Hay
Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[   23.286396] ==================================================================
[   23.286488] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.286488] 
[   23.286555] Corrupted memory at 0x000000001e27fb41 [ ! . . . . . . . . . . . . . . . ] (in kfence-#100):
[   23.286871]  test_corruption+0x120/0x378
[   23.286920]  kunit_try_run_case+0x170/0x3f0
[   23.286965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287009]  kthread+0x328/0x630
[   23.287049]  ret_from_fork+0x10/0x20
[   23.287089] 
[   23.287112] kfence-#100: 0x0000000065344787-0x0000000087cb509d, size=32, cache=test
[   23.287112] 
[   23.287175] allocated by task 313 on cpu 1 at 23.286256s (0.000916s ago):
[   23.287240]  test_alloc+0x230/0x628
[   23.287283]  test_corruption+0xdc/0x378
[   23.287324]  kunit_try_run_case+0x170/0x3f0
[   23.287361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287403]  kthread+0x328/0x630
[   23.287441]  ret_from_fork+0x10/0x20
[   23.287481] 
[   23.287504] freed by task 313 on cpu 1 at 23.286313s (0.001188s ago):
[   23.287563]  test_corruption+0x120/0x378
[   23.287600]  kunit_try_run_case+0x170/0x3f0
[   23.287638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287678]  kthread+0x328/0x630
[   23.287719]  ret_from_fork+0x10/0x20
[   23.287756] 
[   23.287798] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   23.287877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.287908] Hardware name: linux,dummy-virt (DT)
[   23.287940] ==================================================================
[   23.702349] ==================================================================
[   23.702437] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   23.702437] 
[   23.702496] Corrupted memory at 0x0000000012766279 [ ! ] (in kfence-#104):
[   23.702611]  test_corruption+0x1d8/0x378
[   23.702656]  kunit_try_run_case+0x170/0x3f0
[   23.702699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.702748]  kthread+0x328/0x630
[   23.702789]  ret_from_fork+0x10/0x20
[   23.702828] 
[   23.702851] kfence-#104: 0x000000007c17a602-0x00000000912418c3, size=32, cache=test
[   23.702851] 
[   23.702905] allocated by task 313 on cpu 1 at 23.702208s (0.000693s ago):
[   23.702966]  test_alloc+0x230/0x628
[   23.703006]  test_corruption+0x198/0x378
[   23.703045]  kunit_try_run_case+0x170/0x3f0
[   23.703083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.703125]  kthread+0x328/0x630
[   23.703175]  ret_from_fork+0x10/0x20
[   23.703214] 
[   23.703237] freed by task 313 on cpu 1 at 23.702266s (0.000967s ago):
[   23.703296]  test_corruption+0x1d8/0x378
[   23.703334]  kunit_try_run_case+0x170/0x3f0
[   23.703371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.703414]  kthread+0x328/0x630
[   23.703451]  ret_from_fork+0x10/0x20
[   23.703490] 
[   23.703529] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   23.703608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.703639] Hardware name: linux,dummy-virt (DT)
[   23.703673] ==================================================================
[   22.974445] ==================================================================
[   22.974537] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   22.974537] 
[   22.974597] Corrupted memory at 0x000000003202b637 [ ! ] (in kfence-#97):
[   22.974731]  test_corruption+0x284/0x378
[   22.974779]  kunit_try_run_case+0x170/0x3f0
[   22.974820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.974863]  kthread+0x328/0x630
[   22.974904]  ret_from_fork+0x10/0x20
[   22.974942] 
[   22.974966] kfence-#97: 0x0000000063f888f8-0x00000000218016ba, size=32, cache=kmalloc-32
[   22.974966] 
[   22.975019] allocated by task 311 on cpu 1 at 22.974169s (0.000847s ago):
[   22.975080]  test_alloc+0x29c/0x628
[   22.975119]  test_corruption+0x198/0x378
[   22.975169]  kunit_try_run_case+0x170/0x3f0
[   22.975208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.975250]  kthread+0x328/0x630
[   22.975289]  ret_from_fork+0x10/0x20
[   22.975326] 
[   22.975349] freed by task 311 on cpu 1 at 22.974273s (0.001072s ago):
[   22.975407]  test_corruption+0x284/0x378
[   22.975446]  kunit_try_run_case+0x170/0x3f0
[   22.975484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.975527]  kthread+0x328/0x630
[   22.975564]  ret_from_fork+0x10/0x20
[   22.975601] 
[   22.975643] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.975723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.975753] Hardware name: linux,dummy-virt (DT)
[   22.975786] ==================================================================
[   22.766465] ==================================================================
[   22.766570] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   22.766570] 
[   22.766638] Corrupted memory at 0x000000008f5eeef1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#95):
[   22.767764]  test_corruption+0x278/0x378
[   22.767816]  kunit_try_run_case+0x170/0x3f0
[   22.767863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.767907]  kthread+0x328/0x630
[   22.767949]  ret_from_fork+0x10/0x20
[   22.767990] 
[   22.768014] kfence-#95: 0x0000000049730b14-0x0000000098c4f873, size=32, cache=kmalloc-32
[   22.768014] 
[   22.768068] allocated by task 311 on cpu 1 at 22.766185s (0.001880s ago):
[   22.768131]  test_alloc+0x29c/0x628
[   22.768183]  test_corruption+0xdc/0x378
[   22.768223]  kunit_try_run_case+0x170/0x3f0
[   22.768261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768304]  kthread+0x328/0x630
[   22.768342]  ret_from_fork+0x10/0x20
[   22.768379] 
[   22.768402] freed by task 311 on cpu 1 at 22.766294s (0.002105s ago):
[   22.768461]  test_corruption+0x278/0x378
[   22.768499]  kunit_try_run_case+0x170/0x3f0
[   22.768537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768578]  kthread+0x328/0x630
[   22.768617]  ret_from_fork+0x10/0x20
[   22.768654] 
[   22.768694] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.768775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.768803] Hardware name: linux,dummy-virt (DT)
[   22.768837] ==================================================================
Failure - kunit - lib_ratelimit_lib_ratelimit KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
<8>[  263.434960] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[   18.482844] ==================================================================
[   18.482980] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   18.483583] Read of size 4 at addr fff00000c17649c0 by task swapper/1/0
[   18.483662] 
[   18.483855] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.483978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.484432] Hardware name: linux,dummy-virt (DT)
[   18.484547] Call trace:
[   18.484906]  show_stack+0x20/0x38 (C)
[   18.485433]  dump_stack_lvl+0x8c/0xd0
[   18.485539]  print_report+0x118/0x608
[   18.485890]  kasan_report+0xdc/0x128
[   18.486092]  __asan_report_load4_noabort+0x20/0x30
[   18.486303]  rcu_uaf_reclaim+0x64/0x70
[   18.486461]  rcu_core+0x9f4/0x1e20
[   18.486698]  rcu_core_si+0x18/0x30
[   18.486908]  handle_softirqs+0x374/0xb28
[   18.487001]  __do_softirq+0x1c/0x28
[   18.487088]  ____do_softirq+0x18/0x30
[   18.487442]  call_on_irq_stack+0x24/0x30
[   18.487714]  do_softirq_own_stack+0x24/0x38
[   18.487829]  __irq_exit_rcu+0x1fc/0x318
[   18.488092]  irq_exit_rcu+0x1c/0x80
[   18.488325]  el1_interrupt+0x38/0x58
[   18.488376]  el1h_64_irq_handler+0x18/0x28
[   18.488422]  el1h_64_irq+0x6c/0x70
[   18.489171]  arch_local_irq_enable+0x4/0x8 (P)
[   18.489624]  do_idle+0x384/0x4e8
[   18.489731]  cpu_startup_entry+0x64/0x80
[   18.490250]  secondary_start_kernel+0x288/0x340
[   18.490309]  __secondary_switched+0xc0/0xc8
[   18.490638] 
[   18.490688] Allocated by task 198:
[   18.490720]  kasan_save_stack+0x3c/0x68
[   18.491098]  kasan_save_track+0x20/0x40
[   18.491210]  kasan_save_alloc_info+0x40/0x58
[   18.491383]  __kasan_kmalloc+0xd4/0xd8
[   18.491655]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.491782]  rcu_uaf+0xb0/0x2d8
[   18.491818]  kunit_try_run_case+0x170/0x3f0
[   18.491928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.492055]  kthread+0x328/0x630
[   18.492514]  ret_from_fork+0x10/0x20
[   18.492673] 
[   18.492761] Freed by task 0:
[   18.492985]  kasan_save_stack+0x3c/0x68
[   18.493252]  kasan_save_track+0x20/0x40
[   18.493302]  kasan_save_free_info+0x4c/0x78
[   18.493785]  __kasan_slab_free+0x6c/0x98
[   18.493828]  kfree+0x214/0x3c8
[   18.493870]  rcu_uaf_reclaim+0x28/0x70
[   18.494052]  rcu_core+0x9f4/0x1e20
[   18.494412]  rcu_core_si+0x18/0x30
[   18.494460]  handle_softirqs+0x374/0xb28
[   18.494687]  __do_softirq+0x1c/0x28
[   18.494722] 
[   18.494759] Last potentially related work creation:
[   18.495361]  kasan_save_stack+0x3c/0x68
[   18.495450]  kasan_record_aux_stack+0xb4/0xc8
[   18.495679]  __call_rcu_common.constprop.0+0x70/0x8b0
[   18.496259]  call_rcu+0x18/0x30
[   18.496392]  rcu_uaf+0x14c/0x2d8
[   18.496427]  kunit_try_run_case+0x170/0x3f0
[   18.496998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.497115]  kthread+0x328/0x630
[   18.497412]  ret_from_fork+0x10/0x20
[   18.497477] 
[   18.497803] The buggy address belongs to the object at fff00000c17649c0
[   18.497803]  which belongs to the cache kmalloc-32 of size 32
[   18.497872] The buggy address is located 0 bytes inside of
[   18.497872]  freed 32-byte region [fff00000c17649c0, fff00000c17649e0)
[   18.498207] 
[   18.498235] The buggy address belongs to the physical page:
[   18.498268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764
[   18.498777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.499369] page_type: f5(slab)
[   18.499650] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.499989] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.500362] page dumped because: kasan: bad access detected
[   18.500399] 
[   18.500576] Memory state around the buggy address:
[   18.500787]  fff00000c1764880: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   18.501094]  fff00000c1764900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   18.501440] >fff00000c1764980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.501693]                                            ^
[   18.502049]  fff00000c1764a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.502103]  fff00000c1764a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.502310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[   18.318646] ==================================================================
[   18.318952] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.319013] Read of size 1 at addr fff00000c68f1978 by task kunit_try_catch/196
[   18.319317] 
[   18.319614] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.319732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.319762] Hardware name: linux,dummy-virt (DT)
[   18.319902] Call trace:
[   18.320076]  show_stack+0x20/0x38 (C)
[   18.320288]  dump_stack_lvl+0x8c/0xd0
[   18.320376]  print_report+0x118/0x608
[   18.320532]  kasan_report+0xdc/0x128
[   18.320593]  __asan_report_load1_noabort+0x20/0x30
[   18.320674]  ksize_uaf+0x544/0x5f8
[   18.320728]  kunit_try_run_case+0x170/0x3f0
[   18.321099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.321185]  kthread+0x328/0x630
[   18.321240]  ret_from_fork+0x10/0x20
[   18.321389] 
[   18.321416] Allocated by task 196:
[   18.321443]  kasan_save_stack+0x3c/0x68
[   18.321484]  kasan_save_track+0x20/0x40
[   18.321521]  kasan_save_alloc_info+0x40/0x58
[   18.321559]  __kasan_kmalloc+0xd4/0xd8
[   18.321594]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.321634]  ksize_uaf+0xb8/0x5f8
[   18.321665]  kunit_try_run_case+0x170/0x3f0
[   18.321702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.322147]  kthread+0x328/0x630
[   18.322272]  ret_from_fork+0x10/0x20
[   18.322312] 
[   18.322332] Freed by task 196:
[   18.322798]  kasan_save_stack+0x3c/0x68
[   18.322893]  kasan_save_track+0x20/0x40
[   18.323188]  kasan_save_free_info+0x4c/0x78
[   18.323435]  __kasan_slab_free+0x6c/0x98
[   18.323608]  kfree+0x214/0x3c8
[   18.323771]  ksize_uaf+0x11c/0x5f8
[   18.323812]  kunit_try_run_case+0x170/0x3f0
[   18.324026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.324196]  kthread+0x328/0x630
[   18.324314]  ret_from_fork+0x10/0x20
[   18.324546] 
[   18.324670] The buggy address belongs to the object at fff00000c68f1900
[   18.324670]  which belongs to the cache kmalloc-128 of size 128
[   18.324798] The buggy address is located 120 bytes inside of
[   18.324798]  freed 128-byte region [fff00000c68f1900, fff00000c68f1980)
[   18.325037] 
[   18.325281] The buggy address belongs to the physical page:
[   18.325396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.325525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.325677] page_type: f5(slab)
[   18.325923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.326196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.326282] page dumped because: kasan: bad access detected
[   18.326358] 
[   18.326386] Memory state around the buggy address:
[   18.326460]  fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.326506]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.326573] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.326614]                                                                 ^
[   18.326656]  fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.327068]  fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.327139] ==================================================================
[   18.305381] ==================================================================
[   18.305543] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.305709] Read of size 1 at addr fff00000c68f1900 by task kunit_try_catch/196
[   18.305928] 
[   18.305990] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.306539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.306665] Hardware name: linux,dummy-virt (DT)
[   18.306713] Call trace:
[   18.306865]  show_stack+0x20/0x38 (C)
[   18.307005]  dump_stack_lvl+0x8c/0xd0
[   18.307136]  print_report+0x118/0x608
[   18.307452]  kasan_report+0xdc/0x128
[   18.307575]  __asan_report_load1_noabort+0x20/0x30
[   18.307793]  ksize_uaf+0x598/0x5f8
[   18.307896]  kunit_try_run_case+0x170/0x3f0
[   18.308011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.308317]  kthread+0x328/0x630
[   18.308645]  ret_from_fork+0x10/0x20
[   18.308758] 
[   18.308837] Allocated by task 196:
[   18.309046]  kasan_save_stack+0x3c/0x68
[   18.309298]  kasan_save_track+0x20/0x40
[   18.309443]  kasan_save_alloc_info+0x40/0x58
[   18.309607]  __kasan_kmalloc+0xd4/0xd8
[   18.309760]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.310045]  ksize_uaf+0xb8/0x5f8
[   18.310292]  kunit_try_run_case+0x170/0x3f0
[   18.310473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.310625]  kthread+0x328/0x630
[   18.310795]  ret_from_fork+0x10/0x20
[   18.310839] 
[   18.310859] Freed by task 196:
[   18.311109]  kasan_save_stack+0x3c/0x68
[   18.311769]  kasan_save_track+0x20/0x40
[   18.312010]  kasan_save_free_info+0x4c/0x78
[   18.312202]  __kasan_slab_free+0x6c/0x98
[   18.312368]  kfree+0x214/0x3c8
[   18.312426]  ksize_uaf+0x11c/0x5f8
[   18.312836]  kunit_try_run_case+0x170/0x3f0
[   18.313372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.313670]  kthread+0x328/0x630
[   18.314140]  ret_from_fork+0x10/0x20
[   18.314198] 
[   18.314371] The buggy address belongs to the object at fff00000c68f1900
[   18.314371]  which belongs to the cache kmalloc-128 of size 128
[   18.314464] The buggy address is located 0 bytes inside of
[   18.314464]  freed 128-byte region [fff00000c68f1900, fff00000c68f1980)
[   18.315001] 
[   18.315123] The buggy address belongs to the physical page:
[   18.315304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.315488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.315640] page_type: f5(slab)
[   18.315769] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.316117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.316236] page dumped because: kasan: bad access detected
[   18.316469] 
[   18.316599] Memory state around the buggy address:
[   18.316670]  fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.316748]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.316791] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.316833]                    ^
[   18.316871]  fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.316913]  fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.316958] ==================================================================
[   18.293218] ==================================================================
[   18.293280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.293331] Read of size 1 at addr fff00000c68f1900 by task kunit_try_catch/196
[   18.293925] 
[   18.294011] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.294261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.294418] Hardware name: linux,dummy-virt (DT)
[   18.294611] Call trace:
[   18.294661]  show_stack+0x20/0x38 (C)
[   18.294801]  dump_stack_lvl+0x8c/0xd0
[   18.294918]  print_report+0x118/0x608
[   18.295095]  kasan_report+0xdc/0x128
[   18.295191]  __kasan_check_byte+0x54/0x70
[   18.295677]  ksize+0x30/0x88
[   18.295803]  ksize_uaf+0x168/0x5f8
[   18.295976]  kunit_try_run_case+0x170/0x3f0
[   18.296111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.296175]  kthread+0x328/0x630
[   18.296500]  ret_from_fork+0x10/0x20
[   18.296664] 
[   18.296837] Allocated by task 196:
[   18.296952]  kasan_save_stack+0x3c/0x68
[   18.297262]  kasan_save_track+0x20/0x40
[   18.297447]  kasan_save_alloc_info+0x40/0x58
[   18.297534]  __kasan_kmalloc+0xd4/0xd8
[   18.297891]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.297966]  ksize_uaf+0xb8/0x5f8
[   18.298114]  kunit_try_run_case+0x170/0x3f0
[   18.298274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.298383]  kthread+0x328/0x630
[   18.298599]  ret_from_fork+0x10/0x20
[   18.299038] 
[   18.299121] Freed by task 196:
[   18.299275]  kasan_save_stack+0x3c/0x68
[   18.299450]  kasan_save_track+0x20/0x40
[   18.299588]  kasan_save_free_info+0x4c/0x78
[   18.299985]  __kasan_slab_free+0x6c/0x98
[   18.300054]  kfree+0x214/0x3c8
[   18.300086]  ksize_uaf+0x11c/0x5f8
[   18.300130]  kunit_try_run_case+0x170/0x3f0
[   18.300229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.300275]  kthread+0x328/0x630
[   18.300318]  ret_from_fork+0x10/0x20
[   18.300355] 
[   18.300383] The buggy address belongs to the object at fff00000c68f1900
[   18.300383]  which belongs to the cache kmalloc-128 of size 128
[   18.300451] The buggy address is located 0 bytes inside of
[   18.300451]  freed 128-byte region [fff00000c68f1900, fff00000c68f1980)
[   18.300511] 
[   18.300530] The buggy address belongs to the physical page:
[   18.300560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.300620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.300677] page_type: f5(slab)
[   18.300721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.300770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.300816] page dumped because: kasan: bad access detected
[   18.300846] 
[   18.300865] Memory state around the buggy address:
[   18.300895]  fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.300946]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300987] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.301024]                    ^
[   18.301058]  fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.301100]  fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.301138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[   18.267553] ==================================================================
[   18.267607] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.267660] Read of size 1 at addr fff00000c68f1878 by task kunit_try_catch/194
[   18.267985] 
[   18.268034] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.268122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.268148] Hardware name: linux,dummy-virt (DT)
[   18.268300] Call trace:
[   18.268509]  show_stack+0x20/0x38 (C)
[   18.268635]  dump_stack_lvl+0x8c/0xd0
[   18.268770]  print_report+0x118/0x608
[   18.268867]  kasan_report+0xdc/0x128
[   18.268962]  __asan_report_load1_noabort+0x20/0x30
[   18.269225]  ksize_unpoisons_memory+0x618/0x740
[   18.269303]  kunit_try_run_case+0x170/0x3f0
[   18.269387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269457]  kthread+0x328/0x630
[   18.269690]  ret_from_fork+0x10/0x20
[   18.270026] 
[   18.270064] Allocated by task 194:
[   18.270177]  kasan_save_stack+0x3c/0x68
[   18.270511]  kasan_save_track+0x20/0x40
[   18.270608]  kasan_save_alloc_info+0x40/0x58
[   18.270825]  __kasan_kmalloc+0xd4/0xd8
[   18.271019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.271274]  ksize_unpoisons_memory+0xc0/0x740
[   18.271507]  kunit_try_run_case+0x170/0x3f0
[   18.271651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.271826]  kthread+0x328/0x630
[   18.271948]  ret_from_fork+0x10/0x20
[   18.272115] 
[   18.272145] The buggy address belongs to the object at fff00000c68f1800
[   18.272145]  which belongs to the cache kmalloc-128 of size 128
[   18.272557] The buggy address is located 5 bytes to the right of
[   18.272557]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.272740] 
[   18.272790] The buggy address belongs to the physical page:
[   18.272829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.272882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.272932] page_type: f5(slab)
[   18.272984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.273035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.273084] page dumped because: kasan: bad access detected
[   18.273115] 
[   18.273141] Memory state around the buggy address:
[   18.273184]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.273235]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273278] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.273326]                                                                 ^
[   18.273378]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273421]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273464] ==================================================================
[   18.252728] ==================================================================
[   18.252784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.252836] Read of size 1 at addr fff00000c68f1873 by task kunit_try_catch/194
[   18.252886] 
[   18.252944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.253038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.253066] Hardware name: linux,dummy-virt (DT)
[   18.253102] Call trace:
[   18.253124]  show_stack+0x20/0x38 (C)
[   18.253187]  dump_stack_lvl+0x8c/0xd0
[   18.253232]  print_report+0x118/0x608
[   18.253690]  kasan_report+0xdc/0x128
[   18.253865]  __asan_report_load1_noabort+0x20/0x30
[   18.254449]  ksize_unpoisons_memory+0x628/0x740
[   18.254510]  kunit_try_run_case+0x170/0x3f0
[   18.255540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.255763]  kthread+0x328/0x630
[   18.255827]  ret_from_fork+0x10/0x20
[   18.256128] 
[   18.256346] Allocated by task 194:
[   18.256450]  kasan_save_stack+0x3c/0x68
[   18.256621]  kasan_save_track+0x20/0x40
[   18.256907]  kasan_save_alloc_info+0x40/0x58
[   18.257051]  __kasan_kmalloc+0xd4/0xd8
[   18.257280]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.257701]  ksize_unpoisons_memory+0xc0/0x740
[   18.257934]  kunit_try_run_case+0x170/0x3f0
[   18.257976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.258046]  kthread+0x328/0x630
[   18.258356]  ret_from_fork+0x10/0x20
[   18.258506] 
[   18.258549] The buggy address belongs to the object at fff00000c68f1800
[   18.258549]  which belongs to the cache kmalloc-128 of size 128
[   18.258887] The buggy address is located 0 bytes to the right of
[   18.258887]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.259025] 
[   18.259048] The buggy address belongs to the physical page:
[   18.259244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.259472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.259527] page_type: f5(slab)
[   18.259567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.259934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.260074] page dumped because: kasan: bad access detected
[   18.260166] 
[   18.260184] Memory state around the buggy address:
[   18.260246]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.260310]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.260494] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.260760]                                                              ^
[   18.261110]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.261224]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.261322] ==================================================================
[   18.275711] ==================================================================
[   18.275765] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.275840] Read of size 1 at addr fff00000c68f187f by task kunit_try_catch/194
[   18.275892] 
[   18.275928] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.276197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.276426] Hardware name: linux,dummy-virt (DT)
[   18.276471] Call trace:
[   18.276579]  show_stack+0x20/0x38 (C)
[   18.276651]  dump_stack_lvl+0x8c/0xd0
[   18.276727]  print_report+0x118/0x608
[   18.276849]  kasan_report+0xdc/0x128
[   18.277054]  __asan_report_load1_noabort+0x20/0x30
[   18.277253]  ksize_unpoisons_memory+0x690/0x740
[   18.277366]  kunit_try_run_case+0x170/0x3f0
[   18.277418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.277472]  kthread+0x328/0x630
[   18.277584]  ret_from_fork+0x10/0x20
[   18.277635] 
[   18.277653] Allocated by task 194:
[   18.277768]  kasan_save_stack+0x3c/0x68
[   18.277814]  kasan_save_track+0x20/0x40
[   18.278468]  kasan_save_alloc_info+0x40/0x58
[   18.278568]  __kasan_kmalloc+0xd4/0xd8
[   18.278731]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.279121]  ksize_unpoisons_memory+0xc0/0x740
[   18.279322]  kunit_try_run_case+0x170/0x3f0
[   18.279448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.279666]  kthread+0x328/0x630
[   18.279986]  ret_from_fork+0x10/0x20
[   18.280254] 
[   18.280387] The buggy address belongs to the object at fff00000c68f1800
[   18.280387]  which belongs to the cache kmalloc-128 of size 128
[   18.280519] The buggy address is located 12 bytes to the right of
[   18.280519]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.280693] 
[   18.280735] The buggy address belongs to the physical page:
[   18.281132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.281327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.281534] page_type: f5(slab)
[   18.281600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.281680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.282030] page dumped because: kasan: bad access detected
[   18.282103] 
[   18.282541] Memory state around the buggy address:
[   18.282592]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.282638]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283066] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.283149]                                                                 ^
[   18.283202]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283346]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283387] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[   20.269569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   20.438253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   20.427238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[   20.191031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
[   94.879904] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.884566] Modules linked in:
[   94.886321] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   94.887463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.888068] Hardware name: linux,dummy-virt (DT)
[   94.888827] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.889844] pc : kunit_test_null_dereference+0x70/0x170
[   94.890693] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.891510] sp : ffff800080ef7d30
[   94.892067] x29: ffff800080ef7d90 x28: 0000000000000000 x27: 0000000000000000
[   94.893320] x26: 1ffe0000182e5c81 x25: 0000000000000000 x24: 0000000000000004
[   94.894326] x23: fff00000c172e40c x22: ffff950701a0e460 x21: fff00000c3ed0d88
[   94.895408] x20: 1ffff000101defa6 x19: ffff800080087990 x18: fff00000c000b5b0
[   94.895999] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08
[   94.896362] x14: 0000000000018fff x13: 1ffe00001b48e9c5 x12: fffd80001829062c
[   94.896699] x11: 1ffe00001829062b x10: fffd80001829062b x9 : ffff950701a058c8
[   94.897083] x8 : ffff800080ef7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.898033] x5 : ffff7000101defa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.898996] x2 : dfff800000000000 x1 : fff00000c1482880 x0 : ffff800080087990
[   94.899833] Call trace:
[   94.900178]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.900737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.901323]  kthread+0x328/0x630
[   94.901715]  ret_from_fork+0x10/0x20
[   94.902484] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.903515] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[   51.471171] ==================================================================
[   51.471232] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.471232] 
[   51.471314] Use-after-free read at 0x00000000c93cc991 (in kfence-#154):
[   51.471364]  test_krealloc+0x51c/0x830
[   51.471408]  kunit_try_run_case+0x170/0x3f0
[   51.471453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.471497]  kthread+0x328/0x630
[   51.471539]  ret_from_fork+0x10/0x20
[   51.471579] 
[   51.471602] kfence-#154: 0x00000000c93cc991-0x000000005d7f3a1e, size=32, cache=kmalloc-32
[   51.471602] 
[   51.471656] allocated by task 337 on cpu 0 at 51.470477s (0.001175s ago):
[   51.471724]  test_alloc+0x29c/0x628
[   51.471765]  test_krealloc+0xc0/0x830
[   51.471803]  kunit_try_run_case+0x170/0x3f0
[   51.471841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.471883]  kthread+0x328/0x630
[   51.471923]  ret_from_fork+0x10/0x20
[   51.471962] 
[   51.471985] freed by task 337 on cpu 0 at 51.470773s (0.001208s ago):
[   51.472043]  krealloc_noprof+0x148/0x360
[   51.472082]  test_krealloc+0x1dc/0x830
[   51.472121]  kunit_try_run_case+0x170/0x3f0
[   51.472170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.472211]  kthread+0x328/0x630
[   51.472249]  ret_from_fork+0x10/0x20
[   51.472287] 
[   51.472331] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.472416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.472450] Hardware name: linux,dummy-virt (DT)
[   51.472482] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[   51.378527] ==================================================================
[   51.378618] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.378618] 
[   51.378715] Use-after-free read at 0x000000007911c1c7 (in kfence-#153):
[   51.378774]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.378822]  kunit_try_run_case+0x170/0x3f0
[   51.378866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.378910]  kthread+0x328/0x630
[   51.378953]  ret_from_fork+0x10/0x20
[   51.378992] 
[   51.379016] kfence-#153: 0x000000007911c1c7-0x000000001774f692, size=32, cache=test
[   51.379016] 
[   51.379066] allocated by task 335 on cpu 1 at 51.366505s (0.012557s ago):
[   51.379134]  test_alloc+0x230/0x628
[   51.379188]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.379231]  kunit_try_run_case+0x170/0x3f0
[   51.379268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.379310]  kthread+0x328/0x630
[   51.379348]  ret_from_fork+0x10/0x20
[   51.379387] 
[   51.379411] freed by task 335 on cpu 1 at 51.366614s (0.012793s ago):
[   51.379465]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.379507]  kunit_try_run_case+0x170/0x3f0
[   51.379544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.379585]  kthread+0x328/0x630
[   51.379624]  ret_from_fork+0x10/0x20
[   51.379662] 
[   51.379707] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.379788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.379816] Hardware name: linux,dummy-virt (DT)
[   51.379851] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[   28.613710] ==================================================================
[   28.613976] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   28.613976] 
[   28.614107] Invalid read at 0x00000000306ea4c7:
[   28.614215]  test_invalid_access+0xdc/0x1f0
[   28.614274]  kunit_try_run_case+0x170/0x3f0
[   28.614324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.614544]  kthread+0x328/0x630
[   28.614755]  ret_from_fork+0x10/0x20
[   28.615257] 
[   28.616252] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.617134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.617201] Hardware name: linux,dummy-virt (DT)
[   28.617315] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[   21.815540] ==================================================================
[   21.815662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.815662] 
[   21.816119] Out-of-bounds write at 0x00000000692ce2bd (1B left of kfence-#86):
[   21.816292]  test_out_of_bounds_write+0x100/0x240
[   21.816425]  kunit_try_run_case+0x170/0x3f0
[   21.816476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.816908]  kthread+0x328/0x630
[   21.816970]  ret_from_fork+0x10/0x20
[   21.817141] 
[   21.817189] kfence-#86: 0x000000001d58a2f2-0x00000000347cd8f9, size=32, cache=test
[   21.817189] 
[   21.817486] allocated by task 293 on cpu 0 at 21.815401s (0.001839s ago):
[   21.817898]  test_alloc+0x230/0x628
[   21.818115]  test_out_of_bounds_write+0xc8/0x240
[   21.818174]  kunit_try_run_case+0x170/0x3f0
[   21.818359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.818685]  kthread+0x328/0x630
[   21.818813]  ret_from_fork+0x10/0x20
[   21.818964] 
[   21.819078] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.819289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.819343] Hardware name: linux,dummy-virt (DT)
[   21.819728] ==================================================================
[   21.708716] ==================================================================
[   21.708962] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.708962] 
[   21.709065] Out-of-bounds write at 0x0000000065b761bb (1B left of kfence-#85):
[   21.709421]  test_out_of_bounds_write+0x100/0x240
[   21.709522]  kunit_try_run_case+0x170/0x3f0
[   21.709927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.710129]  kthread+0x328/0x630
[   21.710212]  ret_from_fork+0x10/0x20
[   21.710436] 
[   21.710568] kfence-#85: 0x00000000af1f5610-0x000000005607c3d3, size=32, cache=kmalloc-32
[   21.710568] 
[   21.710762] allocated by task 291 on cpu 0 at 21.708083s (0.002657s ago):
[   21.710843]  test_alloc+0x29c/0x628
[   21.710900]  test_out_of_bounds_write+0xc8/0x240
[   21.711124]  kunit_try_run_case+0x170/0x3f0
[   21.711381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.711502]  kthread+0x328/0x630
[   21.711567]  ret_from_fork+0x10/0x20
[   21.711943] 
[   21.712364] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.712875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.713000] Hardware name: linux,dummy-virt (DT)
[   21.713078] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[   28.382492] ==================================================================
[   28.382590] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.382590] 
[   28.382656] Corrupted memory at 0x0000000062639798 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149):
[   28.382983]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.383035]  kunit_try_run_case+0x170/0x3f0
[   28.383077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.383119]  kthread+0x328/0x630
[   28.383176]  ret_from_fork+0x10/0x20
[   28.383216] 
[   28.383242] kfence-#149: 0x0000000053595d44-0x0000000096fad8d4, size=73, cache=kmalloc-96
[   28.383242] 
[   28.383295] allocated by task 325 on cpu 0 at 28.382219s (0.001072s ago):
[   28.383357]  test_alloc+0x29c/0x628
[   28.383396]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   28.383439]  kunit_try_run_case+0x170/0x3f0
[   28.383478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.383522]  kthread+0x328/0x630
[   28.383561]  ret_from_fork+0x10/0x20
[   28.383601] 
[   28.383626] freed by task 325 on cpu 0 at 28.382352s (0.001270s ago):
[   28.383686]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.383729]  kunit_try_run_case+0x170/0x3f0
[   28.383768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.383810]  kthread+0x328/0x630
[   28.383850]  ret_from_fork+0x10/0x20
[   28.383890] 
[   28.383934] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.384021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.384052] Hardware name: linux,dummy-virt (DT)
[   28.384087] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[   28.070403] ==================================================================
[   28.070506] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.070506] 
[   28.070610] Out-of-bounds read at 0x00000000c962e85d (105B right of kfence-#146):
[   28.070673]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.070728]  kunit_try_run_case+0x170/0x3f0
[   28.070774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.070819]  kthread+0x328/0x630
[   28.070861]  ret_from_fork+0x10/0x20
[   28.070900] 
[   28.070925] kfence-#146: 0x000000006696a400-0x0000000058d17b05, size=73, cache=kmalloc-96
[   28.070925] 
[   28.070979] allocated by task 323 on cpu 0 at 28.070166s (0.000809s ago):
[   28.071052]  test_alloc+0x29c/0x628
[   28.071095]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.071138]  kunit_try_run_case+0x170/0x3f0
[   28.071189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.071232]  kthread+0x328/0x630
[   28.071271]  ret_from_fork+0x10/0x20
[   28.071312] 
[   28.071359] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   28.071442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.071473] Hardware name: linux,dummy-virt (DT)
[   28.071508] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[   22.559042] ==================================================================
[   22.559131] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   22.559131] 
[   22.559204] Invalid free of 0x000000001e561d7b (in kfence-#93):
[   22.559258]  test_invalid_addr_free+0x1ac/0x238
[   22.559307]  kunit_try_run_case+0x170/0x3f0
[   22.559352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.559395]  kthread+0x328/0x630
[   22.559438]  ret_from_fork+0x10/0x20
[   22.559478] 
[   22.559502] kfence-#93: 0x00000000a0c95fc0-0x0000000049c60dc3, size=32, cache=kmalloc-32
[   22.559502] 
[   22.559556] allocated by task 307 on cpu 0 at 22.558906s (0.000647s ago):
[   22.559620]  test_alloc+0x29c/0x628
[   22.559660]  test_invalid_addr_free+0xd4/0x238
[   22.559702]  kunit_try_run_case+0x170/0x3f0
[   22.559742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.559782]  kthread+0x328/0x630
[   22.559821]  ret_from_fork+0x10/0x20
[   22.559860] 
[   22.559903] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.559986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.560015] Hardware name: linux,dummy-virt (DT)
[   22.560050] ==================================================================
[   22.662320] ==================================================================
[   22.662409] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   22.662409] 
[   22.662469] Invalid free of 0x00000000f418ffab (in kfence-#94):
[   22.662523]  test_invalid_addr_free+0xec/0x238
[   22.662568]  kunit_try_run_case+0x170/0x3f0
[   22.662612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.662653]  kthread+0x328/0x630
[   22.662695]  ret_from_fork+0x10/0x20
[   22.662742] 
[   22.662765] kfence-#94: 0x00000000a6f78ade-0x000000007118df67, size=32, cache=test
[   22.662765] 
[   22.662816] allocated by task 309 on cpu 1 at 22.662194s (0.000618s ago):
[   22.662878]  test_alloc+0x230/0x628
[   22.662916]  test_invalid_addr_free+0xd4/0x238
[   22.662959]  kunit_try_run_case+0x170/0x3f0
[   22.662999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.663039]  kthread+0x328/0x630
[   22.663079]  ret_from_fork+0x10/0x20
[   22.663117] 
[   22.663174] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.663257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.663286] Hardware name: linux,dummy-virt (DT)
[   22.663321] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[   22.455415] ==================================================================
[   22.455495] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   22.455495] 
[   22.455555] Invalid free of 0x000000005fd9151c (in kfence-#92):
[   22.455741]  test_double_free+0x100/0x238
[   22.455803]  kunit_try_run_case+0x170/0x3f0
[   22.455964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.456052]  kthread+0x328/0x630
[   22.456117]  ret_from_fork+0x10/0x20
[   22.456244] 
[   22.456292] kfence-#92: 0x000000005fd9151c-0x00000000fd9f3de0, size=32, cache=test
[   22.456292] 
[   22.456346] allocated by task 305 on cpu 0 at 22.454857s (0.001485s ago):
[   22.456648]  test_alloc+0x230/0x628
[   22.456708]  test_double_free+0xd4/0x238
[   22.456881]  kunit_try_run_case+0x170/0x3f0
[   22.456934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.456978]  kthread+0x328/0x630
[   22.457046]  ret_from_fork+0x10/0x20
[   22.457089] 
[   22.457235] freed by task 305 on cpu 0 at 22.455048s (0.002158s ago):
[   22.457539]  test_double_free+0xf0/0x238
[   22.457679]  kunit_try_run_case+0x170/0x3f0
[   22.457829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.458199]  kthread+0x328/0x630
[   22.458486]  ret_from_fork+0x10/0x20
[   22.458535] 
[   22.459103] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.459354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.459612] Hardware name: linux,dummy-virt (DT)
[   22.459904] ==================================================================
[   22.353584] ==================================================================
[   22.353684] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   22.353684] 
[   22.353757] Invalid free of 0x00000000490fc580 (in kfence-#91):
[   22.354089]  test_double_free+0x1bc/0x238
[   22.354310]  kunit_try_run_case+0x170/0x3f0
[   22.354451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.354546]  kthread+0x328/0x630
[   22.354595]  ret_from_fork+0x10/0x20
[   22.354863] 
[   22.355430] kfence-#91: 0x00000000490fc580-0x0000000043916d6b, size=32, cache=kmalloc-32
[   22.355430] 
[   22.355985] allocated by task 303 on cpu 0 at 22.352883s (0.003096s ago):
[   22.356517]  test_alloc+0x29c/0x628
[   22.356598]  test_double_free+0xd4/0x238
[   22.356661]  kunit_try_run_case+0x170/0x3f0
[   22.356709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.356757]  kthread+0x328/0x630
[   22.356808]  ret_from_fork+0x10/0x20
[   22.356857] 
[   22.356882] freed by task 303 on cpu 0 at 22.352961s (0.003918s ago):
[   22.356958]  test_double_free+0x1ac/0x238
[   22.357004]  kunit_try_run_case+0x170/0x3f0
[   22.357055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.357106]  kthread+0x328/0x630
[   22.357165]  ret_from_fork+0x10/0x20
[   22.357205] 
[   22.357259] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.357342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.357386] Hardware name: linux,dummy-virt (DT)
[   22.357435] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[   22.027856] ==================================================================
[   22.027936] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.027936] 
[   22.028291] Use-after-free read at 0x0000000015d6621c (in kfence-#88):
[   22.028383]  test_use_after_free_read+0x114/0x248
[   22.028437]  kunit_try_run_case+0x170/0x3f0
[   22.028483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028526]  kthread+0x328/0x630
[   22.028569]  ret_from_fork+0x10/0x20
[   22.028608] 
[   22.028633] kfence-#88: 0x0000000015d6621c-0x0000000020ccf0e5, size=32, cache=test
[   22.028633] 
[   22.028682] allocated by task 297 on cpu 0 at 22.027399s (0.001280s ago):
[   22.028759]  test_alloc+0x230/0x628
[   22.028802]  test_use_after_free_read+0xd0/0x248
[   22.028843]  kunit_try_run_case+0x170/0x3f0
[   22.028881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028922]  kthread+0x328/0x630
[   22.028964]  ret_from_fork+0x10/0x20
[   22.029004] 
