Hay
Date
May 26, 2025, 9:10 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   16.764230] ==================================================================
[   16.764662] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.765597] Write of size 1 at addr fff00000c3ef0a73 by task kunit_try_catch/136
[   16.765714] 
[   16.767069] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.767407] Tainted: [N]=TEST
[   16.767480] Hardware name: linux,dummy-virt (DT)
[   16.767803] Call trace:
[   16.767999]  show_stack+0x20/0x38 (C)
[   16.768165]  dump_stack_lvl+0x8c/0xd0
[   16.768248]  print_report+0x118/0x608
[   16.768308]  kasan_report+0xdc/0x128
[   16.768391]  __asan_report_store1_noabort+0x20/0x30
[   16.768458]  kmalloc_oob_right+0x5a4/0x660
[   16.768520]  kunit_try_run_case+0x170/0x3f0
[   16.768583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.768643]  kthread+0x328/0x630
[   16.768695]  ret_from_fork+0x10/0x20
[   16.768870] 
[   16.768913] Allocated by task 136:
[   16.769093]  kasan_save_stack+0x3c/0x68
[   16.769169]  kasan_save_track+0x20/0x40
[   16.769207]  kasan_save_alloc_info+0x40/0x58
[   16.769245]  __kasan_kmalloc+0xd4/0xd8
[   16.769279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.769330]  kmalloc_oob_right+0xb0/0x660
[   16.769369]  kunit_try_run_case+0x170/0x3f0
[   16.769405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.769445]  kthread+0x328/0x630
[   16.769476]  ret_from_fork+0x10/0x20
[   16.769532] 
[   16.769597] The buggy address belongs to the object at fff00000c3ef0a00
[   16.769597]  which belongs to the cache kmalloc-128 of size 128
[   16.769696] The buggy address is located 0 bytes to the right of
[   16.769696]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.769759] 
[   16.769854] The buggy address belongs to the physical page:
[   16.770083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.770403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.770732] page_type: f5(slab)
[   16.771278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.771429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.771625] page dumped because: kasan: bad access detected
[   16.771709] 
[   16.771746] Memory state around the buggy address:
[   16.772007]  fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.772082]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772139] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.772195]                                                              ^
[   16.772283]  fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772351]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772422] ==================================================================
[   16.786382] ==================================================================
[   16.786479] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.786585] Read of size 1 at addr fff00000c3ef0a80 by task kunit_try_catch/136
[   16.786697] 
[   16.786996] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.787181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.787469] Hardware name: linux,dummy-virt (DT)
[   16.787537] Call trace:
[   16.787586]  show_stack+0x20/0x38 (C)
[   16.787698]  dump_stack_lvl+0x8c/0xd0
[   16.787821]  print_report+0x118/0x608
[   16.787943]  kasan_report+0xdc/0x128
[   16.788046]  __asan_report_load1_noabort+0x20/0x30
[   16.788211]  kmalloc_oob_right+0x5d0/0x660
[   16.788416]  kunit_try_run_case+0x170/0x3f0
[   16.788609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.788741]  kthread+0x328/0x630
[   16.789028]  ret_from_fork+0x10/0x20
[   16.789410] 
[   16.789455] Allocated by task 136:
[   16.789711]  kasan_save_stack+0x3c/0x68
[   16.789891]  kasan_save_track+0x20/0x40
[   16.789977]  kasan_save_alloc_info+0x40/0x58
[   16.790061]  __kasan_kmalloc+0xd4/0xd8
[   16.790456]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.790594]  kmalloc_oob_right+0xb0/0x660
[   16.790682]  kunit_try_run_case+0x170/0x3f0
[   16.790816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.790949]  kthread+0x328/0x630
[   16.791194]  ret_from_fork+0x10/0x20
[   16.791278] 
[   16.791316] The buggy address belongs to the object at fff00000c3ef0a00
[   16.791316]  which belongs to the cache kmalloc-128 of size 128
[   16.791429] The buggy address is located 13 bytes to the right of
[   16.791429]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.791551] 
[   16.791589] The buggy address belongs to the physical page:
[   16.791645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.792001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.792164] page_type: f5(slab)
[   16.792275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.792390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.792532] page dumped because: kasan: bad access detected
[   16.792639] 
[   16.792692] Memory state around the buggy address:
[   16.792760]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.792855]  fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.792947] >fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793031]                    ^
[   16.793092]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793189]  fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793307] ==================================================================
[   16.773787] ==================================================================
[   16.773868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.773971] Write of size 1 at addr fff00000c3ef0a78 by task kunit_try_catch/136
[   16.774076] 
[   16.774142] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.774332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.774392] Hardware name: linux,dummy-virt (DT)
[   16.774457] Call trace:
[   16.774508]  show_stack+0x20/0x38 (C)
[   16.774633]  dump_stack_lvl+0x8c/0xd0
[   16.774747]  print_report+0x118/0x608
[   16.774859]  kasan_report+0xdc/0x128
[   16.774971]  __asan_report_store1_noabort+0x20/0x30
[   16.775094]  kmalloc_oob_right+0x538/0x660
[   16.775208]  kunit_try_run_case+0x170/0x3f0
[   16.777881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.778105]  kthread+0x328/0x630
[   16.778616]  ret_from_fork+0x10/0x20
[   16.779103] 
[   16.779154] Allocated by task 136:
[   16.779211]  kasan_save_stack+0x3c/0x68
[   16.779596]  kasan_save_track+0x20/0x40
[   16.779905]  kasan_save_alloc_info+0x40/0x58
[   16.780017]  __kasan_kmalloc+0xd4/0xd8
[   16.780099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.780797]  kmalloc_oob_right+0xb0/0x660
[   16.781198]  kunit_try_run_case+0x170/0x3f0
[   16.781288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.781616]  kthread+0x328/0x630
[   16.781878]  ret_from_fork+0x10/0x20
[   16.781957] 
[   16.782423] The buggy address belongs to the object at fff00000c3ef0a00
[   16.782423]  which belongs to the cache kmalloc-128 of size 128
[   16.782575] The buggy address is located 5 bytes to the right of
[   16.782575]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.782959] 
[   16.783014] The buggy address belongs to the physical page:
[   16.783413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.783544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.783645] page_type: f5(slab)
