Hay
Date
May 13, 2025, 12:07 p.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   21.653207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   21.744507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   23.243519] ==================================================================
[   23.243656] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   23.243656] 
[   23.243788] Out-of-bounds write at 0x00000000790ab28c (1B left of kfence-#103):
[   23.243852]  test_out_of_bounds_write+0x100/0x240
[   23.243907]  kunit_try_run_case+0x170/0x3f0
[   23.243959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.244022]  kthread+0x328/0x630
[   23.244067]  ret_from_fork+0x10/0x20
[   23.244107] 
[   23.244140] kfence-#103: 0x000000009a5c2f04-0x00000000b0e9a372, size=32, cache=test
[   23.244140] 
[   23.244195] allocated by task 293 on cpu 1 at 23.243418s (0.000773s ago):
[   23.244274]  test_alloc+0x230/0x628
[   23.244318]  test_out_of_bounds_write+0xc8/0x240
[   23.244362]  kunit_try_run_case+0x170/0x3f0
[   23.244432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.244489]  kthread+0x328/0x630
[   23.244534]  ret_from_fork+0x10/0x20
[   23.244610] 
[   23.244679] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.244780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.244816] Hardware name: linux,dummy-virt (DT)
[   23.244866] ==================================================================
[   23.035206] ==================================================================
[   23.035316] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   23.035316] 
[   23.035459] Out-of-bounds write at 0x00000000cbfc27dc (1B left of kfence-#101):
[   23.035541]  test_out_of_bounds_write+0x100/0x240
[   23.035601]  kunit_try_run_case+0x170/0x3f0
[   23.035652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.035701]  kthread+0x328/0x630
[   23.035748]  ret_from_fork+0x10/0x20
[   23.035795] 
[   23.035825] kfence-#101: 0x00000000bd3ca3e5-0x0000000032393000, size=32, cache=kmalloc-32
[   23.035825] 
[   23.035885] allocated by task 291 on cpu 1 at 23.035005s (0.000875s ago):
[   23.035981]  test_alloc+0x29c/0x628
[   23.036051]  test_out_of_bounds_write+0xc8/0x240
[   23.036151]  kunit_try_run_case+0x170/0x3f0
[   23.036239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.036334]  kthread+0x328/0x630
[   23.036382]  ret_from_fork+0x10/0x20
[   23.036427] 
[   23.036484] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.036582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.036619] Hardware name: linux,dummy-virt (DT)
[   23.036660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   21.393292] ==================================================================
[   21.393407] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   21.393494] Read of size 1 at addr ffff8000809d7b4a by task kunit_try_catch/253
[   21.394502] 
[   21.394586] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.394697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.394758] Hardware name: linux,dummy-virt (DT)
[   21.394797] Call trace:
[   21.394843]  show_stack+0x20/0x38 (C)
[   21.394915]  dump_stack_lvl+0x8c/0xd0
[   21.394992]  print_report+0x310/0x608
[   21.395050]  kasan_report+0xdc/0x128
[   21.395101]  __asan_report_load1_noabort+0x20/0x30
[   21.395158]  kasan_alloca_oob_right+0x2dc/0x340
[   21.395500]  kunit_try_run_case+0x170/0x3f0
[   21.395737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.395875]  kthread+0x328/0x630
[   21.396332]  ret_from_fork+0x10/0x20
[   21.396704] 
[   21.396740] The buggy address belongs to stack of task kunit_try_catch/253
[   21.396807] 
[   21.396844] The buggy address belongs to the virtual mapping at
[   21.396844]  [ffff8000809d0000, ffff8000809d9000) created by:
[   21.396844]  kernel_clone+0x150/0x7a8
[   21.396931] 
[   21.396964] The buggy address belongs to the physical page:
[   21.397020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   21.397087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.398811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.398897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.398950] page dumped because: kasan: bad access detected
[   21.399026] 
[   21.399055] Memory state around the buggy address:
[   21.399098]  ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.399151]  ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.399397] >ffff8000809d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   21.399511]                                               ^
[   21.399562]  ffff8000809d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   21.400087]  ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.400148] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[  100.367225] Internal error: Oops: 0000000096000005 [#1]  SMP
[  100.374383] Modules linked in:
[  100.375356] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[  100.376076] Tainted: [B]=BAD_PAGE, [N]=TEST
[  100.376398] Hardware name: linux,dummy-virt (DT)
[  100.377069] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  100.377880] pc : kunit_test_null_dereference+0x70/0x170
[  100.378650] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  100.379421] sp : ffff800081fd7d30
[  100.380224] x29: ffff800081fd7d90 x28: 0000000000000000 x27: 0000000000000000
[  100.381010] x26: 1ffe000018f7dfa1 x25: 0000000000000000 x24: 0000000000000004
[  100.381566] x23: fff00000c7befd0c x22: ffff99d6c440b718 x21: fff00000c1c3de88
[  100.382123] x20: 1ffff000103fafa6 x19: ffff800080087990 x18: fff00000c1217c98
[  100.383140] x17: 0000000000000001 x16: fff00000da457ce8 x15: fff00000ff616b08
[  100.384019] x14: 0000000000018fff x13: 1ffe00001b48af81 x12: fffd800019281dc4
[  100.385056] x11: 1ffe000019281dc3 x10: fffd800019281dc3 x9 : ffff99d6c4402b80
[  100.385879] x8 : ffff800081fd7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  100.386655] x5 : ffff7000103fafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  100.387470] x2 : dfff800000000000 x1 : fff00000c940e540 x0 : ffff800080087990
[  100.388471] Call trace:
[  100.388748]  kunit_test_null_dereference+0x70/0x170 (P)
[  100.389151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  100.389802]  kthread+0x328/0x630
[  100.390217]  ret_from_fork+0x10/0x20
[  100.391142] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  100.392078] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   50.911958] ==================================================================
[   50.912108] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   50.912108] 
[   50.912240] Use-after-free read at 0x00000000ad1bf768 (in kfence-#162):
[   50.912307]  test_krealloc+0x51c/0x830
[   50.912364]  kunit_try_run_case+0x170/0x3f0
[   50.912417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.912469]  kthread+0x328/0x630
[   50.912520]  ret_from_fork+0x10/0x20
[   50.912567] 
[   50.912596] kfence-#162: 0x00000000ad1bf768-0x00000000b3c9254f, size=32, cache=kmalloc-32
[   50.912596] 
[   50.912659] allocated by task 337 on cpu 1 at 50.911135s (0.001519s ago):
[   50.912748]  test_alloc+0x29c/0x628
[   50.912799]  test_krealloc+0xc0/0x830
[   50.912843]  kunit_try_run_case+0x170/0x3f0
[   50.912887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.912936]  kthread+0x328/0x630
[   50.913008]  ret_from_fork+0x10/0x20
[   50.913058] 
[   50.913088] freed by task 337 on cpu 1 at 50.911447s (0.001636s ago):
[   50.913161]  krealloc_noprof+0x148/0x360
[   50.913209]  test_krealloc+0x1dc/0x830
[   50.913255]  kunit_try_run_case+0x170/0x3f0
[   50.913300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.913349]  kthread+0x328/0x630
[   50.913394]  ret_from_fork+0x10/0x20
[   50.913442] 
[   50.913503] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   50.913600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.913639] Hardware name: linux,dummy-virt (DT)
[   50.913681] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   50.827473] ==================================================================
[   50.827610] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   50.827610] 
[   50.827742] Use-after-free read at 0x000000001633a04a (in kfence-#161):
[   50.827814]  test_memcache_typesafe_by_rcu+0x280/0x560
[   50.827877]  kunit_try_run_case+0x170/0x3f0
[   50.827930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.828000]  kthread+0x328/0x630
[   50.828056]  ret_from_fork+0x10/0x20
[   50.828105] 
[   50.828135] kfence-#161: 0x000000001633a04a-0x000000006c585dc1, size=32, cache=test
[   50.828135] 
[   50.828198] allocated by task 335 on cpu 0 at 50.811477s (0.016716s ago):
[   50.828285]  test_alloc+0x230/0x628
[   50.828334]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   50.828387]  kunit_try_run_case+0x170/0x3f0
[   50.828432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.828480]  kthread+0x328/0x630
[   50.828525]  ret_from_fork+0x10/0x20
[   50.828570] 
[   50.828598] freed by task 335 on cpu 0 at 50.811697s (0.016896s ago):
[   50.828665]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   50.828715]  kunit_try_run_case+0x170/0x3f0
[   50.828761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.828810]  kthread+0x328/0x630
[   50.828853]  ret_from_fork+0x10/0x20
[   50.828900] 
[   50.828958] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   50.829071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.829107] Hardware name: linux,dummy-virt (DT)
[   50.829150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   29.094290] ==================================================================
[   29.094875] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   29.094875] 
[   29.095176] Invalid read at 0x0000000049cf2e62:
[   29.095331]  test_invalid_access+0xdc/0x1f0
[   29.095463]  kunit_try_run_case+0x170/0x3f0
[   29.095581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.095701]  kthread+0x328/0x630
[   29.095829]  ret_from_fork+0x10/0x20
[   29.095953] 
[   29.096086] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   29.096311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.096400] Hardware name: linux,dummy-virt (DT)
[   29.096498] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   21.378279] ==================================================================
[   21.378406] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   21.378588] Read of size 1 at addr ffff8000809d7b5f by task kunit_try_catch/251
[   21.378655] 
[   21.378705] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.378813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.378846] Hardware name: linux,dummy-virt (DT)
[   21.378891] Call trace:
[   21.378922]  show_stack+0x20/0x38 (C)
[   21.379008]  dump_stack_lvl+0x8c/0xd0
[   21.379070]  print_report+0x310/0x608
[   21.379129]  kasan_report+0xdc/0x128
[   21.379183]  __asan_report_load1_noabort+0x20/0x30
[   21.379244]  kasan_alloca_oob_left+0x2b8/0x310
[   21.379301]  kunit_try_run_case+0x170/0x3f0
[   21.379361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.379425]  kthread+0x328/0x630
[   21.379485]  ret_from_fork+0x10/0x20
[   21.379545] 
[   21.379577] The buggy address belongs to stack of task kunit_try_catch/251
[   21.379686] 
[   21.379722] The buggy address belongs to the virtual mapping at
[   21.379722]  [ffff8000809d0000, ffff8000809d9000) created by:
[   21.379722]  kernel_clone+0x150/0x7a8
[   21.379818] 
[   21.379850] The buggy address belongs to the physical page:
[   21.379893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   21.379961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.380152] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.380404] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.380475] page dumped because: kasan: bad access detected
[   21.380518] 
[   21.380653] Memory state around the buggy address:
[   21.380847]  ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.380922]  ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.380983] >ffff8000809d7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   21.381032]                                                     ^
[   21.381080]  ffff8000809d7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   21.381129]  ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.381635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   28.859739] ==================================================================
[   28.859868] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.859868] 
[   28.859947] Corrupted memory at 0x00000000206b9873 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157):
[   28.860322]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.860382]  kunit_try_run_case+0x170/0x3f0
[   28.860429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.860479]  kthread+0x328/0x630
[   28.860525]  ret_from_fork+0x10/0x20
[   28.860570] 
[   28.860598] kfence-#157: 0x00000000077a233e-0x00000000cf941849, size=73, cache=kmalloc-96
[   28.860598] 
[   28.860663] allocated by task 325 on cpu 0 at 28.859326s (0.001332s ago):
[   28.860734]  test_alloc+0x29c/0x628
[   28.860782]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   28.860831]  kunit_try_run_case+0x170/0x3f0
[   28.860876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.860925]  kthread+0x328/0x630
[   28.860977]  ret_from_fork+0x10/0x20
[   28.861030] 
[   28.861059] freed by task 325 on cpu 0 at 28.859579s (0.001476s ago):
[   28.861131]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.861181]  kunit_try_run_case+0x170/0x3f0
[   28.861226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.861275]  kthread+0x328/0x630
[   28.861320]  ret_from_fork+0x10/0x20
[   28.861366] 
[   28.861422] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   28.861518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.861554] Hardware name: linux,dummy-virt (DT)
[   28.861594] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   28.755772] ==================================================================
[   28.755919] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.755919] 
[   28.756066] Out-of-bounds read at 0x00000000d369a7fe (105B right of kfence-#156):
[   28.756133]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.756191]  kunit_try_run_case+0x170/0x3f0
[   28.756240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.756284]  kthread+0x328/0x630
[   28.756326]  ret_from_fork+0x10/0x20
[   28.756368] 
[   28.756396] kfence-#156: 0x00000000b424cf7d-0x000000003de8abae, size=73, cache=kmalloc-96
[   28.756396] 
[   28.756450] allocated by task 323 on cpu 0 at 28.755346s (0.001099s ago):
[   28.756530]  test_alloc+0x29c/0x628
[   28.756575]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.756618]  kunit_try_run_case+0x170/0x3f0
[   28.756659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.756718]  kthread+0x328/0x630
[   28.756769]  ret_from_fork+0x10/0x20
[   28.756812] 
[   28.756887] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   28.756997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.757032] Hardware name: linux,dummy-virt (DT)
[   28.757071] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   24.387905] ==================================================================
[   24.388058] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   24.388058] 
[   24.388137] Corrupted memory at 0x00000000218d4ac5 [ ! ] (in kfence-#114):
[   24.388287]  test_corruption+0x284/0x378
[   24.388338]  kunit_try_run_case+0x170/0x3f0
[   24.388385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.388434]  kthread+0x328/0x630
[   24.388480]  ret_from_fork+0x10/0x20
[   24.388528] 
[   24.388554] kfence-#114: 0x00000000929cba9c-0x00000000153bb2cd, size=32, cache=kmalloc-32
[   24.388554] 
[   24.388615] allocated by task 311 on cpu 1 at 24.387443s (0.001168s ago):
[   24.388683]  test_alloc+0x29c/0x628
[   24.388728]  test_corruption+0x198/0x378
[   24.388772]  kunit_try_run_case+0x170/0x3f0
[   24.388812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.388861]  kthread+0x328/0x630
[   24.388904]  ret_from_fork+0x10/0x20
[   24.388946] 
[   24.388983] freed by task 311 on cpu 1 at 24.387605s (0.001372s ago):
[   24.389057]  test_corruption+0x284/0x378
[   24.389104]  kunit_try_run_case+0x170/0x3f0
[   24.389149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.389198]  kthread+0x328/0x630
[   24.389241]  ret_from_fork+0x10/0x20
[   24.389286] 
[   24.389340] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   24.389429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.389466] Hardware name: linux,dummy-virt (DT)
[   24.389507] ==================================================================
[   24.595675] ==================================================================
[   24.595869] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   24.595869] 
[   24.595968] Corrupted memory at 0x00000000d455faf6 [ ! . . . . . . . . . . . . . . . ] (in kfence-#116):
[   24.596352]  test_corruption+0x120/0x378
[   24.596410]  kunit_try_run_case+0x170/0x3f0
[   24.596464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.596513]  kthread+0x328/0x630
[   24.596559]  ret_from_fork+0x10/0x20
[   24.596606] 
[   24.596634] kfence-#116: 0x0000000072ee961d-0x00000000a03ffaf6, size=32, cache=test
[   24.596634] 
[   24.596695] allocated by task 313 on cpu 1 at 24.595417s (0.001274s ago):
[   24.596769]  test_alloc+0x230/0x628
[   24.596817]  test_corruption+0xdc/0x378
[   24.596861]  kunit_try_run_case+0x170/0x3f0
[   24.596905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.596954]  kthread+0x328/0x630
[   24.597014]  ret_from_fork+0x10/0x20
[   24.597060] 
[   24.597087] freed by task 313 on cpu 1 at 24.595512s (0.001570s ago):
[   24.597155]  test_corruption+0x120/0x378
[   24.597199]  kunit_try_run_case+0x170/0x3f0
[   24.597244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.597296]  kthread+0x328/0x630
[   24.597339]  ret_from_fork+0x10/0x20
[   24.597385] 
[   24.597442] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   24.597533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.597567] Hardware name: linux,dummy-virt (DT)
[   24.597607] ==================================================================
[   24.699601] ==================================================================
[   24.699765] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   24.699765] 
[   24.699846] Corrupted memory at 0x0000000037831a29 [ ! ] (in kfence-#117):
[   24.700014]  test_corruption+0x1d8/0x378
[   24.700074]  kunit_try_run_case+0x170/0x3f0
[   24.700126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.700178]  kthread+0x328/0x630
[   24.700226]  ret_from_fork+0x10/0x20
[   24.700270] 
[   24.700300] kfence-#117: 0x00000000bf803449-0x000000002042216c, size=32, cache=test
[   24.700300] 
[   24.700363] allocated by task 313 on cpu 1 at 24.699338s (0.001020s ago):
[   24.700436]  test_alloc+0x230/0x628
[   24.700484]  test_corruption+0x198/0x378
[   24.700530]  kunit_try_run_case+0x170/0x3f0
[   24.700574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.700623]  kthread+0x328/0x630
[   24.700667]  ret_from_fork+0x10/0x20
[   24.700710] 
[   24.700738] freed by task 313 on cpu 1 at 24.699437s (0.001297s ago):
[   24.700806]  test_corruption+0x1d8/0x378
[   24.700852]  kunit_try_run_case+0x170/0x3f0
[   24.700896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.700944]  kthread+0x328/0x630
[   24.701002]  ret_from_fork+0x10/0x20
[   24.701052] 
[   24.701105] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   24.701196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.701231] Hardware name: linux,dummy-virt (DT)
[   24.701275] ==================================================================
[   24.179631] ==================================================================
[   24.179781] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   24.179781] 
[   24.179870] Corrupted memory at 0x00000000eb886328 [ ! . . . . . . . . . . . . . . . ] (in kfence-#112):
[   24.181270]  test_corruption+0x278/0x378
[   24.181338]  kunit_try_run_case+0x170/0x3f0
[   24.181394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181446]  kthread+0x328/0x630
[   24.181497]  ret_from_fork+0x10/0x20
[   24.181543] 
[   24.181571] kfence-#112: 0x0000000023cf7a8b-0x00000000ee5a2f08, size=32, cache=kmalloc-32
[   24.181571] 
[   24.181639] allocated by task 311 on cpu 1 at 24.179261s (0.002373s ago):
[   24.181713]  test_alloc+0x29c/0x628
[   24.181763]  test_corruption+0xdc/0x378
[   24.181829]  kunit_try_run_case+0x170/0x3f0
[   24.181883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181933]  kthread+0x328/0x630
[   24.181993]  ret_from_fork+0x10/0x20
[   24.182044] 
[   24.182073] freed by task 311 on cpu 1 at 24.179396s (0.002672s ago):
[   24.182143]  test_corruption+0x278/0x378
[   24.182192]  kunit_try_run_case+0x170/0x3f0
[   24.182239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.182289]  kthread+0x328/0x630
[   24.182334]  ret_from_fork+0x10/0x20
[   24.182383] 
[   24.182442] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   24.182539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.182577] Hardware name: linux,dummy-virt (DT)
[   24.182618] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   23.971553] ==================================================================
[   23.971688] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   23.971688] 
[   23.971776] Invalid free of 0x0000000036935ce6 (in kfence-#110):
[   23.971852]  test_invalid_addr_free+0x1ac/0x238
[   23.971915]  kunit_try_run_case+0x170/0x3f0
[   23.971994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.972049]  kthread+0x328/0x630
[   23.972099]  ret_from_fork+0x10/0x20
[   23.972146] 
[   23.972176] kfence-#110: 0x0000000005cb5437-0x000000006adc9b06, size=32, cache=kmalloc-32
[   23.972176] 
[   23.972242] allocated by task 307 on cpu 0 at 23.971333s (0.000905s ago):
[   23.972316]  test_alloc+0x29c/0x628
[   23.972366]  test_invalid_addr_free+0xd4/0x238
[   23.972415]  kunit_try_run_case+0x170/0x3f0
[   23.972458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.972504]  kthread+0x328/0x630
[   23.972549]  ret_from_fork+0x10/0x20
[   23.972593] 
[   23.972656] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.972751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.972786] Hardware name: linux,dummy-virt (DT)
[   23.972826] ==================================================================
[   24.075308] ==================================================================
[   24.075431] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   24.075431] 
[   24.075508] Invalid free of 0x000000001e7e07b8 (in kfence-#111):
[   24.075571]  test_invalid_addr_free+0xec/0x238
[   24.075627]  kunit_try_run_case+0x170/0x3f0
[   24.075673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.075723]  kthread+0x328/0x630
[   24.075771]  ret_from_fork+0x10/0x20
[   24.075815] 
[   24.075843] kfence-#111: 0x0000000078629be6-0x00000000b0f4e750, size=32, cache=test
[   24.075843] 
[   24.075904] allocated by task 309 on cpu 0 at 24.075145s (0.000755s ago):
[   24.075998]  test_alloc+0x230/0x628
[   24.076055]  test_invalid_addr_free+0xd4/0x238
[   24.076102]  kunit_try_run_case+0x170/0x3f0
[   24.076147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.076197]  kthread+0x328/0x630
[   24.076240]  ret_from_fork+0x10/0x20
[   24.076287] 
[   24.076345] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   24.076444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.076481] Hardware name: linux,dummy-virt (DT)
[   24.076526] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   23.763369] ==================================================================
[   23.763498] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   23.763498] 
[   23.763575] Invalid free of 0x000000000a9d273d (in kfence-#108):
[   23.763686]  test_double_free+0x1bc/0x238
[   23.763827]  kunit_try_run_case+0x170/0x3f0
[   23.763878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.763923]  kthread+0x328/0x630
[   23.763965]  ret_from_fork+0x10/0x20
[   23.764025] 
[   23.764055] kfence-#108: 0x000000000a9d273d-0x00000000d9af9fcd, size=32, cache=kmalloc-32
[   23.764055] 
[   23.764116] allocated by task 303 on cpu 1 at 23.763003s (0.001108s ago):
[   23.764186]  test_alloc+0x29c/0x628
[   23.764232]  test_double_free+0xd4/0x238
[   23.764275]  kunit_try_run_case+0x170/0x3f0
[   23.764317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.764363]  kthread+0x328/0x630
[   23.764414]  ret_from_fork+0x10/0x20
[   23.764480] 
[   23.764504] freed by task 303 on cpu 1 at 23.763112s (0.001389s ago):
[   23.764621]  test_double_free+0x1ac/0x238
[   23.764665]  kunit_try_run_case+0x170/0x3f0
[   23.764704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.764749]  kthread+0x328/0x630
[   23.764789]  ret_from_fork+0x10/0x20
[   23.764830] 
[   23.764881] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.764979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.765015] Hardware name: linux,dummy-virt (DT)
[   23.765054] ==================================================================
[   23.867393] ==================================================================
[   23.867521] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   23.867521] 
[   23.867600] Invalid free of 0x00000000216839f2 (in kfence-#109):
[   23.867664]  test_double_free+0x100/0x238
[   23.867718]  kunit_try_run_case+0x170/0x3f0
[   23.867768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.867818]  kthread+0x328/0x630
[   23.867864]  ret_from_fork+0x10/0x20
[   23.867910] 
[   23.867939] kfence-#109: 0x00000000216839f2-0x0000000049bb4299, size=32, cache=test
[   23.867939] 
[   23.868015] allocated by task 305 on cpu 1 at 23.867129s (0.000881s ago):
[   23.868089]  test_alloc+0x230/0x628
[   23.868137]  test_double_free+0xd4/0x238
[   23.868181]  kunit_try_run_case+0x170/0x3f0
[   23.868227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.868274]  kthread+0x328/0x630
[   23.868319]  ret_from_fork+0x10/0x20
[   23.868362] 
[   23.868390] freed by task 305 on cpu 1 at 23.867208s (0.001177s ago):
[   23.868459]  test_double_free+0xf0/0x238
[   23.868505]  kunit_try_run_case+0x170/0x3f0
[   23.868547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.868596]  kthread+0x328/0x630
[   23.868641]  ret_from_fork+0x10/0x20
[   23.868686] 
[   23.868743] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.868840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.868875] Hardware name: linux,dummy-virt (DT)
[   23.868916] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   23.453731] ==================================================================
[   23.454134] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   23.454134] 
[   23.454269] Use-after-free read at 0x000000009e8924cb (in kfence-#105):
[   23.454333]  test_use_after_free_read+0x114/0x248
[   23.454395]  kunit_try_run_case+0x170/0x3f0
[   23.454717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.455130]  kthread+0x328/0x630
[   23.455228]  ret_from_fork+0x10/0x20
[   23.455373] 
[   23.455465] kfence-#105: 0x000000009e8924cb-0x00000000b21d41c3, size=32, cache=test
[   23.455465] 
[   23.455705] allocated by task 297 on cpu 1 at 23.452834s (0.002863s ago):
[   23.456008]  test_alloc+0x230/0x628
[   23.456335]  test_use_after_free_read+0xd0/0x248
[   23.456570]  kunit_try_run_case+0x170/0x3f0
[   23.456636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.456705]  kthread+0x328/0x630
[   23.456750]  ret_from_fork+0x10/0x20
[   23.456797] 
[   23.457128] freed by task 297 on cpu 1 at 23.452907s (0.004184s ago):
[   23.457406]  test_use_after_free_read+0xf0/0x248
[   23.457467]  kunit_try_run_case+0x170/0x3f0
[   23.457681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.457744]  kthread+0x328/0x630
[   23.457793]  ret_from_fork+0x10/0x20
[   23.457867] 
[   23.457928] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.458045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.458083] Hardware name: linux,dummy-virt (DT)
[   23.458126] ==================================================================
[   23.348718] ==================================================================
[   23.348986] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   23.348986] 
[   23.349135] Use-after-free read at 0x00000000d0c7f4c7 (in kfence-#104):
[   23.349206]  test_use_after_free_read+0x114/0x248
[   23.349267]  kunit_try_run_case+0x170/0x3f0
[   23.349797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.350065]  kthread+0x328/0x630
[   23.350127]  ret_from_fork+0x10/0x20
[   23.350210] 
[   23.350250] kfence-#104: 0x00000000d0c7f4c7-0x00000000479c9ef7, size=32, cache=kmalloc-32
[   23.350250] 
[   23.350531] allocated by task 295 on cpu 1 at 23.347764s (0.002760s ago):
[   23.350666]  test_alloc+0x29c/0x628
[   23.350877]  test_use_after_free_read+0xd0/0x248
[   23.350982]  kunit_try_run_case+0x170/0x3f0
[   23.351038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.351459]  kthread+0x328/0x630
[   23.351556]  ret_from_fork+0x10/0x20
[   23.351742] 
[   23.352347] freed by task 295 on cpu 1 at 23.347919s (0.004244s ago):
[   23.352864]  test_use_after_free_read+0x1c0/0x248
[   23.353018]  kunit_try_run_case+0x170/0x3f0
[   23.353079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.353364]  kthread+0x328/0x630
[   23.353627]  ret_from_fork+0x10/0x20
[   23.353773] 
[   23.354079] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   23.354263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.355235] Hardware name: linux,dummy-virt (DT)
[   23.355618] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   22.932172] ==================================================================
[   22.932285] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.932285] 
[   22.932396] Out-of-bounds read at 0x0000000052a368c2 (32B right of kfence-#100):
[   22.932467]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.932524]  kunit_try_run_case+0x170/0x3f0
[   22.932573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.932622]  kthread+0x328/0x630
[   22.932670]  ret_from_fork+0x10/0x20
[   22.932716] 
[   22.932744] kfence-#100: 0x000000000a274cde-0x0000000030099e6c, size=32, cache=test
[   22.932744] 
[   22.932801] allocated by task 289 on cpu 1 at 22.932049s (0.000747s ago):
[   22.932885]  test_alloc+0x230/0x628
[   22.932932]  test_out_of_bounds_read+0x198/0x3e0
[   22.933686]  kunit_try_run_case+0x170/0x3f0
[   22.933760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.933878]  kthread+0x328/0x630
[   22.934018]  ret_from_fork+0x10/0x20
[   22.934134] 
[   22.934191] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.934609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.934672] Hardware name: linux,dummy-virt (DT)
[   22.934747] ==================================================================
[   22.724996] ==================================================================
[   22.725105] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   22.725105] 
[   22.725563] Out-of-bounds read at 0x00000000236d31dc (1B left of kfence-#98):
[   22.726034]  test_out_of_bounds_read+0x114/0x3e0
[   22.726119]  kunit_try_run_case+0x170/0x3f0
[   22.726458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.726632]  kthread+0x328/0x630
[   22.726787]  ret_from_fork+0x10/0x20
[   22.726843] 
[   22.726955] kfence-#98: 0x00000000b4691d7b-0x0000000006658219, size=32, cache=test
[   22.726955] 
[   22.727279] allocated by task 289 on cpu 1 at 22.724761s (0.002512s ago):
[   22.728380]  test_alloc+0x230/0x628
[   22.728473]  test_out_of_bounds_read+0xdc/0x3e0
[   22.728534]  kunit_try_run_case+0x170/0x3f0
[   22.728598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.728668]  kthread+0x328/0x630
[   22.728986]  ret_from_fork+0x10/0x20
[   22.729172] 
[   22.729489] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.729839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.730184] Hardware name: linux,dummy-virt (DT)
[   22.730423] ==================================================================
[   22.621253] ==================================================================
[   22.621358] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.621358] 
[   22.621491] Out-of-bounds read at 0x00000000c28388a9 (32B right of kfence-#97):
[   22.621562]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.621620]  kunit_try_run_case+0x170/0x3f0
[   22.621669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.621719]  kthread+0x328/0x630
[   22.621766]  ret_from_fork+0x10/0x20
[   22.621820] 
[   22.621855] kfence-#97: 0x000000002b3086a4-0x00000000b410308c, size=32, cache=kmalloc-32
[   22.621855] 
[   22.621917] allocated by task 287 on cpu 1 at 22.621022s (0.000890s ago):
[   22.622024]  test_alloc+0x29c/0x628
[   22.622306]  test_out_of_bounds_read+0x198/0x3e0
[   22.622436]  kunit_try_run_case+0x170/0x3f0
[   22.622592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.622684]  kthread+0x328/0x630
[   22.622741]  ret_from_fork+0x10/0x20
[   22.622804] 
[   22.622867] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.623511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.623664] Hardware name: linux,dummy-virt (DT)
[   22.623776] ==================================================================
[   22.517067] ==================================================================
[   22.517440] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   22.517440] 
[   22.517693] Out-of-bounds read at 0x000000006fb4a574 (1B left of kfence-#96):
[   22.518064]  test_out_of_bounds_read+0x114/0x3e0
[   22.518244]  kunit_try_run_case+0x170/0x3f0
[   22.518301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.518351]  kthread+0x328/0x630
[   22.518412]  ret_from_fork+0x10/0x20
[   22.518522] 
[   22.519363] kfence-#96: 0x0000000070e3451a-0x00000000a2d5ff56, size=32, cache=kmalloc-32
[   22.519363] 
[   22.520491] allocated by task 287 on cpu 1 at 22.516021s (0.004177s ago):
[   22.521496]  test_alloc+0x29c/0x628
[   22.521601]  test_out_of_bounds_read+0xdc/0x3e0
[   22.522109]  kunit_try_run_case+0x170/0x3f0
[   22.522184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.522239]  kthread+0x328/0x630
[   22.522626]  ret_from_fork+0x10/0x20
[   22.522878] 
[   22.522988] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.523088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.523147] Hardware name: linux,dummy-virt (DT)
[   22.523197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   22.349574] ==================================================================
[   22.349645] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   22.349724] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.349787] 
[   22.349849] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.349952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.350000] Hardware name: linux,dummy-virt (DT)
[   22.350040] Call trace:
[   22.350070]  show_stack+0x20/0x38 (C)
[   22.350269]  dump_stack_lvl+0x8c/0xd0
[   22.350351]  print_report+0x118/0x608
[   22.350408]  kasan_report+0xdc/0x128
[   22.350472]  kasan_check_range+0x100/0x1a8
[   22.350532]  __kasan_check_write+0x20/0x30
[   22.350593]  strncpy_from_user+0x3c/0x2a0
[   22.350647]  copy_user_test_oob+0x5c0/0xec8
[   22.350760]  kunit_try_run_case+0x170/0x3f0
[   22.350819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.350894]  kthread+0x328/0x630
[   22.350948]  ret_from_fork+0x10/0x20
[   22.351095] 
[   22.351122] Allocated by task 285:
[   22.351159]  kasan_save_stack+0x3c/0x68
[   22.351207]  kasan_save_track+0x20/0x40
[   22.351248]  kasan_save_alloc_info+0x40/0x58
[   22.351420]  __kasan_kmalloc+0xd4/0xd8
[   22.351466]  __kmalloc_noprof+0x190/0x4d0
[   22.351510]  kunit_kmalloc_array+0x34/0x88
[   22.351568]  copy_user_test_oob+0xac/0xec8
[   22.351667]  kunit_try_run_case+0x170/0x3f0
[   22.351824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.351880]  kthread+0x328/0x630
[   22.351923]  ret_from_fork+0x10/0x20
[   22.351964] 
[   22.351998] The buggy address belongs to the object at fff00000c6620c00
[   22.351998]  which belongs to the cache kmalloc-128 of size 128
[   22.352086] The buggy address is located 0 bytes inside of
[   22.352086]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.352188] 
[   22.352224] The buggy address belongs to the physical page:
[   22.352263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.352322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.352376] page_type: f5(slab)
[   22.352424] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.352509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.352628] page dumped because: kasan: bad access detected
[   22.352670] 
[   22.352691] Memory state around the buggy address:
[   22.352728]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.352823]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.352876] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.352920]                                                                 ^
[   22.353116]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.353192]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.353289] ==================================================================
[   22.353663] ==================================================================
[   22.353720] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   22.353785] Write of size 1 at addr fff00000c6620c78 by task kunit_try_catch/285
[   22.353865] 
[   22.353904] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.354019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.354054] Hardware name: linux,dummy-virt (DT)
[   22.354094] Call trace:
[   22.354126]  show_stack+0x20/0x38 (C)
[   22.354185]  dump_stack_lvl+0x8c/0xd0
[   22.354239]  print_report+0x118/0x608
[   22.354291]  kasan_report+0xdc/0x128
[   22.354344]  __asan_report_store1_noabort+0x20/0x30
[   22.354402]  strncpy_from_user+0x270/0x2a0
[   22.354998]  copy_user_test_oob+0x5c0/0xec8
[   22.355163]  kunit_try_run_case+0x170/0x3f0
[   22.355279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.355341]  kthread+0x328/0x630
[   22.355555]  ret_from_fork+0x10/0x20
[   22.355626] 
[   22.355654] Allocated by task 285:
[   22.355689]  kasan_save_stack+0x3c/0x68
[   22.355738]  kasan_save_track+0x20/0x40
[   22.355783]  kasan_save_alloc_info+0x40/0x58
[   22.355865]  __kasan_kmalloc+0xd4/0xd8
[   22.355965]  __kmalloc_noprof+0x190/0x4d0
[   22.356021]  kunit_kmalloc_array+0x34/0x88
[   22.356076]  copy_user_test_oob+0xac/0xec8
[   22.356182]  kunit_try_run_case+0x170/0x3f0
[   22.356248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.356299]  kthread+0x328/0x630
[   22.356338]  ret_from_fork+0x10/0x20
[   22.356468] 
[   22.356538] The buggy address belongs to the object at fff00000c6620c00
[   22.356538]  which belongs to the cache kmalloc-128 of size 128
[   22.356612] The buggy address is located 0 bytes to the right of
[   22.356612]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.356682] 
[   22.356707] The buggy address belongs to the physical page:
[   22.356743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.356799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.356851] page_type: f5(slab)
[   22.356897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.356954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.357850] page dumped because: kasan: bad access detected
[   22.358421] 
[   22.358770] Memory state around the buggy address:
[   22.358835]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.358906]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.358961] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.359023]                                                                 ^
[   22.359076]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.359128]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.359174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   22.332245] ==================================================================
[   22.332336] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   22.332967] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.333055] 
[   22.333186] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.333576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.333632] Hardware name: linux,dummy-virt (DT)
[   22.333675] Call trace:
[   22.333704]  show_stack+0x20/0x38 (C)
[   22.333779]  dump_stack_lvl+0x8c/0xd0
[   22.333844]  print_report+0x118/0x608
[   22.333905]  kasan_report+0xdc/0x128
[   22.333958]  kasan_check_range+0x100/0x1a8
[   22.334362]  __kasan_check_write+0x20/0x30
[   22.334425]  copy_user_test_oob+0x35c/0xec8
[   22.334565]  kunit_try_run_case+0x170/0x3f0
[   22.334626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.334798]  kthread+0x328/0x630
[   22.335202]  ret_from_fork+0x10/0x20
[   22.335272] 
[   22.335296] Allocated by task 285:
[   22.335338]  kasan_save_stack+0x3c/0x68
[   22.335391]  kasan_save_track+0x20/0x40
[   22.335482]  kasan_save_alloc_info+0x40/0x58
[   22.335527]  __kasan_kmalloc+0xd4/0xd8
[   22.335589]  __kmalloc_noprof+0x190/0x4d0
[   22.335647]  kunit_kmalloc_array+0x34/0x88
[   22.335692]  copy_user_test_oob+0xac/0xec8
[   22.335770]  kunit_try_run_case+0x170/0x3f0
[   22.335810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.335853]  kthread+0x328/0x630
[   22.335891]  ret_from_fork+0x10/0x20
[   22.335930] 
[   22.335953] The buggy address belongs to the object at fff00000c6620c00
[   22.335953]  which belongs to the cache kmalloc-128 of size 128
[   22.336029] The buggy address is located 0 bytes inside of
[   22.336029]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.336098] 
[   22.336125] The buggy address belongs to the physical page:
[   22.336162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.336253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.336342] page_type: f5(slab)
[   22.336415] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.336524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.336571] page dumped because: kasan: bad access detected
[   22.336610] 
[   22.336633] Memory state around the buggy address:
[   22.336676]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.336750]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.336863] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.336909]                                                                 ^
[   22.336954]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.337013]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.337060] ==================================================================
[   22.345537] ==================================================================
[   22.345597] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   22.345662] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.345721] 
[   22.345760] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.345881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.345942] Hardware name: linux,dummy-virt (DT)
[   22.346001] Call trace:
[   22.346033]  show_stack+0x20/0x38 (C)
[   22.346092]  dump_stack_lvl+0x8c/0xd0
[   22.346179]  print_report+0x118/0x608
[   22.346233]  kasan_report+0xdc/0x128
[   22.346284]  kasan_check_range+0x100/0x1a8
[   22.346352]  __kasan_check_read+0x20/0x30
[   22.346496]  copy_user_test_oob+0x4a0/0xec8
[   22.346568]  kunit_try_run_case+0x170/0x3f0
[   22.346622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.346681]  kthread+0x328/0x630
[   22.346736]  ret_from_fork+0x10/0x20
[   22.346802] 
[   22.346827] Allocated by task 285:
[   22.347058]  kasan_save_stack+0x3c/0x68
[   22.347164]  kasan_save_track+0x20/0x40
[   22.347220]  kasan_save_alloc_info+0x40/0x58
[   22.347285]  __kasan_kmalloc+0xd4/0xd8
[   22.347327]  __kmalloc_noprof+0x190/0x4d0
[   22.347371]  kunit_kmalloc_array+0x34/0x88
[   22.347413]  copy_user_test_oob+0xac/0xec8
[   22.347460]  kunit_try_run_case+0x170/0x3f0
[   22.347503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.347566]  kthread+0x328/0x630
[   22.347606]  ret_from_fork+0x10/0x20
[   22.347647] 
[   22.347703] The buggy address belongs to the object at fff00000c6620c00
[   22.347703]  which belongs to the cache kmalloc-128 of size 128
[   22.347781] The buggy address is located 0 bytes inside of
[   22.347781]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.347850] 
[   22.347875] The buggy address belongs to the physical page:
[   22.347911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.347980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.348096] page_type: f5(slab)
[   22.348186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.348306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.348356] page dumped because: kasan: bad access detected
[   22.348396] 
[   22.348421] Memory state around the buggy address:
[   22.348461]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.348519]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.348623] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.348685]                                                                 ^
[   22.348734]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.348784]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.348828] ==================================================================
[   22.338029] ==================================================================
[   22.338141] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   22.338217] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.338278] 
[   22.338318] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.338417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.338507] Hardware name: linux,dummy-virt (DT)
[   22.338554] Call trace:
[   22.338642]  show_stack+0x20/0x38 (C)
[   22.338709]  dump_stack_lvl+0x8c/0xd0
[   22.338764]  print_report+0x118/0x608
[   22.338868]  kasan_report+0xdc/0x128
[   22.338922]  kasan_check_range+0x100/0x1a8
[   22.338993]  __kasan_check_read+0x20/0x30
[   22.339055]  copy_user_test_oob+0x3c8/0xec8
[   22.339110]  kunit_try_run_case+0x170/0x3f0
[   22.339166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339265]  kthread+0x328/0x630
[   22.339326]  ret_from_fork+0x10/0x20
[   22.339385] 
[   22.339412] Allocated by task 285:
[   22.339447]  kasan_save_stack+0x3c/0x68
[   22.339581]  kasan_save_track+0x20/0x40
[   22.339630]  kasan_save_alloc_info+0x40/0x58
[   22.339680]  __kasan_kmalloc+0xd4/0xd8
[   22.339723]  __kmalloc_noprof+0x190/0x4d0
[   22.339816]  kunit_kmalloc_array+0x34/0x88
[   22.339855]  copy_user_test_oob+0xac/0xec8
[   22.339895]  kunit_try_run_case+0x170/0x3f0
[   22.339936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339997]  kthread+0x328/0x630
[   22.340040]  ret_from_fork+0x10/0x20
[   22.340083] 
[   22.340108] The buggy address belongs to the object at fff00000c6620c00
[   22.340108]  which belongs to the cache kmalloc-128 of size 128
[   22.340180] The buggy address is located 0 bytes inside of
[   22.340180]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.340313] 
[   22.340339] The buggy address belongs to the physical page:
[   22.340375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.340476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.340533] page_type: f5(slab)
[   22.340623] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.340682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.340727] page dumped because: kasan: bad access detected
[   22.340765] 
[   22.340787] Memory state around the buggy address:
[   22.340826]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.340875]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.340923] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.340963]                                                                 ^
[   22.341084]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.341207]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.341258] ==================================================================
[   22.300482] ==================================================================
[   22.300720] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   22.300881] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.300992] 
[   22.301051] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.301352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.301388] Hardware name: linux,dummy-virt (DT)
[   22.301432] Call trace:
[   22.301466]  show_stack+0x20/0x38 (C)
[   22.301533]  dump_stack_lvl+0x8c/0xd0
[   22.301593]  print_report+0x118/0x608
[   22.301647]  kasan_report+0xdc/0x128
[   22.301700]  kasan_check_range+0x100/0x1a8
[   22.301753]  __kasan_check_write+0x20/0x30
[   22.301832]  copy_user_test_oob+0x234/0xec8
[   22.301892]  kunit_try_run_case+0x170/0x3f0
[   22.301953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.302027]  kthread+0x328/0x630
[   22.302258]  ret_from_fork+0x10/0x20
[   22.302360] 
[   22.302390] Allocated by task 285:
[   22.302432]  kasan_save_stack+0x3c/0x68
[   22.302486]  kasan_save_track+0x20/0x40
[   22.302532]  kasan_save_alloc_info+0x40/0x58
[   22.302577]  __kasan_kmalloc+0xd4/0xd8
[   22.303132]  __kmalloc_noprof+0x190/0x4d0
[   22.303198]  kunit_kmalloc_array+0x34/0x88
[   22.303244]  copy_user_test_oob+0xac/0xec8
[   22.303288]  kunit_try_run_case+0x170/0x3f0
[   22.303335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.303383]  kthread+0x328/0x630
[   22.303425]  ret_from_fork+0x10/0x20
[   22.303470] 
[   22.303498] The buggy address belongs to the object at fff00000c6620c00
[   22.303498]  which belongs to the cache kmalloc-128 of size 128
[   22.303570] The buggy address is located 0 bytes inside of
[   22.303570]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.303641] 
[   22.303670] The buggy address belongs to the physical page:
[   22.303710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.303778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.303840] page_type: f5(slab)
[   22.303894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.303956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.304025] page dumped because: kasan: bad access detected
[   22.304065] 
[   22.304134] Memory state around the buggy address:
[   22.304218]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.304274]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.304414] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.304550]                                                                 ^
[   22.304670]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.304721]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.304957] ==================================================================
[   22.341683] ==================================================================
[   22.341743] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   22.341816] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.341880] 
[   22.341921] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.342026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.342073] Hardware name: linux,dummy-virt (DT)
[   22.342132] Call trace:
[   22.342160]  show_stack+0x20/0x38 (C)
[   22.342218]  dump_stack_lvl+0x8c/0xd0
[   22.342272]  print_report+0x118/0x608
[   22.342323]  kasan_report+0xdc/0x128
[   22.342412]  kasan_check_range+0x100/0x1a8
[   22.342516]  __kasan_check_write+0x20/0x30
[   22.342601]  copy_user_test_oob+0x434/0xec8
[   22.342712]  kunit_try_run_case+0x170/0x3f0
[   22.342788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.342846]  kthread+0x328/0x630