[   22.029038] freed by task 297 on cpu 0 at 22.027697s (0.001337s ago):
[   22.029140]  test_use_after_free_read+0xf0/0x248
[   22.029197]  kunit_try_run_case+0x170/0x3f0
[   22.029235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.029276]  kthread+0x328/0x630
[   22.029314]  ret_from_fork+0x10/0x20
[   22.029354] 
[   22.029399] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   22.029492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.029531] Hardware name: linux,dummy-virt (DT)
[   22.029566] ==================================================================
[   21.919797] ==================================================================
[   21.919877] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   21.919877] 
[   21.920031] Use-after-free read at 0x000000000d27104c (in kfence-#87):
[   21.920086]  test_use_after_free_read+0x114/0x248
[   21.920481]  kunit_try_run_case+0x170/0x3f0
[   21.920560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.920606]  kthread+0x328/0x630
[   21.920649]  ret_from_fork+0x10/0x20
[   21.920771] 
[   21.920800] kfence-#87: 0x000000000d27104c-0x000000001071f8e7, size=32, cache=kmalloc-32
[   21.920800] 
[   21.920903] allocated by task 295 on cpu 0 at 21.919069s (0.001786s ago):
[   21.921315]  test_alloc+0x29c/0x628
[   21.921368]  test_use_after_free_read+0xd0/0x248
[   21.921417]  kunit_try_run_case+0x170/0x3f0
[   21.921793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.921896]  kthread+0x328/0x630
[   21.921937]  ret_from_fork+0x10/0x20
[   21.922211] 
[   21.922908] freed by task 295 on cpu 0 at 21.919144s (0.003453s ago):
[   21.923064]  test_use_after_free_read+0x1c0/0x248
[   21.923429]  kunit_try_run_case+0x170/0x3f0
[   21.923728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.923923]  kthread+0x328/0x630
[   21.924295]  ret_from_fork+0x10/0x20
[   21.924383] 
[   21.924448] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.924536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.924566] Hardware name: linux,dummy-virt (DT)
[   21.924602] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[   21.167347] ==================================================================
[   21.167557] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.167557] 
[   21.167829] Out-of-bounds read at 0x000000000c6d2d65 (1B left of kfence-#80):
[   21.168001]  test_out_of_bounds_read+0x114/0x3e0
[   21.168058]  kunit_try_run_case+0x170/0x3f0
[   21.168126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.168190]  kthread+0x328/0x630
[   21.168299]  ret_from_fork+0x10/0x20
[   21.168390] 
[   21.168499] kfence-#80: 0x00000000b3877aec-0x00000000b4727e9d, size=32, cache=kmalloc-32
[   21.168499] 
[   21.168723] allocated by task 287 on cpu 0 at 21.166405s (0.002300s ago):
[   21.169059]  test_alloc+0x29c/0x628
[   21.169166]  test_out_of_bounds_read+0xdc/0x3e0
[   21.169222]  kunit_try_run_case+0x170/0x3f0
[   21.169417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.169529]  kthread+0x328/0x630
[   21.169568]  ret_from_fork+0x10/0x20
[   21.169625] 
[   21.169677] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.169773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.169803] Hardware name: linux,dummy-virt (DT)
[   21.169837] ==================================================================
[   21.491279] ==================================================================
[   21.491354] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.491354] 
[   21.491462] Out-of-bounds read at 0x00000000e80a7474 (1B left of kfence-#83):
[   21.491667]  test_out_of_bounds_read+0x114/0x3e0
[   21.491717]  kunit_try_run_case+0x170/0x3f0
[   21.491757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.491799]  kthread+0x328/0x630
[   21.491839]  ret_from_fork+0x10/0x20
[   21.491879] 
[   21.491903] kfence-#83: 0x000000007eafdb5d-0x000000008f45ec79, size=32, cache=test
[   21.491903] 
[   21.491951] allocated by task 289 on cpu 0 at 21.491200s (0.000747s ago):
[   21.492065]  test_alloc+0x230/0x628
[   21.492107]  test_out_of_bounds_read+0xdc/0x3e0
[   21.492149]  kunit_try_run_case+0x170/0x3f0
[   21.492212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.492255]  kthread+0x328/0x630
[   21.492292]  ret_from_fork+0x10/0x20
[   21.492331] 
[   21.492375] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.492690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.492856] Hardware name: linux,dummy-virt (DT)
[   21.493012] ==================================================================
[   21.383149] ==================================================================
[   21.383270] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.383270] 
[   21.383480] Out-of-bounds read at 0x000000008fa86d37 (32B right of kfence-#82):
[   21.383576]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.383637]  kunit_try_run_case+0x170/0x3f0
[   21.383681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.383739]  kthread+0x328/0x630
[   21.383895]  ret_from_fork+0x10/0x20
[   21.384035] 
[   21.384079] kfence-#82: 0x00000000277bebb5-0x00000000bf3ac5d1, size=32, cache=kmalloc-32
[   21.384079] 
[   21.384202] allocated by task 287 on cpu 0 at 21.382715s (0.001483s ago):
[   21.384273]  test_alloc+0x29c/0x628
[   21.384313]  test_out_of_bounds_read+0x198/0x3e0
[   21.384353]  kunit_try_run_case+0x170/0x3f0
[   21.384533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.384576]  kthread+0x328/0x630
[   21.384614]  ret_from_fork+0x10/0x20
[   21.384702] 
[   21.384818] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.384902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.384931] Hardware name: linux,dummy-virt (DT)
[   21.384980] ==================================================================
[   21.600490] ==================================================================
[   21.600577] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.600577] 
[   21.600777] Out-of-bounds read at 0x00000000990e02c1 (32B right of kfence-#84):
[   21.600942]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.600990]  kunit_try_run_case+0x170/0x3f0
[   21.601040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.601175]  kthread+0x328/0x630
[   21.601257]  ret_from_fork+0x10/0x20
[   21.601297] 
[   21.601616] kfence-#84: 0x00000000988e48a1-0x000000002ddd932b, size=32, cache=test
[   21.601616] 
[   21.603760] allocated by task 289 on cpu 0 at 21.600414s (0.003339s ago):
[   21.603971]  test_alloc+0x230/0x628
[   21.604096]  test_out_of_bounds_read+0x198/0x3e0
[   21.604229]  kunit_try_run_case+0x170/0x3f0
[   21.604272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.604313]  kthread+0x328/0x630
[   21.604362]  ret_from_fork+0x10/0x20
[   21.604402] 
[   21.604448] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   21.604531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.604601] Hardware name: linux,dummy-virt (DT)
[   21.604635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-write-in-__memset: Failure
[   18.171528] ==================================================================
[   18.171621] BUG: KFENCE: use-after-free write in __memset+0xc/0x20
[   18.171621] 
[   18.171702] Use-after-free write at 0x000000003bfa5165 (in kfence-#58):
[   18.172196]  __memset+0xc/0x20
[   18.172255]  kmalloc_uaf_memset+0x170/0x310
[   18.172295]  kunit_try_run_case+0x170/0x3f0
[   18.172345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.172393]  kthread+0x328/0x630
[   18.172437]  ret_from_fork+0x10/0x20
[   18.172490] 
[   18.172667] kfence-#58: 0x000000003bfa5165-0x00000000fadb8304, size=33, cache=kmalloc-64
[   18.172667] 
[   18.172869] allocated by task 186 on cpu 1 at 18.169071s (0.003731s ago):
[   18.174687]  kmalloc_uaf_memset+0xb8/0x310
[   18.174800]  kunit_try_run_case+0x170/0x3f0
[   18.174896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175357]  kthread+0x328/0x630
[   18.175456]  ret_from_fork+0x10/0x20
[   18.175650] 
[   18.176584] freed by task 186 on cpu 1 at 18.169150s (0.006943s ago):
[   18.177931]  kmalloc_uaf_memset+0x11c/0x310
[   18.178007]  kunit_try_run_case+0x170/0x3f0
[   18.178111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.178225]  kthread+0x328/0x630
[   18.178403]  ret_from_fork+0x10/0x20
[   18.178790] 
[   18.179537] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.179932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.180268] Hardware name: linux,dummy-virt (DT)
[   18.180402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[   20.864821] ==================================================================
[   20.864884] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.864950] Write of size 1 at addr fff00000c1729a78 by task kunit_try_catch/285
[   20.865013] 
[   20.865054] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.865305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.865431] Hardware name: linux,dummy-virt (DT)
[   20.865582] Call trace:
[   20.865606]  show_stack+0x20/0x38 (C)
[   20.865657]  dump_stack_lvl+0x8c/0xd0
[   20.866002]  print_report+0x118/0x608
[   20.866060]  kasan_report+0xdc/0x128
[   20.866170]  __asan_report_store1_noabort+0x20/0x30
[   20.866262]  strncpy_from_user+0x270/0x2a0
[   20.866310]  copy_user_test_oob+0x5c0/0xec8
[   20.866359]  kunit_try_run_case+0x170/0x3f0
[   20.866416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866481]  kthread+0x328/0x630
[   20.866639]  ret_from_fork+0x10/0x20
[   20.866794] 
[   20.866818] Allocated by task 285:
[   20.866873]  kasan_save_stack+0x3c/0x68
[   20.867052]  kasan_save_track+0x20/0x40
[   20.867097]  kasan_save_alloc_info+0x40/0x58
[   20.867140]  __kasan_kmalloc+0xd4/0xd8
[   20.867441]  __kmalloc_noprof+0x190/0x4d0
[   20.867487]  kunit_kmalloc_array+0x34/0x88
[   20.867527]  copy_user_test_oob+0xac/0xec8
[   20.867566]  kunit_try_run_case+0x170/0x3f0
[   20.867621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.867836]  kthread+0x328/0x630
[   20.867873]  ret_from_fork+0x10/0x20
[   20.867956] 
[   20.868328] The buggy address belongs to the object at fff00000c1729a00
[   20.868328]  which belongs to the cache kmalloc-128 of size 128
[   20.868464] The buggy address is located 0 bytes to the right of
[   20.868464]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.868530] 
[   20.868604] The buggy address belongs to the physical page:
[   20.868748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.868845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.868912] page_type: f5(slab)
[   20.869020] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.869145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.869269] page dumped because: kasan: bad access detected
[   20.869390] 
[   20.869432] Memory state around the buggy address:
[   20.869474]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.869553]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869628] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.869669]                                                                 ^
[   20.869711]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869755]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869797] ==================================================================
[   20.858859] ==================================================================
[   20.859039] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.859181] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.859418] 
[   20.859578] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.859954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.859984] Hardware name: linux,dummy-virt (DT)
[   20.860062] Call trace:
[   20.860803]  show_stack+0x20/0x38 (C)
[   20.860979]  dump_stack_lvl+0x8c/0xd0
[   20.861232]  print_report+0x118/0x608
[   20.861319]  kasan_report+0xdc/0x128
[   20.861510]  kasan_check_range+0x100/0x1a8
[   20.861676]  __kasan_check_write+0x20/0x30
[   20.861793]  strncpy_from_user+0x3c/0x2a0
[   20.861894]  copy_user_test_oob+0x5c0/0xec8
[   20.862001]  kunit_try_run_case+0x170/0x3f0
[   20.862051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.862105]  kthread+0x328/0x630
[   20.862152]  ret_from_fork+0x10/0x20
[   20.862210] 
[   20.862230] Allocated by task 285:
[   20.862258]  kasan_save_stack+0x3c/0x68
[   20.862316]  kasan_save_track+0x20/0x40
[   20.862358]  kasan_save_alloc_info+0x40/0x58
[   20.862405]  __kasan_kmalloc+0xd4/0xd8
[   20.862443]  __kmalloc_noprof+0x190/0x4d0
[   20.862480]  kunit_kmalloc_array+0x34/0x88
[   20.862542]  copy_user_test_oob+0xac/0xec8
[   20.862583]  kunit_try_run_case+0x170/0x3f0
[   20.862621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.862735]  kthread+0x328/0x630
[   20.862812]  ret_from_fork+0x10/0x20
[   20.862894] 
[   20.862915] The buggy address belongs to the object at fff00000c1729a00
[   20.862915]  which belongs to the cache kmalloc-128 of size 128
[   20.862975] The buggy address is located 0 bytes inside of
[   20.862975]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.863048] 
[   20.863069] The buggy address belongs to the physical page:
[   20.863121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.863223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.863361] page_type: f5(slab)
[   20.863430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.863483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.863525] page dumped because: kasan: bad access detected
[   20.863559] 
[   20.863580] Memory state around the buggy address:
[   20.863624]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.863678]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.863722] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.863773]                                                                 ^
[   20.863814]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.863893]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.863991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[   20.851837] ==================================================================
[   20.851889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.851955] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.852006] 
[   20.852037] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.852149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.852239] Hardware name: linux,dummy-virt (DT)
[   20.852371] Call trace:
[   20.852495]  show_stack+0x20/0x38 (C)
[   20.852547]  dump_stack_lvl+0x8c/0xd0
[   20.852593]  print_report+0x118/0x608
[   20.852651]  kasan_report+0xdc/0x128
[   20.852709]  kasan_check_range+0x100/0x1a8
[   20.853063]  __kasan_check_read+0x20/0x30
[   20.853121]  copy_user_test_oob+0x4a0/0xec8
[   20.853313]  kunit_try_run_case+0x170/0x3f0
[   20.853363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853427]  kthread+0x328/0x630
[   20.853473]  ret_from_fork+0x10/0x20
[   20.853523] 
[   20.853544] Allocated by task 285:
[   20.853573]  kasan_save_stack+0x3c/0x68
[   20.853622]  kasan_save_track+0x20/0x40
[   20.854142]  kasan_save_alloc_info+0x40/0x58
[   20.854336]  __kasan_kmalloc+0xd4/0xd8
[   20.854376]  __kmalloc_noprof+0x190/0x4d0
[   20.854534]  kunit_kmalloc_array+0x34/0x88
[   20.854640]  copy_user_test_oob+0xac/0xec8
[   20.854682]  kunit_try_run_case+0x170/0x3f0
[   20.854721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.854769]  kthread+0x328/0x630
[   20.854808]  ret_from_fork+0x10/0x20
[   20.854846] 
[   20.854870] The buggy address belongs to the object at fff00000c1729a00
[   20.854870]  which belongs to the cache kmalloc-128 of size 128
[   20.854930] The buggy address is located 0 bytes inside of
[   20.854930]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.855056] 
[   20.855086] The buggy address belongs to the physical page:
[   20.855118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.855180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.855229] page_type: f5(slab)
[   20.855311] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.855860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.855905] page dumped because: kasan: bad access detected
[   20.855990] 
[   20.856094] Memory state around the buggy address:
[   20.856185]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.856237]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.856279] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.856640]                                                                 ^
[   20.856680]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.856780]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.857141] ==================================================================
[   20.847347] ==================================================================
[   20.847415] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.847464] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.847516] 
[   20.847546] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.847633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.847671] Hardware name: linux,dummy-virt (DT)
[   20.847754] Call trace:
[   20.847779]  show_stack+0x20/0x38 (C)
[   20.847831]  dump_stack_lvl+0x8c/0xd0
[   20.847877]  print_report+0x118/0x608
[   20.847925]  kasan_report+0xdc/0x128
[   20.847982]  kasan_check_range+0x100/0x1a8
[   20.848043]  __kasan_check_write+0x20/0x30
[   20.848149]  copy_user_test_oob+0x434/0xec8
[   20.848215]  kunit_try_run_case+0x170/0x3f0
[   20.848449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.848505]  kthread+0x328/0x630
[   20.848551]  ret_from_fork+0x10/0x20
[   20.848606] 
[   20.848712] Allocated by task 285:
[   20.848829]  kasan_save_stack+0x3c/0x68
[   20.848870]  kasan_save_track+0x20/0x40
[   20.848972]  kasan_save_alloc_info+0x40/0x58
[   20.849021]  __kasan_kmalloc+0xd4/0xd8
[   20.849178]  __kmalloc_noprof+0x190/0x4d0
[   20.849218]  kunit_kmalloc_array+0x34/0x88
[   20.849255]  copy_user_test_oob+0xac/0xec8
[   20.849292]  kunit_try_run_case+0x170/0x3f0
[   20.849331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.849384]  kthread+0x328/0x630
[   20.849424]  ret_from_fork+0x10/0x20
[   20.849473] 
[   20.849495] The buggy address belongs to the object at fff00000c1729a00
[   20.849495]  which belongs to the cache kmalloc-128 of size 128
[   20.849554] The buggy address is located 0 bytes inside of
[   20.849554]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.849736] 
[   20.849760] The buggy address belongs to the physical page:
[   20.849936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.850039] page_type: f5(slab)
[   20.850084] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.850165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.850215] page dumped because: kasan: bad access detected
[   20.850293] 
[   20.850313] Memory state around the buggy address:
[   20.850346]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.850392]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850445] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.850495]                                                                 ^
[   20.850535]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850581]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850620] ==================================================================
[   20.835374] ==================================================================
[   20.835437] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.835489] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.835947] 
[   20.836093] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.836245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.836273] Hardware name: linux,dummy-virt (DT)
[   20.836308] Call trace:
[   20.836332]  show_stack+0x20/0x38 (C)
[   20.836934]  dump_stack_lvl+0x8c/0xd0
[   20.837234]  print_report+0x118/0x608
[   20.837340]  kasan_report+0xdc/0x128
[   20.837388]  kasan_check_range+0x100/0x1a8
[   20.837439]  __kasan_check_write+0x20/0x30
[   20.837489]  copy_user_test_oob+0x35c/0xec8
[   20.837538]  kunit_try_run_case+0x170/0x3f0
[   20.837585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.837638]  kthread+0x328/0x630
[   20.837687]  ret_from_fork+0x10/0x20
[   20.837985] 
[   20.838024] Allocated by task 285:
[   20.838070]  kasan_save_stack+0x3c/0x68
[   20.838114]  kasan_save_track+0x20/0x40
[   20.838154]  kasan_save_alloc_info+0x40/0x58
[   20.838207]  __kasan_kmalloc+0xd4/0xd8
[   20.838247]  __kmalloc_noprof+0x190/0x4d0
[   20.838285]  kunit_kmalloc_array+0x34/0x88
[   20.838323]  copy_user_test_oob+0xac/0xec8
[   20.838753]  kunit_try_run_case+0x170/0x3f0
[   20.838943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.839058]  kthread+0x328/0x630
[   20.839108]  ret_from_fork+0x10/0x20
[   20.839484] 
[   20.839560] The buggy address belongs to the object at fff00000c1729a00
[   20.839560]  which belongs to the cache kmalloc-128 of size 128
[   20.839656] The buggy address is located 0 bytes inside of
[   20.839656]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.839728] 
[   20.839751] The buggy address belongs to the physical page:
[   20.839785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.839979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.840290] page_type: f5(slab)
[   20.840402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.840531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.840589] page dumped because: kasan: bad access detected
[   20.840623] 
[   20.840645] Memory state around the buggy address:
[   20.840690]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.840777]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.840923] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.841258]                                                                 ^
[   20.841431]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.841479]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.841556] ==================================================================
[   20.820317] ==================================================================
[   20.820371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.820423] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.820475] 
[   20.820507] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.821482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.821526] Hardware name: linux,dummy-virt (DT)
[   20.821785] Call trace:
[   20.821818]  show_stack+0x20/0x38 (C)
[   20.821876]  dump_stack_lvl+0x8c/0xd0
[   20.821923]  print_report+0x118/0x608
[   20.821971]  kasan_report+0xdc/0x128
[   20.822018]  kasan_check_range+0x100/0x1a8
[   20.822343]  __kasan_check_read+0x20/0x30
[   20.822640]  copy_user_test_oob+0x728/0xec8
[   20.822763]  kunit_try_run_case+0x170/0x3f0
[   20.822814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.822880]  kthread+0x328/0x630
[   20.822928]  ret_from_fork+0x10/0x20
[   20.823384] 
[   20.823510] Allocated by task 285:
[   20.823551]  kasan_save_stack+0x3c/0x68
[   20.823596]  kasan_save_track+0x20/0x40
[   20.823634]  kasan_save_alloc_info+0x40/0x58
[   20.823696]  __kasan_kmalloc+0xd4/0xd8
[   20.823887]  __kmalloc_noprof+0x190/0x4d0
[   20.823929]  kunit_kmalloc_array+0x34/0x88
[   20.823966]  copy_user_test_oob+0xac/0xec8
[   20.824007]  kunit_try_run_case+0x170/0x3f0
[   20.824188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.824284]  kthread+0x328/0x630
[   20.824366]  ret_from_fork+0x10/0x20
[   20.824404] 
[   20.824476] The buggy address belongs to the object at fff00000c1729a00
[   20.824476]  which belongs to the cache kmalloc-128 of size 128
[   20.824685] The buggy address is located 0 bytes inside of
[   20.824685]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.824750] 
[   20.824772] The buggy address belongs to the physical page:
[   20.824812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.825078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.825455] page_type: f5(slab)
[   20.825594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.825694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.825884] page dumped because: kasan: bad access detected
[   20.826179] 
[   20.826204] Memory state around the buggy address:
[   20.826300]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.826377]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.826423] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.826465]                                                                 ^
[   20.826704]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.826758]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827149] ==================================================================
[   20.806813] ==================================================================
[   20.807142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.807652] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.807710] 
[   20.807761] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.807985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.808015] Hardware name: linux,dummy-virt (DT)
[   20.808055] Call trace:
[   20.808088]  show_stack+0x20/0x38 (C)
[   20.808143]  dump_stack_lvl+0x8c/0xd0
[   20.808208]  print_report+0x118/0x608
[   20.808255]  kasan_report+0xdc/0x128
[   20.808302]  kasan_check_range+0x100/0x1a8
[   20.808350]  __kasan_check_write+0x20/0x30
[   20.808400]  copy_user_test_oob+0x234/0xec8
[   20.808449]  kunit_try_run_case+0x170/0x3f0
[   20.808502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.808554]  kthread+0x328/0x630
[   20.808603]  ret_from_fork+0x10/0x20
[   20.808662] 
[   20.808761] Allocated by task 285:
[   20.808838]  kasan_save_stack+0x3c/0x68
[   20.808968]  kasan_save_track+0x20/0x40
[   20.809015]  kasan_save_alloc_info+0x40/0x58
[   20.809150]  __kasan_kmalloc+0xd4/0xd8
[   20.809431]  __kmalloc_noprof+0x190/0x4d0
[   20.809675]  kunit_kmalloc_array+0x34/0x88
[   20.809723]  copy_user_test_oob+0xac/0xec8
[   20.809766]  kunit_try_run_case+0x170/0x3f0
[   20.809880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810003]  kthread+0x328/0x630
[   20.810351]  ret_from_fork+0x10/0x20
[   20.810515] 
[   20.810547] The buggy address belongs to the object at fff00000c1729a00
[   20.810547]  which belongs to the cache kmalloc-128 of size 128
[   20.810752] The buggy address is located 0 bytes inside of
[   20.810752]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.810829] 
[   20.810856] The buggy address belongs to the physical page:
[   20.810893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.810957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.811028] page_type: f5(slab)
[   20.811174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.811237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.811280] page dumped because: kasan: bad access detected
[   20.811316] 
[   20.811339] Memory state around the buggy address:
[   20.811374]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.811419]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.811463] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.811920]                                                                 ^
[   20.812024]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812226]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812293] ==================================================================
[   20.842740] ==================================================================
[   20.842798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.842864] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285
[   20.842926] 
[   20.842979] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.843198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.843301] Hardware name: linux,dummy-virt (DT)
[   20.843333] Call trace:
[   20.843357]  show_stack+0x20/0x38 (C)
[   20.843409]  dump_stack_lvl+0x8c/0xd0
[   20.843455]  print_report+0x118/0x608
[   20.844004]  kasan_report+0xdc/0x128
[   20.844060]  kasan_check_range+0x100/0x1a8
[   20.844110]  __kasan_check_read+0x20/0x30
[   20.844179]  copy_user_test_oob+0x3c8/0xec8
[   20.844237]  kunit_try_run_case+0x170/0x3f0
[   20.844286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.844339]  kthread+0x328/0x630
[   20.844385]  ret_from_fork+0x10/0x20
[   20.844521] 
[   20.844622] Allocated by task 285:
[   20.844705]  kasan_save_stack+0x3c/0x68
[   20.844754]  kasan_save_track+0x20/0x40
[   20.844935]  kasan_save_alloc_info+0x40/0x58
[   20.844977]  __kasan_kmalloc+0xd4/0xd8
[   20.845020]  __kmalloc_noprof+0x190/0x4d0
[   20.845211]  kunit_kmalloc_array+0x34/0x88
[   20.845268]  copy_user_test_oob+0xac/0xec8
[   20.845320]  kunit_try_run_case+0x170/0x3f0
[   20.845468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.845512]  kthread+0x328/0x630
[   20.845550]  ret_from_fork+0x10/0x20
[   20.845593] 
[   20.845710] The buggy address belongs to the object at fff00000c1729a00
[   20.845710]  which belongs to the cache kmalloc-128 of size 128
[   20.846234] The buggy address is located 0 bytes inside of
[   20.846234]  allocated 120-byte region [fff00000c1729a00, fff00000c1729a78)
[   20.846300] 
[   20.846324] The buggy address belongs to the physical page:
[   20.846357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.846409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.846457] page_type: f5(slab)
[   20.846496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.846547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.846590] page dumped because: kasan: bad access detected
[   20.846637] 
[   20.846657] Memory state around the buggy address:
[   20.846690]  fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.846739]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.846784] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.846822]                                                                 ^
[   20.846862]  fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.847020]  fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.847084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[   20.755614] ==================================================================
[   20.756385] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.756475] Read of size 8 at addr fff00000c1729978 by task kunit_try_catch/281
[   20.756670] 
[   20.756708] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.756798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.756828] Hardware name: linux,dummy-virt (DT)
[   20.756870] Call trace:
[   20.756896]  show_stack+0x20/0x38 (C)
[   20.757274]  dump_stack_lvl+0x8c/0xd0
[   20.757338]  print_report+0x118/0x608
[   20.757389]  kasan_report+0xdc/0x128
[   20.757802]  __asan_report_load8_noabort+0x20/0x30
[   20.757870]  copy_to_kernel_nofault+0x204/0x250
[   20.758062]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.758193]  kunit_try_run_case+0x170/0x3f0
[   20.758244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.758297]  kthread+0x328/0x630
[   20.758345]  ret_from_fork+0x10/0x20
[   20.758397] 
[   20.758698] Allocated by task 281:
[   20.758783]  kasan_save_stack+0x3c/0x68
[   20.758895]  kasan_save_track+0x20/0x40
[   20.758935]  kasan_save_alloc_info+0x40/0x58
[   20.758977]  __kasan_kmalloc+0xd4/0xd8
[   20.759014]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.759057]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.759097]  kunit_try_run_case+0x170/0x3f0
[   20.759136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.759190]  kthread+0x328/0x630
[   20.759227]  ret_from_fork+0x10/0x20
[   20.759264] 
[   20.759289] The buggy address belongs to the object at fff00000c1729900
[   20.759289]  which belongs to the cache kmalloc-128 of size 128
[   20.759373] The buggy address is located 0 bytes to the right of
[   20.759373]  allocated 120-byte region [fff00000c1729900, fff00000c1729978)
[   20.759549] 
[   20.759622] The buggy address belongs to the physical page:
[   20.759719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.759896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.760138] page_type: f5(slab)
[   20.760203] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.760255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.760297] page dumped because: kasan: bad access detected
[   20.760332] 
[   20.760354] Memory state around the buggy address:
[   20.760390]  fff00000c1729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.761174]  fff00000c1729880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761251] >fff00000c1729900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.761293]                                                                 ^
[   20.761711]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761815]  fff00000c1729a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761857] ==================================================================
[   20.762782] ==================================================================
[   20.762874] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.763060] Write of size 8 at addr fff00000c1729978 by task kunit_try_catch/281
[   20.763209] 
[   20.763241] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.763328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.763357] Hardware name: linux,dummy-virt (DT)
[   20.763389] Call trace:
[   20.763423]  show_stack+0x20/0x38 (C)
[   20.763474]  dump_stack_lvl+0x8c/0xd0
[   20.763780]  print_report+0x118/0x608
[   20.763973]  kasan_report+0xdc/0x128
[   20.764023]  kasan_check_range+0x100/0x1a8
[   20.764229]  __kasan_check_write+0x20/0x30
[   20.764418]  copy_to_kernel_nofault+0x8c/0x250
[   20.764739]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.764848]  kunit_try_run_case+0x170/0x3f0
[   20.764931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.764986]  kthread+0x328/0x630
[   20.765035]  ret_from_fork+0x10/0x20
[   20.765084] 
[   20.765112] Allocated by task 281:
[   20.765262]  kasan_save_stack+0x3c/0x68
[   20.765304]  kasan_save_track+0x20/0x40
[   20.765503]  kasan_save_alloc_info+0x40/0x58
[   20.765695]  __kasan_kmalloc+0xd4/0xd8
[   20.765931]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.766060]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.766118]  kunit_try_run_case+0x170/0x3f0
[   20.766175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766220]  kthread+0x328/0x630
[   20.766269]  ret_from_fork+0x10/0x20
[   20.766308] 
[   20.766423] The buggy address belongs to the object at fff00000c1729900
[   20.766423]  which belongs to the cache kmalloc-128 of size 128
[   20.766688] The buggy address is located 0 bytes to the right of
[   20.766688]  allocated 120-byte region [fff00000c1729900, fff00000c1729978)
[   20.766766] 
[   20.766788] The buggy address belongs to the physical page:
[   20.766824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.766879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.767484] page_type: f5(slab)
[   20.767577] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.767631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.767847] page dumped because: kasan: bad access detected
[   20.768002] 
[   20.768123] Memory state around the buggy address:
[   20.768176]  fff00000c1729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.768283]  fff00000c1729880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.768439] >fff00000c1729900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.768483]                                                                 ^
[   20.768526]  fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769055]  fff00000c1729a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
[   20.712723] ==================================================================
[   20.712762] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.712804] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   20.712854] 
[   20.712881] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.712968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.712998] Hardware name: linux,dummy-virt (DT)
[   20.713031] Call trace:
[   20.713055]  show_stack+0x20/0x38 (C)
[   20.713103]  dump_stack_lvl+0x8c/0xd0
[   20.713152]  print_report+0x310/0x608
[   20.713240]  kasan_report+0xdc/0x128
[   20.713288]  __asan_report_load1_noabort+0x20/0x30
[   20.713340]  vmalloc_oob+0x51c/0x5d0
[   20.713386]  kunit_try_run_case+0x170/0x3f0
[   20.713434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.713488]  kthread+0x328/0x630
[   20.713533]  ret_from_fork+0x10/0x20
[   20.713581] 
[   20.713608] The buggy address belongs to the virtual mapping at
[   20.713608]  [ffff8000800fe000, ffff800080100000) created by:
[   20.713608]  vmalloc_oob+0x98/0x5d0
[   20.713678] 
[   20.713701] The buggy address belongs to the physical page:
[   20.713731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107676
[   20.713814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.713906] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.713957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.713999] page dumped because: kasan: bad access detected
[   20.714062] 
[   20.714082] Memory state around the buggy address:
[   20.714117]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.714172]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.714217] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.714279]                                                                 ^
[   20.714321]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.714382]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.714571] ==================================================================
[   20.710736] ==================================================================
[   20.710811] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.711091] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   20.711145] 
[   20.711192] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.711282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.711310] Hardware name: linux,dummy-virt (DT)
[   20.711343] Call trace:
[   20.711367]  show_stack+0x20/0x38 (C)
[   20.711421]  dump_stack_lvl+0x8c/0xd0
[   20.711470]  print_report+0x310/0x608
[   20.711520]  kasan_report+0xdc/0x128
[   20.711566]  __asan_report_load1_noabort+0x20/0x30
[   20.711618]  vmalloc_oob+0x578/0x5d0
[   20.711664]  kunit_try_run_case+0x170/0x3f0
[   20.711713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.711768]  kthread+0x328/0x630
[   20.711815]  ret_from_fork+0x10/0x20
[   20.711868] 
[   20.711899] The buggy address belongs to the virtual mapping at
[   20.711899]  [ffff8000800fe000, ffff800080100000) created by:
[   20.711899]  vmalloc_oob+0x98/0x5d0
[   20.711975] 
[   20.711999] The buggy address belongs to the physical page:
[   20.712034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107676
[   20.712087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.712154] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.712217] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.712260] page dumped because: kasan: bad access detected
[   20.712295] 
[   20.712315] Memory state around the buggy address:
[   20.712349]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.712395]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.712439] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.712480]                                                              ^
[   20.712519]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.712563]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.712604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[   20.641031] ==================================================================
[   20.641272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.641428] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.641514] 
[   20.641566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.641669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.641772] Hardware name: linux,dummy-virt (DT)
[   20.641847] Call trace:
[   20.641872]  show_stack+0x20/0x38 (C)
[   20.641923]  dump_stack_lvl+0x8c/0xd0
[   20.641973]  print_report+0x118/0x608
[   20.642129]  kasan_report+0xdc/0x128
[   20.642198]  kasan_check_range+0x100/0x1a8
[   20.642284]  __kasan_check_write+0x20/0x30
[   20.642373]  kasan_atomics_helper+0x1414/0x4858
[   20.642490]  kasan_atomics+0x198/0x2e0
[   20.642590]  kunit_try_run_case+0x170/0x3f0
[   20.642950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.643018]  kthread+0x328/0x630
[   20.643064]  ret_from_fork+0x10/0x20
[   20.643409] 
[   20.643522] Allocated by task 265:
[   20.643822]  kasan_save_stack+0x3c/0x68
[   20.643925]  kasan_save_track+0x20/0x40
[   20.644057]  kasan_save_alloc_info+0x40/0x58
[   20.644136]  __kasan_kmalloc+0xd4/0xd8
[   20.644200]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.644241]  kasan_atomics+0xb8/0x2e0
[   20.644474]  kunit_try_run_case+0x170/0x3f0
[   20.644602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.644703]  kthread+0x328/0x630
[   20.644893]  ret_from_fork+0x10/0x20
[   20.645067] 
[   20.645139] The buggy address belongs to the object at fff00000c7832f80
[   20.645139]  which belongs to the cache kmalloc-64 of size 64
[   20.645309] The buggy address is located 0 bytes to the right of
[   20.645309]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.645404] 
[   20.645426] The buggy address belongs to the physical page:
[   20.645679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.645821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.645957] page_type: f5(slab)
[   20.646103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.646312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.646367] page dumped because: kasan: bad access detected
[   20.646465] 
[   20.646544] Memory state around the buggy address:
[   20.646579]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646647]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.646691] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.646734]                                      ^
[   20.646768]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.646813]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.646852] ==================================================================
[   20.610772] ==================================================================
[   20.610852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.610926] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.610994] 
[   20.611042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.611149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.611439] Hardware name: linux,dummy-virt (DT)
[   20.611472] Call trace:
[   20.611503]  show_stack+0x20/0x38 (C)
[   20.611572]  dump_stack_lvl+0x8c/0xd0
[   20.611627]  print_report+0x118/0x608
[   20.611704]  kasan_report+0xdc/0x128
[   20.611786]  kasan_check_range+0x100/0x1a8
[   20.611867]  __kasan_check_write+0x20/0x30
[   20.611921]  kasan_atomics_helper+0x1128/0x4858
[   20.612013]  kasan_atomics+0x198/0x2e0
[   20.612103]  kunit_try_run_case+0x170/0x3f0
[   20.612180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.612281]  kthread+0x328/0x630
[   20.612330]  ret_from_fork+0x10/0x20
[   20.612379] 
[   20.612401] Allocated by task 265:
[   20.612686]  kasan_save_stack+0x3c/0x68
[   20.612730]  kasan_save_track+0x20/0x40
[   20.612787]  kasan_save_alloc_info+0x40/0x58
[   20.612849]  __kasan_kmalloc+0xd4/0xd8
[   20.612896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.612939]  kasan_atomics+0xb8/0x2e0
[   20.612975]  kunit_try_run_case+0x170/0x3f0
[   20.613020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613075]  kthread+0x328/0x630
[   20.613112]  ret_from_fork+0x10/0x20
[   20.613151] 
[   20.613180] The buggy address belongs to the object at fff00000c7832f80
[   20.613180]  which belongs to the cache kmalloc-64 of size 64
[   20.613239] The buggy address is located 0 bytes to the right of
[   20.613239]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.613314] 
[   20.613337] The buggy address belongs to the physical page:
[   20.613369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.613436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.613492] page_type: f5(slab)
[   20.613530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.613581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.613621] page dumped because: kasan: bad access detected
[   20.613656] 
[   20.613676] Memory state around the buggy address:
[   20.613714]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.613788]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.613832] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.613872]                                      ^
[   20.613905]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.613948]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.613990] ==================================================================
[   20.614185] ==================================================================
[   20.614232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.614280] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.614331] 
