Hay
Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-boot - oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti KNOWN ISSUE - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti: Failure
[  118.311516] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[   16.017860] ==================================================================
[   16.018378] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.019161] Free of addr ffff888103c60001 by task kunit_try_catch/261
[   16.019512] 
[   16.019697] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.019810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.019837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.019887] Call Trace:
[   16.019913]  <TASK>
[   16.019948]  dump_stack_lvl+0x73/0xb0
[   16.020004]  print_report+0xd1/0x650
[   16.020044]  ? __virt_addr_valid+0x1db/0x2d0
[   16.020433]  ? kasan_addr_to_slab+0x11/0xa0
[   16.020470]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.020606]  kasan_report_invalid_free+0x10a/0x130
[   16.020636]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.020665]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.020689]  __kasan_mempool_poison_object+0x102/0x1d0
[   16.020714]  mempool_free+0x2ec/0x380
[   16.020738]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.020763]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   16.020791]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.020813]  ? finish_task_switch.isra.0+0x153/0x700
[   16.020839]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   16.020863]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   16.020890]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.020908]  ? __pfx_mempool_kfree+0x10/0x10
[   16.020929]  ? __pfx_read_tsc+0x10/0x10
[   16.020950]  ? ktime_get_ts64+0x86/0x230
[   16.020971]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.020997]  kunit_try_run_case+0x1a5/0x480
[   16.021022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.021045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.021068]  ? __kthread_parkme+0x82/0x180
[   16.021089]  ? preempt_count_sub+0x50/0x80
[   16.021110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.021133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.021154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.021176]  kthread+0x337/0x6f0
[   16.021195]  ? trace_preempt_on+0x20/0xc0
[   16.021217]  ? __pfx_kthread+0x10/0x10
[   16.021258]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.021280]  ? calculate_sigpending+0x7b/0xa0
[   16.021304]  ? __pfx_kthread+0x10/0x10
[   16.021326]  ret_from_fork+0x116/0x1d0
[   16.021344]  ? __pfx_kthread+0x10/0x10
[   16.021364]  ret_from_fork_asm+0x1a/0x30
[   16.021396]  </TASK>
[   16.021409] 
[   16.034603] The buggy address belongs to the physical page:
[   16.035138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c60
[   16.035751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.036097] flags: 0x200000000000040(head|node=0|zone=2)
[   16.036416] page_type: f8(unknown)
[   16.036704] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.036967] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.037506] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.037911] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.038318] head: 0200000000000002 ffffea00040f1801 00000000ffffffff 00000000ffffffff
[   16.038692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.039040] page dumped because: kasan: bad access detected
[   16.039640] 
[   16.039817] Memory state around the buggy address:
[   16.040147]  ffff888103c5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.040388]  ffff888103c5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.041010] >ffff888103c60000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.041274]                    ^
[   16.041664]  ffff888103c60080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.042101]  ffff888103c60100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.042677] ==================================================================
[   15.983067] ==================================================================
[   15.983563] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.984494] Free of addr ffff88810231aa01 by task kunit_try_catch/259
[   15.984727] 
[   15.984875] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.985175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.985205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.985262] Call Trace:
[   15.985292]  <TASK>
[   15.985328]  dump_stack_lvl+0x73/0xb0
[   15.985394]  print_report+0xd1/0x650
[   15.985445]  ? __virt_addr_valid+0x1db/0x2d0
[   15.985495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.985537]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.985577]  kasan_report_invalid_free+0x10a/0x130
[   15.985617]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.985660]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.985697]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.985730]  check_slab_allocation+0x11f/0x130
[   15.985752]  __kasan_mempool_poison_object+0x91/0x1d0
[   15.985776]  mempool_free+0x2ec/0x380
[   15.985801]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.985825]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.985851]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.985874]  ? finish_task_switch.isra.0+0x153/0x700
[   15.985899]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.985922]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   15.985947]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.985966]  ? __pfx_mempool_kfree+0x10/0x10
[   15.985987]  ? __pfx_read_tsc+0x10/0x10
[   15.986007]  ? ktime_get_ts64+0x86/0x230
[   15.986031]  kunit_try_run_case+0x1a5/0x480
[   15.986055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.986076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.986099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.986121]  ? __kthread_parkme+0x82/0x180
[   15.986141]  ? preempt_count_sub+0x50/0x80
[   15.986164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.986186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.986208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.986252]  kthread+0x337/0x6f0
[   15.986273]  ? trace_preempt_on+0x20/0xc0
[   15.986297]  ? __pfx_kthread+0x10/0x10
[   15.986318]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.986349]  ? calculate_sigpending+0x7b/0xa0
[   15.986376]  ? __pfx_kthread+0x10/0x10
[   15.986397]  ret_from_fork+0x116/0x1d0
[   15.986416]  ? __pfx_kthread+0x10/0x10
[   15.986436]  ret_from_fork_asm+0x1a/0x30
[   15.986483]  </TASK>
[   15.986503] 
[   15.998698] Allocated by task 259:
[   15.998900]  kasan_save_stack+0x45/0x70
[   15.999214]  kasan_save_track+0x18/0x40
[   15.999522]  kasan_save_alloc_info+0x3b/0x50
[   15.999799]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.000011]  remove_element+0x11e/0x190
[   16.000187]  mempool_alloc_preallocated+0x4d/0x90
[   16.000395]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   16.000606]  mempool_kmalloc_invalid_free+0xed/0x140
[   16.001204]  kunit_try_run_case+0x1a5/0x480
[   16.001655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.002273]  kthread+0x337/0x6f0
[   16.002769]  ret_from_fork+0x116/0x1d0
[   16.003128]  ret_from_fork_asm+0x1a/0x30
[   16.003452] 
[   16.003620] The buggy address belongs to the object at ffff88810231aa00
[   16.003620]  which belongs to the cache kmalloc-128 of size 128
[   16.004308] The buggy address is located 1 bytes inside of
[   16.004308]  128-byte region [ffff88810231aa00, ffff88810231aa80)
[   16.004653] 
[   16.004759] The buggy address belongs to the physical page:
[   16.004955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a
[   16.005228] flags: 0x200000000000000(node=0|zone=2)
[   16.005570] page_type: f5(slab)
[   16.006017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.006961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.007636] page dumped because: kasan: bad access detected
[   16.008090] 
[   16.008322] Memory state around the buggy address:
[   16.008904]  ffff88810231a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.009461]  ffff88810231a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009960] >ffff88810231aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.010207]                    ^
[   16.010487]  ffff88810231aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.010931]  ffff88810231ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.011173] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init: Failure
------------[ cut here ]------------
[  161.155084] WARNING: CPU: 0 PID: 2556 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300
[  161.155993] Modules linked in:
[  161.156455] CPU: 0 UID: 0 PID: 2556 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  161.157379] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.158779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  161.159164] RIP: 0010:drm_framebuffer_init+0x44/0x300
[  161.159594] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41
[  161.161406] RSP: 0000:ffff888105a77b30 EFLAGS: 00010246
[  161.161768] RAX: dffffc0000000000 RBX: ffff888105a77c28 RCX: 0000000000000000
[  161.162046] RDX: 1ffff11020b4ef8e RSI: ffff888105a77c28 RDI: ffff888105a77c70
[  161.162658] RBP: ffff888105a77b70 R08: ffff888105933000 R09: ffffffffa87d64c0
[  161.163427] R10: 0000000000000003 R11: 00000000e340e1ad R12: ffff888105933000
[  161.164415] R13: ffff88810039fae8 R14: ffff888105a77ba8 R15: 0000000000000000
[  161.164913] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  161.165379] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.165998] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  161.166314] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  161.167118] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  161.167809] Call Trace:
[  161.168049]  <TASK>
[  161.168247]  ? add_dr+0xc1/0x1d0
[  161.169063]  drm_test_framebuffer_init_bad_format+0xfc/0x240
[  161.169797]  ? add_dr+0x148/0x1d0
[  161.170020]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  161.170703]  ? __drmm_add_action+0x1a4/0x280
[  161.170987]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  161.171286]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  161.172103]  ? __drmm_add_action_or_reset+0x22/0x50
[  161.172464]  ? __schedule+0x10cc/0x2b60
[  161.173014]  ? __pfx_read_tsc+0x10/0x10
[  161.173210]  ? ktime_get_ts64+0x86/0x230
[  161.173658]  kunit_try_run_case+0x1a5/0x480
[  161.174084]  ? __pfx_kunit_try_run_case+0x10/0x10
[  161.174399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  161.174984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  161.175303]  ? __kthread_parkme+0x82/0x180
[  161.175968]  ? preempt_count_sub+0x50/0x80
[  161.176286]  ? __pfx_kunit_try_run_case+0x10/0x10
[  161.176518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  161.176774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  161.177357]  kthread+0x337/0x6f0
[  161.177721]  ? trace_preempt_on+0x20/0xc0
[  161.178203]  ? __pfx_kthread+0x10/0x10
[  161.178827]  ? _raw_spin_unlock_irq+0x47/0x80
[  161.179226]  ? calculate_sigpending+0x7b/0xa0
[  161.180631]  ? __pfx_kthread+0x10/0x10
[  161.180936]  ret_from_fork+0x116/0x1d0
[  161.181121]  ? __pfx_kthread+0x10/0x10
[  161.181721]  ret_from_fork_asm+0x1a/0x30
[  161.182172]  </TASK>
[  161.182401] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[   52.323997] ==================================================================
[   52.324412] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0
[   52.324412] 
[   52.325081] Use-after-free read at 0x(____ptrval____) (in kfence-#168):
[   52.325324]  test_krealloc+0x6fc/0xbe0
[   52.325599]  kunit_try_run_case+0x1a5/0x480
[   52.325836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.326027]  kthread+0x337/0x6f0
[   52.326193]  ret_from_fork+0x116/0x1d0
[   52.326378]  ret_from_fork_asm+0x1a/0x30
[   52.326734] 
[   52.326916] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.326916] 
[   52.327387] allocated by task 355 on cpu 1 at 52.323089s (0.004294s ago):
[   52.328467]  test_alloc+0x364/0x10f0
[   52.328909]  test_krealloc+0xad/0xbe0
[   52.329093]  kunit_try_run_case+0x1a5/0x480
[   52.329307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.329782]  kthread+0x337/0x6f0
[   52.330053]  ret_from_fork+0x116/0x1d0
[   52.330278]  ret_from_fork_asm+0x1a/0x30
[   52.330469] 
[   52.330583] freed by task 355 on cpu 1 at 52.323438s (0.007140s ago):
[   52.331440]  krealloc_noprof+0x108/0x340
[   52.331805]  test_krealloc+0x226/0xbe0
[   52.332105]  kunit_try_run_case+0x1a5/0x480
[   52.332397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.332883]  kthread+0x337/0x6f0
[   52.333274]  ret_from_fork+0x116/0x1d0
[   52.333528]  ret_from_fork_asm+0x1a/0x30
[   52.333771] 
[   52.333967] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   52.334384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.334560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.335262] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[   19.667262] ==================================================================
[   19.667605] BUG: KFENCE: invalid free in test_double_free+0x112/0x260
[   19.667605] 
[   19.667802] Invalid free of 0x(____ptrval____) (in kfence-#90):
[   19.667922]  test_double_free+0x112/0x260
[   19.668091]  kunit_try_run_case+0x1a5/0x480
[   19.668353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.668658]  kthread+0x337/0x6f0
[   19.668848]  ret_from_fork+0x116/0x1d0
[   19.669059]  ret_from_fork_asm+0x1a/0x30
[   19.669359] 
[   19.669455] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   19.669455] 
[   19.669691] allocated by task 323 on cpu 1 at 19.667063s (0.002625s ago):
[   19.669881]  test_alloc+0x2a6/0x10f0
[   19.669971]  test_double_free+0xdb/0x260
[   19.670061]  kunit_try_run_case+0x1a5/0x480
[   19.670150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.670266]  kthread+0x337/0x6f0
[   19.670363]  ret_from_fork+0x116/0x1d0
[   19.670456]  ret_from_fork_asm+0x1a/0x30
[   19.670549] 
[   19.670606] freed by task 323 on cpu 1 at 19.667114s (0.003488s ago):
[   19.670738]  test_double_free+0xfa/0x260
[   19.670829]  kunit_try_run_case+0x1a5/0x480
[   19.670920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.671192]  kthread+0x337/0x6f0
[   19.671364]  ret_from_fork+0x116/0x1d0
[   19.671544]  ret_from_fork_asm+0x1a/0x30
[   19.671775] 
[   19.671905] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.672402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.672592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.673029] ==================================================================
[   19.563424] ==================================================================
[   19.563930] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260
[   19.563930] 
[   19.564129] Invalid free of 0x(____ptrval____) (in kfence-#89):
[   19.564415]  test_double_free+0x1d3/0x260
[   19.564646]  kunit_try_run_case+0x1a5/0x480
[   19.564798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.564921]  kthread+0x337/0x6f0
[   19.565012]  ret_from_fork+0x116/0x1d0
[   19.565195]  ret_from_fork_asm+0x1a/0x30
[   19.566272] 
[   19.566376] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   19.566376] 
[   19.566792] allocated by task 321 on cpu 0 at 19.563068s (0.003717s ago):
[   19.567117]  test_alloc+0x364/0x10f0
[   19.567338]  test_double_free+0xdb/0x260
[   19.567496]  kunit_try_run_case+0x1a5/0x480
[   19.567673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.567890]  kthread+0x337/0x6f0
[   19.568065]  ret_from_fork+0x116/0x1d0
[   19.568215]  ret_from_fork_asm+0x1a/0x30
[   19.568401] 
[   19.568489] freed by task 321 on cpu 0 at 19.563167s (0.005318s ago):
[   19.568740]  test_double_free+0x1e0/0x260
[   19.568961]  kunit_try_run_case+0x1a5/0x480
[   19.569195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.569364]  kthread+0x337/0x6f0
[   19.569543]  ret_from_fork+0x116/0x1d0
[   19.569728]  ret_from_fork_asm+0x1a/0x30
[   19.569928] 
[   19.570120] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.570500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.570735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.571074] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[   52.239776] ==================================================================
[   52.240350] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670
[   52.240350] 
[   52.240927] Use-after-free read at 0x(____ptrval____) (in kfence-#167):
[   52.241172]  test_memcache_typesafe_by_rcu+0x2ec/0x670
[   52.241398]  kunit_try_run_case+0x1a5/0x480
[   52.241593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.241797]  kthread+0x337/0x6f0
[   52.242049]  ret_from_fork+0x116/0x1d0
[   52.242405]  ret_from_fork_asm+0x1a/0x30
[   52.242733] 
[   52.242905] kfence-#167: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   52.242905] 
[   52.243531] allocated by task 353 on cpu 0 at 52.218933s (0.024593s ago):
[   52.244012]  test_alloc+0x2a6/0x10f0
[   52.244299]  test_memcache_typesafe_by_rcu+0x16f/0x670
[   52.244542]  kunit_try_run_case+0x1a5/0x480
[   52.244866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.245241]  kthread+0x337/0x6f0
[   52.245522]  ret_from_fork+0x116/0x1d0
[   52.245818]  ret_from_fork_asm+0x1a/0x30
[   52.246042] 
[   52.246153] freed by task 353 on cpu 0 at 52.219080s (0.027069s ago):
[   52.246638]  test_memcache_typesafe_by_rcu+0x1bf/0x670
[   52.246991]  kunit_try_run_case+0x1a5/0x480
[   52.247222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.247589]  kthread+0x337/0x6f0
[   52.247775]  ret_from_fork+0x116/0x1d0
[   52.248083]  ret_from_fork_asm+0x1a/0x30
[   52.248387] 
[   52.248630] CPU: 0 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   52.249298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.249524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.250086] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[   27.275141] ==================================================================
[   27.275721] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210
[   27.275721] 
[   27.276078] Invalid read at 0x(____ptrval____):
[   27.276393]  test_invalid_access+0xf0/0x210
[   27.276626]  kunit_try_run_case+0x1a5/0x480
[   27.276776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.277017]  kthread+0x337/0x6f0
[   27.277171]  ret_from_fork+0x116/0x1d0
[   27.277285]  ret_from_fork_asm+0x1a/0x30
[   27.277409] 
[   27.277498] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   27.277728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.277839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.278006] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[   27.051369] ==================================================================
[   27.051711] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.051711] 
[   27.051918] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#161):
[   27.052490]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.052709]  kunit_try_run_case+0x1a5/0x480
[   27.052908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.053138]  kthread+0x337/0x6f0
[   27.053310]  ret_from_fork+0x116/0x1d0
[   27.053401]  ret_from_fork_asm+0x1a/0x30
[   27.053492] 
[   27.053547] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   27.053547] 
[   27.053708] allocated by task 343 on cpu 1 at 27.051035s (0.002671s ago):
[   27.053965]  test_alloc+0x364/0x10f0
[   27.054152]  test_kmalloc_aligned_oob_write+0xc8/0x340
[   27.054409]  kunit_try_run_case+0x1a5/0x480
[   27.054594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.054802]  kthread+0x337/0x6f0
[   27.054958]  ret_from_fork+0x116/0x1d0
[   27.055118]  ret_from_fork_asm+0x1a/0x30
[   27.055269] 
[   27.055333] freed by task 343 on cpu 1 at 27.051205s (0.004124s ago):
[   27.055529]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.055716]  kunit_try_run_case+0x1a5/0x480
[   27.055810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.055913]  kthread+0x337/0x6f0
[   27.055989]  ret_from_fork+0x116/0x1d0
[   27.056069]  ret_from_fork_asm+0x1a/0x30
[   27.056276] 
[   27.056398] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   27.056826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.056998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.057395] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[   26.843265] ==================================================================
[   26.843607] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560
[   26.843607] 
[   26.844134] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#159):
[   26.844287]  test_kmalloc_aligned_oob_read+0x27e/0x560
[   26.844401]  kunit_try_run_case+0x1a5/0x480
[   26.844500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.844727]  kthread+0x337/0x6f0
[   26.844938]  ret_from_fork+0x116/0x1d0
[   26.845127]  ret_from_fork_asm+0x1a/0x30
[   26.845763] 
[   26.846157] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   26.846157] 
[   26.846533] allocated by task 341 on cpu 0 at 26.842986s (0.003544s ago):
[   26.846774]  test_alloc+0x364/0x10f0
[   26.846955]  test_kmalloc_aligned_oob_read+0x105/0x560
[   26.847129]  kunit_try_run_case+0x1a5/0x480
[   26.847277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.847455]  kthread+0x337/0x6f0
[   26.847542]  ret_from_fork+0x116/0x1d0
[   26.847630]  ret_from_fork_asm+0x1a/0x30
[   26.847722] 
[   26.847804] CPU: 0 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   26.848016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.848239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.848648] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[   22.683250] ==================================================================
[   22.683681] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0
[   22.683681] 
[   22.683931] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#119):
[   22.684524]  test_corruption+0x216/0x3e0
[   22.684786]  kunit_try_run_case+0x1a5/0x480
[   22.684980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.685153]  kthread+0x337/0x6f0
[   22.685325]  ret_from_fork+0x116/0x1d0
[   22.685500]  ret_from_fork_asm+0x1a/0x30
[   22.685775] 
[   22.685935] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   22.685935] 
[   22.686566] allocated by task 331 on cpu 0 at 22.683058s (0.003503s ago):
[   22.687036]  test_alloc+0x2a6/0x10f0
[   22.687307]  test_corruption+0x1cb/0x3e0
[   22.687492]  kunit_try_run_case+0x1a5/0x480
[   22.687681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.688045]  kthread+0x337/0x6f0
[   22.688321]  ret_from_fork+0x116/0x1d0
[   22.688610]  ret_from_fork_asm+0x1a/0x30
[   22.688918] 
[   22.689077] freed by task 331 on cpu 0 at 22.683114s (0.005959s ago):
[   22.689495]  test_corruption+0x216/0x3e0
[   22.689680]  kunit_try_run_case+0x1a5/0x480
[   22.689875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.690238]  kthread+0x337/0x6f0
[   22.690523]  ret_from_fork+0x116/0x1d0
[   22.690808]  ret_from_fork_asm+0x1a/0x30
[   22.691119] 
[   22.691327] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   22.692023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.692259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.692590] ==================================================================
[   22.475282] ==================================================================
[   22.475724] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0
[   22.475724] 
[   22.475967] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#117):
[   22.476912]  test_corruption+0x131/0x3e0
[   22.477237]  kunit_try_run_case+0x1a5/0x480
[   22.477448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.477661]  kthread+0x337/0x6f0
[   22.477926]  ret_from_fork+0x116/0x1d0
[   22.478201]  ret_from_fork_asm+0x1a/0x30
[   22.478504] 
[   22.478639] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   22.478639] 
[   22.478995] allocated by task 331 on cpu 0 at 22.475065s (0.003926s ago):
[   22.479264]  test_alloc+0x2a6/0x10f0
[   22.479537]  test_corruption+0xe6/0x3e0
[   22.479814]  kunit_try_run_case+0x1a5/0x480
[   22.480129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.480354]  kthread+0x337/0x6f0
[   22.480525]  ret_from_fork+0x116/0x1d0
[   22.480693]  ret_from_fork_asm+0x1a/0x30
[   22.481001] 
[   22.481155] freed by task 331 on cpu 0 at 22.475154s (0.005996s ago):
[   22.481632]  test_corruption+0x131/0x3e0
[   22.481932]  kunit_try_run_case+0x1a5/0x480
[   22.482262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.482532]  kthread+0x337/0x6f0
[   22.482695]  ret_from_fork+0x116/0x1d0
[   22.482870]  ret_from_fork_asm+0x1a/0x30
[   22.483171] 
[   22.483474] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   22.484233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.484491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.484906] ==================================================================
[   21.123444] ==================================================================
[   21.123857] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0
[   21.123857] 
[   21.124091] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#104):
[   21.124670]  test_corruption+0x2df/0x3e0
[   21.124997]  kunit_try_run_case+0x1a5/0x480
[   21.125562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.125819]  kthread+0x337/0x6f0
[   21.126455]  ret_from_fork+0x116/0x1d0
[   21.126834]  ret_from_fork_asm+0x1a/0x30
[   21.127207] 
[   21.127426] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   21.127426] 
[   21.127995] allocated by task 329 on cpu 0 at 21.123066s (0.004924s ago):
[   21.128492]  test_alloc+0x364/0x10f0
[   21.128767]  test_corruption+0x1cb/0x3e0
[   21.129050]  kunit_try_run_case+0x1a5/0x480
[   21.129315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.129694]  kthread+0x337/0x6f0
[   21.129877]  ret_from_fork+0x116/0x1d0
[   21.130161]  ret_from_fork_asm+0x1a/0x30
[   21.130445] 
[   21.130593] freed by task 329 on cpu 0 at 21.123232s (0.007356s ago):
[   21.130908]  test_corruption+0x2df/0x3e0
[   21.131132]  kunit_try_run_case+0x1a5/0x480
[   21.131414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.131627]  kthread+0x337/0x6f0
[   21.131794]  ret_from_fork+0x116/0x1d0
[   21.131958]  ret_from_fork_asm+0x1a/0x30
[   21.132127] 
[   21.132298] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   21.133065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.133404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.133972] ==================================================================
[   20.603557] ==================================================================
[   20.603967] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0
[   20.603967] 
[   20.604257] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#99):
[   20.605423]  test_corruption+0x2d2/0x3e0
[   20.605755]  kunit_try_run_case+0x1a5/0x480
[   20.605977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.606178]  kthread+0x337/0x6f0
[   20.606518]  ret_from_fork+0x116/0x1d0
[   20.606857]  ret_from_fork_asm+0x1a/0x30
[   20.607177] 
[   20.607375] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   20.607375] 
[   20.607728] allocated by task 329 on cpu 0 at 20.603124s (0.004600s ago):
[   20.608212]  test_alloc+0x364/0x10f0
[   20.608531]  test_corruption+0xe6/0x3e0
[   20.608829]  kunit_try_run_case+0x1a5/0x480
[   20.609074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.609448]  kthread+0x337/0x6f0
[   20.609703]  ret_from_fork+0x116/0x1d0
[   20.609880]  ret_from_fork_asm+0x1a/0x30
[   20.610064] 
[   20.610231] freed by task 329 on cpu 0 at 20.603303s (0.006923s ago):
[   20.610724]  test_corruption+0x2d2/0x3e0
[   20.611050]  kunit_try_run_case+0x1a5/0x480
[   20.611248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.611641]  kthread+0x337/0x6f0
[   20.611833]  ret_from_fork+0x116/0x1d0
[   20.612142]  ret_from_fork_asm+0x1a/0x30
[   20.612331] 
[   20.612566] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   20.613189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.613506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.613874] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[   19.771199] ==================================================================
[   19.771689] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260
[   19.771689] 
[   19.771898] Invalid free of 0x(____ptrval____) (in kfence-#91):
[   19.772131]  test_invalid_addr_free+0x1e1/0x260
[   19.772298]  kunit_try_run_case+0x1a5/0x480
[   19.772427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.772602]  kthread+0x337/0x6f0
[   19.772725]  ret_from_fork+0x116/0x1d0
[   19.772835]  ret_from_fork_asm+0x1a/0x30
[   19.773012] 
[   19.773072] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   19.773072] 
[   19.773264] allocated by task 325 on cpu 1 at 19.771033s (0.002229s ago):
[   19.773422]  test_alloc+0x364/0x10f0
[   19.773515]  test_invalid_addr_free+0xdb/0x260
[   19.773782]  kunit_try_run_case+0x1a5/0x480
[   19.774060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.774398]  kthread+0x337/0x6f0
[   19.774631]  ret_from_fork+0x116/0x1d0
[   19.774900]  ret_from_fork_asm+0x1a/0x30
[   19.775096] 
[   19.775182] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.775409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.775620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.776126] ==================================================================
[   19.875256] ==================================================================
[   19.875709] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260
[   19.875709] 
[   19.875943] Invalid free of 0x(____ptrval____) (in kfence-#92):
[   19.876067]  test_invalid_addr_free+0xfb/0x260
[   19.876168]  kunit_try_run_case+0x1a5/0x480
[   19.876295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.876405]  kthread+0x337/0x6f0
[   19.876488]  ret_from_fork+0x116/0x1d0
[   19.876575]  ret_from_fork_asm+0x1a/0x30
[   19.876663] 
[   19.876745] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   19.876745] 
[   19.877082] allocated by task 327 on cpu 0 at 19.875122s (0.001958s ago):
[   19.877254]  test_alloc+0x2a6/0x10f0
[   19.877345]  test_invalid_addr_free+0xdb/0x260
[   19.877442]  kunit_try_run_case+0x1a5/0x480
[   19.877667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.877939]  kthread+0x337/0x6f0
[   19.878111]  ret_from_fork+0x116/0x1d0
[   19.878314]  ret_from_fork_asm+0x1a/0x30
[   19.878520] 
[   19.878644] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.879048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.879506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[   13.305365] ==================================================================
[   13.306203] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   13.306666] Read of size 1 at addr ffff8881029bd000 by task kunit_try_catch/158
[   13.307215] 
[   13.307448] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.307549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.307575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.307615] Call Trace:
[   13.307643]  <TASK>
[   13.307682]  dump_stack_lvl+0x73/0xb0
[   13.307748]  print_report+0xd1/0x650
[   13.307787]  ? __virt_addr_valid+0x1db/0x2d0
[   13.307827]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.308057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.308100]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.308147]  kasan_report+0x141/0x180
[   13.308438]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.308552]  __asan_report_load1_noabort+0x18/0x20
[   13.308591]  kmalloc_node_oob_right+0x369/0x3c0
[   13.308636]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   13.308662]  ? __schedule+0x10cc/0x2b60
[   13.308687]  ? __pfx_read_tsc+0x10/0x10
[   13.308710]  ? ktime_get_ts64+0x86/0x230
[   13.308736]  kunit_try_run_case+0x1a5/0x480
[   13.308764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.308786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.308809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.308831]  ? __kthread_parkme+0x82/0x180
[   13.308853]  ? preempt_count_sub+0x50/0x80
[   13.308878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.308901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.308923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.308945]  kthread+0x337/0x6f0
[   13.308965]  ? trace_preempt_on+0x20/0xc0
[   13.308989]  ? __pfx_kthread+0x10/0x10
[   13.309009]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.309029]  ? calculate_sigpending+0x7b/0xa0
[   13.309055]  ? __pfx_kthread+0x10/0x10
[   13.309076]  ret_from_fork+0x116/0x1d0
[   13.309094]  ? __pfx_kthread+0x10/0x10
[   13.309115]  ret_from_fork_asm+0x1a/0x30
[   13.309148]  </TASK>
[   13.309161] 
[   13.321505] Allocated by task 158:
[   13.322013]  kasan_save_stack+0x45/0x70
[   13.322641]  kasan_save_track+0x18/0x40
[   13.322940]  kasan_save_alloc_info+0x3b/0x50
[   13.323106]  __kasan_kmalloc+0xb7/0xc0
[   13.323420]  __kmalloc_cache_node_noprof+0x188/0x420
[   13.324018]  kmalloc_node_oob_right+0xab/0x3c0
[   13.324414]  kunit_try_run_case+0x1a5/0x480
[   13.324881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.325118]  kthread+0x337/0x6f0
[   13.325424]  ret_from_fork+0x116/0x1d0
[   13.325872]  ret_from_fork_asm+0x1a/0x30
[   13.326275] 
[   13.326431] The buggy address belongs to the object at ffff8881029bc000
[   13.326431]  which belongs to the cache kmalloc-4k of size 4096
[   13.327406] The buggy address is located 0 bytes to the right of
[   13.327406]  allocated 4096-byte region [ffff8881029bc000, ffff8881029bd000)
[   13.328248] 
[   13.328653] The buggy address belongs to the physical page:
[   13.329123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b8
[   13.330121] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.330504] flags: 0x200000000000040(head|node=0|zone=2)
[   13.330918] page_type: f5(slab)
[   13.331724] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   13.331966] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   13.332206] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   13.333027] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   13.333351] head: 0200000000000003 ffffea00040a6e01 00000000ffffffff 00000000ffffffff
[   13.334019] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   13.334365] page dumped because: kasan: bad access detected
[   13.334645] 
[   13.335202] Memory state around the buggy address:
[   13.335463]  ffff8881029bcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.336032]  ffff8881029bcf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.336248] >ffff8881029bd000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.337245]                    ^
[   13.337440]  ffff8881029bd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.338129]  ffff8881029bd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.338700] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[   13.272285] ==================================================================
[   13.272790] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   13.273448] Read of size 1 at addr ffff8881022a343f by task kunit_try_catch/156
[   13.273784] 
[   13.273999] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.274095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.274120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.274162] Call Trace:
[   13.274190]  <TASK>
[   13.274241]  dump_stack_lvl+0x73/0xb0
[   13.274297]  print_report+0xd1/0x650
[   13.274343]  ? __virt_addr_valid+0x1db/0x2d0
[   13.274383]  ? kmalloc_oob_left+0x361/0x3c0
[   13.274418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.274453]  ? kmalloc_oob_left+0x361/0x3c0
[   13.274499]  kasan_report+0x141/0x180
[   13.274535]  ? kmalloc_oob_left+0x361/0x3c0
[   13.274601]  __asan_report_load1_noabort+0x18/0x20
[   13.274643]  kmalloc_oob_left+0x361/0x3c0
[   13.274687]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   13.274732]  ? __schedule+0x10cc/0x2b60
[   13.274776]  ? __pfx_read_tsc+0x10/0x10
[   13.274818]  ? ktime_get_ts64+0x86/0x230
[   13.274869]  kunit_try_run_case+0x1a5/0x480
[   13.274930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.274964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.275021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.275043]  ? __kthread_parkme+0x82/0x180
[   13.275064]  ? preempt_count_sub+0x50/0x80
[   13.275087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.275109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.275131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.275152]  kthread+0x337/0x6f0
[   13.275170]  ? trace_preempt_on+0x20/0xc0
[   13.275193]  ? __pfx_kthread+0x10/0x10
[   13.275212]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.275247]  ? calculate_sigpending+0x7b/0xa0
[   13.275271]  ? __pfx_kthread+0x10/0x10
[   13.275291]  ret_from_fork+0x116/0x1d0
[   13.275309]  ? __pfx_kthread+0x10/0x10
[   13.275329]  ret_from_fork_asm+0x1a/0x30
[   13.275360]  </TASK>
[   13.275372] 
[   13.285640] Allocated by task 41:
[   13.285953]  kasan_save_stack+0x45/0x70
[   13.286329]  kasan_save_track+0x18/0x40
[   13.286883]  kasan_save_alloc_info+0x3b/0x50
[   13.287267]  __kasan_kmalloc+0xb7/0xc0
[   13.287695]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.287965]  kvasprintf+0xc5/0x150
[   13.288191]  __kthread_create_on_node+0x18b/0x3a0
[   13.288543]  kthread_create_on_node+0xab/0xe0
[   13.288996]  create_worker+0x3e5/0x7b0
[   13.289229]  worker_thread+0x991/0x1320
[   13.289512]  kthread+0x337/0x6f0
[   13.290009]  ret_from_fork+0x116/0x1d0
[   13.290343]  ret_from_fork_asm+0x1a/0x30
[   13.290682] 
[   13.290787] The buggy address belongs to the object at ffff8881022a3420
[   13.290787]  which belongs to the cache kmalloc-16 of size 16
[   13.291420] The buggy address is located 19 bytes to the right of
[   13.291420]  allocated 12-byte region [ffff8881022a3420, ffff8881022a342c)
[   13.292061] 
[   13.292217] The buggy address belongs to the physical page:
[   13.292461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   13.292776] flags: 0x200000000000000(node=0|zone=2)
[   13.293150] page_type: f5(slab)
[   13.293389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.294022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.294288] page dumped because: kasan: bad access detected
[   13.294891] 
[   13.295185] Memory state around the buggy address:
[   13.296171]  ffff8881022a3300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.296757]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.297127] >ffff8881022a3400: 00 05 fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc
[   13.297615]                                         ^
[   13.297990]  ffff8881022a3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.298296]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.299278] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[   13.189834] ==================================================================
[   13.190750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.191714] Write of size 1 at addr ffff8881022f9b73 by task kunit_try_catch/154
[   13.192125] 
[   13.194033] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.194385] Tainted: [N]=TEST
[   13.194425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.194682] Call Trace:
[   13.194761]  <TASK>
[   13.194924]  dump_stack_lvl+0x73/0xb0
[   13.195030]  print_report+0xd1/0x650
[   13.195062]  ? __virt_addr_valid+0x1db/0x2d0
[   13.195089]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.195111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.195132]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.195153]  kasan_report+0x141/0x180
[   13.195175]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.195202]  __asan_report_store1_noabort+0x1b/0x30
[   13.195234]  kmalloc_oob_right+0x6f0/0x7f0
[   13.195258]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.195282]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.195307]  kunit_try_run_case+0x1a5/0x480
[   13.195332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.195353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.195375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.195395]  ? __kthread_parkme+0x82/0x180
[   13.195415]  ? preempt_count_sub+0x50/0x80
[   13.195440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.195460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.195480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.195500]  kthread+0x337/0x6f0
[   13.195518]  ? trace_preempt_on+0x20/0xc0
[   13.195540]  ? __pfx_kthread+0x10/0x10
[   13.195559]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.195579]  ? calculate_sigpending+0x7b/0xa0
[   13.195602]  ? __pfx_kthread+0x10/0x10
[   13.195622]  ret_from_fork+0x116/0x1d0
[   13.195641]  ? __pfx_kthread+0x10/0x10
[   13.195659]  ret_from_fork_asm+0x1a/0x30
[   13.195712]  </TASK>
[   13.195779] 
[   13.203612] Allocated by task 154:
[   13.204091]  kasan_save_stack+0x45/0x70
[   13.204487]  kasan_save_track+0x18/0x40
[   13.204821]  kasan_save_alloc_info+0x3b/0x50
[   13.205144]  __kasan_kmalloc+0xb7/0xc0
[   13.205361]  __kmalloc_cache_noprof+0x189/0x420
[   13.205671]  kmalloc_oob_right+0xa9/0x7f0
[   13.205991]  kunit_try_run_case+0x1a5/0x480
[   13.206275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.206679]  kthread+0x337/0x6f0
[   13.206908]  ret_from_fork+0x116/0x1d0
[   13.207114]  ret_from_fork_asm+0x1a/0x30
[   13.207527] 
[   13.207767] The buggy address belongs to the object at ffff8881022f9b00
[   13.207767]  which belongs to the cache kmalloc-128 of size 128
[   13.208268] The buggy address is located 0 bytes to the right of
[   13.208268]  allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73)
[   13.208714] 
[   13.208945] The buggy address belongs to the physical page:
[   13.209782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   13.210834] flags: 0x200000000000000(node=0|zone=2)
[   13.211893] page_type: f5(slab)
[   13.212731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.213270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.213919] page dumped because: kasan: bad access detected
[   13.214314] 
[   13.214494] Memory state around the buggy address:
[   13.215175]  ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.215760]  ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.216307] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.216825]                                                              ^
[   13.217295]  ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.217571]  ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.218057] ==================================================================
[   13.221209] ==================================================================
[   13.221767] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   13.222052] Write of size 1 at addr ffff8881022f9b78 by task kunit_try_catch/154
[   13.222271] 
[   13.222381] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.222434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.222449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.222470] Call Trace:
[   13.222494]  <TASK>
[   13.222516]  dump_stack_lvl+0x73/0xb0
[   13.222546]  print_report+0xd1/0x650
[   13.222569]  ? __virt_addr_valid+0x1db/0x2d0
[   13.222592]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.222612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.222633]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.222653]  kasan_report+0x141/0x180
[   13.222674]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.222700]  __asan_report_store1_noabort+0x1b/0x30
[   13.222720]  kmalloc_oob_right+0x6bd/0x7f0
[   13.222741]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.222765]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.222790]  kunit_try_run_case+0x1a5/0x480
[   13.222813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.222833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.222855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.222876]  ? __kthread_parkme+0x82/0x180
[   13.222896]  ? preempt_count_sub+0x50/0x80
[   13.222920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.222942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.222963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.222984]  kthread+0x337/0x6f0
[   13.223002]  ? trace_preempt_on+0x20/0xc0
[   13.223025]  ? __pfx_kthread+0x10/0x10
[   13.223045]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.223065]  ? calculate_sigpending+0x7b/0xa0
[   13.223087]  ? __pfx_kthread+0x10/0x10
[   13.223108]  ret_from_fork+0x116/0x1d0
[   13.223127]  ? __pfx_kthread+0x10/0x10
[   13.223146]  ret_from_fork_asm+0x1a/0x30
[   13.223178]  </TASK>
[   13.223189] 
[   13.232304] Allocated by task 154:
[   13.232611]  kasan_save_stack+0x45/0x70
[   13.232959]  kasan_save_track+0x18/0x40
[   13.233189]  kasan_save_alloc_info+0x3b/0x50
[   13.233382]  __kasan_kmalloc+0xb7/0xc0
[   13.233552]  __kmalloc_cache_noprof+0x189/0x420
[   13.233738]  kmalloc_oob_right+0xa9/0x7f0
[   13.233915]  kunit_try_run_case+0x1a5/0x480
[   13.234097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.234512]  kthread+0x337/0x6f0
[   13.234835]  ret_from_fork+0x116/0x1d0
[   13.235167]  ret_from_fork_asm+0x1a/0x30
[   13.235499] 
[   13.235676] The buggy address belongs to the object at ffff8881022f9b00
[   13.235676]  which belongs to the cache kmalloc-128 of size 128
[   13.236550] The buggy address is located 5 bytes to the right of
[   13.236550]  allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73)
[   13.237131] 
[   13.237256] The buggy address belongs to the physical page:
[   13.237465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   13.237735] flags: 0x200000000000000(node=0|zone=2)
[   13.237935] page_type: f5(slab)
[   13.238097] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.238654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.239211] page dumped because: kasan: bad access detected
[   13.239646] 
[   13.239816] Memory state around the buggy address:
[   13.240175]  ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.240533]  ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.240770] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.240996]                                                                 ^
[   13.241231]  ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.241719]  ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.242207] ==================================================================
[   13.243400] ==================================================================
[   13.244001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   13.244277] Read of size 1 at addr ffff8881022f9b80 by task kunit_try_catch/154
[   13.244824] 
[   13.244997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.245086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.245109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.245159] Call Trace:
[   13.245198]  <TASK>
[   13.245257]  dump_stack_lvl+0x73/0xb0
[   13.245315]  print_report+0xd1/0x650
[   13.245365]  ? __virt_addr_valid+0x1db/0x2d0
[   13.245410]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.245464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.245504]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.245545]  kasan_report+0x141/0x180
[   13.245585]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.245636]  __asan_report_load1_noabort+0x18/0x20
[   13.245676]  kmalloc_oob_right+0x68a/0x7f0
[   13.245709]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.245734]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.245758]  kunit_try_run_case+0x1a5/0x480
[   13.245781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.245801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.245823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.245853]  ? __kthread_parkme+0x82/0x180
[   13.245887]  ? preempt_count_sub+0x50/0x80
[   13.245923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.245961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.246001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.246037]  kthread+0x337/0x6f0
[   13.246068]  ? trace_preempt_on+0x20/0xc0
[   13.246107]  ? __pfx_kthread+0x10/0x10
[   13.246144]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.246182]  ? calculate_sigpending+0x7b/0xa0
[   13.246235]  ? __pfx_kthread+0x10/0x10
[   13.246276]  ret_from_fork+0x116/0x1d0
[   13.246309]  ? __pfx_kthread+0x10/0x10
[   13.246354]  ret_from_fork_asm+0x1a/0x30
[   13.246418]  </TASK>
[   13.246439] 
[   13.254806] Allocated by task 154:
[   13.255059]  kasan_save_stack+0x45/0x70
[   13.255419]  kasan_save_track+0x18/0x40
[   13.255640]  kasan_save_alloc_info+0x3b/0x50
[   13.255958]  __kasan_kmalloc+0xb7/0xc0
[   13.256267]  __kmalloc_cache_noprof+0x189/0x420
[   13.256498]  kmalloc_oob_right+0xa9/0x7f0
[   13.256823]  kunit_try_run_case+0x1a5/0x480
[   13.257000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.257198]  kthread+0x337/0x6f0
[   13.257366]  ret_from_fork+0x116/0x1d0
[   13.257584]  ret_from_fork_asm+0x1a/0x30
[   13.257911] 
[   13.258079] The buggy address belongs to the object at ffff8881022f9b00
[   13.258079]  which belongs to the cache kmalloc-128 of size 128
[   13.258908] The buggy address is located 13 bytes to the right of
[   13.258908]  allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73)
[   13.259522] 
[   13.259696] The buggy address belongs to the physical page:
[   13.259944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   13.260453] flags: 0x200000000000000(node=0|zone=2)
[   13.260747] page_type: f5(slab)
[   13.261024] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.261414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.261798] page dumped because: kasan: bad access detected
[   13.262124] 
[   13.262265] Memory state around the buggy address:
[   13.262617]  ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.262895]  ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.263127] >ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.263556]                    ^
[   13.263879]  ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.264357]  ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.264730] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale: Failure
------------[ cut here ]------------
[  162.503325] WARNING: CPU: 0 PID: 2772 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  162.504114] Modules linked in:
[  162.504368] CPU: 0 UID: 0 PID: 2772 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  162.506379] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.507005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  162.507893] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  162.508216] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 c0 03 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  162.509640] RSP: 0000:ffff88810a637c78 EFLAGS: 00010286
[  162.509918] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  162.511040] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffa88312f4
[  162.511438] RBP: ffff88810a637ca0 R08: 0000000000000000 R09: ffffed10212a9360
[  162.512038] R10: ffff888109549b07 R11: 0000000000000000 R12: ffffffffa88312e0
[  162.513128] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a637d38
[  162.514666] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  162.515409] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  162.515681] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  162.515931] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  162.516172] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  162.516431] Call Trace:
[  162.516571]  <TASK>
[  162.516714]  drm_test_rect_calc_vscale+0x108/0x270
[  162.516950]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  162.519016]  ? __schedule+0x10cc/0x2b60
[  162.519869]  ? __pfx_read_tsc+0x10/0x10
[  162.520331]  ? ktime_get_ts64+0x86/0x230
[  162.520761]  kunit_try_run_case+0x1a5/0x480
[  162.521001]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.521414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  162.521842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  162.522126]  ? __kthread_parkme+0x82/0x180
[  162.522756]  ? preempt_count_sub+0x50/0x80
[  162.523871]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.524307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  162.525008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  162.525318]  kthread+0x337/0x6f0
[  162.525747]  ? trace_preempt_on+0x20/0xc0
[  162.526114]  ? __pfx_kthread+0x10/0x10
[  162.526351]  ? _raw_spin_unlock_irq+0x47/0x80
[  162.526917]  ? calculate_sigpending+0x7b/0xa0
[  162.527613]  ? __pfx_kthread+0x10/0x10
[  162.527933]  ret_from_fork+0x116/0x1d0
[  162.528300]  ? __pfx_kthread+0x10/0x10
[  162.528514]  ret_from_fork_asm+0x1a/0x30
[  162.529073]  </TASK>
[  162.529364] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  162.475548] WARNING: CPU: 0 PID: 2770 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  162.476772] Modules linked in:
[  162.477213] CPU: 0 UID: 0 PID: 2770 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  162.478119] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.478630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  162.480014] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  162.480313] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 c0 03 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  162.481718] RSP: 0000:ffff88810a6e7c78 EFLAGS: 00010286
[  162.481888] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  162.482029] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffa88312bc
[  162.482164] RBP: ffff88810a6e7ca0 R08: 0000000000000000 R09: ffffed10212a9320
[  162.482341] R10: ffff888109549907 R11: 0000000000000000 R12: ffffffffa88312a8
[  162.482601] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a6e7d38
[  162.482879] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  162.483502] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  162.483824] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  162.484655] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  162.484931] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  162.486013] Call Trace:
[  162.486353]  <TASK>
[  162.486507]  drm_test_rect_calc_vscale+0x108/0x270
[  162.486912]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  162.487330]  ? __schedule+0x10cc/0x2b60
[  162.487656]  ? __pfx_read_tsc+0x10/0x10
[  162.488602]  ? ktime_get_ts64+0x86/0x230
[  162.488866]  kunit_try_run_case+0x1a5/0x480
[  162.489087]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.489281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  162.489499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  162.490368]  ? __kthread_parkme+0x82/0x180
[  162.491299]  ? preempt_count_sub+0x50/0x80
[  162.491860]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.492243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  162.492627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  162.493047]  kthread+0x337/0x6f0
[  162.493310]  ? trace_preempt_on+0x20/0xc0
[  162.493576]  ? __pfx_kthread+0x10/0x10
[  162.493807]  ? _raw_spin_unlock_irq+0x47/0x80
[  162.494042]  ? calculate_sigpending+0x7b/0xa0
[  162.494611]  ? __pfx_kthread+0x10/0x10
[  162.495221]  ret_from_fork+0x116/0x1d0
[  162.495847]  ? __pfx_kthread+0x10/0x10
[  162.496222]  ret_from_fork_asm+0x1a/0x30
[  162.497164]  </TASK>
[  162.497430] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale: Failure
------------[ cut here ]------------
[  162.427328] WARNING: CPU: 0 PID: 2760 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  162.428762] Modules linked in:
[  162.429311] CPU: 0 UID: 0 PID: 2760 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  162.430231] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.430835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  162.431174] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  162.432079] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  162.433113] RSP: 0000:ffff88810a5bfc78 EFLAGS: 00010286
[  162.433821] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  162.434158] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffa88312f8
[  162.434613] RBP: ffff88810a5bfca0 R08: 0000000000000000 R09: ffffed10212a9260
[  162.435806] R10: ffff888109549307 R11: 0000000000000000 R12: ffffffffa88312e0
[  162.436277] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a5bfd38
[  162.436735] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  162.437127] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  162.437388] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  162.437815] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  162.438420] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  162.438803] Call Trace:
[  162.439723]  <TASK>
[  162.440020]  drm_test_rect_calc_hscale+0x108/0x270
[  162.440359]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  162.441038]  ? __schedule+0x10cc/0x2b60
[  162.441437]  ? __pfx_read_tsc+0x10/0x10
[  162.442041]  ? ktime_get_ts64+0x86/0x230
[  162.442987]  kunit_try_run_case+0x1a5/0x480
[  162.443324]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.443608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  162.443965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  162.444775]  ? __kthread_parkme+0x82/0x180
[  162.445047]  ? preempt_count_sub+0x50/0x80
[  162.445437]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.446069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  162.447079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  162.447661]  kthread+0x337/0x6f0
[  162.448156]  ? trace_preempt_on+0x20/0xc0
[  162.448462]  ? __pfx_kthread+0x10/0x10
[  162.449032]  ? _raw_spin_unlock_irq+0x47/0x80
[  162.449369]  ? calculate_sigpending+0x7b/0xa0
[  162.449884]  ? __pfx_kthread+0x10/0x10
[  162.450372]  ret_from_fork+0x116/0x1d0
[  162.450713]  ? __pfx_kthread+0x10/0x10
[  162.451070]  ret_from_fork_asm+0x1a/0x30
[  162.451466]  </TASK>
[  162.451693] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  162.396275] WARNING: CPU: 1 PID: 2758 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  162.398009] Modules linked in:
[  162.398596] CPU: 1 UID: 0 PID: 2758 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  162.399326] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.399654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  162.400676] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  162.401316] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  162.402496] RSP: 0000:ffff88810a637c78 EFLAGS: 00010286
[  162.402979] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  162.403384] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffa88312c0
[  162.404370] RBP: ffff88810a637ca0 R08: 0000000000000000 R09: ffffed1020cc5f00
[  162.404816] R10: ffff88810662f807 R11: 0000000000000000 R12: ffffffffa88312a8
[  162.405380] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a637d38
[  162.405724] FS:  0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000
[  162.407029] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  162.407498] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  162.408429] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483
[  162.408888] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  162.409608] Call Trace:
[  162.409789]  <TASK>
[  162.409952]  drm_test_rect_calc_hscale+0x108/0x270
[  162.410450]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  162.410760]  ? __schedule+0x10cc/0x2b60
[  162.411629]  ? __pfx_read_tsc+0x10/0x10
[  162.412403]  ? ktime_get_ts64+0x86/0x230
[  162.412949]  kunit_try_run_case+0x1a5/0x480
[  162.413316]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.413904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  162.414194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  162.414885]  ? __kthread_parkme+0x82/0x180
[  162.415193]  ? preempt_count_sub+0x50/0x80
[  162.415424]  ? __pfx_kunit_try_run_case+0x10/0x10
[  162.415737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  162.415960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  162.416273]  kthread+0x337/0x6f0
[  162.416608]  ? trace_preempt_on+0x20/0xc0
[  162.417190]  ? __pfx_kthread+0x10/0x10
[  162.417584]  ? _raw_spin_unlock_irq+0x47/0x80
[  162.418317]  ? calculate_sigpending+0x7b/0xa0
[  162.419101]  ? __pfx_kthread+0x10/0x10
[  162.419700]  ret_from_fork+0x116/0x1d0
[  162.420007]  ? __pfx_kthread+0x10/0x10
[  162.420258]  ret_from_fork_asm+0x1a/0x30
[  162.420680]  </TASK>
[  162.420957] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[   19.251191] ==================================================================
[   19.251602] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   19.251602] 
[   19.251823] Use-after-free read at 0x(____ptrval____) (in kfence-#86):
[   19.252108]  test_use_after_free_read+0x129/0x270
[   19.252238]  kunit_try_run_case+0x1a5/0x480
[   19.252403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.252594]  kthread+0x337/0x6f0
[   19.252687]  ret_from_fork+0x116/0x1d0
[   19.252870]  ret_from_fork_asm+0x1a/0x30
[   19.253112] 
[   19.253250] kfence-#86: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   19.253250] 
[   19.253470] allocated by task 315 on cpu 0 at 19.251042s (0.002425s ago):
[   19.253716]  test_alloc+0x2a6/0x10f0
[   19.253880]  test_use_after_free_read+0xdc/0x270
[   19.253987]  kunit_try_run_case+0x1a5/0x480
[   19.254084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.254256]  kthread+0x337/0x6f0
[   19.254495]  ret_from_fork+0x116/0x1d0
[   19.254705]  ret_from_fork_asm+0x1a/0x30
[   19.254965] 
[   19.255092] freed by task 315 on cpu 0 at 19.251094s (0.003994s ago):
[   19.255332]  test_use_after_free_read+0xfb/0x270
[   19.255494]  kunit_try_run_case+0x1a5/0x480
[   19.255595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.255707]  kthread+0x337/0x6f0
[   19.255925]  ret_from_fork+0x116/0x1d0
[   19.256148]  ret_from_fork_asm+0x1a/0x30
[   19.256374] 
[   19.256517] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.256771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.256867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.257083] ==================================================================
[   19.147373] ==================================================================
[   19.147783] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   19.147783] 
[   19.148026] Use-after-free read at 0x(____ptrval____) (in kfence-#85):
[   19.148246]  test_use_after_free_read+0x129/0x270
[   19.148543]  kunit_try_run_case+0x1a5/0x480
[   19.148651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.148766]  kthread+0x337/0x6f0
[   19.149006]  ret_from_fork+0x116/0x1d0
[   19.149265]  ret_from_fork_asm+0x1a/0x30
[   19.149525] 
[   19.149612] kfence-#85: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   19.149612] 
[   19.149794] allocated by task 313 on cpu 1 at 19.147056s (0.002736s ago):
[   19.150192]  test_alloc+0x364/0x10f0
[   19.150301]  test_use_after_free_read+0xdc/0x270
[   19.150421]  kunit_try_run_case+0x1a5/0x480
[   19.150572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.150867]  kthread+0x337/0x6f0
[   19.151083]  ret_from_fork+0x116/0x1d0
[   19.151354]  ret_from_fork_asm+0x1a/0x30
[   19.151528] 
[   19.151753] freed by task 313 on cpu 1 at 19.147152s (0.004500s ago):
[   19.152166]  test_use_after_free_read+0x1e7/0x270
[   19.152344]  kunit_try_run_case+0x1a5/0x480
[   19.152571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.152778]  kthread+0x337/0x6f0
[   19.152868]  ret_from_fork+0x116/0x1d0
[   19.153102]  ret_from_fork_asm+0x1a/0x30
[   19.153267] 
[   19.153353] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.153843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.153997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.154158] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[   19.043104] ==================================================================
[   19.043443] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   19.043443] 
[   19.043694] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#84):
[   19.043841]  test_out_of_bounds_write+0x10d/0x260
[   19.044136]  kunit_try_run_case+0x1a5/0x480
[   19.044393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.044636]  kthread+0x337/0x6f0
[   19.044735]  ret_from_fork+0x116/0x1d0
[   19.044985]  ret_from_fork_asm+0x1a/0x30
[   19.045206] 
[   19.045278] kfence-#84: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   19.045278] 
[   19.045662] allocated by task 311 on cpu 0 at 19.043032s (0.002627s ago):
[   19.045937]  test_alloc+0x2a6/0x10f0
[   19.046045]  test_out_of_bounds_write+0xd4/0x260
[   19.046206]  kunit_try_run_case+0x1a5/0x480
[   19.046317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.046440]  kthread+0x337/0x6f0
[   19.046660]  ret_from_fork+0x116/0x1d0
[   19.046902]  ret_from_fork_asm+0x1a/0x30
[   19.047150] 
[   19.047294] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   19.047613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.047793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.047948] ==================================================================
[   18.939117] ==================================================================
[   18.939488] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   18.939488] 
[   18.939709] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#83):
[   18.939846]  test_out_of_bounds_write+0x10d/0x260
[   18.940101]  kunit_try_run_case+0x1a5/0x480
[   18.940342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.940590]  kthread+0x337/0x6f0
[   18.940681]  ret_from_fork+0x116/0x1d0
[   18.940770]  ret_from_fork_asm+0x1a/0x30
[   18.940977] 
[   18.941090] kfence-#83: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   18.941090] 
[   18.941468] allocated by task 309 on cpu 1 at 18.938991s (0.002475s ago):
[   18.941612]  test_alloc+0x364/0x10f0
[   18.941813]  test_out_of_bounds_write+0xd4/0x260
[   18.942046]  kunit_try_run_case+0x1a5/0x480
[   18.942249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.942450]  kthread+0x337/0x6f0
[   18.942535]  ret_from_fork+0x116/0x1d0
[   18.942620]  ret_from_fork_asm+0x1a/0x30
[   18.942709] 
[   18.942788] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.943405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.943600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.943947] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[   18.835102] ==================================================================
[   18.835647] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   18.835647] 
[   18.835889] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#82):
[   18.836232]  test_out_of_bounds_read+0x216/0x4e0
[   18.836464]  kunit_try_run_case+0x1a5/0x480
[   18.836637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.836817]  kthread+0x337/0x6f0
[   18.836917]  ret_from_fork+0x116/0x1d0
[   18.837113]  ret_from_fork_asm+0x1a/0x30
[   18.837403] 
[   18.837512] kfence-#82: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   18.837512] 
[   18.837895] allocated by task 307 on cpu 1 at 18.835033s (0.002859s ago):
[   18.838281]  test_alloc+0x2a6/0x10f0
[   18.838576]  test_out_of_bounds_read+0x1e2/0x4e0
[   18.838860]  kunit_try_run_case+0x1a5/0x480
[   18.839089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.839339]  kthread+0x337/0x6f0
[   18.839492]  ret_from_fork+0x116/0x1d0
[   18.839664]  ret_from_fork_asm+0x1a/0x30
[   18.839920] 
[   18.840083] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.840479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.840739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.841048] ==================================================================
[   18.419369] ==================================================================
[   18.419691] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   18.419691] 
[   18.419904] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#78):
[   18.420046]  test_out_of_bounds_read+0x126/0x4e0
[   18.420168]  kunit_try_run_case+0x1a5/0x480
[   18.420317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.420426]  kthread+0x337/0x6f0
[   18.420508]  ret_from_fork+0x116/0x1d0
[   18.420684]  ret_from_fork_asm+0x1a/0x30
[   18.420902] 
[   18.421017] kfence-#78: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   18.421017] 
[   18.421299] allocated by task 307 on cpu 1 at 18.419180s (0.002117s ago):
[   18.421465]  test_alloc+0x2a6/0x10f0
[   18.421552]  test_out_of_bounds_read+0xed/0x4e0
[   18.421801]  kunit_try_run_case+0x1a5/0x480
[   18.422043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.422292]  kthread+0x337/0x6f0
[   18.422448]  ret_from_fork+0x116/0x1d0
[   18.422539]  ret_from_fork_asm+0x1a/0x30
[   18.422633] 
[   18.422718] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.423025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.423258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.423682] ==================================================================
[   18.315144] ==================================================================
[   18.315480] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   18.315480] 
[   18.315732] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#77):
[   18.315877]  test_out_of_bounds_read+0x216/0x4e0
[   18.316131]  kunit_try_run_case+0x1a5/0x480
[   18.316378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.316657]  kthread+0x337/0x6f0
[   18.316756]  ret_from_fork+0x116/0x1d0
[   18.316849]  ret_from_fork_asm+0x1a/0x30
[   18.316968] 
[   18.317089] kfence-#77: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   18.317089] 
[   18.317479] allocated by task 305 on cpu 0 at 18.315003s (0.002474s ago):
[   18.317629]  test_alloc+0x364/0x10f0
[   18.317719]  test_out_of_bounds_read+0x1e2/0x4e0
[   18.317822]  kunit_try_run_case+0x1a5/0x480
[   18.318023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.318294]  kthread+0x337/0x6f0
[   18.318486]  ret_from_fork+0x116/0x1d0
[   18.318687]  ret_from_fork_asm+0x1a/0x30
[   18.318901] 
[   18.319029] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.319494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.319584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.319732] ==================================================================
[   18.212444] ==================================================================
[   18.212830] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   18.212830] 
[   18.213103] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#76):
[   18.213630]  test_out_of_bounds_read+0x126/0x4e0
[   18.213900]  kunit_try_run_case+0x1a5/0x480
[   18.214138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.214261]  kthread+0x337/0x6f0
[   18.214468]  ret_from_fork+0x116/0x1d0
[   18.214701]  ret_from_fork_asm+0x1a/0x30
[   18.214898] 
[   18.215119] kfence-#76: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   18.215119] 
[   18.215699] allocated by task 305 on cpu 0 at 18.210961s (0.004678s ago):
[   18.216234]  test_alloc+0x364/0x10f0
[   18.216475]  test_out_of_bounds_read+0xed/0x4e0
[   18.216624]  kunit_try_run_case+0x1a5/0x480
[   18.216809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.216922]  kthread+0x337/0x6f0
[   18.217006]  ret_from_fork+0x116/0x1d0
[   18.217092]  ret_from_fork_asm+0x1a/0x30
[   18.217240] 
[   18.217368] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.217957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.218170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.218541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[   18.065615] ==================================================================
[   18.065791] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   18.066087] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.066468] 
[   18.066605] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.066658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.066672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.066695] Call Trace:
[   18.066712]  <TASK>
[   18.066729]  dump_stack_lvl+0x73/0xb0
[   18.066758]  print_report+0xd1/0x650
[   18.066783]  ? __virt_addr_valid+0x1db/0x2d0
[   18.066807]  ? strncpy_from_user+0x2e/0x1d0
[   18.066831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.066856]  ? strncpy_from_user+0x2e/0x1d0
[   18.066880]  kasan_report+0x141/0x180
[   18.066904]  ? strncpy_from_user+0x2e/0x1d0
[   18.066934]  kasan_check_range+0x10c/0x1c0
[   18.066959]  __kasan_check_write+0x18/0x20
[   18.066981]  strncpy_from_user+0x2e/0x1d0
[   18.067009]  copy_user_test_oob+0x760/0x10f0
[   18.067036]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.067061]  ? finish_task_switch.isra.0+0x153/0x700
[   18.067083]  ? __switch_to+0x47/0xf50
[   18.067109]  ? __schedule+0x10cc/0x2b60
[   18.067133]  ? __pfx_read_tsc+0x10/0x10
[   18.067155]  ? ktime_get_ts64+0x86/0x230
[   18.067181]  kunit_try_run_case+0x1a5/0x480
[   18.067205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.067238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.067264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.067289]  ? __kthread_parkme+0x82/0x180
[   18.067311]  ? preempt_count_sub+0x50/0x80
[   18.067335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.067360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.067385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.067409]  kthread+0x337/0x6f0
[   18.067430]  ? trace_preempt_on+0x20/0xc0
[   18.067455]  ? __pfx_kthread+0x10/0x10
[   18.067477]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.067499]  ? calculate_sigpending+0x7b/0xa0
[   18.067524]  ? __pfx_kthread+0x10/0x10
[   18.067547]  ret_from_fork+0x116/0x1d0
[   18.067567]  ? __pfx_kthread+0x10/0x10
[   18.067589]  ret_from_fork_asm+0x1a/0x30
[   18.067623]  </TASK>
[   18.067635] 
[   18.074366] Allocated by task 303:
[   18.074453]  kasan_save_stack+0x45/0x70
[   18.074543]  kasan_save_track+0x18/0x40
[   18.074631]  kasan_save_alloc_info+0x3b/0x50
[   18.074719]  __kasan_kmalloc+0xb7/0xc0
[   18.074803]  __kmalloc_noprof+0x1c9/0x500
[   18.075011]  kunit_kmalloc_array+0x25/0x60
[   18.075267]  copy_user_test_oob+0xab/0x10f0
[   18.075527]  kunit_try_run_case+0x1a5/0x480
[   18.075792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.075991]  kthread+0x337/0x6f0
[   18.076073]  ret_from_fork+0x116/0x1d0
[   18.076156]  ret_from_fork_asm+0x1a/0x30
[   18.076254] 
[   18.076371] The buggy address belongs to the object at ffff888102b5b800
[   18.076371]  which belongs to the cache kmalloc-128 of size 128
[   18.076993] The buggy address is located 0 bytes inside of
[   18.076993]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.077302] 
[   18.077402] The buggy address belongs to the physical page:
[   18.077569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.077806] flags: 0x200000000000000(node=0|zone=2)
[   18.077911] page_type: f5(slab)
[   18.077999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.078134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.078273] page dumped because: kasan: bad access detected
[   18.078387] 
[   18.078443] Memory state around the buggy address:
[   18.078540]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.078666]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078791] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.078912]                                                                 ^
[   18.079031]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.079151]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.079332] ==================================================================
[   18.079763] ==================================================================
[   18.079907] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   18.080044] Write of size 1 at addr ffff888102b5b878 by task kunit_try_catch/303
[   18.080176] 
[   18.080254] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.080302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.080315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.080337] Call Trace:
[   18.080351]  <TASK>
[   18.080366]  dump_stack_lvl+0x73/0xb0
[   18.080392]  print_report+0xd1/0x650
[   18.080416]  ? __virt_addr_valid+0x1db/0x2d0
[   18.080439]  ? strncpy_from_user+0x1a5/0x1d0
[   18.080462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.080485]  ? strncpy_from_user+0x1a5/0x1d0
[   18.080508]  kasan_report+0x141/0x180
[   18.080531]  ? strncpy_from_user+0x1a5/0x1d0
[   18.080559]  __asan_report_store1_noabort+0x1b/0x30
[   18.080581]  strncpy_from_user+0x1a5/0x1d0
[   18.080606]  copy_user_test_oob+0x760/0x10f0
[   18.080631]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.080655]  ? finish_task_switch.isra.0+0x153/0x700
[   18.080676]  ? __switch_to+0x47/0xf50
[   18.080700]  ? __schedule+0x10cc/0x2b60
[   18.080723]  ? __pfx_read_tsc+0x10/0x10
[   18.080743]  ? ktime_get_ts64+0x86/0x230
[   18.080767]  kunit_try_run_case+0x1a5/0x480
[   18.080791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.080813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.080836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.080858]  ? __kthread_parkme+0x82/0x180
[   18.080878]  ? preempt_count_sub+0x50/0x80
[   18.080901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.080925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.080948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.080971]  kthread+0x337/0x6f0
[   18.080991]  ? trace_preempt_on+0x20/0xc0
[   18.081014]  ? __pfx_kthread+0x10/0x10
[   18.081062]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.081084]  ? calculate_sigpending+0x7b/0xa0
[   18.081108]  ? __pfx_kthread+0x10/0x10
[   18.081130]  ret_from_fork+0x116/0x1d0
[   18.081149]  ? __pfx_kthread+0x10/0x10
[   18.081170]  ret_from_fork_asm+0x1a/0x30
[   18.081202]  </TASK>
[   18.081213] 
[   18.088191] Allocated by task 303:
[   18.088376]  kasan_save_stack+0x45/0x70
[   18.088512]  kasan_save_track+0x18/0x40
[   18.088682]  kasan_save_alloc_info+0x3b/0x50
[   18.088796]  __kasan_kmalloc+0xb7/0xc0
[   18.088962]  __kmalloc_noprof+0x1c9/0x500
[   18.089130]  kunit_kmalloc_array+0x25/0x60
[   18.089268]  copy_user_test_oob+0xab/0x10f0
[   18.089473]  kunit_try_run_case+0x1a5/0x480
[   18.089619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.089790]  kthread+0x337/0x6f0
[   18.089962]  ret_from_fork+0x116/0x1d0
[   18.090069]  ret_from_fork_asm+0x1a/0x30
[   18.090292] 
[   18.090395] The buggy address belongs to the object at ffff888102b5b800
[   18.090395]  which belongs to the cache kmalloc-128 of size 128
[   18.090660] The buggy address is located 0 bytes to the right of
[   18.090660]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.090988] 
[   18.091108] The buggy address belongs to the physical page:
[   18.091331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.091577] flags: 0x200000000000000(node=0|zone=2)
[   18.091736] page_type: f5(slab)
[   18.091918] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.092186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.092445] page dumped because: kasan: bad access detected
[   18.092634] 
[   18.092686] Memory state around the buggy address:
[   18.092896]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.093040]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093308] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.093542]                                                                 ^
[   18.093727]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093901]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.094023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[   18.021593] ==================================================================
[   18.021844] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   18.022121] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.022624] 
[   18.022703] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.022756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.022770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.022792] Call Trace:
[   18.022812]  <TASK>
[   18.022833]  dump_stack_lvl+0x73/0xb0
[   18.022864]  print_report+0xd1/0x650
[   18.022888]  ? __virt_addr_valid+0x1db/0x2d0
[   18.022912]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.022937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.022961]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.022986]  kasan_report+0x141/0x180
[   18.023010]  ? copy_user_test_oob+0x4aa/0x10f0
[   18.023040]  kasan_check_range+0x10c/0x1c0
[   18.023065]  __kasan_check_read+0x15/0x20
[   18.023087]  copy_user_test_oob+0x4aa/0x10f0
[   18.023114]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.023138]  ? finish_task_switch.isra.0+0x153/0x700
[   18.023161]  ? __switch_to+0x47/0xf50
[   18.023186]  ? __schedule+0x10cc/0x2b60
[   18.023210]  ? __pfx_read_tsc+0x10/0x10
[   18.023244]  ? ktime_get_ts64+0x86/0x230
[   18.023271]  kunit_try_run_case+0x1a5/0x480
[   18.023297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.023320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.023344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.023369]  ? __kthread_parkme+0x82/0x180
[   18.023391]  ? preempt_count_sub+0x50/0x80
[   18.023415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.023439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.023463]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.023487]  kthread+0x337/0x6f0
[   18.023508]  ? trace_preempt_on+0x20/0xc0
[   18.023532]  ? __pfx_kthread+0x10/0x10
[   18.023554]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.023574]  ? calculate_sigpending+0x7b/0xa0
[   18.023599]  ? __pfx_kthread+0x10/0x10
[   18.023621]  ret_from_fork+0x116/0x1d0
[   18.023640]  ? __pfx_kthread+0x10/0x10
[   18.023662]  ret_from_fork_asm+0x1a/0x30
[   18.023694]  </TASK>
[   18.023706] 
[   18.030051] Allocated by task 303:
[   18.030234]  kasan_save_stack+0x45/0x70
[   18.030341]  kasan_save_track+0x18/0x40
[   18.030541]  kasan_save_alloc_info+0x3b/0x50
[   18.030669]  __kasan_kmalloc+0xb7/0xc0
[   18.030805]  __kmalloc_noprof+0x1c9/0x500
[   18.030900]  kunit_kmalloc_array+0x25/0x60
[   18.030993]  copy_user_test_oob+0xab/0x10f0
[   18.031255]  kunit_try_run_case+0x1a5/0x480
[   18.031480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.031683]  kthread+0x337/0x6f0
[   18.031767]  ret_from_fork+0x116/0x1d0
[   18.031851]  ret_from_fork_asm+0x1a/0x30
[   18.032093] 
[   18.032208] The buggy address belongs to the object at ffff888102b5b800
[   18.032208]  which belongs to the cache kmalloc-128 of size 128
[   18.032682] The buggy address is located 0 bytes inside of
[   18.032682]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.032982] 
[   18.033096] The buggy address belongs to the physical page:
[   18.033280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.033424] flags: 0x200000000000000(node=0|zone=2)
[   18.033529] page_type: f5(slab)
[   18.033617] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.033884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.034198] page dumped because: kasan: bad access detected
[   18.034478] 
[   18.034605] Memory state around the buggy address:
[   18.034866]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.034999]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.035131] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.035515]                                                                 ^
[   18.035896]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036147]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036324] ==================================================================
[   18.004793] ==================================================================
[   18.005128] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   18.005396] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.005806] 
[   18.005926] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.005985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.005999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.006022] Call Trace:
[   18.006040]  <TASK>
[   18.006060]  dump_stack_lvl+0x73/0xb0
[   18.006100]  print_report+0xd1/0x650
[   18.006127]  ? __virt_addr_valid+0x1db/0x2d0
[   18.006150]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.006199]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006309]  kasan_report+0x141/0x180
[   18.006362]  ? copy_user_test_oob+0x3fd/0x10f0
[   18.006396]  kasan_check_range+0x10c/0x1c0
[   18.006423]  __kasan_check_write+0x18/0x20
[   18.006447]  copy_user_test_oob+0x3fd/0x10f0
[   18.006475]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.006500]  ? finish_task_switch.isra.0+0x153/0x700
[   18.006526]  ? __switch_to+0x47/0xf50
[   18.006556]  ? __schedule+0x10cc/0x2b60
[   18.006581]  ? __pfx_read_tsc+0x10/0x10
[   18.006604]  ? ktime_get_ts64+0x86/0x230
[   18.006631]  kunit_try_run_case+0x1a5/0x480
[   18.006659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.006684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.006709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.006733]  ? __kthread_parkme+0x82/0x180
[   18.006756]  ? preempt_count_sub+0x50/0x80
[   18.006781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.006806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.006831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.006856]  kthread+0x337/0x6f0
[   18.006877]  ? trace_preempt_on+0x20/0xc0
[   18.006904]  ? __pfx_kthread+0x10/0x10
[   18.006926]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.006949]  ? calculate_sigpending+0x7b/0xa0
[   18.006976]  ? __pfx_kthread+0x10/0x10
[   18.006999]  ret_from_fork+0x116/0x1d0
[   18.007020]  ? __pfx_kthread+0x10/0x10
[   18.007042]  ret_from_fork_asm+0x1a/0x30
[   18.007076]  </TASK>
[   18.007090] 
[   18.012714] Allocated by task 303:
[   18.012960]  kasan_save_stack+0x45/0x70
[   18.013204]  kasan_save_track+0x18/0x40
[   18.014176]  kasan_save_alloc_info+0x3b/0x50
[   18.014635]  __kasan_kmalloc+0xb7/0xc0
[   18.014784]  __kmalloc_noprof+0x1c9/0x500
[   18.014999]  kunit_kmalloc_array+0x25/0x60
[   18.015170]  copy_user_test_oob+0xab/0x10f0
[   18.015352]  kunit_try_run_case+0x1a5/0x480
[   18.015448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.015735]  kthread+0x337/0x6f0
[   18.015931]  ret_from_fork+0x116/0x1d0
[   18.016148]  ret_from_fork_asm+0x1a/0x30
[   18.016296] 
[   18.016356] The buggy address belongs to the object at ffff888102b5b800
[   18.016356]  which belongs to the cache kmalloc-128 of size 128
[   18.016800] The buggy address is located 0 bytes inside of
[   18.016800]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.017274] 
[   18.017409] The buggy address belongs to the physical page:
[   18.017633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.017794] flags: 0x200000000000000(node=0|zone=2)
[   18.018070] page_type: f5(slab)
[   18.018262] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.018431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.018771] page dumped because: kasan: bad access detected
[   18.018879] 
[   18.018933] Memory state around the buggy address:
[   18.019042]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.019410]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019820] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.020131]                                                                 ^
[   18.020369]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020578]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020854] ==================================================================
[   18.050406] ==================================================================
[   18.050572] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   18.050760] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.051061] 
[   18.051200] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.051259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.051273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.051295] Call Trace:
[   18.051311]  <TASK>
[   18.051327]  dump_stack_lvl+0x73/0xb0
[   18.051355]  print_report+0xd1/0x650
[   18.051378]  ? __virt_addr_valid+0x1db/0x2d0
[   18.051402]  ? copy_user_test_oob+0x604/0x10f0
[   18.051426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.051449]  ? copy_user_test_oob+0x604/0x10f0
[   18.051474]  kasan_report+0x141/0x180
[   18.051496]  ? copy_user_test_oob+0x604/0x10f0
[   18.051525]  kasan_check_range+0x10c/0x1c0
[   18.051550]  __kasan_check_read+0x15/0x20
[   18.051571]  copy_user_test_oob+0x604/0x10f0
[   18.051598]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.051620]  ? finish_task_switch.isra.0+0x153/0x700
[   18.051641]  ? __switch_to+0x47/0xf50
[   18.051667]  ? __schedule+0x10cc/0x2b60
[   18.051689]  ? __pfx_read_tsc+0x10/0x10
[   18.051709]  ? ktime_get_ts64+0x86/0x230
[   18.051733]  kunit_try_run_case+0x1a5/0x480
[   18.051757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.051801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.051824]  ? __kthread_parkme+0x82/0x180
[   18.051844]  ? preempt_count_sub+0x50/0x80
[   18.051867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.051913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.051937]  kthread+0x337/0x6f0
[   18.051957]  ? trace_preempt_on+0x20/0xc0
[   18.051981]  ? __pfx_kthread+0x10/0x10
[   18.052002]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.052023]  ? calculate_sigpending+0x7b/0xa0
[   18.052048]  ? __pfx_kthread+0x10/0x10
[   18.052071]  ret_from_fork+0x116/0x1d0
[   18.052091]  ? __pfx_kthread+0x10/0x10
[   18.052112]  ret_from_fork_asm+0x1a/0x30
[   18.052144]  </TASK>
[   18.052156] 
[   18.058683] Allocated by task 303:
[   18.058850]  kasan_save_stack+0x45/0x70
[   18.058997]  kasan_save_track+0x18/0x40
[   18.059154]  kasan_save_alloc_info+0x3b/0x50
[   18.059331]  __kasan_kmalloc+0xb7/0xc0
[   18.059520]  __kmalloc_noprof+0x1c9/0x500
[   18.059664]  kunit_kmalloc_array+0x25/0x60
[   18.059841]  copy_user_test_oob+0xab/0x10f0
[   18.060034]  kunit_try_run_case+0x1a5/0x480
[   18.060127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.060241]  kthread+0x337/0x6f0
[   18.060322]  ret_from_fork+0x116/0x1d0
[   18.060407]  ret_from_fork_asm+0x1a/0x30
[   18.060494] 
[   18.060546] The buggy address belongs to the object at ffff888102b5b800
[   18.060546]  which belongs to the cache kmalloc-128 of size 128
[   18.061171] The buggy address is located 0 bytes inside of
[   18.061171]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.061849] 
[   18.061906] The buggy address belongs to the physical page:
[   18.062009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.062148] flags: 0x200000000000000(node=0|zone=2)
[   18.062260] page_type: f5(slab)
[   18.062351] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.062759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.063069] page dumped because: kasan: bad access detected
[   18.063351] 
[   18.063447] Memory state around the buggy address:
[   18.063701]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063880]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064031] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.064307]                                                                 ^