[   16.784003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.784194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.784566] page dumped because: kasan: bad access detected
[   16.784822] 
[   16.785057] Memory state around the buggy address:
[   16.785368]  fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.785476]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785566] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.785654]                                                                 ^
[   16.785743]  fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785839]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785924] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   20.557603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   20.586796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   20.568635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   20.560893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure Automatically assigned
[   93.570458] Internal error: Oops: 0000000096000005 [#1]  SMP
[   93.577609] Modules linked in:
[   93.579087] CPU: 1 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   93.579726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   93.580120] Hardware name: linux,dummy-virt (DT)
[   93.580758] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   93.581342] pc : kunit_test_null_dereference+0x70/0x170
[   93.581753] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.582187] sp : ffff800082197d30
[   93.582591] x29: ffff800082197d90 x28: 0000000000000000 x27: 0000000000000000
[   93.583420] x26: 1ffe000018fad6a1 x25: 0000000000000000 x24: 0000000000000004
[   93.584080] x23: fff00000c7d6b50c x22: ffffa1327c855688 x21: fff00000c1cde008
[   93.584752] x20: 1ffff00010432fa6 x19: ffff800080087990 x18: fff00000c17653a8
[   93.585400] x17: 0000000000000001 x16: fff00000da466d28 x15: fff00000ff616b08
[   93.586059] x14: 0000000000018fff x13: 1ffe00001b48cd89 x12: fffd800018d1eb3c
[   93.586699] x11: 1ffe000018d1eb3b x10: fffd800018d1eb3b x9 : ffffa1327c84caf0
[   93.587389] x8 : ffff800082197c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   93.587911] x5 : ffff700010432fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   93.588581] x2 : dfff800000000000 x1 : fff00000c68f5100 x0 : ffff800080087990
[   93.589217] Call trace:
[   93.589503]  kunit_test_null_dereference+0x70/0x170 (P)
[   93.590014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.590467]  kthread+0x328/0x630
[   93.590759]  ret_from_fork+0x10/0x20
[   93.591528] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   93.592432] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   51.800025] ==================================================================
[   51.800143] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.800143] 
[   51.800257] Use-after-free read at 0x00000000456a4f77 (in kfence-#172):
[   51.800334]  test_krealloc+0x51c/0x830
[   51.800390]  kunit_try_run_case+0x170/0x3f0
[   51.800449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.800506]  kthread+0x328/0x630
[   51.800549]  ret_from_fork+0x10/0x20
[   51.800593] 
[   51.800625] kfence-#172: 0x00000000456a4f77-0x00000000d1cf39cf, size=32, cache=kmalloc-32
[   51.800625] 
[   51.800688] allocated by task 337 on cpu 1 at 51.799255s (0.001428s ago):
[   51.800764]  test_alloc+0x29c/0x628
[   51.800804]  test_krealloc+0xc0/0x830
[   51.800844]  kunit_try_run_case+0x170/0x3f0
[   51.800885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.800929]  kthread+0x328/0x630
[   51.800965]  ret_from_fork+0x10/0x20
[   51.801004] 
[   51.801029] freed by task 337 on cpu 1 at 51.799584s (0.001441s ago):
[   51.801091]  krealloc_noprof+0x148/0x360
[   51.801130]  test_krealloc+0x1dc/0x830
[   51.801168]  kunit_try_run_case+0x170/0x3f0
[   51.801207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.801249]  kthread+0x328/0x630
[   51.801284]  ret_from_fork+0x10/0x20
[   51.801332] 
[   51.801378] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   51.801461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.801493] Hardware name: linux,dummy-virt (DT)
[   51.801527] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   51.703801] ==================================================================
[   51.703922] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.703922] 
[   51.704036] Use-after-free read at 0x00000000a2c176bf (in kfence-#171):
[   51.704095]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.704144]  kunit_try_run_case+0x170/0x3f0
[   51.704191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.704236]  kthread+0x328/0x630
[   51.704273]  ret_from_fork+0x10/0x20
[   51.704312] 
[   51.704355] kfence-#171: 0x00000000a2c176bf-0x000000000108ae3c, size=32, cache=test
[   51.704355] 
[   51.704411] allocated by task 335 on cpu 1 at 51.691328s (0.013079s ago):
[   51.704494]  test_alloc+0x230/0x628
[   51.704543]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.704587]  kunit_try_run_case+0x170/0x3f0
[   51.704627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.704671]  kthread+0x328/0x630
[   51.704704]  ret_from_fork+0x10/0x20
[   51.704741] 
[   51.704767] freed by task 335 on cpu 1 at 51.691457s (0.013306s ago):
[   51.704823]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.704865]  kunit_try_run_case+0x170/0x3f0
[   51.704904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.704945]  kthread+0x328/0x630
[   51.704977]  ret_from_fork+0x10/0x20
[   51.705016] 
[   51.705063] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   51.705140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.705168] Hardware name: linux,dummy-virt (DT)
[   51.705202] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   29.248436] ==================================================================
[   29.248653] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   29.248653] 
[   29.248802] Invalid read at 0x00000000a32ecd8d:
[   29.248950]  test_invalid_access+0xdc/0x1f0
[   29.249042]  kunit_try_run_case+0x170/0x3f0
[   29.249104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.249158]  kthread+0x328/0x630
[   29.249311]  ret_from_fork+0x10/0x20
[   29.249450] 
[   29.249561] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   29.249970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.250143] Hardware name: linux,dummy-virt (DT)
[   29.250347] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   22.561856] ==================================================================
[   22.562037] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.562037] 
[   22.562214] Out-of-bounds write at 0x000000003122ac8e (1B left of kfence-#104):
[   22.562345]  test_out_of_bounds_write+0x100/0x240
[   22.562440]  kunit_try_run_case+0x170/0x3f0
[   22.562976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.563869]  kthread+0x328/0x630
[   22.563986]  ret_from_fork+0x10/0x20
[   22.564094] 
[   22.564153] kfence-#104: 0x00000000d78e7a82-0x000000009288fc6d, size=32, cache=test
[   22.564153] 
[   22.564275] allocated by task 293 on cpu 0 at 22.561069s (0.003198s ago):