[   20.614361] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.614464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.614592] Hardware name: linux,dummy-virt (DT)
[   20.614628] Call trace:
[   20.614668]  show_stack+0x20/0x38 (C)
[   20.614975]  dump_stack_lvl+0x8c/0xd0
[   20.615070]  print_report+0x118/0x608
[   20.615147]  kasan_report+0xdc/0x128
[   20.615279]  kasan_check_range+0x100/0x1a8
[   20.615347]  __kasan_check_write+0x20/0x30
[   20.615403]  kasan_atomics_helper+0x1190/0x4858
[   20.615517]  kasan_atomics+0x198/0x2e0
[   20.615594]  kunit_try_run_case+0x170/0x3f0
[   20.615659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.615720]  kthread+0x328/0x630
[   20.615808]  ret_from_fork+0x10/0x20
[   20.615885] 
[   20.615925] Allocated by task 265:
[   20.615981]  kasan_save_stack+0x3c/0x68
[   20.616099]  kasan_save_track+0x20/0x40
[   20.616138]  kasan_save_alloc_info+0x40/0x58
[   20.616189]  __kasan_kmalloc+0xd4/0xd8
[   20.616227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.616268]  kasan_atomics+0xb8/0x2e0
[   20.616306]  kunit_try_run_case+0x170/0x3f0
[   20.616345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.616641]  kthread+0x328/0x630
[   20.616687]  ret_from_fork+0x10/0x20
[   20.616775] 
[   20.616858] The buggy address belongs to the object at fff00000c7832f80
[   20.616858]  which belongs to the cache kmalloc-64 of size 64
[   20.616924] The buggy address is located 0 bytes to the right of
[   20.616924]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.617015] 
[   20.617039] The buggy address belongs to the physical page:
[   20.617334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.617429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.617495] page_type: f5(slab)
[   20.617534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.617623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.617667] page dumped because: kasan: bad access detected
[   20.617717] 
[   20.617813] Memory state around the buggy address:
[   20.617854]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617898]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.617943] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.617982]                                      ^
[   20.618017]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.618457]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.618586] ==================================================================
[   20.546513] ==================================================================
[   20.546559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.546607] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.546658] 
[   20.546687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.546783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.546813] Hardware name: linux,dummy-virt (DT)
[   20.546846] Call trace:
[   20.546869]  show_stack+0x20/0x38 (C)
[   20.546919]  dump_stack_lvl+0x8c/0xd0
[   20.547670]  print_report+0x118/0x608
[   20.547783]  kasan_report+0xdc/0x128
[   20.547833]  __asan_report_load4_noabort+0x20/0x30
[   20.547887]  kasan_atomics_helper+0x3e04/0x4858
[   20.547937]  kasan_atomics+0x198/0x2e0
[   20.547984]  kunit_try_run_case+0x170/0x3f0
[   20.548034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548089]  kthread+0x328/0x630
[   20.548140]  ret_from_fork+0x10/0x20
[   20.548716] 
[   20.549051] Allocated by task 265:
[   20.549227]  kasan_save_stack+0x3c/0x68
[   20.549330]  kasan_save_track+0x20/0x40
[   20.549371]  kasan_save_alloc_info+0x40/0x58
[   20.549413]  __kasan_kmalloc+0xd4/0xd8
[   20.549667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.549809]  kasan_atomics+0xb8/0x2e0
[   20.549846]  kunit_try_run_case+0x170/0x3f0
[   20.549886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.550220]  kthread+0x328/0x630
[   20.550267]  ret_from_fork+0x10/0x20
[   20.550339] 
[   20.550361] The buggy address belongs to the object at fff00000c7832f80
[   20.550361]  which belongs to the cache kmalloc-64 of size 64
[   20.550432] The buggy address is located 0 bytes to the right of
[   20.550432]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.550499] 
[   20.550520] The buggy address belongs to the physical page:
[   20.550553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.550775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.551113] page_type: f5(slab)
[   20.551251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.551398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.551467] page dumped because: kasan: bad access detected
[   20.551590] 
[   20.551650] Memory state around the buggy address:
[   20.551684]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.551754]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.551798] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.551839]                                      ^
[   20.551875]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.551919]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.552010] ==================================================================
[   20.601124] ==================================================================
[   20.601188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.601591] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.601684] 
[   20.601835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.602216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.602252] Hardware name: linux,dummy-virt (DT)
[   20.602394] Call trace:
[   20.602553]  show_stack+0x20/0x38 (C)
[   20.602654]  dump_stack_lvl+0x8c/0xd0
[   20.602752]  print_report+0x118/0x608
[   20.602826]  kasan_report+0xdc/0x128
[   20.602875]  kasan_check_range+0x100/0x1a8
[   20.602927]  __kasan_check_write+0x20/0x30
[   20.603122]  kasan_atomics_helper+0x1058/0x4858
[   20.603265]  kasan_atomics+0x198/0x2e0
[   20.603317]  kunit_try_run_case+0x170/0x3f0
[   20.603372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.603654]  kthread+0x328/0x630
[   20.603762]  ret_from_fork+0x10/0x20
[   20.603812] 
[   20.603834] Allocated by task 265:
[   20.603909]  kasan_save_stack+0x3c/0x68
[   20.604140]  kasan_save_track+0x20/0x40
[   20.604370]  kasan_save_alloc_info+0x40/0x58
[   20.604416]  __kasan_kmalloc+0xd4/0xd8
[   20.604455]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.604496]  kasan_atomics+0xb8/0x2e0
[   20.604534]  kunit_try_run_case+0x170/0x3f0
[   20.604574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.604620]  kthread+0x328/0x630
[   20.604659]  ret_from_fork+0x10/0x20
[   20.604736] 
[   20.604808] The buggy address belongs to the object at fff00000c7832f80
[   20.604808]  which belongs to the cache kmalloc-64 of size 64
[   20.604874] The buggy address is located 0 bytes to the right of
[   20.604874]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.604939] 
[   20.605011] The buggy address belongs to the physical page:
[   20.605047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.605115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.605205] page_type: f5(slab)
[   20.605243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.605296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.605337] page dumped because: kasan: bad access detected
[   20.605371] 
[   20.605391] Memory state around the buggy address:
[   20.605424]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.605468]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.605512] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.605551]                                      ^
[   20.605586]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.606033]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.606105] ==================================================================
[   20.606596] ==================================================================
[   20.606650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.606698] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.606774] 
[   20.606819] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.607118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.607166] Hardware name: linux,dummy-virt (DT)
[   20.607199] Call trace:
[   20.607241]  show_stack+0x20/0x38 (C)
[   20.607296]  dump_stack_lvl+0x8c/0xd0
[   20.607431]  print_report+0x118/0x608
[   20.607509]  kasan_report+0xdc/0x128
[   20.607575]  kasan_check_range+0x100/0x1a8
[   20.607645]  __kasan_check_write+0x20/0x30
[   20.607712]  kasan_atomics_helper+0x10c0/0x4858
[   20.607829]  kasan_atomics+0x198/0x2e0
[   20.607878]  kunit_try_run_case+0x170/0x3f0
[   20.607935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.607991]  kthread+0x328/0x630
[   20.608038]  ret_from_fork+0x10/0x20
[   20.608087] 
[   20.608214] Allocated by task 265:
[   20.608249]  kasan_save_stack+0x3c/0x68
[   20.608356]  kasan_save_track+0x20/0x40
[   20.608403]  kasan_save_alloc_info+0x40/0x58
[   20.608445]  __kasan_kmalloc+0xd4/0xd8
[   20.608484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.608524]  kasan_atomics+0xb8/0x2e0
[   20.608563]  kunit_try_run_case+0x170/0x3f0
[   20.608612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.608658]  kthread+0x328/0x630
[   20.608774]  ret_from_fork+0x10/0x20
[   20.608814] 
[   20.608876] The buggy address belongs to the object at fff00000c7832f80
[   20.608876]  which belongs to the cache kmalloc-64 of size 64
[   20.608938] The buggy address is located 0 bytes to the right of
[   20.608938]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.609002] 
[   20.609025] The buggy address belongs to the physical page:
[   20.609254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.609411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.609488] page_type: f5(slab)
[   20.609563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.609616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.609685] page dumped because: kasan: bad access detected
[   20.610023] 
[   20.610093] Memory state around the buggy address:
[   20.610129]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.610184]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.610228] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.610268]                                      ^
[   20.610305]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.610368]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.610409] ==================================================================
[   20.690979] ==================================================================
[   20.691024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.691071] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.691121] 
[   20.691167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.691252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.691281] Hardware name: linux,dummy-virt (DT)
[   20.691313] Call trace:
[   20.691336]  show_stack+0x20/0x38 (C)
[   20.691384]  dump_stack_lvl+0x8c/0xd0
[   20.691617]  print_report+0x118/0x608
[   20.691698]  kasan_report+0xdc/0x128
[   20.691826]  __asan_report_load8_noabort+0x20/0x30
[   20.691879]  kasan_atomics_helper+0x3e20/0x4858
[   20.691956]  kasan_atomics+0x198/0x2e0
[   20.692124]  kunit_try_run_case+0x170/0x3f0
[   20.692184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.692259]  kthread+0x328/0x630
[   20.692334]  ret_from_fork+0x10/0x20
[   20.692401] 
[   20.692457] Allocated by task 265:
[   20.692553]  kasan_save_stack+0x3c/0x68
[   20.692612]  kasan_save_track+0x20/0x40
[   20.692669]  kasan_save_alloc_info+0x40/0x58
[   20.692732]  __kasan_kmalloc+0xd4/0xd8
[   20.692844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.692891]  kasan_atomics+0xb8/0x2e0
[   20.692948]  kunit_try_run_case+0x170/0x3f0
[   20.692987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.693057]  kthread+0x328/0x630
[   20.693141]  ret_from_fork+0x10/0x20
[   20.693247] 
[   20.693270] The buggy address belongs to the object at fff00000c7832f80
[   20.693270]  which belongs to the cache kmalloc-64 of size 64
[   20.693330] The buggy address is located 0 bytes to the right of
[   20.693330]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.693525] 
[   20.693614] The buggy address belongs to the physical page:
[   20.693685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.693783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.693902] page_type: f5(slab)
[   20.694039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.694123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.694218] page dumped because: kasan: bad access detected
[   20.694260] 
[   20.694280] Memory state around the buggy address:
[   20.694328]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.694392]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.694437] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.694479]                                      ^
[   20.694901]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.694946]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.694986] ==================================================================
[   20.558770] ==================================================================
[   20.558837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.558889] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.558942] 
[   20.558972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.559058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.559088] Hardware name: linux,dummy-virt (DT)
[   20.559122] Call trace:
[   20.559146]  show_stack+0x20/0x38 (C)
[   20.559211]  dump_stack_lvl+0x8c/0xd0
[   20.559285]  print_report+0x118/0x608
[   20.559338]  kasan_report+0xdc/0x128
[   20.559387]  __asan_report_load8_noabort+0x20/0x30
[   20.559749]  kasan_atomics_helper+0x3f58/0x4858
[   20.559813]  kasan_atomics+0x198/0x2e0
[   20.560031]  kunit_try_run_case+0x170/0x3f0
[   20.560278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.560852]  kthread+0x328/0x630
[   20.560914]  ret_from_fork+0x10/0x20
[   20.561098] 
[   20.561121] Allocated by task 265:
[   20.561151]  kasan_save_stack+0x3c/0x68
[   20.561211]  kasan_save_track+0x20/0x40
[   20.561406]  kasan_save_alloc_info+0x40/0x58
[   20.561606]  __kasan_kmalloc+0xd4/0xd8
[   20.561651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.561721]  kasan_atomics+0xb8/0x2e0
[   20.561797]  kunit_try_run_case+0x170/0x3f0
[   20.561838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.561882]  kthread+0x328/0x630
[   20.561920]  ret_from_fork+0x10/0x20
[   20.561958] 
[   20.561981] The buggy address belongs to the object at fff00000c7832f80
[   20.561981]  which belongs to the cache kmalloc-64 of size 64
[   20.562269] The buggy address is located 0 bytes to the right of
[   20.562269]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.562566] 
[   20.562890] The buggy address belongs to the physical page:
[   20.562929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.562984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.563034] page_type: f5(slab)
[   20.563092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.563203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.563566] page dumped because: kasan: bad access detected
[   20.563604] 
[   20.563626] Memory state around the buggy address:
[   20.563667]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.563841]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.563886] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.563926]                                      ^
[   20.564038]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.564167]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.564226] ==================================================================
[   20.665859] ==================================================================
[   20.665903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.665952] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.666003] 
[   20.666034] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.666118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666146] Hardware name: linux,dummy-virt (DT)
[   20.666193] Call trace:
[   20.666216]  show_stack+0x20/0x38 (C)
[   20.666266]  dump_stack_lvl+0x8c/0xd0
[   20.666314]  print_report+0x118/0x608
[   20.666376]  kasan_report+0xdc/0x128
[   20.666472]  __asan_report_load8_noabort+0x20/0x30
[   20.666525]  kasan_atomics_helper+0x3db0/0x4858
[   20.666579]  kasan_atomics+0x198/0x2e0
[   20.666702]  kunit_try_run_case+0x170/0x3f0
[   20.666760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.666846]  kthread+0x328/0x630
[   20.666894]  ret_from_fork+0x10/0x20
[   20.667032] 
[   20.667062] Allocated by task 265:
[   20.667094]  kasan_save_stack+0x3c/0x68
[   20.667136]  kasan_save_track+0x20/0x40
[   20.667209]  kasan_save_alloc_info+0x40/0x58
[   20.667356]  __kasan_kmalloc+0xd4/0xd8
[   20.667528]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.667628]  kasan_atomics+0xb8/0x2e0
[   20.667724]  kunit_try_run_case+0x170/0x3f0
[   20.667790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667866]  kthread+0x328/0x630
[   20.667929]  ret_from_fork+0x10/0x20
[   20.667995] 
[   20.668035] The buggy address belongs to the object at fff00000c7832f80
[   20.668035]  which belongs to the cache kmalloc-64 of size 64
[   20.668100] The buggy address is located 0 bytes to the right of
[   20.668100]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.668176] 
[   20.668198] The buggy address belongs to the physical page:
[   20.668230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.668284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.668330] page_type: f5(slab)
[   20.668368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.668419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.668479] page dumped because: kasan: bad access detected
[   20.668558] 
[   20.668598] Memory state around the buggy address:
[   20.668647]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.668693]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.668745] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.668786]                                      ^
[   20.668820]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.668865]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.669109] ==================================================================
[   20.492101] ==================================================================
[   20.492169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.492222] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.492274] 
[   20.492621] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.492793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.492825] Hardware name: linux,dummy-virt (DT)
[   20.492857] Call trace:
[   20.492885]  show_stack+0x20/0x38 (C)
[   20.493318]  dump_stack_lvl+0x8c/0xd0
[   20.493370]  print_report+0x118/0x608
[   20.493419]  kasan_report+0xdc/0x128
[   20.493973]  kasan_check_range+0x100/0x1a8
[   20.494043]  __kasan_check_write+0x20/0x30
[   20.494243]  kasan_atomics_helper+0xad4/0x4858
[   20.494330]  kasan_atomics+0x198/0x2e0
[   20.494473]  kunit_try_run_case+0x170/0x3f0
[   20.494523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.494801]  kthread+0x328/0x630
[   20.495253]  ret_from_fork+0x10/0x20
[   20.495342] 
[   20.495402] Allocated by task 265:
[   20.495431]  kasan_save_stack+0x3c/0x68
[   20.495507]  kasan_save_track+0x20/0x40
[   20.495547]  kasan_save_alloc_info+0x40/0x58
[   20.495589]  __kasan_kmalloc+0xd4/0xd8
[   20.495649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.496004]  kasan_atomics+0xb8/0x2e0
[   20.496042]  kunit_try_run_case+0x170/0x3f0
[   20.496099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.497166] 
[   20.497225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.497278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.497597] page_type: f5(slab)
[   20.497743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.498332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.498394] page dumped because: kasan: bad access detected
[   20.498452] 
[   20.498475] Memory state around the buggy address:
[   20.498510]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.498554]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.498633] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.498719]                                      ^
[   20.498768]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.498990]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.499041] ==================================================================
[   20.624488] ==================================================================
[   20.624538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.624586] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.624636] 
[   20.624667] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.624752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.624781] Hardware name: linux,dummy-virt (DT)
[   20.624812] Call trace:
[   20.624836]  show_stack+0x20/0x38 (C)
[   20.624884]  dump_stack_lvl+0x8c/0xd0
[   20.624964]  print_report+0x118/0x608
[   20.625026]  kasan_report+0xdc/0x128
[   20.625091]  kasan_check_range+0x100/0x1a8
[   20.625142]  __kasan_check_write+0x20/0x30
[   20.625240]  kasan_atomics_helper+0x126c/0x4858
[   20.625408]  kasan_atomics+0x198/0x2e0
[   20.625562]  kunit_try_run_case+0x170/0x3f0
[   20.625631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.625704]  kthread+0x328/0x630
[   20.625943]  ret_from_fork+0x10/0x20
[   20.626101] 
[   20.626224] Allocated by task 265:
[   20.626325]  kasan_save_stack+0x3c/0x68
[   20.626412]  kasan_save_track+0x20/0x40
[   20.626533]  kasan_save_alloc_info+0x40/0x58
[   20.626578]  __kasan_kmalloc+0xd4/0xd8
[   20.626640]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.626683]  kasan_atomics+0xb8/0x2e0
[   20.626721]  kunit_try_run_case+0x170/0x3f0
[   20.627043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.627166]  kthread+0x328/0x630
[   20.627224]  ret_from_fork+0x10/0x20
[   20.627263] 
[   20.627293] The buggy address belongs to the object at fff00000c7832f80
[   20.627293]  which belongs to the cache kmalloc-64 of size 64
[   20.627353] The buggy address is located 0 bytes to the right of
[   20.627353]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.627435] 
[   20.627459] The buggy address belongs to the physical page:
[   20.627491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.627554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.627607] page_type: f5(slab)
[   20.627650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.627702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.627744] page dumped because: kasan: bad access detected
[   20.627794] 
[   20.627815] Memory state around the buggy address:
[   20.627848]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.627898]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.627941] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.627995]                                      ^
[   20.628042]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.628108]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.628149] ==================================================================
[   20.674501] ==================================================================
[   20.674550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.674599] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.674649] 
[   20.674681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.674770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.674801] Hardware name: linux,dummy-virt (DT)
[   20.674832] Call trace:
[   20.674857]  show_stack+0x20/0x38 (C)
[   20.674905]  dump_stack_lvl+0x8c/0xd0
[   20.674954]  print_report+0x118/0x608
[   20.675001]  kasan_report+0xdc/0x128
[   20.675049]  __asan_report_load8_noabort+0x20/0x30
[   20.675102]  kasan_atomics_helper+0x3df4/0x4858
[   20.675150]  kasan_atomics+0x198/0x2e0
[   20.675223]  kunit_try_run_case+0x170/0x3f0
[   20.675294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675350]  kthread+0x328/0x630
[   20.675414]  ret_from_fork+0x10/0x20
[   20.675465] 
[   20.675495] Allocated by task 265:
[   20.675526]  kasan_save_stack+0x3c/0x68
[   20.675569]  kasan_save_track+0x20/0x40
[   20.675609]  kasan_save_alloc_info+0x40/0x58
[   20.675650]  __kasan_kmalloc+0xd4/0xd8
[   20.675687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.675728]  kasan_atomics+0xb8/0x2e0
[   20.675764]  kunit_try_run_case+0x170/0x3f0
[   20.675812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675858]  kthread+0x328/0x630
[   20.675894]  ret_from_fork+0x10/0x20
[   20.675933] 
[   20.675962] The buggy address belongs to the object at fff00000c7832f80
[   20.675962]  which belongs to the cache kmalloc-64 of size 64
[   20.676021] The buggy address is located 0 bytes to the right of
[   20.676021]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.676096] 
[   20.676119] The buggy address belongs to the physical page:
[   20.676150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.676212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.676260] page_type: f5(slab)
[   20.676297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.676349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.676404] page dumped because: kasan: bad access detected
[   20.676438] 
[   20.676458] Memory state around the buggy address:
[   20.676490]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676534]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.676579] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.676618]                                      ^
[   20.676656]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.676700]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.676742] ==================================================================
[   20.686646] ==================================================================
[   20.686696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.686912] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.686970] 
[   20.687002] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.687088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.687117] Hardware name: linux,dummy-virt (DT)
[   20.687148] Call trace:
[   20.687186]  show_stack+0x20/0x38 (C)
[   20.687426]  dump_stack_lvl+0x8c/0xd0
[   20.687505]  print_report+0x118/0x608
[   20.687602]  kasan_report+0xdc/0x128
[   20.687684]  kasan_check_range+0x100/0x1a8
[   20.687751]  __kasan_check_write+0x20/0x30
[   20.687828]  kasan_atomics_helper+0x175c/0x4858
[   20.687879]  kasan_atomics+0x198/0x2e0
[   20.688051]  kunit_try_run_case+0x170/0x3f0
[   20.688101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.688199]  kthread+0x328/0x630
[   20.688276]  ret_from_fork+0x10/0x20
[   20.688342] 
[   20.688372] Allocated by task 265:
[   20.688430]  kasan_save_stack+0x3c/0x68
[   20.688548]  kasan_save_track+0x20/0x40
[   20.688606]  kasan_save_alloc_info+0x40/0x58
[   20.688675]  __kasan_kmalloc+0xd4/0xd8
[   20.688714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.688837]  kasan_atomics+0xb8/0x2e0
[   20.688964]  kunit_try_run_case+0x170/0x3f0
[   20.689005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689209]  kthread+0x328/0x630
[   20.689252]  ret_from_fork+0x10/0x20
[   20.689290] 
[   20.689312] The buggy address belongs to the object at fff00000c7832f80
[   20.689312]  which belongs to the cache kmalloc-64 of size 64
[   20.689372] The buggy address is located 0 bytes to the right of
[   20.689372]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.689470] 
[   20.689541] The buggy address belongs to the physical page:
[   20.689693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.689762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.689862] page_type: f5(slab)
[   20.689914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.690176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.690219] page dumped because: kasan: bad access detected
[   20.690254] 
[   20.690274] Memory state around the buggy address:
[   20.690308]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.690378]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.690468] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.690540]                                      ^
[   20.690592]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.690671]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.690720] ==================================================================
[   20.457649] ==================================================================
[   20.458124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.458327] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.458401] 
[   20.458445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.458781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.458934] Hardware name: linux,dummy-virt (DT)
[   20.459117] Call trace:
[   20.464568]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.469507]  __kasan_kmalloc+0xd4/0xd8
[   20.469545]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.469586]  kasan_atomics+0xb8/0x2e0
[   20.469624]  kunit_try_run_case+0x170/0x3f0
[   20.469663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.469709]  kthread+0x328/0x630
[   20.469747]  ret_from_fork+0x10/0x20
[   20.469785] 
[   20.469835] The buggy address belongs to the object at fff00000c7832f80
[   20.469835]  which belongs to the cache kmalloc-64 of size 64
[   20.469899] The buggy address is located 0 bytes to the right of
[   20.469899]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.469964] 
[   20.469986] The buggy address belongs to the physical page:
[   20.470019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.470072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.470216] page_type: f5(slab)
[   20.470282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.470405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.470493] page dumped because: kasan: bad access detected
[   20.470959] 
[   20.471009] Memory state around the buggy address:
[   20.471063]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.471142]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.471195] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.471263]                                      ^
[   20.471299]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.471344]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.471385] ==================================================================
[   20.647040] ==================================================================
[   20.647086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.647132] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.647199] 
[   20.647229] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.647317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.647344] Hardware name: linux,dummy-virt (DT)
[   20.647377] Call trace:
[   20.647401]  show_stack+0x20/0x38 (C)
[   20.647451]  dump_stack_lvl+0x8c/0xd0
[   20.647497]  print_report+0x118/0x608
[   20.647545]  kasan_report+0xdc/0x128
[   20.647592]  kasan_check_range+0x100/0x1a8
[   20.647640]  __kasan_check_write+0x20/0x30
[   20.647690]  kasan_atomics_helper+0x147c/0x4858
[   20.647752]  kasan_atomics+0x198/0x2e0
[   20.647809]  kunit_try_run_case+0x170/0x3f0
[   20.647858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.647913]  kthread+0x328/0x630
[   20.647958]  ret_from_fork+0x10/0x20
[   20.648015] 
[   20.648038] Allocated by task 265:
[   20.648076]  kasan_save_stack+0x3c/0x68
[   20.648117]  kasan_save_track+0x20/0x40
[   20.648166]  kasan_save_alloc_info+0x40/0x58
[   20.648209]  __kasan_kmalloc+0xd4/0xd8
[   20.648248]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.648290]  kasan_atomics+0xb8/0x2e0
[   20.648328]  kunit_try_run_case+0x170/0x3f0
[   20.648367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.648413]  kthread+0x328/0x630
[   20.648451]  ret_from_fork+0x10/0x20
[   20.648490] 
[   20.648511] The buggy address belongs to the object at fff00000c7832f80
[   20.648511]  which belongs to the cache kmalloc-64 of size 64
[   20.648569] The buggy address is located 0 bytes to the right of
[   20.648569]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.648634] 
[   20.648655] The buggy address belongs to the physical page:
[   20.648698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.648758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.648806] page_type: f5(slab)
[   20.648844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.648893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.648936] page dumped because: kasan: bad access detected
[   20.648970] 
[   20.648991] Memory state around the buggy address:
[   20.649023]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.649068]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.649120] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.649176]                                      ^
[   20.649209]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.649253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.649292] ==================================================================
[   20.631711] ==================================================================
[   20.631759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.631860] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.631959] 
[   20.632024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.632169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.632235] Hardware name: linux,dummy-virt (DT)
[   20.632285] Call trace:
[   20.632311]  show_stack+0x20/0x38 (C)
[   20.632545]  dump_stack_lvl+0x8c/0xd0
[   20.632623]  print_report+0x118/0x608
[   20.632689]  kasan_report+0xdc/0x128
[   20.632765]  kasan_check_range+0x100/0x1a8
[   20.632832]  __kasan_check_write+0x20/0x30
[   20.632882]  kasan_atomics_helper+0x1384/0x4858
[   20.632970]  kasan_atomics+0x198/0x2e0
[   20.633090]  kunit_try_run_case+0x170/0x3f0
[   20.633140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.633221]  kthread+0x328/0x630
[   20.633479]  ret_from_fork+0x10/0x20
[   20.633529] 
[   20.633571] Allocated by task 265:
[   20.633629]  kasan_save_stack+0x3c/0x68
[   20.633688]  kasan_save_track+0x20/0x40
[   20.633768]  kasan_save_alloc_info+0x40/0x58
[   20.633846]  __kasan_kmalloc+0xd4/0xd8
[   20.633916]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.634085]  kasan_atomics+0xb8/0x2e0
[   20.634294]  kunit_try_run_case+0x170/0x3f0
[   20.634441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.634532]  kthread+0x328/0x630
[   20.634590]  ret_from_fork+0x10/0x20
[   20.634638] 
[   20.634661] The buggy address belongs to the object at fff00000c7832f80
[   20.634661]  which belongs to the cache kmalloc-64 of size 64
[   20.634719] The buggy address is located 0 bytes to the right of
[   20.634719]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.634790] 
[   20.634812] The buggy address belongs to the physical page:
[   20.634846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.634897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.635223] page_type: f5(slab)
[   20.635299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.635437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.635552] page dumped because: kasan: bad access detected
[   20.635600] 
[   20.635641] Memory state around the buggy address:
[   20.635737]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635782]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.635825] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.635998]                                      ^
[   20.636038]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.636171]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.636273] ==================================================================
[   20.484676] ==================================================================
[   20.484842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.484906] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.485067] 
[   20.485193] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.485722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.485841] Hardware name: linux,dummy-virt (DT)
[   20.485875] Call trace:
[   20.485900]  show_stack+0x20/0x38 (C)
[   20.485955]  dump_stack_lvl+0x8c/0xd0
[   20.486007]  print_report+0x118/0x608
[   20.486056]  kasan_report+0xdc/0x128
[   20.486103]  kasan_check_range+0x100/0x1a8
[   20.486151]  __kasan_check_write+0x20/0x30
[   20.486225]  kasan_atomics_helper+0xa6c/0x4858
[   20.486275]  kasan_atomics+0x198/0x2e0
[   20.486505]  kunit_try_run_case+0x170/0x3f0
[   20.486789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.487436]  kthread+0x328/0x630
[   20.487770]  ret_from_fork+0x10/0x20
[   20.487822] 
[   20.487844] Allocated by task 265:
[   20.487878]  kasan_save_stack+0x3c/0x68
[   20.488338]  kasan_save_track+0x20/0x40
[   20.488418]  kasan_save_alloc_info+0x40/0x58
[   20.488524]  __kasan_kmalloc+0xd4/0xd8
[   20.488596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.488666]  kasan_atomics+0xb8/0x2e0
[   20.488846]  kunit_try_run_case+0x170/0x3f0
[   20.488887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488932]  kthread+0x328/0x630
[   20.488969]  ret_from_fork+0x10/0x20
[   20.489008] 
[   20.489031] The buggy address belongs to the object at fff00000c7832f80
[   20.489031]  which belongs to the cache kmalloc-64 of size 64
[   20.489102] The buggy address is located 0 bytes to the right of
[   20.489102]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.489178] 
[   20.489200] The buggy address belongs to the physical page:
[   20.489233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.489309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.489360] page_type: f5(slab)
[   20.489397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.489450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.490440] page dumped because: kasan: bad access detected
[   20.490541] 
[   20.490581] Memory state around the buggy address:
[   20.490635]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490825]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.490992] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.491044]                                      ^
[   20.491083]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.491253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.491295] ==================================================================
[   20.636696] ==================================================================
[   20.636742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.636790] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.636884] 
[   20.637013] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.637109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.637310] Hardware name: linux,dummy-virt (DT)
[   20.637354] Call trace:
[   20.637394]  show_stack+0x20/0x38 (C)
[   20.637467]  dump_stack_lvl+0x8c/0xd0
[   20.637560]  print_report+0x118/0x608
[   20.637627]  kasan_report+0xdc/0x128
[   20.637719]  __asan_report_load8_noabort+0x20/0x30
[   20.637780]  kasan_atomics_helper+0x3f04/0x4858
[   20.637831]  kasan_atomics+0x198/0x2e0
[   20.637878]  kunit_try_run_case+0x170/0x3f0
[   20.637928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.638004]  kthread+0x328/0x630
[   20.638053]  ret_from_fork+0x10/0x20
[   20.638103] 
[   20.638142] Allocated by task 265:
[   20.638304]  kasan_save_stack+0x3c/0x68
[   20.638410]  kasan_save_track+0x20/0x40
[   20.638744]  kasan_save_alloc_info+0x40/0x58
[   20.638817]  __kasan_kmalloc+0xd4/0xd8
[   20.638879]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.638920]  kasan_atomics+0xb8/0x2e0
[   20.638958]  kunit_try_run_case+0x170/0x3f0
[   20.638997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.639042]  kthread+0x328/0x630
[   20.639252]  ret_from_fork+0x10/0x20
[   20.639342] 
[   20.639489] The buggy address belongs to the object at fff00000c7832f80
[   20.639489]  which belongs to the cache kmalloc-64 of size 64
[   20.639619] The buggy address is located 0 bytes to the right of
[   20.639619]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.639965] 
[   20.640076] The buggy address belongs to the physical page:
[   20.640167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.640222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.640269] page_type: f5(slab)
[   20.640317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.640369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.640411] page dumped because: kasan: bad access detected
[   20.640444] 
[   20.640472] Memory state around the buggy address:
[   20.640506]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.640558]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.640602] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.640651]                                      ^
[   20.640701]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.640756]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.640806] ==================================================================
[   20.534855] ==================================================================
[   20.534918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.535058] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.535168] 
[   20.535201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.535288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.535318] Hardware name: linux,dummy-virt (DT)
[   20.535350] Call trace:
[   20.535375]  show_stack+0x20/0x38 (C)
[   20.535427]  dump_stack_lvl+0x8c/0xd0
[   20.535480]  print_report+0x118/0x608
[   20.535609]  kasan_report+0xdc/0x128
[   20.535688]  __asan_report_load4_noabort+0x20/0x30
[   20.535948]  kasan_atomics_helper+0x3dd8/0x4858
[   20.536472]  kasan_atomics+0x198/0x2e0
[   20.536670]  kunit_try_run_case+0x170/0x3f0
[   20.536720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.537353]  kthread+0x328/0x630
[   20.537572]  ret_from_fork+0x10/0x20
[   20.537637] 
[   20.537781] Allocated by task 265:
[   20.537816]  kasan_save_stack+0x3c/0x68
[   20.537858]  kasan_save_track+0x20/0x40
[   20.537898]  kasan_save_alloc_info+0x40/0x58
[   20.537941]  __kasan_kmalloc+0xd4/0xd8
[   20.537980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.538020]  kasan_atomics+0xb8/0x2e0
[   20.538258]  kunit_try_run_case+0x170/0x3f0
[   20.538300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.538343]  kthread+0x328/0x630
[   20.539312]  ret_from_fork+0x10/0x20
[   20.539372] 
[   20.539395] The buggy address belongs to the object at fff00000c7832f80
[   20.539395]  which belongs to the cache kmalloc-64 of size 64
[   20.539953] The buggy address is located 0 bytes to the right of
[   20.539953]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.540043] 
[   20.540065] The buggy address belongs to the physical page:
[   20.540099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.540151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.540414] page_type: f5(slab)
[   20.540456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.540766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.540820] page dumped because: kasan: bad access detected
[   20.540866] 
[   20.540888] Memory state around the buggy address:
[   20.540920]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541082]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.541181] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.541222]                                      ^
[   20.541336]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.541452]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.541493] ==================================================================
[   20.661322] ==================================================================
[   20.661369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.661427] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.661478] 
[   20.661508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.661594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.661621] Hardware name: linux,dummy-virt (DT)
[   20.661653] Call trace:
[   20.661677]  show_stack+0x20/0x38 (C)
[   20.661727]  dump_stack_lvl+0x8c/0xd0
[   20.661812]  print_report+0x118/0x608
[   20.661861]  kasan_report+0xdc/0x128
[   20.661908]  kasan_check_range+0x100/0x1a8
[   20.661956]  __kasan_check_write+0x20/0x30
[   20.662007]  kasan_atomics_helper+0x15b4/0x4858
[   20.662057]  kasan_atomics+0x198/0x2e0
[   20.662103]  kunit_try_run_case+0x170/0x3f0
[   20.662200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662430]  kthread+0x328/0x630
[   20.662585]  ret_from_fork+0x10/0x20
[   20.662776] 
[   20.662865] Allocated by task 265:
[   20.662897]  kasan_save_stack+0x3c/0x68
[   20.662938]  kasan_save_track+0x20/0x40
[   20.662978]  kasan_save_alloc_info+0x40/0x58
[   20.663020]  __kasan_kmalloc+0xd4/0xd8
