+0x118/0x608
[   19.500479]  kasan_report+0xdc/0x128
[   19.500571]  kasan_check_range+0x100/0x1a8
[   19.500617]  __kasan_check_write+0x20/0x30
[   19.500670]  kasan_atomics_helper+0x1414/0x4858
[   19.500768]  kasan_atomics+0x198/0x2e0
[   19.500858]  kunit_try_run_case+0x170/0x3f0
[   19.500947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.500998]  kthread+0x328/0x630
[   19.501088]  ret_from_fork+0x10/0x20
[   19.501193] 
[   19.501215] Allocated by task 265:
[   19.501246]  kasan_save_stack+0x3c/0x68
[   19.501288]  kasan_save_track+0x20/0x40
[   19.501328]  kasan_save_alloc_info+0x40/0x58
[   19.501367]  __kasan_kmalloc+0xd4/0xd8
[   19.501402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.501442]  kasan_atomics+0xb8/0x2e0
[   19.501478]  kunit_try_run_case+0x170/0x3f0
[   19.501515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501557]  kthread+0x328/0x630
[   19.501593]  ret_from_fork+0x10/0x20
[   19.501628] 
[   19.501651] The buggy address belongs to the object at fff00000c788e780
[   19.501651]  which belongs to the cache kmalloc-64 of size 64
[   19.501707] The buggy address is located 0 bytes to the right of
[   19.501707]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.501769] 
[   19.501790] The buggy address belongs to the physical page:
[   19.501823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.501871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.501927] page_type: f5(slab)
[   19.501966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.502031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.502082] page dumped because: kasan: bad access detected
[   19.502116] 
[   19.502136] Memory state around the buggy address:
[   19.502170]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.502211]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.502253] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.502291]                                      ^
[   19.502325]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.502367]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.502404] ==================================================================
[   19.523112] ==================================================================
[   19.523171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.523228] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.523310] 
[   19.523350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.523802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.523857] Hardware name: linux,dummy-virt (DT)
[   19.523902] Call trace:
[   19.523929]  show_stack+0x20/0x38 (C)
[   19.523992]  dump_stack_lvl+0x8c/0xd0
[   19.524064]  print_report+0x118/0x608
[   19.524116]  kasan_report+0xdc/0x128
[   19.524168]  __asan_report_load8_noabort+0x20/0x30
[   19.524220]  kasan_atomics_helper+0x3db0/0x4858
[   19.524267]  kasan_atomics+0x198/0x2e0
[   19.524945]  kunit_try_run_case+0x170/0x3f0
[   19.525050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525111]  kthread+0x328/0x630
[   19.525158]  ret_from_fork+0x10/0x20
[   19.525251] 
[   19.525278] Allocated by task 265:
[   19.525326]  kasan_save_stack+0x3c/0x68
[   19.525372]  kasan_save_track+0x20/0x40
[   19.525422]  kasan_save_alloc_info+0x40/0x58
[   19.525465]  __kasan_kmalloc+0xd4/0xd8
[   19.525502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.525540]  kasan_atomics+0xb8/0x2e0
[   19.525577]  kunit_try_run_case+0x170/0x3f0
[   19.525614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525657]  kthread+0x328/0x630
[   19.525692]  ret_from_fork+0x10/0x20
[   19.525729] 
[   19.525749] The buggy address belongs to the object at fff00000c788e780
[   19.525749]  which belongs to the cache kmalloc-64 of size 64
[   19.525929] The buggy address is located 0 bytes to the right of
[   19.525929]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.526004] 
[   19.526030] The buggy address belongs to the physical page:
[   19.526088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.526147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.526198] page_type: f5(slab)
[   19.526238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.526290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.526333] page dumped because: kasan: bad access detected
[   19.526374] 
[   19.526409] Memory state around the buggy address:
[   19.526456]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.526506]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.526551] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.526600]                                      ^
[   19.526638]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526682]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526722] ==================================================================
[   19.445451] ==================================================================
[   19.445515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.445572] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.445841] 
[   19.445934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.446093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.446165] Hardware name: linux,dummy-virt (DT)
[   19.446201] Call trace:
[   19.446227]  show_stack+0x20/0x38 (C)
[   19.446281]  dump_stack_lvl+0x8c/0xd0
[   19.446331]  print_report+0x118/0x608
[   19.446376]  kasan_report+0xdc/0x128
[   19.446419]  kasan_check_range+0x100/0x1a8
[   19.446467]  __kasan_check_write+0x20/0x30
[   19.446515]  kasan_atomics_helper+0x10c0/0x4858
[   19.448074]  kasan_atomics+0x198/0x2e0
[   19.448398]  kunit_try_run_case+0x170/0x3f0
[   19.448515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.448638]  kthread+0x328/0x630
[   19.448751]  ret_from_fork+0x10/0x20
[   19.448838] 
[   19.448861] Allocated by task 265:
[   19.448894]  kasan_save_stack+0x3c/0x68
[   19.448979]  kasan_save_track+0x20/0x40
[   19.449078]  kasan_save_alloc_info+0x40/0x58
[   19.449124]  __kasan_kmalloc+0xd4/0xd8
[   19.449162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.449202]  kasan_atomics+0xb8/0x2e0
[   19.449264]  kunit_try_run_case+0x170/0x3f0
[   19.449342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449385]  kthread+0x328/0x630
[   19.450071]  ret_from_fork+0x10/0x20
[   19.450142] 
[   19.450210] The buggy address belongs to the object at fff00000c788e780
[   19.450210]  which belongs to the cache kmalloc-64 of size 64
[   19.450363] The buggy address is located 0 bytes to the right of
[   19.450363]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.450536] 
[   19.450561] The buggy address belongs to the physical page:
[   19.450606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.450716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.450770] page_type: f5(slab)
[   19.450811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.450876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.450933] page dumped because: kasan: bad access detected
[   19.451174] 
[   19.451225] Memory state around the buggy address:
[   19.451267]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451315]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451657] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.451842]                                      ^
[   19.451897]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451942]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452134] ==================================================================
[   19.439705] ==================================================================
[   19.439884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.439943] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.439995] 
[   19.440028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.440125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.440155] Hardware name: linux,dummy-virt (DT)
[   19.440186] Call trace:
[   19.440210]  show_stack+0x20/0x38 (C)
[   19.440263]  dump_stack_lvl+0x8c/0xd0
[   19.440311]  print_report+0x118/0x608
[   19.440356]  kasan_report+0xdc/0x128
[   19.440402]  kasan_check_range+0x100/0x1a8
[   19.440449]  __kasan_check_write+0x20/0x30
[   19.440496]  kasan_atomics_helper+0x1058/0x4858
[   19.440542]  kasan_atomics+0x198/0x2e0
[   19.440586]  kunit_try_run_case+0x170/0x3f0
[   19.440633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440683]  kthread+0x328/0x630
[   19.440727]  ret_from_fork+0x10/0x20
[   19.440774] 
[   19.440794] Allocated by task 265:
[   19.441936]  kasan_save_stack+0x3c/0x68
[   19.442001]  kasan_save_track+0x20/0x40
[   19.442118]  kasan_save_alloc_info+0x40/0x58
[   19.442194]  __kasan_kmalloc+0xd4/0xd8
[   19.442277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.442322]  kasan_atomics+0xb8/0x2e0
[   19.442360]  kunit_try_run_case+0x170/0x3f0
[   19.442399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442442]  kthread+0x328/0x630
[   19.442479]  ret_from_fork+0x10/0x20
[   19.442539] 
[   19.442569] The buggy address belongs to the object at fff00000c788e780
[   19.442569]  which belongs to the cache kmalloc-64 of size 64
[   19.442726] The buggy address is located 0 bytes to the right of
[   19.442726]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.442822] 
[   19.442892] The buggy address belongs to the physical page:
[   19.442964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.443068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443131] page_type: f5(slab)
[   19.443187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443287] page dumped because: kasan: bad access detected
[   19.443322] 
[   19.443343] Memory state around the buggy address:
[   19.443378]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.443754]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.443820] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.444008]                                      ^
[   19.444215]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444434]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444526] ==================================================================
[   19.479662] ==================================================================
[   19.479725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.479785] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.479835] 
[   19.479868] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.479953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.479983] Hardware name: linux,dummy-virt (DT)
[   19.480014] Call trace:
[   19.480038]  show_stack+0x20/0x38 (C)
[   19.482151]  dump_stack_lvl+0x8c/0xd0
[   19.482205]  print_report+0x118/0x608
[   19.482255]  kasan_report+0xdc/0x128
[   19.482299]  kasan_check_range+0x100/0x1a8
[   19.482346]  __kasan_check_write+0x20/0x30
[   19.482394]  kasan_atomics_helper+0x126c/0x4858
[   19.482442]  kasan_atomics+0x198/0x2e0
[   19.482487]  kunit_try_run_case+0x170/0x3f0
[   19.482535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.482597]  kthread+0x328/0x630
[   19.482647]  ret_from_fork+0x10/0x20
[   19.482698] 
[   19.482720] Allocated by task 265:
[   19.484357]  kasan_save_stack+0x3c/0x68
[   19.484422]  kasan_save_track+0x20/0x40
[   19.484463]  kasan_save_alloc_info+0x40/0x58
[   19.484556]  __kasan_kmalloc+0xd4/0xd8
[   19.485059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.485103]  kasan_atomics+0xb8/0x2e0
[   19.485143]  kunit_try_run_case+0x170/0x3f0
[   19.485181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.485236]  kthread+0x328/0x630
[   19.485273]  ret_from_fork+0x10/0x20
[   19.485309] 
[   19.485369] The buggy address belongs to the object at fff00000c788e780
[   19.485369]  which belongs to the cache kmalloc-64 of size 64
[   19.485439] The buggy address is located 0 bytes to the right of
[   19.485439]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.485562] 
[   19.485586] The buggy address belongs to the physical page:
[   19.485619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.485670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.485758] page_type: f5(slab)
[   19.485831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.485885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.485927] page dumped because: kasan: bad access detected
[   19.485959] 
[   19.485980] Memory state around the buggy address:
[   19.486025]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486088]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486133] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.486171]                                      ^
[   19.486207]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486249]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486297] ==================================================================
[   19.560665] ==================================================================
[   19.561104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.561177] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.561232] 
[   19.561434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.561720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.561788] Hardware name: linux,dummy-virt (DT)
[   19.561822] Call trace:
[   19.561848]  show_stack+0x20/0x38 (C)
[   19.561914]  dump_stack_lvl+0x8c/0xd0
[   19.561966]  print_report+0x118/0x608
[   19.562011]  kasan_report+0xdc/0x128
[   19.562068]  kasan_check_range+0x100/0x1a8
[   19.562119]  __kasan_check_write+0x20/0x30
[   19.562168]  kasan_atomics_helper+0x17ec/0x4858
[   19.562214]  kasan_atomics+0x198/0x2e0
[   19.562257]  kunit_try_run_case+0x170/0x3f0
[   19.562304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.562356]  kthread+0x328/0x630
[   19.562401]  ret_from_fork+0x10/0x20
[   19.562449] 
[   19.562470] Allocated by task 265:
[   19.563254]  kasan_save_stack+0x3c/0x68
[   19.563320]  kasan_save_track+0x20/0x40
[   19.563361]  kasan_save_alloc_info+0x40/0x58
[   19.563411]  __kasan_kmalloc+0xd4/0xd8
[   19.563452]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.563745]  kasan_atomics+0xb8/0x2e0
[   19.563951]  kunit_try_run_case+0x170/0x3f0
[   19.564019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.564078]  kthread+0x328/0x630
[   19.564127]  ret_from_fork+0x10/0x20
[   19.564167] 
[   19.564297] The buggy address belongs to the object at fff00000c788e780
[   19.564297]  which belongs to the cache kmalloc-64 of size 64
[   19.564496] The buggy address is located 0 bytes to the right of
[   19.564496]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.564684] 
[   19.564711] The buggy address belongs to the physical page:
[   19.564747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.564923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.565009] page_type: f5(slab)
[   19.565063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.565118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.565158] page dumped because: kasan: bad access detected
[   19.565193] 
[   19.565214] Memory state around the buggy address:
[   19.565248]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.565597]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.565850] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.566055]                                      ^
[   19.566104]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566161]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566204] ==================================================================
[   19.339787] ==================================================================
[   19.339854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.339915] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.339966] 
[   19.339999] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.340098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.340129] Hardware name: linux,dummy-virt (DT)
[   19.340161] Call trace:
[   19.340187]  show_stack+0x20/0x38 (C)
[   19.340238]  dump_stack_lvl+0x8c/0xd0
[   19.340286]  print_report+0x118/0x608
[   19.340349]  kasan_report+0xdc/0x128
[   19.340580]  kasan_check_range+0x100/0x1a8
[   19.340923]  __kasan_check_write+0x20/0x30
[   19.340983]  kasan_atomics_helper+0xa6c/0x4858
[   19.341194]  kasan_atomics+0x198/0x2e0
[   19.341342]  kunit_try_run_case+0x170/0x3f0
[   19.341399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.341462]  kthread+0x328/0x630
[   19.341512]  ret_from_fork+0x10/0x20
[   19.341563] 
[   19.341584] Allocated by task 265:
[   19.341616]  kasan_save_stack+0x3c/0x68
[   19.341658]  kasan_save_track+0x20/0x40
[   19.341700]  kasan_save_alloc_info+0x40/0x58
[   19.341740]  __kasan_kmalloc+0xd4/0xd8
[   19.341777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.341816]  kasan_atomics+0xb8/0x2e0
[   19.341852]  kunit_try_run_case+0x170/0x3f0
[   19.341889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.342221]  kthread+0x328/0x630
[   19.342541]  ret_from_fork+0x10/0x20
[   19.342588] 
[   19.342614] The buggy address belongs to the object at fff00000c788e780
[   19.342614]  which belongs to the cache kmalloc-64 of size 64
[   19.342681] The buggy address is located 0 bytes to the right of
[   19.342681]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.342972] 
[   19.343008] The buggy address belongs to the physical page:
[   19.343051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.343167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.343271] page_type: f5(slab)
[   19.343503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.343593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.343678] page dumped because: kasan: bad access detected
[   19.343721] 
[   19.343743] Memory state around the buggy address:
[   19.343879]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344126]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344298] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.344381]                                      ^
[   19.344565]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344768]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344850] ==================================================================
[   19.505225] ==================================================================
[   19.505267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.505313] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.505360] 
[   19.505394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.505566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.505601] Hardware name: linux,dummy-virt (DT)
[   19.505633] Call trace:
[   19.505657]  show_stack+0x20/0x38 (C)
[   19.505711]  dump_stack_lvl+0x8c/0xd0
[   19.505813]  print_report+0x118/0x608
[   19.506171]  kasan_report+0xdc/0x128
[   19.506277]  kasan_check_range+0x100/0x1a8
[   19.506663]  __kasan_check_write+0x20/0x30
[   19.506985]  kasan_atomics_helper+0x14e4/0x4858
[   19.507135]  kasan_atomics+0x198/0x2e0
[   19.507195]  kunit_try_run_case+0x170/0x3f0
[   19.507245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.507470]  kthread+0x328/0x630
[   19.507540]  ret_from_fork+0x10/0x20
[   19.507704] 
[   19.507740] Allocated by task 265:
[   19.507785]  kasan_save_stack+0x3c/0x68
[   19.507834]  kasan_save_track+0x20/0x40
[   19.508028]  kasan_save_alloc_info+0x40/0x58
[   19.508095]  __kasan_kmalloc+0xd4/0xd8
[   19.508147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.508291]  kasan_atomics+0xb8/0x2e0
[   19.508356]  kunit_try_run_case+0x170/0x3f0
[   19.508401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.508460]  kthread+0x328/0x630
[   19.508510]  ret_from_fork+0x10/0x20
[   19.508551] 
[   19.508724] The buggy address belongs to the object at fff00000c788e780
[   19.508724]  which belongs to the cache kmalloc-64 of size 64
[   19.508897] The buggy address is located 0 bytes to the right of
[   19.508897]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.509515] 
[   19.509591] The buggy address belongs to the physical page:
[   19.509649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.509723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.509775] page_type: f5(slab)
[   19.509823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.509924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.509969] page dumped because: kasan: bad access detected
[   19.510004] 
[   19.510025] Memory state around the buggy address:
[   19.510070]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.510114]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.510375] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.510430]                                      ^
[   19.510471]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510515]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510554] ==================================================================
[   19.539510] ==================================================================
[   19.539610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.539772] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.540079] 
[   19.540115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.540213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.540284] Hardware name: linux,dummy-virt (DT)
[   19.540379] Call trace:
[   19.540441]  show_stack+0x20/0x38 (C)
[   19.540583]  dump_stack_lvl+0x8c/0xd0
[   19.540722]  print_report+0x118/0x608
[   19.541071]  kasan_report+0xdc/0x128
[   19.541250]  kasan_check_range+0x100/0x1a8
[   19.541308]  __kasan_check_write+0x20/0x30
[   19.541356]  kasan_atomics_helper+0x16d0/0x4858
[   19.541405]  kasan_atomics+0x198/0x2e0
[   19.541450]  kunit_try_run_case+0x170/0x3f0
[   19.541503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541607]  kthread+0x328/0x630
[   19.541694]  ret_from_fork+0x10/0x20
[   19.541788] 
[   19.541841] Allocated by task 265:
[   19.541873]  kasan_save_stack+0x3c/0x68
[   19.541933]  kasan_save_track+0x20/0x40
[   19.541975]  kasan_save_alloc_info+0x40/0x58
[   19.542031]  __kasan_kmalloc+0xd4/0xd8
[   19.542081]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.542121]  kasan_atomics+0xb8/0x2e0
[   19.542392]  kunit_try_run_case+0x170/0x3f0
[   19.542573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542626]  kthread+0x328/0x630
[   19.542741]  ret_from_fork+0x10/0x20
[   19.542904] 
[   19.542929] The buggy address belongs to the object at fff00000c788e780
[   19.542929]  which belongs to the cache kmalloc-64 of size 64
[   19.543097] The buggy address is located 0 bytes to the right of
[   19.543097]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.543169] 
[   19.543192] The buggy address belongs to the physical page:
[   19.543225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.543277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.543324] page_type: f5(slab)
[   19.543484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.543538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.543583] page dumped because: kasan: bad access detected
[   19.543624] 
[   19.543671] Memory state around the buggy address:
[   19.543740]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.543816]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544137] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.544266]                                      ^
[   19.544353]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544409]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544449] ==================================================================
[   19.400528] ==================================================================
[   19.400580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.400822] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.400881] 
[   19.400917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.401384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.401438] Hardware name: linux,dummy-virt (DT)
[   19.401475] Call trace:
[   19.401717]  show_stack+0x20/0x38 (C)
[   19.401869]  dump_stack_lvl+0x8c/0xd0
[   19.402247]  print_report+0x118/0x608
[   19.402309]  kasan_report+0xdc/0x128
[   19.402468]  kasan_check_range+0x100/0x1a8
[   19.402548]  __kasan_check_read+0x20/0x30
[   19.402609]  kasan_atomics_helper+0xdd4/0x4858
[   19.402659]  kasan_atomics+0x198/0x2e0
[   19.402704]  kunit_try_run_case+0x170/0x3f0
[   19.402753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402804]  kthread+0x328/0x630
[   19.402915]  ret_from_fork+0x10/0x20
[   19.403024] 
[   19.403101] Allocated by task 265:
[   19.403137]  kasan_save_stack+0x3c/0x68
[   19.403244]  kasan_save_track+0x20/0x40
[   19.403294]  kasan_save_alloc_info+0x40/0x58
[   19.403351]  __kasan_kmalloc+0xd4/0xd8
[   19.403389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.403428]  kasan_atomics+0xb8/0x2e0
[   19.403510]  kunit_try_run_case+0x170/0x3f0
[   19.403575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.403617]  kthread+0x328/0x630
[   19.403652]  ret_from_fork+0x10/0x20
[   19.403695] 
[   19.403743] The buggy address belongs to the object at fff00000c788e780
[   19.403743]  which belongs to the cache kmalloc-64 of size 64
[   19.403832] The buggy address is located 0 bytes to the right of
[   19.403832]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.403917] 
[   19.403984] The buggy address belongs to the physical page:
[   19.404023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.404085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.404157] page_type: f5(slab)
[   19.404216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.404269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.404311] page dumped because: kasan: bad access detected
[   19.404345] 
[   19.404365] Memory state around the buggy address:
[   19.404399]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404444]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404486] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.404555]                                      ^
[   19.404635]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404686]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404773] ==================================================================
[   19.395176] ==================================================================
[   19.395237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.395322] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.395380] 
[   19.395412] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.395496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.395704] Hardware name: linux,dummy-virt (DT)
[   19.395791] Call trace:
[   19.395833]  show_stack+0x20/0x38 (C)
[   19.395905]  dump_stack_lvl+0x8c/0xd0
[   19.396087]  print_report+0x118/0x608
[   19.396330]  kasan_report+0xdc/0x128
[   19.396383]  __asan_report_load4_noabort+0x20/0x30
[   19.396606]  kasan_atomics_helper+0x3e04/0x4858
[   19.396689]  kasan_atomics+0x198/0x2e0
[   19.396788]  kunit_try_run_case+0x170/0x3f0
[   19.396838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.396890]  kthread+0x328/0x630
[   19.396936]  ret_from_fork+0x10/0x20
[   19.396984] 
[   19.397011] Allocated by task 265:
[   19.397314]  kasan_save_stack+0x3c/0x68
[   19.397452]  kasan_save_track+0x20/0x40
[   19.397501]  kasan_save_alloc_info+0x40/0x58
[   19.397543]  __kasan_kmalloc+0xd4/0xd8
[   19.397581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.397722]  kasan_atomics+0xb8/0x2e0
[   19.397769]  kunit_try_run_case+0x170/0x3f0
[   19.397811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.397853]  kthread+0x328/0x630
[   19.397914]  ret_from_fork+0x10/0x20
[   19.397956] 
[   19.398066] The buggy address belongs to the object at fff00000c788e780
[   19.398066]  which belongs to the cache kmalloc-64 of size 64
[   19.398141] The buggy address is located 0 bytes to the right of
[   19.398141]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.398206] 
[   19.398231] The buggy address belongs to the physical page:
[   19.398277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.398335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.398401] page_type: f5(slab)
[   19.398441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.398508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.398676] page dumped because: kasan: bad access detected
[   19.398758] 
[   19.399279] Memory state around the buggy address:
[   19.399339]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399474]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399523] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.399562]                                      ^
[   19.399598]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400018]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400133] ==================================================================
[   19.415168] ==================================================================
[   19.415279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.415340] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.415442] 
[   19.415507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.415660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.415690] Hardware name: linux,dummy-virt (DT)
[   19.415722] Call trace:
[   19.415747]  show_stack+0x20/0x38 (C)
[   19.415797]  dump_stack_lvl+0x8c/0xd0
[   19.415847]  print_report+0x118/0x608
[   19.415893]  kasan_report+0xdc/0x128
[   19.415938]  __asan_report_store8_noabort+0x20/0x30
[   19.415989]  kasan_atomics_helper+0x3e5c/0x4858
[   19.416036]  kasan_atomics+0x198/0x2e0
[   19.416093]  kunit_try_run_case+0x170/0x3f0
[   19.416141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416194]  kthread+0x328/0x630
[   19.416238]  ret_from_fork+0x10/0x20
[   19.416286] 
[   19.416307] Allocated by task 265:
[   19.416337]  kasan_save_stack+0x3c/0x68
[   19.416381]  kasan_save_track+0x20/0x40
[   19.416419]  kasan_save_alloc_info+0x40/0x58
[   19.416459]  __kasan_kmalloc+0xd4/0xd8
[   19.416495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.416533]  kasan_atomics+0xb8/0x2e0
[   19.416569]  kunit_try_run_case+0x170/0x3f0
[   19.416612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416714]  kthread+0x328/0x630
[   19.416757]  ret_from_fork+0x10/0x20
[   19.416794] 
[   19.416815] The buggy address belongs to the object at fff00000c788e780
[   19.416815]  which belongs to the cache kmalloc-64 of size 64
[   19.416871] The buggy address is located 0 bytes to the right of
[   19.416871]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.416938] 
[   19.416969] The buggy address belongs to the physical page:
[   19.417001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.417204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.417259] page_type: f5(slab)
[   19.417300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.417354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.417394] page dumped because: kasan: bad access detected
[   19.417427] 
[   19.417446] Memory state around the buggy address:
[   19.417478]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417523]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.417603]                                      ^
[   19.417635]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417677]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417715] ==================================================================
[   19.502621] ==================================================================
[   19.502669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.502717] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.502789] 
[   19.502822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.502904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.502933] Hardware name: linux,dummy-virt (DT)
[   19.502965] Call trace:
[   19.502988]  show_stack+0x20/0x38 (C)
[   19.503036]  dump_stack_lvl+0x8c/0xd0
[   19.503099]  print_report+0x118/0x608
[   19.503156]  kasan_report+0xdc/0x128
[   19.503250]  kasan_check_range+0x100/0x1a8
[   19.503299]  __kasan_check_write+0x20/0x30
[   19.503347]  kasan_atomics_helper+0x147c/0x4858
[   19.503394]  kasan_atomics+0x198/0x2e0
[   19.503450]  kunit_try_run_case+0x170/0x3f0
[   19.503497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503548]  kthread+0x328/0x630
[   19.503608]  ret_from_fork+0x10/0x20
[   19.503663] 
[   19.503685] Allocated by task 265:
[   19.503716]  kasan_save_stack+0x3c/0x68
[   19.503758]  kasan_save_track+0x20/0x40
[   19.503832]  kasan_save_alloc_info+0x40/0x58
[   19.503911]  __kasan_kmalloc+0xd4/0xd8
[   19.503958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.504049]  kasan_atomics+0xb8/0x2e0
[   19.504092]  kunit_try_run_case+0x170/0x3f0
[   19.504130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.504174]  kthread+0x328/0x630
[   19.504219]  ret_from_fork+0x10/0x20
[   19.504260] 
[   19.504283] The buggy address belongs to the object at fff00000c788e780
[   19.504283]  which belongs to the cache kmalloc-64 of size 64
[   19.504356] The buggy address is located 0 bytes to the right of
[   19.504356]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.504419] 
[   19.504455] The buggy address belongs to the physical page:
[   19.504502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.504550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.504598] page_type: f5(slab)
[   19.504635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.504703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.504745] page dumped because: kasan: bad access detected
[   19.504778] 
[   19.504798] Memory state around the buggy address:
[   19.504871]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.504918]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.504961] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.505000]                                      ^
[   19.505035]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505088]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505127] ==================================================================
[   19.512720] ==================================================================
[   19.512788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.512848] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.512899] 
[   19.512933] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.513055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.513088] Hardware name: linux,dummy-virt (DT)
[   19.513122] Call trace:
[   19.513147]  show_stack+0x20/0x38 (C)
[   19.513196]  dump_stack_lvl+0x8c/0xd0
[   19.513248]  print_report+0x118/0x608
[   19.513292]  kasan_report+0xdc/0x128
[   19.513335]  kasan_check_range+0x100/0x1a8
[   19.513382]  __kasan_check_write+0x20/0x30
[   19.513429]  kasan_atomics_helper+0x154c/0x4858
[   19.513476]  kasan_atomics+0x198/0x2e0
[   19.513521]  kunit_try_run_case+0x170/0x3f0
[   19.513569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513620]  kthread+0x328/0x630
[   19.513664]  ret_from_fork+0x10/0x20
[   19.513712] 
[   19.513733] Allocated by task 265:
[   19.513859]  kasan_save_stack+0x3c/0x68
[   19.513996]  kasan_save_track+0x20/0x40
[   19.514073]  kasan_save_alloc_info+0x40/0x58
[   19.514118]  __kasan_kmalloc+0xd4/0xd8
[   19.514155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.514195]  kasan_atomics+0xb8/0x2e0
[   19.514232]  kunit_try_run_case+0x170/0x3f0
[   19.514582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.514636]  kthread+0x328/0x630
[   19.514675]  ret_from_fork+0x10/0x20
[   19.514712] 
[   19.514738] The buggy address belongs to the object at fff00000c788e780
[   19.514738]  which belongs to the cache kmalloc-64 of size 64
[   19.514795] The buggy address is located 0 bytes to the right of
[   19.514795]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.514858] 
[   19.514880] The buggy address belongs to the physical page:
[   19.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.514964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.515014] page_type: f5(slab)
[   19.515064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.515161] page dumped because: kasan: bad access detected
[   19.515196] 
[   19.515216] Memory state around the buggy address:
[   19.515252]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.515295]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.515400] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.515460]                                      ^
[   19.515546]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.515899]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.516345] ==================================================================
[   19.345247] ==================================================================
[   19.345300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.345357] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.345408] 
[   19.345439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.345524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.345553] Hardware name: linux,dummy-virt (DT)
[   19.345587] Call trace:
[   19.345613]  show_stack+0x20/0x38 (C)
[   19.345663]  dump_stack_lvl+0x8c/0xd0
[   19.345713]  print_report+0x118/0x608
[   19.345758]  kasan_report+0xdc/0x128
[   19.345803]  kasan_check_range+0x100/0x1a8
[   19.345851]  __kasan_check_write+0x20/0x30
[   19.345908]  kasan_atomics_helper+0xad4/0x4858
[   19.345956]  kasan_atomics+0x198/0x2e0
[   19.346000]  kunit_try_run_case+0x170/0x3f0
[   19.346057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346113]  kthread+0x328/0x630
[   19.346158]  ret_from_fork+0x10/0x20
[   19.346205] 
[   19.346308] Allocated by task 265:
[   19.346402]  kasan_save_stack+0x3c/0x68
[   19.346449]  kasan_save_track+0x20/0x40
[   19.346487]  kasan_save_alloc_info+0x40/0x58
[   19.346529]  __kasan_kmalloc+0xd4/0xd8
[   19.346579]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.346661]  kasan_atomics+0xb8/0x2e0
[   19.346705]  kunit_try_run_case+0x170/0x3f0
[   19.346743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.347079] 
[   19.347104] The buggy address belongs to the physical page:
[   19.347137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.347202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.347255] page_type: f5(slab)
[   19.347296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.347348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.347390] page dumped because: kasan: bad access detected
[   19.347423] 
[   19.347445] Memory state around the buggy address:
[   19.347479]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.347523]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.347565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.347603]                                      ^
[   19.347637]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.347679]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.348205] ==================================================================
[   19.452846] ==================================================================
[   19.452907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.452966] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.453017] 
[   19.453063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.453151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.453180] Hardware name: linux,dummy-virt (DT)
[   19.453212] Call trace:
[   19.453237]  show_stack+0x20/0x38 (C)
[   19.453287]  dump_stack_lvl+0x8c/0xd0
[   19.453334]  print_report+0x118/0x608
[   19.453380]  kasan_report+0xdc/0x128
[   19.453423]  kasan_check_range+0x100/0x1a8
[   19.453551]  __kasan_check_write+0x20/0x30
[   19.453813]  kasan_atomics_helper+0x1128/0x4858
[   19.454946]  kasan_atomics+0x198/0x2e0
[   19.455014]  kunit_try_run_case+0x170/0x3f0