[   22.564427]  test_alloc+0x230/0x628
[   22.564527]  test_out_of_bounds_write+0xc8/0x240
[   22.564624]  kunit_try_run_case+0x170/0x3f0
[   22.564729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.564824]  kthread+0x328/0x630
[   22.564900]  ret_from_fork+0x10/0x20
[   22.564991] 
[   22.565085] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.565265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.565342] Hardware name: linux,dummy-virt (DT)
[   22.565411] ==================================================================
[   22.456696] ==================================================================
[   22.457852] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.457852] 
[   22.458119] Out-of-bounds write at 0x00000000fb6870c5 (1B left of kfence-#103):
[   22.458389]  test_out_of_bounds_write+0x100/0x240
[   22.458748]  kunit_try_run_case+0x170/0x3f0
[   22.459110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.459499]  kthread+0x328/0x630
[   22.459693]  ret_from_fork+0x10/0x20
[   22.459784] 
[   22.460223] kfence-#103: 0x0000000078bdd4fd-0x0000000046ce4f0e, size=32, cache=kmalloc-32
[   22.460223] 
[   22.460364] allocated by task 291 on cpu 0 at 22.456411s (0.003944s ago):
[   22.460737]  test_alloc+0x29c/0x628
[   22.461047]  test_out_of_bounds_write+0xc8/0x240
[   22.461373]  kunit_try_run_case+0x170/0x3f0
[   22.461814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.462154]  kthread+0x328/0x630
[   22.462239]  ret_from_fork+0x10/0x20
[   22.462567] 
[   22.462821] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.462999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.463052] Hardware name: linux,dummy-virt (DT)
[   22.463365] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   29.007942] ==================================================================
[   29.008053] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.008053] 
[   29.008122] Corrupted memory at 0x00000000bd2894e9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#166):
[   29.008437]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.008504]  kunit_try_run_case+0x170/0x3f0
[   29.008551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.008594]  kthread+0x328/0x630
[   29.008631]  ret_from_fork+0x10/0x20
[   29.008671] 
[   29.008696] kfence-#166: 0x00000000ac65a7c9-0x00000000c108eb28, size=73, cache=kmalloc-96
[   29.008696] 
[   29.008756] allocated by task 325 on cpu 1 at 29.007643s (0.001108s ago):
[   29.008818]  test_alloc+0x29c/0x628
[   29.008861]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   29.008905]  kunit_try_run_case+0x170/0x3f0
[   29.008945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.008989]  kthread+0x328/0x630
[   29.009024]  ret_from_fork+0x10/0x20
[   29.009063] 
[   29.009089] freed by task 325 on cpu 1 at 29.007798s (0.001287s ago):
[   29.009150]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.009194]  kunit_try_run_case+0x170/0x3f0
[   29.009234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.009277]  kthread+0x328/0x630
[   29.009313]  ret_from_fork+0x10/0x20
[   29.009365] 
[   29.009411] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   29.009494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.009524] Hardware name: linux,dummy-virt (DT)
[   29.009557] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   28.592000] ==================================================================
[   28.592122] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.592122] 
[   28.592242] Out-of-bounds read at 0x000000002a18ba02 (105B right of kfence-#162):
[   28.592310]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.592392]  kunit_try_run_case+0x170/0x3f0
[   28.592444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.592507]  kthread+0x328/0x630
[   28.592550]  ret_from_fork+0x10/0x20
[   28.592594] 
[   28.592623] kfence-#162: 0x000000006291d453-0x000000007cff0b7a, size=73, cache=kmalloc-96
[   28.592623] 
[   28.592685] allocated by task 323 on cpu 1 at 28.591610s (0.001070s ago):
[   28.592766]  test_alloc+0x29c/0x628
[   28.592812]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.592861]  kunit_try_run_case+0x170/0x3f0
[   28.592905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.592951]  kthread+0x328/0x630
[   28.592992]  ret_from_fork+0x10/0x20
[   28.593036] 
[   28.593089] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   28.593183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.593218] Hardware name: linux,dummy-virt (DT)
[   28.593260] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   23.498283] ==================================================================
[   23.498479] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   23.498479] 
[   23.498802] Corrupted memory at 0x000000002d44de56 [ ! . . . . . . . . . . . . . . . ] (in kfence-#113):
[   23.500069]  test_corruption+0x278/0x378
[   23.500158]  kunit_try_run_case+0x170/0x3f0
[   23.500393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.500467]  kthread+0x328/0x630
[   23.500520]  ret_from_fork+0x10/0x20
[   23.500580] 
[   23.500609] kfence-#113: 0x0000000027f97248-0x000000009c1f9c55, size=32, cache=kmalloc-32
[   23.500609] 
[   23.500675] allocated by task 311 on cpu 0 at 23.497442s (0.003228s ago):
[   23.501224]  test_alloc+0x29c/0x628
[   23.501441]  test_corruption+0xdc/0x378
[   23.501574]  kunit_try_run_case+0x170/0x3f0
[   23.501623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.502011]  kthread+0x328/0x630
[   23.502054]  ret_from_fork+0x10/0x20
[   23.502351] 
[   23.502445] freed by task 311 on cpu 0 at 23.497572s (0.004864s ago):
[   23.502742]  test_corruption+0x278/0x378
[   23.502791]  kunit_try_run_case+0x170/0x3f0
[   23.502837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.503270]  kthread+0x328/0x630
[   23.503543]  ret_from_fork+0x10/0x20
[   23.503617] 
[   23.503796] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.503927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.503970] Hardware name: linux,dummy-virt (DT)
[   23.504132] ==================================================================
[   23.807890] ==================================================================
[   23.808011] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.808011] 
[   23.808091] Corrupted memory at 0x0000000007b932bc [ ! . . . . . . . . . . . . . . . ] (in kfence-#116):
[   23.808450]  test_corruption+0x120/0x378
[   23.808520]  kunit_try_run_case+0x170/0x3f0
[   23.808574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.808625]  kthread+0x328/0x630
[   23.808668]  ret_from_fork+0x10/0x20
[   23.808712] 
[   23.808741] kfence-#116: 0x00000000a151ee2a-0x0000000005d026de, size=32, cache=test
[   23.808741] 
[   23.808802] allocated by task 313 on cpu 0 at 23.807720s (0.001078s ago):
[   23.808874]  test_alloc+0x230/0x628
[   23.808918]  test_corruption+0xdc/0x378
[   23.808963]  kunit_try_run_case+0x170/0x3f0
[   23.809006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.809053]  kthread+0x328/0x630
[   23.809093]  ret_from_fork+0x10/0x20
[   23.809136] 
[   23.809162] freed by task 313 on cpu 0 at 23.807787s (0.001371s ago):