[   18.064550]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064676]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064846] ==================================================================
[   18.036827] ==================================================================
[   18.037101] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   18.037390] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   18.037665] 
[   18.037756] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   18.037809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.037823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.037845] Call Trace:
[   18.037863]  <TASK>
[   18.037882]  dump_stack_lvl+0x73/0xb0
[   18.037912]  print_report+0xd1/0x650
[   18.037938]  ? __virt_addr_valid+0x1db/0x2d0
[   18.037962]  ? copy_user_test_oob+0x557/0x10f0
[   18.037986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.038011]  ? copy_user_test_oob+0x557/0x10f0
[   18.038037]  kasan_report+0x141/0x180
[   18.038061]  ? copy_user_test_oob+0x557/0x10f0
[   18.038091]  kasan_check_range+0x10c/0x1c0
[   18.038117]  __kasan_check_write+0x18/0x20
[   18.038138]  copy_user_test_oob+0x557/0x10f0
[   18.038166]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.038191]  ? finish_task_switch.isra.0+0x153/0x700
[   18.038214]  ? __switch_to+0x47/0xf50
[   18.038253]  ? __schedule+0x10cc/0x2b60
[   18.038277]  ? __pfx_read_tsc+0x10/0x10
[   18.038298]  ? ktime_get_ts64+0x86/0x230
[   18.038322]  kunit_try_run_case+0x1a5/0x480
[   18.038359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.038387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.038412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.038436]  ? __kthread_parkme+0x82/0x180
[   18.038458]  ? preempt_count_sub+0x50/0x80
[   18.038484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.038509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.038531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.038555]  kthread+0x337/0x6f0
[   18.038577]  ? trace_preempt_on+0x20/0xc0
[   18.038601]  ? __pfx_kthread+0x10/0x10
[   18.038623]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.038645]  ? calculate_sigpending+0x7b/0xa0
[   18.038670]  ? __pfx_kthread+0x10/0x10
[   18.038693]  ret_from_fork+0x116/0x1d0
[   18.038712]  ? __pfx_kthread+0x10/0x10
[   18.038735]  ret_from_fork_asm+0x1a/0x30
[   18.038768]  </TASK>
[   18.038780] 
[   18.043968] Allocated by task 303:
[   18.044064]  kasan_save_stack+0x45/0x70
[   18.044160]  kasan_save_track+0x18/0x40
[   18.044346]  kasan_save_alloc_info+0x3b/0x50
[   18.044599]  __kasan_kmalloc+0xb7/0xc0
[   18.044771]  __kmalloc_noprof+0x1c9/0x500
[   18.044948]  kunit_kmalloc_array+0x25/0x60
[   18.045139]  copy_user_test_oob+0xab/0x10f0
[   18.045382]  kunit_try_run_case+0x1a5/0x480
[   18.045623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.045871]  kthread+0x337/0x6f0
[   18.046031]  ret_from_fork+0x116/0x1d0
[   18.046192]  ret_from_fork_asm+0x1a/0x30
[   18.046294] 
[   18.046358] The buggy address belongs to the object at ffff888102b5b800
[   18.046358]  which belongs to the cache kmalloc-128 of size 128
[   18.046879] The buggy address is located 0 bytes inside of
[   18.046879]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   18.047307] 
[   18.047369] The buggy address belongs to the physical page:
[   18.047476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   18.047911] flags: 0x200000000000000(node=0|zone=2)
[   18.048192] page_type: f5(slab)
[   18.048306] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.048446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.048594] page dumped because: kasan: bad access detected
[   18.048703] 
[   18.048810] Memory state around the buggy address:
[   18.049047]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.049317]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049547] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.049674]                                                                 ^
[   18.049800]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049924]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.050043] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user: Failure
[   17.985791] ==================================================================
[   17.986122] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   17.986379] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   17.986730] 
[   17.986921] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.986986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.987002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.987025] Call Trace:
[   17.987044]  <TASK>
[   17.987065]  dump_stack_lvl+0x73/0xb0
[   17.987107]  print_report+0xd1/0x650
[   17.987134]  ? __virt_addr_valid+0x1db/0x2d0
[   17.987175]  ? _copy_to_user+0x3c/0x70
[   17.987195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.987237]  ? _copy_to_user+0x3c/0x70
[   17.987260]  kasan_report+0x141/0x180
[   17.987285]  ? _copy_to_user+0x3c/0x70
[   17.987309]  kasan_check_range+0x10c/0x1c0
[   17.987335]  __kasan_check_read+0x15/0x20
[   17.987356]  _copy_to_user+0x3c/0x70
[   17.987376]  copy_user_test_oob+0x364/0x10f0
[   17.987416]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.987441]  ? finish_task_switch.isra.0+0x153/0x700
[   17.987478]  ? __switch_to+0x47/0xf50
[   17.987506]  ? __schedule+0x10cc/0x2b60
[   17.987543]  ? __pfx_read_tsc+0x10/0x10
[   17.987569]  ? ktime_get_ts64+0x86/0x230
[   17.987596]  kunit_try_run_case+0x1a5/0x480
[   17.987624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.987647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.987672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.987696]  ? __kthread_parkme+0x82/0x180
[   17.987719]  ? preempt_count_sub+0x50/0x80
[   17.987743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.987768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.987791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.987815]  kthread+0x337/0x6f0
[   17.987836]  ? trace_preempt_on+0x20/0xc0
[   17.987864]  ? __pfx_kthread+0x10/0x10
[   17.987885]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.987907]  ? calculate_sigpending+0x7b/0xa0
[   17.987933]  ? __pfx_kthread+0x10/0x10
[   17.987955]  ret_from_fork+0x116/0x1d0
[   17.987974]  ? __pfx_kthread+0x10/0x10
[   17.987995]  ret_from_fork_asm+0x1a/0x30
[   17.988028]  </TASK>
[   17.988041] 
[   17.993176] Allocated by task 303:
[   17.993271]  kasan_save_stack+0x45/0x70
[   17.993365]  kasan_save_track+0x18/0x40
[   17.993454]  kasan_save_alloc_info+0x3b/0x50
[   17.993542]  __kasan_kmalloc+0xb7/0xc0
[   17.993701]  __kmalloc_noprof+0x1c9/0x500
[   17.993944]  kunit_kmalloc_array+0x25/0x60
[   17.994226]  copy_user_test_oob+0xab/0x10f0
[   17.994491]  kunit_try_run_case+0x1a5/0x480
[   17.994771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.995037]  kthread+0x337/0x6f0
[   17.995121]  ret_from_fork+0x116/0x1d0
[   17.995209]  ret_from_fork_asm+0x1a/0x30
[   17.995312] 
[   17.995366] The buggy address belongs to the object at ffff888102b5b800
[   17.995366]  which belongs to the cache kmalloc-128 of size 128
[   17.995817] The buggy address is located 0 bytes inside of
[   17.995817]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   17.996433] 
[   17.996557] The buggy address belongs to the physical page:
[   17.996748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   17.996997] flags: 0x200000000000000(node=0|zone=2)
[   17.997236] page_type: f5(slab)
[   17.997362] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.997579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.997808] page dumped because: kasan: bad access detected
[   17.998032] 
[   17.998105] Memory state around the buggy address:
[   17.998283]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998470]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.998749] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.998968]                                                                 ^
[   17.999193]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999477]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user: Failure
[   17.967315] ==================================================================
[   17.968019] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90
[   17.968375] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303
[   17.968584] 
[   17.968671] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.968731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.968746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.968772] Call Trace:
[   17.968789]  <TASK>
[   17.968814]  dump_stack_lvl+0x73/0xb0
[   17.968850]  print_report+0xd1/0x650
[   17.968878]  ? __virt_addr_valid+0x1db/0x2d0
[   17.968906]  ? _copy_from_user+0x32/0x90
[   17.968926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.968951]  ? _copy_from_user+0x32/0x90
[   17.968971]  kasan_report+0x141/0x180
[   17.968994]  ? _copy_from_user+0x32/0x90
[   17.969019]  kasan_check_range+0x10c/0x1c0
[   17.969044]  __kasan_check_write+0x18/0x20
[   17.969064]  _copy_from_user+0x32/0x90
[   17.969085]  copy_user_test_oob+0x2be/0x10f0
[   17.969111]  ? __pfx_copy_user_test_oob+0x10/0x10
[   17.969136]  ? finish_task_switch.isra.0+0x153/0x700
[   17.969161]  ? __switch_to+0x47/0xf50
[   17.969191]  ? __schedule+0x10cc/0x2b60
[   17.969214]  ? __pfx_read_tsc+0x10/0x10
[   17.969250]  ? ktime_get_ts64+0x86/0x230
[   17.969277]  kunit_try_run_case+0x1a5/0x480
[   17.969303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.969324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.969349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.969372]  ? __kthread_parkme+0x82/0x180
[   17.969394]  ? preempt_count_sub+0x50/0x80
[   17.969418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.969442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.969465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.969489]  kthread+0x337/0x6f0
[   17.969509]  ? trace_preempt_on+0x20/0xc0
[   17.969536]  ? __pfx_kthread+0x10/0x10
[   17.969557]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.969578]  ? calculate_sigpending+0x7b/0xa0
[   17.969606]  ? __pfx_kthread+0x10/0x10
[   17.969627]  ret_from_fork+0x116/0x1d0
[   17.969647]  ? __pfx_kthread+0x10/0x10
[   17.969667]  ret_from_fork_asm+0x1a/0x30
[   17.969701]  </TASK>
[   17.969715] 
[   17.975347] Allocated by task 303:
[   17.975514]  kasan_save_stack+0x45/0x70
[   17.975693]  kasan_save_track+0x18/0x40
[   17.975838]  kasan_save_alloc_info+0x3b/0x50
[   17.976001]  __kasan_kmalloc+0xb7/0xc0
[   17.976176]  __kmalloc_noprof+0x1c9/0x500
[   17.976352]  kunit_kmalloc_array+0x25/0x60
[   17.976535]  copy_user_test_oob+0xab/0x10f0
[   17.976679]  kunit_try_run_case+0x1a5/0x480
[   17.976835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.977045]  kthread+0x337/0x6f0
[   17.977230]  ret_from_fork+0x116/0x1d0
[   17.977405]  ret_from_fork_asm+0x1a/0x30
[   17.977552] 
[   17.977645] The buggy address belongs to the object at ffff888102b5b800
[   17.977645]  which belongs to the cache kmalloc-128 of size 128
[   17.977973] The buggy address is located 0 bytes inside of
[   17.977973]  allocated 120-byte region [ffff888102b5b800, ffff888102b5b878)
[   17.978170] 
[   17.978235] The buggy address belongs to the physical page:
[   17.978539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   17.979013] flags: 0x200000000000000(node=0|zone=2)
[   17.979168] page_type: f5(slab)
[   17.979276] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.979421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.979848] page dumped because: kasan: bad access detected
[   17.980134] 
[   17.980199] Memory state around the buggy address:
[   17.980310]  ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.980439]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.980565] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.980686]                                                                 ^
[   17.980809]  ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.980932]  ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.981051] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[   17.913727] ==================================================================
[   17.914147] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   17.914614] Read of size 8 at addr ffff888102b5b778 by task kunit_try_catch/299
[   17.915119] 
[   17.915263] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.915325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.915339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.915365] Call Trace:
[   17.915383]  <TASK>
[   17.915406]  dump_stack_lvl+0x73/0xb0
[   17.915441]  print_report+0xd1/0x650
[   17.915604]  ? __virt_addr_valid+0x1db/0x2d0
[   17.915663]  ? copy_to_kernel_nofault+0x225/0x260
[   17.915691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.915755]  ? copy_to_kernel_nofault+0x225/0x260
[   17.915785]  kasan_report+0x141/0x180
[   17.915810]  ? copy_to_kernel_nofault+0x225/0x260
[   17.915850]  __asan_report_load8_noabort+0x18/0x20
[   17.915873]  copy_to_kernel_nofault+0x225/0x260
[   17.915899]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   17.915925]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.915949]  ? finish_task_switch.isra.0+0x153/0x700
[   17.915973]  ? __schedule+0x10cc/0x2b60
[   17.915996]  ? trace_hardirqs_on+0x37/0xe0
[   17.916028]  ? __pfx_read_tsc+0x10/0x10
[   17.916051]  ? ktime_get_ts64+0x86/0x230
[   17.916077]  kunit_try_run_case+0x1a5/0x480
[   17.916105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.916127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.916151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.916173]  ? __kthread_parkme+0x82/0x180
[   17.916194]  ? preempt_count_sub+0x50/0x80
[   17.916217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.916262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.916286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.916309]  kthread+0x337/0x6f0
[   17.916328]  ? trace_preempt_on+0x20/0xc0
[   17.916351]  ? __pfx_kthread+0x10/0x10
[   17.916373]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.916394]  ? calculate_sigpending+0x7b/0xa0
[   17.916421]  ? __pfx_kthread+0x10/0x10
[   17.916443]  ret_from_fork+0x116/0x1d0
[   17.916463]  ? __pfx_kthread+0x10/0x10
[   17.916484]  ret_from_fork_asm+0x1a/0x30
[   17.916520]  </TASK>
[   17.916535] 
[   17.924006] Allocated by task 299:
[   17.924202]  kasan_save_stack+0x45/0x70
[   17.924403]  kasan_save_track+0x18/0x40
[   17.924877]  kasan_save_alloc_info+0x3b/0x50
[   17.925007]  __kasan_kmalloc+0xb7/0xc0
[   17.925290]  __kmalloc_cache_noprof+0x189/0x420
[   17.925435]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.925696]  kunit_try_run_case+0x1a5/0x480
[   17.925850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.926043]  kthread+0x337/0x6f0
[   17.926199]  ret_from_fork+0x116/0x1d0
[   17.926340]  ret_from_fork_asm+0x1a/0x30
[   17.926570] 
[   17.926630] The buggy address belongs to the object at ffff888102b5b700
[   17.926630]  which belongs to the cache kmalloc-128 of size 128
[   17.927032] The buggy address is located 0 bytes to the right of
[   17.927032]  allocated 120-byte region [ffff888102b5b700, ffff888102b5b778)
[   17.927793] 
[   17.927919] The buggy address belongs to the physical page:
[   17.928093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   17.928373] flags: 0x200000000000000(node=0|zone=2)
[   17.928573] page_type: f5(slab)
[   17.928770] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.928998] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.929244] page dumped because: kasan: bad access detected
[   17.929350] 
[   17.929527] Memory state around the buggy address:
[   17.929744]  ffff888102b5b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.929999]  ffff888102b5b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930132] >ffff888102b5b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.930426]                                                                 ^
[   17.930942]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931174]  ffff888102b5b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931365] ==================================================================
[   17.932081] ==================================================================
[   17.932622] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   17.932904] Write of size 8 at addr ffff888102b5b778 by task kunit_try_catch/299
[   17.933064] 
[   17.933145] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.933204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.933218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.933253] Call Trace:
[   17.933269]  <TASK>
[   17.933292]  dump_stack_lvl+0x73/0xb0
[   17.933325]  print_report+0xd1/0x650
[   17.933351]  ? __virt_addr_valid+0x1db/0x2d0
[   17.933378]  ? copy_to_kernel_nofault+0x99/0x260
[   17.933402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.933427]  ? copy_to_kernel_nofault+0x99/0x260
[   17.933533]  kasan_report+0x141/0x180
[   17.933564]  ? copy_to_kernel_nofault+0x99/0x260
[   17.933595]  kasan_check_range+0x10c/0x1c0
[   17.933621]  __kasan_check_write+0x18/0x20
[   17.933642]  copy_to_kernel_nofault+0x99/0x260
[   17.933669]  copy_to_kernel_nofault_oob+0x288/0x560
[   17.933694]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.933719]  ? finish_task_switch.isra.0+0x153/0x700
[   17.933745]  ? __schedule+0x10cc/0x2b60
[   17.933770]  ? trace_hardirqs_on+0x37/0xe0
[   17.933803]  ? __pfx_read_tsc+0x10/0x10
[   17.933825]  ? ktime_get_ts64+0x86/0x230
[   17.933851]  kunit_try_run_case+0x1a5/0x480
[   17.933878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.933900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.933925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.933947]  ? __kthread_parkme+0x82/0x180
[   17.933969]  ? preempt_count_sub+0x50/0x80
[   17.933994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.934019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.934042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.934065]  kthread+0x337/0x6f0
[   17.934085]  ? trace_preempt_on+0x20/0xc0
[   17.934108]  ? __pfx_kthread+0x10/0x10
[   17.934129]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.934150]  ? calculate_sigpending+0x7b/0xa0
[   17.934176]  ? __pfx_kthread+0x10/0x10
[   17.934198]  ret_from_fork+0x116/0x1d0
[   17.934218]  ? __pfx_kthread+0x10/0x10
[   17.934252]  ret_from_fork_asm+0x1a/0x30
[   17.934286]  </TASK>
[   17.934301] 
[   17.942396] Allocated by task 299:
[   17.943010]  kasan_save_stack+0x45/0x70
[   17.943364]  kasan_save_track+0x18/0x40
[   17.943698]  kasan_save_alloc_info+0x3b/0x50
[   17.944315]  __kasan_kmalloc+0xb7/0xc0
[   17.944633]  __kmalloc_cache_noprof+0x189/0x420
[   17.945186]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.945626]  kunit_try_run_case+0x1a5/0x480
[   17.945840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.946048]  kthread+0x337/0x6f0
[   17.946142]  ret_from_fork+0x116/0x1d0
[   17.946373]  ret_from_fork_asm+0x1a/0x30
[   17.946691] 
[   17.947015] The buggy address belongs to the object at ffff888102b5b700
[   17.947015]  which belongs to the cache kmalloc-128 of size 128
[   17.947337] The buggy address is located 0 bytes to the right of
[   17.947337]  allocated 120-byte region [ffff888102b5b700, ffff888102b5b778)
[   17.947668] 
[   17.947775] The buggy address belongs to the physical page:
[   17.948119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   17.948571] flags: 0x200000000000000(node=0|zone=2)
[   17.948707] page_type: f5(slab)
[   17.948857] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.949260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.949399] page dumped because: kasan: bad access detected
[   17.950139] 
[   17.950311] Memory state around the buggy address:
[   17.950650]  ffff888102b5b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.950985]  ffff888102b5b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.951159] >ffff888102b5b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.951346]                                                                 ^
[   17.951791]  ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.952126]  ffff888102b5b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.952383] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[   17.087873] ==================================================================
[   17.088038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   17.088183] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.088329] 
[   17.088541] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.088598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.088613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.088636] Call Trace:
[   17.088654]  <TASK>
[   17.088673]  dump_stack_lvl+0x73/0xb0
[   17.088704]  print_report+0xd1/0x650
[   17.088727]  ? __virt_addr_valid+0x1db/0x2d0
[   17.088753]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.088798]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088819]  kasan_report+0x141/0x180
[   17.088843]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088869]  kasan_check_range+0x10c/0x1c0
[   17.088894]  __kasan_check_write+0x18/0x20
[   17.088915]  kasan_atomics_helper+0xa2b/0x5450
[   17.088938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.088961]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.088983]  ? kasan_atomics+0x152/0x310
[   17.089010]  kasan_atomics+0x1dc/0x310
[   17.089034]  ? __pfx_kasan_atomics+0x10/0x10
[   17.089058]  ? __pfx_read_tsc+0x10/0x10
[   17.089080]  ? ktime_get_ts64+0x86/0x230
[   17.089105]  kunit_try_run_case+0x1a5/0x480
[   17.089131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.089176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.089198]  ? __kthread_parkme+0x82/0x180
[   17.089226]  ? preempt_count_sub+0x50/0x80
[   17.089257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.089306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.089330]  kthread+0x337/0x6f0
[   17.089351]  ? trace_preempt_on+0x20/0xc0
[   17.089376]  ? __pfx_kthread+0x10/0x10
[   17.089398]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.089420]  ? calculate_sigpending+0x7b/0xa0
[   17.089446]  ? __pfx_kthread+0x10/0x10
[   17.089535]  ret_from_fork+0x116/0x1d0
[   17.089556]  ? __pfx_kthread+0x10/0x10
[   17.089579]  ret_from_fork_asm+0x1a/0x30
[   17.089613]  </TASK>
[   17.089627] 
[   17.096374] Allocated by task 283:
[   17.096534]  kasan_save_stack+0x45/0x70
[   17.096811]  kasan_save_track+0x18/0x40
[   17.097067]  kasan_save_alloc_info+0x3b/0x50
[   17.097317]  __kasan_kmalloc+0xb7/0xc0
[   17.097557]  __kmalloc_cache_noprof+0x189/0x420
[   17.097747]  kasan_atomics+0x95/0x310
[   17.097870]  kunit_try_run_case+0x1a5/0x480
[   17.098050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.098265]  kthread+0x337/0x6f0
[   17.098403]  ret_from_fork+0x116/0x1d0
[   17.098792]  ret_from_fork_asm+0x1a/0x30
[   17.098968] 
[   17.099097] The buggy address belongs to the object at ffff888102b6b880
[   17.099097]  which belongs to the cache kmalloc-64 of size 64
[   17.099399] The buggy address is located 0 bytes to the right of
[   17.099399]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.099689] 
[   17.099748] The buggy address belongs to the physical page:
[   17.099856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.100003] flags: 0x200000000000000(node=0|zone=2)
[   17.100107] page_type: f5(slab)
[   17.100293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.100815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.101243] page dumped because: kasan: bad access detected
[   17.101617] 
[   17.101740] Memory state around the buggy address:
[   17.102021]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.102441]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.102780] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.102910]                                      ^
[   17.103011]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103432]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104019] ==================================================================
[   17.398548] ==================================================================
[   17.398902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.399083] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.399237] 
[   17.399322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.399379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.399395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.399422] Call Trace:
[   17.399448]  <TASK>
[   17.399471]  dump_stack_lvl+0x73/0xb0
[   17.399503]  print_report+0xd1/0x650
[   17.399529]  ? __virt_addr_valid+0x1db/0x2d0
[   17.399555]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.399605]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399629]  kasan_report+0x141/0x180
[   17.399654]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399683]  kasan_check_range+0x10c/0x1c0
[   17.399709]  __kasan_check_read+0x15/0x20
[   17.399730]  kasan_atomics_helper+0x13b5/0x5450
[   17.399755]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.399779]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.399802]  ? kasan_atomics+0x152/0x310
[   17.399831]  kasan_atomics+0x1dc/0x310
[   17.399856]  ? __pfx_kasan_atomics+0x10/0x10
[   17.399882]  ? __pfx_read_tsc+0x10/0x10
[   17.399905]  ? ktime_get_ts64+0x86/0x230
[   17.399930]  kunit_try_run_case+0x1a5/0x480
[   17.399955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.399978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.400002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.400026]  ? __kthread_parkme+0x82/0x180
[   17.400047]  ? preempt_count_sub+0x50/0x80
[   17.400071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.400095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.400118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.400142]  kthread+0x337/0x6f0
[   17.400162]  ? trace_preempt_on+0x20/0xc0
[   17.400186]  ? __pfx_kthread+0x10/0x10
[   17.400209]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.400250]  ? calculate_sigpending+0x7b/0xa0
[   17.400991]  ? __pfx_kthread+0x10/0x10
[   17.401033]  ret_from_fork+0x116/0x1d0
[   17.401056]  ? __pfx_kthread+0x10/0x10
[   17.401079]  ret_from_fork_asm+0x1a/0x30
[   17.401113]  </TASK>
[   17.401126] 
[   17.408960] Allocated by task 283:
[   17.409161]  kasan_save_stack+0x45/0x70
[   17.409385]  kasan_save_track+0x18/0x40
[   17.409617]  kasan_save_alloc_info+0x3b/0x50
[   17.409854]  __kasan_kmalloc+0xb7/0xc0
[   17.409985]  __kmalloc_cache_noprof+0x189/0x420
[   17.410098]  kasan_atomics+0x95/0x310
[   17.410314]  kunit_try_run_case+0x1a5/0x480
[   17.410514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.410746]  kthread+0x337/0x6f0
[   17.410975]  ret_from_fork+0x116/0x1d0
[   17.411165]  ret_from_fork_asm+0x1a/0x30
[   17.411315] 
[   17.411422] The buggy address belongs to the object at ffff888102b6b880
[   17.411422]  which belongs to the cache kmalloc-64 of size 64
[   17.411842] The buggy address is located 0 bytes to the right of
[   17.411842]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.412216] 
[   17.412329] The buggy address belongs to the physical page:
[   17.412534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.412847] flags: 0x200000000000000(node=0|zone=2)
[   17.413096] page_type: f5(slab)
[   17.413212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.413397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.413837] page dumped because: kasan: bad access detected
[   17.414065] 
[   17.414121] Memory state around the buggy address:
[   17.414229]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.414376]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.414698] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.414986]                                      ^
[   17.415216]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415472]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415651] ==================================================================
[   17.241979] ==================================================================
[   17.242455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   17.243492] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.243939] 
[   17.244048] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.244101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.244113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.244137] Call Trace:
[   17.244153]  <TASK>
[   17.244172]  dump_stack_lvl+0x73/0xb0
[   17.244201]  print_report+0xd1/0x650
[   17.244234]  ? __virt_addr_valid+0x1db/0x2d0
[   17.244261]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.244307]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244330]  kasan_report+0x141/0x180
[   17.244353]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244380]  kasan_check_range+0x10c/0x1c0
[   17.244404]  __kasan_check_write+0x18/0x20
[   17.244425]  kasan_atomics_helper+0xfa9/0x5450
[   17.244447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.244471]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.244493]  ? kasan_atomics+0x152/0x310
[   17.244521]  kasan_atomics+0x1dc/0x310
[   17.244544]  ? __pfx_kasan_atomics+0x10/0x10
[   17.244569]  ? __pfx_read_tsc+0x10/0x10
[   17.244591]  ? ktime_get_ts64+0x86/0x230
[   17.244615]  kunit_try_run_case+0x1a5/0x480
[   17.244640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.244663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.244687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.244709]  ? __kthread_parkme+0x82/0x180
[   17.244730]  ? preempt_count_sub+0x50/0x80
[   17.244755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.244779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.244802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.244825]  kthread+0x337/0x6f0
[   17.244845]  ? trace_preempt_on+0x20/0xc0
[   17.244868]  ? __pfx_kthread+0x10/0x10
[   17.244890]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.244911]  ? calculate_sigpending+0x7b/0xa0
[   17.244937]  ? __pfx_kthread+0x10/0x10
[   17.244959]  ret_from_fork+0x116/0x1d0
[   17.244978]  ? __pfx_kthread+0x10/0x10
[   17.244999]  ret_from_fork_asm+0x1a/0x30
[   17.245031]  </TASK>
[   17.245044] 
[   17.250610] Allocated by task 283:
[   17.250696]  kasan_save_stack+0x45/0x70
[   17.250791]  kasan_save_track+0x18/0x40
[   17.250881]  kasan_save_alloc_info+0x3b/0x50
[   17.250973]  __kasan_kmalloc+0xb7/0xc0
[   17.251057]  __kmalloc_cache_noprof+0x189/0x420
[   17.251148]  kasan_atomics+0x95/0x310
[   17.251245]  kunit_try_run_case+0x1a5/0x480
[   17.251391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.251685]  kthread+0x337/0x6f0
[   17.251896]  ret_from_fork+0x116/0x1d0
[   17.252133]  ret_from_fork_asm+0x1a/0x30
[   17.252386] 
[   17.252504] The buggy address belongs to the object at ffff888102b6b880
[   17.252504]  which belongs to the cache kmalloc-64 of size 64
[   17.253022] The buggy address is located 0 bytes to the right of
[   17.253022]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.253612] 
[   17.253669] The buggy address belongs to the physical page:
[   17.253774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.253915] flags: 0x200000000000000(node=0|zone=2)
[   17.254168] page_type: f5(slab)
[   17.254381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.254784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.255127] page dumped because: kasan: bad access detected
[   17.255337] 
[   17.255408] Memory state around the buggy address:
[   17.255510]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.255635]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.255760] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.255876]                                      ^
[   17.255968]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256090]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256210] ==================================================================
[   16.946760] ==================================================================
[   16.947073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.947406] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.947623] 
[   16.947767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.947822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.947836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.947859] Call Trace:
[   16.947878]  <TASK>
[   16.947898]  dump_stack_lvl+0x73/0xb0
[   16.947928]  print_report+0xd1/0x650
[   16.947953]  ? __virt_addr_valid+0x1db/0x2d0
[   16.947978]  ? kasan_atomics_helper+0x565/0x5450
[   16.948000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.948024]  ? kasan_atomics_helper+0x565/0x5450
[   16.948048]  kasan_report+0x141/0x180
[   16.948073]  ? kasan_atomics_helper+0x565/0x5450
[   16.948102]  kasan_check_range+0x10c/0x1c0
[   16.948128]  __kasan_check_write+0x18/0x20
[   16.948149]  kasan_atomics_helper+0x565/0x5450
[   16.948173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.948203]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.948238]  ? kasan_atomics+0x152/0x310
[   16.948270]  kasan_atomics+0x1dc/0x310
[   16.948295]  ? __pfx_kasan_atomics+0x10/0x10
[   16.948321]  ? __pfx_read_tsc+0x10/0x10
[   16.948343]  ? ktime_get_ts64+0x86/0x230
[   16.948369]  kunit_try_run_case+0x1a5/0x480
[   16.948396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.948418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.948442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.948527]  ? __kthread_parkme+0x82/0x180
[   16.948551]  ? preempt_count_sub+0x50/0x80
[   16.948578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.948603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.948640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.948664]  kthread+0x337/0x6f0
[   16.948696]  ? trace_preempt_on+0x20/0xc0
[   16.948723]  ? __pfx_kthread+0x10/0x10
[   16.948746]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.948768]  ? calculate_sigpending+0x7b/0xa0
[   16.948793]  ? __pfx_kthread+0x10/0x10
[   16.948816]  ret_from_fork+0x116/0x1d0
[   16.948835]  ? __pfx_kthread+0x10/0x10
[   16.948858]  ret_from_fork_asm+0x1a/0x30
[   16.948889]  </TASK>
[   16.948901] 
[   16.955056] Allocated by task 283:
[   16.955285]  kasan_save_stack+0x45/0x70
[   16.955528]  kasan_save_track+0x18/0x40
[   16.955778]  kasan_save_alloc_info+0x3b/0x50
[   16.956017]  __kasan_kmalloc+0xb7/0xc0
[   16.956200]  __kmalloc_cache_noprof+0x189/0x420
[   16.956423]  kasan_atomics+0x95/0x310
[   16.956669]  kunit_try_run_case+0x1a5/0x480
[   16.956889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.957120]  kthread+0x337/0x6f0
[   16.957302]  ret_from_fork+0x116/0x1d0
[   16.957526]  ret_from_fork_asm+0x1a/0x30
[   16.957733] 
[   16.958126] The buggy address belongs to the object at ffff888102b6b880
[   16.958126]  which belongs to the cache kmalloc-64 of size 64
[   16.958355] The buggy address is located 0 bytes to the right of
[   16.958355]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.958637] 
[   16.958698] The buggy address belongs to the physical page:
[   16.958861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.959336] flags: 0x200000000000000(node=0|zone=2)
[   16.959662] page_type: f5(slab)
[   16.959895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.960333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.960638] page dumped because: kasan: bad access detected
[   16.960907] 
[   16.960965] Memory state around the buggy address:
[   16.961062]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.961189]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.961604] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.962008]                                      ^
[   16.962179]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.962697]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.962845] ==================================================================
[   17.014961] ==================================================================
[   17.015300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   17.015703] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.016007] 
[   17.016118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.016171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.016185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.016208] Call Trace:
[   17.016234]  <TASK>
[   17.016258]  dump_stack_lvl+0x73/0xb0
[   17.016288]  print_report+0xd1/0x650
[   17.016312]  ? __virt_addr_valid+0x1db/0x2d0
[   17.016337]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.016384]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016407]  kasan_report+0x141/0x180
[   17.016431]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016475]  kasan_check_range+0x10c/0x1c0
[   17.016581]  __kasan_check_write+0x18/0x20
[   17.016605]  kasan_atomics_helper+0x7c7/0x5450
[   17.016631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.016655]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.016678]  ? kasan_atomics+0x152/0x310
[   17.016706]  kasan_atomics+0x1dc/0x310
[   17.016731]  ? __pfx_kasan_atomics+0x10/0x10
[   17.016757]  ? __pfx_read_tsc+0x10/0x10
[   17.016779]  ? ktime_get_ts64+0x86/0x230
[   17.016806]  kunit_try_run_case+0x1a5/0x480
[   17.016831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.016855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.016879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.016903]  ? __kthread_parkme+0x82/0x180
[   17.016925]  ? preempt_count_sub+0x50/0x80
[   17.016950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.016976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.017000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.017024]  kthread+0x337/0x6f0
[   17.017045]  ? trace_preempt_on+0x20/0xc0
[   17.017070]  ? __pfx_kthread+0x10/0x10
[   17.017093]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.017115]  ? calculate_sigpending+0x7b/0xa0
[   17.017140]  ? __pfx_kthread+0x10/0x10
[   17.017163]  ret_from_fork+0x116/0x1d0
[   17.017182]  ? __pfx_kthread+0x10/0x10
[   17.017203]  ret_from_fork_asm+0x1a/0x30
[   17.017252]  </TASK>
[   17.017268] 
[   17.024825] Allocated by task 283:
[   17.025008]  kasan_save_stack+0x45/0x70
[   17.025138]  kasan_save_track+0x18/0x40
[   17.025401]  kasan_save_alloc_info+0x3b/0x50
[   17.025703]  __kasan_kmalloc+0xb7/0xc0
[   17.026031]  __kmalloc_cache_noprof+0x189/0x420
[   17.026326]  kasan_atomics+0x95/0x310
[   17.026527]  kunit_try_run_case+0x1a5/0x480
[   17.026663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.026776]  kthread+0x337/0x6f0
[   17.026908]  ret_from_fork+0x116/0x1d0
[   17.027137]  ret_from_fork_asm+0x1a/0x30
[   17.027384] 
[   17.027497] The buggy address belongs to the object at ffff888102b6b880
[   17.027497]  which belongs to the cache kmalloc-64 of size 64
[   17.027709] The buggy address is located 0 bytes to the right of
[   17.027709]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.028166] 
[   17.028319] The buggy address belongs to the physical page:
[   17.028826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.029202] flags: 0x200000000000000(node=0|zone=2)
[   17.029465] page_type: f5(slab)
[   17.029596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.029842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.030213] page dumped because: kasan: bad access detected
[   17.030331] 
[   17.030399] Memory state around the buggy address:
[   17.030503]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030631]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030761] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.030963]                                      ^
[   17.031215]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031763]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031995] ==================================================================
[   17.336134] ==================================================================
[   17.336387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   17.336801] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.336970] 
[   17.337112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.337163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.337177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.337200] Call Trace:
[   17.337216]  <TASK>
[   17.337245]  dump_stack_lvl+0x73/0xb0
[   17.337274]  print_report+0xd1/0x650
[   17.337298]  ? __virt_addr_valid+0x1db/0x2d0
[   17.337322]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.337369]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337392]  kasan_report+0x141/0x180
[   17.337416]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337444]  kasan_check_range+0x10c/0x1c0
[   17.337469]  __kasan_check_write+0x18/0x20
[   17.337490]  kasan_atomics_helper+0x1217/0x5450
[   17.337515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.337539]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.337561]  ? kasan_atomics+0x152/0x310
[   17.337588]  kasan_atomics+0x1dc/0x310
[   17.337613]  ? __pfx_kasan_atomics+0x10/0x10
[   17.337638]  ? __pfx_read_tsc+0x10/0x10
[   17.337659]  ? ktime_get_ts64+0x86/0x230
[   17.337684]  kunit_try_run_case+0x1a5/0x480
[   17.337708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.337731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.337755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.337778]  ? __kthread_parkme+0x82/0x180
[   17.337799]  ? preempt_count_sub+0x50/0x80
[   17.337824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.337849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.337872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.337896]  kthread+0x337/0x6f0
[   17.337917]  ? trace_preempt_on+0x20/0xc0
[   17.337942]  ? __pfx_kthread+0x10/0x10
[   17.337963]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.337985]  ? calculate_sigpending+0x7b/0xa0
[   17.338010]  ? __pfx_kthread+0x10/0x10
[   17.338032]  ret_from_fork+0x116/0x1d0
[   17.338051]  ? __pfx_kthread+0x10/0x10
[   17.338073]  ret_from_fork_asm+0x1a/0x30
[   17.338135]  </TASK>
[   17.338146] 
[   17.344104] Allocated by task 283:
[   17.344191]  kasan_save_stack+0x45/0x70
[   17.344298]  kasan_save_track+0x18/0x40
[   17.344389]  kasan_save_alloc_info+0x3b/0x50
[   17.344483]  __kasan_kmalloc+0xb7/0xc0
[   17.344569]  __kmalloc_cache_noprof+0x189/0x420
[   17.344662]  kasan_atomics+0x95/0x310
[   17.344748]  kunit_try_run_case+0x1a5/0x480
[   17.344838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.344942]  kthread+0x337/0x6f0
[   17.345019]  ret_from_fork+0x116/0x1d0
[   17.345102]  ret_from_fork_asm+0x1a/0x30
[   17.345187] 
[   17.345255] The buggy address belongs to the object at ffff888102b6b880
[   17.345255]  which belongs to the cache kmalloc-64 of size 64
[   17.345875] The buggy address is located 0 bytes to the right of
[   17.345875]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.346598] 
[   17.346730] The buggy address belongs to the physical page:
[   17.347079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.347563] flags: 0x200000000000000(node=0|zone=2)
[   17.347861] page_type: f5(slab)
[   17.348075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.348262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.348441] page dumped because: kasan: bad access detected
[   17.348572] 
[   17.348633] Memory state around the buggy address:
[   17.348758]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.348928]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.349273] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.349685]                                      ^
[   17.349990]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.350438]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.350826] ==================================================================
[   17.712197] ==================================================================
[   17.712605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.712989] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.713376] 
[   17.713510] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.713562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.713577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.713601] Call Trace:
[   17.713619]  <TASK>
[   17.713636]  dump_stack_lvl+0x73/0xb0
[   17.713664]  print_report+0xd1/0x650
[   17.713688]  ? __virt_addr_valid+0x1db/0x2d0
[   17.713712]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.713759]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713782]  kasan_report+0x141/0x180
[   17.713806]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713834]  kasan_check_range+0x10c/0x1c0
[   17.713859]  __kasan_check_write+0x18/0x20
[   17.713880]  kasan_atomics_helper+0x1eaa/0x5450
[   17.713904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.713928]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.713950]  ? kasan_atomics+0x152/0x310
[   17.713978]  kasan_atomics+0x1dc/0x310
[   17.714003]  ? __pfx_kasan_atomics+0x10/0x10
[   17.714029]  ? __pfx_read_tsc+0x10/0x10
[   17.714050]  ? ktime_get_ts64+0x86/0x230
[   17.714075]  kunit_try_run_case+0x1a5/0x480
[   17.714099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.714121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.714145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.714168]  ? __kthread_parkme+0x82/0x180
[   17.714189]  ? preempt_count_sub+0x50/0x80
[   17.714213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.714272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.714307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.714347]  kthread+0x337/0x6f0
[   17.714380]  ? trace_preempt_on+0x20/0xc0
[   17.714406]  ? __pfx_kthread+0x10/0x10
[   17.714440]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.714464]  ? calculate_sigpending+0x7b/0xa0
[   17.714489]  ? __pfx_kthread+0x10/0x10
[   17.714514]  ret_from_fork+0x116/0x1d0
[   17.714534]  ? __pfx_kthread+0x10/0x10
[   17.714559]  ret_from_fork_asm+0x1a/0x30
[   17.714591]  </TASK>
[   17.714604] 
[   17.720203] Allocated by task 283:
[   17.720368]  kasan_save_stack+0x45/0x70
[   17.720564]  kasan_save_track+0x18/0x40
[   17.720787]  kasan_save_alloc_info+0x3b/0x50
[   17.720924]  __kasan_kmalloc+0xb7/0xc0
[   17.721069]  __kmalloc_cache_noprof+0x189/0x420
[   17.721279]  kasan_atomics+0x95/0x310
[   17.721436]  kunit_try_run_case+0x1a5/0x480
[   17.721603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.721754]  kthread+0x337/0x6f0
[   17.721924]  ret_from_fork+0x116/0x1d0
[   17.722056]  ret_from_fork_asm+0x1a/0x30
[   17.722213] 
[   17.722316] The buggy address belongs to the object at ffff888102b6b880
[   17.722316]  which belongs to the cache kmalloc-64 of size 64
[   17.722671] The buggy address is located 0 bytes to the right of
[   17.722671]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.723039] 
[   17.723123] The buggy address belongs to the physical page:
[   17.723281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.723464] flags: 0x200000000000000(node=0|zone=2)
[   17.723607] page_type: f5(slab)
[   17.723711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.723892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.724136] page dumped because: kasan: bad access detected
[   17.724362] 
[   17.724449] Memory state around the buggy address:
[   17.724656]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.724931]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.725205] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.725487]                                      ^
[   17.725693]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.725984]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.726262] ==================================================================
[   17.530094] ==================================================================
[   17.530844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.531288] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.531755] 
[   17.531904] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.531955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.531968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.531991] Call Trace:
[   17.532008]  <TASK>
[   17.532024]  dump_stack_lvl+0x73/0xb0
[   17.532051]  print_report+0xd1/0x650
[   17.532075]  ? __virt_addr_valid+0x1db/0x2d0
[   17.532100]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.532147]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532170]  kasan_report+0x141/0x180
[   17.532193]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532232]  kasan_check_range+0x10c/0x1c0
[   17.532262]  __kasan_check_write+0x18/0x20
[   17.532282]  kasan_atomics_helper+0x177f/0x5450
[   17.532306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.532330]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.532365]  ? kasan_atomics+0x152/0x310
[   17.532395]  kasan_atomics+0x1dc/0x310
[   17.532420]  ? __pfx_kasan_atomics+0x10/0x10
[   17.532460]  ? __pfx_read_tsc+0x10/0x10
[   17.532483]  ? ktime_get_ts64+0x86/0x230
[   17.532518]  kunit_try_run_case+0x1a5/0x480
[   17.532546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.532569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.532605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.532630]  ? __kthread_parkme+0x82/0x180
[   17.532665]  ? preempt_count_sub+0x50/0x80
[   17.532689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.532725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.532752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.532784]  kthread+0x337/0x6f0
[   17.532810]  ? trace_preempt_on+0x20/0xc0
[   17.532835]  ? __pfx_kthread+0x10/0x10
[   17.532869]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.532893]  ? calculate_sigpending+0x7b/0xa0
[   17.532929]  ? __pfx_kthread+0x10/0x10
[   17.532954]  ret_from_fork+0x116/0x1d0
[   17.532975]  ? __pfx_kthread+0x10/0x10
[   17.533009]  ret_from_fork_asm+0x1a/0x30
[   17.533043]  </TASK>
[   17.533066] 
[   17.539081] Allocated by task 283:
[   17.539196]  kasan_save_stack+0x45/0x70
[   17.539481]  kasan_save_track+0x18/0x40
[   17.539736]  kasan_save_alloc_info+0x3b/0x50
[   17.539950]  __kasan_kmalloc+0xb7/0xc0
[   17.540040]  __kmalloc_cache_noprof+0x189/0x420
[   17.540138]  kasan_atomics+0x95/0x310
[   17.540234]  kunit_try_run_case+0x1a5/0x480
[   17.540332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.540439]  kthread+0x337/0x6f0
[   17.540519]  ret_from_fork+0x116/0x1d0
[   17.540602]  ret_from_fork_asm+0x1a/0x30
[   17.540691] 
[   17.540745] The buggy address belongs to the object at ffff888102b6b880
[   17.540745]  which belongs to the cache kmalloc-64 of size 64
[   17.540941] The buggy address is located 0 bytes to the right of
[   17.540941]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.541365] 
[   17.541493] The buggy address belongs to the physical page:
[   17.541821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.542279] flags: 0x200000000000000(node=0|zone=2)
[   17.542575] page_type: f5(slab)
[   17.542801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.543244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.543692] page dumped because: kasan: bad access detected
[   17.544001] 
[   17.544113] Memory state around the buggy address:
[   17.544337]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.544646]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.544773] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.544894]                                      ^
[   17.544987]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.545108]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.545238] ==================================================================
[   17.741403] ==================================================================
[   17.741723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.742016] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.742347] 
[   17.742483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.742541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.742555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.742577] Call Trace:
[   17.742601]  <TASK>
[   17.742618]  dump_stack_lvl+0x73/0xb0
[   17.742653]  print_report+0xd1/0x650
[   17.742678]  ? __virt_addr_valid+0x1db/0x2d0
[   17.742703]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.742748]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742771]  kasan_report+0x141/0x180
[   17.742794]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742822]  __asan_report_load8_noabort+0x18/0x20
[   17.742844]  kasan_atomics_helper+0x4f71/0x5450
[   17.742867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.742890]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.742912]  ? kasan_atomics+0x152/0x310
[   17.742940]  kasan_atomics+0x1dc/0x310
[   17.742963]  ? __pfx_kasan_atomics+0x10/0x10
[   17.742988]  ? __pfx_read_tsc+0x10/0x10
[   17.743009]  ? ktime_get_ts64+0x86/0x230
[   17.743034]  kunit_try_run_case+0x1a5/0x480
[   17.743058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.743080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.743103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.743126]  ? __kthread_parkme+0x82/0x180
[   17.743146]  ? preempt_count_sub+0x50/0x80
[   17.743169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.743193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.743215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.743250]  kthread+0x337/0x6f0
[   17.743270]  ? trace_preempt_on+0x20/0xc0
[   17.743294]  ? __pfx_kthread+0x10/0x10
[   17.743315]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.743336]  ? calculate_sigpending+0x7b/0xa0
[   17.743360]  ? __pfx_kthread+0x10/0x10
[   17.743381]  ret_from_fork+0x116/0x1d0
[   17.743400]  ? __pfx_kthread+0x10/0x10
[   17.743421]  ret_from_fork_asm+0x1a/0x30
[   17.743469]  </TASK>
[   17.743483] 
[   17.748264] Allocated by task 283:
[   17.748418]  kasan_save_stack+0x45/0x70
[   17.748594]  kasan_save_track+0x18/0x40
[   17.748797]  kasan_save_alloc_info+0x3b/0x50
[   17.749003]  __kasan_kmalloc+0xb7/0xc0
[   17.749183]  __kmalloc_cache_noprof+0x189/0x420
[   17.749389]  kasan_atomics+0x95/0x310
[   17.749579]  kunit_try_run_case+0x1a5/0x480
[   17.749767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.750003]  kthread+0x337/0x6f0
[   17.750160]  ret_from_fork+0x116/0x1d0
[   17.750351]  ret_from_fork_asm+0x1a/0x30
[   17.750536] 
[   17.750651] The buggy address belongs to the object at ffff888102b6b880
[   17.750651]  which belongs to the cache kmalloc-64 of size 64
[   17.751060] The buggy address is located 0 bytes to the right of
[   17.751060]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.751336] 
[   17.751411] The buggy address belongs to the physical page:
[   17.751543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.751730] flags: 0x200000000000000(node=0|zone=2)
[   17.751857] page_type: f5(slab)
[   17.752021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.752325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.752636] page dumped because: kasan: bad access detected
[   17.752843] 
[   17.752927] Memory state around the buggy address:
[   17.753131]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.753430]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.753719] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.753993]                                      ^
[   17.754249]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.754384]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.754514] ==================================================================
[   17.447343] ==================================================================
[   17.447951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.448279] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.448579] 
[   17.448694] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.448746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.448759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.448782] Call Trace:
[   17.448801]  <TASK>
[   17.448817]  dump_stack_lvl+0x73/0xb0
[   17.448845]  print_report+0xd1/0x650
[   17.448868]  ? __virt_addr_valid+0x1db/0x2d0
[   17.448891]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.448913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.448937]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.448960]  kasan_report+0x141/0x180
[   17.448983]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.449011]  __asan_report_store8_noabort+0x1b/0x30
[   17.449033]  kasan_atomics_helper+0x50d4/0x5450
[   17.449057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.449080]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.449102]  ? kasan_atomics+0x152/0x310
[   17.449129]  kasan_atomics+0x1dc/0x310
[   17.449152]  ? __pfx_kasan_atomics+0x10/0x10
[   17.449177]  ? __pfx_read_tsc+0x10/0x10
[   17.449199]  ? ktime_get_ts64+0x86/0x230
[   17.449234]  kunit_try_run_case+0x1a5/0x480
[   17.449262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.449287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.449310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.449334]  ? __kthread_parkme+0x82/0x180
[   17.449356]  ? preempt_count_sub+0x50/0x80
[   17.449381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.449405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.449429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.449454]  kthread+0x337/0x6f0
[   17.449474]  ? trace_preempt_on+0x20/0xc0
[   17.449499]  ? __pfx_kthread+0x10/0x10
[   17.449522]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.449545]  ? calculate_sigpending+0x7b/0xa0
[   17.449571]  ? __pfx_kthread+0x10/0x10
[   17.449593]  ret_from_fork+0x116/0x1d0
[   17.449613]  ? __pfx_kthread+0x10/0x10
[   17.449635]  ret_from_fork_asm+0x1a/0x30
[   17.449668]  </TASK>
[   17.449681] 
[   17.454488] Allocated by task 283:
[   17.454682]  kasan_save_stack+0x45/0x70
[   17.454863]  kasan_save_track+0x18/0x40
[   17.455075]  kasan_save_alloc_info+0x3b/0x50
[   17.455308]  __kasan_kmalloc+0xb7/0xc0
[   17.455534]  __kmalloc_cache_noprof+0x189/0x420
[   17.455735]  kasan_atomics+0x95/0x310
[   17.455916]  kunit_try_run_case+0x1a5/0x480
[   17.456134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.456296]  kthread+0x337/0x6f0
[   17.456491]  ret_from_fork+0x116/0x1d0
[   17.456711]  ret_from_fork_asm+0x1a/0x30
[   17.456890] 
[   17.456999] The buggy address belongs to the object at ffff888102b6b880
[   17.456999]  which belongs to the cache kmalloc-64 of size 64
[   17.457378] The buggy address is located 0 bytes to the right of
[   17.457378]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.457759] 
[   17.457875] The buggy address belongs to the physical page:
[   17.458042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.458361] flags: 0x200000000000000(node=0|zone=2)
[   17.458495] page_type: f5(slab)
[   17.458586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.458929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.459219] page dumped because: kasan: bad access detected
[   17.459334] 
[   17.459388] Memory state around the buggy address:
[   17.459486]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.459614]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.459742] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.459864]                                      ^
[   17.459958]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460081]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460202] ==================================================================
[   17.366635] ==================================================================
[   17.366962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.367154] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.367335] 
[   17.367438] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.367507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.367522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.367547] Call Trace:
[   17.367568]  <TASK>
[   17.367586]  dump_stack_lvl+0x73/0xb0
[   17.367616]  print_report+0xd1/0x650
[   17.367640]  ? __virt_addr_valid+0x1db/0x2d0
[   17.367666]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.367713]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367737]  kasan_report+0x141/0x180
[   17.367761]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367789]  kasan_check_range+0x10c/0x1c0
[   17.367815]  __kasan_check_write+0x18/0x20
[   17.367836]  kasan_atomics_helper+0x12e6/0x5450
[   17.367861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.367885]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.367907]  ? kasan_atomics+0x152/0x310
[   17.367934]  kasan_atomics+0x1dc/0x310
[   17.367958]  ? __pfx_kasan_atomics+0x10/0x10
[   17.367983]  ? __pfx_read_tsc+0x10/0x10
[   17.368005]  ? ktime_get_ts64+0x86/0x230
[   17.368030]  kunit_try_run_case+0x1a5/0x480
[   17.368079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.368146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.368173]  ? __kthread_parkme+0x82/0x180
[   17.368193]  ? preempt_count_sub+0x50/0x80
[   17.368218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.368297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.368323]  kthread+0x337/0x6f0
[   17.368345]  ? trace_preempt_on+0x20/0xc0
[   17.368369]  ? __pfx_kthread+0x10/0x10
[   17.368393]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.368414]  ? calculate_sigpending+0x7b/0xa0
[   17.368439]  ? __pfx_kthread+0x10/0x10
[   17.368462]  ret_from_fork+0x116/0x1d0
[   17.368482]  ? __pfx_kthread+0x10/0x10
[   17.368504]  ret_from_fork_asm+0x1a/0x30
[   17.368536]  </TASK>
[   17.368548] 
[   17.373741] Allocated by task 283:
[   17.373857]  kasan_save_stack+0x45/0x70
[   17.373976]  kasan_save_track+0x18/0x40
[   17.374089]  kasan_save_alloc_info+0x3b/0x50
[   17.374206]  __kasan_kmalloc+0xb7/0xc0
[   17.374439]  __kmalloc_cache_noprof+0x189/0x420
[   17.374736]  kasan_atomics+0x95/0x310
[   17.374972]  kunit_try_run_case+0x1a5/0x480
[   17.375198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.375496]  kthread+0x337/0x6f0
[   17.375689]  ret_from_fork+0x116/0x1d0
[   17.375911]  ret_from_fork_asm+0x1a/0x30
[   17.376129] 
[   17.376247] The buggy address belongs to the object at ffff888102b6b880
[   17.376247]  which belongs to the cache kmalloc-64 of size 64
[   17.376822] The buggy address is located 0 bytes to the right of
[   17.376822]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.377427] 
[   17.377543] The buggy address belongs to the physical page:
[   17.377738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.377881] flags: 0x200000000000000(node=0|zone=2)
[   17.377984] page_type: f5(slab)
[   17.378073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.378206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.378355] page dumped because: kasan: bad access detected
[   17.378466] 
[   17.378561] Memory state around the buggy address:
[   17.378790]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.379086]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.379410] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.379692]                                      ^
[   17.379898]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.380187]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.380475] ==================================================================
[   16.875740] ==================================================================
[   16.876087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.876390] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.876773] 
[   16.876895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.876954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.876969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.876994] Call Trace:
[   16.877019]  <TASK>
[   16.877042]  dump_stack_lvl+0x73/0xb0
[   16.877074]  print_report+0xd1/0x650
[   16.877101]  ? __virt_addr_valid+0x1db/0x2d0
[   16.877127]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.877190]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877214]  kasan_report+0x141/0x180
[   16.877258]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877289]  kasan_check_range+0x10c/0x1c0
[   16.877315]  __kasan_check_read+0x15/0x20
[   16.877335]  kasan_atomics_helper+0x3df/0x5450
[   16.877360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.877384]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.877406]  ? kasan_atomics+0x152/0x310
[   16.877435]  kasan_atomics+0x1dc/0x310
[   16.877459]  ? __pfx_kasan_atomics+0x10/0x10
[   16.877485]  ? __pfx_read_tsc+0x10/0x10
[   16.877508]  ? ktime_get_ts64+0x86/0x230
[   16.877536]  kunit_try_run_case+0x1a5/0x480
[   16.877563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.877586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.877611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.877635]  ? __kthread_parkme+0x82/0x180
[   16.877658]  ? preempt_count_sub+0x50/0x80
[   16.877684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.877709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.877734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.877760]  kthread+0x337/0x6f0
[   16.877783]  ? trace_preempt_on+0x20/0xc0
[   16.877809]  ? __pfx_kthread+0x10/0x10
[   16.877833]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.877890]  ? calculate_sigpending+0x7b/0xa0
[   16.877917]  ? __pfx_kthread+0x10/0x10
[   16.877942]  ret_from_fork+0x116/0x1d0
[   16.877963]  ? __pfx_kthread+0x10/0x10
[   16.877985]  ret_from_fork_asm+0x1a/0x30
[   16.878019]  </TASK>
[   16.878032] 
[   16.884871] Allocated by task 283:
[   16.884990]  kasan_save_stack+0x45/0x70
[   16.885247]  kasan_save_track+0x18/0x40
[   16.885481]  kasan_save_alloc_info+0x3b/0x50
[   16.885753]  __kasan_kmalloc+0xb7/0xc0
[   16.885995]  __kmalloc_cache_noprof+0x189/0x420
[   16.886189]  kasan_atomics+0x95/0x310
[   16.886292]  kunit_try_run_case+0x1a5/0x480
[   16.886402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.886589]  kthread+0x337/0x6f0
[   16.886832]  ret_from_fork+0x116/0x1d0
[   16.887146]  ret_from_fork_asm+0x1a/0x30
[   16.887396] 
[   16.887582] The buggy address belongs to the object at ffff888102b6b880
[   16.887582]  which belongs to the cache kmalloc-64 of size 64
[   16.887827] The buggy address is located 0 bytes to the right of
[   16.887827]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.888404] 
[   16.888578] The buggy address belongs to the physical page:
[   16.888835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.889140] flags: 0x200000000000000(node=0|zone=2)
[   16.889702] page_type: f5(slab)
[   16.889898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.890141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.890422] page dumped because: kasan: bad access detected
[   16.890870] 
[   16.890928] Memory state around the buggy address:
[   16.891030]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891159]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891296] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.891421]                                      ^
[   16.891733]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892164]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.893007] ==================================================================
[   17.669961] ==================================================================
[   17.670290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.670448] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.670580] 
[   17.670648] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.670697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.670710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.670734] Call Trace:
[   17.670751]  <TASK>
[   17.670767]  dump_stack_lvl+0x73/0xb0
[   17.670795]  print_report+0xd1/0x650
[   17.670818]  ? __virt_addr_valid+0x1db/0x2d0
[   17.670842]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.670887]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670910]  kasan_report+0x141/0x180
[   17.670933]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670961]  kasan_check_range+0x10c/0x1c0
[   17.670985]  __kasan_check_write+0x18/0x20
[   17.671004]  kasan_atomics_helper+0x1ce1/0x5450
[   17.671028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.671050]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.671071]  ? kasan_atomics+0x152/0x310
[   17.671098]  kasan_atomics+0x1dc/0x310
[   17.671122]  ? __pfx_kasan_atomics+0x10/0x10
[   17.671146]  ? __pfx_read_tsc+0x10/0x10
[   17.671167]  ? ktime_get_ts64+0x86/0x230
[   17.671190]  kunit_try_run_case+0x1a5/0x480
[   17.671214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.671248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.671272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.671294]  ? __kthread_parkme+0x82/0x180
[   17.671314]  ? preempt_count_sub+0x50/0x80
[   17.671338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.671361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.671383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.671406]  kthread+0x337/0x6f0
[   17.671426]  ? trace_preempt_on+0x20/0xc0
[   17.671448]  ? __pfx_kthread+0x10/0x10
[   17.671469]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.671491]  ? calculate_sigpending+0x7b/0xa0
[   17.671513]  ? __pfx_kthread+0x10/0x10
[   17.671535]  ret_from_fork+0x116/0x1d0
[   17.671553]  ? __pfx_kthread+0x10/0x10
[   17.671574]  ret_from_fork_asm+0x1a/0x30
[   17.671605]  </TASK>
[   17.671616] 
[   17.676849] Allocated by task 283:
[   17.677022]  kasan_save_stack+0x45/0x70
[   17.677227]  kasan_save_track+0x18/0x40
[   17.677407]  kasan_save_alloc_info+0x3b/0x50
[   17.677608]  __kasan_kmalloc+0xb7/0xc0
[   17.677835]  __kmalloc_cache_noprof+0x189/0x420
[   17.678072]  kasan_atomics+0x95/0x310
[   17.678256]  kunit_try_run_case+0x1a5/0x480
[   17.678467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.678696]  kthread+0x337/0x6f0
[   17.678856]  ret_from_fork+0x116/0x1d0
[   17.679030]  ret_from_fork_asm+0x1a/0x30
[   17.679212] 
[   17.679331] The buggy address belongs to the object at ffff888102b6b880
[   17.679331]  which belongs to the cache kmalloc-64 of size 64
[   17.679807] The buggy address is located 0 bytes to the right of
[   17.679807]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.680010] 
[   17.680065] The buggy address belongs to the physical page:
[   17.680171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.680468] flags: 0x200000000000000(node=0|zone=2)
[   17.680696] page_type: f5(slab)
[   17.680870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.681156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.681479] page dumped because: kasan: bad access detected
[   17.681700] 
[   17.681783] Memory state around the buggy address:
[   17.681942]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.682145]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.682323] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.682459]                                      ^
[   17.682558]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.682684]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.683042] ==================================================================
[   17.070237] ==================================================================
[   17.070656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   17.071200] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.072277] 
[   17.072377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.072449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.072463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.072488] Call Trace:
[   17.072505]  <TASK>
[   17.072524]  dump_stack_lvl+0x73/0xb0
[   17.072559]  print_report+0xd1/0x650
[   17.072584]  ? __virt_addr_valid+0x1db/0x2d0
[   17.072691]  ? kasan_atomics_helper+0x992/0x5450
[   17.072715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.072739]  ? kasan_atomics_helper+0x992/0x5450
[   17.072761]  kasan_report+0x141/0x180
[   17.072785]  ? kasan_atomics_helper+0x992/0x5450
[   17.072811]  kasan_check_range+0x10c/0x1c0
[   17.072836]  __kasan_check_write+0x18/0x20
[   17.072857]  kasan_atomics_helper+0x992/0x5450
[   17.072881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.072904]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.072926]  ? kasan_atomics+0x152/0x310
[   17.072953]  kasan_atomics+0x1dc/0x310
[   17.072976]  ? __pfx_kasan_atomics+0x10/0x10
[   17.073001]  ? __pfx_read_tsc+0x10/0x10
[   17.073025]  ? ktime_get_ts64+0x86/0x230
[   17.073050]  kunit_try_run_case+0x1a5/0x480
[   17.073075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.073121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.073144]  ? __kthread_parkme+0x82/0x180
[   17.073164]  ? preempt_count_sub+0x50/0x80
[   17.073188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.073256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.073280]  kthread+0x337/0x6f0
[   17.073301]  ? trace_preempt_on+0x20/0xc0
[   17.073328]  ? __pfx_kthread+0x10/0x10
[   17.073350]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.073372]  ? calculate_sigpending+0x7b/0xa0
[   17.073400]  ? __pfx_kthread+0x10/0x10
[   17.073423]  ret_from_fork+0x116/0x1d0
[   17.073443]  ? __pfx_kthread+0x10/0x10
[   17.073465]  ret_from_fork_asm+0x1a/0x30
[   17.073601]  </TASK>
[   17.073620] 
[   17.079770] Allocated by task 283:
[   17.079989]  kasan_save_stack+0x45/0x70
[   17.080228]  kasan_save_track+0x18/0x40
[   17.080522]  kasan_save_alloc_info+0x3b/0x50
[   17.080736]  __kasan_kmalloc+0xb7/0xc0
[   17.080883]  __kmalloc_cache_noprof+0x189/0x420
[   17.081007]  kasan_atomics+0x95/0x310
[   17.081098]  kunit_try_run_case+0x1a5/0x480
[   17.081203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.081778]  kthread+0x337/0x6f0
[   17.081976]  ret_from_fork+0x116/0x1d0
[   17.082184]  ret_from_fork_asm+0x1a/0x30
[   17.082290] 
[   17.082423] The buggy address belongs to the object at ffff888102b6b880
[   17.082423]  which belongs to the cache kmalloc-64 of size 64
[   17.082894] The buggy address is located 0 bytes to the right of
[   17.082894]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.083311] 
[   17.083434] The buggy address belongs to the physical page:
[   17.083686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.083872] flags: 0x200000000000000(node=0|zone=2)
[   17.084095] page_type: f5(slab)
[   17.084284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.084419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.084601] page dumped because: kasan: bad access detected
[   17.084706] 
[   17.084757] Memory state around the buggy address:
[   17.084851]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.084975]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.085308] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.085804]                                      ^
[   17.086116]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.086744]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.087184] ==================================================================
[   17.190019] ==================================================================
[   17.190414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   17.191476] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.191791] 
[   17.191868] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.191923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.191937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.191960] Call Trace:
[   17.191984]  <TASK>
[   17.192004]  dump_stack_lvl+0x73/0xb0
[   17.192039]  print_report+0xd1/0x650
[   17.192064]  ? __virt_addr_valid+0x1db/0x2d0
[   17.192089]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.192148]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192172]  kasan_report+0x141/0x180
[   17.192206]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192246]  kasan_check_range+0x10c/0x1c0
[   17.192273]  __kasan_check_write+0x18/0x20
[   17.192295]  kasan_atomics_helper+0xde0/0x5450
[   17.192318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.192342]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.192364]  ? kasan_atomics+0x152/0x310
[   17.192392]  kasan_atomics+0x1dc/0x310
[   17.192415]  ? __pfx_kasan_atomics+0x10/0x10
[   17.192440]  ? __pfx_read_tsc+0x10/0x10
[   17.192480]  ? ktime_get_ts64+0x86/0x230
[   17.192508]  kunit_try_run_case+0x1a5/0x480
[   17.192534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.192557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.192583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.192618]  ? __kthread_parkme+0x82/0x180
[   17.192640]  ? preempt_count_sub+0x50/0x80
[   17.192674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.192711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.192805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.192831]  kthread+0x337/0x6f0
[   17.192853]  ? trace_preempt_on+0x20/0xc0
[   17.192879]  ? __pfx_kthread+0x10/0x10
[   17.192901]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.192923]  ? calculate_sigpending+0x7b/0xa0
[   17.192949]  ? __pfx_kthread+0x10/0x10
[   17.192971]  ret_from_fork+0x116/0x1d0
[   17.192991]  ? __pfx_kthread+0x10/0x10
[   17.193012]  ret_from_fork_asm+0x1a/0x30
[   17.193045]  </TASK>
[   17.193058] 
[   17.200153] Allocated by task 283:
[   17.200268]  kasan_save_stack+0x45/0x70
[   17.200372]  kasan_save_track+0x18/0x40
[   17.200880]  kasan_save_alloc_info+0x3b/0x50
[   17.201132]  __kasan_kmalloc+0xb7/0xc0
[   17.201370]  __kmalloc_cache_noprof+0x189/0x420
[   17.201711]  kasan_atomics+0x95/0x310
[   17.201937]  kunit_try_run_case+0x1a5/0x480
[   17.202141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.202298]  kthread+0x337/0x6f0
[   17.202574]  ret_from_fork+0x116/0x1d0
[   17.202670]  ret_from_fork_asm+0x1a/0x30
[   17.202804] 
[   17.202930] The buggy address belongs to the object at ffff888102b6b880
[   17.202930]  which belongs to the cache kmalloc-64 of size 64
[   17.203420] The buggy address is located 0 bytes to the right of
[   17.203420]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.204007] 
[   17.204067] The buggy address belongs to the physical page:
[   17.204344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.204694] flags: 0x200000000000000(node=0|zone=2)
[   17.204859] page_type: f5(slab)
[   17.205070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.205326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.205852] page dumped because: kasan: bad access detected
[   17.206125] 
[   17.206193] Memory state around the buggy address:
[   17.206582]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206763]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206895] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.207021]                                      ^
[   17.207301]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.207797]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.208149] ==================================================================
[   17.461154] ==================================================================
[   17.462377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.463831] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.464164] 
[   17.464288] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.464338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.464353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.464376] Call Trace:
[   17.464395]  <TASK>
[   17.464413]  dump_stack_lvl+0x73/0xb0
[   17.464443]  print_report+0xd1/0x650
[   17.464467]  ? __virt_addr_valid+0x1db/0x2d0
[   17.464491]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.464537]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464560]  kasan_report+0x141/0x180
[   17.464583]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464610]  kasan_check_range+0x10c/0x1c0
[   17.464634]  __kasan_check_write+0x18/0x20
[   17.464655]  kasan_atomics_helper+0x151d/0x5450
[   17.464678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.464701]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.464723]  ? kasan_atomics+0x152/0x310
[   17.464750]  kasan_atomics+0x1dc/0x310
[   17.464773]  ? __pfx_kasan_atomics+0x10/0x10
[   17.464798]  ? __pfx_read_tsc+0x10/0x10
[   17.464819]  ? ktime_get_ts64+0x86/0x230
[   17.464844]  kunit_try_run_case+0x1a5/0x480
[   17.464868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.465693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.465721]  ? __kthread_parkme+0x82/0x180
[   17.465746]  ? preempt_count_sub+0x50/0x80
[   17.465773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.465829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.465854]  kthread+0x337/0x6f0
[   17.465876]  ? trace_preempt_on+0x20/0xc0
[   17.465903]  ? __pfx_kthread+0x10/0x10
[   17.465927]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.465951]  ? calculate_sigpending+0x7b/0xa0
[   17.465977]  ? __pfx_kthread+0x10/0x10
[   17.466002]  ret_from_fork+0x116/0x1d0
[   17.466023]  ? __pfx_kthread+0x10/0x10
[   17.466046]  ret_from_fork_asm+0x1a/0x30
[   17.466081]  </TASK>
[   17.466096] 
[   17.473137] Allocated by task 283:
[   17.473404]  kasan_save_stack+0x45/0x70
[   17.473617]  kasan_save_track+0x18/0x40
[   17.473860]  kasan_save_alloc_info+0x3b/0x50
[   17.474076]  __kasan_kmalloc+0xb7/0xc0
[   17.474285]  __kmalloc_cache_noprof+0x189/0x420
[   17.474519]  kasan_atomics+0x95/0x310
[   17.474692]  kunit_try_run_case+0x1a5/0x480
[   17.474843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.475094]  kthread+0x337/0x6f0
[   17.475185]  ret_from_fork+0x116/0x1d0
[   17.475286]  ret_from_fork_asm+0x1a/0x30
[   17.475385] 
[   17.475444] The buggy address belongs to the object at ffff888102b6b880
[   17.475444]  which belongs to the cache kmalloc-64 of size 64
[   17.475655] The buggy address is located 0 bytes to the right of
[   17.475655]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.476053] 
[   17.476184] The buggy address belongs to the physical page:
[   17.476524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.476971] flags: 0x200000000000000(node=0|zone=2)
[   17.477301] page_type: f5(slab)
[   17.477531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.477738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.477875] page dumped because: kasan: bad access detected
[   17.477980] 
[   17.478033] Memory state around the buggy address:
[   17.478309]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.478508]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.478643] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.478768]                                      ^
[   17.478866]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.478991]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.479150] ==================================================================
[   17.138850] ==================================================================
[   17.139148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   17.139892] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.140290] 
[   17.140410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.140521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.140538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.140563] Call Trace:
[   17.140585]  <TASK>
[   17.140605]  dump_stack_lvl+0x73/0xb0
[   17.140639]  print_report+0xd1/0x650
[   17.140664]  ? __virt_addr_valid+0x1db/0x2d0
[   17.140691]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.140737]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140760]  kasan_report+0x141/0x180
[   17.140784]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140811]  kasan_check_range+0x10c/0x1c0
[   17.140836]  __kasan_check_write+0x18/0x20
[   17.140857]  kasan_atomics_helper+0xc70/0x5450
[   17.140880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.140904]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.140926]  ? kasan_atomics+0x152/0x310
[   17.140954]  kasan_atomics+0x1dc/0x310
[   17.140978]  ? __pfx_kasan_atomics+0x10/0x10
[   17.141004]  ? __pfx_read_tsc+0x10/0x10
[   17.141025]  ? ktime_get_ts64+0x86/0x230
[   17.141050]  kunit_try_run_case+0x1a5/0x480
[   17.141075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.141097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.141121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.141144]  ? __kthread_parkme+0x82/0x180
[   17.141165]  ? preempt_count_sub+0x50/0x80
[   17.141190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.141214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.141256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.141280]  kthread+0x337/0x6f0
[   17.141300]  ? trace_preempt_on+0x20/0xc0
[   17.141326]  ? __pfx_kthread+0x10/0x10
[   17.141348]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.141371]  ? calculate_sigpending+0x7b/0xa0
[   17.141397]  ? __pfx_kthread+0x10/0x10
[   17.141420]  ret_from_fork+0x116/0x1d0
[   17.141439]  ? __pfx_kthread+0x10/0x10
[   17.141476]  ret_from_fork_asm+0x1a/0x30
[   17.141583]  </TASK>
[   17.141615] 
[   17.147696] Allocated by task 283:
[   17.147942]  kasan_save_stack+0x45/0x70
[   17.148185]  kasan_save_track+0x18/0x40
[   17.148435]  kasan_save_alloc_info+0x3b/0x50
[   17.148866]  __kasan_kmalloc+0xb7/0xc0
[   17.149034]  __kmalloc_cache_noprof+0x189/0x420
[   17.149227]  kasan_atomics+0x95/0x310
[   17.149422]  kunit_try_run_case+0x1a5/0x480
[   17.149672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.149820]  kthread+0x337/0x6f0
[   17.149989]  ret_from_fork+0x116/0x1d0
[   17.150167]  ret_from_fork_asm+0x1a/0x30
[   17.150341] 
[   17.150402] The buggy address belongs to the object at ffff888102b6b880
[   17.150402]  which belongs to the cache kmalloc-64 of size 64
[   17.150916] The buggy address is located 0 bytes to the right of
[   17.150916]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.151275] 
[   17.151334] The buggy address belongs to the physical page:
[   17.151497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.151889] flags: 0x200000000000000(node=0|zone=2)
[   17.152128] page_type: f5(slab)
[   17.152217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.152367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.152748] page dumped because: kasan: bad access detected
[   17.153008] 
[   17.153110] Memory state around the buggy address:
[   17.153281]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.153810]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.154131] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.154330]                                      ^
[   17.154438]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154641]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154763] ==================================================================
[   17.497305] ==================================================================
[   17.498035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.498499] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.498912] 
[   17.499079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.499137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.499152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.499177] Call Trace:
[   17.499198]  <TASK>
[   17.499218]  dump_stack_lvl+0x73/0xb0
[   17.499259]  print_report+0xd1/0x650
[   17.499284]  ? __virt_addr_valid+0x1db/0x2d0
[   17.499310]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.499373]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499410]  kasan_report+0x141/0x180
[   17.499437]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499466]  kasan_check_range+0x10c/0x1c0
[   17.499492]  __kasan_check_write+0x18/0x20
[   17.499514]  kasan_atomics_helper+0x164f/0x5450
[   17.499539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.499563]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.499587]  ? kasan_atomics+0x152/0x310
[   17.499616]  kasan_atomics+0x1dc/0x310
[   17.499641]  ? __pfx_kasan_atomics+0x10/0x10
[   17.499668]  ? __pfx_read_tsc+0x10/0x10
[   17.499690]  ? ktime_get_ts64+0x86/0x230
[   17.499717]  kunit_try_run_case+0x1a5/0x480
[   17.499744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.499778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.499807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.499832]  ? __kthread_parkme+0x82/0x180
[   17.499869]  ? preempt_count_sub+0x50/0x80
[   17.499896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.499933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.499959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.499995]  kthread+0x337/0x6f0
[   17.500020]  ? trace_preempt_on+0x20/0xc0
[   17.500056]  ? __pfx_kthread+0x10/0x10
[   17.500082]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.500106]  ? calculate_sigpending+0x7b/0xa0
[   17.500144]  ? __pfx_kthread+0x10/0x10
[   17.500169]  ret_from_fork+0x116/0x1d0
[   17.500195]  ? __pfx_kthread+0x10/0x10
[   17.500218]  ret_from_fork_asm+0x1a/0x30
[   17.500268]  </TASK>
[   17.500281] 
[   17.506769] Allocated by task 283:
[   17.506945]  kasan_save_stack+0x45/0x70
[   17.507071]  kasan_save_track+0x18/0x40
[   17.507277]  kasan_save_alloc_info+0x3b/0x50
[   17.507443]  __kasan_kmalloc+0xb7/0xc0
[   17.507539]  __kmalloc_cache_noprof+0x189/0x420
[   17.507889]  kasan_atomics+0x95/0x310
[   17.508051]  kunit_try_run_case+0x1a5/0x480
[   17.508334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.508593]  kthread+0x337/0x6f0
[   17.508743]  ret_from_fork+0x116/0x1d0
[   17.508833]  ret_from_fork_asm+0x1a/0x30
[   17.508927] 
[   17.508982] The buggy address belongs to the object at ffff888102b6b880
[   17.508982]  which belongs to the cache kmalloc-64 of size 64
[   17.509183] The buggy address is located 0 bytes to the right of
[   17.509183]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.509400] 
[   17.509458] The buggy address belongs to the physical page:
[   17.509567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.509820] flags: 0x200000000000000(node=0|zone=2)
[   17.510043] page_type: f5(slab)
[   17.510210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.510553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.510861] page dumped because: kasan: bad access detected
[   17.511090] 
[   17.511181] Memory state around the buggy address:
[   17.511400]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.511721]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.512019] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.512368]                                      ^
[   17.512624]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.512977]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.513335] ==================================================================
[   17.121989] ==================================================================
[   17.122192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   17.122357] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.122615] 
[   17.122737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.122792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.122807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.122831] Call Trace:
[   17.122853]  <TASK>
[   17.122874]  dump_stack_lvl+0x73/0xb0
[   17.122905]  print_report+0xd1/0x650
[   17.122931]  ? __virt_addr_valid+0x1db/0x2d0