[   19.455084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455141]  kthread+0x328/0x630
[   19.455187]  ret_from_fork+0x10/0x20
[   19.455236] 
[   19.455257] Allocated by task 265:
[   19.455555]  kasan_save_stack+0x3c/0x68
[   19.455900]  kasan_save_track+0x20/0x40
[   19.455954]  kasan_save_alloc_info+0x40/0x58
[   19.456239]  __kasan_kmalloc+0xd4/0xd8
[   19.456296]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.456338]  kasan_atomics+0xb8/0x2e0
[   19.456567]  kunit_try_run_case+0x170/0x3f0
[   19.456625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.456833]  kthread+0x328/0x630
[   19.456881]  ret_from_fork+0x10/0x20
[   19.456922] 
[   19.457356] The buggy address belongs to the object at fff00000c788e780
[   19.457356]  which belongs to the cache kmalloc-64 of size 64
[   19.457430] The buggy address is located 0 bytes to the right of
[   19.457430]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.457591] 
[   19.457617] The buggy address belongs to the physical page:
[   19.457664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.458010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.458142] page_type: f5(slab)
[   19.458205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.458258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.458302] page dumped because: kasan: bad access detected
[   19.458466] 
[   19.458492] Memory state around the buggy address:
[   19.458530]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.458586]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.458729] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.458904]                                      ^
[   19.459018]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459082]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459227] ==================================================================
[   19.325310] ==================================================================
[   19.325369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.325420] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.325489] 
[   19.325555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.325695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.325757] Hardware name: linux,dummy-virt (DT)
[   19.325863] Call trace:
[   19.325952]  show_stack+0x20/0x38 (C)
[   19.326047]  dump_stack_lvl+0x8c/0xd0
[   19.326105]  print_report+0x118/0x608
[   19.326162]  kasan_report+0xdc/0x128
[   19.326207]  kasan_check_range+0x100/0x1a8
[   19.326256]  __kasan_check_write+0x20/0x30
[   19.326555]  kasan_atomics_helper+0x99c/0x4858
[   19.326650]  kasan_atomics+0x198/0x2e0
[   19.326697]  kunit_try_run_case+0x170/0x3f0
[   19.326745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.326798]  kthread+0x328/0x630
[   19.327076]  ret_from_fork+0x10/0x20
[   19.327227] 
[   19.327253] Allocated by task 265:
[   19.327287]  kasan_save_stack+0x3c/0x68
[   19.327365]  kasan_save_track+0x20/0x40
[   19.327442]  kasan_save_alloc_info+0x40/0x58
[   19.327523]  __kasan_kmalloc+0xd4/0xd8
[   19.327561]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.327601]  kasan_atomics+0xb8/0x2e0
[   19.327647]  kunit_try_run_case+0x170/0x3f0
[   19.327743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.327820]  kthread+0x328/0x630
[   19.328021]  ret_from_fork+0x10/0x20
[   19.328236] 
[   19.328541] The buggy address belongs to the object at fff00000c788e780
[   19.328541]  which belongs to the cache kmalloc-64 of size 64
[   19.328774] The buggy address is located 0 bytes to the right of
[   19.328774]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.329218] 
[   19.329250] The buggy address belongs to the physical page:
[   19.329287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.329548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.329603] page_type: f5(slab)
[   19.329756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.329825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.330106] page dumped because: kasan: bad access detected
[   19.330287] 
[   19.330503] Memory state around the buggy address:
[   19.330834] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.331155] ==================================================================
[   19.230802] ==================================================================
[   19.232730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   19.232965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.233025] Call trace:
[   19.234182]  __kasan_check_write+0x20/0x30
[   19.234708]  kunit_try_run_case+0x170/0x3f0
[   19.235535]  kasan_save_track+0x20/0x40
[   19.236447] The buggy address is located 0 bytes to the right of
[   19.236447]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.239158] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.240636]  kasan_report+0xdc/0x128
[   19.241264]  kthread+0x328/0x630
[   19.242746] 
[   19.248682]  kasan_atomics+0x198/0x2e0
[   19.251575] page_type: f5(slab)
[   19.252553]                                      ^
[   19.253428] 
[   19.253577] Hardware name: linux,dummy-virt (DT)
[   19.253635]  show_stack+0x20/0x38 (C)
[   19.254044]  kasan_atomics_helper+0x414/0x4858
[   19.254544] 
[   19.254730]  __kasan_kmalloc+0xd4/0xd8
[   19.255048] 
[   19.255075] The buggy address belongs to the object at fff00000c788e780
[   19.255075]  which belongs to the cache kmalloc-64 of size 64
[   19.255689]                                      ^
[   19.255774]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255821]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255861] ==================================================================
[   19.517078] ==================================================================
[   19.517294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.517374] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.517550] 
[   19.517589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.517800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.517839] Hardware name: linux,dummy-virt (DT)
[   19.518089] Call trace:
[   19.518125]  show_stack+0x20/0x38 (C)
[   19.518200]  dump_stack_lvl+0x8c/0xd0
[   19.518284]  print_report+0x118/0x608
[   19.518372]  kasan_report+0xdc/0x128
[   19.518465]  kasan_check_range+0x100/0x1a8
[   19.518513]  __kasan_check_write+0x20/0x30
[   19.518561]  kasan_atomics_helper+0x15b4/0x4858
[   19.518806]  kasan_atomics+0x198/0x2e0
[   19.518868]  kunit_try_run_case+0x170/0x3f0
[   19.518919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.519105]  kthread+0x328/0x630
[   19.519267]  ret_from_fork+0x10/0x20
[   19.519444] 
[   19.519469] Allocated by task 265:
[   19.519505]  kasan_save_stack+0x3c/0x68
[   19.519551]  kasan_save_track+0x20/0x40
[   19.519591]  kasan_save_alloc_info+0x40/0x58
[   19.519631]  __kasan_kmalloc+0xd4/0xd8
[   19.519667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.519707]  kasan_atomics+0xb8/0x2e0
[   19.519743]  kunit_try_run_case+0x170/0x3f0
[   19.520144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520192]  kthread+0x328/0x630
[   19.520718]  ret_from_fork+0x10/0x20
[   19.520837] 
[   19.520868] The buggy address belongs to the object at fff00000c788e780
[   19.520868]  which belongs to the cache kmalloc-64 of size 64
[   19.521135] The buggy address is located 0 bytes to the right of
[   19.521135]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.521231] 
[   19.521305] The buggy address belongs to the physical page:
[   19.521508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.521681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.521882] page_type: f5(slab)
[   19.522058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.522120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.522163] page dumped because: kasan: bad access detected
[   19.522198] 
[   19.522229] Memory state around the buggy address:
[   19.522265]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522308]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522350] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.522518]                                      ^
[   19.522569]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522662]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522706] ==================================================================
[   19.411373] ==================================================================
[   19.411563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.411639] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.411694] 
[   19.411737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.411824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.411854] Hardware name: linux,dummy-virt (DT)
[   19.411887] Call trace:
[   19.411911]  show_stack+0x20/0x38 (C)
[   19.411961]  dump_stack_lvl+0x8c/0xd0
[   19.412561]  print_report+0x118/0x608
[   19.412629]  kasan_report+0xdc/0x128
[   19.412677]  kasan_check_range+0x100/0x1a8
[   19.412740]  __kasan_check_write+0x20/0x30
[   19.412812]  kasan_atomics_helper+0xe44/0x4858
[   19.412907]  kasan_atomics+0x198/0x2e0
[   19.413000]  kunit_try_run_case+0x170/0x3f0
[   19.413120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413243]  kthread+0x328/0x630
[   19.413301]  ret_from_fork+0x10/0x20
[   19.413351] 
[   19.413385] Allocated by task 265:
[   19.413417]  kasan_save_stack+0x3c/0x68
[   19.413461]  kasan_save_track+0x20/0x40
[   19.413498]  kasan_save_alloc_info+0x40/0x58
[   19.413538]  __kasan_kmalloc+0xd4/0xd8
[   19.413574]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.413614]  kasan_atomics+0xb8/0x2e0
[   19.413650]  kunit_try_run_case+0x170/0x3f0
[   19.413686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413741]  kthread+0x328/0x630
[   19.413783]  ret_from_fork+0x10/0x20
[   19.413821] 
[   19.413855] The buggy address belongs to the object at fff00000c788e780
[   19.413855]  which belongs to the cache kmalloc-64 of size 64
[   19.413937] The buggy address is located 0 bytes to the right of
[   19.413937]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.414048] 
[   19.414113] The buggy address belongs to the physical page:
[   19.414148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.414200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.414269] page_type: f5(slab)
[   19.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.414381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.414466] page dumped because: kasan: bad access detected
[   19.414534] 
[   19.414592] Memory state around the buggy address:
[   19.414644]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414690]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414747] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.414785]                                      ^
[   19.414831]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414873]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414911] ==================================================================
[   19.550318] ==================================================================
[   19.550376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.550533] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.550599] 
[   19.550635] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.550809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.550844] Hardware name: linux,dummy-virt (DT)
[   19.551072] Call trace:
[   19.551106]  show_stack+0x20/0x38 (C)
[   19.551175]  dump_stack_lvl+0x8c/0xd0
[   19.551227]  print_report+0x118/0x608
[   19.551323]  kasan_report+0xdc/0x128
[   19.551386]  kasan_check_range+0x100/0x1a8
[   19.551440]  __kasan_check_write+0x20/0x30
[   19.551662]  kasan_atomics_helper+0x175c/0x4858
[   19.551784]  kasan_atomics+0x198/0x2e0
[   19.552031]  kunit_try_run_case+0x170/0x3f0
[   19.552105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.552161]  kthread+0x328/0x630
[   19.552499]  ret_from_fork+0x10/0x20
[   19.552725] 
[   19.552777] Allocated by task 265:
[   19.552817]  kasan_save_stack+0x3c/0x68
[   19.552870]  kasan_save_track+0x20/0x40
[   19.552910]  kasan_save_alloc_info+0x40/0x58
[   19.552950]  __kasan_kmalloc+0xd4/0xd8
[   19.552987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.553025]  kasan_atomics+0xb8/0x2e0
[   19.553077]  kunit_try_run_case+0x170/0x3f0
[   19.553117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.553160]  kthread+0x328/0x630
[   19.553197]  ret_from_fork+0x10/0x20
[   19.553234] 
[   19.553256] The buggy address belongs to the object at fff00000c788e780
[   19.553256]  which belongs to the cache kmalloc-64 of size 64
[   19.553315] The buggy address is located 0 bytes to the right of
[   19.553315]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.553376] 
[   19.553398] The buggy address belongs to the physical page:
[   19.553430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.553483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.553532] page_type: f5(slab)
[   19.553572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.553624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.553665] page dumped because: kasan: bad access detected
[   19.553699] 
[   19.553718] Memory state around the buggy address:
[   19.553750]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.553793]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.554210] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.554284]                                      ^
[   19.554337]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554390]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554735] ==================================================================
[   19.420937] ==================================================================
[   19.421027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.421090] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.421140] 
[   19.421171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.421256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.421284] Hardware name: linux,dummy-virt (DT)
[   19.421314] Call trace:
[   19.421340]  show_stack+0x20/0x38 (C)
[   19.421388]  dump_stack_lvl+0x8c/0xd0
[   19.421436]  print_report+0x118/0x608
[   19.421482]  kasan_report+0xdc/0x128
[   19.421527]  kasan_check_range+0x100/0x1a8
[   19.421574]  __kasan_check_write+0x20/0x30
[   19.421622]  kasan_atomics_helper+0xf20/0x4858
[   19.421668]  kasan_atomics+0x198/0x2e0
[   19.421712]  kunit_try_run_case+0x170/0x3f0
[   19.421758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421809]  kthread+0x328/0x630
[   19.421852]  ret_from_fork+0x10/0x20
[   19.422213] 
[   19.422278] Allocated by task 265:
[   19.422317]  kasan_save_stack+0x3c/0x68
[   19.422371]  kasan_save_track+0x20/0x40
[   19.422410]  kasan_save_alloc_info+0x40/0x58
[   19.422452]  __kasan_kmalloc+0xd4/0xd8
[   19.422489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.422528]  kasan_atomics+0xb8/0x2e0
[   19.422575]  kunit_try_run_case+0x170/0x3f0
[   19.422620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.422663]  kthread+0x328/0x630
[   19.422700]  ret_from_fork+0x10/0x20
[   19.422738] 
[   19.422760] The buggy address belongs to the object at fff00000c788e780
[   19.422760]  which belongs to the cache kmalloc-64 of size 64
[   19.422871] The buggy address is located 0 bytes to the right of
[   19.422871]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.422968] 
[   19.423002] The buggy address belongs to the physical page:
[   19.423035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.423116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.423173] page_type: f5(slab)
[   19.423213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.423264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.423305] page dumped because: kasan: bad access detected
[   19.423339] 
[   19.423370] Memory state around the buggy address:
[   19.423402]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.423446]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.423544] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.423625]                                      ^
[   19.423678]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.423726]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.423766] ==================================================================
[   19.544973] ==================================================================
[   19.545302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.545386] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.545473] 
[   19.545505] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.545588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.545624] Hardware name: linux,dummy-virt (DT)
[   19.545690] Call trace:
[   19.545733]  show_stack+0x20/0x38 (C)
[   19.545827]  dump_stack_lvl+0x8c/0xd0
[   19.546055]  print_report+0x118/0x608
[   19.546346]  kasan_report+0xdc/0x128
[   19.546408]  __asan_report_load8_noabort+0x20/0x30
[   19.546476]  kasan_atomics_helper+0x3e10/0x4858
[   19.546818]  kasan_atomics+0x198/0x2e0
[   19.546891]  kunit_try_run_case+0x170/0x3f0
[   19.546953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.547011]  kthread+0x328/0x630
[   19.547312]  ret_from_fork+0x10/0x20
[   19.547463] 
[   19.547593] Allocated by task 265:
[   19.547767]  kasan_save_stack+0x3c/0x68
[   19.547974]  kasan_save_track+0x20/0x40
[   19.548020]  kasan_save_alloc_info+0x40/0x58
[   19.548077]  __kasan_kmalloc+0xd4/0xd8
[   19.548118]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.548158]  kasan_atomics+0xb8/0x2e0
[   19.548196]  kunit_try_run_case+0x170/0x3f0
[   19.548235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.548277]  kthread+0x328/0x630
[   19.548315]  ret_from_fork+0x10/0x20
[   19.548352] 
[   19.548373] The buggy address belongs to the object at fff00000c788e780
[   19.548373]  which belongs to the cache kmalloc-64 of size 64
[   19.548431] The buggy address is located 0 bytes to the right of
[   19.548431]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.548494] 
[   19.548516] The buggy address belongs to the physical page:
[   19.548548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.548602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.548652] page_type: f5(slab)
[   19.548692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.548744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.548786] page dumped because: kasan: bad access detected
[   19.548819] 
[   19.549194] Memory state around the buggy address:
[   19.549235]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.549283]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.549327] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.549418]                                      ^
[   19.549455]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549499]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549538] ==================================================================
[   19.533456] ==================================================================
[   19.533733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.534008] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.534232] 
[   19.534271] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.534467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.534599] Hardware name: linux,dummy-virt (DT)
[   19.534791] Call trace:
[   19.534986]  show_stack+0x20/0x38 (C)
[   19.535064]  dump_stack_lvl+0x8c/0xd0
[   19.535117]  print_report+0x118/0x608
[   19.535201]  kasan_report+0xdc/0x128
[   19.535453]  __asan_report_load8_noabort+0x20/0x30
[   19.535565]  kasan_atomics_helper+0x3df4/0x4858
[   19.535869]  kasan_atomics+0x198/0x2e0
[   19.536113]  kunit_try_run_case+0x170/0x3f0
[   19.536178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.536503]  kthread+0x328/0x630
[   19.536845]  ret_from_fork+0x10/0x20
[   19.536900] 
[   19.536921] Allocated by task 265:
[   19.536953]  kasan_save_stack+0x3c/0x68
[   19.536998]  kasan_save_track+0x20/0x40
[   19.537062]  kasan_save_alloc_info+0x40/0x58
[   19.537155]  __kasan_kmalloc+0xd4/0xd8
[   19.537218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.537257]  kasan_atomics+0xb8/0x2e0
[   19.537299]  kunit_try_run_case+0x170/0x3f0
[   19.537445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.537687]  kthread+0x328/0x630
[   19.537913]  ret_from_fork+0x10/0x20
[   19.537958] 
[   19.537981] The buggy address belongs to the object at fff00000c788e780
[   19.537981]  which belongs to the cache kmalloc-64 of size 64
[   19.538054] The buggy address is located 0 bytes to the right of
[   19.538054]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.538207] 
[   19.538247] The buggy address belongs to the physical page:
[   19.538329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.538386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.538441] page_type: f5(slab)
[   19.538530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.538596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.538700] page dumped because: kasan: bad access detected
[   19.538736] 
[   19.538758] Memory state around the buggy address:
[   19.538845]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538926]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538970] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.539009]                                      ^
[   19.539052]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.539100]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.539139] ==================================================================
[   19.459604] ==================================================================
[   19.459651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.459707] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.459757] 
[   19.459789] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.459873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.459902] Hardware name: linux,dummy-virt (DT)
[   19.459934] Call trace:
[   19.459958]  show_stack+0x20/0x38 (C)
[   19.460008]  dump_stack_lvl+0x8c/0xd0
[   19.460072]  print_report+0x118/0x608
[   19.462097]  kasan_report+0xdc/0x128
[   19.462932]  kasan_check_range+0x100/0x1a8
[   19.463262]  __kasan_check_write+0x20/0x30
[   19.463347]  kasan_atomics_helper+0x1190/0x4858
[   19.463450]  kasan_atomics+0x198/0x2e0
[   19.463512]  kunit_try_run_case+0x170/0x3f0
[   19.463579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.463632]  kthread+0x328/0x630
[   19.463869]  ret_from_fork+0x10/0x20
[   19.463945] 
[   19.463981] Allocated by task 265:
[   19.464275]  kasan_save_stack+0x3c/0x68
[   19.464329]  kasan_save_track+0x20/0x40
[   19.464589]  kasan_save_alloc_info+0x40/0x58
[   19.464641]  __kasan_kmalloc+0xd4/0xd8
[   19.464680]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.464759]  kasan_atomics+0xb8/0x2e0
[   19.464822]  kunit_try_run_case+0x170/0x3f0
[   19.464865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.464910]  kthread+0x328/0x630
[   19.465255]  ret_from_fork+0x10/0x20
[   19.465330] 
[   19.465356] The buggy address belongs to the object at fff00000c788e780
[   19.465356]  which belongs to the cache kmalloc-64 of size 64
[   19.465417] The buggy address is located 0 bytes to the right of
[   19.465417]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.465480] 
[   19.466069] The buggy address belongs to the physical page:
[   19.466138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.466322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.466378] page_type: f5(slab)
[   19.466420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.466623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.466824] page dumped because: kasan: bad access detected
[   19.466869] 
[   19.466894] Memory state around the buggy address:
[   19.467057]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.467339]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.467534] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.467581]                                      ^
[   19.467912]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.468192]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.468359] ==================================================================
[   19.433309] ==================================================================
[   19.433406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.433465] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.433608] 
[   19.433673] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.433765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433793] Hardware name: linux,dummy-virt (DT)
[   19.433827] Call trace:
[   19.434394]  show_stack+0x20/0x38 (C)
[   19.434478]  dump_stack_lvl+0x8c/0xd0
[   19.434529]  print_report+0x118/0x608
[   19.434591]  kasan_report+0xdc/0x128
[   19.434641]  kasan_check_range+0x100/0x1a8
[   19.434690]  __kasan_check_write+0x20/0x30
[   19.434827]  kasan_atomics_helper+0xff0/0x4858
[   19.434985]  kasan_atomics+0x198/0x2e0
[   19.435240]  kunit_try_run_case+0x170/0x3f0
[   19.435311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435487]  kthread+0x328/0x630
[   19.435554]  ret_from_fork+0x10/0x20
[   19.435604] 
[   19.435639] Allocated by task 265:
[   19.435715]  kasan_save_stack+0x3c/0x68
[   19.435917]  kasan_save_track+0x20/0x40
[   19.436126]  kasan_save_alloc_info+0x40/0x58
[   19.436297]  __kasan_kmalloc+0xd4/0xd8
[   19.436339]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.436398]  kasan_atomics+0xb8/0x2e0
[   19.436536]  kunit_try_run_case+0x170/0x3f0
[   19.436761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.436812]  kthread+0x328/0x630
[   19.436851]  ret_from_fork+0x10/0x20
[   19.436888] 
[   19.436912] The buggy address belongs to the object at fff00000c788e780
[   19.436912]  which belongs to the cache kmalloc-64 of size 64
[   19.438062] The buggy address is located 0 bytes to the right of
[   19.438062]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.438334] 
[   19.438366] The buggy address belongs to the physical page:
[   19.438400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.438456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.438506] page_type: f5(slab)
[   19.438547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.438615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.438698] page dumped because: kasan: bad access detected
[   19.438733] 
[   19.438753] Memory state around the buggy address:
[   19.438786]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.438830]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.438873] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.438913]                                      ^
[   19.438946]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.438992]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439030] ==================================================================
[   19.391356] ==================================================================
[   19.391417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.391476] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.391547] 
[   19.391585] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.391672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.391838] Hardware name: linux,dummy-virt (DT)
[   19.391912] Call trace:
[   19.391968]  show_stack+0x20/0x38 (C)
[   19.392088]  dump_stack_lvl+0x8c/0xd0
[   19.392149]  print_report+0x118/0x608
[   19.392254]  kasan_report+0xdc/0x128
[   19.392300]  kasan_check_range+0x100/0x1a8
[   19.392346]  __kasan_check_write+0x20/0x30
[   19.392395]  kasan_atomics_helper+0xd3c/0x4858
[   19.392443]  kasan_atomics+0x198/0x2e0
[   19.392487]  kunit_try_run_case+0x170/0x3f0
[   19.392533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.392583]  kthread+0x328/0x630
[   19.392628]  ret_from_fork+0x10/0x20
[   19.392677] 
[   19.392697] Allocated by task 265:
[   19.392728]  kasan_save_stack+0x3c/0x68
[   19.392771]  kasan_save_track+0x20/0x40
[   19.392810]  kasan_save_alloc_info+0x40/0x58
[   19.392849]  __kasan_kmalloc+0xd4/0xd8
[   19.392885]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.392925]  kasan_atomics+0xb8/0x2e0
[   19.392959]  kunit_try_run_case+0x170/0x3f0
[   19.392995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393036]  kthread+0x328/0x630
[   19.393161]  ret_from_fork+0x10/0x20
[   19.393334] 
[   19.393358] The buggy address belongs to the object at fff00000c788e780
[   19.393358]  which belongs to the cache kmalloc-64 of size 64
[   19.393438] The buggy address is located 0 bytes to the right of
[   19.393438]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.393634] 
[   19.393701] The buggy address belongs to the physical page:
[   19.393940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.394025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.394088] page_type: f5(slab)
[   19.394140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.394207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.394250] page dumped because: kasan: bad access detected
[   19.394284] 
[   19.394305] Memory state around the buggy address:
[   19.394339]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394405]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394470] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.394520]                                      ^
[   19.394554]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394680]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394800] ==================================================================
[   19.489554] ==================================================================
[   19.489601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.489648] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.489697] 
[   19.489726] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.489807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.489836] Hardware name: linux,dummy-virt (DT)
[   19.489866] Call trace:
[   19.489911]  show_stack+0x20/0x38 (C)
[   19.490015]  dump_stack_lvl+0x8c/0xd0
[   19.490079]  print_report+0x118/0x608
[   19.490131]  kasan_report+0xdc/0x128
[   19.490176]  kasan_check_range+0x100/0x1a8
[   19.490222]  __kasan_check_write+0x20/0x30
[   19.490270]  kasan_atomics_helper+0x1384/0x4858
[   19.490353]  kasan_atomics+0x198/0x2e0
[   19.490409]  kunit_try_run_case+0x170/0x3f0
[   19.490482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490578]  kthread+0x328/0x630
[   19.490814]  ret_from_fork+0x10/0x20
[   19.490870] 
[   19.490892] Allocated by task 265:
[   19.490923]  kasan_save_stack+0x3c/0x68
[   19.491071]  kasan_save_track+0x20/0x40
[   19.491115]  kasan_save_alloc_info+0x40/0x58
[   19.491156]  __kasan_kmalloc+0xd4/0xd8
[   19.491192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.491233]  kasan_atomics+0xb8/0x2e0
[   19.491569]  kunit_try_run_case+0x170/0x3f0
[   19.491654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.491704]  kthread+0x328/0x630
[   19.491743]  ret_from_fork+0x10/0x20
[   19.491780] 
[   19.491946] The buggy address belongs to the object at fff00000c788e780
[   19.491946]  which belongs to the cache kmalloc-64 of size 64
[   19.492013] The buggy address is located 0 bytes to the right of
[   19.492013]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.492088] 
[   19.492128] The buggy address belongs to the physical page:
[   19.492175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.492225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.492297] page_type: f5(slab)
[   19.492386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.492438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.492508] page dumped because: kasan: bad access detected
[   19.492542] 
[   19.492562] Memory state around the buggy address:
[   19.492611]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492707]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492939] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.493015]                                      ^
[   19.493062]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493296]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493948] ==================================================================
[   19.555164] ==================================================================
[   19.555223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.555281] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.555332] 
[   19.555378] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.555461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555491] Hardware name: linux,dummy-virt (DT)
[   19.555522] Call trace:
[   19.555545]  show_stack+0x20/0x38 (C)
[   19.555596]  dump_stack_lvl+0x8c/0xd0
[   19.555644]  print_report+0x118/0x608
[   19.555690]  kasan_report+0xdc/0x128
[   19.555734]  __asan_report_load8_noabort+0x20/0x30
[   19.555841]  kasan_atomics_helper+0x3e20/0x4858
[   19.556004]  kasan_atomics+0x198/0x2e0
[   19.556202]  kunit_try_run_case+0x170/0x3f0
[   19.556378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.556461]  kthread+0x328/0x630
[   19.556516]  ret_from_fork+0x10/0x20
[   19.556566] 
[   19.556587] Allocated by task 265:
[   19.556618]  kasan_save_stack+0x3c/0x68
[   19.556815]  kasan_save_track+0x20/0x40
[   19.556863]  kasan_save_alloc_info+0x40/0x58
[   19.556919]  __kasan_kmalloc+0xd4/0xd8
[   19.557031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.557144]  kasan_atomics+0xb8/0x2e0
[   19.557358]  kunit_try_run_case+0x170/0x3f0
[   19.557448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557601]  kthread+0x328/0x630
[   19.557641]  ret_from_fork+0x10/0x20
[   19.557686] 
[   19.557729] The buggy address belongs to the object at fff00000c788e780
[   19.557729]  which belongs to the cache kmalloc-64 of size 64
[   19.557874] The buggy address is located 0 bytes to the right of
[   19.557874]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.557977] 
[   19.558000] The buggy address belongs to the physical page:
[   19.558576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.558719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.558803] page_type: f5(slab)
[   19.558844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.558921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.558968] page dumped because: kasan: bad access detected
[   19.559003] 
[   19.559023] Memory state around the buggy address:
[   19.559103]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559340]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559663] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.559750]                                      ^
[   19.559808]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559851]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.560080] ==================================================================
[   19.527354] ==================================================================
[   19.527423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.527790] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.527867] 
[   19.527902] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.527990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.528020] Hardware name: linux,dummy-virt (DT)
[   19.528063] Call trace:
[   19.528090]  show_stack+0x20/0x38 (C)
[   19.528145]  dump_stack_lvl+0x8c/0xd0
[   19.528358]  print_report+0x118/0x608
[   19.528556]  kasan_report+0xdc/0x128
[   19.528610]  kasan_check_range+0x100/0x1a8
[   19.528690]  __kasan_check_write+0x20/0x30
[   19.528780]  kasan_atomics_helper+0x1644/0x4858
[   19.528840]  kasan_atomics+0x198/0x2e0
[   19.528948]  kunit_try_run_case+0x170/0x3f0
[   19.529005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.529165]  kthread+0x328/0x630
[   19.529223]  ret_from_fork+0x10/0x20
[   19.529292] 
[   19.529319] Allocated by task 265:
[   19.529352]  kasan_save_stack+0x3c/0x68
[   19.529397]  kasan_save_track+0x20/0x40
[   19.529651]  kasan_save_alloc_info+0x40/0x58
[   19.529933]  __kasan_kmalloc+0xd4/0xd8
[   19.529999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.530050]  kasan_atomics+0xb8/0x2e0
[   19.530094]  kunit_try_run_case+0x170/0x3f0
[   19.530412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530503]  kthread+0x328/0x630
[   19.530655]  ret_from_fork+0x10/0x20
[   19.530866] 
[   19.530947] The buggy address belongs to the object at fff00000c788e780
[   19.530947]  which belongs to the cache kmalloc-64 of size 64
[   19.531014] The buggy address is located 0 bytes to the right of
[   19.531014]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.531089] 
[   19.531116] The buggy address belongs to the physical page:
[   19.531204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.531543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.531615] page_type: f5(slab)
[   19.531851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.531925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.532106] page dumped because: kasan: bad access detected
[   19.532372] 
[   19.532401] Memory state around the buggy address:
[   19.532485]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.532535]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.532770] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.532818]                                      ^
[   19.532859]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.533185]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.533233] ==================================================================
[   19.404957] ==================================================================
[   19.405001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.405060] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.405110] 
[   19.405143] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.405226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.405256] Hardware name: linux,dummy-virt (DT)
[   19.405289] Call trace:
[   19.405326]  show_stack+0x20/0x38 (C)
[   19.405377]  dump_stack_lvl+0x8c/0xd0
[   19.405426]  print_report+0x118/0x608
[   19.405471]  kasan_report+0xdc/0x128
[   19.405517]  __asan_report_load8_noabort+0x20/0x30
[   19.406082]  kasan_atomics_helper+0x3f58/0x4858
[   19.406200]  kasan_atomics+0x198/0x2e0
[   19.406253]  kunit_try_run_case+0x170/0x3f0
[   19.406302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.406431]  kthread+0x328/0x630
[   19.406486]  ret_from_fork+0x10/0x20
[   19.406537] 
[   19.406608] Allocated by task 265:
[   19.406644]  kasan_save_stack+0x3c/0x68
[   19.407433]  kasan_save_track+0x20/0x40
[   19.407503]  kasan_save_alloc_info+0x40/0x58
[   19.407557]  __kasan_kmalloc+0xd4/0xd8
[   19.407597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.407637]  kasan_atomics+0xb8/0x2e0
[   19.407673]  kunit_try_run_case+0x170/0x3f0
[   19.407711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.407754]  kthread+0x328/0x630
[   19.407793]  ret_from_fork+0x10/0x20
[   19.408391] 
[   19.408419] The buggy address belongs to the object at fff00000c788e780
[   19.408419]  which belongs to the cache kmalloc-64 of size 64
[   19.408481] The buggy address is located 0 bytes to the right of
[   19.408481]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.408544] 
[   19.408567] The buggy address belongs to the physical page:
[   19.408598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.408832] page_type: f5(slab)
[   19.408880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.409397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.409491] page dumped because: kasan: bad access detected
[   19.409727] 