[   23.809224]  test_corruption+0x120/0x378
[   23.809265]  kunit_try_run_case+0x170/0x3f0
[   23.809306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.809363]  kthread+0x328/0x630
[   23.809402]  ret_from_fork+0x10/0x20
[   23.809442] 
[   23.809490] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.809573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.809606] Hardware name: linux,dummy-virt (DT)
[   23.809642] ==================================================================
[   24.119774] ==================================================================
[   24.119932] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   24.119932] 
[   24.120008] Corrupted memory at 0x00000000c54a0522 [ ! ] (in kfence-#119):
[   24.120142]  test_corruption+0x1d8/0x378
[   24.120196]  kunit_try_run_case+0x170/0x3f0
[   24.120245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120296]  kthread+0x328/0x630
[   24.120364]  ret_from_fork+0x10/0x20
[   24.120410] 
[   24.120437] kfence-#119: 0x00000000ca1c910e-0x00000000ca49a93f, size=32, cache=test
[   24.120437] 
[   24.120514] allocated by task 313 on cpu 0 at 24.119515s (0.000994s ago):
[   24.120588]  test_alloc+0x230/0x628
[   24.120636]  test_corruption+0x198/0x378
[   24.120681]  kunit_try_run_case+0x170/0x3f0
[   24.120725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120772]  kthread+0x328/0x630
[   24.120811]  ret_from_fork+0x10/0x20
[   24.120854] 
[   24.120880] freed by task 313 on cpu 0 at 24.119614s (0.001262s ago):
[   24.120948]  test_corruption+0x1d8/0x378
[   24.120992]  kunit_try_run_case+0x170/0x3f0
[   24.121033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.121081]  kthread+0x328/0x630
[   24.121120]  ret_from_fork+0x10/0x20
[   24.121162] 
[   24.121211] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   24.121302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.121347] Hardware name: linux,dummy-virt (DT)
[   24.121388] ==================================================================
[   23.599831] ==================================================================
[   23.599956] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   23.599956] 
[   23.600030] Corrupted memory at 0x000000007da9dd45 [ ! ] (in kfence-#114):
[   23.600175]  test_corruption+0x284/0x378
[   23.600230]  kunit_try_run_case+0x170/0x3f0
[   23.600278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.600338]  kthread+0x328/0x630
[   23.600386]  ret_from_fork+0x10/0x20
[   23.600431] 
[   23.600467] kfence-#114: 0x00000000d7ed66a0-0x0000000007007fd7, size=32, cache=kmalloc-32
[   23.600467] 
[   23.600541] allocated by task 311 on cpu 0 at 23.599494s (0.001042s ago):
[   23.600613]  test_alloc+0x29c/0x628
[   23.600661]  test_corruption+0x198/0x378
[   23.600702]  kunit_try_run_case+0x170/0x3f0
[   23.600746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.600793]  kthread+0x328/0x630
[   23.600833]  ret_from_fork+0x10/0x20
[   23.600873] 
[   23.600898] freed by task 311 on cpu 0 at 23.599617s (0.001277s ago):
[   23.600962]  test_corruption+0x284/0x378
[   23.601005]  kunit_try_run_case+0x170/0x3f0
[   23.601049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.601094]  kthread+0x328/0x630
[   23.601131]  ret_from_fork+0x10/0x20
[   23.601172] 
[   23.601218] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.601306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.601349] Hardware name: linux,dummy-virt (DT)
[   23.601388] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   23.287469] ==================================================================
[   23.287566] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   23.287566] 
[   23.287634] Invalid free of 0x0000000090129151 (in kfence-#111):
[   23.287690]  test_invalid_addr_free+0x1ac/0x238
[   23.287742]  kunit_try_run_case+0x170/0x3f0
[   23.287791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287837]  kthread+0x328/0x630
[   23.287876]  ret_from_fork+0x10/0x20
[   23.287918] 
[   23.287945] kfence-#111: 0x00000000ea84e820-0x00000000ca35bded, size=32, cache=kmalloc-32
[   23.287945] 
[   23.288006] allocated by task 307 on cpu 0 at 23.287285s (0.000717s ago):
[   23.288073]  test_alloc+0x29c/0x628
[   23.288116]  test_invalid_addr_free+0xd4/0x238
[   23.288170]  kunit_try_run_case+0x170/0x3f0
[   23.288221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.288264]  kthread+0x328/0x630
[   23.288340]  ret_from_fork+0x10/0x20
[   23.288425] 
[   23.288548] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.288693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.288725] Hardware name: linux,dummy-virt (DT)
[   23.288798] ==================================================================
[   23.391668] ==================================================================
[   23.391766] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   23.391766] 
[   23.391830] Invalid free of 0x00000000d929a14b (in kfence-#112):
[   23.391889]  test_invalid_addr_free+0xec/0x238
[   23.391938]  kunit_try_run_case+0x170/0x3f0
[   23.391985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392031]  kthread+0x328/0x630
[   23.392069]  ret_from_fork+0x10/0x20
[   23.392111] 
[   23.392137] kfence-#112: 0x000000009e6bfb40-0x00000000055ec2a5, size=32, cache=test
[   23.392137] 
[   23.392196] allocated by task 309 on cpu 0 at 23.391514s (0.000677s ago):
[   23.392266]  test_alloc+0x230/0x628
[   23.392311]  test_invalid_addr_free+0xd4/0x238
[   23.392370]  kunit_try_run_case+0x170/0x3f0
[   23.392414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392468]  kthread+0x328/0x630
[   23.392514]  ret_from_fork+0x10/0x20
[   23.392558] 
[   23.392612] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.392705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.392739] Hardware name: linux,dummy-virt (DT)
[   23.392778] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   23.082237] ==================================================================
[   23.082472] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   23.082472] 
[   23.082621] Invalid free of 0x0000000016d85281 (in kfence-#109):
[   23.082828]  test_double_free+0x1bc/0x238
[   23.082961]  kunit_try_run_case+0x170/0x3f0
[   23.083067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.083145]  kthread+0x328/0x630
[   23.083218]  ret_from_fork+0x10/0x20
[   23.083302] 
[   23.083382] kfence-#109: 0x0000000016d85281-0x00000000714381cb, size=32, cache=kmalloc-32
[   23.083382] 
[   23.083543] allocated by task 303 on cpu 0 at 23.081268s (0.002220s ago):
[   23.083766]  test_alloc+0x29c/0x628
[   23.083899]  test_double_free+0xd4/0x238
[   23.084003]  kunit_try_run_case+0x170/0x3f0
[   23.084130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.084305]  kthread+0x328/0x630
[   23.084505]  ret_from_fork+0x10/0x20
[   23.084601] 
[   23.084864] freed by task 303 on cpu 0 at 23.081436s (0.003414s ago):
[   23.085077]  test_double_free+0x1ac/0x238
[   23.085200]  kunit_try_run_case+0x170/0x3f0
[   23.085341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.085440]  kthread+0x328/0x630
[   23.085526]  ret_from_fork+0x10/0x20
[   23.085852] 