[   17.122955]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.122977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.123000]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.123022]  kasan_report+0x141/0x180
[   17.123044]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.123072]  kasan_check_range+0x10c/0x1c0
[   17.123097]  __kasan_check_write+0x18/0x20
[   17.123117]  kasan_atomics_helper+0xb6a/0x5450
[   17.123140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.123164]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.123185]  ? kasan_atomics+0x152/0x310
[   17.123212]  kasan_atomics+0x1dc/0x310
[   17.123247]  ? __pfx_kasan_atomics+0x10/0x10
[   17.123273]  ? __pfx_read_tsc+0x10/0x10
[   17.123296]  ? ktime_get_ts64+0x86/0x230
[   17.123322]  kunit_try_run_case+0x1a5/0x480
[   17.123348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.123394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.123417]  ? __kthread_parkme+0x82/0x180
[   17.123438]  ? preempt_count_sub+0x50/0x80
[   17.123525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.123574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.123597]  kthread+0x337/0x6f0
[   17.123618]  ? trace_preempt_on+0x20/0xc0
[   17.123643]  ? __pfx_kthread+0x10/0x10
[   17.123664]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.123686]  ? calculate_sigpending+0x7b/0xa0
[   17.123712]  ? __pfx_kthread+0x10/0x10
[   17.123734]  ret_from_fork+0x116/0x1d0
[   17.123752]  ? __pfx_kthread+0x10/0x10
[   17.123774]  ret_from_fork_asm+0x1a/0x30
[   17.123805]  </TASK>
[   17.123819] 
[   17.130898] Allocated by task 283:
[   17.131047]  kasan_save_stack+0x45/0x70
[   17.131243]  kasan_save_track+0x18/0x40
[   17.131434]  kasan_save_alloc_info+0x3b/0x50
[   17.131640]  __kasan_kmalloc+0xb7/0xc0
[   17.131834]  __kmalloc_cache_noprof+0x189/0x420
[   17.131995]  kasan_atomics+0x95/0x310
[   17.132181]  kunit_try_run_case+0x1a5/0x480
[   17.132308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.132781]  kthread+0x337/0x6f0
[   17.132975]  ret_from_fork+0x116/0x1d0
[   17.133075]  ret_from_fork_asm+0x1a/0x30
[   17.133167] 
[   17.133273] The buggy address belongs to the object at ffff888102b6b880
[   17.133273]  which belongs to the cache kmalloc-64 of size 64
[   17.133757] The buggy address is located 0 bytes to the right of
[   17.133757]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.134183] 
[   17.134308] The buggy address belongs to the physical page:
[   17.134434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.134631] flags: 0x200000000000000(node=0|zone=2)
[   17.134736] page_type: f5(slab)
[   17.134822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.134954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.135081] page dumped because: kasan: bad access detected
[   17.135181] 
[   17.135846] Memory state around the buggy address:
[   17.136251]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.136718]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.137178] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.137535]                                      ^
[   17.137823]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.138048]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.138246] ==================================================================
[   17.032712] ==================================================================
[   17.032975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   17.033134] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.034021] 
[   17.034247] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.034427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.034449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.034496] Call Trace:
[   17.034527]  <TASK>
[   17.034548]  dump_stack_lvl+0x73/0xb0
[   17.034593]  print_report+0xd1/0x650
[   17.034618]  ? __virt_addr_valid+0x1db/0x2d0
[   17.034641]  ? kasan_atomics_helper+0x860/0x5450
[   17.034664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.034687]  ? kasan_atomics_helper+0x860/0x5450
[   17.034710]  kasan_report+0x141/0x180
[   17.034733]  ? kasan_atomics_helper+0x860/0x5450
[   17.034760]  kasan_check_range+0x10c/0x1c0
[   17.034784]  __kasan_check_write+0x18/0x20
[   17.034805]  kasan_atomics_helper+0x860/0x5450
[   17.034829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.034852]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.034875]  ? kasan_atomics+0x152/0x310
[   17.034903]  kasan_atomics+0x1dc/0x310
[   17.034926]  ? __pfx_kasan_atomics+0x10/0x10
[   17.034951]  ? __pfx_read_tsc+0x10/0x10
[   17.034973]  ? ktime_get_ts64+0x86/0x230
[   17.034998]  kunit_try_run_case+0x1a5/0x480
[   17.035022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.035045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.035068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.035091]  ? __kthread_parkme+0x82/0x180
[   17.035112]  ? preempt_count_sub+0x50/0x80
[   17.035137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.035161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.035185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.035208]  kthread+0x337/0x6f0
[   17.035247]  ? trace_preempt_on+0x20/0xc0
[   17.035274]  ? __pfx_kthread+0x10/0x10
[   17.035296]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.035318]  ? calculate_sigpending+0x7b/0xa0
[   17.035344]  ? __pfx_kthread+0x10/0x10
[   17.035366]  ret_from_fork+0x116/0x1d0
[   17.035385]  ? __pfx_kthread+0x10/0x10
[   17.035407]  ret_from_fork_asm+0x1a/0x30
[   17.035440]  </TASK>
[   17.035465] 
[   17.043023] Allocated by task 283:
[   17.043236]  kasan_save_stack+0x45/0x70
[   17.043439]  kasan_save_track+0x18/0x40
[   17.043602]  kasan_save_alloc_info+0x3b/0x50
[   17.044084]  __kasan_kmalloc+0xb7/0xc0
[   17.044256]  __kmalloc_cache_noprof+0x189/0x420
[   17.044413]  kasan_atomics+0x95/0x310
[   17.044730]  kunit_try_run_case+0x1a5/0x480
[   17.044971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.045110]  kthread+0x337/0x6f0
[   17.045261]  ret_from_fork+0x116/0x1d0
[   17.045568]  ret_from_fork_asm+0x1a/0x30
[   17.045715] 
[   17.045841] The buggy address belongs to the object at ffff888102b6b880
[   17.045841]  which belongs to the cache kmalloc-64 of size 64
[   17.046116] The buggy address is located 0 bytes to the right of
[   17.046116]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.046477] 
[   17.046864] The buggy address belongs to the physical page:
[   17.047149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.047324] flags: 0x200000000000000(node=0|zone=2)
[   17.047731] page_type: f5(slab)
[   17.047935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.048571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.049098] page dumped because: kasan: bad access detected
[   17.049243] 
[   17.049300] Memory state around the buggy address:
[   17.049583]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.049866]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.050193] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.050351]                                      ^
[   17.050610]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.050890]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051142] ==================================================================
[   16.910987] ==================================================================
[   16.911743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.912006] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.912275] 
[   16.912396] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.912503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.912520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.912545] Call Trace:
[   16.912568]  <TASK>
[   16.912590]  dump_stack_lvl+0x73/0xb0
[   16.912619]  print_report+0xd1/0x650
[   16.912643]  ? __virt_addr_valid+0x1db/0x2d0
[   16.912668]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.912713]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912735]  kasan_report+0x141/0x180
[   16.912758]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912785]  kasan_check_range+0x10c/0x1c0
[   16.912810]  __kasan_check_write+0x18/0x20
[   16.912831]  kasan_atomics_helper+0x4a0/0x5450
[   16.912854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.912879]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.912902]  ? kasan_atomics+0x152/0x310
[   16.912928]  kasan_atomics+0x1dc/0x310
[   16.912952]  ? __pfx_kasan_atomics+0x10/0x10
[   16.912976]  ? __pfx_read_tsc+0x10/0x10
[   16.912998]  ? ktime_get_ts64+0x86/0x230
[   16.913023]  kunit_try_run_case+0x1a5/0x480
[   16.913048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.913070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.913094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.913116]  ? __kthread_parkme+0x82/0x180
[   16.913137]  ? preempt_count_sub+0x50/0x80
[   16.913162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.913186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.913208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.913240]  kthread+0x337/0x6f0
[   16.913263]  ? trace_preempt_on+0x20/0xc0
[   16.913287]  ? __pfx_kthread+0x10/0x10
[   16.913309]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.913330]  ? calculate_sigpending+0x7b/0xa0
[   16.913355]  ? __pfx_kthread+0x10/0x10
[   16.913377]  ret_from_fork+0x116/0x1d0
[   16.913396]  ? __pfx_kthread+0x10/0x10
[   16.913417]  ret_from_fork_asm+0x1a/0x30
[   16.913499]  </TASK>
[   16.913516] 
[   16.919733] Allocated by task 283:
[   16.919899]  kasan_save_stack+0x45/0x70
[   16.920090]  kasan_save_track+0x18/0x40
[   16.920234]  kasan_save_alloc_info+0x3b/0x50
[   16.920417]  __kasan_kmalloc+0xb7/0xc0
[   16.920742]  __kmalloc_cache_noprof+0x189/0x420
[   16.920853]  kasan_atomics+0x95/0x310
[   16.920939]  kunit_try_run_case+0x1a5/0x480
[   16.921032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.921137]  kthread+0x337/0x6f0
[   16.921216]  ret_from_fork+0x116/0x1d0
[   16.921422]  ret_from_fork_asm+0x1a/0x30
[   16.921747] 
[   16.921876] The buggy address belongs to the object at ffff888102b6b880
[   16.921876]  which belongs to the cache kmalloc-64 of size 64
[   16.922624] The buggy address is located 0 bytes to the right of
[   16.922624]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.922940] 
[   16.923061] The buggy address belongs to the physical page:
[   16.923682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.923924] flags: 0x200000000000000(node=0|zone=2)
[   16.924112] page_type: f5(slab)
[   16.924277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.925855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.926134] page dumped because: kasan: bad access detected
[   16.926329] 
[   16.926540] Memory state around the buggy address:
[   16.926704]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.926944]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.927127] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.927422]                                      ^
[   16.927581]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.927710]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928003] ==================================================================
[   17.155075] ==================================================================
[   17.155561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   17.156013] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.156527] 
[   17.156673] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.156727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.156741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.156765] Call Trace:
[   17.156786]  <TASK>
[   17.156807]  dump_stack_lvl+0x73/0xb0
[   17.156837]  print_report+0xd1/0x650
[   17.156862]  ? __virt_addr_valid+0x1db/0x2d0
[   17.156888]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.156912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.156937]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.156960]  kasan_report+0x141/0x180
[   17.156985]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.157013]  __asan_report_load4_noabort+0x18/0x20
[   17.157036]  kasan_atomics_helper+0x4a84/0x5450
[   17.157060]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.157084]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.157107]  ? kasan_atomics+0x152/0x310
[   17.157135]  kasan_atomics+0x1dc/0x310
[   17.157159]  ? __pfx_kasan_atomics+0x10/0x10
[   17.157186]  ? __pfx_read_tsc+0x10/0x10
[   17.157208]  ? ktime_get_ts64+0x86/0x230
[   17.157245]  kunit_try_run_case+0x1a5/0x480
[   17.157273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.157295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.157319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.157342]  ? __kthread_parkme+0x82/0x180
[   17.157363]  ? preempt_count_sub+0x50/0x80
[   17.157388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.157412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.157435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.157529]  kthread+0x337/0x6f0
[   17.157554]  ? trace_preempt_on+0x20/0xc0
[   17.157582]  ? __pfx_kthread+0x10/0x10
[   17.157603]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.157626]  ? calculate_sigpending+0x7b/0xa0
[   17.157653]  ? __pfx_kthread+0x10/0x10
[   17.157676]  ret_from_fork+0x116/0x1d0
[   17.157696]  ? __pfx_kthread+0x10/0x10
[   17.157718]  ret_from_fork_asm+0x1a/0x30
[   17.157752]  </TASK>
[   17.157764] 
[   17.163847] Allocated by task 283:
[   17.164068]  kasan_save_stack+0x45/0x70
[   17.164271]  kasan_save_track+0x18/0x40
[   17.164551]  kasan_save_alloc_info+0x3b/0x50
[   17.164827]  __kasan_kmalloc+0xb7/0xc0
[   17.165034]  __kmalloc_cache_noprof+0x189/0x420
[   17.165204]  kasan_atomics+0x95/0x310
[   17.165305]  kunit_try_run_case+0x1a5/0x480
[   17.165400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.165884]  kthread+0x337/0x6f0
[   17.166090]  ret_from_fork+0x116/0x1d0
[   17.166355]  ret_from_fork_asm+0x1a/0x30
[   17.167375] 
[   17.167521] The buggy address belongs to the object at ffff888102b6b880
[   17.167521]  which belongs to the cache kmalloc-64 of size 64
[   17.167921] The buggy address is located 0 bytes to the right of
[   17.167921]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.168124] 
[   17.168521] The buggy address belongs to the physical page:
[   17.168944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.169502] flags: 0x200000000000000(node=0|zone=2)
[   17.169890] page_type: f5(slab)
[   17.170012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.170153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.170344] page dumped because: kasan: bad access detected
[   17.170594] 
[   17.170662] Memory state around the buggy address:
[   17.170816]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.171112]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.171385] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.171603]                                      ^
[   17.171701]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.172044]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.172780] ==================================================================
[   17.546019] ==================================================================
[   17.546463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.546889] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.547200] 
[   17.547339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.547389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.547404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.547424] Call Trace:
[   17.547440]  <TASK>
[   17.547454]  dump_stack_lvl+0x73/0xb0
[   17.547480]  print_report+0xd1/0x650
[   17.547501]  ? __virt_addr_valid+0x1db/0x2d0
[   17.547525]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.547568]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547590]  kasan_report+0x141/0x180
[   17.547614]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547640]  kasan_check_range+0x10c/0x1c0
[   17.547664]  __kasan_check_write+0x18/0x20
[   17.547684]  kasan_atomics_helper+0x1818/0x5450
[   17.547707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.547730]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.547751]  ? kasan_atomics+0x152/0x310
[   17.547777]  kasan_atomics+0x1dc/0x310
[   17.547801]  ? __pfx_kasan_atomics+0x10/0x10
[   17.547825]  ? __pfx_read_tsc+0x10/0x10
[   17.547846]  ? ktime_get_ts64+0x86/0x230
[   17.547869]  kunit_try_run_case+0x1a5/0x480
[   17.547893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.547915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.547938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.547959]  ? __kthread_parkme+0x82/0x180
[   17.547980]  ? preempt_count_sub+0x50/0x80
[   17.548002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.548026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.548048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.548071]  kthread+0x337/0x6f0
[   17.548091]  ? trace_preempt_on+0x20/0xc0
[   17.548113]  ? __pfx_kthread+0x10/0x10
[   17.548135]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.548156]  ? calculate_sigpending+0x7b/0xa0
[   17.548179]  ? __pfx_kthread+0x10/0x10
[   17.548200]  ret_from_fork+0x116/0x1d0
[   17.548219]  ? __pfx_kthread+0x10/0x10
[   17.548498]  ret_from_fork_asm+0x1a/0x30
[   17.548531]  </TASK>
[   17.548543] 
[   17.554827] Allocated by task 283:
[   17.554932]  kasan_save_stack+0x45/0x70
[   17.555120]  kasan_save_track+0x18/0x40
[   17.555285]  kasan_save_alloc_info+0x3b/0x50
[   17.555383]  __kasan_kmalloc+0xb7/0xc0
[   17.555471]  __kmalloc_cache_noprof+0x189/0x420
[   17.555566]  kasan_atomics+0x95/0x310
[   17.555650]  kunit_try_run_case+0x1a5/0x480
[   17.555740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.555841]  kthread+0x337/0x6f0
[   17.555918]  ret_from_fork+0x116/0x1d0
[   17.556000]  ret_from_fork_asm+0x1a/0x30
[   17.556091] 
[   17.556144] The buggy address belongs to the object at ffff888102b6b880
[   17.556144]  which belongs to the cache kmalloc-64 of size 64
[   17.556678] The buggy address is located 0 bytes to the right of
[   17.556678]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.557415] 
[   17.557544] The buggy address belongs to the physical page:
[   17.557887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.558358] flags: 0x200000000000000(node=0|zone=2)
[   17.558589] page_type: f5(slab)
[   17.558682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.558824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.558956] page dumped because: kasan: bad access detected
[   17.559060] 
[   17.559112] Memory state around the buggy address:
[   17.559212]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.559544]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.559974] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.560378]                                      ^
[   17.560684]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.561106]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.561270] ==================================================================
[   16.981097] ==================================================================
[   16.981402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.981793] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.982140] 
[   16.982273] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.982346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.982363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.982397] Call Trace:
[   16.982420]  <TASK>
[   16.982440]  dump_stack_lvl+0x73/0xb0
[   16.982552]  print_report+0xd1/0x650
[   16.982577]  ? __virt_addr_valid+0x1db/0x2d0
[   16.982615]  ? kasan_atomics_helper+0x697/0x5450
[   16.982638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.982672]  ? kasan_atomics_helper+0x697/0x5450
[   16.982698]  kasan_report+0x141/0x180
[   16.982722]  ? kasan_atomics_helper+0x697/0x5450
[   16.982761]  kasan_check_range+0x10c/0x1c0
[   16.982788]  __kasan_check_write+0x18/0x20
[   16.982818]  kasan_atomics_helper+0x697/0x5450
[   16.982846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.982870]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.982903]  ? kasan_atomics+0x152/0x310
[   16.982933]  kasan_atomics+0x1dc/0x310
[   16.982958]  ? __pfx_kasan_atomics+0x10/0x10
[   16.982997]  ? __pfx_read_tsc+0x10/0x10
[   16.983019]  ? ktime_get_ts64+0x86/0x230
[   16.983055]  kunit_try_run_case+0x1a5/0x480
[   16.983082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.983142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.983167]  ? __kthread_parkme+0x82/0x180
[   16.983194]  ? preempt_count_sub+0x50/0x80
[   16.983233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.983285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.983319]  kthread+0x337/0x6f0
[   16.983341]  ? trace_preempt_on+0x20/0xc0
[   16.983367]  ? __pfx_kthread+0x10/0x10
[   16.983389]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.983411]  ? calculate_sigpending+0x7b/0xa0
[   16.983436]  ? __pfx_kthread+0x10/0x10
[   16.983516]  ret_from_fork+0x116/0x1d0
[   16.983540]  ? __pfx_kthread+0x10/0x10
[   16.983563]  ret_from_fork_asm+0x1a/0x30
[   16.983595]  </TASK>
[   16.983609] 
[   16.989042] Allocated by task 283:
[   16.989251]  kasan_save_stack+0x45/0x70
[   16.989556]  kasan_save_track+0x18/0x40
[   16.989814]  kasan_save_alloc_info+0x3b/0x50
[   16.990086]  __kasan_kmalloc+0xb7/0xc0
[   16.990318]  __kmalloc_cache_noprof+0x189/0x420
[   16.990672]  kasan_atomics+0x95/0x310
[   16.990920]  kunit_try_run_case+0x1a5/0x480
[   16.991076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.991194]  kthread+0x337/0x6f0
[   16.991291]  ret_from_fork+0x116/0x1d0
[   16.991407]  ret_from_fork_asm+0x1a/0x30
[   16.991835] 
[   16.991961] The buggy address belongs to the object at ffff888102b6b880
[   16.991961]  which belongs to the cache kmalloc-64 of size 64
[   16.992442] The buggy address is located 0 bytes to the right of
[   16.992442]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.992952] 
[   16.993024] The buggy address belongs to the physical page:
[   16.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.993638] flags: 0x200000000000000(node=0|zone=2)
[   16.994985] page_type: f5(slab)
[   16.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.995398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.995932] page dumped because: kasan: bad access detected
[   16.996350] 
[   16.996449] Memory state around the buggy address:
[   16.996879]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.997201]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.997483] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.997719]                                      ^
[   16.997909]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.998139]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.998379] ==================================================================
[   16.963147] ==================================================================
[   16.963584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.964103] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.964589] 
[   16.964727] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.964783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.964807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.964831] Call Trace:
[   16.964851]  <TASK>
[   16.964870]  dump_stack_lvl+0x73/0xb0
[   16.964899]  print_report+0xd1/0x650
[   16.964923]  ? __virt_addr_valid+0x1db/0x2d0
[   16.964947]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.964971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.964995]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.965018]  kasan_report+0x141/0x180
[   16.965041]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.965069]  kasan_check_range+0x10c/0x1c0
[   16.965094]  __kasan_check_write+0x18/0x20
[   16.965114]  kasan_atomics_helper+0x5fe/0x5450
[   16.965138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.965161]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.965184]  ? kasan_atomics+0x152/0x310
[   16.965211]  kasan_atomics+0x1dc/0x310
[   16.965246]  ? __pfx_kasan_atomics+0x10/0x10
[   16.965272]  ? __pfx_read_tsc+0x10/0x10
[   16.965294]  ? ktime_get_ts64+0x86/0x230
[   16.965319]  kunit_try_run_case+0x1a5/0x480
[   16.965344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.965367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.965391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.965415]  ? __kthread_parkme+0x82/0x180
[   16.965437]  ? preempt_count_sub+0x50/0x80
[   16.965546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.965573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.965608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.965635]  kthread+0x337/0x6f0
[   16.965656]  ? trace_preempt_on+0x20/0xc0
[   16.965682]  ? __pfx_kthread+0x10/0x10
[   16.965705]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.965727]  ? calculate_sigpending+0x7b/0xa0
[   16.965753]  ? __pfx_kthread+0x10/0x10
[   16.965777]  ret_from_fork+0x116/0x1d0
[   16.965795]  ? __pfx_kthread+0x10/0x10
[   16.965818]  ret_from_fork_asm+0x1a/0x30
[   16.965850]  </TASK>
[   16.965862] 
[   16.972509] Allocated by task 283:
[   16.972681]  kasan_save_stack+0x45/0x70
[   16.972820]  kasan_save_track+0x18/0x40
[   16.972990]  kasan_save_alloc_info+0x3b/0x50
[   16.973196]  __kasan_kmalloc+0xb7/0xc0
[   16.973310]  __kmalloc_cache_noprof+0x189/0x420
[   16.973425]  kasan_atomics+0x95/0x310
[   16.973826]  kunit_try_run_case+0x1a5/0x480
[   16.974116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.974536]  kthread+0x337/0x6f0
[   16.974768]  ret_from_fork+0x116/0x1d0
[   16.975025]  ret_from_fork_asm+0x1a/0x30
[   16.975231] 
[   16.975290] The buggy address belongs to the object at ffff888102b6b880
[   16.975290]  which belongs to the cache kmalloc-64 of size 64
[   16.975768] The buggy address is located 0 bytes to the right of
[   16.975768]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.976271] 
[   16.976361] The buggy address belongs to the physical page:
[   16.976603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.976835] flags: 0x200000000000000(node=0|zone=2)
[   16.976940] page_type: f5(slab)
[   16.977030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.977163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.977300] page dumped because: kasan: bad access detected
[   16.977403] 
[   16.977503] Memory state around the buggy address:
[   16.977714]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.978017]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.978356] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.978877]                                      ^
[   16.979098]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.979566]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.979915] ==================================================================
[   17.514110] ==================================================================
[   17.514297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.515135] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.515471] 
[   17.515631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.515685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.515699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.515733] Call Trace:
[   17.515753]  <TASK>
[   17.515771]  dump_stack_lvl+0x73/0xb0
[   17.515816]  print_report+0xd1/0x650
[   17.515842]  ? __virt_addr_valid+0x1db/0x2d0
[   17.515877]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.515905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.515929]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.515966]  kasan_report+0x141/0x180
[   17.515992]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.516022]  kasan_check_range+0x10c/0x1c0
[   17.516048]  __kasan_check_write+0x18/0x20
[   17.516068]  kasan_atomics_helper+0x16e7/0x5450
[   17.516094]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.516118]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.516141]  ? kasan_atomics+0x152/0x310
[   17.516170]  kasan_atomics+0x1dc/0x310
[   17.516202]  ? __pfx_kasan_atomics+0x10/0x10
[   17.516241]  ? __pfx_read_tsc+0x10/0x10
[   17.516267]  ? ktime_get_ts64+0x86/0x230
[   17.516293]  kunit_try_run_case+0x1a5/0x480
[   17.516320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.516367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.516391]  ? __kthread_parkme+0x82/0x180
[   17.516412]  ? preempt_count_sub+0x50/0x80
[   17.516437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.516510]  kthread+0x337/0x6f0
[   17.516530]  ? trace_preempt_on+0x20/0xc0
[   17.516556]  ? __pfx_kthread+0x10/0x10
[   17.516577]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.516600]  ? calculate_sigpending+0x7b/0xa0
[   17.516625]  ? __pfx_kthread+0x10/0x10
[   17.516648]  ret_from_fork+0x116/0x1d0
[   17.516669]  ? __pfx_kthread+0x10/0x10
[   17.516691]  ret_from_fork_asm+0x1a/0x30
[   17.516725]  </TASK>
[   17.516738] 
[   17.522859] Allocated by task 283:
[   17.523058]  kasan_save_stack+0x45/0x70
[   17.523283]  kasan_save_track+0x18/0x40
[   17.523463]  kasan_save_alloc_info+0x3b/0x50
[   17.523658]  __kasan_kmalloc+0xb7/0xc0
[   17.523859]  __kmalloc_cache_noprof+0x189/0x420
[   17.524044]  kasan_atomics+0x95/0x310
[   17.524245]  kunit_try_run_case+0x1a5/0x480
[   17.524451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.524634]  kthread+0x337/0x6f0
[   17.524819]  ret_from_fork+0x116/0x1d0
[   17.524909]  ret_from_fork_asm+0x1a/0x30
[   17.525115] 
[   17.525256] The buggy address belongs to the object at ffff888102b6b880
[   17.525256]  which belongs to the cache kmalloc-64 of size 64
[   17.525706] The buggy address is located 0 bytes to the right of
[   17.525706]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.526040] 
[   17.526099] The buggy address belongs to the physical page:
[   17.526206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.526674] flags: 0x200000000000000(node=0|zone=2)
[   17.526990] page_type: f5(slab)
[   17.527089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.527244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.527624] page dumped because: kasan: bad access detected
[   17.527911] 
[   17.528033] Memory state around the buggy address:
[   17.528359]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.528599]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.528818] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.529067]                                      ^
[   17.529309]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529486]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529616] ==================================================================
[   16.856663] ==================================================================
[   16.857053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.857284] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.857420] 
[   16.857522] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.857854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.857880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.857905] Call Trace:
[   16.857929]  <TASK>
[   16.857980]  dump_stack_lvl+0x73/0xb0
[   16.858017]  print_report+0xd1/0x650
[   16.858051]  ? __virt_addr_valid+0x1db/0x2d0
[   16.858108]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.858165]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858189]  kasan_report+0x141/0x180
[   16.858254]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858286]  __asan_report_store4_noabort+0x1b/0x30
[   16.858317]  kasan_atomics_helper+0x4b6e/0x5450
[   16.858351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.858375]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.858397]  ? kasan_atomics+0x152/0x310
[   16.858424]  kasan_atomics+0x1dc/0x310
[   16.858447]  ? __pfx_kasan_atomics+0x10/0x10
[   16.858471]  ? __pfx_read_tsc+0x10/0x10
[   16.858493]  ? ktime_get_ts64+0x86/0x230
[   16.858518]  kunit_try_run_case+0x1a5/0x480
[   16.858543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.858707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.858738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.858798]  ? __kthread_parkme+0x82/0x180
[   16.858822]  ? preempt_count_sub+0x50/0x80
[   16.858848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.858873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.858899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.858925]  kthread+0x337/0x6f0
[   16.858947]  ? trace_preempt_on+0x20/0xc0
[   16.858974]  ? __pfx_kthread+0x10/0x10
[   16.858997]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.859020]  ? calculate_sigpending+0x7b/0xa0
[   16.859047]  ? __pfx_kthread+0x10/0x10
[   16.859071]  ret_from_fork+0x116/0x1d0
[   16.859092]  ? __pfx_kthread+0x10/0x10
[   16.859116]  ret_from_fork_asm+0x1a/0x30
[   16.859152]  </TASK>
[   16.859166] 
[   16.866583] Allocated by task 283:
[   16.866980]  kasan_save_stack+0x45/0x70
[   16.867372]  kasan_save_track+0x18/0x40
[   16.867844]  kasan_save_alloc_info+0x3b/0x50
[   16.868060]  __kasan_kmalloc+0xb7/0xc0
[   16.868333]  __kmalloc_cache_noprof+0x189/0x420
[   16.868840]  kasan_atomics+0x95/0x310
[   16.869051]  kunit_try_run_case+0x1a5/0x480
[   16.869278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.869477]  kthread+0x337/0x6f0
[   16.869657]  ret_from_fork+0x116/0x1d0
[   16.869839]  ret_from_fork_asm+0x1a/0x30
[   16.869965] 
[   16.870090] The buggy address belongs to the object at ffff888102b6b880
[   16.870090]  which belongs to the cache kmalloc-64 of size 64
[   16.870385] The buggy address is located 0 bytes to the right of
[   16.870385]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.870814] 
[   16.870917] The buggy address belongs to the physical page:
[   16.871109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.871631] flags: 0x200000000000000(node=0|zone=2)
[   16.871807] page_type: f5(slab)
[   16.871976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.872270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.872602] page dumped because: kasan: bad access detected
[   16.872773] 
[   16.872915] Memory state around the buggy address:
[   16.873077]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.873327]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.873756] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.874177]                                      ^
[   16.874448]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874750]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.875039] ==================================================================
[   17.052010] ==================================================================
[   17.052629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   17.052825] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.053216] 
[   17.053349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.053414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.053429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.053475] Call Trace:
[   17.053494]  <TASK>
[   17.053514]  dump_stack_lvl+0x73/0xb0
[   17.053610]  print_report+0xd1/0x650
[   17.053662]  ? __virt_addr_valid+0x1db/0x2d0
[   17.053688]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.053746]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053769]  kasan_report+0x141/0x180
[   17.053793]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053820]  kasan_check_range+0x10c/0x1c0
[   17.053845]  __kasan_check_write+0x18/0x20
[   17.053865]  kasan_atomics_helper+0x8f9/0x5450
[   17.053890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.053913]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.053934]  ? kasan_atomics+0x152/0x310
[   17.053962]  kasan_atomics+0x1dc/0x310
[   17.053986]  ? __pfx_kasan_atomics+0x10/0x10
[   17.054010]  ? __pfx_read_tsc+0x10/0x10
[   17.054032]  ? ktime_get_ts64+0x86/0x230
[   17.054057]  kunit_try_run_case+0x1a5/0x480
[   17.054082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.054104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.054128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.054151]  ? __kthread_parkme+0x82/0x180
[   17.054172]  ? preempt_count_sub+0x50/0x80
[   17.054197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.054236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.054264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.054288]  kthread+0x337/0x6f0
[   17.054309]  ? trace_preempt_on+0x20/0xc0
[   17.054342]  ? __pfx_kthread+0x10/0x10
[   17.054368]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.054391]  ? calculate_sigpending+0x7b/0xa0
[   17.054417]  ? __pfx_kthread+0x10/0x10
[   17.054440]  ret_from_fork+0x116/0x1d0
[   17.054461]  ? __pfx_kthread+0x10/0x10
[   17.054582]  ret_from_fork_asm+0x1a/0x30
[   17.054623]  </TASK>
[   17.054639] 
[   17.060459] Allocated by task 283:
[   17.061407]  kasan_save_stack+0x45/0x70
[   17.061749]  kasan_save_track+0x18/0x40
[   17.061905]  kasan_save_alloc_info+0x3b/0x50
[   17.062001]  __kasan_kmalloc+0xb7/0xc0
[   17.062123]  __kmalloc_cache_noprof+0x189/0x420
[   17.062352]  kasan_atomics+0x95/0x310
[   17.062919]  kunit_try_run_case+0x1a5/0x480
[   17.063207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.063340]  kthread+0x337/0x6f0
[   17.063619]  ret_from_fork+0x116/0x1d0
[   17.064130]  ret_from_fork_asm+0x1a/0x30
[   17.064282] 
[   17.064378] The buggy address belongs to the object at ffff888102b6b880
[   17.064378]  which belongs to the cache kmalloc-64 of size 64
[   17.064907] The buggy address is located 0 bytes to the right of
[   17.064907]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.065292] 
[   17.065413] The buggy address belongs to the physical page:
[   17.065847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.066016] flags: 0x200000000000000(node=0|zone=2)
[   17.066135] page_type: f5(slab)
[   17.066342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.066836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.067050] page dumped because: kasan: bad access detected
[   17.067158] 
[   17.067212] Memory state around the buggy address:
[   17.067485]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.067920]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.068085] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.068427]                                      ^
[   17.068960]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.069123]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.069329] ==================================================================
[   17.257066] ==================================================================
[   17.257424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   17.257770] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.258170] 
[   17.258296] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.258355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.258370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.258393] Call Trace:
[   17.258409]  <TASK>
[   17.258426]  dump_stack_lvl+0x73/0xb0
[   17.258453]  print_report+0xd1/0x650
[   17.258478]  ? __virt_addr_valid+0x1db/0x2d0
[   17.258503]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.258549]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258572]  kasan_report+0x141/0x180
[   17.258596]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258624]  __asan_report_load4_noabort+0x18/0x20
[   17.258646]  kasan_atomics_helper+0x4a36/0x5450
[   17.258670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.258694]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.258715]  ? kasan_atomics+0x152/0x310
[   17.258743]  kasan_atomics+0x1dc/0x310
[   17.258768]  ? __pfx_kasan_atomics+0x10/0x10
[   17.258793]  ? __pfx_read_tsc+0x10/0x10
[   17.258814]  ? ktime_get_ts64+0x86/0x230
[   17.258840]  kunit_try_run_case+0x1a5/0x480
[   17.258865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.258888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.258912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.258936]  ? __kthread_parkme+0x82/0x180
[   17.258958]  ? preempt_count_sub+0x50/0x80
[   17.258982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.259007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.259030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.259054]  kthread+0x337/0x6f0
[   17.259075]  ? trace_preempt_on+0x20/0xc0
[   17.259098]  ? __pfx_kthread+0x10/0x10
[   17.259121]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.259143]  ? calculate_sigpending+0x7b/0xa0
[   17.259169]  ? __pfx_kthread+0x10/0x10
[   17.259192]  ret_from_fork+0x116/0x1d0
[   17.259211]  ? __pfx_kthread+0x10/0x10
[   17.259245]  ret_from_fork_asm+0x1a/0x30
[   17.259278]  </TASK>
[   17.259290] 
[   17.267599] Allocated by task 283:
[   17.267745]  kasan_save_stack+0x45/0x70
[   17.267864]  kasan_save_track+0x18/0x40
[   17.267956]  kasan_save_alloc_info+0x3b/0x50
[   17.268176]  __kasan_kmalloc+0xb7/0xc0
[   17.268331]  __kmalloc_cache_noprof+0x189/0x420
[   17.268593]  kasan_atomics+0x95/0x310
[   17.268744]  kunit_try_run_case+0x1a5/0x480
[   17.268871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.268988]  kthread+0x337/0x6f0
[   17.269094]  ret_from_fork+0x116/0x1d0
[   17.269291]  ret_from_fork_asm+0x1a/0x30
[   17.269544] 
[   17.269677] The buggy address belongs to the object at ffff888102b6b880
[   17.269677]  which belongs to the cache kmalloc-64 of size 64
[   17.270194] The buggy address is located 0 bytes to the right of
[   17.270194]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.270660] 
[   17.270726] The buggy address belongs to the physical page:
[   17.271005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.271320] flags: 0x200000000000000(node=0|zone=2)
[   17.271511] page_type: f5(slab)
[   17.271611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.271939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.272172] page dumped because: kasan: bad access detected
[   17.272394] 
[   17.272512] Memory state around the buggy address:
[   17.272699]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.272927]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.273207] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.273547]                                      ^
[   17.273763]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274057]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274418] ==================================================================
[   17.808162] ==================================================================
[   17.808721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.809161] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.809619] 
[   17.810165] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.810235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.810251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.810275] Call Trace:
[   17.810302]  <TASK>
[   17.810320]  dump_stack_lvl+0x73/0xb0
[   17.810364]  print_report+0xd1/0x650
[   17.810390]  ? __virt_addr_valid+0x1db/0x2d0
[   17.810417]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.810467]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810491]  kasan_report+0x141/0x180
[   17.810514]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810542]  __asan_report_load8_noabort+0x18/0x20
[   17.810564]  kasan_atomics_helper+0x4fb2/0x5450
[   17.810588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.810611]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.810634]  ? kasan_atomics+0x152/0x310
[   17.810662]  kasan_atomics+0x1dc/0x310
[   17.810686]  ? __pfx_kasan_atomics+0x10/0x10
[   17.810711]  ? __pfx_read_tsc+0x10/0x10
[   17.810732]  ? ktime_get_ts64+0x86/0x230
[   17.810757]  kunit_try_run_case+0x1a5/0x480
[   17.810782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.810804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.810828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.810851]  ? __kthread_parkme+0x82/0x180
[   17.810872]  ? preempt_count_sub+0x50/0x80
[   17.810897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.810921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.810948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.810972]  kthread+0x337/0x6f0
[   17.810992]  ? trace_preempt_on+0x20/0xc0
[   17.811017]  ? __pfx_kthread+0x10/0x10
[   17.811041]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.811062]  ? calculate_sigpending+0x7b/0xa0
[   17.811087]  ? __pfx_kthread+0x10/0x10
[   17.811109]  ret_from_fork+0x116/0x1d0
[   17.811128]  ? __pfx_kthread+0x10/0x10
[   17.811150]  ret_from_fork_asm+0x1a/0x30
[   17.811212]  </TASK>
[   17.811233] 
[   17.817141] Allocated by task 283:
[   17.817395]  kasan_save_stack+0x45/0x70
[   17.817648]  kasan_save_track+0x18/0x40
[   17.817891]  kasan_save_alloc_info+0x3b/0x50
[   17.818023]  __kasan_kmalloc+0xb7/0xc0
[   17.818114]  __kmalloc_cache_noprof+0x189/0x420
[   17.818211]  kasan_atomics+0x95/0x310
[   17.818460]  kunit_try_run_case+0x1a5/0x480
[   17.818749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.818901]  kthread+0x337/0x6f0
[   17.818986]  ret_from_fork+0x116/0x1d0
[   17.819070]  ret_from_fork_asm+0x1a/0x30
[   17.819156] 
[   17.819209] The buggy address belongs to the object at ffff888102b6b880
[   17.819209]  which belongs to the cache kmalloc-64 of size 64
[   17.819929] The buggy address is located 0 bytes to the right of
[   17.819929]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.820429] 
[   17.820486] The buggy address belongs to the physical page:
[   17.820590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.820731] flags: 0x200000000000000(node=0|zone=2)
[   17.820834] page_type: f5(slab)
[   17.820919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.821266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.821752] page dumped because: kasan: bad access detected
[   17.822137] 
[   17.822312] Memory state around the buggy address:
[   17.822655]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.822917]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.823046] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.823171]                                      ^
[   17.823385]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.823819]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824237] ==================================================================
[   17.656898] ==================================================================
[   17.657196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.657487] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.657670] 
[   17.657802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.657866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.657880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.657902] Call Trace:
[   17.657919]  <TASK>
[   17.657935]  dump_stack_lvl+0x73/0xb0
[   17.657975]  print_report+0xd1/0x650
[   17.658008]  ? __virt_addr_valid+0x1db/0x2d0
[   17.658032]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.658094]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658118]  kasan_report+0x141/0x180
[   17.658150]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658186]  __asan_report_load8_noabort+0x18/0x20
[   17.658216]  kasan_atomics_helper+0x4f30/0x5450
[   17.658251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.658276]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.658299]  ? kasan_atomics+0x152/0x310
[   17.658327]  kasan_atomics+0x1dc/0x310
[   17.658360]  ? __pfx_kasan_atomics+0x10/0x10
[   17.658387]  ? __pfx_read_tsc+0x10/0x10
[   17.658410]  ? ktime_get_ts64+0x86/0x230
[   17.658437]  kunit_try_run_case+0x1a5/0x480
[   17.658461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.658506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.658529]  ? __kthread_parkme+0x82/0x180
[   17.658551]  ? preempt_count_sub+0x50/0x80
[   17.658575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.658622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.658646]  kthread+0x337/0x6f0
[   17.658666]  ? trace_preempt_on+0x20/0xc0
[   17.658711]  ? __pfx_kthread+0x10/0x10
[   17.658733]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.658755]  ? calculate_sigpending+0x7b/0xa0
[   17.658780]  ? __pfx_kthread+0x10/0x10
[   17.658802]  ret_from_fork+0x116/0x1d0
[   17.658838]  ? __pfx_kthread+0x10/0x10
[   17.658862]  ret_from_fork_asm+0x1a/0x30
[   17.658895]  </TASK>
[   17.658907] 
[   17.663311] Allocated by task 283:
[   17.663450]  kasan_save_stack+0x45/0x70
[   17.663542]  kasan_save_track+0x18/0x40
[   17.663631]  kasan_save_alloc_info+0x3b/0x50
[   17.663792]  __kasan_kmalloc+0xb7/0xc0
[   17.663951]  __kmalloc_cache_noprof+0x189/0x420
[   17.664149]  kasan_atomics+0x95/0x310
[   17.664276]  kunit_try_run_case+0x1a5/0x480
[   17.664451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.664558]  kthread+0x337/0x6f0
[   17.664638]  ret_from_fork+0x116/0x1d0
[   17.664720]  ret_from_fork_asm+0x1a/0x30
[   17.664808] 
[   17.664859] The buggy address belongs to the object at ffff888102b6b880
[   17.664859]  which belongs to the cache kmalloc-64 of size 64
[   17.665049] The buggy address is located 0 bytes to the right of
[   17.665049]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.665255] 
[   17.665311] The buggy address belongs to the physical page:
[   17.665414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.665662] flags: 0x200000000000000(node=0|zone=2)
[   17.665874] page_type: f5(slab)
[   17.666030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.666350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.666682] page dumped because: kasan: bad access detected
[   17.666913] 
[   17.667017] Memory state around the buggy address:
[   17.667217]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.667558]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.667837] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.668119]                                      ^
[   17.668357]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.668640]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.668851] ==================================================================
[   17.275491] ==================================================================
[   17.275862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   17.276097] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.276357] 
[   17.276478] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.276535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.276549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.276572] Call Trace:
[   17.276596]  <TASK>
[   17.276637]  dump_stack_lvl+0x73/0xb0
[   17.276678]  print_report+0xd1/0x650
[   17.276704]  ? __virt_addr_valid+0x1db/0x2d0
[   17.276728]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.276792]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276816]  kasan_report+0x141/0x180
[   17.276839]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276866]  kasan_check_range+0x10c/0x1c0
[   17.276891]  __kasan_check_write+0x18/0x20
[   17.276912]  kasan_atomics_helper+0x1079/0x5450
[   17.276936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.276959]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.276982]  ? kasan_atomics+0x152/0x310
[   17.277009]  kasan_atomics+0x1dc/0x310
[   17.277033]  ? __pfx_kasan_atomics+0x10/0x10
[   17.277057]  ? __pfx_read_tsc+0x10/0x10
[   17.277080]  ? ktime_get_ts64+0x86/0x230
[   17.277105]  kunit_try_run_case+0x1a5/0x480
[   17.277130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.277152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.277175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.277197]  ? __kthread_parkme+0x82/0x180
[   17.277218]  ? preempt_count_sub+0x50/0x80
[   17.277264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.277290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.277315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.277340]  kthread+0x337/0x6f0
[   17.277360]  ? trace_preempt_on+0x20/0xc0
[   17.277387]  ? __pfx_kthread+0x10/0x10
[   17.277409]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.277432]  ? calculate_sigpending+0x7b/0xa0
[   17.277459]  ? __pfx_kthread+0x10/0x10
[   17.277482]  ret_from_fork+0x116/0x1d0
[   17.277502]  ? __pfx_kthread+0x10/0x10
[   17.277525]  ret_from_fork_asm+0x1a/0x30
[   17.277559]  </TASK>
[   17.277573] 
[   17.283076] Allocated by task 283:
[   17.283207]  kasan_save_stack+0x45/0x70
[   17.283360]  kasan_save_track+0x18/0x40
[   17.283483]  kasan_save_alloc_info+0x3b/0x50
[   17.283659]  __kasan_kmalloc+0xb7/0xc0
[   17.283837]  __kmalloc_cache_noprof+0x189/0x420
[   17.284054]  kasan_atomics+0x95/0x310
[   17.284251]  kunit_try_run_case+0x1a5/0x480
[   17.284464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.284722]  kthread+0x337/0x6f0
[   17.284884]  ret_from_fork+0x116/0x1d0
[   17.285061]  ret_from_fork_asm+0x1a/0x30
[   17.285263] 
[   17.285363] The buggy address belongs to the object at ffff888102b6b880
[   17.285363]  which belongs to the cache kmalloc-64 of size 64
[   17.285834] The buggy address is located 0 bytes to the right of
[   17.285834]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.286345] 
[   17.286459] The buggy address belongs to the physical page:
[   17.286630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.286777] flags: 0x200000000000000(node=0|zone=2)
[   17.286886] page_type: f5(slab)
[   17.286976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.287240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.287627] page dumped because: kasan: bad access detected
[   17.287922] 
[   17.288027] Memory state around the buggy address:
[   17.288311]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.288597]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.288845] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.289043]                                      ^
[   17.289210]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.289490]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.289706] ==================================================================
[   17.208875] ==================================================================
[   17.209606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   17.210167] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.210468] 
[   17.210584] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.210651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.210667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.210693] Call Trace:
[   17.210709]  <TASK>
[   17.210738]  dump_stack_lvl+0x73/0xb0
[   17.210774]  print_report+0xd1/0x650
[   17.210812]  ? __virt_addr_valid+0x1db/0x2d0
[   17.210841]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.210889]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210914]  kasan_report+0x141/0x180
[   17.210939]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210968]  kasan_check_range+0x10c/0x1c0
[   17.210995]  __kasan_check_write+0x18/0x20
[   17.211017]  kasan_atomics_helper+0xe78/0x5450
[   17.211042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.211066]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.211090]  ? kasan_atomics+0x152/0x310
[   17.211119]  kasan_atomics+0x1dc/0x310
[   17.211144]  ? __pfx_kasan_atomics+0x10/0x10
[   17.211170]  ? __pfx_read_tsc+0x10/0x10
[   17.211193]  ? ktime_get_ts64+0x86/0x230
[   17.211228]  kunit_try_run_case+0x1a5/0x480
[   17.211270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.211297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.211322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.211360]  ? __kthread_parkme+0x82/0x180
[   17.211383]  ? preempt_count_sub+0x50/0x80
[   17.211409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.211434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.211459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.211484]  kthread+0x337/0x6f0
[   17.211505]  ? trace_preempt_on+0x20/0xc0
[   17.211531]  ? __pfx_kthread+0x10/0x10
[   17.211553]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.211576]  ? calculate_sigpending+0x7b/0xa0
[   17.211603]  ? __pfx_kthread+0x10/0x10
[   17.211627]  ret_from_fork+0x116/0x1d0
[   17.211646]  ? __pfx_kthread+0x10/0x10
[   17.211669]  ret_from_fork_asm+0x1a/0x30
[   17.211703]  </TASK>
[   17.211716] 
[   17.217549] Allocated by task 283:
[   17.217688]  kasan_save_stack+0x45/0x70
[   17.217790]  kasan_save_track+0x18/0x40
[   17.217883]  kasan_save_alloc_info+0x3b/0x50
[   17.217977]  __kasan_kmalloc+0xb7/0xc0
[   17.218063]  __kmalloc_cache_noprof+0x189/0x420
[   17.218160]  kasan_atomics+0x95/0x310
[   17.218391]  kunit_try_run_case+0x1a5/0x480
[   17.218670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.219020]  kthread+0x337/0x6f0
[   17.219264]  ret_from_fork+0x116/0x1d0
[   17.219533]  ret_from_fork_asm+0x1a/0x30
[   17.219711] 
[   17.219768] The buggy address belongs to the object at ffff888102b6b880
[   17.219768]  which belongs to the cache kmalloc-64 of size 64
[   17.220104] The buggy address is located 0 bytes to the right of
[   17.220104]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.220641] 
[   17.220743] The buggy address belongs to the physical page:
[   17.220958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.221105] flags: 0x200000000000000(node=0|zone=2)
[   17.221213] page_type: f5(slab)
[   17.221312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.221452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.221588] page dumped because: kasan: bad access detected
[   17.221698] 
[   17.221755] Memory state around the buggy address:
[   17.221993]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222448]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222890] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.223296]                                      ^
[   17.223587]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224002]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224260] ==================================================================
[   17.641244] ==================================================================
[   17.641893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.642300] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.642725] 
[   17.642877] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.642931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.642945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.642969] Call Trace:
[   17.642988]  <TASK>
[   17.643005]  dump_stack_lvl+0x73/0xb0
[   17.643034]  print_report+0xd1/0x650
[   17.643059]  ? __virt_addr_valid+0x1db/0x2d0
[   17.643084]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.643167]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643191]  kasan_report+0x141/0x180
[   17.643215]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643258]  kasan_check_range+0x10c/0x1c0
[   17.643300]  __kasan_check_write+0x18/0x20
[   17.643327]  kasan_atomics_helper+0x1c18/0x5450
[   17.643353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.643378]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.643401]  ? kasan_atomics+0x152/0x310
[   17.643428]  kasan_atomics+0x1dc/0x310
[   17.643470]  ? __pfx_kasan_atomics+0x10/0x10
[   17.643496]  ? __pfx_read_tsc+0x10/0x10
[   17.643518]  ? ktime_get_ts64+0x86/0x230
[   17.643542]  kunit_try_run_case+0x1a5/0x480
[   17.643566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.643598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.643622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.643645]  ? __kthread_parkme+0x82/0x180
[   17.643666]  ? preempt_count_sub+0x50/0x80
[   17.643690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.643728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.643755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.643779]  kthread+0x337/0x6f0
[   17.643799]  ? trace_preempt_on+0x20/0xc0
[   17.643824]  ? __pfx_kthread+0x10/0x10
[   17.643845]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.643884]  ? calculate_sigpending+0x7b/0xa0
[   17.643908]  ? __pfx_kthread+0x10/0x10
[   17.643931]  ret_from_fork+0x116/0x1d0
[   17.643950]  ? __pfx_kthread+0x10/0x10
[   17.643971]  ret_from_fork_asm+0x1a/0x30
[   17.644019]  </TASK>
[   17.644032] 
[   17.649928] Allocated by task 283:
[   17.650122]  kasan_save_stack+0x45/0x70
[   17.650356]  kasan_save_track+0x18/0x40
[   17.650575]  kasan_save_alloc_info+0x3b/0x50
[   17.650781]  __kasan_kmalloc+0xb7/0xc0
[   17.650932]  __kmalloc_cache_noprof+0x189/0x420
[   17.651032]  kasan_atomics+0x95/0x310
[   17.651122]  kunit_try_run_case+0x1a5/0x480
[   17.651214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.651334]  kthread+0x337/0x6f0
[   17.651417]  ret_from_fork+0x116/0x1d0
[   17.651502]  ret_from_fork_asm+0x1a/0x30
[   17.651592] 
[   17.651698] The buggy address belongs to the object at ffff888102b6b880
[   17.651698]  which belongs to the cache kmalloc-64 of size 64
[   17.652152] The buggy address is located 0 bytes to the right of
[   17.652152]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.652646] 
[   17.652760] The buggy address belongs to the physical page:
[   17.653011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.653344] flags: 0x200000000000000(node=0|zone=2)
[   17.653570] page_type: f5(slab)
[   17.653760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.653980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.654109] page dumped because: kasan: bad access detected
[   17.654363] 
[   17.654476] Memory state around the buggy address:
[   17.654698]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.654930]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.655181] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.655424]                                      ^
[   17.655626]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.655858]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.656110] ==================================================================
[   17.225612] ==================================================================
[   17.226109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   17.226887] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.227363] 
[   17.227511] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.227580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.227710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.227747] Call Trace:
[   17.227771]  <TASK>
[   17.227794]  dump_stack_lvl+0x73/0xb0
[   17.227842]  print_report+0xd1/0x650
[   17.227869]  ? __virt_addr_valid+0x1db/0x2d0
[   17.227909]  ? kasan_atomics_helper+0xf10/0x5450
[   17.227934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.227970]  ? kasan_atomics_helper+0xf10/0x5450
[   17.227995]  kasan_report+0x141/0x180
[   17.228031]  ? kasan_atomics_helper+0xf10/0x5450
[   17.228063]  kasan_check_range+0x10c/0x1c0
[   17.228089]  __kasan_check_write+0x18/0x20
[   17.228122]  kasan_atomics_helper+0xf10/0x5450
[   17.228147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.228181]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.228206]  ? kasan_atomics+0x152/0x310
[   17.228252]  kasan_atomics+0x1dc/0x310
[   17.228280]  ? __pfx_kasan_atomics+0x10/0x10
[   17.228307]  ? __pfx_read_tsc+0x10/0x10
[   17.228342]  ? ktime_get_ts64+0x86/0x230
[   17.228369]  kunit_try_run_case+0x1a5/0x480
[   17.228405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.228457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.228493]  ? __kthread_parkme+0x82/0x180
[   17.228516]  ? preempt_count_sub+0x50/0x80
[   17.228541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.228590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.228613]  kthread+0x337/0x6f0
[   17.228634]  ? trace_preempt_on+0x20/0xc0
[   17.228659]  ? __pfx_kthread+0x10/0x10
[   17.228681]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.228703]  ? calculate_sigpending+0x7b/0xa0
[   17.228729]  ? __pfx_kthread+0x10/0x10
[   17.228752]  ret_from_fork+0x116/0x1d0
[   17.228772]  ? __pfx_kthread+0x10/0x10
[   17.228793]  ret_from_fork_asm+0x1a/0x30
[   17.228828]  </TASK>
[   17.228841] 
[   17.235110] Allocated by task 283:
[   17.235328]  kasan_save_stack+0x45/0x70
[   17.235458]  kasan_save_track+0x18/0x40
[   17.235652]  kasan_save_alloc_info+0x3b/0x50
[   17.235828]  __kasan_kmalloc+0xb7/0xc0
[   17.236061]  __kmalloc_cache_noprof+0x189/0x420
[   17.236191]  kasan_atomics+0x95/0x310
[   17.236363]  kunit_try_run_case+0x1a5/0x480
[   17.236459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.236564]  kthread+0x337/0x6f0
[   17.236646]  ret_from_fork+0x116/0x1d0
[   17.236729]  ret_from_fork_asm+0x1a/0x30
[   17.236949] 
[   17.237069] The buggy address belongs to the object at ffff888102b6b880
[   17.237069]  which belongs to the cache kmalloc-64 of size 64
[   17.237676] The buggy address is located 0 bytes to the right of
[   17.237676]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.238094] 
[   17.238152] The buggy address belongs to the physical page:
[   17.238361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.238798] flags: 0x200000000000000(node=0|zone=2)
[   17.238999] page_type: f5(slab)
[   17.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.239481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.239759] page dumped because: kasan: bad access detected
[   17.239992] 
[   17.240092] Memory state around the buggy address:
[   17.240326]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.240453]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.240578] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.240697]                                      ^
[   17.240789]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.240910]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.241029] ==================================================================
[   17.593455] ==================================================================
[   17.593925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.594374] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.594842] 
[   17.594989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.595048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.595063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.595086] Call Trace:
[   17.595102]  <TASK>
[   17.595128]  dump_stack_lvl+0x73/0xb0
[   17.595156]  print_report+0xd1/0x650
[   17.595186]  ? __virt_addr_valid+0x1db/0x2d0
[   17.595210]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.595271]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595294]  kasan_report+0x141/0x180
[   17.595340]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595369]  kasan_check_range+0x10c/0x1c0
[   17.595405]  __kasan_check_write+0x18/0x20
[   17.595427]  kasan_atomics_helper+0x19e3/0x5450
[   17.595462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.595486]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.595508]  ? kasan_atomics+0x152/0x310
[   17.595550]  kasan_atomics+0x1dc/0x310
[   17.595574]  ? __pfx_kasan_atomics+0x10/0x10
[   17.595613]  ? __pfx_read_tsc+0x10/0x10
[   17.595637]  ? ktime_get_ts64+0x86/0x230
[   17.595661]  kunit_try_run_case+0x1a5/0x480
[   17.595696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.595741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.595765]  ? __kthread_parkme+0x82/0x180
[   17.595786]  ? preempt_count_sub+0x50/0x80
[   17.595810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.595856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.595879]  kthread+0x337/0x6f0
[   17.595899]  ? trace_preempt_on+0x20/0xc0
[   17.595923]  ? __pfx_kthread+0x10/0x10
[   17.595944]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.595966]  ? calculate_sigpending+0x7b/0xa0
[   17.595989]  ? __pfx_kthread+0x10/0x10
[   17.596011]  ret_from_fork+0x116/0x1d0
[   17.596030]  ? __pfx_kthread+0x10/0x10
[   17.596052]  ret_from_fork_asm+0x1a/0x30
[   17.596082]  </TASK>
[   17.596094] 
[   17.601631] Allocated by task 283:
[   17.601830]  kasan_save_stack+0x45/0x70
[   17.602038]  kasan_save_track+0x18/0x40
[   17.602184]  kasan_save_alloc_info+0x3b/0x50
[   17.602438]  __kasan_kmalloc+0xb7/0xc0
[   17.602605]  __kmalloc_cache_noprof+0x189/0x420
[   17.602774]  kasan_atomics+0x95/0x310
[   17.602960]  kunit_try_run_case+0x1a5/0x480
[   17.603096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.604501]  kthread+0x337/0x6f0
[   17.604866]  ret_from_fork+0x116/0x1d0
[   17.605253]  ret_from_fork_asm+0x1a/0x30
[   17.605363] 
[   17.605422] The buggy address belongs to the object at ffff888102b6b880
[   17.605422]  which belongs to the cache kmalloc-64 of size 64
[   17.605626] The buggy address is located 0 bytes to the right of
[   17.605626]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.605835] 
[   17.605895] The buggy address belongs to the physical page:
[   17.606012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.606290] flags: 0x200000000000000(node=0|zone=2)
[   17.606627] page_type: f5(slab)
[   17.606893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.607332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.607696] page dumped because: kasan: bad access detected
[   17.608017] 
[   17.608163] Memory state around the buggy address:
[   17.608499]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.608909]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.609216] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.609574]                                      ^
[   17.609862]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.610111]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.610365] ==================================================================
[   16.820070] ==================================================================
[   16.820407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.820811] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.821065] 
[   16.821203] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.821265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.821297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.821320] Call Trace:
[   16.821335]  <TASK>
[   16.821355]  dump_stack_lvl+0x73/0xb0
[   16.821385]  print_report+0xd1/0x650
[   16.821425]  ? __virt_addr_valid+0x1db/0x2d0
[   16.821520]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.821588]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821612]  kasan_report+0x141/0x180
[   16.821635]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821662]  __asan_report_store4_noabort+0x1b/0x30
[   16.821683]  kasan_atomics_helper+0x4ba2/0x5450
[   16.821720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.821746]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.821769]  ? kasan_atomics+0x152/0x310
[   16.821796]  kasan_atomics+0x1dc/0x310
[   16.821819]  ? __pfx_kasan_atomics+0x10/0x10
[   16.821843]  ? __pfx_read_tsc+0x10/0x10
[   16.821865]  ? ktime_get_ts64+0x86/0x230
[   16.821890]  kunit_try_run_case+0x1a5/0x480
[   16.821913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.821961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.821987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.822009]  ? __kthread_parkme+0x82/0x180
[   16.822030]  ? preempt_count_sub+0x50/0x80
[   16.822055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.822080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.822103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.822125]  kthread+0x337/0x6f0
[   16.822144]  ? trace_preempt_on+0x20/0xc0
[   16.822169]  ? __pfx_kthread+0x10/0x10
[   16.822190]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.822212]  ? calculate_sigpending+0x7b/0xa0
[   16.822248]  ? __pfx_kthread+0x10/0x10
[   16.822271]  ret_from_fork+0x116/0x1d0
[   16.822290]  ? __pfx_kthread+0x10/0x10
[   16.822311]  ret_from_fork_asm+0x1a/0x30
[   16.822352]  </TASK>
[   16.822367] 
[   16.829780] Allocated by task 283:
[   16.829996]  kasan_save_stack+0x45/0x70
[   16.830215]  kasan_save_track+0x18/0x40
[   16.830401]  kasan_save_alloc_info+0x3b/0x50
[   16.830913]  __kasan_kmalloc+0xb7/0xc0
[   16.831161]  __kmalloc_cache_noprof+0x189/0x420
[   16.831388]  kasan_atomics+0x95/0x310
[   16.831654]  kunit_try_run_case+0x1a5/0x480
[   16.831822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.831929]  kthread+0x337/0x6f0
[   16.832008]  ret_from_fork+0x116/0x1d0
[   16.832247]  ret_from_fork_asm+0x1a/0x30
[   16.832612] 
[   16.832755] The buggy address belongs to the object at ffff888102b6b880
[   16.832755]  which belongs to the cache kmalloc-64 of size 64
[   16.833205] The buggy address is located 0 bytes to the right of
[   16.833205]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.833682] 
[   16.833740] The buggy address belongs to the physical page:
[   16.833849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.834276] flags: 0x200000000000000(node=0|zone=2)
[   16.834654] page_type: f5(slab)
[   16.834823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.834988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.835442] page dumped because: kasan: bad access detected
[   16.835871] 
[   16.835929] Memory state around the buggy address:
[   16.836031]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.836444]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.836914] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.837208]                                      ^
[   16.837553]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837714]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837839] ==================================================================
[   16.929741] ==================================================================
[   16.930488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.930974] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.931249] 
[   16.931395] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.931466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.931482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.931506] Call Trace:
[   16.931546]  <TASK>
[   16.931569]  dump_stack_lvl+0x73/0xb0
[   16.931603]  print_report+0xd1/0x650
[   16.931626]  ? __virt_addr_valid+0x1db/0x2d0
[   16.931651]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.931696]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931796]  kasan_report+0x141/0x180
[   16.931822]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931850]  __asan_report_store4_noabort+0x1b/0x30
[   16.931872]  kasan_atomics_helper+0x4b3a/0x5450
[   16.931896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.931920]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.931943]  ? kasan_atomics+0x152/0x310
[   16.931971]  kasan_atomics+0x1dc/0x310
[   16.932004]  ? __pfx_kasan_atomics+0x10/0x10
[   16.932033]  ? __pfx_read_tsc+0x10/0x10
[   16.932056]  ? ktime_get_ts64+0x86/0x230
[   16.932093]  kunit_try_run_case+0x1a5/0x480
[   16.932119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.932142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.932166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.932189]  ? __kthread_parkme+0x82/0x180
[   16.932210]  ? preempt_count_sub+0x50/0x80
[   16.932253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.932279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.932303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.932326]  kthread+0x337/0x6f0
[   16.932348]  ? trace_preempt_on+0x20/0xc0
[   16.932374]  ? __pfx_kthread+0x10/0x10
[   16.932396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.932419]  ? calculate_sigpending+0x7b/0xa0
[   16.932444]  ? __pfx_kthread+0x10/0x10
[   16.932480]  ret_from_fork+0x116/0x1d0
[   16.932500]  ? __pfx_kthread+0x10/0x10
[   16.932523]  ret_from_fork_asm+0x1a/0x30
[   16.932555]  </TASK>
[   16.932569] 
[   16.938945] Allocated by task 283:
[   16.939085]  kasan_save_stack+0x45/0x70
[   16.939190]  kasan_save_track+0x18/0x40
[   16.939505]  kasan_save_alloc_info+0x3b/0x50
[   16.939785]  __kasan_kmalloc+0xb7/0xc0
[   16.939891]  __kmalloc_cache_noprof+0x189/0x420
[   16.940090]  kasan_atomics+0x95/0x310
[   16.940233]  kunit_try_run_case+0x1a5/0x480
[   16.940419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.940816]  kthread+0x337/0x6f0
[   16.941012]  ret_from_fork+0x116/0x1d0
[   16.941190]  ret_from_fork_asm+0x1a/0x30
[   16.941347] 
[   16.941543] The buggy address belongs to the object at ffff888102b6b880
[   16.941543]  which belongs to the cache kmalloc-64 of size 64
[   16.941774] The buggy address is located 0 bytes to the right of
[   16.941774]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.941974] 
[   16.942030] The buggy address belongs to the physical page:
[   16.942134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.942419] flags: 0x200000000000000(node=0|zone=2)
[   16.942783] page_type: f5(slab)
[   16.943007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.943510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.943864] page dumped because: kasan: bad access detected
[   16.943968] 
[   16.944018] Memory state around the buggy address:
[   16.944113]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.944410]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.944821] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.945115]                                      ^
[   16.945354]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.945863]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.946143] ==================================================================
[   17.480573] ==================================================================
[   17.480977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.481322] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.482003] 
[   17.482244] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.482315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.482337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.482367] Call Trace:
[   17.482393]  <TASK>
[   17.482417]  dump_stack_lvl+0x73/0xb0
[   17.482453]  print_report+0xd1/0x650
[   17.482480]  ? __virt_addr_valid+0x1db/0x2d0
[   17.482507]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.482552]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482576]  kasan_report+0x141/0x180
[   17.482614]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482644]  kasan_check_range+0x10c/0x1c0
[   17.482685]  __kasan_check_write+0x18/0x20
[   17.482707]  kasan_atomics_helper+0x15b6/0x5450
[   17.482733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.482756]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.482779]  ? kasan_atomics+0x152/0x310
[   17.482807]  kasan_atomics+0x1dc/0x310
[   17.482832]  ? __pfx_kasan_atomics+0x10/0x10
[   17.482857]  ? __pfx_read_tsc+0x10/0x10
[   17.482881]  ? ktime_get_ts64+0x86/0x230
[   17.482907]  kunit_try_run_case+0x1a5/0x480
[   17.482933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.482981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.483004]  ? __kthread_parkme+0x82/0x180
[   17.483026]  ? preempt_count_sub+0x50/0x80
[   17.483051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.483076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.483100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.483123]  kthread+0x337/0x6f0
[   17.483143]  ? trace_preempt_on+0x20/0xc0
[   17.483169]  ? __pfx_kthread+0x10/0x10
[   17.483190]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.483213]  ? calculate_sigpending+0x7b/0xa0
[   17.483258]  ? __pfx_kthread+0x10/0x10
[   17.483281]  ret_from_fork+0x116/0x1d0
[   17.483301]  ? __pfx_kthread+0x10/0x10
[   17.483323]  ret_from_fork_asm+0x1a/0x30
[   17.483357]  </TASK>
[   17.483371] 
[   17.489534] Allocated by task 283:
[   17.489656]  kasan_save_stack+0x45/0x70
[   17.489771]  kasan_save_track+0x18/0x40
[   17.489871]  kasan_save_alloc_info+0x3b/0x50
[   17.489976]  __kasan_kmalloc+0xb7/0xc0
[   17.490203]  __kmalloc_cache_noprof+0x189/0x420
[   17.490554]  kasan_atomics+0x95/0x310
[   17.490835]  kunit_try_run_case+0x1a5/0x480
[   17.491149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.491510]  kthread+0x337/0x6f0
[   17.491728]  ret_from_fork+0x116/0x1d0
[   17.491844]  ret_from_fork_asm+0x1a/0x30
[   17.491943] 
[   17.492004] The buggy address belongs to the object at ffff888102b6b880
[   17.492004]  which belongs to the cache kmalloc-64 of size 64
[   17.492584] The buggy address is located 0 bytes to the right of
[   17.492584]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.492803] 
[   17.492932] The buggy address belongs to the physical page:
[   17.493299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.493708] flags: 0x200000000000000(node=0|zone=2)
[   17.493957] page_type: f5(slab)
[   17.494114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.494404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.494704] page dumped because: kasan: bad access detected
[   17.494918] 
[   17.495061] Memory state around the buggy address:
[   17.495237]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495549]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495827] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.496130]                                      ^
[   17.496351]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496556]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496684] ==================================================================
[   16.802025] ==================================================================
[   16.802458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.802838] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.803104] 
[   16.803212] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.803297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.803310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.803335] Call Trace:
[   16.803349]  <TASK>
[   16.803385]  dump_stack_lvl+0x73/0xb0
[   16.803416]  print_report+0xd1/0x650
[   16.803439]  ? __virt_addr_valid+0x1db/0x2d0
[   16.803482]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.803527]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803549]  kasan_report+0x141/0x180
[   16.803573]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803599]  __asan_report_load4_noabort+0x18/0x20
[   16.803627]  kasan_atomics_helper+0x4bbc/0x5450
[   16.803651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.803674]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.803696]  ? kasan_atomics+0x152/0x310
[   16.803722]  kasan_atomics+0x1dc/0x310
[   16.803746]  ? __pfx_kasan_atomics+0x10/0x10
[   16.803769]  ? __pfx_read_tsc+0x10/0x10
[   16.803789]  ? ktime_get_ts64+0x86/0x230
[   16.803814]  kunit_try_run_case+0x1a5/0x480
[   16.803836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.803857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.803881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.803903]  ? __kthread_parkme+0x82/0x180
[   16.803922]  ? preempt_count_sub+0x50/0x80
[   16.803946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.803969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.803991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.804014]  kthread+0x337/0x6f0
[   16.804032]  ? trace_preempt_on+0x20/0xc0
[   16.804056]  ? __pfx_kthread+0x10/0x10
[   16.804076]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.804097]  ? calculate_sigpending+0x7b/0xa0
[   16.804121]  ? __pfx_kthread+0x10/0x10
[   16.804142]  ret_from_fork+0x116/0x1d0
[   16.804159]  ? __pfx_kthread+0x10/0x10
[   16.804179]  ret_from_fork_asm+0x1a/0x30
[   16.804210]  </TASK>
[   16.804230] 
[   16.811059] Allocated by task 283:
[   16.811311]  kasan_save_stack+0x45/0x70
[   16.811663]  kasan_save_track+0x18/0x40
[   16.811882]  kasan_save_alloc_info+0x3b/0x50
[   16.812150]  __kasan_kmalloc+0xb7/0xc0
[   16.812247]  __kmalloc_cache_noprof+0x189/0x420
[   16.812346]  kasan_atomics+0x95/0x310
[   16.812434]  kunit_try_run_case+0x1a5/0x480
[   16.812590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.812699]  kthread+0x337/0x6f0
[   16.812780]  ret_from_fork+0x116/0x1d0
[   16.812864]  ret_from_fork_asm+0x1a/0x30
[   16.813070] 
[   16.813203] The buggy address belongs to the object at ffff888102b6b880
[   16.813203]  which belongs to the cache kmalloc-64 of size 64
[   16.813963] The buggy address is located 0 bytes to the right of
[   16.813963]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.814947] 
[   16.815073] The buggy address belongs to the physical page:
[   16.815580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.815854] flags: 0x200000000000000(node=0|zone=2)
[   16.816010] page_type: f5(slab)
[   16.816232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.816392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.816585] page dumped because: kasan: bad access detected
[   16.816689] 
[   16.816740] Memory state around the buggy address:
[   16.816937]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.817240]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.817623] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.818041]                                      ^
[   16.818408]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.818623]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.818964] ==================================================================
[   17.104446] ==================================================================
[   17.104767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   17.105077] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.105347] 
[   17.105583] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.105708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.105725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.105749] Call Trace:
[   17.105770]  <TASK>
[   17.105808]  dump_stack_lvl+0x73/0xb0
[   17.105848]  print_report+0xd1/0x650
[   17.105890]  ? __virt_addr_valid+0x1db/0x2d0
[   17.106172]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.106246]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106271]  kasan_report+0x141/0x180
[   17.106295]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106324]  kasan_check_range+0x10c/0x1c0
[   17.106360]  __kasan_check_write+0x18/0x20
[   17.106381]  kasan_atomics_helper+0xac7/0x5450
[   17.106406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.106430]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.106452]  ? kasan_atomics+0x152/0x310
[   17.106480]  kasan_atomics+0x1dc/0x310
[   17.106505]  ? __pfx_kasan_atomics+0x10/0x10
[   17.106530]  ? __pfx_read_tsc+0x10/0x10
[   17.106554]  ? ktime_get_ts64+0x86/0x230
[   17.106582]  kunit_try_run_case+0x1a5/0x480
[   17.106705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.106737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.106764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.106788]  ? __kthread_parkme+0x82/0x180
[   17.106812]  ? preempt_count_sub+0x50/0x80
[   17.106839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.106865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.106890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.106915]  kthread+0x337/0x6f0
[   17.106937]  ? trace_preempt_on+0x20/0xc0
[   17.106963]  ? __pfx_kthread+0x10/0x10
[   17.106987]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.107011]  ? calculate_sigpending+0x7b/0xa0
[   17.107039]  ? __pfx_kthread+0x10/0x10
[   17.107062]  ret_from_fork+0x116/0x1d0
[   17.107083]  ? __pfx_kthread+0x10/0x10
[   17.107105]  ret_from_fork_asm+0x1a/0x30
[   17.107139]  </TASK>
[   17.107153] 
[   17.113734] Allocated by task 283:
[   17.113846]  kasan_save_stack+0x45/0x70
[   17.113989]  kasan_save_track+0x18/0x40
[   17.114181]  kasan_save_alloc_info+0x3b/0x50
[   17.114447]  __kasan_kmalloc+0xb7/0xc0
[   17.114725]  __kmalloc_cache_noprof+0x189/0x420
[   17.115028]  kasan_atomics+0x95/0x310
[   17.115284]  kunit_try_run_case+0x1a5/0x480
[   17.115564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.115902]  kthread+0x337/0x6f0
[   17.116044]  ret_from_fork+0x116/0x1d0
[   17.116134]  ret_from_fork_asm+0x1a/0x30
[   17.116304] 
[   17.116365] The buggy address belongs to the object at ffff888102b6b880
[   17.116365]  which belongs to the cache kmalloc-64 of size 64
[   17.116614] The buggy address is located 0 bytes to the right of
[   17.116614]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.117103] 
[   17.117216] The buggy address belongs to the physical page:
[   17.117610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.118013] flags: 0x200000000000000(node=0|zone=2)
[   17.118284] page_type: f5(slab)
[   17.118574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.118952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.119085] page dumped because: kasan: bad access detected
[   17.119187] 
[   17.119247] Memory state around the buggy address:
[   17.119346]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120070]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120539] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.120859]                                      ^
[   17.121070]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121245]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121591] ==================================================================
[   16.893735] ==================================================================
[   16.894428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.895154] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.895551] 
[   16.895740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.895808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.895822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.895846] Call Trace:
[   16.895871]  <TASK>
[   16.895893]  dump_stack_lvl+0x73/0xb0
[   16.895924]  print_report+0xd1/0x650
[   16.895973]  ? __virt_addr_valid+0x1db/0x2d0
[   16.896001]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.896060]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896085]  kasan_report+0x141/0x180
[   16.896109]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896138]  __asan_report_load4_noabort+0x18/0x20
[   16.896161]  kasan_atomics_helper+0x4b54/0x5450
[   16.896185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.896209]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.896243]  ? kasan_atomics+0x152/0x310
[   16.896290]  kasan_atomics+0x1dc/0x310
[   16.896316]  ? __pfx_kasan_atomics+0x10/0x10
[   16.896342]  ? __pfx_read_tsc+0x10/0x10
[   16.896365]  ? ktime_get_ts64+0x86/0x230
[   16.896391]  kunit_try_run_case+0x1a5/0x480
[   16.896417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.896551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.896577]  ? __kthread_parkme+0x82/0x180
[   16.896600]  ? preempt_count_sub+0x50/0x80
[   16.896625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.896693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.896718]  kthread+0x337/0x6f0
[   16.896738]  ? trace_preempt_on+0x20/0xc0
[   16.896763]  ? __pfx_kthread+0x10/0x10
[   16.896784]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.896807]  ? calculate_sigpending+0x7b/0xa0
[   16.896851]  ? __pfx_kthread+0x10/0x10
[   16.896874]  ret_from_fork+0x116/0x1d0
[   16.896894]  ? __pfx_kthread+0x10/0x10
[   16.896917]  ret_from_fork_asm+0x1a/0x30
[   16.896950]  </TASK>
[   16.896963] 
[   16.903411] Allocated by task 283:
[   16.903807]  kasan_save_stack+0x45/0x70
[   16.904002]  kasan_save_track+0x18/0x40
[   16.904093]  kasan_save_alloc_info+0x3b/0x50
[   16.904186]  __kasan_kmalloc+0xb7/0xc0
[   16.904282]  __kmalloc_cache_noprof+0x189/0x420
[   16.904565]  kasan_atomics+0x95/0x310