[   19.409773] Memory state around the buggy address:
[   19.409807]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409853]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409905] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.409948]                                      ^
[   19.410328]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410519]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410590] ==================================================================
[   19.315730] ==================================================================
[   19.315791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.315848] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.315912] 
[   19.315949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.316431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.316505] Hardware name: linux,dummy-virt (DT)
[   19.316544] Call trace:
[   19.316569]  show_stack+0x20/0x38 (C)
[   19.316627]  dump_stack_lvl+0x8c/0xd0
[   19.317056]  print_report+0x118/0x608
[   19.317126]  kasan_report+0xdc/0x128
[   19.317177]  __asan_report_load4_noabort+0x20/0x30
[   19.317230]  kasan_atomics_helper+0x42d8/0x4858
[   19.317318]  kasan_atomics+0x198/0x2e0
[   19.317379]  kunit_try_run_case+0x170/0x3f0
[   19.317472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.317550]  kthread+0x328/0x630
[   19.317644]  ret_from_fork+0x10/0x20
[   19.317751] 
[   19.317807] Allocated by task 265:
[   19.317847]  kasan_save_stack+0x3c/0x68
[   19.318124]  kasan_save_track+0x20/0x40
[   19.318170]  kasan_save_alloc_info+0x40/0x58
[   19.318212]  __kasan_kmalloc+0xd4/0xd8
[   19.318262]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.318409]  kasan_atomics+0xb8/0x2e0
[   19.318535]  kunit_try_run_case+0x170/0x3f0
[   19.318657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.318707]  kthread+0x328/0x630
[   19.318744]  ret_from_fork+0x10/0x20
[   19.318781] 
[   19.318806] The buggy address belongs to the object at fff00000c788e780
[   19.318806]  which belongs to the cache kmalloc-64 of size 64
[   19.318866] The buggy address is located 0 bytes to the right of
[   19.318866]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.319283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.319572] page dumped because: kasan: bad access detected
[   19.320383]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.321912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.323158]  kthread+0x328/0x630
[   19.323648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.323689]  kasan_atomics+0xb8/0x2e0
[   19.323725]  kunit_try_run_case+0x170/0x3f0
[   19.323763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.323806]  kthread+0x328/0x630
[   19.323895]  ret_from_fork+0x10/0x20
[   19.323947] 
[   19.323970] The buggy address belongs to the object at fff00000c788e780
[   19.323970]  which belongs to the cache kmalloc-64 of size 64
[   19.324034] The buggy address is located 0 bytes to the right of
[   19.324034]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.324110] 
[   19.324133] The buggy address belongs to the physical page:
[   19.324167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.324263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.324318] page_type: f5(slab)
[   19.324368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.324462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.324536] page dumped because: kasan: bad access detected
[   19.324576] 
[   19.324597] Memory state around the buggy address:
[   19.324632]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.324709]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.324758] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.324798]                                      ^
[   19.324838]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324918]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324964] ==================================================================
[   19.424782] ==================================================================
[   19.424860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.424923] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.424975] 
[   19.425007] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.425104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.425135] Hardware name: linux,dummy-virt (DT)
[   19.425169] Call trace:
[   19.425645]  show_stack+0x20/0x38 (C)
[   19.426078]  dump_stack_lvl+0x8c/0xd0
[   19.426569]  print_report+0x118/0x608
[   19.426753]  kasan_report+0xdc/0x128
[   19.426947]  kasan_check_range+0x100/0x1a8
[   19.427012]  __kasan_check_write+0x20/0x30
[   19.427234]  kasan_atomics_helper+0xf88/0x4858
[   19.427385]  kasan_atomics+0x198/0x2e0
[   19.427784]  kunit_try_run_case+0x170/0x3f0
[   19.427884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.428204]  kthread+0x328/0x630
[   19.428308]  ret_from_fork+0x10/0x20
[   19.428377] 
[   19.428401] Allocated by task 265:
[   19.428726]  kasan_save_stack+0x3c/0x68
[   19.429007]  kasan_save_track+0x20/0x40
[   19.429086]  kasan_save_alloc_info+0x40/0x58
[   19.429583]  __kasan_kmalloc+0xd4/0xd8
[   19.429887]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.430107]  kasan_atomics+0xb8/0x2e0
[   19.430216]  kunit_try_run_case+0x170/0x3f0
[   19.430263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430307]  kthread+0x328/0x630
[   19.430344]  ret_from_fork+0x10/0x20
[   19.430380] 
[   19.430405] The buggy address belongs to the object at fff00000c788e780
[   19.430405]  which belongs to the cache kmalloc-64 of size 64
[   19.430464] The buggy address is located 0 bytes to the right of
[   19.430464]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.430974] 
[   19.431062] The buggy address belongs to the physical page:
[   19.431477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.431550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431605] page_type: f5(slab)
[   19.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.431837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431889] page dumped because: kasan: bad access detected
[   19.432128] 
[   19.432166] Memory state around the buggy address:
[   19.432286]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432348]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432395] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.432565]                                      ^
[   19.432620]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432667]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432813] ==================================================================
[   19.385612] ==================================================================
[   19.385659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.385760] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.385815] 
[   19.386446] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.386689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.386737] Hardware name: linux,dummy-virt (DT)
[   19.386818] Call trace:
[   19.386863]  show_stack+0x20/0x38 (C)
[   19.387118]  dump_stack_lvl+0x8c/0xd0
[   19.387180]  print_report+0x118/0x608
[   19.387229]  kasan_report+0xdc/0x128
[   19.387277]  __asan_report_load4_noabort+0x20/0x30
[   19.387542]  kasan_atomics_helper+0x3dd8/0x4858
[   19.387885]  kasan_atomics+0x198/0x2e0
[   19.387938]  kunit_try_run_case+0x170/0x3f0
[   19.387987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388059]  kthread+0x328/0x630
[   19.388114]  ret_from_fork+0x10/0x20
[   19.388207] 
[   19.388452] Allocated by task 265:
[   19.388512]  kasan_save_stack+0x3c/0x68
[   19.388571]  kasan_save_track+0x20/0x40
[   19.388673]  kasan_save_alloc_info+0x40/0x58
[   19.388718]  __kasan_kmalloc+0xd4/0xd8
[   19.388765]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.388933]  kasan_atomics+0xb8/0x2e0
[   19.389005]  kunit_try_run_case+0x170/0x3f0
[   19.389108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.389161]  kthread+0x328/0x630
[   19.389197]  ret_from_fork+0x10/0x20
[   19.389235] 
[   19.389393] The buggy address belongs to the object at fff00000c788e780
[   19.389393]  which belongs to the cache kmalloc-64 of size 64
[   19.389464] The buggy address is located 0 bytes to the right of
[   19.389464]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.389579] 
[   19.389629] The buggy address belongs to the physical page:
[   19.389677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.389731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389782] page_type: f5(slab)
[   19.389824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389932] page dumped because: kasan: bad access detected
[   19.389965] 
[   19.389985] Memory state around the buggy address:
[   19.390019]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390073]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390131] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390172]                                      ^
[   19.390209]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390252]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390300] ==================================================================
[   19.494559] ==================================================================
[   19.494856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.494921] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.495168] 
[   19.495215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.495646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.495807] Hardware name: linux,dummy-virt (DT)
[   19.495852] Call trace:
[   19.496003]  show_stack+0x20/0x38 (C)
[   19.496171]  dump_stack_lvl+0x8c/0xd0
[   19.496257]  print_report+0x118/0x608
[   19.496327]  kasan_report+0xdc/0x128
[   19.496379]  __asan_report_load8_noabort+0x20/0x30
[   19.496709]  kasan_atomics_helper+0x3f04/0x4858
[   19.496936]  kasan_atomics+0x198/0x2e0
[   19.497000]  kunit_try_run_case+0x170/0x3f0
[   19.497063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.497120]  kthread+0x328/0x630
[   19.497167]  ret_from_fork+0x10/0x20
[   19.497217] 
[   19.497238] Allocated by task 265:
[   19.497271]  kasan_save_stack+0x3c/0x68
[   19.497315]  kasan_save_track+0x20/0x40
[   19.498096]  kasan_save_alloc_info+0x40/0x58
[   19.498319]  __kasan_kmalloc+0xd4/0xd8
[   19.498363]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.498401]  kasan_atomics+0xb8/0x2e0
[   19.498439]  kunit_try_run_case+0x170/0x3f0
[   19.498476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.498519]  kthread+0x328/0x630
[   19.498556]  ret_from_fork+0x10/0x20
[   19.498604] 
[   19.498628] The buggy address belongs to the object at fff00000c788e780
[   19.498628]  which belongs to the cache kmalloc-64 of size 64
[   19.498686] The buggy address is located 0 bytes to the right of
[   19.498686]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.498748] 
[   19.498770] The buggy address belongs to the physical page:
[   19.498802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.498854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.498903] page_type: f5(slab)
[   19.498942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.498993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.499035] page dumped because: kasan: bad access detected
[   19.499077] 
[   19.499099] Memory state around the buggy address:
[   19.499131]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499176]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499218] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.499256]                                      ^
[   19.499291]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499333]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499371] ==================================================================
[   19.417908] ==================================================================
[   19.417955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.418002] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.418059] 
[   19.418093] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.418175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.418226] Hardware name: linux,dummy-virt (DT)
[   19.418278] Call trace:
[   19.418337]  show_stack+0x20/0x38 (C)
[   19.418422]  dump_stack_lvl+0x8c/0xd0
[   19.418525]  print_report+0x118/0x608
[   19.418597]  kasan_report+0xdc/0x128
[   19.418645]  kasan_check_range+0x100/0x1a8
[   19.418692]  __kasan_check_write+0x20/0x30
[   19.418811]  kasan_atomics_helper+0xeb8/0x4858
[   19.418862]  kasan_atomics+0x198/0x2e0
[   19.418908]  kunit_try_run_case+0x170/0x3f0
[   19.418953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419018]  kthread+0x328/0x630
[   19.419076]  ret_from_fork+0x10/0x20
[   19.419127] 
[   19.419169] Allocated by task 265:
[   19.419255]  kasan_save_stack+0x3c/0x68
[   19.419342]  kasan_save_track+0x20/0x40
[   19.419406]  kasan_save_alloc_info+0x40/0x58
[   19.419501]  __kasan_kmalloc+0xd4/0xd8
[   19.419543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.419582]  kasan_atomics+0xb8/0x2e0
[   19.419619]  kunit_try_run_case+0x170/0x3f0
[   19.419656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419699]  kthread+0x328/0x630
[   19.419758]  ret_from_fork+0x10/0x20
[   19.419840] 
[   19.419865] The buggy address belongs to the object at fff00000c788e780
[   19.419865]  which belongs to the cache kmalloc-64 of size 64
[   19.419923] The buggy address is located 0 bytes to the right of
[   19.419923]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.419984] 
[   19.420005] The buggy address belongs to the physical page:
[   19.420036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.420098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.420145] page_type: f5(slab)
[   19.420201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.420262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.420319] page dumped because: kasan: bad access detected
[   19.420359] 
[   19.420378] Memory state around the buggy address:
[   19.420419]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420463]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420505] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.420542]                                      ^
[   19.420576]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420618]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420656] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   19.089946] ==================================================================
[   19.090008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.090753] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.090837] 
[   19.090960] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.091107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.091174] Hardware name: linux,dummy-virt (DT)
[   19.091256] Call trace:
[   19.091284]  show_stack+0x20/0x38 (C)
[   19.091634]  dump_stack_lvl+0x8c/0xd0
[   19.092323]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.094120]  kthread+0x328/0x630
[   19.094409]  ret_from_fork+0x10/0x20
[   19.094711] 
[   19.094768] The buggy address belongs to the object at fff00000c5f09c40
[   19.094768]  which belongs to the cache kmalloc-16 of size 16
[   19.095252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.095769] page dumped because: kasan: bad access detected
[   19.096185] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.096910] ==================================================================
[   19.065257] ==================================================================
[   19.065340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.065403] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.066608] 
[   19.066834] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.066960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.067273] Hardware name: linux,dummy-virt (DT)
[   19.067520] Call trace:
[   19.067559]  show_stack+0x20/0x38 (C)
[   19.067711]  dump_stack_lvl+0x8c/0xd0
[   19.067790]  print_report+0x118/0x608
[   19.067839]  kasan_report+0xdc/0x128
[   19.067886]  kasan_check_range+0x100/0x1a8
[   19.067933]  __kasan_check_write+0x20/0x30
[   19.068552]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.068732]  kasan_bitops_generic+0x110/0x1c8
[   19.068959]  kunit_try_run_case+0x170/0x3f0
[   19.069109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.069173]  kthread+0x328/0x630
[   19.069374]  ret_from_fork+0x10/0x20
[   19.069555] 
[   19.069613] Allocated by task 261:
[   19.069652]  kasan_save_stack+0x3c/0x68
[   19.069723]  kasan_save_track+0x20/0x40
[   19.069942]  kasan_save_alloc_info+0x40/0x58
[   19.070116]  __kasan_kmalloc+0xd4/0xd8
[   19.070171]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.070214]  kasan_bitops_generic+0xa0/0x1c8
[   19.070261]  kunit_try_run_case+0x170/0x3f0
[   19.070305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.070501]  kthread+0x328/0x630
[   19.070661]  ret_from_fork+0x10/0x20
[   19.070715] 
[   19.070742] The buggy address belongs to the object at fff00000c5f09c40
[   19.070742]  which belongs to the cache kmalloc-16 of size 16
[   19.070804] The buggy address is located 8 bytes inside of
[   19.070804]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.070864] 
[   19.070887] The buggy address belongs to the physical page:
[   19.071080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.071285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.071655] page_type: f5(slab)
[   19.071745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.071834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.072184] page dumped because: kasan: bad access detected
[   19.072229] 
[   19.072255] Memory state around the buggy address:
[   19.072375]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.072580]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.072760] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.072868]                                               ^
[   19.072913]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.072958]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.073185] ==================================================================
[   19.080965] ==================================================================
[   19.081029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.081102] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.081441] 
[   19.081490] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.081609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.081645] Hardware name: linux,dummy-virt (DT)
[   19.081802] Call trace:
[   19.081838]  show_stack+0x20/0x38 (C)
[   19.082364]  dump_stack_lvl+0x8c/0xd0
[   19.082587]  print_report+0x118/0x608
[   19.082696]  kasan_report+0xdc/0x128
[   19.082777]  kasan_check_range+0x100/0x1a8
[   19.082842]  __kasan_check_write+0x20/0x30
[   19.082892]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.082945]  kasan_bitops_generic+0x110/0x1c8
[   19.082992]  kunit_try_run_case+0x170/0x3f0
[   19.083375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.083470]  kthread+0x328/0x630
[   19.083520]  ret_from_fork+0x10/0x20
[   19.083865] 
[   19.083946] Allocated by task 261:
[   19.083986]  kasan_save_stack+0x3c/0x68
[   19.084319]  kasan_save_track+0x20/0x40
[   19.084374]  kasan_save_alloc_info+0x40/0x58
[   19.084417]  __kasan_kmalloc+0xd4/0xd8
[   19.084455]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.084693]  kasan_bitops_generic+0xa0/0x1c8
[   19.085012]  kunit_try_run_case+0x170/0x3f0
[   19.085100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.085470]  kthread+0x328/0x630
[   19.085532]  ret_from_fork+0x10/0x20
[   19.085581] 
[   19.085608] The buggy address belongs to the object at fff00000c5f09c40
[   19.085608]  which belongs to the cache kmalloc-16 of size 16
[   19.085997] The buggy address is located 8 bytes inside of
[   19.085997]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.086264] 
[   19.086368] The buggy address belongs to the physical page:
[   19.086410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.086539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.086616] page_type: f5(slab)
[   19.086879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.087110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.087173] page dumped because: kasan: bad access detected
[   19.087332] 
[   19.087463] Memory state around the buggy address:
[   19.087554]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.087814]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.088035] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.088101]                                               ^
[   19.088370]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.088460]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.088534] ==================================================================
[   19.075372] ==================================================================
[   19.075435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.075496] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261
[   19.075548] 
[   19.076053] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.076572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.076636] Hardware name: linux,dummy-virt (DT)
[   19.076674] Call trace:
[   19.076699]  show_stack+0x20/0x38 (C)
[   19.076759]  dump_stack_lvl+0x8c/0xd0
[   19.076809]  print_report+0x118/0x608
[   19.076894]  kasan_report+0xdc/0x128
[   19.076946]  __asan_report_load8_noabort+0x20/0x30
[   19.076997]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.077303]  kasan_bitops_generic+0x110/0x1c8
[   19.077437]  kunit_try_run_case+0x170/0x3f0
[   19.077493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.077743]  kthread+0x328/0x630
[   19.077838]  ret_from_fork+0x10/0x20
[   19.077891] 
[   19.077938] Allocated by task 261:
[   19.077974]  kasan_save_stack+0x3c/0x68
[   19.078022]  kasan_save_track+0x20/0x40
[   19.078074]  kasan_save_alloc_info+0x40/0x58
[   19.078405]  __kasan_kmalloc+0xd4/0xd8
[   19.078703]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.078758]  kasan_bitops_generic+0xa0/0x1c8
[   19.078827]  kunit_try_run_case+0x170/0x3f0
[   19.078866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.078909]  kthread+0x328/0x630
[   19.078946]  ret_from_fork+0x10/0x20
[   19.078981] 
[   19.079011] The buggy address belongs to the object at fff00000c5f09c40
[   19.079011]  which belongs to the cache kmalloc-16 of size 16
[   19.079085] The buggy address is located 8 bytes inside of
[   19.079085]  allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49)
[   19.079149] 
[   19.079173] The buggy address belongs to the physical page:
[   19.079205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09
[   19.079259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.079313] page_type: f5(slab)
[   19.079356] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.079411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.079451] page dumped because: kasan: bad access detected
[   19.079482] 
[   19.079518] Memory state around the buggy address:
[   19.079556]  fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.079610]  fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.079669] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.079709]                                               ^
[   19.079766]  fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.079815]  fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.079855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   19.042191] ==================================================================
[   19.042310] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   19.042711] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259
[   19.043269] 
[   19.043638] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.043745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.043775] Hardware name: linux,dummy-virt (DT)
[   19.043816] Call trace:
[   19.043844]  show_stack+0x20/0x38 (C)
[   19.044105]  dump_stack_lvl+0x8c/0xd0
[   19.044372]  print_report+0x118/0x608
[   19.044452]  kasan_report+0xdc/0x128
[   19.044503]  __asan_report_load1_noabort+0x20/0x30
[   19.044562]  strnlen+0x80/0x88
[   19.044818]  kasan_strings+0x478/0xb00
[   19.044902]  kunit_try_run_case+0x170/0x3f0
[   19.044955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.045008]  kthread+0x328/0x630
[   19.045066]  ret_from_fork+0x10/0x20
[   19.045418] 
[   19.045468] Allocated by task 259:
[   19.045527]  kasan_save_stack+0x3c/0x68
[   19.045590]  kasan_save_track+0x20/0x40
[   19.045634]  kasan_save_alloc_info+0x40/0x58
[   19.045676]  __kasan_kmalloc+0xd4/0xd8
[   19.045713]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.045752]  kasan_strings+0xc8/0xb00
[   19.045788]  kunit_try_run_case+0x170/0x3f0
[   19.045824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.045867]  kthread+0x328/0x630
[   19.046229]  ret_from_fork+0x10/0x20
[   19.046284] 
[   19.046311] Freed by task 259:
[   19.046344]  kasan_save_stack+0x3c/0x68
[   19.046384]  kasan_save_track+0x20/0x40
[   19.046877]  kasan_save_free_info+0x4c/0x78
[   19.047224]  __kasan_slab_free+0x6c/0x98
[   19.047408]  kfree+0x214/0x3c8
[   19.047476]  kasan_strings+0x24c/0xb00
[   19.047537]  kunit_try_run_case+0x170/0x3f0
[   19.047591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.047861]  kthread+0x328/0x630
[   19.047968]  ret_from_fork+0x10/0x20
[   19.048055] 
[   19.048246] The buggy address belongs to the object at fff00000c78896c0
[   19.048246]  which belongs to the cache kmalloc-32 of size 32
[   19.048329] The buggy address is located 16 bytes inside of
[   19.048329]  freed 32-byte region [fff00000c78896c0, fff00000c78896e0)
[   19.048576] 
[   19.048607] The buggy address belongs to the physical page:
[   19.048785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889
[   19.048997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.049062] page_type: f5(slab)
[   19.049328] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.049634] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.049683] page dumped because: kasan: bad access detected
[   19.049815] 
[   19.049848] Memory state around the buggy address:
[   19.050017]  fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.050082]  fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.050155] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.050418]                                                  ^
[   19.050539]  fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.050613]  fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.050666] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   19.033952] ==================================================================
[   19.034167] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   19.034239] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259
[   19.034293] 
[   19.034326] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.034522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.034557] Hardware name: linux,dummy-virt (DT)
[   19.034603] Call trace:
[   19.034628]  show_stack+0x20/0x38 (C)
[   19.034684]  dump_stack_lvl+0x8c/0xd0
[   19.034734]  print_report+0x118/0x608
[   19.034781]  kasan_report+0xdc/0x128
[   19.034894]  __asan_report_load1_noabort+0x20/0x30
[   19.034977]  strlen+0xa8/0xb0
[   19.035034]  kasan_strings+0x418/0xb00
[   19.035096]  kunit_try_run_case+0x170/0x3f0
[   19.035151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.035226]  kthread+0x328/0x630
[   19.035499]  ret_from_fork+0x10/0x20
[   19.035568] 
[   19.035605] Allocated by task 259:
[   19.035640]  kasan_save_stack+0x3c/0x68
[   19.035853]  kasan_save_track+0x20/0x40
[   19.036087]  kasan_save_alloc_info+0x40/0x58
[   19.036290]  __kasan_kmalloc+0xd4/0xd8
[   19.036719]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.036787]  kasan_strings+0xc8/0xb00
[   19.036825]  kunit_try_run_case+0x170/0x3f0
[   19.036987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.037254]  kthread+0x328/0x630
[   19.037471]  ret_from_fork+0x10/0x20
[   19.037689] 
[   19.037750] Freed by task 259:
[   19.037788]  kasan_save_stack+0x3c/0x68
[   19.037938]  kasan_save_track+0x20/0x40
[   19.037985]  kasan_save_free_info+0x4c/0x78
[   19.038102]  __kasan_slab_free+0x6c/0x98
[   19.038146]  kfree+0x214/0x3c8
[   19.038182]  kasan_strings+0x24c/0xb00
[   19.038216]  kunit_try_run_case+0x170/0x3f0
[   19.038254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.038297]  kthread+0x328/0x630
[   19.038335]  ret_from_fork+0x10/0x20
[   19.038370] 
[   19.038393] The buggy address belongs to the object at fff00000c78896c0
[   19.038393]  which belongs to the cache kmalloc-32 of size 32
[   19.038450] The buggy address is located 16 bytes inside of
[   19.038450]  freed 32-byte region [fff00000c78896c0, fff00000c78896e0)
[   19.038710] 
[   19.038847] The buggy address belongs to the physical page:
[   19.038926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889
[   19.039036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.039102] page_type: f5(slab)
[   19.039569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.039750] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.039846] page dumped because: kasan: bad access detected
[   19.039888] 
[   19.039951] Memory state around the buggy address:
[   19.040009]  fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.040224]  fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.040498] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.040641]                                                  ^
[   19.040698]  fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.040751]  fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.040792] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   19.028523] ==================================================================
[   19.028587] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   19.028643] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259
[   19.028696] 
[   19.028728] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.028814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.028844] Hardware name: linux,dummy-virt (DT)
[   19.028876] Call trace:
[   19.028901]  show_stack+0x20/0x38 (C)
[   19.028950]  dump_stack_lvl+0x8c/0xd0
[   19.028999]  print_report+0x118/0x608
[   19.029644]  kasan_report+0xdc/0x128
[   19.029704]  __asan_report_load1_noabort+0x20/0x30
[   19.029757]  kasan_strings+0x95c/0xb00
[   19.029850]  kunit_try_run_case+0x170/0x3f0
[   19.029996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.030124]  kthread+0x328/0x630
[   19.030180]  ret_from_fork+0x10/0x20
[   19.030242] 
[   19.030267] Allocated by task 259:
[   19.030300]  kasan_save_stack+0x3c/0x68
[   19.030345]  kasan_save_track+0x20/0x40
[   19.030384]  kasan_save_alloc_info+0x40/0x58
[   19.030425]  __kasan_kmalloc+0xd4/0xd8
[   19.030462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.030501]  kasan_strings+0xc8/0xb00
[   19.030537]  kunit_try_run_case+0x170/0x3f0
[   19.030583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.030630]  kthread+0x328/0x630
[   19.030927]  ret_from_fork+0x10/0x20
[   19.030977] 
[   19.031000] Freed by task 259:
[   19.031029]  kasan_save_stack+0x3c/0x68
[   19.031160]  kasan_save_track+0x20/0x40
[   19.031249]  kasan_save_free_info+0x4c/0x78
[   19.031490]  __kasan_slab_free+0x6c/0x98
[   19.031533]  kfree+0x214/0x3c8
[   19.031686]  kasan_strings+0x24c/0xb00
[   19.031793]  kunit_try_run_case+0x170/0x3f0
[   19.031889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.032036]  kthread+0x328/0x630
[   19.032142]  ret_from_fork+0x10/0x20
[   19.032365] 
[   19.032460] The buggy address belongs to the object at fff00000c78896c0
[   19.032460]  which belongs to the cache kmalloc-32 of size 32
[   19.032585] The buggy address is located 16 bytes inside of
[   19.032585]  freed 32-byte region [fff00000c78896c0, fff00000c78896e0)
[   19.032646] 
[   19.032670] The buggy address belongs to the physical page:
[   19.032704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889
[   19.032758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.032807] page_type: f5(slab)
[   19.032850] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.032901] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.032941] page dumped because: kasan: bad access detected
[   19.032975] 
[   19.032995] Memory state around the buggy address:
[   19.033029]  fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.033085]  fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.033129] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.033167]                                                  ^
[   19.033205]  fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.033530]  fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.033662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   19.016560] ==================================================================
[   19.016614] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   19.016671] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259
[   19.017618] 
[   19.017688] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.017793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.017825] Hardware name: linux,dummy-virt (DT)
[   19.017858] Call trace:
[   19.017894]  show_stack+0x20/0x38 (C)
[   19.017954]  dump_stack_lvl+0x8c/0xd0
[   19.018005]  print_report+0x118/0x608
[   19.018062]  kasan_report+0xdc/0x128
[   19.018111]  __asan_report_load1_noabort+0x20/0x30
[   19.018162]  strcmp+0xc0/0xc8
[   19.019485]  kasan_strings+0x340/0xb00
[   19.019917]  kunit_try_run_case+0x170/0x3f0
[   19.020263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.020793]  kthread+0x328/0x630
[   19.021003]  ret_from_fork+0x10/0x20
[   19.021068] 
[   19.021093] Allocated by task 259:
[   19.021917]  kasan_save_stack+0x3c/0x68
[   19.022118]  kasan_save_track+0x20/0x40
[   19.022354]  kasan_save_alloc_info+0x40/0x58
[   19.022401]  __kasan_kmalloc+0xd4/0xd8
[   19.023321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.023375]  kasan_strings+0xc8/0xb00
[   19.023482]  kunit_try_run_case+0x170/0x3f0
[   19.023616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.023678]  kthread+0x328/0x630
[   19.023717]  ret_from_fork+0x10/0x20
[   19.023923] 
[   19.023990] Freed by task 259:
[   19.024139]  kasan_save_stack+0x3c/0x68
[   19.024429]  kasan_save_track+0x20/0x40
[   19.024486]  kasan_save_free_info+0x4c/0x78
[   19.024529]  __kasan_slab_free+0x6c/0x98
[   19.024577]  kfree+0x214/0x3c8
[   19.024615]  kasan_strings+0x24c/0xb00
[   19.024652]  kunit_try_run_case+0x170/0x3f0
[   19.024691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.024735]  kthread+0x328/0x630
[   19.025322]  ret_from_fork+0x10/0x20
[   19.025389] 
[   19.025432] The buggy address belongs to the object at fff00000c78896c0
[   19.025432]  which belongs to the cache kmalloc-32 of size 32
[   19.025576] The buggy address is located 16 bytes inside of
[   19.025576]  freed 32-byte region [fff00000c78896c0, fff00000c78896e0)
[   19.025647] 
[   19.025671] The buggy address belongs to the physical page:
[   19.025704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889
[   19.025854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.025987] page_type: f5(slab)
[   19.026074] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.026198] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.026243] page dumped because: kasan: bad access detected
[   19.026322] 
[   19.026348] Memory state around the buggy address:
[   19.026384]  fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.026429]  fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.026472] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.027036]                                                  ^
[   19.027272]  fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.027322]  fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.027373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   19.000746] ==================================================================
[   19.000817] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   19.000884] Read of size 1 at addr fff00000c7889518 by task kunit_try_catch/257
[   19.000937] 
[   19.000970] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.001069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.001102] Hardware name: linux,dummy-virt (DT)
[   19.001136] Call trace:
[   19.001161]  show_stack+0x20/0x38 (C)
[   19.001215]  dump_stack_lvl+0x8c/0xd0
[   19.001263]  print_report+0x118/0x608
[   19.001311]  kasan_report+0xdc/0x128
[   19.001356]  __asan_report_load1_noabort+0x20/0x30
[   19.001409]  memcmp+0x198/0x1d8
[   19.001954]  kasan_memcmp+0x16c/0x300
[   19.002018]  kunit_try_run_case+0x170/0x3f0
[   19.002082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.002140]  kthread+0x328/0x630
[   19.002187]  ret_from_fork+0x10/0x20
[   19.002239] 
[   19.002758] Allocated by task 257:
[   19.003166]  kasan_save_stack+0x3c/0x68
[   19.003477]  kasan_save_track+0x20/0x40
[   19.003598]  kasan_save_alloc_info+0x40/0x58
[   19.004074]  __kasan_kmalloc+0xd4/0xd8
[   19.004315]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.004738]  kasan_memcmp+0xbc/0x300
[   19.004929]  kunit_try_run_case+0x170/0x3f0
[   19.005199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.005482]  kthread+0x328/0x630
[   19.005651]  ret_from_fork+0x10/0x20
[   19.005870] 
[   19.006050] The buggy address belongs to the object at fff00000c7889500
[   19.006050]  which belongs to the cache kmalloc-32 of size 32
[   19.006119] The buggy address is located 0 bytes to the right of
[   19.006119]  allocated 24-byte region [fff00000c7889500, fff00000c7889518)
[   19.006206] 
[   19.006229] The buggy address belongs to the physical page:
[   19.006261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889
[   19.006340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.006427] page_type: f5(slab)
[   19.006471] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.006524] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.006573] page dumped because: kasan: bad access detected
[   19.006610] 
[   19.006637] Memory state around the buggy address:
[   19.006706]  fff00000c7889400: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   19.006759]  fff00000c7889480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.006840] >fff00000c7889500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.006882]                             ^
[   19.006958]  fff00000c7889580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007005]  fff00000c7889600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007054] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   18.980663] ==================================================================
[   18.980869] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   18.980929] Read of size 1 at addr ffff800080ab7b4a by task kunit_try_catch/253
[   18.980981] 
[   18.981014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.981119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.981149] Hardware name: linux,dummy-virt (DT)
[   18.981181] Call trace:
[   18.981209]  show_stack+0x20/0x38 (C)
[   18.981260]  dump_stack_lvl+0x8c/0xd0
[   18.981311]  print_report+0x310/0x608
[   18.981356]  kasan_report+0xdc/0x128
[   18.981407]  __asan_report_load1_noabort+0x20/0x30
[   18.981459]  kasan_alloca_oob_right+0x2dc/0x340
[   18.981508]  kunit_try_run_case+0x170/0x3f0