[   20.663059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.663116]  kasan_atomics+0xb8/0x2e0
[   20.663164]  kunit_try_run_case+0x170/0x3f0
[   20.663203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.663373]  kthread+0x328/0x630
[   20.663532]  ret_from_fork+0x10/0x20
[   20.663689] 
[   20.663809] The buggy address belongs to the object at fff00000c7832f80
[   20.663809]  which belongs to the cache kmalloc-64 of size 64
[   20.663886] The buggy address is located 0 bytes to the right of
[   20.663886]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.664179] 
[   20.664292] The buggy address belongs to the physical page:
[   20.664413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.664524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.664571] page_type: f5(slab)
[   20.664611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.664952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.665082] page dumped because: kasan: bad access detected
[   20.665396] 
[   20.665418] Memory state around the buggy address:
[   20.665452]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.665498]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.665542] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.665581]                                      ^
[   20.665614]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.665659]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.665699] ==================================================================
[   20.681340] ==================================================================
[   20.681406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.681494] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.681546] 
[   20.681599] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.681722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.681751] Hardware name: linux,dummy-virt (DT)
[   20.681831] Call trace:
[   20.681966]  show_stack+0x20/0x38 (C)
[   20.682085]  dump_stack_lvl+0x8c/0xd0
[   20.682259]  print_report+0x118/0x608
[   20.682326]  kasan_report+0xdc/0x128
[   20.682372]  __asan_report_load8_noabort+0x20/0x30
[   20.682587]  kasan_atomics_helper+0x3e10/0x4858
[   20.682638]  kasan_atomics+0x198/0x2e0
[   20.682684]  kunit_try_run_case+0x170/0x3f0
[   20.682739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682794]  kthread+0x328/0x630
[   20.682841]  ret_from_fork+0x10/0x20
[   20.682983] 
[   20.683146] Allocated by task 265:
[   20.683237]  kasan_save_stack+0x3c/0x68
[   20.683301]  kasan_save_track+0x20/0x40
[   20.683372]  kasan_save_alloc_info+0x40/0x58
[   20.683763]  __kasan_kmalloc+0xd4/0xd8
[   20.683827]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.683969]  kasan_atomics+0xb8/0x2e0
[   20.684087]  kunit_try_run_case+0x170/0x3f0
[   20.684217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684271]  kthread+0x328/0x630
[   20.684310]  ret_from_fork+0x10/0x20
[   20.684391] 
[   20.684556] The buggy address belongs to the object at fff00000c7832f80
[   20.684556]  which belongs to the cache kmalloc-64 of size 64
[   20.684617] The buggy address is located 0 bytes to the right of
[   20.684617]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.684722] 
[   20.684857] The buggy address belongs to the physical page:
[   20.684917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.685145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.685208] page_type: f5(slab)
[   20.685246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.685342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.685466] page dumped because: kasan: bad access detected
[   20.685539] 
[   20.685668] Memory state around the buggy address:
[   20.685751]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685796]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.685840] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.685879]                                      ^
[   20.685914]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.685958]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.686149] ==================================================================
[   20.695344] ==================================================================
[   20.695450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.695533] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.695585] 
[   20.695645] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.695840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.695870] Hardware name: linux,dummy-virt (DT)
[   20.695903] Call trace:
[   20.695926]  show_stack+0x20/0x38 (C)
[   20.695977]  dump_stack_lvl+0x8c/0xd0
[   20.696032]  print_report+0x118/0x608
[   20.696110]  kasan_report+0xdc/0x128
[   20.696169]  kasan_check_range+0x100/0x1a8
[   20.696219]  __kasan_check_write+0x20/0x30
[   20.696287]  kasan_atomics_helper+0x17ec/0x4858
[   20.696355]  kasan_atomics+0x198/0x2e0
[   20.696447]  kunit_try_run_case+0x170/0x3f0
[   20.696544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.696653]  kthread+0x328/0x630
[   20.696739]  ret_from_fork+0x10/0x20
[   20.696799] 
[   20.696841] Allocated by task 265:
[   20.696937]  kasan_save_stack+0x3c/0x68
[   20.697005]  kasan_save_track+0x20/0x40
[   20.697047]  kasan_save_alloc_info+0x40/0x58
[   20.697089]  __kasan_kmalloc+0xd4/0xd8
[   20.697128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.697327]  kasan_atomics+0xb8/0x2e0
[   20.697368]  kunit_try_run_case+0x170/0x3f0
[   20.697505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697582]  kthread+0x328/0x630
[   20.697649]  ret_from_fork+0x10/0x20
[   20.697704] 
[   20.697727] The buggy address belongs to the object at fff00000c7832f80
[   20.697727]  which belongs to the cache kmalloc-64 of size 64
[   20.697990] The buggy address is located 0 bytes to the right of
[   20.697990]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.698186] 
[   20.698222] The buggy address belongs to the physical page:
[   20.698269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.698322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.698370] page_type: f5(slab)
[   20.698635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.698692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.698739] page dumped because: kasan: bad access detected
[   20.698772] 
[   20.698792] Memory state around the buggy address:
[   20.698826]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698914]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.699023] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.699177]                                      ^
[   20.699269]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.699354]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.699446] ==================================================================
[   20.552618] ==================================================================
[   20.552979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.553259] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.553342] 
[   20.553374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.553467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.553613] Hardware name: linux,dummy-virt (DT)
[   20.553781] Call trace:
[   20.553807]  show_stack+0x20/0x38 (C)
[   20.553860]  dump_stack_lvl+0x8c/0xd0
[   20.554086]  print_report+0x118/0x608
[   20.554144]  kasan_report+0xdc/0x128
[   20.554203]  kasan_check_range+0x100/0x1a8
[   20.554255]  __kasan_check_read+0x20/0x30
[   20.554308]  kasan_atomics_helper+0xdd4/0x4858
[   20.554521]  kasan_atomics+0x198/0x2e0
[   20.554735]  kunit_try_run_case+0x170/0x3f0
[   20.554850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.554965]  kthread+0x328/0x630
[   20.555140]  ret_from_fork+0x10/0x20
[   20.555217] 
[   20.555238] Allocated by task 265:
[   20.555269]  kasan_save_stack+0x3c/0x68
[   20.555364]  kasan_save_track+0x20/0x40
[   20.555553]  kasan_save_alloc_info+0x40/0x58
[   20.555734]  __kasan_kmalloc+0xd4/0xd8
[   20.555774]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.555815]  kasan_atomics+0xb8/0x2e0
[   20.555851]  kunit_try_run_case+0x170/0x3f0
[   20.555891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.555937]  kthread+0x328/0x630
[   20.555973]  ret_from_fork+0x10/0x20
[   20.556010] 
[   20.556031] The buggy address belongs to the object at fff00000c7832f80
[   20.556031]  which belongs to the cache kmalloc-64 of size 64
[   20.556115] The buggy address is located 0 bytes to the right of
[   20.556115]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.556223] 
[   20.556244] The buggy address belongs to the physical page:
[   20.556277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.556328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.556375] page_type: f5(slab)
[   20.556414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.556610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.556658] page dumped because: kasan: bad access detected
[   20.556692] 
[   20.557144] Memory state around the buggy address:
[   20.557567]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.557779]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.557838] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.557880]                                      ^
[   20.557915]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.557959]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.557999] ==================================================================
[   20.472097] ==================================================================
[   20.472278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.472331] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.472441] 
[   20.472556] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.472646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.472675] Hardware name: linux,dummy-virt (DT)
[   20.472734] Call trace:
[   20.472789]  show_stack+0x20/0x38 (C)
[   20.472857]  dump_stack_lvl+0x8c/0xd0
[   20.472916]  print_report+0x118/0x608
[   20.472974]  kasan_report+0xdc/0x128
[   20.473023]  kasan_check_range+0x100/0x1a8
[   20.473072]  __kasan_check_write+0x20/0x30
[   20.473122]  kasan_atomics_helper+0x99c/0x4858
[   20.473181]  kasan_atomics+0x198/0x2e0
[   20.473227]  kunit_try_run_case+0x170/0x3f0
[   20.473274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.473336]  kthread+0x328/0x630
[   20.473382]  ret_from_fork+0x10/0x20
[   20.473431] 
[   20.473451] Allocated by task 265:
[   20.473481]  kasan_save_stack+0x3c/0x68
[   20.473521]  kasan_save_track+0x20/0x40
[   20.473561]  kasan_save_alloc_info+0x40/0x58
[   20.473601]  __kasan_kmalloc+0xd4/0xd8
[   20.473640]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.474005]  kasan_atomics+0xb8/0x2e0
[   20.474354]  kunit_try_run_case+0x170/0x3f0
[   20.474441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.474522]  kthread+0x328/0x630
[   20.474637]  ret_from_fork+0x10/0x20
[   20.474719] 
[   20.474841] The buggy address belongs to the object at fff00000c7832f80
[   20.474841]  which belongs to the cache kmalloc-64 of size 64
[   20.474945] The buggy address is located 0 bytes to the right of
[   20.474945]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.475018] 
[   20.475251] The buggy address belongs to the physical page:
[   20.475343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.475532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.475759] page_type: f5(slab)
[   20.475836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.475917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.476033] page dumped because: kasan: bad access detected
[   20.476129] 
[   20.476178] Memory state around the buggy address:
[   20.476214]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476427]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.476578] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.476721]                                      ^
[   20.476779]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.476847]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.477028] ==================================================================
[   20.589590] ==================================================================
[   20.589757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.589948] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.590026] 
[   20.590169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.590322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.590369] Hardware name: linux,dummy-virt (DT)
[   20.590401] Call trace:
[   20.590557]  show_stack+0x20/0x38 (C)
[   20.590784]  dump_stack_lvl+0x8c/0xd0
[   20.590891]  print_report+0x118/0x608
[   20.591025]  kasan_report+0xdc/0x128
[   20.591102]  kasan_check_range+0x100/0x1a8
[   20.591206]  __kasan_check_write+0x20/0x30
[   20.591284]  kasan_atomics_helper+0xf88/0x4858
[   20.591335]  kasan_atomics+0x198/0x2e0
[   20.591420]  kunit_try_run_case+0x170/0x3f0
[   20.591470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.591715]  kthread+0x328/0x630
[   20.591826]  ret_from_fork+0x10/0x20
[   20.591963] 
[   20.592087] Allocated by task 265:
[   20.592118]  kasan_save_stack+0x3c/0x68
[   20.592169]  kasan_save_track+0x20/0x40
[   20.592209]  kasan_save_alloc_info+0x40/0x58
[   20.592251]  __kasan_kmalloc+0xd4/0xd8
[   20.592290]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.592332]  kasan_atomics+0xb8/0x2e0
[   20.592370]  kunit_try_run_case+0x170/0x3f0
[   20.592410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.592454]  kthread+0x328/0x630
[   20.592492]  ret_from_fork+0x10/0x20
[   20.592880] 
[   20.592904] The buggy address belongs to the object at fff00000c7832f80
[   20.592904]  which belongs to the cache kmalloc-64 of size 64
[   20.592965] The buggy address is located 0 bytes to the right of
[   20.592965]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.593497] 
[   20.593523] The buggy address belongs to the physical page:
[   20.593555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.593609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.593658] page_type: f5(slab)
[   20.593697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.594301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.594517] page dumped because: kasan: bad access detected
[   20.594580] 
[   20.594601] Memory state around the buggy address:
[   20.594681]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.594881]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.594996] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.595039]                                      ^
[   20.595072]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.595139]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.595189] ==================================================================
[   20.578236] ==================================================================
[   20.578287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.578344] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.578587] 
[   20.578710] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.578804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.578834] Hardware name: linux,dummy-virt (DT)
[   20.578901] Call trace:
[   20.579014]  show_stack+0x20/0x38 (C)
[   20.579146]  dump_stack_lvl+0x8c/0xd0
[   20.579204]  print_report+0x118/0x608
[   20.579258]  kasan_report+0xdc/0x128
[   20.579408]  kasan_check_range+0x100/0x1a8
[   20.579509]  __kasan_check_write+0x20/0x30
[   20.579695]  kasan_atomics_helper+0xeb8/0x4858
[   20.579751]  kasan_atomics+0x198/0x2e0
[   20.579956]  kunit_try_run_case+0x170/0x3f0
[   20.580013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.580075]  kthread+0x328/0x630
[   20.580126]  ret_from_fork+0x10/0x20
[   20.580497] 
[   20.580524] Allocated by task 265:
[   20.580645]  kasan_save_stack+0x3c/0x68
[   20.581199]  kasan_save_track+0x20/0x40
[   20.581256]  kasan_save_alloc_info+0x40/0x58
[   20.581301]  __kasan_kmalloc+0xd4/0xd8
[   20.581340]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.581381]  kasan_atomics+0xb8/0x2e0
[   20.581419]  kunit_try_run_case+0x170/0x3f0
[   20.581459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.581504]  kthread+0x328/0x630
[   20.581543]  ret_from_fork+0x10/0x20
[   20.581581] 
[   20.581604] The buggy address belongs to the object at fff00000c7832f80
[   20.581604]  which belongs to the cache kmalloc-64 of size 64
[   20.581663] The buggy address is located 0 bytes to the right of
[   20.581663]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.581727] 
[   20.581757] The buggy address belongs to the physical page:
[   20.581789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.581840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.581889] page_type: f5(slab)
[   20.581927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.581979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.582022] page dumped because: kasan: bad access detected
[   20.582057] 
[   20.582077] Memory state around the buggy address:
[   20.582110]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.582164]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.582288] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.582400]                                      ^
[   20.582478]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.582530]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.582571] ==================================================================
[   20.656371] ==================================================================
[   20.656433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.656558] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.656635] 
[   20.656700] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.656792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656838] Hardware name: linux,dummy-virt (DT)
[   20.656872] Call trace:
[   20.656895]  show_stack+0x20/0x38 (C)
[   20.656945]  dump_stack_lvl+0x8c/0xd0
[   20.656991]  print_report+0x118/0x608
[   20.657172]  kasan_report+0xdc/0x128
[   20.657374]  kasan_check_range+0x100/0x1a8
[   20.657451]  __kasan_check_write+0x20/0x30
[   20.657508]  kasan_atomics_helper+0x154c/0x4858
[   20.657558]  kasan_atomics+0x198/0x2e0
[   20.657665]  kunit_try_run_case+0x170/0x3f0
[   20.657716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.657776]  kthread+0x328/0x630
[   20.657822]  ret_from_fork+0x10/0x20
[   20.657871] 
[   20.657893] Allocated by task 265:
[   20.657923]  kasan_save_stack+0x3c/0x68
[   20.657982]  kasan_save_track+0x20/0x40
[   20.658024]  kasan_save_alloc_info+0x40/0x58
[   20.658067]  __kasan_kmalloc+0xd4/0xd8
[   20.658106]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.658147]  kasan_atomics+0xb8/0x2e0
[   20.658197]  kunit_try_run_case+0x170/0x3f0
[   20.658236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658281]  kthread+0x328/0x630
[   20.658320]  ret_from_fork+0x10/0x20
[   20.658358] 
[   20.658408] The buggy address belongs to the object at fff00000c7832f80
[   20.658408]  which belongs to the cache kmalloc-64 of size 64
[   20.658524] The buggy address is located 0 bytes to the right of
[   20.658524]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.658715] 
[   20.658897] The buggy address belongs to the physical page:
[   20.659074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.659212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.659356] page_type: f5(slab)
[   20.659477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.659527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.659593] page dumped because: kasan: bad access detected
[   20.659627] 
[   20.659648] Memory state around the buggy address:
[   20.659681]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.659993]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.660111] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.660275]                                      ^
[   20.660350]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.660544]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.660805] ==================================================================
[   20.564963] ==================================================================
[   20.565067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.565118] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.565235] 
[   20.565273] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.565540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.565688] Hardware name: linux,dummy-virt (DT)
[   20.565824] Call trace:
[   20.566087]  show_stack+0x20/0x38 (C)
[   20.566368]  dump_stack_lvl+0x8c/0xd0
[   20.566524]  print_report+0x118/0x608
[   20.566829]  kasan_report+0xdc/0x128
[   20.566883]  kasan_check_range+0x100/0x1a8
[   20.566990]  __kasan_check_write+0x20/0x30
[   20.567113]  kasan_atomics_helper+0xe44/0x4858
[   20.567236]  kasan_atomics+0x198/0x2e0
[   20.567454]  kunit_try_run_case+0x170/0x3f0
[   20.567504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.567643]  kthread+0x328/0x630
[   20.567711]  ret_from_fork+0x10/0x20
[   20.567761] 
[   20.567866] Allocated by task 265:
[   20.567900]  kasan_save_stack+0x3c/0x68
[   20.567980]  kasan_save_track+0x20/0x40
[   20.568114]  kasan_save_alloc_info+0x40/0x58
[   20.568171]  __kasan_kmalloc+0xd4/0xd8
[   20.568212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.568253]  kasan_atomics+0xb8/0x2e0
[   20.568291]  kunit_try_run_case+0x170/0x3f0
[   20.568331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568375]  kthread+0x328/0x630
[   20.568414]  ret_from_fork+0x10/0x20
[   20.568452] 
[   20.568850] The buggy address belongs to the object at fff00000c7832f80
[   20.568850]  which belongs to the cache kmalloc-64 of size 64
[   20.569004] The buggy address is located 0 bytes to the right of
[   20.569004]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.569142] 
[   20.569200] The buggy address belongs to the physical page:
[   20.569302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.569393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.569580] page_type: f5(slab)
[   20.569621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.569679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.569807] page dumped because: kasan: bad access detected
[   20.569842] 
[   20.569862] Memory state around the buggy address:
[   20.569897]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.569957]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.570000] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.570040]                                      ^
[   20.570074]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.570253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.570305] ==================================================================
[   20.669245] ==================================================================
[   20.669288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.669333] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.669383] 
[   20.669413] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.669498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.669527] Hardware name: linux,dummy-virt (DT)
[   20.669558] Call trace:
[   20.669582]  show_stack+0x20/0x38 (C)
[   20.669630]  dump_stack_lvl+0x8c/0xd0
[   20.669695]  print_report+0x118/0x608
[   20.669744]  kasan_report+0xdc/0x128
[   20.669791]  kasan_check_range+0x100/0x1a8
[   20.669841]  __kasan_check_write+0x20/0x30
[   20.669898]  kasan_atomics_helper+0x1644/0x4858
[   20.669947]  kasan_atomics+0x198/0x2e0
[   20.669994]  kunit_try_run_case+0x170/0x3f0
[   20.670042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670143]  kthread+0x328/0x630
[   20.670220]  ret_from_fork+0x10/0x20
[   20.670270] 
[   20.670292] Allocated by task 265:
[   20.670321]  kasan_save_stack+0x3c/0x68
[   20.670362]  kasan_save_track+0x20/0x40
[   20.670401]  kasan_save_alloc_info+0x40/0x58
[   20.670443]  __kasan_kmalloc+0xd4/0xd8
[   20.670481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.670643]  kasan_atomics+0xb8/0x2e0
[   20.670682]  kunit_try_run_case+0x170/0x3f0
[   20.670721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670773]  kthread+0x328/0x630
[   20.670871]  ret_from_fork+0x10/0x20
[   20.671044] 
[   20.671164] The buggy address belongs to the object at fff00000c7832f80
[   20.671164]  which belongs to the cache kmalloc-64 of size 64
[   20.671437] The buggy address is located 0 bytes to the right of
[   20.671437]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.671648] 
[   20.671785] The buggy address belongs to the physical page:
[   20.671882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.672064] page_type: f5(slab)
[   20.672102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.672320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.672480] page dumped because: kasan: bad access detected
[   20.672660] 
[   20.672794] Memory state around the buggy address:
[   20.672922]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.673161]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.673287] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.673407]                                      ^
[   20.673509]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.673561]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.673717] ==================================================================
[   20.628362] ==================================================================
[   20.628409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.628455] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.628505] 
[   20.628535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.628618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.628647] Hardware name: linux,dummy-virt (DT)
[   20.628678] Call trace:
[   20.628702]  show_stack+0x20/0x38 (C)
[   20.628748]  dump_stack_lvl+0x8c/0xd0
[   20.628796]  print_report+0x118/0x608
[   20.628842]  kasan_report+0xdc/0x128
[   20.628889]  kasan_check_range+0x100/0x1a8
[   20.628971]  __kasan_check_write+0x20/0x30
[   20.629035]  kasan_atomics_helper+0x12d8/0x4858
[   20.629092]  kasan_atomics+0x198/0x2e0
[   20.629192]  kunit_try_run_case+0x170/0x3f0
[   20.629289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.629346]  kthread+0x328/0x630
[   20.629398]  ret_from_fork+0x10/0x20
[   20.629494] 
[   20.629538] Allocated by task 265:
[   20.629586]  kasan_save_stack+0x3c/0x68
[   20.629643]  kasan_save_track+0x20/0x40
[   20.629682]  kasan_save_alloc_info+0x40/0x58
[   20.629723]  __kasan_kmalloc+0xd4/0xd8
[   20.629786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.629837]  kasan_atomics+0xb8/0x2e0
[   20.629876]  kunit_try_run_case+0x170/0x3f0
[   20.629926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.629971]  kthread+0x328/0x630
[   20.630010]  ret_from_fork+0x10/0x20
[   20.630072] 
[   20.630184] The buggy address belongs to the object at fff00000c7832f80
[   20.630184]  which belongs to the cache kmalloc-64 of size 64
[   20.630326] The buggy address is located 0 bytes to the right of
[   20.630326]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.630412] 
[   20.630472] The buggy address belongs to the physical page:
[   20.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.630596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.630642] page_type: f5(slab)
[   20.630688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.630743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.630806] page dumped because: kasan: bad access detected
[   20.630917] 
[   20.631006] Memory state around the buggy address:
[   20.631091]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.631207]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.631282] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.631322]                                      ^
[   20.631357]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.631402]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.631451] ==================================================================
[   20.570834] ==================================================================
[   20.571010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.571064] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.571116] 
[   20.571146] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.571407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.571442] Hardware name: linux,dummy-virt (DT)
[   20.571476] Call trace:
[   20.571501]  show_stack+0x20/0x38 (C)
[   20.571563]  dump_stack_lvl+0x8c/0xd0
[   20.571612]  print_report+0x118/0x608
[   20.571661]  kasan_report+0xdc/0x128
[   20.571955]  __asan_report_store8_noabort+0x20/0x30
[   20.572066]  kasan_atomics_helper+0x3e5c/0x4858
[   20.572270]  kasan_atomics+0x198/0x2e0
[   20.572332]  kunit_try_run_case+0x170/0x3f0
[   20.572382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.572436]  kthread+0x328/0x630
[   20.572484]  ret_from_fork+0x10/0x20
[   20.572830] 
[   20.573057] Allocated by task 265:
[   20.573433]  kasan_save_stack+0x3c/0x68
[   20.573543]  kasan_save_track+0x20/0x40
[   20.573874]  kasan_save_alloc_info+0x40/0x58
[   20.574007]  __kasan_kmalloc+0xd4/0xd8
[   20.574048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.574257]  kasan_atomics+0xb8/0x2e0
[   20.574305]  kunit_try_run_case+0x170/0x3f0
[   20.574345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574446]  kthread+0x328/0x630
[   20.574714]  ret_from_fork+0x10/0x20
[   20.574836] 
[   20.574861] The buggy address belongs to the object at fff00000c7832f80
[   20.574861]  which belongs to the cache kmalloc-64 of size 64
[   20.575199] The buggy address is located 0 bytes to the right of
[   20.575199]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.575302] 
[   20.575325] The buggy address belongs to the physical page:
[   20.575357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.575421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.575470] page_type: f5(slab)
[   20.575509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.576062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.576417] page dumped because: kasan: bad access detected
[   20.576690] 
[   20.576714] Memory state around the buggy address:
[   20.576749]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576842]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.577268] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.577446]                                      ^
[   20.577598]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.577699]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.577767] ==================================================================
[   20.619435] ==================================================================
[   20.619519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.619623] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.619730] 
[   20.619762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.619847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.619876] Hardware name: linux,dummy-virt (DT)
[   20.620145] Call trace:
[   20.620182]  show_stack+0x20/0x38 (C)
[   20.620261]  dump_stack_lvl+0x8c/0xd0
[   20.620327]  print_report+0x118/0x608
[   20.620390]  kasan_report+0xdc/0x128
[   20.620474]  kasan_check_range+0x100/0x1a8
[   20.620530]  __kasan_check_write+0x20/0x30
[   20.620616]  kasan_atomics_helper+0x11f8/0x4858
[   20.620668]  kasan_atomics+0x198/0x2e0
[   20.620831]  kunit_try_run_case+0x170/0x3f0
[   20.620978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.621036]  kthread+0x328/0x630
[   20.621081]  ret_from_fork+0x10/0x20
[   20.621149] 
[   20.621208] Allocated by task 265:
[   20.621282]  kasan_save_stack+0x3c/0x68
[   20.621325]  kasan_save_track+0x20/0x40
[   20.621402]  kasan_save_alloc_info+0x40/0x58
[   20.621446]  __kasan_kmalloc+0xd4/0xd8
[   20.621764]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.622033]  kasan_atomics+0xb8/0x2e0
[   20.622639]  kunit_try_run_case+0x170/0x3f0
[   20.622695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.622773]  kthread+0x328/0x630
[   20.622812]  ret_from_fork+0x10/0x20
[   20.622851] 
[   20.622874] The buggy address belongs to the object at fff00000c7832f80
[   20.622874]  which belongs to the cache kmalloc-64 of size 64
[   20.622934] The buggy address is located 0 bytes to the right of
[   20.622934]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.622999] 
[   20.623022] The buggy address belongs to the physical page:
[   20.623055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.623108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.623164] page_type: f5(slab)
[   20.623289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.623410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.623522] page dumped because: kasan: bad access detected
[   20.623557] 
[   20.623578] Memory state around the buggy address:
[   20.623611]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623944]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.624076] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.624127]                                      ^
[   20.624185]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.624242]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.624291] ==================================================================
[   20.649393] ==================================================================
[   20.649433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.649476] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.649525] 
[   20.649553] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.650075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.650262] Hardware name: linux,dummy-virt (DT)
[   20.650316] Call trace:
[   20.650340]  show_stack+0x20/0x38 (C)
[   20.650392]  dump_stack_lvl+0x8c/0xd0
[   20.650438]  print_report+0x118/0x608
[   20.650499]  kasan_report+0xdc/0x128
[   20.650554]  kasan_check_range+0x100/0x1a8
[   20.650603]  __kasan_check_write+0x20/0x30
[   20.650654]  kasan_atomics_helper+0x14e4/0x4858
[   20.650703]  kasan_atomics+0x198/0x2e0
[   20.650777]  kunit_try_run_case+0x170/0x3f0
[   20.650828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.650902]  kthread+0x328/0x630
[   20.651023]  ret_from_fork+0x10/0x20
[   20.651233] 
[   20.651313] Allocated by task 265:
[   20.651636]  kasan_save_stack+0x3c/0x68
[   20.651710]  kasan_save_track+0x20/0x40
[   20.651854]  kasan_save_alloc_info+0x40/0x58
[   20.651916]  __kasan_kmalloc+0xd4/0xd8
[   20.651955]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.652253]  kasan_atomics+0xb8/0x2e0
[   20.652364]  kunit_try_run_case+0x170/0x3f0
[   20.652499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.652632]  kthread+0x328/0x630
[   20.652912]  ret_from_fork+0x10/0x20
[   20.652963] 
[   20.653095] The buggy address belongs to the object at fff00000c7832f80
[   20.653095]  which belongs to the cache kmalloc-64 of size 64
[   20.653296] The buggy address is located 0 bytes to the right of
[   20.653296]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.653465] 
[   20.653572] The buggy address belongs to the physical page:
[   20.653625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.653677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.653961] page_type: f5(slab)
[   20.654298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.654435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.654627] page dumped because: kasan: bad access detected
[   20.654844] 
[   20.654935] Memory state around the buggy address:
[   20.655056]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.655123]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.655177] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.655243]                                      ^
[   20.655334]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.655489]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.655677] ==================================================================
[   20.595877] ==================================================================
[   20.595955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.596151] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.596215] 
[   20.596247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.596336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.596367] Hardware name: linux,dummy-virt (DT)
[   20.596398] Call trace:
[   20.596422]  show_stack+0x20/0x38 (C)
[   20.596526]  dump_stack_lvl+0x8c/0xd0
[   20.596827]  print_report+0x118/0x608
[   20.596893]  kasan_report+0xdc/0x128
[   20.596981]  kasan_check_range+0x100/0x1a8
[   20.597032]  __kasan_check_write+0x20/0x30
[   20.597299]  kasan_atomics_helper+0xff0/0x4858
[   20.597353]  kasan_atomics+0x198/0x2e0
[   20.597401]  kunit_try_run_case+0x170/0x3f0
[   20.597451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.597505]  kthread+0x328/0x630
[   20.597552]  ret_from_fork+0x10/0x20
[   20.597601] 
[   20.597623] Allocated by task 265:
[   20.597658]  kasan_save_stack+0x3c/0x68
[   20.597816]  kasan_save_track+0x20/0x40
[   20.597858]  kasan_save_alloc_info+0x40/0x58
[   20.597900]  __kasan_kmalloc+0xd4/0xd8
[   20.597937]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.597979]  kasan_atomics+0xb8/0x2e0
[   20.598593]  kunit_try_run_case+0x170/0x3f0
[   20.598722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.598776]  kthread+0x328/0x630
[   20.598816]  ret_from_fork+0x10/0x20
[   20.598866] 
[   20.598888] The buggy address belongs to the object at fff00000c7832f80
[   20.598888]  which belongs to the cache kmalloc-64 of size 64
[   20.598955] The buggy address is located 0 bytes to the right of
[   20.598955]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.599355] 
[   20.599410] The buggy address belongs to the physical page:
[   20.599445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.599521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.599729] page_type: f5(slab)
[   20.599767] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.599905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.600014] page dumped because: kasan: bad access detected
[   20.600099] 
[   20.600153] Memory state around the buggy address:
[   20.600197]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.600332]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.600411] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.600518]                                      ^
[   20.600620]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.600718]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.600841] ==================================================================
[   20.676876] ==================================================================
[   20.676919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.676964] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.677014] 
[   20.677042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.677127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.677166] Hardware name: linux,dummy-virt (DT)
[   20.677199] Call trace:
[   20.677221]  show_stack+0x20/0x38 (C)
[   20.677271]  dump_stack_lvl+0x8c/0xd0
[   20.677317]  print_report+0x118/0x608
[   20.677364]  kasan_report+0xdc/0x128
[   20.677410]  kasan_check_range+0x100/0x1a8
[   20.677460]  __kasan_check_write+0x20/0x30
[   20.677509]  kasan_atomics_helper+0x16d0/0x4858
[   20.677567]  kasan_atomics+0x198/0x2e0
[   20.677615]  kunit_try_run_case+0x170/0x3f0
[   20.677662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.677716]  kthread+0x328/0x630
[   20.677772]  ret_from_fork+0x10/0x20
[   20.677821] 
[   20.677843] Allocated by task 265:
[   20.677872]  kasan_save_stack+0x3c/0x68
[   20.677914]  kasan_save_track+0x20/0x40
[   20.677954]  kasan_save_alloc_info+0x40/0x58
[   20.677996]  __kasan_kmalloc+0xd4/0xd8
[   20.678033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.678075]  kasan_atomics+0xb8/0x2e0
[   20.678184]  kunit_try_run_case+0x170/0x3f0
[   20.678265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678466]  kthread+0x328/0x630
[   20.678633]  ret_from_fork+0x10/0x20
[   20.678702] 
[   20.678727] The buggy address belongs to the object at fff00000c7832f80
[   20.678727]  which belongs to the cache kmalloc-64 of size 64
[   20.678801] The buggy address is located 0 bytes to the right of
[   20.678801]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.678882] 
[   20.678906] The buggy address belongs to the physical page:
[   20.678938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.678989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.679323] page_type: f5(slab)
[   20.679428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.679553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.679724] page dumped because: kasan: bad access detected
[   20.679785] 
[   20.680091] Memory state around the buggy address:
[   20.680168]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.680215]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.680260] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.680591]                                      ^
[   20.680673]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.680810]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.680929] ==================================================================
[   20.582817] ==================================================================
[   20.582870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.582944] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.583003] 
[   20.583131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.583229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.583259] Hardware name: linux,dummy-virt (DT)
[   20.583299] Call trace:
[   20.583423]  show_stack+0x20/0x38 (C)
[   20.584018]  dump_stack_lvl+0x8c/0xd0
[   20.584067]  print_report+0x118/0x608
[   20.584115]  kasan_report+0xdc/0x128
[   20.584172]  kasan_check_range+0x100/0x1a8
[   20.584222]  __kasan_check_write+0x20/0x30
[   20.584273]  kasan_atomics_helper+0xf20/0x4858
[   20.584323]  kasan_atomics+0x198/0x2e0
[   20.584369]  kunit_try_run_case+0x170/0x3f0
[   20.584419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584480]  kthread+0x328/0x630
[   20.584709]  ret_from_fork+0x10/0x20
[   20.584954] 
[   20.585059] Allocated by task 265:
[   20.585134]  kasan_save_stack+0x3c/0x68
[   20.585184]  kasan_save_track+0x20/0x40
[   20.585222]  kasan_save_alloc_info+0x40/0x58
[   20.585265]  __kasan_kmalloc+0xd4/0xd8
[   20.585304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.585346]  kasan_atomics+0xb8/0x2e0
[   20.585384]  kunit_try_run_case+0x170/0x3f0
[   20.585423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.585468]  kthread+0x328/0x630
[   20.585517]  ret_from_fork+0x10/0x20
[   20.586020] 
[   20.586169] The buggy address belongs to the object at fff00000c7832f80
[   20.586169]  which belongs to the cache kmalloc-64 of size 64
[   20.586348] The buggy address is located 0 bytes to the right of
[   20.586348]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.586418] 
[   20.586893] The buggy address belongs to the physical page:
[   20.586930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.586984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.587035] page_type: f5(slab)
[   20.587074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.587125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.587566] page dumped because: kasan: bad access detected
[   20.587981] 
[   20.588005] Memory state around the buggy address:
[   20.588109]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.588527]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.588591] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.588723]                                      ^
[   20.588992]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.589184]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.589267] ==================================================================
[   20.542553] ==================================================================
[   20.542623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.542685] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.542865] 
[   20.542899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.542990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.543281] Hardware name: linux,dummy-virt (DT)
[   20.543357] Call trace:
[   20.543381]  show_stack+0x20/0x38 (C)
[   20.543441]  dump_stack_lvl+0x8c/0xd0
[   20.543702]  print_report+0x118/0x608
[   20.543833]  kasan_report+0xdc/0x128
[   20.543880]  kasan_check_range+0x100/0x1a8
[   20.543930]  __kasan_check_write+0x20/0x30
[   20.543980]  kasan_atomics_helper+0xd3c/0x4858
[   20.544037]  kasan_atomics+0x198/0x2e0
[   20.544306]  kunit_try_run_case+0x170/0x3f0
[   20.544476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.544593]  kthread+0x328/0x630
[   20.544817]  ret_from_fork+0x10/0x20
[   20.545002] 