[   16.904810]  kunit_try_run_case+0x1a5/0x480
[   16.905057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.905294]  kthread+0x337/0x6f0
[   16.905520]  ret_from_fork+0x116/0x1d0
[   16.905634]  ret_from_fork_asm+0x1a/0x30
[   16.905728] 
[   16.905831] The buggy address belongs to the object at ffff888102b6b880
[   16.905831]  which belongs to the cache kmalloc-64 of size 64
[   16.906285] The buggy address is located 0 bytes to the right of
[   16.906285]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.906709] 
[   16.906770] The buggy address belongs to the physical page:
[   16.906881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.907030] flags: 0x200000000000000(node=0|zone=2)
[   16.907135] page_type: f5(slab)
[   16.907230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.907373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.907876] page dumped because: kasan: bad access detected
[   16.908217] 
[   16.908353] Memory state around the buggy address:
[   16.908877]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.909312]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.909546] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.909817]                                      ^
[   16.909992]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910118]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910251] ==================================================================
[   17.871240] ==================================================================
[   17.872168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.872516] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.872922] 
[   17.873069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.873121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.873134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.873157] Call Trace:
[   17.873174]  <TASK>
[   17.873190]  dump_stack_lvl+0x73/0xb0
[   17.873217]  print_report+0xd1/0x650
[   17.873252]  ? __virt_addr_valid+0x1db/0x2d0
[   17.873277]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.873325]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873348]  kasan_report+0x141/0x180
[   17.873370]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873422]  __asan_report_load8_noabort+0x18/0x20
[   17.873448]  kasan_atomics_helper+0x5115/0x5450
[   17.873472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.873495]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.873517]  ? kasan_atomics+0x152/0x310
[   17.873545]  kasan_atomics+0x1dc/0x310
[   17.873589]  ? __pfx_kasan_atomics+0x10/0x10
[   17.873615]  ? __pfx_read_tsc+0x10/0x10
[   17.873636]  ? ktime_get_ts64+0x86/0x230
[   17.873661]  kunit_try_run_case+0x1a5/0x480
[   17.873686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.873728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.873753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.873776]  ? __kthread_parkme+0x82/0x180
[   17.873797]  ? preempt_count_sub+0x50/0x80
[   17.873822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.873846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.873887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.873913]  kthread+0x337/0x6f0
[   17.873934]  ? trace_preempt_on+0x20/0xc0
[   17.873958]  ? __pfx_kthread+0x10/0x10
[   17.873979]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.874000]  ? calculate_sigpending+0x7b/0xa0
[   17.874044]  ? __pfx_kthread+0x10/0x10
[   17.874067]  ret_from_fork+0x116/0x1d0
[   17.874086]  ? __pfx_kthread+0x10/0x10
[   17.874107]  ret_from_fork_asm+0x1a/0x30
[   17.874139]  </TASK>
[   17.874170] 
[   17.879950] Allocated by task 283:
[   17.880035]  kasan_save_stack+0x45/0x70
[   17.880127]  kasan_save_track+0x18/0x40
[   17.880216]  kasan_save_alloc_info+0x3b/0x50
[   17.880319]  __kasan_kmalloc+0xb7/0xc0
[   17.880405]  __kmalloc_cache_noprof+0x189/0x420
[   17.880499]  kasan_atomics+0x95/0x310
[   17.880586]  kunit_try_run_case+0x1a5/0x480
[   17.880678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.880778]  kthread+0x337/0x6f0
[   17.880852]  ret_from_fork+0x116/0x1d0
[   17.880934]  ret_from_fork_asm+0x1a/0x30
[   17.881018] 
[   17.881069] The buggy address belongs to the object at ffff888102b6b880
[   17.881069]  which belongs to the cache kmalloc-64 of size 64
[   17.881343] The buggy address is located 0 bytes to the right of
[   17.881343]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.882019] 
[   17.882139] The buggy address belongs to the physical page:
[   17.882482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.882929] flags: 0x200000000000000(node=0|zone=2)
[   17.883262] page_type: f5(slab)
[   17.883460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.883857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.884273] page dumped because: kasan: bad access detected
[   17.884549] 
[   17.884657] Memory state around the buggy address:
[   17.884810]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.885057]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.885267] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.885388]                                      ^
[   17.885483]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885604]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885724] ==================================================================
[   17.697957] ==================================================================
[   17.698213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.698556] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.698783] 
[   17.698905] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.698958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.698973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.698997] Call Trace:
[   17.699014]  <TASK>
[   17.699030]  dump_stack_lvl+0x73/0xb0
[   17.699060]  print_report+0xd1/0x650
[   17.699085]  ? __virt_addr_valid+0x1db/0x2d0
[   17.699111]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.699161]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699186]  kasan_report+0x141/0x180
[   17.699211]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699518]  kasan_check_range+0x10c/0x1c0
[   17.699550]  __kasan_check_write+0x18/0x20
[   17.699573]  kasan_atomics_helper+0x1e12/0x5450
[   17.699600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.699626]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.699651]  ? kasan_atomics+0x152/0x310
[   17.699681]  kasan_atomics+0x1dc/0x310
[   17.699707]  ? __pfx_kasan_atomics+0x10/0x10
[   17.699733]  ? __pfx_read_tsc+0x10/0x10
[   17.699754]  ? ktime_get_ts64+0x86/0x230
[   17.699779]  kunit_try_run_case+0x1a5/0x480
[   17.699804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.699827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.699852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.699876]  ? __kthread_parkme+0x82/0x180
[   17.699897]  ? preempt_count_sub+0x50/0x80
[   17.699922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.699946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.699969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.699993]  kthread+0x337/0x6f0
[   17.700014]  ? trace_preempt_on+0x20/0xc0
[   17.700039]  ? __pfx_kthread+0x10/0x10
[   17.700061]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.700083]  ? calculate_sigpending+0x7b/0xa0
[   17.700107]  ? __pfx_kthread+0x10/0x10
[   17.700155]  ret_from_fork+0x116/0x1d0
[   17.700176]  ? __pfx_kthread+0x10/0x10
[   17.700197]  ret_from_fork_asm+0x1a/0x30
[   17.700238]  </TASK>
[   17.700253] 
[   17.705479] Allocated by task 283:
[   17.705643]  kasan_save_stack+0x45/0x70
[   17.705829]  kasan_save_track+0x18/0x40
[   17.706005]  kasan_save_alloc_info+0x3b/0x50
[   17.706196]  __kasan_kmalloc+0xb7/0xc0
[   17.706390]  __kmalloc_cache_noprof+0x189/0x420
[   17.706600]  kasan_atomics+0x95/0x310
[   17.706782]  kunit_try_run_case+0x1a5/0x480
[   17.706985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.707232]  kthread+0x337/0x6f0
[   17.707396]  ret_from_fork+0x116/0x1d0
[   17.707574]  ret_from_fork_asm+0x1a/0x30
[   17.707673] 
[   17.707729] The buggy address belongs to the object at ffff888102b6b880
[   17.707729]  which belongs to the cache kmalloc-64 of size 64
[   17.707929] The buggy address is located 0 bytes to the right of
[   17.707929]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.708133] 
[   17.708188] The buggy address belongs to the physical page:
[   17.708407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.708721] flags: 0x200000000000000(node=0|zone=2)
[   17.708929] page_type: f5(slab)
[   17.709087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.709385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.709672] page dumped because: kasan: bad access detected
[   17.709928] 
[   17.710022] Memory state around the buggy address:
[   17.710235]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.710533]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.710800] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.711060]                                      ^
[   17.711178]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711318]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711447] ==================================================================
[   17.290483] ==================================================================
[   17.290865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   17.291270] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.291568] 
[   17.291678] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.291746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.291761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.291785] Call Trace:
[   17.291817]  <TASK>
[   17.291838]  dump_stack_lvl+0x73/0xb0
[   17.291867]  print_report+0xd1/0x650
[   17.291890]  ? __virt_addr_valid+0x1db/0x2d0
[   17.291914]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.291951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.291978]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.292001]  kasan_report+0x141/0x180
[   17.292025]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.292053]  __asan_report_load4_noabort+0x18/0x20
[   17.292089]  kasan_atomics_helper+0x4a1c/0x5450
[   17.292116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.292139]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.292161]  ? kasan_atomics+0x152/0x310
[   17.292188]  kasan_atomics+0x1dc/0x310
[   17.292232]  ? __pfx_kasan_atomics+0x10/0x10
[   17.292268]  ? __pfx_read_tsc+0x10/0x10
[   17.292290]  ? ktime_get_ts64+0x86/0x230
[   17.292324]  kunit_try_run_case+0x1a5/0x480
[   17.292356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.292378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.292409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.292441]  ? __kthread_parkme+0x82/0x180
[   17.292470]  ? preempt_count_sub+0x50/0x80
[   17.292494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.292526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.292589]  kthread+0x337/0x6f0
[   17.292609]  ? trace_preempt_on+0x20/0xc0
[   17.292633]  ? __pfx_kthread+0x10/0x10
[   17.292655]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.292676]  ? calculate_sigpending+0x7b/0xa0
[   17.292701]  ? __pfx_kthread+0x10/0x10
[   17.292723]  ret_from_fork+0x116/0x1d0
[   17.292742]  ? __pfx_kthread+0x10/0x10
[   17.292764]  ret_from_fork_asm+0x1a/0x30
[   17.292796]  </TASK>
[   17.292808] 
[   17.298768] Allocated by task 283:
[   17.298905]  kasan_save_stack+0x45/0x70
[   17.299103]  kasan_save_track+0x18/0x40
[   17.299240]  kasan_save_alloc_info+0x3b/0x50
[   17.299426]  __kasan_kmalloc+0xb7/0xc0
[   17.299539]  __kmalloc_cache_noprof+0x189/0x420
[   17.299781]  kasan_atomics+0x95/0x310
[   17.299901]  kunit_try_run_case+0x1a5/0x480
[   17.300086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.300308]  kthread+0x337/0x6f0
[   17.300476]  ret_from_fork+0x116/0x1d0
[   17.300630]  ret_from_fork_asm+0x1a/0x30
[   17.300800] 
[   17.300855] The buggy address belongs to the object at ffff888102b6b880
[   17.300855]  which belongs to the cache kmalloc-64 of size 64
[   17.301327] The buggy address is located 0 bytes to the right of
[   17.301327]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.301665] 
[   17.301768] The buggy address belongs to the physical page:
[   17.301960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.302216] flags: 0x200000000000000(node=0|zone=2)
[   17.302412] page_type: f5(slab)
[   17.302590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.302761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.303098] page dumped because: kasan: bad access detected
[   17.303254] 
[   17.303356] Memory state around the buggy address:
[   17.303580]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.303831]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.304031] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.304308]                                      ^
[   17.304516]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304718]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304866] ==================================================================
[   17.416613] ==================================================================
[   17.416894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.417140] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.417433] 
[   17.417640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.417694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.417708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.417732] Call Trace:
[   17.417755]  <TASK>
[   17.417773]  dump_stack_lvl+0x73/0xb0
[   17.417803]  print_report+0xd1/0x650
[   17.417827]  ? __virt_addr_valid+0x1db/0x2d0
[   17.417852]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.417899]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417941]  kasan_report+0x141/0x180
[   17.417967]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417995]  __asan_report_load8_noabort+0x18/0x20
[   17.418017]  kasan_atomics_helper+0x4eae/0x5450
[   17.418042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.418084]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.418108]  ? kasan_atomics+0x152/0x310
[   17.418136]  kasan_atomics+0x1dc/0x310
[   17.418160]  ? __pfx_kasan_atomics+0x10/0x10
[   17.418186]  ? __pfx_read_tsc+0x10/0x10
[   17.418209]  ? ktime_get_ts64+0x86/0x230
[   17.418262]  kunit_try_run_case+0x1a5/0x480
[   17.418288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.418311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.418342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.418368]  ? __kthread_parkme+0x82/0x180
[   17.418410]  ? preempt_count_sub+0x50/0x80
[   17.418437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.418461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.418486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.418510]  kthread+0x337/0x6f0
[   17.418531]  ? trace_preempt_on+0x20/0xc0
[   17.418556]  ? __pfx_kthread+0x10/0x10
[   17.418597]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.418620]  ? calculate_sigpending+0x7b/0xa0
[   17.418664]  ? __pfx_kthread+0x10/0x10
[   17.418688]  ret_from_fork+0x116/0x1d0
[   17.418708]  ? __pfx_kthread+0x10/0x10
[   17.418729]  ret_from_fork_asm+0x1a/0x30
[   17.418763]  </TASK>
[   17.418777] 
[   17.424710] Allocated by task 283:
[   17.424892]  kasan_save_stack+0x45/0x70
[   17.425027]  kasan_save_track+0x18/0x40
[   17.425206]  kasan_save_alloc_info+0x3b/0x50
[   17.425403]  __kasan_kmalloc+0xb7/0xc0
[   17.425609]  __kmalloc_cache_noprof+0x189/0x420
[   17.425812]  kasan_atomics+0x95/0x310
[   17.425973]  kunit_try_run_case+0x1a5/0x480
[   17.426204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.426410]  kthread+0x337/0x6f0
[   17.426550]  ret_from_fork+0x116/0x1d0
[   17.426750]  ret_from_fork_asm+0x1a/0x30
[   17.426879] 
[   17.426980] The buggy address belongs to the object at ffff888102b6b880
[   17.426980]  which belongs to the cache kmalloc-64 of size 64
[   17.427345] The buggy address is located 0 bytes to the right of
[   17.427345]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.427757] 
[   17.427871] The buggy address belongs to the physical page:
[   17.428090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.428348] flags: 0x200000000000000(node=0|zone=2)
[   17.428515] page_type: f5(slab)
[   17.428645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.428934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.429069] page dumped because: kasan: bad access detected
[   17.429172] 
[   17.429232] Memory state around the buggy address:
[   17.429442]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.429757]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.430045] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.430366]                                      ^
[   17.430474]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430604]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430732] ==================================================================
[   17.824779] ==================================================================
[   17.825373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.826081] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.826228] 
[   17.826382] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.826437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.826451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.826474] Call Trace:
[   17.826494]  <TASK>
[   17.826511]  dump_stack_lvl+0x73/0xb0
[   17.826540]  print_report+0xd1/0x650
[   17.826566]  ? __virt_addr_valid+0x1db/0x2d0
[   17.826591]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.826639]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826662]  kasan_report+0x141/0x180
[   17.826685]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826714]  kasan_check_range+0x10c/0x1c0
[   17.826739]  __kasan_check_write+0x18/0x20
[   17.826801]  kasan_atomics_helper+0x218a/0x5450
[   17.826830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.826854]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.826876]  ? kasan_atomics+0x152/0x310
[   17.826906]  kasan_atomics+0x1dc/0x310
[   17.826958]  ? __pfx_kasan_atomics+0x10/0x10
[   17.826984]  ? __pfx_read_tsc+0x10/0x10
[   17.827007]  ? ktime_get_ts64+0x86/0x230
[   17.827032]  kunit_try_run_case+0x1a5/0x480
[   17.827085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.827135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.827160]  ? __kthread_parkme+0x82/0x180
[   17.827206]  ? preempt_count_sub+0x50/0x80
[   17.827244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.827294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.827319]  kthread+0x337/0x6f0
[   17.827368]  ? trace_preempt_on+0x20/0xc0
[   17.827395]  ? __pfx_kthread+0x10/0x10
[   17.827417]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.827439]  ? calculate_sigpending+0x7b/0xa0
[   17.827492]  ? __pfx_kthread+0x10/0x10
[   17.827518]  ret_from_fork+0x116/0x1d0
[   17.827539]  ? __pfx_kthread+0x10/0x10
[   17.827563]  ret_from_fork_asm+0x1a/0x30
[   17.827617]  </TASK>
[   17.827633] 
[   17.833366] Allocated by task 283:
[   17.833582]  kasan_save_stack+0x45/0x70
[   17.833822]  kasan_save_track+0x18/0x40
[   17.834073]  kasan_save_alloc_info+0x3b/0x50
[   17.834337]  __kasan_kmalloc+0xb7/0xc0
[   17.834433]  __kmalloc_cache_noprof+0x189/0x420
[   17.834533]  kasan_atomics+0x95/0x310
[   17.834621]  kunit_try_run_case+0x1a5/0x480
[   17.834713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.834819]  kthread+0x337/0x6f0
[   17.834897]  ret_from_fork+0x116/0x1d0
[   17.834982]  ret_from_fork_asm+0x1a/0x30
[   17.835069] 
[   17.835121] The buggy address belongs to the object at ffff888102b6b880
[   17.835121]  which belongs to the cache kmalloc-64 of size 64
[   17.835821] The buggy address is located 0 bytes to the right of
[   17.835821]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.836568] 
[   17.836692] The buggy address belongs to the physical page:
[   17.837032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.837423] flags: 0x200000000000000(node=0|zone=2)
[   17.837531] page_type: f5(slab)
[   17.837618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.837754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.837884] page dumped because: kasan: bad access detected
[   17.837985] 
[   17.838035] Memory state around the buggy address:
[   17.838132]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.838268]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.838404] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.838531]                                      ^
[   17.838629]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.838913]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.839289] ==================================================================
[   17.840294] ==================================================================
[   17.840721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.841166] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.841600] 
[   17.841737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.841788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.841802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.841825] Call Trace:
[   17.841843]  <TASK>
[   17.841858]  dump_stack_lvl+0x73/0xb0
[   17.841887]  print_report+0xd1/0x650
[   17.841911]  ? __virt_addr_valid+0x1db/0x2d0
[   17.841936]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.841960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.841984]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.842007]  kasan_report+0x141/0x180
[   17.842031]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.842059]  __asan_report_load8_noabort+0x18/0x20
[   17.842082]  kasan_atomics_helper+0x4fa5/0x5450
[   17.842106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.842130]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.842153]  ? kasan_atomics+0x152/0x310
[   17.842180]  kasan_atomics+0x1dc/0x310
[   17.842204]  ? __pfx_kasan_atomics+0x10/0x10
[   17.842243]  ? __pfx_read_tsc+0x10/0x10
[   17.842266]  ? ktime_get_ts64+0x86/0x230
[   17.842292]  kunit_try_run_case+0x1a5/0x480
[   17.842317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.842347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.842374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.842397]  ? __kthread_parkme+0x82/0x180
[   17.842420]  ? preempt_count_sub+0x50/0x80
[   17.842446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.842473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.842497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.842521]  kthread+0x337/0x6f0
[   17.842542]  ? trace_preempt_on+0x20/0xc0
[   17.842566]  ? __pfx_kthread+0x10/0x10
[   17.842590]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.842611]  ? calculate_sigpending+0x7b/0xa0
[   17.842636]  ? __pfx_kthread+0x10/0x10
[   17.842659]  ret_from_fork+0x116/0x1d0
[   17.842678]  ? __pfx_kthread+0x10/0x10
[   17.842699]  ret_from_fork_asm+0x1a/0x30
[   17.842758]  </TASK>
[   17.842772] 
[   17.848445] Allocated by task 283:
[   17.848677]  kasan_save_stack+0x45/0x70
[   17.848938]  kasan_save_track+0x18/0x40
[   17.849198]  kasan_save_alloc_info+0x3b/0x50
[   17.849354]  __kasan_kmalloc+0xb7/0xc0
[   17.849446]  __kmalloc_cache_noprof+0x189/0x420
[   17.849543]  kasan_atomics+0x95/0x310
[   17.849630]  kunit_try_run_case+0x1a5/0x480
[   17.849722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.849824]  kthread+0x337/0x6f0
[   17.849901]  ret_from_fork+0x116/0x1d0
[   17.850021]  ret_from_fork_asm+0x1a/0x30
[   17.850203] 
[   17.850337] The buggy address belongs to the object at ffff888102b6b880
[   17.850337]  which belongs to the cache kmalloc-64 of size 64
[   17.851057] The buggy address is located 0 bytes to the right of
[   17.851057]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.851571] 
[   17.851698] The buggy address belongs to the physical page:
[   17.851876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.852099] flags: 0x200000000000000(node=0|zone=2)
[   17.852381] page_type: f5(slab)
[   17.852469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.852749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.852878] page dumped because: kasan: bad access detected
[   17.852977] 
[   17.853028] Memory state around the buggy address:
[   17.853122]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.853255]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.853379] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.853497]                                      ^
[   17.853589]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.853709]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.853827] ==================================================================
[   17.626681] ==================================================================
[   17.627025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.627425] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.627743] 
[   17.627872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.627926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.627941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.627964] Call Trace:
[   17.627999]  <TASK>
[   17.628021]  dump_stack_lvl+0x73/0xb0
[   17.628049]  print_report+0xd1/0x650
[   17.628074]  ? __virt_addr_valid+0x1db/0x2d0
[   17.628099]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.628165]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628189]  kasan_report+0x141/0x180
[   17.628213]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628253]  kasan_check_range+0x10c/0x1c0
[   17.628298]  __kasan_check_write+0x18/0x20
[   17.628320]  kasan_atomics_helper+0x1b22/0x5450
[   17.628345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.628369]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.628391]  ? kasan_atomics+0x152/0x310
[   17.628436]  kasan_atomics+0x1dc/0x310
[   17.628462]  ? __pfx_kasan_atomics+0x10/0x10
[   17.628489]  ? __pfx_read_tsc+0x10/0x10
[   17.628511]  ? ktime_get_ts64+0x86/0x230
[   17.628536]  kunit_try_run_case+0x1a5/0x480
[   17.628561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.628585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.628610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.628633]  ? __kthread_parkme+0x82/0x180
[   17.628654]  ? preempt_count_sub+0x50/0x80
[   17.628679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.628703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.628726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.628766]  kthread+0x337/0x6f0
[   17.628792]  ? trace_preempt_on+0x20/0xc0
[   17.628817]  ? __pfx_kthread+0x10/0x10
[   17.628840]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.628862]  ? calculate_sigpending+0x7b/0xa0
[   17.628887]  ? __pfx_kthread+0x10/0x10
[   17.628928]  ret_from_fork+0x116/0x1d0
[   17.628949]  ? __pfx_kthread+0x10/0x10
[   17.628971]  ret_from_fork_asm+0x1a/0x30
[   17.629005]  </TASK>
[   17.629018] 
[   17.634992] Allocated by task 283:
[   17.635141]  kasan_save_stack+0x45/0x70
[   17.635309]  kasan_save_track+0x18/0x40
[   17.635414]  kasan_save_alloc_info+0x3b/0x50
[   17.635616]  __kasan_kmalloc+0xb7/0xc0
[   17.635790]  __kmalloc_cache_noprof+0x189/0x420
[   17.635915]  kasan_atomics+0x95/0x310
[   17.636101]  kunit_try_run_case+0x1a5/0x480
[   17.636248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.636461]  kthread+0x337/0x6f0
[   17.636640]  ret_from_fork+0x116/0x1d0
[   17.636791]  ret_from_fork_asm+0x1a/0x30
[   17.637010] 
[   17.637080] The buggy address belongs to the object at ffff888102b6b880
[   17.637080]  which belongs to the cache kmalloc-64 of size 64
[   17.637450] The buggy address is located 0 bytes to the right of
[   17.637450]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.637842] 
[   17.637938] The buggy address belongs to the physical page:
[   17.638171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.638438] flags: 0x200000000000000(node=0|zone=2)
[   17.638605] page_type: f5(slab)
[   17.638764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.638932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.639094] page dumped because: kasan: bad access detected
[   17.639230] 
[   17.639305] Memory state around the buggy address:
[   17.639429]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.639591]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.639750] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.639898]                                      ^
[   17.640019]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640178]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640549] ==================================================================
[   17.562190] ==================================================================
[   17.562402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.563551] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.563785] 
[   17.563930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.563994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.564009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.564034] Call Trace:
[   17.564055]  <TASK>
[   17.564073]  dump_stack_lvl+0x73/0xb0
[   17.564104]  print_report+0xd1/0x650
[   17.564128]  ? __virt_addr_valid+0x1db/0x2d0
[   17.564153]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.564200]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564272]  kasan_report+0x141/0x180
[   17.564299]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564327]  kasan_check_range+0x10c/0x1c0
[   17.564354]  __kasan_check_write+0x18/0x20
[   17.564374]  kasan_atomics_helper+0x18b1/0x5450
[   17.564399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.564422]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.564443]  ? kasan_atomics+0x152/0x310
[   17.564471]  kasan_atomics+0x1dc/0x310
[   17.564496]  ? __pfx_kasan_atomics+0x10/0x10
[   17.564521]  ? __pfx_read_tsc+0x10/0x10
[   17.564544]  ? ktime_get_ts64+0x86/0x230
[   17.564570]  kunit_try_run_case+0x1a5/0x480
[   17.564596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.564642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.564666]  ? __kthread_parkme+0x82/0x180
[   17.564687]  ? preempt_count_sub+0x50/0x80
[   17.564710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.564757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.564794]  kthread+0x337/0x6f0
[   17.564816]  ? trace_preempt_on+0x20/0xc0
[   17.564840]  ? __pfx_kthread+0x10/0x10
[   17.564878]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.564900]  ? calculate_sigpending+0x7b/0xa0
[   17.564926]  ? __pfx_kthread+0x10/0x10
[   17.564949]  ret_from_fork+0x116/0x1d0
[   17.564969]  ? __pfx_kthread+0x10/0x10
[   17.564991]  ret_from_fork_asm+0x1a/0x30
[   17.565024]  </TASK>
[   17.565036] 
[   17.571131] Allocated by task 283:
[   17.571217]  kasan_save_stack+0x45/0x70
[   17.571440]  kasan_save_track+0x18/0x40
[   17.571693]  kasan_save_alloc_info+0x3b/0x50
[   17.571964]  __kasan_kmalloc+0xb7/0xc0
[   17.572056]  __kmalloc_cache_noprof+0x189/0x420
[   17.572153]  kasan_atomics+0x95/0x310
[   17.572406]  kunit_try_run_case+0x1a5/0x480
[   17.572644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.572853]  kthread+0x337/0x6f0
[   17.573063]  ret_from_fork+0x116/0x1d0
[   17.573197]  ret_from_fork_asm+0x1a/0x30
[   17.573416] 
[   17.573499] The buggy address belongs to the object at ffff888102b6b880
[   17.573499]  which belongs to the cache kmalloc-64 of size 64
[   17.573912] The buggy address is located 0 bytes to the right of
[   17.573912]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.574296] 
[   17.574438] The buggy address belongs to the physical page:
[   17.574549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.574894] flags: 0x200000000000000(node=0|zone=2)
[   17.575065] page_type: f5(slab)
[   17.575274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.575525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.575683] page dumped because: kasan: bad access detected
[   17.575785] 
[   17.575836] Memory state around the buggy address:
[   17.575932]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.576053]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.576176] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.576305]                                      ^
[   17.576401]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.576523]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.576643] ==================================================================
[   17.305773] ==================================================================
[   17.306111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   17.306462] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.306766] 
[   17.306888] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.306941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.306955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.306978] Call Trace:
[   17.306996]  <TASK>
[   17.307014]  dump_stack_lvl+0x73/0xb0
[   17.307041]  print_report+0xd1/0x650
[   17.307064]  ? __virt_addr_valid+0x1db/0x2d0
[   17.307089]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.307135]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307157]  kasan_report+0x141/0x180
[   17.307180]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307207]  kasan_check_range+0x10c/0x1c0
[   17.307243]  __kasan_check_write+0x18/0x20
[   17.307266]  kasan_atomics_helper+0x1148/0x5450
[   17.307289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.307313]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.307335]  ? kasan_atomics+0x152/0x310
[   17.307363]  kasan_atomics+0x1dc/0x310
[   17.307387]  ? __pfx_kasan_atomics+0x10/0x10
[   17.307411]  ? __pfx_read_tsc+0x10/0x10
[   17.307433]  ? ktime_get_ts64+0x86/0x230
[   17.307476]  kunit_try_run_case+0x1a5/0x480
[   17.307529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.307577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.307604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.307642]  ? __kthread_parkme+0x82/0x180
[   17.307668]  ? preempt_count_sub+0x50/0x80
[   17.307704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.307729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.307753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.307788]  kthread+0x337/0x6f0
[   17.307817]  ? trace_preempt_on+0x20/0xc0
[   17.307843]  ? __pfx_kthread+0x10/0x10
[   17.307864]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.307888]  ? calculate_sigpending+0x7b/0xa0
[   17.307914]  ? __pfx_kthread+0x10/0x10
[   17.307938]  ret_from_fork+0x116/0x1d0
[   17.307973]  ? __pfx_kthread+0x10/0x10
[   17.307997]  ret_from_fork_asm+0x1a/0x30
[   17.308029]  </TASK>
[   17.308041] 
[   17.314063] Allocated by task 283:
[   17.314212]  kasan_save_stack+0x45/0x70
[   17.314400]  kasan_save_track+0x18/0x40
[   17.314597]  kasan_save_alloc_info+0x3b/0x50
[   17.314831]  __kasan_kmalloc+0xb7/0xc0
[   17.314976]  __kmalloc_cache_noprof+0x189/0x420
[   17.315141]  kasan_atomics+0x95/0x310
[   17.315315]  kunit_try_run_case+0x1a5/0x480
[   17.315466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.315653]  kthread+0x337/0x6f0
[   17.315786]  ret_from_fork+0x116/0x1d0
[   17.315933]  ret_from_fork_asm+0x1a/0x30
[   17.316120] 
[   17.316197] The buggy address belongs to the object at ffff888102b6b880
[   17.316197]  which belongs to the cache kmalloc-64 of size 64
[   17.316461] The buggy address is located 0 bytes to the right of
[   17.316461]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.316733] 
[   17.316812] The buggy address belongs to the physical page:
[   17.316946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.317312] flags: 0x200000000000000(node=0|zone=2)
[   17.317546] page_type: f5(slab)
[   17.317717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.318038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.318366] page dumped because: kasan: bad access detected
[   17.318612] 
[   17.318737] Memory state around the buggy address:
[   17.318962]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.319255]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.319499] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.319626]                                      ^
[   17.319723]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.319863]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.320243] ==================================================================
[   17.793887] ==================================================================
[   17.794603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.794866] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.795067] 
[   17.795164] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.795237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.795254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.795280] Call Trace:
[   17.795305]  <TASK>
[   17.795329]  dump_stack_lvl+0x73/0xb0
[   17.795360]  print_report+0xd1/0x650
[   17.795387]  ? __virt_addr_valid+0x1db/0x2d0
[   17.795413]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.795461]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795485]  kasan_report+0x141/0x180
[   17.795508]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795535]  kasan_check_range+0x10c/0x1c0
[   17.795561]  __kasan_check_write+0x18/0x20
[   17.795581]  kasan_atomics_helper+0x20c8/0x5450
[   17.795605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.795628]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.795650]  ? kasan_atomics+0x152/0x310
[   17.795678]  kasan_atomics+0x1dc/0x310
[   17.795702]  ? __pfx_kasan_atomics+0x10/0x10
[   17.795728]  ? __pfx_read_tsc+0x10/0x10
[   17.795749]  ? ktime_get_ts64+0x86/0x230
[   17.795774]  kunit_try_run_case+0x1a5/0x480
[   17.795800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.795823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.795848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.795872]  ? __kthread_parkme+0x82/0x180
[   17.795894]  ? preempt_count_sub+0x50/0x80
[   17.795919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.795943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.795965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.795989]  kthread+0x337/0x6f0
[   17.796010]  ? trace_preempt_on+0x20/0xc0
[   17.796033]  ? __pfx_kthread+0x10/0x10
[   17.796055]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.796077]  ? calculate_sigpending+0x7b/0xa0
[   17.796102]  ? __pfx_kthread+0x10/0x10
[   17.796125]  ret_from_fork+0x116/0x1d0
[   17.796143]  ? __pfx_kthread+0x10/0x10
[   17.796165]  ret_from_fork_asm+0x1a/0x30
[   17.796198]  </TASK>
[   17.796209] 
[   17.801747] Allocated by task 283:
[   17.801847]  kasan_save_stack+0x45/0x70
[   17.801942]  kasan_save_track+0x18/0x40
[   17.802030]  kasan_save_alloc_info+0x3b/0x50
[   17.802121]  __kasan_kmalloc+0xb7/0xc0
[   17.802206]  __kmalloc_cache_noprof+0x189/0x420
[   17.802434]  kasan_atomics+0x95/0x310
[   17.802678]  kunit_try_run_case+0x1a5/0x480
[   17.802947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.803277]  kthread+0x337/0x6f0
[   17.803491]  ret_from_fork+0x116/0x1d0
[   17.803738]  ret_from_fork_asm+0x1a/0x30
[   17.804009] 
[   17.804140] The buggy address belongs to the object at ffff888102b6b880
[   17.804140]  which belongs to the cache kmalloc-64 of size 64
[   17.804439] The buggy address is located 0 bytes to the right of
[   17.804439]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.804856] 
[   17.804969] The buggy address belongs to the physical page:
[   17.805161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.805400] flags: 0x200000000000000(node=0|zone=2)
[   17.805603] page_type: f5(slab)
[   17.805779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.805976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.806255] page dumped because: kasan: bad access detected
[   17.806399] 
[   17.806502] Memory state around the buggy address:
[   17.806684]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.806937]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.807198] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.807340]                                      ^
[   17.807445]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.807576]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.807703] ==================================================================
[   17.854553] ==================================================================
[   17.855534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.856022] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.856473] 
[   17.856617] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.856668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.856682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.856704] Call Trace:
[   17.856722]  <TASK>
[   17.856738]  dump_stack_lvl+0x73/0xb0
[   17.856766]  print_report+0xd1/0x650
[   17.856790]  ? __virt_addr_valid+0x1db/0x2d0
[   17.856815]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.856862]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856885]  kasan_report+0x141/0x180
[   17.856909]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856937]  kasan_check_range+0x10c/0x1c0
[   17.856963]  __kasan_check_write+0x18/0x20
[   17.856984]  kasan_atomics_helper+0x224c/0x5450
[   17.857008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.857031]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.857057]  ? kasan_atomics+0x152/0x310
[   17.857084]  kasan_atomics+0x1dc/0x310
[   17.857109]  ? __pfx_kasan_atomics+0x10/0x10
[   17.857134]  ? __pfx_read_tsc+0x10/0x10
[   17.857156]  ? ktime_get_ts64+0x86/0x230
[   17.857210]  kunit_try_run_case+0x1a5/0x480
[   17.857247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.857270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.857295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.857319]  ? __kthread_parkme+0x82/0x180
[   17.857361]  ? preempt_count_sub+0x50/0x80
[   17.857387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.857412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.857437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.857462]  kthread+0x337/0x6f0
[   17.857502]  ? trace_preempt_on+0x20/0xc0
[   17.857528]  ? __pfx_kthread+0x10/0x10
[   17.857549]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.857572]  ? calculate_sigpending+0x7b/0xa0
[   17.857597]  ? __pfx_kthread+0x10/0x10
[   17.857619]  ret_from_fork+0x116/0x1d0
[   17.857639]  ? __pfx_kthread+0x10/0x10
[   17.857660]  ret_from_fork_asm+0x1a/0x30
[   17.857692]  </TASK>
[   17.857704] 
[   17.863744] Allocated by task 283:
[   17.863975]  kasan_save_stack+0x45/0x70
[   17.864248]  kasan_save_track+0x18/0x40
[   17.864503]  kasan_save_alloc_info+0x3b/0x50
[   17.864597]  __kasan_kmalloc+0xb7/0xc0
[   17.864684]  __kmalloc_cache_noprof+0x189/0x420
[   17.864778]  kasan_atomics+0x95/0x310
[   17.864881]  kunit_try_run_case+0x1a5/0x480
[   17.865152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.865501]  kthread+0x337/0x6f0
[   17.865731]  ret_from_fork+0x116/0x1d0
[   17.865856]  ret_from_fork_asm+0x1a/0x30
[   17.865947] 
[   17.865999] The buggy address belongs to the object at ffff888102b6b880
[   17.865999]  which belongs to the cache kmalloc-64 of size 64
[   17.866189] The buggy address is located 0 bytes to the right of
[   17.866189]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.866931] 
[   17.867049] The buggy address belongs to the physical page:
[   17.867325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.867477] flags: 0x200000000000000(node=0|zone=2)
[   17.867588] page_type: f5(slab)
[   17.867681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.867819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.867953] page dumped because: kasan: bad access detected
[   17.868053] 
[   17.868174] Memory state around the buggy address:
[   17.868466]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.868896]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.869292] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.869698]                                      ^
[   17.869968]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870347]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870519] ==================================================================
[   17.321128] ==================================================================
[   17.321573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   17.321714] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.321843] 
[   17.321966] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.322036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.322050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.322089] Call Trace:
[   17.322107]  <TASK>
[   17.322139]  dump_stack_lvl+0x73/0xb0
[   17.322168]  print_report+0xd1/0x650
[   17.322191]  ? __virt_addr_valid+0x1db/0x2d0
[   17.322216]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.322293]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322319]  kasan_report+0x141/0x180
[   17.322349]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322379]  __asan_report_load4_noabort+0x18/0x20
[   17.322401]  kasan_atomics_helper+0x4a02/0x5450
[   17.322446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.322471]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.322493]  ? kasan_atomics+0x152/0x310
[   17.322522]  kasan_atomics+0x1dc/0x310
[   17.322546]  ? __pfx_kasan_atomics+0x10/0x10
[   17.322572]  ? __pfx_read_tsc+0x10/0x10
[   17.322593]  ? ktime_get_ts64+0x86/0x230
[   17.322618]  kunit_try_run_case+0x1a5/0x480
[   17.322643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.322665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.322688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.322712]  ? __kthread_parkme+0x82/0x180
[   17.322733]  ? preempt_count_sub+0x50/0x80
[   17.322758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.322781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.322805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.322828]  kthread+0x337/0x6f0
[   17.322850]  ? trace_preempt_on+0x20/0xc0
[   17.322874]  ? __pfx_kthread+0x10/0x10
[   17.322897]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.322918]  ? calculate_sigpending+0x7b/0xa0
[   17.322943]  ? __pfx_kthread+0x10/0x10
[   17.322966]  ret_from_fork+0x116/0x1d0
[   17.322985]  ? __pfx_kthread+0x10/0x10
[   17.323007]  ret_from_fork_asm+0x1a/0x30
[   17.323039]  </TASK>
[   17.323052] 
[   17.329011] Allocated by task 283:
[   17.329126]  kasan_save_stack+0x45/0x70
[   17.329264]  kasan_save_track+0x18/0x40
[   17.329386]  kasan_save_alloc_info+0x3b/0x50
[   17.329507]  __kasan_kmalloc+0xb7/0xc0
[   17.329614]  __kmalloc_cache_noprof+0x189/0x420
[   17.329747]  kasan_atomics+0x95/0x310
[   17.329854]  kunit_try_run_case+0x1a5/0x480
[   17.329976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.330119]  kthread+0x337/0x6f0
[   17.330310]  ret_from_fork+0x116/0x1d0
[   17.330527]  ret_from_fork_asm+0x1a/0x30
[   17.330809] 
[   17.330944] The buggy address belongs to the object at ffff888102b6b880
[   17.330944]  which belongs to the cache kmalloc-64 of size 64
[   17.331629] The buggy address is located 0 bytes to the right of
[   17.331629]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.332348] 
[   17.332474] The buggy address belongs to the physical page:
[   17.332800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.332953] flags: 0x200000000000000(node=0|zone=2)
[   17.333058] page_type: f5(slab)
[   17.333145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.333288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.333421] page dumped because: kasan: bad access detected
[   17.333524] 
[   17.333574] Memory state around the buggy address:
[   17.333720]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.334033]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.334352] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.334648]                                      ^
[   17.334870]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335164]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335464] ==================================================================
[   16.998896] ==================================================================
[   16.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.999591] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.000027] 
[   17.000169] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.000235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.000250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.000276] Call Trace:
[   17.000296]  <TASK>
[   17.000316]  dump_stack_lvl+0x73/0xb0
[   17.000349]  print_report+0xd1/0x650
[   17.000373]  ? __virt_addr_valid+0x1db/0x2d0
[   17.000397]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.000444]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000467]  kasan_report+0x141/0x180
[   17.000491]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000519]  kasan_check_range+0x10c/0x1c0
[   17.000544]  __kasan_check_write+0x18/0x20
[   17.000565]  kasan_atomics_helper+0x72f/0x5450
[   17.000590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.000615]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.000638]  ? kasan_atomics+0x152/0x310
[   17.000666]  kasan_atomics+0x1dc/0x310
[   17.000690]  ? __pfx_kasan_atomics+0x10/0x10
[   17.000716]  ? __pfx_read_tsc+0x10/0x10
[   17.000738]  ? ktime_get_ts64+0x86/0x230
[   17.000764]  kunit_try_run_case+0x1a5/0x480
[   17.000789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.000895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.000920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.000945]  ? __kthread_parkme+0x82/0x180
[   17.000967]  ? preempt_count_sub+0x50/0x80
[   17.000991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.001015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.001037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.001060]  kthread+0x337/0x6f0
[   17.001081]  ? trace_preempt_on+0x20/0xc0
[   17.001106]  ? __pfx_kthread+0x10/0x10
[   17.001127]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.001277]  ? calculate_sigpending+0x7b/0xa0
[   17.001316]  ? __pfx_kthread+0x10/0x10
[   17.001343]  ret_from_fork+0x116/0x1d0
[   17.001369]  ? __pfx_kthread+0x10/0x10
[   17.001391]  ret_from_fork_asm+0x1a/0x30
[   17.001423]  </TASK>
[   17.001436] 
[   17.007672] Allocated by task 283:
[   17.007803]  kasan_save_stack+0x45/0x70
[   17.008011]  kasan_save_track+0x18/0x40
[   17.008187]  kasan_save_alloc_info+0x3b/0x50
[   17.008334]  __kasan_kmalloc+0xb7/0xc0
[   17.008596]  __kmalloc_cache_noprof+0x189/0x420
[   17.008779]  kasan_atomics+0x95/0x310
[   17.008980]  kunit_try_run_case+0x1a5/0x480
[   17.009130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.009359]  kthread+0x337/0x6f0
[   17.009827]  ret_from_fork+0x116/0x1d0
[   17.009953]  ret_from_fork_asm+0x1a/0x30
[   17.010109] 
[   17.010213] The buggy address belongs to the object at ffff888102b6b880
[   17.010213]  which belongs to the cache kmalloc-64 of size 64
[   17.010606] The buggy address is located 0 bytes to the right of
[   17.010606]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.010959] 
[   17.011084] The buggy address belongs to the physical page:
[   17.011302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.011617] flags: 0x200000000000000(node=0|zone=2)
[   17.011721] page_type: f5(slab)
[   17.011807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.011938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.012065] page dumped because: kasan: bad access detected
[   17.012162] 
[   17.012210] Memory state around the buggy address:
[   17.012423]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.012766]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.013050] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.013345]                                      ^
[   17.013611]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.013897]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.014174] ==================================================================
[   17.683829] ==================================================================
[   17.684145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.684485] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.684677] 
[   17.684751] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.684802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.684816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.684840] Call Trace:
[   17.684861]  <TASK>
[   17.684881]  dump_stack_lvl+0x73/0xb0
[   17.684910]  print_report+0xd1/0x650
[   17.684933]  ? __virt_addr_valid+0x1db/0x2d0
[   17.684957]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.684979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.685002]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.685025]  kasan_report+0x141/0x180
[   17.685049]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.685076]  kasan_check_range+0x10c/0x1c0
[   17.685100]  __kasan_check_write+0x18/0x20
[   17.685121]  kasan_atomics_helper+0x1d7a/0x5450
[   17.685145]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.685168]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.685189]  ? kasan_atomics+0x152/0x310
[   17.685216]  kasan_atomics+0x1dc/0x310
[   17.685251]  ? __pfx_kasan_atomics+0x10/0x10
[   17.685277]  ? __pfx_read_tsc+0x10/0x10
[   17.685299]  ? ktime_get_ts64+0x86/0x230
[   17.685324]  kunit_try_run_case+0x1a5/0x480
[   17.685348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.685370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.685394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.685417]  ? __kthread_parkme+0x82/0x180
[   17.685438]  ? preempt_count_sub+0x50/0x80
[   17.685462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.685486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.685510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.685533]  kthread+0x337/0x6f0
[   17.685553]  ? trace_preempt_on+0x20/0xc0
[   17.685577]  ? __pfx_kthread+0x10/0x10
[   17.685598]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.685619]  ? calculate_sigpending+0x7b/0xa0
[   17.685643]  ? __pfx_kthread+0x10/0x10
[   17.685665]  ret_from_fork+0x116/0x1d0
[   17.685684]  ? __pfx_kthread+0x10/0x10
[   17.685705]  ret_from_fork_asm+0x1a/0x30
[   17.685737]  </TASK>
[   17.685749] 
[   17.691037] Allocated by task 283:
[   17.691126]  kasan_save_stack+0x45/0x70
[   17.691219]  kasan_save_track+0x18/0x40
[   17.691427]  kasan_save_alloc_info+0x3b/0x50
[   17.691626]  __kasan_kmalloc+0xb7/0xc0
[   17.691797]  __kmalloc_cache_noprof+0x189/0x420
[   17.691997]  kasan_atomics+0x95/0x310
[   17.692169]  kunit_try_run_case+0x1a5/0x480
[   17.692363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.692589]  kthread+0x337/0x6f0
[   17.692744]  ret_from_fork+0x116/0x1d0
[   17.692918]  ret_from_fork_asm+0x1a/0x30
[   17.693104] 
[   17.693213] The buggy address belongs to the object at ffff888102b6b880
[   17.693213]  which belongs to the cache kmalloc-64 of size 64
[   17.693677] The buggy address is located 0 bytes to the right of
[   17.693677]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.694124] 
[   17.694184] The buggy address belongs to the physical page:
[   17.694304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.694463] flags: 0x200000000000000(node=0|zone=2)
[   17.694575] page_type: f5(slab)
[   17.694738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.695047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.695335] page dumped because: kasan: bad access detected
[   17.695560] 
[   17.695655] Memory state around the buggy address:
[   17.695861]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.696111]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.696361] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.696580]                                      ^
[   17.696745]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.696976]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.697212] ==================================================================
[   17.381097] ==================================================================
[   17.381266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.382112] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.382530] 
[   17.382657] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.382715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.382730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.382755] Call Trace:
[   17.382775]  <TASK>
[   17.382793]  dump_stack_lvl+0x73/0xb0
[   17.382833]  print_report+0xd1/0x650
[   17.382859]  ? __virt_addr_valid+0x1db/0x2d0
[   17.382886]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.382910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.382935]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.382961]  kasan_report+0x141/0x180
[   17.382985]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.383013]  __asan_report_load4_noabort+0x18/0x20
[   17.383036]  kasan_atomics_helper+0x49ce/0x5450
[   17.383061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.383087]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.383110]  ? kasan_atomics+0x152/0x310
[   17.383139]  kasan_atomics+0x1dc/0x310
[   17.383165]  ? __pfx_kasan_atomics+0x10/0x10
[   17.383192]  ? __pfx_read_tsc+0x10/0x10
[   17.383215]  ? ktime_get_ts64+0x86/0x230
[   17.383255]  kunit_try_run_case+0x1a5/0x480
[   17.383281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.383305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.383330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.383353]  ? __kthread_parkme+0x82/0x180
[   17.383376]  ? preempt_count_sub+0x50/0x80
[   17.383403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.383427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.383452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.383476]  kthread+0x337/0x6f0
[   17.383496]  ? trace_preempt_on+0x20/0xc0
[   17.383520]  ? __pfx_kthread+0x10/0x10
[   17.383542]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.383563]  ? calculate_sigpending+0x7b/0xa0
[   17.383588]  ? __pfx_kthread+0x10/0x10
[   17.383611]  ret_from_fork+0x116/0x1d0
[   17.383629]  ? __pfx_kthread+0x10/0x10
[   17.383651]  ret_from_fork_asm+0x1a/0x30
[   17.383683]  </TASK>
[   17.383695] 
[   17.389501] Allocated by task 283:
[   17.389716]  kasan_save_stack+0x45/0x70
[   17.389925]  kasan_save_track+0x18/0x40
[   17.390118]  kasan_save_alloc_info+0x3b/0x50
[   17.390380]  __kasan_kmalloc+0xb7/0xc0
[   17.390582]  __kmalloc_cache_noprof+0x189/0x420
[   17.390802]  kasan_atomics+0x95/0x310
[   17.390985]  kunit_try_run_case+0x1a5/0x480
[   17.391186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391440]  kthread+0x337/0x6f0
[   17.391611]  ret_from_fork+0x116/0x1d0
[   17.391789]  ret_from_fork_asm+0x1a/0x30
[   17.391977] 
[   17.392071] The buggy address belongs to the object at ffff888102b6b880
[   17.392071]  which belongs to the cache kmalloc-64 of size 64
[   17.392734] The buggy address is located 0 bytes to the right of
[   17.392734]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.393330] 
[   17.393501] The buggy address belongs to the physical page:
[   17.393820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.394158] flags: 0x200000000000000(node=0|zone=2)
[   17.394482] page_type: f5(slab)
[   17.394679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.395045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.395251] page dumped because: kasan: bad access detected
[   17.395361] 
[   17.395418] Memory state around the buggy address:
[   17.395667]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.396091]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.396318] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.396678]                                      ^
[   17.396925]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.397236]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.397630] ==================================================================
[   17.577126] ==================================================================
[   17.577988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.578470] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.578947] 
[   17.579100] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.579154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.579167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.579192] Call Trace:
[   17.579211]  <TASK>
[   17.579237]  dump_stack_lvl+0x73/0xb0
[   17.579267]  print_report+0xd1/0x650
[   17.579292]  ? __virt_addr_valid+0x1db/0x2d0
[   17.579319]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.579367]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579391]  kasan_report+0x141/0x180
[   17.579416]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579446]  kasan_check_range+0x10c/0x1c0
[   17.579472]  __kasan_check_write+0x18/0x20
[   17.579494]  kasan_atomics_helper+0x194a/0x5450
[   17.579520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.579545]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.579567]  ? kasan_atomics+0x152/0x310
[   17.579595]  kasan_atomics+0x1dc/0x310
[   17.579619]  ? __pfx_kasan_atomics+0x10/0x10
[   17.579645]  ? __pfx_read_tsc+0x10/0x10
[   17.579668]  ? ktime_get_ts64+0x86/0x230
[   17.579692]  kunit_try_run_case+0x1a5/0x480
[   17.579717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.579763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.579786]  ? __kthread_parkme+0x82/0x180
[   17.579807]  ? preempt_count_sub+0x50/0x80
[   17.579832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.579902]  kthread+0x337/0x6f0
[   17.579922]  ? trace_preempt_on+0x20/0xc0
[   17.579947]  ? __pfx_kthread+0x10/0x10
[   17.579968]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.579990]  ? calculate_sigpending+0x7b/0xa0
[   17.580014]  ? __pfx_kthread+0x10/0x10
[   17.580037]  ret_from_fork+0x116/0x1d0
[   17.580075]  ? __pfx_kthread+0x10/0x10
[   17.580098]  ret_from_fork_asm+0x1a/0x30
[   17.580142]  </TASK>
[   17.580156] 
[   17.586833] Allocated by task 283:
[   17.587093]  kasan_save_stack+0x45/0x70
[   17.587261]  kasan_save_track+0x18/0x40
[   17.587358]  kasan_save_alloc_info+0x3b/0x50
[   17.587458]  __kasan_kmalloc+0xb7/0xc0
[   17.587550]  __kmalloc_cache_noprof+0x189/0x420
[   17.587649]  kasan_atomics+0x95/0x310
[   17.587736]  kunit_try_run_case+0x1a5/0x480
[   17.587828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.587935]  kthread+0x337/0x6f0
[   17.588015]  ret_from_fork+0x116/0x1d0
[   17.588097]  ret_from_fork_asm+0x1a/0x30
[   17.588185] 
[   17.588249] The buggy address belongs to the object at ffff888102b6b880
[   17.588249]  which belongs to the cache kmalloc-64 of size 64
[   17.588447] The buggy address is located 0 bytes to the right of
[   17.588447]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.588853] 
[   17.588979] The buggy address belongs to the physical page:
[   17.589319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.589808] flags: 0x200000000000000(node=0|zone=2)
[   17.590118] page_type: f5(slab)
[   17.590351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.590813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.591271] page dumped because: kasan: bad access detected
[   17.591615] 
[   17.591724] Memory state around the buggy address:
[   17.591823]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.591948]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.592071] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.592189]                                      ^
[   17.592292]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.592416]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.592535] ==================================================================
[   17.755156] ==================================================================
[   17.755438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.755777] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.756065] 
[   17.756178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.756242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.756256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.756277] Call Trace:
[   17.756301]  <TASK>
[   17.756316]  dump_stack_lvl+0x73/0xb0
[   17.756351]  print_report+0xd1/0x650
[   17.756375]  ? __virt_addr_valid+0x1db/0x2d0
[   17.756406]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.756468]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756491]  kasan_report+0x141/0x180
[   17.756522]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756558]  kasan_check_range+0x10c/0x1c0
[   17.756591]  __kasan_check_write+0x18/0x20
[   17.756612]  kasan_atomics_helper+0x2006/0x5450
[   17.756643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.756675]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.756697]  ? kasan_atomics+0x152/0x310
[   17.756733]  kasan_atomics+0x1dc/0x310
[   17.756765]  ? __pfx_kasan_atomics+0x10/0x10
[   17.756798]  ? __pfx_read_tsc+0x10/0x10
[   17.756827]  ? ktime_get_ts64+0x86/0x230
[   17.756851]  kunit_try_run_case+0x1a5/0x480
[   17.756884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.756916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.756946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.756969]  ? __kthread_parkme+0x82/0x180
[   17.756998]  ? preempt_count_sub+0x50/0x80
[   17.757030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.757053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.757084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.757116]  kthread+0x337/0x6f0
[   17.757136]  ? trace_preempt_on+0x20/0xc0
[   17.757169]  ? __pfx_kthread+0x10/0x10
[   17.757199]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.757237]  ? calculate_sigpending+0x7b/0xa0
[   17.757266]  ? __pfx_kthread+0x10/0x10
[   17.757298]  ret_from_fork+0x116/0x1d0
[   17.757328]  ? __pfx_kthread+0x10/0x10
[   17.757351]  ret_from_fork_asm+0x1a/0x30
[   17.757394]  </TASK>
[   17.757415] 
[   17.762427] Allocated by task 283:
[   17.762653]  kasan_save_stack+0x45/0x70
[   17.762857]  kasan_save_track+0x18/0x40
[   17.763033]  kasan_save_alloc_info+0x3b/0x50
[   17.763300]  __kasan_kmalloc+0xb7/0xc0
[   17.763499]  __kmalloc_cache_noprof+0x189/0x420
[   17.763688]  kasan_atomics+0x95/0x310
[   17.763875]  kunit_try_run_case+0x1a5/0x480
[   17.764054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.764392]  kthread+0x337/0x6f0
[   17.764505]  ret_from_fork+0x116/0x1d0
[   17.764595]  ret_from_fork_asm+0x1a/0x30
[   17.764799] 
[   17.764907] The buggy address belongs to the object at ffff888102b6b880
[   17.764907]  which belongs to the cache kmalloc-64 of size 64
[   17.766378] The buggy address is located 0 bytes to the right of
[   17.766378]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.767150] 
[   17.767324] The buggy address belongs to the physical page:
[   17.767584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.767905] flags: 0x200000000000000(node=0|zone=2)
[   17.768137] page_type: f5(slab)
[   17.769472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.769641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.769779] page dumped because: kasan: bad access detected
[   17.769884] 
[   17.769935] Memory state around the buggy address:
[   17.770037]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.770449]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.770779] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.771117]                                      ^
[   17.771385]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.771715]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.771845] ==================================================================
[   17.431577] ==================================================================
[   17.431942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.432330] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.433013] 
[   17.433141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.433193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.433206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.433238] Call Trace:
[   17.433258]  <TASK>
[   17.433290]  dump_stack_lvl+0x73/0xb0
[   17.433319]  print_report+0xd1/0x650
[   17.433343]  ? __virt_addr_valid+0x1db/0x2d0
[   17.433368]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.433430]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433454]  kasan_report+0x141/0x180
[   17.433477]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433505]  kasan_check_range+0x10c/0x1c0
[   17.433529]  __kasan_check_write+0x18/0x20
[   17.433567]  kasan_atomics_helper+0x1467/0x5450
[   17.433592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.433634]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.433657]  ? kasan_atomics+0x152/0x310
[   17.433683]  kasan_atomics+0x1dc/0x310
[   17.433707]  ? __pfx_kasan_atomics+0x10/0x10
[   17.433733]  ? __pfx_read_tsc+0x10/0x10
[   17.433754]  ? ktime_get_ts64+0x86/0x230
[   17.433779]  kunit_try_run_case+0x1a5/0x480
[   17.433804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.433826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.433850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.433873]  ? __kthread_parkme+0x82/0x180
[   17.433894]  ? preempt_count_sub+0x50/0x80
[   17.433918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.433942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.433965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.433988]  kthread+0x337/0x6f0
[   17.434008]  ? trace_preempt_on+0x20/0xc0
[   17.434032]  ? __pfx_kthread+0x10/0x10
[   17.434053]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.434075]  ? calculate_sigpending+0x7b/0xa0
[   17.434099]  ? __pfx_kthread+0x10/0x10
[   17.434121]  ret_from_fork+0x116/0x1d0
[   17.434139]  ? __pfx_kthread+0x10/0x10
[   17.434161]  ret_from_fork_asm+0x1a/0x30
[   17.434207]  </TASK>
[   17.434229] 
[   17.439506] Allocated by task 283:
[   17.439617]  kasan_save_stack+0x45/0x70
[   17.439850]  kasan_save_track+0x18/0x40
[   17.440066]  kasan_save_alloc_info+0x3b/0x50
[   17.440286]  __kasan_kmalloc+0xb7/0xc0
[   17.440545]  __kmalloc_cache_noprof+0x189/0x420
[   17.440818]  kasan_atomics+0x95/0x310
[   17.441019]  kunit_try_run_case+0x1a5/0x480
[   17.441271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.441475]  kthread+0x337/0x6f0
[   17.441560]  ret_from_fork+0x116/0x1d0
[   17.441645]  ret_from_fork_asm+0x1a/0x30
[   17.441888] 
[   17.442012] The buggy address belongs to the object at ffff888102b6b880
[   17.442012]  which belongs to the cache kmalloc-64 of size 64
[   17.442395] The buggy address is located 0 bytes to the right of
[   17.442395]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.442784] 
[   17.442865] The buggy address belongs to the physical page:
[   17.443044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.443342] flags: 0x200000000000000(node=0|zone=2)
[   17.443590] page_type: f5(slab)
[   17.443753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.443997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.444215] page dumped because: kasan: bad access detected
[   17.444454] 
[   17.444542] Memory state around the buggy address:
[   17.444675]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.444922]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.445151] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.445415]                                      ^
[   17.445560]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445790]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445948] ==================================================================
[   17.173251] ==================================================================
[   17.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   17.173731] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.174043] 
[   17.174125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.174179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.174193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.174216] Call Trace:
[   17.174249]  <TASK>
[   17.174270]  dump_stack_lvl+0x73/0xb0
[   17.174300]  print_report+0xd1/0x650
[   17.174324]  ? __virt_addr_valid+0x1db/0x2d0
[   17.174360]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.174409]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174432]  kasan_report+0x141/0x180
[   17.174457]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174485]  kasan_check_range+0x10c/0x1c0
[   17.174510]  __kasan_check_write+0x18/0x20
[   17.174531]  kasan_atomics_helper+0xd47/0x5450
[   17.174555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.174579]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.174602]  ? kasan_atomics+0x152/0x310
[   17.174631]  kasan_atomics+0x1dc/0x310
[   17.174655]  ? __pfx_kasan_atomics+0x10/0x10
[   17.174681]  ? __pfx_read_tsc+0x10/0x10
[   17.174706]  ? ktime_get_ts64+0x86/0x230
[   17.174732]  kunit_try_run_case+0x1a5/0x480
[   17.174758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.174805]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.174829]  ? __kthread_parkme+0x82/0x180
[   17.174850]  ? preempt_count_sub+0x50/0x80
[   17.174875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.174924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.175129]  kthread+0x337/0x6f0
[   17.175238]  ? trace_preempt_on+0x20/0xc0
[   17.175273]  ? __pfx_kthread+0x10/0x10
[   17.175297]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.175322]  ? calculate_sigpending+0x7b/0xa0
[   17.175348]  ? __pfx_kthread+0x10/0x10
[   17.175372]  ret_from_fork+0x116/0x1d0
[   17.175392]  ? __pfx_kthread+0x10/0x10
[   17.175415]  ret_from_fork_asm+0x1a/0x30
[   17.175448]  </TASK>
[   17.175550] 
[   17.181998] Allocated by task 283:
[   17.182101]  kasan_save_stack+0x45/0x70
[   17.182205]  kasan_save_track+0x18/0x40
[   17.182427]  kasan_save_alloc_info+0x3b/0x50
[   17.182747]  __kasan_kmalloc+0xb7/0xc0
[   17.182971]  __kmalloc_cache_noprof+0x189/0x420
[   17.183253]  kasan_atomics+0x95/0x310
[   17.183556]  kunit_try_run_case+0x1a5/0x480
[   17.183709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.183835]  kthread+0x337/0x6f0
[   17.183918]  ret_from_fork+0x116/0x1d0
[   17.184004]  ret_from_fork_asm+0x1a/0x30
[   17.184092] 
[   17.184202] The buggy address belongs to the object at ffff888102b6b880
[   17.184202]  which belongs to the cache kmalloc-64 of size 64
[   17.184967] The buggy address is located 0 bytes to the right of
[   17.184967]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.185607] 
[   17.185669] The buggy address belongs to the physical page:
[   17.185799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.186213] flags: 0x200000000000000(node=0|zone=2)
[   17.186528] page_type: f5(slab)
[   17.186666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.186901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.187089] page dumped because: kasan: bad access detected
[   17.187193] 
[   17.187256] Memory state around the buggy address:
[   17.187356]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.187543]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.187861] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.188286]                                      ^
[   17.188622]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189035]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189251] ==================================================================
[   17.727295] ==================================================================
[   17.727656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.727969] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.728286] 
[   17.728397] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.728464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.728478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.728501] Call Trace:
[   17.728518]  <TASK>
[   17.728534]  dump_stack_lvl+0x73/0xb0
[   17.728562]  print_report+0xd1/0x650
[   17.728586]  ? __virt_addr_valid+0x1db/0x2d0
[   17.728629]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.728678]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728701]  kasan_report+0x141/0x180
[   17.728726]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728754]  kasan_check_range+0x10c/0x1c0
[   17.728799]  __kasan_check_write+0x18/0x20
[   17.728821]  kasan_atomics_helper+0x1f43/0x5450
[   17.728846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.728870]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.728893]  ? kasan_atomics+0x152/0x310
[   17.728921]  kasan_atomics+0x1dc/0x310
[   17.728945]  ? __pfx_kasan_atomics+0x10/0x10
[   17.728988]  ? __pfx_read_tsc+0x10/0x10
[   17.729012]  ? ktime_get_ts64+0x86/0x230
[   17.729038]  kunit_try_run_case+0x1a5/0x480
[   17.729064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.729111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.729153]  ? __kthread_parkme+0x82/0x180
[   17.729174]  ? preempt_count_sub+0x50/0x80
[   17.729198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.729256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.729297]  kthread+0x337/0x6f0
[   17.729320]  ? trace_preempt_on+0x20/0xc0
[   17.729354]  ? __pfx_kthread+0x10/0x10
[   17.729384]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.729414]  ? calculate_sigpending+0x7b/0xa0
[   17.729439]  ? __pfx_kthread+0x10/0x10
[   17.729470]  ret_from_fork+0x116/0x1d0
[   17.729498]  ? __pfx_kthread+0x10/0x10
[   17.729520]  ret_from_fork_asm+0x1a/0x30
[   17.729560]  </TASK>
[   17.729579] 
[   17.735029] Allocated by task 283:
[   17.735226]  kasan_save_stack+0x45/0x70
[   17.735382]  kasan_save_track+0x18/0x40
[   17.735569]  kasan_save_alloc_info+0x3b/0x50
[   17.735692]  __kasan_kmalloc+0xb7/0xc0
[   17.735779]  __kmalloc_cache_noprof+0x189/0x420
[   17.735873]  kasan_atomics+0x95/0x310
[   17.735957]  kunit_try_run_case+0x1a5/0x480
[   17.736046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.736149]  kthread+0x337/0x6f0
[   17.736246]  ret_from_fork+0x116/0x1d0
[   17.736439]  ret_from_fork_asm+0x1a/0x30
[   17.736640] 
[   17.736755] The buggy address belongs to the object at ffff888102b6b880
[   17.736755]  which belongs to the cache kmalloc-64 of size 64
[   17.737308] The buggy address is located 0 bytes to the right of
[   17.737308]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.737775] 
[   17.737888] The buggy address belongs to the physical page:
[   17.738049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.738316] flags: 0x200000000000000(node=0|zone=2)
[   17.738455] page_type: f5(slab)
[   17.738656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.738892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.739130] page dumped because: kasan: bad access detected
[   17.739288] 
[   17.739363] Memory state around the buggy address:
[   17.739488]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.739648]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.739805] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.739965]                                      ^
[   17.740083]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740367]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740642] ==================================================================
[   17.351389] ==================================================================
[   17.351721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.352029] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.352343] 
[   17.352427] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.352497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.352511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.352535] Call Trace:
[   17.352552]  <TASK>
[   17.352569]  dump_stack_lvl+0x73/0xb0
[   17.352597]  print_report+0xd1/0x650
[   17.352621]  ? __virt_addr_valid+0x1db/0x2d0
[   17.353594]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.353646]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353671]  kasan_report+0x141/0x180
[   17.353696]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353725]  __asan_report_load4_noabort+0x18/0x20
[   17.353749]  kasan_atomics_helper+0x49e8/0x5450
[   17.353774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.353797]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.353820]  ? kasan_atomics+0x152/0x310
[   17.353848]  kasan_atomics+0x1dc/0x310
[   17.353873]  ? __pfx_kasan_atomics+0x10/0x10
[   17.353898]  ? __pfx_read_tsc+0x10/0x10
[   17.354308]  ? ktime_get_ts64+0x86/0x230
[   17.354352]  kunit_try_run_case+0x1a5/0x480
[   17.354385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.354410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.354436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.354460]  ? __kthread_parkme+0x82/0x180
[   17.354483]  ? preempt_count_sub+0x50/0x80
[   17.354509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.354534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.354557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.354581]  kthread+0x337/0x6f0
[   17.354602]  ? trace_preempt_on+0x20/0xc0
[   17.354627]  ? __pfx_kthread+0x10/0x10
[   17.354648]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.354671]  ? calculate_sigpending+0x7b/0xa0
[   17.354696]  ? __pfx_kthread+0x10/0x10
[   17.354719]  ret_from_fork+0x116/0x1d0
[   17.354739]  ? __pfx_kthread+0x10/0x10
[   17.354761]  ret_from_fork_asm+0x1a/0x30
[   17.354793]  </TASK>
[   17.354807] 
[   17.359719] Allocated by task 283:
[   17.359841]  kasan_save_stack+0x45/0x70
[   17.360068]  kasan_save_track+0x18/0x40
[   17.360260]  kasan_save_alloc_info+0x3b/0x50
[   17.360429]  __kasan_kmalloc+0xb7/0xc0
[   17.360575]  __kmalloc_cache_noprof+0x189/0x420
[   17.360783]  kasan_atomics+0x95/0x310
[   17.360907]  kunit_try_run_case+0x1a5/0x480
[   17.361101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.361303]  kthread+0x337/0x6f0
[   17.361444]  ret_from_fork+0x116/0x1d0
[   17.361591]  ret_from_fork_asm+0x1a/0x30
[   17.361761] 
[   17.361873] The buggy address belongs to the object at ffff888102b6b880
[   17.361873]  which belongs to the cache kmalloc-64 of size 64
[   17.362204] The buggy address is located 0 bytes to the right of
[   17.362204]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.362618] 
[   17.362735] The buggy address belongs to the physical page:
[   17.362910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.363165] flags: 0x200000000000000(node=0|zone=2)
[   17.363423] page_type: f5(slab)
[   17.363592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.363851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.364040] page dumped because: kasan: bad access detected
[   17.364241] 
[   17.364340] Memory state around the buggy address:
[   17.364506]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.364746]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.364980] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.365173]                                      ^
[   17.365324]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365485]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365762] ==================================================================
[   17.775292] ==================================================================
[   17.777804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.778277] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.778672] 
[   17.778820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.778878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.778892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.778917] Call Trace:
[   17.778944]  <TASK>
[   17.778967]  dump_stack_lvl+0x73/0xb0
[   17.778997]  print_report+0xd1/0x650
[   17.779022]  ? __virt_addr_valid+0x1db/0x2d0
[   17.779047]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.779092]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779114]  kasan_report+0x141/0x180
[   17.779137]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779165]  __asan_report_load8_noabort+0x18/0x20
[   17.779187]  kasan_atomics_helper+0x4f98/0x5450
[   17.779211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.779589]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.779624]  ? kasan_atomics+0x152/0x310
[   17.779652]  kasan_atomics+0x1dc/0x310
[   17.779680]  ? __pfx_kasan_atomics+0x10/0x10
[   17.779706]  ? __pfx_read_tsc+0x10/0x10
[   17.779728]  ? ktime_get_ts64+0x86/0x230
[   17.779754]  kunit_try_run_case+0x1a5/0x480
[   17.779781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.779804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.779828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.779852]  ? __kthread_parkme+0x82/0x180
[   17.779874]  ? preempt_count_sub+0x50/0x80
[   17.779900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.779924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.779947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.779971]  kthread+0x337/0x6f0
[   17.779990]  ? trace_preempt_on+0x20/0xc0
[   17.780015]  ? __pfx_kthread+0x10/0x10
[   17.780036]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.780057]  ? calculate_sigpending+0x7b/0xa0
[   17.780082]  ? __pfx_kthread+0x10/0x10
[   17.780105]  ret_from_fork+0x116/0x1d0
[   17.780124]  ? __pfx_kthread+0x10/0x10
[   17.780144]  ret_from_fork_asm+0x1a/0x30
[   17.780176]  </TASK>
[   17.780190] 
[   17.786628] Allocated by task 283:
[   17.786820]  kasan_save_stack+0x45/0x70
[   17.787029]  kasan_save_track+0x18/0x40
[   17.787214]  kasan_save_alloc_info+0x3b/0x50
[   17.787428]  __kasan_kmalloc+0xb7/0xc0
[   17.787610]  __kmalloc_cache_noprof+0x189/0x420
[   17.787823]  kasan_atomics+0x95/0x310
[   17.788005]  kunit_try_run_case+0x1a5/0x480
[   17.788203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.788478]  kthread+0x337/0x6f0
[   17.788607]  ret_from_fork+0x116/0x1d0
[   17.788725]  ret_from_fork_asm+0x1a/0x30
[   17.788923] 
[   17.789035] The buggy address belongs to the object at ffff888102b6b880
[   17.789035]  which belongs to the cache kmalloc-64 of size 64
[   17.789394] The buggy address is located 0 bytes to the right of
[   17.789394]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.789643] 
[   17.789762] The buggy address belongs to the physical page:
[   17.790082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.790341] flags: 0x200000000000000(node=0|zone=2)
[   17.790611] page_type: f5(slab)
[   17.790772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.790996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.791256] page dumped because: kasan: bad access detected
[   17.791361] 
[   17.791413] Memory state around the buggy address:
[   17.791675]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791973]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.792250] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.792517]                                      ^
[   17.792760]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792910]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793042] ==================================================================
[   17.611404] ==================================================================
[   17.611754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.612011] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.612260] 
[   17.612410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.612488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.612513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.612538] Call Trace:
[   17.612572]  <TASK>
[   17.612597]  dump_stack_lvl+0x73/0xb0
[   17.612627]  print_report+0xd1/0x650
[   17.612662]  ? __virt_addr_valid+0x1db/0x2d0
[   17.612689]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.612752]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612777]  kasan_report+0x141/0x180
[   17.612801]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612830]  kasan_check_range+0x10c/0x1c0
[   17.612855]  __kasan_check_write+0x18/0x20
[   17.612875]  kasan_atomics_helper+0x1a7f/0x5450
[   17.612917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.612943]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.612965]  ? kasan_atomics+0x152/0x310
[   17.612992]  kasan_atomics+0x1dc/0x310
[   17.613016]  ? __pfx_kasan_atomics+0x10/0x10
[   17.613041]  ? __pfx_read_tsc+0x10/0x10
[   17.613063]  ? ktime_get_ts64+0x86/0x230
[   17.613088]  kunit_try_run_case+0x1a5/0x480
[   17.613114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.613137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.613161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.613184]  ? __kthread_parkme+0x82/0x180
[   17.613206]  ? preempt_count_sub+0x50/0x80
[   17.613249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.613274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.613299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.613322]  kthread+0x337/0x6f0
[   17.613343]  ? trace_preempt_on+0x20/0xc0
[   17.613369]  ? __pfx_kthread+0x10/0x10
[   17.613391]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.613413]  ? calculate_sigpending+0x7b/0xa0
[   17.613438]  ? __pfx_kthread+0x10/0x10
[   17.613460]  ret_from_fork+0x116/0x1d0
[   17.613480]  ? __pfx_kthread+0x10/0x10
[   17.613501]  ret_from_fork_asm+0x1a/0x30
[   17.613535]  </TASK>
[   17.613549] 
[   17.619077] Allocated by task 283:
[   17.619196]  kasan_save_stack+0x45/0x70
[   17.619331]  kasan_save_track+0x18/0x40
[   17.619465]  kasan_save_alloc_info+0x3b/0x50
[   17.619700]  __kasan_kmalloc+0xb7/0xc0
[   17.619945]  __kmalloc_cache_noprof+0x189/0x420
[   17.620200]  kasan_atomics+0x95/0x310
[   17.620441]  kunit_try_run_case+0x1a5/0x480
[   17.620697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.621009]  kthread+0x337/0x6f0
[   17.621229]  ret_from_fork+0x116/0x1d0
[   17.621447]  ret_from_fork_asm+0x1a/0x30
[   17.621680] 
[   17.621801] The buggy address belongs to the object at ffff888102b6b880
[   17.621801]  which belongs to the cache kmalloc-64 of size 64
[   17.621997] The buggy address is located 0 bytes to the right of
[   17.621997]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.622288] 
[   17.622400] The buggy address belongs to the physical page:
[   17.622704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.623091] flags: 0x200000000000000(node=0|zone=2)
[   17.623260] page_type: f5(slab)
[   17.623350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.623483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.623614] page dumped because: kasan: bad access detected
[   17.623713] 
[   17.623763] Memory state around the buggy address:
[   17.623859]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.624208]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.624622] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.624953]                                      ^
[   17.625190]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625545]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625725] ==================================================================
[   16.838281] ==================================================================
[   16.838766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.839205] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.839659] 