[   18.981554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.981607]  kthread+0x328/0x630
[   18.981652]  ret_from_fork+0x10/0x20
[   18.981701] 
[   18.981726] The buggy address belongs to stack of task kunit_try_catch/253
[   18.981787] 
[   18.981838] The buggy address belongs to the virtual mapping at
[   18.981838]  [ffff800080ab0000, ffff800080ab9000) created by:
[   18.981838]  kernel_clone+0x150/0x7a8
[   18.981954] 
[   18.981978] The buggy address belongs to the physical page:
[   18.982022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795e
[   18.982095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.982197] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.982256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.982401] page dumped because: kasan: bad access detected
[   18.982687] 
[   18.982718] Memory state around the buggy address:
[   18.982755]  ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.982803]  ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.982880] >ffff800080ab7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   18.982918]                                               ^
[   18.982967]  ffff800080ab7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   18.983095]  ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.983138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   18.971545] ==================================================================
[   18.971645] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   18.971710] Read of size 1 at addr ffff800080ab7b5f by task kunit_try_catch/251
[   18.971763] 
[   18.971804] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.971890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.971918] Hardware name: linux,dummy-virt (DT)
[   18.971953] Call trace:
[   18.971977]  show_stack+0x20/0x38 (C)
[   18.972027]  dump_stack_lvl+0x8c/0xd0
[   18.972092]  print_report+0x310/0x608
[   18.972139]  kasan_report+0xdc/0x128
[   18.972326]  __asan_report_load1_noabort+0x20/0x30
[   18.972390]  kasan_alloca_oob_left+0x2b8/0x310
[   18.972440]  kunit_try_run_case+0x170/0x3f0
[   18.972487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.972540]  kthread+0x328/0x630
[   18.972586]  ret_from_fork+0x10/0x20
[   18.972636] 
[   18.972660] The buggy address belongs to stack of task kunit_try_catch/251
[   18.972728] 
[   18.972755] The buggy address belongs to the virtual mapping at
[   18.972755]  [ffff800080ab0000, ffff800080ab9000) created by:
[   18.972755]  kernel_clone+0x150/0x7a8
[   18.972830] 
[   18.972854] The buggy address belongs to the physical page:
[   18.972884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795e
[   18.972936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.973000] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.973063] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.973108] page dumped because: kasan: bad access detected
[   18.973144] 
[   18.973164] Memory state around the buggy address:
[   18.973197]  ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.973241]  ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.973285] >ffff800080ab7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   18.973611]                                                     ^
[   18.973656]  ffff800080ab7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   18.973703]  ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.973743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   18.964024] ==================================================================
[   18.964162] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.964242] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249
[   18.964308] 
[   18.964339] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.964447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.964473] Hardware name: linux,dummy-virt (DT)
[   18.964509] Call trace:
[   18.964531]  show_stack+0x20/0x38 (C)
[   18.964578]  dump_stack_lvl+0x8c/0xd0
[   18.964625]  print_report+0x310/0x608
[   18.964666]  kasan_report+0xdc/0x128
[   18.964709]  __asan_report_load1_noabort+0x20/0x30
[   18.964756]  kasan_stack_oob+0x238/0x270
[   18.964799]  kunit_try_run_case+0x170/0x3f0
[   18.964844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.964891]  kthread+0x328/0x630
[   18.964931]  ret_from_fork+0x10/0x20
[   18.964977] 
[   18.965035] The buggy address belongs to stack of task kunit_try_catch/249
[   18.965166]  and is located at offset 138 in frame:
[   18.965203]  kasan_stack_oob+0x0/0x270
[   18.965388] 
[   18.965461] This frame has 4 objects:
[   18.965600]  [48, 49) '__assertion'
[   18.965687]  [64, 72) 'array'
[   18.965801]  [96, 112) '__assertion'
[   18.965848]  [128, 138) 'stack_array'
[   18.965920] 
[   18.965956] The buggy address belongs to the virtual mapping at
[   18.965956]  [ffff800080ac0000, ffff800080ac9000) created by:
[   18.965956]  kernel_clone+0x150/0x7a8
[   18.966058] 
[   18.966084] The buggy address belongs to the physical page:
[   18.966120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1
[   18.966173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.966235] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.966327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.966440] page dumped because: kasan: bad access detected
[   18.966506] 
[   18.966550] Memory state around the buggy address:
[   18.966598]  ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.966657]  ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.966759] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.966804]                                   ^
[   18.966840]  ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.966884]  ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.966945] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   18.949096] ==================================================================
[   18.949167] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   18.949230] Read of size 1 at addr ffffa8e07372e60d by task kunit_try_catch/245
[   18.949279] 
[   18.949314] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.949395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.949422] Hardware name: linux,dummy-virt (DT)
[   18.949451] Call trace:
[   18.949472]  show_stack+0x20/0x38 (C)
[   18.949521]  dump_stack_lvl+0x8c/0xd0
[   18.949568]  print_report+0x310/0x608
[   18.949613]  kasan_report+0xdc/0x128
[   18.949655]  __asan_report_load1_noabort+0x20/0x30
[   18.949732]  kasan_global_oob_right+0x230/0x270
[   18.949784]  kunit_try_run_case+0x170/0x3f0
[   18.949852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.949903]  kthread+0x328/0x630
[   18.949948]  ret_from_fork+0x10/0x20
[   18.950036] 
[   18.950098] The buggy address belongs to the variable:
[   18.950131]  global_array+0xd/0x40
[   18.950179] 
[   18.950251] The buggy address belongs to the virtual mapping at
[   18.950251]  [ffffa8e0718e0000, ffffa8e0737e1000) created by:
[   18.950251]  paging_init+0x66c/0x7d0
[   18.950336] 
[   18.950649] The buggy address belongs to the physical page:
[   18.950714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d2e
[   18.950772] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   18.951113] raw: 03fffe0000002000 ffffc1ffc01f4b88 ffffc1ffc01f4b88 0000000000000000
[   18.951311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.951406] page dumped because: kasan: bad access detected
[   18.951476] 
[   18.951641] Memory state around the buggy address:
[   18.951680]  ffffa8e07372e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.951764]  ffffa8e07372e580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   18.951830] >ffffa8e07372e600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   18.951888]                       ^
[   18.951956]  ffffa8e07372e680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   18.952000]  ffffa8e07372e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.952036] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   18.933357] ==================================================================
[   18.933434] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.933578] Free of addr fff00000c79f0001 by task kunit_try_catch/243
[   18.933631] 
[   18.933663] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.933746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.933774] Hardware name: linux,dummy-virt (DT)
[   18.933949] Call trace:
[   18.934127]  show_stack+0x20/0x38 (C)
[   18.934193]  dump_stack_lvl+0x8c/0xd0
[   18.934241]  print_report+0x118/0x608
[   18.934316]  kasan_report_invalid_free+0xc0/0xe8
[   18.934552]  __kasan_mempool_poison_object+0xfc/0x150
[   18.934695]  mempool_free+0x28c/0x328
[   18.934892]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.935063]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.935306]  kunit_try_run_case+0x170/0x3f0
[   18.935357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.935409]  kthread+0x328/0x630
[   18.935452]  ret_from_fork+0x10/0x20
[   18.935499] 
[   18.936100] The buggy address belongs to the physical page:
[   18.936140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   18.936197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.936250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.936307] page_type: f8(unknown)
[   18.936348] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.936397] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.936784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.936842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.936925] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff
[   18.937231] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.937336] page dumped because: kasan: bad access detected
[   18.937435] 
[   18.937495] Memory state around the buggy address:
[   18.937614]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.937658]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.937700] >fff00000c79f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.937735]                    ^
[   18.937763]  fff00000c79f0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.937804]  fff00000c79f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.937861] ==================================================================
[   18.922806] ==================================================================
[   18.923029] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.923104] Free of addr fff00000c78d3701 by task kunit_try_catch/241
[   18.923147] 
[   18.923260] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.923378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.923416] Hardware name: linux,dummy-virt (DT)
[   18.923566] Call trace:
[   18.923724]  show_stack+0x20/0x38 (C)
[   18.923901]  dump_stack_lvl+0x8c/0xd0
[   18.924062]  print_report+0x118/0x608
[   18.924247]  kasan_report_invalid_free+0xc0/0xe8
[   18.924300]  check_slab_allocation+0xfc/0x108
[   18.924345]  __kasan_mempool_poison_object+0x78/0x150
[   18.924394]  mempool_free+0x28c/0x328
[   18.924443]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.924492]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.925148]  kunit_try_run_case+0x170/0x3f0
[   18.925210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.925262]  kthread+0x328/0x630
[   18.925319]  ret_from_fork+0x10/0x20
[   18.925367] 
[   18.925385] Allocated by task 241:
[   18.925416]  kasan_save_stack+0x3c/0x68
[   18.925456]  kasan_save_track+0x20/0x40
[   18.925536]  kasan_save_alloc_info+0x40/0x58
[   18.925612]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.925696]  remove_element+0x130/0x1f8
[   18.925850]  mempool_alloc_preallocated+0x58/0xc0
[   18.925891]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.926244]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.926289]  kunit_try_run_case+0x170/0x3f0
[   18.926325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.926365]  kthread+0x328/0x630
[   18.926399]  ret_from_fork+0x10/0x20
[   18.926607] 
[   18.926668] The buggy address belongs to the object at fff00000c78d3700
[   18.926668]  which belongs to the cache kmalloc-128 of size 128
[   18.926732] The buggy address is located 1 bytes inside of
[   18.926732]  128-byte region [fff00000c78d3700, fff00000c78d3780)
[   18.926865] 
[   18.926888] The buggy address belongs to the physical page:
[   18.926939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   18.927021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.927079] page_type: f5(slab)
[   18.927140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.927459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.927694] page dumped because: kasan: bad access detected
[   18.927752] 
[   18.927781] Memory state around the buggy address:
[   18.927823]  fff00000c78d3600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.928050]  fff00000c78d3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.928109] >fff00000c78d3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.928156]                    ^
[   18.928199]  fff00000c78d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.928258]  fff00000c78d3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.928296] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   18.884331] ==================================================================
[   18.884471] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.884557] Free of addr fff00000c78d3300 by task kunit_try_catch/235
[   18.884733] 
[   18.884768] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.885109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.885303] Hardware name: linux,dummy-virt (DT)
[   18.885355] Call trace:
[   18.885396]  show_stack+0x20/0x38 (C)
[   18.885463]  dump_stack_lvl+0x8c/0xd0
[   18.885515]  print_report+0x118/0x608
[   18.885561]  kasan_report_invalid_free+0xc0/0xe8
[   18.885608]  check_slab_allocation+0xd4/0x108
[   18.885870]  __kasan_mempool_poison_object+0x78/0x150
[   18.886209]  mempool_free+0x28c/0x328
[   18.886266]  mempool_double_free_helper+0x150/0x2e8
[   18.886458]  mempool_kmalloc_double_free+0xc0/0x118
[   18.886713]  kunit_try_run_case+0x170/0x3f0
[   18.886767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.886873]  kthread+0x328/0x630
[   18.886973]  ret_from_fork+0x10/0x20
[   18.887132] 
[   18.887155] Allocated by task 235:
[   18.887362]  kasan_save_stack+0x3c/0x68
[   18.887536]  kasan_save_track+0x20/0x40
[   18.887662]  kasan_save_alloc_info+0x40/0x58
[   18.887715]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.887759]  remove_element+0x130/0x1f8
[   18.887967]  mempool_alloc_preallocated+0x58/0xc0
[   18.888142]  mempool_double_free_helper+0x94/0x2e8
[   18.888190]  mempool_kmalloc_double_free+0xc0/0x118
[   18.888568]  kunit_try_run_case+0x170/0x3f0
[   18.888649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.888692]  kthread+0x328/0x630
[   18.889007]  ret_from_fork+0x10/0x20
[   18.889076] 
[   18.889099] Freed by task 235:
[   18.889130]  kasan_save_stack+0x3c/0x68
[   18.889177]  kasan_save_track+0x20/0x40
[   18.889212]  kasan_save_free_info+0x4c/0x78
[   18.889419]  __kasan_mempool_poison_object+0xc0/0x150
[   18.889523]  mempool_free+0x28c/0x328
[   18.889920]  mempool_double_free_helper+0x100/0x2e8
[   18.889973]  mempool_kmalloc_double_free+0xc0/0x118
[   18.890046]  kunit_try_run_case+0x170/0x3f0
[   18.890120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.890164]  kthread+0x328/0x630
[   18.890387]  ret_from_fork+0x10/0x20
[   18.890429] 
[   18.890580] The buggy address belongs to the object at fff00000c78d3300
[   18.890580]  which belongs to the cache kmalloc-128 of size 128
[   18.890685] The buggy address is located 0 bytes inside of
[   18.890685]  128-byte region [fff00000c78d3300, fff00000c78d3380)
[   18.890760] 
[   18.890975] The buggy address belongs to the physical page:
[   18.891115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   18.891176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.891225] page_type: f5(slab)
[   18.891474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.891667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.891797] page dumped because: kasan: bad access detected
[   18.891837] 
[   18.891916] Memory state around the buggy address:
[   18.892089]  fff00000c78d3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.892137]  fff00000c78d3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892199] >fff00000c78d3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.892262]                    ^
[   18.892304]  fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892605]  fff00000c78d3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.892795] ==================================================================
[   18.900817] ==================================================================
[   18.900883] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.900942] Free of addr fff00000c79ec000 by task kunit_try_catch/237
[   18.900984] 
[   18.901014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.901123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.901152] Hardware name: linux,dummy-virt (DT)
[   18.901181] Call trace:
[   18.901205]  show_stack+0x20/0x38 (C)
[   18.901252]  dump_stack_lvl+0x8c/0xd0
[   18.901298]  print_report+0x118/0x608
[   18.901340]  kasan_report_invalid_free+0xc0/0xe8
[   18.901387]  __kasan_mempool_poison_object+0x14c/0x150
[   18.901436]  mempool_free+0x28c/0x328
[   18.901480]  mempool_double_free_helper+0x150/0x2e8
[   18.901526]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.901574]  kunit_try_run_case+0x170/0x3f0
[   18.901618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.901665]  kthread+0x328/0x630
[   18.901709]  ret_from_fork+0x10/0x20
[   18.901756] 
[   18.901776] The buggy address belongs to the physical page:
[   18.901808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec
[   18.901860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.901923] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.902030] page_type: f8(unknown)
[   18.902081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.902131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.902179] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.902226] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.902272] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff
[   18.902317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.902355] page dumped because: kasan: bad access detected
[   18.902387] 
[   18.902404] Memory state around the buggy address:
[   18.902435]  fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902475]  fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902514] >fff00000c79ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902579]                    ^
[   18.902648]  fff00000c79ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902737]  fff00000c79ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902815] ==================================================================
[   18.907931] ==================================================================
[   18.907999] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.908074] Free of addr fff00000c79f0000 by task kunit_try_catch/239
[   18.908118] 
[   18.908151] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.908232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.908259] Hardware name: linux,dummy-virt (DT)
[   18.908289] Call trace:
[   18.908311]  show_stack+0x20/0x38 (C)
[   18.908372]  dump_stack_lvl+0x8c/0xd0
[   18.908432]  print_report+0x118/0x608
[   18.908476]  kasan_report_invalid_free+0xc0/0xe8
[   18.908522]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.908569]  mempool_free+0x24c/0x328
[   18.908614]  mempool_double_free_helper+0x150/0x2e8
[   18.908661]  mempool_page_alloc_double_free+0xbc/0x118
[   18.908713]  kunit_try_run_case+0x170/0x3f0
[   18.908803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.908874]  kthread+0x328/0x630
[   18.908947]  ret_from_fork+0x10/0x20
[   18.909069] 
[   18.909183] The buggy address belongs to the physical page:
[   18.909242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   18.909345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.909472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.909529] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.909582] page dumped because: kasan: bad access detected
[   18.909629] 
[   18.909669] Memory state around the buggy address:
[   18.909738]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909780]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909819] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909855]                    ^
[   18.909881]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.910406]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.910452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   18.872505] ==================================================================
[   18.872575] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.872662] Read of size 1 at addr fff00000c79ec000 by task kunit_try_catch/233
[   18.872711] 
[   18.872744] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.872827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.872854] Hardware name: linux,dummy-virt (DT)
[   18.873094] Call trace:
[   18.873135]  show_stack+0x20/0x38 (C)
[   18.873191]  dump_stack_lvl+0x8c/0xd0
[   18.873248]  print_report+0x118/0x608
[   18.873296]  kasan_report+0xdc/0x128
[   18.873539]  __asan_report_load1_noabort+0x20/0x30
[   18.873878]  mempool_uaf_helper+0x314/0x340
[   18.874000]  mempool_page_alloc_uaf+0xc0/0x118
[   18.874067]  kunit_try_run_case+0x170/0x3f0
[   18.874120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.874169]  kthread+0x328/0x630
[   18.874213]  ret_from_fork+0x10/0x20
[   18.874258] 
[   18.874282] The buggy address belongs to the physical page:
[   18.874311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec
[   18.874364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.874425] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.874502] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.874542] page dumped because: kasan: bad access detected
[   18.874581] 
[   18.874600] Memory state around the buggy address:
[   18.874632]  fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.874675]  fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.874853] >fff00000c79ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.875023]                    ^
[   18.875067]  fff00000c79ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.875127]  fff00000c79ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.875165] ==================================================================
[   18.837267] ==================================================================
[   18.837343] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.837463] Read of size 1 at addr fff00000c79e8000 by task kunit_try_catch/229
[   18.837517] 
[   18.837548] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.837862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.838022] Hardware name: linux,dummy-virt (DT)
[   18.838069] Call trace:
[   18.838095]  show_stack+0x20/0x38 (C)
[   18.838150]  dump_stack_lvl+0x8c/0xd0
[   18.838197]  print_report+0x118/0x608
[   18.838242]  kasan_report+0xdc/0x128
[   18.838595]  __asan_report_load1_noabort+0x20/0x30
[   18.838664]  mempool_uaf_helper+0x314/0x340
[   18.838759]  mempool_kmalloc_large_uaf+0xc4/0x120
[   18.838811]  kunit_try_run_case+0x170/0x3f0
[   18.838885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.838983]  kthread+0x328/0x630
[   18.839118]  ret_from_fork+0x10/0x20
[   18.839174] 
[   18.839199] The buggy address belongs to the physical page:
[   18.839420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e8
[   18.839489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.839537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.839643] page_type: f8(unknown)
[   18.839697] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.839937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.840114] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.840284] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.840335] head: 0bfffe0000000002 ffffc1ffc31e7a01 00000000ffffffff 00000000ffffffff
[   18.840413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.840455] page dumped because: kasan: bad access detected
[   18.840491] 
[   18.840516] Memory state around the buggy address:
[   18.840574]  fff00000c79e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.840618]  fff00000c79e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.840661] >fff00000c79e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.841009]                    ^
[   18.841078]  fff00000c79e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.841126]  fff00000c79e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.841252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   18.848995] ==================================================================
[   18.849411] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.849482] Read of size 1 at addr fff00000c6bb4240 by task kunit_try_catch/231
[   18.849532] 
[   18.849564] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.849647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.849672] Hardware name: linux,dummy-virt (DT)
[   18.849703] Call trace:
[   18.853046]  show_stack+0x20/0x38 (C)
[   18.853129]  dump_stack_lvl+0x8c/0xd0
[   18.853177]  print_report+0x118/0x608
[   18.853223]  kasan_report+0xdc/0x128
[   18.853264]  __asan_report_load1_noabort+0x20/0x30
[   18.853330]  mempool_uaf_helper+0x314/0x340
[   18.853432]  mempool_slab_uaf+0xc0/0x118
[   18.853478]  kunit_try_run_case+0x170/0x3f0
[   18.853524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.853574]  kthread+0x328/0x630
[   18.853614]  ret_from_fork+0x10/0x20
[   18.853661] 
[   18.853716] Allocated by task 231:
[   18.853752]  kasan_save_stack+0x3c/0x68
[   18.853843]  kasan_save_track+0x20/0x40
[   18.853879]  kasan_save_alloc_info+0x40/0x58
[   18.854059]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.854104]  remove_element+0x16c/0x1f8
[   18.854142]  mempool_alloc_preallocated+0x58/0xc0
[   18.854182]  mempool_uaf_helper+0xa4/0x340
[   18.854215]  mempool_slab_uaf+0xc0/0x118
[   18.854269]  kunit_try_run_case+0x170/0x3f0
[   18.854303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.854352]  kthread+0x328/0x630
[   18.854391]  ret_from_fork+0x10/0x20
[   18.854425] 
[   18.854616] Freed by task 231:
[   18.854656]  kasan_save_stack+0x3c/0x68
[   18.854729]  kasan_save_track+0x20/0x40
[   18.854764]  kasan_save_free_info+0x4c/0x78
[   18.854803]  __kasan_mempool_poison_object+0xc0/0x150
[   18.854842]  mempool_free+0x28c/0x328
[   18.854878]  mempool_uaf_helper+0x104/0x340
[   18.854913]  mempool_slab_uaf+0xc0/0x118
[   18.854946]  kunit_try_run_case+0x170/0x3f0
[   18.854980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.855019]  kthread+0x328/0x630
[   18.855064]  ret_from_fork+0x10/0x20
[   18.855102] 
[   18.855133] The buggy address belongs to the object at fff00000c6bb4240
[   18.855133]  which belongs to the cache test_cache of size 123
[   18.855195] The buggy address is located 0 bytes inside of
[   18.855195]  freed 123-byte region [fff00000c6bb4240, fff00000c6bb42bb)
[   18.855322] 
[   18.855344] The buggy address belongs to the physical page:
[   18.855374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106bb4
[   18.855424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.855470] page_type: f5(slab)
[   18.855509] raw: 0bfffe0000000000 fff00000c5d1e3c0 dead000000000122 0000000000000000
[   18.855567] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.855611] page dumped because: kasan: bad access detected
[   18.855653] 
[   18.855673] Memory state around the buggy address:
[   18.855703]  fff00000c6bb4100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.855745]  fff00000c6bb4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.855834] >fff00000c6bb4200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.855868]                                            ^
[   18.855916]  fff00000c6bb4280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.856015]  fff00000c6bb4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.856064] ==================================================================
[   18.823479] ==================================================================
[   18.823549] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.823613] Read of size 1 at addr fff00000c6370f00 by task kunit_try_catch/227
[   18.823663] 
[   18.823699] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.823782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.823809] Hardware name: linux,dummy-virt (DT)
[   18.823840] Call trace:
[   18.823878]  show_stack+0x20/0x38 (C)
[   18.823927]  dump_stack_lvl+0x8c/0xd0
[   18.823977]  print_report+0x118/0x608
[   18.824020]  kasan_report+0xdc/0x128
[   18.824078]  __asan_report_load1_noabort+0x20/0x30
[   18.824126]  mempool_uaf_helper+0x314/0x340
[   18.824170]  mempool_kmalloc_uaf+0xc4/0x120
[   18.824213]  kunit_try_run_case+0x170/0x3f0
[   18.824259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.824305]  kthread+0x328/0x630
[   18.824349]  ret_from_fork+0x10/0x20
[   18.824395] 
[   18.824413] Allocated by task 227:
[   18.824442]  kasan_save_stack+0x3c/0x68
[   18.824483]  kasan_save_track+0x20/0x40
[   18.824519]  kasan_save_alloc_info+0x40/0x58
[   18.824557]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.824598]  remove_element+0x130/0x1f8
[   18.824633]  mempool_alloc_preallocated+0x58/0xc0
[   18.824672]  mempool_uaf_helper+0xa4/0x340
[   18.824706]  mempool_kmalloc_uaf+0xc4/0x120
[   18.824741]  kunit_try_run_case+0x170/0x3f0
[   18.824775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.824815]  kthread+0x328/0x630
[   18.824848]  ret_from_fork+0x10/0x20
[   18.824883] 
[   18.824908] Freed by task 227:
[   18.824969]  kasan_save_stack+0x3c/0x68
[   18.825079]  kasan_save_track+0x20/0x40
[   18.825121]  kasan_save_free_info+0x4c/0x78
[   18.825159]  __kasan_mempool_poison_object+0xc0/0x150
[   18.825427]  mempool_free+0x28c/0x328
[   18.825464]  mempool_uaf_helper+0x104/0x340
[   18.825499]  mempool_kmalloc_uaf+0xc4/0x120
[   18.825621]  kunit_try_run_case+0x170/0x3f0
[   18.825729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.825776]  kthread+0x328/0x630
[   18.825972]  ret_from_fork+0x10/0x20
[   18.826022] 
[   18.826051] The buggy address belongs to the object at fff00000c6370f00
[   18.826051]  which belongs to the cache kmalloc-128 of size 128
[   18.826275] The buggy address is located 0 bytes inside of
[   18.826275]  freed 128-byte region [fff00000c6370f00, fff00000c6370f80)
[   18.826336] 
[   18.826357] The buggy address belongs to the physical page:
[   18.826387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370
[   18.826760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.826829] page_type: f5(slab)
[   18.826871] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.826922] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   18.826961] page dumped because: kasan: bad access detected
[   18.827009] 
[   18.827079] Memory state around the buggy address:
[   18.827114]  fff00000c6370e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.827158]  fff00000c6370e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.827199] >fff00000c6370f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.827236]                    ^
[   18.827264]  fff00000c6370f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.827305]  fff00000c6371000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.827343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   18.803203] ==================================================================
[   18.803274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.803335] Read of size 1 at addr fff00000c78d32bb by task kunit_try_catch/225
[   18.803385] 
[   18.803417] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.803499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.803525] Hardware name: linux,dummy-virt (DT)
[   18.803555] Call trace:
[   18.803579]  show_stack+0x20/0x38 (C)
[   18.803625]  dump_stack_lvl+0x8c/0xd0
[   18.803672]  print_report+0x118/0x608
[   18.803715]  kasan_report+0xdc/0x128
[   18.803757]  __asan_report_load1_noabort+0x20/0x30
[   18.803805]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.803851]  mempool_slab_oob_right+0xc0/0x118
[   18.803896]  kunit_try_run_case+0x170/0x3f0
[   18.803940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.803988]  kthread+0x328/0x630
[   18.804030]  ret_from_fork+0x10/0x20
[   18.804107] 
[   18.804781] Allocated by task 225:
[   18.804902]  kasan_save_stack+0x3c/0x68
[   18.804952]  kasan_save_track+0x20/0x40
[   18.804994]  kasan_save_alloc_info+0x40/0x58
[   18.805084]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.805128]  remove_element+0x16c/0x1f8
[   18.805199]  mempool_alloc_preallocated+0x58/0xc0
[   18.805302]  mempool_oob_right_helper+0x98/0x2f0
[   18.805346]  mempool_slab_oob_right+0xc0/0x118
[   18.805383]  kunit_try_run_case+0x170/0x3f0
[   18.805418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.805458]  kthread+0x328/0x630
[   18.805491]  ret_from_fork+0x10/0x20
[   18.805532] 
[   18.805563] The buggy address belongs to the object at fff00000c78d3240
[   18.805563]  which belongs to the cache test_cache of size 123
[   18.805657] The buggy address is located 0 bytes to the right of
[   18.805657]  allocated 123-byte region [fff00000c78d3240, fff00000c78d32bb)
[   18.805722] 
[   18.805744] The buggy address belongs to the physical page:
[   18.805774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   18.805823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.805870] page_type: f5(slab)
[   18.805917] raw: 0bfffe0000000000 fff00000c5d1e280 dead000000000122 0000000000000000
[   18.805965] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.806399] page dumped because: kasan: bad access detected
[   18.806437] 
[   18.806535] Memory state around the buggy address:
[   18.806575]  fff00000c78d3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.806643]  fff00000c78d3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.806684] >fff00000c78d3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.806784]                                         ^
[   18.806826]  fff00000c78d3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806903]  fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806940] ==================================================================
[   18.788949] ==================================================================
[   18.789381] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.789472] Read of size 1 at addr fff00000c79e6001 by task kunit_try_catch/223
[   18.789523] 
[   18.789634] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.789730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.789758] Hardware name: linux,dummy-virt (DT)
[   18.789802] Call trace:
[   18.789834]  show_stack+0x20/0x38 (C)
[   18.789993]  dump_stack_lvl+0x8c/0xd0
[   18.790159]  print_report+0x118/0x608
[   18.790222]  kasan_report+0xdc/0x128
[   18.790279]  __asan_report_load1_noabort+0x20/0x30
[   18.790329]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.790375]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.790623]  kunit_try_run_case+0x170/0x3f0
[   18.790823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.790958]  kthread+0x328/0x630
[   18.791164]  ret_from_fork+0x10/0x20
[   18.791268] 
[   18.791307] The buggy address belongs to the physical page:
[   18.791343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   18.791398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.791442] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.791497] page_type: f8(unknown)
[   18.791540] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.791588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.791634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.791681] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.791728] head: 0bfffe0000000002 ffffc1ffc31e7901 00000000ffffffff 00000000ffffffff
[   18.791773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.791955] page dumped because: kasan: bad access detected
[   18.791989] 
[   18.792010] Memory state around the buggy address:
[   18.792050]  fff00000c79e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.793439]  fff00000c79e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.793686] >fff00000c79e6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.793849]                    ^
[   18.794007]  fff00000c79e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.794096]  fff00000c79e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.794134] ==================================================================
[   18.764536] ==================================================================
[   18.764631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.764729] Read of size 1 at addr fff00000c6370b73 by task kunit_try_catch/221
[   18.764781] 
[   18.764826] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.764917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.764946] Hardware name: linux,dummy-virt (DT)
[   18.764981] Call trace:
[   18.765006]  show_stack+0x20/0x38 (C)
[   18.765078]  dump_stack_lvl+0x8c/0xd0
[   18.765135]  print_report+0x118/0x608
[   18.765182]  kasan_report+0xdc/0x128
[   18.765225]  __asan_report_load1_noabort+0x20/0x30
[   18.765275]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.765319]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.765364]  kunit_try_run_case+0x170/0x3f0
[   18.765410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765460]  kthread+0x328/0x630
[   18.765506]  ret_from_fork+0x10/0x20
[   18.765556] 
[   18.765575] Allocated by task 221:
[   18.765603]  kasan_save_stack+0x3c/0x68
[   18.765646]  kasan_save_track+0x20/0x40
[   18.765681]  kasan_save_alloc_info+0x40/0x58
[   18.765720]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.765759]  remove_element+0x130/0x1f8
[   18.765799]  mempool_alloc_preallocated+0x58/0xc0
[   18.765837]  mempool_oob_right_helper+0x98/0x2f0
[   18.765873]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.765929]  kunit_try_run_case+0x170/0x3f0
[   18.765968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.766006]  kthread+0x328/0x630
[   18.766050]  ret_from_fork+0x10/0x20
[   18.766088] 
[   18.766125] The buggy address belongs to the object at fff00000c6370b00
[   18.766125]  which belongs to the cache kmalloc-128 of size 128
[   18.766183] The buggy address is located 0 bytes to the right of
[   18.766183]  allocated 115-byte region [fff00000c6370b00, fff00000c6370b73)
[   18.766242] 
[   18.766267] The buggy address belongs to the physical page:
[   18.766301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370
[   18.766356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.766409] page_type: f5(slab)
[   18.766452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.766501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.766540] page dumped because: kasan: bad access detected
[   18.766581] 
[   18.766600] Memory state around the buggy address:
[   18.766634]  fff00000c6370a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.766676]  fff00000c6370a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.766716] >fff00000c6370b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.766752]                                                              ^
[   18.766790]  fff00000c6370b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.766830]  fff00000c6370c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.766866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   18.155369] ==================================================================
[   18.156099] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   18.156303] Read of size 1 at addr fff00000c1096c80 by task kunit_try_catch/215
[   18.156403] 
[   18.156659] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.157385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.157456] Hardware name: linux,dummy-virt (DT)
[   18.157533] Call trace:
[   18.157588]  show_stack+0x20/0x38 (C)
[   18.157703]  dump_stack_lvl+0x8c/0xd0
[   18.158434]  print_report+0x118/0x608
[   18.158717]  kasan_report+0xdc/0x128
[   18.159197]  __kasan_check_byte+0x54/0x70
[   18.159392]  kmem_cache_destroy+0x34/0x218
[   18.159807]  kmem_cache_double_destroy+0x174/0x300
[   18.160088]  kunit_try_run_case+0x170/0x3f0
[   18.160207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.160315]  kthread+0x328/0x630
[   18.160793]  ret_from_fork+0x10/0x20
[   18.161125] 
[   18.161385] Allocated by task 215:
[   18.161478]  kasan_save_stack+0x3c/0x68
[   18.161562]  kasan_save_track+0x20/0x40
[   18.161637]  kasan_save_alloc_info+0x40/0x58
[   18.161720]  __kasan_slab_alloc+0xa8/0xb0
[   18.161998]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.162317]  __kmem_cache_create_args+0x178/0x280
[   18.162777]  kmem_cache_double_destroy+0xc0/0x300
[   18.162882]  kunit_try_run_case+0x170/0x3f0
[   18.163201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.163445]  kthread+0x328/0x630
[   18.163579]  ret_from_fork+0x10/0x20
[   18.163722] 
[   18.163761] Freed by task 215:
[   18.163998]  kasan_save_stack+0x3c/0x68
[   18.164284]  kasan_save_track+0x20/0x40
[   18.164381]  kasan_save_free_info+0x4c/0x78
[   18.164656]  __kasan_slab_free+0x6c/0x98
[   18.164767]  kmem_cache_free+0x260/0x470
[   18.164841]  slab_kmem_cache_release+0x38/0x50
[   18.165311]  kmem_cache_release+0x1c/0x30
[   18.165407]  kobject_put+0x17c/0x430
[   18.166047]  sysfs_slab_release+0x1c/0x30
[   18.166208]  kmem_cache_destroy+0x118/0x218
[   18.166467]  kmem_cache_double_destroy+0x128/0x300
[   18.166550]  kunit_try_run_case+0x170/0x3f0
[   18.166632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.166713]  kthread+0x328/0x630
[   18.167132]  ret_from_fork+0x10/0x20
[   18.167216] 
[   18.167627] The buggy address belongs to the object at fff00000c1096c80
[   18.167627]  which belongs to the cache kmem_cache of size 208
[   18.167765] The buggy address is located 0 bytes inside of
[   18.167765]  freed 208-byte region [fff00000c1096c80, fff00000c1096d50)
[   18.168157] 
[   18.168317] The buggy address belongs to the physical page:
[   18.168389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101096
[   18.168732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.168856] page_type: f5(slab)
[   18.168935] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   18.169055] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   18.169797] page dumped because: kasan: bad access detected
[   18.170008] 
[   18.170275] Memory state around the buggy address:
[   18.170539]  fff00000c1096b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.170745]  fff00000c1096c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.170847] >fff00000c1096c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.170985]                    ^
[   18.171078]  fff00000c1096d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   18.171382]  fff00000c1096d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.171490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   18.051207] ==================================================================
[   18.051382] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   18.051697] Read of size 1 at addr fff00000c794e000 by task kunit_try_catch/213
[   18.051875] 
[   18.051990] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.052195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.052255] Hardware name: linux,dummy-virt (DT)
[   18.052423] Call trace:
[   18.052482]  show_stack+0x20/0x38 (C)
[   18.052592]  dump_stack_lvl+0x8c/0xd0
[   18.052704]  print_report+0x118/0x608
[   18.052809]  kasan_report+0xdc/0x128
[   18.052909]  __asan_report_load1_noabort+0x20/0x30
[   18.053024]  kmem_cache_rcu_uaf+0x388/0x468
[   18.053125]  kunit_try_run_case+0x170/0x3f0
[   18.053228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.053340]  kthread+0x328/0x630
[   18.053436]  ret_from_fork+0x10/0x20
[   18.053540] 
[   18.053581] Allocated by task 213:
[   18.053647]  kasan_save_stack+0x3c/0x68
[   18.053730]  kasan_save_track+0x20/0x40
[   18.053811]  kasan_save_alloc_info+0x40/0x58
[   18.053885]  __kasan_slab_alloc+0xa8/0xb0
[   18.054547]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.054716]  kmem_cache_rcu_uaf+0x12c/0x468
[   18.054807]  kunit_try_run_case+0x170/0x3f0
[   18.055050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055166]  kthread+0x328/0x630
[   18.055228]  ret_from_fork+0x10/0x20
[   18.055490] 
[   18.055858] Freed by task 0:
[   18.055934]  kasan_save_stack+0x3c/0x68
[   18.056198]  kasan_save_track+0x20/0x40
[   18.056315]  kasan_save_free_info+0x4c/0x78
[   18.056416]  __kasan_slab_free+0x6c/0x98
[   18.056495]  slab_free_after_rcu_debug+0xd4/0x2f8
[   18.056579]  rcu_core+0x9f4/0x1e20
[   18.057034]  rcu_core_si+0x18/0x30
[   18.057516]  handle_softirqs+0x374/0xb28
[   18.057707]  __do_softirq+0x1c/0x28
[   18.057951] 
[   18.058092] Last potentially related work creation:
[   18.058187]  kasan_save_stack+0x3c/0x68
[   18.058401]  kasan_record_aux_stack+0xb4/0xc8
[   18.058536]  kmem_cache_free+0x120/0x470
[   18.058621]  kmem_cache_rcu_uaf+0x16c/0x468
[   18.058692]  kunit_try_run_case+0x170/0x3f0
[   18.058764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059201]  kthread+0x328/0x630
[   18.059688]  ret_from_fork+0x10/0x20
[   18.059766] 
[   18.059981] The buggy address belongs to the object at fff00000c794e000
[   18.059981]  which belongs to the cache test_cache of size 200
[   18.060322] The buggy address is located 0 bytes inside of
[   18.060322]  freed 200-byte region [fff00000c794e000, fff00000c794e0c8)
[   18.060846] 
[   18.060956] The buggy address belongs to the physical page:
[   18.061159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794e
[   18.061880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.062226] page_type: f5(slab)
[   18.062611] raw: 0bfffe0000000000 fff00000c1096b40 dead000000000122 0000000000000000
[   18.063248] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.063767] page dumped because: kasan: bad access detected
[   18.063953] 
[   18.063996] Memory state around the buggy address:
[   18.064198]  fff00000c794df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064454]  fff00000c794df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064900] >fff00000c794e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.065376]                    ^
[   18.065493]  fff00000c794e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.065606]  fff00000c794e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.066124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   17.651974] ==================================================================
[   17.652125] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.652247] Free of addr fff00000c794b001 by task kunit_try_catch/211
[   17.652342] 
[   17.652421] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.652607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.652662] Hardware name: linux,dummy-virt (DT)
[   17.652732] Call trace:
[   17.652779]  show_stack+0x20/0x38 (C)
[   17.652887]  dump_stack_lvl+0x8c/0xd0
[   17.652993]  print_report+0x118/0x608
[   17.653612]  kasan_report_invalid_free+0xc0/0xe8
[   17.653779]  check_slab_allocation+0xfc/0x108
[   17.653917]  __kasan_slab_pre_free+0x2c/0x48
[   17.654036]  kmem_cache_free+0xf0/0x470
[   17.654154]  kmem_cache_invalid_free+0x184/0x3c8
[   17.654261]  kunit_try_run_case+0x170/0x3f0
[   17.654361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.654453]  kthread+0x328/0x630
[   17.654542]  ret_from_fork+0x10/0x20
[   17.654657] 
[   17.654698] Allocated by task 211:
[   17.654763]  kasan_save_stack+0x3c/0x68
[   17.655281]  kasan_save_track+0x20/0x40
[   17.655536]  kasan_save_alloc_info+0x40/0x58
[   17.655765]  __kasan_slab_alloc+0xa8/0xb0
[   17.655885]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   17.656106]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.656513]  kunit_try_run_case+0x170/0x3f0
[   17.656740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.656980]  kthread+0x328/0x630
[   17.657148]  ret_from_fork+0x10/0x20
[   17.657232] 
[   17.657362] The buggy address belongs to the object at fff00000c794b000
[   17.657362]  which belongs to the cache test_cache of size 200
[   17.657748] The buggy address is located 1 bytes inside of
[   17.657748]  200-byte region [fff00000c794b000, fff00000c794b0c8)
[   17.658025] 
[   17.658108] The buggy address belongs to the physical page:
[   17.658292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   17.658431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.658530] page_type: f5(slab)
[   17.658611] raw: 0bfffe0000000000 fff00000c1096a00 dead000000000122 0000000000000000
[   17.658712] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.659399] page dumped because: kasan: bad access detected
[   17.659492] 
[   17.659707] Memory state around the buggy address:
[   17.659793]  fff00000c794af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.660254]  fff00000c794af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.660404] >fff00000c794b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.660549]                    ^
[   17.660685]  fff00000c794b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.660805]  fff00000c794b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.660890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   17.584929] ==================================================================
[   17.585093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   17.585239] Free of addr fff00000c794a000 by task kunit_try_catch/209
[   17.585332] 
[   17.585413] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.585605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.585662] Hardware name: linux,dummy-virt (DT)
[   17.585733] Call trace:
[   17.585787]  show_stack+0x20/0x38 (C)
[   17.586519]  dump_stack_lvl+0x8c/0xd0
[   17.586770]  print_report+0x118/0x608
[   17.586886]  kasan_report_invalid_free+0xc0/0xe8
[   17.587358]  check_slab_allocation+0xd4/0x108
[   17.587571]  __kasan_slab_pre_free+0x2c/0x48
[   17.587679]  kmem_cache_free+0xf0/0x470
[   17.587984]  kmem_cache_double_free+0x190/0x3c8
[   17.588224]  kunit_try_run_case+0x170/0x3f0
[   17.588490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.588889]  kthread+0x328/0x630
[   17.589069]  ret_from_fork+0x10/0x20
[   17.589331] 
[   17.589381] Allocated by task 209:
[   17.589661]  kasan_save_stack+0x3c/0x68
[   17.589806]  kasan_save_track+0x20/0x40
[   17.589943]  kasan_save_alloc_info+0x40/0x58
[   17.590102]  __kasan_slab_alloc+0xa8/0xb0
[   17.590197]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   17.590438]  kmem_cache_double_free+0x12c/0x3c8
[   17.590529]  kunit_try_run_case+0x170/0x3f0
[   17.590848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.590954]  kthread+0x328/0x630
[   17.591025]  ret_from_fork+0x10/0x20
[   17.591129] 
[   17.591167] Freed by task 209:
[   17.591222]  kasan_save_stack+0x3c/0x68
[   17.591293]  kasan_save_track+0x20/0x40
[   17.591360]  kasan_save_free_info+0x4c/0x78
[   17.591471]  __kasan_slab_free+0x6c/0x98
[   17.591593]  kmem_cache_free+0x260/0x470
[   17.591835]  kmem_cache_double_free+0x140/0x3c8
[   17.591925]  kunit_try_run_case+0x170/0x3f0
[   17.592018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.592119]  kthread+0x328/0x630
[   17.592195]  ret_from_fork+0x10/0x20
[   17.592271] 
[   17.592614] The buggy address belongs to the object at fff00000c794a000
[   17.592614]  which belongs to the cache test_cache of size 200
[   17.592853] The buggy address is located 0 bytes inside of
[   17.592853]  200-byte region [fff00000c794a000, fff00000c794a0c8)
[   17.593164] 
[   17.593236] The buggy address belongs to the physical page:
[   17.593359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a
[   17.593749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.593858] page_type: f5(slab)
[   17.594158] raw: 0bfffe0000000000 fff00000c10968c0 dead000000000122 0000000000000000
[   17.594392] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.594478] page dumped because: kasan: bad access detected
[   17.594544] 
[   17.594593] Memory state around the buggy address:
[   17.594661]  fff00000c7949f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.594774]  fff00000c7949f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.594885] >fff00000c794a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.594978]                    ^
[   17.595082]  fff00000c794a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.595216]  fff00000c794a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.595343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   17.403549] ==================================================================
[   17.403669] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.403783] Read of size 1 at addr fff00000c79480c8 by task kunit_try_catch/207
[   17.403891] 
[   17.403954] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.404155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.404217] Hardware name: linux,dummy-virt (DT)
[   17.404285] Call trace:
[   17.404331]  show_stack+0x20/0x38 (C)
[   17.404439]  dump_stack_lvl+0x8c/0xd0
[   17.404545]  print_report+0x118/0x608
[   17.404646]  kasan_report+0xdc/0x128
[   17.404746]  __asan_report_load1_noabort+0x20/0x30
[   17.404859]  kmem_cache_oob+0x344/0x430
[   17.404966]  kunit_try_run_case+0x170/0x3f0
[   17.405075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.405178]  kthread+0x328/0x630
[   17.405393]  ret_from_fork+0x10/0x20
[   17.405506] 
[   17.405543] Allocated by task 207:
[   17.405847]  kasan_save_stack+0x3c/0x68
[   17.405952]  kasan_save_track+0x20/0x40
[   17.406035]  kasan_save_alloc_info+0x40/0x58
[   17.406132]  __kasan_slab_alloc+0xa8/0xb0
[   17.406198]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   17.406277]  kmem_cache_oob+0x12c/0x430
[   17.406559]  kunit_try_run_case+0x170/0x3f0
[   17.406646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.406723]  kthread+0x328/0x630
[   17.406792]  ret_from_fork+0x10/0x20
[   17.406864] 
[   17.406947] The buggy address belongs to the object at fff00000c7948000
[   17.406947]  which belongs to the cache test_cache of size 200
[   17.407176] The buggy address is located 0 bytes to the right of
[   17.407176]  allocated 200-byte region [fff00000c7948000, fff00000c79480c8)
[   17.407322] 
[   17.407414] The buggy address belongs to the physical page:
[   17.407642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   17.407839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.407946] page_type: f5(slab)
[   17.408033] raw: 0bfffe0000000000 fff00000c1096780 dead000000000122 0000000000000000
[   17.408382] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.408819] page dumped because: kasan: bad access detected
[   17.408897] 
[   17.408939] Memory state around the buggy address:
[   17.409014]  fff00000c7947f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.409418]  fff00000c7948000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.409736] >fff00000c7948080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.409822]                                               ^
[   17.410096]  fff00000c7948100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.410522]  fff00000c7948180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.410637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   17.345491] ==================================================================
[   17.345934] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   17.346064] Read of size 8 at addr fff00000c7943540 by task kunit_try_catch/200
[   17.346178] 
[   17.346245] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.346424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.346475] Hardware name: linux,dummy-virt (DT)
[   17.346536] Call trace:
[   17.346654]  show_stack+0x20/0x38 (C)
[   17.346885]  dump_stack_lvl+0x8c/0xd0
[   17.346985]  print_report+0x118/0x608
[   17.347085]  kasan_report+0xdc/0x128
[   17.347159]  __asan_report_load8_noabort+0x20/0x30
[   17.347423]  workqueue_uaf+0x480/0x4a8
[   17.347531]  kunit_try_run_case+0x170/0x3f0
[   17.347799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.348049]  kthread+0x328/0x630
[   17.348155]  ret_from_fork+0x10/0x20
[   17.348264] 
[   17.348308] Allocated by task 200:
[   17.348370]  kasan_save_stack+0x3c/0x68
[   17.348457]  kasan_save_track+0x20/0x40
[   17.348534]  kasan_save_alloc_info+0x40/0x58
[   17.348629]  __kasan_kmalloc+0xd4/0xd8
[   17.348740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.348861]  workqueue_uaf+0x13c/0x4a8
[   17.348962]  kunit_try_run_case+0x170/0x3f0
[   17.349085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.349190]  kthread+0x328/0x630
[   17.349288]  ret_from_fork+0x10/0x20
[   17.349392] 
[   17.349437] Freed by task 48:
[   17.349492]  kasan_save_stack+0x3c/0x68
[   17.349578]  kasan_save_track+0x20/0x40
[   17.349658]  kasan_save_free_info+0x4c/0x78
[   17.349742]  __kasan_slab_free+0x6c/0x98
[   17.349821]  kfree+0x214/0x3c8
[   17.349925]  workqueue_uaf_work+0x18/0x30
[   17.350002]  process_one_work+0x530/0xf98
[   17.350084]  worker_thread+0x8ac/0xf28
[   17.350163]  kthread+0x328/0x630
[   17.350300]  ret_from_fork+0x10/0x20
[   17.350391] 
[   17.350430] Last potentially related work creation:
[   17.350487]  kasan_save_stack+0x3c/0x68
[   17.350577]  kasan_record_aux_stack+0xb4/0xc8
[   17.350673]  __queue_work+0x65c/0x1010
[   17.350768]  queue_work_on+0xbc/0xf8
[   17.350834]  workqueue_uaf+0x210/0x4a8
[   17.350902]  kunit_try_run_case+0x170/0x3f0
[   17.350976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.351105]  kthread+0x328/0x630
[   17.351185]  ret_from_fork+0x10/0x20
[   17.351249] 
[   17.351306] The buggy address belongs to the object at fff00000c7943540
[   17.351306]  which belongs to the cache kmalloc-32 of size 32
[   17.351433] The buggy address is located 0 bytes inside of
[   17.351433]  freed 32-byte region [fff00000c7943540, fff00000c7943560)
[   17.351567] 
[   17.351633] The buggy address belongs to the physical page:
[   17.351722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107943
[   17.351858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.351964] page_type: f5(slab)
[   17.352050] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.352179] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.352281] page dumped because: kasan: bad access detected
[   17.352348] 
[   17.352383] Memory state around the buggy address:
[   17.352447]  fff00000c7943400: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   17.352543]  fff00000c7943480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.352637] >fff00000c7943500: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   17.352724]                                            ^
[   17.352803]  fff00000c7943580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.352892]  fff00000c7943600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.352975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   17.316193] ==================================================================
[   17.316418] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   17.316616] Read of size 4 at addr fff00000c7943340 by task swapper/1/0
[   17.316742] 
[   17.316826] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.317082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.317132] Hardware name: linux,dummy-virt (DT)
[   17.317199] Call trace:
[   17.317491]  show_stack+0x20/0x38 (C)
[   17.317701]  dump_stack_lvl+0x8c/0xd0
[   17.317801]  print_report+0x118/0x608
[   17.317907]  kasan_report+0xdc/0x128
[   17.318505]  __asan_report_load4_noabort+0x20/0x30
[   17.318556]  rcu_uaf_reclaim+0x64/0x70
[   17.318656]  rcu_core+0x9f4/0x1e20
[   17.318807]  rcu_core_si+0x18/0x30
[   17.318932]  handle_softirqs+0x374/0xb28
[   17.319016]  __do_softirq+0x1c/0x28
[   17.319360]  ____do_softirq+0x18/0x30
[   17.319582]  call_on_irq_stack+0x24/0x30
[   17.319692]  do_softirq_own_stack+0x24/0x38
[   17.319800]  __irq_exit_rcu+0x1fc/0x318
[   17.319893]  irq_exit_rcu+0x1c/0x80
[   17.319981]  el1_interrupt+0x38/0x58
[   17.320091]  el1h_64_irq_handler+0x18/0x28
[   17.320189]  el1h_64_irq+0x6c/0x70
[   17.320391]  arch_local_irq_enable+0x4/0x8 (P)
[   17.320529]  do_idle+0x384/0x4e8
[   17.320658]  cpu_startup_entry+0x68/0x80
[   17.320784]  secondary_start_kernel+0x288/0x340
[   17.320928]  __secondary_switched+0xc0/0xc8
[   17.321103] 
[   17.321141] Allocated by task 198:
[   17.321199]  kasan_save_stack+0x3c/0x68
[   17.321288]  kasan_save_track+0x20/0x40
[   17.321632]  kasan_save_alloc_info+0x40/0x58
[   17.321909]  __kasan_kmalloc+0xd4/0xd8
[   17.322018]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.322132]  rcu_uaf+0xb0/0x2d8
[   17.322228]  kunit_try_run_case+0x170/0x3f0
[   17.322341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.322462]  kthread+0x328/0x630
[   17.322560]  ret_from_fork+0x10/0x20
[   17.322645] 
[   17.322695] Freed by task 0:
[   17.322772]  kasan_save_stack+0x3c/0x68
[   17.322884]  kasan_save_track+0x20/0x40
[   17.322956]  kasan_save_free_info+0x4c/0x78
[   17.323062]  __kasan_slab_free+0x6c/0x98
[   17.323128]  kfree+0x214/0x3c8
[   17.323190]  rcu_uaf_reclaim+0x28/0x70
[   17.323764]  rcu_core+0x9f4/0x1e20
[   17.324001]  rcu_core_si+0x18/0x30
[   17.324088]  handle_softirqs+0x374/0xb28
[   17.324338]  __do_softirq+0x1c/0x28
[   17.324427] 
[   17.324509] Last potentially related work creation:
[   17.324620]  kasan_save_stack+0x3c/0x68
[   17.324710]  kasan_record_aux_stack+0xb4/0xc8
[   17.324858]  __call_rcu_common.constprop.0+0x70/0x8b0
[   17.324980]  call_rcu+0x18/0x30
[   17.325083]  rcu_uaf+0x14c/0x2d8
[   17.325152]  kunit_try_run_case+0x170/0x3f0
[   17.325237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.325328]  kthread+0x328/0x630
[   17.325402]  ret_from_fork+0x10/0x20
[   17.325487] 
[   17.325543] The buggy address belongs to the object at fff00000c7943340
[   17.325543]  which belongs to the cache kmalloc-32 of size 32
[   17.325674] The buggy address is located 0 bytes inside of
[   17.325674]  freed 32-byte region [fff00000c7943340, fff00000c7943360)
[   17.325805] 
[   17.325852] The buggy address belongs to the physical page:
[   17.325922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107943
[   17.326024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.326345] page_type: f5(slab)
[   17.326440] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.326531] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.326610] page dumped because: kasan: bad access detected
[   17.326668] 
[   17.327230] Memory state around the buggy address:
[   17.327376]  fff00000c7943200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.327478]  fff00000c7943280: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.327583] >fff00000c7943300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.327703]                                            ^
[   17.327798]  fff00000c7943380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.327917]  fff00000c7943400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.327999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   17.088829] ==================================================================
[   17.088959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.089071] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196
[   17.089176] 
[   17.089240] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.089432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.089490] Hardware name: linux,dummy-virt (DT)
[   17.089556] Call trace:
[   17.089604]  show_stack+0x20/0x38 (C)
[   17.089710]  dump_stack_lvl+0x8c/0xd0
[   17.089814]  print_report+0x118/0x608
[   17.089954]  kasan_report+0xdc/0x128
[   17.090054]  __kasan_check_byte+0x54/0x70
[   17.090191]  ksize+0x30/0x88
[   17.090276]  ksize_uaf+0x168/0x5f8
[   17.090362]  kunit_try_run_case+0x170/0x3f0
[   17.090468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.090603]  kthread+0x328/0x630
[   17.090729]  ret_from_fork+0x10/0x20
[   17.090863] 
[   17.090912] Allocated by task 196:
[   17.090986]  kasan_save_stack+0x3c/0x68
[   17.091107]  kasan_save_track+0x20/0x40
[   17.091208]  kasan_save_alloc_info+0x40/0x58
[   17.091313]  __kasan_kmalloc+0xd4/0xd8
[   17.091409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.091509]  ksize_uaf+0xb8/0x5f8
[   17.091601]  kunit_try_run_case+0x170/0x3f0
[   17.091699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.091816]  kthread+0x328/0x630
[   17.092078]  ret_from_fork+0x10/0x20
[   17.092165] 
[   17.092206] Freed by task 196:
[   17.092264]  kasan_save_stack+0x3c/0x68
[   17.092331]  kasan_save_track+0x20/0x40
[   17.092425]  kasan_save_free_info+0x4c/0x78
[   17.092552]  __kasan_slab_free+0x6c/0x98
[   17.092646]  kfree+0x214/0x3c8
[   17.092781]  ksize_uaf+0x11c/0x5f8
[   17.092860]  kunit_try_run_case+0x170/0x3f0
[   17.092951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.093052]  kthread+0x328/0x630
[   17.093128]  ret_from_fork+0x10/0x20
[   17.093259] 
[   17.093314] The buggy address belongs to the object at fff00000c78d9400
[   17.093314]  which belongs to the cache kmalloc-128 of size 128
[   17.093844] The buggy address is located 0 bytes inside of
[   17.093844]  freed 128-byte region [fff00000c78d9400, fff00000c78d9480)
[   17.094051] 
[   17.094147] The buggy address belongs to the physical page:
[   17.094287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.094799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.095298] page_type: f5(slab)
[   17.095513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.095623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.095713] page dumped because: kasan: bad access detected
[   17.096153] 
[   17.096214] Memory state around the buggy address:
[   17.096370]  fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.096671]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.096938] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.097035]                    ^
[   17.097104]  fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.097282]  fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.097372] ==================================================================
[   17.099062] ==================================================================
[   17.099170] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.099270] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196
[   17.100140] 
[   17.100299] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.100892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.100960] Hardware name: linux,dummy-virt (DT)
[   17.101034] Call trace:
[   17.101089]  show_stack+0x20/0x38 (C)
[   17.101300]  dump_stack_lvl+0x8c/0xd0
[   17.101405]  print_report+0x118/0x608
[   17.101944]  kasan_report+0xdc/0x128
[   17.102183]  __asan_report_load1_noabort+0x20/0x30
[   17.102389]  ksize_uaf+0x598/0x5f8
[   17.102679]  kunit_try_run_case+0x170/0x3f0
[   17.103011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.103145]  kthread+0x328/0x630
[   17.103551]  ret_from_fork+0x10/0x20
[   17.103660] 
[   17.103701] Allocated by task 196:
[   17.103756]  kasan_save_stack+0x3c/0x68
[   17.104816]  kasan_save_track+0x20/0x40
[   17.104931]  kasan_save_alloc_info+0x40/0x58
[   17.105223]  __kasan_kmalloc+0xd4/0xd8
[   17.105460]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.105755]  ksize_uaf+0xb8/0x5f8
[   17.105827]  kunit_try_run_case+0x170/0x3f0
[   17.106280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.106738]  kthread+0x328/0x630
[   17.106821]  ret_from_fork+0x10/0x20
[   17.106997] 
[   17.107083] Freed by task 196:
[   17.107143]  kasan_save_stack+0x3c/0x68
[   17.107227]  kasan_save_track+0x20/0x40
[   17.107304]  kasan_save_free_info+0x4c/0x78
[   17.107381]  __kasan_slab_free+0x6c/0x98
[   17.107471]  kfree+0x214/0x3c8
[   17.107539]  ksize_uaf+0x11c/0x5f8
[   17.107607]  kunit_try_run_case+0x170/0x3f0
[   17.107683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.107774]  kthread+0x328/0x630
[   17.107846]  ret_from_fork+0x10/0x20
[   17.107931] 
[   17.107976] The buggy address belongs to the object at fff00000c78d9400
[   17.107976]  which belongs to the cache kmalloc-128 of size 128
[   17.108102] The buggy address is located 0 bytes inside of
[   17.108102]  freed 128-byte region [fff00000c78d9400, fff00000c78d9480)
[   17.108251] 
[   17.108308] The buggy address belongs to the physical page:
[   17.108376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.108491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.108592] page_type: f5(slab)
[   17.108674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.108784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.108873] page dumped because: kasan: bad access detected
[   17.108944] 
[   17.108996] Memory state around the buggy address:
[   17.109562]  fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.109687]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.109845] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.109960]                    ^
[   17.110020]  fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.110111]  fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.111011] ==================================================================
[   17.112379] ==================================================================
[   17.112488] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.112585] Read of size 1 at addr fff00000c78d9478 by task kunit_try_catch/196
[   17.112689] 
[   17.112750] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.113213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.113866] Hardware name: linux,dummy-virt (DT)
[   17.114078] Call trace:
[   17.114149]  show_stack+0x20/0x38 (C)
[   17.114662]  dump_stack_lvl+0x8c/0xd0
[   17.114903]  print_report+0x118/0x608
[   17.115059]  kasan_report+0xdc/0x128
[   17.115175]  __asan_report_load1_noabort+0x20/0x30
[   17.115451]  ksize_uaf+0x544/0x5f8
[   17.115547]  kunit_try_run_case+0x170/0x3f0
[   17.115644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.115754]  kthread+0x328/0x630
[   17.116777]  ret_from_fork+0x10/0x20
[   17.117661] 
[   17.117822] Allocated by task 196:
[   17.118046]  kasan_save_stack+0x3c/0x68
[   17.118260]  kasan_save_track+0x20/0x40
[   17.118381]  kasan_save_alloc_info+0x40/0x58
[   17.118801]  __kasan_kmalloc+0xd4/0xd8
[   17.119103]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.119377]  ksize_uaf+0xb8/0x5f8
[   17.119479]  kunit_try_run_case+0x170/0x3f0
[   17.119639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.119797]  kthread+0x328/0x630
[   17.120002]  ret_from_fork+0x10/0x20
[   17.120238] 
[   17.120298] Freed by task 196:
[   17.120365]  kasan_save_stack+0x3c/0x68
[   17.120452]  kasan_save_track+0x20/0x40
[   17.120529]  kasan_save_free_info+0x4c/0x78
[   17.120603]  __kasan_slab_free+0x6c/0x98
[   17.120894]  kfree+0x214/0x3c8
[   17.121008]  ksize_uaf+0x11c/0x5f8
[   17.121464]  kunit_try_run_case+0x170/0x3f0
[   17.121553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.121645]  kthread+0x328/0x630
[   17.121719]  ret_from_fork+0x10/0x20
[   17.121790] 
[   17.121830] The buggy address belongs to the object at fff00000c78d9400
[   17.121830]  which belongs to the cache kmalloc-128 of size 128
[   17.122856] The buggy address is located 120 bytes inside of
[   17.122856]  freed 128-byte region [fff00000c78d9400, fff00000c78d9480)
[   17.123154] 
[   17.123718] The buggy address belongs to the physical page:
[   17.123897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.124127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.124305] page_type: f5(slab)
[   17.124388] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.124498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.124929] page dumped because: kasan: bad access detected
[   17.125267] 
[   17.125325] Memory state around the buggy address:
[   17.125400]  fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.125697]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.125842] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.125991]                                                                 ^
[   17.126242]  fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.126341]  fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.126423] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   17.052218] ==================================================================
[   17.052577] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.052704] Read of size 1 at addr fff00000c78d9373 by task kunit_try_catch/194
[   17.052874] 
[   17.052973] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.053283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.053375] Hardware name: linux,dummy-virt (DT)
[   17.053479] Call trace:
[   17.053540]  show_stack+0x20/0x38 (C)
[   17.053648]  dump_stack_lvl+0x8c/0xd0
[   17.053760]  print_report+0x118/0x608
[   17.053866]  kasan_report+0xdc/0x128
[   17.053957]  __asan_report_load1_noabort+0x20/0x30
[   17.054073]  ksize_unpoisons_memory+0x628/0x740
[   17.054667]  kunit_try_run_case+0x170/0x3f0
[   17.054825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.054991]  kthread+0x328/0x630
[   17.055111]  ret_from_fork+0x10/0x20
[   17.055244] 
[   17.055279] Allocated by task 194:
[   17.055338]  kasan_save_stack+0x3c/0x68
[   17.055522]  kasan_save_track+0x20/0x40
[   17.055608]  kasan_save_alloc_info+0x40/0x58
[   17.055785]  __kasan_kmalloc+0xd4/0xd8
[   17.055862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.055944]  ksize_unpoisons_memory+0xc0/0x740
[   17.056020]  kunit_try_run_case+0x170/0x3f0
[   17.056111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.056210]  kthread+0x328/0x630
[   17.056282]  ret_from_fork+0x10/0x20
[   17.056356] 
[   17.056407] The buggy address belongs to the object at fff00000c78d9300
[   17.056407]  which belongs to the cache kmalloc-128 of size 128
[   17.056601] The buggy address is located 0 bytes to the right of
[   17.056601]  allocated 115-byte region [fff00000c78d9300, fff00000c78d9373)
[   17.056806] 
[   17.056845] The buggy address belongs to the physical page:
[   17.056954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.057150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.057324] page_type: f5(slab)
[   17.057443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.057579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.057730] page dumped because: kasan: bad access detected
[   17.057842] 
[   17.057884] Memory state around the buggy address:
[   17.057948]  fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.058057]  fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.058442] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.058603]                                                              ^
[   17.058724]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.058830]  fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.058923] ==================================================================
[   17.060069] ==================================================================
[   17.060174] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.060277] Read of size 1 at addr fff00000c78d9378 by task kunit_try_catch/194
[   17.060380] 
[   17.060441] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.060623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.060679] Hardware name: linux,dummy-virt (DT)
[   17.060741] Call trace:
[   17.060790]  show_stack+0x20/0x38 (C)
[   17.060893]  dump_stack_lvl+0x8c/0xd0
[   17.060997]  print_report+0x118/0x608
[   17.061207]  kasan_report+0xdc/0x128
[   17.061310]  __asan_report_load1_noabort+0x20/0x30
[   17.061419]  ksize_unpoisons_memory+0x618/0x740
[   17.061527]  kunit_try_run_case+0x170/0x3f0
[   17.061633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.061748]  kthread+0x328/0x630
[   17.061843]  ret_from_fork+0x10/0x20
[   17.061981] 
[   17.062019] Allocated by task 194:
[   17.062083]  kasan_save_stack+0x3c/0x68
[   17.062167]  kasan_save_track+0x20/0x40
[   17.062245]  kasan_save_alloc_info+0x40/0x58
[   17.062335]  __kasan_kmalloc+0xd4/0xd8
[   17.062409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.062490]  ksize_unpoisons_memory+0xc0/0x740
[   17.062583]  kunit_try_run_case+0x170/0x3f0
[   17.062661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.062750]  kthread+0x328/0x630
[   17.063383]  ret_from_fork+0x10/0x20
[   17.063450] 
[   17.063490] The buggy address belongs to the object at fff00000c78d9300
[   17.063490]  which belongs to the cache kmalloc-128 of size 128
[   17.063616] The buggy address is located 5 bytes to the right of
[   17.063616]  allocated 115-byte region [fff00000c78d9300, fff00000c78d9373)
[   17.063808] 
[   17.063862] The buggy address belongs to the physical page:
[   17.063952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.064093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.064174] page_type: f5(slab)
[   17.064249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.064355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.064449] page dumped because: kasan: bad access detected
[   17.064518] 
[   17.064559] Memory state around the buggy address:
[   17.064620]  fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.065574]  fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.065869] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.066012]                                                                 ^
[   17.066114]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.066210]  fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.066295] ==================================================================
[   17.068452] ==================================================================
[   17.068610] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.068756] Read of size 1 at addr fff00000c78d937f by task kunit_try_catch/194
[   17.068901] 
[   17.068984] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.069169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.069224] Hardware name: linux,dummy-virt (DT)
[   17.069300] Call trace:
[   17.069345]  show_stack+0x20/0x38 (C)
[   17.069660]  dump_stack_lvl+0x8c/0xd0
[   17.069886]  print_report+0x118/0x608
[   17.070037]  kasan_report+0xdc/0x128
[   17.070154]  __asan_report_load1_noabort+0x20/0x30
[   17.070255]  ksize_unpoisons_memory+0x690/0x740
[   17.070543]  kunit_try_run_case+0x170/0x3f0