[   22.343059]  ret_from_fork+0x10/0x20
[   22.343123] 
[   22.343161] Allocated by task 285:
[   22.343199]  kasan_save_stack+0x3c/0x68
[   22.343248]  kasan_save_track+0x20/0x40
[   22.343292]  kasan_save_alloc_info+0x40/0x58
[   22.343339]  __kasan_kmalloc+0xd4/0xd8
[   22.343384]  __kmalloc_noprof+0x190/0x4d0
[   22.343426]  kunit_kmalloc_array+0x34/0x88
[   22.343468]  copy_user_test_oob+0xac/0xec8
[   22.343511]  kunit_try_run_case+0x170/0x3f0
[   22.343555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.343635]  kthread+0x328/0x630
[   22.343680]  ret_from_fork+0x10/0x20
[   22.343740] 
[   22.343794] The buggy address belongs to the object at fff00000c6620c00
[   22.343794]  which belongs to the cache kmalloc-128 of size 128
[   22.343943] The buggy address is located 0 bytes inside of
[   22.343943]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.344035] 
[   22.344103] The buggy address belongs to the physical page:
[   22.344142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.344203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.344259] page_type: f5(slab)
[   22.344308] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.344445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.344499] page dumped because: kasan: bad access detected
[   22.344565] 
[   22.344596] Memory state around the buggy address:
[   22.344639]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.344692]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.344742] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.344787]                                                                 ^
[   22.344834]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.344900]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.345009] ==================================================================
[   22.313497] ==================================================================
[   22.313590] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   22.313676] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285
[   22.313736] 
[   22.313840] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.313961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.314008] Hardware name: linux,dummy-virt (DT)
[   22.314204] Call trace:
[   22.314649]  show_stack+0x20/0x38 (C)
[   22.314717]  dump_stack_lvl+0x8c/0xd0
[   22.314772]  print_report+0x118/0x608
[   22.314822]  kasan_report+0xdc/0x128
[   22.314872]  kasan_check_range+0x100/0x1a8
[   22.314925]  __kasan_check_read+0x20/0x30
[   22.314986]  copy_user_test_oob+0x728/0xec8
[   22.315043]  kunit_try_run_case+0x170/0x3f0
[   22.315609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.315806]  kthread+0x328/0x630
[   22.316138]  ret_from_fork+0x10/0x20
[   22.316354] 
[   22.316383] Allocated by task 285:
[   22.316711]  kasan_save_stack+0x3c/0x68
[   22.316780]  kasan_save_track+0x20/0x40
[   22.316827]  kasan_save_alloc_info+0x40/0x58
[   22.316876]  __kasan_kmalloc+0xd4/0xd8
[   22.316918]  __kmalloc_noprof+0x190/0x4d0
[   22.316964]  kunit_kmalloc_array+0x34/0x88
[   22.317024]  copy_user_test_oob+0xac/0xec8
[   22.317070]  kunit_try_run_case+0x170/0x3f0
[   22.318460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.318561]  kthread+0x328/0x630
[   22.318615]  ret_from_fork+0x10/0x20
[   22.318661] 
[   22.318693] The buggy address belongs to the object at fff00000c6620c00
[   22.318693]  which belongs to the cache kmalloc-128 of size 128
[   22.319295] The buggy address is located 0 bytes inside of
[   22.319295]  allocated 120-byte region [fff00000c6620c00, fff00000c6620c78)
[   22.319386] 
[   22.319520] The buggy address belongs to the physical page:
[   22.319607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.319677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.319880] page_type: f5(slab)
[   22.320097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.320232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.320420] page dumped because: kasan: bad access detected
[   22.320557] 
[   22.320585] Memory state around the buggy address:
[   22.320628]  fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.320680]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.320728] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.320959]                                                                 ^
[   22.321053]  fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.321246]  fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.321293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   22.240096] ==================================================================
[   22.240340] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   22.240575] Read of size 8 at addr fff00000c6620b78 by task kunit_try_catch/281
[   22.240707] 
[   22.240775] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.241161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.241524] Hardware name: linux,dummy-virt (DT)
[   22.241591] Call trace:
[   22.241764]  show_stack+0x20/0x38 (C)
[   22.242149]  dump_stack_lvl+0x8c/0xd0
[   22.242271]  print_report+0x118/0x608
[   22.242515]  kasan_report+0xdc/0x128
[   22.242669]  __asan_report_load8_noabort+0x20/0x30
[   22.242857]  copy_to_kernel_nofault+0x204/0x250
[   22.242918]  copy_to_kernel_nofault_oob+0x158/0x418
[   22.242987]  kunit_try_run_case+0x170/0x3f0
[   22.243142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.243211]  kthread+0x328/0x630
[   22.243654]  ret_from_fork+0x10/0x20
[   22.244077] 
[   22.244136] Allocated by task 281:
[   22.244195]  kasan_save_stack+0x3c/0x68
[   22.244416]  kasan_save_track+0x20/0x40
[   22.244479]  kasan_save_alloc_info+0x40/0x58
[   22.244523]  __kasan_kmalloc+0xd4/0xd8
[   22.244728]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.244787]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.244837]  kunit_try_run_case+0x170/0x3f0
[   22.244932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.245260]  kthread+0x328/0x630
[   22.245434]  ret_from_fork+0x10/0x20
[   22.245639] 
[   22.245750] The buggy address belongs to the object at fff00000c6620b00
[   22.245750]  which belongs to the cache kmalloc-128 of size 128
[   22.245850] The buggy address is located 0 bytes to the right of
[   22.245850]  allocated 120-byte region [fff00000c6620b00, fff00000c6620b78)
[   22.246226] 
[   22.246268] The buggy address belongs to the physical page:
[   22.246609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.247166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.247260] page_type: f5(slab)
[   22.247506] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.247644] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.247742] page dumped because: kasan: bad access detected
[   22.248297] 
[   22.248342] Memory state around the buggy address:
[   22.248449]  fff00000c6620a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.248560]  fff00000c6620a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248650] >fff00000c6620b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.248884]                                                                 ^
[   22.249103]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.249182]  fff00000c6620c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.249233] ==================================================================
[   22.252586] ==================================================================
[   22.252723] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   22.252808] Write of size 8 at addr fff00000c6620b78 by task kunit_try_catch/281
[   22.253332] 
[   22.253383] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.253483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.253520] Hardware name: linux,dummy-virt (DT)
[   22.253953] Call trace:
[   22.254011]  show_stack+0x20/0x38 (C)
[   22.254083]  dump_stack_lvl+0x8c/0xd0
[   22.254137]  print_report+0x118/0x608
[   22.254191]  kasan_report+0xdc/0x128
[   22.254240]  kasan_check_range+0x100/0x1a8
[   22.254632]  __kasan_check_write+0x20/0x30
[   22.254761]  copy_to_kernel_nofault+0x8c/0x250
[   22.254826]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   22.255466]  kunit_try_run_case+0x170/0x3f0
[   22.255554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.255765]  kthread+0x328/0x630
[   22.255963]  ret_from_fork+0x10/0x20
[   22.256159] 
[   22.256188] Allocated by task 281:
[   22.256365]  kasan_save_stack+0x3c/0x68
[   22.256426]  kasan_save_track+0x20/0x40
[   22.256689]  kasan_save_alloc_info+0x40/0x58
[   22.256771]  __kasan_kmalloc+0xd4/0xd8
[   22.256817]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.256863]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.257360]  kunit_try_run_case+0x170/0x3f0
[   22.257488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.257548]  kthread+0x328/0x630
[   22.257596]  ret_from_fork+0x10/0x20
[   22.257796] 
[   22.257871] The buggy address belongs to the object at fff00000c6620b00
[   22.257871]  which belongs to the cache kmalloc-128 of size 128
[   22.258206] The buggy address is located 0 bytes to the right of
[   22.258206]  allocated 120-byte region [fff00000c6620b00, fff00000c6620b78)
[   22.258439] 
[   22.258546] The buggy address belongs to the physical page:
[   22.258603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   22.259092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.259232] page_type: f5(slab)
[   22.259296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.259511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.259679] page dumped because: kasan: bad access detected
[   22.259731] 
[   22.259757] Memory state around the buggy address:
[   22.259820]  fff00000c6620a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.259879]  fff00000c6620a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.260260] >fff00000c6620b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.260337]                                                                 ^
[   22.260392]  fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.260447]  fff00000c6620c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.260745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   22.172540] ==================================================================
[   22.172612] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   22.172687] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   22.173521] 
[   22.173842] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.173991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.174028] Hardware name: linux,dummy-virt (DT)
[   22.174073] Call trace:
[   22.174416]  show_stack+0x20/0x38 (C)
[   22.174870]  dump_stack_lvl+0x8c/0xd0
[   22.174960]  print_report+0x310/0x608
[   22.175131]  kasan_report+0xdc/0x128
[   22.175333]  __asan_report_load1_noabort+0x20/0x30
[   22.175899]  vmalloc_oob+0x51c/0x5d0
[   22.175984]  kunit_try_run_case+0x170/0x3f0
[   22.176230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.176598]  kthread+0x328/0x630
[   22.176672]  ret_from_fork+0x10/0x20
[   22.177260] 
[   22.177469] The buggy address belongs to the virtual mapping at
[   22.177469]  [ffff8000800fe000, ffff800080100000) created by:
[   22.177469]  vmalloc_oob+0x98/0x5d0
[   22.177573] 
[   22.177604] The buggy address belongs to the physical page:
[   22.177644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059db
[   22.177900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.178906] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.179644] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.179728] page dumped because: kasan: bad access detected
[   22.180187] 
[   22.180250] Memory state around the buggy address:
[   22.180303]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.180362]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.180861] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.181227]                                                                 ^
[   22.181295]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.181351]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.181644] ==================================================================
[   22.167308] ==================================================================
[   22.167481] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   22.167573] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   22.167635] 
[   22.167684] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.167803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.167847] Hardware name: linux,dummy-virt (DT)
[   22.167889] Call trace:
[   22.167921]  show_stack+0x20/0x38 (C)
[   22.168001]  dump_stack_lvl+0x8c/0xd0
[   22.168060]  print_report+0x310/0x608
[   22.168116]  kasan_report+0xdc/0x128
[   22.168468]  __asan_report_load1_noabort+0x20/0x30
[   22.168596]  vmalloc_oob+0x578/0x5d0
[   22.168798]  kunit_try_run_case+0x170/0x3f0
[   22.169407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.169727]  kthread+0x328/0x630
[   22.169836]  ret_from_fork+0x10/0x20
[   22.169908] 
[   22.169954] The buggy address belongs to the virtual mapping at
[   22.169954]  [ffff8000800fe000, ffff800080100000) created by:
[   22.169954]  vmalloc_oob+0x98/0x5d0
[   22.170068] 
[   22.170100] The buggy address belongs to the physical page:
[   22.170152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059db
[   22.170217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.170302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.170373] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.170461] page dumped because: kasan: bad access detected
[   22.170533] 
[   22.170559] Memory state around the buggy address:
[   22.170609]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.170848]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.170937] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.171212]                                                              ^
[   22.171423]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.171501]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.171549] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   22.083925] ==================================================================
[   22.084026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.084521] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.086015] 
[   22.086107] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.086221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.086256] Hardware name: linux,dummy-virt (DT)
[   22.086296] Call trace:
[   22.086328]  show_stack+0x20/0x38 (C)
[   22.086396]  dump_stack_lvl+0x8c/0xd0
[   22.086465]  print_report+0x118/0x608
[   22.086524]  kasan_report+0xdc/0x128
[   22.086581]  kasan_check_range+0x100/0x1a8
[   22.086637]  __kasan_check_write+0x20/0x30
[   22.086693]  kasan_atomics_helper+0x154c/0x4858
[   22.086751]  kasan_atomics+0x198/0x2e0
[   22.086806]  kunit_try_run_case+0x170/0x3f0
[   22.086863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.086925]  kthread+0x328/0x630
[   22.086988]  ret_from_fork+0x10/0x20
[   22.087052] 
[   22.087077] Allocated by task 265:
[   22.087113]  kasan_save_stack+0x3c/0x68
[   22.088819]  kasan_save_track+0x20/0x40
[   22.088930]  kasan_save_alloc_info+0x40/0x58
[   22.089037]  __kasan_kmalloc+0xd4/0xd8
[   22.089117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.089166]  kasan_atomics+0xb8/0x2e0
[   22.089224]  kunit_try_run_case+0x170/0x3f0
[   22.089325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.089428]  kthread+0x328/0x630
[   22.089526]  ret_from_fork+0x10/0x20
[   22.089572] 
[   22.089605] The buggy address belongs to the object at fff00000c59de300
[   22.089605]  which belongs to the cache kmalloc-64 of size 64
[   22.089685] The buggy address is located 0 bytes to the right of
[   22.089685]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.089759] 
[   22.089786] The buggy address belongs to the physical page:
[   22.089850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.089918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.090021] page_type: f5(slab)
[   22.090076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.090135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.090185] page dumped because: kasan: bad access detected
[   22.090225] 
[   22.090249] Memory state around the buggy address:
[   22.090290]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.090370]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.090423] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.090491]                                      ^
[   22.090557]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.090612]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.090672] ==================================================================
[   22.091569] ==================================================================
[   22.091648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.091727] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.091787] 
[   22.091830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.091927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.091960] Hardware name: linux,dummy-virt (DT)
[   22.092018] Call trace:
[   22.092049]  show_stack+0x20/0x38 (C)
[   22.092109]  dump_stack_lvl+0x8c/0xd0
[   22.092164]  print_report+0x118/0x608
[   22.092216]  kasan_report+0xdc/0x128
[   22.092270]  kasan_check_range+0x100/0x1a8
[   22.092323]  __kasan_check_write+0x20/0x30
[   22.092376]  kasan_atomics_helper+0x15b4/0x4858
[   22.092439]  kasan_atomics+0x198/0x2e0
[   22.092551]  kunit_try_run_case+0x170/0x3f0
[   22.092670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.092731]  kthread+0x328/0x630
[   22.092784]  ret_from_fork+0x10/0x20
[   22.092841] 
[   22.092866] Allocated by task 265:
[   22.092902]  kasan_save_stack+0x3c/0x68
[   22.092953]  kasan_save_track+0x20/0x40
[   22.093014]  kasan_save_alloc_info+0x40/0x58
[   22.093062]  __kasan_kmalloc+0xd4/0xd8
[   22.093105]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.093151]  kasan_atomics+0xb8/0x2e0
[   22.093220]  kunit_try_run_case+0x170/0x3f0
[   22.093277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.093338]  kthread+0x328/0x630
[   22.093391]  ret_from_fork+0x10/0x20
[   22.093445] 
[   22.094009] The buggy address belongs to the object at fff00000c59de300
[   22.094009]  which belongs to the cache kmalloc-64 of size 64
[   22.094085] The buggy address is located 0 bytes to the right of
[   22.094085]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.094161] 
[   22.094707] The buggy address belongs to the physical page:
[   22.094805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.094876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.095175] page_type: f5(slab)
[   22.095256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.095325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.095376] page dumped because: kasan: bad access detected
[   22.095425] 
[   22.095457] Memory state around the buggy address:
[   22.095508]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.095561]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096014] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.096100]                                      ^
[   22.096169]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.096264]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.096344] ==================================================================
[   21.835378] ==================================================================
[   21.835462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.835544] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.835606] 
[   21.835652] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.835758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.835795] Hardware name: linux,dummy-virt (DT)
[   21.835878] Call trace:
[   21.835917]  show_stack+0x20/0x38 (C)
[   21.835993]  dump_stack_lvl+0x8c/0xd0
[   21.836056]  print_report+0x118/0x608
[   21.836135]  kasan_report+0xdc/0x128
[   21.836198]  __asan_report_load4_noabort+0x20/0x30
[   21.836261]  kasan_atomics_helper+0x3dcc/0x4858
[   21.836324]  kasan_atomics+0x198/0x2e0
[   21.836376]  kunit_try_run_case+0x170/0x3f0
[   21.836455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.836527]  kthread+0x328/0x630
[   21.836583]  ret_from_fork+0x10/0x20
[   21.836643] 
[   21.836670] Allocated by task 265:
[   21.836708]  kasan_save_stack+0x3c/0x68
[   21.836761]  kasan_save_track+0x20/0x40
[   21.836806]  kasan_save_alloc_info+0x40/0x58
[   21.836852]  __kasan_kmalloc+0xd4/0xd8
[   21.836897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.836943]  kasan_atomics+0xb8/0x2e0
[   21.837001]  kunit_try_run_case+0x170/0x3f0
[   21.837078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.837131]  kthread+0x328/0x630
[   21.837173]  ret_from_fork+0x10/0x20
[   21.838105] 
[   21.838168] The buggy address belongs to the object at fff00000c59de300
[   21.838168]  which belongs to the cache kmalloc-64 of size 64
[   21.838249] The buggy address is located 0 bytes to the right of
[   21.838249]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.838325] 
[   21.838359] The buggy address belongs to the physical page:
[   21.838409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.838658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.838725] page_type: f5(slab)
[   21.838877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.839165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.839243] page dumped because: kasan: bad access detected
[   21.839388] 
[   21.839418] Memory state around the buggy address:
[   21.839605]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.839792]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.841735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   21.845951]  kthread+0x328/0x630
[   21.847457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.850843] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.854364]  print_report+0x118/0x608
[   21.857769]  kasan_save_alloc_info+0x40/0x58
[   21.859215] 
[   21.861231]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.866995] 
[   21.868774]  ret_from_fork+0x10/0x20
[   21.870195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.870620] page dumped because: kasan: bad access detected
[   21.870772]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.879072]  kunit_try_run_case+0x170/0x3f0
[   21.881700] page dumped because: kasan: bad access detected
[   21.882798]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886526] Hardware name: linux,dummy-virt (DT)
[   21.887964]  kasan_save_alloc_info+0x40/0x58
[   21.889479] 
[   21.889509] The buggy address belongs to the object at fff00000c59de300
[   21.889509]  which belongs to the cache kmalloc-64 of size 64
[   21.891154] page dumped because: kasan: bad access detected
[   21.891319] 
[   21.891384] Memory state around the buggy address:
[   21.891433]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.891487]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.891625] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.891676]                                      ^
[   21.892053]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.892234]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.892286] ==================================================================
[   21.977845] ==================================================================
[   21.977925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.978015] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.978077] 
[   21.978122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.978224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.978257] Hardware name: linux,dummy-virt (DT)
[   21.978299] Call trace:
[   21.978329]  show_stack+0x20/0x38 (C)
[   21.978391]  dump_stack_lvl+0x8c/0xd0
[   21.978448]  print_report+0x118/0x608
[   21.978503]  kasan_report+0xdc/0x128
[   21.978557]  kasan_check_range+0x100/0x1a8
[   21.978615]  __kasan_check_write+0x20/0x30
[   21.978673]  kasan_atomics_helper+0xf20/0x4858
[   21.978731]  kasan_atomics+0x198/0x2e0
[   21.978785]  kunit_try_run_case+0x170/0x3f0
[   21.978840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.978903]  kthread+0x328/0x630
[   21.978957]  ret_from_fork+0x10/0x20
[   21.979471] 
[   21.980061] Allocated by task 265:
[   21.980155]  kasan_save_stack+0x3c/0x68
[   21.980573]  kasan_save_track+0x20/0x40
[   21.980881]  kasan_save_alloc_info+0x40/0x58
[   21.981101]  __kasan_kmalloc+0xd4/0xd8
[   21.981469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.981600]  kasan_atomics+0xb8/0x2e0
[   21.981656]  kunit_try_run_case+0x170/0x3f0
[   21.981705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.982003]  kthread+0x328/0x630
[   21.982250]  ret_from_fork+0x10/0x20
[   21.982592] 
[   21.982636] The buggy address belongs to the object at fff00000c59de300
[   21.982636]  which belongs to the cache kmalloc-64 of size 64
[   21.982722] The buggy address is located 0 bytes to the right of
[   21.982722]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.982801] 
[   21.982829] The buggy address belongs to the physical page:
[   21.983257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.983398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.983479] page_type: f5(slab)
[   21.983560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.983731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.983793] page dumped because: kasan: bad access detected
[   21.983994] 
[   21.984073] Memory state around the buggy address:
[   21.984148]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.984459]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.984631] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.984693]                                      ^
[   21.984738]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985067]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985131] ==================================================================
[   21.995516] ==================================================================
[   21.995588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.995659] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.995715] 
[   21.995757] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.995853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.995885] Hardware name: linux,dummy-virt (DT)
[   21.995924] Call trace:
[   21.995954]  show_stack+0x20/0x38 (C)
[   21.996088]  dump_stack_lvl+0x8c/0xd0
[   21.996141]  print_report+0x118/0x608
[   21.996190]  kasan_report+0xdc/0x128
[   21.996238]  kasan_check_range+0x100/0x1a8
[   21.996291]  __kasan_check_write+0x20/0x30
[   21.996344]  kasan_atomics_helper+0xff0/0x4858
[   21.996399]  kasan_atomics+0x198/0x2e0
[   21.996449]  kunit_try_run_case+0x170/0x3f0
[   21.996500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.996558]  kthread+0x328/0x630
[   21.996676]  ret_from_fork+0x10/0x20
[   21.996741] 
[   21.996767] Allocated by task 265:
[   21.996801]  kasan_save_stack+0x3c/0x68
[   21.996853]  kasan_save_track+0x20/0x40
[   21.996898]  kasan_save_alloc_info+0x40/0x58
[   21.996945]  __kasan_kmalloc+0xd4/0xd8
[   21.997001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.997051]  kasan_atomics+0xb8/0x2e0
[   21.997135]  kunit_try_run_case+0x170/0x3f0
[   21.997184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.997235]  kthread+0x328/0x630
[   21.997277]  ret_from_fork+0x10/0x20
[   21.997320] 
[   21.997349] The buggy address belongs to the object at fff00000c59de300
[   21.997349]  which belongs to the cache kmalloc-64 of size 64
[   21.997429] The buggy address is located 0 bytes to the right of
[   21.997429]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.997503] 
[   21.997531] The buggy address belongs to the physical page:
[   21.997570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.997627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.997682] page_type: f5(slab)
[   21.997730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.997790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.997867] page dumped because: kasan: bad access detected
[   21.997950] 
[   21.998019] Memory state around the buggy address:
[   21.998063]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.998115]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.998166] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.998210]                                      ^
[   21.998253]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.998302]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.998347] ==================================================================
[   22.096606] ==================================================================
[   22.096665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.096742] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.096801] 
[   22.096843] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.096937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.097006] Hardware name: linux,dummy-virt (DT)
[   22.097051] Call trace:
[   22.097080]  show_stack+0x20/0x38 (C)
[   22.097139]  dump_stack_lvl+0x8c/0xd0
[   22.097195]  print_report+0x118/0x608
[   22.097254]  kasan_report+0xdc/0x128
[   22.097372]  __asan_report_load8_noabort+0x20/0x30
[   22.097496]  kasan_atomics_helper+0x3db0/0x4858
[   22.097551]  kasan_atomics+0x198/0x2e0
[   22.097611]  kunit_try_run_case+0x170/0x3f0
[   22.097719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.097857]  kthread+0x328/0x630
[   22.098205]  ret_from_fork+0x10/0x20
[   22.098469] 
[   22.098500] Allocated by task 265:
[   22.098539]  kasan_save_stack+0x3c/0x68
[   22.098597]  kasan_save_track+0x20/0x40
[   22.098645]  kasan_save_alloc_info+0x40/0x58
[   22.098694]  __kasan_kmalloc+0xd4/0xd8
[   22.098739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.098787]  kasan_atomics+0xb8/0x2e0
[   22.098832]  kunit_try_run_case+0x170/0x3f0
[   22.098969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.099088]  kthread+0x328/0x630
[   22.099137]  ret_from_fork+0x10/0x20
[   22.099184] 
[   22.099210] The buggy address belongs to the object at fff00000c59de300
[   22.099210]  which belongs to the cache kmalloc-64 of size 64
[   22.099279] The buggy address is located 0 bytes to the right of
[   22.099279]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.099355] 
[   22.099381] The buggy address belongs to the physical page:
[   22.099439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.099508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.099613] page_type: f5(slab)
[   22.099687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.099751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.099801] page dumped because: kasan: bad access detected
[   22.099867] 
[   22.099907] Memory state around the buggy address:
[   22.099949]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.100016]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.100069] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.100115]                                      ^
[   22.100156]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100208]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100286] ==================================================================
[   21.778836] ==================================================================
[   21.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.779370] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.779439] 
[   21.779550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.779654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.779691] Hardware name: linux,dummy-virt (DT)
[   21.780126] Call trace:
[   21.780204]  show_stack+0x20/0x38 (C)
[   21.780434]  dump_stack_lvl+0x8c/0xd0
[   21.780559]  print_report+0x118/0x608
[   21.780680]  kasan_report+0xdc/0x128
[   21.780925]  __asan_report_load4_noabort+0x20/0x30
[   21.781023]  kasan_atomics_helper+0x42d8/0x4858
[   21.781311]  kasan_atomics+0x198/0x2e0
[   21.781381]  kunit_try_run_case+0x170/0x3f0
[   21.781529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.781796]  kthread+0x328/0x630
[   21.781913]  ret_from_fork+0x10/0x20
[   21.781989] 
[   21.782121] Allocated by task 265:
[   21.782180]  kasan_save_stack+0x3c/0x68
[   21.782242]  kasan_save_track+0x20/0x40
[   21.782447]  kasan_save_alloc_info+0x40/0x58
[   21.782501]  __kasan_kmalloc+0xd4/0xd8
[   21.782546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.782596]  kasan_atomics+0xb8/0x2e0
[   21.782684]  kunit_try_run_case+0x170/0x3f0
[   21.782738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.782837]  ret_from_fork+0x10/0x20
[   21.783907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.783994] page_type: f5(slab)
[   21.784046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.784465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.784854]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.785156] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.785435]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.785730] ==================================================================
[   21.824896] ==================================================================
[   21.825511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.825614] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.825979] 
[   21.826042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.826394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.826606] Hardware name: linux,dummy-virt (DT)
[   21.826663] Call trace:
[   21.826827]  show_stack+0x20/0x38 (C)
[   21.827008]  dump_stack_lvl+0x8c/0xd0
[   21.827125]  print_report+0x118/0x608
[   21.827229]  kasan_report+0xdc/0x128
[   21.827574]  kasan_check_range+0x100/0x1a8
[   21.827661]  __kasan_check_write+0x20/0x30
[   21.827722]  kasan_atomics_helper+0xad4/0x4858
[   21.827783]  kasan_atomics+0x198/0x2e0
[   21.827981]  kunit_try_run_case+0x170/0x3f0
[   21.828373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.828499]  kthread+0x328/0x630
[   21.828565]  ret_from_fork+0x10/0x20
[   21.828647] 
[   21.828682] Allocated by task 265:
[   21.828900]  kasan_save_stack+0x3c/0x68
[   21.829169]  kasan_save_track+0x20/0x40
[   21.829341]  kasan_save_alloc_info+0x40/0x58
[   21.829412]  __kasan_kmalloc+0xd4/0xd8
[   21.829462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.829744]  kasan_atomics+0xb8/0x2e0
[   21.829999]  kunit_try_run_case+0x170/0x3f0
[   21.830177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.830250]  kthread+0x328/0x630
[   21.830437]  ret_from_fork+0x10/0x20
[   21.830523] 
[   21.830561] The buggy address belongs to the object at fff00000c59de300
[   21.830561]  which belongs to the cache kmalloc-64 of size 64
[   21.830773] The buggy address is located 0 bytes to the right of
[   21.830773]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.830862] 
[   21.830893] The buggy address belongs to the physical page:
[   21.831103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.831303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.831643] page_type: f5(slab)
[   21.831719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.831782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.831831] page dumped because: kasan: bad access detected
[   21.831871] 
[   21.832070] Memory state around the buggy address:
[   21.832281]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.832391]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.832450] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.832704]                                      ^
[   21.832868]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.833098]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.833293] ==================================================================
[   22.137206] ==================================================================
[   22.137454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.137675] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.137768] 
[   22.137822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.137928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.137966] Hardware name: linux,dummy-virt (DT)
[   22.138018] Call trace:
[   22.138318]  show_stack+0x20/0x38 (C)
[   22.138432]  dump_stack_lvl+0x8c/0xd0
[   22.138596]  print_report+0x118/0x608
[   22.138660]  kasan_report+0xdc/0x128
[   22.138861]  __asan_report_load8_noabort+0x20/0x30
[   22.138930]  kasan_atomics_helper+0x3e20/0x4858
[   22.139025]  kasan_atomics+0x198/0x2e0
[   22.139138]  kunit_try_run_case+0x170/0x3f0
[   22.139250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.139316]  kthread+0x328/0x630
[   22.139412]  ret_from_fork+0x10/0x20
[   22.139502] 
[   22.139557] Allocated by task 265:
[   22.139651]  kasan_save_stack+0x3c/0x68
[   22.139707]  kasan_save_track+0x20/0x40
[   22.139753]  kasan_save_alloc_info+0x40/0x58
[   22.139803]  __kasan_kmalloc+0xd4/0xd8
[   22.139875]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.139979]  kasan_atomics+0xb8/0x2e0
[   22.140089]  kunit_try_run_case+0x170/0x3f0
[   22.140177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.140229]  kthread+0x328/0x630
[   22.140271]  ret_from_fork+0x10/0x20
[   22.140322] 
[   22.140348] The buggy address belongs to the object at fff00000c59de300
[   22.140348]  which belongs to the cache kmalloc-64 of size 64
[   22.140439] The buggy address is located 0 bytes to the right of
[   22.140439]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.140517] 
[   22.140546] The buggy address belongs to the physical page:
[   22.140599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.140734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.140797] page_type: f5(slab)
[   22.140848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.140911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.140960] page dumped because: kasan: bad access detected
[   22.141163] 
[   22.141186] Memory state around the buggy address:
[   22.141226]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141276]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141669] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.141922]                                      ^
[   22.141985]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.142042]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.142087] ==================================================================
[   22.064787] ==================================================================
[   22.064851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.064923] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.064993] 
[   22.065033] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.065130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.065163] Hardware name: linux,dummy-virt (DT)
[   22.065201] Call trace:
[   22.065229]  show_stack+0x20/0x38 (C)
[   22.065320]  dump_stack_lvl+0x8c/0xd0
[   22.065543]  print_report+0x118/0x608
[   22.065610]  kasan_report+0xdc/0x128
[   22.065860]  kasan_check_range+0x100/0x1a8
[   22.066055]  __kasan_check_write+0x20/0x30
[   22.066130]  kasan_atomics_helper+0x147c/0x4858
[   22.066206]  kasan_atomics+0x198/0x2e0
[   22.066262]  kunit_try_run_case+0x170/0x3f0
[   22.066318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.066379]  kthread+0x328/0x630
[   22.066625]  ret_from_fork+0x10/0x20
[   22.067487] 
[   22.067743] Allocated by task 265:
[   22.067836]  kasan_save_stack+0x3c/0x68
[   22.068105]  kasan_save_track+0x20/0x40
[   22.068252]  kasan_save_alloc_info+0x40/0x58
[   22.068303]  __kasan_kmalloc+0xd4/0xd8
[   22.068904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.069283]  kasan_atomics+0xb8/0x2e0
[   22.069574]  kunit_try_run_case+0x170/0x3f0
[   22.069726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.070031]  kthread+0x328/0x630
[   22.070195]  ret_from_fork+0x10/0x20
[   22.070247] 
[   22.070630] The buggy address belongs to the object at fff00000c59de300
[   22.070630]  which belongs to the cache kmalloc-64 of size 64
[   22.070703] The buggy address is located 0 bytes to the right of
[   22.070703]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.071164] 
[   22.071191] The buggy address belongs to the physical page:
[   22.071229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.071546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.071612] page_type: f5(slab)
[   22.071858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.072255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.072379] page dumped because: kasan: bad access detected
[   22.072724] 
[   22.072791] Memory state around the buggy address:
[   22.072834]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.073366]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.073464] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.073898]                                      ^
[   22.074011]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.074066]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.074109] ==================================================================
[   21.642326] ==================================================================
[   21.642415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   21.642618] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.643180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.643397]  show_stack+0x20/0x38 (C)
[   21.644019]  kasan_atomics+0x198/0x2e0
[   21.645070] 
[   21.646018]  kunit_try_run_case+0x170/0x3f0
[   21.647284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.648418]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.648595] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.648653]                                      ^
[   21.648816]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.648993]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.649111] ==================================================================
[   22.105402] ==================================================================
[   22.105457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.105572] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.105634] 
[   22.105675] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.105771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.105841] Hardware name: linux,dummy-virt (DT)
[   22.105892] Call trace:
[   22.105925]  show_stack+0x20/0x38 (C)
[   22.106019]  dump_stack_lvl+0x8c/0xd0
[   22.106129]  print_report+0x118/0x608
[   22.106188]  kasan_report+0xdc/0x128
[   22.106265]  __asan_report_load8_noabort+0x20/0x30
[   22.106479]  kasan_atomics_helper+0x3df4/0x4858
[   22.106642]  kasan_atomics+0x198/0x2e0
[   22.106704]  kunit_try_run_case+0x170/0x3f0
[   22.106765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.106827]  kthread+0x328/0x630
[   22.106883]  ret_from_fork+0x10/0x20
[   22.106941] 
[   22.106965] Allocated by task 265:
[   22.107015]  kasan_save_stack+0x3c/0x68
[   22.107118]  kasan_save_track+0x20/0x40
[   22.107533]  kasan_save_alloc_info+0x40/0x58
[   22.108238]  __kasan_kmalloc+0xd4/0xd8
[   22.108321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.108746]  kasan_atomics+0xb8/0x2e0
[   22.108832]  kunit_try_run_case+0x170/0x3f0
[   22.108895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.109151]  kthread+0x328/0x630
[   22.109427]  ret_from_fork+0x10/0x20
[   22.109502] 
[   22.109551] The buggy address belongs to the object at fff00000c59de300
[   22.109551]  which belongs to the cache kmalloc-64 of size 64
[   22.109968] The buggy address is located 0 bytes to the right of
[   22.109968]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.110120] 
[   22.110174] The buggy address belongs to the physical page:
[   22.110440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.110548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.110611] page_type: f5(slab)
[   22.110662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.110724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.110771] page dumped because: kasan: bad access detected
[   22.110850] 
[   22.111240] Memory state around the buggy address:
[   22.111291]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111367]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111418] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.111599]                                      ^
[   22.112048]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112137]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112282] ==================================================================
[   22.041961] ==================================================================
[   22.042053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.042129] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.042188] 
[   22.042229] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.042328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.042362] Hardware name: linux,dummy-virt (DT)
[   22.042399] Call trace:
[   22.042427]  show_stack+0x20/0x38 (C)
[   22.042605]  dump_stack_lvl+0x8c/0xd0
[   22.042765]  print_report+0x118/0x608
[   22.042824]  kasan_report+0xdc/0x128
[   22.042880]  kasan_check_range+0x100/0x1a8
[   22.043033]  __kasan_check_write+0x20/0x30
[   22.043099]  kasan_atomics_helper+0x12d8/0x4858
[   22.043151]  kasan_atomics+0x198/0x2e0
[   22.043200]  kunit_try_run_case+0x170/0x3f0
[   22.043252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043308]  kthread+0x328/0x630
[   22.043360]  ret_from_fork+0x10/0x20
[   22.043415] 
[   22.043438] Allocated by task 265:
[   22.043503]  kasan_save_stack+0x3c/0x68
[   22.043551]  kasan_save_track+0x20/0x40
[   22.043593]  kasan_save_alloc_info+0x40/0x58
[   22.043636]  __kasan_kmalloc+0xd4/0xd8
[   22.043676]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.043718]  kasan_atomics+0xb8/0x2e0
[   22.043786]  kunit_try_run_case+0x170/0x3f0
[   22.043857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043907]  kthread+0x328/0x630
[   22.044045]  ret_from_fork+0x10/0x20
[   22.044281] 
[   22.044326] The buggy address belongs to the object at fff00000c59de300
[   22.044326]  which belongs to the cache kmalloc-64 of size 64
[   22.044389] The buggy address is located 0 bytes to the right of
[   22.044389]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.045050] 
[   22.045229] The buggy address belongs to the physical page:
[   22.045273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.045529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.045978] page_type: f5(slab)
[   22.046041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.046552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.046684] page dumped because: kasan: bad access detected
[   22.046792] 
[   22.046845] Memory state around the buggy address:
[   22.046888]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.046946]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.047011] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.047059]                                      ^
[   22.047132]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047196]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047241] ==================================================================
[   22.121052] ==================================================================
[   22.121147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.121235] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.121296] 
[   22.121339] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.121437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.121471] Hardware name: linux,dummy-virt (DT)
[   22.121512] Call trace:
[   22.121541]  show_stack+0x20/0x38 (C)
[   22.121602]  dump_stack_lvl+0x8c/0xd0
[   22.121659]  print_report+0x118/0x608
[   22.121712]  kasan_report+0xdc/0x128
[   22.121766]  __asan_report_load8_noabort+0x20/0x30
[   22.121838]  kasan_atomics_helper+0x3e10/0x4858
[   22.121903]  kasan_atomics+0x198/0x2e0
[   22.121958]  kunit_try_run_case+0x170/0x3f0
[   22.122029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.122092]  kthread+0x328/0x630
[   22.122147]  ret_from_fork+0x10/0x20
[   22.123842] 
[   22.124523] Allocated by task 265:
[   22.124601]  kasan_save_stack+0x3c/0x68
[   22.125138]  kasan_save_track+0x20/0x40
[   22.125449]  kasan_save_alloc_info+0x40/0x58
[   22.125665]  __kasan_kmalloc+0xd4/0xd8
[   22.125772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.125836]  kasan_atomics+0xb8/0x2e0
[   22.125888]  kunit_try_run_case+0x170/0x3f0
[   22.125937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.126002]  kthread+0x328/0x630
[   22.126053]  ret_from_fork+0x10/0x20
[   22.126098] 
[   22.126125] The buggy address belongs to the object at fff00000c59de300
[   22.126125]  which belongs to the cache kmalloc-64 of size 64
[   22.126192] The buggy address is located 0 bytes to the right of
[   22.126192]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.126262] 
[   22.126759] The buggy address belongs to the physical page:
[   22.126869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.127924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.128887] page_type: f5(slab)
[   22.129222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.129363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.129422] page dumped because: kasan: bad access detected
[   22.129475] 
[   22.129654] Memory state around the buggy address:
[   22.129906]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130335]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130400] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.130625]                                      ^
[   22.130693]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130749]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130859] ==================================================================
[   21.915690] ==================================================================
[   21.916178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.916555] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.916641] 
[   21.916690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.916791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.916827] Hardware name: linux,dummy-virt (DT)
[   21.917253] Call trace:
[   21.917314]  show_stack+0x20/0x38 (C)
[   21.917388]  dump_stack_lvl+0x8c/0xd0
[   21.917448]  print_report+0x118/0x608
[   21.917873]  kasan_report+0xdc/0x128
[   21.917963]  __asan_report_load4_noabort+0x20/0x30
[   21.918047]  kasan_atomics_helper+0x3e04/0x4858
[   21.918363]  kasan_atomics+0x198/0x2e0
[   21.918540]  kunit_try_run_case+0x170/0x3f0
[   21.918699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.918775]  kthread+0x328/0x630
[   21.918850]  ret_from_fork+0x10/0x20
[   21.919220] 
[   21.919265] Allocated by task 265:
[   21.919351]  kasan_save_stack+0x3c/0x68
[   21.919460]  kasan_save_track+0x20/0x40
[   21.920343]  kasan_save_alloc_info+0x40/0x58
[   21.920440]  __kasan_kmalloc+0xd4/0xd8
[   21.920489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.920554]  kasan_atomics+0xb8/0x2e0
[   21.920617]  kunit_try_run_case+0x170/0x3f0
[   21.920679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.921051]  kthread+0x328/0x630
[   21.921168]  ret_from_fork+0x10/0x20
[   21.921220] 
[   21.921249] The buggy address belongs to the object at fff00000c59de300
[   21.921249]  which belongs to the cache kmalloc-64 of size 64
[   21.921732] The buggy address is located 0 bytes to the right of