[   20.545059] Allocated by task 265:
[   20.545090]  kasan_save_stack+0x3c/0x68
[   20.545141]  kasan_save_track+0x20/0x40
[   20.545200]  kasan_save_alloc_info+0x40/0x58
[   20.545243]  __kasan_kmalloc+0xd4/0xd8
[   20.545282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.545323]  kasan_atomics+0xb8/0x2e0
[   20.545361]  kunit_try_run_case+0x170/0x3f0
[   20.545400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.545443]  kthread+0x328/0x630
[   20.545480]  ret_from_fork+0x10/0x20
[   20.545518] 
[   20.545539] The buggy address belongs to the object at fff00000c7832f80
[   20.545539]  which belongs to the cache kmalloc-64 of size 64
[   20.545597] The buggy address is located 0 bytes to the right of
[   20.545597]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.545661] 
[   20.545682] The buggy address belongs to the physical page:
[   20.545714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.545790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.545839] page_type: f5(slab)
[   20.545878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.545931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.545973] page dumped because: kasan: bad access detected
[   20.546007] 
[   20.546027] Memory state around the buggy address:
[   20.546060]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.546104]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.546148] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.546197]                                      ^
[   20.546231]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.546274]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.546313] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[   20.089477] ==================================================================
[   20.089728] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.089845] Read of size 1 at addr fff00000c7833ad8 by task kunit_try_catch/257
[   20.089990] 
[   20.090044] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.090379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.090414] Hardware name: linux,dummy-virt (DT)
[   20.090464] Call trace:
[   20.090519]  show_stack+0x20/0x38 (C)
[   20.090644]  dump_stack_lvl+0x8c/0xd0
[   20.090721]  print_report+0x118/0x608
[   20.090850]  kasan_report+0xdc/0x128
[   20.090939]  __asan_report_load1_noabort+0x20/0x30
[   20.091019]  memcmp+0x198/0x1d8
[   20.091065]  kasan_memcmp+0x16c/0x300
[   20.091339]  kunit_try_run_case+0x170/0x3f0
[   20.091485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.091552]  kthread+0x328/0x630
[   20.091616]  ret_from_fork+0x10/0x20
[   20.091696] 
[   20.091727] Allocated by task 257:
[   20.091757]  kasan_save_stack+0x3c/0x68
[   20.091819]  kasan_save_track+0x20/0x40
[   20.091886]  kasan_save_alloc_info+0x40/0x58
[   20.092008]  __kasan_kmalloc+0xd4/0xd8
[   20.092086]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.092129]  kasan_memcmp+0xbc/0x300
[   20.092176]  kunit_try_run_case+0x170/0x3f0
[   20.092213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.092279]  kthread+0x328/0x630
[   20.092316]  ret_from_fork+0x10/0x20
[   20.092371] 
[   20.092391] The buggy address belongs to the object at fff00000c7833ac0
[   20.092391]  which belongs to the cache kmalloc-32 of size 32
[   20.092452] The buggy address is located 0 bytes to the right of
[   20.092452]  allocated 24-byte region [fff00000c7833ac0, fff00000c7833ad8)
[   20.092528] 
[   20.092551] The buggy address belongs to the physical page:
[   20.092600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107833
[   20.092657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.092718] page_type: f5(slab)
[   20.092761] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.092814] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.092872] page dumped because: kasan: bad access detected
[   20.092907] 
[   20.092943] Memory state around the buggy address:
[   20.092978]  fff00000c7833980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   20.093024]  fff00000c7833a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.093087] >fff00000c7833a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.093127]                                                     ^
[   20.093581]  fff00000c7833b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.093656]  fff00000c7833b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.093824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[   20.073782] ==================================================================
[   20.073841] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   20.073894] Read of size 1 at addr ffff800080a37b4a by task kunit_try_catch/253
[   20.073944] 
[   20.074194] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.074335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.074405] Hardware name: linux,dummy-virt (DT)
[   20.074506] Call trace:
[   20.074543]  show_stack+0x20/0x38 (C)
[   20.074618]  dump_stack_lvl+0x8c/0xd0
[   20.074668]  print_report+0x310/0x608
[   20.074715]  kasan_report+0xdc/0x128
[   20.074769]  __asan_report_load1_noabort+0x20/0x30
[   20.074823]  kasan_alloca_oob_right+0x2dc/0x340
[   20.074873]  kunit_try_run_case+0x170/0x3f0
[   20.074923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.075069]  kthread+0x328/0x630
[   20.075123]  ret_from_fork+0x10/0x20
[   20.075219] 
[   20.075270] The buggy address belongs to stack of task kunit_try_catch/253
[   20.075361] 
[   20.075401] The buggy address belongs to the virtual mapping at
[   20.075401]  [ffff800080a30000, ffff800080a39000) created by:
[   20.075401]  kernel_clone+0x150/0x7a8
[   20.075480] 
[   20.075504] The buggy address belongs to the physical page:
[   20.075537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7
[   20.075590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.075651] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.075781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.075859] page dumped because: kasan: bad access detected
[   20.075921] 
[   20.075941] Memory state around the buggy address:
[   20.075973]  ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.076226]  ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.076304] >ffff800080a37b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.076417]                                               ^
[   20.076472]  ffff800080a37b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.076541]  ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.076645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[   20.065811] ==================================================================
[   20.065906] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.066015] Read of size 1 at addr ffff800080a37b5f by task kunit_try_catch/251
[   20.066191] 
[   20.066230] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.066323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066352] Hardware name: linux,dummy-virt (DT)
[   20.066384] Call trace:
[   20.066409]  show_stack+0x20/0x38 (C)
[   20.066462]  dump_stack_lvl+0x8c/0xd0
[   20.066630]  print_report+0x310/0x608
[   20.066712]  kasan_report+0xdc/0x128
[   20.066797]  __asan_report_load1_noabort+0x20/0x30
[   20.066893]  kasan_alloca_oob_left+0x2b8/0x310
[   20.066972]  kunit_try_run_case+0x170/0x3f0
[   20.067064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.067129]  kthread+0x328/0x630
[   20.067189]  ret_from_fork+0x10/0x20
[   20.067241] 
[   20.067264] The buggy address belongs to stack of task kunit_try_catch/251
[   20.067427] 
[   20.067523] The buggy address belongs to the virtual mapping at
[   20.067523]  [ffff800080a30000, ffff800080a39000) created by:
[   20.067523]  kernel_clone+0x150/0x7a8
[   20.067637] 
[   20.067694] The buggy address belongs to the physical page:
[   20.067735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7
[   20.067789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.067944] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.068051] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.068119] page dumped because: kasan: bad access detected
[   20.068179] 
[   20.068231] Memory state around the buggy address:
[   20.068309]  ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.068396]  ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.068459] >ffff800080a37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.068498]                                                     ^
[   20.068725]  ffff800080a37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.068803]  ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.068885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[   20.052821] ==================================================================
[   20.052944] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.053025] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/249
[   20.053101] 
[   20.053138] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.053253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.053281] Hardware name: linux,dummy-virt (DT)
[   20.053318] Call trace:
[   20.053347]  show_stack+0x20/0x38 (C)
[   20.053418]  dump_stack_lvl+0x8c/0xd0
[   20.053463]  print_report+0x310/0x608
[   20.053509]  kasan_report+0xdc/0x128
[   20.053552]  __asan_report_load1_noabort+0x20/0x30
[   20.053601]  kasan_stack_oob+0x238/0x270
[   20.053647]  kunit_try_run_case+0x170/0x3f0
[   20.053692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.053743]  kthread+0x328/0x630
[   20.053787]  ret_from_fork+0x10/0x20
[   20.053842] 
[   20.053900] The buggy address belongs to stack of task kunit_try_catch/249
[   20.054124]  and is located at offset 138 in frame:
[   20.054197]  kasan_stack_oob+0x0/0x270
[   20.054490] 
[   20.054521] This frame has 4 objects:
[   20.054873]  [48, 49) '__assertion'
[   20.055010]  [64, 72) 'array'
[   20.055077]  [96, 112) '__assertion'
[   20.055226]  [128, 138) 'stack_array'
[   20.055300] 
[   20.055961] The buggy address belongs to the virtual mapping at
[   20.055961]  [ffff800080a30000, ffff800080a39000) created by:
[   20.055961]  kernel_clone+0x150/0x7a8
[   20.056075] 
[   20.056121] The buggy address belongs to the physical page:
[   20.056451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7
[   20.056523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.056625] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.056726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.056841] page dumped because: kasan: bad access detected
[   20.056914] 
[   20.056963] Memory state around the buggy address:
[   20.057038]  ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.057144]  ffff800080a37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.057230] >ffff800080a37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.057293]                                   ^
[   20.057335]  ffff800080a37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.057376]  ffff800080a37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.057698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[   20.040649] ==================================================================
[   20.040710] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.040767] Read of size 1 at addr ffff9507083405cd by task kunit_try_catch/245
[   20.040819] 
[   20.040864] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.040950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.040977] Hardware name: linux,dummy-virt (DT)
[   20.041008] Call trace:
[   20.041048]  show_stack+0x20/0x38 (C)
[   20.041098]  dump_stack_lvl+0x8c/0xd0
[   20.041146]  print_report+0x310/0x608
[   20.041505]  kasan_report+0xdc/0x128
[   20.041567]  __asan_report_load1_noabort+0x20/0x30
[   20.041664]  kasan_global_oob_right+0x230/0x270
[   20.041738]  kunit_try_run_case+0x170/0x3f0
[   20.041834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.041915]  kthread+0x328/0x630
[   20.041960]  ret_from_fork+0x10/0x20
[   20.042015] 
[   20.042062] The buggy address belongs to the variable:
[   20.042091]  global_array+0xd/0x40
[   20.042139] 
[   20.042354] The buggy address belongs to the virtual mapping at
[   20.042354]  [ffff9507064f0000, ffff950708401000) created by:
[   20.042354]  paging_init+0x66c/0x7d0
[   20.042441] 
[   20.042567] The buggy address belongs to the physical page:
[   20.042628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d40
[   20.042715] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.042796] raw: 03fffe0000002000 ffffc1ffc01f5008 ffffc1ffc01f5008 0000000000000000
[   20.042869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.042990] page dumped because: kasan: bad access detected
[   20.043084] 
[   20.043129] Memory state around the buggy address:
[   20.043237]  ffff950708340480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.043315]  ffff950708340500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.043381] >ffff950708340580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   20.043500]                                               ^
[   20.043568]  ffff950708340600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.043641]  ffff950708340680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.043678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[   20.020022] ==================================================================
[   20.020213] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.020278] Free of addr fff00000c1729501 by task kunit_try_catch/241
[   20.020377] 
[   20.020411] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.020495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.020520] Hardware name: linux,dummy-virt (DT)
[   20.020647] Call trace:
[   20.020689]  show_stack+0x20/0x38 (C)
[   20.020812]  dump_stack_lvl+0x8c/0xd0
[   20.020898]  print_report+0x118/0x608
[   20.021008]  kasan_report_invalid_free+0xc0/0xe8
[   20.021087]  check_slab_allocation+0xfc/0x108
[   20.021140]  __kasan_mempool_poison_object+0x78/0x150
[   20.021229]  mempool_free+0x28c/0x328
[   20.021294]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.021346]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.021421]  kunit_try_run_case+0x170/0x3f0
[   20.021530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.021625]  kthread+0x328/0x630
[   20.021776]  ret_from_fork+0x10/0x20
[   20.021915] 
[   20.022034] Allocated by task 241:
[   20.022129]  kasan_save_stack+0x3c/0x68
[   20.022182]  kasan_save_track+0x20/0x40
[   20.022248]  kasan_save_alloc_info+0x40/0x58
[   20.022287]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.022330]  remove_element+0x130/0x1f8
[   20.022363]  mempool_alloc_preallocated+0x58/0xc0
[   20.022625]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.022718]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.022816]  kunit_try_run_case+0x170/0x3f0
[   20.022943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.023008]  kthread+0x328/0x630
[   20.023104]  ret_from_fork+0x10/0x20
[   20.023231] 
[   20.023336] The buggy address belongs to the object at fff00000c1729500
[   20.023336]  which belongs to the cache kmalloc-128 of size 128
[   20.023414] The buggy address is located 1 bytes inside of
[   20.023414]  128-byte region [fff00000c1729500, fff00000c1729580)
[   20.023619] 
[   20.023775] The buggy address belongs to the physical page:
[   20.023824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   20.023908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.024014] page_type: f5(slab)
[   20.024092] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.024142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.024210] page dumped because: kasan: bad access detected
[   20.024243] 
[   20.024261] Memory state around the buggy address:
[   20.024290]  fff00000c1729400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.024344]  fff00000c1729480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.024386] >fff00000c1729500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.024423]                    ^
[   20.024450]  fff00000c1729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.024497]  fff00000c1729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.024536] ==================================================================
[   20.031077] ==================================================================
[   20.031172] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.031261] Free of addr fff00000c786c001 by task kunit_try_catch/243
[   20.031358] 
[   20.031396] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.031482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.031742] Hardware name: linux,dummy-virt (DT)
[   20.031779] Call trace:
[   20.031809]  show_stack+0x20/0x38 (C)
[   20.031901]  dump_stack_lvl+0x8c/0xd0
[   20.031978]  print_report+0x118/0x608
[   20.032044]  kasan_report_invalid_free+0xc0/0xe8
[   20.032124]  __kasan_mempool_poison_object+0xfc/0x150
[   20.032187]  mempool_free+0x28c/0x328
[   20.032233]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.032285]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.032377]  kunit_try_run_case+0x170/0x3f0
[   20.032423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.032475]  kthread+0x328/0x630
[   20.032551]  ret_from_fork+0x10/0x20
[   20.032796] 
[   20.032834] The buggy address belongs to the physical page:
[   20.032893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   20.032966] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.033433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.033513] page_type: f8(unknown)
[   20.033558] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.033633] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.033683] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.034043] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.034145] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   20.034279] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.034424] page dumped because: kasan: bad access detected
[   20.034497] 
[   20.034539] Memory state around the buggy address:
[   20.034605]  fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.034646]  fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.034844] >fff00000c786c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.034887]                    ^
[   20.034914]  fff00000c786c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.034954]  fff00000c786c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.035146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[   20.004035] ==================================================================
[   20.004088] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.004141] Free of addr fff00000c7868000 by task kunit_try_catch/237
[   20.004198] 
[   20.004228] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.004311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.004337] Hardware name: linux,dummy-virt (DT)
[   20.004368] Call trace:
[   20.004390]  show_stack+0x20/0x38 (C)
[   20.004440]  dump_stack_lvl+0x8c/0xd0
[   20.004486]  print_report+0x118/0x608
[   20.004532]  kasan_report_invalid_free+0xc0/0xe8
[   20.004581]  __kasan_mempool_poison_object+0x14c/0x150
[   20.004633]  mempool_free+0x28c/0x328
[   20.004680]  mempool_double_free_helper+0x150/0x2e8
[   20.004728]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.004778]  kunit_try_run_case+0x170/0x3f0
[   20.004823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.004874]  kthread+0x328/0x630
[   20.004919]  ret_from_fork+0x10/0x20
[   20.004964] 
[   20.004984] The buggy address belongs to the physical page:
[   20.005016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868
[   20.005069] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.005115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.005199] page_type: f8(unknown)
[   20.005239] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.005286] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.005344] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.005394] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.005443] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff
[   20.005492] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.005532] page dumped because: kasan: bad access detected
[   20.005570] 
[   20.005588] Memory state around the buggy address:
[   20.005627]  fff00000c7867f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.005681]  fff00000c7867f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.005723] >fff00000c7868000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.005759]                    ^
[   20.005785]  fff00000c7868080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.005826]  fff00000c7868100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.005864] ==================================================================
[   20.012327] ==================================================================
[   20.012447] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.012506] Free of addr fff00000c786c000 by task kunit_try_catch/239
[   20.012600] 
[   20.012679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.012792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.012820] Hardware name: linux,dummy-virt (DT)
[   20.012869] Call trace:
[   20.012901]  show_stack+0x20/0x38 (C)
[   20.012952]  dump_stack_lvl+0x8c/0xd0
[   20.012998]  print_report+0x118/0x608
[   20.013044]  kasan_report_invalid_free+0xc0/0xe8
[   20.013197]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.013298]  mempool_free+0x24c/0x328
[   20.013385]  mempool_double_free_helper+0x150/0x2e8
[   20.013436]  mempool_page_alloc_double_free+0xbc/0x118
[   20.013486]  kunit_try_run_case+0x170/0x3f0
[   20.013533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.013584]  kthread+0x328/0x630
[   20.013630]  ret_from_fork+0x10/0x20
[   20.013772] 
[   20.013855] The buggy address belongs to the physical page:
[   20.013926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   20.014007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.014102] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.014215] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.014276] page dumped because: kasan: bad access detected
[   20.014320] 
[   20.014338] Memory state around the buggy address:
[   20.014371]  fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.014414]  fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.014456] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.014599]                    ^
[   20.014669]  fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.014847]  fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.015016] ==================================================================
[   19.993797] ==================================================================
[   19.993932] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.994098] Free of addr fff00000c1729100 by task kunit_try_catch/235
[   19.994264] 
[   19.994333] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.994425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.994473] Hardware name: linux,dummy-virt (DT)
[   19.994502] Call trace:
[   19.994531]  show_stack+0x20/0x38 (C)
[   19.994581]  dump_stack_lvl+0x8c/0xd0
[   19.994629]  print_report+0x118/0x608
[   19.994674]  kasan_report_invalid_free+0xc0/0xe8
[   19.994729]  check_slab_allocation+0xd4/0x108
[   19.994775]  __kasan_mempool_poison_object+0x78/0x150
[   19.994827]  mempool_free+0x28c/0x328
[   19.994874]  mempool_double_free_helper+0x150/0x2e8
[   19.994922]  mempool_kmalloc_double_free+0xc0/0x118
[   19.994970]  kunit_try_run_case+0x170/0x3f0
[   19.995016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.995068]  kthread+0x328/0x630
[   19.995112]  ret_from_fork+0x10/0x20
[   19.995167] 
[   19.995188] Allocated by task 235:
[   19.995215]  kasan_save_stack+0x3c/0x68
[   19.995255]  kasan_save_track+0x20/0x40
[   19.995292]  kasan_save_alloc_info+0x40/0x58
[   19.995331]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.995371]  remove_element+0x130/0x1f8
[   19.995417]  mempool_alloc_preallocated+0x58/0xc0
[   19.995470]  mempool_double_free_helper+0x94/0x2e8
[   19.995572]  mempool_kmalloc_double_free+0xc0/0x118
[   19.995671]  kunit_try_run_case+0x170/0x3f0
[   19.995744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.995861]  kthread+0x328/0x630
[   19.995940]  ret_from_fork+0x10/0x20
[   19.996008] 
[   19.996072] Freed by task 235:
[   19.996099]  kasan_save_stack+0x3c/0x68
[   19.996379]  kasan_save_track+0x20/0x40
[   19.996480]  kasan_save_free_info+0x4c/0x78
[   19.996581]  __kasan_mempool_poison_object+0xc0/0x150
[   19.996633]  mempool_free+0x28c/0x328
[   19.996670]  mempool_double_free_helper+0x100/0x2e8
[   19.996709]  mempool_kmalloc_double_free+0xc0/0x118
[   19.996757]  kunit_try_run_case+0x170/0x3f0
[   19.996801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.996842]  kthread+0x328/0x630
[   19.996886]  ret_from_fork+0x10/0x20
[   19.996927] 
[   19.996945] The buggy address belongs to the object at fff00000c1729100
[   19.996945]  which belongs to the cache kmalloc-128 of size 128
[   19.997013] The buggy address is located 0 bytes inside of
[   19.997013]  128-byte region [fff00000c1729100, fff00000c1729180)
[   19.997069] 
[   19.997098] The buggy address belongs to the physical page:
[   19.997128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   19.997188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.997236] page_type: f5(slab)
[   19.997275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.997324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.997364] page dumped because: kasan: bad access detected
[   19.997395] 
[   19.997412] Memory state around the buggy address:
[   19.997443]  fff00000c1729000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.997486]  fff00000c1729080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.997527] >fff00000c1729100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.997564]                    ^
[   19.997589]  fff00000c1729180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.997630]  fff00000c1729200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.997669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[   18.582185] ==================================================================
[   18.582244] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.582311] Read of size 1 at addr fff00000c17330c8 by task kunit_try_catch/207
[   18.582408] 
[   18.582452] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.582565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.582623] Hardware name: linux,dummy-virt (DT)
[   18.582700] Call trace:
[   18.582745]  show_stack+0x20/0x38 (C)
[   18.582800]  dump_stack_lvl+0x8c/0xd0
[   18.582893]  print_report+0x118/0x608
[   18.582971]  kasan_report+0xdc/0x128
[   18.583018]  __asan_report_load1_noabort+0x20/0x30
[   18.583083]  kmem_cache_oob+0x344/0x430
[   18.583190]  kunit_try_run_case+0x170/0x3f0
[   18.583241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.583312]  kthread+0x328/0x630
[   18.583366]  ret_from_fork+0x10/0x20
[   18.583417] 
[   18.583435] Allocated by task 207:
[   18.583466]  kasan_save_stack+0x3c/0x68
[   18.583505]  kasan_save_track+0x20/0x40
[   18.583542]  kasan_save_alloc_info+0x40/0x58
[   18.583784]  __kasan_slab_alloc+0xa8/0xb0
[   18.583846]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.583955]  kmem_cache_oob+0x12c/0x430
[   18.583991]  kunit_try_run_case+0x170/0x3f0
[   18.584027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.584085]  kthread+0x328/0x630
[   18.584120]  ret_from_fork+0x10/0x20
[   18.584166] 
[   18.584187] The buggy address belongs to the object at fff00000c1733000
[   18.584187]  which belongs to the cache test_cache of size 200
[   18.584282] The buggy address is located 0 bytes to the right of
[   18.584282]  allocated 200-byte region [fff00000c1733000, fff00000c17330c8)
[   18.584347] 
[   18.584395] The buggy address belongs to the physical page:
[   18.584431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101733
[   18.584534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.584587] page_type: f5(slab)
[   18.584645] raw: 0bfffe0000000000 fff00000c1736000 dead000000000122 0000000000000000
[   18.584730] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.584795] page dumped because: kasan: bad access detected
[   18.584828] 
[   18.584845] Memory state around the buggy address:
[   18.585015]  fff00000c1732f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.585061]  fff00000c1733000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.585102] >fff00000c1733080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.585151]                                               ^
[   18.585196]  fff00000c1733100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585253]  fff00000c1733180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[   18.529804] ==================================================================
[   18.530202] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.530530] Read of size 8 at addr fff00000c1764bc0 by task kunit_try_catch/200
[   18.531179] 
[   18.531377] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.531890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.532083] Hardware name: linux,dummy-virt (DT)
[   18.532254] Call trace:
[   18.532373]  show_stack+0x20/0x38 (C)
[   18.532630]  dump_stack_lvl+0x8c/0xd0
[   18.533054]  print_report+0x118/0x608
[   18.533231]  kasan_report+0xdc/0x128
[   18.533619]  __asan_report_load8_noabort+0x20/0x30
[   18.533674]  workqueue_uaf+0x480/0x4a8
[   18.534243]  kunit_try_run_case+0x170/0x3f0
[   18.534377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.534714]  kthread+0x328/0x630
[   18.535094]  ret_from_fork+0x10/0x20
[   18.535154] 
[   18.535434] Allocated by task 200:
[   18.535643]  kasan_save_stack+0x3c/0x68
[   18.535944]  kasan_save_track+0x20/0x40
[   18.536151]  kasan_save_alloc_info+0x40/0x58
[   18.536342]  __kasan_kmalloc+0xd4/0xd8
[   18.536400]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.536441]  workqueue_uaf+0x13c/0x4a8
[   18.536841]  kunit_try_run_case+0x170/0x3f0
[   18.536937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.537275]  kthread+0x328/0x630
[   18.537631]  ret_from_fork+0x10/0x20
[   18.537797] 
[   18.537820] Freed by task 47:
[   18.538106]  kasan_save_stack+0x3c/0x68
[   18.538170]  kasan_save_track+0x20/0x40
[   18.538232]  kasan_save_free_info+0x4c/0x78
[   18.538347]  __kasan_slab_free+0x6c/0x98
[   18.538431]  kfree+0x214/0x3c8
[   18.538763]  workqueue_uaf_work+0x18/0x30
[   18.539065]  process_one_work+0x530/0xf98
[   18.539443]  worker_thread+0x8ac/0xf28
[   18.539725]  kthread+0x328/0x630
[   18.539837]  ret_from_fork+0x10/0x20
[   18.540442] 
[   18.540485] Last potentially related work creation:
[   18.540515]  kasan_save_stack+0x3c/0x68
[   18.540559]  kasan_record_aux_stack+0xb4/0xc8
[   18.540601]  __queue_work+0x65c/0x1010
[   18.540637]  queue_work_on+0xbc/0xf8
[   18.540672]  workqueue_uaf+0x210/0x4a8
[   18.541470]  kunit_try_run_case+0x170/0x3f0
[   18.541542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.541604]  kthread+0x328/0x630
[   18.541809]  ret_from_fork+0x10/0x20
[   18.541848] 
[   18.542051] The buggy address belongs to the object at fff00000c1764bc0
[   18.542051]  which belongs to the cache kmalloc-32 of size 32
[   18.542126] The buggy address is located 0 bytes inside of
[   18.542126]  freed 32-byte region [fff00000c1764bc0, fff00000c1764be0)
[   18.542709] 
[   18.542744] The buggy address belongs to the physical page:
[   18.542785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764
[   18.543144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.543722] page_type: f5(slab)
[   18.543778] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.544015] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.544143] page dumped because: kasan: bad access detected
[   18.544553] 
[   18.544577] Memory state around the buggy address:
[   18.544825]  fff00000c1764a80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   18.545180]  fff00000c1764b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.545238] >fff00000c1764b80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   18.545496]                                            ^
[   18.545693]  fff00000c1764c00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.545865]  fff00000c1764c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.545980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[   19.944830] ==================================================================
[   19.944885] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.944934] Read of size 1 at addr fff00000c7750000 by task kunit_try_catch/229
[   19.944983] 
[   19.945010] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.945094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.945120] Hardware name: linux,dummy-virt (DT)
[   19.945151] Call trace:
[   19.945188]  show_stack+0x20/0x38 (C)
[   19.945234]  dump_stack_lvl+0x8c/0xd0
[   19.945280]  print_report+0x118/0x608
[   19.945368]  kasan_report+0xdc/0x128
[   19.945427]  __asan_report_load1_noabort+0x20/0x30
[   19.945477]  mempool_uaf_helper+0x314/0x340
[   19.945520]  mempool_kmalloc_large_uaf+0xc4/0x120
[   19.945566]  kunit_try_run_case+0x170/0x3f0
[   19.945629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.945692]  kthread+0x328/0x630
[   19.945764]  ret_from_fork+0x10/0x20
[   19.945808] 
[   19.945836] The buggy address belongs to the physical page:
[   19.945868] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107750
[   19.945920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.945966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.946016] page_type: f8(unknown)
[   19.946052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.946102] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.946151] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.946292] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.946343] head: 0bfffe0000000002 ffffc1ffc31dd401 00000000ffffffff 00000000ffffffff
[   19.946393] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.946432] page dumped because: kasan: bad access detected
[   19.946485] 
[   19.946504] Memory state around the buggy address:
[   19.946536]  fff00000c774ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.946580]  fff00000c774ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.946623] >fff00000c7750000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.946691]                    ^
[   19.946722]  fff00000c7750080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.946827]  fff00000c7750100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.946919] ==================================================================
[   19.981390] ==================================================================
[   19.981501] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.981618] Read of size 1 at addr fff00000c7868000 by task kunit_try_catch/233
[   19.981696] 
[   19.981731] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.981898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.982023] Hardware name: linux,dummy-virt (DT)
[   19.982062] Call trace:
[   19.982087]  show_stack+0x20/0x38 (C)
[   19.982136]  dump_stack_lvl+0x8c/0xd0
[   19.982195]  print_report+0x118/0x608
[   19.982402]  kasan_report+0xdc/0x128
[   19.982447]  __asan_report_load1_noabort+0x20/0x30
[   19.982495]  mempool_uaf_helper+0x314/0x340
[   19.982540]  mempool_page_alloc_uaf+0xc0/0x118
[   19.982585]  kunit_try_run_case+0x170/0x3f0
[   19.982665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.982867]  kthread+0x328/0x630
[   19.982937]  ret_from_fork+0x10/0x20
[   19.985170] 
[   19.985201] The buggy address belongs to the physical page:
[   19.985233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868
[   19.985287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.985350] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.985398] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.985438] page dumped because: kasan: bad access detected
[   19.985470] 
[   19.985488] Memory state around the buggy address:
[   19.985519]  fff00000c7867f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.985560]  fff00000c7867f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.985601] >fff00000c7868000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.985638]                    ^
[   19.985666]  fff00000c7868080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.985707]  fff00000c7868100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.985744] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[   19.957958] ==================================================================
[   19.958108] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.958216] Read of size 1 at addr fff00000c1729240 by task kunit_try_catch/231
[   19.958322] 
[   19.958362] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.958447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.958498] Hardware name: linux,dummy-virt (DT)
[   19.958527] Call trace:
[   19.958550]  show_stack+0x20/0x38 (C)
[   19.958599]  dump_stack_lvl+0x8c/0xd0
[   19.958916]  print_report+0x118/0x608
[   19.959083]  kasan_report+0xdc/0x128
[   19.959205]  __asan_report_load1_noabort+0x20/0x30
[   19.959334]  mempool_uaf_helper+0x314/0x340
[   19.959476]  mempool_slab_uaf+0xc0/0x118
[   19.959623]  kunit_try_run_case+0x170/0x3f0
[   19.959667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.959753]  kthread+0x328/0x630
[   19.959918]  ret_from_fork+0x10/0x20
[   19.959974] 
[   19.959994] Allocated by task 231:
[   19.960020]  kasan_save_stack+0x3c/0x68
[   19.960291]  kasan_save_track+0x20/0x40
[   19.960366]  kasan_save_alloc_info+0x40/0x58
[   19.960408]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.960620]  remove_element+0x16c/0x1f8
[   19.960789]  mempool_alloc_preallocated+0x58/0xc0
[   19.960914]  mempool_uaf_helper+0xa4/0x340
[   19.961004]  mempool_slab_uaf+0xc0/0x118
[   19.961101]  kunit_try_run_case+0x170/0x3f0
[   19.961207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.961250]  kthread+0x328/0x630
[   19.961291]  ret_from_fork+0x10/0x20
[   19.961326] 
[   19.961346] Freed by task 231:
[   19.961372]  kasan_save_stack+0x3c/0x68
[   19.961419]  kasan_save_track+0x20/0x40
[   19.961462]  kasan_save_free_info+0x4c/0x78
[   19.961508]  __kasan_mempool_poison_object+0xc0/0x150
[   19.961547]  mempool_free+0x28c/0x328
[   19.961586]  mempool_uaf_helper+0x104/0x340
[   19.961629]  mempool_slab_uaf+0xc0/0x118
[   19.961681]  kunit_try_run_case+0x170/0x3f0
[   19.961726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.961777]  kthread+0x328/0x630
[   19.961812]  ret_from_fork+0x10/0x20
[   19.961846] 
[   19.961865] The buggy address belongs to the object at fff00000c1729240
[   19.961865]  which belongs to the cache test_cache of size 123
[   19.961933] The buggy address is located 0 bytes inside of
[   19.961933]  freed 123-byte region [fff00000c1729240, fff00000c17292bb)
[   19.961992] 
[   19.962012] The buggy address belongs to the physical page:
[   19.962066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729
[   19.962133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.962207] page_type: f5(slab)
[   19.962249] raw: 0bfffe0000000000 fff00000c1736a00 dead000000000122 0000000000000000
[   19.962299] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.962356] page dumped because: kasan: bad access detected
[   19.962400] 
[   19.962418] Memory state around the buggy address:
[   19.962463]  fff00000c1729100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962506]  fff00000c1729180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.962548] >fff00000c1729200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.962585]                                            ^
[   19.962625]  fff00000c1729280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962667]  fff00000c1729300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962711] ==================================================================
[   19.934765] ==================================================================
[   19.934887] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.935059] Read of size 1 at addr fff00000c1718d00 by task kunit_try_catch/227
[   19.935179] 
[   19.935217] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.935304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935331] Hardware name: linux,dummy-virt (DT)
[   19.935365] Call trace:
[   19.935388]  show_stack+0x20/0x38 (C)
[   19.935442]  dump_stack_lvl+0x8c/0xd0
[   19.935515]  print_report+0x118/0x608
[   19.935563]  kasan_report+0xdc/0x128
[   19.935607]  __asan_report_load1_noabort+0x20/0x30
[   19.935658]  mempool_uaf_helper+0x314/0x340
[   19.935702]  mempool_kmalloc_uaf+0xc4/0x120
[   19.935748]  kunit_try_run_case+0x170/0x3f0
[   19.935822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.935942]  kthread+0x328/0x630
[   19.936008]  ret_from_fork+0x10/0x20
[   19.936190] 
[   19.936281] Allocated by task 227:
[   19.936343]  kasan_save_stack+0x3c/0x68
[   19.936431]  kasan_save_track+0x20/0x40
[   19.936579]  kasan_save_alloc_info+0x40/0x58
[   19.936702]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.936862]  remove_element+0x130/0x1f8
[   19.936920]  mempool_alloc_preallocated+0x58/0xc0
[   19.936959]  mempool_uaf_helper+0xa4/0x340
[   19.936995]  mempool_kmalloc_uaf+0xc4/0x120
[   19.937053]  kunit_try_run_case+0x170/0x3f0
[   19.937089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.937132]  kthread+0x328/0x630
[   19.937176]  ret_from_fork+0x10/0x20
[   19.937214] 
[   19.937232] Freed by task 227:
[   19.937259]  kasan_save_stack+0x3c/0x68
[   19.937370]  kasan_save_track+0x20/0x40
[   19.937534]  kasan_save_free_info+0x4c/0x78
[   19.937698]  __kasan_mempool_poison_object+0xc0/0x150
[   19.937816]  mempool_free+0x28c/0x328
[   19.937965]  mempool_uaf_helper+0x104/0x340
[   19.938093]  mempool_kmalloc_uaf+0xc4/0x120
[   19.938132]  kunit_try_run_case+0x170/0x3f0
[   19.938177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.938249]  kthread+0x328/0x630
[   19.938286]  ret_from_fork+0x10/0x20
[   19.938323] 
[   19.938354] The buggy address belongs to the object at fff00000c1718d00
[   19.938354]  which belongs to the cache kmalloc-128 of size 128
[   19.938421] The buggy address is located 0 bytes inside of
[   19.938421]  freed 128-byte region [fff00000c1718d00, fff00000c1718d80)
[   19.938481] 
[   19.938501] The buggy address belongs to the physical page:
[   19.938534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101718
[   19.938588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.938663] page_type: f5(slab)
[   19.938706] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.938762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.938800] page dumped because: kasan: bad access detected
[   19.938832] 
[   19.938849] Memory state around the buggy address:
[   19.938883]  fff00000c1718c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.938925]  fff00000c1718c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.938980] >fff00000c1718d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.939061]                    ^
[   19.939118]  fff00000c1718d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.939187]  fff00000c1718e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.939279] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[   19.884210] ==================================================================
[   19.884269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.884319] Read of size 1 at addr fff00000c774e001 by task kunit_try_catch/223
[   19.884374] 
[   19.884404] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.884488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.884514] Hardware name: linux,dummy-virt (DT)
[   19.884544] Call trace:
[   19.884567]  show_stack+0x20/0x38 (C)
[   19.884615]  dump_stack_lvl+0x8c/0xd0
[   19.884661]  print_report+0x118/0x608
[   19.884707]  kasan_report+0xdc/0x128
[   19.884751]  __asan_report_load1_noabort+0x20/0x30
[   19.884801]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.884848]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.884897]  kunit_try_run_case+0x170/0x3f0
[   19.884943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.884993]  kthread+0x328/0x630
[   19.885038]  ret_from_fork+0x10/0x20
[   19.885086] 
[   19.885106] The buggy address belongs to the physical page:
[   19.885312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c
[   19.885383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.885432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.885526] page_type: f8(unknown)