[   16.839805] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.839860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.839874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.839897] Call Trace:
[   16.839917]  <TASK>
[   16.839937]  dump_stack_lvl+0x73/0xb0
[   16.839965]  print_report+0xd1/0x650
[   16.839989]  ? __virt_addr_valid+0x1db/0x2d0
[   16.840013]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.840056]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840078]  kasan_report+0x141/0x180
[   16.840100]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840127]  __asan_report_load4_noabort+0x18/0x20
[   16.840147]  kasan_atomics_helper+0x4b88/0x5450
[   16.840170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.840192]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.840237]  ? kasan_atomics+0x152/0x310
[   16.840268]  kasan_atomics+0x1dc/0x310
[   16.840300]  ? __pfx_kasan_atomics+0x10/0x10
[   16.840325]  ? __pfx_read_tsc+0x10/0x10
[   16.840347]  ? ktime_get_ts64+0x86/0x230
[   16.840372]  kunit_try_run_case+0x1a5/0x480
[   16.840396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.840418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.840441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.840531]  ? __kthread_parkme+0x82/0x180
[   16.840556]  ? preempt_count_sub+0x50/0x80
[   16.840597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.840625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.840648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.840671]  kthread+0x337/0x6f0
[   16.840690]  ? trace_preempt_on+0x20/0xc0
[   16.840715]  ? __pfx_kthread+0x10/0x10
[   16.840752]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.840776]  ? calculate_sigpending+0x7b/0xa0
[   16.840801]  ? __pfx_kthread+0x10/0x10
[   16.840823]  ret_from_fork+0x116/0x1d0
[   16.840842]  ? __pfx_kthread+0x10/0x10
[   16.840862]  ret_from_fork_asm+0x1a/0x30
[   16.840910]  </TASK>
[   16.840923] 
[   16.846944] Allocated by task 283:
[   16.847046]  kasan_save_stack+0x45/0x70
[   16.847296]  kasan_save_track+0x18/0x40
[   16.847606]  kasan_save_alloc_info+0x3b/0x50
[   16.847882]  __kasan_kmalloc+0xb7/0xc0
[   16.848102]  __kmalloc_cache_noprof+0x189/0x420
[   16.848393]  kasan_atomics+0x95/0x310
[   16.848693]  kunit_try_run_case+0x1a5/0x480
[   16.848958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.849096]  kthread+0x337/0x6f0
[   16.849307]  ret_from_fork+0x116/0x1d0
[   16.849414]  ret_from_fork_asm+0x1a/0x30
[   16.849818] 
[   16.849884] The buggy address belongs to the object at ffff888102b6b880
[   16.849884]  which belongs to the cache kmalloc-64 of size 64
[   16.850715] The buggy address is located 0 bytes to the right of
[   16.850715]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.851370] 
[   16.851427] The buggy address belongs to the physical page:
[   16.851588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.851735] flags: 0x200000000000000(node=0|zone=2)
[   16.852055] page_type: f5(slab)
[   16.852240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.852740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.853101] page dumped because: kasan: bad access detected
[   16.853325] 
[   16.853440] Memory state around the buggy address:
[   16.853631]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.853964]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.854091] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.854211]                                      ^
[   16.854316]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855013]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[   16.617914] ==================================================================
[   16.619251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.620080] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.620902] 
[   16.621310] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.621417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.621443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.621479] Call Trace:
[   16.621507]  <TASK>
[   16.621537]  dump_stack_lvl+0x73/0xb0
[   16.621609]  print_report+0xd1/0x650
[   16.621646]  ? __virt_addr_valid+0x1db/0x2d0
[   16.621685]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.621759]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621800]  kasan_report+0x141/0x180
[   16.621828]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621857]  kasan_check_range+0x10c/0x1c0
[   16.621881]  __kasan_check_write+0x18/0x20
[   16.621900]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   16.621924]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.621950]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.621970]  ? kasan_bitops_generic+0x92/0x1c0
[   16.621995]  kasan_bitops_generic+0x121/0x1c0
[   16.622018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.622040]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.622066]  kunit_try_run_case+0x1a5/0x480
[   16.622091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.622134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.622155]  ? __kthread_parkme+0x82/0x180
[   16.622175]  ? preempt_count_sub+0x50/0x80
[   16.622199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.622266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.622288]  kthread+0x337/0x6f0
[   16.622307]  ? trace_preempt_on+0x20/0xc0
[   16.622331]  ? __pfx_kthread+0x10/0x10
[   16.622366]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.622389]  ? calculate_sigpending+0x7b/0xa0
[   16.622414]  ? __pfx_kthread+0x10/0x10
[   16.622436]  ret_from_fork+0x116/0x1d0
[   16.622473]  ? __pfx_kthread+0x10/0x10
[   16.622510]  ret_from_fork_asm+0x1a/0x30
[   16.622562]  </TASK>
[   16.622583] 
[   16.634655] Allocated by task 279:
[   16.634960]  kasan_save_stack+0x45/0x70
[   16.635214]  kasan_save_track+0x18/0x40
[   16.635920]  kasan_save_alloc_info+0x3b/0x50
[   16.636206]  __kasan_kmalloc+0xb7/0xc0
[   16.636646]  __kmalloc_cache_noprof+0x189/0x420
[   16.637009]  kasan_bitops_generic+0x92/0x1c0
[   16.637313]  kunit_try_run_case+0x1a5/0x480
[   16.638061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.638406]  kthread+0x337/0x6f0
[   16.638885]  ret_from_fork+0x116/0x1d0
[   16.639150]  ret_from_fork_asm+0x1a/0x30
[   16.639716] 
[   16.639900] The buggy address belongs to the object at ffff8881022a34c0
[   16.639900]  which belongs to the cache kmalloc-16 of size 16
[   16.640578] The buggy address is located 8 bytes inside of
[   16.640578]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.641399] 
[   16.641977] The buggy address belongs to the physical page:
[   16.642390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.642963] flags: 0x200000000000000(node=0|zone=2)
[   16.643342] page_type: f5(slab)
[   16.643824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.644266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.644903] page dumped because: kasan: bad access detected
[   16.645159] 
[   16.645324] Memory state around the buggy address:
[   16.646002]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.646609]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.646928] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.647420]                                               ^
[   16.648039]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648391]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648973] ==================================================================
[   16.720704] ==================================================================
[   16.721379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.722140] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.722642] 
[   16.722771] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.722839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.722853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.722875] Call Trace:
[   16.722889]  <TASK>
[   16.722909]  dump_stack_lvl+0x73/0xb0
[   16.722941]  print_report+0xd1/0x650
[   16.722983]  ? __virt_addr_valid+0x1db/0x2d0
[   16.723008]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.723055]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723080]  kasan_report+0x141/0x180
[   16.723101]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723149]  kasan_check_range+0x10c/0x1c0
[   16.723172]  __kasan_check_write+0x18/0x20
[   16.723191]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.723216]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.723253]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.723275]  ? kasan_bitops_generic+0x92/0x1c0
[   16.723300]  kasan_bitops_generic+0x121/0x1c0
[   16.723323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.723345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.723371]  kunit_try_run_case+0x1a5/0x480
[   16.723410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.723434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.723565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.723592]  ? __kthread_parkme+0x82/0x180
[   16.723614]  ? preempt_count_sub+0x50/0x80
[   16.723638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.723661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.723684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.723706]  kthread+0x337/0x6f0
[   16.723725]  ? trace_preempt_on+0x20/0xc0
[   16.723748]  ? __pfx_kthread+0x10/0x10
[   16.723769]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.723808]  ? calculate_sigpending+0x7b/0xa0
[   16.723832]  ? __pfx_kthread+0x10/0x10
[   16.723854]  ret_from_fork+0x116/0x1d0
[   16.723873]  ? __pfx_kthread+0x10/0x10
[   16.723892]  ret_from_fork_asm+0x1a/0x30
[   16.723922]  </TASK>
[   16.723950] 
[   16.731089] Allocated by task 279:
[   16.731194]  kasan_save_stack+0x45/0x70
[   16.731317]  kasan_save_track+0x18/0x40
[   16.731642]  kasan_save_alloc_info+0x3b/0x50
[   16.731759]  __kasan_kmalloc+0xb7/0xc0
[   16.731967]  __kmalloc_cache_noprof+0x189/0x420
[   16.732158]  kasan_bitops_generic+0x92/0x1c0
[   16.732263]  kunit_try_run_case+0x1a5/0x480
[   16.732357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.732768]  kthread+0x337/0x6f0
[   16.732944]  ret_from_fork+0x116/0x1d0
[   16.733120]  ret_from_fork_asm+0x1a/0x30
[   16.733331] 
[   16.733575] The buggy address belongs to the object at ffff8881022a34c0
[   16.733575]  which belongs to the cache kmalloc-16 of size 16
[   16.733960] The buggy address is located 8 bytes inside of
[   16.733960]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.734154] 
[   16.734210] The buggy address belongs to the physical page:
[   16.734410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.734919] flags: 0x200000000000000(node=0|zone=2)
[   16.735238] page_type: f5(slab)
[   16.735367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.735603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.735934] page dumped because: kasan: bad access detected
[   16.736276] 
[   16.736400] Memory state around the buggy address:
[   16.736803]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.737088]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.737216] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.737354]                                               ^
[   16.737622]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.737999]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.738311] ==================================================================
[   16.757005] ==================================================================
[   16.757405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758062] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.758198] 
[   16.758285] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.758364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.758378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.758402] Call Trace:
[   16.758423]  <TASK>
[   16.758444]  dump_stack_lvl+0x73/0xb0
[   16.758475]  print_report+0xd1/0x650
[   16.758500]  ? __virt_addr_valid+0x1db/0x2d0
[   16.758786]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.758841]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758869]  kasan_report+0x141/0x180
[   16.758897]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.758929]  kasan_check_range+0x10c/0x1c0
[   16.758953]  __kasan_check_read+0x15/0x20
[   16.758974]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.759001]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.759029]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.759052]  ? kasan_bitops_generic+0x92/0x1c0
[   16.759079]  kasan_bitops_generic+0x121/0x1c0
[   16.759103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.759127]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.759179]  kunit_try_run_case+0x1a5/0x480
[   16.759211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.759261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.759290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.759314]  ? __kthread_parkme+0x82/0x180
[   16.759345]  ? preempt_count_sub+0x50/0x80
[   16.759370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.759396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.759418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.759439]  kthread+0x337/0x6f0
[   16.759459]  ? trace_preempt_on+0x20/0xc0
[   16.759483]  ? __pfx_kthread+0x10/0x10
[   16.759503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.759639]  ? calculate_sigpending+0x7b/0xa0
[   16.759665]  ? __pfx_kthread+0x10/0x10
[   16.759688]  ret_from_fork+0x116/0x1d0
[   16.759707]  ? __pfx_kthread+0x10/0x10
[   16.759728]  ret_from_fork_asm+0x1a/0x30
[   16.759760]  </TASK>
[   16.759772] 
[   16.767214] Allocated by task 279:
[   16.767486]  kasan_save_stack+0x45/0x70
[   16.767752]  kasan_save_track+0x18/0x40
[   16.768251]  kasan_save_alloc_info+0x3b/0x50
[   16.768365]  __kasan_kmalloc+0xb7/0xc0
[   16.768456]  __kmalloc_cache_noprof+0x189/0x420
[   16.768751]  kasan_bitops_generic+0x92/0x1c0
[   16.769040]  kunit_try_run_case+0x1a5/0x480
[   16.769317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.769731]  kthread+0x337/0x6f0
[   16.769898]  ret_from_fork+0x116/0x1d0
[   16.770008]  ret_from_fork_asm+0x1a/0x30
[   16.770101] 
[   16.770154] The buggy address belongs to the object at ffff8881022a34c0
[   16.770154]  which belongs to the cache kmalloc-16 of size 16
[   16.770989] The buggy address is located 8 bytes inside of
[   16.770989]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.771193] 
[   16.771260] The buggy address belongs to the physical page:
[   16.771631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.772100] flags: 0x200000000000000(node=0|zone=2)
[   16.772217] page_type: f5(slab)
[   16.772320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.772617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.773055] page dumped because: kasan: bad access detected
[   16.773415] 
[   16.773585] Memory state around the buggy address:
[   16.773768]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.773897]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.774023] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.774303]                                               ^
[   16.774652]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775186]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775325] ==================================================================
[   16.681207] ==================================================================
[   16.681656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.682254] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.682765] 
[   16.683023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.683107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.683122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.683143] Call Trace:
[   16.683168]  <TASK>
[   16.683191]  dump_stack_lvl+0x73/0xb0
[   16.683240]  print_report+0xd1/0x650
[   16.683269]  ? __virt_addr_valid+0x1db/0x2d0
[   16.683294]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.683341]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683366]  kasan_report+0x141/0x180
[   16.683388]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683418]  kasan_check_range+0x10c/0x1c0
[   16.683440]  __kasan_check_write+0x18/0x20
[   16.683473]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   16.683574]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.683643]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.683668]  ? kasan_bitops_generic+0x92/0x1c0
[   16.683695]  kasan_bitops_generic+0x121/0x1c0
[   16.683718]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.683741]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.683768]  kunit_try_run_case+0x1a5/0x480
[   16.683797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.683843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.683865]  ? __kthread_parkme+0x82/0x180
[   16.683886]  ? preempt_count_sub+0x50/0x80
[   16.683909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.683952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.683974]  kthread+0x337/0x6f0
[   16.683992]  ? trace_preempt_on+0x20/0xc0
[   16.684016]  ? __pfx_kthread+0x10/0x10
[   16.684036]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.684056]  ? calculate_sigpending+0x7b/0xa0
[   16.684079]  ? __pfx_kthread+0x10/0x10
[   16.684100]  ret_from_fork+0x116/0x1d0
[   16.684118]  ? __pfx_kthread+0x10/0x10
[   16.684138]  ret_from_fork_asm+0x1a/0x30
[   16.684170]  </TASK>
[   16.684182] 
[   16.693963] Allocated by task 279:
[   16.694281]  kasan_save_stack+0x45/0x70
[   16.694576]  kasan_save_track+0x18/0x40
[   16.694876]  kasan_save_alloc_info+0x3b/0x50
[   16.695107]  __kasan_kmalloc+0xb7/0xc0
[   16.695379]  __kmalloc_cache_noprof+0x189/0x420
[   16.695714]  kasan_bitops_generic+0x92/0x1c0
[   16.695988]  kunit_try_run_case+0x1a5/0x480
[   16.696251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.696682]  kthread+0x337/0x6f0
[   16.696861]  ret_from_fork+0x116/0x1d0
[   16.696966]  ret_from_fork_asm+0x1a/0x30
[   16.697293] 
[   16.697408] The buggy address belongs to the object at ffff8881022a34c0
[   16.697408]  which belongs to the cache kmalloc-16 of size 16
[   16.698112] The buggy address is located 8 bytes inside of
[   16.698112]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.699019] 
[   16.699127] The buggy address belongs to the physical page:
[   16.699413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.699853] flags: 0x200000000000000(node=0|zone=2)
[   16.700692] page_type: f5(slab)
[   16.700830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.700982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.701113] page dumped because: kasan: bad access detected
[   16.701214] 
[   16.701279] Memory state around the buggy address:
[   16.701536]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.701737]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.701861] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.702162]                                               ^
[   16.702424]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.702674]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.703029] ==================================================================
[   16.776045] ==================================================================
[   16.776197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.776700] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.777027] 
[   16.777460] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.777533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.777547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.777570] Call Trace:
[   16.777593]  <TASK>
[   16.777712]  dump_stack_lvl+0x73/0xb0
[   16.777745]  print_report+0xd1/0x650
[   16.777787]  ? __virt_addr_valid+0x1db/0x2d0
[   16.777814]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.777862]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777887]  kasan_report+0x141/0x180
[   16.777925]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.777960]  __asan_report_load8_noabort+0x18/0x20
[   16.777981]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.778007]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.778034]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.778074]  ? kasan_bitops_generic+0x92/0x1c0
[   16.778102]  kasan_bitops_generic+0x121/0x1c0
[   16.778125]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.778148]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.778176]  kunit_try_run_case+0x1a5/0x480
[   16.778201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.778268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.778290]  ? __kthread_parkme+0x82/0x180
[   16.778311]  ? preempt_count_sub+0x50/0x80
[   16.778342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.778368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.778391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.778415]  kthread+0x337/0x6f0
[   16.778434]  ? trace_preempt_on+0x20/0xc0
[   16.778483]  ? __pfx_kthread+0x10/0x10
[   16.778504]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.778526]  ? calculate_sigpending+0x7b/0xa0
[   16.778620]  ? __pfx_kthread+0x10/0x10
[   16.778662]  ret_from_fork+0x116/0x1d0
[   16.778685]  ? __pfx_kthread+0x10/0x10
[   16.778705]  ret_from_fork_asm+0x1a/0x30
[   16.778736]  </TASK>
[   16.778748] 
[   16.785198] Allocated by task 279:
[   16.785309]  kasan_save_stack+0x45/0x70
[   16.785804]  kasan_save_track+0x18/0x40
[   16.786144]  kasan_save_alloc_info+0x3b/0x50
[   16.786427]  __kasan_kmalloc+0xb7/0xc0
[   16.786671]  __kmalloc_cache_noprof+0x189/0x420
[   16.786772]  kasan_bitops_generic+0x92/0x1c0
[   16.786870]  kunit_try_run_case+0x1a5/0x480
[   16.787102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.787570]  kthread+0x337/0x6f0
[   16.787805]  ret_from_fork+0x116/0x1d0
[   16.787968]  ret_from_fork_asm+0x1a/0x30
[   16.788061] 
[   16.788115] The buggy address belongs to the object at ffff8881022a34c0
[   16.788115]  which belongs to the cache kmalloc-16 of size 16
[   16.788752] The buggy address is located 8 bytes inside of
[   16.788752]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.788950] 
[   16.789005] The buggy address belongs to the physical page:
[   16.789108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.789259] flags: 0x200000000000000(node=0|zone=2)
[   16.789579] page_type: f5(slab)
[   16.789799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.790239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.790700] page dumped because: kasan: bad access detected
[   16.790859] 
[   16.790912] Memory state around the buggy address:
[   16.791008]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.791134]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.791697] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.792156]                                               ^
[   16.792572]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.792856]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793095] ==================================================================
[   16.650175] ==================================================================
[   16.650919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.651419] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.652060] 
[   16.652324] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.652424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.652449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.652700] Call Trace:
[   16.652744]  <TASK>
[   16.652808]  dump_stack_lvl+0x73/0xb0
[   16.652888]  print_report+0xd1/0x650
[   16.652929]  ? __virt_addr_valid+0x1db/0x2d0
[   16.652963]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.653034]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653060]  kasan_report+0x141/0x180
[   16.653082]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653113]  kasan_check_range+0x10c/0x1c0
[   16.653135]  __kasan_check_write+0x18/0x20
[   16.653155]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   16.653181]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.653206]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.653248]  ? kasan_bitops_generic+0x92/0x1c0
[   16.653278]  kasan_bitops_generic+0x121/0x1c0
[   16.653301]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.653324]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.653352]  kunit_try_run_case+0x1a5/0x480
[   16.653377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.653399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.653423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.653444]  ? __kthread_parkme+0x82/0x180
[   16.653517]  ? preempt_count_sub+0x50/0x80
[   16.653563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.653599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.653637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.653673]  kthread+0x337/0x6f0
[   16.653704]  ? trace_preempt_on+0x20/0xc0
[   16.653745]  ? __pfx_kthread+0x10/0x10
[   16.653779]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.653831]  ? calculate_sigpending+0x7b/0xa0
[   16.653857]  ? __pfx_kthread+0x10/0x10
[   16.653878]  ret_from_fork+0x116/0x1d0
[   16.653898]  ? __pfx_kthread+0x10/0x10
[   16.653918]  ret_from_fork_asm+0x1a/0x30
[   16.653950]  </TASK>
[   16.653963] 
[   16.667248] Allocated by task 279:
[   16.667823]  kasan_save_stack+0x45/0x70
[   16.668158]  kasan_save_track+0x18/0x40
[   16.668653]  kasan_save_alloc_info+0x3b/0x50
[   16.669029]  __kasan_kmalloc+0xb7/0xc0
[   16.669255]  __kmalloc_cache_noprof+0x189/0x420
[   16.669923]  kasan_bitops_generic+0x92/0x1c0
[   16.670288]  kunit_try_run_case+0x1a5/0x480
[   16.670835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.671239]  kthread+0x337/0x6f0
[   16.671688]  ret_from_fork+0x116/0x1d0
[   16.671857]  ret_from_fork_asm+0x1a/0x30
[   16.672169] 
[   16.672338] The buggy address belongs to the object at ffff8881022a34c0
[   16.672338]  which belongs to the cache kmalloc-16 of size 16
[   16.673017] The buggy address is located 8 bytes inside of
[   16.673017]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.673538] 
[   16.673732] The buggy address belongs to the physical page:
[   16.674743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.675105] flags: 0x200000000000000(node=0|zone=2)
[   16.675736] page_type: f5(slab)
[   16.675975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.676373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.676876] page dumped because: kasan: bad access detected
[   16.677287] 
[   16.677418] Memory state around the buggy address:
[   16.678033]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.678306]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.678754] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.679026]                                               ^
[   16.679986]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.680266]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.680489] ==================================================================
[   16.738956] ==================================================================
[   16.739262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.739627] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.739946] 
[   16.740098] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.740151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.740164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.740185] Call Trace:
[   16.740207]  <TASK>
[   16.740237]  dump_stack_lvl+0x73/0xb0
[   16.740269]  print_report+0xd1/0x650
[   16.740294]  ? __virt_addr_valid+0x1db/0x2d0
[   16.740318]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.740391]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740417]  kasan_report+0x141/0x180
[   16.740438]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740467]  kasan_check_range+0x10c/0x1c0
[   16.740489]  __kasan_check_write+0x18/0x20
[   16.740508]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.740533]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.740559]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.740579]  ? kasan_bitops_generic+0x92/0x1c0
[   16.740605]  kasan_bitops_generic+0x121/0x1c0
[   16.740628]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.740650]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.740677]  kunit_try_run_case+0x1a5/0x480
[   16.740702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.740725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.740747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.741022]  ? __kthread_parkme+0x82/0x180
[   16.741055]  ? preempt_count_sub+0x50/0x80
[   16.741081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.741105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.741128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.741149]  kthread+0x337/0x6f0
[   16.741167]  ? trace_preempt_on+0x20/0xc0
[   16.741193]  ? __pfx_kthread+0x10/0x10
[   16.741259]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.741281]  ? calculate_sigpending+0x7b/0xa0
[   16.741305]  ? __pfx_kthread+0x10/0x10
[   16.741326]  ret_from_fork+0x116/0x1d0
[   16.741344]  ? __pfx_kthread+0x10/0x10
[   16.741363]  ret_from_fork_asm+0x1a/0x30
[   16.741395]  </TASK>
[   16.741408] 
[   16.748891] Allocated by task 279:
[   16.749008]  kasan_save_stack+0x45/0x70
[   16.749294]  kasan_save_track+0x18/0x40
[   16.749548]  kasan_save_alloc_info+0x3b/0x50
[   16.749646]  __kasan_kmalloc+0xb7/0xc0
[   16.749732]  __kmalloc_cache_noprof+0x189/0x420
[   16.749852]  kasan_bitops_generic+0x92/0x1c0
[   16.750112]  kunit_try_run_case+0x1a5/0x480
[   16.750528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.750819]  kthread+0x337/0x6f0
[   16.750908]  ret_from_fork+0x116/0x1d0
[   16.751131]  ret_from_fork_asm+0x1a/0x30
[   16.751499] 
[   16.751555] The buggy address belongs to the object at ffff8881022a34c0
[   16.751555]  which belongs to the cache kmalloc-16 of size 16
[   16.751957] The buggy address is located 8 bytes inside of
[   16.751957]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.752155] 
[   16.752209] The buggy address belongs to the physical page:
[   16.752324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.752809] flags: 0x200000000000000(node=0|zone=2)
[   16.753156] page_type: f5(slab)
[   16.753395] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.753591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.753720] page dumped because: kasan: bad access detected
[   16.753818] 
[   16.753866] Memory state around the buggy address:
[   16.753994]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.754846]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.755292] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.755684]                                               ^
[   16.755911]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.756210]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.756429] ==================================================================
[   16.703445] ==================================================================
[   16.703857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.704296] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.704616] 
[   16.704740] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.704792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.704804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.704878] Call Trace:
[   16.704901]  <TASK>
[   16.704923]  dump_stack_lvl+0x73/0xb0
[   16.704951]  print_report+0xd1/0x650
[   16.704975]  ? __virt_addr_valid+0x1db/0x2d0
[   16.704997]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.705044]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705069]  kasan_report+0x141/0x180
[   16.705091]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705121]  kasan_check_range+0x10c/0x1c0
[   16.705144]  __kasan_check_write+0x18/0x20
[   16.705164]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   16.705190]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.705216]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.705250]  ? kasan_bitops_generic+0x92/0x1c0
[   16.705277]  kasan_bitops_generic+0x121/0x1c0
[   16.705300]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.705323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.705351]  kunit_try_run_case+0x1a5/0x480
[   16.705377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.705399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.705422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.705443]  ? __kthread_parkme+0x82/0x180
[   16.705464]  ? preempt_count_sub+0x50/0x80
[   16.705498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.705523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.705546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.705585]  kthread+0x337/0x6f0
[   16.705604]  ? trace_preempt_on+0x20/0xc0
[   16.705658]  ? __pfx_kthread+0x10/0x10
[   16.705679]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.705701]  ? calculate_sigpending+0x7b/0xa0
[   16.705724]  ? __pfx_kthread+0x10/0x10
[   16.705745]  ret_from_fork+0x116/0x1d0
[   16.705764]  ? __pfx_kthread+0x10/0x10
[   16.705785]  ret_from_fork_asm+0x1a/0x30
[   16.705816]  </TASK>
[   16.705828] 
[   16.712726] Allocated by task 279:
[   16.712929]  kasan_save_stack+0x45/0x70
[   16.713129]  kasan_save_track+0x18/0x40
[   16.713299]  kasan_save_alloc_info+0x3b/0x50
[   16.713395]  __kasan_kmalloc+0xb7/0xc0
[   16.713547]  __kmalloc_cache_noprof+0x189/0x420
[   16.713708]  kasan_bitops_generic+0x92/0x1c0
[   16.713953]  kunit_try_run_case+0x1a5/0x480
[   16.714181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.714748]  kthread+0x337/0x6f0
[   16.714978]  ret_from_fork+0x116/0x1d0
[   16.715174]  ret_from_fork_asm+0x1a/0x30
[   16.715279] 
[   16.715334] The buggy address belongs to the object at ffff8881022a34c0
[   16.715334]  which belongs to the cache kmalloc-16 of size 16
[   16.715953] The buggy address is located 8 bytes inside of
[   16.715953]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.716147] 
[   16.716200] The buggy address belongs to the physical page:
[   16.716313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.716540] flags: 0x200000000000000(node=0|zone=2)
[   16.716766] page_type: f5(slab)
[   16.716971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.717279] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.717702] page dumped because: kasan: bad access detected
[   16.718011] 
[   16.718144] Memory state around the buggy address:
[   16.718393]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.718892]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.719174] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.719386]                                               ^
[   16.719668]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.719925]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.720107] ==================================================================
[   16.585357] ==================================================================
[   16.586180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.586648] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.586895] 
[   16.587039] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.587759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.587785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.587836] Call Trace:
[   16.587878]  <TASK>
[   16.587915]  dump_stack_lvl+0x73/0xb0
[   16.587973]  print_report+0xd1/0x650
[   16.588020]  ? __virt_addr_valid+0x1db/0x2d0
[   16.588065]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.588186]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588243]  kasan_report+0x141/0x180
[   16.588272]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588303]  kasan_check_range+0x10c/0x1c0
[   16.588326]  __kasan_check_write+0x18/0x20
[   16.588345]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   16.588383]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.588430]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.588468]  ? kasan_bitops_generic+0x92/0x1c0
[   16.588513]  kasan_bitops_generic+0x121/0x1c0
[   16.588652]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.588694]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.588747]  kunit_try_run_case+0x1a5/0x480
[   16.588796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.588830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.589045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.589085]  ? __kthread_parkme+0x82/0x180
[   16.589125]  ? preempt_count_sub+0x50/0x80
[   16.589151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.589175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.589199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.589243]  kthread+0x337/0x6f0
[   16.589268]  ? trace_preempt_on+0x20/0xc0
[   16.589293]  ? __pfx_kthread+0x10/0x10
[   16.589314]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.589334]  ? calculate_sigpending+0x7b/0xa0
[   16.589360]  ? __pfx_kthread+0x10/0x10
[   16.589380]  ret_from_fork+0x116/0x1d0
[   16.589399]  ? __pfx_kthread+0x10/0x10
[   16.589419]  ret_from_fork_asm+0x1a/0x30
[   16.589448]  </TASK>
[   16.589478] 
[   16.603944] Allocated by task 279:
[   16.604455]  kasan_save_stack+0x45/0x70
[   16.605281]  kasan_save_track+0x18/0x40
[   16.605496]  kasan_save_alloc_info+0x3b/0x50
[   16.605966]  __kasan_kmalloc+0xb7/0xc0
[   16.606430]  __kmalloc_cache_noprof+0x189/0x420
[   16.606734]  kasan_bitops_generic+0x92/0x1c0
[   16.607055]  kunit_try_run_case+0x1a5/0x480
[   16.607251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.607442]  kthread+0x337/0x6f0
[   16.607746]  ret_from_fork+0x116/0x1d0
[   16.608042]  ret_from_fork_asm+0x1a/0x30
[   16.608349] 
[   16.608520] The buggy address belongs to the object at ffff8881022a34c0
[   16.608520]  which belongs to the cache kmalloc-16 of size 16
[   16.609231] The buggy address is located 8 bytes inside of
[   16.609231]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.609604] 
[   16.609792] The buggy address belongs to the physical page:
[   16.610234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.611006] flags: 0x200000000000000(node=0|zone=2)
[   16.611383] page_type: f5(slab)
[   16.611695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.611961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.612463] page dumped because: kasan: bad access detected
[   16.612860] 
[   16.613047] Memory state around the buggy address:
[   16.613517]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.613714]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.614265] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.614556]                                               ^
[   16.614766]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615265]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.615922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
[   16.468403] ==================================================================
[   16.469747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.470069] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.470316] 
[   16.470459] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.471134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.471454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.471506] Call Trace:
[   16.471551]  <TASK>
[   16.471593]  dump_stack_lvl+0x73/0xb0
[   16.471660]  print_report+0xd1/0x650
[   16.471699]  ? __virt_addr_valid+0x1db/0x2d0
[   16.471736]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.471810]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471835]  kasan_report+0x141/0x180
[   16.471857]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471886]  kasan_check_range+0x10c/0x1c0
[   16.471909]  __kasan_check_write+0x18/0x20
[   16.471928]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.471951]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.471976]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.472000]  ? kasan_bitops_generic+0x92/0x1c0
[   16.472026]  kasan_bitops_generic+0x116/0x1c0
[   16.472049]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.472071]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.472098]  kunit_try_run_case+0x1a5/0x480
[   16.472123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.472144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.472167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.472188]  ? __kthread_parkme+0x82/0x180
[   16.472210]  ? preempt_count_sub+0x50/0x80
[   16.472260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.472284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.472306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.472327]  kthread+0x337/0x6f0
[   16.472347]  ? trace_preempt_on+0x20/0xc0
[   16.472369]  ? __pfx_kthread+0x10/0x10
[   16.472389]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.472408]  ? calculate_sigpending+0x7b/0xa0
[   16.472432]  ? __pfx_kthread+0x10/0x10
[   16.472454]  ret_from_fork+0x116/0x1d0
[   16.472487]  ? __pfx_kthread+0x10/0x10
[   16.472519]  ret_from_fork_asm+0x1a/0x30
[   16.472602]  </TASK>
[   16.472617] 
[   16.483856] Allocated by task 279:
[   16.484199]  kasan_save_stack+0x45/0x70
[   16.484462]  kasan_save_track+0x18/0x40
[   16.484683]  kasan_save_alloc_info+0x3b/0x50
[   16.484998]  __kasan_kmalloc+0xb7/0xc0
[   16.485389]  __kmalloc_cache_noprof+0x189/0x420
[   16.485701]  kasan_bitops_generic+0x92/0x1c0
[   16.486006]  kunit_try_run_case+0x1a5/0x480
[   16.486359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.487160]  kthread+0x337/0x6f0
[   16.487595]  ret_from_fork+0x116/0x1d0
[   16.487907]  ret_from_fork_asm+0x1a/0x30
[   16.488205] 
[   16.488373] The buggy address belongs to the object at ffff8881022a34c0
[   16.488373]  which belongs to the cache kmalloc-16 of size 16
[   16.489083] The buggy address is located 8 bytes inside of
[   16.489083]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.489746] 
[   16.489913] The buggy address belongs to the physical page:
[   16.490118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.491061] flags: 0x200000000000000(node=0|zone=2)
[   16.491429] page_type: f5(slab)
[   16.491855] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.492287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.492781] page dumped because: kasan: bad access detected
[   16.493143] 
[   16.493306] Memory state around the buggy address:
[   16.495901]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.496252]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.497076] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.497389]                                               ^
[   16.497597]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498018]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498308] ==================================================================
[   16.439159] ==================================================================
[   16.439529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.439864] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.440776] 
[   16.440977] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.441038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.441051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.441072] Call Trace:
[   16.441097]  <TASK>
[   16.441119]  dump_stack_lvl+0x73/0xb0
[   16.441154]  print_report+0xd1/0x650
[   16.441178]  ? __virt_addr_valid+0x1db/0x2d0
[   16.441202]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.441271]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441295]  kasan_report+0x141/0x180
[   16.441316]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441344]  kasan_check_range+0x10c/0x1c0
[   16.441367]  __kasan_check_write+0x18/0x20
[   16.441385]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.441409]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.441433]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.441454]  ? kasan_bitops_generic+0x92/0x1c0
[   16.441480]  kasan_bitops_generic+0x116/0x1c0
[   16.441502]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.441524]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.441551]  kunit_try_run_case+0x1a5/0x480
[   16.441575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.441596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.441619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.441640]  ? __kthread_parkme+0x82/0x180
[   16.441660]  ? preempt_count_sub+0x50/0x80
[   16.441683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.441706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.441727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.441748]  kthread+0x337/0x6f0
[   16.441767]  ? trace_preempt_on+0x20/0xc0
[   16.441789]  ? __pfx_kthread+0x10/0x10
[   16.441809]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.441828]  ? calculate_sigpending+0x7b/0xa0
[   16.441851]  ? __pfx_kthread+0x10/0x10
[   16.441870]  ret_from_fork+0x116/0x1d0
[   16.441889]  ? __pfx_kthread+0x10/0x10
[   16.441907]  ret_from_fork_asm+0x1a/0x30
[   16.441938]  </TASK>
[   16.441949] 
[   16.454077] Allocated by task 279:
[   16.454242]  kasan_save_stack+0x45/0x70
[   16.454878]  kasan_save_track+0x18/0x40
[   16.455283]  kasan_save_alloc_info+0x3b/0x50
[   16.455666]  __kasan_kmalloc+0xb7/0xc0
[   16.455845]  __kmalloc_cache_noprof+0x189/0x420
[   16.456074]  kasan_bitops_generic+0x92/0x1c0
[   16.456656]  kunit_try_run_case+0x1a5/0x480
[   16.457016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.457437]  kthread+0x337/0x6f0
[   16.457955]  ret_from_fork+0x116/0x1d0
[   16.458266]  ret_from_fork_asm+0x1a/0x30
[   16.459036] 
[   16.459275] The buggy address belongs to the object at ffff8881022a34c0
[   16.459275]  which belongs to the cache kmalloc-16 of size 16
[   16.460181] The buggy address is located 8 bytes inside of
[   16.460181]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.460926] 
[   16.461093] The buggy address belongs to the physical page:
[   16.461685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.462262] flags: 0x200000000000000(node=0|zone=2)
[   16.462940] page_type: f5(slab)
[   16.463183] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.463517] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.463911] page dumped because: kasan: bad access detected
[   16.464248] 
[   16.464381] Memory state around the buggy address:
[   16.464635]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.465049]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.465456] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.465862]                                               ^
[   16.466074]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.466317]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.467302] ==================================================================
[   16.499144] ==================================================================
[   16.500078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.500687] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.501188] 
[   16.501395] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.501643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.501673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.501713] Call Trace:
[   16.501751]  <TASK>
[   16.501795]  dump_stack_lvl+0x73/0xb0
[   16.501860]  print_report+0xd1/0x650
[   16.501908]  ? __virt_addr_valid+0x1db/0x2d0
[   16.501952]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.501994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.502036]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502087]  kasan_report+0x141/0x180
[   16.502133]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502188]  kasan_check_range+0x10c/0x1c0
[   16.502247]  __kasan_check_write+0x18/0x20
[   16.502290]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.502349]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.502401]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.502430]  ? kasan_bitops_generic+0x92/0x1c0
[   16.502477]  kasan_bitops_generic+0x116/0x1c0
[   16.502534]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.502570]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.502630]  kunit_try_run_case+0x1a5/0x480
[   16.502661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.502683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.502706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.502728]  ? __kthread_parkme+0x82/0x180
[   16.502750]  ? preempt_count_sub+0x50/0x80
[   16.502774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.502795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.502816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.502837]  kthread+0x337/0x6f0
[   16.502855]  ? trace_preempt_on+0x20/0xc0
[   16.502878]  ? __pfx_kthread+0x10/0x10
[   16.502898]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.502917]  ? calculate_sigpending+0x7b/0xa0
[   16.502940]  ? __pfx_kthread+0x10/0x10
[   16.502961]  ret_from_fork+0x116/0x1d0
[   16.502979]  ? __pfx_kthread+0x10/0x10
[   16.502999]  ret_from_fork_asm+0x1a/0x30
[   16.503031]  </TASK>
[   16.503043] 
[   16.512982] Allocated by task 279:
[   16.513145]  kasan_save_stack+0x45/0x70
[   16.513565]  kasan_save_track+0x18/0x40
[   16.513729]  kasan_save_alloc_info+0x3b/0x50
[   16.513911]  __kasan_kmalloc+0xb7/0xc0
[   16.514078]  __kmalloc_cache_noprof+0x189/0x420
[   16.514526]  kasan_bitops_generic+0x92/0x1c0
[   16.514887]  kunit_try_run_case+0x1a5/0x480
[   16.515231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.515727]  kthread+0x337/0x6f0
[   16.515928]  ret_from_fork+0x116/0x1d0
[   16.516100]  ret_from_fork_asm+0x1a/0x30
[   16.516280] 
[   16.516386] The buggy address belongs to the object at ffff8881022a34c0
[   16.516386]  which belongs to the cache kmalloc-16 of size 16
[   16.517688] The buggy address is located 8 bytes inside of
[   16.517688]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.519240] 
[   16.519476] The buggy address belongs to the physical page:
[   16.519966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.520281] flags: 0x200000000000000(node=0|zone=2)
[   16.520792] page_type: f5(slab)
[   16.521143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.521813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.522108] page dumped because: kasan: bad access detected
[   16.522321] 
[   16.522434] Memory state around the buggy address:
[   16.522636]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.522881]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.523121] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.523357]                                               ^
[   16.523555]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523804]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.524438] ==================================================================
[   16.555743] ==================================================================
[   16.556286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.556585] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.557074] 
[   16.557446] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.557545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.557571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.557612] Call Trace:
[   16.557655]  <TASK>
[   16.557695]  dump_stack_lvl+0x73/0xb0
[   16.557748]  print_report+0xd1/0x650
[   16.557790]  ? __virt_addr_valid+0x1db/0x2d0
[   16.557833]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.558394]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558449]  kasan_report+0x141/0x180
[   16.558558]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558683]  kasan_check_range+0x10c/0x1c0
[   16.558737]  __kasan_check_write+0x18/0x20
[   16.558774]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.558832]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.558898]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.558938]  ? kasan_bitops_generic+0x92/0x1c0
[   16.558971]  kasan_bitops_generic+0x116/0x1c0
[   16.558995]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.559018]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.559045]  kunit_try_run_case+0x1a5/0x480
[   16.559072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.559105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.559142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.559184]  ? __kthread_parkme+0x82/0x180
[   16.559233]  ? preempt_count_sub+0x50/0x80
[   16.559287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.559347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.559389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.559433]  kthread+0x337/0x6f0
[   16.559470]  ? trace_preempt_on+0x20/0xc0
[   16.559521]  ? __pfx_kthread+0x10/0x10
[   16.559564]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.559740]  ? calculate_sigpending+0x7b/0xa0
[   16.559767]  ? __pfx_kthread+0x10/0x10
[   16.559791]  ret_from_fork+0x116/0x1d0
[   16.559812]  ? __pfx_kthread+0x10/0x10
[   16.559831]  ret_from_fork_asm+0x1a/0x30
[   16.559864]  </TASK>
[   16.559877] 
[   16.571362] Allocated by task 279:
[   16.571641]  kasan_save_stack+0x45/0x70
[   16.572048]  kasan_save_track+0x18/0x40
[   16.572366]  kasan_save_alloc_info+0x3b/0x50
[   16.572583]  __kasan_kmalloc+0xb7/0xc0
[   16.572965]  __kmalloc_cache_noprof+0x189/0x420
[   16.573172]  kasan_bitops_generic+0x92/0x1c0
[   16.573365]  kunit_try_run_case+0x1a5/0x480
[   16.573547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.573815]  kthread+0x337/0x6f0
[   16.574280]  ret_from_fork+0x116/0x1d0
[   16.574700]  ret_from_fork_asm+0x1a/0x30
[   16.575026] 
[   16.575182] The buggy address belongs to the object at ffff8881022a34c0
[   16.575182]  which belongs to the cache kmalloc-16 of size 16
[   16.575904] The buggy address is located 8 bytes inside of
[   16.575904]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.577144] 
[   16.577337] The buggy address belongs to the physical page:
[   16.577805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.578173] flags: 0x200000000000000(node=0|zone=2)
[   16.578406] page_type: f5(slab)
[   16.578579] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.579386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.580160] page dumped because: kasan: bad access detected
[   16.580643] 
[   16.581084] Memory state around the buggy address:
[   16.581301]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.581543]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.582022] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.582504]                                               ^
[   16.583069]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.583357]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.584066] ==================================================================
[   16.380156] ==================================================================
[   16.380600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.380860] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.381162] 
[   16.381314] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.381410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.381436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.381466] Call Trace:
[   16.381490]  <TASK>
[   16.381513]  dump_stack_lvl+0x73/0xb0
[   16.381545]  print_report+0xd1/0x650
[   16.381570]  ? __virt_addr_valid+0x1db/0x2d0
[   16.381599]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.381661]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381685]  kasan_report+0x141/0x180
[   16.381706]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381735]  kasan_check_range+0x10c/0x1c0
[   16.381757]  __kasan_check_write+0x18/0x20
[   16.381776]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.381799]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.381824]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.381845]  ? kasan_bitops_generic+0x92/0x1c0
[   16.381872]  kasan_bitops_generic+0x116/0x1c0
[   16.381894]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.381916]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.381942]  kunit_try_run_case+0x1a5/0x480
[   16.381968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.381988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.382011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.382032]  ? __kthread_parkme+0x82/0x180
[   16.382053]  ? preempt_count_sub+0x50/0x80
[   16.382077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.382100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.382121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.382143]  kthread+0x337/0x6f0
[   16.382162]  ? trace_preempt_on+0x20/0xc0
[   16.382184]  ? __pfx_kthread+0x10/0x10
[   16.382204]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.382364]  ? calculate_sigpending+0x7b/0xa0
[   16.382419]  ? __pfx_kthread+0x10/0x10
[   16.382464]  ret_from_fork+0x116/0x1d0
[   16.382500]  ? __pfx_kthread+0x10/0x10
[   16.382534]  ret_from_fork_asm+0x1a/0x30
[   16.382585]  </TASK>
[   16.382606] 
[   16.394825] Allocated by task 279:
[   16.395140]  kasan_save_stack+0x45/0x70
[   16.395672]  kasan_save_track+0x18/0x40
[   16.396018]  kasan_save_alloc_info+0x3b/0x50
[   16.396344]  __kasan_kmalloc+0xb7/0xc0
[   16.396805]  __kmalloc_cache_noprof+0x189/0x420
[   16.397174]  kasan_bitops_generic+0x92/0x1c0
[   16.398016]  kunit_try_run_case+0x1a5/0x480
[   16.398445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398900]  kthread+0x337/0x6f0
[   16.399078]  ret_from_fork+0x116/0x1d0
[   16.399245]  ret_from_fork_asm+0x1a/0x30
[   16.399738] 
[   16.399914] The buggy address belongs to the object at ffff8881022a34c0
[   16.399914]  which belongs to the cache kmalloc-16 of size 16
[   16.400866] The buggy address is located 8 bytes inside of
[   16.400866]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.401441] 
[   16.402081] The buggy address belongs to the physical page:
[   16.402339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.403031] flags: 0x200000000000000(node=0|zone=2)
[   16.403614] page_type: f5(slab)
[   16.403912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.404182] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.404715] page dumped because: kasan: bad access detected
[   16.405031] 
[   16.405375] Memory state around the buggy address:
[   16.406038]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.406389]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.406991] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.407419]                                               ^
[   16.407986]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408401]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.408923] ==================================================================
[   16.350801] ==================================================================
[   16.351276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.352061] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.352958] 
[   16.353353] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.353432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.353447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.353481] Call Trace:
[   16.353505]  <TASK>
[   16.353538]  dump_stack_lvl+0x73/0xb0
[   16.353647]  print_report+0xd1/0x650
[   16.353701]  ? __virt_addr_valid+0x1db/0x2d0
[   16.353751]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.353830]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353873]  kasan_report+0x141/0x180
[   16.353915]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.353974]  kasan_check_range+0x10c/0x1c0
[   16.354016]  __kasan_check_write+0x18/0x20
[   16.354047]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.354073]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.354099]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.354122]  ? kasan_bitops_generic+0x92/0x1c0
[   16.354150]  kasan_bitops_generic+0x116/0x1c0
[   16.354173]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.354196]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.354246]  kunit_try_run_case+0x1a5/0x480
[   16.354277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.354298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.354324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.354358]  ? __kthread_parkme+0x82/0x180
[   16.354382]  ? preempt_count_sub+0x50/0x80
[   16.354412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.354437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.354528]  kthread+0x337/0x6f0
[   16.354560]  ? trace_preempt_on+0x20/0xc0
[   16.354599]  ? __pfx_kthread+0x10/0x10
[   16.354644]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.354667]  ? calculate_sigpending+0x7b/0xa0
[   16.354693]  ? __pfx_kthread+0x10/0x10
[   16.354714]  ret_from_fork+0x116/0x1d0
[   16.354734]  ? __pfx_kthread+0x10/0x10
[   16.354754]  ret_from_fork_asm+0x1a/0x30
[   16.354788]  </TASK>
[   16.354801] 
[   16.366362] Allocated by task 279:
[   16.366754]  kasan_save_stack+0x45/0x70
[   16.367026]  kasan_save_track+0x18/0x40
[   16.367269]  kasan_save_alloc_info+0x3b/0x50
[   16.367720]  __kasan_kmalloc+0xb7/0xc0
[   16.368263]  __kmalloc_cache_noprof+0x189/0x420
[   16.368666]  kasan_bitops_generic+0x92/0x1c0
[   16.369041]  kunit_try_run_case+0x1a5/0x480
[   16.369518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.369756]  kthread+0x337/0x6f0
[   16.369914]  ret_from_fork+0x116/0x1d0
[   16.370082]  ret_from_fork_asm+0x1a/0x30
[   16.370269] 
[   16.370416] The buggy address belongs to the object at ffff8881022a34c0
[   16.370416]  which belongs to the cache kmalloc-16 of size 16
[   16.371019] The buggy address is located 8 bytes inside of
[   16.371019]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.371449] 
[   16.371601] The buggy address belongs to the physical page:
[   16.371991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.372734] flags: 0x200000000000000(node=0|zone=2)
[   16.373127] page_type: f5(slab)
[   16.373308] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.373777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.374026] page dumped because: kasan: bad access detected
[   16.374228] 
[   16.374379] Memory state around the buggy address:
[   16.374719]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.375202]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.375920] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.376318]                                               ^
[   16.377084]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377802]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378351] ==================================================================
[   16.409808] ==================================================================
[   16.410923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.411387] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.411778] 
[   16.412103] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.412204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.412240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.412298] Call Trace:
[   16.412340]  <TASK>
[   16.412387]  dump_stack_lvl+0x73/0xb0
[   16.412449]  print_report+0xd1/0x650
[   16.412523]  ? __virt_addr_valid+0x1db/0x2d0
[   16.412570]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.412662]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412714]  kasan_report+0x141/0x180
[   16.412752]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412810]  kasan_check_range+0x10c/0x1c0
[   16.412845]  __kasan_check_write+0x18/0x20
[   16.412895]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.412930]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.412955]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.412978]  ? kasan_bitops_generic+0x92/0x1c0
[   16.413004]  kasan_bitops_generic+0x116/0x1c0
[   16.413026]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.413048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.413075]  kunit_try_run_case+0x1a5/0x480
[   16.413101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.413146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.413168]  ? __kthread_parkme+0x82/0x180
[   16.413190]  ? preempt_count_sub+0x50/0x80
[   16.413215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.413285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.413307]  kthread+0x337/0x6f0
[   16.413326]  ? trace_preempt_on+0x20/0xc0
[   16.413351]  ? __pfx_kthread+0x10/0x10
[   16.413371]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.413392]  ? calculate_sigpending+0x7b/0xa0
[   16.413416]  ? __pfx_kthread+0x10/0x10
[   16.413437]  ret_from_fork+0x116/0x1d0
[   16.413467]  ? __pfx_kthread+0x10/0x10
[   16.413517]  ret_from_fork_asm+0x1a/0x30
[   16.413568]  </TASK>
[   16.413588] 
[   16.423883] Allocated by task 279:
[   16.423995]  kasan_save_stack+0x45/0x70
[   16.424105]  kasan_save_track+0x18/0x40
[   16.424192]  kasan_save_alloc_info+0x3b/0x50
[   16.425099]  __kasan_kmalloc+0xb7/0xc0
[   16.426048]  __kmalloc_cache_noprof+0x189/0x420
[   16.426477]  kasan_bitops_generic+0x92/0x1c0
[   16.426826]  kunit_try_run_case+0x1a5/0x480
[   16.427133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.427524]  kthread+0x337/0x6f0
[   16.427793]  ret_from_fork+0x116/0x1d0
[   16.428081]  ret_from_fork_asm+0x1a/0x30
[   16.428706] 
[   16.428877] The buggy address belongs to the object at ffff8881022a34c0
[   16.428877]  which belongs to the cache kmalloc-16 of size 16
[   16.430082] The buggy address is located 8 bytes inside of
[   16.430082]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.430967] 
[   16.431138] The buggy address belongs to the physical page:
[   16.431697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.431986] flags: 0x200000000000000(node=0|zone=2)
[   16.432186] page_type: f5(slab)
[   16.432645] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.433154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.434092] page dumped because: kasan: bad access detected
[   16.434670] 
[   16.434833] Memory state around the buggy address:
[   16.435173]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.435722]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.436202] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.436744]                                               ^
[   16.436978]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.437908]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.438283] ==================================================================
[   16.525908] ==================================================================
[   16.526537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.527316] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279
[   16.528090] 
[   16.528347] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.528451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.528845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.528926] Call Trace:
[   16.528973]  <TASK>
[   16.529023]  dump_stack_lvl+0x73/0xb0
[   16.529090]  print_report+0xd1/0x650
[   16.529136]  ? __virt_addr_valid+0x1db/0x2d0
[   16.529177]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.529273]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529317]  kasan_report+0x141/0x180
[   16.529360]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529419]  kasan_check_range+0x10c/0x1c0
[   16.529465]  __kasan_check_write+0x18/0x20
[   16.529515]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.529563]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.529615]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.529656]  ? kasan_bitops_generic+0x92/0x1c0
[   16.529861]  kasan_bitops_generic+0x116/0x1c0
[   16.529919]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.529980]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.530027]  kunit_try_run_case+0x1a5/0x480
[   16.530075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.530167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.530237]  ? __kthread_parkme+0x82/0x180
[   16.530278]  ? preempt_count_sub+0x50/0x80
[   16.530321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.530429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.530598]  kthread+0x337/0x6f0
[   16.530657]  ? trace_preempt_on+0x20/0xc0
[   16.530714]  ? __pfx_kthread+0x10/0x10
[   16.530757]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.530815]  ? calculate_sigpending+0x7b/0xa0
[   16.530857]  ? __pfx_kthread+0x10/0x10
[   16.530894]  ret_from_fork+0x116/0x1d0
[   16.530919]  ? __pfx_kthread+0x10/0x10
[   16.530940]  ret_from_fork_asm+0x1a/0x30
[   16.530972]  </TASK>
[   16.530986] 
[   16.542000] Allocated by task 279:
[   16.542316]  kasan_save_stack+0x45/0x70
[   16.542798]  kasan_save_track+0x18/0x40
[   16.543002]  kasan_save_alloc_info+0x3b/0x50
[   16.543327]  __kasan_kmalloc+0xb7/0xc0
[   16.543791]  __kmalloc_cache_noprof+0x189/0x420
[   16.544065]  kasan_bitops_generic+0x92/0x1c0
[   16.544364]  kunit_try_run_case+0x1a5/0x480
[   16.544711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.545041]  kthread+0x337/0x6f0
[   16.545347]  ret_from_fork+0x116/0x1d0
[   16.545546]  ret_from_fork_asm+0x1a/0x30
[   16.546260] 
[   16.546421] The buggy address belongs to the object at ffff8881022a34c0
[   16.546421]  which belongs to the cache kmalloc-16 of size 16
[   16.546879] The buggy address is located 8 bytes inside of
[   16.546879]  allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9)
[   16.547892] 
[   16.548073] The buggy address belongs to the physical page:
[   16.548570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   16.548959] flags: 0x200000000000000(node=0|zone=2)
[   16.549307] page_type: f5(slab)
[   16.550131] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.550592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.550858] page dumped because: kasan: bad access detected
[   16.551056] 
[   16.551159] Memory state around the buggy address:
[   16.551359]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.551605]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.552240] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.552707]                                               ^
[   16.553166]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553874]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.554667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
[   16.311942] ==================================================================
[   16.312369] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   16.313156] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277
[   16.313640] 
[   16.313907] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.314020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.314045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.314085] Call Trace:
[   16.314152]  <TASK>
[   16.314190]  dump_stack_lvl+0x73/0xb0
[   16.314273]  print_report+0xd1/0x650
[   16.314321]  ? __virt_addr_valid+0x1db/0x2d0
[   16.314401]  ? strnlen+0x73/0x80
[   16.314490]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.314542]  ? strnlen+0x73/0x80
[   16.314612]  kasan_report+0x141/0x180
[   16.314669]  ? strnlen+0x73/0x80
[   16.314705]  __asan_report_load1_noabort+0x18/0x20
[   16.314728]  strnlen+0x73/0x80
[   16.314751]  kasan_strings+0x615/0xe80
[   16.314771]  ? trace_hardirqs_on+0x37/0xe0
[   16.314797]  ? __pfx_kasan_strings+0x10/0x10
[   16.314818]  ? finish_task_switch.isra.0+0x153/0x700
[   16.314841]  ? __switch_to+0x47/0xf50
[   16.314867]  ? __schedule+0x10cc/0x2b60
[   16.314890]  ? __pfx_read_tsc+0x10/0x10
[   16.314911]  ? ktime_get_ts64+0x86/0x230
[   16.314936]  kunit_try_run_case+0x1a5/0x480
[   16.314961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.314983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.315006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.315028]  ? __kthread_parkme+0x82/0x180
[   16.315049]  ? preempt_count_sub+0x50/0x80
[   16.315072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.315094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.315116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.315139]  kthread+0x337/0x6f0
[   16.315158]  ? trace_preempt_on+0x20/0xc0
[   16.315179]  ? __pfx_kthread+0x10/0x10
[   16.315200]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.315235]  ? calculate_sigpending+0x7b/0xa0
[   16.315265]  ? __pfx_kthread+0x10/0x10
[   16.315287]  ret_from_fork+0x116/0x1d0
[   16.315305]  ? __pfx_kthread+0x10/0x10
[   16.315326]  ret_from_fork_asm+0x1a/0x30
[   16.315356]  </TASK>
[   16.315368] 
[   16.327290] Allocated by task 277:
[   16.327642]  kasan_save_stack+0x45/0x70
[   16.327965]  kasan_save_track+0x18/0x40
[   16.328311]  kasan_save_alloc_info+0x3b/0x50
[   16.328563]  __kasan_kmalloc+0xb7/0xc0
[   16.329155]  __kmalloc_cache_noprof+0x189/0x420
[   16.329712]  kasan_strings+0xc0/0xe80
[   16.329880]  kunit_try_run_case+0x1a5/0x480
[   16.330024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.330193]  kthread+0x337/0x6f0
[   16.330340]  ret_from_fork+0x116/0x1d0
[   16.330677]  ret_from_fork_asm+0x1a/0x30
[   16.330882] 
[   16.330987] Freed by task 277:
[   16.331135]  kasan_save_stack+0x45/0x70
[   16.331317]  kasan_save_track+0x18/0x40
[   16.331490]  kasan_save_free_info+0x3f/0x60
[   16.331670]  __kasan_slab_free+0x56/0x70
[   16.332414]  kfree+0x222/0x3f0
[   16.332708]  kasan_strings+0x2aa/0xe80
[   16.333008]  kunit_try_run_case+0x1a5/0x480
[   16.333330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.333720]  kthread+0x337/0x6f0
[   16.333877]  ret_from_fork+0x116/0x1d0
[   16.334012]  ret_from_fork_asm+0x1a/0x30
[   16.334151] 
[   16.335175] The buggy address belongs to the object at ffff888102b6e280
[   16.335175]  which belongs to the cache kmalloc-32 of size 32
[   16.336300] The buggy address is located 16 bytes inside of
[   16.336300]  freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0)
[   16.336695] 
[   16.336816] The buggy address belongs to the physical page:
[   16.337179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e
[   16.338209] flags: 0x200000000000000(node=0|zone=2)
[   16.338797] page_type: f5(slab)
[   16.339117] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.339527] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.340168] page dumped because: kasan: bad access detected
[   16.340744] 
[   16.340949] Memory state around the buggy address:
[   16.341162]  ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.341677]  ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.342141] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.342573]                          ^
[   16.342844]  ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.343423]  ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.344060] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
[   16.277353] ==================================================================
[   16.278178] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   16.278743] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277
[   16.279095] 
[   16.279252] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.279349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.279371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.279396] Call Trace:
[   16.279421]  <TASK>
[   16.279443]  dump_stack_lvl+0x73/0xb0
[   16.279667]  print_report+0xd1/0x650
[   16.279721]  ? __virt_addr_valid+0x1db/0x2d0
[   16.279766]  ? strlen+0x8f/0xb0
[   16.279807]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.279852]  ? strlen+0x8f/0xb0
[   16.279894]  kasan_report+0x141/0x180
[   16.279943]  ? strlen+0x8f/0xb0
[   16.279997]  __asan_report_load1_noabort+0x18/0x20
[   16.280040]  strlen+0x8f/0xb0
[   16.280085]  kasan_strings+0x57b/0xe80
[   16.280126]  ? trace_hardirqs_on+0x37/0xe0
[   16.280174]  ? __pfx_kasan_strings+0x10/0x10
[   16.280215]  ? finish_task_switch.isra.0+0x153/0x700
[   16.280273]  ? __switch_to+0x47/0xf50
[   16.280327]  ? __schedule+0x10cc/0x2b60
[   16.280373]  ? __pfx_read_tsc+0x10/0x10
[   16.280415]  ? ktime_get_ts64+0x86/0x230
[   16.280473]  kunit_try_run_case+0x1a5/0x480
[   16.280514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.280550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.280581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.280603]  ? __kthread_parkme+0x82/0x180
[   16.280623]  ? preempt_count_sub+0x50/0x80
[   16.280645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.280667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.280689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.280711]  kthread+0x337/0x6f0
[   16.280730]  ? trace_preempt_on+0x20/0xc0
[   16.280752]  ? __pfx_kthread+0x10/0x10
[   16.280772]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.280792]  ? calculate_sigpending+0x7b/0xa0
[   16.280816]  ? __pfx_kthread+0x10/0x10
[   16.280837]  ret_from_fork+0x116/0x1d0
[   16.280854]  ? __pfx_kthread+0x10/0x10
[   16.280876]  ret_from_fork_asm+0x1a/0x30
[   16.280906]  </TASK>
[   16.280918] 
[   16.292819] Allocated by task 277:
[   16.293104]  kasan_save_stack+0x45/0x70
[   16.293327]  kasan_save_track+0x18/0x40
[   16.293634]  kasan_save_alloc_info+0x3b/0x50
[   16.294005]  __kasan_kmalloc+0xb7/0xc0
[   16.294189]  __kmalloc_cache_noprof+0x189/0x420
[   16.294716]  kasan_strings+0xc0/0xe80
[   16.295086]  kunit_try_run_case+0x1a5/0x480
[   16.295403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.295984]  kthread+0x337/0x6f0
[   16.296275]  ret_from_fork+0x116/0x1d0
[   16.297067]  ret_from_fork_asm+0x1a/0x30
[   16.297386] 
[   16.297553] Freed by task 277:
[   16.297747]  kasan_save_stack+0x45/0x70
[   16.297909]  kasan_save_track+0x18/0x40
[   16.298146]  kasan_save_free_info+0x3f/0x60
[   16.298474]  __kasan_slab_free+0x56/0x70
[   16.298705]  kfree+0x222/0x3f0
[   16.298850]  kasan_strings+0x2aa/0xe80
[   16.299071]  kunit_try_run_case+0x1a5/0x480
[   16.299579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.299923]  kthread+0x337/0x6f0
[   16.300254]  ret_from_fork+0x116/0x1d0
[   16.300742]  ret_from_fork_asm+0x1a/0x30
[   16.301080] 
[   16.301261] The buggy address belongs to the object at ffff888102b6e280
[   16.301261]  which belongs to the cache kmalloc-32 of size 32
[   16.301772] The buggy address is located 16 bytes inside of
[   16.301772]  freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0)
[   16.302135] 
[   16.302262] The buggy address belongs to the physical page:
[   16.303310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e
[   16.304018] flags: 0x200000000000000(node=0|zone=2)
[   16.304426] page_type: f5(slab)
[   16.304888] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.305616] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.306201] page dumped because: kasan: bad access detected
[   16.306811] 
[   16.307018] Memory state around the buggy address:
[   16.307395]  ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.308243]  ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.308958] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.309401]                          ^
[   16.309800]  ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.310281]  ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.310800] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
[   16.243421] ==================================================================
[   16.243903] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   16.244258] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277
[   16.244855] 
[   16.245070] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.245178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.245218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.245270] Call Trace:
[   16.245296]  <TASK>
[   16.245333]  dump_stack_lvl+0x73/0xb0
[   16.245389]  print_report+0xd1/0x650
[   16.245443]  ? __virt_addr_valid+0x1db/0x2d0
[   16.245499]  ? kasan_strings+0xcbc/0xe80
[   16.245541]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.245579]  ? kasan_strings+0xcbc/0xe80
[   16.245604]  kasan_report+0x141/0x180
[   16.245626]  ? kasan_strings+0xcbc/0xe80
[   16.245652]  __asan_report_load1_noabort+0x18/0x20
[   16.245673]  kasan_strings+0xcbc/0xe80
[   16.245694]  ? trace_hardirqs_on+0x37/0xe0
[   16.245725]  ? __pfx_kasan_strings+0x10/0x10
[   16.245756]  ? finish_task_switch.isra.0+0x153/0x700
[   16.245793]  ? __switch_to+0x47/0xf50
[   16.245841]  ? __schedule+0x10cc/0x2b60
[   16.246009]  ? __pfx_read_tsc+0x10/0x10
[   16.246062]  ? ktime_get_ts64+0x86/0x230
[   16.246109]  kunit_try_run_case+0x1a5/0x480
[   16.246156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.246192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.246256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.246299]  ? __kthread_parkme+0x82/0x180
[   16.246347]  ? preempt_count_sub+0x50/0x80
[   16.246378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.246403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.246427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.246451]  kthread+0x337/0x6f0
[   16.246481]  ? trace_preempt_on+0x20/0xc0
[   16.246557]  ? __pfx_kthread+0x10/0x10
[   16.246594]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.246618]  ? calculate_sigpending+0x7b/0xa0
[   16.246644]  ? __pfx_kthread+0x10/0x10
[   16.246665]  ret_from_fork+0x116/0x1d0
[   16.246686]  ? __pfx_kthread+0x10/0x10
[   16.246706]  ret_from_fork_asm+0x1a/0x30
[   16.246740]  </TASK>
[   16.246752] 
[   16.260213] Allocated by task 277:
[   16.260497]  kasan_save_stack+0x45/0x70
[   16.261126]  kasan_save_track+0x18/0x40
[   16.261475]  kasan_save_alloc_info+0x3b/0x50
[   16.261843]  __kasan_kmalloc+0xb7/0xc0
[   16.262375]  __kmalloc_cache_noprof+0x189/0x420
[   16.262672]  kasan_strings+0xc0/0xe80
[   16.263120]  kunit_try_run_case+0x1a5/0x480
[   16.263351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.263714]  kthread+0x337/0x6f0
[   16.264060]  ret_from_fork+0x116/0x1d0
[   16.264289]  ret_from_fork_asm+0x1a/0x30
[   16.264583] 
[   16.264711] Freed by task 277:
[   16.264854]  kasan_save_stack+0x45/0x70
[   16.265140]  kasan_save_track+0x18/0x40
[   16.266188]  kasan_save_free_info+0x3f/0x60
[   16.266401]  __kasan_slab_free+0x56/0x70
[   16.266717]  kfree+0x222/0x3f0
[   16.266945]  kasan_strings+0x2aa/0xe80
[   16.267174]  kunit_try_run_case+0x1a5/0x480
[   16.267388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.267653]  kthread+0x337/0x6f0
[   16.267903]  ret_from_fork+0x116/0x1d0
[   16.268136]  ret_from_fork_asm+0x1a/0x30
[   16.268383] 
[   16.268491] The buggy address belongs to the object at ffff888102b6e280
[   16.268491]  which belongs to the cache kmalloc-32 of size 32
[   16.268860] The buggy address is located 16 bytes inside of
[   16.268860]  freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0)
[   16.269725] 
[   16.269916] The buggy address belongs to the physical page:
[   16.270318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e
[   16.271688] flags: 0x200000000000000(node=0|zone=2)
[   16.272061] page_type: f5(slab)
[   16.272267] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.272946] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.273263] page dumped because: kasan: bad access detected
[   16.273572] 
[   16.273678] Memory state around the buggy address:
[   16.274021]  ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.274313]  ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.274772] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.275071]                          ^
[   16.275545]  ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.275839]  ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.276066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
[   16.208067] ==================================================================
[   16.209652] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   16.209909] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277
[   16.210055] 
[   16.210133] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.210189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.210202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.210243] Call Trace:
[   16.210261]  <TASK>
[   16.210282]  dump_stack_lvl+0x73/0xb0
[   16.210310]  print_report+0xd1/0x650
[   16.210349]  ? __virt_addr_valid+0x1db/0x2d0
[   16.210381]  ? strcmp+0xb0/0xc0
[   16.210403]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.210429]  ? strcmp+0xb0/0xc0
[   16.210451]  kasan_report+0x141/0x180
[   16.210475]  ? strcmp+0xb0/0xc0
[   16.210501]  __asan_report_load1_noabort+0x18/0x20
[   16.210523]  strcmp+0xb0/0xc0
[   16.210546]  kasan_strings+0x431/0xe80
[   16.210568]  ? trace_hardirqs_on+0x37/0xe0
[   16.210593]  ? __pfx_kasan_strings+0x10/0x10
[   16.210615]  ? finish_task_switch.isra.0+0x153/0x700
[   16.210639]  ? __switch_to+0x47/0xf50
[   16.210666]  ? __schedule+0x10cc/0x2b60
[   16.210690]  ? __pfx_read_tsc+0x10/0x10
[   16.210712]  ? ktime_get_ts64+0x86/0x230
[   16.210737]  kunit_try_run_case+0x1a5/0x480
[   16.210763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.210785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.210809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.210833]  ? __kthread_parkme+0x82/0x180
[   16.210855]  ? preempt_count_sub+0x50/0x80
[   16.210878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.210902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.210927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.210950]  kthread+0x337/0x6f0
[   16.210970]  ? trace_preempt_on+0x20/0xc0
[   16.210993]  ? __pfx_kthread+0x10/0x10
[   16.211015]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.211035]  ? calculate_sigpending+0x7b/0xa0
[   16.211061]  ? __pfx_kthread+0x10/0x10
[   16.211083]  ret_from_fork+0x116/0x1d0
[   16.211102]  ? __pfx_kthread+0x10/0x10
[   16.211123]  ret_from_fork_asm+0x1a/0x30
[   16.211157]  </TASK>
[   16.211170] 
[   16.224345] Allocated by task 277:
[   16.225079]  kasan_save_stack+0x45/0x70
[   16.225442]  kasan_save_track+0x18/0x40
[   16.225775]  kasan_save_alloc_info+0x3b/0x50
[   16.226065]  __kasan_kmalloc+0xb7/0xc0
[   16.226251]  __kmalloc_cache_noprof+0x189/0x420
[   16.226604]  kasan_strings+0xc0/0xe80
[   16.226903]  kunit_try_run_case+0x1a5/0x480
[   16.227440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227843]  kthread+0x337/0x6f0
[   16.228123]  ret_from_fork+0x116/0x1d0
[   16.228429]  ret_from_fork_asm+0x1a/0x30
[   16.228918] 
[   16.229128] Freed by task 277:
[   16.229349]  kasan_save_stack+0x45/0x70
[   16.229850]  kasan_save_track+0x18/0x40
[   16.230059]  kasan_save_free_info+0x3f/0x60
[   16.230435]  __kasan_slab_free+0x56/0x70
[   16.231235]  kfree+0x222/0x3f0
[   16.231604]  kasan_strings+0x2aa/0xe80
[   16.231952]  kunit_try_run_case+0x1a5/0x480
[   16.232196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.232776]  kthread+0x337/0x6f0
[   16.232942]  ret_from_fork+0x116/0x1d0
[   16.233191]  ret_from_fork_asm+0x1a/0x30
[   16.233384] 
[   16.233671] The buggy address belongs to the object at ffff888102b6e280
[   16.233671]  which belongs to the cache kmalloc-32 of size 32
[   16.234098] The buggy address is located 16 bytes inside of
[   16.234098]  freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0)
[   16.235060] 
[   16.235260] The buggy address belongs to the physical page:
[   16.235496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e
[   16.236193] flags: 0x200000000000000(node=0|zone=2)
[   16.236481] page_type: f5(slab)
[   16.236769] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.237076] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.237575] page dumped because: kasan: bad access detected
[   16.237784] 
[   16.237945] Memory state around the buggy address:
[   16.238899]  ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.239429]  ffff888102b6e200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.239912] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.240396]                          ^
[   16.240846]  ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.241177]  ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.241745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[   16.175949] ==================================================================
[   16.176355] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   16.176721] Read of size 1 at addr ffff888102b6e1d8 by task kunit_try_catch/275
[   16.177280] 
[   16.177431] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.177529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.177547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.177573] Call Trace:
[   16.177589]  <TASK>
[   16.177611]  dump_stack_lvl+0x73/0xb0
[   16.177646]  print_report+0xd1/0x650
[   16.177679]  ? __virt_addr_valid+0x1db/0x2d0
[   16.177716]  ? memcmp+0x1b4/0x1d0
[   16.177749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.177790]  ? memcmp+0x1b4/0x1d0
[   16.177827]  kasan_report+0x141/0x180
[   16.177874]  ? memcmp+0x1b4/0x1d0
[   16.177930]  __asan_report_load1_noabort+0x18/0x20
[   16.177975]  memcmp+0x1b4/0x1d0
[   16.178013]  kasan_memcmp+0x18f/0x390
[   16.178049]  ? trace_hardirqs_on+0x37/0xe0
[   16.178095]  ? __pfx_kasan_memcmp+0x10/0x10
[   16.178135]  ? finish_task_switch.isra.0+0x153/0x700
[   16.178179]  ? __switch_to+0x47/0xf50
[   16.178252]  ? __pfx_read_tsc+0x10/0x10
[   16.178299]  ? ktime_get_ts64+0x86/0x230
[   16.178355]  kunit_try_run_case+0x1a5/0x480
[   16.178414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.178447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.178473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.178496]  ? __kthread_parkme+0x82/0x180
[   16.178518]  ? preempt_count_sub+0x50/0x80
[   16.178541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.178565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.178587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.178610]  kthread+0x337/0x6f0
[   16.178629]  ? trace_preempt_on+0x20/0xc0
[   16.178650]  ? __pfx_kthread+0x10/0x10
[   16.178670]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.178691]  ? calculate_sigpending+0x7b/0xa0
[   16.178715]  ? __pfx_kthread+0x10/0x10
[   16.178735]  ret_from_fork+0x116/0x1d0
[   16.178752]  ? __pfx_kthread+0x10/0x10
[   16.178773]  ret_from_fork_asm+0x1a/0x30
[   16.178804]  </TASK>
[   16.178817] 
[   16.186728] Allocated by task 275:
[   16.186950]  kasan_save_stack+0x45/0x70
[   16.187149]  kasan_save_track+0x18/0x40
[   16.187437]  kasan_save_alloc_info+0x3b/0x50
[   16.187696]  __kasan_kmalloc+0xb7/0xc0
[   16.187882]  __kmalloc_cache_noprof+0x189/0x420
[   16.188212]  kasan_memcmp+0xb7/0x390
[   16.188437]  kunit_try_run_case+0x1a5/0x480
[   16.188655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188895]  kthread+0x337/0x6f0
[   16.189116]  ret_from_fork+0x116/0x1d0
[   16.189292]  ret_from_fork_asm+0x1a/0x30
[   16.189578] 
[   16.189718] The buggy address belongs to the object at ffff888102b6e1c0
[   16.189718]  which belongs to the cache kmalloc-32 of size 32
[   16.190315] The buggy address is located 0 bytes to the right of
[   16.190315]  allocated 24-byte region [ffff888102b6e1c0, ffff888102b6e1d8)
[   16.190812] 
[   16.190926] The buggy address belongs to the physical page:
[   16.191278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e
[   16.191658] flags: 0x200000000000000(node=0|zone=2)
[   16.191865] page_type: f5(slab)
[   16.192033] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.192329] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.192803] page dumped because: kasan: bad access detected
[   16.193174] 