[   21.921732]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.921846] 
[   21.922036] The buggy address belongs to the physical page:
[   21.922103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.922392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.922629] page_type: f5(slab)
[   21.922692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.922887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.922950] page dumped because: kasan: bad access detected
[   21.923007] 
[   21.923033] Memory state around the buggy address:
[   21.923183]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.923292]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.923349] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.923396]                                      ^
[   21.923554]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.923614]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.923663] ==================================================================
[   21.798436] ==================================================================
[   21.798534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.798611] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.798673] 
[   21.799021] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.799375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.799582] Hardware name: linux,dummy-virt (DT)
[   21.799753] Call trace:
[   21.799946]  show_stack+0x20/0x38 (C)
[   21.800296]  dump_stack_lvl+0x8c/0xd0
[   21.800371]  print_report+0x118/0x608
[   21.800474]  kasan_report+0xdc/0x128
[   21.800535]  kasan_check_range+0x100/0x1a8
[   21.800760]  __kasan_check_write+0x20/0x30
[   21.800831]  kasan_atomics_helper+0x99c/0x4858
[   21.800891]  kasan_atomics+0x198/0x2e0
[   21.800946]  kunit_try_run_case+0x170/0x3f0
[   21.801118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.801219]  kthread+0x328/0x630
[   21.801850]  ret_from_fork+0x10/0x20
[   21.802108] 
[   21.802244] Allocated by task 265:
[   21.802313]  kasan_save_stack+0x3c/0x68
[   21.802389]  kasan_save_track+0x20/0x40
[   21.802442]  kasan_save_alloc_info+0x40/0x58
[   21.802507]  __kasan_kmalloc+0xd4/0xd8
[   21.802552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.802601]  kasan_atomics+0xb8/0x2e0
[   21.802645]  kunit_try_run_case+0x170/0x3f0
[   21.802694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.803129]  kthread+0x328/0x630
[   21.803282]  ret_from_fork+0x10/0x20
[   21.803339] 
[   21.803378] The buggy address belongs to the object at fff00000c59de300
[   21.803378]  which belongs to the cache kmalloc-64 of size 64
[   21.803753] The buggy address is located 0 bytes to the right of
[   21.803753]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.803832] 
[   21.804129] The buggy address belongs to the physical page:
[   21.804183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.804268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.804330] page_type: f5(slab)
[   21.804546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.804757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.804827] page dumped because: kasan: bad access detected
[   21.804886] 
[   21.804988] Memory state around the buggy address:
[   21.805038]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.805098]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.805559] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.805629]                                      ^
[   21.805690]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.805745]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.805793] ==================================================================
[   22.025493] ==================================================================
[   22.026116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.026408] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.026993] 
[   22.027050] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.027166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.027508] Hardware name: linux,dummy-virt (DT)
[   22.027608] Call trace:
[   22.027802]  show_stack+0x20/0x38 (C)
[   22.028265]  dump_stack_lvl+0x8c/0xd0
[   22.028521]  print_report+0x118/0x608
[   22.028578]  kasan_report+0xdc/0x128
[   22.029181]  kasan_check_range+0x100/0x1a8
[   22.030021]  __kasan_check_write+0x20/0x30
[   22.030138]  kasan_atomics_helper+0x1190/0x4858
[   22.030202]  kasan_atomics+0x198/0x2e0
[   22.030255]  kunit_try_run_case+0x170/0x3f0
[   22.030312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030373]  kthread+0x328/0x630
[   22.030643]  ret_from_fork+0x10/0x20
[   22.030739] 
[   22.030766] Allocated by task 265:
[   22.030822]  kasan_save_stack+0x3c/0x68
[   22.030947]  kasan_save_track+0x20/0x40
[   22.031013]  kasan_save_alloc_info+0x40/0x58
[   22.031060]  __kasan_kmalloc+0xd4/0xd8
[   22.031113]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.031157]  kasan_atomics+0xb8/0x2e0
[   22.031198]  kunit_try_run_case+0x170/0x3f0
[   22.031255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.031304]  kthread+0x328/0x630
[   22.031347]  ret_from_fork+0x10/0x20
[   22.031440] 
[   22.031471] The buggy address belongs to the object at fff00000c59de300
[   22.031471]  which belongs to the cache kmalloc-64 of size 64
[   22.031544] The buggy address is located 0 bytes to the right of
[   22.031544]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.031688] 
[   22.031719] The buggy address belongs to the physical page:
[   22.031756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.031815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.031868] page_type: f5(slab)
[   22.031915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.032007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.032116] page dumped because: kasan: bad access detected
[   22.032178] 
[   22.032200] Memory state around the buggy address:
[   22.032249]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.032317]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.032366] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.032431]                                      ^
[   22.032516]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032568]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032616] ==================================================================
[   22.075803] ==================================================================
[   22.075878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.075950] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.076022] 
[   22.076063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.076156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.076189] Hardware name: linux,dummy-virt (DT)
[   22.076228] Call trace:
[   22.076257]  show_stack+0x20/0x38 (C)
[   22.076316]  dump_stack_lvl+0x8c/0xd0
[   22.077313]  print_report+0x118/0x608
[   22.077412]  kasan_report+0xdc/0x128
[   22.077489]  kasan_check_range+0x100/0x1a8
[   22.077548]  __kasan_check_write+0x20/0x30
[   22.077956]  kasan_atomics_helper+0x14e4/0x4858
[   22.078059]  kasan_atomics+0x198/0x2e0
[   22.078198]  kunit_try_run_case+0x170/0x3f0
[   22.078263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.078529]  kthread+0x328/0x630
[   22.078597]  ret_from_fork+0x10/0x20
[   22.078992] 
[   22.079036] Allocated by task 265:
[   22.079082]  kasan_save_stack+0x3c/0x68
[   22.079154]  kasan_save_track+0x20/0x40
[   22.079345]  kasan_save_alloc_info+0x40/0x58
[   22.079581]  __kasan_kmalloc+0xd4/0xd8
[   22.079766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.079830]  kasan_atomics+0xb8/0x2e0
[   22.079877]  kunit_try_run_case+0x170/0x3f0
[   22.080099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.080181]  kthread+0x328/0x630
[   22.080234]  ret_from_fork+0x10/0x20
[   22.080477] 
[   22.080513] The buggy address belongs to the object at fff00000c59de300
[   22.080513]  which belongs to the cache kmalloc-64 of size 64
[   22.080587] The buggy address is located 0 bytes to the right of
[   22.080587]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.080676] 
[   22.080706] The buggy address belongs to the physical page:
[   22.081054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.081143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.081343] page_type: f5(slab)
[   22.081412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.081831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.081905] page dumped because: kasan: bad access detected
[   22.082257] 
[   22.082302] Memory state around the buggy address:
[   22.082352]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082409]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.082608]                                      ^
[   22.082653]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082918]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.083115] ==================================================================
[   22.013578] ==================================================================
[   22.013939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.014073] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.014712] 
[   22.014808] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.014923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.016052] Hardware name: linux,dummy-virt (DT)
[   22.016187] Call trace:
[   22.016356]  show_stack+0x20/0x38 (C)
[   22.017055]  dump_stack_lvl+0x8c/0xd0
[   22.017286]  print_report+0x118/0x608
[   22.017348]  kasan_report+0xdc/0x128
[   22.017402]  kasan_check_range+0x100/0x1a8
[   22.017460]  __kasan_check_write+0x20/0x30
[   22.017517]  kasan_atomics_helper+0x1128/0x4858
[   22.017577]  kasan_atomics+0x198/0x2e0
[   22.018632]  kunit_try_run_case+0x170/0x3f0
[   22.018728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.018797]  kthread+0x328/0x630
[   22.019198]  ret_from_fork+0x10/0x20
[   22.019299] 
[   22.019366] Allocated by task 265:
[   22.019458]  kasan_save_stack+0x3c/0x68
[   22.019559]  kasan_save_track+0x20/0x40
[   22.019856]  kasan_save_alloc_info+0x40/0x58
[   22.019980]  __kasan_kmalloc+0xd4/0xd8
[   22.020036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.020093]  kasan_atomics+0xb8/0x2e0
[   22.020249]  kunit_try_run_case+0x170/0x3f0
[   22.020581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.020819]  kthread+0x328/0x630
[   22.020874]  ret_from_fork+0x10/0x20
[   22.020920] 
[   22.020977] The buggy address belongs to the object at fff00000c59de300
[   22.020977]  which belongs to the cache kmalloc-64 of size 64
[   22.021049] The buggy address is located 0 bytes to the right of
[   22.021049]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.021117] 
[   22.021143] The buggy address belongs to the physical page:
[   22.021181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.021238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.021292] page_type: f5(slab)
[   22.021337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.021400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.021442] page dumped because: kasan: bad access detected
[   22.021479] 
[   22.021501] Memory state around the buggy address:
[   22.021539]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.021590]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.022013] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.022203]                                      ^
[   22.022661]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.022809]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.022914] ==================================================================
[   22.037465] ==================================================================
[   22.037527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.037594] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.037653] 
[   22.037693] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.037793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.037846] Hardware name: linux,dummy-virt (DT)
[   22.037884] Call trace:
[   22.037913]  show_stack+0x20/0x38 (C)
[   22.037987]  dump_stack_lvl+0x8c/0xd0
[   22.038047]  print_report+0x118/0x608
[   22.038102]  kasan_report+0xdc/0x128
[   22.038155]  kasan_check_range+0x100/0x1a8
[   22.038215]  __kasan_check_write+0x20/0x30
[   22.038270]  kasan_atomics_helper+0x126c/0x4858
[   22.038326]  kasan_atomics+0x198/0x2e0
[   22.038380]  kunit_try_run_case+0x170/0x3f0
[   22.038436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.038553]  kthread+0x328/0x630
[   22.038613]  ret_from_fork+0x10/0x20
[   22.038764] 
[   22.038808] Allocated by task 265:
[   22.038881]  kasan_save_stack+0x3c/0x68
[   22.038954]  kasan_save_track+0x20/0x40
[   22.039014]  kasan_save_alloc_info+0x40/0x58
[   22.039065]  __kasan_kmalloc+0xd4/0xd8
[   22.039111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.039158]  kasan_atomics+0xb8/0x2e0
[   22.039228]  kunit_try_run_case+0x170/0x3f0
[   22.039344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039404]  kthread+0x328/0x630
[   22.039453]  ret_from_fork+0x10/0x20
[   22.039499] 
[   22.039527] The buggy address belongs to the object at fff00000c59de300
[   22.039527]  which belongs to the cache kmalloc-64 of size 64
[   22.039625] The buggy address is located 0 bytes to the right of
[   22.039625]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.039739] 
[   22.039780] The buggy address belongs to the physical page:
[   22.039821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.039885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.039943] page_type: f5(slab)
[   22.040000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.040294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.040347] page dumped because: kasan: bad access detected
[   22.040386] 
[   22.040409] Memory state around the buggy address:
[   22.040462]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.040514]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.040688] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.040859]                                      ^
[   22.040904]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.040956]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.041013] ==================================================================
[   21.814905] ==================================================================
[   21.815715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.815814] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.816116] 
[   21.816168] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.816511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.816553] Hardware name: linux,dummy-virt (DT)
[   21.816735] Call trace:
[   21.816778]  show_stack+0x20/0x38 (C)
[   21.817162]  dump_stack_lvl+0x8c/0xd0
[   21.817389]  print_report+0x118/0x608
[   21.817472]  kasan_report+0xdc/0x128
[   21.817833]  kasan_check_range+0x100/0x1a8
[   21.817995]  __kasan_check_write+0x20/0x30
[   21.818224]  kasan_atomics_helper+0xa6c/0x4858
[   21.818299]  kasan_atomics+0x198/0x2e0
[   21.818685]  kunit_try_run_case+0x170/0x3f0
[   21.818781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.818849]  kthread+0x328/0x630
[   21.818904]  ret_from_fork+0x10/0x20
[   21.819207] 
[   21.819396] Allocated by task 265:
[   21.819538]  kasan_save_stack+0x3c/0x68
[   21.819654]  kasan_save_track+0x20/0x40
[   21.819712]  kasan_save_alloc_info+0x40/0x58
[   21.819782]  __kasan_kmalloc+0xd4/0xd8
[   21.819991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.820202]  kasan_atomics+0xb8/0x2e0
[   21.820281]  kunit_try_run_case+0x170/0x3f0
[   21.820331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.820589]  kthread+0x328/0x630
[   21.820826]  ret_from_fork+0x10/0x20
[   21.820881] 
[   21.820913] The buggy address belongs to the object at fff00000c59de300
[   21.820913]  which belongs to the cache kmalloc-64 of size 64
[   21.820996] The buggy address is located 0 bytes to the right of
[   21.820996]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.821251] 
[   21.821381] The buggy address belongs to the physical page:
[   21.821430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.821497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.821567] page_type: f5(slab)
[   21.821926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.822155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.822221] page dumped because: kasan: bad access detected
[   21.822371] 
[   21.822401] Memory state around the buggy address:
[   21.822572]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.822644]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.822885] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.822948]                                      ^
[   21.823156]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.823219]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.823373] ==================================================================
[   21.808057] ==================================================================
[   21.808162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.808361] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.808433] 
[   21.808482] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.808584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.808889] Hardware name: linux,dummy-virt (DT)
[   21.809020] Call trace:
[   21.809055]  show_stack+0x20/0x38 (C)
[   21.809143]  dump_stack_lvl+0x8c/0xd0
[   21.809207]  print_report+0x118/0x608
[   21.809264]  kasan_report+0xdc/0x128
[   21.809568]  kasan_check_range+0x100/0x1a8
[   21.809705]  __kasan_check_write+0x20/0x30
[   21.809772]  kasan_atomics_helper+0xa04/0x4858
[   21.809864]  kasan_atomics+0x198/0x2e0
[   21.809922]  kunit_try_run_case+0x170/0x3f0
[   21.809991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.810577]  kthread+0x328/0x630
[   21.810793]  ret_from_fork+0x10/0x20
[   21.810896] 
[   21.811023] Allocated by task 265:
[   21.811092]  kasan_save_stack+0x3c/0x68
[   21.811160]  kasan_save_track+0x20/0x40
[   21.811204]  kasan_save_alloc_info+0x40/0x58
[   21.811251]  __kasan_kmalloc+0xd4/0xd8
[   21.811294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.811609]  kasan_atomics+0xb8/0x2e0
[   21.811777]  kunit_try_run_case+0x170/0x3f0
[   21.811829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.811928]  kthread+0x328/0x630
[   21.811988]  ret_from_fork+0x10/0x20
[   21.812054] 
[   21.812087] The buggy address belongs to the object at fff00000c59de300
[   21.812087]  which belongs to the cache kmalloc-64 of size 64
[   21.812151] The buggy address is located 0 bytes to the right of
[   21.812151]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.812235] 
[   21.812262] The buggy address belongs to the physical page:
[   21.812301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.812357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.812412] page_type: f5(slab)
[   21.812458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.812518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.812564] page dumped because: kasan: bad access detected
[   21.812614] 
[   21.812640] Memory state around the buggy address:
[   21.812679]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.812730]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.812778] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.812836]                                      ^
[   21.812889]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.812943]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.813006] ==================================================================
[   22.142840] ==================================================================
[   22.142913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.143360] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.143431] 
[   22.143475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.143571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.143604] Hardware name: linux,dummy-virt (DT)
[   22.143640] Call trace:
[   22.143695]  show_stack+0x20/0x38 (C)
[   22.143810]  dump_stack_lvl+0x8c/0xd0
[   22.143917]  print_report+0x118/0x608
[   22.144043]  kasan_report+0xdc/0x128
[   22.144158]  kasan_check_range+0x100/0x1a8
[   22.144219]  __kasan_check_write+0x20/0x30
[   22.144319]  kasan_atomics_helper+0x17ec/0x4858
[   22.144375]  kasan_atomics+0x198/0x2e0
[   22.144435]  kunit_try_run_case+0x170/0x3f0
[   22.144541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.144652]  kthread+0x328/0x630
[   22.144731]  ret_from_fork+0x10/0x20
[   22.144786] 
[   22.144809] Allocated by task 265:
[   22.144843]  kasan_save_stack+0x3c/0x68
[   22.144892]  kasan_save_track+0x20/0x40
[   22.144937]  kasan_save_alloc_info+0x40/0x58
[   22.144999]  __kasan_kmalloc+0xd4/0xd8
[   22.145045]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.145089]  kasan_atomics+0xb8/0x2e0
[   22.145131]  kunit_try_run_case+0x170/0x3f0
[   22.145175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.145226]  kthread+0x328/0x630
[   22.145266]  ret_from_fork+0x10/0x20
[   22.145310] 
[   22.145345] The buggy address belongs to the object at fff00000c59de300
[   22.145345]  which belongs to the cache kmalloc-64 of size 64
[   22.145480] The buggy address is located 0 bytes to the right of
[   22.145480]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.145636] 
[   22.145698] The buggy address belongs to the physical page:
[   22.145774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.145912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.146013] page_type: f5(slab)
[   22.146064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.146124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.146228] page dumped because: kasan: bad access detected
[   22.146266] 
[   22.146289] Memory state around the buggy address:
[   22.146330]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.146381]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.146431] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.146476]                                      ^
[   22.146514]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.146563]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.146607] ==================================================================
[   22.005757] ==================================================================
[   22.005860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.005938] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.006012] 
[   22.006052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.006146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.006179] Hardware name: linux,dummy-virt (DT)
[   22.006216] Call trace:
[   22.006247]  show_stack+0x20/0x38 (C)
[   22.006307]  dump_stack_lvl+0x8c/0xd0
[   22.006361]  print_report+0x118/0x608
[   22.006412]  kasan_report+0xdc/0x128
[   22.006474]  kasan_check_range+0x100/0x1a8
[   22.006526]  __kasan_check_write+0x20/0x30
[   22.006578]  kasan_atomics_helper+0x10c0/0x4858
[   22.006631]  kasan_atomics+0x198/0x2e0
[   22.006717]  kunit_try_run_case+0x170/0x3f0
[   22.007003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.007089]  kthread+0x328/0x630
[   22.007148]  ret_from_fork+0x10/0x20
[   22.007206] 
[   22.007234] Allocated by task 265:
[   22.007269]  kasan_save_stack+0x3c/0x68
[   22.007322]  kasan_save_track+0x20/0x40
[   22.007524]  kasan_save_alloc_info+0x40/0x58
[   22.007617]  __kasan_kmalloc+0xd4/0xd8
[   22.007926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.007992]  kasan_atomics+0xb8/0x2e0
[   22.008038]  kunit_try_run_case+0x170/0x3f0
[   22.008220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.008274]  kthread+0x328/0x630
[   22.008345]  ret_from_fork+0x10/0x20
[   22.008612] 
[   22.008696] The buggy address belongs to the object at fff00000c59de300
[   22.008696]  which belongs to the cache kmalloc-64 of size 64
[   22.009071] The buggy address is located 0 bytes to the right of
[   22.009071]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.009559] 
[   22.009610] The buggy address belongs to the physical page:
[   22.009737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.009964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.010381] page_type: f5(slab)
[   22.010636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.011041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.011197] page dumped because: kasan: bad access detected
[   22.011416] 
[   22.011447] Memory state around the buggy address:
[   22.011640]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.011715]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.012053] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.012148]                                      ^
[   22.012233]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012299]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012533] ==================================================================
[   21.925792] ==================================================================
[   21.926184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.926270] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.926334] 
[   21.926379] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.926608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.926942] Hardware name: linux,dummy-virt (DT)
[   21.927054] Call trace:
[   21.927122]  show_stack+0x20/0x38 (C)
[   21.927392]  dump_stack_lvl+0x8c/0xd0
[   21.927460]  print_report+0x118/0x608
[   21.927518]  kasan_report+0xdc/0x128
[   21.927574]  kasan_check_range+0x100/0x1a8
[   21.927631]  __kasan_check_read+0x20/0x30
[   21.927690]  kasan_atomics_helper+0xdd4/0x4858
[   21.927749]  kasan_atomics+0x198/0x2e0
[   21.927805]  kunit_try_run_case+0x170/0x3f0
[   21.927861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927924]  kthread+0x328/0x630
[   21.927994]  ret_from_fork+0x10/0x20
[   21.928060] 
[   21.928087] Allocated by task 265:
[   21.928125]  kasan_save_stack+0x3c/0x68
[   21.929901]  kasan_save_track+0x20/0x40
[   21.930146]  kasan_save_alloc_info+0x40/0x58
[   21.930982]  __kasan_kmalloc+0xd4/0xd8
[   21.931117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.931172]  kasan_atomics+0xb8/0x2e0
[   21.931219]  kunit_try_run_case+0x170/0x3f0
[   21.931268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.931322]  kthread+0x328/0x630
[   21.932296]  ret_from_fork+0x10/0x20
[   21.932635] 
[   21.932710] The buggy address belongs to the object at fff00000c59de300
[   21.932710]  which belongs to the cache kmalloc-64 of size 64
[   21.932789] The buggy address is located 0 bytes to the right of
[   21.932789]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.932864] 
[   21.932893] The buggy address belongs to the physical page:
[   21.932931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.933010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.933075] page_type: f5(slab)
[   21.933127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.933189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.933867] page dumped because: kasan: bad access detected
[   21.935044] 
[   21.935368] Memory state around the buggy address:
[   21.935443]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.935501]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.935552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.935599]                                      ^
[   21.935743]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.936308]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.936481] ==================================================================
[   21.895260] ==================================================================
[   21.895346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.895424] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.895812] 
[   21.895880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.896842] Hardware name: linux,dummy-virt (DT)
[   21.896901] Call trace:
[   21.896940]  show_stack+0x20/0x38 (C)
[   21.897372]  dump_stack_lvl+0x8c/0xd0
[   21.897465]  print_report+0x118/0x608
[   21.897526]  kasan_report+0xdc/0x128
[   21.897585]  __asan_report_load4_noabort+0x20/0x30
[   21.897648]  kasan_atomics_helper+0x3dd8/0x4858
[   21.898347]  kasan_atomics+0x198/0x2e0
[   21.898451]  kunit_try_run_case+0x170/0x3f0
[   21.898597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.898962]  kthread+0x328/0x630
[   21.899054]  ret_from_fork+0x10/0x20
[   21.899121] 
[   21.899147] Allocated by task 265:
[   21.899188]  kasan_save_stack+0x3c/0x68
[   21.899826]  kasan_save_track+0x20/0x40
[   21.899883]  kasan_save_alloc_info+0x40/0x58
[   21.900032]  __kasan_kmalloc+0xd4/0xd8
[   21.900090]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.900355]  kasan_atomics+0xb8/0x2e0
[   21.900528]  kunit_try_run_case+0x170/0x3f0
[   21.900743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.900923]  kthread+0x328/0x630
[   21.901057]  ret_from_fork+0x10/0x20
[   21.901387] 
[   21.901437] The buggy address belongs to the object at fff00000c59de300
[   21.901437]  which belongs to the cache kmalloc-64 of size 64
[   21.901513] The buggy address is located 0 bytes to the right of
[   21.901513]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.902027] 
[   21.902168] The buggy address belongs to the physical page:
[   21.902220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.902292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.902355] page_type: f5(slab)
[   21.902408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.902904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.903137] page dumped because: kasan: bad access detected
[   21.903252] 
[   21.903281] Memory state around the buggy address:
[   21.903349]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.903676]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.903864] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.904059]                                      ^
[   21.904114]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904327]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904682] ==================================================================
[   21.956416] ==================================================================
[   21.956503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.956586] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.956646] 
[   21.956695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.956797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.956831] Hardware name: linux,dummy-virt (DT)
[   21.956872] Call trace:
[   21.956903]  show_stack+0x20/0x38 (C)
[   21.956964]  dump_stack_lvl+0x8c/0xd0
[   21.957042]  print_report+0x118/0x608
[   21.957098]  kasan_report+0xdc/0x128
[   21.957152]  kasan_check_range+0x100/0x1a8
[   21.957209]  __kasan_check_write+0x20/0x30
[   21.957264]  kasan_atomics_helper+0xe44/0x4858
[   21.957320]  kasan_atomics+0x198/0x2e0
[   21.957374]  kunit_try_run_case+0x170/0x3f0
[   21.957430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.957489]  kthread+0x328/0x630
[   21.957541]  ret_from_fork+0x10/0x20
[   21.957601] 
[   21.957626] Allocated by task 265:
[   21.958462]  kasan_save_stack+0x3c/0x68
[   21.958683]  kasan_save_track+0x20/0x40
[   21.959357]  kasan_save_alloc_info+0x40/0x58
[   21.959846]  __kasan_kmalloc+0xd4/0xd8
[   21.960285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.960682]  kasan_atomics+0xb8/0x2e0
[   21.961178]  kunit_try_run_case+0x170/0x3f0
[   21.961558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.962103]  kthread+0x328/0x630
[   21.962785]  ret_from_fork+0x10/0x20
[   21.963121] 
[   21.963226] The buggy address belongs to the object at fff00000c59de300
[   21.963226]  which belongs to the cache kmalloc-64 of size 64
[   21.963582] The buggy address is located 0 bytes to the right of
[   21.963582]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.963692] 
[   21.964004] The buggy address belongs to the physical page:
[   21.964131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.964202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.964264] page_type: f5(slab)
[   21.964317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.964377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.964425] page dumped because: kasan: bad access detected
[   21.965756] 
[   21.965798] Memory state around the buggy address:
[   21.965871]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.965931]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.966875] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.967255]                                      ^
[   21.967355]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.967647]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.967733] ==================================================================
[   21.906659] ==================================================================
[   21.906763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.906852] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.906914] 
[   21.907611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.907794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.907904] Hardware name: linux,dummy-virt (DT)
[   21.907985] Call trace:
[   21.908177]  show_stack+0x20/0x38 (C)
[   21.908292]  dump_stack_lvl+0x8c/0xd0
[   21.908369]  print_report+0x118/0x608
[   21.908705]  kasan_report+0xdc/0x128
[   21.909044]  kasan_check_range+0x100/0x1a8
[   21.909255]  __kasan_check_write+0x20/0x30
[   21.909370]  kasan_atomics_helper+0xd3c/0x4858
[   21.909465]  kasan_atomics+0x198/0x2e0
[   21.909852]  kunit_try_run_case+0x170/0x3f0
[   21.910103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.910181]  kthread+0x328/0x630
[   21.910243]  ret_from_fork+0x10/0x20
[   21.910731] 
[   21.910828] Allocated by task 265:
[   21.910928]  kasan_save_stack+0x3c/0x68
[   21.911006]  kasan_save_track+0x20/0x40
[   21.911261]  kasan_save_alloc_info+0x40/0x58
[   21.911457]  __kasan_kmalloc+0xd4/0xd8
[   21.911522]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.911638]  kasan_atomics+0xb8/0x2e0
[   21.911693]  kunit_try_run_case+0x170/0x3f0
[   21.911761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.912039]  kthread+0x328/0x630
[   21.912090]  ret_from_fork+0x10/0x20
[   21.912138] 
[   21.912379] The buggy address belongs to the object at fff00000c59de300
[   21.912379]  which belongs to the cache kmalloc-64 of size 64
[   21.912457] The buggy address is located 0 bytes to the right of
[   21.912457]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.912530] 
[   21.912561] The buggy address belongs to the physical page:
[   21.912601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.912662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.912723] page_type: f5(slab)
[   21.912773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.913346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.913429] page dumped because: kasan: bad access detected
[   21.913475] 
[   21.913562] Memory state around the buggy address:
[   21.913613]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.913668]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.914002] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.914058]                                      ^
[   21.914103]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.914530]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.914602] ==================================================================
[   21.939962] ==================================================================
[   21.940083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.940164] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.940226] 
[   21.940273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.940372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.940407] Hardware name: linux,dummy-virt (DT)
[   21.940449] Call trace:
[   21.940481]  show_stack+0x20/0x38 (C)
[   21.940544]  dump_stack_lvl+0x8c/0xd0
[   21.940600]  print_report+0x118/0x608
[   21.940654]  kasan_report+0xdc/0x128
[   21.940708]  __asan_report_load8_noabort+0x20/0x30
[   21.940768]  kasan_atomics_helper+0x3f58/0x4858
[   21.941487]  kasan_atomics+0x198/0x2e0
[   21.942103]  kunit_try_run_case+0x170/0x3f0
[   21.942592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.943163]  kthread+0x328/0x630
[   21.943634]  ret_from_fork+0x10/0x20
[   21.944371] 
[   21.944484] Allocated by task 265:
[   21.944531]  kasan_save_stack+0x3c/0x68
[   21.944753]  kasan_save_track+0x20/0x40
[   21.945155]  kasan_save_alloc_info+0x40/0x58
[   21.945408]  __kasan_kmalloc+0xd4/0xd8
[   21.945543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.945606]  kasan_atomics+0xb8/0x2e0
[   21.945660]  kunit_try_run_case+0x170/0x3f0
[   21.946291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.946541]  kthread+0x328/0x630
[   21.946595]  ret_from_fork+0x10/0x20
[   21.946642] 
[   21.946670] The buggy address belongs to the object at fff00000c59de300
[   21.946670]  which belongs to the cache kmalloc-64 of size 64
[   21.946744] The buggy address is located 0 bytes to the right of
[   21.946744]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.947593] 
[   21.947735] The buggy address belongs to the physical page:
[   21.947784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.947858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.947921] page_type: f5(slab)
[   21.947989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.948055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.948105] page dumped because: kasan: bad access detected
[   21.948145] 
[   21.948172] Memory state around the buggy address:
[   21.950232]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950765]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950995] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.951343]                                      ^
[   21.951640]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.951888]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.951942] ==================================================================
[   22.053703] ==================================================================
[   22.054153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.054268] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.054342] 
[   22.054384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.054490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.054526] Hardware name: linux,dummy-virt (DT)
[   22.054567] Call trace:
[   22.054596]  show_stack+0x20/0x38 (C)
[   22.055008]  dump_stack_lvl+0x8c/0xd0
[   22.055138]  print_report+0x118/0x608
[   22.055301]  kasan_report+0xdc/0x128
[   22.055652]  __asan_report_load8_noabort+0x20/0x30
[   22.055729]  kasan_atomics_helper+0x3f04/0x4858
[   22.055789]  kasan_atomics+0x198/0x2e0
[   22.055845]  kunit_try_run_case+0x170/0x3f0
[   22.055904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056004]  kthread+0x328/0x630
[   22.056064]  ret_from_fork+0x10/0x20
[   22.056124] 
[   22.056179] Allocated by task 265:
[   22.056222]  kasan_save_stack+0x3c/0x68
[   22.056291]  kasan_save_track+0x20/0x40
[   22.056338]  kasan_save_alloc_info+0x40/0x58
[   22.056386]  __kasan_kmalloc+0xd4/0xd8
[   22.056430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.056477]  kasan_atomics+0xb8/0x2e0
[   22.056522]  kunit_try_run_case+0x170/0x3f0
[   22.056580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056656]  kthread+0x328/0x630
[   22.056709]  ret_from_fork+0x10/0x20
[   22.056803] 
[   22.056871] The buggy address belongs to the object at fff00000c59de300
[   22.056871]  which belongs to the cache kmalloc-64 of size 64
[   22.056945] The buggy address is located 0 bytes to the right of
[   22.056945]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.057034] 
[   22.057063] The buggy address belongs to the physical page:
[   22.057118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.057254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.057316] page_type: f5(slab)
[   22.057366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.057428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.057479] page dumped because: kasan: bad access detected
[   22.057518] 
[   22.057540] Memory state around the buggy address:
[   22.057579]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.057633]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.057758] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.057855]                                      ^
[   22.057955]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058752]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058844] ==================================================================
[   22.033545] ==================================================================
[   22.033618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.033690] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.033749] 
[   22.033789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.033923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.033958] Hardware name: linux,dummy-virt (DT)
[   22.034010] Call trace:
[   22.034041]  show_stack+0x20/0x38 (C)
[   22.034104]  dump_stack_lvl+0x8c/0xd0
[   22.034153]  print_report+0x118/0x608
[   22.034204]  kasan_report+0xdc/0x128
[   22.034252]  kasan_check_range+0x100/0x1a8
[   22.034307]  __kasan_check_write+0x20/0x30
[   22.034369]  kasan_atomics_helper+0x11f8/0x4858
[   22.034518]  kasan_atomics+0x198/0x2e0
[   22.034576]  kunit_try_run_case+0x170/0x3f0
[   22.034692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034817]  kthread+0x328/0x630
[   22.034877]  ret_from_fork+0x10/0x20
[   22.034935] 
[   22.034960] Allocated by task 265:
[   22.035008]  kasan_save_stack+0x3c/0x68
[   22.035072]  kasan_save_track+0x20/0x40
[   22.035169]  kasan_save_alloc_info+0x40/0x58
[   22.035298]  __kasan_kmalloc+0xd4/0xd8
[   22.035351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.035420]  kasan_atomics+0xb8/0x2e0
[   22.035468]  kunit_try_run_case+0x170/0x3f0
[   22.035639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.035696]  kthread+0x328/0x630
[   22.035743]  ret_from_fork+0x10/0x20
[   22.035788] 
[   22.035815] The buggy address belongs to the object at fff00000c59de300
[   22.035815]  which belongs to the cache kmalloc-64 of size 64
[   22.035953] The buggy address is located 0 bytes to the right of
[   22.035953]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.036102] 
[   22.036157] The buggy address belongs to the physical page:
[   22.036219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.036334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.036389] page_type: f5(slab)
[   22.036471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.036573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.036624] page dumped because: kasan: bad access detected
[   22.036664] 
[   22.036688] Memory state around the buggy address:
[   22.036725]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.036776]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.036828] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.036874]                                      ^
[   22.036933]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.037025]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.037131] ==================================================================
[   22.101225] ==================================================================
[   22.101316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.101391] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.101451] 
[   22.101532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.101652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.101690] Hardware name: linux,dummy-virt (DT)
[   22.101730] Call trace:
[   22.101786]  show_stack+0x20/0x38 (C)
[   22.101926]  dump_stack_lvl+0x8c/0xd0
[   22.101994]  print_report+0x118/0x608
[   22.102118]  kasan_report+0xdc/0x128
[   22.102381]  kasan_check_range+0x100/0x1a8
[   22.102693]  __kasan_check_write+0x20/0x30
[   22.102810]  kasan_atomics_helper+0x1644/0x4858
[   22.102880]  kasan_atomics+0x198/0x2e0
[   22.102947]  kunit_try_run_case+0x170/0x3f0
[   22.103103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.103174]  kthread+0x328/0x630
[   22.103231]  ret_from_fork+0x10/0x20
[   22.103313] 
[   22.103339] Allocated by task 265:
[   22.103378]  kasan_save_stack+0x3c/0x68
[   22.103431]  kasan_save_track+0x20/0x40
[   22.103477]  kasan_save_alloc_info+0x40/0x58
[   22.103562]  __kasan_kmalloc+0xd4/0xd8
[   22.103622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.103670]  kasan_atomics+0xb8/0x2e0
[   22.103713]  kunit_try_run_case+0x170/0x3f0
[   22.103758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.103808]  kthread+0x328/0x630
[   22.103883]  ret_from_fork+0x10/0x20
[   22.103937] 
[   22.103965] The buggy address belongs to the object at fff00000c59de300
[   22.103965]  which belongs to the cache kmalloc-64 of size 64
[   22.104045] The buggy address is located 0 bytes to the right of
[   22.104045]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.104121] 
[   22.104161] The buggy address belongs to the physical page:
[   22.104205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.104302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.104373] page_type: f5(slab)
[   22.104423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.104483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.104591] page dumped because: kasan: bad access detected
[   22.104640] 
[   22.104693] Memory state around the buggy address:
[   22.104778]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.104881]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.104935] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.104989]                                      ^
[   22.105031]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105106]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105158] ==================================================================
[   21.998708] ==================================================================
[   21.998769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.998838] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.998919] 
[   21.998959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.999069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.999120] Hardware name: linux,dummy-virt (DT)
[   21.999157] Call trace:
[   21.999186]  show_stack+0x20/0x38 (C)
[   21.999246]  dump_stack_lvl+0x8c/0xd0
[   21.999318]  print_report+0x118/0x608
[   21.999378]  kasan_report+0xdc/0x128
[   21.999432]  kasan_check_range+0x100/0x1a8
[   21.999487]  __kasan_check_write+0x20/0x30
[   21.999545]  kasan_atomics_helper+0x1058/0x4858
[   21.999639]  kasan_atomics+0x198/0x2e0
[   21.999747]  kunit_try_run_case+0x170/0x3f0
[   21.999857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.999990]  kthread+0x328/0x630
[   22.000109]  ret_from_fork+0x10/0x20
[   22.000226] 
[   22.000272] Allocated by task 265:
[   22.000345]  kasan_save_stack+0x3c/0x68
[   22.000420]  kasan_save_track+0x20/0x40
[   22.000469]  kasan_save_alloc_info+0x40/0x58
[   22.000548]  __kasan_kmalloc+0xd4/0xd8
[   22.000624]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.000706]  kasan_atomics+0xb8/0x2e0
[   22.000784]  kunit_try_run_case+0x170/0x3f0
[   22.000867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.000958]  kthread+0x328/0x630
[   22.001102]  ret_from_fork+0x10/0x20
[   22.001148] 
[   22.001273] The buggy address belongs to the object at fff00000c59de300
[   22.001273]  which belongs to the cache kmalloc-64 of size 64
[   22.001340] The buggy address is located 0 bytes to the right of
[   22.001340]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.001602] 
[   22.001632] The buggy address belongs to the physical page:
[   22.001672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.001914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.002192] page_type: f5(slab)
[   22.002494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.002581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.002952] page dumped because: kasan: bad access detected
[   22.003055] 
[   22.003279] Memory state around the buggy address:
[   22.003328]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.003827]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.004114] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.004178]                                      ^
[   22.004224]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.004473]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.004627] ==================================================================
[   21.986271] ==================================================================
[   21.986549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.986705] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.986828] 
[   21.986880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.986991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.987029] Hardware name: linux,dummy-virt (DT)
[   21.987095] Call trace:
[   21.987130]  show_stack+0x20/0x38 (C)
[   21.987193]  dump_stack_lvl+0x8c/0xd0
[   21.987246]  print_report+0x118/0x608
[   21.987489]  kasan_report+0xdc/0x128
[   21.987622]  kasan_check_range+0x100/0x1a8
[   21.987699]  __kasan_check_write+0x20/0x30
[   21.987810]  kasan_atomics_helper+0xf88/0x4858
[   21.987876]  kasan_atomics+0x198/0x2e0
[   21.987930]  kunit_try_run_case+0x170/0x3f0
[   21.987998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.988065]  kthread+0x328/0x630
[   21.988185]  ret_from_fork+0x10/0x20
[   21.988247] 
[   21.988348] Allocated by task 265:
[   21.988530]  kasan_save_stack+0x3c/0x68
[   21.988588]  kasan_save_track+0x20/0x40
[   21.988635]  kasan_save_alloc_info+0x40/0x58
[   21.988684]  __kasan_kmalloc+0xd4/0xd8
[   21.988728]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.988777]  kasan_atomics+0xb8/0x2e0
[   21.989431]  kunit_try_run_case+0x170/0x3f0
[   21.990194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.990411]  kthread+0x328/0x630
[   21.990612]  ret_from_fork+0x10/0x20
[   21.991046] 
[   21.991283] The buggy address belongs to the object at fff00000c59de300
[   21.991283]  which belongs to the cache kmalloc-64 of size 64
[   21.991365] The buggy address is located 0 bytes to the right of
[   21.991365]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.991440] 
[   21.991470] The buggy address belongs to the physical page:
[   21.991507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.991567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.991622] page_type: f5(slab)
[   21.993035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.993432] page dumped because: kasan: bad access detected
[   21.993580] 
[   21.993670] Memory state around the buggy address:
[   21.993712]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.993946]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.994276] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.994465]                                      ^
[   21.994521]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.994575]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.994621] ==================================================================
[   21.968634] ==================================================================
[   21.968733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.968823] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.968886] 