[   17.070653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.070771]  kthread+0x328/0x630
[   17.070902]  ret_from_fork+0x10/0x20
[   17.071049] 
[   17.071089] Allocated by task 194:
[   17.071147]  kasan_save_stack+0x3c/0x68
[   17.071235]  kasan_save_track+0x20/0x40
[   17.071353]  kasan_save_alloc_info+0x40/0x58
[   17.071427]  __kasan_kmalloc+0xd4/0xd8
[   17.071497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.071672]  ksize_unpoisons_memory+0xc0/0x740
[   17.071876]  kunit_try_run_case+0x170/0x3f0
[   17.072090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.072181]  kthread+0x328/0x630
[   17.072547]  ret_from_fork+0x10/0x20
[   17.072803] 
[   17.072842] The buggy address belongs to the object at fff00000c78d9300
[   17.072842]  which belongs to the cache kmalloc-128 of size 128
[   17.073016] The buggy address is located 12 bytes to the right of
[   17.073016]  allocated 115-byte region [fff00000c78d9300, fff00000c78d9373)
[   17.073172] 
[   17.073233] The buggy address belongs to the physical page:
[   17.073292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   17.073404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.073504] page_type: f5(slab)
[   17.073586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.073693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.073781] page dumped because: kasan: bad access detected
[   17.073850] 
[   17.073887] Memory state around the buggy address:
[   17.073948]  fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.074027]  fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.074369] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.074687]                                                                 ^
[   17.074769]  fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.074850]  fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.074930] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   17.001253] ==================================================================
[   17.001970] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.002177] Free of addr fff00000c10cc860 by task kunit_try_catch/192
[   17.002271] 
[   17.002330] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   17.002988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.003339] Hardware name: linux,dummy-virt (DT)
[   17.003419] Call trace:
[   17.003467]  show_stack+0x20/0x38 (C)
[   17.003970]  dump_stack_lvl+0x8c/0xd0
[   17.004098]  print_report+0x118/0x608
[   17.004654]  kasan_report_invalid_free+0xc0/0xe8
[   17.004791]  check_slab_allocation+0xd4/0x108
[   17.005109]  __kasan_slab_pre_free+0x2c/0x48
[   17.005462]  kfree+0xe8/0x3c8
[   17.005676]  kfree_sensitive+0x3c/0xb0
[   17.005856]  kmalloc_double_kzfree+0x168/0x308
[   17.005954]  kunit_try_run_case+0x170/0x3f0
[   17.006272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.006409]  kthread+0x328/0x630
[   17.006638]  ret_from_fork+0x10/0x20
[   17.007218] 
[   17.007338] Allocated by task 192:
[   17.007427]  kasan_save_stack+0x3c/0x68
[   17.007662]  kasan_save_track+0x20/0x40
[   17.007835]  kasan_save_alloc_info+0x40/0x58
[   17.007925]  __kasan_kmalloc+0xd4/0xd8
[   17.008009]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.008103]  kmalloc_double_kzfree+0xb8/0x308
[   17.008190]  kunit_try_run_case+0x170/0x3f0
[   17.008274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.008629]  kthread+0x328/0x630
[   17.008959]  ret_from_fork+0x10/0x20
[   17.009283] 
[   17.009499] Freed by task 192:
[   17.009636]  kasan_save_stack+0x3c/0x68
[   17.009742]  kasan_save_track+0x20/0x40
[   17.010033]  kasan_save_free_info+0x4c/0x78
[   17.010354]  __kasan_slab_free+0x6c/0x98
[   17.010445]  kfree+0x214/0x3c8
[   17.010616]  kfree_sensitive+0x80/0xb0
[   17.010745]  kmalloc_double_kzfree+0x11c/0x308
[   17.011026]  kunit_try_run_case+0x170/0x3f0
[   17.011127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.011236]  kthread+0x328/0x630
[   17.011313]  ret_from_fork+0x10/0x20
[   17.011950] 
[   17.012003] The buggy address belongs to the object at fff00000c10cc860
[   17.012003]  which belongs to the cache kmalloc-16 of size 16
[   17.012752] The buggy address is located 0 bytes inside of
[   17.012752]  16-byte region [fff00000c10cc860, fff00000c10cc870)
[   17.012939] 
[   17.012987] The buggy address belongs to the physical page:
[   17.013597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   17.014251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.014385] page_type: f5(slab)
[   17.014472] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.015273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.015455] page dumped because: kasan: bad access detected
[   17.015615] 
[   17.015681] Memory state around the buggy address:
[   17.015765]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   17.015884]  fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.016000] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.016160]                                                        ^
[   17.016259]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.016376]  fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.016482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   16.985440] ==================================================================
[   16.986018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   16.986364] Read of size 1 at addr fff00000c10cc860 by task kunit_try_catch/192
[   16.986743] 
[   16.986834] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.987245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.987395] Hardware name: linux,dummy-virt (DT)
[   16.987464] Call trace:
[   16.987756]  show_stack+0x20/0x38 (C)
[   16.987885]  dump_stack_lvl+0x8c/0xd0
[   16.987991]  print_report+0x118/0x608
[   16.988711]  kasan_report+0xdc/0x128
[   16.988842]  __kasan_check_byte+0x54/0x70
[   16.988947]  kfree_sensitive+0x30/0xb0
[   16.989060]  kmalloc_double_kzfree+0x168/0x308
[   16.989170]  kunit_try_run_case+0x170/0x3f0
[   16.989795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.990307]  kthread+0x328/0x630
[   16.990477]  ret_from_fork+0x10/0x20
[   16.990816] 
[   16.990865] Allocated by task 192:
[   16.991106]  kasan_save_stack+0x3c/0x68
[   16.991399]  kasan_save_track+0x20/0x40
[   16.991528]  kasan_save_alloc_info+0x40/0x58
[   16.992109]  __kasan_kmalloc+0xd4/0xd8
[   16.992274]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.992376]  kmalloc_double_kzfree+0xb8/0x308
[   16.992468]  kunit_try_run_case+0x170/0x3f0
[   16.992544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.993003]  kthread+0x328/0x630
[   16.993294]  ret_from_fork+0x10/0x20
[   16.993393] 
[   16.993661] Freed by task 192:
[   16.993961]  kasan_save_stack+0x3c/0x68
[   16.994185]  kasan_save_track+0x20/0x40
[   16.994335]  kasan_save_free_info+0x4c/0x78
[   16.994444]  __kasan_slab_free+0x6c/0x98
[   16.994532]  kfree+0x214/0x3c8
[   16.994848]  kfree_sensitive+0x80/0xb0
[   16.995147]  kmalloc_double_kzfree+0x11c/0x308
[   16.995242]  kunit_try_run_case+0x170/0x3f0
[   16.995324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.995490]  kthread+0x328/0x630
[   16.995578]  ret_from_fork+0x10/0x20
[   16.995956] 
[   16.996288] The buggy address belongs to the object at fff00000c10cc860
[   16.996288]  which belongs to the cache kmalloc-16 of size 16
[   16.996708] The buggy address is located 0 bytes inside of
[   16.996708]  freed 16-byte region [fff00000c10cc860, fff00000c10cc870)
[   16.996910] 
[   16.996974] The buggy address belongs to the physical page:
[   16.997248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   16.997431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.997622] page_type: f5(slab)
[   16.997714] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.998038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.998320] page dumped because: kasan: bad access detected
[   16.998604] 
[   16.998729] Memory state around the buggy address:
[   16.998856]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   16.999032]  fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.999142] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.999287]                                                        ^
[   16.999372]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999468]  fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   16.937257] ==================================================================
[   16.937403] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   16.937513] Read of size 1 at addr fff00000c7941028 by task kunit_try_catch/188
[   16.937611] 
[   16.937669] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.937899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.938092] Hardware name: linux,dummy-virt (DT)
[   16.938131] Call trace:
[   16.938156]  show_stack+0x20/0x38 (C)
[   16.938214]  dump_stack_lvl+0x8c/0xd0
[   16.938569]  print_report+0x118/0x608
[   16.938669]  kasan_report+0xdc/0x128
[   16.938758]  __asan_report_load1_noabort+0x20/0x30
[   16.938861]  kmalloc_uaf2+0x3f4/0x468
[   16.939010]  kunit_try_run_case+0x170/0x3f0
[   16.939128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.939246]  kthread+0x328/0x630
[   16.939344]  ret_from_fork+0x10/0x20
[   16.939449] 
[   16.939504] Allocated by task 188:
[   16.939571]  kasan_save_stack+0x3c/0x68
[   16.939654]  kasan_save_track+0x20/0x40
[   16.939748]  kasan_save_alloc_info+0x40/0x58
[   16.939836]  __kasan_kmalloc+0xd4/0xd8
[   16.939915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.940017]  kmalloc_uaf2+0xc4/0x468
[   16.941069]  kunit_try_run_case+0x170/0x3f0
[   16.941166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.941259]  kthread+0x328/0x630
[   16.941337]  ret_from_fork+0x10/0x20
[   16.941418] 
[   16.941458] Freed by task 188:
[   16.941829]  kasan_save_stack+0x3c/0x68
[   16.941939]  kasan_save_track+0x20/0x40
[   16.942477]  kasan_save_free_info+0x4c/0x78
[   16.942683]  __kasan_slab_free+0x6c/0x98
[   16.942769]  kfree+0x214/0x3c8
[   16.942862]  kmalloc_uaf2+0x134/0x468
[   16.942949]  kunit_try_run_case+0x170/0x3f0
[   16.943236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.943510]  kthread+0x328/0x630
[   16.943689]  ret_from_fork+0x10/0x20
[   16.943843] 
[   16.943907] The buggy address belongs to the object at fff00000c7941000
[   16.943907]  which belongs to the cache kmalloc-64 of size 64
[   16.944109] The buggy address is located 40 bytes inside of
[   16.944109]  freed 64-byte region [fff00000c7941000, fff00000c7941040)
[   16.944455] 
[   16.944534] The buggy address belongs to the physical page:
[   16.944754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   16.944956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.945127] page_type: f5(slab)
[   16.945204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.945509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.945649] page dumped because: kasan: bad access detected
[   16.945919] 
[   16.946006] Memory state around the buggy address:
[   16.946244]  fff00000c7940f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.946433]  fff00000c7940f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.946535] >fff00000c7941000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.946802]                                   ^
[   16.946882]  fff00000c7941080: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   16.946982]  fff00000c7941100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.947185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   16.907161] ==================================================================
[   16.907276] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   16.907388] Write of size 33 at addr fff00000c78cbe80 by task kunit_try_catch/186
[   16.907497] 
[   16.907559] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.907736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.907793] Hardware name: linux,dummy-virt (DT)
[   16.907858] Call trace:
[   16.907901]  show_stack+0x20/0x38 (C)
[   16.908008]  dump_stack_lvl+0x8c/0xd0
[   16.908276]  print_report+0x118/0x608
[   16.908386]  kasan_report+0xdc/0x128
[   16.908481]  kasan_check_range+0x100/0x1a8
[   16.908585]  __asan_memset+0x34/0x78
[   16.908683]  kmalloc_uaf_memset+0x170/0x310
[   16.908780]  kunit_try_run_case+0x170/0x3f0
[   16.908886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.909786]  kthread+0x328/0x630
[   16.910143]  ret_from_fork+0x10/0x20
[   16.910555] 
[   16.910621] Allocated by task 186:
[   16.910684]  kasan_save_stack+0x3c/0x68
[   16.910757]  kasan_save_track+0x20/0x40
[   16.910828]  kasan_save_alloc_info+0x40/0x58
[   16.910899]  __kasan_kmalloc+0xd4/0xd8
[   16.910969]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.911991]  kmalloc_uaf_memset+0xb8/0x310
[   16.912582]  kunit_try_run_case+0x170/0x3f0
[   16.912830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.913074]  kthread+0x328/0x630
[   16.913153]  ret_from_fork+0x10/0x20
[   16.913231] 
[   16.913272] Freed by task 186:
[   16.913335]  kasan_save_stack+0x3c/0x68
[   16.913929]  kasan_save_track+0x20/0x40
[   16.914548]  kasan_save_free_info+0x4c/0x78
[   16.914648]  __kasan_slab_free+0x6c/0x98
[   16.915125]  kfree+0x214/0x3c8
[   16.915646]  kmalloc_uaf_memset+0x11c/0x310
[   16.915828]  kunit_try_run_case+0x170/0x3f0
[   16.915908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.916657]  kthread+0x328/0x630
[   16.916740]  ret_from_fork+0x10/0x20
[   16.916813] 
[   16.916854] The buggy address belongs to the object at fff00000c78cbe80
[   16.916854]  which belongs to the cache kmalloc-64 of size 64
[   16.916983] The buggy address is located 0 bytes inside of
[   16.916983]  freed 64-byte region [fff00000c78cbe80, fff00000c78cbec0)
[   16.918751] 
[   16.918843] The buggy address belongs to the physical page:
[   16.918926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb
[   16.919179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.919394] page_type: f5(slab)
[   16.919526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.919708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.919878] page dumped because: kasan: bad access detected
[   16.919951] 
[   16.920062] Memory state around the buggy address:
[   16.920151]  fff00000c78cbd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.920391]  fff00000c78cbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.920746] >fff00000c78cbe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.920832]                    ^
[   16.920904]  fff00000c78cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.921275]  fff00000c78cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.921404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   16.887912] ==================================================================
[   16.888035] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   16.888160] Read of size 1 at addr fff00000c10cc848 by task kunit_try_catch/184
[   16.888266] 
[   16.888346] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.888528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.888613] Hardware name: linux,dummy-virt (DT)
[   16.889147] Call trace:
[   16.889214]  show_stack+0x20/0x38 (C)
[   16.889375]  dump_stack_lvl+0x8c/0xd0
[   16.889485]  print_report+0x118/0x608
[   16.889579]  kasan_report+0xdc/0x128
[   16.889675]  __asan_report_load1_noabort+0x20/0x30
[   16.889783]  kmalloc_uaf+0x300/0x338
[   16.889877]  kunit_try_run_case+0x170/0x3f0
[   16.890382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.890505]  kthread+0x328/0x630
[   16.890614]  ret_from_fork+0x10/0x20
[   16.890718] 
[   16.890763] Allocated by task 184:
[   16.890823]  kasan_save_stack+0x3c/0x68
[   16.890911]  kasan_save_track+0x20/0x40
[   16.891603]  kasan_save_alloc_info+0x40/0x58
[   16.891956]  __kasan_kmalloc+0xd4/0xd8
[   16.892318]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.892686]  kmalloc_uaf+0xb8/0x338
[   16.893057]  kunit_try_run_case+0x170/0x3f0
[   16.893145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.893253]  kthread+0x328/0x630
[   16.893385]  ret_from_fork+0x10/0x20
[   16.893504] 
[   16.893552] Freed by task 184:
[   16.893611]  kasan_save_stack+0x3c/0x68
[   16.893690]  kasan_save_track+0x20/0x40
[   16.893759]  kasan_save_free_info+0x4c/0x78
[   16.893840]  __kasan_slab_free+0x6c/0x98
[   16.893946]  kfree+0x214/0x3c8
[   16.894013]  kmalloc_uaf+0x11c/0x338
[   16.894102]  kunit_try_run_case+0x170/0x3f0
[   16.894202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.894293]  kthread+0x328/0x630
[   16.894723]  ret_from_fork+0x10/0x20
[   16.894961] 
[   16.895003] The buggy address belongs to the object at fff00000c10cc840
[   16.895003]  which belongs to the cache kmalloc-16 of size 16
[   16.895122] The buggy address is located 8 bytes inside of
[   16.895122]  freed 16-byte region [fff00000c10cc840, fff00000c10cc850)
[   16.895237] 
[   16.895274] The buggy address belongs to the physical page:
[   16.895336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   16.895441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.896097] page_type: f5(slab)
[   16.897317] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.897518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.897777] page dumped because: kasan: bad access detected
[   16.897884] 
[   16.897997] Memory state around the buggy address:
[   16.898093]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   16.898170]  fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.898256] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   16.898323]                                               ^
[   16.898393]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.898478]  fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.899218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   16.851408] ==================================================================
[   16.851535] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.851656] Read of size 64 at addr fff00000c78cbb84 by task kunit_try_catch/182
[   16.851758] 
[   16.851822] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.852046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.852119] Hardware name: linux,dummy-virt (DT)
[   16.852195] Call trace:
[   16.852248]  show_stack+0x20/0x38 (C)
[   16.852345]  dump_stack_lvl+0x8c/0xd0
[   16.852453]  print_report+0x118/0x608
[   16.852552]  kasan_report+0xdc/0x128
[   16.852646]  kasan_check_range+0x100/0x1a8
[   16.852747]  __asan_memmove+0x3c/0x98
[   16.852843]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.852950]  kunit_try_run_case+0x170/0x3f0
[   16.853060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.853178]  kthread+0x328/0x630
[   16.853278]  ret_from_fork+0x10/0x20
[   16.853377] 
[   16.853419] Allocated by task 182:
[   16.853476]  kasan_save_stack+0x3c/0x68
[   16.853558]  kasan_save_track+0x20/0x40
[   16.853633]  kasan_save_alloc_info+0x40/0x58
[   16.853717]  __kasan_kmalloc+0xd4/0xd8
[   16.853792]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.853880]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   16.855979]  kunit_try_run_case+0x170/0x3f0
[   16.856092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.856767]  kthread+0x328/0x630
[   16.856950]  ret_from_fork+0x10/0x20
[   16.857455] 
[   16.857540] The buggy address belongs to the object at fff00000c78cbb80
[   16.857540]  which belongs to the cache kmalloc-64 of size 64
[   16.857797] The buggy address is located 4 bytes inside of
[   16.857797]  allocated 64-byte region [fff00000c78cbb80, fff00000c78cbbc0)
[   16.858077] 
[   16.858127] The buggy address belongs to the physical page:
[   16.858183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb
[   16.858278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.858953] page_type: f5(slab)
[   16.859222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.859340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.859431] page dumped because: kasan: bad access detected
[   16.860027] 
[   16.860090] Memory state around the buggy address:
[   16.860234]  fff00000c78cba80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.860534]  fff00000c78cbb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.860960] >fff00000c78cbb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.861058]                                            ^
[   16.861130]  fff00000c78cbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861226]  fff00000c78cbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   16.816957] ==================================================================
[   16.817141] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.817254] Read of size 18446744073709551614 at addr fff00000c78cba04 by task kunit_try_catch/180
[   16.817456] 
[   16.817517] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.817754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.817829] Hardware name: linux,dummy-virt (DT)
[   16.817945] Call trace:
[   16.817986]  show_stack+0x20/0x38 (C)
[   16.818087]  dump_stack_lvl+0x8c/0xd0
[   16.818180]  print_report+0x118/0x608
[   16.818277]  kasan_report+0xdc/0x128
[   16.818518]  kasan_check_range+0x100/0x1a8
[   16.818827]  __asan_memmove+0x3c/0x98
[   16.819106]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.819336]  kunit_try_run_case+0x170/0x3f0
[   16.819470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.819615]  kthread+0x328/0x630
[   16.819698]  ret_from_fork+0x10/0x20
[   16.819922] 
[   16.819963] Allocated by task 180:
[   16.820018]  kasan_save_stack+0x3c/0x68
[   16.820108]  kasan_save_track+0x20/0x40
[   16.820217]  kasan_save_alloc_info+0x40/0x58
[   16.820302]  __kasan_kmalloc+0xd4/0xd8
[   16.820373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.820455]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.820538]  kunit_try_run_case+0x170/0x3f0
[   16.820784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.820875]  kthread+0x328/0x630
[   16.821212]  ret_from_fork+0x10/0x20
[   16.821311] 
[   16.822209] The buggy address belongs to the object at fff00000c78cba00
[   16.822209]  which belongs to the cache kmalloc-64 of size 64
[   16.822352] The buggy address is located 4 bytes inside of
[   16.822352]  64-byte region [fff00000c78cba00, fff00000c78cba40)
[   16.822462] 
[   16.822506] The buggy address belongs to the physical page:
[   16.822681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb
[   16.822970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.823187] page_type: f5(slab)
[   16.823300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.823455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.823559] page dumped because: kasan: bad access detected
[   16.823651] 
[   16.823688] Memory state around the buggy address:
[   16.823763]  fff00000c78cb900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.823896]  fff00000c78cb980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.824018] >fff00000c78cba00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.824108]                    ^
[   16.824164]  fff00000c78cba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.824490]  fff00000c78cbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.824612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   16.797512] ==================================================================
[   16.797810] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.798051] Write of size 16 at addr fff00000c78d9269 by task kunit_try_catch/178
[   16.798368] 
[   16.798679] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.799063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.799328] Hardware name: linux,dummy-virt (DT)
[   16.799391] Call trace:
[   16.799455]  show_stack+0x20/0x38 (C)
[   16.799581]  dump_stack_lvl+0x8c/0xd0
[   16.799876]  print_report+0x118/0x608
[   16.800004]  kasan_report+0xdc/0x128
[   16.800115]  kasan_check_range+0x100/0x1a8
[   16.800216]  __asan_memset+0x34/0x78
[   16.800821]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.801061]  kunit_try_run_case+0x170/0x3f0
[   16.801174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.801297]  kthread+0x328/0x630
[   16.801394]  ret_from_fork+0x10/0x20
[   16.801494] 
[   16.801530] Allocated by task 178:
[   16.801586]  kasan_save_stack+0x3c/0x68
[   16.801994]  kasan_save_track+0x20/0x40
[   16.802211]  kasan_save_alloc_info+0x40/0x58
[   16.802341]  __kasan_kmalloc+0xd4/0xd8
[   16.802582]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.802678]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.802754]  kunit_try_run_case+0x170/0x3f0
[   16.802816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.802894]  kthread+0x328/0x630
[   16.802962]  ret_from_fork+0x10/0x20
[   16.803049] 
[   16.803095] The buggy address belongs to the object at fff00000c78d9200
[   16.803095]  which belongs to the cache kmalloc-128 of size 128
[   16.803220] The buggy address is located 105 bytes inside of
[   16.803220]  allocated 120-byte region [fff00000c78d9200, fff00000c78d9278)
[   16.803786] 
[   16.803848] The buggy address belongs to the physical page:
[   16.804162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   16.804451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.804660] page_type: f5(slab)
[   16.804862] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.805024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.805307] page dumped because: kasan: bad access detected
[   16.805586] 
[   16.805710] Memory state around the buggy address:
[   16.805875]  fff00000c78d9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.805975]  fff00000c78d9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806064] >fff00000c78d9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.806130]                                                                 ^
[   16.806208]  fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806296]  fff00000c78d9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   16.764607] ==================================================================
[   16.764734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.764841] Write of size 8 at addr fff00000c78d9171 by task kunit_try_catch/176
[   16.764946] 
[   16.765013] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.765695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.765766] Hardware name: linux,dummy-virt (DT)
[   16.765930] Call trace:
[   16.765988]  show_stack+0x20/0x38 (C)
[   16.766127]  dump_stack_lvl+0x8c/0xd0
[   16.766302]  print_report+0x118/0x608
[   16.766621]  kasan_report+0xdc/0x128
[   16.766794]  kasan_check_range+0x100/0x1a8
[   16.766915]  __asan_memset+0x34/0x78
[   16.767356]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.767643]  kunit_try_run_case+0x170/0x3f0
[   16.767826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.768088]  kthread+0x328/0x630
[   16.768193]  ret_from_fork+0x10/0x20
[   16.768303] 
[   16.768343] Allocated by task 176:
[   16.768403]  kasan_save_stack+0x3c/0x68
[   16.768486]  kasan_save_track+0x20/0x40
[   16.768669]  kasan_save_alloc_info+0x40/0x58
[   16.768857]  __kasan_kmalloc+0xd4/0xd8
[   16.769280]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.769578]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.769698]  kunit_try_run_case+0x170/0x3f0
[   16.770059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.770232]  kthread+0x328/0x630
[   16.770350]  ret_from_fork+0x10/0x20
[   16.770437] 
[   16.770666] The buggy address belongs to the object at fff00000c78d9100
[   16.770666]  which belongs to the cache kmalloc-128 of size 128
[   16.770796] The buggy address is located 113 bytes inside of
[   16.770796]  allocated 120-byte region [fff00000c78d9100, fff00000c78d9178)
[   16.770912] 
[   16.770955] The buggy address belongs to the physical page:
[   16.771125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   16.771346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.771549] page_type: f5(slab)
[   16.771840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.771941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.772124] page dumped because: kasan: bad access detected
[   16.772337] 
[   16.772490] Memory state around the buggy address:
[   16.772564]  fff00000c78d9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.772741]  fff00000c78d9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772857] >fff00000c78d9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.772937]                                                                 ^
[   16.773022]  fff00000c78d9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773125]  fff00000c78d9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773208] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   16.691605] ==================================================================
[   16.691723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.691832] Write of size 2 at addr fff00000c78d9077 by task kunit_try_catch/172
[   16.691935] 
[   16.691999] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.693087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.693193] Hardware name: linux,dummy-virt (DT)
[   16.693298] Call trace:
[   16.693436]  show_stack+0x20/0x38 (C)
[   16.693651]  dump_stack_lvl+0x8c/0xd0
[   16.693798]  print_report+0x118/0x608
[   16.694012]  kasan_report+0xdc/0x128
[   16.694465]  kasan_check_range+0x100/0x1a8
[   16.694575]  __asan_memset+0x34/0x78
[   16.694786]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.695009]  kunit_try_run_case+0x170/0x3f0
[   16.695113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.695356]  kthread+0x328/0x630
[   16.695723]  ret_from_fork+0x10/0x20
[   16.695904] 
[   16.696010] Allocated by task 172:
[   16.696092]  kasan_save_stack+0x3c/0x68
[   16.696184]  kasan_save_track+0x20/0x40
[   16.696585]  kasan_save_alloc_info+0x40/0x58
[   16.696906]  __kasan_kmalloc+0xd4/0xd8
[   16.697024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.697234]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.697340]  kunit_try_run_case+0x170/0x3f0
[   16.697518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.697687]  kthread+0x328/0x630
[   16.698019]  ret_from_fork+0x10/0x20
[   16.698205] 
[   16.698253] The buggy address belongs to the object at fff00000c78d9000
[   16.698253]  which belongs to the cache kmalloc-128 of size 128
[   16.698458] The buggy address is located 119 bytes inside of
[   16.698458]  allocated 120-byte region [fff00000c78d9000, fff00000c78d9078)
[   16.698736] 
[   16.698804] The buggy address belongs to the physical page:
[   16.698863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9
[   16.699202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.699378] page_type: f5(slab)
[   16.699550] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.699668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.699840] page dumped because: kasan: bad access detected
[   16.699934] 
[   16.700186] Memory state around the buggy address:
[   16.700495]  fff00000c78d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.700687]  fff00000c78d8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.700938] >fff00000c78d9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.701134]                                                                 ^
[   16.701241]  fff00000c78d9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.701430]  fff00000c78d9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.701564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   16.663555] ==================================================================
[   16.663674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.664297] Write of size 128 at addr fff00000c1094f00 by task kunit_try_catch/170
[   16.664464] 
[   16.664568] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.664772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.664840] Hardware name: linux,dummy-virt (DT)
[   16.664930] Call trace:
[   16.664995]  show_stack+0x20/0x38 (C)
[   16.665122]  dump_stack_lvl+0x8c/0xd0
[   16.665223]  print_report+0x118/0x608
[   16.665318]  kasan_report+0xdc/0x128
[   16.665410]  kasan_check_range+0x100/0x1a8
[   16.665508]  __asan_memset+0x34/0x78
[   16.665602]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.665709]  kunit_try_run_case+0x170/0x3f0
[   16.665808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.665914]  kthread+0x328/0x630
[   16.665996]  ret_from_fork+0x10/0x20
[   16.666108] 
[   16.666151] Allocated by task 170:
[   16.666210]  kasan_save_stack+0x3c/0x68
[   16.666401]  kasan_save_track+0x20/0x40
[   16.666472]  kasan_save_alloc_info+0x40/0x58
[   16.666551]  __kasan_kmalloc+0xd4/0xd8
[   16.666635]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.666727]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.666848]  kunit_try_run_case+0x170/0x3f0
[   16.666946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.667079]  kthread+0x328/0x630
[   16.667154]  ret_from_fork+0x10/0x20
[   16.667233] 
[   16.667277] The buggy address belongs to the object at fff00000c1094f00
[   16.667277]  which belongs to the cache kmalloc-128 of size 128
[   16.667390] The buggy address is located 0 bytes inside of
[   16.667390]  allocated 120-byte region [fff00000c1094f00, fff00000c1094f78)
[   16.667713] 
[   16.667832] The buggy address belongs to the physical page:
[   16.668208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.668520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.668640] page_type: f5(slab)
[   16.668992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.669509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.669804] page dumped because: kasan: bad access detected
[   16.669989] 
[   16.670072] Memory state around the buggy address:
[   16.670178]  fff00000c1094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.670308]  fff00000c1094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.670545] >fff00000c1094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.670655]                                                                 ^
[   16.670734]  fff00000c1094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.670817]  fff00000c1095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.670893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   16.640679] ==================================================================
[   16.640797] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.640905] Read of size 16 at addr fff00000c10cc820 by task kunit_try_catch/168
[   16.641011] 
[   16.641085] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.641259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.641313] Hardware name: linux,dummy-virt (DT)
[   16.641374] Call trace:
[   16.641417]  show_stack+0x20/0x38 (C)
[   16.641518]  dump_stack_lvl+0x8c/0xd0
[   16.641617]  print_report+0x118/0x608
[   16.641709]  kasan_report+0xdc/0x128
[   16.641808]  __asan_report_load16_noabort+0x20/0x30
[   16.642553]  kmalloc_uaf_16+0x3bc/0x438
[   16.642678]  kunit_try_run_case+0x170/0x3f0
[   16.642784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.642895]  kthread+0x328/0x630
[   16.642998]  ret_from_fork+0x10/0x20
[   16.643146] 
[   16.643191] Allocated by task 168:
[   16.643358]  kasan_save_stack+0x3c/0x68
[   16.643451]  kasan_save_track+0x20/0x40
[   16.643516]  kasan_save_alloc_info+0x40/0x58
[   16.643579]  __kasan_kmalloc+0xd4/0xd8
[   16.643645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.643713]  kmalloc_uaf_16+0x140/0x438
[   16.643780]  kunit_try_run_case+0x170/0x3f0
[   16.643851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643939]  kthread+0x328/0x630
[   16.644407]  ret_from_fork+0x10/0x20
[   16.644691] 
[   16.644754] Freed by task 168:
[   16.644834]  kasan_save_stack+0x3c/0x68
[   16.644916]  kasan_save_track+0x20/0x40
[   16.644990]  kasan_save_free_info+0x4c/0x78
[   16.645082]  __kasan_slab_free+0x6c/0x98
[   16.645153]  kfree+0x214/0x3c8
[   16.645220]  kmalloc_uaf_16+0x190/0x438
[   16.645296]  kunit_try_run_case+0x170/0x3f0
[   16.645369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.645454]  kthread+0x328/0x630
[   16.645524]  ret_from_fork+0x10/0x20
[   16.645596] 
[   16.645645] The buggy address belongs to the object at fff00000c10cc820
[   16.645645]  which belongs to the cache kmalloc-16 of size 16
[   16.645816] The buggy address is located 0 bytes inside of
[   16.645816]  freed 16-byte region [fff00000c10cc820, fff00000c10cc830)
[   16.645985] 
[   16.646026] The buggy address belongs to the physical page:
[   16.646459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   16.646589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.646866] page_type: f5(slab)
[   16.646955] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.647114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.647221] page dumped because: kasan: bad access detected
[   16.647285] 
[   16.647319] Memory state around the buggy address:
[   16.647383]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   16.647494]  fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.647594] >fff00000c10cc800: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   16.647664]                                ^
[   16.647725]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648053]  fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   16.612650] ==================================================================
[   16.612835] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   16.612943] Write of size 16 at addr fff00000c10cc7c0 by task kunit_try_catch/166
[   16.613088] 
[   16.613177] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.613394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.613442] Hardware name: linux,dummy-virt (DT)
[   16.613501] Call trace:
[   16.613542]  show_stack+0x20/0x38 (C)
[   16.613715]  dump_stack_lvl+0x8c/0xd0
[   16.613805]  print_report+0x118/0x608
[   16.613898]  kasan_report+0xdc/0x128
[   16.614063]  __asan_report_store16_noabort+0x20/0x30
[   16.614178]  kmalloc_oob_16+0x3a0/0x3f8
[   16.614292]  kunit_try_run_case+0x170/0x3f0
[   16.614418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.614649]  kthread+0x328/0x630
[   16.614767]  ret_from_fork+0x10/0x20
[   16.614874] 
[   16.614936] Allocated by task 166:
[   16.615017]  kasan_save_stack+0x3c/0x68
[   16.615114]  kasan_save_track+0x20/0x40
[   16.615188]  kasan_save_alloc_info+0x40/0x58
[   16.615287]  __kasan_kmalloc+0xd4/0xd8
[   16.615359]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.615471]  kmalloc_oob_16+0xb4/0x3f8
[   16.615549]  kunit_try_run_case+0x170/0x3f0
[   16.615622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.615706]  kthread+0x328/0x630
[   16.615774]  ret_from_fork+0x10/0x20
[   16.615846] 
[   16.615884] The buggy address belongs to the object at fff00000c10cc7c0
[   16.615884]  which belongs to the cache kmalloc-16 of size 16
[   16.616002] The buggy address is located 0 bytes inside of
[   16.616002]  allocated 13-byte region [fff00000c10cc7c0, fff00000c10cc7cd)
[   16.616123] 
[   16.616162] The buggy address belongs to the physical page:
[   16.616786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   16.616991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.617116] page_type: f5(slab)
[   16.617498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.617859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.618115] page dumped because: kasan: bad access detected
[   16.618189] 
[   16.618227] Memory state around the buggy address:
[   16.618296]  fff00000c10cc680: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   16.618594]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   16.618731] >fff00000c10cc780: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   16.618800]                                               ^
[   16.619108]  fff00000c10cc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.619347]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.619509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   16.588984] ==================================================================
[   16.589137] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.589241] Read of size 1 at addr fff00000c450a600 by task kunit_try_catch/164
[   16.589338] 
[   16.589394] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.590013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.590166] Hardware name: linux,dummy-virt (DT)
[   16.590250] Call trace:
[   16.590299]  show_stack+0x20/0x38 (C)
[   16.590408]  dump_stack_lvl+0x8c/0xd0
[   16.590492]  print_report+0x118/0x608
[   16.590572]  kasan_report+0xdc/0x128
[   16.590657]  __kasan_check_byte+0x54/0x70
[   16.590753]  krealloc_noprof+0x44/0x360
[   16.590848]  krealloc_uaf+0x180/0x520
[   16.590938]  kunit_try_run_case+0x170/0x3f0
[   16.591033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.591371]  kthread+0x328/0x630
[   16.591672]  ret_from_fork+0x10/0x20
[   16.591776] 
[   16.591818] Allocated by task 164:
[   16.591882]  kasan_save_stack+0x3c/0x68
[   16.592224]  kasan_save_track+0x20/0x40
[   16.592455]  kasan_save_alloc_info+0x40/0x58
[   16.592597]  __kasan_kmalloc+0xd4/0xd8
[   16.592709]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.592782]  krealloc_uaf+0xc8/0x520
[   16.593189]  kunit_try_run_case+0x170/0x3f0
[   16.593283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.593581]  kthread+0x328/0x630
[   16.593661]  ret_from_fork+0x10/0x20
[   16.594007] 
[   16.594240] Freed by task 164:
[   16.594323]  kasan_save_stack+0x3c/0x68
[   16.594472]  kasan_save_track+0x20/0x40
[   16.594552]  kasan_save_free_info+0x4c/0x78
[   16.594822]  __kasan_slab_free+0x6c/0x98
[   16.594896]  kfree+0x214/0x3c8
[   16.594972]  krealloc_uaf+0x12c/0x520
[   16.595054]  kunit_try_run_case+0x170/0x3f0
[   16.595134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.595591]  kthread+0x328/0x630
[   16.595687]  ret_from_fork+0x10/0x20
[   16.595833] 
[   16.595874] The buggy address belongs to the object at fff00000c450a600
[   16.595874]  which belongs to the cache kmalloc-256 of size 256
[   16.596442] The buggy address is located 0 bytes inside of
[   16.596442]  freed 256-byte region [fff00000c450a600, fff00000c450a700)
[   16.596653] 
[   16.596699] The buggy address belongs to the physical page:
[   16.596926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.597133] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.597232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.597330] page_type: f5(slab)
[   16.597408] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.597513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.598561] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.598742] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.598857] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.598959] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.599056] page dumped because: kasan: bad access detected
[   16.599163] 
[   16.599218] Memory state around the buggy address:
[   16.599285]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599373]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599453] >fff00000c450a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.599540]                    ^
[   16.599622]  fff00000c450a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.599711]  fff00000c450a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599789] ==================================================================
[   16.600690] ==================================================================
[   16.600786] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.600925] Read of size 1 at addr fff00000c450a600 by task kunit_try_catch/164
[   16.601028] 
[   16.601115] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.601325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.601402] Hardware name: linux,dummy-virt (DT)
[   16.601505] Call trace:
[   16.601573]  show_stack+0x20/0x38 (C)
[   16.601679]  dump_stack_lvl+0x8c/0xd0
[   16.601808]  print_report+0x118/0x608
[   16.601913]  kasan_report+0xdc/0x128
[   16.602049]  __asan_report_load1_noabort+0x20/0x30
[   16.602165]  krealloc_uaf+0x4c8/0x520
[   16.602268]  kunit_try_run_case+0x170/0x3f0
[   16.602352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.602451]  kthread+0x328/0x630
[   16.602528]  ret_from_fork+0x10/0x20
[   16.602676] 
[   16.602723] Allocated by task 164:
[   16.602780]  kasan_save_stack+0x3c/0x68
[   16.602858]  kasan_save_track+0x20/0x40
[   16.602921]  kasan_save_alloc_info+0x40/0x58
[   16.602990]  __kasan_kmalloc+0xd4/0xd8
[   16.603074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.603191]  krealloc_uaf+0xc8/0x520
[   16.603289]  kunit_try_run_case+0x170/0x3f0
[   16.603364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.603456]  kthread+0x328/0x630
[   16.603556]  ret_from_fork+0x10/0x20
[   16.603650] 
[   16.603705] Freed by task 164:
[   16.603781]  kasan_save_stack+0x3c/0x68
[   16.603872]  kasan_save_track+0x20/0x40
[   16.603941]  kasan_save_free_info+0x4c/0x78
[   16.604037]  __kasan_slab_free+0x6c/0x98
[   16.604315]  kfree+0x214/0x3c8
[   16.604394]  krealloc_uaf+0x12c/0x520
[   16.604463]  kunit_try_run_case+0x170/0x3f0
[   16.604536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.604622]  kthread+0x328/0x630
[   16.604784]  ret_from_fork+0x10/0x20
[   16.604846] 
[   16.604885] The buggy address belongs to the object at fff00000c450a600
[   16.604885]  which belongs to the cache kmalloc-256 of size 256
[   16.605009] The buggy address is located 0 bytes inside of
[   16.605009]  freed 256-byte region [fff00000c450a600, fff00000c450a700)
[   16.605184] 
[   16.605225] The buggy address belongs to the physical page:
[   16.605291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.605419] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.605542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.605675] page_type: f5(slab)
[   16.605772] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.605910] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.605969] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.606015] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.606095] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.606141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.606178] page dumped because: kasan: bad access detected
[   16.606207] 
[   16.606225] Memory state around the buggy address:
[   16.606254]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.606293]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.606332] >fff00000c450a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.606365]                    ^
[   16.606391]  fff00000c450a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.606429]  fff00000c450a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.606463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   16.476973] ==================================================================
[   16.477074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.477170] Write of size 1 at addr fff00000c450a4d0 by task kunit_try_catch/158
[   16.477273] 
[   16.477332] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.477503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.477558] Hardware name: linux,dummy-virt (DT)
[   16.477617] Call trace:
[   16.477660]  show_stack+0x20/0x38 (C)
[   16.477760]  dump_stack_lvl+0x8c/0xd0
[   16.477859]  print_report+0x118/0x608
[   16.477967]  kasan_report+0xdc/0x128
[   16.478092]  __asan_report_store1_noabort+0x20/0x30
[   16.478190]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.478287]  krealloc_less_oob+0x20/0x38
[   16.478387]  kunit_try_run_case+0x170/0x3f0
[   16.478480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.478577]  kthread+0x328/0x630
[   16.478668]  ret_from_fork+0x10/0x20
[   16.478774] 
[   16.478816] Allocated by task 158:
[   16.478879]  kasan_save_stack+0x3c/0x68
[   16.478955]  kasan_save_track+0x20/0x40
[   16.479035]  kasan_save_alloc_info+0x40/0x58
[   16.479167]  __kasan_krealloc+0x118/0x178
[   16.479250]  krealloc_noprof+0x128/0x360
[   16.479336]  krealloc_less_oob_helper+0x168/0xc50
[   16.479418]  krealloc_less_oob+0x20/0x38
[   16.479520]  kunit_try_run_case+0x170/0x3f0
[   16.479602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.479679]  kthread+0x328/0x630
[   16.479744]  ret_from_fork+0x10/0x20
[   16.479806] 
[   16.479840] The buggy address belongs to the object at fff00000c450a400
[   16.479840]  which belongs to the cache kmalloc-256 of size 256
[   16.479941] The buggy address is located 7 bytes to the right of
[   16.479941]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.480087] 
[   16.480130] The buggy address belongs to the physical page:
[   16.480187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.480290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.480382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.480483] page_type: f5(slab)
[   16.480599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.480710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.480806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.480903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.481008] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.481123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.481217] page dumped because: kasan: bad access detected
[   16.481275] 
[   16.481310] Memory state around the buggy address:
[   16.481366]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481440]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.481529] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.481597]                                                  ^
[   16.481703]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481807]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481935] ==================================================================
[   16.555254] ==================================================================
[   16.555405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.555555] Write of size 1 at addr fff00000c78e20da by task kunit_try_catch/162
[   16.555678] 
[   16.555742] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.555924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.555980] Hardware name: linux,dummy-virt (DT)
[   16.556051] Call trace:
[   16.556091]  show_stack+0x20/0x38 (C)
[   16.556176]  dump_stack_lvl+0x8c/0xd0
[   16.556301]  print_report+0x118/0x608
[   16.556413]  kasan_report+0xdc/0x128
[   16.556512]  __asan_report_store1_noabort+0x20/0x30
[   16.556606]  krealloc_less_oob_helper+0xa80/0xc50
[   16.556982]  krealloc_large_less_oob+0x20/0x38
[   16.557263]  kunit_try_run_case+0x170/0x3f0
[   16.557357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.557502]  kthread+0x328/0x630
[   16.557597]  ret_from_fork+0x10/0x20
[   16.557725] 
[   16.557761] The buggy address belongs to the physical page:
[   16.557833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.558304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.558399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.558487] page_type: f8(unknown)
[   16.558527] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558583] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558632] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558676] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558720] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.558764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.558801] page dumped because: kasan: bad access detected
[   16.558830] 
[   16.558848] Memory state around the buggy address:
[   16.558878]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.558918]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.558956] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.558990]                                                     ^
[   16.559024]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559086]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559122] ==================================================================
[   16.483220] ==================================================================
[   16.483315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.483412] Write of size 1 at addr fff00000c450a4da by task kunit_try_catch/158
[   16.483514] 
[   16.483573] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.484189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.484269] Hardware name: linux,dummy-virt (DT)
[   16.484338] Call trace:
[   16.484388]  show_stack+0x20/0x38 (C)
[   16.484628]  dump_stack_lvl+0x8c/0xd0
[   16.484858]  print_report+0x118/0x608
[   16.485065]  kasan_report+0xdc/0x128
[   16.485485]  __asan_report_store1_noabort+0x20/0x30
[   16.485731]  krealloc_less_oob_helper+0xa80/0xc50
[   16.485948]  krealloc_less_oob+0x20/0x38
[   16.486031]  kunit_try_run_case+0x170/0x3f0
[   16.486137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.486323]  kthread+0x328/0x630
[   16.486663]  ret_from_fork+0x10/0x20
[   16.486766] 
[   16.486887] Allocated by task 158:
[   16.486950]  kasan_save_stack+0x3c/0x68
[   16.487089]  kasan_save_track+0x20/0x40
[   16.487189]  kasan_save_alloc_info+0x40/0x58
[   16.487310]  __kasan_krealloc+0x118/0x178
[   16.487388]  krealloc_noprof+0x128/0x360
[   16.487461]  krealloc_less_oob_helper+0x168/0xc50
[   16.487538]  krealloc_less_oob+0x20/0x38
[   16.487609]  kunit_try_run_case+0x170/0x3f0
[   16.487681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.487765]  kthread+0x328/0x630
[   16.487831]  ret_from_fork+0x10/0x20
[   16.487900] 
[   16.487940] The buggy address belongs to the object at fff00000c450a400
[   16.487940]  which belongs to the cache kmalloc-256 of size 256
[   16.488068] The buggy address is located 17 bytes to the right of
[   16.488068]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.488206] 
[   16.488252] The buggy address belongs to the physical page:
[   16.488338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.488496] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.488593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.488704] page_type: f5(slab)
[   16.488811] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.488957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489067] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489250] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.489344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.489412] page dumped because: kasan: bad access detected
[   16.489470] 
[   16.489501] Memory state around the buggy address:
[   16.489567]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489655]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.489735] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.489812]                                                     ^
[   16.489901]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.489997]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490088] ==================================================================
[   16.559460] ==================================================================
[   16.559555] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.559661] Write of size 1 at addr fff00000c78e20ea by task kunit_try_catch/162
[   16.559768] 
[   16.559828] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.560002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.560067] Hardware name: linux,dummy-virt (DT)
[   16.560132] Call trace:
[   16.560179]  show_stack+0x20/0x38 (C)
[   16.560282]  dump_stack_lvl+0x8c/0xd0
[   16.560384]  print_report+0x118/0x608
[   16.560480]  kasan_report+0xdc/0x128
[   16.561090]  __asan_report_store1_noabort+0x20/0x30
[   16.562150]  krealloc_less_oob_helper+0xae4/0xc50
[   16.562538]  krealloc_large_less_oob+0x20/0x38
[   16.562651]  kunit_try_run_case+0x170/0x3f0
[   16.563381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.564090]  kthread+0x328/0x630
[   16.564616]  ret_from_fork+0x10/0x20
[   16.565091] 
[   16.565137] The buggy address belongs to the physical page:
[   16.565641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.566242] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.566406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.566569] page_type: f8(unknown)
[   16.566684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.566957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.567667] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.567806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.567916] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.568024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.568125] page dumped because: kasan: bad access detected
[   16.568193] 
[   16.568712] Memory state around the buggy address:
[   16.568991]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.569794]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.570002] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.570304]                                                           ^
[   16.570400]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570499]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.570581] ==================================================================
[   16.490863] ==================================================================
[   16.491211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.491321] Write of size 1 at addr fff00000c450a4ea by task kunit_try_catch/158
[   16.491425] 
[   16.491483] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.491647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491703] Hardware name: linux,dummy-virt (DT)
[   16.491843] Call trace:
[   16.491893]  show_stack+0x20/0x38 (C)
[   16.492068]  dump_stack_lvl+0x8c/0xd0
[   16.492264]  print_report+0x118/0x608
[   16.492365]  kasan_report+0xdc/0x128
[   16.492521]  __asan_report_store1_noabort+0x20/0x30
[   16.492634]  krealloc_less_oob_helper+0xae4/0xc50
[   16.492740]  krealloc_less_oob+0x20/0x38
[   16.493203]  kunit_try_run_case+0x170/0x3f0
[   16.493333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.493437]  kthread+0x328/0x630
[   16.493532]  ret_from_fork+0x10/0x20
[   16.493629] 
[   16.493667] Allocated by task 158:
[   16.493723]  kasan_save_stack+0x3c/0x68
[   16.493805]  kasan_save_track+0x20/0x40
[   16.493878]  kasan_save_alloc_info+0x40/0x58
[   16.493971]  __kasan_krealloc+0x118/0x178
[   16.494310]  krealloc_noprof+0x128/0x360
[   16.494501]  krealloc_less_oob_helper+0x168/0xc50
[   16.494550]  krealloc_less_oob+0x20/0x38
[   16.494598]  kunit_try_run_case+0x170/0x3f0
[   16.494656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.494758]  kthread+0x328/0x630
[   16.494854]  ret_from_fork+0x10/0x20
[   16.494929] 
[   16.494964] The buggy address belongs to the object at fff00000c450a400
[   16.494964]  which belongs to the cache kmalloc-256 of size 256
[   16.495109] The buggy address is located 33 bytes to the right of
[   16.495109]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.495233] 
[   16.495269] The buggy address belongs to the physical page:
[   16.495327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.495622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.495733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.495887] page_type: f5(slab)
[   16.495976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.496092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.496203] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.496312] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.496408] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.496513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.496601] page dumped because: kasan: bad access detected
[   16.496667] 
[   16.496706] Memory state around the buggy address:
[   16.496779]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.496867]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.496955] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.497259]                                                           ^
[   16.497455]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.497542]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.497653] ==================================================================
[   16.498631] ==================================================================
[   16.498730] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.498830] Write of size 1 at addr fff00000c450a4eb by task kunit_try_catch/158
[   16.498935] 
[   16.498994] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.499184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.499241] Hardware name: linux,dummy-virt (DT)
[   16.499303] Call trace:
[   16.499347]  show_stack+0x20/0x38 (C)
[   16.499450]  dump_stack_lvl+0x8c/0xd0
[   16.499552]  print_report+0x118/0x608
[   16.499646]  kasan_report+0xdc/0x128
[   16.499739]  __asan_report_store1_noabort+0x20/0x30
[   16.499843]  krealloc_less_oob_helper+0xa58/0xc50
[   16.499943]  krealloc_less_oob+0x20/0x38
[   16.500038]  kunit_try_run_case+0x170/0x3f0
[   16.500786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.500934]  kthread+0x328/0x630
[   16.501835]  ret_from_fork+0x10/0x20
[   16.501968] 
[   16.502024] Allocated by task 158:
[   16.502118]  kasan_save_stack+0x3c/0x68
[   16.502212]  kasan_save_track+0x20/0x40
[   16.502288]  kasan_save_alloc_info+0x40/0x58
[   16.502365]  __kasan_krealloc+0x118/0x178
[   16.502440]  krealloc_noprof+0x128/0x360
[   16.502512]  krealloc_less_oob_helper+0x168/0xc50
[   16.502598]  krealloc_less_oob+0x20/0x38
[   16.502664]  kunit_try_run_case+0x170/0x3f0
[   16.502724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.502796]  kthread+0x328/0x630
[   16.502862]  ret_from_fork+0x10/0x20
[   16.503301] 
[   16.503356] The buggy address belongs to the object at fff00000c450a400
[   16.503356]  which belongs to the cache kmalloc-256 of size 256
[   16.503927] The buggy address is located 34 bytes to the right of
[   16.503927]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.504201] 
[   16.504252] The buggy address belongs to the physical page:
[   16.504315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.504759] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.504948] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.505164] page_type: f5(slab)
[   16.505274] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505755] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.506269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.506395] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.506544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.506681] page dumped because: kasan: bad access detected
[   16.506778] 
[   16.506966] Memory state around the buggy address:
[   16.507072]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507163]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.507242] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.507312]                                                           ^
[   16.507814]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.508154]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.508275] ==================================================================
[   16.549211] ==================================================================
[   16.549422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.549633] Write of size 1 at addr fff00000c78e20d0 by task kunit_try_catch/162
[   16.549739] 
[   16.549827] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.550023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.550122] Hardware name: linux,dummy-virt (DT)
[   16.550207] Call trace:
[   16.550249]  show_stack+0x20/0x38 (C)
[   16.550364]  dump_stack_lvl+0x8c/0xd0
[   16.550506]  print_report+0x118/0x608
[   16.550618]  kasan_report+0xdc/0x128
[   16.550798]  __asan_report_store1_noabort+0x20/0x30
[   16.550894]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.550991]  krealloc_large_less_oob+0x20/0x38
[   16.551138]  kunit_try_run_case+0x170/0x3f0
[   16.551252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551634]  kthread+0x328/0x630
[   16.551726]  ret_from_fork+0x10/0x20
[   16.551817] 
[   16.551851] The buggy address belongs to the physical page:
[   16.551927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.552053] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.552194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.552345] page_type: f8(unknown)
[   16.552455] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552731] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552989] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.553101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.553184] page dumped because: kasan: bad access detected
[   16.553288] 
[   16.553324] Memory state around the buggy address:
[   16.553526]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553655]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553916] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.554035]                                                  ^
[   16.554211]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.554307]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.554393] ==================================================================
[   16.571798] ==================================================================
[   16.571892] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.571992] Write of size 1 at addr fff00000c78e20eb by task kunit_try_catch/162
[   16.572108] 
[   16.572170] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.572344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.572401] Hardware name: linux,dummy-virt (DT)
[   16.572468] Call trace:
[   16.572515]  show_stack+0x20/0x38 (C)
[   16.572616]  dump_stack_lvl+0x8c/0xd0
[   16.572716]  print_report+0x118/0x608
[   16.572811]  kasan_report+0xdc/0x128
[   16.572910]  __asan_report_store1_noabort+0x20/0x30
[   16.573019]  krealloc_less_oob_helper+0xa58/0xc50
[   16.573136]  krealloc_large_less_oob+0x20/0x38
[   16.573237]  kunit_try_run_case+0x170/0x3f0
[   16.573336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.573450]  kthread+0x328/0x630
[   16.573553]  ret_from_fork+0x10/0x20
[   16.573648] 
[   16.573687] The buggy address belongs to the physical page:
[   16.573786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.573967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.574125] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.574279] page_type: f8(unknown)
[   16.574377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.574466] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.574554] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.574651] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.574752] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.574885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.574958] page dumped because: kasan: bad access detected
[   16.575021] 
[   16.575519] Memory state around the buggy address:
[   16.575639]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.575870]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.576066] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.576191]                                                           ^
[   16.576280]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.576372]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.576455] ==================================================================
[   16.539885] ==================================================================
[   16.539997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.540118] Write of size 1 at addr fff00000c78e20c9 by task kunit_try_catch/162
[   16.540212] 
[   16.540647] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.541156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.541227] Hardware name: linux,dummy-virt (DT)
[   16.541285] Call trace:
[   16.541336]  show_stack+0x20/0x38 (C)
[   16.541483]  dump_stack_lvl+0x8c/0xd0
[   16.541616]  print_report+0x118/0x608
[   16.541745]  kasan_report+0xdc/0x128
[   16.541867]  __asan_report_store1_noabort+0x20/0x30
[   16.542151]  krealloc_less_oob_helper+0xa48/0xc50
[   16.542545]  krealloc_large_less_oob+0x20/0x38
[   16.542645]  kunit_try_run_case+0x170/0x3f0
[   16.542877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.543207]  kthread+0x328/0x630
[   16.543394]  ret_from_fork+0x10/0x20
[   16.543514] 
[   16.543674] The buggy address belongs to the physical page:
[   16.543763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.543874] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.544238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.544495] page_type: f8(unknown)
[   16.544735] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.544916] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.545096] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.545545] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.547117] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.547201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.547240] page dumped because: kasan: bad access detected
[   16.547274] 
[   16.547293] Memory state around the buggy address:
[   16.547332]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.547403]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.547645] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.547875]                                               ^
[   16.548020]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.548309]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.548426] ==================================================================
[   16.471012] ==================================================================
[   16.471172] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.471306] Write of size 1 at addr fff00000c450a4c9 by task kunit_try_catch/158
[   16.471436] 
[   16.471521] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.471704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471754] Hardware name: linux,dummy-virt (DT)
[   16.471811] Call trace:
[   16.471855]  show_stack+0x20/0x38 (C)
[   16.471937]  dump_stack_lvl+0x8c/0xd0
[   16.472022]  print_report+0x118/0x608
[   16.472121]  kasan_report+0xdc/0x128
[   16.472223]  __asan_report_store1_noabort+0x20/0x30
[   16.472342]  krealloc_less_oob_helper+0xa48/0xc50
[   16.472474]  krealloc_less_oob+0x20/0x38
[   16.472587]  kunit_try_run_case+0x170/0x3f0
[   16.472701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472876]  kthread+0x328/0x630
[   16.472941]  ret_from_fork+0x10/0x20
[   16.472988] 
[   16.473007] Allocated by task 158:
[   16.473034]  kasan_save_stack+0x3c/0x68
[   16.473128]  kasan_save_track+0x20/0x40
[   16.473202]  kasan_save_alloc_info+0x40/0x58
[   16.473280]  __kasan_krealloc+0x118/0x178
[   16.473382]  krealloc_noprof+0x128/0x360
[   16.473491]  krealloc_less_oob_helper+0x168/0xc50
[   16.473569]  krealloc_less_oob+0x20/0x38
[   16.473639]  kunit_try_run_case+0x170/0x3f0
[   16.473711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.473795]  kthread+0x328/0x630
[   16.473866]  ret_from_fork+0x10/0x20
[   16.473976] 
[   16.474014] The buggy address belongs to the object at fff00000c450a400
[   16.474014]  which belongs to the cache kmalloc-256 of size 256
[   16.474139] The buggy address is located 0 bytes to the right of
[   16.474139]  allocated 201-byte region [fff00000c450a400, fff00000c450a4c9)
[   16.474248] 
[   16.474285] The buggy address belongs to the physical page:
[   16.474343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.474453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.474583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.474712] page_type: f5(slab)
[   16.474823] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.474952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475100] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.475203] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475293] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.475373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.475473] page dumped because: kasan: bad access detected
[   16.475534] 
[   16.475568] Memory state around the buggy address:
[   16.475621]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475699]  fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.475774] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.475848]                                               ^
[   16.475913]  fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476008]  fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   16.518442] ==================================================================
[   16.518569] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.518675] Write of size 1 at addr fff00000c78e20eb by task kunit_try_catch/160
[   16.518783] 
[   16.518844] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.519009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.519071] Hardware name: linux,dummy-virt (DT)
[   16.519134] Call trace:
[   16.519176]  show_stack+0x20/0x38 (C)
[   16.519265]  dump_stack_lvl+0x8c/0xd0
[   16.519348]  print_report+0x118/0x608
[   16.519428]  kasan_report+0xdc/0x128
[   16.519513]  __asan_report_store1_noabort+0x20/0x30
[   16.519619]  krealloc_more_oob_helper+0x60c/0x678
[   16.519719]  krealloc_large_more_oob+0x20/0x38
[   16.519820]  kunit_try_run_case+0x170/0x3f0
[   16.520081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.520201]  kthread+0x328/0x630
[   16.520532]  ret_from_fork+0x10/0x20
[   16.520698] 
[   16.520746] The buggy address belongs to the physical page:
[   16.520811] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.520926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.521017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.521452] page_type: f8(unknown)
[   16.521558] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.521657] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.521755] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.522036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.522196] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.522307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.522390] page dumped because: kasan: bad access detected
[   16.522451] 
[   16.522486] Memory state around the buggy address:
[   16.522549]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.522640]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.522719] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.522792]                                                           ^
[   16.522896]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.523197]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.523311] ==================================================================
[   16.442994] ==================================================================
[   16.443113] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.443284] Write of size 1 at addr fff00000c450a2f0 by task kunit_try_catch/156
[   16.443739] 
[   16.443814] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.444085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.444148] Hardware name: linux,dummy-virt (DT)
[   16.444274] Call trace:
[   16.444322]  show_stack+0x20/0x38 (C)
[   16.444609]  dump_stack_lvl+0x8c/0xd0
[   16.444920]  print_report+0x118/0x608
[   16.445019]  kasan_report+0xdc/0x128
[   16.445126]  __asan_report_store1_noabort+0x20/0x30
[   16.445229]  krealloc_more_oob_helper+0x5c0/0x678
[   16.445321]  krealloc_more_oob+0x20/0x38
[   16.445416]  kunit_try_run_case+0x170/0x3f0
[   16.445515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.445623]  kthread+0x328/0x630
[   16.446299]  ret_from_fork+0x10/0x20
[   16.446617] 
[   16.447000] Allocated by task 156:
[   16.447088]  kasan_save_stack+0x3c/0x68
[   16.447300]  kasan_save_track+0x20/0x40
[   16.447440]  kasan_save_alloc_info+0x40/0x58
[   16.447521]  __kasan_krealloc+0x118/0x178
[   16.447612]  krealloc_noprof+0x128/0x360
[   16.447683]  krealloc_more_oob_helper+0x168/0x678
[   16.447987]  krealloc_more_oob+0x20/0x38
[   16.448306]  kunit_try_run_case+0x170/0x3f0
[   16.448400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.448501]  kthread+0x328/0x630
[   16.448741]  ret_from_fork+0x10/0x20
[   16.448833] 
[   16.448883] The buggy address belongs to the object at fff00000c450a200
[   16.448883]  which belongs to the cache kmalloc-256 of size 256
[   16.449153] The buggy address is located 5 bytes to the right of
[   16.449153]  allocated 235-byte region [fff00000c450a200, fff00000c450a2eb)
[   16.449351] 
[   16.449397] The buggy address belongs to the physical page:
[   16.449510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.449621] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.449792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.449969] page_type: f5(slab)
[   16.450065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.450154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.450667] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.450933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.451161] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.451350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.451628] page dumped because: kasan: bad access detected
[   16.451903] 
[   16.451963] Memory state around the buggy address:
[   16.452111]  fff00000c450a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.452209]  fff00000c450a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.452468] >fff00000c450a280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.452619]                                                              ^
[   16.453013]  fff00000c450a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.453132]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.453215] ==================================================================
[   16.524667] ==================================================================
[   16.524801] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.525136] Write of size 1 at addr fff00000c78e20f0 by task kunit_try_catch/160
[   16.525237] 
[   16.525298] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.525475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.525531] Hardware name: linux,dummy-virt (DT)
[   16.525594] Call trace:
[   16.525638]  show_stack+0x20/0x38 (C)
[   16.525741]  dump_stack_lvl+0x8c/0xd0
[   16.525845]  print_report+0x118/0x608
[   16.525945]  kasan_report+0xdc/0x128
[   16.526091]  __asan_report_store1_noabort+0x20/0x30
[   16.526232]  krealloc_more_oob_helper+0x5c0/0x678
[   16.526350]  krealloc_large_more_oob+0x20/0x38
[   16.526489]  kunit_try_run_case+0x170/0x3f0
[   16.526644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.526796]  kthread+0x328/0x630
[   16.526912]  ret_from_fork+0x10/0x20
[   16.527031] 
[   16.527296] The buggy address belongs to the physical page:
[   16.527380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.527501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.527605] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.527803] page_type: f8(unknown)