[   16.193339] Memory state around the buggy address:
[   16.193686]  ffff888102b6e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.194052]  ffff888102b6e100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   16.194374] >ffff888102b6e180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.194739]                                                     ^
[   16.195029]  ffff888102b6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.195326]  ffff888102b6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.195726] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[   16.141141] ==================================================================
[   16.141588] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   16.142097] Read of size 1 at addr ffff888103bffc4a by task kunit_try_catch/271
[   16.143816] 
[   16.144007] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.144106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.144132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.144175] Call Trace:
[   16.144229]  <TASK>
[   16.144266]  dump_stack_lvl+0x73/0xb0
[   16.144325]  print_report+0xd1/0x650
[   16.144367]  ? __virt_addr_valid+0x1db/0x2d0
[   16.144409]  ? kasan_alloca_oob_right+0x329/0x390
[   16.144451]  ? kasan_addr_to_slab+0x11/0xa0
[   16.144486]  ? kasan_alloca_oob_right+0x329/0x390
[   16.144515]  kasan_report+0x141/0x180
[   16.144538]  ? kasan_alloca_oob_right+0x329/0x390
[   16.144566]  __asan_report_load1_noabort+0x18/0x20
[   16.144588]  kasan_alloca_oob_right+0x329/0x390
[   16.144610]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.144632]  ? finish_task_switch.isra.0+0x153/0x700
[   16.144654]  ? rt_mutex_adjust_prio_chain+0x68e/0x20e0
[   16.144680]  ? trace_hardirqs_on+0x37/0xe0
[   16.144704]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   16.144730]  ? __schedule+0x10cc/0x2b60
[   16.144751]  ? __pfx_read_tsc+0x10/0x10
[   16.144771]  ? ktime_get_ts64+0x86/0x230
[   16.144795]  kunit_try_run_case+0x1a5/0x480
[   16.144821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.144864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.144886]  ? __kthread_parkme+0x82/0x180
[   16.144907]  ? preempt_count_sub+0x50/0x80
[   16.144930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.144974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.144996]  kthread+0x337/0x6f0
[   16.145015]  ? trace_preempt_on+0x20/0xc0
[   16.145037]  ? __pfx_kthread+0x10/0x10
[   16.145057]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.145076]  ? calculate_sigpending+0x7b/0xa0
[   16.145101]  ? __pfx_kthread+0x10/0x10
[   16.145121]  ret_from_fork+0x116/0x1d0
[   16.145139]  ? __pfx_kthread+0x10/0x10
[   16.145158]  ret_from_fork_asm+0x1a/0x30
[   16.145190]  </TASK>
[   16.145203] 
[   16.157185] The buggy address belongs to stack of task kunit_try_catch/271
[   16.157559] 
[   16.157691] The buggy address belongs to the physical page:
[   16.157899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bff
[   16.158934] flags: 0x200000000000000(node=0|zone=2)
[   16.159339] raw: 0200000000000000 ffffea00040effc8 ffffea00040effc8 0000000000000000
[   16.159826] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.160170] page dumped because: kasan: bad access detected
[   16.160727] 
[   16.160891] Memory state around the buggy address:
[   16.161154]  ffff888103bffb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.162082]  ffff888103bffb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.162657] >ffff888103bffc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   16.163033]                                               ^
[   16.163390]  ffff888103bffc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   16.164026]  ffff888103bffd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.164664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[   16.112393] ==================================================================
[   16.113251] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   16.113856] Read of size 1 at addr ffff888103bc7c3f by task kunit_try_catch/269
[   16.114448] 
[   16.114652] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.114796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.114824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.114861] Call Trace:
[   16.114887]  <TASK>
[   16.114923]  dump_stack_lvl+0x73/0xb0
[   16.114983]  print_report+0xd1/0x650
[   16.115029]  ? __virt_addr_valid+0x1db/0x2d0
[   16.115075]  ? kasan_alloca_oob_left+0x320/0x380
[   16.115116]  ? kasan_addr_to_slab+0x11/0xa0
[   16.115150]  ? kasan_alloca_oob_left+0x320/0x380
[   16.115190]  kasan_report+0x141/0x180
[   16.115240]  ? kasan_alloca_oob_left+0x320/0x380
[   16.115334]  __asan_report_load1_noabort+0x18/0x20
[   16.115400]  kasan_alloca_oob_left+0x320/0x380
[   16.115443]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.115484]  ? finish_task_switch.isra.0+0x153/0x700
[   16.115519]  ? rt_mutex_adjust_prio_chain+0x68e/0x20e0
[   16.115556]  ? trace_hardirqs_on+0x37/0xe0
[   16.115760]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   16.115804]  ? __schedule+0x10cc/0x2b60
[   16.115858]  ? __pfx_read_tsc+0x10/0x10
[   16.115882]  ? ktime_get_ts64+0x86/0x230
[   16.115906]  kunit_try_run_case+0x1a5/0x480
[   16.115933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.115954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.115976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.115997]  ? __kthread_parkme+0x82/0x180
[   16.116018]  ? preempt_count_sub+0x50/0x80
[   16.116041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.116062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.116083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.116104]  kthread+0x337/0x6f0
[   16.116123]  ? trace_preempt_on+0x20/0xc0
[   16.116144]  ? __pfx_kthread+0x10/0x10
[   16.116163]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.116183]  ? calculate_sigpending+0x7b/0xa0
[   16.116206]  ? __pfx_kthread+0x10/0x10
[   16.116248]  ret_from_fork+0x116/0x1d0
[   16.116269]  ? __pfx_kthread+0x10/0x10
[   16.116288]  ret_from_fork_asm+0x1a/0x30
[   16.116318]  </TASK>
[   16.116332] 
[   16.127218] The buggy address belongs to stack of task kunit_try_catch/269
[   16.128313] 
[   16.128683] The buggy address belongs to the physical page:
[   16.129255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc7
[   16.129858] flags: 0x200000000000000(node=0|zone=2)
[   16.130198] raw: 0200000000000000 ffffea00040ef1c8 ffffea00040ef1c8 0000000000000000
[   16.130836] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.131234] page dumped because: kasan: bad access detected
[   16.131448] 
[   16.131601] Memory state around the buggy address:
[   16.131903]  ffff888103bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.132329]  ffff888103bc7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.132700] >ffff888103bc7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   16.132928]                                         ^
[   16.133642]  ffff888103bc7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   16.134098]  ffff888103bc7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.134515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[   16.080785] ==================================================================
[   16.081381] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   16.081839] Read of size 1 at addr ffff888103bffd02 by task kunit_try_catch/267
[   16.082201] 
[   16.082605] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.082705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.082730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.082774] Call Trace:
[   16.082793]  <TASK>
[   16.082826]  dump_stack_lvl+0x73/0xb0
[   16.082887]  print_report+0xd1/0x650
[   16.082928]  ? __virt_addr_valid+0x1db/0x2d0
[   16.082963]  ? kasan_stack_oob+0x2b5/0x300
[   16.082995]  ? kasan_addr_to_slab+0x11/0xa0
[   16.083031]  ? kasan_stack_oob+0x2b5/0x300
[   16.083071]  kasan_report+0x141/0x180
[   16.083110]  ? kasan_stack_oob+0x2b5/0x300
[   16.083161]  __asan_report_load1_noabort+0x18/0x20
[   16.083202]  kasan_stack_oob+0x2b5/0x300
[   16.083257]  ? __pfx_kasan_stack_oob+0x10/0x10
[   16.083298]  ? finish_task_switch.isra.0+0x153/0x700
[   16.083339]  ? __switch_to+0x47/0xf50
[   16.083371]  ? __schedule+0x10cc/0x2b60
[   16.083396]  ? __pfx_read_tsc+0x10/0x10
[   16.083417]  ? ktime_get_ts64+0x86/0x230
[   16.083442]  kunit_try_run_case+0x1a5/0x480
[   16.083475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.083571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.083605]  ? __kthread_parkme+0x82/0x180
[   16.083637]  ? preempt_count_sub+0x50/0x80
[   16.083735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.083786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.083834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.083882]  kthread+0x337/0x6f0
[   16.083921]  ? trace_preempt_on+0x20/0xc0
[   16.083971]  ? __pfx_kthread+0x10/0x10
[   16.084014]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.084057]  ? calculate_sigpending+0x7b/0xa0
[   16.084104]  ? __pfx_kthread+0x10/0x10
[   16.084146]  ret_from_fork+0x116/0x1d0
[   16.084172]  ? __pfx_kthread+0x10/0x10
[   16.084192]  ret_from_fork_asm+0x1a/0x30
[   16.084244]  </TASK>
[   16.084259] 
[   16.095342] The buggy address belongs to stack of task kunit_try_catch/267
[   16.096179]  and is located at offset 138 in frame:
[   16.097067]  kasan_stack_oob+0x0/0x300
[   16.097895] 
[   16.098134] This frame has 4 objects:
[   16.098779]  [48, 49) '__assertion'
[   16.098874]  [64, 72) 'array'
[   16.099089]  [96, 112) '__assertion'
[   16.099271]  [128, 138) 'stack_array'
[   16.099817] 
[   16.100296] The buggy address belongs to the physical page:
[   16.101041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bff
[   16.101369] flags: 0x200000000000000(node=0|zone=2)
[   16.101965] raw: 0200000000000000 ffffea00040effc8 ffffea00040effc8 0000000000000000
[   16.102432] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.103092] page dumped because: kasan: bad access detected
[   16.103379] 
[   16.103729] Memory state around the buggy address:
[   16.104071]  ffff888103bffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.104908]  ffff888103bffc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   16.105278] >ffff888103bffd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.105858]                    ^
[   16.106103]  ffff888103bffd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   16.106636]  ffff888103bffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.107147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[   16.050123] ==================================================================
[   16.051021] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   16.051454] Read of size 1 at addr ffffffffaa85fecd by task kunit_try_catch/263
[   16.052809] 
[   16.053002] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.053079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.053100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.053139] Call Trace:
[   16.053165]  <TASK>
[   16.053231]  dump_stack_lvl+0x73/0xb0
[   16.053306]  print_report+0xd1/0x650
[   16.053352]  ? __virt_addr_valid+0x1db/0x2d0
[   16.053411]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053457]  ? kasan_addr_to_slab+0x11/0xa0
[   16.053495]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053540]  kasan_report+0x141/0x180
[   16.053573]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053616]  __asan_report_load1_noabort+0x18/0x20
[   16.053649]  kasan_global_oob_right+0x286/0x2d0
[   16.053677]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   16.053701]  ? __schedule+0x10cc/0x2b60
[   16.053724]  ? __pfx_read_tsc+0x10/0x10
[   16.053746]  ? ktime_get_ts64+0x86/0x230
[   16.053772]  kunit_try_run_case+0x1a5/0x480
[   16.053797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.053840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.053861]  ? __kthread_parkme+0x82/0x180
[   16.053883]  ? preempt_count_sub+0x50/0x80
[   16.053907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.053971]  kthread+0x337/0x6f0
[   16.053990]  ? trace_preempt_on+0x20/0xc0
[   16.054014]  ? __pfx_kthread+0x10/0x10
[   16.054033]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.054054]  ? calculate_sigpending+0x7b/0xa0
[   16.054078]  ? __pfx_kthread+0x10/0x10
[   16.054099]  ret_from_fork+0x116/0x1d0
[   16.054116]  ? __pfx_kthread+0x10/0x10
[   16.054136]  ret_from_fork_asm+0x1a/0x30
[   16.054167]  </TASK>
[   16.054180] 
[   16.063483] The buggy address belongs to the variable:
[   16.063926]  global_array+0xd/0x40
[   16.064299] 
[   16.064514] The buggy address belongs to the physical page:
[   16.064991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2d25f
[   16.065298] flags: 0x100000000002000(reserved|node=0|zone=1)
[   16.065714] raw: 0100000000002000 ffffea0000b497c8 ffffea0000b497c8 0000000000000000
[   16.066328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.067127] page dumped because: kasan: bad access detected
[   16.067369] 
[   16.067536] Memory state around the buggy address:
[   16.068186]  ffffffffaa85fd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.069949]  ffffffffaa85fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.070203] >ffffffffaa85fe80: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   16.070685]                                               ^
[   16.071106]  ffffffffaa85ff00: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   16.071957]  ffffffffaa85ff80: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   16.072424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[   15.926734] ==================================================================
[   15.927173] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   15.927724] Free of addr ffff8881029a4000 by task kunit_try_catch/255
[   15.928017] 
[   15.928760] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.928916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.928946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.929115] Call Trace:
[   15.929153]  <TASK>
[   15.929187]  dump_stack_lvl+0x73/0xb0
[   15.929254]  print_report+0xd1/0x650
[   15.929283]  ? __virt_addr_valid+0x1db/0x2d0
[   15.929311]  ? kasan_addr_to_slab+0x11/0xa0
[   15.929333]  ? mempool_double_free_helper+0x184/0x370
[   15.929359]  kasan_report_invalid_free+0x10a/0x130
[   15.929385]  ? mempool_double_free_helper+0x184/0x370
[   15.929413]  ? mempool_double_free_helper+0x184/0x370
[   15.929436]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   15.929482]  mempool_free+0x2ec/0x380
[   15.929524]  mempool_double_free_helper+0x184/0x370
[   15.929562]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   15.929609]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.929635]  ? finish_task_switch.isra.0+0x153/0x700
[   15.929664]  mempool_kmalloc_large_double_free+0xed/0x140
[   15.929690]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   15.929717]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.929735]  ? __pfx_mempool_kfree+0x10/0x10
[   15.929756]  ? __pfx_read_tsc+0x10/0x10
[   15.929778]  ? ktime_get_ts64+0x86/0x230
[   15.929803]  kunit_try_run_case+0x1a5/0x480
[   15.929828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.929872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.929893]  ? __kthread_parkme+0x82/0x180
[   15.929914]  ? preempt_count_sub+0x50/0x80
[   15.929937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.929981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.930002]  kthread+0x337/0x6f0
[   15.930020]  ? trace_preempt_on+0x20/0xc0
[   15.930045]  ? __pfx_kthread+0x10/0x10
[   15.930065]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.930085]  ? calculate_sigpending+0x7b/0xa0
[   15.930109]  ? __pfx_kthread+0x10/0x10
[   15.930130]  ret_from_fork+0x116/0x1d0
[   15.930148]  ? __pfx_kthread+0x10/0x10
[   15.930167]  ret_from_fork_asm+0x1a/0x30
[   15.930199]  </TASK>
[   15.930212] 
[   15.941314] The buggy address belongs to the physical page:
[   15.941717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4
[   15.942478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.942803] flags: 0x200000000000040(head|node=0|zone=2)
[   15.943577] page_type: f8(unknown)
[   15.943759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.944410] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.944852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.945314] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.945460] head: 0200000000000002 ffffea00040a6901 00000000ffffffff 00000000ffffffff
[   15.945591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.946789] page dumped because: kasan: bad access detected
[   15.947127] 
[   15.947307] Memory state around the buggy address:
[   15.947633]  ffff8881029a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.947873]  ffff8881029a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.948192] >ffff8881029a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.948644]                    ^
[   15.948908]  ffff8881029a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.949197]  ffff8881029a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.949491] ==================================================================
[   15.883059] ==================================================================
[   15.883536] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   15.884485] Free of addr ffff88810231a600 by task kunit_try_catch/253
[   15.884924] 
[   15.885658] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.885728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.885741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.885764] Call Trace:
[   15.885780]  <TASK>
[   15.885802]  dump_stack_lvl+0x73/0xb0
[   15.885838]  print_report+0xd1/0x650
[   15.885862]  ? __virt_addr_valid+0x1db/0x2d0
[   15.885886]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.885907]  ? mempool_double_free_helper+0x184/0x370
[   15.885929]  kasan_report_invalid_free+0x10a/0x130
[   15.885952]  ? mempool_double_free_helper+0x184/0x370
[   15.885976]  ? mempool_double_free_helper+0x184/0x370
[   15.885998]  ? mempool_double_free_helper+0x184/0x370
[   15.886020]  check_slab_allocation+0x101/0x130
[   15.886041]  __kasan_mempool_poison_object+0x91/0x1d0
[   15.886064]  mempool_free+0x2ec/0x380
[   15.886088]  mempool_double_free_helper+0x184/0x370
[   15.886111]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   15.886136]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.886156]  ? irqentry_exit+0x2a/0x60
[   15.886177]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.886201]  mempool_kmalloc_double_free+0xed/0x140
[   15.886244]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   15.886287]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.886318]  ? __pfx_mempool_kfree+0x10/0x10
[   15.886369]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   15.886418]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   15.886460]  kunit_try_run_case+0x1a5/0x480
[   15.886514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.886586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.886621]  ? __kthread_parkme+0x82/0x180
[   15.886657]  ? preempt_count_sub+0x50/0x80
[   15.886695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.886768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.886805]  kthread+0x337/0x6f0
[   15.886837]  ? trace_preempt_on+0x20/0xc0
[   15.886875]  ? __pfx_kthread+0x10/0x10
[   15.886908]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.886943]  ? calculate_sigpending+0x7b/0xa0
[   15.886979]  ? __pfx_kthread+0x10/0x10
[   15.887014]  ret_from_fork+0x116/0x1d0
[   15.887052]  ? __pfx_kthread+0x10/0x10
[   15.887090]  ret_from_fork_asm+0x1a/0x30
[   15.887151]  </TASK>
[   15.887167] 
[   15.900713] Allocated by task 253:
[   15.901649]  kasan_save_stack+0x45/0x70
[   15.902016]  kasan_save_track+0x18/0x40
[   15.902174]  kasan_save_alloc_info+0x3b/0x50
[   15.902336]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.902862]  remove_element+0x11e/0x190
[   15.903139]  mempool_alloc_preallocated+0x4d/0x90
[   15.903400]  mempool_double_free_helper+0x8a/0x370
[   15.904624]  mempool_kmalloc_double_free+0xed/0x140
[   15.905046]  kunit_try_run_case+0x1a5/0x480
[   15.905319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.905862]  kthread+0x337/0x6f0
[   15.906096]  ret_from_fork+0x116/0x1d0
[   15.906268]  ret_from_fork_asm+0x1a/0x30
[   15.906512] 
[   15.906743] Freed by task 253:
[   15.907178]  kasan_save_stack+0x45/0x70
[   15.907738]  kasan_save_track+0x18/0x40
[   15.908204]  kasan_save_free_info+0x3f/0x60
[   15.908504]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.909081]  mempool_free+0x2ec/0x380
[   15.909284]  mempool_double_free_helper+0x109/0x370
[   15.909697]  mempool_kmalloc_double_free+0xed/0x140
[   15.909912]  kunit_try_run_case+0x1a5/0x480
[   15.910560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.910865]  kthread+0x337/0x6f0
[   15.911135]  ret_from_fork+0x116/0x1d0
[   15.911363]  ret_from_fork_asm+0x1a/0x30
[   15.912133] 
[   15.912258] The buggy address belongs to the object at ffff88810231a600
[   15.912258]  which belongs to the cache kmalloc-128 of size 128
[   15.912908] The buggy address is located 0 bytes inside of
[   15.912908]  128-byte region [ffff88810231a600, ffff88810231a680)
[   15.913479] 
[   15.913651] The buggy address belongs to the physical page:
[   15.913945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a
[   15.914435] flags: 0x200000000000000(node=0|zone=2)
[   15.914920] page_type: f5(slab)
[   15.915111] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.915388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.916319] page dumped because: kasan: bad access detected
[   15.916903] 
[   15.917074] Memory state around the buggy address:
[   15.917431]  ffff88810231a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.918079]  ffff88810231a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.918681] >ffff88810231a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.918947]                    ^
[   15.919238]  ffff88810231a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920079]  ffff88810231a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.920558] ==================================================================
[   15.954383] ==================================================================
[   15.955523] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   15.956218] Free of addr ffff888103c2c000 by task kunit_try_catch/257
[   15.956461] 
[   15.956648] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.956706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.956719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.956742] Call Trace:
[   15.956758]  <TASK>
[   15.956778]  dump_stack_lvl+0x73/0xb0
[   15.956812]  print_report+0xd1/0x650
[   15.956836]  ? __virt_addr_valid+0x1db/0x2d0
[   15.956862]  ? kasan_addr_to_slab+0x11/0xa0
[   15.956882]  ? mempool_double_free_helper+0x184/0x370
[   15.956906]  kasan_report_invalid_free+0x10a/0x130
[   15.956929]  ? mempool_double_free_helper+0x184/0x370
[   15.956955]  ? mempool_double_free_helper+0x184/0x370
[   15.956977]  __kasan_mempool_poison_pages+0x115/0x130
[   15.957001]  mempool_free+0x290/0x380
[   15.957024]  mempool_double_free_helper+0x184/0x370
[   15.957048]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   15.957073]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.957095]  ? finish_task_switch.isra.0+0x153/0x700
[   15.957121]  mempool_page_alloc_double_free+0xe8/0x140
[   15.957145]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   15.957171]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   15.957189]  ? __pfx_mempool_free_pages+0x10/0x10
[   15.957210]  ? __pfx_read_tsc+0x10/0x10
[   15.957271]  ? ktime_get_ts64+0x86/0x230
[   15.957300]  kunit_try_run_case+0x1a5/0x480
[   15.957327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.957371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.957395]  ? __kthread_parkme+0x82/0x180
[   15.957425]  ? preempt_count_sub+0x50/0x80
[   15.957470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.957553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.958015]  kthread+0x337/0x6f0
[   15.958086]  ? trace_preempt_on+0x20/0xc0
[   15.958133]  ? __pfx_kthread+0x10/0x10
[   15.958170]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.958207]  ? calculate_sigpending+0x7b/0xa0
[   15.958263]  ? __pfx_kthread+0x10/0x10
[   15.958356]  ret_from_fork+0x116/0x1d0
[   15.958397]  ? __pfx_kthread+0x10/0x10
[   15.958437]  ret_from_fork_asm+0x1a/0x30
[   15.958713]  </TASK>
[   15.958761] 
[   15.971285] The buggy address belongs to the physical page:
[   15.971827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c
[   15.972447] flags: 0x200000000000000(node=0|zone=2)
[   15.973039] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   15.973426] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.974164] page dumped because: kasan: bad access detected
[   15.974560] 
[   15.974672] Memory state around the buggy address:
[   15.975164]  ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.975617]  ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.975998] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.976295]                    ^
[   15.976515]  ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.976854]  ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.977173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[   15.853734] ==================================================================
[   15.854210] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   15.854782] Read of size 1 at addr ffff888103c2c000 by task kunit_try_catch/251
[   15.855058] 
[   15.855319] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.855931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.855957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.855996] Call Trace:
[   15.856024]  <TASK>
[   15.856059]  dump_stack_lvl+0x73/0xb0
[   15.856399]  print_report+0xd1/0x650
[   15.856429]  ? __virt_addr_valid+0x1db/0x2d0
[   15.856456]  ? mempool_uaf_helper+0x392/0x400
[   15.856617]  ? kasan_addr_to_slab+0x11/0xa0
[   15.856649]  ? mempool_uaf_helper+0x392/0x400
[   15.856672]  kasan_report+0x141/0x180
[   15.856696]  ? mempool_uaf_helper+0x392/0x400
[   15.856722]  __asan_report_load1_noabort+0x18/0x20
[   15.856742]  mempool_uaf_helper+0x392/0x400
[   15.856764]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.856788]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.856810]  ? finish_task_switch.isra.0+0x153/0x700
[   15.856835]  mempool_page_alloc_uaf+0xed/0x140
[   15.856858]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   15.856883]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   15.856905]  ? __pfx_mempool_free_pages+0x10/0x10
[   15.856927]  ? __pfx_read_tsc+0x10/0x10
[   15.856948]  ? ktime_get_ts64+0x86/0x230
[   15.856972]  kunit_try_run_case+0x1a5/0x480
[   15.856997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.857018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.857040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.857062]  ? __kthread_parkme+0x82/0x180
[   15.857083]  ? preempt_count_sub+0x50/0x80
[   15.857105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.857127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.857149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.857171]  kthread+0x337/0x6f0
[   15.857189]  ? trace_preempt_on+0x20/0xc0
[   15.857212]  ? __pfx_kthread+0x10/0x10
[   15.857255]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.857275]  ? calculate_sigpending+0x7b/0xa0
[   15.857298]  ? __pfx_kthread+0x10/0x10
[   15.857319]  ret_from_fork+0x116/0x1d0
[   15.857337]  ? __pfx_kthread+0x10/0x10
[   15.857356]  ret_from_fork_asm+0x1a/0x30
[   15.857388]  </TASK>
[   15.857401] 
[   15.870560] The buggy address belongs to the physical page:
[   15.871493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c
[   15.872347] flags: 0x200000000000000(node=0|zone=2)
[   15.872922] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   15.873435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.873914] page dumped because: kasan: bad access detected
[   15.874139] 
[   15.874321] Memory state around the buggy address:
[   15.874550]  ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.874866]  ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.875332] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.876178]                    ^
[   15.876445]  ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.877084]  ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.877423] ==================================================================
[   15.772423] ==================================================================
[   15.773192] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   15.773647] Read of size 1 at addr ffff888103c2c000 by task kunit_try_catch/247
[   15.774105] 
[   15.774269] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.774381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.774408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.774449] Call Trace:
[   15.774475]  <TASK>
[   15.774508]  dump_stack_lvl+0x73/0xb0
[   15.774565]  print_report+0xd1/0x650
[   15.774613]  ? __virt_addr_valid+0x1db/0x2d0
[   15.774663]  ? mempool_uaf_helper+0x392/0x400
[   15.774710]  ? kasan_addr_to_slab+0x11/0xa0
[   15.774751]  ? mempool_uaf_helper+0x392/0x400
[   15.774790]  kasan_report+0x141/0x180
[   15.774834]  ? mempool_uaf_helper+0x392/0x400
[   15.774886]  __asan_report_load1_noabort+0x18/0x20
[   15.774924]  mempool_uaf_helper+0x392/0x400
[   15.774965]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.775014]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.775058]  ? finish_task_switch.isra.0+0x153/0x700
[   15.775118]  mempool_kmalloc_large_uaf+0xef/0x140
[   15.775155]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   15.775214]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.775265]  ? __pfx_mempool_kfree+0x10/0x10
[   15.775304]  ? __pfx_read_tsc+0x10/0x10
[   15.775343]  ? ktime_get_ts64+0x86/0x230
[   15.775388]  kunit_try_run_case+0x1a5/0x480
[   15.775431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.775493]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.775539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.775587]  ? __kthread_parkme+0x82/0x180
[   15.775626]  ? preempt_count_sub+0x50/0x80
[   15.775667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.775708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.775790]  kthread+0x337/0x6f0
[   15.775819]  ? trace_preempt_on+0x20/0xc0
[   15.775855]  ? __pfx_kthread+0x10/0x10
[   15.775888]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.775928]  ? calculate_sigpending+0x7b/0xa0
[   15.775974]  ? __pfx_kthread+0x10/0x10
[   15.776035]  ret_from_fork+0x116/0x1d0
[   15.776056]  ? __pfx_kthread+0x10/0x10
[   15.776077]  ret_from_fork_asm+0x1a/0x30
[   15.776109]  </TASK>
[   15.776123] 
[   15.786754] The buggy address belongs to the physical page:
[   15.787162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c
[   15.787860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.788268] flags: 0x200000000000040(head|node=0|zone=2)
[   15.788751] page_type: f8(unknown)
[   15.788937] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.789433] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.789992] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.790851] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.791425] head: 0200000000000002 ffffea00040f0b01 00000000ffffffff 00000000ffffffff
[   15.791931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.792312] page dumped because: kasan: bad access detected
[   15.792718] 
[   15.792888] Memory state around the buggy address:
[   15.793143]  ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.793580]  ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.793848] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.794278]                    ^
[   15.794676]  ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.795154]  ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.795412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[   15.805408] ==================================================================
[   15.806446] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.807328] Read of size 1 at addr ffff888102b6a240 by task kunit_try_catch/249
[   15.807655] 
[   15.807821] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.807982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.808011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.808054] Call Trace:
[   15.808084]  <TASK>
[   15.808122]  dump_stack_lvl+0x73/0xb0
[   15.808189]  print_report+0xd1/0x650
[   15.808256]  ? __virt_addr_valid+0x1db/0x2d0
[   15.808312]  ? mempool_uaf_helper+0x392/0x400
[   15.808353]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.808405]  ? mempool_uaf_helper+0x392/0x400
[   15.808652]  kasan_report+0x141/0x180
[   15.808718]  ? mempool_uaf_helper+0x392/0x400
[   15.808780]  __asan_report_load1_noabort+0x18/0x20
[   15.808818]  mempool_uaf_helper+0x392/0x400
[   15.808858]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.808916]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.808947]  ? finish_task_switch.isra.0+0x153/0x700
[   15.808976]  mempool_slab_uaf+0xea/0x140
[   15.808999]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   15.809023]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.809048]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.809072]  ? __pfx_read_tsc+0x10/0x10
[   15.809095]  ? ktime_get_ts64+0x86/0x230
[   15.809123]  kunit_try_run_case+0x1a5/0x480
[   15.809152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.809175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.809200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.809245]  ? __kthread_parkme+0x82/0x180
[   15.809272]  ? preempt_count_sub+0x50/0x80
[   15.809297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.809322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.809346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.809370]  kthread+0x337/0x6f0
[   15.809391]  ? trace_preempt_on+0x20/0xc0
[   15.809417]  ? __pfx_kthread+0x10/0x10
[   15.809438]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.809465]  ? calculate_sigpending+0x7b/0xa0
[   15.809512]  ? __pfx_kthread+0x10/0x10
[   15.809546]  ret_from_fork+0x116/0x1d0
[   15.809576]  ? __pfx_kthread+0x10/0x10
[   15.809619]  ret_from_fork_asm+0x1a/0x30
[   15.809655]  </TASK>
[   15.809669] 
[   15.821046] Allocated by task 249:
[   15.821208]  kasan_save_stack+0x45/0x70
[   15.822388]  kasan_save_track+0x18/0x40
[   15.822601]  kasan_save_alloc_info+0x3b/0x50
[   15.822752]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.824219]  remove_element+0x11e/0x190
[   15.824681]  mempool_alloc_preallocated+0x4d/0x90
[   15.824988]  mempool_uaf_helper+0x96/0x400
[   15.825219]  mempool_slab_uaf+0xea/0x140
[   15.825436]  kunit_try_run_case+0x1a5/0x480
[   15.825664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.825983]  kthread+0x337/0x6f0
[   15.826186]  ret_from_fork+0x116/0x1d0
[   15.826423]  ret_from_fork_asm+0x1a/0x30
[   15.826621] 
[   15.826731] Freed by task 249:
[   15.826885]  kasan_save_stack+0x45/0x70
[   15.827177]  kasan_save_track+0x18/0x40
[   15.827517]  kasan_save_free_info+0x3f/0x60
[   15.827922]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.829068]  mempool_free+0x2ec/0x380
[   15.829398]  mempool_uaf_helper+0x11a/0x400
[   15.829908]  mempool_slab_uaf+0xea/0x140
[   15.830174]  kunit_try_run_case+0x1a5/0x480
[   15.830738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.831137]  kthread+0x337/0x6f0
[   15.831357]  ret_from_fork+0x116/0x1d0
[   15.832050]  ret_from_fork_asm+0x1a/0x30
[   15.832450] 
[   15.832892] The buggy address belongs to the object at ffff888102b6a240
[   15.832892]  which belongs to the cache test_cache of size 123
[   15.833781] The buggy address is located 0 bytes inside of
[   15.833781]  freed 123-byte region [ffff888102b6a240, ffff888102b6a2bb)
[   15.834429] 
[   15.834853] The buggy address belongs to the physical page:
[   15.835262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6a
[   15.835667] flags: 0x200000000000000(node=0|zone=2)
[   15.835922] page_type: f5(slab)
[   15.836203] raw: 0200000000000000 ffff8881009b3dc0 dead000000000122 0000000000000000
[   15.837285] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.837933] page dumped because: kasan: bad access detected
[   15.838510] 
[   15.838857] Memory state around the buggy address:
[   15.839293]  ffff888102b6a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840160]  ffff888102b6a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.840631] >ffff888102b6a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   15.841069]                                            ^
[   15.841604]  ffff888102b6a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.842014]  ffff888102b6a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842342] ==================================================================
[   15.731092] ==================================================================
[   15.731578] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   15.732529] Read of size 1 at addr ffff88810231a200 by task kunit_try_catch/245
[   15.732934] 
[   15.733386] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.733493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.733515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.733554] Call Trace:
[   15.733576]  <TASK>
[   15.733608]  dump_stack_lvl+0x73/0xb0
[   15.733660]  print_report+0xd1/0x650
[   15.733702]  ? __virt_addr_valid+0x1db/0x2d0
[   15.733744]  ? mempool_uaf_helper+0x392/0x400
[   15.733777]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.733817]  ? mempool_uaf_helper+0x392/0x400
[   15.733857]  kasan_report+0x141/0x180
[   15.733899]  ? mempool_uaf_helper+0x392/0x400
[   15.733949]  __asan_report_load1_noabort+0x18/0x20
[   15.733983]  mempool_uaf_helper+0x392/0x400
[   15.734025]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.734070]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.734109]  ? irqentry_exit+0x2a/0x60
[   15.734150]  mempool_kmalloc_uaf+0xef/0x140
[   15.734185]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   15.734212]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.734265]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.734298]  ? __pfx_mempool_kfree+0x10/0x10
[   15.734342]  ? __pfx_read_tsc+0x10/0x10
[   15.734383]  ? ktime_get_ts64+0x86/0x230
[   15.734433]  kunit_try_run_case+0x1a5/0x480
[   15.734473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.734563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.734642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.734686]  ? __kthread_parkme+0x82/0x180
[   15.734717]  ? preempt_count_sub+0x50/0x80
[   15.734741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.734763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.734785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.734806]  kthread+0x337/0x6f0
[   15.734825]  ? trace_preempt_on+0x20/0xc0
[   15.734848]  ? __pfx_kthread+0x10/0x10
[   15.734867]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.734887]  ? calculate_sigpending+0x7b/0xa0
[   15.734910]  ? __pfx_kthread+0x10/0x10
[   15.734930]  ret_from_fork+0x116/0x1d0
[   15.734948]  ? __pfx_kthread+0x10/0x10
[   15.734966]  ret_from_fork_asm+0x1a/0x30
[   15.734996]  </TASK>
[   15.735010] 
[   15.745304] Allocated by task 245:
[   15.745489]  kasan_save_stack+0x45/0x70
[   15.745688]  kasan_save_track+0x18/0x40
[   15.745859]  kasan_save_alloc_info+0x3b/0x50
[   15.746031]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.746406]  remove_element+0x11e/0x190
[   15.746693]  mempool_alloc_preallocated+0x4d/0x90
[   15.747038]  mempool_uaf_helper+0x96/0x400
[   15.747945]  mempool_kmalloc_uaf+0xef/0x140
[   15.748292]  kunit_try_run_case+0x1a5/0x480
[   15.748759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749002]  kthread+0x337/0x6f0
[   15.749168]  ret_from_fork+0x116/0x1d0
[   15.749899]  ret_from_fork_asm+0x1a/0x30
[   15.750252] 
[   15.750423] Freed by task 245:
[   15.750839]  kasan_save_stack+0x45/0x70
[   15.751156]  kasan_save_track+0x18/0x40
[   15.751351]  kasan_save_free_info+0x3f/0x60
[   15.751792]  __kasan_mempool_poison_object+0x131/0x1d0
[   15.752062]  mempool_free+0x2ec/0x380
[   15.752325]  mempool_uaf_helper+0x11a/0x400
[   15.752662]  mempool_kmalloc_uaf+0xef/0x140
[   15.752996]  kunit_try_run_case+0x1a5/0x480
[   15.753230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.753434]  kthread+0x337/0x6f0
[   15.755448]  ret_from_fork+0x116/0x1d0
[   15.756250]  ret_from_fork_asm+0x1a/0x30
[   15.757153] 
[   15.757638] The buggy address belongs to the object at ffff88810231a200
[   15.757638]  which belongs to the cache kmalloc-128 of size 128
[   15.759663] The buggy address is located 0 bytes inside of
[   15.759663]  freed 128-byte region [ffff88810231a200, ffff88810231a280)
[   15.760197] 
[   15.760326] The buggy address belongs to the physical page:
[   15.760604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a
[   15.760933] flags: 0x200000000000000(node=0|zone=2)
[   15.761923] page_type: f5(slab)
[   15.762183] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.762647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.763147] page dumped because: kasan: bad access detected
[   15.763356] 
[   15.764034] Memory state around the buggy address:
[   15.764366]  ffff88810231a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.764801]  ffff88810231a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765268] >ffff88810231a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.765546]                    ^
[   15.765790]  ffff88810231a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766030]  ffff88810231a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.766504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[   15.690966] ==================================================================
[   15.691410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.691928] Read of size 1 at addr ffff888102b682bb by task kunit_try_catch/243
[   15.692667] 
[   15.692924] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.693344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.693382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.693451] Call Trace:
[   15.693479]  <TASK>
[   15.693520]  dump_stack_lvl+0x73/0xb0
[   15.693631]  print_report+0xd1/0x650
[   15.693678]  ? __virt_addr_valid+0x1db/0x2d0
[   15.693725]  ? mempool_oob_right_helper+0x318/0x380
[   15.693769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.693812]  ? mempool_oob_right_helper+0x318/0x380
[   15.693855]  kasan_report+0x141/0x180
[   15.693896]  ? mempool_oob_right_helper+0x318/0x380
[   15.693933]  __asan_report_load1_noabort+0x18/0x20
[   15.693956]  mempool_oob_right_helper+0x318/0x380
[   15.693984]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.694014]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.694042]  ? finish_task_switch.isra.0+0x153/0x700
[   15.694073]  mempool_slab_oob_right+0xed/0x140
[   15.694098]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   15.694125]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.694149]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.694174]  ? __pfx_read_tsc+0x10/0x10
[   15.694197]  ? ktime_get_ts64+0x86/0x230
[   15.694248]  kunit_try_run_case+0x1a5/0x480
[   15.694280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.694306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.694341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.694376]  ? __kthread_parkme+0x82/0x180
[   15.694403]  ? preempt_count_sub+0x50/0x80
[   15.694430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.694462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.694534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.694580]  kthread+0x337/0x6f0
[   15.694614]  ? trace_preempt_on+0x20/0xc0
[   15.694654]  ? __pfx_kthread+0x10/0x10
[   15.694676]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.694698]  ? calculate_sigpending+0x7b/0xa0
[   15.694724]  ? __pfx_kthread+0x10/0x10
[   15.694747]  ret_from_fork+0x116/0x1d0
[   15.694766]  ? __pfx_kthread+0x10/0x10
[   15.694788]  ret_from_fork_asm+0x1a/0x30
[   15.694822]  </TASK>
[   15.694835] 
[   15.706611] Allocated by task 243:
[   15.706905]  kasan_save_stack+0x45/0x70
[   15.707247]  kasan_save_track+0x18/0x40
[   15.707549]  kasan_save_alloc_info+0x3b/0x50
[   15.707857]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.708754]  remove_element+0x11e/0x190
[   15.709054]  mempool_alloc_preallocated+0x4d/0x90
[   15.709352]  mempool_oob_right_helper+0x8a/0x380
[   15.709805]  mempool_slab_oob_right+0xed/0x140
[   15.710133]  kunit_try_run_case+0x1a5/0x480
[   15.710426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.710937]  kthread+0x337/0x6f0
[   15.711198]  ret_from_fork+0x116/0x1d0
[   15.711414]  ret_from_fork_asm+0x1a/0x30
[   15.712109] 
[   15.712254] The buggy address belongs to the object at ffff888102b68240
[   15.712254]  which belongs to the cache test_cache of size 123
[   15.713076] The buggy address is located 0 bytes to the right of
[   15.713076]  allocated 123-byte region [ffff888102b68240, ffff888102b682bb)
[   15.713704] 
[   15.713859] The buggy address belongs to the physical page:
[   15.714234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68
[   15.714924] flags: 0x200000000000000(node=0|zone=2)
[   15.715164] page_type: f5(slab)
[   15.715444] raw: 0200000000000000 ffff8881009b3c80 dead000000000122 0000000000000000
[   15.716190] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.716847] page dumped because: kasan: bad access detected
[   15.717092] 
[   15.717195] Memory state around the buggy address:
[   15.717699]  ffff888102b68180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.718111]  ffff888102b68200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   15.718648] >ffff888102b68280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   15.719048]                                         ^
[   15.719299]  ffff888102b68300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720167]  ffff888102b68380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720741] ==================================================================
[   15.660100] ==================================================================
[   15.660553] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.661334] Read of size 1 at addr ffff888103c2a001 by task kunit_try_catch/241
[   15.662112] 
[   15.662303] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.662414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.662433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.662460] Call Trace:
[   15.662486]  <TASK>
[   15.662515]  dump_stack_lvl+0x73/0xb0
[   15.662556]  print_report+0xd1/0x650
[   15.662580]  ? __virt_addr_valid+0x1db/0x2d0
[   15.662605]  ? mempool_oob_right_helper+0x318/0x380
[   15.662628]  ? kasan_addr_to_slab+0x11/0xa0
[   15.662648]  ? mempool_oob_right_helper+0x318/0x380
[   15.662670]  kasan_report+0x141/0x180
[   15.662691]  ? mempool_oob_right_helper+0x318/0x380
[   15.662718]  __asan_report_load1_noabort+0x18/0x20
[   15.662737]  mempool_oob_right_helper+0x318/0x380
[   15.662761]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.662786]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.662810]  ? finish_task_switch.isra.0+0x153/0x700
[   15.662836]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   15.662859]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   15.662884]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.662906]  ? __pfx_mempool_kfree+0x10/0x10
[   15.662927]  ? __pfx_read_tsc+0x10/0x10
[   15.662948]  ? ktime_get_ts64+0x86/0x230
[   15.662973]  kunit_try_run_case+0x1a5/0x480
[   15.662999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.663019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.663042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.663064]  ? __kthread_parkme+0x82/0x180
[   15.663085]  ? preempt_count_sub+0x50/0x80
[   15.663107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.663129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.663151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.663173]  kthread+0x337/0x6f0
[   15.663192]  ? trace_preempt_on+0x20/0xc0
[   15.663214]  ? __pfx_kthread+0x10/0x10
[   15.663261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.663431]  ? calculate_sigpending+0x7b/0xa0
[   15.663575]  ? __pfx_kthread+0x10/0x10
[   15.663621]  ret_from_fork+0x116/0x1d0
[   15.663663]  ? __pfx_kthread+0x10/0x10
[   15.663707]  ret_from_fork_asm+0x1a/0x30
[   15.663791]  </TASK>
[   15.663817] 
[   15.674855] The buggy address belongs to the physical page:
[   15.675313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c28
[   15.675830] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.676563] flags: 0x200000000000040(head|node=0|zone=2)
[   15.676922] page_type: f8(unknown)
[   15.677264] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.677886] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.678340] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.678782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.679179] head: 0200000000000002 ffffea00040f0a01 00000000ffffffff 00000000ffffffff
[   15.679681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.679940] page dumped because: kasan: bad access detected
[   15.680133] 
[   15.680315] Memory state around the buggy address:
[   15.680747]  ffff888103c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.681385]  ffff888103c29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.681865] >ffff888103c2a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.682371]                    ^
[   15.682546]  ffff888103c2a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.683151]  ffff888103c2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.683693] ==================================================================
[   15.625661] ==================================================================
[   15.626110] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.626869] Read of size 1 at addr ffff888102b5b373 by task kunit_try_catch/239
[   15.627435] 
[   15.628046] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.628169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.628194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.628250] Call Trace:
[   15.628292]  <TASK>
[   15.628384]  dump_stack_lvl+0x73/0xb0
[   15.628560]  print_report+0xd1/0x650
[   15.628628]  ? __virt_addr_valid+0x1db/0x2d0
[   15.628674]  ? mempool_oob_right_helper+0x318/0x380
[   15.628704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.628727]  ? mempool_oob_right_helper+0x318/0x380
[   15.628751]  kasan_report+0x141/0x180
[   15.628773]  ? mempool_oob_right_helper+0x318/0x380
[   15.628802]  __asan_report_load1_noabort+0x18/0x20
[   15.628823]  mempool_oob_right_helper+0x318/0x380
[   15.628848]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.628875]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.628899]  ? irqentry_exit+0x2a/0x60
[   15.628922]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.628949]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.628973]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.629001]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.629022]  ? __pfx_mempool_kfree+0x10/0x10
[   15.629043]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.629069]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.629094]  kunit_try_run_case+0x1a5/0x480
[   15.629121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.629142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.629165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.629187]  ? __kthread_parkme+0x82/0x180
[   15.629210]  ? preempt_count_sub+0x50/0x80
[   15.629257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.629283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.629307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.629329]  kthread+0x337/0x6f0
[   15.629349]  ? trace_preempt_on+0x20/0xc0
[   15.629372]  ? __pfx_kthread+0x10/0x10
[   15.629392]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.629414]  ? calculate_sigpending+0x7b/0xa0
[   15.629440]  ? __pfx_kthread+0x10/0x10
[   15.629476]  ret_from_fork+0x116/0x1d0
[   15.629523]  ? __pfx_kthread+0x10/0x10
[   15.629557]  ret_from_fork_asm+0x1a/0x30
[   15.629610]  </TASK>
[   15.629630] 
[   15.639245] Allocated by task 239:
[   15.639428]  kasan_save_stack+0x45/0x70
[   15.639639]  kasan_save_track+0x18/0x40
[   15.639936]  kasan_save_alloc_info+0x3b/0x50
[   15.640340]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.640769]  remove_element+0x11e/0x190
[   15.641071]  mempool_alloc_preallocated+0x4d/0x90
[   15.641318]  mempool_oob_right_helper+0x8a/0x380
[   15.641504]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.641696]  kunit_try_run_case+0x1a5/0x480
[   15.642011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.642395]  kthread+0x337/0x6f0
[   15.642678]  ret_from_fork+0x116/0x1d0
[   15.642940]  ret_from_fork_asm+0x1a/0x30
[   15.643114] 
[   15.643414] The buggy address belongs to the object at ffff888102b5b300
[   15.643414]  which belongs to the cache kmalloc-128 of size 128
[   15.644881] The buggy address is located 0 bytes to the right of
[   15.644881]  allocated 115-byte region [ffff888102b5b300, ffff888102b5b373)
[   15.645518] 
[   15.645826] The buggy address belongs to the physical page:
[   15.646134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   15.646780] flags: 0x200000000000000(node=0|zone=2)
[   15.647129] page_type: f5(slab)
[   15.647432] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.647732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.647988] page dumped because: kasan: bad access detected
[   15.648187] 
[   15.648560] Memory state around the buggy address:
[   15.648925]  ffff888102b5b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.649403]  ffff888102b5b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.650416] >ffff888102b5b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.651004]                                                              ^
[   15.651264]  ffff888102b5b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651735]  ffff888102b5b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.652267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[   15.034267] ==================================================================
[   15.034788] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   15.035324] Read of size 1 at addr ffff8881009b3a00 by task kunit_try_catch/233
[   15.035678] 
[   15.035821] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   15.036053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.036077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.036116] Call Trace:
[   15.036140]  <TASK>
[   15.036174]  dump_stack_lvl+0x73/0xb0
[   15.036248]  print_report+0xd1/0x650
[   15.036298]  ? __virt_addr_valid+0x1db/0x2d0
[   15.036350]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.036395]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.036443]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.036484]  kasan_report+0x141/0x180
[   15.036523]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.036562]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.036596]  __kasan_check_byte+0x3d/0x50
[   15.036638]  kmem_cache_destroy+0x25/0x1d0
[   15.036684]  kmem_cache_double_destroy+0x1bf/0x380
[   15.036720]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   15.036982]  ? finish_task_switch.isra.0+0x153/0x700
[   15.037034]  ? __switch_to+0x47/0xf50
[   15.037109]  ? __pfx_read_tsc+0x10/0x10
[   15.037172]  ? ktime_get_ts64+0x86/0x230
[   15.037234]  kunit_try_run_case+0x1a5/0x480
[   15.037273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.037323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.037346]  ? __kthread_parkme+0x82/0x180
[   15.037376]  ? preempt_count_sub+0x50/0x80
[   15.037416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.037540]  kthread+0x337/0x6f0
[   15.037587]  ? trace_preempt_on+0x20/0xc0
[   15.037650]  ? __pfx_kthread+0x10/0x10
[   15.037694]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.037730]  ? calculate_sigpending+0x7b/0xa0
[   15.037778]  ? __pfx_kthread+0x10/0x10
[   15.037820]  ret_from_fork+0x116/0x1d0
[   15.037955]  ? __pfx_kthread+0x10/0x10
[   15.037995]  ret_from_fork_asm+0x1a/0x30
[   15.038056]  </TASK>
[   15.038077] 
[   15.050094] Allocated by task 233:
[   15.050465]  kasan_save_stack+0x45/0x70
[   15.050861]  kasan_save_track+0x18/0x40
[   15.051056]  kasan_save_alloc_info+0x3b/0x50
[   15.051250]  __kasan_slab_alloc+0x91/0xa0
[   15.051559]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.052698]  __kmem_cache_create_args+0x169/0x240
[   15.053113]  kmem_cache_double_destroy+0xd5/0x380
[   15.053656]  kunit_try_run_case+0x1a5/0x480
[   15.053978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.054433]  kthread+0x337/0x6f0
[   15.054846]  ret_from_fork+0x116/0x1d0
[   15.055059]  ret_from_fork_asm+0x1a/0x30
[   15.055239] 
[   15.055328] Freed by task 233:
[   15.055629]  kasan_save_stack+0x45/0x70
[   15.056464]  kasan_save_track+0x18/0x40
[   15.057065]  kasan_save_free_info+0x3f/0x60
[   15.057372]  __kasan_slab_free+0x56/0x70
[   15.057692]  kmem_cache_free+0x249/0x420
[   15.057930]  slab_kmem_cache_release+0x2e/0x40
[   15.058284]  kmem_cache_release+0x16/0x20
[   15.058723]  kobject_put+0x181/0x450
[   15.058967]  sysfs_slab_release+0x16/0x20
[   15.059333]  kmem_cache_destroy+0xf0/0x1d0
[   15.059575]  kmem_cache_double_destroy+0x14e/0x380
[   15.059770]  kunit_try_run_case+0x1a5/0x480
[   15.060874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.061572]  kthread+0x337/0x6f0
[   15.061854]  ret_from_fork+0x116/0x1d0
[   15.062120]  ret_from_fork_asm+0x1a/0x30
[   15.062441] 
[   15.062568] The buggy address belongs to the object at ffff8881009b3a00
[   15.062568]  which belongs to the cache kmem_cache of size 208
[   15.063330] The buggy address is located 0 bytes inside of
[   15.063330]  freed 208-byte region [ffff8881009b3a00, ffff8881009b3ad0)
[   15.064063] 
[   15.064181] The buggy address belongs to the physical page:
[   15.064393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009b3
[   15.064850] flags: 0x200000000000000(node=0|zone=2)
[   15.065347] page_type: f5(slab)
[   15.065706] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   15.066163] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   15.067261] page dumped because: kasan: bad access detected
[   15.067506] 
[   15.067615] Memory state around the buggy address:
[   15.067813]  ffff8881009b3900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.068373]  ffff8881009b3980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.068990] >ffff8881009b3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.069560]                    ^
[   15.069991]  ffff8881009b3a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   15.070419]  ffff8881009b3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.071269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[   14.962943] ==================================================================
[   14.963524] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   14.964518] Read of size 1 at addr ffff888102316000 by task kunit_try_catch/231
[   14.964942] 
[   14.965098] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.965315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.965337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.965381] Call Trace:
[   14.965409]  <TASK>
[   14.965444]  dump_stack_lvl+0x73/0xb0
[   14.965522]  print_report+0xd1/0x650
[   14.965570]  ? __virt_addr_valid+0x1db/0x2d0
[   14.965612]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   14.965647]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.966101]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   14.966129]  kasan_report+0x141/0x180
[   14.966153]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   14.966179]  __asan_report_load1_noabort+0x18/0x20
[   14.966198]  kmem_cache_rcu_uaf+0x3e3/0x510
[   14.966238]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   14.966266]  ? finish_task_switch.isra.0+0x153/0x700
[   14.966292]  ? __switch_to+0x47/0xf50
[   14.966321]  ? __pfx_read_tsc+0x10/0x10
[   14.966354]  ? ktime_get_ts64+0x86/0x230
[   14.966381]  kunit_try_run_case+0x1a5/0x480
[   14.966409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.966430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.966858]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.966886]  ? __kthread_parkme+0x82/0x180
[   14.966911]  ? preempt_count_sub+0x50/0x80
[   14.966935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.966957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.966979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.967001]  kthread+0x337/0x6f0
[   14.967021]  ? trace_preempt_on+0x20/0xc0
[   14.967045]  ? __pfx_kthread+0x10/0x10
[   14.967064]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.967085]  ? calculate_sigpending+0x7b/0xa0
[   14.967109]  ? __pfx_kthread+0x10/0x10
[   14.967130]  ret_from_fork+0x116/0x1d0
[   14.967148]  ? __pfx_kthread+0x10/0x10
[   14.967168]  ret_from_fork_asm+0x1a/0x30
[   14.967200]  </TASK>
[   14.967213] 
[   14.977464] Allocated by task 231:
[   14.977900]  kasan_save_stack+0x45/0x70
[   14.978273]  kasan_save_track+0x18/0x40
[   14.978765]  kasan_save_alloc_info+0x3b/0x50
[   14.979049]  __kasan_slab_alloc+0x91/0xa0
[   14.979235]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.979629]  kmem_cache_rcu_uaf+0x155/0x510
[   14.980557]  kunit_try_run_case+0x1a5/0x480
[   14.981239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981839]  kthread+0x337/0x6f0
[   14.982094]  ret_from_fork+0x116/0x1d0
[   14.982361]  ret_from_fork_asm+0x1a/0x30
[   14.982605] 
[   14.982762] Freed by task 0:
[   14.982945]  kasan_save_stack+0x45/0x70
[   14.983869]  kasan_save_track+0x18/0x40
[   14.984200]  kasan_save_free_info+0x3f/0x60
[   14.984922]  __kasan_slab_free+0x56/0x70
[   14.985191]  slab_free_after_rcu_debug+0xe4/0x310
[   14.985688]  rcu_core+0x66f/0x1c40
[   14.985877]  rcu_core_si+0x12/0x20
[   14.986161]  handle_softirqs+0x209/0x730
[   14.986404]  __irq_exit_rcu+0xc9/0x110
[   14.986573]  irq_exit_rcu+0x12/0x20
[   14.986754]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.987201]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.987726] 
[   14.988295] Last potentially related work creation:
[   14.988570]  kasan_save_stack+0x45/0x70
[   14.989094]  kasan_record_aux_stack+0xb2/0xc0
[   14.989338]  kmem_cache_free+0x131/0x420
[   14.989670]  kmem_cache_rcu_uaf+0x194/0x510
[   14.990194]  kunit_try_run_case+0x1a5/0x480
[   14.990410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.990915]  kthread+0x337/0x6f0
[   14.991088]  ret_from_fork+0x116/0x1d0
[   14.991363]  ret_from_fork_asm+0x1a/0x30
[   14.992057] 
[   14.992263] The buggy address belongs to the object at ffff888102316000
[   14.992263]  which belongs to the cache test_cache of size 200
[   14.992848] The buggy address is located 0 bytes inside of
[   14.992848]  freed 200-byte region [ffff888102316000, ffff8881023160c8)
[   14.993667] 
[   14.993786] The buggy address belongs to the physical page:
[   14.994431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102316
[   14.994836] flags: 0x200000000000000(node=0|zone=2)
[   14.995121] page_type: f5(slab)
[   14.995333] raw: 0200000000000000 ffff888102312140 dead000000000122 0000000000000000
[   14.996259] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.996530] page dumped because: kasan: bad access detected
[   14.996894] 
[   14.997049] Memory state around the buggy address:
[   14.997544]  ffff888102315f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998125]  ffff888102315f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998636] >ffff888102316000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.999054]                    ^
[   14.999397]  ffff888102316080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   15.000230]  ffff888102316100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[   14.891230] ==================================================================
[   14.891765] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   14.892031] Free of addr ffff888102b5f001 by task kunit_try_catch/229
[   14.892254] 
[   14.892852] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.892982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.893028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.893076] Call Trace:
[   14.893123]  <TASK>
[   14.893164]  dump_stack_lvl+0x73/0xb0
[   14.893247]  print_report+0xd1/0x650
[   14.893300]  ? __virt_addr_valid+0x1db/0x2d0
[   14.893353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.893393]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.893434]  kasan_report_invalid_free+0x10a/0x130
[   14.893494]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.893541]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.893586]  check_slab_allocation+0x11f/0x130
[   14.893627]  __kasan_slab_pre_free+0x28/0x40
[   14.893670]  kmem_cache_free+0xed/0x420
[   14.893718]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   14.893793]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.893856]  kmem_cache_invalid_free+0x1d8/0x460
[   14.893901]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   14.893943]  ? finish_task_switch.isra.0+0x153/0x700
[   14.893996]  ? __switch_to+0x47/0xf50
[   14.894062]  ? __pfx_read_tsc+0x10/0x10
[   14.894109]  ? ktime_get_ts64+0x86/0x230
[   14.894154]  kunit_try_run_case+0x1a5/0x480
[   14.894197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.894242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.894302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.894328]  ? __kthread_parkme+0x82/0x180
[   14.894364]  ? preempt_count_sub+0x50/0x80
[   14.894390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.894416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.894443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.894474]  kthread+0x337/0x6f0
[   14.894522]  ? trace_preempt_on+0x20/0xc0
[   14.894587]  ? __pfx_kthread+0x10/0x10
[   14.894609]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.894631]  ? calculate_sigpending+0x7b/0xa0
[   14.894657]  ? __pfx_kthread+0x10/0x10
[   14.894679]  ret_from_fork+0x116/0x1d0
[   14.894698]  ? __pfx_kthread+0x10/0x10
[   14.894719]  ret_from_fork_asm+0x1a/0x30
[   14.894754]  </TASK>
[   14.894767] 
[   14.906180] Allocated by task 229:
[   14.906391]  kasan_save_stack+0x45/0x70
[   14.907013]  kasan_save_track+0x18/0x40
[   14.907380]  kasan_save_alloc_info+0x3b/0x50
[   14.907835]  __kasan_slab_alloc+0x91/0xa0
[   14.908165]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.908585]  kmem_cache_invalid_free+0x157/0x460
[   14.908959]  kunit_try_run_case+0x1a5/0x480
[   14.909298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909813]  kthread+0x337/0x6f0
[   14.910012]  ret_from_fork+0x116/0x1d0
[   14.910321]  ret_from_fork_asm+0x1a/0x30
[   14.910696] 
[   14.910811] The buggy address belongs to the object at ffff888102b5f000
[   14.910811]  which belongs to the cache test_cache of size 200
[   14.911689] The buggy address is located 1 bytes inside of
[   14.911689]  200-byte region [ffff888102b5f000, ffff888102b5f0c8)
[   14.912386] 
[   14.912639] The buggy address belongs to the physical page:
[   14.913037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5f
[   14.913713] flags: 0x200000000000000(node=0|zone=2)
[   14.914096] page_type: f5(slab)
[   14.914314] raw: 0200000000000000 ffff8881009b38c0 dead000000000122 0000000000000000
[   14.914906] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.915445] page dumped because: kasan: bad access detected
[   14.915851] 
[   14.916009] Memory state around the buggy address:
[   14.916319]  ffff888102b5ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.916985]  ffff888102b5ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917335] >ffff888102b5f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.917888]                    ^
[   14.918157]  ffff888102b5f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   14.918534]  ffff888102b5f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.918995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[   14.844989] ==================================================================
[   14.845972] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   14.846405] Free of addr ffff888102314000 by task kunit_try_catch/227
[   14.846840] 
[   14.846995] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.847091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.847114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.847153] Call Trace:
[   14.847177]  <TASK>
[   14.847210]  dump_stack_lvl+0x73/0xb0
[   14.847285]  print_report+0xd1/0x650
[   14.847333]  ? __virt_addr_valid+0x1db/0x2d0
[   14.847387]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.847430]  ? kmem_cache_double_free+0x1e5/0x480
[   14.847886]  kasan_report_invalid_free+0x10a/0x130
[   14.847959]  ? kmem_cache_double_free+0x1e5/0x480
[   14.848007]  ? kmem_cache_double_free+0x1e5/0x480
[   14.848045]  check_slab_allocation+0x101/0x130
[   14.848082]  __kasan_slab_pre_free+0x28/0x40
[   14.848115]  kmem_cache_free+0xed/0x420
[   14.848153]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   14.848191]  ? kmem_cache_double_free+0x1e5/0x480
[   14.848249]  kmem_cache_double_free+0x1e5/0x480
[   14.848295]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   14.848335]  ? finish_task_switch.isra.0+0x153/0x700
[   14.848386]  ? __switch_to+0x47/0xf50
[   14.848448]  ? __pfx_read_tsc+0x10/0x10
[   14.848526]  ? ktime_get_ts64+0x86/0x230
[   14.848571]  kunit_try_run_case+0x1a5/0x480
[   14.848618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.848651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.848685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.848708]  ? __kthread_parkme+0x82/0x180
[   14.848730]  ? preempt_count_sub+0x50/0x80
[   14.848754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.848777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.848821]  kthread+0x337/0x6f0
[   14.848840]  ? trace_preempt_on+0x20/0xc0
[   14.848864]  ? __pfx_kthread+0x10/0x10
[   14.848884]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.848904]  ? calculate_sigpending+0x7b/0xa0
[   14.848928]  ? __pfx_kthread+0x10/0x10
[   14.848948]  ret_from_fork+0x116/0x1d0
[   14.848966]  ? __pfx_kthread+0x10/0x10
[   14.848986]  ret_from_fork_asm+0x1a/0x30
[   14.849019]  </TASK>
[   14.849032] 
[   14.861870] Allocated by task 227:
[   14.862188]  kasan_save_stack+0x45/0x70
[   14.863109]  kasan_save_track+0x18/0x40
[   14.863403]  kasan_save_alloc_info+0x3b/0x50
[   14.863890]  __kasan_slab_alloc+0x91/0xa0
[   14.864077]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.864431]  kmem_cache_double_free+0x14f/0x480
[   14.864686]  kunit_try_run_case+0x1a5/0x480
[   14.864885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.865093]  kthread+0x337/0x6f0
[   14.865365]  ret_from_fork+0x116/0x1d0
[   14.865622]  ret_from_fork_asm+0x1a/0x30
[   14.865833] 
[   14.865992] Freed by task 227:
[   14.866159]  kasan_save_stack+0x45/0x70
[   14.866957]  kasan_save_track+0x18/0x40
[   14.867165]  kasan_save_free_info+0x3f/0x60
[   14.867663]  __kasan_slab_free+0x56/0x70
[   14.867993]  kmem_cache_free+0x249/0x420
[   14.868304]  kmem_cache_double_free+0x16a/0x480
[   14.868624]  kunit_try_run_case+0x1a5/0x480
[   14.868959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869378]  kthread+0x337/0x6f0
[   14.869717]  ret_from_fork+0x116/0x1d0
[   14.870083]  ret_from_fork_asm+0x1a/0x30
[   14.870400] 
[   14.870592] The buggy address belongs to the object at ffff888102314000
[   14.870592]  which belongs to the cache test_cache of size 200
[   14.871417] The buggy address is located 0 bytes inside of
[   14.871417]  200-byte region [ffff888102314000, ffff8881023140c8)
[   14.871933] 
[   14.872091] The buggy address belongs to the physical page:
[   14.872906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   14.873585] flags: 0x200000000000000(node=0|zone=2)
[   14.873799] page_type: f5(slab)
[   14.874239] raw: 0200000000000000 ffff888102312000 dead000000000122 0000000000000000
[   14.874668] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.875167] page dumped because: kasan: bad access detected
[   14.875965] 
[   14.876094] Memory state around the buggy address:
[   14.876291]  ffff888102313f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.876760]  ffff888102313f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877078] >ffff888102314000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.878008]                    ^
[   14.878320]  ffff888102314080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   14.879015]  ffff888102314100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[   14.796769] ==================================================================
[   14.797743] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   14.798207] Read of size 1 at addr ffff888102b5e0c8 by task kunit_try_catch/225
[   14.798599] 
[   14.798813] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.798960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.798982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.799039] Call Trace:
[   14.799065]  <TASK>
[   14.799098]  dump_stack_lvl+0x73/0xb0
[   14.799162]  print_report+0xd1/0x650
[   14.799210]  ? __virt_addr_valid+0x1db/0x2d0
[   14.799269]  ? kmem_cache_oob+0x402/0x530
[   14.799308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.799343]  ? kmem_cache_oob+0x402/0x530
[   14.799375]  kasan_report+0x141/0x180
[   14.799415]  ? kmem_cache_oob+0x402/0x530
[   14.799488]  __asan_report_load1_noabort+0x18/0x20
[   14.799528]  kmem_cache_oob+0x402/0x530
[   14.799576]  ? trace_hardirqs_on+0x37/0xe0
[   14.799622]  ? __pfx_kmem_cache_oob+0x10/0x10
[   14.799662]  ? finish_task_switch.isra.0+0x153/0x700
[   14.799699]  ? __switch_to+0x47/0xf50
[   14.799759]  ? __pfx_read_tsc+0x10/0x10
[   14.799797]  ? ktime_get_ts64+0x86/0x230
[   14.799841]  kunit_try_run_case+0x1a5/0x480
[   14.799894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.799977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.800008]  ? __kthread_parkme+0x82/0x180
[   14.800031]  ? preempt_count_sub+0x50/0x80
[   14.800053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.800099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.800120]  kthread+0x337/0x6f0
[   14.800139]  ? trace_preempt_on+0x20/0xc0
[   14.800160]  ? __pfx_kthread+0x10/0x10
[   14.800180]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.800200]  ? calculate_sigpending+0x7b/0xa0
[   14.800244]  ? __pfx_kthread+0x10/0x10
[   14.800268]  ret_from_fork+0x116/0x1d0
[   14.800286]  ? __pfx_kthread+0x10/0x10
[   14.800306]  ret_from_fork_asm+0x1a/0x30
[   14.800339]  </TASK>
[   14.800352] 
[   14.812514] Allocated by task 225:
[   14.812928]  kasan_save_stack+0x45/0x70
[   14.813131]  kasan_save_track+0x18/0x40
[   14.813516]  kasan_save_alloc_info+0x3b/0x50
[   14.813796]  __kasan_slab_alloc+0x91/0xa0
[   14.813969]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.814131]  kmem_cache_oob+0x157/0x530
[   14.814467]  kunit_try_run_case+0x1a5/0x480
[   14.814859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815272]  kthread+0x337/0x6f0
[   14.815570]  ret_from_fork+0x116/0x1d0
[   14.816168]  ret_from_fork_asm+0x1a/0x30
[   14.816583] 
[   14.816723] The buggy address belongs to the object at ffff888102b5e000
[   14.816723]  which belongs to the cache test_cache of size 200
[   14.817108] The buggy address is located 0 bytes to the right of
[   14.817108]  allocated 200-byte region [ffff888102b5e000, ffff888102b5e0c8)
[   14.817718] 
[   14.817826] The buggy address belongs to the physical page:
[   14.818107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5e
[   14.818546] flags: 0x200000000000000(node=0|zone=2)
[   14.818764] page_type: f5(slab)
[   14.819024] raw: 0200000000000000 ffff8881009b3780 dead000000000122 0000000000000000
[   14.819400] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.819674] page dumped because: kasan: bad access detected
[   14.819872] 
[   14.819972] Memory state around the buggy address:
[   14.820301]  ffff888102b5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820730]  ffff888102b5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.821180] >ffff888102b5e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   14.821635]                                               ^
[   14.822471]  ffff888102b5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.823081]  ffff888102b5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.823431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[   14.745144] ==================================================================
[   14.746104] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560
[   14.746708] Read of size 8 at addr ffff88810230d400 by task kunit_try_catch/218
[   14.747121] 
[   14.747353] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.747454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.747479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.747518] Call Trace:
[   14.747545]  <TASK>
[   14.747583]  dump_stack_lvl+0x73/0xb0
[   14.747683]  print_report+0xd1/0x650
[   14.747745]  ? __virt_addr_valid+0x1db/0x2d0
[   14.747790]  ? workqueue_uaf+0x4d6/0x560
[   14.747834]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.747879]  ? workqueue_uaf+0x4d6/0x560
[   14.747924]  kasan_report+0x141/0x180
[   14.747964]  ? workqueue_uaf+0x4d6/0x560
[   14.748009]  __asan_report_load8_noabort+0x18/0x20
[   14.748050]  workqueue_uaf+0x4d6/0x560
[   14.748094]  ? __pfx_workqueue_uaf+0x10/0x10
[   14.748136]  ? irqentry_exit+0x2a/0x60
[   14.748177]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.748234]  ? __pfx_read_tsc+0x10/0x10
[   14.748268]  ? ktime_get_ts64+0x86/0x230
[   14.748308]  kunit_try_run_case+0x1a5/0x480
[   14.748348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.748417]  ? __kthread_parkme+0x82/0x180
[   14.748488]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   14.748629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.748732]  kthread+0x337/0x6f0
[   14.748761]  ? trace_preempt_on+0x20/0xc0
[   14.748797]  ? __pfx_kthread+0x10/0x10
[   14.748829]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.748852]  ? calculate_sigpending+0x7b/0xa0
[   14.748874]  ? __pfx_kthread+0x10/0x10
[   14.748894]  ret_from_fork+0x116/0x1d0
[   14.748912]  ? __pfx_kthread+0x10/0x10
[   14.748931]  ret_from_fork_asm+0x1a/0x30
[   14.748961]  </TASK>
[   14.748974] 
[   14.760359] Allocated by task 218:
[   14.760705]  kasan_save_stack+0x45/0x70
[   14.761024]  kasan_save_track+0x18/0x40
[   14.761907]  kasan_save_alloc_info+0x3b/0x50
[   14.762164]  __kasan_kmalloc+0xb7/0xc0
[   14.762478]  __kmalloc_cache_noprof+0x189/0x420
[   14.762944]  workqueue_uaf+0x152/0x560
[   14.763301]  kunit_try_run_case+0x1a5/0x480
[   14.763746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.764194]  kthread+0x337/0x6f0
[   14.764461]  ret_from_fork+0x116/0x1d0
[   14.764764]  ret_from_fork_asm+0x1a/0x30
[   14.765058] 
[   14.765219] Freed by task 24:
[   14.765457]  kasan_save_stack+0x45/0x70
[   14.765666]  kasan_save_track+0x18/0x40
[   14.765838]  kasan_save_free_info+0x3f/0x60
[   14.766014]  __kasan_slab_free+0x56/0x70
[   14.766170]  kfree+0x222/0x3f0
[   14.766687]  workqueue_uaf_work+0x12/0x20
[   14.767082]  process_one_work+0x5ee/0xf60
[   14.767984]  worker_thread+0x725/0x1320
[   14.768591]  kthread+0x337/0x6f0
[   14.769117]  ret_from_fork+0x116/0x1d0
[   14.769442]  ret_from_fork_asm+0x1a/0x30
[   14.769790] 
[   14.769942] Last potentially related work creation:
[   14.770154]  kasan_save_stack+0x45/0x70
[   14.770450]  kasan_record_aux_stack+0xb2/0xc0
[   14.770814]  __queue_work+0x626/0xeb0
[   14.771042]  queue_work_on+0xb6/0xc0
[   14.771338]  workqueue_uaf+0x26d/0x560
[   14.771566]  kunit_try_run_case+0x1a5/0x480
[   14.771880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.772128]  kthread+0x337/0x6f0
[   14.772296]  ret_from_fork+0x116/0x1d0
[   14.772453]  ret_from_fork_asm+0x1a/0x30
[   14.772626] 
[   14.772780] The buggy address belongs to the object at ffff88810230d400
[   14.772780]  which belongs to the cache kmalloc-32 of size 32
[   14.774472] The buggy address is located 0 bytes inside of
[   14.774472]  freed 32-byte region [ffff88810230d400, ffff88810230d420)
[   14.775463] 
[   14.775651] The buggy address belongs to the physical page:
[   14.775934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d
[   14.776271] flags: 0x200000000000000(node=0|zone=2)
[   14.776479] page_type: f5(slab)
[   14.776748] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.777572] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.777910] page dumped because: kasan: bad access detected
[   14.778620] 
[   14.778808] Memory state around the buggy address:
[   14.779116]  ffff88810230d300: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.779797]  ffff88810230d380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.780125] >ffff88810230d400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780893]                    ^
[   14.781197]  ffff88810230d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781634]  ffff88810230d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.782032] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[   14.696712] ==================================================================
[   14.697201] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   14.697707] Read of size 4 at addr ffff88810230d380 by task swapper/1/0
[   14.698267] 
[   14.698448] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.698540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.698561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.698589] Call Trace:
[   14.698629]  <IRQ>
[   14.698652]  dump_stack_lvl+0x73/0xb0
[   14.698691]  print_report+0xd1/0x650
[   14.698716]  ? __virt_addr_valid+0x1db/0x2d0
[   14.698741]  ? rcu_uaf_reclaim+0x50/0x60
[   14.698761]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.698782]  ? rcu_uaf_reclaim+0x50/0x60
[   14.698802]  kasan_report+0x141/0x180
[   14.698822]  ? rcu_uaf_reclaim+0x50/0x60
[   14.698847]  __asan_report_load4_noabort+0x18/0x20
[   14.698867]  rcu_uaf_reclaim+0x50/0x60
[   14.698886]  rcu_core+0x66f/0x1c40
[   14.698914]  ? __pfx_rcu_core+0x10/0x10
[   14.698935]  ? ktime_get+0x6b/0x150
[   14.698956]  ? handle_softirqs+0x18e/0x730
[   14.698982]  rcu_core_si+0x12/0x20
[   14.699001]  handle_softirqs+0x209/0x730
[   14.699019]  ? hrtimer_interrupt+0x2fe/0x780
[   14.699041]  ? __pfx_handle_softirqs+0x10/0x10
[   14.699066]  __irq_exit_rcu+0xc9/0x110
[   14.699085]  irq_exit_rcu+0x12/0x20
[   14.699103]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.699127]  </IRQ>
[   14.699156]  <TASK>
[   14.699166]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.699302] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   14.699888] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d a3 36 23 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   14.700059] RSP: 0000:ffff888100877dc8 EFLAGS: 00010202
[   14.700243] RAX: ffff8881b0976000 RBX: ffff888100853000 RCX: ffffffffa82583e5
[   14.700321] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 000000000000c084
[   14.700390] RBP: ffff888100877dd0 R08: 0000000000000001 R09: ffffed102b62618a
[   14.700475] R10: ffff88815b130c53 R11: 0000000000016400 R12: 0000000000000001
[   14.700555] R13: ffffed102010a600 R14: ffffffffa9fb0b90 R15: 0000000000000000
[   14.700671]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   14.700802]  ? default_idle+0xd/0x20
[   14.700832]  arch_cpu_idle+0xd/0x20
[   14.700855]  default_idle_call+0x48/0x80
[   14.700875]  do_idle+0x379/0x4f0
[   14.700898]  ? __pfx_do_idle+0x10/0x10
[   14.700915]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   14.700937]  ? complete+0x15b/0x1d0
[   14.700959]  cpu_startup_entry+0x5c/0x70
[   14.700978]  start_secondary+0x211/0x290
[   14.701000]  ? __pfx_start_secondary+0x10/0x10
[   14.701024]  common_startup_64+0x13e/0x148
[   14.701057]  </TASK>
[   14.701069] 
[   14.715046] Allocated by task 216:
[   14.715624]  kasan_save_stack+0x45/0x70
[   14.716199]  kasan_save_track+0x18/0x40
[   14.716374]  kasan_save_alloc_info+0x3b/0x50
[   14.716686]  __kasan_kmalloc+0xb7/0xc0
[   14.716998]  __kmalloc_cache_noprof+0x189/0x420
[   14.717262]  rcu_uaf+0xb0/0x330
[   14.717760]  kunit_try_run_case+0x1a5/0x480
[   14.718082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.718405]  kthread+0x337/0x6f0
[   14.718836]  ret_from_fork+0x116/0x1d0
[   14.719120]  ret_from_fork_asm+0x1a/0x30
[   14.719449] 
[   14.719768] Freed by task 0:
[   14.719927]  kasan_save_stack+0x45/0x70
[   14.720196]  kasan_save_track+0x18/0x40
[   14.720888]  kasan_save_free_info+0x3f/0x60
[   14.721196]  __kasan_slab_free+0x56/0x70
[   14.721389]  kfree+0x222/0x3f0
[   14.721645]  rcu_uaf_reclaim+0x1f/0x60
[   14.721861]  rcu_core+0x66f/0x1c40
[   14.722375]  rcu_core_si+0x12/0x20
[   14.722686]  handle_softirqs+0x209/0x730
[   14.722943]  __irq_exit_rcu+0xc9/0x110
[   14.723113]  irq_exit_rcu+0x12/0x20
[   14.723309]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.723870]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.724330] 
[   14.724558] Last potentially related work creation:
[   14.725077]  kasan_save_stack+0x45/0x70
[   14.725397]  kasan_record_aux_stack+0xb2/0xc0
[   14.725589]  __call_rcu_common.constprop.0+0x72/0x9d0
[   14.725903]  call_rcu+0x12/0x20
[   14.726378]  rcu_uaf+0x168/0x330
[   14.726975]  kunit_try_run_case+0x1a5/0x480
[   14.727296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.727758]  kthread+0x337/0x6f0
[   14.728048]  ret_from_fork+0x116/0x1d0
[   14.728317]  ret_from_fork_asm+0x1a/0x30
[   14.728809] 
[   14.728959] The buggy address belongs to the object at ffff88810230d380
[   14.728959]  which belongs to the cache kmalloc-32 of size 32
[   14.729843] The buggy address is located 0 bytes inside of
[   14.729843]  freed 32-byte region [ffff88810230d380, ffff88810230d3a0)
[   14.730576] 
[   14.730762] The buggy address belongs to the physical page:
[   14.731263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d
[   14.732091] flags: 0x200000000000000(node=0|zone=2)
[   14.732629] page_type: f5(slab)
[   14.732917] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.733252] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.733902] page dumped because: kasan: bad access detected
[   14.734091] 
[   14.734214] Memory state around the buggy address:
[   14.734695]  ffff88810230d280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.734923]  ffff88810230d300: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.735380] >ffff88810230d380: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735907]                    ^
[   14.736136]  ffff88810230d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.736555]  ffff88810230d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.736968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[   14.601965] ==================================================================
[   14.602407] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   14.603102] Read of size 1 at addr ffff888102b5b000 by task kunit_try_catch/214
[   14.603439] 
[   14.603644] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.603738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.603761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.603801] Call Trace:
[   14.603828]  <TASK>
[   14.603863]  dump_stack_lvl+0x73/0xb0
[   14.603910]  print_report+0xd1/0x650
[   14.603936]  ? __virt_addr_valid+0x1db/0x2d0
[   14.603961]  ? ksize_uaf+0x19d/0x6c0
[   14.603981]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.604002]  ? ksize_uaf+0x19d/0x6c0
[   14.604025]  kasan_report+0x141/0x180
[   14.604060]  ? ksize_uaf+0x19d/0x6c0
[   14.604097]  ? ksize_uaf+0x19d/0x6c0
[   14.604128]  __kasan_check_byte+0x3d/0x50
[   14.604160]  ksize+0x20/0x60
[   14.604196]  ksize_uaf+0x19d/0x6c0
[   14.604247]  ? __pfx_ksize_uaf+0x10/0x10
[   14.604291]  ? __schedule+0x10cc/0x2b60
[   14.604337]  ? __pfx_read_tsc+0x10/0x10
[   14.604378]  ? ktime_get_ts64+0x86/0x230
[   14.604427]  kunit_try_run_case+0x1a5/0x480
[   14.604476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.604519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.604553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.604576]  ? __kthread_parkme+0x82/0x180
[   14.604599]  ? preempt_count_sub+0x50/0x80
[   14.604623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.604647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.604668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.604690]  kthread+0x337/0x6f0
[   14.604709]  ? trace_preempt_on+0x20/0xc0
[   14.604732]  ? __pfx_kthread+0x10/0x10
[   14.604751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.604771]  ? calculate_sigpending+0x7b/0xa0
[   14.604795]  ? __pfx_kthread+0x10/0x10
[   14.604816]  ret_from_fork+0x116/0x1d0
[   14.604833]  ? __pfx_kthread+0x10/0x10
[   14.604853]  ret_from_fork_asm+0x1a/0x30
[   14.604885]  </TASK>
[   14.604897] 
[   14.613017] Allocated by task 214:
[   14.613339]  kasan_save_stack+0x45/0x70
[   14.613669]  kasan_save_track+0x18/0x40
[   14.613966]  kasan_save_alloc_info+0x3b/0x50
[   14.614360]  __kasan_kmalloc+0xb7/0xc0
[   14.614701]  __kmalloc_cache_noprof+0x189/0x420
[   14.615039]  ksize_uaf+0xaa/0x6c0
[   14.615370]  kunit_try_run_case+0x1a5/0x480
[   14.615642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.616014]  kthread+0x337/0x6f0
[   14.616265]  ret_from_fork+0x116/0x1d0
[   14.616587]  ret_from_fork_asm+0x1a/0x30
[   14.616769] 
[   14.616871] Freed by task 214:
[   14.617010]  kasan_save_stack+0x45/0x70
[   14.617183]  kasan_save_track+0x18/0x40
[   14.617486]  kasan_save_free_info+0x3f/0x60
[   14.617808]  __kasan_slab_free+0x56/0x70
[   14.618119]  kfree+0x222/0x3f0
[   14.618444]  ksize_uaf+0x12c/0x6c0
[   14.618782]  kunit_try_run_case+0x1a5/0x480
[   14.619125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.619517]  kthread+0x337/0x6f0
[   14.619782]  ret_from_fork+0x116/0x1d0
[   14.620098]  ret_from_fork_asm+0x1a/0x30
[   14.620283] 
[   14.620386] The buggy address belongs to the object at ffff888102b5b000
[   14.620386]  which belongs to the cache kmalloc-128 of size 128
[   14.620747] The buggy address is located 0 bytes inside of
[   14.620747]  freed 128-byte region [ffff888102b5b000, ffff888102b5b080)
[   14.621101] 
[   14.621263] The buggy address belongs to the physical page:
[   14.621685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   14.622214] flags: 0x200000000000000(node=0|zone=2)
[   14.622595] page_type: f5(slab)
[   14.622880] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.623323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.623571] page dumped because: kasan: bad access detected