[   21.968940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.969097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.969162] Hardware name: linux,dummy-virt (DT)
[   21.969211] Call trace:
[   21.969292]  show_stack+0x20/0x38 (C)
[   21.969385]  dump_stack_lvl+0x8c/0xd0
[   21.969779]  print_report+0x118/0x608
[   21.969906]  kasan_report+0xdc/0x128
[   21.969965]  __asan_report_store8_noabort+0x20/0x30
[   21.970046]  kasan_atomics_helper+0x3e5c/0x4858
[   21.970109]  kasan_atomics+0x198/0x2e0
[   21.970164]  kunit_try_run_case+0x170/0x3f0
[   21.970222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.970299]  kthread+0x328/0x630
[   21.970366]  ret_from_fork+0x10/0x20
[   21.970450] 
[   21.970481] Allocated by task 265:
[   21.970519]  kasan_save_stack+0x3c/0x68
[   21.970574]  kasan_save_track+0x20/0x40
[   21.970634]  kasan_save_alloc_info+0x40/0x58
[   21.970691]  __kasan_kmalloc+0xd4/0xd8
[   21.970736]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.970784]  kasan_atomics+0xb8/0x2e0
[   21.970849]  kunit_try_run_case+0x170/0x3f0
[   21.970902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.970955]  kthread+0x328/0x630
[   21.971009]  ret_from_fork+0x10/0x20
[   21.971055] 
[   21.971080] The buggy address belongs to the object at fff00000c59de300
[   21.971080]  which belongs to the cache kmalloc-64 of size 64
[   21.971150] The buggy address is located 0 bytes to the right of
[   21.971150]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.971222] 
[   21.971250] The buggy address belongs to the physical page:
[   21.971290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.971355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.971415] page_type: f5(slab)
[   21.971463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.971523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.971572] page dumped because: kasan: bad access detected
[   21.971610] 
[   21.971632] Memory state around the buggy address:
[   21.971671]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971723]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971774] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.971819]                                      ^
[   21.971857]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.971907]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.971952] ==================================================================
[   21.972130] ==================================================================
[   21.972184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.972240] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.972297] 
[   21.972338] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.972534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.972589] Hardware name: linux,dummy-virt (DT)
[   21.972629] Call trace:
[   21.972659]  show_stack+0x20/0x38 (C)
[   21.972773]  dump_stack_lvl+0x8c/0xd0
[   21.972883]  print_report+0x118/0x608
[   21.973728]  kasan_report+0xdc/0x128
[   21.973923]  kasan_check_range+0x100/0x1a8
[   21.974080]  __kasan_check_write+0x20/0x30
[   21.974200]  kasan_atomics_helper+0xeb8/0x4858
[   21.974259]  kasan_atomics+0x198/0x2e0
[   21.974320]  kunit_try_run_case+0x170/0x3f0
[   21.974375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.974462]  kthread+0x328/0x630
[   21.974517]  ret_from_fork+0x10/0x20
[   21.974574] 
[   21.974599] Allocated by task 265:
[   21.974636]  kasan_save_stack+0x3c/0x68
[   21.974823]  kasan_save_track+0x20/0x40
[   21.974908]  kasan_save_alloc_info+0x40/0x58
[   21.974960]  __kasan_kmalloc+0xd4/0xd8
[   21.975031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.975079]  kasan_atomics+0xb8/0x2e0
[   21.975124]  kunit_try_run_case+0x170/0x3f0
[   21.975171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.975222]  kthread+0x328/0x630
[   21.975268]  ret_from_fork+0x10/0x20
[   21.975315] 
[   21.975346] The buggy address belongs to the object at fff00000c59de300
[   21.975346]  which belongs to the cache kmalloc-64 of size 64
[   21.975416] The buggy address is located 0 bytes to the right of
[   21.975416]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.975486] 
[   21.975511] The buggy address belongs to the physical page:
[   21.975550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.975608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.975663] page_type: f5(slab)
[   21.975711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.975769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.975814] page dumped because: kasan: bad access detected
[   21.975848] 
[   21.975871] Memory state around the buggy address:
[   21.975908]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.975956]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.976024] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.976070]                                      ^
[   21.976111]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.976160]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.976205] ==================================================================
[   22.047798] ==================================================================
[   22.047861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.047933] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.048009] 
[   22.048052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.048151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.048185] Hardware name: linux,dummy-virt (DT)
[   22.048223] Call trace:
[   22.048253]  show_stack+0x20/0x38 (C)
[   22.048315]  dump_stack_lvl+0x8c/0xd0
[   22.048369]  print_report+0x118/0x608
[   22.048425]  kasan_report+0xdc/0x128
[   22.048478]  kasan_check_range+0x100/0x1a8
[   22.048536]  __kasan_check_write+0x20/0x30
[   22.048592]  kasan_atomics_helper+0x1384/0x4858
[   22.048649]  kasan_atomics+0x198/0x2e0
[   22.048703]  kunit_try_run_case+0x170/0x3f0
[   22.048760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.048824]  kthread+0x328/0x630
[   22.048922]  ret_from_fork+0x10/0x20
[   22.049026] 
[   22.049052] Allocated by task 265:
[   22.049089]  kasan_save_stack+0x3c/0x68
[   22.049215]  kasan_save_track+0x20/0x40
[   22.049364]  kasan_save_alloc_info+0x40/0x58
[   22.049475]  __kasan_kmalloc+0xd4/0xd8
[   22.049538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.049590]  kasan_atomics+0xb8/0x2e0
[   22.049633]  kunit_try_run_case+0x170/0x3f0
[   22.049679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.049733]  kthread+0x328/0x630
[   22.049777]  ret_from_fork+0x10/0x20
[   22.049845] 
[   22.049876] The buggy address belongs to the object at fff00000c59de300
[   22.049876]  which belongs to the cache kmalloc-64 of size 64
[   22.049947] The buggy address is located 0 bytes to the right of
[   22.049947]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.050064] 
[   22.050097] The buggy address belongs to the physical page:
[   22.050185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.050278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.050337] page_type: f5(slab)
[   22.050388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.050454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.050541] page dumped because: kasan: bad access detected
[   22.050614] 
[   22.050663] Memory state around the buggy address:
[   22.050705]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050759]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050808] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.050852]                                      ^
[   22.050893]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.050944]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.051001] ==================================================================
[   22.059361] ==================================================================
[   22.059429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.059498] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.059556] 
[   22.059594] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.059692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.059725] Hardware name: linux,dummy-virt (DT)
[   22.059761] Call trace:
[   22.059790]  show_stack+0x20/0x38 (C)
[   22.059850]  dump_stack_lvl+0x8c/0xd0
[   22.059903]  print_report+0x118/0x608
[   22.059959]  kasan_report+0xdc/0x128
[   22.060027]  kasan_check_range+0x100/0x1a8
[   22.060085]  __kasan_check_write+0x20/0x30
[   22.060140]  kasan_atomics_helper+0x1414/0x4858
[   22.060194]  kasan_atomics+0x198/0x2e0
[   22.060247]  kunit_try_run_case+0x170/0x3f0
[   22.060300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.060361]  kthread+0x328/0x630
[   22.060414]  ret_from_fork+0x10/0x20
[   22.060471] 
[   22.060495] Allocated by task 265:
[   22.060530]  kasan_save_stack+0x3c/0x68
[   22.060581]  kasan_save_track+0x20/0x40
[   22.060627]  kasan_save_alloc_info+0x40/0x58
[   22.060675]  __kasan_kmalloc+0xd4/0xd8
[   22.060719]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.060765]  kasan_atomics+0xb8/0x2e0
[   22.060806]  kunit_try_run_case+0x170/0x3f0
[   22.060854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.060905]  kthread+0x328/0x630
[   22.060949]  ret_from_fork+0x10/0x20
[   22.061977] 
[   22.062040] The buggy address belongs to the object at fff00000c59de300
[   22.062040]  which belongs to the cache kmalloc-64 of size 64
[   22.062172] The buggy address is located 0 bytes to the right of
[   22.062172]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.062353] 
[   22.062405] The buggy address belongs to the physical page:
[   22.062511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.062720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.062780] page_type: f5(slab)
[   22.062829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.062883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.062929] page dumped because: kasan: bad access detected
[   22.063558] 
[   22.063589] Memory state around the buggy address:
[   22.063634]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.063688]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.063736] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.063781]                                      ^
[   22.063822]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.063917]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.063964] ==================================================================
[   22.113023] ==================================================================
[   22.113092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.113564] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.113670] 
[   22.113728] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.113841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.113878] Hardware name: linux,dummy-virt (DT)
[   22.113919] Call trace:
[   22.113951]  show_stack+0x20/0x38 (C)
[   22.114031]  dump_stack_lvl+0x8c/0xd0
[   22.114089]  print_report+0x118/0x608
[   22.114142]  kasan_report+0xdc/0x128
[   22.114195]  kasan_check_range+0x100/0x1a8
[   22.114251]  __kasan_check_write+0x20/0x30
[   22.114308]  kasan_atomics_helper+0x16d0/0x4858
[   22.114363]  kasan_atomics+0x198/0x2e0
[   22.114411]  kunit_try_run_case+0x170/0x3f0
[   22.115491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.115613]  kthread+0x328/0x630
[   22.115673]  ret_from_fork+0x10/0x20
[   22.115775] 
[   22.115804] Allocated by task 265:
[   22.115839]  kasan_save_stack+0x3c/0x68
[   22.115894]  kasan_save_track+0x20/0x40
[   22.115940]  kasan_save_alloc_info+0x40/0x58
[   22.116011]  __kasan_kmalloc+0xd4/0xd8
[   22.116060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.116263]  kasan_atomics+0xb8/0x2e0
[   22.116421]  kunit_try_run_case+0x170/0x3f0
[   22.116565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.116895]  kthread+0x328/0x630
[   22.116981]  ret_from_fork+0x10/0x20
[   22.117036] 
[   22.117141] The buggy address belongs to the object at fff00000c59de300
[   22.117141]  which belongs to the cache kmalloc-64 of size 64
[   22.117209] The buggy address is located 0 bytes to the right of
[   22.117209]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.117283] 
[   22.117308] The buggy address belongs to the physical page:
[   22.117348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.117409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.117692] page_type: f5(slab)
[   22.117816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.118207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.118307] page dumped because: kasan: bad access detected
[   22.118365] 
[   22.118392] Memory state around the buggy address:
[   22.118662]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.119063]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.119180] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.119524]                                      ^
[   22.119738]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.119858]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.119923] ==================================================================
[   22.131862] ==================================================================
[   22.131944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.132042] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.132103] 
[   22.132148] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.132247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132280] Hardware name: linux,dummy-virt (DT)
[   22.132315] Call trace:
[   22.132343]  show_stack+0x20/0x38 (C)
[   22.132402]  dump_stack_lvl+0x8c/0xd0
[   22.132453]  print_report+0x118/0x608
[   22.132505]  kasan_report+0xdc/0x128
[   22.132554]  kasan_check_range+0x100/0x1a8
[   22.132607]  __kasan_check_write+0x20/0x30
[   22.132661]  kasan_atomics_helper+0x175c/0x4858
[   22.132715]  kasan_atomics+0x198/0x2e0
[   22.132762]  kunit_try_run_case+0x170/0x3f0
[   22.132815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132873]  kthread+0x328/0x630
[   22.132926]  ret_from_fork+0x10/0x20
[   22.133003] 
[   22.133146] Allocated by task 265:
[   22.133193]  kasan_save_stack+0x3c/0x68
[   22.133258]  kasan_save_track+0x20/0x40
[   22.133305]  kasan_save_alloc_info+0x40/0x58
[   22.133354]  __kasan_kmalloc+0xd4/0xd8
[   22.133398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.133456]  kasan_atomics+0xb8/0x2e0
[   22.133507]  kunit_try_run_case+0x170/0x3f0
[   22.133553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.133605]  kthread+0x328/0x630
[   22.133883]  ret_from_fork+0x10/0x20
[   22.133988] 
[   22.134111] The buggy address belongs to the object at fff00000c59de300
[   22.134111]  which belongs to the cache kmalloc-64 of size 64
[   22.134485] The buggy address is located 0 bytes to the right of
[   22.134485]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.134564] 
[   22.134592] The buggy address belongs to the physical page:
[   22.134731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.135063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.135353] page_type: f5(slab)
[   22.135481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.135592] page dumped because: kasan: bad access detected
[   22.135633] 
[   22.135659] Memory state around the buggy address:
[   22.135699]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135750]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135800] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.135845]                                      ^
[   22.135887]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136194]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   21.579650] ==================================================================
[   21.579733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   21.579813] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.579875] 
[   21.579917] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.580034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.580071] Hardware name: linux,dummy-virt (DT)
[   21.580112] Call trace:
[   21.580141]  show_stack+0x20/0x38 (C)
[   21.580202]  dump_stack_lvl+0x8c/0xd0
[   21.580261]  print_report+0x118/0x608
[   21.580317]  kasan_report+0xdc/0x128
[   21.580371]  kasan_check_range+0x100/0x1a8
[   21.580427]  __kasan_check_write+0x20/0x30
[   21.580484]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   21.580547]  kasan_bitops_generic+0x11c/0x1c8
[   21.580602]  kunit_try_run_case+0x170/0x3f0
[   21.580658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.580719]  kthread+0x328/0x630
[   21.580773]  ret_from_fork+0x10/0x20
[   21.580828] 
[   21.580855] Allocated by task 261:
[   21.580892]  kasan_save_stack+0x3c/0x68
[   21.580955]  kasan_save_track+0x20/0x40
[   21.581018]  kasan_save_alloc_info+0x40/0x58
[   21.581067]  __kasan_kmalloc+0xd4/0xd8
[   21.581111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.581158]  kasan_bitops_generic+0xa0/0x1c8
[   21.581204]  kunit_try_run_case+0x170/0x3f0
[   21.581248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.581296]  kthread+0x328/0x630
[   21.581338]  ret_from_fork+0x10/0x20
[   21.581823] 
[   21.581857] The buggy address belongs to the object at fff00000c4035140
[   21.581857]  which belongs to the cache kmalloc-16 of size 16
[   21.581929] The buggy address is located 8 bytes inside of
[   21.581929]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.582108] 
[   21.582139] The buggy address belongs to the physical page:
[   21.582190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.582757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.583055] page_type: f5(slab)
[   21.583115] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.583176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.583312] page dumped because: kasan: bad access detected
[   21.583355] 
[   21.583379] Memory state around the buggy address:
[   21.583521]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.583716]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.583770] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.584030]                                               ^
[   21.584126]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.584258]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.584475] ==================================================================
[   21.585008] ==================================================================
[   21.585073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   21.585151] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.585210] 
[   21.585254] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.585351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.585386] Hardware name: linux,dummy-virt (DT)
[   21.585425] Call trace:
[   21.585455]  show_stack+0x20/0x38 (C)
[   21.585516]  dump_stack_lvl+0x8c/0xd0
[   21.585570]  print_report+0x118/0x608
[   21.585625]  kasan_report+0xdc/0x128
[   21.585679]  __asan_report_load8_noabort+0x20/0x30
[   21.585739]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   21.585847]  kasan_bitops_generic+0x11c/0x1c8
[   21.585917]  kunit_try_run_case+0x170/0x3f0
[   21.586595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587320]  kthread+0x328/0x630
[   21.587408]  ret_from_fork+0x10/0x20
[   21.587529] 
[   21.587593] Allocated by task 261:
[   21.587667]  kasan_save_stack+0x3c/0x68
[   21.587733]  kasan_save_track+0x20/0x40
[   21.587780]  kasan_save_alloc_info+0x40/0x58
[   21.587828]  __kasan_kmalloc+0xd4/0xd8
[   21.587871]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.588335]  kasan_bitops_generic+0xa0/0x1c8
[   21.588392]  kunit_try_run_case+0x170/0x3f0
[   21.588448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.588646]  kthread+0x328/0x630
[   21.588701]  ret_from_fork+0x10/0x20
[   21.588835] 
[   21.589100] The buggy address belongs to the object at fff00000c4035140
[   21.589100]  which belongs to the cache kmalloc-16 of size 16
[   21.589185] The buggy address is located 8 bytes inside of
[   21.589185]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.589273] 
[   21.589633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.590316] 
[   21.590541]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.590702]                                               ^
[   21.591943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   21.562556] ==================================================================
[   21.562892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.562968] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.563066] 
[   21.563106] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.563330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.563363] Hardware name: linux,dummy-virt (DT)
[   21.563402] Call trace:
[   21.563463]  show_stack+0x20/0x38 (C)
[   21.563577]  dump_stack_lvl+0x8c/0xd0
[   21.563644]  print_report+0x118/0x608
[   21.563759]  kasan_report+0xdc/0x128
[   21.563862]  kasan_check_range+0x100/0x1a8
[   21.563998]  __kasan_check_write+0x20/0x30
[   21.564056]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.564114]  kasan_bitops_generic+0x110/0x1c8
[   21.564531]  kunit_try_run_case+0x170/0x3f0
[   21.564593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.564953]  kthread+0x328/0x630
[   21.565067]  ret_from_fork+0x10/0x20
[   21.565193] 
[   21.565234] Allocated by task 261:
[   21.565276]  kasan_save_stack+0x3c/0x68
[   21.565412]  kasan_save_track+0x20/0x40
[   21.565461]  kasan_save_alloc_info+0x40/0x58
[   21.565507]  __kasan_kmalloc+0xd4/0xd8
[   21.565551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.565598]  kasan_bitops_generic+0xa0/0x1c8
[   21.565645]  kunit_try_run_case+0x170/0x3f0
[   21.565706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.565760]  kthread+0x328/0x630
[   21.565823]  ret_from_fork+0x10/0x20
[   21.565902] 
[   21.565933] The buggy address belongs to the object at fff00000c4035140
[   21.565933]  which belongs to the cache kmalloc-16 of size 16
[   21.566021] The buggy address is located 8 bytes inside of
[   21.566021]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.566094] 
[   21.566121] The buggy address belongs to the physical page:
[   21.566160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.566492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.566568] page_type: f5(slab)
[   21.567555] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.568145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.568225] page dumped because: kasan: bad access detected
[   21.568269] 
[   21.568311] Memory state around the buggy address:
[   21.568364]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.568432]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.568484] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.568528]                                               ^
[   21.568572]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568628]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568672] ==================================================================
[   21.569740] ==================================================================
[   21.569838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   21.569921] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.570177] 
[   21.570474] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.570871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.570912] Hardware name: linux,dummy-virt (DT)
[   21.571079] Call trace:
[   21.571128]  show_stack+0x20/0x38 (C)
[   21.571202]  dump_stack_lvl+0x8c/0xd0
[   21.571258]  print_report+0x118/0x608
[   21.571314]  kasan_report+0xdc/0x128
[   21.571809]  __asan_report_load8_noabort+0x20/0x30
[   21.571996]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   21.572170]  kasan_bitops_generic+0x110/0x1c8
[   21.572377]  kunit_try_run_case+0x170/0x3f0
[   21.572573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.572645]  kthread+0x328/0x630
[   21.572864]  ret_from_fork+0x10/0x20
[   21.573164] 
[   21.573258] Allocated by task 261:
[   21.573394]  kasan_save_stack+0x3c/0x68
[   21.573606]  kasan_save_track+0x20/0x40
[   21.573667]  kasan_save_alloc_info+0x40/0x58
[   21.574087]  __kasan_kmalloc+0xd4/0xd8
[   21.574267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.574339]  kasan_bitops_generic+0xa0/0x1c8
[   21.574543]  kunit_try_run_case+0x170/0x3f0
[   21.574606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.574849]  kthread+0x328/0x630
[   21.574949]  ret_from_fork+0x10/0x20
[   21.575103] 
[   21.575131] The buggy address belongs to the object at fff00000c4035140
[   21.575131]  which belongs to the cache kmalloc-16 of size 16
[   21.575201] The buggy address is located 8 bytes inside of
[   21.575201]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.575432] 
[   21.575468] The buggy address belongs to the physical page:
[   21.575727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.575941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.576168] page_type: f5(slab)
[   21.576253] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.576317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.576669] page dumped because: kasan: bad access detected
[   21.576978] 
[   21.577016] Memory state around the buggy address:
[   21.577071]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.577312]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.577585] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.577693]                                               ^
[   21.577754]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.578027]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.578206] ==================================================================
[   21.535510] ==================================================================
[   21.535592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.535668] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.535727] 
[   21.535771] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.535870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.535902] Hardware name: linux,dummy-virt (DT)
[   21.535941] Call trace:
[   21.535987]  show_stack+0x20/0x38 (C)
[   21.536053]  dump_stack_lvl+0x8c/0xd0
[   21.536111]  print_report+0x118/0x608
[   21.536164]  kasan_report+0xdc/0x128
[   21.536217]  kasan_check_range+0x100/0x1a8
[   21.536270]  __kasan_check_write+0x20/0x30
[   21.536326]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.536385]  kasan_bitops_generic+0x110/0x1c8
[   21.536439]  kunit_try_run_case+0x170/0x3f0
[   21.536488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.536544]  kthread+0x328/0x630
[   21.536594]  ret_from_fork+0x10/0x20
[   21.536648] 
[   21.536671] Allocated by task 261:
[   21.536705]  kasan_save_stack+0x3c/0x68
[   21.536754]  kasan_save_track+0x20/0x40
[   21.536796]  kasan_save_alloc_info+0x40/0x58
[   21.537379]  __kasan_kmalloc+0xd4/0xd8
[   21.537507]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.537617]  kasan_bitops_generic+0xa0/0x1c8
[   21.537748]  kunit_try_run_case+0x170/0x3f0
[   21.537929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.538038]  kthread+0x328/0x630
[   21.538155]  ret_from_fork+0x10/0x20
[   21.538270] 
[   21.538343] The buggy address belongs to the object at fff00000c4035140
[   21.538343]  which belongs to the cache kmalloc-16 of size 16
[   21.538663] The buggy address is located 8 bytes inside of
[   21.538663]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.538775] 
[   21.538806] The buggy address belongs to the physical page:
[   21.538848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.539225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.539486] page_type: f5(slab)
[   21.539564] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.539630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.539866] page dumped because: kasan: bad access detected
[   21.539963] 
[   21.540059] Memory state around the buggy address:
[   21.540114]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.540218]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.540306] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.540356]                                               ^
[   21.540402]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540742]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540821] ==================================================================
[   21.485671] ==================================================================
[   21.485997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.486242] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.486307] 
[   21.486415] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.486526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.486897] Hardware name: linux,dummy-virt (DT)
[   21.486948] Call trace:
[   21.487054]  show_stack+0x20/0x38 (C)
[   21.487130]  dump_stack_lvl+0x8c/0xd0
[   21.487191]  print_report+0x118/0x608
[   21.487259]  kasan_report+0xdc/0x128
[   21.487314]  kasan_check_range+0x100/0x1a8
[   21.487371]  __kasan_check_write+0x20/0x30
[   21.488107]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.488295]  kasan_bitops_generic+0x110/0x1c8
[   21.488400]  kunit_try_run_case+0x170/0x3f0
[   21.488758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.488842]  kthread+0x328/0x630
[   21.488936]  ret_from_fork+0x10/0x20
[   21.489025] 
[   21.489072] Allocated by task 261:
[   21.489305]  kasan_save_stack+0x3c/0x68
[   21.489582]  kasan_save_track+0x20/0x40
[   21.489951]  kasan_save_alloc_info+0x40/0x58
[   21.490116]  __kasan_kmalloc+0xd4/0xd8
[   21.490252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.490314]  kasan_bitops_generic+0xa0/0x1c8
[   21.490633]  kunit_try_run_case+0x170/0x3f0
[   21.490759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490827]  kthread+0x328/0x630
[   21.490934]  ret_from_fork+0x10/0x20
[   21.490993] 
[   21.491024] The buggy address belongs to the object at fff00000c4035140
[   21.491024]  which belongs to the cache kmalloc-16 of size 16
[   21.491344] The buggy address is located 8 bytes inside of
[   21.491344]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.491545] 
[   21.491598] The buggy address belongs to the physical page:
[   21.491884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.492069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.492136] page_type: f5(slab)
[   21.492346] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.493299] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.493412] page dumped because: kasan: bad access detected
[   21.493455] 
[   21.493499] Memory state around the buggy address:
[   21.493546]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.493614]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.493823] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.493960]                                               ^
[   21.494024]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494080]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494322] ==================================================================
[   21.553925] ==================================================================
[   21.554012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.554086] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.554152] 
[   21.554236] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.554427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.555005] Hardware name: linux,dummy-virt (DT)
[   21.555139] Call trace:
[   21.555179]  show_stack+0x20/0x38 (C)
[   21.555308]  dump_stack_lvl+0x8c/0xd0
[   21.555404]  print_report+0x118/0x608
[   21.555463]  kasan_report+0xdc/0x128
[   21.555518]  kasan_check_range+0x100/0x1a8
[   21.555628]  __kasan_check_write+0x20/0x30
[   21.555706]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.555776]  kasan_bitops_generic+0x110/0x1c8
[   21.555854]  kunit_try_run_case+0x170/0x3f0
[   21.555911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.556118]  kthread+0x328/0x630
[   21.556228]  ret_from_fork+0x10/0x20
[   21.556410] 
[   21.556572] Allocated by task 261:
[   21.557017]  kasan_save_stack+0x3c/0x68
[   21.557221]  kasan_save_track+0x20/0x40
[   21.557502]  kasan_save_alloc_info+0x40/0x58
[   21.557579]  __kasan_kmalloc+0xd4/0xd8
[   21.557922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.558276]  kasan_bitops_generic+0xa0/0x1c8
[   21.558360]  kunit_try_run_case+0x170/0x3f0
[   21.558472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.558753]  kthread+0x328/0x630
[   21.558847]  ret_from_fork+0x10/0x20
[   21.559006] 
[   21.559158] The buggy address belongs to the object at fff00000c4035140
[   21.559158]  which belongs to the cache kmalloc-16 of size 16
[   21.559237] The buggy address is located 8 bytes inside of
[   21.559237]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.559332] 
[   21.559401] The buggy address belongs to the physical page:
[   21.559488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.559764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.559832] page_type: f5(slab)
[   21.559884] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.559960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.560025] page dumped because: kasan: bad access detected
[   21.560061] 
[   21.560085] Memory state around the buggy address:
[   21.560124]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.560176]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.560223] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.560873]                                               ^
[   21.560933]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.561049]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.561093] ==================================================================
[   21.509681] ==================================================================
[   21.509765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.509860] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.509924] 
[   21.509991] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.510101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.510136] Hardware name: linux,dummy-virt (DT)
[   21.510178] Call trace:
[   21.510209]  show_stack+0x20/0x38 (C)
[   21.510274]  dump_stack_lvl+0x8c/0xd0
[   21.510331]  print_report+0x118/0x608
[   21.510388]  kasan_report+0xdc/0x128
[   21.510441]  kasan_check_range+0x100/0x1a8
[   21.515424]  __kasan_check_write+0x20/0x30
[   21.515912]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.516052]  kasan_bitops_generic+0x110/0x1c8
[   21.516778]  kunit_try_run_case+0x170/0x3f0
[   21.516911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.517488]  kthread+0x328/0x630
[   21.517722]  ret_from_fork+0x10/0x20
[   21.517789] 
[   21.518601] Allocated by task 261:
[   21.518999]  kasan_save_stack+0x3c/0x68
[   21.519072]  kasan_save_track+0x20/0x40
[   21.519118]  kasan_save_alloc_info+0x40/0x58
[   21.519902]  __kasan_kmalloc+0xd4/0xd8
[   21.520221]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.520499]  kasan_bitops_generic+0xa0/0x1c8
[   21.521174]  kunit_try_run_case+0x170/0x3f0
[   21.521412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.521499]  kthread+0x328/0x630
[   21.522031]  ret_from_fork+0x10/0x20
[   21.522583] 
[   21.522633] The buggy address belongs to the object at fff00000c4035140
[   21.522633]  which belongs to the cache kmalloc-16 of size 16
[   21.522713] The buggy address is located 8 bytes inside of
[   21.522713]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.523365] 
[   21.523734] The buggy address belongs to the physical page:
[   21.523905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.524468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.524556] page_type: f5(slab)
[   21.525140] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.525408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.525465] page dumped because: kasan: bad access detected
[   21.525506] 
[   21.525530] Memory state around the buggy address:
[   21.525570]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.526153]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.526826] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.526881]                                               ^
[   21.526938]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.527001]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.527403] ==================================================================
[   21.541881] ==================================================================
[   21.542037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.542192] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.542310] 
[   21.542389] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.542526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.542565] Hardware name: linux,dummy-virt (DT)
[   21.543067] Call trace:
[   21.543125]  show_stack+0x20/0x38 (C)
[   21.543218]  dump_stack_lvl+0x8c/0xd0
[   21.543278]  print_report+0x118/0x608
[   21.543361]  kasan_report+0xdc/0x128
[   21.543448]  kasan_check_range+0x100/0x1a8
[   21.543502]  __kasan_check_write+0x20/0x30
[   21.543557]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.543615]  kasan_bitops_generic+0x110/0x1c8
[   21.543667]  kunit_try_run_case+0x170/0x3f0
[   21.543718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.543775]  kthread+0x328/0x630
[   21.543824]  ret_from_fork+0x10/0x20
[   21.543877] 
[   21.543902] Allocated by task 261:
[   21.543936]  kasan_save_stack+0x3c/0x68
[   21.544008]  kasan_save_track+0x20/0x40
[   21.544054]  kasan_save_alloc_info+0x40/0x58
[   21.544101]  __kasan_kmalloc+0xd4/0xd8
[   21.544142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.544183]  kasan_bitops_generic+0xa0/0x1c8
[   21.544225]  kunit_try_run_case+0x170/0x3f0
[   21.544266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.544310]  kthread+0x328/0x630
[   21.544350]  ret_from_fork+0x10/0x20
[   21.544391] 
[   21.544414] The buggy address belongs to the object at fff00000c4035140
[   21.544414]  which belongs to the cache kmalloc-16 of size 16
[   21.544476] The buggy address is located 8 bytes inside of
[   21.544476]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.544540] 
[   21.544564] The buggy address belongs to the physical page:
[   21.544597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.544653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.544705] page_type: f5(slab)
[   21.544750] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.544804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.544850] page dumped because: kasan: bad access detected
[   21.544886] 
[   21.544908] Memory state around the buggy address:
[   21.544945]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.545233]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.545283] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.545326]                                               ^
[   21.545369]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545431]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545589] ==================================================================
[   21.547223] ==================================================================
[   21.547303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.547379] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.547439] 
[   21.547479] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.547571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.547605] Hardware name: linux,dummy-virt (DT)
[   21.547644] Call trace:
[   21.547670]  show_stack+0x20/0x38 (C)
[   21.547726]  dump_stack_lvl+0x8c/0xd0
[   21.547777]  print_report+0x118/0x608
[   21.547832]  kasan_report+0xdc/0x128
[   21.547884]  __asan_report_load8_noabort+0x20/0x30
[   21.547942]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.548019]  kasan_bitops_generic+0x110/0x1c8
[   21.548079]  kunit_try_run_case+0x170/0x3f0
[   21.548132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.548193]  kthread+0x328/0x630
[   21.548249]  ret_from_fork+0x10/0x20
[   21.548308] 
[   21.548331] Allocated by task 261:
[   21.548365]  kasan_save_stack+0x3c/0x68
[   21.548417]  kasan_save_track+0x20/0x40
[   21.548463]  kasan_save_alloc_info+0x40/0x58
[   21.548511]  __kasan_kmalloc+0xd4/0xd8
[   21.548600]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.548654]  kasan_bitops_generic+0xa0/0x1c8
[   21.548702]  kunit_try_run_case+0x170/0x3f0
[   21.548746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.548804]  kthread+0x328/0x630
[   21.548848]  ret_from_fork+0x10/0x20
[   21.548894] 
[   21.549471] The buggy address belongs to the object at fff00000c4035140
[   21.549471]  which belongs to the cache kmalloc-16 of size 16
[   21.549666] The buggy address is located 8 bytes inside of
[   21.549666]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.549922] 
[   21.549954] The buggy address belongs to the physical page:
[   21.550301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.550394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.550631] page_type: f5(slab)
[   21.550816] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.550884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.551063] page dumped because: kasan: bad access detected
[   21.551145] 
[   21.551198] Memory state around the buggy address:
[   21.551362]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.551626]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.552003] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.552704]                                               ^
[   21.552783]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.552837]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.553288] ==================================================================
[   21.495757] ==================================================================
[   21.495838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.495916] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.496329] 
[   21.496639] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.496935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.497008] Hardware name: linux,dummy-virt (DT)
[   21.497072] Call trace:
[   21.497108]  show_stack+0x20/0x38 (C)
[   21.497366]  dump_stack_lvl+0x8c/0xd0
[   21.497606]  print_report+0x118/0x608
[   21.497714]  kasan_report+0xdc/0x128
[   21.497857]  __asan_report_load8_noabort+0x20/0x30
[   21.497928]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.498018]  kasan_bitops_generic+0x110/0x1c8
[   21.498078]  kunit_try_run_case+0x170/0x3f0
[   21.498136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.498196]  kthread+0x328/0x630
[   21.498251]  ret_from_fork+0x10/0x20
[   21.498312] 
[   21.498337] Allocated by task 261:
[   21.498375]  kasan_save_stack+0x3c/0x68
[   21.498426]  kasan_save_track+0x20/0x40
[   21.498472]  kasan_save_alloc_info+0x40/0x58
[   21.498525]  __kasan_kmalloc+0xd4/0xd8
[   21.498567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.499863]  kasan_bitops_generic+0xa0/0x1c8
[   21.500585]  kunit_try_run_case+0x170/0x3f0
[   21.500836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.501260]  kthread+0x328/0x630
[   21.501315]  ret_from_fork+0x10/0x20
[   21.501362] 
[   21.501391] The buggy address belongs to the object at fff00000c4035140
[   21.501391]  which belongs to the cache kmalloc-16 of size 16
[   21.502548] The buggy address is located 8 bytes inside of
[   21.502548]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.502648] 
[   21.502679] The buggy address belongs to the physical page:
[   21.503377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.503458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.503521] page_type: f5(slab)
[   21.503573] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.503635] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.503685] page dumped because: kasan: bad access detected
[   21.505396] 
[   21.505649] Memory state around the buggy address:
[   21.506073]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.506206]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.506882] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.507075]                                               ^
[   21.507561]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.507661]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.507711] ==================================================================
[   21.528827] ==================================================================
[   21.528908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.529004] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261
[   21.529066] 
[   21.529114] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.529212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.529246] Hardware name: linux,dummy-virt (DT)
[   21.529287] Call trace:
[   21.529862]  show_stack+0x20/0x38 (C)
[   21.530033]  dump_stack_lvl+0x8c/0xd0
[   21.530158]  print_report+0x118/0x608
[   21.530219]  kasan_report+0xdc/0x128
[   21.530275]  __asan_report_load8_noabort+0x20/0x30
[   21.530337]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.530400]  kasan_bitops_generic+0x110/0x1c8
[   21.530474]  kunit_try_run_case+0x170/0x3f0
[   21.530544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.531158]  kthread+0x328/0x630
[   21.531220]  ret_from_fork+0x10/0x20
[   21.531285] 
[   21.531310] Allocated by task 261:
[   21.531347]  kasan_save_stack+0x3c/0x68
[   21.531399]  kasan_save_track+0x20/0x40
[   21.531578]  kasan_save_alloc_info+0x40/0x58
[   21.531660]  __kasan_kmalloc+0xd4/0xd8
[   21.531725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.531777]  kasan_bitops_generic+0xa0/0x1c8
[   21.531821]  kunit_try_run_case+0x170/0x3f0
[   21.531863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.532141]  kthread+0x328/0x630
[   21.532216]  ret_from_fork+0x10/0x20
[   21.532290] 
[   21.532337] The buggy address belongs to the object at fff00000c4035140
[   21.532337]  which belongs to the cache kmalloc-16 of size 16
[   21.532424] The buggy address is located 8 bytes inside of
[   21.532424]  allocated 9-byte region [fff00000c4035140, fff00000c4035149)
[   21.532490] 
[   21.532517] The buggy address belongs to the physical page:
[   21.532553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   21.532614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.532684] page_type: f5(slab)
[   21.532732] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.533241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.533296] page dumped because: kasan: bad access detected
[   21.533336] 
[   21.533371] Memory state around the buggy address:
[   21.533415]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   21.533695]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.533839] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.533944]                                               ^
[   21.534066]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534139]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   21.463349] ==================================================================
[   21.463438] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   21.463615] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259
[   21.463681] 
[   21.463730] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.463830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.463865] Hardware name: linux,dummy-virt (DT)
[   21.463906] Call trace:
[   21.463945]  show_stack+0x20/0x38 (C)
[   21.464087]  dump_stack_lvl+0x8c/0xd0
[   21.464179]  print_report+0x118/0x608
[   21.464240]  kasan_report+0xdc/0x128
[   21.464295]  __asan_report_load1_noabort+0x20/0x30
[   21.464353]  strnlen+0x80/0x88
[   21.464442]  kasan_strings+0x478/0xb00
[   21.464527]  kunit_try_run_case+0x170/0x3f0
[   21.464620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.464724]  kthread+0x328/0x630
[   21.464789]  ret_from_fork+0x10/0x20
[   21.465169] 
[   21.465203] Allocated by task 259:
[   21.465240]  kasan_save_stack+0x3c/0x68
[   21.465295]  kasan_save_track+0x20/0x40
[   21.465341]  kasan_save_alloc_info+0x40/0x58
[   21.465384]  __kasan_kmalloc+0xd4/0xd8
[   21.465428]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.465570]  kasan_strings+0xc8/0xb00
[   21.465622]  kunit_try_run_case+0x170/0x3f0
[   21.465666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.465718]  kthread+0x328/0x630
[   21.465760]  ret_from_fork+0x10/0x20
[   21.465833] 
[   21.465870] Freed by task 259:
[   21.465908]  kasan_save_stack+0x3c/0x68
[   21.465956]  kasan_save_track+0x20/0x40
[   21.466021]  kasan_save_free_info+0x4c/0x78
[   21.466084]  __kasan_slab_free+0x6c/0x98
[   21.466167]  kfree+0x214/0x3c8
[   21.466216]  kasan_strings+0x24c/0xb00
[   21.466259]  kunit_try_run_case+0x170/0x3f0
[   21.466304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.466354]  kthread+0x328/0x630
[   21.466517]  ret_from_fork+0x10/0x20
[   21.466588] 
[   21.466785] The buggy address belongs to the object at fff00000c7794c80
[   21.466785]  which belongs to the cache kmalloc-32 of size 32
[   21.466875] The buggy address is located 16 bytes inside of
[   21.466875]  freed 32-byte region [fff00000c7794c80, fff00000c7794ca0)
[   21.467375] 
[   21.467554] The buggy address belongs to the physical page:
[   21.467601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   21.467742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.467834] page_type: f5(slab)
[   21.468051] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.468120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.468175] page dumped because: kasan: bad access detected
[   21.468215] 
[   21.468240] Memory state around the buggy address:
[   21.468282]  fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.468615]  fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.468839] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.468900]                          ^
[   21.469135]  fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.469818]  fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.470269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   21.342434] ==================================================================
[   21.343564] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   21.343810] Read of size 1 at addr ffff8000809d7c2a by task kunit_try_catch/249
[   21.343880] 
[   21.346494] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.346614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.346677] Hardware name: linux,dummy-virt (DT)
[   21.346721] Call trace:
[   21.346756]  show_stack+0x20/0x38 (C)
[   21.346907]  dump_stack_lvl+0x8c/0xd0
[   21.347013]  print_report+0x310/0x608
[   21.347138]  kasan_report+0xdc/0x128
[   21.347201]  __asan_report_load1_noabort+0x20/0x30
[   21.347264]  kasan_stack_oob+0x238/0x270
[   21.347338]  kunit_try_run_case+0x170/0x3f0
[   21.347396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347458]  kthread+0x328/0x630
[   21.347514]  ret_from_fork+0x10/0x20
[   21.347575] 
[   21.347647] The buggy address belongs to stack of task kunit_try_catch/249
[   21.347780]  and is located at offset 138 in frame:
[   21.347851]  kasan_stack_oob+0x0/0x270
[   21.348150] 
[   21.348218] This frame has 4 objects:
[   21.348427]  [48, 49) '__assertion'
[   21.348482]  [64, 72) 'array'
[   21.348522]  [96, 112) '__assertion'
[   21.348574]  [128, 138) 'stack_array'
[   21.348627] 
[   21.348673] The buggy address belongs to the virtual mapping at
[   21.348673]  [ffff8000809d0000, ffff8000809d9000) created by:
[   21.348673]  kernel_clone+0x150/0x7a8