[   16.527919] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.528052] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.528612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.528750] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.528866] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.529061] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.529152] page dumped because: kasan: bad access detected
[   16.529231] 
[   16.529286] Memory state around the buggy address:
[   16.529371]  fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.529460]  fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.529553] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.529635]                                                              ^
[   16.529719]  fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.529811]  fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.529928] ==================================================================
[   16.424868] ==================================================================
[   16.424988] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.426239] Write of size 1 at addr fff00000c450a2eb by task kunit_try_catch/156
[   16.426337] 
[   16.426407] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.426937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.427059] Hardware name: linux,dummy-virt (DT)
[   16.427121] Call trace:
[   16.427564]  show_stack+0x20/0x38 (C)
[   16.427754]  dump_stack_lvl+0x8c/0xd0
[   16.428433]  print_report+0x118/0x608
[   16.428856]  kasan_report+0xdc/0x128
[   16.429036]  __asan_report_store1_noabort+0x20/0x30
[   16.429152]  krealloc_more_oob_helper+0x60c/0x678
[   16.429857]  krealloc_more_oob+0x20/0x38
[   16.430378]  kunit_try_run_case+0x170/0x3f0
[   16.430556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.430866]  kthread+0x328/0x630
[   16.431172]  ret_from_fork+0x10/0x20
[   16.431285] 
[   16.431326] Allocated by task 156:
[   16.431386]  kasan_save_stack+0x3c/0x68
[   16.431461]  kasan_save_track+0x20/0x40
[   16.431536]  kasan_save_alloc_info+0x40/0x58
[   16.431615]  __kasan_krealloc+0x118/0x178
[   16.431688]  krealloc_noprof+0x128/0x360
[   16.432622]  krealloc_more_oob_helper+0x168/0x678
[   16.433183]  krealloc_more_oob+0x20/0x38
[   16.433346]  kunit_try_run_case+0x170/0x3f0
[   16.433428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.433828]  kthread+0x328/0x630
[   16.434251]  ret_from_fork+0x10/0x20
[   16.434379] 
[   16.434591] The buggy address belongs to the object at fff00000c450a200
[   16.434591]  which belongs to the cache kmalloc-256 of size 256
[   16.434942] The buggy address is located 0 bytes to the right of
[   16.434942]  allocated 235-byte region [fff00000c450a200, fff00000c450a2eb)
[   16.435351] 
[   16.435561] The buggy address belongs to the physical page:
[   16.435844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a
[   16.436214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.436472] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.436861] page_type: f5(slab)
[   16.437052] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.437249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.437599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.437989] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.438273] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff
[   16.438377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.438768] page dumped because: kasan: bad access detected
[   16.438968] 
[   16.439159] Memory state around the buggy address:
[   16.439305]  fff00000c450a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.439398]  fff00000c450a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.439898] >fff00000c450a280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.440291]                                                           ^
[   16.440507]  fff00000c450a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440599]  fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440910] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   16.397239] ==================================================================
[   16.397370] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   16.397631] Read of size 1 at addr fff00000c7910000 by task kunit_try_catch/154
[   16.397872] 
[   16.397940] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.398441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.398545] Hardware name: linux,dummy-virt (DT)
[   16.398627] Call trace:
[   16.398676]  show_stack+0x20/0x38 (C)
[   16.398999]  dump_stack_lvl+0x8c/0xd0
[   16.399141]  print_report+0x118/0x608
[   16.399235]  kasan_report+0xdc/0x128
[   16.399409]  __asan_report_load1_noabort+0x20/0x30
[   16.399505]  page_alloc_uaf+0x328/0x350
[   16.399651]  kunit_try_run_case+0x170/0x3f0
[   16.399899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.400138]  kthread+0x328/0x630
[   16.400371]  ret_from_fork+0x10/0x20
[   16.400888] 
[   16.400953] The buggy address belongs to the physical page:
[   16.401130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910
[   16.401384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.401706] page_type: f0(buddy)
[   16.401832] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000
[   16.402055] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   16.402158] page dumped because: kasan: bad access detected
[   16.402228] 
[   16.402267] Memory state around the buggy address:
[   16.402336]  fff00000c790ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402434]  fff00000c790ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402518] >fff00000c7910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402590]                    ^
[   16.402641]  fff00000c7910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402724]  fff00000c7910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402799] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   16.346830] ==================================================================
[   16.347006] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   16.347196] Free of addr fff00000c78dc001 by task kunit_try_catch/150
[   16.347893] 
[   16.348361] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.348587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.348734] Hardware name: linux,dummy-virt (DT)
[   16.348893] Call trace:
[   16.348966]  show_stack+0x20/0x38 (C)
[   16.349236]  dump_stack_lvl+0x8c/0xd0
[   16.349560]  print_report+0x118/0x608
[   16.349746]  kasan_report_invalid_free+0xc0/0xe8
[   16.349953]  __kasan_kfree_large+0x5c/0xa8
[   16.350175]  free_large_kmalloc+0x64/0x190
[   16.350323]  kfree+0x270/0x3c8
[   16.350439]  kmalloc_large_invalid_free+0x108/0x270
[   16.350594]  kunit_try_run_case+0x170/0x3f0
[   16.350909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.351108]  kthread+0x328/0x630
[   16.351558]  ret_from_fork+0x10/0x20
[   16.351787] 
[   16.351875] The buggy address belongs to the physical page:
[   16.352148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc
[   16.352371] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.352541] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.352985] page_type: f8(unknown)
[   16.353073] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.353513] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.353822] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.354089] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.354174] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff
[   16.354263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.355344] page dumped because: kasan: bad access detected
[   16.355709] 
[   16.355760] Memory state around the buggy address:
[   16.355830]  fff00000c78dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.355915]  fff00000c78dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.355999] >fff00000c78dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.356335]                    ^
[   16.356656]  fff00000c78dc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.356752]  fff00000c78dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.356936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   16.329849] ==================================================================
[   16.330014] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   16.330130] Read of size 1 at addr fff00000c78dc000 by task kunit_try_catch/148
[   16.330471] 
[   16.330540] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.330839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.330925] Hardware name: linux,dummy-virt (DT)
[   16.331126] Call trace:
[   16.331180]  show_stack+0x20/0x38 (C)
[   16.331537]  dump_stack_lvl+0x8c/0xd0
[   16.332067]  print_report+0x118/0x608
[   16.332339]  kasan_report+0xdc/0x128
[   16.332486]  __asan_report_load1_noabort+0x20/0x30
[   16.332591]  kmalloc_large_uaf+0x2cc/0x2f8
[   16.332697]  kunit_try_run_case+0x170/0x3f0
[   16.333177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.333402]  kthread+0x328/0x630
[   16.333581]  ret_from_fork+0x10/0x20
[   16.333689] 
[   16.333902] The buggy address belongs to the physical page:
[   16.333965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc
[   16.334090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.334508] raw: 0bfffe0000000000 ffffc1ffc31e3808 fff00000da47cc00 0000000000000000
[   16.334817] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.334913] page dumped because: kasan: bad access detected
[   16.334977] 
[   16.335017] Memory state around the buggy address:
[   16.335106]  fff00000c78dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.335354]  fff00000c78dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.335477] >fff00000c78dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.335558]                    ^
[   16.335622]  fff00000c78dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.336091]  fff00000c78dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.336186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   16.300858] ==================================================================
[   16.300993] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.301407] Write of size 1 at addr fff00000c78de00a by task kunit_try_catch/146
[   16.301627] 
[   16.301830] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.302364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.302425] Hardware name: linux,dummy-virt (DT)
[   16.302790] Call trace:
[   16.302955]  show_stack+0x20/0x38 (C)
[   16.303365]  dump_stack_lvl+0x8c/0xd0
[   16.303470]  print_report+0x118/0x608
[   16.304311]  kasan_report+0xdc/0x128
[   16.304456]  __asan_report_store1_noabort+0x20/0x30
[   16.304560]  kmalloc_large_oob_right+0x278/0x2b8
[   16.304657]  kunit_try_run_case+0x170/0x3f0
[   16.304767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.304910]  kthread+0x328/0x630
[   16.305031]  ret_from_fork+0x10/0x20
[   16.305165] 
[   16.305242] The buggy address belongs to the physical page:
[   16.305337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc
[   16.305489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.305617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.305773] page_type: f8(unknown)
[   16.305852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.305966] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.306077] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.306165] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.306261] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff
[   16.306356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.306436] page dumped because: kasan: bad access detected
[   16.306506] 
[   16.306546] Memory state around the buggy address:
[   16.306623]  fff00000c78ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.307538]  fff00000c78ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.307679] >fff00000c78de000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.307743]                       ^
[   16.307826]  fff00000c78de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.307905]  fff00000c78de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.307999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   16.280894] ==================================================================
[   16.281016] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   16.281291] Write of size 1 at addr fff00000c78b1f00 by task kunit_try_catch/144
[   16.281408] 
[   16.281490] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.281827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.282051] Hardware name: linux,dummy-virt (DT)
[   16.282121] Call trace:
[   16.282164]  show_stack+0x20/0x38 (C)
[   16.282271]  dump_stack_lvl+0x8c/0xd0
[   16.282464]  print_report+0x118/0x608
[   16.282548]  kasan_report+0xdc/0x128
[   16.282632]  __asan_report_store1_noabort+0x20/0x30
[   16.282908]  kmalloc_big_oob_right+0x2a4/0x2f0
[   16.283036]  kunit_try_run_case+0x170/0x3f0
[   16.283139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.283237]  kthread+0x328/0x630
[   16.283405]  ret_from_fork+0x10/0x20
[   16.283507] 
[   16.283549] Allocated by task 144:
[   16.283610]  kasan_save_stack+0x3c/0x68
[   16.283693]  kasan_save_track+0x20/0x40
[   16.283769]  kasan_save_alloc_info+0x40/0x58
[   16.283848]  __kasan_kmalloc+0xd4/0xd8
[   16.284115]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.284222]  kmalloc_big_oob_right+0xb8/0x2f0
[   16.284453]  kunit_try_run_case+0x170/0x3f0
[   16.284668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.284756]  kthread+0x328/0x630
[   16.284829]  ret_from_fork+0x10/0x20
[   16.284987] 
[   16.285132] The buggy address belongs to the object at fff00000c78b0000
[   16.285132]  which belongs to the cache kmalloc-8k of size 8192
[   16.285253] The buggy address is located 0 bytes to the right of
[   16.285253]  allocated 7936-byte region [fff00000c78b0000, fff00000c78b1f00)
[   16.285708] 
[   16.285786] The buggy address belongs to the physical page:
[   16.285867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   16.286021] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.286082] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.286185] page_type: f5(slab)
[   16.286294] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.286439] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.286587] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.286728] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.286874] head: 0bfffe0000000003 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   16.286980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.287109] page dumped because: kasan: bad access detected
[   16.287199] 
[   16.287253] Memory state around the buggy address:
[   16.287335]  fff00000c78b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.287409]  fff00000c78b1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.287478] >fff00000c78b1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287544]                    ^
[   16.287597]  fff00000c78b1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287706]  fff00000c78b2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   16.259582] ==================================================================
[   16.259681] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.259785] Write of size 1 at addr fff00000c1094e78 by task kunit_try_catch/142
[   16.259890] 
[   16.259950] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.261752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.261934] Hardware name: linux,dummy-virt (DT)
[   16.262003] Call trace:
[   16.262056]  show_stack+0x20/0x38 (C)
[   16.262167]  dump_stack_lvl+0x8c/0xd0
[   16.262275]  print_report+0x118/0x608
[   16.262377]  kasan_report+0xdc/0x128
[   16.262480]  __asan_report_store1_noabort+0x20/0x30
[   16.262604]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.262722]  kunit_try_run_case+0x170/0x3f0
[   16.262880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.263016]  kthread+0x328/0x630
[   16.263108]  ret_from_fork+0x10/0x20
[   16.263422] 
[   16.263486] Allocated by task 142:
[   16.263579]  kasan_save_stack+0x3c/0x68
[   16.263660]  kasan_save_track+0x20/0x40
[   16.263956]  kasan_save_alloc_info+0x40/0x58
[   16.264035]  __kasan_kmalloc+0xd4/0xd8
[   16.264117]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   16.264207]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.264359]  kunit_try_run_case+0x170/0x3f0
[   16.264499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.264669]  kthread+0x328/0x630
[   16.264772]  ret_from_fork+0x10/0x20
[   16.264936] 
[   16.265032] The buggy address belongs to the object at fff00000c1094e00
[   16.265032]  which belongs to the cache kmalloc-128 of size 128
[   16.265233] The buggy address is located 0 bytes to the right of
[   16.265233]  allocated 120-byte region [fff00000c1094e00, fff00000c1094e78)
[   16.265357] 
[   16.265399] The buggy address belongs to the physical page:
[   16.265466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.265775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.265869] page_type: f5(slab)
[   16.266036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.266114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.266158] page dumped because: kasan: bad access detected
[   16.266235] 
[   16.266284] Memory state around the buggy address:
[   16.266340]  fff00000c1094d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.266417]  fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.266700] >fff00000c1094e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.267123]                                                                 ^
[   16.267224]  fff00000c1094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.267320]  fff00000c1094f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.267829] ==================================================================
[   16.248395] ==================================================================
[   16.248510] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.248609] Write of size 1 at addr fff00000c1094d78 by task kunit_try_catch/142
[   16.248713] 
[   16.248773] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.248947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.249002] Hardware name: linux,dummy-virt (DT)
[   16.249078] Call trace:
[   16.249115]  show_stack+0x20/0x38 (C)
[   16.249206]  dump_stack_lvl+0x8c/0xd0
[   16.249556]  print_report+0x118/0x608
[   16.249842]  kasan_report+0xdc/0x128
[   16.250086]  __asan_report_store1_noabort+0x20/0x30
[   16.250306]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.250400]  kunit_try_run_case+0x170/0x3f0
[   16.250492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.250724]  kthread+0x328/0x630
[   16.251092]  ret_from_fork+0x10/0x20
[   16.251499] 
[   16.251544] Allocated by task 142:
[   16.251603]  kasan_save_stack+0x3c/0x68
[   16.251807]  kasan_save_track+0x20/0x40
[   16.251923]  kasan_save_alloc_info+0x40/0x58
[   16.252155]  __kasan_kmalloc+0xd4/0xd8
[   16.252312]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   16.252793]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.252901]  kunit_try_run_case+0x170/0x3f0
[   16.252994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.253159]  kthread+0x328/0x630
[   16.253251]  ret_from_fork+0x10/0x20
[   16.253416] 
[   16.253480] The buggy address belongs to the object at fff00000c1094d00
[   16.253480]  which belongs to the cache kmalloc-128 of size 128
[   16.253610] The buggy address is located 0 bytes to the right of
[   16.253610]  allocated 120-byte region [fff00000c1094d00, fff00000c1094d78)
[   16.253746] 
[   16.254031] The buggy address belongs to the physical page:
[   16.254117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.254352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.254609] page_type: f5(slab)
[   16.254725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.254817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.255126] page dumped because: kasan: bad access detected
[   16.255268] 
[   16.255319] Memory state around the buggy address:
[   16.255538]  fff00000c1094c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.255717]  fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.255824] >fff00000c1094d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.256047]                                                                 ^
[   16.256131]  fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256491]  fff00000c1094e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256718] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   16.221753] ==================================================================
[   16.221877] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.221984] Read of size 1 at addr fff00000c651b000 by task kunit_try_catch/140
[   16.222090] 
[   16.222154] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.222313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.222454] Hardware name: linux,dummy-virt (DT)
[   16.222682] Call trace:
[   16.222932]  show_stack+0x20/0x38 (C)
[   16.223094]  dump_stack_lvl+0x8c/0xd0
[   16.223261]  print_report+0x118/0x608
[   16.223355]  kasan_report+0xdc/0x128
[   16.223729]  __asan_report_load1_noabort+0x20/0x30
[   16.223854]  kmalloc_node_oob_right+0x2f4/0x330
[   16.223953]  kunit_try_run_case+0x170/0x3f0
[   16.224069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.224182]  kthread+0x328/0x630
[   16.224275]  ret_from_fork+0x10/0x20
[   16.224372] 
[   16.224412] Allocated by task 140:
[   16.224469]  kasan_save_stack+0x3c/0x68
[   16.225576]  kasan_save_track+0x20/0x40
[   16.226154]  kasan_save_alloc_info+0x40/0x58
[   16.226266]  __kasan_kmalloc+0xd4/0xd8
[   16.226346]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   16.226435]  kmalloc_node_oob_right+0xbc/0x330
[   16.226508]  kunit_try_run_case+0x170/0x3f0
[   16.226755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.226862]  kthread+0x328/0x630
[   16.226930]  ret_from_fork+0x10/0x20
[   16.227120] 
[   16.227181] The buggy address belongs to the object at fff00000c651a000
[   16.227181]  which belongs to the cache kmalloc-4k of size 4096
[   16.227360] The buggy address is located 0 bytes to the right of
[   16.227360]  allocated 4096-byte region [fff00000c651a000, fff00000c651b000)
[   16.227683] 
[   16.227736] The buggy address belongs to the physical page:
[   16.227880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106518
[   16.228438] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.229153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.229907] page_type: f5(slab)
[   16.229997] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.230365] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.230816] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.230956] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.231271] head: 0bfffe0000000003 ffffc1ffc3194601 00000000ffffffff 00000000ffffffff
[   16.231380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.231678] page dumped because: kasan: bad access detected
[   16.231784] 
[   16.231843] Memory state around the buggy address:
[   16.231935]  fff00000c651af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.232037]  fff00000c651af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.232137] >fff00000c651b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.232222]                    ^
[   16.232595]  fff00000c651b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.232690]  fff00000c651b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   16.198848] ==================================================================
[   16.199104] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.199224] Read of size 1 at addr fff00000c10cc79f by task kunit_try_catch/138
[   16.199331] 
[   16.199388] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.199557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.199603] Hardware name: linux,dummy-virt (DT)
[   16.199662] Call trace:
[   16.199706]  show_stack+0x20/0x38 (C)
[   16.199798]  dump_stack_lvl+0x8c/0xd0
[   16.199897]  print_report+0x118/0x608
[   16.200000]  kasan_report+0xdc/0x128
[   16.200112]  __asan_report_load1_noabort+0x20/0x30
[   16.200209]  kmalloc_oob_left+0x2ec/0x320
[   16.200309]  kunit_try_run_case+0x170/0x3f0
[   16.200401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.200491]  kthread+0x328/0x630
[   16.200574]  ret_from_fork+0x10/0x20
[   16.200666] 
[   16.200702] Allocated by task 26:
[   16.200759]  kasan_save_stack+0x3c/0x68
[   16.200834]  kasan_save_track+0x20/0x40
[   16.200904]  kasan_save_alloc_info+0x40/0x58
[   16.201014]  __kasan_kmalloc+0xd4/0xd8
[   16.201121]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   16.201224]  kstrdup+0x54/0xc8
[   16.201354]  devtmpfs_work_loop+0x6f8/0xa58
[   16.201474]  devtmpfsd+0x50/0x58
[   16.201579]  kthread+0x328/0x630
[   16.201677]  ret_from_fork+0x10/0x20
[   16.201781] 
[   16.201879] Freed by task 26:
[   16.202022]  kasan_save_stack+0x3c/0x68
[   16.202120]  kasan_save_track+0x20/0x40
[   16.202198]  kasan_save_free_info+0x4c/0x78
[   16.202275]  __kasan_slab_free+0x6c/0x98
[   16.202344]  kfree+0x214/0x3c8
[   16.202401]  devtmpfs_work_loop+0x804/0xa58
[   16.202470]  devtmpfsd+0x50/0x58
[   16.202543]  kthread+0x328/0x630
[   16.202620]  ret_from_fork+0x10/0x20
[   16.202701] 
[   16.202740] The buggy address belongs to the object at fff00000c10cc780
[   16.202740]  which belongs to the cache kmalloc-16 of size 16
[   16.202868] The buggy address is located 15 bytes to the right of
[   16.202868]  allocated 16-byte region [fff00000c10cc780, fff00000c10cc790)
[   16.203014] 
[   16.203065] The buggy address belongs to the physical page:
[   16.203137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc
[   16.203324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.203436] page_type: f5(slab)
[   16.203580] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.203920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.204118] page dumped because: kasan: bad access detected
[   16.204507] 
[   16.204553] Memory state around the buggy address:
[   16.204632]  fff00000c10cc680: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   16.204726]  fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc
[   16.204815] >fff00000c10cc780: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   16.204898]                             ^
[   16.204962]  fff00000c10cc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205061]  fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   16.167438] ==================================================================
[   16.167533] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.167638] Write of size 1 at addr fff00000c1094c78 by task kunit_try_catch/136
[   16.167740] 
[   16.167802] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.169012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.169112] Hardware name: linux,dummy-virt (DT)
[   16.169188] Call trace:
[   16.169235]  show_stack+0x20/0x38 (C)
[   16.169348]  dump_stack_lvl+0x8c/0xd0
[   16.169450]  print_report+0x118/0x608
[   16.169545]  kasan_report+0xdc/0x128
[   16.169639]  __asan_report_store1_noabort+0x20/0x30
[   16.169740]  kmalloc_oob_right+0x538/0x660
[   16.169839]  kunit_try_run_case+0x170/0x3f0
[   16.170928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.171159]  kthread+0x328/0x630
[   16.171280]  ret_from_fork+0x10/0x20
[   16.171385] 
[   16.171425] Allocated by task 136:
[   16.171484]  kasan_save_stack+0x3c/0x68
[   16.171566]  kasan_save_track+0x20/0x40
[   16.171651]  kasan_save_alloc_info+0x40/0x58
[   16.171738]  __kasan_kmalloc+0xd4/0xd8
[   16.171809]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.171933]  kmalloc_oob_right+0xb0/0x660
[   16.172016]  kunit_try_run_case+0x170/0x3f0
[   16.172106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.172195]  kthread+0x328/0x630
[   16.172270]  ret_from_fork+0x10/0x20
[   16.172344] 
[   16.172383] The buggy address belongs to the object at fff00000c1094c00
[   16.172383]  which belongs to the cache kmalloc-128 of size 128
[   16.172504] The buggy address is located 5 bytes to the right of
[   16.172504]  allocated 115-byte region [fff00000c1094c00, fff00000c1094c73)
[   16.172638] 
[   16.172682] The buggy address belongs to the physical page:
[   16.172747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.172859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.172963] page_type: f5(slab)
[   16.173055] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.173155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.173231] page dumped because: kasan: bad access detected
[   16.173287] 
[   16.173321] Memory state around the buggy address:
[   16.173386]  fff00000c1094b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.173476]  fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.173567] >fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.173646]                                                                 ^
[   16.173726]  fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.173811]  fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.173949] ==================================================================
[   16.159306] ==================================================================
[   16.159680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.160599] Write of size 1 at addr fff00000c1094c73 by task kunit_try_catch/136
[   16.160715] 
[   16.161543] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.161701] Tainted: [N]=TEST
[   16.161736] Hardware name: linux,dummy-virt (DT)
[   16.162037] Call trace:
[   16.162334]  show_stack+0x20/0x38 (C)
[   16.162595]  dump_stack_lvl+0x8c/0xd0
[   16.162722]  print_report+0x118/0x608
[   16.162812]  kasan_report+0xdc/0x128
[   16.162897]  __asan_report_store1_noabort+0x20/0x30
[   16.162972]  kmalloc_oob_right+0x5a4/0x660
[   16.163020]  kunit_try_run_case+0x170/0x3f0
[   16.163096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.163145]  kthread+0x328/0x630
[   16.163191]  ret_from_fork+0x10/0x20
[   16.163356] 
[   16.163398] Allocated by task 136:
[   16.163517]  kasan_save_stack+0x3c/0x68
[   16.163586]  kasan_save_track+0x20/0x40
[   16.163623]  kasan_save_alloc_info+0x40/0x58
[   16.163660]  __kasan_kmalloc+0xd4/0xd8
[   16.163693]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.163730]  kmalloc_oob_right+0xb0/0x660
[   16.163766]  kunit_try_run_case+0x170/0x3f0
[   16.163799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.163838]  kthread+0x328/0x630
[   16.163870]  ret_from_fork+0x10/0x20
[   16.163923] 
[   16.163984] The buggy address belongs to the object at fff00000c1094c00
[   16.163984]  which belongs to the cache kmalloc-128 of size 128
[   16.164085] The buggy address is located 0 bytes to the right of
[   16.164085]  allocated 115-byte region [fff00000c1094c00, fff00000c1094c73)
[   16.164153] 
[   16.164237] The buggy address belongs to the physical page:
[   16.164458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.164743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.165056] page_type: f5(slab)
[   16.165371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.165432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.165550] page dumped because: kasan: bad access detected
[   16.165591] 
[   16.165618] Memory state around the buggy address:
[   16.165848]  fff00000c1094b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.166217]  fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166288] >fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.166344]                                                              ^
[   16.166434]  fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166475]  fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166538] ==================================================================
[   16.175696] ==================================================================
[   16.175798] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.175900] Read of size 1 at addr fff00000c1094c80 by task kunit_try_catch/136
[   16.176004] 
[   16.176074] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   16.176249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.176305] Hardware name: linux,dummy-virt (DT)
[   16.177921] Call trace:
[   16.178581]  show_stack+0x20/0x38 (C)
[   16.178822]  dump_stack_lvl+0x8c/0xd0
[   16.179489]  print_report+0x118/0x608
[   16.180809]  kasan_report+0xdc/0x128
[   16.181241]  __asan_report_load1_noabort+0x20/0x30
[   16.181459]  kmalloc_oob_right+0x5d0/0x660
[   16.181796]  kunit_try_run_case+0x170/0x3f0
[   16.181947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.182055]  kthread+0x328/0x630
[   16.182141]  ret_from_fork+0x10/0x20
[   16.182415] 
[   16.182449] Allocated by task 136:
[   16.182498]  kasan_save_stack+0x3c/0x68
[   16.182784]  kasan_save_track+0x20/0x40
[   16.182896]  kasan_save_alloc_info+0x40/0x58
[   16.183093]  __kasan_kmalloc+0xd4/0xd8
[   16.183317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.183393]  kmalloc_oob_right+0xb0/0x660
[   16.183488]  kunit_try_run_case+0x170/0x3f0
[   16.183590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.183706]  kthread+0x328/0x630
[   16.183776]  ret_from_fork+0x10/0x20
[   16.183846] 
[   16.183884] The buggy address belongs to the object at fff00000c1094c00
[   16.183884]  which belongs to the cache kmalloc-128 of size 128
[   16.184018] The buggy address is located 13 bytes to the right of
[   16.184018]  allocated 115-byte region [fff00000c1094c00, fff00000c1094c73)
[   16.184216] 
[   16.184279] The buggy address belongs to the physical page:
[   16.184369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094
[   16.184478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.184575] page_type: f5(slab)
[   16.184658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.184764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.184848] page dumped because: kasan: bad access detected
[   16.184911] 
[   16.184946] Memory state around the buggy address:
[   16.185010]  fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.185096]  fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.185178] >fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.185489]                    ^
[   16.185649]  fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.185882]  fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186061] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child
------------[ cut here ]------------
[  153.230509] WARNING: CPU: 1 PID: 1552 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8
[  153.233820] Modules linked in:
[  153.235480] CPU: 1 UID: 0 PID: 1552 Comm: test_ratelimit_ Tainted: G    B D W        N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[  153.237073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  153.238050] Hardware name: linux,dummy-virt (DT)
[  153.238357] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  153.238729] pc : test_ratelimit_stress_child+0x160/0x1b8
[  153.239053] lr : test_ratelimit_stress_child+0x30/0x1b8
[  153.239356] sp : ffff800089507d90
[  153.239574] x29: ffff800089507d90 x28: 0000000000000000 x27: 0000000000000000
[  153.241336] x26: 1ffe0000193c1e01 x25: 0000000000000000 x24: 0000000000000004
[  153.242586] x23: fff00000c9e0f00c x22: fff00000cbff5fa8 x21: ffffa8e06cf19618
[  153.243649] x20: fff00000c9e0f000 x19: fff00000cbff5fa8 x18: fff00000c178d548
[  153.244832] x17: 0000000000000001 x16: fff00000c0975c3c x15: fff00000ff616b08
[  153.245829] x14: 0000000000018fff x13: 1ffe00001b48adc5 x12: fffd80001b48f041
[  153.246835] x11: 1ffe00001b48f040 x10: fffd80001b48f040 x9 : ffffa8e06f5ac60c
[  153.247856] x8 : ffff800089507ae8 x7 : 0000000000000001 x6 : ffff800089507c00
[  153.248641] x5 : 0000000000000001 x4 : ffffa8e0718f4340 x3 : 0000000000000000
[  153.249672] x2 : 1ffe0000197febf9 x1 : 0000000000000000 x0 : 0000000000000000
[  153.250790] Call trace:
[  153.251137]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  153.251693]  kthread+0x328/0x630
[  153.252098]  ret_from_fork+0x10/0x20
[  153.252519] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   91.850702] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   91.851352] Modules linked in:
[   91.851658] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   91.852046] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   91.852366] Hardware name: linux,dummy-virt (DT)
[   91.852545] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   91.852781] pc : intlog10+0x38/0x48
[   91.852995] lr : intlog10_test+0xe4/0x200
[   91.853209] sp : ffff800082477c10
[   91.853400] x29: ffff800082477c90 x28: 0000000000000000 x27: 0000000000000000
[   91.853741] x26: 1ffe000018f11741 x25: 0000000000000000 x24: ffff800082477ce0
[   91.854088] x23: ffff800082477d00 x22: 0000000000000000 x21: 1ffff0001048ef82
[   91.854705] x20: ffffa8e06f866f80 x19: ffff800080087990 x18: 00000000cdfba44a
[   91.854971] x17: 00000000e5b6ca4f x16: 00000000488778e7 x15: 000000005f3a246b
[   91.855230] x14: 000000009c5710ee x13: 1ffe00001b48f181 x12: ffff751c0e6df181
[   91.855474] x11: 1ffff51c0e6df180 x10: ffff751c0e6df180 x9 : ffffa8e06ce1d6fc
[   91.855719] x8 : ffffa8e0736f8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   91.855955] x5 : ffff70001048ef82 x4 : 1ffff00010010f3a x3 : 1ffff51c0df0cdf0
[   91.856886] x2 : 1ffff51c0df0cdf0 x1 : 0000000000000003 x0 : 0000000000000000
[   91.857462] Call trace:
[   91.857611]  intlog10+0x38/0x48 (P)
[   91.857854]  kunit_try_run_case+0x170/0x3f0
[   91.858296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.858781]  kthread+0x328/0x630
[   91.859023]  ret_from_fork+0x10/0x20
[   91.859263] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   91.800425] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   91.801785] Modules linked in:
[   91.803026] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   91.803814] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   91.804214] Hardware name: linux,dummy-virt (DT)
[   91.804518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   91.805063] pc : intlog2+0xd8/0xf8
[   91.805218] lr : intlog2_test+0xe4/0x200
[   91.805519] sp : ffff800082447c10
[   91.805726] x29: ffff800082447c90 x28: 0000000000000000 x27: 0000000000000000
[   91.806294] x26: 1ffe00001824eb41 x25: 0000000000000000 x24: ffff800082447ce0
[   91.806806] x23: ffff800082447d00 x22: 0000000000000000 x21: 1ffff00010488f82
[   91.807431] x20: ffffa8e06f866e80 x19: ffff800080087990 x18: fff00000c178d618
[   91.807837] x17: 00000000eae4f324 x16: fff00000c0975c3c x15: fff00000ff616b08
[   91.808188] x14: 0000000000018fff x13: 1ffe00001b48adc5 x12: ffff751c0e6df181
[   91.808536] x11: 1ffff51c0e6df180 x10: ffff751c0e6df180 x9 : ffffa8e06ce1d8fc
[   91.808889] x8 : ffffa8e0736f8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   91.809257] x5 : ffff700010488f82 x4 : 1ffff00010010f3a x3 : 1ffff51c0df0cdd0
[   91.809614] x2 : 1ffff51c0df0cdd0 x1 : 0000000000000003 x0 : 0000000000000000
[   91.810139] Call trace:
[   91.810430]  intlog2+0xd8/0xf8 (P)
[   91.810592]  kunit_try_run_case+0x170/0x3f0
[   91.810763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.810985]  kthread+0x328/0x630
[   91.811216]  ret_from_fork+0x10/0x20
[   91.811381] ---[ end trace 0000000000000000 ]---