[   14.623855] 
[   14.624008] Memory state around the buggy address:
[   14.624406]  ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.624927]  ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.625306] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.625816]                    ^
[   14.626025]  ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626486]  ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626825] ==================================================================
[   14.628129] ==================================================================
[   14.628539] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   14.628813] Read of size 1 at addr ffff888102b5b000 by task kunit_try_catch/214
[   14.629016] 
[   14.629128] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.629203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.629233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.629265] Call Trace:
[   14.629299]  <TASK>
[   14.629327]  dump_stack_lvl+0x73/0xb0
[   14.629369]  print_report+0xd1/0x650
[   14.629402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.629434]  ? ksize_uaf+0x5fe/0x6c0
[   14.629476]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.629508]  ? ksize_uaf+0x5fe/0x6c0
[   14.629540]  kasan_report+0x141/0x180
[   14.629577]  ? ksize_uaf+0x5fe/0x6c0
[   14.629619]  __asan_report_load1_noabort+0x18/0x20
[   14.629731]  ksize_uaf+0x5fe/0x6c0
[   14.629771]  ? __pfx_ksize_uaf+0x10/0x10
[   14.629816]  ? __schedule+0x10cc/0x2b60
[   14.629860]  ? __pfx_read_tsc+0x10/0x10
[   14.629901]  ? ktime_get_ts64+0x86/0x230
[   14.629944]  kunit_try_run_case+0x1a5/0x480
[   14.629990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.630030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.630075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.630119]  ? __kthread_parkme+0x82/0x180
[   14.630163]  ? preempt_count_sub+0x50/0x80
[   14.630213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.630295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.630354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.630396]  kthread+0x337/0x6f0
[   14.630433]  ? trace_preempt_on+0x20/0xc0
[   14.630481]  ? __pfx_kthread+0x10/0x10
[   14.630550]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.630619]  ? calculate_sigpending+0x7b/0xa0
[   14.630667]  ? __pfx_kthread+0x10/0x10
[   14.630727]  ret_from_fork+0x116/0x1d0
[   14.630767]  ? __pfx_kthread+0x10/0x10
[   14.630810]  ret_from_fork_asm+0x1a/0x30
[   14.630879]  </TASK>
[   14.630905] 
[   14.641720] Allocated by task 214:
[   14.641960]  kasan_save_stack+0x45/0x70
[   14.642247]  kasan_save_track+0x18/0x40
[   14.642534]  kasan_save_alloc_info+0x3b/0x50
[   14.642711]  __kasan_kmalloc+0xb7/0xc0
[   14.642901]  __kmalloc_cache_noprof+0x189/0x420
[   14.643234]  ksize_uaf+0xaa/0x6c0
[   14.643520]  kunit_try_run_case+0x1a5/0x480
[   14.643846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.644180]  kthread+0x337/0x6f0
[   14.644462]  ret_from_fork+0x116/0x1d0
[   14.644688]  ret_from_fork_asm+0x1a/0x30
[   14.644860] 
[   14.644963] Freed by task 214:
[   14.645105]  kasan_save_stack+0x45/0x70
[   14.645323]  kasan_save_track+0x18/0x40
[   14.645615]  kasan_save_free_info+0x3f/0x60
[   14.645924]  __kasan_slab_free+0x56/0x70
[   14.646245]  kfree+0x222/0x3f0
[   14.646505]  ksize_uaf+0x12c/0x6c0
[   14.646800]  kunit_try_run_case+0x1a5/0x480
[   14.647141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647490]  kthread+0x337/0x6f0
[   14.647651]  ret_from_fork+0x116/0x1d0
[   14.647818]  ret_from_fork_asm+0x1a/0x30
[   14.648114] 
[   14.648300] The buggy address belongs to the object at ffff888102b5b000
[   14.648300]  which belongs to the cache kmalloc-128 of size 128
[   14.649075] The buggy address is located 0 bytes inside of
[   14.649075]  freed 128-byte region [ffff888102b5b000, ffff888102b5b080)
[   14.649523] 
[   14.649635] The buggy address belongs to the physical page:
[   14.650011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   14.650550] flags: 0x200000000000000(node=0|zone=2)
[   14.650874] page_type: f5(slab)
[   14.651047] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.651563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.651981] page dumped because: kasan: bad access detected
[   14.652174] 
[   14.652315] Memory state around the buggy address:
[   14.652681]  ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653160]  ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653484] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.653848]                    ^
[   14.654046]  ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.654427]  ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.654666] ==================================================================
[   14.656094] ==================================================================
[   14.656870] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   14.657362] Read of size 1 at addr ffff888102b5b078 by task kunit_try_catch/214
[   14.657844] 
[   14.658047] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.658141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.658163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.658202] Call Trace:
[   14.658826]  <TASK>
[   14.658888]  dump_stack_lvl+0x73/0xb0
[   14.658953]  print_report+0xd1/0x650
[   14.659002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.659053]  ? ksize_uaf+0x5e4/0x6c0
[   14.659098]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.659143]  ? ksize_uaf+0x5e4/0x6c0
[   14.659187]  kasan_report+0x141/0x180
[   14.659243]  ? ksize_uaf+0x5e4/0x6c0
[   14.659299]  __asan_report_load1_noabort+0x18/0x20
[   14.659341]  ksize_uaf+0x5e4/0x6c0
[   14.659383]  ? __pfx_ksize_uaf+0x10/0x10
[   14.659428]  ? __schedule+0x10cc/0x2b60
[   14.659472]  ? __pfx_read_tsc+0x10/0x10
[   14.659514]  ? ktime_get_ts64+0x86/0x230
[   14.659561]  kunit_try_run_case+0x1a5/0x480
[   14.659608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.659650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.659696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.659736]  ? __kthread_parkme+0x82/0x180
[   14.659764]  ? preempt_count_sub+0x50/0x80
[   14.659787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.659810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.659832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.659854]  kthread+0x337/0x6f0
[   14.659872]  ? trace_preempt_on+0x20/0xc0
[   14.659896]  ? __pfx_kthread+0x10/0x10
[   14.659917]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.659936]  ? calculate_sigpending+0x7b/0xa0
[   14.659960]  ? __pfx_kthread+0x10/0x10
[   14.659980]  ret_from_fork+0x116/0x1d0
[   14.659998]  ? __pfx_kthread+0x10/0x10
[   14.660018]  ret_from_fork_asm+0x1a/0x30
[   14.660050]  </TASK>
[   14.660061] 
[   14.667721] Allocated by task 214:
[   14.668022]  kasan_save_stack+0x45/0x70
[   14.668369]  kasan_save_track+0x18/0x40
[   14.668673]  kasan_save_alloc_info+0x3b/0x50
[   14.668980]  __kasan_kmalloc+0xb7/0xc0
[   14.669289]  __kmalloc_cache_noprof+0x189/0x420
[   14.670145]  ksize_uaf+0xaa/0x6c0
[   14.670806]  kunit_try_run_case+0x1a5/0x480
[   14.671508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.671743]  kthread+0x337/0x6f0
[   14.671897]  ret_from_fork+0x116/0x1d0
[   14.671990]  ret_from_fork_asm+0x1a/0x30
[   14.672082] 
[   14.672134] Freed by task 214:
[   14.672209]  kasan_save_stack+0x45/0x70
[   14.673171]  kasan_save_track+0x18/0x40
[   14.673544]  kasan_save_free_info+0x3f/0x60
[   14.673845]  __kasan_slab_free+0x56/0x70
[   14.674056]  kfree+0x222/0x3f0
[   14.674328]  ksize_uaf+0x12c/0x6c0
[   14.674580]  kunit_try_run_case+0x1a5/0x480
[   14.674915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675146]  kthread+0x337/0x6f0
[   14.675450]  ret_from_fork+0x116/0x1d0
[   14.675651]  ret_from_fork_asm+0x1a/0x30
[   14.675950] 
[   14.676080] The buggy address belongs to the object at ffff888102b5b000
[   14.676080]  which belongs to the cache kmalloc-128 of size 128
[   14.676594] The buggy address is located 120 bytes inside of
[   14.676594]  freed 128-byte region [ffff888102b5b000, ffff888102b5b080)
[   14.677260] 
[   14.677436] The buggy address belongs to the physical page:
[   14.677724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b
[   14.678039] flags: 0x200000000000000(node=0|zone=2)
[   14.678420] page_type: f5(slab)
[   14.678690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.679081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.679447] page dumped because: kasan: bad access detected
[   14.679746] 
[   14.679912] Memory state around the buggy address:
[   14.680146]  ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.680386]  ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.680891] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.681327]                                                                 ^
[   14.681678]  ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682076]  ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[   14.540253] ==================================================================
[   14.540927] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   14.541209] Read of size 1 at addr ffff888102b48f78 by task kunit_try_catch/212
[   14.541884] 
[   14.542100] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.542199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.542231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.542270] Call Trace:
[   14.542298]  <TASK>
[   14.542339]  dump_stack_lvl+0x73/0xb0
[   14.542401]  print_report+0xd1/0x650
[   14.542449]  ? __virt_addr_valid+0x1db/0x2d0
[   14.542660]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.542746]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542799]  kasan_report+0x141/0x180
[   14.542842]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542905]  __asan_report_load1_noabort+0x18/0x20
[   14.542938]  ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542978]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.543016]  ? finish_task_switch.isra.0+0x153/0x700
[   14.543056]  ? __switch_to+0x47/0xf50
[   14.543104]  ? __schedule+0x10cc/0x2b60
[   14.543150]  ? __pfx_read_tsc+0x10/0x10
[   14.543189]  ? ktime_get_ts64+0x86/0x230
[   14.543246]  kunit_try_run_case+0x1a5/0x480
[   14.543290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.543342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.543363]  ? __kthread_parkme+0x82/0x180
[   14.543385]  ? preempt_count_sub+0x50/0x80
[   14.543407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.543469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.543541]  kthread+0x337/0x6f0
[   14.543576]  ? trace_preempt_on+0x20/0xc0
[   14.543627]  ? __pfx_kthread+0x10/0x10
[   14.543650]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.543671]  ? calculate_sigpending+0x7b/0xa0
[   14.543695]  ? __pfx_kthread+0x10/0x10
[   14.543716]  ret_from_fork+0x116/0x1d0
[   14.543734]  ? __pfx_kthread+0x10/0x10
[   14.543754]  ret_from_fork_asm+0x1a/0x30
[   14.543785]  </TASK>
[   14.543797] 
[   14.556847] Allocated by task 212:
[   14.557169]  kasan_save_stack+0x45/0x70
[   14.557515]  kasan_save_track+0x18/0x40
[   14.557806]  kasan_save_alloc_info+0x3b/0x50
[   14.558024]  __kasan_kmalloc+0xb7/0xc0
[   14.558356]  __kmalloc_cache_noprof+0x189/0x420
[   14.558589]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.559035]  kunit_try_run_case+0x1a5/0x480
[   14.559349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559722]  kthread+0x337/0x6f0
[   14.559924]  ret_from_fork+0x116/0x1d0
[   14.560090]  ret_from_fork_asm+0x1a/0x30
[   14.561134] 
[   14.561320] The buggy address belongs to the object at ffff888102b48f00
[   14.561320]  which belongs to the cache kmalloc-128 of size 128
[   14.562022] The buggy address is located 5 bytes to the right of
[   14.562022]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.562721] 
[   14.562976] The buggy address belongs to the physical page:
[   14.563897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.564215] flags: 0x200000000000000(node=0|zone=2)
[   14.565076] page_type: f5(slab)
[   14.565270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.565499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.565859] page dumped because: kasan: bad access detected
[   14.566785] 
[   14.567105] Memory state around the buggy address:
[   14.567302]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.567658]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.568083] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.568375]                                                                 ^
[   14.568839]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569241]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.569592] ==================================================================
[   14.512077] ==================================================================
[   14.512564] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   14.513157] Read of size 1 at addr ffff888102b48f73 by task kunit_try_catch/212
[   14.513761] 
[   14.513880] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.513937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.513949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.513972] Call Trace:
[   14.513987]  <TASK>
[   14.514008]  dump_stack_lvl+0x73/0xb0
[   14.514042]  print_report+0xd1/0x650
[   14.514067]  ? __virt_addr_valid+0x1db/0x2d0
[   14.514090]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.514135]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514158]  kasan_report+0x141/0x180
[   14.514179]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514207]  __asan_report_load1_noabort+0x18/0x20
[   14.514246]  ksize_unpoisons_memory+0x81c/0x9b0
[   14.514272]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.514294]  ? finish_task_switch.isra.0+0x153/0x700
[   14.514319]  ? __switch_to+0x47/0xf50
[   14.514362]  ? __schedule+0x10cc/0x2b60
[   14.514387]  ? __pfx_read_tsc+0x10/0x10
[   14.514410]  ? ktime_get_ts64+0x86/0x230
[   14.514436]  kunit_try_run_case+0x1a5/0x480
[   14.514474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.514508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.514547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.514584]  ? __kthread_parkme+0x82/0x180
[   14.514622]  ? preempt_count_sub+0x50/0x80
[   14.514670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.514716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.514760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.514948]  kthread+0x337/0x6f0
[   14.515001]  ? trace_preempt_on+0x20/0xc0
[   14.515053]  ? __pfx_kthread+0x10/0x10
[   14.515097]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.515136]  ? calculate_sigpending+0x7b/0xa0
[   14.515176]  ? __pfx_kthread+0x10/0x10
[   14.515213]  ret_from_fork+0x116/0x1d0
[   14.515262]  ? __pfx_kthread+0x10/0x10
[   14.515300]  ret_from_fork_asm+0x1a/0x30
[   14.515364]  </TASK>
[   14.515389] 
[   14.526426] Allocated by task 212:
[   14.526909]  kasan_save_stack+0x45/0x70
[   14.527162]  kasan_save_track+0x18/0x40
[   14.527667]  kasan_save_alloc_info+0x3b/0x50
[   14.527957]  __kasan_kmalloc+0xb7/0xc0
[   14.528156]  __kmalloc_cache_noprof+0x189/0x420
[   14.528737]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.529089]  kunit_try_run_case+0x1a5/0x480
[   14.529449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.529915]  kthread+0x337/0x6f0
[   14.530164]  ret_from_fork+0x116/0x1d0
[   14.530629]  ret_from_fork_asm+0x1a/0x30
[   14.530873] 
[   14.531038] The buggy address belongs to the object at ffff888102b48f00
[   14.531038]  which belongs to the cache kmalloc-128 of size 128
[   14.531743] The buggy address is located 0 bytes to the right of
[   14.531743]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.532367] 
[   14.532694] The buggy address belongs to the physical page:
[   14.532992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.533423] flags: 0x200000000000000(node=0|zone=2)
[   14.533979] page_type: f5(slab)
[   14.534277] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.534882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.535319] page dumped because: kasan: bad access detected
[   14.535797] 
[   14.535903] Memory state around the buggy address:
[   14.536125]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.536366]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536860] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.537139]                                                              ^
[   14.537775]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538158]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.538831] ==================================================================
[   14.572160] ==================================================================
[   14.572855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   14.573365] Read of size 1 at addr ffff888102b48f7f by task kunit_try_catch/212
[   14.573670] 
[   14.573921] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.574045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.574071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.574114] Call Trace:
[   14.574142]  <TASK>
[   14.574177]  dump_stack_lvl+0x73/0xb0
[   14.574247]  print_report+0xd1/0x650
[   14.574293]  ? __virt_addr_valid+0x1db/0x2d0
[   14.574410]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.574499]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574546]  kasan_report+0x141/0x180
[   14.574587]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574644]  __asan_report_load1_noabort+0x18/0x20
[   14.574683]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574712]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.574734]  ? finish_task_switch.isra.0+0x153/0x700
[   14.574759]  ? __switch_to+0x47/0xf50
[   14.574786]  ? __schedule+0x10cc/0x2b60
[   14.574809]  ? __pfx_read_tsc+0x10/0x10
[   14.574831]  ? ktime_get_ts64+0x86/0x230
[   14.574855]  kunit_try_run_case+0x1a5/0x480
[   14.574882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.574903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.574925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.574947]  ? __kthread_parkme+0x82/0x180
[   14.574970]  ? preempt_count_sub+0x50/0x80
[   14.574993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.575015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.575037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.575058]  kthread+0x337/0x6f0
[   14.575077]  ? trace_preempt_on+0x20/0xc0
[   14.575101]  ? __pfx_kthread+0x10/0x10
[   14.575122]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.575142]  ? calculate_sigpending+0x7b/0xa0
[   14.575166]  ? __pfx_kthread+0x10/0x10
[   14.575187]  ret_from_fork+0x116/0x1d0
[   14.575204]  ? __pfx_kthread+0x10/0x10
[   14.575245]  ret_from_fork_asm+0x1a/0x30
[   14.575280]  </TASK>
[   14.575292] 
[   14.583581] Allocated by task 212:
[   14.583934]  kasan_save_stack+0x45/0x70
[   14.584300]  kasan_save_track+0x18/0x40
[   14.584574]  kasan_save_alloc_info+0x3b/0x50
[   14.584894]  __kasan_kmalloc+0xb7/0xc0
[   14.585186]  __kmalloc_cache_noprof+0x189/0x420
[   14.585583]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.585943]  kunit_try_run_case+0x1a5/0x480
[   14.586232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.586571]  kthread+0x337/0x6f0
[   14.586734]  ret_from_fork+0x116/0x1d0
[   14.586907]  ret_from_fork_asm+0x1a/0x30
[   14.587083] 
[   14.587190] The buggy address belongs to the object at ffff888102b48f00
[   14.587190]  which belongs to the cache kmalloc-128 of size 128
[   14.587577] The buggy address is located 12 bytes to the right of
[   14.587577]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.588447] 
[   14.588645] The buggy address belongs to the physical page:
[   14.589024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.589637] flags: 0x200000000000000(node=0|zone=2)
[   14.590045] page_type: f5(slab)
[   14.590331] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.590876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.591446] page dumped because: kasan: bad access detected
[   14.591822] 
[   14.591966] Memory state around the buggy address:
[   14.592275]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.592688]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.592972] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.593201]                                                                 ^
[   14.593727]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.594247]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.594630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[   14.480234] ==================================================================
[   14.480850] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   14.481333] Free of addr ffff888102817b60 by task kunit_try_catch/210
[   14.481732] 
[   14.481904] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.481998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.482020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.482057] Call Trace:
[   14.482083]  <TASK>
[   14.482119]  dump_stack_lvl+0x73/0xb0
[   14.482183]  print_report+0xd1/0x650
[   14.482466]  ? __virt_addr_valid+0x1db/0x2d0
[   14.482547]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.482612]  ? kfree_sensitive+0x2e/0x90
[   14.482661]  kasan_report_invalid_free+0x10a/0x130
[   14.482718]  ? kfree_sensitive+0x2e/0x90
[   14.482769]  ? kfree_sensitive+0x2e/0x90
[   14.482812]  check_slab_allocation+0x101/0x130
[   14.482861]  __kasan_slab_pre_free+0x28/0x40
[   14.482903]  kfree+0xf0/0x3f0
[   14.482936]  ? kfree_sensitive+0x2e/0x90
[   14.482982]  kfree_sensitive+0x2e/0x90
[   14.483021]  kmalloc_double_kzfree+0x19c/0x350
[   14.483115]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   14.483166]  ? __schedule+0x10cc/0x2b60
[   14.483210]  ? __pfx_read_tsc+0x10/0x10
[   14.483291]  ? ktime_get_ts64+0x86/0x230
[   14.483335]  kunit_try_run_case+0x1a5/0x480
[   14.483379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.483423]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.483471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.483513]  ? __kthread_parkme+0x82/0x180
[   14.483551]  ? preempt_count_sub+0x50/0x80
[   14.483586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.483612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.483636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.483661]  kthread+0x337/0x6f0
[   14.483681]  ? trace_preempt_on+0x20/0xc0
[   14.483706]  ? __pfx_kthread+0x10/0x10
[   14.483727]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.483750]  ? calculate_sigpending+0x7b/0xa0
[   14.483775]  ? __pfx_kthread+0x10/0x10
[   14.483797]  ret_from_fork+0x116/0x1d0
[   14.483816]  ? __pfx_kthread+0x10/0x10
[   14.483837]  ret_from_fork_asm+0x1a/0x30
[   14.483872]  </TASK>
[   14.483886] 
[   14.492419] Allocated by task 210:
[   14.492684]  kasan_save_stack+0x45/0x70
[   14.493019]  kasan_save_track+0x18/0x40
[   14.493328]  kasan_save_alloc_info+0x3b/0x50
[   14.493645]  __kasan_kmalloc+0xb7/0xc0
[   14.493852]  __kmalloc_cache_noprof+0x189/0x420
[   14.494196]  kmalloc_double_kzfree+0xa9/0x350
[   14.494406]  kunit_try_run_case+0x1a5/0x480
[   14.494747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.495023]  kthread+0x337/0x6f0
[   14.495290]  ret_from_fork+0x116/0x1d0
[   14.495501]  ret_from_fork_asm+0x1a/0x30
[   14.495686] 
[   14.495793] Freed by task 210:
[   14.495940]  kasan_save_stack+0x45/0x70
[   14.496112]  kasan_save_track+0x18/0x40
[   14.496292]  kasan_save_free_info+0x3f/0x60
[   14.496506]  __kasan_slab_free+0x56/0x70
[   14.496806]  kfree+0x222/0x3f0
[   14.497101]  kfree_sensitive+0x67/0x90
[   14.497412]  kmalloc_double_kzfree+0x12b/0x350
[   14.497760]  kunit_try_run_case+0x1a5/0x480
[   14.498091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.498513]  kthread+0x337/0x6f0
[   14.498798]  ret_from_fork+0x116/0x1d0
[   14.499025]  ret_from_fork_asm+0x1a/0x30
[   14.499213] 
[   14.499385] The buggy address belongs to the object at ffff888102817b60
[   14.499385]  which belongs to the cache kmalloc-16 of size 16
[   14.500054] The buggy address is located 0 bytes inside of
[   14.500054]  16-byte region [ffff888102817b60, ffff888102817b70)
[   14.500600] 
[   14.500736] The buggy address belongs to the physical page:
[   14.500966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817
[   14.501247] flags: 0x200000000000000(node=0|zone=2)
[   14.501448] page_type: f5(slab)
[   14.501611] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.501863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.502104] page dumped because: kasan: bad access detected
[   14.502371] 
[   14.502535] Memory state around the buggy address:
[   14.502903]  ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.503419]  ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.503873] >ffff888102817b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.504332]                                                        ^
[   14.504760]  ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.505236]  ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.505709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[   14.450150] ==================================================================
[   14.451403] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   14.451962] Read of size 1 at addr ffff888102817b60 by task kunit_try_catch/210
[   14.452682] 
[   14.452853] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.452964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.452987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.453025] Call Trace:
[   14.453052]  <TASK>
[   14.453092]  dump_stack_lvl+0x73/0xb0
[   14.453168]  print_report+0xd1/0x650
[   14.453216]  ? __virt_addr_valid+0x1db/0x2d0
[   14.453271]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.453298]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.453322]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.453346]  kasan_report+0x141/0x180
[   14.453369]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.453396]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.453420]  __kasan_check_byte+0x3d/0x50
[   14.453443]  kfree_sensitive+0x22/0x90
[   14.453467]  kmalloc_double_kzfree+0x19c/0x350
[   14.453490]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   14.453515]  ? __schedule+0x10cc/0x2b60
[   14.453537]  ? __pfx_read_tsc+0x10/0x10
[   14.453559]  ? ktime_get_ts64+0x86/0x230
[   14.453584]  kunit_try_run_case+0x1a5/0x480
[   14.453610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.453656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.453679]  ? __kthread_parkme+0x82/0x180
[   14.453702]  ? preempt_count_sub+0x50/0x80
[   14.453726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.453773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.453796]  kthread+0x337/0x6f0
[   14.453815]  ? trace_preempt_on+0x20/0xc0
[   14.453839]  ? __pfx_kthread+0x10/0x10
[   14.453860]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.453880]  ? calculate_sigpending+0x7b/0xa0
[   14.453906]  ? __pfx_kthread+0x10/0x10
[   14.453928]  ret_from_fork+0x116/0x1d0
[   14.453946]  ? __pfx_kthread+0x10/0x10
[   14.453967]  ret_from_fork_asm+0x1a/0x30
[   14.453999]  </TASK>
[   14.454011] 
[   14.462562] Allocated by task 210:
[   14.462896]  kasan_save_stack+0x45/0x70
[   14.463253]  kasan_save_track+0x18/0x40
[   14.463563]  kasan_save_alloc_info+0x3b/0x50
[   14.463914]  __kasan_kmalloc+0xb7/0xc0
[   14.464241]  __kmalloc_cache_noprof+0x189/0x420
[   14.464484]  kmalloc_double_kzfree+0xa9/0x350
[   14.464682]  kunit_try_run_case+0x1a5/0x480
[   14.465032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.465461]  kthread+0x337/0x6f0
[   14.465699]  ret_from_fork+0x116/0x1d0
[   14.465910]  ret_from_fork_asm+0x1a/0x30
[   14.466216] 
[   14.466407] Freed by task 210:
[   14.466600]  kasan_save_stack+0x45/0x70
[   14.466784]  kasan_save_track+0x18/0x40
[   14.466962]  kasan_save_free_info+0x3f/0x60
[   14.467143]  __kasan_slab_free+0x56/0x70
[   14.467452]  kfree+0x222/0x3f0
[   14.467735]  kfree_sensitive+0x67/0x90
[   14.468049]  kmalloc_double_kzfree+0x12b/0x350
[   14.468409]  kunit_try_run_case+0x1a5/0x480
[   14.468747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.469163]  kthread+0x337/0x6f0
[   14.469461]  ret_from_fork+0x116/0x1d0
[   14.469725]  ret_from_fork_asm+0x1a/0x30
[   14.469916] 
[   14.470027] The buggy address belongs to the object at ffff888102817b60
[   14.470027]  which belongs to the cache kmalloc-16 of size 16
[   14.470855] The buggy address is located 0 bytes inside of
[   14.470855]  freed 16-byte region [ffff888102817b60, ffff888102817b70)
[   14.471530] 
[   14.471722] The buggy address belongs to the physical page:
[   14.471949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817
[   14.472507] flags: 0x200000000000000(node=0|zone=2)
[   14.472871] page_type: f5(slab)
[   14.473074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.473492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.473905] page dumped because: kasan: bad access detected
[   14.474254] 
[   14.474423] Memory state around the buggy address:
[   14.474729]  ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.475095]  ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.475543] >ffff888102817b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.475840]                                                        ^
[   14.476263]  ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.476630]  ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.476927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[   14.410184] ==================================================================
[   14.411237] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   14.411574] Read of size 1 at addr ffff888102b50fa8 by task kunit_try_catch/206
[   14.411946] 
[   14.412139] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.412240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.412266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.412308] Call Trace:
[   14.412332]  <TASK>
[   14.412365]  dump_stack_lvl+0x73/0xb0
[   14.412423]  print_report+0xd1/0x650
[   14.412461]  ? __virt_addr_valid+0x1db/0x2d0
[   14.412505]  ? kmalloc_uaf2+0x4a8/0x520
[   14.412543]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.412583]  ? kmalloc_uaf2+0x4a8/0x520
[   14.412624]  kasan_report+0x141/0x180
[   14.412663]  ? kmalloc_uaf2+0x4a8/0x520
[   14.412707]  __asan_report_load1_noabort+0x18/0x20
[   14.412744]  kmalloc_uaf2+0x4a8/0x520
[   14.412784]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   14.412822]  ? finish_task_switch.isra.0+0x153/0x700
[   14.412864]  ? __switch_to+0x47/0xf50
[   14.412910]  ? __schedule+0x10cc/0x2b60
[   14.412952]  ? __pfx_read_tsc+0x10/0x10
[   14.412994]  ? ktime_get_ts64+0x86/0x230
[   14.413043]  kunit_try_run_case+0x1a5/0x480
[   14.413093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.413161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.413193]  ? __kthread_parkme+0x82/0x180
[   14.413236]  ? preempt_count_sub+0x50/0x80
[   14.413289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.413360]  kthread+0x337/0x6f0
[   14.413380]  ? trace_preempt_on+0x20/0xc0
[   14.413404]  ? __pfx_kthread+0x10/0x10
[   14.413424]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.413444]  ? calculate_sigpending+0x7b/0xa0
[   14.413480]  ? __pfx_kthread+0x10/0x10
[   14.413514]  ret_from_fork+0x116/0x1d0
[   14.413564]  ? __pfx_kthread+0x10/0x10
[   14.413586]  ret_from_fork_asm+0x1a/0x30
[   14.413618]  </TASK>
[   14.413631] 
[   14.422516] Allocated by task 206:
[   14.422923]  kasan_save_stack+0x45/0x70
[   14.423265]  kasan_save_track+0x18/0x40
[   14.423677]  kasan_save_alloc_info+0x3b/0x50
[   14.424022]  __kasan_kmalloc+0xb7/0xc0
[   14.424228]  __kmalloc_cache_noprof+0x189/0x420
[   14.424420]  kmalloc_uaf2+0xc6/0x520
[   14.424580]  kunit_try_run_case+0x1a5/0x480
[   14.424852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.425246]  kthread+0x337/0x6f0
[   14.425995]  ret_from_fork+0x116/0x1d0
[   14.426354]  ret_from_fork_asm+0x1a/0x30
[   14.426815] 
[   14.426982] Freed by task 206:
[   14.427133]  kasan_save_stack+0x45/0x70
[   14.427398]  kasan_save_track+0x18/0x40
[   14.427775]  kasan_save_free_info+0x3f/0x60
[   14.427951]  __kasan_slab_free+0x56/0x70
[   14.428256]  kfree+0x222/0x3f0
[   14.428497]  kmalloc_uaf2+0x14c/0x520
[   14.428708]  kunit_try_run_case+0x1a5/0x480
[   14.428959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429228]  kthread+0x337/0x6f0
[   14.429488]  ret_from_fork+0x116/0x1d0
[   14.429760]  ret_from_fork_asm+0x1a/0x30
[   14.429938] 
[   14.430041] The buggy address belongs to the object at ffff888102b50f80
[   14.430041]  which belongs to the cache kmalloc-64 of size 64
[   14.431138] The buggy address is located 40 bytes inside of
[   14.431138]  freed 64-byte region [ffff888102b50f80, ffff888102b50fc0)
[   14.432039] 
[   14.432156] The buggy address belongs to the physical page:
[   14.432407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50
[   14.432672] flags: 0x200000000000000(node=0|zone=2)
[   14.433107] page_type: f5(slab)
[   14.433424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.434059] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   14.434433] page dumped because: kasan: bad access detected
[   14.434634] 
[   14.435237] Memory state around the buggy address:
[   14.435584]  ffff888102b50e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.436050]  ffff888102b50f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.436492] >ffff888102b50f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.436742]                                   ^
[   14.437043]  ffff888102b51000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.437478]  ffff888102b51080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.438259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
[   14.371646] ==================================================================
[   14.372461] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360
[   14.373175] Write of size 33 at addr ffff888102b50e80 by task kunit_try_catch/204
[   14.373670] 
[   14.374063] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.374169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.374194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.374252] Call Trace:
[   14.374280]  <TASK>
[   14.374327]  dump_stack_lvl+0x73/0xb0
[   14.374402]  print_report+0xd1/0x650
[   14.374491]  ? __virt_addr_valid+0x1db/0x2d0
[   14.374545]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.374583]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.374618]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.374642]  kasan_report+0x141/0x180
[   14.374665]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.374691]  kasan_check_range+0x10c/0x1c0
[   14.374714]  __asan_memset+0x27/0x50
[   14.374733]  kmalloc_uaf_memset+0x1a3/0x360
[   14.374753]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   14.374775]  ? __schedule+0x10cc/0x2b60
[   14.374797]  ? __pfx_read_tsc+0x10/0x10
[   14.374819]  ? ktime_get_ts64+0x86/0x230
[   14.374843]  kunit_try_run_case+0x1a5/0x480
[   14.374869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.374891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.374912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.374933]  ? __kthread_parkme+0x82/0x180
[   14.374954]  ? preempt_count_sub+0x50/0x80
[   14.374977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.374999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.375021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.375042]  kthread+0x337/0x6f0
[   14.375060]  ? trace_preempt_on+0x20/0xc0
[   14.375083]  ? __pfx_kthread+0x10/0x10
[   14.375103]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.375123]  ? calculate_sigpending+0x7b/0xa0
[   14.375146]  ? __pfx_kthread+0x10/0x10
[   14.375167]  ret_from_fork+0x116/0x1d0
[   14.375184]  ? __pfx_kthread+0x10/0x10
[   14.375204]  ret_from_fork_asm+0x1a/0x30
[   14.375255]  </TASK>
[   14.375269] 
[   14.385969] Allocated by task 204:
[   14.386255]  kasan_save_stack+0x45/0x70
[   14.386755]  kasan_save_track+0x18/0x40
[   14.387057]  kasan_save_alloc_info+0x3b/0x50
[   14.387374]  __kasan_kmalloc+0xb7/0xc0
[   14.388053]  __kmalloc_cache_noprof+0x189/0x420
[   14.388367]  kmalloc_uaf_memset+0xa9/0x360
[   14.388810]  kunit_try_run_case+0x1a5/0x480
[   14.389022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.389377]  kthread+0x337/0x6f0
[   14.389837]  ret_from_fork+0x116/0x1d0
[   14.390154]  ret_from_fork_asm+0x1a/0x30
[   14.390640] 
[   14.390809] Freed by task 204:
[   14.391041]  kasan_save_stack+0x45/0x70
[   14.391326]  kasan_save_track+0x18/0x40
[   14.392063]  kasan_save_free_info+0x3f/0x60
[   14.392321]  __kasan_slab_free+0x56/0x70
[   14.392809]  kfree+0x222/0x3f0
[   14.392992]  kmalloc_uaf_memset+0x12b/0x360
[   14.393279]  kunit_try_run_case+0x1a5/0x480
[   14.393697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.394087]  kthread+0x337/0x6f0
[   14.394261]  ret_from_fork+0x116/0x1d0
[   14.394718]  ret_from_fork_asm+0x1a/0x30
[   14.395043] 
[   14.395211] The buggy address belongs to the object at ffff888102b50e80
[   14.395211]  which belongs to the cache kmalloc-64 of size 64
[   14.396202] The buggy address is located 0 bytes inside of
[   14.396202]  freed 64-byte region [ffff888102b50e80, ffff888102b50ec0)
[   14.396991] 
[   14.397118] The buggy address belongs to the physical page:
[   14.397633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50
[   14.398102] flags: 0x200000000000000(node=0|zone=2)
[   14.398425] page_type: f5(slab)
[   14.398865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.399175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.399434] page dumped because: kasan: bad access detected
[   14.400286] 
[   14.400600] Memory state around the buggy address:
[   14.400956]  ffff888102b50d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.401314]  ffff888102b50e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.401884] >ffff888102b50e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.402182]                    ^
[   14.402604]  ffff888102b50f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.403002]  ffff888102b50f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.403304] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[   14.334777] ==================================================================
[   14.335252] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   14.335702] Read of size 1 at addr ffff8881022a34a8 by task kunit_try_catch/202
[   14.336325] 
[   14.336499] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.336581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.337042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.337087] Call Trace:
[   14.337118]  <TASK>
[   14.337162]  dump_stack_lvl+0x73/0xb0
[   14.337252]  print_report+0xd1/0x650
[   14.337314]  ? __virt_addr_valid+0x1db/0x2d0
[   14.337353]  ? kmalloc_uaf+0x320/0x380
[   14.337380]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.337407]  ? kmalloc_uaf+0x320/0x380
[   14.337433]  kasan_report+0x141/0x180
[   14.337466]  ? kmalloc_uaf+0x320/0x380
[   14.337561]  __asan_report_load1_noabort+0x18/0x20
[   14.337636]  kmalloc_uaf+0x320/0x380
[   14.337666]  ? __pfx_kmalloc_uaf+0x10/0x10
[   14.337693]  ? __schedule+0x10cc/0x2b60
[   14.337724]  ? __pfx_read_tsc+0x10/0x10
[   14.337751]  ? ktime_get_ts64+0x86/0x230
[   14.337782]  kunit_try_run_case+0x1a5/0x480
[   14.337814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.337840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.337867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.337893]  ? __kthread_parkme+0x82/0x180
[   14.337919]  ? preempt_count_sub+0x50/0x80
[   14.337950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.337977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.338003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.338030]  kthread+0x337/0x6f0
[   14.338054]  ? trace_preempt_on+0x20/0xc0
[   14.338082]  ? __pfx_kthread+0x10/0x10
[   14.338107]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.338132]  ? calculate_sigpending+0x7b/0xa0
[   14.338162]  ? __pfx_kthread+0x10/0x10
[   14.338188]  ret_from_fork+0x116/0x1d0
[   14.338211]  ? __pfx_kthread+0x10/0x10
[   14.338262]  ret_from_fork_asm+0x1a/0x30
[   14.338298]  </TASK>
[   14.338311] 
[   14.347725] Allocated by task 202:
[   14.347880]  kasan_save_stack+0x45/0x70
[   14.348054]  kasan_save_track+0x18/0x40
[   14.348207]  kasan_save_alloc_info+0x3b/0x50
[   14.348441]  __kasan_kmalloc+0xb7/0xc0
[   14.349043]  __kmalloc_cache_noprof+0x189/0x420
[   14.349426]  kmalloc_uaf+0xaa/0x380
[   14.350586]  kunit_try_run_case+0x1a5/0x480
[   14.351048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.351346]  kthread+0x337/0x6f0
[   14.352643]  ret_from_fork+0x116/0x1d0
[   14.352935]  ret_from_fork_asm+0x1a/0x30
[   14.353246] 
[   14.353399] Freed by task 202:
[   14.353654]  kasan_save_stack+0x45/0x70
[   14.354306]  kasan_save_track+0x18/0x40
[   14.354651]  kasan_save_free_info+0x3f/0x60
[   14.355179]  __kasan_slab_free+0x56/0x70
[   14.355502]  kfree+0x222/0x3f0
[   14.355772]  kmalloc_uaf+0x12c/0x380
[   14.355969]  kunit_try_run_case+0x1a5/0x480
[   14.356346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.356878]  kthread+0x337/0x6f0
[   14.357118]  ret_from_fork+0x116/0x1d0
[   14.357309]  ret_from_fork_asm+0x1a/0x30
[   14.357747] 
[   14.357908] The buggy address belongs to the object at ffff8881022a34a0
[   14.357908]  which belongs to the cache kmalloc-16 of size 16
[   14.358506] The buggy address is located 8 bytes inside of
[   14.358506]  freed 16-byte region [ffff8881022a34a0, ffff8881022a34b0)
[   14.359154] 
[   14.359337] The buggy address belongs to the physical page:
[   14.359696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   14.360672] flags: 0x200000000000000(node=0|zone=2)
[   14.361132] page_type: f5(slab)
[   14.361399] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.362159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.362730] page dumped because: kasan: bad access detected
[   14.363118] 
[   14.363504] Memory state around the buggy address:
[   14.363867]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.364151]  ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   14.364784] >ffff8881022a3480: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   14.365021]                                   ^
[   14.365310]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.365815]  ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.366268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[   14.309832] ==================================================================
[   14.310311] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   14.311155] Read of size 64 at addr ffff88810230b104 by task kunit_try_catch/200
[   14.311474] 
[   14.311677] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.311772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.311794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.311820] Call Trace:
[   14.311835]  <TASK>
[   14.311862]  dump_stack_lvl+0x73/0xb0
[   14.311898]  print_report+0xd1/0x650
[   14.311921]  ? __virt_addr_valid+0x1db/0x2d0
[   14.311954]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.311990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.312022]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.312062]  kasan_report+0x141/0x180
[   14.312103]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.312159]  kasan_check_range+0x10c/0x1c0
[   14.312206]  __asan_memmove+0x27/0x70
[   14.312261]  kmalloc_memmove_invalid_size+0x16f/0x330
[   14.312310]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   14.312360]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   14.312415]  kunit_try_run_case+0x1a5/0x480
[   14.312445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.312489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.312509]  ? __kthread_parkme+0x82/0x180
[   14.312529]  ? preempt_count_sub+0x50/0x80
[   14.312554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.312617]  kthread+0x337/0x6f0
[   14.312635]  ? trace_preempt_on+0x20/0xc0
[   14.312658]  ? __pfx_kthread+0x10/0x10
[   14.312678]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.312697]  ? calculate_sigpending+0x7b/0xa0
[   14.312720]  ? __pfx_kthread+0x10/0x10
[   14.312740]  ret_from_fork+0x116/0x1d0
[   14.312758]  ? __pfx_kthread+0x10/0x10
[   14.312777]  ret_from_fork_asm+0x1a/0x30
[   14.312808]  </TASK>
[   14.312820] 
[   14.319761] Allocated by task 200:
[   14.320066]  kasan_save_stack+0x45/0x70
[   14.320399]  kasan_save_track+0x18/0x40
[   14.320681]  kasan_save_alloc_info+0x3b/0x50
[   14.321001]  __kasan_kmalloc+0xb7/0xc0
[   14.321319]  __kmalloc_cache_noprof+0x189/0x420
[   14.321657]  kmalloc_memmove_invalid_size+0xac/0x330
[   14.322046]  kunit_try_run_case+0x1a5/0x480
[   14.322377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.322774]  kthread+0x337/0x6f0
[   14.323054]  ret_from_fork+0x116/0x1d0
[   14.323374]  ret_from_fork_asm+0x1a/0x30
[   14.323690] 
[   14.323806] The buggy address belongs to the object at ffff88810230b100
[   14.323806]  which belongs to the cache kmalloc-64 of size 64
[   14.324281] The buggy address is located 4 bytes inside of
[   14.324281]  allocated 64-byte region [ffff88810230b100, ffff88810230b140)
[   14.324829] 
[   14.324990] The buggy address belongs to the physical page:
[   14.325282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230b
[   14.325660] flags: 0x200000000000000(node=0|zone=2)
[   14.325923] page_type: f5(slab)
[   14.326088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.326607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.326939] page dumped because: kasan: bad access detected
[   14.327290] 
[   14.327433] Memory state around the buggy address:
[   14.327704]  ffff88810230b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.328107]  ffff88810230b080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.328504] >ffff88810230b100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.328777]                                            ^
[   14.329044]  ffff88810230b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.329359]  ffff88810230b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.329641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[   14.279087] ==================================================================
[   14.279653] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   14.280200] Read of size 18446744073709551614 at addr ffff88810230b084 by task kunit_try_catch/198
[   14.280546] 
[   14.280686] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.280774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.280789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.280810] Call Trace:
[   14.280825]  <TASK>
[   14.280845]  dump_stack_lvl+0x73/0xb0
[   14.280876]  print_report+0xd1/0x650
[   14.280902]  ? __virt_addr_valid+0x1db/0x2d0
[   14.280938]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.280969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.280989]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.281037]  kasan_report+0x141/0x180
[   14.281059]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.281086]  kasan_check_range+0x10c/0x1c0
[   14.281107]  __asan_memmove+0x27/0x70
[   14.281126]  kmalloc_memmove_negative_size+0x171/0x330
[   14.281148]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   14.281171]  ? __schedule+0x10cc/0x2b60
[   14.281192]  ? __pfx_read_tsc+0x10/0x10
[   14.281212]  ? ktime_get_ts64+0x86/0x230
[   14.281522]  kunit_try_run_case+0x1a5/0x480
[   14.281573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.281609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.281653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.281695]  ? __kthread_parkme+0x82/0x180
[   14.281738]  ? preempt_count_sub+0x50/0x80
[   14.281787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.281833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.281878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.281921]  kthread+0x337/0x6f0
[   14.281960]  ? trace_preempt_on+0x20/0xc0
[   14.282006]  ? __pfx_kthread+0x10/0x10
[   14.282046]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.282087]  ? calculate_sigpending+0x7b/0xa0
[   14.282120]  ? __pfx_kthread+0x10/0x10
[   14.282184]  ret_from_fork+0x116/0x1d0
[   14.282212]  ? __pfx_kthread+0x10/0x10
[   14.282245]  ret_from_fork_asm+0x1a/0x30
[   14.282277]  </TASK>
[   14.282289] 
[   14.292037] Allocated by task 198:
[   14.292443]  kasan_save_stack+0x45/0x70
[   14.292651]  kasan_save_track+0x18/0x40
[   14.292822]  kasan_save_alloc_info+0x3b/0x50
[   14.292997]  __kasan_kmalloc+0xb7/0xc0
[   14.293161]  __kmalloc_cache_noprof+0x189/0x420
[   14.293355]  kmalloc_memmove_negative_size+0xac/0x330
[   14.294037]  kunit_try_run_case+0x1a5/0x480
[   14.294405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.295048]  kthread+0x337/0x6f0
[   14.295436]  ret_from_fork+0x116/0x1d0
[   14.295950]  ret_from_fork_asm+0x1a/0x30
[   14.296423] 
[   14.296777] The buggy address belongs to the object at ffff88810230b080
[   14.296777]  which belongs to the cache kmalloc-64 of size 64
[   14.297362] The buggy address is located 4 bytes inside of
[   14.297362]  64-byte region [ffff88810230b080, ffff88810230b0c0)
[   14.297991] 
[   14.298154] The buggy address belongs to the physical page:
[   14.298559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230b
[   14.299060] flags: 0x200000000000000(node=0|zone=2)
[   14.299519] page_type: f5(slab)
[   14.299887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.300163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.300417] page dumped because: kasan: bad access detected
[   14.300619] 
[   14.300720] Memory state around the buggy address:
[   14.301219]  ffff88810230af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301960]  ffff88810230b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.302589] >ffff88810230b080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.302822]                    ^
[   14.303040]  ffff88810230b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.303775]  ffff88810230b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.304306] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[   14.244142] ==================================================================
[   14.244610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   14.245662] Write of size 16 at addr ffff8881022f9f69 by task kunit_try_catch/196
[   14.246612] 
[   14.246889] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.246989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.247013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.247053] Call Trace:
[   14.247078]  <TASK>
[   14.247109]  dump_stack_lvl+0x73/0xb0
[   14.247180]  print_report+0xd1/0x650
[   14.247251]  ? __virt_addr_valid+0x1db/0x2d0
[   14.247303]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.247347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.247377]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.247400]  kasan_report+0x141/0x180
[   14.247423]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.247450]  kasan_check_range+0x10c/0x1c0
[   14.247488]  __asan_memset+0x27/0x50
[   14.247520]  kmalloc_oob_memset_16+0x166/0x330
[   14.247556]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   14.247593]  ? __schedule+0x10cc/0x2b60
[   14.247628]  ? __pfx_read_tsc+0x10/0x10
[   14.247661]  ? ktime_get_ts64+0x86/0x230
[   14.247699]  kunit_try_run_case+0x1a5/0x480
[   14.247739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.247774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.247812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.247849]  ? __kthread_parkme+0x82/0x180
[   14.247885]  ? preempt_count_sub+0x50/0x80
[   14.247911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.247935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.247959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.247982]  kthread+0x337/0x6f0
[   14.248001]  ? trace_preempt_on+0x20/0xc0
[   14.248027]  ? __pfx_kthread+0x10/0x10
[   14.248047]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.248068]  ? calculate_sigpending+0x7b/0xa0
[   14.248093]  ? __pfx_kthread+0x10/0x10
[   14.248114]  ret_from_fork+0x116/0x1d0
[   14.248133]  ? __pfx_kthread+0x10/0x10
[   14.248152]  ret_from_fork_asm+0x1a/0x30
[   14.248184]  </TASK>
[   14.248196] 
[   14.258378] Allocated by task 196:
[   14.258606]  kasan_save_stack+0x45/0x70
[   14.258882]  kasan_save_track+0x18/0x40
[   14.259106]  kasan_save_alloc_info+0x3b/0x50
[   14.260310]  __kasan_kmalloc+0xb7/0xc0
[   14.260822]  __kmalloc_cache_noprof+0x189/0x420
[   14.261041]  kmalloc_oob_memset_16+0xac/0x330
[   14.261236]  kunit_try_run_case+0x1a5/0x480
[   14.261419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.261772]  kthread+0x337/0x6f0
[   14.262173]  ret_from_fork+0x116/0x1d0
[   14.262713]  ret_from_fork_asm+0x1a/0x30
[   14.263388] 
[   14.263871] The buggy address belongs to the object at ffff8881022f9f00
[   14.263871]  which belongs to the cache kmalloc-128 of size 128
[   14.264879] The buggy address is located 105 bytes inside of
[   14.264879]  allocated 120-byte region [ffff8881022f9f00, ffff8881022f9f78)
[   14.265665] 
[   14.265929] The buggy address belongs to the physical page:
[   14.266372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   14.267185] flags: 0x200000000000000(node=0|zone=2)
[   14.267770] page_type: f5(slab)
[   14.268039] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.268769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.268987] page dumped because: kasan: bad access detected
[   14.269471] 
[   14.269579] Memory state around the buggy address:
[   14.269942]  ffff8881022f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.270533]  ffff8881022f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.271357] >ffff8881022f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.272045]                                                                 ^
[   14.272669]  ffff8881022f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.273263]  ffff8881022fa000: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   14.273847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[   14.211778] ==================================================================
[   14.212207] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   14.212757] Write of size 8 at addr ffff888102b48e71 by task kunit_try_catch/194
[   14.213353] 
[   14.213887] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.213988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.214012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.214050] Call Trace:
[   14.214114]  <TASK>
[   14.214147]  dump_stack_lvl+0x73/0xb0
[   14.214205]  print_report+0xd1/0x650
[   14.214264]  ? __virt_addr_valid+0x1db/0x2d0
[   14.214310]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.214357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.214382]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.214406]  kasan_report+0x141/0x180
[   14.214430]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.214472]  kasan_check_range+0x10c/0x1c0
[   14.214535]  __asan_memset+0x27/0x50
[   14.214567]  kmalloc_oob_memset_8+0x166/0x330
[   14.214603]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   14.214628]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.214652]  ? trace_hardirqs_on+0x37/0xe0
[   14.214677]  ? __pfx_read_tsc+0x10/0x10
[   14.214699]  ? ktime_get_ts64+0x86/0x230
[   14.214724]  kunit_try_run_case+0x1a5/0x480
[   14.214748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.214771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.214794]  ? __kthread_parkme+0x82/0x180
[   14.214814]  ? preempt_count_sub+0x50/0x80
[   14.214837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.214860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.214881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.214903]  kthread+0x337/0x6f0
[   14.214921]  ? trace_preempt_on+0x20/0xc0
[   14.214942]  ? __pfx_kthread+0x10/0x10
[   14.214962]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.214981]  ? calculate_sigpending+0x7b/0xa0
[   14.215006]  ? __pfx_kthread+0x10/0x10
[   14.215027]  ret_from_fork+0x116/0x1d0
[   14.215044]  ? __pfx_kthread+0x10/0x10
[   14.215064]  ret_from_fork_asm+0x1a/0x30
[   14.215097]  </TASK>
[   14.215110] 
[   14.225521] Allocated by task 194:
[   14.225803]  kasan_save_stack+0x45/0x70
[   14.226077]  kasan_save_track+0x18/0x40
[   14.226296]  kasan_save_alloc_info+0x3b/0x50
[   14.226561]  __kasan_kmalloc+0xb7/0xc0
[   14.227296]  __kmalloc_cache_noprof+0x189/0x420
[   14.227714]  kmalloc_oob_memset_8+0xac/0x330
[   14.228027]  kunit_try_run_case+0x1a5/0x480
[   14.228347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.228718]  kthread+0x337/0x6f0
[   14.228985]  ret_from_fork+0x116/0x1d0
[   14.229168]  ret_from_fork_asm+0x1a/0x30
[   14.229762] 
[   14.229923] The buggy address belongs to the object at ffff888102b48e00
[   14.229923]  which belongs to the cache kmalloc-128 of size 128
[   14.230581] The buggy address is located 113 bytes inside of
[   14.230581]  allocated 120-byte region [ffff888102b48e00, ffff888102b48e78)
[   14.231741] 
[   14.231909] The buggy address belongs to the physical page:
[   14.232119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.232708] flags: 0x200000000000000(node=0|zone=2)
[   14.233091] page_type: f5(slab)
[   14.233638] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.234635] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.235308] page dumped because: kasan: bad access detected
[   14.235708] 
[   14.236158] Memory state around the buggy address:
[   14.236533]  ffff888102b48d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.236818]  ffff888102b48d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237156] >ffff888102b48e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.237522]                                                                 ^
[   14.238446]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.239039]  ffff888102b48f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.239364] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[   14.178086] ==================================================================
[   14.178539] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   14.179323] Write of size 4 at addr ffff8881022f9e75 by task kunit_try_catch/192
[   14.179874] 
[   14.180130] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.180236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.180261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.180300] Call Trace:
[   14.180355]  <TASK>
[   14.180391]  dump_stack_lvl+0x73/0xb0
[   14.180512]  print_report+0xd1/0x650
[   14.180562]  ? __virt_addr_valid+0x1db/0x2d0
[   14.180614]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.180655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.180687]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.180709]  kasan_report+0x141/0x180
[   14.180732]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.180758]  kasan_check_range+0x10c/0x1c0
[   14.180781]  __asan_memset+0x27/0x50
[   14.180800]  kmalloc_oob_memset_4+0x166/0x330
[   14.180822]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   14.180844]  ? __schedule+0x10cc/0x2b60
[   14.180867]  ? __pfx_read_tsc+0x10/0x10
[   14.180888]  ? ktime_get_ts64+0x86/0x230
[   14.180913]  kunit_try_run_case+0x1a5/0x480
[   14.180939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.180960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.180982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.181003]  ? __kthread_parkme+0x82/0x180
[   14.181025]  ? preempt_count_sub+0x50/0x80
[   14.181050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.181072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.181095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.181117]  kthread+0x337/0x6f0
[   14.181136]  ? trace_preempt_on+0x20/0xc0
[   14.181159]  ? __pfx_kthread+0x10/0x10
[   14.181179]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.181199]  ? calculate_sigpending+0x7b/0xa0
[   14.181242]  ? __pfx_kthread+0x10/0x10
[   14.181287]  ret_from_fork+0x116/0x1d0
[   14.181314]  ? __pfx_kthread+0x10/0x10
[   14.181362]  ret_from_fork_asm+0x1a/0x30
[   14.181407]  </TASK>
[   14.181421] 
[   14.191920] Allocated by task 192:
[   14.192062]  kasan_save_stack+0x45/0x70
[   14.192209]  kasan_save_track+0x18/0x40
[   14.192385]  kasan_save_alloc_info+0x3b/0x50
[   14.192785]  __kasan_kmalloc+0xb7/0xc0
[   14.193132]  __kmalloc_cache_noprof+0x189/0x420
[   14.193479]  kmalloc_oob_memset_4+0xac/0x330
[   14.193849]  kunit_try_run_case+0x1a5/0x480
[   14.194047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.194259]  kthread+0x337/0x6f0
[   14.194547]  ret_from_fork+0x116/0x1d0
[   14.194857]  ret_from_fork_asm+0x1a/0x30
[   14.195173] 
[   14.196485] The buggy address belongs to the object at ffff8881022f9e00
[   14.196485]  which belongs to the cache kmalloc-128 of size 128
[   14.197351] The buggy address is located 117 bytes inside of
[   14.197351]  allocated 120-byte region [ffff8881022f9e00, ffff8881022f9e78)
[   14.198339] 
[   14.198516] The buggy address belongs to the physical page:
[   14.198721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   14.198967] flags: 0x200000000000000(node=0|zone=2)
[   14.199364] page_type: f5(slab)
[   14.199655] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.200104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.200805] page dumped because: kasan: bad access detected
[   14.201176] 
[   14.201279] Memory state around the buggy address:
[   14.201470]  ffff8881022f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.202464]  ffff8881022f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.202987] >ffff8881022f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.203300]                                                                 ^
[   14.203886]  ffff8881022f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204243]  ffff8881022f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204907] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[   14.143160] ==================================================================
[   14.143881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   14.144082] Write of size 2 at addr ffff8881022f9d77 by task kunit_try_catch/190
[   14.144216] 
[   14.144361] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.144450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.144470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.144504] Call Trace:
[   14.144529]  <TASK>
[   14.144562]  dump_stack_lvl+0x73/0xb0
[   14.144611]  print_report+0xd1/0x650
[   14.144647]  ? __virt_addr_valid+0x1db/0x2d0
[   14.144682]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.145153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.145206]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.145256]  kasan_report+0x141/0x180
[   14.145302]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.145390]  kasan_check_range+0x10c/0x1c0
[   14.145607]  __asan_memset+0x27/0x50
[   14.145672]  kmalloc_oob_memset_2+0x166/0x330
[   14.145710]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   14.145734]  ? __schedule+0x10cc/0x2b60
[   14.145758]  ? __pfx_read_tsc+0x10/0x10
[   14.145779]  ? ktime_get_ts64+0x86/0x230
[   14.145803]  kunit_try_run_case+0x1a5/0x480
[   14.145827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.145847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.145870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.145890]  ? __kthread_parkme+0x82/0x180
[   14.145911]  ? preempt_count_sub+0x50/0x80
[   14.145934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.145957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.145978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.145999]  kthread+0x337/0x6f0
[   14.146017]  ? trace_preempt_on+0x20/0xc0
[   14.146041]  ? __pfx_kthread+0x10/0x10
[   14.146061]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.146080]  ? calculate_sigpending+0x7b/0xa0
[   14.146104]  ? __pfx_kthread+0x10/0x10
[   14.146124]  ret_from_fork+0x116/0x1d0
[   14.146142]  ? __pfx_kthread+0x10/0x10
[   14.146161]  ret_from_fork_asm+0x1a/0x30
[   14.146192]  </TASK>
[   14.146204] 
[   14.157858] Allocated by task 190:
[   14.158079]  kasan_save_stack+0x45/0x70
[   14.158657]  kasan_save_track+0x18/0x40
[   14.158914]  kasan_save_alloc_info+0x3b/0x50
[   14.159097]  __kasan_kmalloc+0xb7/0xc0
[   14.159345]  __kmalloc_cache_noprof+0x189/0x420
[   14.160257]  kmalloc_oob_memset_2+0xac/0x330
[   14.160882]  kunit_try_run_case+0x1a5/0x480
[   14.161285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.161664]  kthread+0x337/0x6f0
[   14.162028]  ret_from_fork+0x116/0x1d0
[   14.162411]  ret_from_fork_asm+0x1a/0x30
[   14.162844] 
[   14.163011] The buggy address belongs to the object at ffff8881022f9d00
[   14.163011]  which belongs to the cache kmalloc-128 of size 128
[   14.164183] The buggy address is located 119 bytes inside of
[   14.164183]  allocated 120-byte region [ffff8881022f9d00, ffff8881022f9d78)
[   14.164741] 
[   14.164918] The buggy address belongs to the physical page:
[   14.165357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   14.165987] flags: 0x200000000000000(node=0|zone=2)
[   14.166439] page_type: f5(slab)
[   14.166868] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.167316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.168125] page dumped because: kasan: bad access detected
[   14.168785] 
[   14.168990] Memory state around the buggy address:
[   14.169233]  ffff8881022f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.169599]  ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.170258] >ffff8881022f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.170879]                                                                 ^
[   14.171235]  ffff8881022f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.171527]  ffff8881022f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.171992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[   14.110649] ==================================================================
[   14.111266] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   14.112029] Write of size 128 at addr ffff8881022f9c00 by task kunit_try_catch/188
[   14.112612] 
[   14.112887] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.112976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.113309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.113335] Call Trace:
[   14.113351]  <TASK>
[   14.113374]  dump_stack_lvl+0x73/0xb0
[   14.113413]  print_report+0xd1/0x650
[   14.113437]  ? __virt_addr_valid+0x1db/0x2d0
[   14.113469]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.113531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.113567]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.113619]  kasan_report+0x141/0x180
[   14.113643]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.113668]  kasan_check_range+0x10c/0x1c0
[   14.113690]  __asan_memset+0x27/0x50
[   14.113709]  kmalloc_oob_in_memset+0x15f/0x320
[   14.113730]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   14.113750]  ? __schedule+0x10cc/0x2b60
[   14.113772]  ? __pfx_read_tsc+0x10/0x10
[   14.113793]  ? ktime_get_ts64+0x86/0x230
[   14.113817]  kunit_try_run_case+0x1a5/0x480
[   14.113843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.113862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.113883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.113903]  ? __kthread_parkme+0x82/0x180
[   14.113924]  ? preempt_count_sub+0x50/0x80
[   14.113949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.113970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.113990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.114010]  kthread+0x337/0x6f0
[   14.114028]  ? trace_preempt_on+0x20/0xc0
[   14.114051]  ? __pfx_kthread+0x10/0x10
[   14.114070]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.114089]  ? calculate_sigpending+0x7b/0xa0
[   14.114112]  ? __pfx_kthread+0x10/0x10
[   14.114132]  ret_from_fork+0x116/0x1d0
[   14.114149]  ? __pfx_kthread+0x10/0x10
[   14.114168]  ret_from_fork_asm+0x1a/0x30
[   14.114198]  </TASK>
[   14.114211] 
[   14.124232] Allocated by task 188:
[   14.124675]  kasan_save_stack+0x45/0x70
[   14.125067]  kasan_save_track+0x18/0x40
[   14.125277]  kasan_save_alloc_info+0x3b/0x50
[   14.125800]  __kasan_kmalloc+0xb7/0xc0
[   14.126130]  __kmalloc_cache_noprof+0x189/0x420
[   14.126450]  kmalloc_oob_in_memset+0xac/0x320
[   14.126972]  kunit_try_run_case+0x1a5/0x480
[   14.127314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.127646]  kthread+0x337/0x6f0
[   14.127814]  ret_from_fork+0x116/0x1d0
[   14.128106]  ret_from_fork_asm+0x1a/0x30
[   14.128775] 
[   14.128954] The buggy address belongs to the object at ffff8881022f9c00
[   14.128954]  which belongs to the cache kmalloc-128 of size 128
[   14.129739] The buggy address is located 0 bytes inside of
[   14.129739]  allocated 120-byte region [ffff8881022f9c00, ffff8881022f9c78)
[   14.130707] 
[   14.130890] The buggy address belongs to the physical page:
[   14.131316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9
[   14.131789] flags: 0x200000000000000(node=0|zone=2)
[   14.132204] page_type: f5(slab)
[   14.132717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.133267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.133904] page dumped because: kasan: bad access detected
[   14.134292] 
[   14.134611] Memory state around the buggy address:
[   14.135002]  ffff8881022f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.135399]  ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.136023] >ffff8881022f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.136705]                                                                 ^
[   14.137119]  ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.137402]  ffff8881022f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.138019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[   14.068884] ==================================================================
[   14.069367] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   14.069866] Read of size 16 at addr ffff888102817b40 by task kunit_try_catch/186
[   14.070080] 
[   14.070185] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.070266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.070286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.070324] Call Trace:
[   14.070357]  <TASK>
[   14.070391]  dump_stack_lvl+0x73/0xb0
[   14.070795]  print_report+0xd1/0x650
[   14.070908]  ? __virt_addr_valid+0x1db/0x2d0
[   14.070972]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.071026]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.071077]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.071124]  kasan_report+0x141/0x180
[   14.071167]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.071218]  __asan_report_load16_noabort+0x18/0x20
[   14.071272]  kmalloc_uaf_16+0x47b/0x4c0
[   14.071334]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   14.071384]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   14.071435]  kunit_try_run_case+0x1a5/0x480
[   14.071521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.071741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.071781]  ? __kthread_parkme+0x82/0x180
[   14.071813]  ? preempt_count_sub+0x50/0x80
[   14.071842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.071938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.071963]  kthread+0x337/0x6f0
[   14.071983]  ? trace_preempt_on+0x20/0xc0
[   14.072009]  ? __pfx_kthread+0x10/0x10
[   14.072029]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.072050]  ? calculate_sigpending+0x7b/0xa0
[   14.072074]  ? __pfx_kthread+0x10/0x10
[   14.072095]  ret_from_fork+0x116/0x1d0
[   14.072115]  ? __pfx_kthread+0x10/0x10
[   14.072135]  ret_from_fork_asm+0x1a/0x30
[   14.072167]  </TASK>
[   14.072180] 
[   14.083314] Allocated by task 186:
[   14.083676]  kasan_save_stack+0x45/0x70
[   14.084078]  kasan_save_track+0x18/0x40
[   14.084406]  kasan_save_alloc_info+0x3b/0x50
[   14.084813]  __kasan_kmalloc+0xb7/0xc0
[   14.085153]  __kmalloc_cache_noprof+0x189/0x420
[   14.085682]  kmalloc_uaf_16+0x15b/0x4c0
[   14.086028]  kunit_try_run_case+0x1a5/0x480
[   14.086479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.086947]  kthread+0x337/0x6f0
[   14.087252]  ret_from_fork+0x116/0x1d0
[   14.087620]  ret_from_fork_asm+0x1a/0x30
[   14.087969] 
[   14.088249] Freed by task 186:
[   14.088511]  kasan_save_stack+0x45/0x70
[   14.088859]  kasan_save_track+0x18/0x40
[   14.089155]  kasan_save_free_info+0x3f/0x60
[   14.089570]  __kasan_slab_free+0x56/0x70
[   14.089785]  kfree+0x222/0x3f0
[   14.089973]  kmalloc_uaf_16+0x1d6/0x4c0
[   14.090358]  kunit_try_run_case+0x1a5/0x480
[   14.090786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091198]  kthread+0x337/0x6f0
[   14.091603]  ret_from_fork+0x116/0x1d0
[   14.092067]  ret_from_fork_asm+0x1a/0x30
[   14.092398] 
[   14.092609] The buggy address belongs to the object at ffff888102817b40
[   14.092609]  which belongs to the cache kmalloc-16 of size 16
[   14.093446] The buggy address is located 0 bytes inside of
[   14.093446]  freed 16-byte region [ffff888102817b40, ffff888102817b50)
[   14.094091] 
[   14.094293] The buggy address belongs to the physical page:
[   14.094779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817
[   14.095644] flags: 0x200000000000000(node=0|zone=2)
[   14.096026] page_type: f5(slab)
[   14.096386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.096899] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.097879] page dumped because: kasan: bad access detected
[   14.098247] 
[   14.098404] Memory state around the buggy address:
[   14.098691]  ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   14.099910]  ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.100268] >ffff888102817b00: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   14.100723]                                            ^
[   14.100952]  ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103435]  ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.104005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[   14.036681] ==================================================================
[   14.037276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   14.038346] Write of size 16 at addr ffff8881022a3460 by task kunit_try_catch/184
[   14.039025] 
[   14.039200] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.039313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.039350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.039388] Call Trace:
[   14.039417]  <TASK>
[   14.039451]  dump_stack_lvl+0x73/0xb0
[   14.039519]  print_report+0xd1/0x650
[   14.039589]  ? __virt_addr_valid+0x1db/0x2d0
[   14.039629]  ? kmalloc_oob_16+0x452/0x4a0
[   14.039664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.039693]  ? kmalloc_oob_16+0x452/0x4a0
[   14.039713]  kasan_report+0x141/0x180
[   14.039734]  ? kmalloc_oob_16+0x452/0x4a0
[   14.039759]  __asan_report_store16_noabort+0x1b/0x30
[   14.039778]  kmalloc_oob_16+0x452/0x4a0
[   14.039798]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   14.039819]  ? __schedule+0x10cc/0x2b60
[   14.039840]  ? __pfx_read_tsc+0x10/0x10
[   14.039861]  ? ktime_get_ts64+0x86/0x230
[   14.039884]  kunit_try_run_case+0x1a5/0x480
[   14.039909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.039929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.039950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.039972]  ? __kthread_parkme+0x82/0x180
[   14.039993]  ? preempt_count_sub+0x50/0x80
[   14.040016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.040037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.040058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.040078]  kthread+0x337/0x6f0
[   14.040096]  ? trace_preempt_on+0x20/0xc0
[   14.040119]  ? __pfx_kthread+0x10/0x10
[   14.040139]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.040158]  ? calculate_sigpending+0x7b/0xa0
[   14.040180]  ? __pfx_kthread+0x10/0x10
[   14.040200]  ret_from_fork+0x116/0x1d0
[   14.040217]  ? __pfx_kthread+0x10/0x10
[   14.040260]  ret_from_fork_asm+0x1a/0x30
[   14.040292]  </TASK>
[   14.040304] 
[   14.048761] Allocated by task 184:
[   14.049057]  kasan_save_stack+0x45/0x70
[   14.049385]  kasan_save_track+0x18/0x40
[   14.049686]  kasan_save_alloc_info+0x3b/0x50
[   14.050007]  __kasan_kmalloc+0xb7/0xc0
[   14.050853]  __kmalloc_cache_noprof+0x189/0x420
[   14.051212]  kmalloc_oob_16+0xa8/0x4a0
[   14.051704]  kunit_try_run_case+0x1a5/0x480
[   14.052056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.052318]  kthread+0x337/0x6f0
[   14.052784]  ret_from_fork+0x116/0x1d0
[   14.053031]  ret_from_fork_asm+0x1a/0x30
[   14.053357] 
[   14.053707] The buggy address belongs to the object at ffff8881022a3460
[   14.053707]  which belongs to the cache kmalloc-16 of size 16
[   14.054346] The buggy address is located 0 bytes inside of
[   14.054346]  allocated 13-byte region [ffff8881022a3460, ffff8881022a346d)
[   14.055363] 
[   14.055808] The buggy address belongs to the physical page:
[   14.056970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3
[   14.057290] flags: 0x200000000000000(node=0|zone=2)
[   14.057922] page_type: f5(slab)
[   14.058318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.058874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.059100] page dumped because: kasan: bad access detected
[   14.059484] 
[   14.059637] Memory state around the buggy address:
[   14.059881]  ffff8881022a3300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.060158]  ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.060994] >ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   14.061534]                                                           ^
[   14.062014]  ffff8881022a3480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.062882]  ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.063169] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[   13.961779] ==================================================================
[   13.962343] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   13.963033] Read of size 1 at addr ffff888100ab3800 by task kunit_try_catch/182
[   13.963271] 
[   13.963483] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.963576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.963599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.963638] Call Trace:
[   13.963666]  <TASK>
[   13.963702]  dump_stack_lvl+0x73/0xb0
[   13.963766]  print_report+0xd1/0x650
[   13.963814]  ? __virt_addr_valid+0x1db/0x2d0
[   13.963858]  ? krealloc_uaf+0x1b8/0x5e0
[   13.963895]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.963937]  ? krealloc_uaf+0x1b8/0x5e0
[   13.963978]  kasan_report+0x141/0x180
[   13.964019]  ? krealloc_uaf+0x1b8/0x5e0
[   13.964060]  ? krealloc_uaf+0x1b8/0x5e0
[   13.964097]  __kasan_check_byte+0x3d/0x50
[   13.964136]  krealloc_noprof+0x3f/0x340
[   13.964183]  krealloc_uaf+0x1b8/0x5e0
[   13.964669]  ? __pfx_krealloc_uaf+0x10/0x10
[   13.964723]  ? finish_task_switch.isra.0+0x153/0x700
[   13.964750]  ? __switch_to+0x47/0xf50
[   13.964778]  ? __schedule+0x10cc/0x2b60
[   13.964800]  ? __pfx_read_tsc+0x10/0x10
[   13.964821]  ? ktime_get_ts64+0x86/0x230
[   13.964845]  kunit_try_run_case+0x1a5/0x480
[   13.964872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.964893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.964915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.964936]  ? __kthread_parkme+0x82/0x180
[   13.964958]  ? preempt_count_sub+0x50/0x80
[   13.964979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.965001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.965021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.965042]  kthread+0x337/0x6f0
[   13.965060]  ? trace_preempt_on+0x20/0xc0
[   13.965083]  ? __pfx_kthread+0x10/0x10
[   13.965104]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.965123]  ? calculate_sigpending+0x7b/0xa0
[   13.965147]  ? __pfx_kthread+0x10/0x10
[   13.965167]  ret_from_fork+0x116/0x1d0
[   13.965185]  ? __pfx_kthread+0x10/0x10
[   13.965204]  ret_from_fork_asm+0x1a/0x30
[   13.965251]  </TASK>
[   13.965266] 
[   13.974960] Allocated by task 182:
[   13.975244]  kasan_save_stack+0x45/0x70
[   13.975799]  kasan_save_track+0x18/0x40
[   13.976135]  kasan_save_alloc_info+0x3b/0x50
[   13.977005]  __kasan_kmalloc+0xb7/0xc0
[   13.977352]  __kmalloc_cache_noprof+0x189/0x420
[   13.977847]  krealloc_uaf+0xbb/0x5e0
[   13.978141]  kunit_try_run_case+0x1a5/0x480
[   13.978644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.979050]  kthread+0x337/0x6f0
[   13.979347]  ret_from_fork+0x116/0x1d0
[   13.979786]  ret_from_fork_asm+0x1a/0x30
[   13.979970] 
[   13.980219] Freed by task 182:
[   13.980693]  kasan_save_stack+0x45/0x70
[   13.981141]  kasan_save_track+0x18/0x40
[   13.981329]  kasan_save_free_info+0x3f/0x60
[   13.981851]  __kasan_slab_free+0x56/0x70
[   13.982198]  kfree+0x222/0x3f0
[   13.982626]  krealloc_uaf+0x13d/0x5e0
[   13.982962]  kunit_try_run_case+0x1a5/0x480
[   13.983140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.983888]  kthread+0x337/0x6f0
[   13.984135]  ret_from_fork+0x116/0x1d0
[   13.984436]  ret_from_fork_asm+0x1a/0x30
[   13.985213] 
[   13.985362] The buggy address belongs to the object at ffff888100ab3800
[   13.985362]  which belongs to the cache kmalloc-256 of size 256
[   13.985844] The buggy address is located 0 bytes inside of
[   13.985844]  freed 256-byte region [ffff888100ab3800, ffff888100ab3900)
[   13.986504] 
[   13.986676] The buggy address belongs to the physical page:
[   13.987067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.987967] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.988359] flags: 0x200000000000040(head|node=0|zone=2)
[   13.989062] page_type: f5(slab)
[   13.989297] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.989949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.990393] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.991075] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.991582] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.991858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.992408] page dumped because: kasan: bad access detected
[   13.993046] 
[   13.993238] Memory state around the buggy address:
[   13.993760]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.994159]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.994666] >ffff888100ab3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.994913]                    ^
[   13.995237]  ffff888100ab3880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.995615]  ffff888100ab3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.996047] ==================================================================
[   13.997346] ==================================================================
[   13.997659] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   13.998873] Read of size 1 at addr ffff888100ab3800 by task kunit_try_catch/182
[   13.999286] 
[   13.999441] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.999543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.999660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.999701] Call Trace:
[   13.999743]  <TASK>
[   14.000306]  dump_stack_lvl+0x73/0xb0
[   14.000362]  print_report+0xd1/0x650
[   14.000388]  ? __virt_addr_valid+0x1db/0x2d0
[   14.000413]  ? krealloc_uaf+0x53c/0x5e0
[   14.000433]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.000456]  ? krealloc_uaf+0x53c/0x5e0
[   14.000489]  kasan_report+0x141/0x180
[   14.000544]  ? krealloc_uaf+0x53c/0x5e0
[   14.000584]  __asan_report_load1_noabort+0x18/0x20
[   14.000615]  krealloc_uaf+0x53c/0x5e0
[   14.000664]  ? __pfx_krealloc_uaf+0x10/0x10
[   14.000687]  ? finish_task_switch.isra.0+0x153/0x700
[   14.000709]  ? __switch_to+0x47/0xf50
[   14.000735]  ? __schedule+0x10cc/0x2b60
[   14.000756]  ? __pfx_read_tsc+0x10/0x10
[   14.000777]  ? ktime_get_ts64+0x86/0x230
[   14.000800]  kunit_try_run_case+0x1a5/0x480
[   14.000825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.000846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.000867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.000887]  ? __kthread_parkme+0x82/0x180
[   14.000908]  ? preempt_count_sub+0x50/0x80
[   14.000930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.000951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.000971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.000991]  kthread+0x337/0x6f0
[   14.001009]  ? trace_preempt_on+0x20/0xc0
[   14.001032]  ? __pfx_kthread+0x10/0x10
[   14.001052]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.001071]  ? calculate_sigpending+0x7b/0xa0
[   14.001093]  ? __pfx_kthread+0x10/0x10
[   14.001113]  ret_from_fork+0x116/0x1d0
[   14.001130]  ? __pfx_kthread+0x10/0x10
[   14.001149]  ret_from_fork_asm+0x1a/0x30
[   14.001178]  </TASK>
[   14.001191] 
[   14.012592] Allocated by task 182:
[   14.012731]  kasan_save_stack+0x45/0x70
[   14.012886]  kasan_save_track+0x18/0x40
[   14.013012]  kasan_save_alloc_info+0x3b/0x50
[   14.013146]  __kasan_kmalloc+0xb7/0xc0
[   14.013277]  __kmalloc_cache_noprof+0x189/0x420
[   14.013424]  krealloc_uaf+0xbb/0x5e0
[   14.013549]  kunit_try_run_case+0x1a5/0x480
[   14.013687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.013847]  kthread+0x337/0x6f0
[   14.013970]  ret_from_fork+0x116/0x1d0
[   14.014100]  ret_from_fork_asm+0x1a/0x30
[   14.016197] 
[   14.016382] Freed by task 182:
[   14.016817]  kasan_save_stack+0x45/0x70
[   14.017050]  kasan_save_track+0x18/0x40
[   14.017265]  kasan_save_free_info+0x3f/0x60
[   14.017588]  __kasan_slab_free+0x56/0x70
[   14.017860]  kfree+0x222/0x3f0
[   14.018087]  krealloc_uaf+0x13d/0x5e0
[   14.018360]  kunit_try_run_case+0x1a5/0x480
[   14.018593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.018944]  kthread+0x337/0x6f0
[   14.019192]  ret_from_fork+0x116/0x1d0
[   14.020036]  ret_from_fork_asm+0x1a/0x30
[   14.020377] 
[   14.020518] The buggy address belongs to the object at ffff888100ab3800
[   14.020518]  which belongs to the cache kmalloc-256 of size 256
[   14.021021] The buggy address is located 0 bytes inside of
[   14.021021]  freed 256-byte region [ffff888100ab3800, ffff888100ab3900)
[   14.021741] 
[   14.021942] The buggy address belongs to the physical page:
[   14.022194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   14.022554] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.023014] flags: 0x200000000000040(head|node=0|zone=2)
[   14.023887] page_type: f5(slab)
[   14.024084] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.024455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.025109] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.025437] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.026419] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   14.026904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.027201] page dumped because: kasan: bad access detected
[   14.027564] 
[   14.027692] Memory state around the buggy address:
[   14.027930]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.028427]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.028673] >ffff888100ab3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.029780]                    ^
[   14.030065]  ffff888100ab3880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.030622]  ffff888100ab3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.031022] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[   13.881635] ==================================================================
[   13.881867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.882148] Write of size 1 at addr ffff88810298e0da by task kunit_try_catch/180
[   13.882953] 
[   13.883557] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.883657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.883682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.883720] Call Trace:
[   13.883761]  <TASK>
[   13.883796]  dump_stack_lvl+0x73/0xb0
[   13.883883]  print_report+0xd1/0x650
[   13.884091]  ? __virt_addr_valid+0x1db/0x2d0
[   13.884146]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884195]  ? kasan_addr_to_slab+0x11/0xa0
[   13.884249]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884298]  kasan_report+0x141/0x180
[   13.884336]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.884389]  __asan_report_store1_noabort+0x1b/0x30
[   13.884423]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.884478]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.884516]  ? finish_task_switch.isra.0+0x153/0x700
[   13.884550]  ? __switch_to+0x47/0xf50
[   13.884592]  ? __schedule+0x10cc/0x2b60
[   13.884620]  ? __pfx_read_tsc+0x10/0x10
[   13.884645]  krealloc_large_less_oob+0x1c/0x30
[   13.884668]  kunit_try_run_case+0x1a5/0x480
[   13.884695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.884737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.884758]  ? __kthread_parkme+0x82/0x180
[   13.884779]  ? preempt_count_sub+0x50/0x80
[   13.884801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.884844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.884865]  kthread+0x337/0x6f0
[   13.884884]  ? trace_preempt_on+0x20/0xc0
[   13.884907]  ? __pfx_kthread+0x10/0x10
[   13.884926]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.884946]  ? calculate_sigpending+0x7b/0xa0
[   13.884970]  ? __pfx_kthread+0x10/0x10
[   13.884990]  ret_from_fork+0x116/0x1d0
[   13.885008]  ? __pfx_kthread+0x10/0x10
[   13.885028]  ret_from_fork_asm+0x1a/0x30
[   13.885060]  </TASK>
[   13.885072] 
[   13.896777] The buggy address belongs to the physical page:
[   13.897158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.897682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.898175] flags: 0x200000000000040(head|node=0|zone=2)
[   13.899160] page_type: f8(unknown)
[   13.899654] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.900162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.900637] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.900882] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.901685] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.902097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.902420] page dumped because: kasan: bad access detected
[   13.902882] 
[   13.903047] Memory state around the buggy address:
[   13.903762]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.904175]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.904741] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.905101]                                                     ^
[   13.905653]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.905955]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.906430] ==================================================================
[   13.643860] ==================================================================