[   23.085948] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.086231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.086430] Hardware name: linux,dummy-virt (DT)
[   23.086585] ==================================================================
[   23.184009] ==================================================================
[   23.184103] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   23.184103] 
[   23.184164] Invalid free of 0x00000000e1cdb67a (in kfence-#110):
[   23.184221]  test_double_free+0x100/0x238
[   23.184365]  kunit_try_run_case+0x170/0x3f0
[   23.184422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.184478]  kthread+0x328/0x630
[   23.184530]  ret_from_fork+0x10/0x20
[   23.184571] 
[   23.184599] kfence-#110: 0x00000000e1cdb67a-0x00000000504e2f1d, size=32, cache=test
[   23.184599] 
[   23.184661] allocated by task 305 on cpu 0 at 23.183265s (0.001391s ago):
[   23.184729]  test_alloc+0x230/0x628
[   23.184770]  test_double_free+0xd4/0x238
[   23.185311]  kunit_try_run_case+0x170/0x3f0
[   23.185443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.185500]  kthread+0x328/0x630
[   23.185538]  ret_from_fork+0x10/0x20
[   23.185621] 
[   23.185653] freed by task 305 on cpu 0 at 23.183357s (0.002290s ago):
[   23.185731]  test_double_free+0xf0/0x238
[   23.186105]  kunit_try_run_case+0x170/0x3f0
[   23.186421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.186493]  kthread+0x328/0x630
[   23.186531]  ret_from_fork+0x10/0x20
[   23.186798] 
[   23.187178] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   23.187439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.187640] Hardware name: linux,dummy-virt (DT)
[   23.187897] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   22.770350] ==================================================================
[   22.770505] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.770505] 
[   22.771022] Use-after-free read at 0x000000000ccb60a1 (in kfence-#106):
[   22.771162]  test_use_after_free_read+0x114/0x248
[   22.771774]  kunit_try_run_case+0x170/0x3f0
[   22.771886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.771991]  kthread+0x328/0x630
[   22.772422]  ret_from_fork+0x10/0x20
[   22.772598] 
[   22.772673] kfence-#106: 0x000000000ccb60a1-0x000000006644583e, size=32, cache=test
[   22.772673] 
[   22.773204] allocated by task 297 on cpu 0 at 22.768672s (0.004521s ago):
[   22.773368]  test_alloc+0x230/0x628
[   22.773809]  test_use_after_free_read+0xd0/0x248
[   22.773908]  kunit_try_run_case+0x170/0x3f0
[   22.773989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.774476]  kthread+0x328/0x630
[   22.774578]  ret_from_fork+0x10/0x20
[   22.774961] 
[   22.775059] freed by task 297 on cpu 0 at 22.768773s (0.006277s ago):
[   22.775502]  test_use_after_free_read+0xf0/0x248
[   22.775610]  kunit_try_run_case+0x170/0x3f0
[   22.775700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.776131]  kthread+0x328/0x630
[   22.776219]  ret_from_fork+0x10/0x20
[   22.776302] 
[   22.776892] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.777262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.777458] Hardware name: linux,dummy-virt (DT)
[   22.777883] ==================================================================
[   22.665748] ==================================================================
[   22.666238] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.666238] 
[   22.666859] Use-after-free read at 0x00000000fa56cf99 (in kfence-#105):
[   22.667007]  test_use_after_free_read+0x114/0x248
[   22.667118]  kunit_try_run_case+0x170/0x3f0
[   22.667198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.667270]  kthread+0x328/0x630
[   22.667349]  ret_from_fork+0x10/0x20
[   22.667410] 
[   22.667454] kfence-#105: 0x00000000fa56cf99-0x000000003c485cfb, size=32, cache=kmalloc-32
[   22.667454] 
[   22.667557] allocated by task 295 on cpu 0 at 22.664487s (0.003062s ago):
[   22.667701]  test_alloc+0x29c/0x628
[   22.667786]  test_use_after_free_read+0xd0/0x248
[   22.668212]  kunit_try_run_case+0x170/0x3f0
[   22.668338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.668708]  kthread+0x328/0x630
[   22.668791]  ret_from_fork+0x10/0x20
[   22.668884] 
[   22.668936] freed by task 295 on cpu 0 at 22.664940s (0.003988s ago):
[   22.669074]  test_use_after_free_read+0x1c0/0x248
[   22.669165]  kunit_try_run_case+0x170/0x3f0
[   22.669259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.670105]  kthread+0x328/0x630
[   22.670209]  ret_from_fork+0x10/0x20
[   22.670403] 
[   22.670559] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.670968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.671118] Hardware name: linux,dummy-virt (DT)
[   22.671202] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   22.250237] ==================================================================
[   22.250502] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.250502] 
[   22.250783] Out-of-bounds read at 0x00000000a9cb5eb2 (32B right of kfence-#101):
[   22.250909]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.251013]  kunit_try_run_case+0x170/0x3f0
[   22.251104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.251200]  kthread+0x328/0x630
[   22.251279]  ret_from_fork+0x10/0x20
[   22.251377] 
[   22.251434] kfence-#101: 0x00000000a0d9fa4e-0x00000000537914da, size=32, cache=test
[   22.251434] 
[   22.251899] allocated by task 289 on cpu 0 at 22.249721s (0.002153s ago):
[   22.252124]  test_alloc+0x230/0x628
[   22.252225]  test_out_of_bounds_read+0x198/0x3e0
[   22.252442]  kunit_try_run_case+0x170/0x3f0
[   22.252735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.252828]  kthread+0x328/0x630
[   22.253042]  ret_from_fork+0x10/0x20
[   22.253355] 
[   22.253578] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.254269] Hardware name: linux,dummy-virt (DT)
[   22.254435] ==================================================================
[   21.832931] ==================================================================
[   21.833162] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.833162] 
[   21.833414] Out-of-bounds read at 0x00000000d53b03bc (32B right of kfence-#97):
[   21.833539]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.833650]  kunit_try_run_case+0x170/0x3f0
[   21.833733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.833813]  kthread+0x328/0x630
[   21.833888]  ret_from_fork+0x10/0x20
[   21.833961] 
[   21.834018] kfence-#97: 0x00000000c46db671-0x000000007d182a7a, size=32, cache=kmalloc-32
[   21.834018] 
[   21.834139] allocated by task 287 on cpu 0 at 21.832369s (0.001761s ago):
[   21.834304]  test_alloc+0x29c/0x628
[   21.834394]  test_out_of_bounds_read+0x198/0x3e0
[   21.834476]  kunit_try_run_case+0x170/0x3f0
[   21.834550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.834639]  kthread+0x328/0x630
[   21.834717]  ret_from_fork+0x10/0x20
[   21.834918] 
[   21.835020] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.835307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.835717] Hardware name: linux,dummy-virt (DT)
[   21.835817] ==================================================================