[   21.348765] 
[   21.348802] The buggy address belongs to the physical page:
[   21.348892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   21.348961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.349055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.349116] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.349183] page dumped because: kasan: bad access detected
[   21.349273] 
[   21.349302] Memory state around the buggy address:
[   21.349343]  ffff8000809d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.349397]  ffff8000809d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   21.349449] >ffff8000809d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   21.349519]                                   ^
[   21.349575]  ffff8000809d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   21.349647]  ffff8000809d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.349701] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   21.454928] ==================================================================
[   21.454986] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   21.455048] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259
[   21.455105] 
[   21.455148] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.455246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.455282] Hardware name: linux,dummy-virt (DT)
[   21.455319] Call trace:
[   21.455349]  show_stack+0x20/0x38 (C)
[   21.455413]  dump_stack_lvl+0x8c/0xd0
[   21.455467]  print_report+0x118/0x608
[   21.455539]  kasan_report+0xdc/0x128
[   21.455595]  __asan_report_load1_noabort+0x20/0x30
[   21.455666]  strlen+0xa8/0xb0
[   21.455720]  kasan_strings+0x418/0xb00
[   21.455773]  kunit_try_run_case+0x170/0x3f0
[   21.455826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.455884]  kthread+0x328/0x630
[   21.457716]  ret_from_fork+0x10/0x20
[   21.457830] 
[   21.457859] Allocated by task 259:
[   21.457898]  kasan_save_stack+0x3c/0x68
[   21.457951]  kasan_save_track+0x20/0x40
[   21.458013]  kasan_save_alloc_info+0x40/0x58
[   21.458065]  __kasan_kmalloc+0xd4/0xd8
[   21.458107]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.458154]  kasan_strings+0xc8/0xb00
[   21.458196]  kunit_try_run_case+0x170/0x3f0
[   21.458242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.458291]  kthread+0x328/0x630
[   21.458336]  ret_from_fork+0x10/0x20
[   21.458381] 
[   21.458405] Freed by task 259:
[   21.458438]  kasan_save_stack+0x3c/0x68
[   21.458627]  kasan_save_track+0x20/0x40
[   21.458861]  kasan_save_free_info+0x4c/0x78
[   21.458918]  __kasan_slab_free+0x6c/0x98
[   21.458964]  kfree+0x214/0x3c8
[   21.459024]  kasan_strings+0x24c/0xb00
[   21.459067]  kunit_try_run_case+0x170/0x3f0
[   21.459111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.459162]  kthread+0x328/0x630
[   21.459809]  ret_from_fork+0x10/0x20
[   21.460397] 
[   21.460541] The buggy address belongs to the object at fff00000c7794c80
[   21.460541]  which belongs to the cache kmalloc-32 of size 32
[   21.460694] The buggy address is located 16 bytes inside of
[   21.460694]  freed 32-byte region [fff00000c7794c80, fff00000c7794ca0)
[   21.460768] 
[   21.460796] The buggy address belongs to the physical page:
[   21.460834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   21.460898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.460958] page_type: f5(slab)
[   21.461025] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.461443] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.461510] page dumped because: kasan: bad access detected
[   21.461554] 
[   21.461578] Memory state around the buggy address:
[   21.461682]  fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.461771]  fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.462032] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.462093]                          ^
[   21.462230]  fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.462495]  fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.462573] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   21.450679] ==================================================================
[   21.450758] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   21.450832] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259
[   21.451301] 
[   21.451360] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.451457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.451490] Hardware name: linux,dummy-virt (DT)
[   21.451525] Call trace:
[   21.451553]  show_stack+0x20/0x38 (C)
[   21.451612]  dump_stack_lvl+0x8c/0xd0
[   21.451664]  print_report+0x118/0x608
[   21.451712]  kasan_report+0xdc/0x128
[   21.451761]  __asan_report_load1_noabort+0x20/0x30
[   21.451813]  kasan_strings+0x95c/0xb00
[   21.451860]  kunit_try_run_case+0x170/0x3f0
[   21.451910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.451967]  kthread+0x328/0x630
[   21.452042]  ret_from_fork+0x10/0x20
[   21.452098] 
[   21.452123] Allocated by task 259:
[   21.452156]  kasan_save_stack+0x3c/0x68
[   21.452209]  kasan_save_track+0x20/0x40
[   21.452255]  kasan_save_alloc_info+0x40/0x58
[   21.452303]  __kasan_kmalloc+0xd4/0xd8
[   21.452348]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.452393]  kasan_strings+0xc8/0xb00
[   21.452434]  kunit_try_run_case+0x170/0x3f0
[   21.452478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.452526]  kthread+0x328/0x630
[   21.452570]  ret_from_fork+0x10/0x20
[   21.452611] 
[   21.452635] Freed by task 259:
[   21.452668]  kasan_save_stack+0x3c/0x68
[   21.452711]  kasan_save_track+0x20/0x40
[   21.452755]  kasan_save_free_info+0x4c/0x78
[   21.452799]  __kasan_slab_free+0x6c/0x98
[   21.452842]  kfree+0x214/0x3c8
[   21.452880]  kasan_strings+0x24c/0xb00
[   21.452921]  kunit_try_run_case+0x170/0x3f0
[   21.452965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.453676]  kthread+0x328/0x630
[   21.453754]  ret_from_fork+0x10/0x20
[   21.453801] 
[   21.453854] The buggy address belongs to the object at fff00000c7794c80
[   21.453854]  which belongs to the cache kmalloc-32 of size 32
[   21.453932] The buggy address is located 16 bytes inside of
[   21.453932]  freed 32-byte region [fff00000c7794c80, fff00000c7794ca0)
[   21.454015] 
[   21.454045] The buggy address belongs to the physical page:
[   21.454087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   21.454151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.454208] page_type: f5(slab)
[   21.454259] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.454321] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.454371] page dumped because: kasan: bad access detected
[   21.454410] 
[   21.454433] Memory state around the buggy address:
[   21.454489]  fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.454544]  fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.454595] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.454640]                          ^
[   21.454677]  fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.454728]  fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.454770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   21.444366] ==================================================================
[   21.444430] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   21.444509] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259
[   21.444566] 
[   21.444619] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.444721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.444754] Hardware name: linux,dummy-virt (DT)
[   21.444796] Call trace:
[   21.444827]  show_stack+0x20/0x38 (C)
[   21.444890]  dump_stack_lvl+0x8c/0xd0
[   21.444941]  print_report+0x118/0x608
[   21.445011]  kasan_report+0xdc/0x128
[   21.445065]  __asan_report_load1_noabort+0x20/0x30
[   21.445120]  strcmp+0xc0/0xc8
[   21.445166]  kasan_strings+0x340/0xb00
[   21.445215]  kunit_try_run_case+0x170/0x3f0
[   21.445268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.445326]  kthread+0x328/0x630
[   21.445837]  ret_from_fork+0x10/0x20
[   21.445940] 
[   21.445984] Allocated by task 259:
[   21.446024]  kasan_save_stack+0x3c/0x68
[   21.446079]  kasan_save_track+0x20/0x40
[   21.446127]  kasan_save_alloc_info+0x40/0x58
[   21.446177]  __kasan_kmalloc+0xd4/0xd8
[   21.446222]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.446269]  kasan_strings+0xc8/0xb00
[   21.446689]  kunit_try_run_case+0x170/0x3f0
[   21.446812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.446902]  kthread+0x328/0x630
[   21.446944]  ret_from_fork+0x10/0x20
[   21.447011] 
[   21.447038] Freed by task 259:
[   21.447104]  kasan_save_stack+0x3c/0x68
[   21.447170]  kasan_save_track+0x20/0x40
[   21.447265]  kasan_save_free_info+0x4c/0x78
[   21.447306]  __kasan_slab_free+0x6c/0x98
[   21.447348]  kfree+0x214/0x3c8
[   21.447382]  kasan_strings+0x24c/0xb00
[   21.447422]  kunit_try_run_case+0x170/0x3f0
[   21.447460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.447517]  kthread+0x328/0x630
[   21.447627]  ret_from_fork+0x10/0x20
[   21.447672] 
[   21.447732] The buggy address belongs to the object at fff00000c7794c80
[   21.447732]  which belongs to the cache kmalloc-32 of size 32
[   21.447817] The buggy address is located 16 bytes inside of
[   21.447817]  freed 32-byte region [fff00000c7794c80, fff00000c7794ca0)
[   21.447944] 
[   21.447992] The buggy address belongs to the physical page:
[   21.448106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   21.448177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.448263] page_type: f5(slab)
[   21.448386] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.448451] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.448521] page dumped because: kasan: bad access detected
[   21.448604] 
[   21.448659] Memory state around the buggy address:
[   21.448711]  fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.448809]  fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.448912] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.449527]                          ^
[   21.449671]  fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.449896]  fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.449950] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   21.424940] ==================================================================
[   21.425063] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   21.425200] Read of size 1 at addr fff00000c7794ad8 by task kunit_try_catch/257
[   21.425278] 
[   21.425339] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.425454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.425745] Hardware name: linux,dummy-virt (DT)
[   21.425952] Call trace:
[   21.426064]  show_stack+0x20/0x38 (C)
[   21.426508]  dump_stack_lvl+0x8c/0xd0
[   21.426842]  print_report+0x118/0x608
[   21.427112]  kasan_report+0xdc/0x128
[   21.427237]  __asan_report_load1_noabort+0x20/0x30
[   21.427343]  memcmp+0x198/0x1d8
[   21.427396]  kasan_memcmp+0x16c/0x300
[   21.427473]  kunit_try_run_case+0x170/0x3f0
[   21.427531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.427618]  kthread+0x328/0x630
[   21.427674]  ret_from_fork+0x10/0x20
[   21.427731] 
[   21.427940] Allocated by task 257:
[   21.427988]  kasan_save_stack+0x3c/0x68
[   21.428144]  kasan_save_track+0x20/0x40
[   21.428214]  kasan_save_alloc_info+0x40/0x58
[   21.428281]  __kasan_kmalloc+0xd4/0xd8
[   21.428321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.428367]  kasan_memcmp+0xbc/0x300
[   21.428406]  kunit_try_run_case+0x170/0x3f0
[   21.428449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.428494]  kthread+0x328/0x630
[   21.428535]  ret_from_fork+0x10/0x20
[   21.428575] 
[   21.428737] The buggy address belongs to the object at fff00000c7794ac0
[   21.428737]  which belongs to the cache kmalloc-32 of size 32
[   21.428894] The buggy address is located 0 bytes to the right of
[   21.428894]  allocated 24-byte region [fff00000c7794ac0, fff00000c7794ad8)
[   21.428998] 
[   21.429055] The buggy address belongs to the physical page:
[   21.429345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   21.429423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.429501] page_type: f5(slab)
[   21.429561] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.429638] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.429692] page dumped because: kasan: bad access detected
[   21.429732] 
[   21.429769] Memory state around the buggy address:
[   21.429840]  fff00000c7794980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.429897]  fff00000c7794a00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   21.429951] >fff00000c7794a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.430007]                                                     ^
[   21.430057]  fff00000c7794b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.430109]  fff00000c7794b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.430156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   21.293414] ==================================================================
[   21.293529] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   21.294052] Read of size 1 at addr ffff99d6cad2e60d by task kunit_try_catch/245
[   21.294258] 
[   21.294341] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.294444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.294853] Hardware name: linux,dummy-virt (DT)
[   21.294894] Call trace:
[   21.294925]  show_stack+0x20/0x38 (C)
[   21.295153]  dump_stack_lvl+0x8c/0xd0
[   21.295222]  print_report+0x310/0x608
[   21.295279]  kasan_report+0xdc/0x128
[   21.295328]  __asan_report_load1_noabort+0x20/0x30
[   21.296015]  kasan_global_oob_right+0x230/0x270
[   21.296114]  kunit_try_run_case+0x170/0x3f0
[   21.296179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.296459]  kthread+0x328/0x630
[   21.296686]  ret_from_fork+0x10/0x20
[   21.296773] 
[   21.297030] The buggy address belongs to the variable:
[   21.297193]  global_array+0xd/0x40
[   21.297535] 
[   21.297669] The buggy address belongs to the virtual mapping at
[   21.297669]  [ffff99d6c8ee0000, ffff99d6cade1000) created by:
[   21.297669]  paging_init+0x66c/0x7d0
[   21.297978] 
[   21.298621] The buggy address belongs to the physical page:
[   21.298834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d2e
[   21.299032] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   21.299258] raw: 03fffe0000002000 ffffc1ffc01f4b88 ffffc1ffc01f4b88 0000000000000000
[   21.299462] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.299521] page dumped because: kasan: bad access detected
[   21.299564] 
[   21.299734] Memory state around the buggy address:
[   21.299784]  ffff99d6cad2e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.299850]  ffff99d6cad2e580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   21.300126] >ffff99d6cad2e600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   21.300301]                       ^
[   21.300355]  ffff99d6cad2e680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   21.300409]  ffff99d6cad2e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.300451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   21.245762] ==================================================================
[   21.245870] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.245963] Free of addr fff00000c6620701 by task kunit_try_catch/241
[   21.246930] 
[   21.247063] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.247232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.247640] Hardware name: linux,dummy-virt (DT)
[   21.247996] Call trace:
[   21.248050]  show_stack+0x20/0x38 (C)
[   21.248439]  dump_stack_lvl+0x8c/0xd0
[   21.248522]  print_report+0x118/0x608
[   21.248874]  kasan_report_invalid_free+0xc0/0xe8
[   21.248945]  check_slab_allocation+0xfc/0x108
[   21.249023]  __kasan_mempool_poison_object+0x78/0x150
[   21.249085]  mempool_free+0x28c/0x328
[   21.249148]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.249212]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.249733]  kunit_try_run_case+0x170/0x3f0
[   21.250150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.250319]  kthread+0x328/0x630
[   21.250383]  ret_from_fork+0x10/0x20
[   21.250959] 
[   21.251030] Allocated by task 241:
[   21.251081]  kasan_save_stack+0x3c/0x68
[   21.251148]  kasan_save_track+0x20/0x40
[   21.251191]  kasan_save_alloc_info+0x40/0x58
[   21.251235]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.251283]  remove_element+0x130/0x1f8
[   21.251376]  mempool_alloc_preallocated+0x58/0xc0
[   21.251431]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   21.251478]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.251749]  kunit_try_run_case+0x170/0x3f0
[   21.251802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.251847]  kthread+0x328/0x630
[   21.252342]  ret_from_fork+0x10/0x20
[   21.252680] 
[   21.252710] The buggy address belongs to the object at fff00000c6620700
[   21.252710]  which belongs to the cache kmalloc-128 of size 128
[   21.253164] The buggy address is located 1 bytes inside of
[   21.253164]  128-byte region [fff00000c6620700, fff00000c6620780)
[   21.253534] 
[   21.253620] The buggy address belongs to the physical page:
[   21.253992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   21.254092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.254158] page_type: f5(slab)
[   21.254373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.254556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.254609] page dumped because: kasan: bad access detected
[   21.254647] 
[   21.254668] Memory state around the buggy address:
[   21.254710]  fff00000c6620600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.254763]  fff00000c6620680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.255114] >fff00000c6620700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.255174]                    ^
[   21.255380]  fff00000c6620780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.255544]  fff00000c6620800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.255594] ==================================================================
[   21.274514] ==================================================================
[   21.274628] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.274731] Free of addr fff00000c78b8001 by task kunit_try_catch/243
[   21.275204] 
[   21.275301] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.275452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.275490] Hardware name: linux,dummy-virt (DT)
[   21.275529] Call trace:
[   21.275576]  show_stack+0x20/0x38 (C)
[   21.275927]  dump_stack_lvl+0x8c/0xd0
[   21.276010]  print_report+0x118/0x608
[   21.276230]  kasan_report_invalid_free+0xc0/0xe8
[   21.276303]  __kasan_mempool_poison_object+0xfc/0x150
[   21.276378]  mempool_free+0x28c/0x328
[   21.276437]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.276496]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   21.276876]  kunit_try_run_case+0x170/0x3f0
[   21.277244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.277590]  kthread+0x328/0x630
[   21.277724]  ret_from_fork+0x10/0x20
[   21.277857] 
[   21.278045] The buggy address belongs to the physical page:
[   21.278143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8
[   21.278225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.278390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.278463] page_type: f8(unknown)
[   21.278770] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.278845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.279053] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.279166] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.279467] head: 0bfffe0000000002 ffffc1ffc31e2e01 00000000ffffffff 00000000ffffffff
[   21.279537] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.279585] page dumped because: kasan: bad access detected
[   21.279903] 
[   21.279932] Memory state around the buggy address:
[   21.279994]  fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.280055]  fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.280145] >fff00000c78b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.280202]                    ^
[   21.280399]  fff00000c78b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.280459]  fff00000c78b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.280506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   21.217209] ==================================================================
[   21.217296] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.217435] Free of addr fff00000c78b8000 by task kunit_try_catch/237
[   21.217487] 
[   21.217535] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.217654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217687] Hardware name: linux,dummy-virt (DT)
[   21.217726] Call trace:
[   21.217756]  show_stack+0x20/0x38 (C)
[   21.217831]  dump_stack_lvl+0x8c/0xd0
[   21.217918]  print_report+0x118/0x608
[   21.218361]  kasan_report_invalid_free+0xc0/0xe8
[   21.218429]  __kasan_mempool_poison_object+0x14c/0x150
[   21.218635]  mempool_free+0x28c/0x328
[   21.218792]  mempool_double_free_helper+0x150/0x2e8
[   21.218880]  mempool_kmalloc_large_double_free+0xc0/0x118
[   21.218944]  kunit_try_run_case+0x170/0x3f0
[   21.219015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.219245]  kthread+0x328/0x630
[   21.219305]  ret_from_fork+0x10/0x20
[   21.219545] 
[   21.219587] The buggy address belongs to the physical page:
[   21.219629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8
[   21.219694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.219750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.219817] page_type: f8(unknown)
[   21.220131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.220199] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.220285] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.220385] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.220449] head: 0bfffe0000000002 ffffc1ffc31e2e01 00000000ffffffff 00000000ffffffff
[   21.220556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.220607] page dumped because: kasan: bad access detected
[   21.220646] 
[   21.220666] Memory state around the buggy address:
[   21.220708]  fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220756]  fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220804] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220845]                    ^
[   21.220928]  fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220990]  fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.221035] ==================================================================
[   21.231735] ==================================================================
[   21.231829] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.231924] Free of addr fff00000c78b8000 by task kunit_try_catch/239
[   21.231987] 
[   21.232040] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.232139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.232171] Hardware name: linux,dummy-virt (DT)
[   21.232213] Call trace:
[   21.232241]  show_stack+0x20/0x38 (C)
[   21.232303]  dump_stack_lvl+0x8c/0xd0
[   21.232356]  print_report+0x118/0x608
[   21.232410]  kasan_report_invalid_free+0xc0/0xe8
[   21.232463]  __kasan_mempool_poison_pages+0xe0/0xe8
[   21.232520]  mempool_free+0x24c/0x328
[   21.232574]  mempool_double_free_helper+0x150/0x2e8
[   21.232628]  mempool_page_alloc_double_free+0xbc/0x118
[   21.232685]  kunit_try_run_case+0x170/0x3f0
[   21.232739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.232795]  kthread+0x328/0x630
[   21.232847]  ret_from_fork+0x10/0x20
[   21.232901] 
[   21.232927] The buggy address belongs to the physical page:
[   21.232963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8
[   21.233119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.233241] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.233309] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.233376] page dumped because: kasan: bad access detected
[   21.233422] 
[   21.233442] Memory state around the buggy address:
[   21.233481]  fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233529]  fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233599] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233652]                    ^
[   21.233688]  fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233749]  fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233837] ==================================================================
[   21.201855] ==================================================================
[   21.201952] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.202056] Free of addr fff00000c6620300 by task kunit_try_catch/235
[   21.202106] 
[   21.202157] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.202256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.202286] Hardware name: linux,dummy-virt (DT)
[   21.202326] Call trace:
[   21.202354]  show_stack+0x20/0x38 (C)
[   21.203219]  dump_stack_lvl+0x8c/0xd0
[   21.203303]  print_report+0x118/0x608
[   21.203431]  kasan_report_invalid_free+0xc0/0xe8
[   21.203572]  check_slab_allocation+0xd4/0x108
[   21.203884]  __kasan_mempool_poison_object+0x78/0x150
[   21.203958]  mempool_free+0x28c/0x328
[   21.204282]  mempool_double_free_helper+0x150/0x2e8
[   21.204339]  mempool_kmalloc_double_free+0xc0/0x118
[   21.204853]  kunit_try_run_case+0x170/0x3f0
[   21.204950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.205085]  kthread+0x328/0x630
[   21.205164]  ret_from_fork+0x10/0x20
[   21.205221] 
[   21.205263] Allocated by task 235:
[   21.205357]  kasan_save_stack+0x3c/0x68
[   21.205474]  kasan_save_track+0x20/0x40
[   21.205530]  kasan_save_alloc_info+0x40/0x58
[   21.205614]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.205871]  remove_element+0x130/0x1f8
[   21.205998]  mempool_alloc_preallocated+0x58/0xc0
[   21.206300]  mempool_double_free_helper+0x94/0x2e8
[   21.206359]  mempool_kmalloc_double_free+0xc0/0x118
[   21.206444]  kunit_try_run_case+0x170/0x3f0
[   21.206511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.206561]  kthread+0x328/0x630
[   21.206602]  ret_from_fork+0x10/0x20
[   21.206662] 
[   21.206686] Freed by task 235:
[   21.206718]  kasan_save_stack+0x3c/0x68
[   21.206799]  kasan_save_track+0x20/0x40
[   21.206838]  kasan_save_free_info+0x4c/0x78
[   21.206884]  __kasan_mempool_poison_object+0xc0/0x150
[   21.206930]  mempool_free+0x28c/0x328
[   21.206980]  mempool_double_free_helper+0x100/0x2e8
[   21.207032]  mempool_kmalloc_double_free+0xc0/0x118
[   21.207355]  kunit_try_run_case+0x170/0x3f0
[   21.207427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207498]  kthread+0x328/0x630
[   21.207543]  ret_from_fork+0x10/0x20
[   21.207586] 
[   21.207609] The buggy address belongs to the object at fff00000c6620300
[   21.207609]  which belongs to the cache kmalloc-128 of size 128
[   21.207675] The buggy address is located 0 bytes inside of
[   21.207675]  128-byte region [fff00000c6620300, fff00000c6620380)
[   21.207743] 
[   21.207769] The buggy address belongs to the physical page:
[   21.207808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   21.207873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.207932] page_type: f5(slab)
[   21.207991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.208394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.208458] page dumped because: kasan: bad access detected
[   21.208506] 
[   21.208531] Memory state around the buggy address:
[   21.208794]  fff00000c6620200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.209135]  fff00000c6620280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209241] >fff00000c6620300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.209450]                    ^
[   21.209496]  fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209661]  fff00000c6620400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.209717] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   21.121378] ==================================================================
[   21.122260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.122400] Read of size 1 at addr fff00000c78b4000 by task kunit_try_catch/229
[   21.122941] 
[   21.123050] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.123288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.123379] Hardware name: linux,dummy-virt (DT)
[   21.123444] Call trace:
[   21.123676]  show_stack+0x20/0x38 (C)
[   21.124040]  dump_stack_lvl+0x8c/0xd0
[   21.124297]  print_report+0x118/0x608
[   21.124523]  kasan_report+0xdc/0x128
[   21.124617]  __asan_report_load1_noabort+0x20/0x30
[   21.125027]  mempool_uaf_helper+0x314/0x340
[   21.125126]  mempool_kmalloc_large_uaf+0xc4/0x120
[   21.125201]  kunit_try_run_case+0x170/0x3f0
[   21.125264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.125322]  kthread+0x328/0x630
[   21.125374]  ret_from_fork+0x10/0x20
[   21.125694] 
[   21.126195] The buggy address belongs to the physical page:
[   21.126247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4
[   21.126317] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.126369] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.126706] page_type: f8(unknown)
[   21.126773] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.126842] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.126902] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.127328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.127688] head: 0bfffe0000000002 ffffc1ffc31e2d01 00000000ffffffff 00000000ffffffff
[   21.127771] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.127820] page dumped because: kasan: bad access detected
[   21.127863] 
[   21.128193] Memory state around the buggy address:
[   21.128408]  fff00000c78b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.128608]  fff00000c78b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.128664] >fff00000c78b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.128904]                    ^
[   21.129081]  fff00000c78b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.129137]  fff00000c78b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.129182] ==================================================================
[   21.182145] ==================================================================
[   21.182388] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.182773] Read of size 1 at addr fff00000c78b4000 by task kunit_try_catch/233
[   21.183013] 
[   21.183083] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.183203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.183235] Hardware name: linux,dummy-virt (DT)
[   21.183276] Call trace:
[   21.183309]  show_stack+0x20/0x38 (C)
[   21.183534]  dump_stack_lvl+0x8c/0xd0
[   21.183739]  print_report+0x118/0x608
[   21.184080]  kasan_report+0xdc/0x128
[   21.184264]  __asan_report_load1_noabort+0x20/0x30
[   21.184553]  mempool_uaf_helper+0x314/0x340
[   21.184694]  mempool_page_alloc_uaf+0xc0/0x118
[   21.184888]  kunit_try_run_case+0x170/0x3f0
[   21.185135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185218]  kthread+0x328/0x630
[   21.185283]  ret_from_fork+0x10/0x20
[   21.185784] 
[   21.185834] The buggy address belongs to the physical page:
[   21.185943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4
[   21.186181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186399] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.186639] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.186748] page dumped because: kasan: bad access detected
[   21.186933] 
[   21.187042] Memory state around the buggy address:
[   21.187086]  fff00000c78b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.187150]  fff00000c78b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.187330] >fff00000c78b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.187391]                    ^
[   21.187431]  fff00000c78b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.187577]  fff00000c78b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.187781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   21.098347] ==================================================================
[   21.098966] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.099289] Read of size 1 at addr fff00000c4065f00 by task kunit_try_catch/227
[   21.099357] 
[   21.099566] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.099781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.099855] Hardware name: linux,dummy-virt (DT)
[   21.099908] Call trace:
[   21.099984]  show_stack+0x20/0x38 (C)
[   21.100111]  dump_stack_lvl+0x8c/0xd0
[   21.100191]  print_report+0x118/0x608
[   21.100245]  kasan_report+0xdc/0x128
[   21.100296]  __asan_report_load1_noabort+0x20/0x30
[   21.100354]  mempool_uaf_helper+0x314/0x340
[   21.100561]  mempool_kmalloc_uaf+0xc4/0x120
[   21.100675]  kunit_try_run_case+0x170/0x3f0
[   21.100929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.101001]  kthread+0x328/0x630
[   21.101310]  ret_from_fork+0x10/0x20
[   21.101586] 
[   21.101646] Allocated by task 227:
[   21.101691]  kasan_save_stack+0x3c/0x68
[   21.101760]  kasan_save_track+0x20/0x40
[   21.101881]  kasan_save_alloc_info+0x40/0x58
[   21.101936]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.102003]  remove_element+0x130/0x1f8
[   21.102100]  mempool_alloc_preallocated+0x58/0xc0
[   21.102190]  mempool_uaf_helper+0xa4/0x340
[   21.102264]  mempool_kmalloc_uaf+0xc4/0x120
[   21.102335]  kunit_try_run_case+0x170/0x3f0
[   21.102413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.102500]  kthread+0x328/0x630
[   21.102567]  ret_from_fork+0x10/0x20
[   21.102634] 
[   21.102678] Freed by task 227:
[   21.102750]  kasan_save_stack+0x3c/0x68
[   21.102797]  kasan_save_track+0x20/0x40
[   21.102840]  kasan_save_free_info+0x4c/0x78
[   21.102886]  __kasan_mempool_poison_object+0xc0/0x150
[   21.102983]  mempool_free+0x28c/0x328
[   21.103092]  mempool_uaf_helper+0x104/0x340
[   21.103142]  mempool_kmalloc_uaf+0xc4/0x120
[   21.103182]  kunit_try_run_case+0x170/0x3f0
[   21.103235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.103321]  kthread+0x328/0x630
[   21.103371]  ret_from_fork+0x10/0x20
[   21.103419] 
[   21.103479] The buggy address belongs to the object at fff00000c4065f00
[   21.103479]  which belongs to the cache kmalloc-128 of size 128
[   21.103551] The buggy address is located 0 bytes inside of
[   21.103551]  freed 128-byte region [fff00000c4065f00, fff00000c4065f80)
[   21.103619] 
[   21.103645] The buggy address belongs to the physical page:
[   21.103684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   21.103760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.103878] page_type: f5(slab)
[   21.103931] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.103995] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   21.104040] page dumped because: kasan: bad access detected
[   21.104073] 
[   21.104638] Memory state around the buggy address:
[   21.104809]  fff00000c4065e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.104873]  fff00000c4065e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.104926] >fff00000c4065f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.105235]                    ^
[   21.105327]  fff00000c4065f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.105388]  fff00000c4066000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.105455] ==================================================================
[   21.144481] ==================================================================
[   21.144586] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.144752] Read of size 1 at addr fff00000c661e240 by task kunit_try_catch/231
[   21.144836] 
[   21.144891] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.145213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.145253] Hardware name: linux,dummy-virt (DT)
[   21.145548] Call trace:
[   21.145594]  show_stack+0x20/0x38 (C)
[   21.145664]  dump_stack_lvl+0x8c/0xd0
[   21.145778]  print_report+0x118/0x608
[   21.145866]  kasan_report+0xdc/0x128
[   21.145920]  __asan_report_load1_noabort+0x20/0x30
[   21.145991]  mempool_uaf_helper+0x314/0x340
[   21.146049]  mempool_slab_uaf+0xc0/0x118
[   21.146112]  kunit_try_run_case+0x170/0x3f0
[   21.146176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.146490]  kthread+0x328/0x630
[   21.146573]  ret_from_fork+0x10/0x20
[   21.146634] 
[   21.146659] Allocated by task 231:
[   21.146697]  kasan_save_stack+0x3c/0x68
[   21.147292]  kasan_save_track+0x20/0x40
[   21.147718]  kasan_save_alloc_info+0x40/0x58
[   21.147794]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.147867]  remove_element+0x16c/0x1f8
[   21.147922]  mempool_alloc_preallocated+0x58/0xc0
[   21.147979]  mempool_uaf_helper+0xa4/0x340
[   21.148027]  mempool_slab_uaf+0xc0/0x118
[   21.148070]  kunit_try_run_case+0x170/0x3f0
[   21.148112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.148161]  kthread+0x328/0x630
[   21.148203]  ret_from_fork+0x10/0x20
[   21.148245] 
[   21.148270] Freed by task 231:
[   21.148307]  kasan_save_stack+0x3c/0x68
[   21.148352]  kasan_save_track+0x20/0x40
[   21.148392]  kasan_save_free_info+0x4c/0x78
[   21.148436]  __kasan_mempool_poison_object+0xc0/0x150
[   21.148483]  mempool_free+0x28c/0x328
[   21.149034]  mempool_uaf_helper+0x104/0x340
[   21.149189]  mempool_slab_uaf+0xc0/0x118
[   21.149242]  kunit_try_run_case+0x170/0x3f0
[   21.149304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.149674]  kthread+0x328/0x630
[   21.149734]  ret_from_fork+0x10/0x20
[   21.149849] 
[   21.149883] The buggy address belongs to the object at fff00000c661e240
[   21.149883]  which belongs to the cache test_cache of size 123
[   21.150001] The buggy address is located 0 bytes inside of
[   21.150001]  freed 123-byte region [fff00000c661e240, fff00000c661e2bb)
[   21.150075] 
[   21.150103] The buggy address belongs to the physical page:
[   21.150452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10661e
[   21.150549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.150615] page_type: f5(slab)
[   21.150806] raw: 0bfffe0000000000 fff00000c6617640 dead000000000122 0000000000000000
[   21.151060] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.151107] page dumped because: kasan: bad access detected
[   21.151144] 
[   21.151167] Memory state around the buggy address:
[   21.151207]  fff00000c661e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.151747]  fff00000c661e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.151812] >fff00000c661e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   21.151857]                                            ^
[   21.151900]  fff00000c661e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.151955]  fff00000c661e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.152073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   21.014666] ==================================================================
[   21.014872] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.015014] Read of size 1 at addr fff00000c4065b73 by task kunit_try_catch/221
[   21.015076] 
[   21.015130] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.015234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.015265] Hardware name: linux,dummy-virt (DT)
[   21.015305] Call trace:
[   21.015333]  show_stack+0x20/0x38 (C)
[   21.015392]  dump_stack_lvl+0x8c/0xd0
[   21.015446]  print_report+0x118/0x608
[   21.015500]  kasan_report+0xdc/0x128
[   21.015549]  __asan_report_load1_noabort+0x20/0x30
[   21.015605]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.015678]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.015734]  kunit_try_run_case+0x170/0x3f0
[   21.015788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015843]  kthread+0x328/0x630
[   21.015891]  ret_from_fork+0x10/0x20
[   21.015945] 
[   21.015967] Allocated by task 221:
[   21.016021]  kasan_save_stack+0x3c/0x68
[   21.016071]  kasan_save_track+0x20/0x40
[   21.016111]  kasan_save_alloc_info+0x40/0x58
[   21.016156]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.016204]  remove_element+0x130/0x1f8
[   21.016249]  mempool_alloc_preallocated+0x58/0xc0
[   21.016297]  mempool_oob_right_helper+0x98/0x2f0
[   21.016335]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.016379]  kunit_try_run_case+0x170/0x3f0
[   21.016419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.016467]  kthread+0x328/0x630
[   21.016506]  ret_from_fork+0x10/0x20
[   21.016548] 
[   21.016571] The buggy address belongs to the object at fff00000c4065b00
[   21.016571]  which belongs to the cache kmalloc-128 of size 128
[   21.016635] The buggy address is located 0 bytes to the right of
[   21.016635]  allocated 115-byte region [fff00000c4065b00, fff00000c4065b73)
[   21.016703] 
[   21.016728] The buggy address belongs to the physical page:
[   21.016766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   21.016829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.016888] page_type: f5(slab)
[   21.016937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.017006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.017056] page dumped because: kasan: bad access detected
[   21.017105] 
[   21.017132] Memory state around the buggy address:
[   21.017173]  fff00000c4065a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.017223]  fff00000c4065a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017272] >fff00000c4065b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.017314]                                                              ^
[   21.017359]  fff00000c4065b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017406]  fff00000c4065c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.017448] ==================================================================
[   21.028681] ==================================================================
[   21.028776] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.028865] Read of size 1 at addr fff00000c78b2001 by task kunit_try_catch/223
[   21.028926] 
[   21.028990] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.029096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.029128] Hardware name: linux,dummy-virt (DT)
[   21.029165] Call trace:
[   21.029199]  show_stack+0x20/0x38 (C)
[   21.029261]  dump_stack_lvl+0x8c/0xd0
[   21.029315]  print_report+0x118/0x608
[   21.029370]  kasan_report+0xdc/0x128
[   21.029421]  __asan_report_load1_noabort+0x20/0x30
[   21.029479]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.029532]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.029589]  kunit_try_run_case+0x170/0x3f0
[   21.029644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.029701]  kthread+0x328/0x630
[   21.029754]  ret_from_fork+0x10/0x20
[   21.029816] 
[   21.029848] The buggy address belongs to the physical page:
[   21.029890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   21.029954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.030563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.030827] page_type: f8(unknown)
[   21.030895] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.030954] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.031023] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.031080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.031133] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   21.031215] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.031303] page dumped because: kasan: bad access detected
[   21.031343] 
[   21.031678] Memory state around the buggy address:
[   21.031881]  fff00000c78b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.031941]  fff00000c78b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.032005] >fff00000c78b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.032266]                    ^
[   21.032715]  fff00000c78b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.033037]  fff00000c78b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.033275] ==================================================================
[   21.045106] ==================================================================
[   21.045523] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.045770] Read of size 1 at addr fff00000c66202bb by task kunit_try_catch/225
[   21.045909] 
[   21.046020] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.046169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.046231] Hardware name: linux,dummy-virt (DT)
[   21.046323] Call trace:
[   21.046359]  show_stack+0x20/0x38 (C)
[   21.046508]  dump_stack_lvl+0x8c/0xd0
[   21.046570]  print_report+0x118/0x608
[   21.046627]  kasan_report+0xdc/0x128
[   21.046682]  __asan_report_load1_noabort+0x20/0x30
[   21.046738]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.046791]  mempool_slab_oob_right+0xc0/0x118
[   21.047364]  kunit_try_run_case+0x170/0x3f0
[   21.047439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.047503]  kthread+0x328/0x630
[   21.047621]  ret_from_fork+0x10/0x20
[   21.047842] 
[   21.047899] Allocated by task 225:
[   21.048136]  kasan_save_stack+0x3c/0x68
[   21.048211]  kasan_save_track+0x20/0x40
[   21.048299]  kasan_save_alloc_info+0x40/0x58
[   21.048414]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.048506]  remove_element+0x16c/0x1f8
[   21.048557]  mempool_alloc_preallocated+0x58/0xc0
[   21.048605]  mempool_oob_right_helper+0x98/0x2f0
[   21.048701]  mempool_slab_oob_right+0xc0/0x118
[   21.048897]  kunit_try_run_case+0x170/0x3f0
[   21.049173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049511]  kthread+0x328/0x630
[   21.049671]  ret_from_fork+0x10/0x20
[   21.050254] 
[   21.050359] The buggy address belongs to the object at fff00000c6620240
[   21.050359]  which belongs to the cache test_cache of size 123
[   21.050481] The buggy address is located 0 bytes to the right of
[   21.050481]  allocated 123-byte region [fff00000c6620240, fff00000c66202bb)
[   21.050615] 
[   21.050771] The buggy address belongs to the physical page:
[   21.050884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   21.050982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.051165] page_type: f5(slab)
[   21.051322] raw: 0bfffe0000000000 fff00000c6617500 dead000000000122 0000000000000000
[   21.051383] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.051453] page dumped because: kasan: bad access detected
[   21.051489] 
[   21.051512] Memory state around the buggy address:
[   21.051551]  fff00000c6620180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.051599]  fff00000c6620200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.051645] >fff00000c6620280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.051687]                                         ^
[   21.051728]  fff00000c6620300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.051774]  fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.051818] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   20.438017] ==================================================================
[   20.438224] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   20.438324] Read of size 1 at addr fff00000c6617140 by task kunit_try_catch/215
[   20.438434] 
[   20.438498] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   20.438838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.438922] Hardware name: linux,dummy-virt (DT)
[   20.438991] Call trace:
[   20.439047]  show_stack+0x20/0x38 (C)
[   20.439235]  dump_stack_lvl+0x8c/0xd0
[   20.439704]  print_report+0x118/0x608
[   20.439868]  kasan_report+0xdc/0x128
[   20.439997]  __kasan_check_byte+0x54/0x70
[   20.440056]  kmem_cache_destroy+0x34/0x218
[   20.440157]  kmem_cache_double_destroy+0x174/0x300
[   20.440260]  kunit_try_run_case+0x170/0x3f0
[   20.440336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.440452]  kthread+0x328/0x630
[   20.440506]  ret_from_fork+0x10/0x20
[   20.440599] 
[   20.440654] Allocated by task 215:
[   20.440730]  kasan_save_stack+0x3c/0x68
[   20.440806]  kasan_save_track+0x20/0x40
[   20.440862]  kasan_save_alloc_info+0x40/0x58
[   20.440955]  __kasan_slab_alloc+0xa8/0xb0
[   20.441012]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.441062]  __kmem_cache_create_args+0x178/0x280
[   20.441165]  kmem_cache_double_destroy+0xc0/0x300
[   20.441207]  kunit_try_run_case+0x170/0x3f0
[   20.441247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.441293]  kthread+0x328/0x630
[   20.441331]  ret_from_fork+0x10/0x20
[   20.441370] 
[   20.441391] Freed by task 215:
[   20.441421]  kasan_save_stack+0x3c/0x68
[   20.441462]  kasan_save_track+0x20/0x40
[   20.441500]  kasan_save_free_info+0x4c/0x78
[   20.441541]  __kasan_slab_free+0x6c/0x98
[   20.441586]  kmem_cache_free+0x260/0x470
[   20.441667]  slab_kmem_cache_release+0x38/0x50
[   20.441710]  kmem_cache_release+0x1c/0x30
[   20.441749]  kobject_put+0x17c/0x430
[   20.441791]  sysfs_slab_release+0x1c/0x30
[   20.441847]  kmem_cache_destroy+0x118/0x218
[   20.441945]  kmem_cache_double_destroy+0x128/0x300
[   20.442042]  kunit_try_run_case+0x170/0x3f0
[   20.442084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.442881]  kthread+0x328/0x630
[   20.442942]  ret_from_fork+0x10/0x20
[   20.443002] 
[   20.443031] The buggy address belongs to the object at fff00000c6617140
[   20.443031]  which belongs to the cache kmem_cache of size 208
[   20.443100] The buggy address is located 0 bytes inside of
[   20.443100]  freed 208-byte region [fff00000c6617140, fff00000c6617210)
[   20.443186] 
[   20.443211] The buggy address belongs to the physical page:
[   20.443248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106617
[   20.443552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.443702] page_type: f5(slab)
[   20.443878] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   20.444151] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   20.444206] page dumped because: kasan: bad access detected
[   20.444257] 
[   20.444289] Memory state around the buggy address:
[   20.444347]  fff00000c6617000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.444395]  fff00000c6617080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   20.444733] >fff00000c6617100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.444787]                                            ^
[   20.444828]  fff00000c6617180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.444875]  fff00000c6617200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.444914] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   20.155367] ==================================================================
[   20.155489] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   20.155591] Read of size 1 at addr fff00000c408a000 by task kunit_try_catch/213
[   20.155668] 
[   20.155725] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   20.155916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.155991] Hardware name: linux,dummy-virt (DT)
[   20.156085] Call trace:
[   20.156145]  show_stack+0x20/0x38 (C)
[   20.156228]  dump_stack_lvl+0x8c/0xd0
[   20.156331]  print_report+0x118/0x608
[   20.156432]  kasan_report+0xdc/0x128
[   20.156533]  __asan_report_load1_noabort+0x20/0x30
[   20.156644]  kmem_cache_rcu_uaf+0x388/0x468
[   20.156708]  kunit_try_run_case+0x170/0x3f0
[   20.156806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.156915]  kthread+0x328/0x630