[   13.644449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.644887] Write of size 1 at addr ffff888100ab36d0 by task kunit_try_catch/176
[   13.645261] 
[   13.645459] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.645547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.645570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.645608] Call Trace:
[   13.645640]  <TASK>
[   13.645672]  dump_stack_lvl+0x73/0xb0
[   13.645727]  print_report+0xd1/0x650
[   13.645772]  ? __virt_addr_valid+0x1db/0x2d0
[   13.645818]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.645863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.645907]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.645952]  kasan_report+0x141/0x180
[   13.645990]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.646039]  __asan_report_store1_noabort+0x1b/0x30
[   13.646075]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.646121]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.646166]  ? finish_task_switch.isra.0+0x153/0x700
[   13.646207]  ? __switch_to+0x47/0xf50
[   13.646271]  ? __schedule+0x10cc/0x2b60
[   13.646314]  ? __pfx_read_tsc+0x10/0x10
[   13.646373]  krealloc_less_oob+0x1c/0x30
[   13.646418]  kunit_try_run_case+0x1a5/0x480
[   13.646469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.646556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.646592]  ? __kthread_parkme+0x82/0x180
[   13.646626]  ? preempt_count_sub+0x50/0x80
[   13.646669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.646745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.646784]  kthread+0x337/0x6f0
[   13.646818]  ? trace_preempt_on+0x20/0xc0
[   13.646860]  ? __pfx_kthread+0x10/0x10
[   13.646896]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.646930]  ? calculate_sigpending+0x7b/0xa0
[   13.646970]  ? __pfx_kthread+0x10/0x10
[   13.647011]  ret_from_fork+0x116/0x1d0
[   13.647049]  ? __pfx_kthread+0x10/0x10
[   13.647091]  ret_from_fork_asm+0x1a/0x30
[   13.647151]  </TASK>
[   13.647170] 
[   13.657063] Allocated by task 176:
[   13.657327]  kasan_save_stack+0x45/0x70
[   13.657755]  kasan_save_track+0x18/0x40
[   13.658007]  kasan_save_alloc_info+0x3b/0x50
[   13.658190]  __kasan_krealloc+0x190/0x1f0
[   13.658951]  krealloc_noprof+0xf3/0x340
[   13.659154]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.659507]  krealloc_less_oob+0x1c/0x30
[   13.659687]  kunit_try_run_case+0x1a5/0x480
[   13.659976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.660362]  kthread+0x337/0x6f0
[   13.660620]  ret_from_fork+0x116/0x1d0
[   13.660906]  ret_from_fork_asm+0x1a/0x30
[   13.661100] 
[   13.661423] The buggy address belongs to the object at ffff888100ab3600
[   13.661423]  which belongs to the cache kmalloc-256 of size 256
[   13.661966] The buggy address is located 7 bytes to the right of
[   13.661966]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.663085] 
[   13.663273] The buggy address belongs to the physical page:
[   13.663706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.664030] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.664403] flags: 0x200000000000040(head|node=0|zone=2)
[   13.664917] page_type: f5(slab)
[   13.665091] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.665613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.666126] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.666984] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.667334] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.668008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.668351] page dumped because: kasan: bad access detected
[   13.668865] 
[   13.669032] Memory state around the buggy address:
[   13.669267]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.669819]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.670283] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.671113]                                                  ^
[   13.671438]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.671903]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.672448] ==================================================================
[   13.673386] ==================================================================
[   13.673932] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.674394] Write of size 1 at addr ffff888100ab36da by task kunit_try_catch/176
[   13.675295] 
[   13.675620] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.675740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.675761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.675795] Call Trace:
[   13.675827]  <TASK>
[   13.675859]  dump_stack_lvl+0x73/0xb0
[   13.675918]  print_report+0xd1/0x650
[   13.675963]  ? __virt_addr_valid+0x1db/0x2d0
[   13.676009]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.676099]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676145]  kasan_report+0x141/0x180
[   13.676191]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.676254]  __asan_report_store1_noabort+0x1b/0x30
[   13.676290]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.676329]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.676369]  ? finish_task_switch.isra.0+0x153/0x700
[   13.676408]  ? __switch_to+0x47/0xf50
[   13.676451]  ? __schedule+0x10cc/0x2b60
[   13.676659]  ? __pfx_read_tsc+0x10/0x10
[   13.676709]  krealloc_less_oob+0x1c/0x30
[   13.676755]  kunit_try_run_case+0x1a5/0x480
[   13.676804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.676847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.676887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.676922]  ? __kthread_parkme+0x82/0x180
[   13.676954]  ? preempt_count_sub+0x50/0x80
[   13.676992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.677030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.677071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.677115]  kthread+0x337/0x6f0
[   13.677154]  ? trace_preempt_on+0x20/0xc0
[   13.677202]  ? __pfx_kthread+0x10/0x10
[   13.677254]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.677297]  ? calculate_sigpending+0x7b/0xa0
[   13.677343]  ? __pfx_kthread+0x10/0x10
[   13.677387]  ret_from_fork+0x116/0x1d0
[   13.677421]  ? __pfx_kthread+0x10/0x10
[   13.677557]  ret_from_fork_asm+0x1a/0x30
[   13.677625]  </TASK>
[   13.677640] 
[   13.691284] Allocated by task 176:
[   13.691674]  kasan_save_stack+0x45/0x70
[   13.691927]  kasan_save_track+0x18/0x40
[   13.692123]  kasan_save_alloc_info+0x3b/0x50
[   13.692296]  __kasan_krealloc+0x190/0x1f0
[   13.692607]  krealloc_noprof+0xf3/0x340
[   13.692810]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.693011]  krealloc_less_oob+0x1c/0x30
[   13.693976]  kunit_try_run_case+0x1a5/0x480
[   13.694196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.694398]  kthread+0x337/0x6f0
[   13.695128]  ret_from_fork+0x116/0x1d0
[   13.695580]  ret_from_fork_asm+0x1a/0x30
[   13.696091] 
[   13.696191] The buggy address belongs to the object at ffff888100ab3600
[   13.696191]  which belongs to the cache kmalloc-256 of size 256
[   13.697085] The buggy address is located 17 bytes to the right of
[   13.697085]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.697546] 
[   13.697701] The buggy address belongs to the physical page:
[   13.697881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.698458] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.698748] flags: 0x200000000000040(head|node=0|zone=2)
[   13.699097] page_type: f5(slab)
[   13.699776] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.700071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.700337] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.700850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.701442] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.701908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.702423] page dumped because: kasan: bad access detected
[   13.702931] 
[   13.703047] Memory state around the buggy address:
[   13.703437]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.704160]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.704490] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.704852]                                                     ^
[   13.705457]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.705919]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.706318] ==================================================================
[   13.854821] ==================================================================
[   13.855356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.855858] Write of size 1 at addr ffff88810298e0d0 by task kunit_try_catch/180
[   13.856239] 
[   13.856386] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.856491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.856516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.856553] Call Trace:
[   13.856578]  <TASK>
[   13.856611]  dump_stack_lvl+0x73/0xb0
[   13.856727]  print_report+0xd1/0x650
[   13.856769]  ? __virt_addr_valid+0x1db/0x2d0
[   13.856816]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.856872]  ? kasan_addr_to_slab+0x11/0xa0
[   13.856915]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.856971]  kasan_report+0x141/0x180
[   13.857026]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.857088]  __asan_report_store1_noabort+0x1b/0x30
[   13.857136]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.857178]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.857217]  ? finish_task_switch.isra.0+0x153/0x700
[   13.857268]  ? __switch_to+0x47/0xf50
[   13.857317]  ? __schedule+0x10cc/0x2b60
[   13.857362]  ? __pfx_read_tsc+0x10/0x10
[   13.857415]  krealloc_large_less_oob+0x1c/0x30
[   13.857486]  kunit_try_run_case+0x1a5/0x480
[   13.857538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.857626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.857665]  ? __kthread_parkme+0x82/0x180
[   13.857702]  ? preempt_count_sub+0x50/0x80
[   13.857737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.857813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.857873]  kthread+0x337/0x6f0
[   13.857911]  ? trace_preempt_on+0x20/0xc0
[   13.857948]  ? __pfx_kthread+0x10/0x10
[   13.857980]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.858027]  ? calculate_sigpending+0x7b/0xa0
[   13.858063]  ? __pfx_kthread+0x10/0x10
[   13.858097]  ret_from_fork+0x116/0x1d0
[   13.858128]  ? __pfx_kthread+0x10/0x10
[   13.858162]  ret_from_fork_asm+0x1a/0x30
[   13.858215]  </TASK>
[   13.858245] 
[   13.867170] The buggy address belongs to the physical page:
[   13.868625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.869279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.871379] flags: 0x200000000000040(head|node=0|zone=2)
[   13.871774] page_type: f8(unknown)
[   13.872042] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.872580] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.873419] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.875606] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.875939] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.876514] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.876958] page dumped because: kasan: bad access detected
[   13.877266] 
[   13.877397] Memory state around the buggy address:
[   13.877681]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.877962]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.878997] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.879659]                                                  ^
[   13.880211]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.880730]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.881032] ==================================================================
[   13.932386] ==================================================================
[   13.932964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.933330] Write of size 1 at addr ffff88810298e0eb by task kunit_try_catch/180
[   13.933749] 
[   13.933931] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.934014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.934035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.934071] Call Trace:
[   13.934107]  <TASK>
[   13.934143]  dump_stack_lvl+0x73/0xb0
[   13.934199]  print_report+0xd1/0x650
[   13.934259]  ? __virt_addr_valid+0x1db/0x2d0
[   13.934305]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934356]  ? kasan_addr_to_slab+0x11/0xa0
[   13.934392]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934433]  kasan_report+0x141/0x180
[   13.934474]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.934531]  __asan_report_store1_noabort+0x1b/0x30
[   13.934570]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.934618]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.934660]  ? finish_task_switch.isra.0+0x153/0x700
[   13.934701]  ? __switch_to+0x47/0xf50
[   13.934748]  ? __schedule+0x10cc/0x2b60
[   13.934789]  ? __pfx_read_tsc+0x10/0x10
[   13.934837]  krealloc_large_less_oob+0x1c/0x30
[   13.934878]  kunit_try_run_case+0x1a5/0x480
[   13.934925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.934960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.934999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.935040]  ? __kthread_parkme+0x82/0x180
[   13.935074]  ? preempt_count_sub+0x50/0x80
[   13.935098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.935120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.935142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.935164]  kthread+0x337/0x6f0
[   13.935183]  ? trace_preempt_on+0x20/0xc0
[   13.935207]  ? __pfx_kthread+0x10/0x10
[   13.935275]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.935313]  ? calculate_sigpending+0x7b/0xa0
[   13.935348]  ? __pfx_kthread+0x10/0x10
[   13.935401]  ret_from_fork+0x116/0x1d0
[   13.935436]  ? __pfx_kthread+0x10/0x10
[   13.935488]  ret_from_fork_asm+0x1a/0x30
[   13.935549]  </TASK>
[   13.935568] 
[   13.945604] The buggy address belongs to the physical page:
[   13.945918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.946296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.946564] flags: 0x200000000000040(head|node=0|zone=2)
[   13.946935] page_type: f8(unknown)
[   13.947205] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.947929] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.948567] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.948823] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.949074] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.949418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.949912] page dumped because: kasan: bad access detected
[   13.950743] 
[   13.950922] Memory state around the buggy address:
[   13.951249]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.951967]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.952245] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.952474]                                                           ^
[   13.953151]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.953834]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.954185] ==================================================================
[   13.708030] ==================================================================
[   13.708367] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.708996] Write of size 1 at addr ffff888100ab36ea by task kunit_try_catch/176
[   13.710025] 
[   13.710291] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.710392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.710416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.710487] Call Trace:
[   13.710537]  <TASK>
[   13.710581]  dump_stack_lvl+0x73/0xb0
[   13.710635]  print_report+0xd1/0x650
[   13.710678]  ? __virt_addr_valid+0x1db/0x2d0
[   13.710720]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.710806]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710851]  kasan_report+0x141/0x180
[   13.710886]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.710916]  __asan_report_store1_noabort+0x1b/0x30
[   13.710936]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.710960]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.710982]  ? finish_task_switch.isra.0+0x153/0x700
[   13.711005]  ? __switch_to+0x47/0xf50
[   13.711042]  ? __schedule+0x10cc/0x2b60
[   13.711078]  ? __pfx_read_tsc+0x10/0x10
[   13.711104]  krealloc_less_oob+0x1c/0x30
[   13.711124]  kunit_try_run_case+0x1a5/0x480
[   13.711148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.711169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.711191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.711212]  ? __kthread_parkme+0x82/0x180
[   13.711252]  ? preempt_count_sub+0x50/0x80
[   13.711275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.711297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.711318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.711339]  kthread+0x337/0x6f0
[   13.711357]  ? trace_preempt_on+0x20/0xc0
[   13.711381]  ? __pfx_kthread+0x10/0x10
[   13.711400]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.711420]  ? calculate_sigpending+0x7b/0xa0
[   13.711443]  ? __pfx_kthread+0x10/0x10
[   13.711484]  ret_from_fork+0x116/0x1d0
[   13.711515]  ? __pfx_kthread+0x10/0x10
[   13.711545]  ret_from_fork_asm+0x1a/0x30
[   13.711617]  </TASK>
[   13.711631] 
[   13.722326] Allocated by task 176:
[   13.722630]  kasan_save_stack+0x45/0x70
[   13.723084]  kasan_save_track+0x18/0x40
[   13.723423]  kasan_save_alloc_info+0x3b/0x50
[   13.723881]  __kasan_krealloc+0x190/0x1f0
[   13.724130]  krealloc_noprof+0xf3/0x340
[   13.724295]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.724990]  krealloc_less_oob+0x1c/0x30
[   13.725289]  kunit_try_run_case+0x1a5/0x480
[   13.725670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.725875]  kthread+0x337/0x6f0
[   13.726035]  ret_from_fork+0x116/0x1d0
[   13.726202]  ret_from_fork_asm+0x1a/0x30
[   13.726767] 
[   13.726994] The buggy address belongs to the object at ffff888100ab3600
[   13.726994]  which belongs to the cache kmalloc-256 of size 256
[   13.727789] The buggy address is located 33 bytes to the right of
[   13.727789]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.729011] 
[   13.729341] The buggy address belongs to the physical page:
[   13.729941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.730301] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.730575] flags: 0x200000000000040(head|node=0|zone=2)
[   13.730949] page_type: f5(slab)
[   13.731401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.731929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.732939] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.733233] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.734042] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.734468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.734718] page dumped because: kasan: bad access detected
[   13.734953] 
[   13.735111] Memory state around the buggy address:
[   13.735477]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.736261]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.736975] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.737454]                                                           ^
[   13.737983]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.738624]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.738992] ==================================================================
[   13.907378] ==================================================================
[   13.907809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.908366] Write of size 1 at addr ffff88810298e0ea by task kunit_try_catch/180
[   13.908834] 
[   13.909025] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.909117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909177] Call Trace:
[   13.909215]  <TASK>
[   13.909262]  dump_stack_lvl+0x73/0xb0
[   13.909322]  print_report+0xd1/0x650
[   13.909363]  ? __virt_addr_valid+0x1db/0x2d0
[   13.909409]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909607]  ? kasan_addr_to_slab+0x11/0xa0
[   13.909670]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909714]  kasan_report+0x141/0x180
[   13.909754]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.909806]  __asan_report_store1_noabort+0x1b/0x30
[   13.909848]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.909897]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.909936]  ? finish_task_switch.isra.0+0x153/0x700
[   13.909977]  ? __switch_to+0x47/0xf50
[   13.910023]  ? __schedule+0x10cc/0x2b60
[   13.910062]  ? __pfx_read_tsc+0x10/0x10
[   13.910111]  krealloc_large_less_oob+0x1c/0x30
[   13.910155]  kunit_try_run_case+0x1a5/0x480
[   13.910198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910328]  ? __kthread_parkme+0x82/0x180
[   13.910373]  ? preempt_count_sub+0x50/0x80
[   13.910418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910607]  kthread+0x337/0x6f0
[   13.910642]  ? trace_preempt_on+0x20/0xc0
[   13.910681]  ? __pfx_kthread+0x10/0x10
[   13.910714]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910749]  ? calculate_sigpending+0x7b/0xa0
[   13.910786]  ? __pfx_kthread+0x10/0x10
[   13.910821]  ret_from_fork+0x116/0x1d0
[   13.910853]  ? __pfx_kthread+0x10/0x10
[   13.910885]  ret_from_fork_asm+0x1a/0x30
[   13.910920]  </TASK>
[   13.910933] 
[   13.920845] The buggy address belongs to the physical page:
[   13.921134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.921419] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.921910] flags: 0x200000000000040(head|node=0|zone=2)
[   13.922283] page_type: f8(unknown)
[   13.923057] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.923586] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.923920] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.924173] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.924434] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.925021] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.925520] page dumped because: kasan: bad access detected
[   13.925900] 
[   13.926052] Memory state around the buggy address:
[   13.926405]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.926691]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.926934] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.927210]                                                           ^
[   13.928163]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.928817]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.929274] ==================================================================
[   13.740084] ==================================================================
[   13.740556] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.741089] Write of size 1 at addr ffff888100ab36eb by task kunit_try_catch/176
[   13.741688] 
[   13.741934] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.742056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.742086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.742124] Call Trace:
[   13.742177]  <TASK>
[   13.742214]  dump_stack_lvl+0x73/0xb0
[   13.742282]  print_report+0xd1/0x650
[   13.742328]  ? __virt_addr_valid+0x1db/0x2d0
[   13.742383]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.742496]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742550]  kasan_report+0x141/0x180
[   13.742674]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.742735]  __asan_report_store1_noabort+0x1b/0x30
[   13.742780]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.742827]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.742871]  ? finish_task_switch.isra.0+0x153/0x700
[   13.742913]  ? __switch_to+0x47/0xf50
[   13.743062]  ? __schedule+0x10cc/0x2b60
[   13.743110]  ? __pfx_read_tsc+0x10/0x10
[   13.743161]  krealloc_less_oob+0x1c/0x30
[   13.743207]  kunit_try_run_case+0x1a5/0x480
[   13.743272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.743359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.743395]  ? __kthread_parkme+0x82/0x180
[   13.743421]  ? preempt_count_sub+0x50/0x80
[   13.743445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.743543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.743577]  kthread+0x337/0x6f0
[   13.743608]  ? trace_preempt_on+0x20/0xc0
[   13.743645]  ? __pfx_kthread+0x10/0x10
[   13.743676]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.743709]  ? calculate_sigpending+0x7b/0xa0
[   13.743746]  ? __pfx_kthread+0x10/0x10
[   13.743780]  ret_from_fork+0x116/0x1d0
[   13.743813]  ? __pfx_kthread+0x10/0x10
[   13.743847]  ret_from_fork_asm+0x1a/0x30
[   13.743886]  </TASK>
[   13.743899] 
[   13.756868] Allocated by task 176:
[   13.757445]  kasan_save_stack+0x45/0x70
[   13.757655]  kasan_save_track+0x18/0x40
[   13.758119]  kasan_save_alloc_info+0x3b/0x50
[   13.758630]  __kasan_krealloc+0x190/0x1f0
[   13.758966]  krealloc_noprof+0xf3/0x340
[   13.759188]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.759548]  krealloc_less_oob+0x1c/0x30
[   13.759813]  kunit_try_run_case+0x1a5/0x480
[   13.759993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.760406]  kthread+0x337/0x6f0
[   13.760963]  ret_from_fork+0x116/0x1d0
[   13.761275]  ret_from_fork_asm+0x1a/0x30
[   13.761598] 
[   13.761755] The buggy address belongs to the object at ffff888100ab3600
[   13.761755]  which belongs to the cache kmalloc-256 of size 256
[   13.762618] The buggy address is located 34 bytes to the right of
[   13.762618]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.763284] 
[   13.763462] The buggy address belongs to the physical page:
[   13.763899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.764296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.764546] flags: 0x200000000000040(head|node=0|zone=2)
[   13.764958] page_type: f5(slab)
[   13.765518] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.766294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.766772] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.767234] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.768024] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.768568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.769124] page dumped because: kasan: bad access detected
[   13.769374] 
[   13.769532] Memory state around the buggy address:
[   13.769886]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.770708]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.771185] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.771838]                                                           ^
[   13.772156]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.772748]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.773248] ==================================================================
[   13.611596] ==================================================================
[   13.612214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.613124] Write of size 1 at addr ffff888100ab36c9 by task kunit_try_catch/176
[   13.613978] 
[   13.614356] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.614488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.614513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.614548] Call Trace:
[   13.614573]  <TASK>
[   13.614604]  dump_stack_lvl+0x73/0xb0
[   13.614809]  print_report+0xd1/0x650
[   13.614838]  ? __virt_addr_valid+0x1db/0x2d0
[   13.614864]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.614910]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614933]  kasan_report+0x141/0x180
[   13.614955]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.614983]  __asan_report_store1_noabort+0x1b/0x30
[   13.615004]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.615029]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.615053]  ? finish_task_switch.isra.0+0x153/0x700
[   13.615076]  ? __switch_to+0x47/0xf50
[   13.615104]  ? __schedule+0x10cc/0x2b60
[   13.615126]  ? __pfx_read_tsc+0x10/0x10
[   13.615152]  krealloc_less_oob+0x1c/0x30
[   13.615173]  kunit_try_run_case+0x1a5/0x480
[   13.615199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.615231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.615259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.615282]  ? __kthread_parkme+0x82/0x180
[   13.615304]  ? preempt_count_sub+0x50/0x80
[   13.615327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.615351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.615374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.615396]  kthread+0x337/0x6f0
[   13.615416]  ? trace_preempt_on+0x20/0xc0
[   13.615438]  ? __pfx_kthread+0x10/0x10
[   13.615474]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.615508]  ? calculate_sigpending+0x7b/0xa0
[   13.615541]  ? __pfx_kthread+0x10/0x10
[   13.615574]  ret_from_fork+0x116/0x1d0
[   13.615604]  ? __pfx_kthread+0x10/0x10
[   13.615634]  ret_from_fork_asm+0x1a/0x30
[   13.615683]  </TASK>
[   13.615702] 
[   13.628028] Allocated by task 176:
[   13.628351]  kasan_save_stack+0x45/0x70
[   13.628671]  kasan_save_track+0x18/0x40
[   13.629180]  kasan_save_alloc_info+0x3b/0x50
[   13.629416]  __kasan_krealloc+0x190/0x1f0
[   13.629564]  krealloc_noprof+0xf3/0x340
[   13.629721]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.630045]  krealloc_less_oob+0x1c/0x30
[   13.630273]  kunit_try_run_case+0x1a5/0x480
[   13.630498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.631207]  kthread+0x337/0x6f0
[   13.631573]  ret_from_fork+0x116/0x1d0
[   13.631747]  ret_from_fork_asm+0x1a/0x30
[   13.632061] 
[   13.632895] The buggy address belongs to the object at ffff888100ab3600
[   13.632895]  which belongs to the cache kmalloc-256 of size 256
[   13.633345] The buggy address is located 0 bytes to the right of
[   13.633345]  allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9)
[   13.633949] 
[   13.634122] The buggy address belongs to the physical page:
[   13.634472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2
[   13.634782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.635177] flags: 0x200000000000040(head|node=0|zone=2)
[   13.636258] page_type: f5(slab)
[   13.636660] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.637362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.637800] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.638261] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.638541] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff
[   13.638947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.639168] page dumped because: kasan: bad access detected
[   13.639353] 
[   13.639519] Memory state around the buggy address:
[   13.639995]  ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.640208]  ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.641373] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.642010]                                               ^
[   13.642567]  ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.642838]  ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.643050] ==================================================================
[   13.830916] ==================================================================
[   13.831430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.831988] Write of size 1 at addr ffff88810298e0c9 by task kunit_try_catch/180
[   13.832400] 
[   13.832576] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.832639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.832652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.832676] Call Trace:
[   13.832692]  <TASK>
[   13.832714]  dump_stack_lvl+0x73/0xb0
[   13.832765]  print_report+0xd1/0x650
[   13.832811]  ? __virt_addr_valid+0x1db/0x2d0
[   13.832858]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.832904]  ? kasan_addr_to_slab+0x11/0xa0
[   13.832940]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.832977]  kasan_report+0x141/0x180
[   13.833000]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.833028]  __asan_report_store1_noabort+0x1b/0x30
[   13.833048]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.833073]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.833096]  ? finish_task_switch.isra.0+0x153/0x700
[   13.833120]  ? __switch_to+0x47/0xf50
[   13.833147]  ? __schedule+0x10cc/0x2b60
[   13.833170]  ? __pfx_read_tsc+0x10/0x10
[   13.833196]  krealloc_large_less_oob+0x1c/0x30
[   13.833218]  kunit_try_run_case+0x1a5/0x480
[   13.833897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.833940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.833976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.834014]  ? __kthread_parkme+0x82/0x180
[   13.834054]  ? preempt_count_sub+0x50/0x80
[   13.834099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.834137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.834171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.834195]  kthread+0x337/0x6f0
[   13.834214]  ? trace_preempt_on+0x20/0xc0
[   13.834265]  ? __pfx_kthread+0x10/0x10
[   13.834286]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.834306]  ? calculate_sigpending+0x7b/0xa0
[   13.834330]  ? __pfx_kthread+0x10/0x10
[   13.834365]  ret_from_fork+0x116/0x1d0
[   13.834385]  ? __pfx_kthread+0x10/0x10
[   13.834406]  ret_from_fork_asm+0x1a/0x30
[   13.834439]  </TASK>
[   13.834453] 
[   13.845684] The buggy address belongs to the physical page:
[   13.846079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.846758] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.847254] flags: 0x200000000000040(head|node=0|zone=2)
[   13.847649] page_type: f8(unknown)
[   13.847869] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.848442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.848657] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.849157] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.849646] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.850076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.850511] page dumped because: kasan: bad access detected
[   13.850869] 
[   13.850991] Memory state around the buggy address:
[   13.851212]  ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.851704]  ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.852354] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.852666]                                               ^
[   13.852935]  ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.853463]  ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.853728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[   13.778991] ==================================================================
[   13.779429] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.780164] Write of size 1 at addr ffff8881025060eb by task kunit_try_catch/178
[   13.780502] 
[   13.780635] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.781486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.781518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.781552] Call Trace:
[   13.781577]  <TASK>
[   13.781618]  dump_stack_lvl+0x73/0xb0
[   13.781664]  print_report+0xd1/0x650
[   13.781689]  ? __virt_addr_valid+0x1db/0x2d0
[   13.781714]  ? krealloc_more_oob_helper+0x821/0x930
[   13.781736]  ? kasan_addr_to_slab+0x11/0xa0
[   13.781755]  ? krealloc_more_oob_helper+0x821/0x930
[   13.781777]  kasan_report+0x141/0x180
[   13.781798]  ? krealloc_more_oob_helper+0x821/0x930
[   13.781824]  __asan_report_store1_noabort+0x1b/0x30
[   13.781843]  krealloc_more_oob_helper+0x821/0x930
[   13.781864]  ? __schedule+0x10cc/0x2b60
[   13.781885]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.781907]  ? finish_task_switch.isra.0+0x153/0x700
[   13.781928]  ? __switch_to+0x47/0xf50
[   13.781953]  ? __schedule+0x10cc/0x2b60
[   13.781973]  ? __pfx_read_tsc+0x10/0x10
[   13.781996]  krealloc_large_more_oob+0x1c/0x30
[   13.782018]  kunit_try_run_case+0x1a5/0x480
[   13.782040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.782060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.782082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.782102]  ? __kthread_parkme+0x82/0x180
[   13.782123]  ? preempt_count_sub+0x50/0x80
[   13.782145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.782167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.782187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.782208]  kthread+0x337/0x6f0
[   13.782246]  ? trace_preempt_on+0x20/0xc0
[   13.782272]  ? __pfx_kthread+0x10/0x10
[   13.782292]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.782313]  ? calculate_sigpending+0x7b/0xa0
[   13.782349]  ? __pfx_kthread+0x10/0x10
[   13.782374]  ret_from_fork+0x116/0x1d0
[   13.782392]  ? __pfx_kthread+0x10/0x10
[   13.782412]  ret_from_fork_asm+0x1a/0x30
[   13.782443]  </TASK>
[   13.782457] 
[   13.793783] The buggy address belongs to the physical page:
[   13.794010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102504
[   13.794657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.795203] flags: 0x200000000000040(head|node=0|zone=2)
[   13.795799] page_type: f8(unknown)
[   13.796031] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.796601] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.796878] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.797126] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.797785] head: 0200000000000002 ffffea0004094101 00000000ffffffff 00000000ffffffff
[   13.798307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.799002] page dumped because: kasan: bad access detected
[   13.799411] 
[   13.799798] Memory state around the buggy address:
[   13.800155]  ffff888102505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.800781]  ffff888102506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.801066] >ffff888102506080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.801705]                                                           ^
[   13.802050]  ffff888102506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.802300]  ffff888102506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.802940] ==================================================================
[   13.804255] ==================================================================
[   13.804917] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.805233] Write of size 1 at addr ffff8881025060f0 by task kunit_try_catch/178
[   13.805897] 
[   13.806057] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.806168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.806191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.806236] Call Trace:
[   13.806261]  <TASK>
[   13.806292]  dump_stack_lvl+0x73/0xb0
[   13.806375]  print_report+0xd1/0x650
[   13.806425]  ? __virt_addr_valid+0x1db/0x2d0
[   13.806546]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.806634]  ? kasan_addr_to_slab+0x11/0xa0
[   13.806664]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.806703]  kasan_report+0x141/0x180
[   13.806742]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.806794]  __asan_report_store1_noabort+0x1b/0x30
[   13.806834]  krealloc_more_oob_helper+0x7eb/0x930
[   13.806876]  ? __schedule+0x10cc/0x2b60
[   13.806921]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.806962]  ? finish_task_switch.isra.0+0x153/0x700
[   13.807028]  ? __switch_to+0x47/0xf50
[   13.807077]  ? __schedule+0x10cc/0x2b60
[   13.807117]  ? __pfx_read_tsc+0x10/0x10
[   13.807166]  krealloc_large_more_oob+0x1c/0x30
[   13.807214]  kunit_try_run_case+0x1a5/0x480
[   13.807274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.807298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.807322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.807344]  ? __kthread_parkme+0x82/0x180
[   13.807366]  ? preempt_count_sub+0x50/0x80
[   13.807388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.807410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.807454]  kthread+0x337/0x6f0
[   13.807484]  ? trace_preempt_on+0x20/0xc0
[   13.807545]  ? __pfx_kthread+0x10/0x10
[   13.807575]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.807623]  ? calculate_sigpending+0x7b/0xa0
[   13.807655]  ? __pfx_kthread+0x10/0x10
[   13.807683]  ret_from_fork+0x116/0x1d0
[   13.807709]  ? __pfx_kthread+0x10/0x10
[   13.807736]  ret_from_fork_asm+0x1a/0x30
[   13.807779]  </TASK>
[   13.807797] 
[   13.816571] The buggy address belongs to the physical page:
[   13.816790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102504
[   13.817070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.817595] flags: 0x200000000000040(head|node=0|zone=2)
[   13.818000] page_type: f8(unknown)
[   13.818315] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.818949] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.819250] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.819510] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.819761] head: 0200000000000002 ffffea0004094101 00000000ffffffff 00000000ffffffff
[   13.820316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.820810] page dumped because: kasan: bad access detected
[   13.821191] 
[   13.821361] Memory state around the buggy address:
[   13.821816]  ffff888102505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.822361]  ffff888102506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.822606] >ffff888102506080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   13.822839]                                                              ^
[   13.823075]  ffff888102506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.823459]  ffff888102506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.823906] ==================================================================
[   13.553128] ==================================================================
[   13.553605] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.554006] Write of size 1 at addr ffff88810033eeeb by task kunit_try_catch/174
[   13.554954] 
[   13.555287] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.555413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.555436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.555461] Call Trace:
[   13.555478]  <TASK>
[   13.555498]  dump_stack_lvl+0x73/0xb0
[   13.555535]  print_report+0xd1/0x650
[   13.555559]  ? __virt_addr_valid+0x1db/0x2d0
[   13.555583]  ? krealloc_more_oob_helper+0x821/0x930
[   13.555606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.555628]  ? krealloc_more_oob_helper+0x821/0x930
[   13.555651]  kasan_report+0x141/0x180
[   13.555673]  ? krealloc_more_oob_helper+0x821/0x930
[   13.555701]  __asan_report_store1_noabort+0x1b/0x30
[   13.555721]  krealloc_more_oob_helper+0x821/0x930
[   13.555743]  ? __schedule+0x10cc/0x2b60
[   13.555765]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.555789]  ? finish_task_switch.isra.0+0x153/0x700
[   13.555811]  ? __switch_to+0x47/0xf50
[   13.555838]  ? __schedule+0x10cc/0x2b60
[   13.555858]  ? __pfx_read_tsc+0x10/0x10
[   13.555882]  krealloc_more_oob+0x1c/0x30
[   13.555904]  kunit_try_run_case+0x1a5/0x480
[   13.555928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.555949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.555971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.555993]  ? __kthread_parkme+0x82/0x180
[   13.556013]  ? preempt_count_sub+0x50/0x80
[   13.556035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.556057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.556079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.556102]  kthread+0x337/0x6f0
[   13.556121]  ? trace_preempt_on+0x20/0xc0
[   13.556144]  ? __pfx_kthread+0x10/0x10
[   13.556164]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.556184]  ? calculate_sigpending+0x7b/0xa0
[   13.556208]  ? __pfx_kthread+0x10/0x10
[   13.556249]  ret_from_fork+0x116/0x1d0
[   13.556269]  ? __pfx_kthread+0x10/0x10
[   13.556289]  ret_from_fork_asm+0x1a/0x30
[   13.556321]  </TASK>
[   13.556333] 
[   13.564629] Allocated by task 174:
[   13.564803]  kasan_save_stack+0x45/0x70
[   13.565102]  kasan_save_track+0x18/0x40
[   13.565385]  kasan_save_alloc_info+0x3b/0x50
[   13.565696]  __kasan_krealloc+0x190/0x1f0
[   13.565925]  krealloc_noprof+0xf3/0x340
[   13.566097]  krealloc_more_oob_helper+0x1a9/0x930
[   13.566302]  krealloc_more_oob+0x1c/0x30
[   13.566490]  kunit_try_run_case+0x1a5/0x480
[   13.566781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.567171]  kthread+0x337/0x6f0
[   13.567454]  ret_from_fork+0x116/0x1d0
[   13.567743]  ret_from_fork_asm+0x1a/0x30
[   13.568050] 
[   13.568204] The buggy address belongs to the object at ffff88810033ee00
[   13.568204]  which belongs to the cache kmalloc-256 of size 256
[   13.568684] The buggy address is located 0 bytes to the right of
[   13.568684]  allocated 235-byte region [ffff88810033ee00, ffff88810033eeeb)
[   13.569106] 
[   13.569265] The buggy address belongs to the physical page:
[   13.569639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   13.570134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.570649] flags: 0x200000000000040(head|node=0|zone=2)
[   13.570946] page_type: f5(slab)
[   13.571115] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.571382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.571637] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.571896] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.572142] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   13.572650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.573124] page dumped because: kasan: bad access detected
[   13.573521] 
[   13.573671] Memory state around the buggy address:
[   13.574015]  ffff88810033ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.574522]  ffff88810033ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.574985] >ffff88810033ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.575337]                                                           ^
[   13.575685]  ffff88810033ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.576011]  ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.576259] ==================================================================
[   13.578868] ==================================================================
[   13.579428] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.580094] Write of size 1 at addr ffff88810033eef0 by task kunit_try_catch/174
[   13.580608] 
[   13.580807] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.580897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.580918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.580954] Call Trace:
[   13.580980]  <TASK>
[   13.581012]  dump_stack_lvl+0x73/0xb0
[   13.581065]  print_report+0xd1/0x650
[   13.581108]  ? __virt_addr_valid+0x1db/0x2d0
[   13.581150]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.581195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.581248]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.581296]  kasan_report+0x141/0x180
[   13.581341]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.581395]  __asan_report_store1_noabort+0x1b/0x30
[   13.581437]  krealloc_more_oob_helper+0x7eb/0x930
[   13.581480]  ? __schedule+0x10cc/0x2b60
[   13.581526]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.581573]  ? finish_task_switch.isra.0+0x153/0x700
[   13.581615]  ? __switch_to+0x47/0xf50
[   13.581663]  ? __schedule+0x10cc/0x2b60
[   13.581699]  ? __pfx_read_tsc+0x10/0x10
[   13.581741]  krealloc_more_oob+0x1c/0x30
[   13.581779]  kunit_try_run_case+0x1a5/0x480
[   13.581824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.581864]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.581908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.581952]  ? __kthread_parkme+0x82/0x180
[   13.581992]  ? preempt_count_sub+0x50/0x80
[   13.582039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.582079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.582121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.582166]  kthread+0x337/0x6f0
[   13.582204]  ? trace_preempt_on+0x20/0xc0
[   13.582264]  ? __pfx_kthread+0x10/0x10
[   13.582307]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.582358]  ? calculate_sigpending+0x7b/0xa0
[   13.582409]  ? __pfx_kthread+0x10/0x10
[   13.582455]  ret_from_fork+0x116/0x1d0
[   13.582701]  ? __pfx_kthread+0x10/0x10
[   13.582753]  ret_from_fork_asm+0x1a/0x30
[   13.582813]  </TASK>
[   13.582834] 
[   13.592187] Allocated by task 174:
[   13.592395]  kasan_save_stack+0x45/0x70
[   13.592597]  kasan_save_track+0x18/0x40
[   13.592788]  kasan_save_alloc_info+0x3b/0x50
[   13.592980]  __kasan_krealloc+0x190/0x1f0
[   13.593113]  krealloc_noprof+0xf3/0x340
[   13.594462]  krealloc_more_oob_helper+0x1a9/0x930
[   13.595193]  krealloc_more_oob+0x1c/0x30
[   13.595768]  kunit_try_run_case+0x1a5/0x480
[   13.596091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.596299]  kthread+0x337/0x6f0
[   13.596553]  ret_from_fork+0x116/0x1d0
[   13.596842]  ret_from_fork_asm+0x1a/0x30
[   13.597054] 
[   13.597210] The buggy address belongs to the object at ffff88810033ee00
[   13.597210]  which belongs to the cache kmalloc-256 of size 256
[   13.597656] The buggy address is located 5 bytes to the right of
[   13.597656]  allocated 235-byte region [ffff88810033ee00, ffff88810033eeeb)
[   13.598384] 
[   13.598499] The buggy address belongs to the physical page:
[   13.598873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   13.599288] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.599655] flags: 0x200000000000040(head|node=0|zone=2)
[   13.599956] page_type: f5(slab)
[   13.600177] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.600585] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.600853] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.601101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.601525] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   13.602039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.602524] page dumped because: kasan: bad access detected
[   13.602740] 
[   13.602893] Memory state around the buggy address:
[   13.603162]  ffff88810033ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.603512]  ffff88810033ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.603924] >ffff88810033ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.604289]                                                              ^
[   13.604607]  ffff88810033ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.604940]  ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.605270] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[   13.529147] ==================================================================
[   13.529764] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   13.530119] Read of size 1 at addr ffff888103bc0000 by task kunit_try_catch/172
[   13.530436] 
[   13.530588] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.530683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.530709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.530739] Call Trace:
[   13.530755]  <TASK>
[   13.530776]  dump_stack_lvl+0x73/0xb0
[   13.530808]  print_report+0xd1/0x650
[   13.530832]  ? __virt_addr_valid+0x1db/0x2d0
[   13.530857]  ? page_alloc_uaf+0x356/0x3d0
[   13.530893]  ? kasan_addr_to_slab+0x11/0xa0
[   13.530974]  ? page_alloc_uaf+0x356/0x3d0
[   13.531023]  kasan_report+0x141/0x180
[   13.531068]  ? page_alloc_uaf+0x356/0x3d0
[   13.531122]  __asan_report_load1_noabort+0x18/0x20
[   13.531164]  page_alloc_uaf+0x356/0x3d0
[   13.531212]  ? __pfx_page_alloc_uaf+0x10/0x10
[   13.531269]  ? __schedule+0x10cc/0x2b60
[   13.531316]  ? __pfx_read_tsc+0x10/0x10
[   13.531357]  ? ktime_get_ts64+0x86/0x230
[   13.531407]  kunit_try_run_case+0x1a5/0x480
[   13.531458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.531502]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.531547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.531592]  ? __kthread_parkme+0x82/0x180
[   13.531631]  ? preempt_count_sub+0x50/0x80
[   13.531669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.531702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.531745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.531778]  kthread+0x337/0x6f0
[   13.531807]  ? trace_preempt_on+0x20/0xc0
[   13.531845]  ? __pfx_kthread+0x10/0x10
[   13.531875]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.531906]  ? calculate_sigpending+0x7b/0xa0
[   13.531941]  ? __pfx_kthread+0x10/0x10
[   13.531977]  ret_from_fork+0x116/0x1d0
[   13.532009]  ? __pfx_kthread+0x10/0x10
[   13.532040]  ret_from_fork_asm+0x1a/0x30
[   13.532092]  </TASK>
[   13.532110] 
[   13.540946] The buggy address belongs to the physical page:
[   13.541313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc0
[   13.541686] flags: 0x200000000000000(node=0|zone=2)
[   13.541898] page_type: f0(buddy)
[   13.542061] raw: 0200000000000000 ffff88817fffb4f0 ffff88817fffb4f0 0000000000000000
[   13.542980] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   13.543524] page dumped because: kasan: bad access detected
[   13.544038] 
[   13.544208] Memory state around the buggy address:
[   13.544958]  ffff888103bbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.545502]  ffff888103bbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.545887] >ffff888103bc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.546123]                    ^
[   13.546752]  ffff888103bc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.547006]  ffff888103bc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.547510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
[   13.496113] ==================================================================
[   13.496695] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   13.497343] Free of addr ffff88810298c001 by task kunit_try_catch/168
[   13.498124] 
[   13.498283] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.498351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.498365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.498389] Call Trace:
[   13.498405]  <TASK>
[   13.498424]  dump_stack_lvl+0x73/0xb0
[   13.498465]  print_report+0xd1/0x650
[   13.498732]  ? __virt_addr_valid+0x1db/0x2d0
[   13.498785]  ? kasan_addr_to_slab+0x11/0xa0
[   13.498826]  ? kfree+0x274/0x3f0
[   13.498870]  kasan_report_invalid_free+0x10a/0x130
[   13.498913]  ? kfree+0x274/0x3f0
[   13.498946]  ? kfree+0x274/0x3f0
[   13.498976]  __kasan_kfree_large+0x86/0xd0
[   13.499017]  free_large_kmalloc+0x4b/0x110
[   13.499065]  kfree+0x274/0x3f0
[   13.499105]  kmalloc_large_invalid_free+0x120/0x2b0
[   13.499144]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   13.499189]  ? __schedule+0x10cc/0x2b60
[   13.499242]  ? __pfx_read_tsc+0x10/0x10
[   13.499287]  ? ktime_get_ts64+0x86/0x230
[   13.499338]  kunit_try_run_case+0x1a5/0x480
[   13.499376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.499398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.499421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.499443]  ? __kthread_parkme+0x82/0x180
[   13.499487]  ? preempt_count_sub+0x50/0x80
[   13.499524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.499558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.499592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.499640]  kthread+0x337/0x6f0
[   13.499663]  ? trace_preempt_on+0x20/0xc0
[   13.499688]  ? __pfx_kthread+0x10/0x10
[   13.499708]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.499728]  ? calculate_sigpending+0x7b/0xa0
[   13.499752]  ? __pfx_kthread+0x10/0x10
[   13.499773]  ret_from_fork+0x116/0x1d0
[   13.499792]  ? __pfx_kthread+0x10/0x10
[   13.499812]  ret_from_fork_asm+0x1a/0x30
[   13.499844]  </TASK>
[   13.499856] 
[   13.512153] The buggy address belongs to the physical page:
[   13.512481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.512878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.513190] flags: 0x200000000000040(head|node=0|zone=2)
[   13.513454] page_type: f8(unknown)
[   13.513712] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.514027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.515198] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.515655] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.516133] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff
[   13.516723] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.516949] page dumped because: kasan: bad access detected
[   13.517111] 
[   13.517191] Memory state around the buggy address:
[   13.517352]  ffff88810298bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.518240]  ffff88810298bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.518780] >ffff88810298c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.519160]                    ^
[   13.519318]  ffff88810298c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.519661]  ffff88810298c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.520302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[   13.470442] ==================================================================
[   13.470975] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   13.471275] Read of size 1 at addr ffff88810298c000 by task kunit_try_catch/166
[   13.471607] 
[   13.471753] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.471833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.471852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.471885] Call Trace:
[   13.471908]  <TASK>
[   13.471941]  dump_stack_lvl+0x73/0xb0
[   13.472000]  print_report+0xd1/0x650
[   13.472045]  ? __virt_addr_valid+0x1db/0x2d0
[   13.472092]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.472120]  ? kasan_addr_to_slab+0x11/0xa0
[   13.472141]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.472161]  kasan_report+0x141/0x180
[   13.472182]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.472207]  __asan_report_load1_noabort+0x18/0x20
[   13.472282]  kmalloc_large_uaf+0x2f1/0x340
[   13.472314]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   13.472347]  ? __schedule+0x10cc/0x2b60
[   13.472383]  ? __pfx_read_tsc+0x10/0x10
[   13.472420]  ? ktime_get_ts64+0x86/0x230
[   13.472463]  kunit_try_run_case+0x1a5/0x480
[   13.472923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.472971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.473008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.473031]  ? __kthread_parkme+0x82/0x180
[   13.473053]  ? preempt_count_sub+0x50/0x80
[   13.473077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.473099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.473121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.473142]  kthread+0x337/0x6f0
[   13.473160]  ? trace_preempt_on+0x20/0xc0
[   13.473183]  ? __pfx_kthread+0x10/0x10
[   13.473202]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.473243]  ? calculate_sigpending+0x7b/0xa0
[   13.473271]  ? __pfx_kthread+0x10/0x10
[   13.473292]  ret_from_fork+0x116/0x1d0
[   13.473311]  ? __pfx_kthread+0x10/0x10
[   13.473331]  ret_from_fork_asm+0x1a/0x30
[   13.473362]  </TASK>
[   13.473374] 
[   13.484388] The buggy address belongs to the physical page:
[   13.485195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   13.485915] flags: 0x200000000000000(node=0|zone=2)
[   13.486286] raw: 0200000000000000 ffffea00040a6408 ffff88815b039f80 0000000000000000
[   13.486960] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.487408] page dumped because: kasan: bad access detected
[   13.487900] 
[   13.488064] Memory state around the buggy address:
[   13.488257]  ffff88810298bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.488669]  ffff88810298bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.489050] >ffff88810298c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.489726]                    ^
[   13.489894]  ffff88810298c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.490237]  ffff88810298c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.490679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[   13.441780] ==================================================================
[   13.442272] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   13.442931] Write of size 1 at addr ffff88810250200a by task kunit_try_catch/164
[   13.443205] 
[   13.443366] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.443462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.443479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.443502] Call Trace:
[   13.443518]  <TASK>
[   13.443544]  dump_stack_lvl+0x73/0xb0
[   13.443594]  print_report+0xd1/0x650
[   13.443630]  ? __virt_addr_valid+0x1db/0x2d0
[   13.443667]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.443702]  ? kasan_addr_to_slab+0x11/0xa0
[   13.443728]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.443749]  kasan_report+0x141/0x180
[   13.443770]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.443797]  __asan_report_store1_noabort+0x1b/0x30
[   13.443816]  kmalloc_large_oob_right+0x2e9/0x330
[   13.443836]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   13.443859]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   13.443883]  kunit_try_run_case+0x1a5/0x480
[   13.443906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.443925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.443947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.443967]  ? __kthread_parkme+0x82/0x180
[   13.443988]  ? preempt_count_sub+0x50/0x80
[   13.444010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.444032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.444052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.444072]  kthread+0x337/0x6f0
[   13.444090]  ? trace_preempt_on+0x20/0xc0
[   13.444112]  ? __pfx_kthread+0x10/0x10
[   13.444131]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.444150]  ? calculate_sigpending+0x7b/0xa0
[   13.444172]  ? __pfx_kthread+0x10/0x10
[   13.444192]  ret_from_fork+0x116/0x1d0
[   13.444209]  ? __pfx_kthread+0x10/0x10
[   13.444252]  ret_from_fork_asm+0x1a/0x30
[   13.444306]  </TASK>
[   13.444328] 
[   13.454687] The buggy address belongs to the physical page:
[   13.455265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102500
[   13.456208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.456848] flags: 0x200000000000040(head|node=0|zone=2)
[   13.457325] page_type: f8(unknown)
[   13.457958] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.458775] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.459197] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.459727] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.460190] head: 0200000000000002 ffffea0004094001 00000000ffffffff 00000000ffffffff
[   13.460579] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.461251] page dumped because: kasan: bad access detected
[   13.461494] 
[   13.461657] Memory state around the buggy address:
[   13.462105]  ffff888102501f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.462825]  ffff888102501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.463042] >ffff888102502000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.463467]                       ^
[   13.463741]  ffff888102502080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.464227]  ffff888102502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.464873] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[   13.407191] ==================================================================
[   13.407749] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   13.408210] Write of size 1 at addr ffff888101f8df00 by task kunit_try_catch/162
[   13.408620] 
[   13.408780] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.408870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.408891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.408928] Call Trace:
[   13.408953]  <TASK>
[   13.408986]  dump_stack_lvl+0x73/0xb0
[   13.409049]  print_report+0xd1/0x650
[   13.409096]  ? __virt_addr_valid+0x1db/0x2d0
[   13.409138]  ? kmalloc_big_oob_right+0x316/0x370
[   13.409175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.409214]  ? kmalloc_big_oob_right+0x316/0x370
[   13.409379]  kasan_report+0x141/0x180
[   13.409423]  ? kmalloc_big_oob_right+0x316/0x370
[   13.409468]  __asan_report_store1_noabort+0x1b/0x30
[   13.409605]  kmalloc_big_oob_right+0x316/0x370
[   13.409637]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   13.409672]  ? __schedule+0x10cc/0x2b60
[   13.409712]  ? __pfx_read_tsc+0x10/0x10
[   13.409752]  ? ktime_get_ts64+0x86/0x230
[   13.409794]  kunit_try_run_case+0x1a5/0x480
[   13.409839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.409876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.409916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.409952]  ? __kthread_parkme+0x82/0x180
[   13.409988]  ? preempt_count_sub+0x50/0x80
[   13.410029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.410070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.410111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.410152]  kthread+0x337/0x6f0
[   13.410188]  ? trace_preempt_on+0x20/0xc0
[   13.410246]  ? __pfx_kthread+0x10/0x10
[   13.410295]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.410326]  ? calculate_sigpending+0x7b/0xa0
[   13.410375]  ? __pfx_kthread+0x10/0x10
[   13.410441]  ret_from_fork+0x116/0x1d0
[   13.410471]  ? __pfx_kthread+0x10/0x10
[   13.410521]  ret_from_fork_asm+0x1a/0x30
[   13.410573]  </TASK>
[   13.410587] 
[   13.420970] Allocated by task 162:
[   13.421196]  kasan_save_stack+0x45/0x70
[   13.421871]  kasan_save_track+0x18/0x40
[   13.422193]  kasan_save_alloc_info+0x3b/0x50
[   13.422696]  __kasan_kmalloc+0xb7/0xc0
[   13.423023]  __kmalloc_cache_noprof+0x189/0x420
[   13.423404]  kmalloc_big_oob_right+0xa9/0x370
[   13.423856]  kunit_try_run_case+0x1a5/0x480
[   13.424062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.424248]  kthread+0x337/0x6f0
[   13.424400]  ret_from_fork+0x116/0x1d0
[   13.424832]  ret_from_fork_asm+0x1a/0x30
[   13.425053] 
[   13.425195] The buggy address belongs to the object at ffff888101f8c000
[   13.425195]  which belongs to the cache kmalloc-8k of size 8192
[   13.426193] The buggy address is located 0 bytes to the right of
[   13.426193]  allocated 7936-byte region [ffff888101f8c000, ffff888101f8df00)
[   13.427041] 
[   13.427206] The buggy address belongs to the physical page:
[   13.427716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f88
[   13.428099] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.428697] flags: 0x200000000000040(head|node=0|zone=2)
[   13.429054] page_type: f5(slab)
[   13.429233] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   13.429857] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   13.430248] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   13.431206] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   13.431604] head: 0200000000000003 ffffea000407e201 00000000ffffffff 00000000ffffffff
[   13.431869] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   13.432314] page dumped because: kasan: bad access detected
[   13.432773] 
[   13.432930] Memory state around the buggy address:
[   13.433129]  ffff888101f8de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.433566]  ffff888101f8de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.433884] >ffff888101f8df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.434323]                    ^
[   13.434645]  ffff888101f8df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435070]  ffff888101f8e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435942] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[   13.345213] ==================================================================
[   13.345879] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.346697] Write of size 1 at addr ffff888102b48c78 by task kunit_try_catch/160
[   13.347068] 
[   13.347296] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.347395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.347417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.347502] Call Trace:
[   13.347542]  <TASK>
[   13.347576]  dump_stack_lvl+0x73/0xb0
[   13.347632]  print_report+0xd1/0x650
[   13.347671]  ? __virt_addr_valid+0x1db/0x2d0
[   13.347869]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.347922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.348009]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348077]  kasan_report+0x141/0x180
[   13.348134]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348198]  __asan_report_store1_noabort+0x1b/0x30
[   13.348253]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.348298]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   13.348339]  ? __schedule+0x10cc/0x2b60
[   13.348363]  ? __pfx_read_tsc+0x10/0x10
[   13.348385]  ? ktime_get_ts64+0x86/0x230
[   13.348410]  kunit_try_run_case+0x1a5/0x480
[   13.348437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.348527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.348562]  ? __kthread_parkme+0x82/0x180
[   13.348614]  ? preempt_count_sub+0x50/0x80
[   13.348641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.348687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.348708]  kthread+0x337/0x6f0
[   13.348727]  ? trace_preempt_on+0x20/0xc0
[   13.348752]  ? __pfx_kthread+0x10/0x10
[   13.348772]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.348793]  ? calculate_sigpending+0x7b/0xa0
[   13.348818]  ? __pfx_kthread+0x10/0x10
[   13.348839]  ret_from_fork+0x116/0x1d0
[   13.348858]  ? __pfx_kthread+0x10/0x10
[   13.348879]  ret_from_fork_asm+0x1a/0x30
[   13.348913]  </TASK>
[   13.348924] 
[   13.359712] Allocated by task 160:
[   13.360264]  kasan_save_stack+0x45/0x70
[   13.360530]  kasan_save_track+0x18/0x40
[   13.360860]  kasan_save_alloc_info+0x3b/0x50
[   13.361105]  __kasan_kmalloc+0xb7/0xc0
[   13.361494]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.362068]  kmalloc_track_caller_oob_right+0x99/0x520
[   13.362816]  kunit_try_run_case+0x1a5/0x480
[   13.363081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.363681]  kthread+0x337/0x6f0
[   13.363929]  ret_from_fork+0x116/0x1d0
[   13.364147]  ret_from_fork_asm+0x1a/0x30
[   13.364488] 
[   13.364663] The buggy address belongs to the object at ffff888102b48c00
[   13.364663]  which belongs to the cache kmalloc-128 of size 128
[   13.365284] The buggy address is located 0 bytes to the right of
[   13.365284]  allocated 120-byte region [ffff888102b48c00, ffff888102b48c78)
[   13.365743] 
[   13.365915] The buggy address belongs to the physical page:
[   13.366686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   13.367015] flags: 0x200000000000000(node=0|zone=2)
[   13.367623] page_type: f5(slab)
[   13.367939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.368313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.368860] page dumped because: kasan: bad access detected
[   13.369173] 
[   13.369346] Memory state around the buggy address:
[   13.369627]  ffff888102b48b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.370019]  ffff888102b48b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.370691] >ffff888102b48c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.371165]                                                                 ^
[   13.371744]  ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.372540]  ffff888102b48d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.373107] ==================================================================
[   13.375183] ==================================================================
[   13.375545] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.376289] Write of size 1 at addr ffff888102b48d78 by task kunit_try_catch/160
[   13.376570] 
[   13.376900] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   13.376998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.377021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.377058] Call Trace:
[   13.377146]  <TASK>
[   13.377200]  dump_stack_lvl+0x73/0xb0
[   13.377264]  print_report+0xd1/0x650
[   13.377292]  ? __virt_addr_valid+0x1db/0x2d0
[   13.377316]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.377362]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377390]  kasan_report+0x141/0x180
[   13.377424]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377571]  __asan_report_store1_noabort+0x1b/0x30
[   13.377629]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   13.377690]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   13.377736]  ? __schedule+0x10cc/0x2b60
[   13.377791]  ? __pfx_read_tsc+0x10/0x10
[   13.377840]  ? ktime_get_ts64+0x86/0x230
[   13.377890]  kunit_try_run_case+0x1a5/0x480
[   13.377940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.378019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.378041]  ? __kthread_parkme+0x82/0x180
[   13.378063]  ? preempt_count_sub+0x50/0x80
[   13.378087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.378109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.378131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.378153]  kthread+0x337/0x6f0
[   13.378172]  ? trace_preempt_on+0x20/0xc0
[   13.378195]  ? __pfx_kthread+0x10/0x10
[   13.378215]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.378259]  ? calculate_sigpending+0x7b/0xa0
[   13.378283]  ? __pfx_kthread+0x10/0x10
[   13.378305]  ret_from_fork+0x116/0x1d0
[   13.378323]  ? __pfx_kthread+0x10/0x10
[   13.378359]  ret_from_fork_asm+0x1a/0x30
[   13.378393]  </TASK>
[   13.378405] 
[   13.389956] Allocated by task 160:
[   13.390188]  kasan_save_stack+0x45/0x70
[   13.390366]  kasan_save_track+0x18/0x40
[   13.390590]  kasan_save_alloc_info+0x3b/0x50
[   13.390907]  __kasan_kmalloc+0xb7/0xc0
[   13.391405]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.391760]  kmalloc_track_caller_oob_right+0x19a/0x520
[   13.391977]  kunit_try_run_case+0x1a5/0x480
[   13.392180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.392555]  kthread+0x337/0x6f0
[   13.392850]  ret_from_fork+0x116/0x1d0
[   13.393100]  ret_from_fork_asm+0x1a/0x30
[   13.393361] 
[   13.393512] The buggy address belongs to the object at ffff888102b48d00
[   13.393512]  which belongs to the cache kmalloc-128 of size 128
[   13.393895] The buggy address is located 0 bytes to the right of
[   13.393895]  allocated 120-byte region [ffff888102b48d00, ffff888102b48d78)
[   13.394701] 
[   13.394870] The buggy address belongs to the physical page:
[   13.395212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   13.396027] flags: 0x200000000000000(node=0|zone=2)
[   13.396281] page_type: f5(slab)
[   13.396610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.396919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.397300] page dumped because: kasan: bad access detected
[   13.397615] 
[   13.397890] Memory state around the buggy address:
[   13.398093]  ffff888102b48c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.398688]  ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.399012] >ffff888102b48d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.399260]                                                                 ^
[   13.399714]  ffff888102b48d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.400347]  ffff888102b48e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.400719] ==================================================================
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count: Failure
------------[ cut here ]------------
[  161.368019] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count))
[  161.368231] WARNING: CPU: 0 PID: 2575 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x3ed/0x6c0
[  161.370972] Modules linked in:
[  161.371367] CPU: 0 UID: 0 PID: 2575 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  161.372155] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.372675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  161.373091] RIP: 0010:drm_gem_shmem_free+0x3ed/0x6c0
[  161.373540] Code: 85 f6 0f 84 ba 01 00 00 4c 89 e7 e8 dd 16 80 00 48 c7 c1 a0 61 7e a8 4c 89 f2 48 c7 c7 60 5e 7e a8 48 89 c6 e8 84 a9 78 fe 90 <0f> 0b 90 90 e9 09 ff ff ff 90 48 b8 00 00 00 00 00 fc ff df 48 8d
[  161.374719] RSP: 0000:ffff888105a0fd18 EFLAGS: 00010286
[  161.375013] RAX: 0000000000000000 RBX: ffff888108fea000 RCX: 1ffffffff52a4d18
[  161.375930] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[  161.376624] RBP: ffff888105a0fd48 R08: 0000000000000000 R09: fffffbfff52a4d18
[  161.376975] R10: 0000000000000003 R11: 00000000000394a8 R12: ffff888105a71800
[  161.377257] R13: ffff888108fea0f8 R14: ffff88810b4ffb80 R15: ffff88810039fb40
[  161.377793] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  161.378410] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.379675] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  161.380062] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  161.380348] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  161.380877] Call Trace:
[  161.381395]  <TASK>
[  161.381818]  ? trace_preempt_on+0x20/0xc0
[  161.382264]  ? __pfx_drm_gem_shmem_free_wrapper+0x10/0x10
[  161.382654]  drm_gem_shmem_free_wrapper+0x12/0x20
[  161.383342]  __kunit_action_free+0x57/0x70
[  161.383860]  kunit_remove_resource+0x133/0x200
[  161.384245]  ? preempt_count_sub+0x50/0x80
[  161.384499]  kunit_cleanup+0x7a/0x120
[  161.384940]  kunit_try_run_case_cleanup+0xbd/0xf0
[  161.385444]  ? __pfx_kunit_try_run_case_cleanup+0x10/0x10
[  161.386647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  161.387377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  161.388115]  kthread+0x337/0x6f0
[  161.388949]  ? trace_preempt_on+0x20/0xc0
[  161.389224]  ? __pfx_kthread+0x10/0x10
[  161.389432]  ? _raw_spin_unlock_irq+0x47/0x80
[  161.389847]  ? calculate_sigpending+0x7b/0xa0
[  161.390438]  ? __pfx_kthread+0x10/0x10
[  161.390874]  ret_from_fork+0x116/0x1d0
[  161.391291]  ? __pfx_kthread+0x10/0x10
[  161.392223]  ret_from_fork_asm+0x1a/0x30
[  161.392865]  </TASK>
[  161.393134] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head: Failure
------------[ cut here ]------------
[  161.099000] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head))
[  161.099255] WARNING: CPU: 1 PID: 2552 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0
[  161.100816] Modules linked in:
[  161.101374] CPU: 1 UID: 0 PID: 2552 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  161.102111] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.102691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  161.103415] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0
[  161.103846] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 eb 2f 87 00 48 c7 c1 80 14 7d a8 4c 89 fa 48 c7 c7 e0 14 7d a8 48 89 c6 e8 92 c2 7f fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea
[  161.105392] RSP: 0000:ffff888105aa7b68 EFLAGS: 00010282
[  161.105880] RAX: 0000000000000000 RBX: ffff888105aa7c40 RCX: 1ffffffff52a4d18
[  161.106963] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[  161.107321] RBP: ffff888105aa7b90 R08: 0000000000000000 R09: fffffbfff52a4d18
[  161.107723] R10: 0000000000000003 R11: 0000000000037be8 R12: ffff888105aa7c18
[  161.108198] R13: ffff888109f56000 R14: ffff888105977000 R15: ffff88810b4c5080
[  161.109074] FS:  0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000
[  161.109633] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.109903] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  161.110343] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483
[  161.111416] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  161.111987] Call Trace:
[  161.112379]  <TASK>
[  161.112887]  drm_test_framebuffer_free+0x1ab/0x610
[  161.113349]  ? __pfx_drm_test_framebuffer_free+0x10/0x10
[  161.113989]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  161.114304]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  161.115075]  ? __drmm_add_action_or_reset+0x22/0x50
[  161.115683]  ? __schedule+0x10cc/0x2b60
[  161.116142]  ? __pfx_read_tsc+0x10/0x10
[  161.116667]  ? ktime_get_ts64+0x86/0x230
[  161.116965]  kunit_try_run_case+0x1a5/0x480
[  161.117174]  ? __pfx_kunit_try_run_case+0x10/0x10
[  161.117761]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  161.118215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  161.118669]  ? __kthread_parkme+0x82/0x180
[  161.119128]  ? preempt_count_sub+0x50/0x80
[  161.119711]  ? __pfx_kunit_try_run_case+0x10/0x10
[  161.120049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  161.120657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  161.120927]  kthread+0x337/0x6f0
[  161.121135]  ? trace_preempt_on+0x20/0xc0
[  161.121517]  ? __pfx_kthread+0x10/0x10
[  161.121876]  ? _raw_spin_unlock_irq+0x47/0x80
[  161.123439]  ? calculate_sigpending+0x7b/0xa0
[  161.124076]  ? __pfx_kthread+0x10/0x10
[  161.124635]  ret_from_fork+0x116/0x1d0
[  161.125001]  ? __pfx_kthread+0x10/0x10
[  161.125323]  ret_from_fork_asm+0x1a/0x30
[  161.125754]  </TASK>
[  161.126012] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register: Failure
------------[ cut here ]------------
[  158.951765] WARNING: CPU: 0 PID: 1990 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  158.952465] Modules linked in:
[  158.952782] CPU: 0 UID: 0 PID: 1990 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  158.953296] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  158.953885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  158.955169] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  158.955838] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d e9 90 4d 25 02 48 89 df e8 d8
[  158.957221] RSP: 0000:ffff888100e27c90 EFLAGS: 00010246
[  158.957729] RAX: dffffc0000000000 RBX: ffff888104faa000 RCX: 0000000000000000
[  158.958657] RDX: 1ffff110209f5432 RSI: ffffffffa59f79a8 RDI: ffff888104faa190
[  158.959119] RBP: ffff888100e27ca0 R08: 1ffff11020073f69 R09: ffffed10201c4f65
[  158.960059] R10: 0000000000000003 R11: ffffffffa4f833e8 R12: 0000000000000000
[  158.960436] R13: ffff888100e27d38 R14: ffff88810039fc50 R15: ffff88810039fc58
[  158.961101] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  158.961446] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  158.962387] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  158.963086] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  158.963427] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  158.964163] Call Trace:
[  158.964588]  <TASK>
[  158.964774]  drm_test_drm_connector_dynamic_register_no_init+0x104/0x290
[  158.965368]  ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10
[  158.965739]  ? __schedule+0x10cc/0x2b60
[  158.966013]  ? __pfx_read_tsc+0x10/0x10
[  158.967086]  ? ktime_get_ts64+0x86/0x230
[  158.967374]  kunit_try_run_case+0x1a5/0x480
[  158.967795]  ? __pfx_kunit_try_run_case+0x10/0x10
[  158.968102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  158.968924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  158.969345]  ? __kthread_parkme+0x82/0x180
[  158.970088]  ? preempt_count_sub+0x50/0x80
[  158.970363]  ? __pfx_kunit_try_run_case+0x10/0x10
[  158.971077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  158.971457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  158.972373]  kthread+0x337/0x6f0
[  158.972995]  ? trace_preempt_on+0x20/0xc0
[  158.973273]  ? __pfx_kthread+0x10/0x10
[  158.974071]  ? _raw_spin_unlock_irq+0x47/0x80
[  158.974448]  ? calculate_sigpending+0x7b/0xa0
[  158.975329]  ? __pfx_kthread+0x10/0x10
[  158.976017]  ret_from_fork+0x116/0x1d0
[  158.976345]  ? __pfx_kthread+0x10/0x10
[  158.976562]  ret_from_fork_asm+0x1a/0x30
[  158.976847]  </TASK>
[  158.977018] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  158.831633] WARNING: CPU: 0 PID: 1982 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  158.832352] Modules linked in:
[  158.832814] CPU: 0 UID: 0 PID: 1982 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  158.833774] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  158.835246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  158.836027] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  158.836657] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d e9 90 4d 25 02 48 89 df e8 d8
[  158.837773] RSP: 0000:ffff888103b37c90 EFLAGS: 00010246
[  158.838111] RAX: dffffc0000000000 RBX: ffff888100f2e000 RCX: 0000000000000000
[  158.838358] RDX: 1ffff110201e5c32 RSI: ffffffffa59f79a8 RDI: ffff888100f2e190
[  158.838986] RBP: ffff888103b37ca0 R08: 1ffff11020073f69 R09: ffffed1020766f65
[  158.839362] R10: 0000000000000003 R11: ffffffffa4f833e8 R12: 0000000000000000
[  158.840069] R13: ffff888103b37d38 R14: ffff88810039fc50 R15: ffff88810039fc58
[  158.840488] FS:  0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000
[  158.841012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  158.841556] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  158.842089] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482
[  158.842602] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  158.842991] Call Trace:
[  158.843143]  <TASK>
[  158.843420]  drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290
[  158.843992]  ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10
[  158.844320]  ? __schedule+0x10cc/0x2b60
[  158.844922]  ? __pfx_read_tsc+0x10/0x10
[  158.845440]  ? ktime_get_ts64+0x86/0x230
[  158.845872]  kunit_try_run_case+0x1a5/0x480
[  158.846098]  ? __pfx_kunit_try_run_case+0x10/0x10
[  158.846348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  158.846718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  158.847122]  ? __kthread_parkme+0x82/0x180
[  158.847741]  ? preempt_count_sub+0x50/0x80
[  158.848061]  ? __pfx_kunit_try_run_case+0x10/0x10
[  158.848301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  158.848923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  158.849272]  kthread+0x337/0x6f0
[  158.849604]  ? trace_preempt_on+0x20/0xc0
[  158.849846]  ? __pfx_kthread+0x10/0x10
[  158.850088]  ? _raw_spin_unlock_irq+0x47/0x80
[  158.850629]  ? calculate_sigpending+0x7b/0xa0
[  158.851033]  ? __pfx_kthread+0x10/0x10
[  158.851332]  ret_from_fork+0x116/0x1d0
[  158.851663]  ? __pfx_kthread+0x10/0x10
[  158.851964]  ret_from_fork_asm+0x1a/0x30
[  158.852370]  </TASK>
[  158.852696] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------
[  119.035888] WARNING: CPU: 1 PID: 674 at lib/math/int_log.c:120 intlog10+0x2a/0x40
[  119.036257] Modules linked in:
[  119.036876] CPU: 1 UID: 0 PID: 674 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  119.037619] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  119.038237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  119.038976] RIP: 0010:intlog10+0x2a/0x40
[  119.039322] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f e9 57 cb 85 02 90 <0f> 0b 90 31 c0 e9 4c cb 85 02 66 2e 0f 1f 84 00 00 00 00 00 66 90
[  119.040630] RSP: 0000:ffff88810ad07cb0 EFLAGS: 00010246
[  119.040965] RAX: 0000000000000000 RBX: ffff88810039fae8 RCX: 1ffff110215a0fb4
[  119.041387] RDX: 1ffffffff50d2a4c RSI: 1ffff110215a0fb3 RDI: 0000000000000000
[  119.041689] RBP: ffff88810ad07d60 R08: 0000000000000000 R09: ffffed1020598c80
[  119.042585] R10: ffff888102cc6407 R11: 0000000000000000 R12: 1ffff110215a0f97
[  119.042958] R13: ffffffffa8695260 R14: 0000000000000000 R15: ffff88810ad07d38
[  119.043469] FS:  0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000
[  119.043920] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  119.044355] CR2: ffff88815a952000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  119.045251] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483
[  119.045578] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  119.046036] Call Trace:
[  119.046508]  <TASK>
[  119.046783]  ? intlog10_test+0xf2/0x220
[  119.047309]  ? __pfx_intlog10_test+0x10/0x10
[  119.047720]  ? __schedule+0x10cc/0x2b60
[  119.047922]  ? __pfx_read_tsc+0x10/0x10
[  119.048106]  ? ktime_get_ts64+0x86/0x230
[  119.048452]  kunit_try_run_case+0x1a5/0x480
[  119.048928]  ? __pfx_kunit_try_run_case+0x10/0x10
[  119.049357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  119.049886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  119.050261]  ? __kthread_parkme+0x82/0x180
[  119.050845]  ? preempt_count_sub+0x50/0x80
[  119.051251]  ? __pfx_kunit_try_run_case+0x10/0x10
[  119.051764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  119.052026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  119.052270]  kthread+0x337/0x6f0
[  119.052569]  ? trace_preempt_on+0x20/0xc0
[  119.052836]  ? __pfx_kthread+0x10/0x10
[  119.053098]  ? _raw_spin_unlock_irq+0x47/0x80
[  119.053317]  ? calculate_sigpending+0x7b/0xa0
[  119.053588]  ? __pfx_kthread+0x10/0x10
[  119.053773]  ret_from_fork+0x116/0x1d0
[  119.054046]  ? __pfx_kthread+0x10/0x10
[  119.054867]  ret_from_fork_asm+0x1a/0x30
[  119.055272]  </TASK>
[  119.055440] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------
[  118.982650] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:63 intlog2+0xdf/0x110
[  118.983433] Modules linked in:
[  118.984168] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[  118.985249] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  118.985628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  118.986453] RIP: 0010:intlog2+0xdf/0x110
[  118.986993] Code: 69 a8 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d e9 c2 cb 85 02 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 ef a0 56 ff 8b 45 e4 eb
[  118.987677] RSP: 0000:ffff88810aef7cb0 EFLAGS: 00010246
[  118.988130] RAX: 0000000000000000 RBX: ffff88810039fae8 RCX: 1ffff110215defb4
[  118.988672] RDX: 1ffffffff50d2aa0 RSI: 1ffff110215defb3 RDI: 0000000000000000
[  118.989027] RBP: ffff88810aef7d60 R08: 0000000000000000 R09: ffffed1020452360
[  118.989653] R10: ffff888102291b07 R11: 0000000000000000 R12: 1ffff110215def97
[  118.990088] R13: ffffffffa8695500 R14: 0000000000000000 R15: ffff88810aef7d38
[  118.990726] FS:  0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000
[  118.991213] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  118.991624] CR2: ffff88815a952000 CR3: 000000002bebc000 CR4: 00000000000006f0
[  118.991878] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483
[  118.992207] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  118.992574] Call Trace:
[  118.992804]  <TASK>
[  118.993007]  ? intlog2_test+0xf2/0x220
[  118.993570]  ? __pfx_intlog2_test+0x10/0x10
[  118.993913]  ? __schedule+0x10cc/0x2b60
[  118.994262]  ? __pfx_read_tsc+0x10/0x10
[  118.994751]  ? ktime_get_ts64+0x86/0x230
[  118.995150]  kunit_try_run_case+0x1a5/0x480
[  118.995621]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.996020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  118.996323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  118.996873]  ? __kthread_parkme+0x82/0x180
[  118.997169]  ? preempt_count_sub+0x50/0x80
[  118.997673]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.998055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  118.998618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  118.998958]  kthread+0x337/0x6f0
[  118.999247]  ? trace_preempt_on+0x20/0xc0
[  118.999768]  ? __pfx_kthread+0x10/0x10
[  119.000077]  ? _raw_spin_unlock_irq+0x47/0x80
[  119.000437]  ? calculate_sigpending+0x7b/0xa0
[  119.000890]  ? __pfx_kthread+0x10/0x10
[  119.001236]  ret_from_fork+0x116/0x1d0
[  119.001657]  ? __pfx_kthread+0x10/0x10
[  119.001997]  ret_from_fork_asm+0x1a/0x30
[  119.002431]  </TASK>
[  119.003060] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
<8>[  366.792065] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
<8>[  366.475847] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>