[   22.044082] ==================================================================
[   22.044358] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   22.044358] 
[   22.044970] Out-of-bounds read at 0x0000000016f85214 (1B left of kfence-#99):
[   22.045566]  test_out_of_bounds_read+0x114/0x3e0
[   22.046340]  kunit_try_run_case+0x170/0x3f0
[   22.046588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.046696]  kthread+0x328/0x630
[   22.046789]  ret_from_fork+0x10/0x20
[   22.046876] 
[   22.047642] kfence-#99: 0x000000002dfe1980-0x00000000d625c233, size=32, cache=test
[   22.047642] 
[   22.047904] allocated by task 289 on cpu 0 at 22.042213s (0.005652s ago):
[   22.048599]  test_alloc+0x230/0x628
[   22.048928]  test_out_of_bounds_read+0xdc/0x3e0
[   22.049333]  kunit_try_run_case+0x170/0x3f0
[   22.049656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.050190]  kthread+0x328/0x630
[   22.050367]  ret_from_fork+0x10/0x20
[   22.050453] 
[   22.051061] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   22.051514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.051581] Hardware name: linux,dummy-virt (DT)
[   22.051913] ==================================================================
[   21.624938] ==================================================================
[   21.625163] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.625163] 
[   21.625474] Out-of-bounds read at 0x00000000da348c44 (1B left of kfence-#95):
[   21.625688]  test_out_of_bounds_read+0x114/0x3e0
[   21.625806]  kunit_try_run_case+0x170/0x3f0
[   21.625903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.626002]  kthread+0x328/0x630
[   21.626095]  ret_from_fork+0x10/0x20
[   21.626221] 
[   21.626301] kfence-#95: 0x0000000045dd50ac-0x00000000961b10b2, size=32, cache=kmalloc-32
[   21.626301] 
[   21.626419] allocated by task 287 on cpu 0 at 21.624466s (0.001945s ago):
[   21.626570]  test_alloc+0x29c/0x628
[   21.626696]  test_out_of_bounds_read+0xdc/0x3e0
[   21.627088]  kunit_try_run_case+0x170/0x3f0
[   21.627196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.627282]  kthread+0x328/0x630
[   21.627366]  ret_from_fork+0x10/0x20
[   21.627838] 
[   21.627940] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.628125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.628195] Hardware name: linux,dummy-virt (DT)
[   21.628284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   21.337614] ==================================================================
[   21.337739] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.337851] Write of size 1 at addr fff00000c7893378 by task kunit_try_catch/285
[   21.338290] 
[   21.338549] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.338808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.338866] Hardware name: linux,dummy-virt (DT)
[   21.338943] Call trace:
[   21.339152]  show_stack+0x20/0x38 (C)
[   21.339395]  dump_stack_lvl+0x8c/0xd0
[   21.339551]  print_report+0x118/0x608
[   21.339656]  kasan_report+0xdc/0x128
[   21.339964]  __asan_report_store1_noabort+0x20/0x30
[   21.340091]  strncpy_from_user+0x270/0x2a0
[   21.340208]  copy_user_test_oob+0x5c0/0xec8
[   21.340316]  kunit_try_run_case+0x170/0x3f0
[   21.340463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.340581]  kthread+0x328/0x630
[   21.340691]  ret_from_fork+0x10/0x20
[   21.340794] 
[   21.340844] Allocated by task 285:
[   21.340906]  kasan_save_stack+0x3c/0x68
[   21.341006]  kasan_save_track+0x20/0x40
[   21.341269]  kasan_save_alloc_info+0x40/0x58
[   21.341473]  __kasan_kmalloc+0xd4/0xd8
[   21.341755]  __kmalloc_noprof+0x190/0x4d0
[   21.341987]  kunit_kmalloc_array+0x34/0x88
[   21.342074]  copy_user_test_oob+0xac/0xec8
[   21.342399]  kunit_try_run_case+0x170/0x3f0
[   21.342632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.342805]  kthread+0x328/0x630
[   21.342882]  ret_from_fork+0x10/0x20
[   21.342987] 
[   21.343043] The buggy address belongs to the object at fff00000c7893300
[   21.343043]  which belongs to the cache kmalloc-128 of size 128
[   21.343238] The buggy address is located 0 bytes to the right of
[   21.343238]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.343481] 
[   21.343539] The buggy address belongs to the physical page:
[   21.343612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.343704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.343833] page_type: f5(slab)
[   21.343922] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.344032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.344129] page dumped because: kasan: bad access detected
[   21.344274] 
[   21.344372] Memory state around the buggy address:
[   21.344478]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.344603]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.344739] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.344842]                                                                 ^
[   21.344979]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.345095]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.345197] ==================================================================
[   21.325635] ==================================================================
[   21.325747] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.325914] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.326077] 
[   21.326180] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.326404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.326466] Hardware name: linux,dummy-virt (DT)
[   21.326532] Call trace:
[   21.326807]  show_stack+0x20/0x38 (C)
[   21.327147]  dump_stack_lvl+0x8c/0xd0
[   21.327375]  print_report+0x118/0x608
[   21.327515]  kasan_report+0xdc/0x128
[   21.327630]  kasan_check_range+0x100/0x1a8
[   21.328160]  __kasan_check_write+0x20/0x30
[   21.328288]  strncpy_from_user+0x3c/0x2a0
[   21.328751]  copy_user_test_oob+0x5c0/0xec8
[   21.328971]  kunit_try_run_case+0x170/0x3f0
[   21.329290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.329443]  kthread+0x328/0x630
[   21.329662]  ret_from_fork+0x10/0x20
[   21.329794] 
[   21.329881] Allocated by task 285:
[   21.329948]  kasan_save_stack+0x3c/0x68
[   21.330036]  kasan_save_track+0x20/0x40
[   21.330113]  kasan_save_alloc_info+0x40/0x58
[   21.330201]  __kasan_kmalloc+0xd4/0xd8
[   21.330315]  __kmalloc_noprof+0x190/0x4d0
[   21.330707]  kunit_kmalloc_array+0x34/0x88
[   21.330982]  copy_user_test_oob+0xac/0xec8
[   21.331155]  kunit_try_run_case+0x170/0x3f0
[   21.331241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.331580]  kthread+0x328/0x630
[   21.331733]  ret_from_fork+0x10/0x20
[   21.331819] 
[   21.332142] The buggy address belongs to the object at fff00000c7893300
[   21.332142]  which belongs to the cache kmalloc-128 of size 128
[   21.332392] The buggy address is located 0 bytes inside of
[   21.332392]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.332800] 
[   21.332869] The buggy address belongs to the physical page:
[   21.333080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.333833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.333977] page_type: f5(slab)