[   20.157052]  ret_from_fork+0x10/0x20
[   20.157119] 
[   20.157141] Allocated by task 213:
[   20.157177]  kasan_save_stack+0x3c/0x68
[   20.157227]  kasan_save_track+0x20/0x40
[   20.157270]  kasan_save_alloc_info+0x40/0x58
[   20.157314]  __kasan_slab_alloc+0xa8/0xb0
[   20.157509]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.157620]  kmem_cache_rcu_uaf+0x12c/0x468
[   20.157678]  kunit_try_run_case+0x170/0x3f0
[   20.157721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.157834]  kthread+0x328/0x630
[   20.157881]  ret_from_fork+0x10/0x20
[   20.157924] 
[   20.157948] Freed by task 0:
[   20.157991]  kasan_save_stack+0x3c/0x68
[   20.158039]  kasan_save_track+0x20/0x40
[   20.158079]  kasan_save_free_info+0x4c/0x78
[   20.158124]  __kasan_slab_free+0x6c/0x98
[   20.158165]  slab_free_after_rcu_debug+0xd4/0x2f8
[   20.158210]  rcu_core+0x9f4/0x1e20
[   20.158252]  rcu_core_si+0x18/0x30
[   20.158293]  handle_softirqs+0x374/0xb28
[   20.158338]  __do_softirq+0x1c/0x28
[   20.158377] 
[   20.158401] Last potentially related work creation:
[   20.158430]  kasan_save_stack+0x3c/0x68
[   20.158486]  kasan_record_aux_stack+0xb4/0xc8
[   20.158531]  kmem_cache_free+0x120/0x470
[   20.158604]  kmem_cache_rcu_uaf+0x16c/0x468
[   20.158703]  kunit_try_run_case+0x170/0x3f0
[   20.158778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158828]  kthread+0x328/0x630
[   20.158870]  ret_from_fork+0x10/0x20
[   20.158911] 
[   20.158933] The buggy address belongs to the object at fff00000c408a000
[   20.158933]  which belongs to the cache test_cache of size 200
[   20.159012] The buggy address is located 0 bytes inside of
[   20.159012]  freed 200-byte region [fff00000c408a000, fff00000c408a0c8)
[   20.159083] 
[   20.159111] The buggy address belongs to the physical page:
[   20.159150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10408a
[   20.159219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.159281] page_type: f5(slab)
[   20.159377] raw: 0bfffe0000000000 fff00000c6617000 dead000000000122 0000000000000000
[   20.159491] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.159591] page dumped because: kasan: bad access detected
[   20.159649] 
[   20.159675] Memory state around the buggy address:
[   20.159718]  fff00000c4089f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.159789]  fff00000c4089f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.159840] >fff00000c408a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.159885]                    ^
[   20.159919]  fff00000c408a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.159977]  fff00000c408a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.160027] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   20.049194] ==================================================================
[   20.049406] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   20.049545] Free of addr fff00000c6617001 by task kunit_try_catch/211
[   20.049600] 
[   20.049654] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   20.049759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.049790] Hardware name: linux,dummy-virt (DT)
[   20.049868] Call trace:
[   20.049899]  show_stack+0x20/0x38 (C)
[   20.050007]  dump_stack_lvl+0x8c/0xd0
[   20.050070]  print_report+0x118/0x608
[   20.050179]  kasan_report_invalid_free+0xc0/0xe8
[   20.050293]  check_slab_allocation+0xfc/0x108
[   20.050349]  __kasan_slab_pre_free+0x2c/0x48
[   20.050442]  kmem_cache_free+0xf0/0x470
[   20.050538]  kmem_cache_invalid_free+0x184/0x3c8
[   20.050595]  kunit_try_run_case+0x170/0x3f0
[   20.050652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.050713]  kthread+0x328/0x630
[   20.050782]  ret_from_fork+0x10/0x20
[   20.050900] 
[   20.051024] Allocated by task 211:
[   20.051063]  kasan_save_stack+0x3c/0x68
[   20.051272]  kasan_save_track+0x20/0x40
[   20.051327]  kasan_save_alloc_info+0x40/0x58
[   20.051596]  __kasan_slab_alloc+0xa8/0xb0
[   20.051659]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.051967]  kmem_cache_invalid_free+0x12c/0x3c8
[   20.052261]  kunit_try_run_case+0x170/0x3f0
[   20.052326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.052449]  kthread+0x328/0x630
[   20.052827]  ret_from_fork+0x10/0x20
[   20.052886] 
[   20.052912] The buggy address belongs to the object at fff00000c6617000
[   20.052912]  which belongs to the cache test_cache of size 200
[   20.052999] The buggy address is located 1 bytes inside of
[   20.052999]  200-byte region [fff00000c6617000, fff00000c66170c8)
[   20.053065] 
[   20.053433] The buggy address belongs to the physical page:
[   20.053527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106617
[   20.053745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.053907] page_type: f5(slab)
[   20.054296] raw: 0bfffe0000000000 fff00000c1806dc0 dead000000000122 0000000000000000
[   20.054569] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.054634] page dumped because: kasan: bad access detected
[   20.054770] 
[   20.054977] Memory state around the buggy address:
[   20.055033]  fff00000c6616f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.055157]  fff00000c6616f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.055296] >fff00000c6617000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.055511]                    ^
[   20.055752]  fff00000c6617080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.056004]  fff00000c6617100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.056187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   20.012392] ==================================================================
[   20.012496] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   20.012592] Free of addr fff00000c6616000 by task kunit_try_catch/209
[   20.012643] 
[   20.012696] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   20.012794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.012823] Hardware name: linux,dummy-virt (DT)
[   20.012874] Call trace:
[   20.012935]  show_stack+0x20/0x38 (C)
[   20.013219]  dump_stack_lvl+0x8c/0xd0
[   20.013341]  print_report+0x118/0x608
[   20.014006]  kasan_report_invalid_free+0xc0/0xe8
[   20.014072]  check_slab_allocation+0xd4/0x108
[   20.014144]  __kasan_slab_pre_free+0x2c/0x48
[   20.014617]  kmem_cache_free+0xf0/0x470
[   20.014696]  kmem_cache_double_free+0x190/0x3c8
[   20.014932]  kunit_try_run_case+0x170/0x3f0
[   20.015058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.015123]  kthread+0x328/0x630
[   20.015179]  ret_from_fork+0x10/0x20
[   20.015237] 
[   20.015260] Allocated by task 209:
[   20.015340]  kasan_save_stack+0x3c/0x68
[   20.015451]  kasan_save_track+0x20/0x40
[   20.015537]  kasan_save_alloc_info+0x40/0x58
[   20.015581]  __kasan_slab_alloc+0xa8/0xb0
[   20.015673]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.015719]  kmem_cache_double_free+0x12c/0x3c8
[   20.015761]  kunit_try_run_case+0x170/0x3f0
[   20.015803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.015851]  kthread+0x328/0x630
[   20.015890]  ret_from_fork+0x10/0x20
[   20.015931] 
[   20.015990] Freed by task 209:
[   20.016026]  kasan_save_stack+0x3c/0x68
[   20.016071]  kasan_save_track+0x20/0x40
[   20.016112]  kasan_save_free_info+0x4c/0x78
[   20.016154]  __kasan_slab_free+0x6c/0x98
[   20.016195]  kmem_cache_free+0x260/0x470
[   20.016235]  kmem_cache_double_free+0x140/0x3c8
[   20.016278]  kunit_try_run_case+0x170/0x3f0
[   20.016317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.016362]  kthread+0x328/0x630
[   20.016402]  ret_from_fork+0x10/0x20
[   20.016443] 
[   20.016465] The buggy address belongs to the object at fff00000c6616000
[   20.016465]  which belongs to the cache test_cache of size 200
[   20.016533] The buggy address is located 0 bytes inside of
[   20.016533]  200-byte region [fff00000c6616000, fff00000c66160c8)
[   20.016599] 
[   20.016624] The buggy address belongs to the physical page:
[   20.016663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106616
[   20.016736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.016857] page_type: f5(slab)
[   20.016910] raw: 0bfffe0000000000 fff00000c1806c80 dead000000000122 0000000000000000
[   20.016967] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.017027] page dumped because: kasan: bad access detected
[   20.017064] 
[   20.017083] Memory state around the buggy address:
[   20.017125]  fff00000c6615f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.017173]  fff00000c6615f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.017223] >fff00000c6616000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.017267]                    ^
[   20.017298]  fff00000c6616080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.017375]  fff00000c6616100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.017422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   19.754274] ==================================================================
[   19.754477] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   19.754618] Read of size 1 at addr fff00000c66140c8 by task kunit_try_catch/207
[   19.754682] 
[   19.754831] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.755003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.755072] Hardware name: linux,dummy-virt (DT)
[   19.755116] Call trace:
[   19.755146]  show_stack+0x20/0x38 (C)
[   19.755214]  dump_stack_lvl+0x8c/0xd0
[   19.755268]  print_report+0x118/0x608
[   19.755455]  kasan_report+0xdc/0x128
[   19.755608]  __asan_report_load1_noabort+0x20/0x30
[   19.755836]  kmem_cache_oob+0x344/0x430
[   19.755928]  kunit_try_run_case+0x170/0x3f0
[   19.756004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.756181]  kthread+0x328/0x630
[   19.756288]  ret_from_fork+0x10/0x20
[   19.756354] 
[   19.756376] Allocated by task 207:
[   19.756410]  kasan_save_stack+0x3c/0x68
[   19.756462]  kasan_save_track+0x20/0x40
[   19.756647]  kasan_save_alloc_info+0x40/0x58
[   19.756697]  __kasan_slab_alloc+0xa8/0xb0
[   19.756740]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.756789]  kmem_cache_oob+0x12c/0x430
[   19.756830]  kunit_try_run_case+0x170/0x3f0
[   19.756872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.756921]  kthread+0x328/0x630
[   19.757211]  ret_from_fork+0x10/0x20
[   19.757400] 
[   19.757509] The buggy address belongs to the object at fff00000c6614000
[   19.757509]  which belongs to the cache test_cache of size 200
[   19.757609] The buggy address is located 0 bytes to the right of
[   19.757609]  allocated 200-byte region [fff00000c6614000, fff00000c66140c8)
[   19.757689] 
[   19.757845] The buggy address belongs to the physical page:
[   19.757983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.758052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.758158] page_type: f5(slab)
[   19.758216] raw: 0bfffe0000000000 fff00000c1806b40 dead000000000122 0000000000000000
[   19.758426] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.758649] page dumped because: kasan: bad access detected
[   19.758703] 
[   19.758726] Memory state around the buggy address:
[   19.758782]  fff00000c6613f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.758838]  fff00000c6614000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.759294] >fff00000c6614080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.759688]                                               ^
[   19.759801]  fff00000c6614100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759938]  fff00000c6614180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.760084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   19.718170] ==================================================================
[   19.718292] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   19.718429] Read of size 8 at addr fff00000c4075100 by task kunit_try_catch/200
[   19.718500] 
[   19.718604] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.718795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.718874] Hardware name: linux,dummy-virt (DT)
[   19.718947] Call trace:
[   19.719034]  show_stack+0x20/0x38 (C)
[   19.719157]  dump_stack_lvl+0x8c/0xd0
[   19.719215]  print_report+0x118/0x608
[   19.719305]  kasan_report+0xdc/0x128
[   19.719375]  __asan_report_load8_noabort+0x20/0x30
[   19.719437]  workqueue_uaf+0x480/0x4a8
[   19.719490]  kunit_try_run_case+0x170/0x3f0
[   19.719546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.719608]  kthread+0x328/0x630
[   19.719664]  ret_from_fork+0x10/0x20
[   19.719722] 
[   19.719747] Allocated by task 200:
[   19.719799]  kasan_save_stack+0x3c/0x68
[   19.719907]  kasan_save_track+0x20/0x40
[   19.719955]  kasan_save_alloc_info+0x40/0x58
[   19.720038]  __kasan_kmalloc+0xd4/0xd8
[   19.720117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.720166]  workqueue_uaf+0x13c/0x4a8
[   19.720208]  kunit_try_run_case+0x170/0x3f0
[   19.720256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.720365]  kthread+0x328/0x630
[   19.720410]  ret_from_fork+0x10/0x20
[   19.720454] 
[   19.720477] Freed by task 46:
[   19.720510]  kasan_save_stack+0x3c/0x68
[   19.720555]  kasan_save_track+0x20/0x40
[   19.720596]  kasan_save_free_info+0x4c/0x78
[   19.720644]  __kasan_slab_free+0x6c/0x98
[   19.720684]  kfree+0x214/0x3c8
[   19.720722]  workqueue_uaf_work+0x18/0x30
[   19.720768]  process_one_work+0x530/0xf98
[   19.720812]  worker_thread+0x8ac/0xf28
[   19.720852]  kthread+0x328/0x630
[   19.720895]  ret_from_fork+0x10/0x20
[   19.720937] 
[   19.720961] Last potentially related work creation:
[   19.721005]  kasan_save_stack+0x3c/0x68
[   19.721055]  kasan_record_aux_stack+0xb4/0xc8
[   19.721101]  __queue_work+0x65c/0x1010
[   19.721172]  queue_work_on+0xbc/0xf8
[   19.721226]  workqueue_uaf+0x210/0x4a8
[   19.721292]  kunit_try_run_case+0x170/0x3f0
[   19.721624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.721878]  kthread+0x328/0x630
[   19.722108]  ret_from_fork+0x10/0x20
[   19.722386] 
[   19.722424] The buggy address belongs to the object at fff00000c4075100
[   19.722424]  which belongs to the cache kmalloc-32 of size 32
[   19.722522] The buggy address is located 0 bytes inside of
[   19.722522]  freed 32-byte region [fff00000c4075100, fff00000c4075120)
[   19.722596] 
[   19.722649] The buggy address belongs to the physical page:
[   19.722846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104075
[   19.723054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.723191] page_type: f5(slab)
[   19.723251] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.723312] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.723359] page dumped because: kasan: bad access detected
[   19.723396] 
[   19.723581] Memory state around the buggy address:
[   19.723713]  fff00000c4075000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.723787]  fff00000c4075080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   19.723867] >fff00000c4075100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.723942]                    ^
[   19.723987]  fff00000c4075180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.724088]  fff00000c4075200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.724135] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   19.695105] ==================================================================
[   19.695277] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   19.695378] Read of size 4 at addr fff00000c7782f00 by task swapper/1/0
[   19.695433] 
[   19.695489] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.695592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.695651] Hardware name: linux,dummy-virt (DT)
[   19.695731] Call trace:
[   19.695789]  show_stack+0x20/0x38 (C)
[   19.695901]  dump_stack_lvl+0x8c/0xd0
[   19.695969]  print_report+0x118/0x608
[   19.696091]  kasan_report+0xdc/0x128
[   19.696215]  __asan_report_load4_noabort+0x20/0x30
[   19.696285]  rcu_uaf_reclaim+0x64/0x70
[   19.696338]  rcu_core+0x9f4/0x1e20
[   19.696394]  rcu_core_si+0x18/0x30
[   19.696443]  handle_softirqs+0x374/0xb28
[   19.696497]  __do_softirq+0x1c/0x28
[   19.696547]  ____do_softirq+0x18/0x30
[   19.696598]  call_on_irq_stack+0x24/0x30
[   19.696653]  do_softirq_own_stack+0x24/0x38
[   19.696705]  __irq_exit_rcu+0x1fc/0x318
[   19.696755]  irq_exit_rcu+0x1c/0x80
[   19.696805]  el1_interrupt+0x38/0x58
[   19.696859]  el1h_64_irq_handler+0x18/0x28
[   19.696912]  el1h_64_irq+0x6c/0x70
[   19.697026]  arch_local_irq_enable+0x4/0x8 (P)
[   19.697092]  do_idle+0x384/0x4e8
[   19.697186]  cpu_startup_entry+0x68/0x80
[   19.697240]  secondary_start_kernel+0x288/0x340
[   19.697296]  __secondary_switched+0xc0/0xc8
[   19.697363] 
[   19.697398] Allocated by task 198:
[   19.697445]  kasan_save_stack+0x3c/0x68
[   19.697508]  kasan_save_track+0x20/0x40
[   19.697561]  kasan_save_alloc_info+0x40/0x58
[   19.697608]  __kasan_kmalloc+0xd4/0xd8
[   19.697650]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.697697]  rcu_uaf+0xb0/0x2d8
[   19.697734]  kunit_try_run_case+0x170/0x3f0
[   19.697780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.697848]  kthread+0x328/0x630
[   19.697894]  ret_from_fork+0x10/0x20
[   19.697935] 
[   19.698026] Freed by task 0:
[   19.698064]  kasan_save_stack+0x3c/0x68
[   19.698112]  kasan_save_track+0x20/0x40
[   19.698156]  kasan_save_free_info+0x4c/0x78
[   19.698199]  __kasan_slab_free+0x6c/0x98
[   19.698244]  kfree+0x214/0x3c8
[   19.698281]  rcu_uaf_reclaim+0x28/0x70
[   19.698326]  rcu_core+0x9f4/0x1e20
[   19.698364]  rcu_core_si+0x18/0x30
[   19.698414]  handle_softirqs+0x374/0xb28
[   19.698463]  __do_softirq+0x1c/0x28
[   19.698504] 
[   19.698573] Last potentially related work creation:
[   19.698615]  kasan_save_stack+0x3c/0x68
[   19.698665]  kasan_record_aux_stack+0xb4/0xc8
[   19.698711]  __call_rcu_common.constprop.0+0x70/0x8b0
[   19.698814]  call_rcu+0x18/0x30
[   19.698859]  rcu_uaf+0x14c/0x2d8
[   19.698899]  kunit_try_run_case+0x170/0x3f0
[   19.698940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.699002]  kthread+0x328/0x630
[   19.699066]  ret_from_fork+0x10/0x20
[   19.699118] 
[   19.699150] The buggy address belongs to the object at fff00000c7782f00
[   19.699150]  which belongs to the cache kmalloc-32 of size 32
[   19.699219] The buggy address is located 0 bytes inside of
[   19.699219]  freed 32-byte region [fff00000c7782f00, fff00000c7782f20)
[   19.699288] 
[   19.699314] The buggy address belongs to the physical page:
[   19.699353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107782
[   19.699418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.699481] page_type: f5(slab)
[   19.699531] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.699591] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.699638] page dumped because: kasan: bad access detected
[   19.699673] 
[   19.699696] Memory state around the buggy address:
[   19.699735]  fff00000c7782e00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   19.699787]  fff00000c7782e80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.699836] >fff00000c7782f00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   19.699879]                    ^
[   19.699911]  fff00000c7782f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.699959]  fff00000c7783000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.700018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   19.545316] ==================================================================
[   19.545414] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.545499] Read of size 1 at addr fff00000c4065800 by task kunit_try_catch/196
[   19.545557] 
[   19.545604] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.545706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.545739] Hardware name: linux,dummy-virt (DT)
[   19.545777] Call trace:
[   19.545817]  show_stack+0x20/0x38 (C)
[   19.545882]  dump_stack_lvl+0x8c/0xd0
[   19.545940]  print_report+0x118/0x608
[   19.546011]  kasan_report+0xdc/0x128
[   19.546065]  __kasan_check_byte+0x54/0x70
[   19.546116]  ksize+0x30/0x88
[   19.546167]  ksize_uaf+0x168/0x5f8
[   19.546215]  kunit_try_run_case+0x170/0x3f0
[   19.546270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.546328]  kthread+0x328/0x630
[   19.546380]  ret_from_fork+0x10/0x20
[   19.546438] 
[   19.546514] Allocated by task 196:
[   19.546548]  kasan_save_stack+0x3c/0x68
[   19.546601]  kasan_save_track+0x20/0x40
[   19.546643]  kasan_save_alloc_info+0x40/0x58
[   19.546690]  __kasan_kmalloc+0xd4/0xd8
[   19.546731]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.546778]  ksize_uaf+0xb8/0x5f8
[   19.546817]  kunit_try_run_case+0x170/0x3f0
[   19.546861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.546908]  kthread+0x328/0x630
[   19.546947]  ret_from_fork+0x10/0x20
[   19.547003] 
[   19.547026] Freed by task 196:
[   19.547059]  kasan_save_stack+0x3c/0x68
[   19.547104]  kasan_save_track+0x20/0x40
[   19.547167]  kasan_save_free_info+0x4c/0x78
[   19.547289]  __kasan_slab_free+0x6c/0x98
[   19.547399]  kfree+0x214/0x3c8
[   19.547454]  ksize_uaf+0x11c/0x5f8
[   19.547511]  kunit_try_run_case+0x170/0x3f0
[   19.547553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.547602]  kthread+0x328/0x630
[   19.547657]  ret_from_fork+0x10/0x20
[   19.547769] 
[   19.547795] The buggy address belongs to the object at fff00000c4065800
[   19.547795]  which belongs to the cache kmalloc-128 of size 128
[   19.547865] The buggy address is located 0 bytes inside of
[   19.547865]  freed 128-byte region [fff00000c4065800, fff00000c4065880)
[   19.547932] 
[   19.548131] The buggy address belongs to the physical page:
[   19.548170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.548232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.548287] page_type: f5(slab)
[   19.548338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.548395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.548439] page dumped because: kasan: bad access detected
[   19.548476] 
[   19.548496] Memory state around the buggy address:
[   19.548533]  fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.548583]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.548631] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.548672]                    ^
[   19.548705]  fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.548779]  fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.548824] ==================================================================
[   19.554056] ==================================================================
[   19.554130] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.554196] Read of size 1 at addr fff00000c4065878 by task kunit_try_catch/196
[   19.554252] 
[   19.554290] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.554384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.554416] Hardware name: linux,dummy-virt (DT)
[   19.554464] Call trace:
[   19.554494]  show_stack+0x20/0x38 (C)
[   19.554551]  dump_stack_lvl+0x8c/0xd0
[   19.554604]  print_report+0x118/0x608
[   19.554688]  kasan_report+0xdc/0x128
[   19.554751]  __asan_report_load1_noabort+0x20/0x30
[   19.554809]  ksize_uaf+0x544/0x5f8
[   19.554855]  kunit_try_run_case+0x170/0x3f0
[   19.554907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555042]  kthread+0x328/0x630
[   19.555101]  ret_from_fork+0x10/0x20
[   19.555179] 
[   19.555203] Allocated by task 196:
[   19.555234]  kasan_save_stack+0x3c/0x68
[   19.555281]  kasan_save_track+0x20/0x40
[   19.555325]  kasan_save_alloc_info+0x40/0x58
[   19.555369]  __kasan_kmalloc+0xd4/0xd8
[   19.555410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.555454]  ksize_uaf+0xb8/0x5f8
[   19.555492]  kunit_try_run_case+0x170/0x3f0
[   19.555533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555581]  kthread+0x328/0x630
[   19.555619]  ret_from_fork+0x10/0x20
[   19.555660] 
[   19.555680] Freed by task 196:
[   19.555711]  kasan_save_stack+0x3c/0x68
[   19.555753]  kasan_save_track+0x20/0x40
[   19.555793]  kasan_save_free_info+0x4c/0x78
[   19.555838]  __kasan_slab_free+0x6c/0x98
[   19.555879]  kfree+0x214/0x3c8
[   19.555916]  ksize_uaf+0x11c/0x5f8
[   19.555954]  kunit_try_run_case+0x170/0x3f0
[   19.556012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.556062]  kthread+0x328/0x630
[   19.556103]  ret_from_fork+0x10/0x20
[   19.556144] 
[   19.556166] The buggy address belongs to the object at fff00000c4065800
[   19.556166]  which belongs to the cache kmalloc-128 of size 128
[   19.556230] The buggy address is located 120 bytes inside of
[   19.556230]  freed 128-byte region [fff00000c4065800, fff00000c4065880)
[   19.556296] 
[   19.556322] The buggy address belongs to the physical page:
[   19.556355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.556412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.556463] page_type: f5(slab)
[   19.556547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.556608] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.556660] page dumped because: kasan: bad access detected
[   19.556733] 
[   19.556769] Memory state around the buggy address:
[   19.556806]  fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.556907]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.556964] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.557044]                                                                 ^
[   19.557103]  fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557150]  fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557192] ==================================================================
[   19.549914] ==================================================================
[   19.549994] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.550062] Read of size 1 at addr fff00000c4065800 by task kunit_try_catch/196
[   19.550119] 
[   19.550162] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.550262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.550316] Hardware name: linux,dummy-virt (DT)
[   19.550389] Call trace:
[   19.550418]  show_stack+0x20/0x38 (C)
[   19.550524]  dump_stack_lvl+0x8c/0xd0
[   19.550579]  print_report+0x118/0x608
[   19.550633]  kasan_report+0xdc/0x128
[   19.550685]  __asan_report_load1_noabort+0x20/0x30
[   19.550741]  ksize_uaf+0x598/0x5f8
[   19.550790]  kunit_try_run_case+0x170/0x3f0
[   19.550843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.550900]  kthread+0x328/0x630
[   19.550956]  ret_from_fork+0x10/0x20
[   19.551026] 
[   19.551048] Allocated by task 196:
[   19.551080]  kasan_save_stack+0x3c/0x68
[   19.551129]  kasan_save_track+0x20/0x40
[   19.551171]  kasan_save_alloc_info+0x40/0x58
[   19.551216]  __kasan_kmalloc+0xd4/0xd8
[   19.551257]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.551328]  ksize_uaf+0xb8/0x5f8
[   19.551374]  kunit_try_run_case+0x170/0x3f0
[   19.551424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.551471]  kthread+0x328/0x630
[   19.551511]  ret_from_fork+0x10/0x20
[   19.551552] 
[   19.551574] Freed by task 196:
[   19.551606]  kasan_save_stack+0x3c/0x68
[   19.551646]  kasan_save_track+0x20/0x40
[   19.551687]  kasan_save_free_info+0x4c/0x78
[   19.551732]  __kasan_slab_free+0x6c/0x98
[   19.551773]  kfree+0x214/0x3c8
[   19.551839]  ksize_uaf+0x11c/0x5f8
[   19.551881]  kunit_try_run_case+0x170/0x3f0
[   19.551922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.552026]  kthread+0x328/0x630
[   19.552074]  ret_from_fork+0x10/0x20
[   19.552114] 
[   19.552140] The buggy address belongs to the object at fff00000c4065800
[   19.552140]  which belongs to the cache kmalloc-128 of size 128
[   19.552204] The buggy address is located 0 bytes inside of
[   19.552204]  freed 128-byte region [fff00000c4065800, fff00000c4065880)
[   19.552353] 
[   19.552481] The buggy address belongs to the physical page:
[   19.552521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.552582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.552646] page_type: f5(slab)
[   19.552736] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.552797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.552841] page dumped because: kasan: bad access detected
[   19.552876] 
[   19.552897] Memory state around the buggy address:
[   19.552932]  fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.553005]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553057] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.553099]                    ^
[   19.553134]  fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553182]  fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   19.533210] ==================================================================
[   19.533362] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.533437] Read of size 1 at addr fff00000c406577f by task kunit_try_catch/194
[   19.533491] 
[   19.533537] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.533633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.533677] Hardware name: linux,dummy-virt (DT)
[   19.533719] Call trace:
[   19.533748]  show_stack+0x20/0x38 (C)
[   19.533846]  dump_stack_lvl+0x8c/0xd0
[   19.533910]  print_report+0x118/0x608
[   19.533994]  kasan_report+0xdc/0x128
[   19.534105]  __asan_report_load1_noabort+0x20/0x30
[   19.534192]  ksize_unpoisons_memory+0x690/0x740
[   19.534247]  kunit_try_run_case+0x170/0x3f0
[   19.534300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.534356]  kthread+0x328/0x630
[   19.534408]  ret_from_fork+0x10/0x20
[   19.534507] 
[   19.534531] Allocated by task 194:
[   19.534564]  kasan_save_stack+0x3c/0x68
[   19.534684]  kasan_save_track+0x20/0x40
[   19.534729]  kasan_save_alloc_info+0x40/0x58
[   19.534775]  __kasan_kmalloc+0xd4/0xd8
[   19.534815]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.534860]  ksize_unpoisons_memory+0xc0/0x740
[   19.534904]  kunit_try_run_case+0x170/0x3f0
[   19.534944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535005]  kthread+0x328/0x630
[   19.535047]  ret_from_fork+0x10/0x20
[   19.535087] 
[   19.535109] The buggy address belongs to the object at fff00000c4065700
[   19.535109]  which belongs to the cache kmalloc-128 of size 128
[   19.535197] The buggy address is located 12 bytes to the right of
[   19.535197]  allocated 115-byte region [fff00000c4065700, fff00000c4065773)
[   19.535272] 
[   19.535310] The buggy address belongs to the physical page:
[   19.535346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.535406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.535459] page_type: f5(slab)
[   19.535507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.535629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.535765] page dumped because: kasan: bad access detected
[   19.535816] 
[   19.535870] Memory state around the buggy address:
[   19.535911]  fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.535969]  fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536089] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.536135]                                                                 ^
[   19.536183]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536230]  fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536279] ==================================================================
[   19.514890] ==================================================================
[   19.516651] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.517206] Read of size 1 at addr fff00000c4065773 by task kunit_try_catch/194
[   19.517602] 
[   19.517677] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.517816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.518146] Hardware name: linux,dummy-virt (DT)
[   19.518240] Call trace:
[   19.518454]  show_stack+0x20/0x38 (C)
[   19.518664]  dump_stack_lvl+0x8c/0xd0
[   19.518950]  print_report+0x118/0x608
[   19.519048]  kasan_report+0xdc/0x128
[   19.519108]  __asan_report_load1_noabort+0x20/0x30
[   19.519170]  ksize_unpoisons_memory+0x628/0x740
[   19.519722]  kunit_try_run_case+0x170/0x3f0
[   19.519867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.519938]  kthread+0x328/0x630
[   19.520199]  ret_from_fork+0x10/0x20
[   19.520441] 
[   19.520851] Allocated by task 194:
[   19.521172]  kasan_save_stack+0x3c/0x68
[   19.521243]  kasan_save_track+0x20/0x40
[   19.521285]  kasan_save_alloc_info+0x40/0x58
[   19.521343]  __kasan_kmalloc+0xd4/0xd8
[   19.521394]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.521621]  ksize_unpoisons_memory+0xc0/0x740
[   19.521705]  kunit_try_run_case+0x170/0x3f0
[   19.521776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522057]  kthread+0x328/0x630
[   19.522118]  ret_from_fork+0x10/0x20
[   19.522162] 
[   19.522187] The buggy address belongs to the object at fff00000c4065700
[   19.522187]  which belongs to the cache kmalloc-128 of size 128
[   19.522258] The buggy address is located 0 bytes to the right of
[   19.522258]  allocated 115-byte region [fff00000c4065700, fff00000c4065773)
[   19.522404] 
[   19.522436] The buggy address belongs to the physical page:
[   19.522475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.522742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.523006] page_type: f5(slab)
[   19.523225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.523338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.523415] page dumped because: kasan: bad access detected
[   19.523457] 
[   19.523486] Memory state around the buggy address:
[   19.523533]  fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.523585]  fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.523635] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.523679]                                                              ^
[   19.523725]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.523773]  fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.523816] ==================================================================
[   19.526223] ==================================================================
[   19.526310] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.526398] Read of size 1 at addr fff00000c4065778 by task kunit_try_catch/194
[   19.526498] 
[   19.526657] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.526773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.527439] Hardware name: linux,dummy-virt (DT)
[   19.527507] Call trace:
[   19.528045]  show_stack+0x20/0x38 (C)
[   19.528393]  dump_stack_lvl+0x8c/0xd0
[   19.528485]  print_report+0x118/0x608
[   19.528677]  kasan_report+0xdc/0x128
[   19.528862]  __asan_report_load1_noabort+0x20/0x30
[   19.529173]  ksize_unpoisons_memory+0x618/0x740
[   19.529250]  kunit_try_run_case+0x170/0x3f0
[   19.529361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.529515]  kthread+0x328/0x630
[   19.529966]  ret_from_fork+0x10/0x20
[   19.530048] 
[   19.530073] Allocated by task 194:
[   19.530112]  kasan_save_stack+0x3c/0x68
[   19.530166]  kasan_save_track+0x20/0x40
[   19.530235]  kasan_save_alloc_info+0x40/0x58
[   19.530284]  __kasan_kmalloc+0xd4/0xd8
[   19.530328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.530487]  ksize_unpoisons_memory+0xc0/0x740
[   19.530582]  kunit_try_run_case+0x170/0x3f0
[   19.530629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530692]  kthread+0x328/0x630
[   19.530774]  ret_from_fork+0x10/0x20
[   19.530826] 
[   19.530859] The buggy address belongs to the object at fff00000c4065700
[   19.530859]  which belongs to the cache kmalloc-128 of size 128
[   19.531004] The buggy address is located 5 bytes to the right of
[   19.531004]  allocated 115-byte region [fff00000c4065700, fff00000c4065773)
[   19.531227] 
[   19.531317] The buggy address belongs to the physical page:
[   19.531360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.531425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.531505] page_type: f5(slab)
[   19.531561] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.531621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.531667] page dumped because: kasan: bad access detected
[   19.531704] 
[   19.531725] Memory state around the buggy address:
[   19.531765]  fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.531817]  fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.531867] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.531910]                                                                 ^
[   19.532015]  fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.532137]  fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.532207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   19.500740] ==================================================================
[   19.500868] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   19.501037] Free of addr fff00000c4035120 by task kunit_try_catch/192
[   19.501090] 
[   19.501134] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.501232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.501263] Hardware name: linux,dummy-virt (DT)
[   19.501300] Call trace:
[   19.501328]  show_stack+0x20/0x38 (C)
[   19.501388]  dump_stack_lvl+0x8c/0xd0
[   19.501442]  print_report+0x118/0x608
[   19.501493]  kasan_report_invalid_free+0xc0/0xe8
[   19.501547]  check_slab_allocation+0xd4/0x108
[   19.501601]  __kasan_slab_pre_free+0x2c/0x48
[   19.501656]  kfree+0xe8/0x3c8
[   19.501702]  kfree_sensitive+0x3c/0xb0
[   19.501753]  kmalloc_double_kzfree+0x168/0x308
[   19.501814]  kunit_try_run_case+0x170/0x3f0
[   19.501877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501938]  kthread+0x328/0x630
[   19.502419]  ret_from_fork+0x10/0x20
[   19.502758] 
[   19.502796] Allocated by task 192:
[   19.502838]  kasan_save_stack+0x3c/0x68
[   19.502890]  kasan_save_track+0x20/0x40
[   19.502935]  kasan_save_alloc_info+0x40/0x58
[   19.503046]  __kasan_kmalloc+0xd4/0xd8
[   19.503129]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.503177]  kmalloc_double_kzfree+0xb8/0x308
[   19.503220]  kunit_try_run_case+0x170/0x3f0
[   19.503286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503371]  kthread+0x328/0x630
[   19.503412]  ret_from_fork+0x10/0x20
[   19.503454] 
[   19.503478] Freed by task 192:
[   19.503513]  kasan_save_stack+0x3c/0x68
[   19.503554]  kasan_save_track+0x20/0x40
[   19.503596]  kasan_save_free_info+0x4c/0x78
[   19.503639]  __kasan_slab_free+0x6c/0x98
[   19.503679]  kfree+0x214/0x3c8
[   19.503717]  kfree_sensitive+0x80/0xb0
[   19.503756]  kmalloc_double_kzfree+0x11c/0x308
[   19.503798]  kunit_try_run_case+0x170/0x3f0
[   19.503837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503882]  kthread+0x328/0x630
[   19.503919]  ret_from_fork+0x10/0x20
[   19.503958] 
[   19.503991] The buggy address belongs to the object at fff00000c4035120
[   19.503991]  which belongs to the cache kmalloc-16 of size 16
[   19.504075] The buggy address is located 0 bytes inside of
[   19.504075]  16-byte region [fff00000c4035120, fff00000c4035130)
[   19.504197] 
[   19.504259] The buggy address belongs to the physical page:
[   19.504317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   19.504380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.504433] page_type: f5(slab)
[   19.504480] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.504535] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.504580] page dumped because: kasan: bad access detected
[   19.504613] 
[   19.504634] Memory state around the buggy address:
[   19.504671]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.504718]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.504764] >fff00000c4035100: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   19.504804]                                ^
[   19.504848]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.504941]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   19.492069] ==================================================================
[   19.492215] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   19.492356] Read of size 1 at addr fff00000c4035120 by task kunit_try_catch/192
[   19.492421] 
[   19.492493] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.492827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.492891] Hardware name: linux,dummy-virt (DT)
[   19.492938] Call trace:
[   19.492968]  show_stack+0x20/0x38 (C)
[   19.493337]  dump_stack_lvl+0x8c/0xd0
[   19.493456]  print_report+0x118/0x608
[   19.493510]  kasan_report+0xdc/0x128
[   19.493562]  __kasan_check_byte+0x54/0x70
[   19.493612]  kfree_sensitive+0x30/0xb0
[   19.493664]  kmalloc_double_kzfree+0x168/0x308
[   19.493714]  kunit_try_run_case+0x170/0x3f0
[   19.493775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493896]  kthread+0x328/0x630
[   19.494041]  ret_from_fork+0x10/0x20
[   19.494213] 
[   19.494263] Allocated by task 192:
[   19.494308]  kasan_save_stack+0x3c/0x68
[   19.494364]  kasan_save_track+0x20/0x40
[   19.494408]  kasan_save_alloc_info+0x40/0x58
[   19.494469]  __kasan_kmalloc+0xd4/0xd8
[   19.494514]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.494559]  kmalloc_double_kzfree+0xb8/0x308
[   19.494603]  kunit_try_run_case+0x170/0x3f0
[   19.494665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.494716]  kthread+0x328/0x630
[   19.494760]  ret_from_fork+0x10/0x20
[   19.494800] 
[   19.494824] Freed by task 192:
[   19.494853]  kasan_save_stack+0x3c/0x68
[   19.494895]  kasan_save_track+0x20/0x40
[   19.494937]  kasan_save_free_info+0x4c/0x78
[   19.494990]  __kasan_slab_free+0x6c/0x98
[   19.495037]  kfree+0x214/0x3c8
[   19.495073]  kfree_sensitive+0x80/0xb0
[   19.495115]  kmalloc_double_kzfree+0x11c/0x308
[   19.495159]  kunit_try_run_case+0x170/0x3f0
[   19.495943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.496067]  kthread+0x328/0x630
[   19.496127]  ret_from_fork+0x10/0x20
[   19.496171] 
[   19.496200] The buggy address belongs to the object at fff00000c4035120
[   19.496200]  which belongs to the cache kmalloc-16 of size 16
[   19.496269] The buggy address is located 0 bytes inside of
[   19.496269]  freed 16-byte region [fff00000c4035120, fff00000c4035130)
[   19.496334] 
[   19.496360] The buggy address belongs to the physical page:
[   19.496399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   19.496459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.496518] page_type: f5(slab)
[   19.496989] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.497422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.497661] page dumped because: kasan: bad access detected
[   19.497706] 
[   19.497728] Memory state around the buggy address:
[   19.497768]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.497839]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.497891] >fff00000c4035100: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   19.497952]                                ^
[   19.498823]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499117]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   19.471102] ==================================================================
[   19.471193] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   19.471277] Read of size 1 at addr fff00000c77800a8 by task kunit_try_catch/188
[   19.471335] 
[   19.471385] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.471483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.471516] Hardware name: linux,dummy-virt (DT)
[   19.471555] Call trace:
[   19.471583]  show_stack+0x20/0x38 (C)
[   19.471643]  dump_stack_lvl+0x8c/0xd0
[   19.471698]  print_report+0x118/0x608
[   19.471750]  kasan_report+0xdc/0x128
[   19.471799]  __asan_report_load1_noabort+0x20/0x30
[   19.471856]  kmalloc_uaf2+0x3f4/0x468
[   19.471909]  kunit_try_run_case+0x170/0x3f0
[   19.471961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.472037]  kthread+0x328/0x630
[   19.472090]  ret_from_fork+0x10/0x20
[   19.472147] 
[   19.472167] Allocated by task 188:
[   19.472200]  kasan_save_stack+0x3c/0x68
[   19.472249]  kasan_save_track+0x20/0x40
[   19.472305]  kasan_save_alloc_info+0x40/0x58
[   19.472349]  __kasan_kmalloc+0xd4/0xd8
[   19.472388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.472431]  kmalloc_uaf2+0xc4/0x468
[   19.472473]  kunit_try_run_case+0x170/0x3f0
[   19.472514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.472560]  kthread+0x328/0x630
[   19.472598]  ret_from_fork+0x10/0x20
[   19.472638] 
[   19.472659] Freed by task 188:
[   19.472688]  kasan_save_stack+0x3c/0x68
[   19.472726]  kasan_save_track+0x20/0x40
[   19.472762]  kasan_save_free_info+0x4c/0x78
[   19.472803]  __kasan_slab_free+0x6c/0x98
[   19.472840]  kfree+0x214/0x3c8
[   19.472874]  kmalloc_uaf2+0x134/0x468
[   19.472911]  kunit_try_run_case+0x170/0x3f0
[   19.472949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.473006]  kthread+0x328/0x630
[   19.473049]  ret_from_fork+0x10/0x20
[   19.473088] 
[   19.473111] The buggy address belongs to the object at fff00000c7780080
[   19.473111]  which belongs to the cache kmalloc-64 of size 64
[   19.473191] The buggy address is located 40 bytes inside of
[   19.473191]  freed 64-byte region [fff00000c7780080, fff00000c77800c0)
[   19.473298] 
[   19.473323] The buggy address belongs to the physical page:
[   19.473359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107780
[   19.473421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.473478] page_type: f5(slab)
[   19.473527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.473587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.473636] page dumped because: kasan: bad access detected
[   19.473672] 
[   19.473694] Memory state around the buggy address:
[   19.473754]  fff00000c777ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.473813]  fff00000c7780000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.473962] >fff00000c7780080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.474021]                                   ^
[   19.474060]  fff00000c7780100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   19.474109]  fff00000c7780180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474152] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   19.453194] ==================================================================
[   19.453286] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   19.453374] Write of size 33 at addr fff00000c7785f00 by task kunit_try_catch/186
[   19.453433] 
[   19.453482] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.453580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.454100] Hardware name: linux,dummy-virt (DT)
[   19.454617] Call trace:
[   19.454677]  show_stack+0x20/0x38 (C)
[   19.454922]  dump_stack_lvl+0x8c/0xd0
[   19.455172]  print_report+0x118/0x608
[   19.455226]  kasan_report+0xdc/0x128
[   19.455276]  kasan_check_range+0x100/0x1a8
[   19.455593]  __asan_memset+0x34/0x78
[   19.455674]  kmalloc_uaf_memset+0x170/0x310
[   19.455831]  kunit_try_run_case+0x170/0x3f0
[   19.455891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.456201]  kthread+0x328/0x630
[   19.456453]  ret_from_fork+0x10/0x20
[   19.456529] 
[   19.456553] Allocated by task 186:
[   19.456649]  kasan_save_stack+0x3c/0x68
[   19.456700]  kasan_save_track+0x20/0x40
[   19.456808]  kasan_save_alloc_info+0x40/0x58
[   19.457082]  __kasan_kmalloc+0xd4/0xd8
[   19.457216]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.457267]  kmalloc_uaf_memset+0xb8/0x310
[   19.457394]  kunit_try_run_case+0x170/0x3f0
[   19.457456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457745]  kthread+0x328/0x630
[   19.457823]  ret_from_fork+0x10/0x20
[   19.457994] 
[   19.458065] Freed by task 186:
[   19.458206]  kasan_save_stack+0x3c/0x68
[   19.458313]  kasan_save_track+0x20/0x40
[   19.458360]  kasan_save_free_info+0x4c/0x78
[   19.458404]  __kasan_slab_free+0x6c/0x98
[   19.458709]  kfree+0x214/0x3c8
[   19.458869]  kmalloc_uaf_memset+0x11c/0x310
[   19.458942]  kunit_try_run_case+0x170/0x3f0
[   19.459025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.459223]  kthread+0x328/0x630
[   19.459274]  ret_from_fork+0x10/0x20
[   19.459379] 
[   19.459410] The buggy address belongs to the object at fff00000c7785f00
[   19.459410]  which belongs to the cache kmalloc-64 of size 64
[   19.459510] The buggy address is located 0 bytes inside of
[   19.459510]  freed 64-byte region [fff00000c7785f00, fff00000c7785f40)
[   19.459805] 
[   19.459855] The buggy address belongs to the physical page:
[   19.459905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785
[   19.459981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.460045] page_type: f5(slab)
[   19.460099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.460433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.460694] page dumped because: kasan: bad access detected
[   19.460752] 
[   19.460775] Memory state around the buggy address:
[   19.460826]  fff00000c7785e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.461100]  fff00000c7785e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.461156] >fff00000c7785f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.461204]                    ^
[   19.461424]  fff00000c7785f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.461476]  fff00000c7786000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.461520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   19.431588] ==================================================================
[   19.432242] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   19.432350] Read of size 1 at addr fff00000c4035108 by task kunit_try_catch/184
[   19.432447] 
[   19.432505] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.432608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.432735] Hardware name: linux,dummy-virt (DT)
[   19.432928] Call trace:
[   19.433088]  show_stack+0x20/0x38 (C)
[   19.433239]  dump_stack_lvl+0x8c/0xd0
[   19.433450]  print_report+0x118/0x608
[   19.433517]  kasan_report+0xdc/0x128
[   19.433697]  __asan_report_load1_noabort+0x20/0x30
[   19.433770]  kmalloc_uaf+0x300/0x338
[   19.434156]  kunit_try_run_case+0x170/0x3f0
[   19.434240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.434349]  kthread+0x328/0x630
[   19.435230]  ret_from_fork+0x10/0x20
[   19.435381] 
[   19.435506] Allocated by task 184:
[   19.435609]  kasan_save_stack+0x3c/0x68
[   19.435665]  kasan_save_track+0x20/0x40
[   19.435706]  kasan_save_alloc_info+0x40/0x58
[   19.435881]  __kasan_kmalloc+0xd4/0xd8
[   19.436245]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.436359]  kmalloc_uaf+0xb8/0x338
[   19.436400]  kunit_try_run_case+0x170/0x3f0
[   19.436496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.436543]  kthread+0x328/0x630
[   19.436795]  ret_from_fork+0x10/0x20
[   19.436935] 
[   19.437046] Freed by task 184:
[   19.437353]  kasan_save_stack+0x3c/0x68
[   19.437504]  kasan_save_track+0x20/0x40
[   19.437624]  kasan_save_free_info+0x4c/0x78
[   19.437671]  __kasan_slab_free+0x6c/0x98
[   19.437710]  kfree+0x214/0x3c8
[   19.438499]  kmalloc_uaf+0x11c/0x338
[   19.438894]  kunit_try_run_case+0x170/0x3f0
[   19.438946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.439107]  kthread+0x328/0x630
[   19.439243]  ret_from_fork+0x10/0x20
[   19.439425] 
[   19.439481] The buggy address belongs to the object at fff00000c4035100
[   19.439481]  which belongs to the cache kmalloc-16 of size 16
[   19.439747] The buggy address is located 8 bytes inside of
[   19.439747]  freed 16-byte region [fff00000c4035100, fff00000c4035110)
[   19.439823] 
[   19.439851] The buggy address belongs to the physical page:
[   19.439892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   19.439955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.440025] page_type: f5(slab)
[   19.440125] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.440218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.440261] page dumped because: kasan: bad access detected
[   19.440296] 
[   19.440316] Memory state around the buggy address:
[   19.440351]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.440406]  fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.440554] >fff00000c4035100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440657]                       ^
[   19.440817]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441098]  fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   19.412984] ==================================================================
[   19.413102] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.413194] Read of size 64 at addr fff00000c7785c04 by task kunit_try_catch/182
[   19.413252] 
[   19.413304] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.413406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.414138] Hardware name: linux,dummy-virt (DT)
[   19.414740] Call trace:
[   19.415044]  show_stack+0x20/0x38 (C)
[   19.415160]  dump_stack_lvl+0x8c/0xd0
[   19.415229]  print_report+0x118/0x608
[   19.415279]  kasan_report+0xdc/0x128
[   19.415813]  kasan_check_range+0x100/0x1a8
[   19.416197]  __asan_memmove+0x3c/0x98
[   19.416260]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.416413]  kunit_try_run_case+0x170/0x3f0
[   19.416535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416880]  kthread+0x328/0x630
[   19.417070]  ret_from_fork+0x10/0x20
[   19.417325] 
[   19.417376] Allocated by task 182:
[   19.417458]  kasan_save_stack+0x3c/0x68
[   19.417516]  kasan_save_track+0x20/0x40
[   19.417742]  kasan_save_alloc_info+0x40/0x58
[   19.417791]  __kasan_kmalloc+0xd4/0xd8
[   19.418078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.418172]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   19.418220]  kunit_try_run_case+0x170/0x3f0
[   19.418263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.418309]  kthread+0x328/0x630
[   19.418350]  ret_from_fork+0x10/0x20
[   19.418390] 
[   19.418416] The buggy address belongs to the object at fff00000c7785c00
[   19.418416]  which belongs to the cache kmalloc-64 of size 64
[   19.418482] The buggy address is located 4 bytes inside of
[   19.418482]  allocated 64-byte region [fff00000c7785c00, fff00000c7785c40)
[   19.418559] 
[   19.418717] The buggy address belongs to the physical page:
[   19.418865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785
[   19.419156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.419229] page_type: f5(slab)
[   19.419477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.419734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.419800] page dumped because: kasan: bad access detected
[   19.419852] 
[   19.420037] Memory state around the buggy address:
[   19.420208]  fff00000c7785b00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.420535]  fff00000c7785b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420654] >fff00000c7785c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.420727]                                            ^
[   19.420810]  fff00000c7785c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420903]  fff00000c7785d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   19.395580] ==================================================================
[   19.395683] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   19.396040] Read of size 18446744073709551614 at addr fff00000c7785a04 by task kunit_try_catch/180
[   19.396265] 
[   19.396429] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.397182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.397246] Hardware name: linux,dummy-virt (DT)
[   19.397315] Call trace:
[   19.397345]  show_stack+0x20/0x38 (C)
[   19.397548]  dump_stack_lvl+0x8c/0xd0
[   19.397672]  print_report+0x118/0x608
[   19.397782]  kasan_report+0xdc/0x128
[   19.397926]  kasan_check_range+0x100/0x1a8
[   19.398044]  __asan_memmove+0x3c/0x98
[   19.398111]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.398221]  kunit_try_run_case+0x170/0x3f0
[   19.398321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.398408]  kthread+0x328/0x630
[   19.398526]  ret_from_fork+0x10/0x20
[   19.398591] 
[   19.398614] Allocated by task 180:
[   19.398652]  kasan_save_stack+0x3c/0x68
[   19.398726]  kasan_save_track+0x20/0x40
[   19.398789]  kasan_save_alloc_info+0x40/0x58
[   19.398870]  __kasan_kmalloc+0xd4/0xd8
[   19.398917]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.399094]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   19.399158]  kunit_try_run_case+0x170/0x3f0
[   19.399203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.399271]  kthread+0x328/0x630
[   19.399312]  ret_from_fork+0x10/0x20
[   19.399356] 
[   19.399382] The buggy address belongs to the object at fff00000c7785a00
[   19.399382]  which belongs to the cache kmalloc-64 of size 64
[   19.399649] The buggy address is located 4 bytes inside of
[   19.399649]  64-byte region [fff00000c7785a00, fff00000c7785a40)
[   19.399772] 
[   19.399815] The buggy address belongs to the physical page:
[   19.400012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785
[   19.400270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.400560] page_type: f5(slab)
[   19.400665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.400729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.400775] page dumped because: kasan: bad access detected
[   19.401053] 
[   19.401097] Memory state around the buggy address:
[   19.401142]  fff00000c7785900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   19.401418]  fff00000c7785980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.401610] >fff00000c7785a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.401656]                    ^
[   19.401690]  fff00000c7785a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402170]  fff00000c7785b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   19.377319] ==================================================================
[   19.377451] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   19.377540] Write of size 16 at addr fff00000c4065669 by task kunit_try_catch/178
[   19.377597] 
[   19.377642] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.377741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377771] Hardware name: linux,dummy-virt (DT)
[   19.377836] Call trace:
[   19.377878]  show_stack+0x20/0x38 (C)
[   19.377938]  dump_stack_lvl+0x8c/0xd0
[   19.378007]  print_report+0x118/0x608
[   19.378089]  kasan_report+0xdc/0x128
[   19.378267]  kasan_check_range+0x100/0x1a8
[   19.378352]  __asan_memset+0x34/0x78
[   19.378412]  kmalloc_oob_memset_16+0x150/0x2f8
[   19.378570]  kunit_try_run_case+0x170/0x3f0
[   19.378667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378727]  kthread+0x328/0x630
[   19.378779]  ret_from_fork+0x10/0x20
[   19.378835] 
[   19.378857] Allocated by task 178:
[   19.379035]  kasan_save_stack+0x3c/0x68
[   19.379086]  kasan_save_track+0x20/0x40
[   19.379128]  kasan_save_alloc_info+0x40/0x58
[   19.379173]  __kasan_kmalloc+0xd4/0xd8
[   19.379215]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.379259]  kmalloc_oob_memset_16+0xb0/0x2f8
[   19.379435]  kunit_try_run_case+0x170/0x3f0
[   19.379593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.379756]  kthread+0x328/0x630
[   19.379811]  ret_from_fork+0x10/0x20
[   19.379854] 
[   19.379900] The buggy address belongs to the object at fff00000c4065600
[   19.379900]  which belongs to the cache kmalloc-128 of size 128
[   19.379966] The buggy address is located 105 bytes inside of
[   19.379966]  allocated 120-byte region [fff00000c4065600, fff00000c4065678)
[   19.380045] 
[   19.380209] The buggy address belongs to the physical page:
[   19.380277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.380339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.380405] page_type: f5(slab)
[   19.380461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.380516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.380560] page dumped because: kasan: bad access detected
[   19.380594] 
[   19.380614] Memory state around the buggy address:
[   19.380652]  fff00000c4065500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.380699]  fff00000c4065580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.380762] >fff00000c4065600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.380803]                                                                 ^
[   19.380848]  fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.380893]  fff00000c4065700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.380947] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   19.364469] ==================================================================
[   19.364573] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   19.364660] Write of size 8 at addr fff00000c4065571 by task kunit_try_catch/176
[   19.364718] 
[   19.364765] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.364861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.364890] Hardware name: linux,dummy-virt (DT)
[   19.364925] Call trace:
[   19.364953]  show_stack+0x20/0x38 (C)
[   19.365445]  dump_stack_lvl+0x8c/0xd0
[   19.365658]  print_report+0x118/0x608
[   19.365797]  kasan_report+0xdc/0x128
[   19.365865]  kasan_check_range+0x100/0x1a8
[   19.366035]  __asan_memset+0x34/0x78
[   19.366150]  kmalloc_oob_memset_8+0x150/0x2f8
[   19.366248]  kunit_try_run_case+0x170/0x3f0
[   19.366352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366477]  kthread+0x328/0x630
[   19.366535]  ret_from_fork+0x10/0x20
[   19.366623] 
[   19.366697] Allocated by task 176:
[   19.366733]  kasan_save_stack+0x3c/0x68
[   19.366784]  kasan_save_track+0x20/0x40
[   19.366827]  kasan_save_alloc_info+0x40/0x58
[   19.366872]  __kasan_kmalloc+0xd4/0xd8
[   19.366915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.367056]  kmalloc_oob_memset_8+0xb0/0x2f8
[   19.367274]  kunit_try_run_case+0x170/0x3f0
[   19.367323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.367380]  kthread+0x328/0x630
[   19.367441]  ret_from_fork+0x10/0x20
[   19.367481] 
[   19.367504] The buggy address belongs to the object at fff00000c4065500
[   19.367504]  which belongs to the cache kmalloc-128 of size 128
[   19.367668] The buggy address is located 113 bytes inside of
[   19.367668]  allocated 120-byte region [fff00000c4065500, fff00000c4065578)
[   19.367754] 
[   19.367812] The buggy address belongs to the physical page:
[   19.367848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.367953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.368145] page_type: f5(slab)
[   19.368268] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.368330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.368375] page dumped because: kasan: bad access detected
[   19.368410] 
[   19.368578] Memory state around the buggy address:
[   19.368645]  fff00000c4065400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.368705]  fff00000c4065480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368755] >fff00000c4065500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.368796]                                                                 ^
[   19.368841]  fff00000c4065580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368887]  fff00000c4065600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   19.350282] ==================================================================
[   19.350368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   19.350451] Write of size 4 at addr fff00000c4065475 by task kunit_try_catch/174
[   19.350525] 
[   19.350573] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.350672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.350701] Hardware name: linux,dummy-virt (DT)
[   19.350739] Call trace:
[   19.350768]  show_stack+0x20/0x38 (C)
[   19.351248]  dump_stack_lvl+0x8c/0xd0
[   19.351310]  print_report+0x118/0x608
[   19.351364]  kasan_report+0xdc/0x128
[   19.352132]  kasan_check_range+0x100/0x1a8
[   19.352655]  __asan_memset+0x34/0x78
[   19.352787]  kmalloc_oob_memset_4+0x150/0x300
[   19.353021]  kunit_try_run_case+0x170/0x3f0
[   19.353274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353338]  kthread+0x328/0x630
[   19.353393]  ret_from_fork+0x10/0x20
[   19.353742] 
[   19.353827] Allocated by task 174:
[   19.354031]  kasan_save_stack+0x3c/0x68
[   19.354092]  kasan_save_track+0x20/0x40
[   19.354265]  kasan_save_alloc_info+0x40/0x58
[   19.354494]  __kasan_kmalloc+0xd4/0xd8
[   19.354543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.354590]  kmalloc_oob_memset_4+0xb0/0x300
[   19.354636]  kunit_try_run_case+0x170/0x3f0
[   19.354802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.355013]  kthread+0x328/0x630
[   19.355069]  ret_from_fork+0x10/0x20
[   19.355341] 
[   19.355407] The buggy address belongs to the object at fff00000c4065400
[   19.355407]  which belongs to the cache kmalloc-128 of size 128
[   19.355493] The buggy address is located 117 bytes inside of
[   19.355493]  allocated 120-byte region [fff00000c4065400, fff00000c4065478)
[   19.355559] 
[   19.355585] The buggy address belongs to the physical page:
[   19.355621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.355680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.355736] page_type: f5(slab)
[   19.355786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.355841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.355885] page dumped because: kasan: bad access detected
[   19.355919] 
[   19.355940] Memory state around the buggy address:
[   19.355997]  fff00000c4065300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.356048]  fff00000c4065380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356093] >fff00000c4065400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.356133]                                                                 ^
[   19.356176]  fff00000c4065480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356220]  fff00000c4065500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.084050] ==================================================================
[   19.084189] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   19.084293] Read of size 1 at addr fff00000c7820000 by task kunit_try_catch/154
[   19.084428] 
[   19.084484] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.084581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.084881] Hardware name: linux,dummy-virt (DT)
[   19.084960] Call trace:
[   19.085239]  show_stack+0x20/0x38 (C)
[   19.085310]  dump_stack_lvl+0x8c/0xd0
[   19.085364]  print_report+0x118/0x608
[   19.085416]  kasan_report+0xdc/0x128
[   19.085466]  __asan_report_load1_noabort+0x20/0x30
[   19.085522]  page_alloc_uaf+0x328/0x350
[   19.085571]  kunit_try_run_case+0x170/0x3f0
[   19.085623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.085680]  kthread+0x328/0x630
[   19.085733]  ret_from_fork+0x10/0x20
[   19.085790] 
[   19.085836] The buggy address belongs to the physical page:
[   19.085875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820
[   19.085937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.086007] page_type: f0(buddy)
[   19.086061] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   19.086118] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   19.086162] page dumped because: kasan: bad access detected
[   19.086196] 
[   19.086216] Memory state around the buggy address:
[   19.086264]  fff00000c781ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.086371]  fff00000c781ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.086419] >fff00000c7820000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.086459]                    ^
[   19.086492]  fff00000c7820080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.086538]  fff00000c7820100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.086578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   19.333067] ==================================================================
[   19.333161] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   19.333253] Write of size 2 at addr fff00000c4065377 by task kunit_try_catch/172
[   19.333308] 
[   19.333357] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.333456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.333487] Hardware name: linux,dummy-virt (DT)
[   19.334019] Call trace:
[   19.334077]  show_stack+0x20/0x38 (C)
[   19.334148]  dump_stack_lvl+0x8c/0xd0
[   19.334219]  print_report+0x118/0x608
[   19.334701]  kasan_report+0xdc/0x128
[   19.334967]  kasan_check_range+0x100/0x1a8
[   19.335042]  __asan_memset+0x34/0x78
[   19.335347]  kmalloc_oob_memset_2+0x150/0x2f8
[   19.335474]  kunit_try_run_case+0x170/0x3f0
[   19.335541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.335863]  kthread+0x328/0x630
[   19.335943]  ret_from_fork+0x10/0x20
[   19.336290] 
[   19.336369] Allocated by task 172:
[   19.336410]  kasan_save_stack+0x3c/0x68
[   19.336479]  kasan_save_track+0x20/0x40
[   19.336761]  kasan_save_alloc_info+0x40/0x58
[   19.336845]  __kasan_kmalloc+0xd4/0xd8
[   19.336908]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.336952]  kmalloc_oob_memset_2+0xb0/0x2f8
[   19.337011]  kunit_try_run_case+0x170/0x3f0
[   19.337222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.337594]  kthread+0x328/0x630
[   19.337648]  ret_from_fork+0x10/0x20
[   19.337691] 
[   19.337954] The buggy address belongs to the object at fff00000c4065300
[   19.337954]  which belongs to the cache kmalloc-128 of size 128
[   19.338068] The buggy address is located 119 bytes inside of
[   19.338068]  allocated 120-byte region [fff00000c4065300, fff00000c4065378)
[   19.338139] 
[   19.338415] The buggy address belongs to the physical page:
[   19.338547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.338619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.338870] page_type: f5(slab)
[   19.339063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.339127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.339174] page dumped because: kasan: bad access detected
[   19.339211] 
[   19.339232] Memory state around the buggy address:
[   19.339408]  fff00000c4065200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.339483]  fff00000c4065280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.339534] >fff00000c4065300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.339760]                                                                 ^
[   19.339826]  fff00000c4065380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.340119]  fff00000c4065400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.340259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   19.311877] ==================================================================
[   19.312013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   19.312125] Write of size 128 at addr fff00000c4065200 by task kunit_try_catch/170
[   19.312188] 
[   19.312253] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.312627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.312783] Hardware name: linux,dummy-virt (DT)
[   19.312834] Call trace:
[   19.313034]  show_stack+0x20/0x38 (C)
[   19.313108]  dump_stack_lvl+0x8c/0xd0
[   19.313169]  print_report+0x118/0x608
[   19.313226]  kasan_report+0xdc/0x128
[   19.313275]  kasan_check_range+0x100/0x1a8
[   19.313730]  __asan_memset+0x34/0x78
[   19.313857]  kmalloc_oob_in_memset+0x144/0x2d0
[   19.313933]  kunit_try_run_case+0x170/0x3f0
[   19.314008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.314071]  kthread+0x328/0x630
[   19.314288]  ret_from_fork+0x10/0x20
[   19.314363] 
[   19.314387] Allocated by task 170:
[   19.314742]  kasan_save_stack+0x3c/0x68
[   19.314826]  kasan_save_track+0x20/0x40
[   19.314907]  kasan_save_alloc_info+0x40/0x58
[   19.314983]  __kasan_kmalloc+0xd4/0xd8
[   19.315117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.315211]  kmalloc_oob_in_memset+0xb0/0x2d0
[   19.315289]  kunit_try_run_case+0x170/0x3f0
[   19.315591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.315831]  kthread+0x328/0x630
[   19.315946]  ret_from_fork+0x10/0x20
[   19.316093] 
[   19.316170] The buggy address belongs to the object at fff00000c4065200
[   19.316170]  which belongs to the cache kmalloc-128 of size 128
[   19.316437] The buggy address is located 0 bytes inside of
[   19.316437]  allocated 120-byte region [fff00000c4065200, fff00000c4065278)
[   19.316642] 
[   19.316687] The buggy address belongs to the physical page:
[   19.316780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   19.316863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.316921] page_type: f5(slab)
[   19.317157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.317258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.317414] page dumped because: kasan: bad access detected
[   19.317476] 
[   19.317554] Memory state around the buggy address:
[   19.317597]  fff00000c4065100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.317649]  fff00000c4065180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.317981] >fff00000c4065200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.318240]                                                                 ^
[   19.318315]  fff00000c4065280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.318366]  fff00000c4065300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.318495] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   19.285023] ==================================================================
[   19.285120] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   19.285212] Read of size 16 at addr fff00000c40350e0 by task kunit_try_catch/168
[   19.285268] 
[   19.285316] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.285412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.286722] Hardware name: linux,dummy-virt (DT)
[   19.286929] Call trace:
[   19.286989]  show_stack+0x20/0x38 (C)
[   19.287063]  dump_stack_lvl+0x8c/0xd0
[   19.287189]  print_report+0x118/0x608
[   19.287370]  kasan_report+0xdc/0x128
[   19.287486]  __asan_report_load16_noabort+0x20/0x30
[   19.287875]  kmalloc_uaf_16+0x3bc/0x438
[   19.287950]  kunit_try_run_case+0x170/0x3f0
[   19.288032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.288093]  kthread+0x328/0x630
[   19.288371]  ret_from_fork+0x10/0x20
[   19.288638] 
[   19.288667] Allocated by task 168:
[   19.288732]  kasan_save_stack+0x3c/0x68
[   19.288930]  kasan_save_track+0x20/0x40
[   19.288993]  kasan_save_alloc_info+0x40/0x58
[   19.289042]  __kasan_kmalloc+0xd4/0xd8
[   19.289084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.289136]  kmalloc_uaf_16+0x140/0x438
[   19.289373]  kunit_try_run_case+0x170/0x3f0
[   19.289451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.289690]  kthread+0x328/0x630
[   19.290124]  ret_from_fork+0x10/0x20
[   19.290209] 
[   19.290463] Freed by task 168:
[   19.290665]  kasan_save_stack+0x3c/0x68
[   19.291002]  kasan_save_track+0x20/0x40
[   19.291344]  kasan_save_free_info+0x4c/0x78
[   19.291415]  __kasan_slab_free+0x6c/0x98
[   19.291809]  kfree+0x214/0x3c8
[   19.291928]  kmalloc_uaf_16+0x190/0x438
[   19.291982]  kunit_try_run_case+0x170/0x3f0
[   19.292025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.292746]  kthread+0x328/0x630
[   19.292809]  ret_from_fork+0x10/0x20
[   19.293017] 
[   19.293149] The buggy address belongs to the object at fff00000c40350e0
[   19.293149]  which belongs to the cache kmalloc-16 of size 16
[   19.293304] The buggy address is located 0 bytes inside of
[   19.293304]  freed 16-byte region [fff00000c40350e0, fff00000c40350f0)
[   19.293372] 
[   19.293397] The buggy address belongs to the physical page:
[   19.293440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   19.293513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.293570] page_type: f5(slab)
[   19.293621] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.293677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.293721] page dumped because: kasan: bad access detected
[   19.293755] 
[   19.293774] Memory state around the buggy address:
[   19.293819]  fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.293872]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.293919] >fff00000c4035080: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   19.293980]                                                        ^
[   19.294070]  fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.294113]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.294186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   19.266612] ==================================================================
[   19.267007] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   19.267129] Write of size 16 at addr fff00000c4035080 by task kunit_try_catch/166
[   19.267190] 
[   19.267785] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.267891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.267922] Hardware name: linux,dummy-virt (DT)
[   19.267960] Call trace:
[   19.268002]  show_stack+0x20/0x38 (C)
[   19.268065]  dump_stack_lvl+0x8c/0xd0
[   19.268119]  print_report+0x118/0x608
[   19.268367]  kasan_report+0xdc/0x128
[   19.268423]  __asan_report_store16_noabort+0x20/0x30
[   19.268481]  kmalloc_oob_16+0x3a0/0x3f8
[   19.268634]  kunit_try_run_case+0x170/0x3f0
[   19.268705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.268775]  kthread+0x328/0x630
[   19.268832]  ret_from_fork+0x10/0x20
[   19.268889] 
[   19.269137] Allocated by task 166:
[   19.269180]  kasan_save_stack+0x3c/0x68
[   19.269234]  kasan_save_track+0x20/0x40
[   19.269439]  kasan_save_alloc_info+0x40/0x58
[   19.269495]  __kasan_kmalloc+0xd4/0xd8
[   19.269546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.269648]  kmalloc_oob_16+0xb4/0x3f8
[   19.269728]  kunit_try_run_case+0x170/0x3f0
[   19.269776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.269893]  kthread+0x328/0x630
[   19.270079]  ret_from_fork+0x10/0x20
[   19.270274] 
[   19.270343] The buggy address belongs to the object at fff00000c4035080
[   19.270343]  which belongs to the cache kmalloc-16 of size 16
[   19.270418] The buggy address is located 0 bytes inside of
[   19.270418]  allocated 13-byte region [fff00000c4035080, fff00000c403508d)
[   19.270513] 
[   19.270569] The buggy address belongs to the physical page:
[   19.270642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   19.270739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270807] page_type: f5(slab)
[   19.270909] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.271031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.271080] page dumped because: kasan: bad access detected
[   19.271116] 
[   19.271136] Memory state around the buggy address:
[   19.271176]  fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271225]  fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.271272] >fff00000c4035080: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.271319]                       ^
[   19.271393]  fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271494]  fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271538] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   19.247523] ==================================================================
[   19.247602] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   19.247687] Read of size 1 at addr fff00000c5b13e00 by task kunit_try_catch/164
[   19.247743] 
[   19.247788] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.248090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.248137] Hardware name: linux,dummy-virt (DT)
[   19.248207] Call trace:
[   19.248785]  show_stack+0x20/0x38 (C)
[   19.248871]  dump_stack_lvl+0x8c/0xd0
[   19.248927]  print_report+0x118/0x608
[   19.248994]  kasan_report+0xdc/0x128
[   19.249252]  __asan_report_load1_noabort+0x20/0x30
[   19.249497]  krealloc_uaf+0x4c8/0x520
[   19.249791]  kunit_try_run_case+0x170/0x3f0
[   19.249881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.250122]  kthread+0x328/0x630
[   19.250192]  ret_from_fork+0x10/0x20
[   19.250252] 
[   19.250275] Allocated by task 164:
[   19.250473]  kasan_save_stack+0x3c/0x68
[   19.250711]  kasan_save_track+0x20/0x40
[   19.250847]  kasan_save_alloc_info+0x40/0x58
[   19.251041]  __kasan_kmalloc+0xd4/0xd8
[   19.251095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.251247]  krealloc_uaf+0xc8/0x520
[   19.251358]  kunit_try_run_case+0x170/0x3f0
[   19.251446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.251566]  kthread+0x328/0x630
[   19.251833]  ret_from_fork+0x10/0x20
[   19.252018] 
[   19.252055] Freed by task 164:
[   19.252249]  kasan_save_stack+0x3c/0x68
[   19.252366]  kasan_save_track+0x20/0x40
[   19.252410]  kasan_save_free_info+0x4c/0x78
[   19.252481]  __kasan_slab_free+0x6c/0x98
[   19.252538]  kfree+0x214/0x3c8
[   19.252603]  krealloc_uaf+0x12c/0x520
[   19.252919]  kunit_try_run_case+0x170/0x3f0
[   19.253076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.253132]  kthread+0x328/0x630
[   19.253195]  ret_from_fork+0x10/0x20
[   19.253245] 
[   19.253270] The buggy address belongs to the object at fff00000c5b13e00
[   19.253270]  which belongs to the cache kmalloc-256 of size 256
[   19.253484] The buggy address is located 0 bytes inside of
[   19.253484]  freed 256-byte region [fff00000c5b13e00, fff00000c5b13f00)
[   19.253695] 
[   19.253741] The buggy address belongs to the physical page:
[   19.253781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.253870] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.253926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.254352] page_type: f5(slab)
[   19.254535] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.254658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.255028] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.255105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.255162] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.255217] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.255258] page dumped because: kasan: bad access detected
[   19.255292] 
[   19.255311] Memory state around the buggy address:
[   19.255348]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255394]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255438] >fff00000c5b13e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.255476]                    ^
[   19.255509]  fff00000c5b13e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.255553]  fff00000c5b13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255593] ==================================================================
[   19.237328] ==================================================================
[   19.237693] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   19.237798] Read of size 1 at addr fff00000c5b13e00 by task kunit_try_catch/164
[   19.237877] 
[   19.237927] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.238043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.238077] Hardware name: linux,dummy-virt (DT)
[   19.238114] Call trace:
[   19.238654]  show_stack+0x20/0x38 (C)
[   19.238942]  dump_stack_lvl+0x8c/0xd0
[   19.239200]  print_report+0x118/0x608
[   19.239269]  kasan_report+0xdc/0x128
[   19.239462]  __kasan_check_byte+0x54/0x70
[   19.239519]  krealloc_noprof+0x44/0x360
[   19.240022]  krealloc_uaf+0x180/0x520
[   19.240130]  kunit_try_run_case+0x170/0x3f0
[   19.240341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240570]  kthread+0x328/0x630
[   19.240695]  ret_from_fork+0x10/0x20
[   19.240762] 
[   19.240950] Allocated by task 164:
[   19.241005]  kasan_save_stack+0x3c/0x68
[   19.241062]  kasan_save_track+0x20/0x40
[   19.241453]  kasan_save_alloc_info+0x40/0x58
[   19.241631]  __kasan_kmalloc+0xd4/0xd8
[   19.241739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.241840]  krealloc_uaf+0xc8/0x520
[   19.241898]  kunit_try_run_case+0x170/0x3f0
[   19.241945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.242210]  kthread+0x328/0x630
[   19.242273]  ret_from_fork+0x10/0x20
[   19.242332] 
[   19.242361] Freed by task 164:
[   19.242394]  kasan_save_stack+0x3c/0x68
[   19.242439]  kasan_save_track+0x20/0x40
[   19.242479]  kasan_save_free_info+0x4c/0x78
[   19.242521]  __kasan_slab_free+0x6c/0x98
[   19.242561]  kfree+0x214/0x3c8
[   19.242597]  krealloc_uaf+0x12c/0x520
[   19.242636]  kunit_try_run_case+0x170/0x3f0
[   19.242675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.242723]  kthread+0x328/0x630
[   19.242761]  ret_from_fork+0x10/0x20
[   19.242801] 
[   19.242838] The buggy address belongs to the object at fff00000c5b13e00
[   19.242838]  which belongs to the cache kmalloc-256 of size 256
[   19.242962] The buggy address is located 0 bytes inside of
[   19.242962]  freed 256-byte region [fff00000c5b13e00, fff00000c5b13f00)
[   19.243069] 
[   19.243098] The buggy address belongs to the physical page:
[   19.243137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.243209] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.243263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.243324] page_type: f5(slab)
[   19.243374] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.243429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.243498] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.243552] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.243603] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.243674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.243733] page dumped because: kasan: bad access detected
[   19.243769] 
[   19.243790] Memory state around the buggy address:
[   19.243827]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.243889]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.243936] >fff00000c5b13e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.244334]                    ^
[   19.244402]  fff00000c5b13e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.244453]  fff00000c5b13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.244819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   19.209407] ==================================================================
[   19.209476] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.209549] Write of size 1 at addr fff00000c65620ea by task kunit_try_catch/162
[   19.209605] 
[   19.209645] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.209739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.209770] Hardware name: linux,dummy-virt (DT)
[   19.209805] Call trace:
[   19.209844]  show_stack+0x20/0x38 (C)
[   19.209906]  dump_stack_lvl+0x8c/0xd0
[   19.209958]  print_report+0x118/0x608
[   19.210028]  kasan_report+0xdc/0x128
[   19.210081]  __asan_report_store1_noabort+0x20/0x30
[   19.210139]  krealloc_less_oob_helper+0xae4/0xc50
[   19.210192]  krealloc_large_less_oob+0x20/0x38
[   19.210245]  kunit_try_run_case+0x170/0x3f0
[   19.210296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210354]  kthread+0x328/0x630
[   19.210406]  ret_from_fork+0x10/0x20
[   19.210691] 
[   19.210724] The buggy address belongs to the physical page:
[   19.210774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.210851] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.210994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.211054] page_type: f8(unknown)
[   19.211370] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.211453] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211527] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.211655] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211740] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.212073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.212121] page dumped because: kasan: bad access detected
[   19.212168] 
[   19.212233] Memory state around the buggy address:
[   19.212287]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.212510]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.212593] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.212638]                                                           ^
[   19.212994]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.213252]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.213499] ==================================================================
[   19.133452] ==================================================================
[   19.133686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.134064] Write of size 1 at addr fff00000c5b13cc9 by task kunit_try_catch/158
[   19.134130] 
[   19.134183] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.134291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.134322] Hardware name: linux,dummy-virt (DT)
[   19.134361] Call trace:
[   19.134811]  show_stack+0x20/0x38 (C)
[   19.134982]  dump_stack_lvl+0x8c/0xd0
[   19.135244]  print_report+0x118/0x608
[   19.135300]  kasan_report+0xdc/0x128
[   19.135349]  __asan_report_store1_noabort+0x20/0x30
[   19.135572]  krealloc_less_oob_helper+0xa48/0xc50
[   19.135708]  krealloc_less_oob+0x20/0x38
[   19.135806]  kunit_try_run_case+0x170/0x3f0
[   19.135932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.136005]  kthread+0x328/0x630
[   19.136118]  ret_from_fork+0x10/0x20
[   19.136189] 
[   19.136235] Allocated by task 158:
[   19.136314]  kasan_save_stack+0x3c/0x68
[   19.136367]  kasan_save_track+0x20/0x40
[   19.136422]  kasan_save_alloc_info+0x40/0x58
[   19.136462]  __kasan_krealloc+0x118/0x178
[   19.136501]  krealloc_noprof+0x128/0x360
[   19.136539]  krealloc_less_oob_helper+0x168/0xc50
[   19.136617]  krealloc_less_oob+0x20/0x38
[   19.136688]  kunit_try_run_case+0x170/0x3f0
[   19.137271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.137530]  kthread+0x328/0x630
[   19.137580]  ret_from_fork+0x10/0x20
[   19.137920] 
[   19.137947] The buggy address belongs to the object at fff00000c5b13c00
[   19.137947]  which belongs to the cache kmalloc-256 of size 256
[   19.138030] The buggy address is located 0 bytes to the right of
[   19.138030]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.138099] 
[   19.138124] The buggy address belongs to the physical page:
[   19.138163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.138222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.138274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.138338] page_type: f5(slab)
[   19.138388] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138516] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.138569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138622] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.138674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.138718] page dumped because: kasan: bad access detected
[   19.138753] 
[   19.138773] Memory state around the buggy address:
[   19.139223]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139336]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.139390] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.139435]                                               ^
[   19.139491]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139728]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139779] ==================================================================
[   19.191826] ==================================================================
[   19.191913] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.192095] Write of size 1 at addr fff00000c65620c9 by task kunit_try_catch/162
[   19.192184] 
[   19.192242] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.192342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.192374] Hardware name: linux,dummy-virt (DT)
[   19.192410] Call trace:
[   19.192444]  show_stack+0x20/0x38 (C)
[   19.192563]  dump_stack_lvl+0x8c/0xd0
[   19.192660]  print_report+0x118/0x608
[   19.192760]  kasan_report+0xdc/0x128
[   19.192842]  __asan_report_store1_noabort+0x20/0x30
[   19.192906]  krealloc_less_oob_helper+0xa48/0xc50
[   19.193541]  krealloc_large_less_oob+0x20/0x38
[   19.193732]  kunit_try_run_case+0x170/0x3f0
[   19.193792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.193886]  kthread+0x328/0x630
[   19.193993]  ret_from_fork+0x10/0x20
[   19.194100] 
[   19.194127] The buggy address belongs to the physical page:
[   19.194165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.194225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.194277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.194338] page_type: f8(unknown)
[   19.194388] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194457] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.194642] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.194768] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.194876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.195169] page dumped because: kasan: bad access detected
[   19.195331] 
[   19.195393] Memory state around the buggy address:
[   19.195586]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.195736]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.196014] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.196176]                                               ^
[   19.196390]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.196721]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.197137] ==================================================================
[   19.160968] ==================================================================
[   19.161044] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.161111] Write of size 1 at addr fff00000c5b13ceb by task kunit_try_catch/158
[   19.161162] 
[   19.161198] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.161282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.161310] Hardware name: linux,dummy-virt (DT)
[   19.161342] Call trace:
[   19.161365]  show_stack+0x20/0x38 (C)
[   19.161418]  dump_stack_lvl+0x8c/0xd0
[   19.161468]  print_report+0x118/0x608
[   19.161518]  kasan_report+0xdc/0x128
[   19.161568]  __asan_report_store1_noabort+0x20/0x30
[   19.161622]  krealloc_less_oob_helper+0xa58/0xc50
[   19.161674]  krealloc_less_oob+0x20/0x38
[   19.161723]  kunit_try_run_case+0x170/0x3f0
[   19.161773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.161860]  kthread+0x328/0x630
[   19.161915]  ret_from_fork+0x10/0x20
[   19.162906] 
[   19.162961] Allocated by task 158:
[   19.163018]  kasan_save_stack+0x3c/0x68
[   19.163072]  kasan_save_track+0x20/0x40
[   19.163114]  kasan_save_alloc_info+0x40/0x58
[   19.163156]  __kasan_krealloc+0x118/0x178
[   19.163196]  krealloc_noprof+0x128/0x360
[   19.163659]  krealloc_less_oob_helper+0x168/0xc50
[   19.163750]  krealloc_less_oob+0x20/0x38
[   19.163948]  kunit_try_run_case+0x170/0x3f0
[   19.164024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.164070]  kthread+0x328/0x630
[   19.164177]  ret_from_fork+0x10/0x20
[   19.164317] 
[   19.164344] The buggy address belongs to the object at fff00000c5b13c00
[   19.164344]  which belongs to the cache kmalloc-256 of size 256
[   19.164415] The buggy address is located 34 bytes to the right of
[   19.164415]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.164479] 
[   19.164502] The buggy address belongs to the physical page:
[   19.164536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.164589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.164636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.164939] page_type: f5(slab)
[   19.165112] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.165177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.165246] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.165330] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.165404] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.165462] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.165505] page dumped because: kasan: bad access detected
[   19.165541] 
[   19.165562] Memory state around the buggy address:
[   19.165619]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.165672]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.165719] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.165936]                                                           ^
[   19.166339]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.166559]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.166621] ==================================================================
[   19.198107] ==================================================================
[   19.198182] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.198330] Write of size 1 at addr fff00000c65620d0 by task kunit_try_catch/162
[   19.198388] 
[   19.198431] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.198535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.198566] Hardware name: linux,dummy-virt (DT)
[   19.198602] Call trace:
[   19.198629]  show_stack+0x20/0x38 (C)
[   19.198690]  dump_stack_lvl+0x8c/0xd0
[   19.198876]  print_report+0x118/0x608
[   19.198982]  kasan_report+0xdc/0x128
[   19.199069]  __asan_report_store1_noabort+0x20/0x30
[   19.199143]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.199199]  krealloc_large_less_oob+0x20/0x38
[   19.199251]  kunit_try_run_case+0x170/0x3f0
[   19.199304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199361]  kthread+0x328/0x630
[   19.199416]  ret_from_fork+0x10/0x20
[   19.199485] 
[   19.199514] The buggy address belongs to the physical page:
[   19.199551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.199612] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.199772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.199933] page_type: f8(unknown)
[   19.200191] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200421] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.200569] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.200623] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.200674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.200717] page dumped because: kasan: bad access detected
[   19.200758] 
[   19.200795] Memory state around the buggy address:
[   19.200849]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.200951]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.201007] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.201048]                                                  ^
[   19.201194]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.201330]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.201598] ==================================================================
[   19.141202] ==================================================================
[   19.141319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.141399] Write of size 1 at addr fff00000c5b13cd0 by task kunit_try_catch/158
[   19.141453] 
[   19.141706] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.141841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.141877] Hardware name: linux,dummy-virt (DT)
[   19.141914] Call trace:
[   19.141998]  show_stack+0x20/0x38 (C)
[   19.142069]  dump_stack_lvl+0x8c/0xd0
[   19.142123]  print_report+0x118/0x608
[   19.142504]  kasan_report+0xdc/0x128
[   19.142659]  __asan_report_store1_noabort+0x20/0x30
[   19.142719]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.142809]  krealloc_less_oob+0x20/0x38
[   19.142873]  kunit_try_run_case+0x170/0x3f0
[   19.142929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.142995]  kthread+0x328/0x630
[   19.143049]  ret_from_fork+0x10/0x20
[   19.143748] 
[   19.143853] Allocated by task 158:
[   19.143890]  kasan_save_stack+0x3c/0x68
[   19.143948]  kasan_save_track+0x20/0x40
[   19.144098]  kasan_save_alloc_info+0x40/0x58
[   19.144146]  __kasan_krealloc+0x118/0x178
[   19.144187]  krealloc_noprof+0x128/0x360
[   19.144566]  krealloc_less_oob_helper+0x168/0xc50
[   19.144620]  krealloc_less_oob+0x20/0x38
[   19.144808]  kunit_try_run_case+0x170/0x3f0
[   19.144853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.145184]  kthread+0x328/0x630
[   19.145268]  ret_from_fork+0x10/0x20
[   19.145331] 
[   19.145449] The buggy address belongs to the object at fff00000c5b13c00
[   19.145449]  which belongs to the cache kmalloc-256 of size 256
[   19.145522] The buggy address is located 7 bytes to the right of
[   19.145522]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.145593] 
[   19.145617] The buggy address belongs to the physical page:
[   19.145652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.146137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.146261] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.146324] page_type: f5(slab)
[   19.146382] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.146473] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.146591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.146772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.146863] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.146916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.146958] page dumped because: kasan: bad access detected
[   19.147004] 
[   19.147025] Memory state around the buggy address:
[   19.147083]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147137]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.147184] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.147223]                                                  ^
[   19.147263]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147307]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147346] ==================================================================
[   19.201847] ==================================================================
[   19.201900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.201964] Write of size 1 at addr fff00000c65620da by task kunit_try_catch/162
[   19.202367] 
[   19.202425] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.203276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.203670] Hardware name: linux,dummy-virt (DT)
[   19.203717] Call trace:
[   19.203752]  show_stack+0x20/0x38 (C)
[   19.203832]  dump_stack_lvl+0x8c/0xd0
[   19.203933]  print_report+0x118/0x608
[   19.204013]  kasan_report+0xdc/0x128
[   19.204075]  __asan_report_store1_noabort+0x20/0x30
[   19.204132]  krealloc_less_oob_helper+0xa80/0xc50
[   19.204187]  krealloc_large_less_oob+0x20/0x38
[   19.204412]  kunit_try_run_case+0x170/0x3f0
[   19.204514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.204803]  kthread+0x328/0x630
[   19.204863]  ret_from_fork+0x10/0x20
[   19.205027] 
[   19.205188] The buggy address belongs to the physical page:
[   19.205475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.205540] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.205608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.206178] page_type: f8(unknown)
[   19.206285] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.206359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.206485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.206542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.206595] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.206647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.206689] page dumped because: kasan: bad access detected
[   19.207010] 