[   19.885564] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.885613] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.885662] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.885708] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.885784] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff
[   19.885847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.885886] page dumped because: kasan: bad access detected
[   19.885917] 
[   19.885935] Memory state around the buggy address:
[   19.885966]  fff00000c774df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.886008]  fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.886048] >fff00000c774e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.886090]                    ^
[   19.886131]  fff00000c774e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.886183]  fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.886318] ==================================================================
[   19.876013] ==================================================================
[   19.876093] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.876187] Read of size 1 at addr fff00000c1718973 by task kunit_try_catch/221
[   19.876238] 
[   19.876279] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.876371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876398] Hardware name: linux,dummy-virt (DT)
[   19.876433] Call trace:
[   19.876458]  show_stack+0x20/0x38 (C)
[   19.876512]  dump_stack_lvl+0x8c/0xd0
[   19.876562]  print_report+0x118/0x608
[   19.876609]  kasan_report+0xdc/0x128
[   19.876656]  __asan_report_load1_noabort+0x20/0x30
[   19.876706]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.876753]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.876802]  kunit_try_run_case+0x170/0x3f0
[   19.876852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.876903]  kthread+0x328/0x630
[   19.876949]  ret_from_fork+0x10/0x20
[   19.876998] 
[   19.877017] Allocated by task 221:
[   19.877047]  kasan_save_stack+0x3c/0x68
[   19.877088]  kasan_save_track+0x20/0x40
[   19.877126]  kasan_save_alloc_info+0x40/0x58
[   19.877176]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.877218]  remove_element+0x130/0x1f8
[   19.877255]  mempool_alloc_preallocated+0x58/0xc0
[   19.877293]  mempool_oob_right_helper+0x98/0x2f0
[   19.877330]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.877367]  kunit_try_run_case+0x170/0x3f0
[   19.877406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.877449]  kthread+0x328/0x630
[   19.877483]  ret_from_fork+0x10/0x20
[   19.877520] 
[   19.877540] The buggy address belongs to the object at fff00000c1718900
[   19.877540]  which belongs to the cache kmalloc-128 of size 128
[   19.877597] The buggy address is located 0 bytes to the right of
[   19.877597]  allocated 115-byte region [fff00000c1718900, fff00000c1718973)
[   19.877659] 
[   19.877681] The buggy address belongs to the physical page:
[   19.877713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101718
[   19.877767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.877820] page_type: f5(slab)
[   19.877860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.877909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.877950] page dumped because: kasan: bad access detected
[   19.877982] 
[   19.878001] Memory state around the buggy address:
[   19.878035]  fff00000c1718800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.878077]  fff00000c1718880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.878119] >fff00000c1718900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.878166]                                                              ^
[   19.878204]  fff00000c1718980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.878245]  fff00000c1718a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.878284] ==================================================================
[   19.897281] ==================================================================
[   19.897342] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.897405] Read of size 1 at addr fff00000c76702bb by task kunit_try_catch/225
[   19.897454] 
[   19.897486] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.897581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.897664] Hardware name: linux,dummy-virt (DT)
[   19.897707] Call trace:
[   19.897731]  show_stack+0x20/0x38 (C)
[   19.897792]  dump_stack_lvl+0x8c/0xd0
[   19.898044]  print_report+0x118/0x608
[   19.898111]  kasan_report+0xdc/0x128
[   19.898226]  __asan_report_load1_noabort+0x20/0x30
[   19.898346]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.898479]  mempool_slab_oob_right+0xc0/0x118
[   19.898582]  kunit_try_run_case+0x170/0x3f0
[   19.898664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899690]  kthread+0x328/0x630
[   19.899794]  ret_from_fork+0x10/0x20
[   19.899945] 
[   19.899995] Allocated by task 225:
[   19.900184]  kasan_save_stack+0x3c/0x68
[   19.900233]  kasan_save_track+0x20/0x40
[   19.900303]  kasan_save_alloc_info+0x40/0x58
[   19.900607]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.900659]  remove_element+0x16c/0x1f8
[   19.900697]  mempool_alloc_preallocated+0x58/0xc0
[   19.901064]  mempool_oob_right_helper+0x98/0x2f0
[   19.901179]  mempool_slab_oob_right+0xc0/0x118
[   19.901226]  kunit_try_run_case+0x170/0x3f0
[   19.901264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.901557]  kthread+0x328/0x630
[   19.901720]  ret_from_fork+0x10/0x20
[   19.902001] 
[   19.902029] The buggy address belongs to the object at fff00000c7670240
[   19.902029]  which belongs to the cache test_cache of size 123
[   19.902103] The buggy address is located 0 bytes to the right of
[   19.902103]  allocated 123-byte region [fff00000c7670240, fff00000c76702bb)
[   19.902177] 
[   19.902199] The buggy address belongs to the physical page:
[   19.902690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107670
[   19.902995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.903314] page_type: f5(slab)
[   19.903522] raw: 0bfffe0000000000 fff00000c17368c0 dead000000000122 0000000000000000
[   19.903596] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.903638] page dumped because: kasan: bad access detected
[   19.904020] 
[   19.904040] Memory state around the buggy address:
[   19.904143]  fff00000c7670180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.904196]  fff00000c7670200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.904239] >fff00000c7670280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.904276]                                         ^
[   19.904579]  fff00000c7670300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904840]  fff00000c7670380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[   19.320622] ==================================================================
[   19.320695] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.320763] Read of size 1 at addr fff00000c1736500 by task kunit_try_catch/215
[   19.320812] 
[   19.320851] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.320940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.320967] Hardware name: linux,dummy-virt (DT)
[   19.321001] Call trace:
[   19.321026]  show_stack+0x20/0x38 (C)
[   19.321079]  dump_stack_lvl+0x8c/0xd0
[   19.321130]  print_report+0x118/0x608
[   19.321192]  kasan_report+0xdc/0x128
[   19.321239]  __kasan_check_byte+0x54/0x70
[   19.321285]  kmem_cache_destroy+0x34/0x218
[   19.321334]  kmem_cache_double_destroy+0x174/0x300
[   19.321384]  kunit_try_run_case+0x170/0x3f0
[   19.321433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.321485]  kthread+0x328/0x630
[   19.321533]  ret_from_fork+0x10/0x20
[   19.321581] 
[   19.321601] Allocated by task 215:
[   19.321631]  kasan_save_stack+0x3c/0x68
[   19.321673]  kasan_save_track+0x20/0x40
[   19.321711]  kasan_save_alloc_info+0x40/0x58
[   19.321754]  __kasan_slab_alloc+0xa8/0xb0
[   19.321795]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.321843]  __kmem_cache_create_args+0x178/0x280
[   19.321883]  kmem_cache_double_destroy+0xc0/0x300
[   19.321923]  kunit_try_run_case+0x170/0x3f0
[   19.321961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.322004]  kthread+0x328/0x630
[   19.322041]  ret_from_fork+0x10/0x20
[   19.322079] 
[   19.322097] Freed by task 215:
[   19.322124]  kasan_save_stack+0x3c/0x68
[   19.322169]  kasan_save_track+0x20/0x40
[   19.322206]  kasan_save_free_info+0x4c/0x78
[   19.322244]  __kasan_slab_free+0x6c/0x98
[   19.322280]  kmem_cache_free+0x260/0x470
[   19.322317]  slab_kmem_cache_release+0x38/0x50
[   19.322356]  kmem_cache_release+0x1c/0x30
[   19.322393]  kobject_put+0x17c/0x430
[   19.322432]  sysfs_slab_release+0x1c/0x30
[   19.322471]  kmem_cache_destroy+0x118/0x218
[   19.322507]  kmem_cache_double_destroy+0x128/0x300
[   19.322546]  kunit_try_run_case+0x170/0x3f0
[   19.322582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.322625]  kthread+0x328/0x630
[   19.322660]  ret_from_fork+0x10/0x20
[   19.322696] 
[   19.322717] The buggy address belongs to the object at fff00000c1736500
[   19.322717]  which belongs to the cache kmem_cache of size 208
[   19.322778] The buggy address is located 0 bytes inside of
[   19.322778]  freed 208-byte region [fff00000c1736500, fff00000c17365d0)
[   19.322838] 
[   19.322860] The buggy address belongs to the physical page:
[   19.322891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101736
[   19.322946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.322996] page_type: f5(slab)
[   19.323038] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.323087] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.323127] page dumped because: kasan: bad access detected
[   19.323168] 
[   19.323186] Memory state around the buggy address:
[   19.323221]  fff00000c1736400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.323266]  fff00000c1736480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.323309] >fff00000c1736500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.323347]                    ^
[   19.323374]  fff00000c1736580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.323417]  fff00000c1736600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.323456] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[   19.262437] ==================================================================
[   19.262543] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.262625] Read of size 1 at addr fff00000c6891000 by task kunit_try_catch/213
[   19.262676] 
[   19.262721] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   19.262816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.262843] Hardware name: linux,dummy-virt (DT)
[   19.262878] Call trace:
[   19.262902]  show_stack+0x20/0x38 (C)
[   19.262955]  dump_stack_lvl+0x8c/0xd0
[   19.263006]  print_report+0x118/0x608
[   19.263053]  kasan_report+0xdc/0x128
[   19.263099]  __asan_report_load1_noabort+0x20/0x30
[   19.263149]  kmem_cache_rcu_uaf+0x388/0x468
[   19.263210]  kunit_try_run_case+0x170/0x3f0
[   19.263259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263311]  kthread+0x328/0x630
[   19.263360]  ret_from_fork+0x10/0x20
[   19.263409] 
[   19.263429] Allocated by task 213:
[   19.263458]  kasan_save_stack+0x3c/0x68
[   19.263499]  kasan_save_track+0x20/0x40
[   19.263535]  kasan_save_alloc_info+0x40/0x58
[   19.263575]  __kasan_slab_alloc+0xa8/0xb0
[   19.263610]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.263651]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.263688]  kunit_try_run_case+0x170/0x3f0
[   19.263725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263765]  kthread+0x328/0x630
[   19.263801]  ret_from_fork+0x10/0x20
[   19.263835] 
[   19.263854] Freed by task 0:
[   19.263882]  kasan_save_stack+0x3c/0x68
[   19.263920]  kasan_save_track+0x20/0x40
[   19.263955]  kasan_save_free_info+0x4c/0x78
[   19.263994]  __kasan_slab_free+0x6c/0x98
[   19.264029]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.264067]  rcu_core+0x9f4/0x1e20
[   19.264103]  rcu_core_si+0x18/0x30
[   19.264137]  handle_softirqs+0x374/0xb28
[   19.264182]  __do_softirq+0x1c/0x28
[   19.264217] 
[   19.264237] Last potentially related work creation:
[   19.264263]  kasan_save_stack+0x3c/0x68
[   19.264299]  kasan_record_aux_stack+0xb4/0xc8
[   19.264339]  kmem_cache_free+0x120/0x470
[   19.264375]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.264413]  kunit_try_run_case+0x170/0x3f0
[   19.264449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.264491]  kthread+0x328/0x630
[   19.264527]  ret_from_fork+0x10/0x20
[   19.264562] 
[   19.264580] The buggy address belongs to the object at fff00000c6891000
[   19.264580]  which belongs to the cache test_cache of size 200
[   19.264638] The buggy address is located 0 bytes inside of
[   19.264638]  freed 200-byte region [fff00000c6891000, fff00000c68910c8)
[   19.264699] 
[   19.264722] The buggy address belongs to the physical page:
[   19.264756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106891
[   19.264813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.264866] page_type: f5(slab)
[   19.264909] raw: 0bfffe0000000000 fff00000c17363c0 dead000000000122 0000000000000000
[   19.264958] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.264999] page dumped because: kasan: bad access detected
[   19.265030] 
[   19.265050] Memory state around the buggy address:
[   19.265083]  fff00000c6890f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.265125]  fff00000c6890f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.265178] >fff00000c6891000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.265215]                    ^
[   19.265243]  fff00000c6891080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.265285]  fff00000c6891100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.265323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[   18.808371] ==================================================================
[   18.808437] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   18.808957] Free of addr fff00000c6890001 by task kunit_try_catch/211
[   18.809016] 
[   18.809055] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.810322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.810392] Hardware name: linux,dummy-virt (DT)
[   18.810473] Call trace:
[   18.810499]  show_stack+0x20/0x38 (C)
[   18.810553]  dump_stack_lvl+0x8c/0xd0
[   18.811143]  print_report+0x118/0x608
[   18.811332]  kasan_report_invalid_free+0xc0/0xe8
[   18.811384]  check_slab_allocation+0xfc/0x108
[   18.811459]  __kasan_slab_pre_free+0x2c/0x48
[   18.811508]  kmem_cache_free+0xf0/0x470
[   18.811557]  kmem_cache_invalid_free+0x184/0x3c8
[   18.812185]  kunit_try_run_case+0x170/0x3f0
[   18.812499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.812678]  kthread+0x328/0x630
[   18.812794]  ret_from_fork+0x10/0x20
[   18.813108] 
[   18.813133] Allocated by task 211:
[   18.813177]  kasan_save_stack+0x3c/0x68
[   18.813220]  kasan_save_track+0x20/0x40
[   18.813257]  kasan_save_alloc_info+0x40/0x58
[   18.813536]  __kasan_slab_alloc+0xa8/0xb0
[   18.813587]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.813662]  kmem_cache_invalid_free+0x12c/0x3c8
[   18.813869]  kunit_try_run_case+0x170/0x3f0
[   18.814199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.814243]  kthread+0x328/0x630
[   18.814279]  ret_from_fork+0x10/0x20
[   18.814322] 
[   18.814342] The buggy address belongs to the object at fff00000c6890000
[   18.814342]  which belongs to the cache test_cache of size 200
[   18.814399] The buggy address is located 1 bytes inside of
[   18.814399]  200-byte region [fff00000c6890000, fff00000c68900c8)
[   18.814944] 
[   18.815115] The buggy address belongs to the physical page:
[   18.815151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106890
[   18.815279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.815333] page_type: f5(slab)
[   18.815375] raw: 0bfffe0000000000 fff00000c1736280 dead000000000122 0000000000000000
[   18.815961] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.816446] page dumped because: kasan: bad access detected
[   18.816697] 
[   18.816718] Memory state around the buggy address:
[   18.816988]  fff00000c688ff00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   18.817239]  fff00000c688ff80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   18.817295] >fff00000c6890000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.817335]                    ^
[   18.817362]  fff00000c6890080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.817414]  fff00000c6890100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[   18.764423] ==================================================================
[   18.765234] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.765878] Free of addr fff00000c1732000 by task kunit_try_catch/209
[   18.765989] 
[   18.766214] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.766745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.767027] Hardware name: linux,dummy-virt (DT)
[   18.767463] Call trace:
[   18.767493]  show_stack+0x20/0x38 (C)
[   18.768106]  dump_stack_lvl+0x8c/0xd0
[   18.768290]  print_report+0x118/0x608
[   18.768338]  kasan_report_invalid_free+0xc0/0xe8
[   18.768396]  check_slab_allocation+0xd4/0x108
[   18.768445]  __kasan_slab_pre_free+0x2c/0x48
[   18.768963]  kmem_cache_free+0xf0/0x470
[   18.769192]  kmem_cache_double_free+0x190/0x3c8
[   18.769254]  kunit_try_run_case+0x170/0x3f0
[   18.769316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.769366]  kthread+0x328/0x630
[   18.769414]  ret_from_fork+0x10/0x20
[   18.769465] 
[   18.769484] Allocated by task 209:
[   18.769774]  kasan_save_stack+0x3c/0x68
[   18.769831]  kasan_save_track+0x20/0x40
[   18.769868]  kasan_save_alloc_info+0x40/0x58
[   18.770204]  __kasan_slab_alloc+0xa8/0xb0
[   18.770429]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.770469]  kmem_cache_double_free+0x12c/0x3c8
[   18.770507]  kunit_try_run_case+0x170/0x3f0
[   18.770665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.770714]  kthread+0x328/0x630
[   18.770754]  ret_from_fork+0x10/0x20
[   18.771143] 
[   18.771176] Freed by task 209:
[   18.771203]  kasan_save_stack+0x3c/0x68
[   18.771244]  kasan_save_track+0x20/0x40
[   18.771279]  kasan_save_free_info+0x4c/0x78
[   18.771694]  __kasan_slab_free+0x6c/0x98
[   18.771740]  kmem_cache_free+0x260/0x470
[   18.771777]  kmem_cache_double_free+0x140/0x3c8
[   18.772453]  kunit_try_run_case+0x170/0x3f0
[   18.772505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.772573]  kthread+0x328/0x630
[   18.772776]  ret_from_fork+0x10/0x20
[   18.772850] 
[   18.772870] The buggy address belongs to the object at fff00000c1732000
[   18.772870]  which belongs to the cache test_cache of size 200
[   18.773397] The buggy address is located 0 bytes inside of
[   18.773397]  200-byte region [fff00000c1732000, fff00000c17320c8)
[   18.773462] 
[   18.773484] The buggy address belongs to the physical page:
[   18.773815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101732
[   18.774117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.774204] page_type: f5(slab)
[   18.774435] raw: 0bfffe0000000000 fff00000c1736140 dead000000000122 0000000000000000
[   18.774491] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.774532] page dumped because: kasan: bad access detected
[   18.774571] 
[   18.774591] Memory state around the buggy address:
[   18.774678]  fff00000c1731f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.774922]  fff00000c1731f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.774968] >fff00000c1732000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.775005]                    ^
[   18.775238]  fff00000c1732080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.775588]  fff00000c1732100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.775631] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[   18.236181] ==================================================================
[   18.236252] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   18.236301] Free of addr fff00000c5ccd320 by task kunit_try_catch/192
[   18.236678] 
[   18.236743] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.236842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.236870] Hardware name: linux,dummy-virt (DT)
[   18.236900] Call trace:
[   18.236923]  show_stack+0x20/0x38 (C)
[   18.236979]  dump_stack_lvl+0x8c/0xd0
[   18.237036]  print_report+0x118/0x608
[   18.237082]  kasan_report_invalid_free+0xc0/0xe8
[   18.237133]  check_slab_allocation+0xd4/0x108
[   18.237199]  __kasan_slab_pre_free+0x2c/0x48
[   18.237247]  kfree+0xe8/0x3c8
[   18.237289]  kfree_sensitive+0x3c/0xb0
[   18.237337]  kmalloc_double_kzfree+0x168/0x308
[   18.237383]  kunit_try_run_case+0x170/0x3f0
[   18.237434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.237490]  kthread+0x328/0x630
[   18.237535]  ret_from_fork+0x10/0x20
[   18.237581] 
[   18.237599] Allocated by task 192:
[   18.237634]  kasan_save_stack+0x3c/0x68
[   18.237677]  kasan_save_track+0x20/0x40
[   18.237714]  kasan_save_alloc_info+0x40/0x58
[   18.238305]  __kasan_kmalloc+0xd4/0xd8
[   18.238679]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.238830]  kmalloc_double_kzfree+0xb8/0x308
[   18.239012]  kunit_try_run_case+0x170/0x3f0
[   18.239088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.239209]  kthread+0x328/0x630
[   18.239341]  ret_from_fork+0x10/0x20
[   18.239380] 
[   18.239400] Freed by task 192:
[   18.239722]  kasan_save_stack+0x3c/0x68
[   18.239835]  kasan_save_track+0x20/0x40
[   18.239921]  kasan_save_free_info+0x4c/0x78
[   18.240100]  __kasan_slab_free+0x6c/0x98
[   18.240288]  kfree+0x214/0x3c8
[   18.240356]  kfree_sensitive+0x80/0xb0
[   18.240415]  kmalloc_double_kzfree+0x11c/0x308
[   18.240735]  kunit_try_run_case+0x170/0x3f0
[   18.240865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.241033]  kthread+0x328/0x630
[   18.241225]  ret_from_fork+0x10/0x20
[   18.241303] 
[   18.241351] The buggy address belongs to the object at fff00000c5ccd320
[   18.241351]  which belongs to the cache kmalloc-16 of size 16
[   18.241706] The buggy address is located 0 bytes inside of
[   18.241706]  16-byte region [fff00000c5ccd320, fff00000c5ccd330)
[   18.241925] 
[   18.242041] The buggy address belongs to the physical page:
[   18.242139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   18.242285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.242343] page_type: f5(slab)
[   18.242386] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.242706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.242794] page dumped because: kasan: bad access detected
[   18.242882] 
[   18.243074] Memory state around the buggy address:
[   18.243182]  fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.243309]  fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.243402] >fff00000c5ccd300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   18.243443]                                ^
[   18.243810]  fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.243955]  fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.244125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[   18.221352] ==================================================================
[   18.221471] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   18.221541] Read of size 1 at addr fff00000c5ccd320 by task kunit_try_catch/192
[   18.221590] 
[   18.222037] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.222425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.222636] Hardware name: linux,dummy-virt (DT)
[   18.222777] Call trace:
[   18.222801]  show_stack+0x20/0x38 (C)
[   18.223212]  dump_stack_lvl+0x8c/0xd0
[   18.223674]  print_report+0x118/0x608
[   18.223799]  kasan_report+0xdc/0x128
[   18.223952]  __kasan_check_byte+0x54/0x70
[   18.224172]  kfree_sensitive+0x30/0xb0
[   18.224402]  kmalloc_double_kzfree+0x168/0x308
[   18.224612]  kunit_try_run_case+0x170/0x3f0
[   18.224901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.224973]  kthread+0x328/0x630
[   18.225466]  ret_from_fork+0x10/0x20
[   18.225943] 
[   18.225996] Allocated by task 192:
[   18.226070]  kasan_save_stack+0x3c/0x68
[   18.226131]  kasan_save_track+0x20/0x40
[   18.226199]  kasan_save_alloc_info+0x40/0x58
[   18.226603]  __kasan_kmalloc+0xd4/0xd8
[   18.226710]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.227002]  kmalloc_double_kzfree+0xb8/0x308
[   18.227194]  kunit_try_run_case+0x170/0x3f0
[   18.227345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.227608]  kthread+0x328/0x630
[   18.228145]  ret_from_fork+0x10/0x20
[   18.228362] 
[   18.228596] Freed by task 192:
[   18.228695]  kasan_save_stack+0x3c/0x68
[   18.228834]  kasan_save_track+0x20/0x40
[   18.228932]  kasan_save_free_info+0x4c/0x78
[   18.229052]  __kasan_slab_free+0x6c/0x98
[   18.229209]  kfree+0x214/0x3c8
[   18.229592]  kfree_sensitive+0x80/0xb0
[   18.229860]  kmalloc_double_kzfree+0x11c/0x308
[   18.230171]  kunit_try_run_case+0x170/0x3f0
[   18.230411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.230643]  kthread+0x328/0x630
[   18.230780]  ret_from_fork+0x10/0x20
[   18.230866] 
[   18.230936] The buggy address belongs to the object at fff00000c5ccd320
[   18.230936]  which belongs to the cache kmalloc-16 of size 16
[   18.231406] The buggy address is located 0 bytes inside of
[   18.231406]  freed 16-byte region [fff00000c5ccd320, fff00000c5ccd330)
[   18.231516] 
[   18.231562] The buggy address belongs to the physical page:
[   18.231793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   18.231940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.232270] page_type: f5(slab)
[   18.232469] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.232550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.232678] page dumped because: kasan: bad access detected
[   18.232864] 
[   18.232955] Memory state around the buggy address:
[   18.233305]  fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.233421]  fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.233581] >fff00000c5ccd300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   18.233658]                                ^
[   18.233801]  fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.234099]  fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.234305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[   18.193787] ==================================================================
[   18.193851] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   18.194124] Read of size 1 at addr fff00000c6879fa8 by task kunit_try_catch/188
[   18.194516] 
[   18.194748] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.195327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.195409] Hardware name: linux,dummy-virt (DT)
[   18.195525] Call trace:
[   18.195584]  show_stack+0x20/0x38 (C)
[   18.195771]  dump_stack_lvl+0x8c/0xd0
[   18.195876]  print_report+0x118/0x608
[   18.196243]  kasan_report+0xdc/0x128
[   18.196367]  __asan_report_load1_noabort+0x20/0x30
[   18.196447]  kmalloc_uaf2+0x3f4/0x468
[   18.196635]  kunit_try_run_case+0x170/0x3f0
[   18.196913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.196979]  kthread+0x328/0x630
[   18.197048]  ret_from_fork+0x10/0x20
[   18.197099] 
[   18.197119] Allocated by task 188:
[   18.197147]  kasan_save_stack+0x3c/0x68
[   18.197201]  kasan_save_track+0x20/0x40
[   18.197237]  kasan_save_alloc_info+0x40/0x58
[   18.197276]  __kasan_kmalloc+0xd4/0xd8
[   18.197312]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.197349]  kmalloc_uaf2+0xc4/0x468
[   18.197382]  kunit_try_run_case+0x170/0x3f0
[   18.197419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.197460]  kthread+0x328/0x630
[   18.197494]  ret_from_fork+0x10/0x20
[   18.197554] 
[   18.197571] Freed by task 188:
[   18.197596]  kasan_save_stack+0x3c/0x68
[   18.197640]  kasan_save_track+0x20/0x40
[   18.197683]  kasan_save_free_info+0x4c/0x78
[   18.197982]  __kasan_slab_free+0x6c/0x98
[   18.198374]  kfree+0x214/0x3c8
[   18.198549]  kmalloc_uaf2+0x134/0x468
[   18.198713]  kunit_try_run_case+0x170/0x3f0
[   18.198940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199055]  kthread+0x328/0x630
[   18.199210]  ret_from_fork+0x10/0x20
[   18.199268] 
[   18.199466] The buggy address belongs to the object at fff00000c6879f80
[   18.199466]  which belongs to the cache kmalloc-64 of size 64
[   18.199642] The buggy address is located 40 bytes inside of
[   18.199642]  freed 64-byte region [fff00000c6879f80, fff00000c6879fc0)
[   18.199804] 
[   18.199905] The buggy address belongs to the physical page:
[   18.200014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879
[   18.200397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.200595] page_type: f5(slab)
[   18.200663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.200815] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   18.200883] page dumped because: kasan: bad access detected
[   18.200964] 
[   18.201032] Memory state around the buggy address:
[   18.201095]  fff00000c6879e80: 00 00 00 00 02 fc fc fc fc fc fc fc fc fc fc fc
[   18.201321]  fff00000c6879f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.201804] >fff00000c6879f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.202124]                                   ^
[   18.202200]  fff00000c687a000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.202306]  fff00000c687a080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.202463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[   18.145457] ==================================================================
[   18.145772] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   18.146132] Read of size 1 at addr fff00000c5ccd308 by task kunit_try_catch/184
[   18.146690] 
[   18.147052] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.147193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.147488] Hardware name: linux,dummy-virt (DT)
[   18.147600] Call trace:
[   18.147625]  show_stack+0x20/0x38 (C)
[   18.147956]  dump_stack_lvl+0x8c/0xd0
[   18.148108]  print_report+0x118/0x608
[   18.148510]  kasan_report+0xdc/0x128
[   18.148650]  __asan_report_load1_noabort+0x20/0x30
[   18.148878]  kmalloc_uaf+0x300/0x338
[   18.149125]  kunit_try_run_case+0x170/0x3f0
[   18.149253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.149311]  kthread+0x328/0x630
[   18.149519]  ret_from_fork+0x10/0x20
[   18.149753] 
[   18.149839] Allocated by task 184:
[   18.149869]  kasan_save_stack+0x3c/0x68
[   18.150055]  kasan_save_track+0x20/0x40
[   18.150314]  kasan_save_alloc_info+0x40/0x58
[   18.150486]  __kasan_kmalloc+0xd4/0xd8
[   18.150578]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.150895]  kmalloc_uaf+0xb8/0x338
[   18.151039]  kunit_try_run_case+0x170/0x3f0
[   18.151222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.151469]  kthread+0x328/0x630
[   18.151580]  ret_from_fork+0x10/0x20
[   18.151621] 
[   18.151686] Freed by task 184:
[   18.152136]  kasan_save_stack+0x3c/0x68
[   18.152262]  kasan_save_track+0x20/0x40
[   18.152302]  kasan_save_free_info+0x4c/0x78
[   18.152406]  __kasan_slab_free+0x6c/0x98
[   18.152625]  kfree+0x214/0x3c8
[   18.152795]  kmalloc_uaf+0x11c/0x338
[   18.152966]  kunit_try_run_case+0x170/0x3f0
[   18.153095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.153274]  kthread+0x328/0x630
[   18.153650]  ret_from_fork+0x10/0x20
[   18.153857] 
[   18.153882] The buggy address belongs to the object at fff00000c5ccd300
[   18.153882]  which belongs to the cache kmalloc-16 of size 16
[   18.153965] The buggy address is located 8 bytes inside of
[   18.153965]  freed 16-byte region [fff00000c5ccd300, fff00000c5ccd310)
[   18.154302] 
[   18.154479] The buggy address belongs to the physical page:
[   18.154524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   18.154854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.155012] page_type: f5(slab)
[   18.155218] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.155453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.155540] page dumped because: kasan: bad access detected
[   18.155736] 
[   18.155949] Memory state around the buggy address:
[   18.156100]  fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.156343]  fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.156576] >fff00000c5ccd300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156686]                       ^
[   18.156826]  fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156973]  fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.157109] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[   18.130736] ==================================================================
[   18.131235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.131305] Read of size 64 at addr fff00000c6879a04 by task kunit_try_catch/182
[   18.131459] 
[   18.131546] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.131728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.131786] Hardware name: linux,dummy-virt (DT)
[   18.131816] Call trace:
[   18.131837]  show_stack+0x20/0x38 (C)
[   18.131893]  dump_stack_lvl+0x8c/0xd0
[   18.131938]  print_report+0x118/0x608
[   18.132287]  kasan_report+0xdc/0x128
[   18.132366]  kasan_check_range+0x100/0x1a8
[   18.132496]  __asan_memmove+0x3c/0x98
[   18.132549]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.132636]  kunit_try_run_case+0x170/0x3f0
[   18.132823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.132892]  kthread+0x328/0x630
[   18.132938]  ret_from_fork+0x10/0x20
[   18.133123] 
[   18.133149] Allocated by task 182:
[   18.133199]  kasan_save_stack+0x3c/0x68
[   18.133242]  kasan_save_track+0x20/0x40
[   18.133278]  kasan_save_alloc_info+0x40/0x58
[   18.133459]  __kasan_kmalloc+0xd4/0xd8
[   18.133545]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.133601]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   18.133948]  kunit_try_run_case+0x170/0x3f0
[   18.134117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.134454]  kthread+0x328/0x630
[   18.134752]  ret_from_fork+0x10/0x20
[   18.134952] 
[   18.135034] The buggy address belongs to the object at fff00000c6879a00
[   18.135034]  which belongs to the cache kmalloc-64 of size 64
[   18.135259] The buggy address is located 4 bytes inside of
[   18.135259]  allocated 64-byte region [fff00000c6879a00, fff00000c6879a40)
[   18.135430] 
[   18.135753] The buggy address belongs to the physical page:
[   18.135887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879
[   18.135993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.136148] page_type: f5(slab)
[   18.136227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.136433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.136538] page dumped because: kasan: bad access detected
[   18.136701] 
[   18.136745] Memory state around the buggy address:
[   18.136843]  fff00000c6879900: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.136927]  fff00000c6879980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.137003] >fff00000c6879a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.137041]                                            ^
[   18.137343]  fff00000c6879a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.137532]  fff00000c6879b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.137621] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[   18.110273] ==================================================================
[   18.110714] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   18.110822] Read of size 18446744073709551614 at addr fff00000c6879804 by task kunit_try_catch/180
[   18.111228] 
[   18.111417] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.111619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.111809] Hardware name: linux,dummy-virt (DT)
[   18.111862] Call trace:
[   18.111886]  show_stack+0x20/0x38 (C)
[   18.111995]  dump_stack_lvl+0x8c/0xd0
[   18.112485]  print_report+0x118/0x608
[   18.113784]  kasan_report+0xdc/0x128
[   18.114042]  kasan_check_range+0x100/0x1a8
[   18.114294]  __asan_memmove+0x3c/0x98
[   18.114343]  kmalloc_memmove_negative_size+0x154/0x2e0
[   18.114399]  kunit_try_run_case+0x170/0x3f0
[   18.114676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.115082]  kthread+0x328/0x630
[   18.115561]  ret_from_fork+0x10/0x20
[   18.115927] 
[   18.116190] Allocated by task 180:
[   18.116235]  kasan_save_stack+0x3c/0x68
[   18.116361]  kasan_save_track+0x20/0x40
[   18.116505]  kasan_save_alloc_info+0x40/0x58
[   18.116831]  __kasan_kmalloc+0xd4/0xd8
[   18.116959]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.117048]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   18.117338]  kunit_try_run_case+0x170/0x3f0
[   18.117552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.117617]  kthread+0x328/0x630
[   18.117820]  ret_from_fork+0x10/0x20
[   18.117868] 
[   18.118002] The buggy address belongs to the object at fff00000c6879800
[   18.118002]  which belongs to the cache kmalloc-64 of size 64
[   18.118546] The buggy address is located 4 bytes inside of
[   18.118546]  64-byte region [fff00000c6879800, fff00000c6879840)
[   18.118625] 
[   18.118864] The buggy address belongs to the physical page:
[   18.119037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879
[   18.119316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.119416] page_type: f5(slab)
[   18.119590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.119712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.119756] page dumped because: kasan: bad access detected
[   18.119999] 
[   18.120068] Memory state around the buggy address:
[   18.120264]  fff00000c6879700: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   18.120415]  fff00000c6879780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.120710] >fff00000c6879800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.120816]                    ^
[   18.120885]  fff00000c6879880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.120930]  fff00000c6879900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.120979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[   18.085143] ==================================================================
[   18.085470] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   18.085523] Write of size 16 at addr fff00000c68f1669 by task kunit_try_catch/178
[   18.085926] 
[   18.086020] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.086395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.086438] Hardware name: linux,dummy-virt (DT)
[   18.086473] Call trace:
[   18.086497]  show_stack+0x20/0x38 (C)
[   18.087092]  dump_stack_lvl+0x8c/0xd0
[   18.087241]  print_report+0x118/0x608
[   18.087334]  kasan_report+0xdc/0x128
[   18.087454]  kasan_check_range+0x100/0x1a8
[   18.087547]  __asan_memset+0x34/0x78
[   18.087928]  kmalloc_oob_memset_16+0x150/0x2f8
[   18.088008]  kunit_try_run_case+0x170/0x3f0
[   18.088181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.088349]  kthread+0x328/0x630
[   18.088427]  ret_from_fork+0x10/0x20
[   18.088866] 
[   18.088967] Allocated by task 178:
[   18.089094]  kasan_save_stack+0x3c/0x68
[   18.089231]  kasan_save_track+0x20/0x40
[   18.089362]  kasan_save_alloc_info+0x40/0x58
[   18.089406]  __kasan_kmalloc+0xd4/0xd8
[   18.089486]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.089669]  kmalloc_oob_memset_16+0xb0/0x2f8
[   18.089950]  kunit_try_run_case+0x170/0x3f0
[   18.090122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.090222]  kthread+0x328/0x630
[   18.090279]  ret_from_fork+0x10/0x20
[   18.090554] 
[   18.090698] The buggy address belongs to the object at fff00000c68f1600
[   18.090698]  which belongs to the cache kmalloc-128 of size 128
[   18.090768] The buggy address is located 105 bytes inside of
[   18.090768]  allocated 120-byte region [fff00000c68f1600, fff00000c68f1678)
[   18.090861] 
[   18.091017] The buggy address belongs to the physical page:
[   18.091230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.091435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.091580] page_type: f5(slab)
[   18.091666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.091722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.091917] page dumped because: kasan: bad access detected
[   18.092142] 
[   18.092306] Memory state around the buggy address:
[   18.092469]  fff00000c68f1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.092578]  fff00000c68f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.092664] >fff00000c68f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.092949]                                                                 ^
[   18.093136]  fff00000c68f1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093214]  fff00000c68f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093396] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[   18.067998] ==================================================================
[   18.068056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   18.068128] Write of size 8 at addr fff00000c68f1571 by task kunit_try_catch/176
[   18.068229] 
[   18.068269] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.068352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.068377] Hardware name: linux,dummy-virt (DT)
[   18.068407] Call trace:
[   18.068436]  show_stack+0x20/0x38 (C)
[   18.068484]  dump_stack_lvl+0x8c/0xd0
[   18.068529]  print_report+0x118/0x608
[   18.068583]  kasan_report+0xdc/0x128
[   18.068635]  kasan_check_range+0x100/0x1a8
[   18.068682]  __asan_memset+0x34/0x78
[   18.068736]  kmalloc_oob_memset_8+0x150/0x2f8
[   18.068781]  kunit_try_run_case+0x170/0x3f0
[   18.068825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.068883]  kthread+0x328/0x630
[   18.068927]  ret_from_fork+0x10/0x20
[   18.068977] 
[   18.069001] Allocated by task 176:
[   18.069028]  kasan_save_stack+0x3c/0x68
[   18.069066]  kasan_save_track+0x20/0x40
[   18.069101]  kasan_save_alloc_info+0x40/0x58
[   18.069138]  __kasan_kmalloc+0xd4/0xd8
[   18.069972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.070072]  kmalloc_oob_memset_8+0xb0/0x2f8
[   18.070110]  kunit_try_run_case+0x170/0x3f0
[   18.070943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.071017]  kthread+0x328/0x630
[   18.071094]  ret_from_fork+0x10/0x20
[   18.071756] 
[   18.071818] The buggy address belongs to the object at fff00000c68f1500
[   18.071818]  which belongs to the cache kmalloc-128 of size 128
[   18.071948] The buggy address is located 113 bytes inside of
[   18.071948]  allocated 120-byte region [fff00000c68f1500, fff00000c68f1578)
[   18.072029] 
[   18.072052] The buggy address belongs to the physical page:
[   18.072434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.072492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.072941] page_type: f5(slab)
[   18.073021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.073281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.073484] page dumped because: kasan: bad access detected
[   18.073750] 
[   18.074093] Memory state around the buggy address:
[   18.074149]  fff00000c68f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.074542]  fff00000c68f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.074633] >fff00000c68f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.074736]                                                                 ^
[   18.074816]  fff00000c68f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075052]  fff00000c68f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[   18.052676] ==================================================================
[   18.052758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.052888] Write of size 4 at addr fff00000c68f1475 by task kunit_try_catch/174
[   18.053040] 
[   18.053075] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.053171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.053197] Hardware name: linux,dummy-virt (DT)
[   18.053225] Call trace:
[   18.053370]  show_stack+0x20/0x38 (C)
[   18.053430]  dump_stack_lvl+0x8c/0xd0
[   18.053476]  print_report+0x118/0x608
[   18.053529]  kasan_report+0xdc/0x128
[   18.053573]  kasan_check_range+0x100/0x1a8
[   18.053620]  __asan_memset+0x34/0x78
[   18.053664]  kmalloc_oob_memset_4+0x150/0x300
[   18.053708]  kunit_try_run_case+0x170/0x3f0
[   18.053759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.053810]  kthread+0x328/0x630
[   18.054336]  ret_from_fork+0x10/0x20
[   18.054563] 
[   18.054634] Allocated by task 174:
[   18.054683]  kasan_save_stack+0x3c/0x68
[   18.054991]  kasan_save_track+0x20/0x40
[   18.055077]  kasan_save_alloc_info+0x40/0x58
[   18.055218]  __kasan_kmalloc+0xd4/0xd8
[   18.055346]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.055434]  kmalloc_oob_memset_4+0xb0/0x300