[   21.334202] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.334383] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.334480] page dumped because: kasan: bad access detected
[   21.334813] 
[   21.334859] Memory state around the buggy address:
[   21.334990]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.335256]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.335369] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.335455]                                                                 ^
[   21.335531]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.335622]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.335711] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   21.301953] ==================================================================
[   21.302086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.302198] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.302312] 
[   21.302392] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.302576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.302631] Hardware name: linux,dummy-virt (DT)
[   21.302704] Call trace:
[   21.302755]  show_stack+0x20/0x38 (C)
[   21.303649]  dump_stack_lvl+0x8c/0xd0
[   21.303919]  print_report+0x118/0x608
[   21.304488]  kasan_report+0xdc/0x128
[   21.304616]  kasan_check_range+0x100/0x1a8
[   21.304855]  __kasan_check_write+0x20/0x30
[   21.305233]  copy_user_test_oob+0x434/0xec8
[   21.305355]  kunit_try_run_case+0x170/0x3f0
[   21.305471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.305581]  kthread+0x328/0x630
[   21.305964]  ret_from_fork+0x10/0x20
[   21.306171] 
[   21.306602] Allocated by task 285:
[   21.306689]  kasan_save_stack+0x3c/0x68
[   21.306995]  kasan_save_track+0x20/0x40
[   21.307122]  kasan_save_alloc_info+0x40/0x58
[   21.307553]  __kasan_kmalloc+0xd4/0xd8
[   21.307735]  __kmalloc_noprof+0x190/0x4d0
[   21.308033]  kunit_kmalloc_array+0x34/0x88
[   21.308209]  copy_user_test_oob+0xac/0xec8
[   21.308284]  kunit_try_run_case+0x170/0x3f0
[   21.308368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.308474]  kthread+0x328/0x630
[   21.309295]  ret_from_fork+0x10/0x20
[   21.309396] 
[   21.309444] The buggy address belongs to the object at fff00000c7893300
[   21.309444]  which belongs to the cache kmalloc-128 of size 128
[   21.309587] The buggy address is located 0 bytes inside of
[   21.309587]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.309740] 
[   21.309793] The buggy address belongs to the physical page:
[   21.310346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.310537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.310649] page_type: f5(slab)
[   21.310738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.310895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.310998] page dumped because: kasan: bad access detected
[   21.311213] 
[   21.311378] Memory state around the buggy address:
[   21.311595]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.311697]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311887] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.312175]                                                                 ^
[   21.312282]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312393]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312625] ==================================================================
[   21.285138] ==================================================================
[   21.285562] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.285707] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.285838] 
[   21.285931] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.286148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.286217] Hardware name: linux,dummy-virt (DT)
[   21.286297] Call trace:
[   21.286356]  show_stack+0x20/0x38 (C)
[   21.286465]  dump_stack_lvl+0x8c/0xd0
[   21.286573]  print_report+0x118/0x608
[   21.286681]  kasan_report+0xdc/0x128
[   21.286793]  kasan_check_range+0x100/0x1a8
[   21.286909]  __kasan_check_write+0x20/0x30
[   21.287010]  copy_user_test_oob+0x35c/0xec8
[   21.287120]  kunit_try_run_case+0x170/0x3f0
[   21.287234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.287366]  kthread+0x328/0x630
[   21.287464]  ret_from_fork+0x10/0x20
[   21.287573] 
[   21.287618] Allocated by task 285:
[   21.287681]  kasan_save_stack+0x3c/0x68
[   21.287773]  kasan_save_track+0x20/0x40
[   21.287855]  kasan_save_alloc_info+0x40/0x58
[   21.287944]  __kasan_kmalloc+0xd4/0xd8
[   21.288023]  __kmalloc_noprof+0x190/0x4d0
[   21.288115]  kunit_kmalloc_array+0x34/0x88
[   21.289455]  copy_user_test_oob+0xac/0xec8
[   21.289613]  kunit_try_run_case+0x170/0x3f0
[   21.289690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.289772]  kthread+0x328/0x630
[   21.289842]  ret_from_fork+0x10/0x20
[   21.289938] 
[   21.290068] The buggy address belongs to the object at fff00000c7893300
[   21.290068]  which belongs to the cache kmalloc-128 of size 128
[   21.290200] The buggy address is located 0 bytes inside of
[   21.290200]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.290348] 
[   21.290489] The buggy address belongs to the physical page:
[   21.290579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.290696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.290809] page_type: f5(slab)
[   21.290893] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.290996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.291265] page dumped because: kasan: bad access detected
[   21.291468] 
[   21.291768] Memory state around the buggy address:
[   21.291881]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.292163]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.292284] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.292598]                                                                 ^
[   21.292905]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.293012]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.293311] ==================================================================
[   21.249936] ==================================================================
[   21.250594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.251174] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.251696] 
[   21.251814] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.252016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.252524] Hardware name: linux,dummy-virt (DT)
[   21.252944] Call trace:
[   21.253089]  show_stack+0x20/0x38 (C)
[   21.253386]  dump_stack_lvl+0x8c/0xd0
[   21.253957]  print_report+0x118/0x608
[   21.254129]  kasan_report+0xdc/0x128
[   21.254229]  kasan_check_range+0x100/0x1a8
[   21.254342]  __kasan_check_write+0x20/0x30
[   21.254459]  copy_user_test_oob+0x234/0xec8
[   21.254564]  kunit_try_run_case+0x170/0x3f0
[   21.254675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.255063]  kthread+0x328/0x630
[   21.255179]  ret_from_fork+0x10/0x20
[   21.255238] 
[   21.255261] Allocated by task 285:
[   21.255299]  kasan_save_stack+0x3c/0x68
[   21.255432]  kasan_save_track+0x20/0x40
[   21.255537]  kasan_save_alloc_info+0x40/0x58