[   19.207037] Memory state around the buggy address:
[   19.207086]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.207137]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.207274] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.207380]                                                     ^
[   19.207670]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.207735]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.207866] ==================================================================
[   19.149603] ==================================================================
[   19.149821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.149918] Write of size 1 at addr fff00000c5b13cda by task kunit_try_catch/158
[   19.149986] 
[   19.150031] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.150328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.150400] Hardware name: linux,dummy-virt (DT)
[   19.150440] Call trace:
[   19.150565]  show_stack+0x20/0x38 (C)
[   19.150683]  dump_stack_lvl+0x8c/0xd0
[   19.150742]  print_report+0x118/0x608
[   19.150796]  kasan_report+0xdc/0x128
[   19.150870]  __asan_report_store1_noabort+0x20/0x30
[   19.150926]  krealloc_less_oob_helper+0xa80/0xc50
[   19.151097]  krealloc_less_oob+0x20/0x38
[   19.151183]  kunit_try_run_case+0x170/0x3f0
[   19.151331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151428]  kthread+0x328/0x630
[   19.151482]  ret_from_fork+0x10/0x20
[   19.151534] 
[   19.151555] Allocated by task 158:
[   19.151586]  kasan_save_stack+0x3c/0x68
[   19.151631]  kasan_save_track+0x20/0x40
[   19.151697]  kasan_save_alloc_info+0x40/0x58
[   19.151756]  __kasan_krealloc+0x118/0x178
[   19.151804]  krealloc_noprof+0x128/0x360
[   19.151888]  krealloc_less_oob_helper+0x168/0xc50
[   19.151934]  krealloc_less_oob+0x20/0x38
[   19.151981]  kunit_try_run_case+0x170/0x3f0
[   19.152032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.152121]  kthread+0x328/0x630
[   19.152192]  ret_from_fork+0x10/0x20
[   19.152263] 
[   19.152307] The buggy address belongs to the object at fff00000c5b13c00
[   19.152307]  which belongs to the cache kmalloc-256 of size 256
[   19.152366] The buggy address is located 17 bytes to the right of
[   19.152366]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.152435] 
[   19.152479] The buggy address belongs to the physical page:
[   19.152538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.152623] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.152671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.152778] page_type: f5(slab)
[   19.152873] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.152979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.153034] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.153082] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.153131] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.153182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.153680] page dumped because: kasan: bad access detected
[   19.153865] 
[   19.153946] Memory state around the buggy address:
[   19.154031]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154142]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.154244] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.154287]                                                     ^
[   19.154332]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154377]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154416] ==================================================================
[   19.155062] ==================================================================
[   19.155125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.155196] Write of size 1 at addr fff00000c5b13cea by task kunit_try_catch/158
[   19.155252] 
[   19.155291] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.155381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.155409] Hardware name: linux,dummy-virt (DT)
[   19.155443] Call trace:
[   19.155468]  show_stack+0x20/0x38 (C)
[   19.155524]  dump_stack_lvl+0x8c/0xd0
[   19.155576]  print_report+0x118/0x608
[   19.155627]  kasan_report+0xdc/0x128
[   19.155677]  __asan_report_store1_noabort+0x20/0x30
[   19.155733]  krealloc_less_oob_helper+0xae4/0xc50
[   19.155786]  krealloc_less_oob+0x20/0x38
[   19.155834]  kunit_try_run_case+0x170/0x3f0
[   19.155883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.155938]  kthread+0x328/0x630
[   19.156407]  ret_from_fork+0x10/0x20
[   19.156528] 
[   19.156570] Allocated by task 158:
[   19.156630]  kasan_save_stack+0x3c/0x68
[   19.156710]  kasan_save_track+0x20/0x40
[   19.156752]  kasan_save_alloc_info+0x40/0x58
[   19.156835]  __kasan_krealloc+0x118/0x178
[   19.156914]  krealloc_noprof+0x128/0x360
[   19.157009]  krealloc_less_oob_helper+0x168/0xc50
[   19.157067]  krealloc_less_oob+0x20/0x38
[   19.157126]  kunit_try_run_case+0x170/0x3f0
[   19.157205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.157294]  kthread+0x328/0x630
[   19.157373]  ret_from_fork+0x10/0x20
[   19.157452] 
[   19.157475] The buggy address belongs to the object at fff00000c5b13c00
[   19.157475]  which belongs to the cache kmalloc-256 of size 256
[   19.157535] The buggy address is located 33 bytes to the right of
[   19.157535]  allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9)
[   19.157602] 
[   19.157624] The buggy address belongs to the physical page:
[   19.157657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.157712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.157763] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.157831] page_type: f5(slab)
[   19.157881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.157938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.158060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158112] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.158163] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.158204] page dumped because: kasan: bad access detected
[   19.158238] 
[   19.158257] Memory state around the buggy address:
[   19.158291]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.158336]  fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.158381] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.159379]                                                           ^
[   19.159448]  fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.159672]  fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.159729] ==================================================================
[   19.214289] ==================================================================
[   19.214356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.214427] Write of size 1 at addr fff00000c65620eb by task kunit_try_catch/162
[   19.214703] 
[   19.214917] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.215220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.215266] Hardware name: linux,dummy-virt (DT)
[   19.215337] Call trace:
[   19.215571]  show_stack+0x20/0x38 (C)
[   19.215769]  dump_stack_lvl+0x8c/0xd0
[   19.215882]  print_report+0x118/0x608
[   19.215938]  kasan_report+0xdc/0x128
[   19.216043]  __asan_report_store1_noabort+0x20/0x30
[   19.216107]  krealloc_less_oob_helper+0xa58/0xc50
[   19.216407]  krealloc_large_less_oob+0x20/0x38
[   19.216575]  kunit_try_run_case+0x170/0x3f0
[   19.216640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.216861]  kthread+0x328/0x630
[   19.217063]  ret_from_fork+0x10/0x20
[   19.217141] 
[   19.217167] The buggy address belongs to the physical page:
[   19.217205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.217264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.217316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.217374] page_type: f8(unknown)
[   19.217730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.217802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.218161] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.218225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.218411] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.218484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.218539] page dumped because: kasan: bad access detected
[   19.218838] 
[   19.218954] Memory state around the buggy address:
[   19.219153]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.219230]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.219283] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.219502]                                                           ^
[   19.219675]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.219928]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.220006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.093671] ==================================================================
[   19.093758] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.093874] Write of size 1 at addr fff00000c5b13aeb by task kunit_try_catch/156
[   19.093993] 
[   19.094043] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.094138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.094168] Hardware name: linux,dummy-virt (DT)
[   19.094205] Call trace:
[   19.094232]  show_stack+0x20/0x38 (C)
[   19.094382]  dump_stack_lvl+0x8c/0xd0
[   19.094438]  print_report+0x118/0x608
[   19.094532]  kasan_report+0xdc/0x128
[   19.094583]  __asan_report_store1_noabort+0x20/0x30
[   19.094640]  krealloc_more_oob_helper+0x60c/0x678
[   19.094775]  krealloc_more_oob+0x20/0x38
[   19.094902]  kunit_try_run_case+0x170/0x3f0
[   19.094986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.095047]  kthread+0x328/0x630
[   19.095101]  ret_from_fork+0x10/0x20
[   19.095155] 
[   19.095300] Allocated by task 156:
[   19.095390]  kasan_save_stack+0x3c/0x68
[   19.095471]  kasan_save_track+0x20/0x40
[   19.095509]  kasan_save_alloc_info+0x40/0x58
[   19.095794]  __kasan_krealloc+0x118/0x178
[   19.096047]  krealloc_noprof+0x128/0x360
[   19.096312]  krealloc_more_oob_helper+0x168/0x678
[   19.096361]  krealloc_more_oob+0x20/0x38
[   19.096400]  kunit_try_run_case+0x170/0x3f0
[   19.096440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.096485]  kthread+0x328/0x630
[   19.097047]  ret_from_fork+0x10/0x20
[   19.099003] 
[   19.099032] The buggy address belongs to the object at fff00000c5b13a00
[   19.099032]  which belongs to the cache kmalloc-256 of size 256
[   19.099104] The buggy address is located 0 bytes to the right of
[   19.099104]  allocated 235-byte region [fff00000c5b13a00, fff00000c5b13aeb)
[   19.099210] 
[   19.099256] The buggy address belongs to the physical page:
[   19.099301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.099363] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.099416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.099482] page_type: f5(slab)
[   19.099532] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.099590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.099646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.099698] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.099751] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.099824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.099867] page dumped because: kasan: bad access detected
[   19.099903] 
[   19.099923] Memory state around the buggy address:
[   19.099963]  fff00000c5b13980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.100023]  fff00000c5b13a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100070] >fff00000c5b13a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.100110]                                                           ^
[   19.100152]  fff00000c5b13b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.100323]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.100368] ==================================================================
[   19.175173] ==================================================================
[   19.175256] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.175340] Write of size 1 at addr fff00000c65620eb by task kunit_try_catch/160
[   19.175396] 
[   19.175441] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.175535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.175564] Hardware name: linux,dummy-virt (DT)
[   19.175608] Call trace:
[   19.175660]  show_stack+0x20/0x38 (C)
[   19.175735]  dump_stack_lvl+0x8c/0xd0
[   19.175819]  print_report+0x118/0x608
[   19.175924]  kasan_report+0xdc/0x128
[   19.175985]  __asan_report_store1_noabort+0x20/0x30
[   19.176099]  krealloc_more_oob_helper+0x60c/0x678
[   19.176197]  krealloc_large_more_oob+0x20/0x38
[   19.176296]  kunit_try_run_case+0x170/0x3f0
[   19.176397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.176506]  kthread+0x328/0x630
[   19.176606]  ret_from_fork+0x10/0x20
[   19.176704] 
[   19.176748] The buggy address belongs to the physical page:
[   19.176831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.176891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.176941] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.177014] page_type: f8(unknown)
[   19.177064] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.177118] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.177254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.177387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.177443] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.177495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.177537] page dumped because: kasan: bad access detected
[   19.177573] 
[   19.177593] Memory state around the buggy address:
[   19.177630]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.177677]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.177751] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.177796]                                                           ^
[   19.177885]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.177947]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.178013] ==================================================================
[   19.101618] ==================================================================
[   19.101767] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.101869] Write of size 1 at addr fff00000c5b13af0 by task kunit_try_catch/156
[   19.101940] 
[   19.102501] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.102633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.102668] Hardware name: linux,dummy-virt (DT)
[   19.102705] Call trace:
[   19.102732]  show_stack+0x20/0x38 (C)
[   19.102800]  dump_stack_lvl+0x8c/0xd0
[   19.102852]  print_report+0x118/0x608
[   19.102903]  kasan_report+0xdc/0x128
[   19.102952]  __asan_report_store1_noabort+0x20/0x30
[   19.103024]  krealloc_more_oob_helper+0x5c0/0x678
[   19.103078]  krealloc_more_oob+0x20/0x38
[   19.103126]  kunit_try_run_case+0x170/0x3f0
[   19.103177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104782]  kthread+0x328/0x630
[   19.105410]  ret_from_fork+0x10/0x20
[   19.105938] 
[   19.105966] Allocated by task 156:
[   19.106483]  kasan_save_stack+0x3c/0x68
[   19.106551]  kasan_save_track+0x20/0x40
[   19.106594]  kasan_save_alloc_info+0x40/0x58
[   19.107690]  __kasan_krealloc+0x118/0x178
[   19.107751]  krealloc_noprof+0x128/0x360
[   19.107797]  krealloc_more_oob_helper+0x168/0x678
[   19.107841]  krealloc_more_oob+0x20/0x38
[   19.107881]  kunit_try_run_case+0x170/0x3f0
[   19.107922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.107977]  kthread+0x328/0x630
[   19.108031]  ret_from_fork+0x10/0x20
[   19.108072] 
[   19.108096] The buggy address belongs to the object at fff00000c5b13a00
[   19.108096]  which belongs to the cache kmalloc-256 of size 256
[   19.109700] The buggy address is located 5 bytes to the right of
[   19.109700]  allocated 235-byte region [fff00000c5b13a00, fff00000c5b13aeb)
[   19.109824] 
[   19.109860] The buggy address belongs to the physical page:
[   19.109901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   19.112917] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.113024] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.113100] page_type: f5(slab)
[   19.113157] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.114332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.114528] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.114587] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.114641] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff
[   19.115266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.115679] page dumped because: kasan: bad access detected
[   19.115851] 
[   19.115874] Memory state around the buggy address:
[   19.115916]  fff00000c5b13980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.115965]  fff00000c5b13a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.116627] >fff00000c5b13a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.116671]                                                              ^
[   19.116731]  fff00000c5b13b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.116782]  fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.116824] ==================================================================
[   19.180551] ==================================================================
[   19.180631] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.180705] Write of size 1 at addr fff00000c65620f0 by task kunit_try_catch/160
[   19.180759] 
[   19.180799] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.180890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.180919] Hardware name: linux,dummy-virt (DT)
[   19.180954] Call trace:
[   19.180991]  show_stack+0x20/0x38 (C)
[   19.182417]  dump_stack_lvl+0x8c/0xd0
[   19.182566]  print_report+0x118/0x608
[   19.182630]  kasan_report+0xdc/0x128
[   19.182682]  __asan_report_store1_noabort+0x20/0x30
[   19.182772]  krealloc_more_oob_helper+0x5c0/0x678
[   19.182827]  krealloc_large_more_oob+0x20/0x38
[   19.182879]  kunit_try_run_case+0x170/0x3f0
[   19.182932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.183003]  kthread+0x328/0x630
[   19.183094]  ret_from_fork+0x10/0x20
[   19.183187] 
[   19.183735] The buggy address belongs to the physical page:
[   19.183860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   19.183928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.184145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.184296] page_type: f8(unknown)
[   19.184396] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.184454] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.184508] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.184559] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.184611] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff
[   19.184662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.184714] page dumped because: kasan: bad access detected
[   19.184767] 
[   19.184788] Memory state around the buggy address:
[   19.184826]  fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184873]  fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184918] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.184958]                                                              ^
[   19.185019]  fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.185066]  fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.185107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   19.057718] ==================================================================
[   19.057916] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   19.058037] Free of addr fff00000c655c001 by task kunit_try_catch/150
[   19.058277] 
[   19.058335] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.058485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.058530] Hardware name: linux,dummy-virt (DT)
[   19.058649] Call trace:
[   19.058693]  show_stack+0x20/0x38 (C)
[   19.058772]  dump_stack_lvl+0x8c/0xd0
[   19.058939]  print_report+0x118/0x608
[   19.059217]  kasan_report_invalid_free+0xc0/0xe8
[   19.059774]  __kasan_kfree_large+0x5c/0xa8
[   19.059856]  free_large_kmalloc+0x64/0x190
[   19.060173]  kfree+0x270/0x3c8
[   19.060591]  kmalloc_large_invalid_free+0x108/0x270
[   19.060687]  kunit_try_run_case+0x170/0x3f0
[   19.060951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.061395]  kthread+0x328/0x630
[   19.061472]  ret_from_fork+0x10/0x20
[   19.061532] 
[   19.061682] The buggy address belongs to the physical page:
[   19.061743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[   19.062067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.062152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.062307] page_type: f8(unknown)
[   19.062609] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.062676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.062735] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.062789] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.062842] head: 0bfffe0000000002 ffffc1ffc3195701 00000000ffffffff 00000000ffffffff
[   19.062895] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.062938] page dumped because: kasan: bad access detected
[   19.062986] 
[   19.063008] Memory state around the buggy address:
[   19.063047]  fff00000c655bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.063091]  fff00000c655bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.063135] >fff00000c655c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.063172]                    ^
[   19.063203]  fff00000c655c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.063244]  fff00000c655c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.063305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.025756] ==================================================================
[   19.025873] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.025965] Read of size 1 at addr fff00000c655c000 by task kunit_try_catch/148
[   19.026965] 
[   19.027567] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.028013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.028442] Hardware name: linux,dummy-virt (DT)
[   19.028501] Call trace:
[   19.028535]  show_stack+0x20/0x38 (C)
[   19.028604]  dump_stack_lvl+0x8c/0xd0
[   19.028990]  print_report+0x118/0x608
[   19.029079]  kasan_report+0xdc/0x128
[   19.029145]  __asan_report_load1_noabort+0x20/0x30
[   19.029206]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.029261]  kunit_try_run_case+0x170/0x3f0
[   19.029583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.029855]  kthread+0x328/0x630
[   19.029939]  ret_from_fork+0x10/0x20
[   19.030012] 
[   19.030093] The buggy address belongs to the physical page:
[   19.030139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[   19.030203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.030569] raw: 0bfffe0000000000 ffffc1ffc3195808 fff00000da47dc00 0000000000000000
[   19.030637] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.030909] page dumped because: kasan: bad access detected
[   19.030957] 
[   19.030996] Memory state around the buggy address:
[   19.031039]  fff00000c655bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.031089]  fff00000c655bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.031281] >fff00000c655c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.031394]                    ^
[   19.031477]  fff00000c655c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.031538]  fff00000c655c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.031581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.005515] ==================================================================
[   19.005987] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.006168] Write of size 1 at addr fff00000c655e00a by task kunit_try_catch/146
[   19.006229] 
[   19.006456] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   19.006846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.006891] Hardware name: linux,dummy-virt (DT)
[   19.006953] Call trace:
[   19.007042]  show_stack+0x20/0x38 (C)
[   19.007111]  dump_stack_lvl+0x8c/0xd0
[   19.007196]  print_report+0x118/0x608
[   19.007255]  kasan_report+0xdc/0x128
[   19.007592]  __asan_report_store1_noabort+0x20/0x30
[   19.007762]  kmalloc_large_oob_right+0x278/0x2b8
[   19.008010]  kunit_try_run_case+0x170/0x3f0
[   19.008082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.008551]  kthread+0x328/0x630
[   19.008886]  ret_from_fork+0x10/0x20
[   19.009086] 
[   19.009153] The buggy address belongs to the physical page:
[   19.009360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c
[   19.009661] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.009725] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.010233] page_type: f8(unknown)
[   19.010329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.010435] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.010545] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.010985] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.011067] head: 0bfffe0000000002 ffffc1ffc3195701 00000000ffffffff 00000000ffffffff
[   19.011189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.011296] page dumped because: kasan: bad access detected
[   19.011712] 
[   19.011761] Memory state around the buggy address:
[   19.011912]  fff00000c655df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.012075]  fff00000c655df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.012124] >fff00000c655e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.012163]                       ^
[   19.012197]  fff00000c655e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.012239]  fff00000c655e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.012284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   18.975838] ==================================================================
[   18.976276] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   18.976485] Write of size 1 at addr fff00000c6595f00 by task kunit_try_catch/144
[   18.976730] 
[   18.976807] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.976911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.976942] Hardware name: linux,dummy-virt (DT)
[   18.976995] Call trace:
[   18.977027]  show_stack+0x20/0x38 (C)
[   18.977090]  dump_stack_lvl+0x8c/0xd0
[   18.977144]  print_report+0x118/0x608
[   18.977194]  kasan_report+0xdc/0x128
[   18.977244]  __asan_report_store1_noabort+0x20/0x30
[   18.977300]  kmalloc_big_oob_right+0x2a4/0x2f0
[   18.977355]  kunit_try_run_case+0x170/0x3f0
[   18.977408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.977464]  kthread+0x328/0x630
[   18.977516]  ret_from_fork+0x10/0x20
[   18.977571] 
[   18.977593] Allocated by task 144:
[   18.977626]  kasan_save_stack+0x3c/0x68
[   18.977675]  kasan_save_track+0x20/0x40
[   18.977718]  kasan_save_alloc_info+0x40/0x58
[   18.977761]  __kasan_kmalloc+0xd4/0xd8
[   18.977801]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.978480]  kmalloc_big_oob_right+0xb8/0x2f0
[   18.978554]  kunit_try_run_case+0x170/0x3f0
[   18.978802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.978857]  kthread+0x328/0x630
[   18.979354]  ret_from_fork+0x10/0x20
[   18.979455] 
[   18.979574] The buggy address belongs to the object at fff00000c6594000
[   18.979574]  which belongs to the cache kmalloc-8k of size 8192
[   18.979686] The buggy address is located 0 bytes to the right of
[   18.979686]  allocated 7936-byte region [fff00000c6594000, fff00000c6595f00)
[   18.979898] 
[   18.980045] The buggy address belongs to the physical page:
[   18.980268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106590
[   18.980476] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.980630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.980700] page_type: f5(slab)
[   18.980753] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.980811] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.980869] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.981567] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.981647] head: 0bfffe0000000003 ffffc1ffc3196401 00000000ffffffff 00000000ffffffff
[   18.982137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.982315] page dumped because: kasan: bad access detected
[   18.982357] 
[   18.982382] Memory state around the buggy address:
[   18.982501]  fff00000c6595e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.982578]  fff00000c6595e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.982624] >fff00000c6595f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.982665]                    ^
[   18.982699]  fff00000c6595f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.982793]  fff00000c6596000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.982854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   18.936938] ==================================================================
[   18.937057] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.937151] Write of size 1 at addr fff00000c4065078 by task kunit_try_catch/142
[   18.937271] 
[   18.937357] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.937476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.937508] Hardware name: linux,dummy-virt (DT)
[   18.937546] Call trace:
[   18.937574]  show_stack+0x20/0x38 (C)
[   18.937649]  dump_stack_lvl+0x8c/0xd0
[   18.937702]  print_report+0x118/0x608
[   18.937753]  kasan_report+0xdc/0x128
[   18.937803]  __asan_report_store1_noabort+0x20/0x30
[   18.937880]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.937938]  kunit_try_run_case+0x170/0x3f0
[   18.938007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.938068]  kthread+0x328/0x630
[   18.938122]  ret_from_fork+0x10/0x20
[   18.938180] 
[   18.938202] Allocated by task 142:
[   18.938773]  kasan_save_stack+0x3c/0x68
[   18.939044]  kasan_save_track+0x20/0x40
[   18.939128]  kasan_save_alloc_info+0x40/0x58
[   18.939177]  __kasan_kmalloc+0xd4/0xd8
[   18.939218]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   18.939371]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.939427]  kunit_try_run_case+0x170/0x3f0
[   18.939480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.939852]  kthread+0x328/0x630
[   18.939963]  ret_from_fork+0x10/0x20
[   18.940052] 
[   18.940178] The buggy address belongs to the object at fff00000c4065000
[   18.940178]  which belongs to the cache kmalloc-128 of size 128
[   18.940251] The buggy address is located 0 bytes to the right of
[   18.940251]  allocated 120-byte region [fff00000c4065000, fff00000c4065078)
[   18.940320] 
[   18.940348] The buggy address belongs to the physical page:
[   18.940384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   18.940445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.940502] page_type: f5(slab)
[   18.940553] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.940610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.940653] page dumped because: kasan: bad access detected
[   18.940687] 
[   18.941082] Memory state around the buggy address:
[   18.941142]  fff00000c4064f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.941253]  fff00000c4064f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.941311] >fff00000c4065000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.941438]                                                                 ^
[   18.941678]  fff00000c4065080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.941751]  fff00000c4065100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.942092] ==================================================================
[   18.943296] ==================================================================
[   18.943364] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   18.943783] Write of size 1 at addr fff00000c4065178 by task kunit_try_catch/142
[   18.944089] 
[   18.944149] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.944409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.944445] Hardware name: linux,dummy-virt (DT)
[   18.944482] Call trace:
[   18.944508]  show_stack+0x20/0x38 (C)
[   18.944580]  dump_stack_lvl+0x8c/0xd0
[   18.944631]  print_report+0x118/0x608
[   18.944680]  kasan_report+0xdc/0x128
[   18.944726]  __asan_report_store1_noabort+0x20/0x30
[   18.944778]  kmalloc_track_caller_oob_right+0x418/0x488
[   18.944985]  kunit_try_run_case+0x170/0x3f0
[   18.945052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.945173]  kthread+0x328/0x630
[   18.945236]  ret_from_fork+0x10/0x20
[   18.945294] 
[   18.945357] Allocated by task 142:
[   18.945393]  kasan_save_stack+0x3c/0x68
[   18.945670]  kasan_save_track+0x20/0x40
[   18.945732]  kasan_save_alloc_info+0x40/0x58
[   18.945778]  __kasan_kmalloc+0xd4/0xd8
[   18.945828]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   18.945881]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.945926]  kunit_try_run_case+0x170/0x3f0
[   18.945967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.946030]  kthread+0x328/0x630
[   18.946069]  ret_from_fork+0x10/0x20
[   18.946108] 
[   18.946131] The buggy address belongs to the object at fff00000c4065100
[   18.946131]  which belongs to the cache kmalloc-128 of size 128
[   18.946194] The buggy address is located 0 bytes to the right of
[   18.946194]  allocated 120-byte region [fff00000c4065100, fff00000c4065178)
[   18.946260] 
[   18.946283] The buggy address belongs to the physical page:
[   18.946317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   18.946374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.946426] page_type: f5(slab)
[   18.946658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.947005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.947122] page dumped because: kasan: bad access detected
[   18.947330] 
[   18.947387] Memory state around the buggy address:
[   18.947428]  fff00000c4065000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.947569]  fff00000c4065080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.947724] >fff00000c4065100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.947765]                                                                 ^
[   18.948077]  fff00000c4065180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948139]  fff00000c4065200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948294] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   18.895961] ==================================================================
[   18.896428] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   18.896733] Read of size 1 at addr fff00000c6533000 by task kunit_try_catch/140
[   18.896838] 
[   18.896919] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.897736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.897890] Hardware name: linux,dummy-virt (DT)
[   18.898048] Call trace:
[   18.898107]  show_stack+0x20/0x38 (C)
[   18.898248]  dump_stack_lvl+0x8c/0xd0
[   18.898417]  print_report+0x118/0x608
[   18.898668]  kasan_report+0xdc/0x128
[   18.899057]  __asan_report_load1_noabort+0x20/0x30
[   18.899310]  kmalloc_node_oob_right+0x2f4/0x330
[   18.899471]  kunit_try_run_case+0x170/0x3f0
[   18.899690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.899932]  kthread+0x328/0x630
[   18.900088]  ret_from_fork+0x10/0x20
[   18.900218] 
[   18.900329] Allocated by task 140:
[   18.900401]  kasan_save_stack+0x3c/0x68
[   18.900506]  kasan_save_track+0x20/0x40
[   18.900597]  kasan_save_alloc_info+0x40/0x58
[   18.900692]  __kasan_kmalloc+0xd4/0xd8
[   18.900787]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   18.900888]  kmalloc_node_oob_right+0xbc/0x330
[   18.901291]  kunit_try_run_case+0x170/0x3f0
[   18.901401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.901516]  kthread+0x328/0x630
[   18.901696]  ret_from_fork+0x10/0x20
[   18.901910] 
[   18.901966] The buggy address belongs to the object at fff00000c6532000
[   18.901966]  which belongs to the cache kmalloc-4k of size 4096
[   18.902397] The buggy address is located 0 bytes to the right of
[   18.902397]  allocated 4096-byte region [fff00000c6532000, fff00000c6533000)
[   18.902738] 
[   18.902979] The buggy address belongs to the physical page:
[   18.903297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   18.904191] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.904338] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.904497] page_type: f5(slab)
[   18.904599] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.904716] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.904858] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.905309] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.906275] head: 0bfffe0000000003 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff
[   18.906864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.906997] page dumped because: kasan: bad access detected
[   18.907390] 
[   18.907750] Memory state around the buggy address:
[   18.908143]  fff00000c6532f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.908565]  fff00000c6532f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.908850] >fff00000c6533000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.909150]                    ^
[   18.909265]  fff00000c6533080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.909504]  fff00000c6533100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.909844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   18.866098] ==================================================================
[   18.866344] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   18.866496] Read of size 1 at addr fff00000c403505f by task kunit_try_catch/138
[   18.866608] 
[   18.866695] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.866906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.866980] Hardware name: linux,dummy-virt (DT)
[   18.867063] Call trace:
[   18.867118]  show_stack+0x20/0x38 (C)
[   18.867245]  dump_stack_lvl+0x8c/0xd0
[   18.867360]  print_report+0x118/0x608
[   18.867472]  kasan_report+0xdc/0x128
[   18.867580]  __asan_report_load1_noabort+0x20/0x30
[   18.867703]  kmalloc_oob_left+0x2ec/0x320
[   18.867816]  kunit_try_run_case+0x170/0x3f0
[   18.867937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.868605]  kthread+0x328/0x630
[   18.868802]  ret_from_fork+0x10/0x20
[   18.869277] 
[   18.869328] Allocated by task 26:
[   18.869420]  kasan_save_stack+0x3c/0x68
[   18.869608]  kasan_save_track+0x20/0x40
[   18.869838]  kasan_save_alloc_info+0x40/0x58
[   18.869948]  __kasan_kmalloc+0xd4/0xd8
[   18.870049]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   18.870442]  kstrdup+0x54/0xc8
[   18.870542]  devtmpfs_work_loop+0x6f8/0xa58
[   18.870764]  devtmpfsd+0x50/0x58
[   18.871262]  kthread+0x328/0x630
[   18.871429]  ret_from_fork+0x10/0x20
[   18.871554] 
[   18.871634] Freed by task 26:
[   18.871763]  kasan_save_stack+0x3c/0x68
[   18.871865]  kasan_save_track+0x20/0x40
[   18.871951]  kasan_save_free_info+0x4c/0x78
[   18.872059]  __kasan_slab_free+0x6c/0x98
[   18.872552]  kfree+0x214/0x3c8
[   18.872658]  devtmpfs_work_loop+0x804/0xa58
[   18.872723]  devtmpfsd+0x50/0x58
[   18.872781]  kthread+0x328/0x630
[   18.872909]  ret_from_fork+0x10/0x20
[   18.873050] 
[   18.873114] The buggy address belongs to the object at fff00000c4035040
[   18.873114]  which belongs to the cache kmalloc-16 of size 16
[   18.873268] The buggy address is located 15 bytes to the right of
[   18.873268]  allocated 16-byte region [fff00000c4035040, fff00000c4035050)
[   18.873438] 
[   18.873507] The buggy address belongs to the physical page:
[   18.873591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035
[   18.873737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.873921] page_type: f5(slab)
[   18.874090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.874239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.874351] page dumped because: kasan: bad access detected
[   18.874424] 
[   18.874511] Memory state around the buggy address:
[   18.874582]  fff00000c4034f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.874682]  fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.874791] >fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 07 fc fc
[   18.874878]                                                     ^
[   18.875023]  fff00000c4035080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.875373]  fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.875695] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.796469] ==================================================================
[   18.796917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.798046] Write of size 1 at addr fff00000c1807f73 by task kunit_try_catch/136
[   18.798185] 
[   18.799441] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.799639] Tainted: [N]=TEST
[   18.799680] Hardware name: linux,dummy-virt (DT)
[   18.799962] Call trace:
[   18.800197]  show_stack+0x20/0x38 (C)
[   18.800368]  dump_stack_lvl+0x8c/0xd0
[   18.800442]  print_report+0x118/0x608
[   18.800498]  kasan_report+0xdc/0x128
[   18.800548]  __asan_report_store1_noabort+0x20/0x30
[   18.800605]  kmalloc_oob_right+0x5a4/0x660
[   18.800654]  kunit_try_run_case+0x170/0x3f0
[   18.800709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.800766]  kthread+0x328/0x630
[   18.800817]  ret_from_fork+0x10/0x20
[   18.801024] 
[   18.801082] Allocated by task 136:
[   18.801211]  kasan_save_stack+0x3c/0x68
[   18.801286]  kasan_save_track+0x20/0x40
[   18.801330]  kasan_save_alloc_info+0x40/0x58
[   18.801373]  __kasan_kmalloc+0xd4/0xd8
[   18.801411]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.801453]  kmalloc_oob_right+0xb0/0x660
[   18.801491]  kunit_try_run_case+0x170/0x3f0
[   18.801530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.801575]  kthread+0x328/0x630
[   18.801614]  ret_from_fork+0x10/0x20
[   18.801677] 
[   18.801749] The buggy address belongs to the object at fff00000c1807f00
[   18.801749]  which belongs to the cache kmalloc-128 of size 128
[   18.801872] The buggy address is located 0 bytes to the right of
[   18.801872]  allocated 115-byte region [fff00000c1807f00, fff00000c1807f73)
[   18.801951] 
[   18.802059] The buggy address belongs to the physical page:
[   18.802274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807
[   18.802609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.802986] page_type: f5(slab)
[   18.803387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.803462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.803595] page dumped because: kasan: bad access detected
[   18.803645] 
[   18.803676] Memory state around the buggy address:
[   18.803953]  fff00000c1807e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.804048]  fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.804115] >fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.804177]                                                              ^
[   18.804276]  fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.804326]  fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.804398] ==================================================================
[   18.812512] ==================================================================
[   18.812647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.812869] Write of size 1 at addr fff00000c1807f78 by task kunit_try_catch/136
[   18.813055] 
[   18.813142] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.813617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.813693] Hardware name: linux,dummy-virt (DT)
[   18.813776] Call trace:
[   18.814285]  show_stack+0x20/0x38 (C)
[   18.814494]  dump_stack_lvl+0x8c/0xd0
[   18.814642]  print_report+0x118/0x608
[   18.814751]  kasan_report+0xdc/0x128
[   18.814857]  __asan_report_store1_noabort+0x20/0x30
[   18.815209]  kmalloc_oob_right+0x538/0x660
[   18.815335]  kunit_try_run_case+0x170/0x3f0
[   18.815482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.815709]  kthread+0x328/0x630
[   18.816040]  ret_from_fork+0x10/0x20
[   18.816461] 
[   18.816509] Allocated by task 136:
[   18.816585]  kasan_save_stack+0x3c/0x68
[   18.816680]  kasan_save_track+0x20/0x40
[   18.816764]  kasan_save_alloc_info+0x40/0x58
[   18.816875]  __kasan_kmalloc+0xd4/0xd8
[   18.817110]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.817275]  kmalloc_oob_right+0xb0/0x660
[   18.817384]  kunit_try_run_case+0x170/0x3f0
[   18.817598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.817799]  kthread+0x328/0x630
[   18.818267]  ret_from_fork+0x10/0x20
[   18.818373] 
[   18.818426] The buggy address belongs to the object at fff00000c1807f00
[   18.818426]  which belongs to the cache kmalloc-128 of size 128
[   18.818882] The buggy address is located 5 bytes to the right of
[   18.818882]  allocated 115-byte region [fff00000c1807f00, fff00000c1807f73)
[   18.819121] 
[   18.819284] The buggy address belongs to the physical page:
[   18.819595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807
[   18.819867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.820145] page_type: f5(slab)
[   18.820327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.820549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.821050] page dumped because: kasan: bad access detected
[   18.821187] 
[   18.821232] Memory state around the buggy address:
[   18.821322]  fff00000c1807e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.821435]  fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.821541] >fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.821634]                                                                 ^
[   18.821735]  fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.821858]  fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.821960] ==================================================================
[   18.825184] ==================================================================
[   18.825445] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.825697] Read of size 1 at addr fff00000c1807f80 by task kunit_try_catch/136
[   18.825987] 
[   18.826280] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   18.826676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.827091] Hardware name: linux,dummy-virt (DT)
[   18.827291] Call trace:
[   18.827387]  show_stack+0x20/0x38 (C)
[   18.827922]  dump_stack_lvl+0x8c/0xd0
[   18.828192]  print_report+0x118/0x608
[   18.828411]  kasan_report+0xdc/0x128
[   18.828977]  __asan_report_load1_noabort+0x20/0x30
[   18.829161]  kmalloc_oob_right+0x5d0/0x660
[   18.829305]  kunit_try_run_case+0x170/0x3f0
[   18.829424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.829564]  kthread+0x328/0x630
[   18.829683]  ret_from_fork+0x10/0x20
[   18.829816] 
[   18.829866] Allocated by task 136:
[   18.829943]  kasan_save_stack+0x3c/0x68
[   18.830058]  kasan_save_track+0x20/0x40
[   18.830153]  kasan_save_alloc_info+0x40/0x58
[   18.830255]  __kasan_kmalloc+0xd4/0xd8
[   18.830822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.831043]  kmalloc_oob_right+0xb0/0x660
[   18.831140]  kunit_try_run_case+0x170/0x3f0
[   18.831227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.831410]  kthread+0x328/0x630
[   18.831613]  ret_from_fork+0x10/0x20
[   18.832143] 
[   18.832195] The buggy address belongs to the object at fff00000c1807f00
[   18.832195]  which belongs to the cache kmalloc-128 of size 128
[   18.832585] The buggy address is located 13 bytes to the right of
[   18.832585]  allocated 115-byte region [fff00000c1807f00, fff00000c1807f73)
[   18.832960] 
[   18.833114] The buggy address belongs to the physical page:
[   18.833197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807
[   18.833348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.833803] page_type: f5(slab)
[   18.834070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.834210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.834316] page dumped because: kasan: bad access detected
[   18.834737] 
[   18.834810] Memory state around the buggy address:
[   18.835065]  fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.835353]  fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.835711] >fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.835884]                    ^
[   18.836117]  fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.836238]  fff00000c1808080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.836332] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  101.734044] WARNING: CPU: 0 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  101.735266] Modules linked in:
[  101.735630] CPU: 0 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[  101.737426] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  101.737864] Hardware name: linux,dummy-virt (DT)
[  101.738215] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  101.739069] pc : intlog10+0x38/0x48
[  101.739434] lr : intlog10_test+0xe4/0x200
[  101.739898] sp : ffff800082467c10
[  101.740299] x29: ffff800082467c90 x28: 0000000000000000 x27: 0000000000000000
[  101.740878] x26: 1ffe000019671d21 x25: 0000000000000000 x24: ffff800082467ce0
[  101.741748] x23: ffff800082467d00 x22: 0000000000000000 x21: 1ffff0001048cf82
[  101.742422] x20: ffff99d6c6e66fc0 x19: ffff800080087990 x18: 00000000334f0ef9
[  101.743373] x17: fff0662a116dc000 x16: ffff800080000000 x15: 000000003eb6c79f
[  101.744032] x14: 000000006bc3d84f x13: fff00000c09d4800 x12: ffff733ad959f181
[  101.745140] x11: 1ffff33ad959f180 x10: ffff733ad959f180 x9 : ffff99d6c441e13c
[  101.745896] x8 : ffff99d6cacf8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  101.746909] x5 : ffff70001048cf82 x4 : 1ffff00010010f3a x3 : 1ffff33ad8dccdf8
[  101.747767] x2 : 1ffff33ad8dccdf8 x1 : 0000000000000003 x0 : 0000000000000000
[  101.748562] Call trace:
[  101.748960]  intlog10+0x38/0x48 (P)
[  101.749535]  kunit_try_run_case+0x170/0x3f0
[  101.749963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.750589]  kthread+0x328/0x630
[  101.751027]  ret_from_fork+0x10/0x20
[  101.751424] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  101.645724] WARNING: CPU: 0 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  101.647690] Modules linked in:
[  101.648212] CPU: 0 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[  101.648776] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  101.649689] Hardware name: linux,dummy-virt (DT)
[  101.650223] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  101.651338] pc : intlog2+0xd8/0xf8
[  101.652024] lr : intlog2_test+0xe4/0x200
[  101.652604] sp : ffff8000823a7c10
[  101.653265] x29: ffff8000823a7c90 x28: 0000000000000000 x27: 0000000000000000
[  101.654177] x26: 1ffe00001961ad21 x25: 0000000000000000 x24: ffff8000823a7ce0
[  101.655418] x23: ffff8000823a7d00 x22: 0000000000000000 x21: 1ffff00010474f82
[  101.656157] x20: ffff99d6c6e66ec0 x19: ffff800080087990 x18: fff00000c1217c98
[  101.656898] x17: 00000000fc82b209 x16: fff00000c097583c x15: fff00000ff616b08
[  101.657675] x14: 0000000000018fff x13: 1ffe00001b48f3c5 x12: ffff733ad959f181
[  101.658905] x11: 1ffff33ad959f180 x10: ffff733ad959f180 x9 : ffff99d6c441e33c
[  101.659565] x8 : ffff99d6cacf8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  101.660301] x5 : ffff700010474f82 x4 : 1ffff00010010f3a x3 : 1ffff33ad8dccdd8
[  101.660963] x2 : 1ffff33ad8dccdd8 x1 : 0000000000000003 x0 : 0000000000000000
[  101.661598] Call trace:
[  101.661831]  intlog2+0xd8/0xf8 (P)
[  101.662338]  kunit_try_run_case+0x170/0x3f0
[  101.663211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.663704]  kthread+0x328/0x630
[  101.664070]  ret_from_fork+0x10/0x20
[  101.664620] ---[ end trace 0000000000000000 ]---