[   18.055586]  kunit_try_run_case+0x170/0x3f0
[   18.055625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055695]  kthread+0x328/0x630
[   18.056016]  ret_from_fork+0x10/0x20
[   18.056128] 
[   18.056205] The buggy address belongs to the object at fff00000c68f1400
[   18.056205]  which belongs to the cache kmalloc-128 of size 128
[   18.056364] The buggy address is located 117 bytes inside of
[   18.056364]  allocated 120-byte region [fff00000c68f1400, fff00000c68f1478)
[   18.056525] 
[   18.056548] The buggy address belongs to the physical page:
[   18.056607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.056693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.056868] page_type: f5(slab)
[   18.057195] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.057332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.057413] page dumped because: kasan: bad access detected
[   18.057445] 
[   18.057470] Memory state around the buggy address:
[   18.057554]  fff00000c68f1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.057597]  fff00000c68f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057671] >fff00000c68f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.057723]                                                                 ^
[   18.057768]  fff00000c68f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057809]  fff00000c68f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[   18.032217] ==================================================================
[   18.032271] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   18.032318] Write of size 2 at addr fff00000c68f1377 by task kunit_try_catch/172
[   18.032798] 
[   18.033058] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.033415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.033690] Hardware name: linux,dummy-virt (DT)
[   18.033778] Call trace:
[   18.034119]  show_stack+0x20/0x38 (C)
[   18.034354]  dump_stack_lvl+0x8c/0xd0
[   18.034717]  print_report+0x118/0x608
[   18.034892]  kasan_report+0xdc/0x128
[   18.035056]  kasan_check_range+0x100/0x1a8
[   18.035152]  __asan_memset+0x34/0x78
[   18.035355]  kmalloc_oob_memset_2+0x150/0x2f8
[   18.035493]  kunit_try_run_case+0x170/0x3f0
[   18.035541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.035741]  kthread+0x328/0x630
[   18.035909]  ret_from_fork+0x10/0x20
[   18.036120] 
[   18.036367] Allocated by task 172:
[   18.036538]  kasan_save_stack+0x3c/0x68
[   18.036625]  kasan_save_track+0x20/0x40
[   18.036797]  kasan_save_alloc_info+0x40/0x58
[   18.036954]  __kasan_kmalloc+0xd4/0xd8
[   18.037034]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.037273]  kmalloc_oob_memset_2+0xb0/0x2f8
[   18.037334]  kunit_try_run_case+0x170/0x3f0
[   18.037370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.037411]  kthread+0x328/0x630
[   18.037583]  ret_from_fork+0x10/0x20
[   18.037656] 
[   18.037686] The buggy address belongs to the object at fff00000c68f1300
[   18.037686]  which belongs to the cache kmalloc-128 of size 128
[   18.037974] The buggy address is located 119 bytes inside of
[   18.037974]  allocated 120-byte region [fff00000c68f1300, fff00000c68f1378)
[   18.038194] 
[   18.038261] The buggy address belongs to the physical page:
[   18.038660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.038739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.038964] page_type: f5(slab)
[   18.039342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.039431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.039722] page dumped because: kasan: bad access detected
[   18.039795] 
[   18.039862] Memory state around the buggy address:
[   18.040300]  fff00000c68f1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.040386]  fff00000c68f1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.040826] >fff00000c68f1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.040923]                                                                 ^
[   18.040993]  fff00000c68f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.041369]  fff00000c68f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.041535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[   18.018218] ==================================================================
[   18.018677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   18.018737] Write of size 128 at addr fff00000c68f1200 by task kunit_try_catch/170
[   18.018792] 
[   18.019143] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.019355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.019456] Hardware name: linux,dummy-virt (DT)
[   18.019630] Call trace:
[   18.019710]  show_stack+0x20/0x38 (C)
[   18.019825]  dump_stack_lvl+0x8c/0xd0
[   18.020046]  print_report+0x118/0x608
[   18.020130]  kasan_report+0xdc/0x128
[   18.020339]  kasan_check_range+0x100/0x1a8
[   18.020477]  __asan_memset+0x34/0x78
[   18.020606]  kmalloc_oob_in_memset+0x144/0x2d0
[   18.020755]  kunit_try_run_case+0x170/0x3f0
[   18.021089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.021253]  kthread+0x328/0x630
[   18.021474]  ret_from_fork+0x10/0x20
[   18.021592] 
[   18.021694] Allocated by task 170:
[   18.021770]  kasan_save_stack+0x3c/0x68
[   18.021811]  kasan_save_track+0x20/0x40
[   18.021853]  kasan_save_alloc_info+0x40/0x58
[   18.022172]  __kasan_kmalloc+0xd4/0xd8
[   18.022375]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.022472]  kmalloc_oob_in_memset+0xb0/0x2d0
[   18.022590]  kunit_try_run_case+0x170/0x3f0
[   18.022821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.022885]  kthread+0x328/0x630
[   18.023084]  ret_from_fork+0x10/0x20
[   18.023181] 
[   18.023204] The buggy address belongs to the object at fff00000c68f1200
[   18.023204]  which belongs to the cache kmalloc-128 of size 128
[   18.023269] The buggy address is located 0 bytes inside of
[   18.023269]  allocated 120-byte region [fff00000c68f1200, fff00000c68f1278)
[   18.023328] 
[   18.023348] The buggy address belongs to the physical page:
[   18.023378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.023428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.023474] page_type: f5(slab)
[   18.023521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.023582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.023634] page dumped because: kasan: bad access detected
[   18.023674] 
[   18.023692] Memory state around the buggy address:
[   18.023724]  fff00000c68f1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.023764]  fff00000c68f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023804] >fff00000c68f1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.023849]                                                                 ^
[   18.023886]  fff00000c68f1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023927]  fff00000c68f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023963] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[   18.003610] ==================================================================
[   18.003711] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   18.003765] Read of size 16 at addr fff00000c5ccd2e0 by task kunit_try_catch/168
[   18.003825] 
[   18.004067] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.004177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.004204] Hardware name: linux,dummy-virt (DT)
[   18.004341] Call trace:
[   18.004399]  show_stack+0x20/0x38 (C)
[   18.004452]  dump_stack_lvl+0x8c/0xd0
[   18.004779]  print_report+0x118/0x608
[   18.004892]  kasan_report+0xdc/0x128
[   18.004942]  __asan_report_load16_noabort+0x20/0x30
[   18.005227]  kmalloc_uaf_16+0x3bc/0x438
[   18.005323]  kunit_try_run_case+0x170/0x3f0
[   18.005388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.005441]  kthread+0x328/0x630
[   18.005683]  ret_from_fork+0x10/0x20
[   18.006213] 
[   18.006234] Allocated by task 168:
[   18.006285]  kasan_save_stack+0x3c/0x68
[   18.006646]  kasan_save_track+0x20/0x40
[   18.006740]  kasan_save_alloc_info+0x40/0x58
[   18.006782]  __kasan_kmalloc+0xd4/0xd8
[   18.006826]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.006864]  kmalloc_uaf_16+0x140/0x438
[   18.006897]  kunit_try_run_case+0x170/0x3f0
[   18.006941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.006989]  kthread+0x328/0x630
[   18.007023]  ret_from_fork+0x10/0x20
[   18.007057] 
[   18.007076] Freed by task 168:
[   18.007102]  kasan_save_stack+0x3c/0x68
[   18.007138]  kasan_save_track+0x20/0x40
[   18.007185]  kasan_save_free_info+0x4c/0x78
[   18.007222]  __kasan_slab_free+0x6c/0x98
[   18.007258]  kfree+0x214/0x3c8
[   18.007298]  kmalloc_uaf_16+0x190/0x438
[   18.007339]  kunit_try_run_case+0x170/0x3f0
[   18.007374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.007429]  kthread+0x328/0x630
[   18.007462]  ret_from_fork+0x10/0x20
[   18.007496] 
[   18.007525] The buggy address belongs to the object at fff00000c5ccd2e0
[   18.007525]  which belongs to the cache kmalloc-16 of size 16
[   18.007580] The buggy address is located 0 bytes inside of
[   18.007580]  freed 16-byte region [fff00000c5ccd2e0, fff00000c5ccd2f0)
[   18.007637] 
[   18.007656] The buggy address belongs to the physical page:
[   18.007686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   18.007743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.007790] page_type: f5(slab)
[   18.007833] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.007903] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.007951] page dumped because: kasan: bad access detected
[   18.007989] 
[   18.008007] Memory state around the buggy address:
[   18.008037]  fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.008077]  fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.008132] >fff00000c5ccd280: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   18.008917]                                                        ^
[   18.009011]  fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.009077]  fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.009131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[   17.987033] ==================================================================
[   17.987245] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   17.987298] Write of size 16 at addr fff00000c5ccd280 by task kunit_try_catch/166
[   17.987415] 
[   17.987581] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.987667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.987708] Hardware name: linux,dummy-virt (DT)
[   17.987766] Call trace:
[   17.987790]  show_stack+0x20/0x38 (C)
[   17.987875]  dump_stack_lvl+0x8c/0xd0
[   17.987942]  print_report+0x118/0x608
[   17.988008]  kasan_report+0xdc/0x128
[   17.988140]  __asan_report_store16_noabort+0x20/0x30
[   17.988214]  kmalloc_oob_16+0x3a0/0x3f8
[   17.988263]  kunit_try_run_case+0x170/0x3f0
[   17.988447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.988510]  kthread+0x328/0x630
[   17.988555]  ret_from_fork+0x10/0x20
[   17.988602] 
[   17.988619] Allocated by task 166:
[   17.988655]  kasan_save_stack+0x3c/0x68
[   17.988695]  kasan_save_track+0x20/0x40
[   17.988730]  kasan_save_alloc_info+0x40/0x58
[   17.988776]  __kasan_kmalloc+0xd4/0xd8
[   17.988811]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.988847]  kmalloc_oob_16+0xb4/0x3f8
[   17.988881]  kunit_try_run_case+0x170/0x3f0
[   17.988915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.988955]  kthread+0x328/0x630
[   17.988989]  ret_from_fork+0x10/0x20
[   17.989196] 
[   17.989379] The buggy address belongs to the object at fff00000c5ccd280
[   17.989379]  which belongs to the cache kmalloc-16 of size 16
[   17.989464] The buggy address is located 0 bytes inside of
[   17.989464]  allocated 13-byte region [fff00000c5ccd280, fff00000c5ccd28d)
[   17.989603] 
[   17.989625] The buggy address belongs to the physical page:
[   17.989758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   17.989863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.990122] page_type: f5(slab)
[   17.990277] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.990430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.990627] page dumped because: kasan: bad access detected
[   17.990882] 
[   17.990964] Memory state around the buggy address:
[   17.991085]  fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.991130]  fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   17.991534] >fff00000c5ccd280: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.991622]                       ^
[   17.991735]  fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.991804]  fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.991866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[   17.977080] ==================================================================
[   17.977127] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.977189] Read of size 1 at addr fff00000c473de00 by task kunit_try_catch/164
[   17.977349] 
[   17.977425] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.977562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.977617] Hardware name: linux,dummy-virt (DT)
[   17.977647] Call trace:
[   17.977669]  show_stack+0x20/0x38 (C)
[   17.977719]  dump_stack_lvl+0x8c/0xd0
[   17.977949]  print_report+0x118/0x608
[   17.978072]  kasan_report+0xdc/0x128
[   17.978196]  __asan_report_load1_noabort+0x20/0x30
[   17.978308]  krealloc_uaf+0x4c8/0x520
[   17.978429]  kunit_try_run_case+0x170/0x3f0
[   17.978554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.978637]  kthread+0x328/0x630
[   17.978683]  ret_from_fork+0x10/0x20
[   17.978756] 
[   17.978775] Allocated by task 164:
[   17.978801]  kasan_save_stack+0x3c/0x68
[   17.979016]  kasan_save_track+0x20/0x40
[   17.979122]  kasan_save_alloc_info+0x40/0x58
[   17.979220]  __kasan_kmalloc+0xd4/0xd8
[   17.979294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.979393]  krealloc_uaf+0xc8/0x520
[   17.979426]  kunit_try_run_case+0x170/0x3f0
[   17.979609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.979786]  kthread+0x328/0x630
[   17.979933]  ret_from_fork+0x10/0x20
[   17.980020] 
[   17.980041] Freed by task 164:
[   17.980068]  kasan_save_stack+0x3c/0x68
[   17.980298]  kasan_save_track+0x20/0x40
[   17.980407]  kasan_save_free_info+0x4c/0x78
[   17.980446]  __kasan_slab_free+0x6c/0x98
[   17.980716]  kfree+0x214/0x3c8
[   17.980825]  krealloc_uaf+0x12c/0x520
[   17.980924]  kunit_try_run_case+0x170/0x3f0
[   17.980981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.981021]  kthread+0x328/0x630
[   17.981065]  ret_from_fork+0x10/0x20
[   17.981099] 
[   17.981118] The buggy address belongs to the object at fff00000c473de00
[   17.981118]  which belongs to the cache kmalloc-256 of size 256
[   17.981183] The buggy address is located 0 bytes inside of
[   17.981183]  freed 256-byte region [fff00000c473de00, fff00000c473df00)
[   17.981241] 
[   17.981269] The buggy address belongs to the physical page:
[   17.981306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.981374] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.981426] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.981475] page_type: f5(slab)
[   17.981526] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.981584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.981631] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.981687] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.981762] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.981811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.981849] page dumped because: kasan: bad access detected
[   17.981878] 
[   17.981895] Memory state around the buggy address:
[   17.982059]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.982222]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.982330] >fff00000c473de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.982399]                    ^
[   17.982427]  fff00000c473de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.982520]  fff00000c473df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.982587] ==================================================================
[   17.969192] ==================================================================
[   17.969333] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.969396] Read of size 1 at addr fff00000c473de00 by task kunit_try_catch/164
[   17.969443] 
[   17.969551] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.969851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.969922] Hardware name: linux,dummy-virt (DT)
[   17.969980] Call trace:
[   17.970074]  show_stack+0x20/0x38 (C)
[   17.970210]  dump_stack_lvl+0x8c/0xd0
[   17.970316]  print_report+0x118/0x608
[   17.970378]  kasan_report+0xdc/0x128
[   17.970459]  __kasan_check_byte+0x54/0x70
[   17.970606]  krealloc_noprof+0x44/0x360
[   17.970705]  krealloc_uaf+0x180/0x520
[   17.970829]  kunit_try_run_case+0x170/0x3f0
[   17.970940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.971041]  kthread+0x328/0x630
[   17.971086]  ret_from_fork+0x10/0x20
[   17.971141] 
[   17.971169] Allocated by task 164:
[   17.971316]  kasan_save_stack+0x3c/0x68
[   17.971550]  kasan_save_track+0x20/0x40
[   17.971648]  kasan_save_alloc_info+0x40/0x58
[   17.971772]  __kasan_kmalloc+0xd4/0xd8
[   17.971841]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.971946]  krealloc_uaf+0xc8/0x520
[   17.971979]  kunit_try_run_case+0x170/0x3f0
[   17.972044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.972358]  kthread+0x328/0x630
[   17.972448]  ret_from_fork+0x10/0x20
[   17.972549] 
[   17.972645] Freed by task 164:
[   17.972754]  kasan_save_stack+0x3c/0x68
[   17.972848]  kasan_save_track+0x20/0x40
[   17.973228]  kasan_save_free_info+0x4c/0x78
[   17.973283]  __kasan_slab_free+0x6c/0x98
[   17.973319]  kfree+0x214/0x3c8
[   17.973501]  krealloc_uaf+0x12c/0x520
[   17.973690]  kunit_try_run_case+0x170/0x3f0
[   17.973867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.973912]  kthread+0x328/0x630
[   17.973947]  ret_from_fork+0x10/0x20
[   17.974015] 
[   17.974040] The buggy address belongs to the object at fff00000c473de00
[   17.974040]  which belongs to the cache kmalloc-256 of size 256
[   17.974379] The buggy address is located 0 bytes inside of
[   17.974379]  freed 256-byte region [fff00000c473de00, fff00000c473df00)
[   17.974462] 
[   17.974499] The buggy address belongs to the physical page:
[   17.974566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.974615] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.974681] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.974942] page_type: f5(slab)
[   17.975029] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.975169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.975281] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.975362] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.975409] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.975455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.975509] page dumped because: kasan: bad access detected
[   17.975547] 
[   17.975566] Memory state around the buggy address:
[   17.975596]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.975635]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.975674] >fff00000c473de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.975715]                    ^
[   17.975741]  fff00000c473de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.975790]  fff00000c473df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.975841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[   17.962584] ==================================================================
[   17.962625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.962667] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/162
[   17.962714] 
[   17.962746] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.962824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.962864] Hardware name: linux,dummy-virt (DT)
[   17.962892] Call trace:
[   17.962912]  show_stack+0x20/0x38 (C)
[   17.962971]  dump_stack_lvl+0x8c/0xd0
[   17.963014]  print_report+0x118/0x608
[   17.963058]  kasan_report+0xdc/0x128
[   17.963102]  __asan_report_store1_noabort+0x20/0x30
[   17.963151]  krealloc_less_oob_helper+0xa58/0xc50
[   17.963208]  krealloc_large_less_oob+0x20/0x38
[   17.963253]  kunit_try_run_case+0x170/0x3f0
[   17.963306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.963356]  kthread+0x328/0x630
[   17.963411]  ret_from_fork+0x10/0x20
[   17.963456] 
[   17.963474] The buggy address belongs to the physical page:
[   17.963503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.963551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.963614] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.963691] page_type: f8(unknown)
[   17.963727] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.963774] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.963839] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.963948] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.964013] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.964060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.964116] page dumped because: kasan: bad access detected
[   17.964171] 
[   17.964189] Memory state around the buggy address:
[   17.964217]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.964280]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.964590] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.964646]                                                           ^
[   17.964755]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.964823]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.964880] ==================================================================
[   17.880805] ==================================================================
[   17.880868] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.880919] Write of size 1 at addr fff00000c473dcc9 by task kunit_try_catch/158
[   17.881200] 
[   17.881260] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.881346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.881372] Hardware name: linux,dummy-virt (DT)
[   17.881403] Call trace:
[   17.881625]  show_stack+0x20/0x38 (C)
[   17.881710]  dump_stack_lvl+0x8c/0xd0
[   17.881798]  print_report+0x118/0x608
[   17.881884]  kasan_report+0xdc/0x128
[   17.881947]  __asan_report_store1_noabort+0x20/0x30
[   17.882011]  krealloc_less_oob_helper+0xa48/0xc50
[   17.882292]  krealloc_less_oob+0x20/0x38
[   17.882447]  kunit_try_run_case+0x170/0x3f0
[   17.882512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.882883]  kthread+0x328/0x630
[   17.883018]  ret_from_fork+0x10/0x20
[   17.883098] 
[   17.883414] Allocated by task 158:
[   17.883460]  kasan_save_stack+0x3c/0x68
[   17.883587]  kasan_save_track+0x20/0x40
[   17.883780]  kasan_save_alloc_info+0x40/0x58
[   17.883841]  __kasan_krealloc+0x118/0x178
[   17.884029]  krealloc_noprof+0x128/0x360
[   17.884186]  krealloc_less_oob_helper+0x168/0xc50
[   17.884262]  krealloc_less_oob+0x20/0x38
[   17.884399]  kunit_try_run_case+0x170/0x3f0
[   17.884436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.884778]  kthread+0x328/0x630
[   17.884889]  ret_from_fork+0x10/0x20
[   17.885094] 
[   17.885135] The buggy address belongs to the object at fff00000c473dc00
[   17.885135]  which belongs to the cache kmalloc-256 of size 256
[   17.885485] The buggy address is located 0 bytes to the right of
[   17.885485]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.885592] 
[   17.885613] The buggy address belongs to the physical page:
[   17.885681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.886055] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.886113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.886178] page_type: f5(slab)
[   17.886217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.886566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.886639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.886943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887148] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.887551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.887618] page dumped because: kasan: bad access detected
[   17.887747] 
[   17.887800] Memory state around the buggy address:
[   17.887968]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888091]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.888138] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.888392]                                               ^
[   17.888592]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888685]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888819] ==================================================================
[   17.910397] ==================================================================
[   17.910467] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.910689] Write of size 1 at addr fff00000c473dceb by task kunit_try_catch/158
[   17.910789] 
[   17.910858] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.910939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.910965] Hardware name: linux,dummy-virt (DT)
[   17.910994] Call trace:
[   17.911075]  show_stack+0x20/0x38 (C)
[   17.911131]  dump_stack_lvl+0x8c/0xd0
[   17.911218]  print_report+0x118/0x608
[   17.911264]  kasan_report+0xdc/0x128
[   17.911308]  __asan_report_store1_noabort+0x20/0x30
[   17.911358]  krealloc_less_oob_helper+0xa58/0xc50
[   17.911434]  krealloc_less_oob+0x20/0x38
[   17.911530]  kunit_try_run_case+0x170/0x3f0
[   17.911607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.911660]  kthread+0x328/0x630
[   17.911732]  ret_from_fork+0x10/0x20
[   17.911809] 
[   17.911846] Allocated by task 158:
[   17.911873]  kasan_save_stack+0x3c/0x68
[   17.911911]  kasan_save_track+0x20/0x40
[   17.911982]  kasan_save_alloc_info+0x40/0x58
[   17.912021]  __kasan_krealloc+0x118/0x178
[   17.912267]  krealloc_noprof+0x128/0x360
[   17.912334]  krealloc_less_oob_helper+0x168/0xc50
[   17.912436]  krealloc_less_oob+0x20/0x38
[   17.912474]  kunit_try_run_case+0x170/0x3f0
[   17.912509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.912568]  kthread+0x328/0x630
[   17.912603]  ret_from_fork+0x10/0x20
[   17.912637] 
[   17.912749] The buggy address belongs to the object at fff00000c473dc00
[   17.912749]  which belongs to the cache kmalloc-256 of size 256
[   17.912817] The buggy address is located 34 bytes to the right of
[   17.912817]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.912987] 
[   17.913047] The buggy address belongs to the physical page:
[   17.913107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.913185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.913230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.913308] page_type: f5(slab)
[   17.913445] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.913682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.913782] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.913881] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.913929] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.913991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.914153] page dumped because: kasan: bad access detected
[   17.914231] 
[   17.914328] Memory state around the buggy address:
[   17.914415]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914518]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.914568] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.914605]                                                           ^
[   17.914641]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914681]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.914716] ==================================================================
[   17.960474] ==================================================================
[   17.960507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.960547] Write of size 1 at addr fff00000c77560ea by task kunit_try_catch/162
[   17.960592] 
[   17.960629] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.960708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.960732] Hardware name: linux,dummy-virt (DT)
[   17.960760] Call trace:
[   17.960780]  show_stack+0x20/0x38 (C)
[   17.960825]  dump_stack_lvl+0x8c/0xd0
[   17.960869]  print_report+0x118/0x608
[   17.960928]  kasan_report+0xdc/0x128
[   17.960975]  __asan_report_store1_noabort+0x20/0x30
[   17.961032]  krealloc_less_oob_helper+0xae4/0xc50
[   17.961079]  krealloc_large_less_oob+0x20/0x38
[   17.961125]  kunit_try_run_case+0x170/0x3f0
[   17.961180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.961231]  kthread+0x328/0x630
[   17.961275]  ret_from_fork+0x10/0x20
[   17.961319] 
[   17.961337] The buggy address belongs to the physical page:
[   17.961366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.961416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.961459] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.961517] page_type: f8(unknown)
[   17.961552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.961598] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.961645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.961691] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.961770] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.961817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.961855] page dumped because: kasan: bad access detected
[   17.961884] 
[   17.961901] Memory state around the buggy address:
[   17.961929]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.961968]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.962019] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.962054]                                                           ^
[   17.962101]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962140]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.962185] ==================================================================
[   17.944007] ==================================================================
[   17.944061] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.944111] Write of size 1 at addr fff00000c77560c9 by task kunit_try_catch/162
[   17.944993] 
[   17.945035] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.945268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.945317] Hardware name: linux,dummy-virt (DT)
[   17.945365] Call trace:
[   17.945403]  show_stack+0x20/0x38 (C)
[   17.945605]  dump_stack_lvl+0x8c/0xd0
[   17.945916]  print_report+0x118/0x608
[   17.946266]  kasan_report+0xdc/0x128
[   17.946409]  __asan_report_store1_noabort+0x20/0x30
[   17.946485]  krealloc_less_oob_helper+0xa48/0xc50
[   17.946533]  krealloc_large_less_oob+0x20/0x38
[   17.946608]  kunit_try_run_case+0x170/0x3f0
[   17.946983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.947108]  kthread+0x328/0x630
[   17.947304]  ret_from_fork+0x10/0x20
[   17.947487] 
[   17.947509] The buggy address belongs to the physical page:
[   17.947539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.947875] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.947993] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.948202] page_type: f8(unknown)
[   17.948410] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.948481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.948607] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.948760] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.948858] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.949248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.949308] page dumped because: kasan: bad access detected
[   17.949443] 
[   17.949474] Memory state around the buggy address:
[   17.949582]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.949666]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.949808] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.949926]                                               ^
[   17.949987]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.950136]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.950398] ==================================================================
[   17.907345] ==================================================================
[   17.907388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.907434] Write of size 1 at addr fff00000c473dcea by task kunit_try_catch/158
[   17.907481] 
[   17.907510] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.907590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.907615] Hardware name: linux,dummy-virt (DT)
[   17.907647] Call trace:
[   17.907669]  show_stack+0x20/0x38 (C)
[   17.907717]  dump_stack_lvl+0x8c/0xd0
[   17.907762]  print_report+0x118/0x608
[   17.907806]  kasan_report+0xdc/0x128
[   17.907850]  __asan_report_store1_noabort+0x20/0x30
[   17.907900]  krealloc_less_oob_helper+0xae4/0xc50
[   17.907946]  krealloc_less_oob+0x20/0x38
[   17.907990]  kunit_try_run_case+0x170/0x3f0
[   17.908034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908084]  kthread+0x328/0x630
[   17.908127]  ret_from_fork+0x10/0x20
[   17.908186] 
[   17.908204] Allocated by task 158:
[   17.908230]  kasan_save_stack+0x3c/0x68
[   17.908267]  kasan_save_track+0x20/0x40
[   17.908302]  kasan_save_alloc_info+0x40/0x58
[   17.908339]  __kasan_krealloc+0x118/0x178
[   17.908375]  krealloc_noprof+0x128/0x360
[   17.908409]  krealloc_less_oob_helper+0x168/0xc50
[   17.908445]  krealloc_less_oob+0x20/0x38
[   17.908479]  kunit_try_run_case+0x170/0x3f0
[   17.908513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908553]  kthread+0x328/0x630
[   17.908586]  ret_from_fork+0x10/0x20
[   17.908619] 
[   17.908637] The buggy address belongs to the object at fff00000c473dc00
[   17.908637]  which belongs to the cache kmalloc-256 of size 256
[   17.908689] The buggy address is located 33 bytes to the right of
[   17.908689]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.908749] 
[   17.908767] The buggy address belongs to the physical page:
[   17.908796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.908845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.908888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.908936] page_type: f5(slab)
[   17.908970] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.909018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.909066] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.909112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.909192] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.909268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.909335] page dumped because: kasan: bad access detected
[   17.909393] 
[   17.909422] Memory state around the buggy address:
[   17.909490]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.909558]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.909629] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.909676]                                                           ^
[   17.909714]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910109]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910170] ==================================================================
[   17.958267] ==================================================================
[   17.958309] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.958352] Write of size 1 at addr fff00000c77560da by task kunit_try_catch/162
[   17.958399] 
[   17.958426] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.958980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.959016] Hardware name: linux,dummy-virt (DT)
[   17.959045] Call trace:
[   17.959066]  show_stack+0x20/0x38 (C)
[   17.959115]  dump_stack_lvl+0x8c/0xd0
[   17.959171]  print_report+0x118/0x608
[   17.959215]  kasan_report+0xdc/0x128
[   17.959259]  __asan_report_store1_noabort+0x20/0x30
[   17.959308]  krealloc_less_oob_helper+0xa80/0xc50
[   17.959354]  krealloc_large_less_oob+0x20/0x38
[   17.959400]  kunit_try_run_case+0x170/0x3f0
[   17.959444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959493]  kthread+0x328/0x630
[   17.959536]  ret_from_fork+0x10/0x20
[   17.959581] 
[   17.959600] The buggy address belongs to the physical page:
[   17.959628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.959678] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.959721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.959768] page_type: f8(unknown)
[   17.959803] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.959850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.959898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.959944] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.959990] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.960036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.960074] page dumped because: kasan: bad access detected
[   17.960102] 
[   17.960120] Memory state around the buggy address:
[   17.960148]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.960196]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.960236] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.960300]                                                     ^
[   17.960336]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.960382]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.960418] ==================================================================
[   17.897052] ==================================================================
[   17.897096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.897142] Write of size 1 at addr fff00000c473dcda by task kunit_try_catch/158
[   17.897754] 
[   17.897931] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.898169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.898207] Hardware name: linux,dummy-virt (DT)
[   17.898266] Call trace:
[   17.898288]  show_stack+0x20/0x38 (C)
[   17.898671]  dump_stack_lvl+0x8c/0xd0
[   17.898806]  print_report+0x118/0x608
[   17.898950]  kasan_report+0xdc/0x128
[   17.899106]  __asan_report_store1_noabort+0x20/0x30
[   17.899233]  krealloc_less_oob_helper+0xa80/0xc50
[   17.899305]  krealloc_less_oob+0x20/0x38
[   17.899640]  kunit_try_run_case+0x170/0x3f0
[   17.899750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.899861]  kthread+0x328/0x630
[   17.900064]  ret_from_fork+0x10/0x20
[   17.900153] 
[   17.900186] Allocated by task 158:
[   17.900426]  kasan_save_stack+0x3c/0x68
[   17.900514]  kasan_save_track+0x20/0x40
[   17.900581]  kasan_save_alloc_info+0x40/0x58
[   17.900983]  __kasan_krealloc+0x118/0x178
[   17.901101]  krealloc_noprof+0x128/0x360
[   17.901256]  krealloc_less_oob_helper+0x168/0xc50
[   17.901422]  krealloc_less_oob+0x20/0x38
[   17.901531]  kunit_try_run_case+0x170/0x3f0
[   17.901935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.902091]  kthread+0x328/0x630
[   17.902334]  ret_from_fork+0x10/0x20
[   17.902537] 
[   17.902588] The buggy address belongs to the object at fff00000c473dc00
[   17.902588]  which belongs to the cache kmalloc-256 of size 256
[   17.903028] The buggy address is located 17 bytes to the right of
[   17.903028]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.903166] 
[   17.903305] The buggy address belongs to the physical page:
[   17.903376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.903546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.903604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.903692] page_type: f5(slab)
[   17.903963] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.904121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.904866] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.904940] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.905023] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.905099] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.905231] page dumped because: kasan: bad access detected
[   17.905263] 
[   17.905466] Memory state around the buggy address:
[   17.905731]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906213]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.906258] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.906295]                                                     ^
[   17.906330]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906858]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906915] ==================================================================
[   17.952860] ==================================================================
[   17.952940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.953016] Write of size 1 at addr fff00000c77560d0 by task kunit_try_catch/162
[   17.953082] 
[   17.953383] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.953560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.953618] Hardware name: linux,dummy-virt (DT)
[   17.953676] Call trace:
[   17.953770]  show_stack+0x20/0x38 (C)
[   17.953845]  dump_stack_lvl+0x8c/0xd0
[   17.953957]  print_report+0x118/0x608
[   17.954077]  kasan_report+0xdc/0x128
[   17.954253]  __asan_report_store1_noabort+0x20/0x30
[   17.954429]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.954675]  krealloc_large_less_oob+0x20/0x38
[   17.954786]  kunit_try_run_case+0x170/0x3f0
[   17.954935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.954988]  kthread+0x328/0x630
[   17.955290]  ret_from_fork+0x10/0x20
[   17.955420] 
[   17.955465] The buggy address belongs to the physical page:
[   17.955710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.955808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.955913] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.956224] page_type: f8(unknown)
[   17.956286] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.956483] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.956636] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.956743] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.956848] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.956934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.957765] page dumped because: kasan: bad access detected
[   17.957809] 
[   17.957827] Memory state around the buggy address:
[   17.957865]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957907]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.957950] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.957988]                                                  ^
[   17.958023]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.958064]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.958100] ==================================================================
[   17.890012] ==================================================================
[   17.890057] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.890420] Write of size 1 at addr fff00000c473dcd0 by task kunit_try_catch/158
[   17.890593] 
[   17.890632] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.890813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.890841] Hardware name: linux,dummy-virt (DT)
[   17.891124] Call trace:
[   17.891195]  show_stack+0x20/0x38 (C)
[   17.891314]  dump_stack_lvl+0x8c/0xd0
[   17.891400]  print_report+0x118/0x608
[   17.891511]  kasan_report+0xdc/0x128
[   17.891673]  __asan_report_store1_noabort+0x20/0x30
[   17.891810]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.892246]  krealloc_less_oob+0x20/0x38
[   17.892329]  kunit_try_run_case+0x170/0x3f0
[   17.892524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892735]  kthread+0x328/0x630
[   17.892819]  ret_from_fork+0x10/0x20
[   17.892989] 
[   17.893172] Allocated by task 158:
[   17.893231]  kasan_save_stack+0x3c/0x68
[   17.893385]  kasan_save_track+0x20/0x40
[   17.893582]  kasan_save_alloc_info+0x40/0x58
[   17.893681]  __kasan_krealloc+0x118/0x178
[   17.893859]  krealloc_noprof+0x128/0x360
[   17.893899]  krealloc_less_oob_helper+0x168/0xc50
[   17.893960]  krealloc_less_oob+0x20/0x38
[   17.893998]  kunit_try_run_case+0x170/0x3f0
[   17.894319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.894479]  kthread+0x328/0x630
[   17.894589]  ret_from_fork+0x10/0x20
[   17.894711] 
[   17.894805] The buggy address belongs to the object at fff00000c473dc00
[   17.894805]  which belongs to the cache kmalloc-256 of size 256
[   17.894940] The buggy address is located 7 bytes to the right of
[   17.894940]  allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9)
[   17.895003] 
[   17.895022] The buggy address belongs to the physical page:
[   17.895420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.895657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.895726] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.895789] page_type: f5(slab)
[   17.895835] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895946] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.896002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.896050] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.896106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.896166] page dumped because: kasan: bad access detected
[   17.896205] 
[   17.896223] Memory state around the buggy address:
[   17.896261]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896301]  fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.896349] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.896384]                                                  ^
[   17.896434]  fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896474]  fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[   17.863372] ==================================================================
[   17.863493] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.863545] Write of size 1 at addr fff00000c473daf0 by task kunit_try_catch/156
[   17.863648] 
[   17.863720] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.863803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.864135] Hardware name: linux,dummy-virt (DT)
[   17.864222] Call trace:
[   17.864253]  show_stack+0x20/0x38 (C)
[   17.864306]  dump_stack_lvl+0x8c/0xd0
[   17.864428]  print_report+0x118/0x608
[   17.864518]  kasan_report+0xdc/0x128
[   17.864625]  __asan_report_store1_noabort+0x20/0x30
[   17.864679]  krealloc_more_oob_helper+0x5c0/0x678
[   17.864763]  krealloc_more_oob+0x20/0x38
[   17.865071]  kunit_try_run_case+0x170/0x3f0
[   17.865151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.865306]  kthread+0x328/0x630
[   17.865358]  ret_from_fork+0x10/0x20
[   17.865415] 
[   17.865492] Allocated by task 156:
[   17.865540]  kasan_save_stack+0x3c/0x68
[   17.865629]  kasan_save_track+0x20/0x40
[   17.865665]  kasan_save_alloc_info+0x40/0x58
[   17.865702]  __kasan_krealloc+0x118/0x178
[   17.865916]  krealloc_noprof+0x128/0x360
[   17.865964]  krealloc_more_oob_helper+0x168/0x678
[   17.866209]  krealloc_more_oob+0x20/0x38
[   17.866376]  kunit_try_run_case+0x170/0x3f0
[   17.866518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866606]  kthread+0x328/0x630
[   17.866803]  ret_from_fork+0x10/0x20
[   17.866949] 
[   17.866971] The buggy address belongs to the object at fff00000c473da00
[   17.866971]  which belongs to the cache kmalloc-256 of size 256
[   17.867355] The buggy address is located 5 bytes to the right of
[   17.867355]  allocated 235-byte region [fff00000c473da00, fff00000c473daeb)
[   17.867493] 
[   17.867570] The buggy address belongs to the physical page:
[   17.867686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.867782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.867873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.868199] page_type: f5(slab)
[   17.868269] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.868423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.868646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.868748] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.869208] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.869483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.869623] page dumped because: kasan: bad access detected
[   17.869655] 
[   17.869818] Memory state around the buggy address:
[   17.869972]  fff00000c473d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870052]  fff00000c473da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.870110] >fff00000c473da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.870147]                                                              ^
[   17.870243]  fff00000c473db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870609]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870694] ==================================================================
[   17.852844] ==================================================================
[   17.852899] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.852951] Write of size 1 at addr fff00000c473daeb by task kunit_try_catch/156
[   17.852999] 
[   17.853031] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.853113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.853139] Hardware name: linux,dummy-virt (DT)
[   17.853733] Call trace:
[   17.854281]  show_stack+0x20/0x38 (C)
[   17.854373]  dump_stack_lvl+0x8c/0xd0
[   17.854442]  print_report+0x118/0x608
[   17.854515]  kasan_report+0xdc/0x128
[   17.854595]  __asan_report_store1_noabort+0x20/0x30
[   17.854666]  krealloc_more_oob_helper+0x60c/0x678
[   17.854747]  krealloc_more_oob+0x20/0x38
[   17.855071]  kunit_try_run_case+0x170/0x3f0
[   17.855149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.855295]  kthread+0x328/0x630
[   17.855379]  ret_from_fork+0x10/0x20
[   17.855751] 
[   17.855799] Allocated by task 156:
[   17.855861]  kasan_save_stack+0x3c/0x68
[   17.855924]  kasan_save_track+0x20/0x40
[   17.856059]  kasan_save_alloc_info+0x40/0x58
[   17.856206]  __kasan_krealloc+0x118/0x178
[   17.856340]  krealloc_noprof+0x128/0x360
[   17.856434]  krealloc_more_oob_helper+0x168/0x678
[   17.856743]  krealloc_more_oob+0x20/0x38
[   17.856813]  kunit_try_run_case+0x170/0x3f0
[   17.856885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.856974]  kthread+0x328/0x630
[   17.857093]  ret_from_fork+0x10/0x20
[   17.857146] 
[   17.857176] The buggy address belongs to the object at fff00000c473da00
[   17.857176]  which belongs to the cache kmalloc-256 of size 256
[   17.857483] The buggy address is located 0 bytes to the right of
[   17.857483]  allocated 235-byte region [fff00000c473da00, fff00000c473daeb)
[   17.857917] 
[   17.858015] The buggy address belongs to the physical page:
[   17.858180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c
[   17.858238] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.858311] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.858672] page_type: f5(slab)
[   17.858767] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.858876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.859057] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.859243] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.859320] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff
[   17.859382] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.859700] page dumped because: kasan: bad access detected
[   17.859785] 
[   17.859923] Memory state around the buggy address:
[   17.860108]  fff00000c473d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.860241]  fff00000c473da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.860323] >fff00000c473da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.860366]                                                           ^
[   17.860760]  fff00000c473db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.860856]  fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.860957] ==================================================================
[   17.929018] ==================================================================
[   17.929073] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.929141] Write of size 1 at addr fff00000c77560f0 by task kunit_try_catch/160
[   17.929630] 
[   17.929675] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.930108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.930237] Hardware name: linux,dummy-virt (DT)
[   17.930286] Call trace:
[   17.930308]  show_stack+0x20/0x38 (C)
[   17.930608]  dump_stack_lvl+0x8c/0xd0
[   17.930717]  print_report+0x118/0x608
[   17.930886]  kasan_report+0xdc/0x128
[   17.931079]  __asan_report_store1_noabort+0x20/0x30
[   17.931693]  krealloc_more_oob_helper+0x5c0/0x678
[   17.931760]  krealloc_large_more_oob+0x20/0x38
[   17.932220]  kunit_try_run_case+0x170/0x3f0
[   17.932570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.932651]  kthread+0x328/0x630
[   17.932922]  ret_from_fork+0x10/0x20
[   17.933111] 
[   17.933223] The buggy address belongs to the physical page:
[   17.933273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.933536] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.933827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.934204] page_type: f8(unknown)
[   17.934342] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.934548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.934600] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.934648] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.934695] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.934750] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.934790] page dumped because: kasan: bad access detected
[   17.934820] 
[   17.934838] Memory state around the buggy address:
[   17.935029]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.935388]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.935450] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.935574]                                                              ^
[   17.935704]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.935788]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.935892] ==================================================================
[   17.921767] ==================================================================
[   17.922058] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.922115] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/160
[   17.922424] 
[   17.922591] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.922754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.922845] Hardware name: linux,dummy-virt (DT)
[   17.922987] Call trace:
[   17.923078]  show_stack+0x20/0x38 (C)
[   17.923396]  dump_stack_lvl+0x8c/0xd0
[   17.923448]  print_report+0x118/0x608
[   17.923778]  kasan_report+0xdc/0x128
[   17.923859]  __asan_report_store1_noabort+0x20/0x30
[   17.923993]  krealloc_more_oob_helper+0x60c/0x678
[   17.924173]  krealloc_large_more_oob+0x20/0x38
[   17.924294]  kunit_try_run_case+0x170/0x3f0
[   17.924410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.924500]  kthread+0x328/0x630
[   17.924855]  ret_from_fork+0x10/0x20
[   17.924939] 
[   17.924990] The buggy address belongs to the physical page:
[   17.925148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754
[   17.925240] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.925509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.925879] page_type: f8(unknown)
[   17.925956] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.926038] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.926227] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.926305] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.926560] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff
[   17.926638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.926828] page dumped because: kasan: bad access detected
[   17.927071] 
[   17.927212] Memory state around the buggy address:
[   17.927298]  fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.927343]  fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.927755] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.927841]                                                           ^
[   17.927915]  fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.927963]  fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.927999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[   17.839457] ==================================================================
[   17.839518] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.839637] Read of size 1 at addr fff00000c77a0000 by task kunit_try_catch/154
[   17.839689] 
[   17.839751] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.840090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.840123] Hardware name: linux,dummy-virt (DT)
[   17.840370] Call trace:
[   17.840427]  show_stack+0x20/0x38 (C)
[   17.840519]  dump_stack_lvl+0x8c/0xd0
[   17.840573]  print_report+0x118/0x608
[   17.840700]  kasan_report+0xdc/0x128
[   17.840792]  __asan_report_load1_noabort+0x20/0x30
[   17.840845]  page_alloc_uaf+0x328/0x350
[   17.840890]  kunit_try_run_case+0x170/0x3f0
[   17.840992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.841047]  kthread+0x328/0x630
[   17.841092]  ret_from_fork+0x10/0x20
[   17.841206] 
[   17.841273] The buggy address belongs to the physical page:
[   17.841512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0
[   17.841583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.842042] page_type: f0(buddy)
[   17.842126] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   17.842318] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   17.842420] page dumped because: kasan: bad access detected
[   17.842490] 
[   17.842509] Memory state around the buggy address:
[   17.842542]  fff00000c779ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.842881]  fff00000c779ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.842939] >fff00000c77a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.843396]                    ^
[   17.843435]  fff00000c77a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.843741]  fff00000c77a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.844056] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
[   17.811626] ==================================================================
[   17.811714] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.811771] Free of addr fff00000c67ec001 by task kunit_try_catch/150
[   17.811825] 
[   17.811943] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.812183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.812208] Hardware name: linux,dummy-virt (DT)
[   17.812237] Call trace:
[   17.812823]  show_stack+0x20/0x38 (C)
[   17.812952]  dump_stack_lvl+0x8c/0xd0
[   17.813023]  print_report+0x118/0x608
[   17.813095]  kasan_report_invalid_free+0xc0/0xe8
[   17.814198]  __kasan_kfree_large+0x5c/0xa8
[   17.814285]  free_large_kmalloc+0x64/0x190
[   17.814332]  kfree+0x270/0x3c8
[   17.814373]  kmalloc_large_invalid_free+0x108/0x270
[   17.814421]  kunit_try_run_case+0x170/0x3f0
[   17.814470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.814522]  kthread+0x328/0x630
[   17.814569]  ret_from_fork+0x10/0x20
[   17.814617] 
[   17.814638] The buggy address belongs to the physical page:
[   17.814668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec
[   17.814718] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.814767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.815212] page_type: f8(unknown)
[   17.815252] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.815299] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.815941] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.815997] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.816044] head: 0bfffe0000000002 ffffc1ffc319fb01 00000000ffffffff 00000000ffffffff
[   17.816090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.816130] page dumped because: kasan: bad access detected
[   17.816176] 
[   17.816194] Memory state around the buggy address:
[   17.816224]  fff00000c67ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816264]  fff00000c67ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816364] >fff00000c67ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.816404]                    ^
[   17.816432]  fff00000c67ec080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.816473]  fff00000c67ec100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.816522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[   17.801723] ==================================================================
[   17.801868] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.802117] Read of size 1 at addr fff00000c67ec000 by task kunit_try_catch/148
[   17.802275] 
[   17.802305] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.802471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.802543] Hardware name: linux,dummy-virt (DT)
[   17.802579] Call trace:
[   17.802678]  show_stack+0x20/0x38 (C)
[   17.802763]  dump_stack_lvl+0x8c/0xd0
[   17.802808]  print_report+0x118/0x608
[   17.802872]  kasan_report+0xdc/0x128
[   17.802916]  __asan_report_load1_noabort+0x20/0x30
[   17.802965]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.803008]  kunit_try_run_case+0x170/0x3f0
[   17.803317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.803382]  kthread+0x328/0x630
[   17.803586]  ret_from_fork+0x10/0x20
[   17.803637] 
[   17.803676] The buggy address belongs to the physical page:
[   17.803705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec
[   17.803776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.803898] raw: 0bfffe0000000000 fff00000da478c00 fff00000da478c00 0000000000000000
[   17.804023] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.804133] page dumped because: kasan: bad access detected
[   17.804206] 
[   17.804224] Memory state around the buggy address:
[   17.804254]  fff00000c67ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804304]  fff00000c67ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804448] >fff00000c67ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.804541]                    ^
[   17.804596]  fff00000c67ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.804635]  fff00000c67ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.804671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[   17.791999] ==================================================================
[   17.792063] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.792420] Write of size 1 at addr fff00000c67ee00a by task kunit_try_catch/146
[   17.792492] 
[   17.792531] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.792655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.792680] Hardware name: linux,dummy-virt (DT)
[   17.792709] Call trace:
[   17.792730]  show_stack+0x20/0x38 (C)
[   17.792777]  dump_stack_lvl+0x8c/0xd0
[   17.792881]  print_report+0x118/0x608
[   17.792930]  kasan_report+0xdc/0x128
[   17.793050]  __asan_report_store1_noabort+0x20/0x30
[   17.793208]  kmalloc_large_oob_right+0x278/0x2b8
[   17.793255]  kunit_try_run_case+0x170/0x3f0
[   17.793299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.793349]  kthread+0x328/0x630
[   17.793395]  ret_from_fork+0x10/0x20
[   17.793441] 
[   17.793476] The buggy address belongs to the physical page:
[   17.793507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec
[   17.793556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.793600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.793654] page_type: f8(unknown)
[   17.793691] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.793854] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.793978] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.794050] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.794098] head: 0bfffe0000000002 ffffc1ffc319fb01 00000000ffffffff 00000000ffffffff
[   17.794144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.794195] page dumped because: kasan: bad access detected
[   17.794277] 
[   17.794296] Memory state around the buggy address:
[   17.794338]  fff00000c67edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.794378]  fff00000c67edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.794418] >fff00000c67ee000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.794454]                       ^
[   17.794481]  fff00000c67ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.794536]  fff00000c67ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.794635] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[   17.778644] ==================================================================
[   17.778955] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.779221] Write of size 1 at addr fff00000c683df00 by task kunit_try_catch/144
[   17.779342] 
[   17.779371] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.779494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.780076] Hardware name: linux,dummy-virt (DT)
[   17.780153] Call trace:
[   17.780186]  show_stack+0x20/0x38 (C)
[   17.780237]  dump_stack_lvl+0x8c/0xd0
[   17.780735]  print_report+0x118/0x608
[   17.780842]  kasan_report+0xdc/0x128
[   17.780939]  __asan_report_store1_noabort+0x20/0x30
[   17.781192]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.781291]  kunit_try_run_case+0x170/0x3f0
[   17.781340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.781391]  kthread+0x328/0x630
[   17.781482]  ret_from_fork+0x10/0x20
[   17.781575] 
[   17.781653] Allocated by task 144:
[   17.781679]  kasan_save_stack+0x3c/0x68
[   17.781719]  kasan_save_track+0x20/0x40
[   17.781798]  kasan_save_alloc_info+0x40/0x58
[   17.781837]  __kasan_kmalloc+0xd4/0xd8
[   17.782364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.782422]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.782595]  kunit_try_run_case+0x170/0x3f0
[   17.782636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.782840]  kthread+0x328/0x630
[   17.782919]  ret_from_fork+0x10/0x20
[   17.782995] 
[   17.783015] The buggy address belongs to the object at fff00000c683c000
[   17.783015]  which belongs to the cache kmalloc-8k of size 8192
[   17.783350] The buggy address is located 0 bytes to the right of
[   17.783350]  allocated 7936-byte region [fff00000c683c000, fff00000c683df00)
[   17.783533] 
[   17.783556] The buggy address belongs to the physical page:
[   17.783586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106838
[   17.783637] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.783863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.783997] page_type: f5(slab)
[   17.784039] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.784090] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.784138] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.784199] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.784247] head: 0bfffe0000000003 ffffc1ffc31a0e01 00000000ffffffff 00000000ffffffff
[   17.784293] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.784331] page dumped because: kasan: bad access detected
[   17.784953] 
[   17.784976] Memory state around the buggy address:
[   17.785078]  fff00000c683de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.785142]  fff00000c683de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.785192] >fff00000c683df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.785256]                    ^
[   17.785406]  fff00000c683df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.785464]  fff00000c683e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.785581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[   17.766684] ==================================================================
[   17.766737] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.766785] Write of size 1 at addr fff00000c68f1178 by task kunit_try_catch/142
[   17.766831] 
[   17.766860] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.766940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766966] Hardware name: linux,dummy-virt (DT)
[   17.766995] Call trace:
[   17.767244]  show_stack+0x20/0x38 (C)
[   17.767937]  dump_stack_lvl+0x8c/0xd0
[   17.768180]  print_report+0x118/0x608
[   17.768228]  kasan_report+0xdc/0x128
[   17.768626]  __asan_report_store1_noabort+0x20/0x30
[   17.768879]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.768930]  kunit_try_run_case+0x170/0x3f0
[   17.768976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.769822]  kthread+0x328/0x630
[   17.770046]  ret_from_fork+0x10/0x20
[   17.770189] 
[   17.770208] Allocated by task 142:
[   17.770245]  kasan_save_stack+0x3c/0x68
[   17.770371]  kasan_save_track+0x20/0x40
[   17.770408]  kasan_save_alloc_info+0x40/0x58
[   17.770446]  __kasan_kmalloc+0xd4/0xd8
[   17.770480]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.770756]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.770872]  kunit_try_run_case+0x170/0x3f0
[   17.770950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.770991]  kthread+0x328/0x630
[   17.771025]  ret_from_fork+0x10/0x20
[   17.771060] 
[   17.771079] The buggy address belongs to the object at fff00000c68f1100
[   17.771079]  which belongs to the cache kmalloc-128 of size 128
[   17.771134] The buggy address is located 0 bytes to the right of
[   17.771134]  allocated 120-byte region [fff00000c68f1100, fff00000c68f1178)
[   17.771215] 
[   17.771234] The buggy address belongs to the physical page:
[   17.771262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   17.771580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.771629] page_type: f5(slab)
[   17.771875] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.772225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.772272] page dumped because: kasan: bad access detected
[   17.772426] 
[   17.772469] Memory state around the buggy address:
[   17.772564]  fff00000c68f1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.772615]  fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772714] >fff00000c68f1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.772802]                                                                 ^
[   17.772876]  fff00000c68f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772950]  fff00000c68f1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773041] ==================================================================
[   17.763476] ==================================================================
[   17.763544] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.763602] Write of size 1 at addr fff00000c68f1078 by task kunit_try_catch/142
[   17.763650] 
[   17.763686] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.763769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.763795] Hardware name: linux,dummy-virt (DT)
[   17.763825] Call trace:
[   17.763848]  show_stack+0x20/0x38 (C)
[   17.763896]  dump_stack_lvl+0x8c/0xd0
[   17.763942]  print_report+0x118/0x608
[   17.763987]  kasan_report+0xdc/0x128
[   17.764032]  __asan_report_store1_noabort+0x20/0x30
[   17.764082]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.764130]  kunit_try_run_case+0x170/0x3f0
[   17.764204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.764255]  kthread+0x328/0x630
[   17.764334]  ret_from_fork+0x10/0x20
[   17.764383] 
[   17.764414] Allocated by task 142:
[   17.764441]  kasan_save_stack+0x3c/0x68
[   17.764480]  kasan_save_track+0x20/0x40
[   17.764515]  kasan_save_alloc_info+0x40/0x58
[   17.764553]  __kasan_kmalloc+0xd4/0xd8
[   17.764605]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.764662]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.764715]  kunit_try_run_case+0x170/0x3f0
[   17.764749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.764790]  kthread+0x328/0x630
[   17.764824]  ret_from_fork+0x10/0x20
[   17.764858] 
[   17.764876] The buggy address belongs to the object at fff00000c68f1000
[   17.764876]  which belongs to the cache kmalloc-128 of size 128
[   17.764930] The buggy address is located 0 bytes to the right of
[   17.764930]  allocated 120-byte region [fff00000c68f1000, fff00000c68f1078)
[   17.764990] 
[   17.765009] The buggy address belongs to the physical page:
[   17.765039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   17.765090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.765139] page_type: f5(slab)
[   17.765186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.765235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.765274] page dumped because: kasan: bad access detected
[   17.765303] 
[   17.765321] Memory state around the buggy address:
[   17.765351]  fff00000c68f0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.765393]  fff00000c68f0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.765433] >fff00000c68f1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.765469]                                                                 ^
[   17.765507]  fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.765548]  fff00000c68f1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.765585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[   17.729303] ==================================================================
[   17.729368] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.729421] Read of size 1 at addr fff00000c67b7000 by task kunit_try_catch/140
[   17.729467] 
[   17.729501] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.730680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.730733] Hardware name: linux,dummy-virt (DT)
[   17.730778] Call trace:
[   17.730801]  show_stack+0x20/0x38 (C)
[   17.731107]  dump_stack_lvl+0x8c/0xd0
[   17.731238]  print_report+0x118/0x608
[   17.731288]  kasan_report+0xdc/0x128
[   17.731333]  __asan_report_load1_noabort+0x20/0x30
[   17.731382]  kmalloc_node_oob_right+0x2f4/0x330
[   17.731428]  kunit_try_run_case+0x170/0x3f0
[   17.731474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.731524]  kthread+0x328/0x630
[   17.731569]  ret_from_fork+0x10/0x20
[   17.731615] 
[   17.731634] Allocated by task 140:
[   17.731786]  kasan_save_stack+0x3c/0x68
[   17.731890]  kasan_save_track+0x20/0x40
[   17.731955]  kasan_save_alloc_info+0x40/0x58
[   17.732269]  __kasan_kmalloc+0xd4/0xd8
[   17.732309]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   17.732356]  kmalloc_node_oob_right+0xbc/0x330
[   17.732392]  kunit_try_run_case+0x170/0x3f0
[   17.732805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.733310]  kthread+0x328/0x630
[   17.733375]  ret_from_fork+0x10/0x20
[   17.733419] 
[   17.734021] The buggy address belongs to the object at fff00000c67b6000
[   17.734021]  which belongs to the cache kmalloc-4k of size 4096
[   17.734650] The buggy address is located 0 bytes to the right of
[   17.734650]  allocated 4096-byte region [fff00000c67b6000, fff00000c67b7000)
[   17.735112] 
[   17.735134] The buggy address belongs to the physical page:
[   17.735354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067b0
[   17.736335] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.736512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.736946] page_type: f5(slab)
[   17.737145] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.737339] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.737615] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.737666] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.738088] head: 0bfffe0000000003 ffffc1ffc319ec01 00000000ffffffff 00000000ffffffff
[   17.738524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.738580] page dumped because: kasan: bad access detected
[   17.738621] 
[   17.738639] Memory state around the buggy address:
[   17.738934]  fff00000c67b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.739677]  fff00000c67b6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.739769] >fff00000c67b7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740084]                    ^
[   17.740191]  fff00000c67b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740234]  fff00000c67b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740272] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[   17.701877] ==================================================================
[   17.701947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.702004] Read of size 1 at addr fff00000c5ccd25f by task kunit_try_catch/138
[   17.702060] 
[   17.702095] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.702186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.702212] Hardware name: linux,dummy-virt (DT)
[   17.702243] Call trace:
[   17.702265]  show_stack+0x20/0x38 (C)
[   17.702313]  dump_stack_lvl+0x8c/0xd0
[   17.702359]  print_report+0x118/0x608
[   17.702406]  kasan_report+0xdc/0x128
[   17.702451]  __asan_report_load1_noabort+0x20/0x30
[   17.702500]  kmalloc_oob_left+0x2ec/0x320
[   17.702544]  kunit_try_run_case+0x170/0x3f0
[   17.702590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.702640]  kthread+0x328/0x630
[   17.705832]  ret_from_fork+0x10/0x20
[   17.706261] 
[   17.706336] Allocated by task 24:
[   17.706368]  kasan_save_stack+0x3c/0x68
[   17.707039]  kasan_save_track+0x20/0x40
[   17.707165]  kasan_save_alloc_info+0x40/0x58
[   17.707208]  __kasan_kmalloc+0xd4/0xd8
[   17.707244]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.708118]  kvasprintf+0xe0/0x180
[   17.708373]  __kthread_create_on_node+0x16c/0x350
[   17.708413]  kthread_create_on_node+0xe4/0x130
[   17.708449]  create_worker+0x380/0x6b8
[   17.709085]  worker_thread+0x5dc/0xf28
[   17.709552]  kthread+0x328/0x630
[   17.709779]  ret_from_fork+0x10/0x20
[   17.709822] 
[   17.710144] The buggy address belongs to the object at fff00000c5ccd240
[   17.710144]  which belongs to the cache kmalloc-16 of size 16
[   17.710456] The buggy address is located 19 bytes to the right of
[   17.710456]  allocated 12-byte region [fff00000c5ccd240, fff00000c5ccd24c)
[   17.711146] 
[   17.711418] The buggy address belongs to the physical page:
[   17.711581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd
[   17.711905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.712362] page_type: f5(slab)
[   17.712522] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.713592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.713768] page dumped because: kasan: bad access detected
[   17.713954] 
[   17.714092] Memory state around the buggy address:
[   17.714125]  fff00000c5ccd100: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   17.714444]  fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.714489] >fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   17.714525]                                                     ^
[   17.714561]  fff00000c5ccd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714600]  fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[   17.638709] ==================================================================
[   17.638755] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.638800] Write of size 1 at addr fff00000c5c44f78 by task kunit_try_catch/136
[   17.638846] 
[   17.638874] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.638967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.638992] Hardware name: linux,dummy-virt (DT)
[   17.639020] Call trace:
[   17.639041]  show_stack+0x20/0x38 (C)
[   17.639954]  dump_stack_lvl+0x8c/0xd0
[   17.640025]  print_report+0x118/0x608
[   17.640399]  kasan_report+0xdc/0x128
[   17.640495]  __asan_report_store1_noabort+0x20/0x30
[   17.640556]  kmalloc_oob_right+0x538/0x660
[   17.640768]  kunit_try_run_case+0x170/0x3f0
[   17.640897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.641061]  kthread+0x328/0x630
[   17.641112]  ret_from_fork+0x10/0x20
[   17.641172] 
[   17.641191] Allocated by task 136:
[   17.641219]  kasan_save_stack+0x3c/0x68
[   17.641258]  kasan_save_track+0x20/0x40
[   17.641294]  kasan_save_alloc_info+0x40/0x58
[   17.641331]  __kasan_kmalloc+0xd4/0xd8
[   17.641376]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.641417]  kmalloc_oob_right+0xb0/0x660
[   17.641697]  kunit_try_run_case+0x170/0x3f0
[   17.642050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.642320]  kthread+0x328/0x630
[   17.642363]  ret_from_fork+0x10/0x20
[   17.642883] 
[   17.643056] The buggy address belongs to the object at fff00000c5c44f00
[   17.643056]  which belongs to the cache kmalloc-128 of size 128
[   17.643600] The buggy address is located 5 bytes to the right of
[   17.643600]  allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73)
[   17.644315] 
[   17.644433] The buggy address belongs to the physical page:
[   17.644565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44
[   17.644892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.645471] page_type: f5(slab)
[   17.645518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.646109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.646461] page dumped because: kasan: bad access detected
[   17.647150] 
[   17.647475] Memory state around the buggy address:
[   17.647554]  fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.647865]  fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.647909] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.647946]                                                                 ^
[   17.648313]  fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.649058]  fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.649947] ==================================================================
[   17.655673] ==================================================================
[   17.655805] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.655855] Read of size 1 at addr fff00000c5c44f80 by task kunit_try_catch/136
[   17.655907] 
[   17.655940] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.657134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.657342] Hardware name: linux,dummy-virt (DT)
[   17.657696] Call trace:
[   17.658226]  show_stack+0x20/0x38 (C)
[   17.658796]  dump_stack_lvl+0x8c/0xd0
[   17.659551]  print_report+0x118/0x608
[   17.659921]  kasan_report+0xdc/0x128
[   17.660390]  __asan_report_load1_noabort+0x20/0x30
[   17.660931]  kmalloc_oob_right+0x5d0/0x660
[   17.661318]  kunit_try_run_case+0x170/0x3f0
[   17.662113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.662307]  kthread+0x328/0x630
[   17.662888]  ret_from_fork+0x10/0x20
[   17.663569] 
[   17.663685] Allocated by task 136:
[   17.663715]  kasan_save_stack+0x3c/0x68
[   17.663770]  kasan_save_track+0x20/0x40
[   17.663807]  kasan_save_alloc_info+0x40/0x58
[   17.663844]  __kasan_kmalloc+0xd4/0xd8
[   17.664752]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.664802]  kmalloc_oob_right+0xb0/0x660
[   17.664838]  kunit_try_run_case+0x170/0x3f0
[   17.665563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.665662]  kthread+0x328/0x630
[   17.665764]  ret_from_fork+0x10/0x20
[   17.666135] 
[   17.666389] The buggy address belongs to the object at fff00000c5c44f00
[   17.666389]  which belongs to the cache kmalloc-128 of size 128
[   17.667080] The buggy address is located 13 bytes to the right of
[   17.667080]  allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73)
[   17.667763] 
[   17.667788] The buggy address belongs to the physical page:
[   17.668540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44
[   17.668786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.668844] page_type: f5(slab)
[   17.668898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.669976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.670663] page dumped because: kasan: bad access detected
[   17.670869] 
[   17.670989] Memory state around the buggy address:
[   17.671023]  fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671066]  fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.671107] >fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671656]                    ^
[   17.672569]  fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.672661]  fff00000c5c45080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   17.672699] ==================================================================
[   17.626952] ==================================================================
[   17.627287] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.628085] Write of size 1 at addr fff00000c5c44f73 by task kunit_try_catch/136
[   17.628199] 
[   17.629072] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   17.629273] Tainted: [N]=TEST
[   17.629687] Hardware name: linux,dummy-virt (DT)
[   17.630323] Call trace:
[   17.630525]  show_stack+0x20/0x38 (C)
[   17.631347]  dump_stack_lvl+0x8c/0xd0
[   17.631770]  print_report+0x118/0x608
[   17.631968]  kasan_report+0xdc/0x128
[   17.632087]  __asan_report_store1_noabort+0x20/0x30
[   17.632250]  kmalloc_oob_right+0x5a4/0x660
[   17.632296]  kunit_try_run_case+0x170/0x3f0
[   17.632371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.632492]  kthread+0x328/0x630
[   17.632743]  ret_from_fork+0x10/0x20
[   17.633020] 
[   17.633082] Allocated by task 136:
[   17.633501]  kasan_save_stack+0x3c/0x68
[   17.633796]  kasan_save_track+0x20/0x40
[   17.633850]  kasan_save_alloc_info+0x40/0x58
[   17.633888]  __kasan_kmalloc+0xd4/0xd8
[   17.633937]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.633976]  kmalloc_oob_right+0xb0/0x660
[   17.634020]  kunit_try_run_case+0x170/0x3f0
[   17.634062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.634111]  kthread+0x328/0x630
[   17.634154]  ret_from_fork+0x10/0x20
[   17.634219] 
[   17.634303] The buggy address belongs to the object at fff00000c5c44f00
[   17.634303]  which belongs to the cache kmalloc-128 of size 128
[   17.634425] The buggy address is located 0 bytes to the right of
[   17.634425]  allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73)
[   17.634491] 
[   17.634574] The buggy address belongs to the physical page:
[   17.634986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44
[   17.635828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.636326] page_type: f5(slab)
[   17.636951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.637014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.637520] page dumped because: kasan: bad access detected
[   17.637568] 
[   17.637593] Memory state around the buggy address:
[   17.637832]  fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.637898]  fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.637950] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.638001]                                                              ^
[   17.638082]  fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.638123]  fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.638196] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------
[   95.807831] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.809533] Modules linked in:
[   95.810059] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   95.811324] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.811551] Hardware name: linux,dummy-virt (DT)
[   95.811750] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   95.812024] pc : intlog10+0x38/0x48
[   95.812222] lr : intlog10_test+0xe4/0x200
[   95.812411] sp : ffff8000820a7c10
[   95.812570] x29: ffff8000820a7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.812927] x26: 1ffe0000191d51a1 x25: 0000000000000000 x24: ffff8000820a7ce0
[   95.813575] x23: ffff8000820a7d00 x22: 0000000000000000 x21: 1ffff00010414f82
[   95.814517] x20: ffff950704478400 x19: ffff800080087990 x18: fff00000c10ebc30
[   95.815528] x17: 0000000067c0eb91 x16: fff00000c0975c3c x15: fff00000ff616b08
[   95.816311] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5c5 x12: ffff72a0e1061579
[   95.817068] x11: 1ffff2a0e1061578 x10: ffff72a0e1061578 x9 : ffff950701a20e84
[   95.817868] x8 : ffff95070830abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.818621] x5 : ffff700010414f82 x4 : 1ffff00010010f3a x3 : 1ffff2a0e088f080
[   95.819372] x2 : 1ffff2a0e088f080 x1 : 0000000000000003 x0 : 0000000000000000
[   95.820121] Call trace:
[   95.820425]  intlog10+0x38/0x48 (P)
[   95.820826]  kunit_try_run_case+0x170/0x3f0
[   95.821277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.821887]  kthread+0x328/0x630
[   95.822384]  ret_from_fork+0x10/0x20
[   95.822888] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------
[   95.756894] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   95.759030] Modules linked in:
[   95.759716] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   95.760853] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   95.761072] Hardware name: linux,dummy-virt (DT)
[   95.761739] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   95.762829] pc : intlog2+0xd8/0xf8
[   95.763295] lr : intlog2_test+0xe4/0x200
[   95.763928] sp : ffff8000820a7c10
[   95.764417] x29: ffff8000820a7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.765213] x26: 1ffe0000182e4661 x25: 0000000000000000 x24: ffff8000820a7ce0
[   95.766168] x23: ffff8000820a7d00 x22: 0000000000000000 x21: 1ffff00010414f82
[   95.766988] x20: ffff950704478300 x19: ffff800080087990 x18: 00000000f82703a8
[   95.767349] x17: 00000000b72a11d1 x16: 0000000000000100 x15: 00000000005fc93d
[   95.767683] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e981 x12: ffff72a0e1061579
[   95.768015] x11: 1ffff2a0e1061578 x10: ffff72a0e1061578 x9 : ffff950701a21084
[   95.769121] x8 : ffff95070830abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.770279] x5 : ffff700010414f82 x4 : 1ffff00010010f3a x3 : 1ffff2a0e088f060
[   95.771479] x2 : 1ffff2a0e088f060 x1 : 0000000000000003 x0 : 0000000000000000
[   95.772393] Call trace:
[   95.772897]  intlog2+0xd8/0xf8 (P)
[   95.773499]  kunit_try_run_case+0x170/0x3f0
[   95.774059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.774843]  kthread+0x328/0x630
[   95.775363]  ret_from_fork+0x10/0x20
[   95.775845] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_test_ratelimit_smoke KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
<8>[  263.203859] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>