[   21.255652]  __kasan_kmalloc+0xd4/0xd8
[   21.255740]  __kmalloc_noprof+0x190/0x4d0
[   21.255835]  kunit_kmalloc_array+0x34/0x88
[   21.255956]  copy_user_test_oob+0xac/0xec8
[   21.256029]  kunit_try_run_case+0x170/0x3f0
[   21.256100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.256207]  kthread+0x328/0x630
[   21.256278]  ret_from_fork+0x10/0x20
[   21.256371] 
[   21.256420] The buggy address belongs to the object at fff00000c7893300
[   21.256420]  which belongs to the cache kmalloc-128 of size 128
[   21.256640] The buggy address is located 0 bytes inside of
[   21.256640]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.256803] 
[   21.256857] The buggy address belongs to the physical page:
[   21.256986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.257184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.257364] page_type: f5(slab)
[   21.257476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.257593] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.257690] page dumped because: kasan: bad access detected
[   21.257794] 
[   21.257853] Memory state around the buggy address:
[   21.257948]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.258105]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258211] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.258304]                                                                 ^
[   21.258407]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258528]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258655] ==================================================================
[   21.314428] ==================================================================
[   21.314542] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.314649] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.314764] 
[   21.315437] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.315707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315993] Hardware name: linux,dummy-virt (DT)
[   21.316114] Call trace:
[   21.316164]  show_stack+0x20/0x38 (C)
[   21.316275]  dump_stack_lvl+0x8c/0xd0
[   21.316413]  print_report+0x118/0x608
[   21.316603]  kasan_report+0xdc/0x128
[   21.316918]  kasan_check_range+0x100/0x1a8
[   21.317025]  __kasan_check_read+0x20/0x30
[   21.317135]  copy_user_test_oob+0x4a0/0xec8
[   21.317298]  kunit_try_run_case+0x170/0x3f0
[   21.317491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.317628]  kthread+0x328/0x630
[   21.317721]  ret_from_fork+0x10/0x20
[   21.317826] 
[   21.317872] Allocated by task 285:
[   21.317940]  kasan_save_stack+0x3c/0x68
[   21.318028]  kasan_save_track+0x20/0x40
[   21.318125]  kasan_save_alloc_info+0x40/0x58
[   21.318212]  __kasan_kmalloc+0xd4/0xd8
[   21.318291]  __kmalloc_noprof+0x190/0x4d0
[   21.318703]  kunit_kmalloc_array+0x34/0x88
[   21.318865]  copy_user_test_oob+0xac/0xec8
[   21.319011]  kunit_try_run_case+0x170/0x3f0
[   21.319136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.319279]  kthread+0x328/0x630
[   21.319377]  ret_from_fork+0x10/0x20
[   21.319446] 
[   21.319484] The buggy address belongs to the object at fff00000c7893300
[   21.319484]  which belongs to the cache kmalloc-128 of size 128
[   21.319626] The buggy address is located 0 bytes inside of
[   21.319626]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.319913] 
[   21.319957] The buggy address belongs to the physical page:
[   21.320024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.320142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.320271] page_type: f5(slab)
[   21.320390] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.320561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.320693] page dumped because: kasan: bad access detected
[   21.320817] 
[   21.320863] Memory state around the buggy address:
[   21.320934]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.321306]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321416] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.321505]                                                                 ^
[   21.321621]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321731]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.321823] ==================================================================
[   21.294752] ==================================================================
[   21.294897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.294962] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.295014] 
[   21.295051] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.295137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.295167] Hardware name: linux,dummy-virt (DT)
[   21.295201] Call trace:
[   21.295226]  show_stack+0x20/0x38 (C)
[   21.295276]  dump_stack_lvl+0x8c/0xd0
[   21.295345]  print_report+0x118/0x608
[   21.295399]  kasan_report+0xdc/0x128
[   21.295444]  kasan_check_range+0x100/0x1a8
[   21.295492]  __kasan_check_read+0x20/0x30
[   21.295538]  copy_user_test_oob+0x3c8/0xec8
[   21.295583]  kunit_try_run_case+0x170/0x3f0
[   21.295631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.295683]  kthread+0x328/0x630
[   21.295723]  ret_from_fork+0x10/0x20
[   21.295771] 
[   21.295793] Allocated by task 285:
[   21.295822]  kasan_save_stack+0x3c/0x68
[   21.295866]  kasan_save_track+0x20/0x40
[   21.295906]  kasan_save_alloc_info+0x40/0x58
[   21.295948]  __kasan_kmalloc+0xd4/0xd8
[   21.295984]  __kmalloc_noprof+0x190/0x4d0
[   21.296026]  kunit_kmalloc_array+0x34/0x88
[   21.296064]  copy_user_test_oob+0xac/0xec8
[   21.296101]  kunit_try_run_case+0x170/0x3f0
[   21.296141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.296185]  kthread+0x328/0x630
[   21.296218]  ret_from_fork+0x10/0x20
[   21.296257] 
[   21.296278] The buggy address belongs to the object at fff00000c7893300
[   21.296278]  which belongs to the cache kmalloc-128 of size 128
[   21.296472] The buggy address is located 0 bytes inside of
[   21.296472]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.296813] 
[   21.296987] The buggy address belongs to the physical page:
[   21.297279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.297613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.297748] page_type: f5(slab)
[   21.297956] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.298099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.298346] page dumped because: kasan: bad access detected
[   21.298469] 
[   21.298783] Memory state around the buggy address:
[   21.298991]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.299243]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299412] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.299766]                                                                 ^
[   21.300038]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300138]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300464] ==================================================================
[   21.266652] ==================================================================
[   21.266843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.266978] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285
[   21.267107] 
[   21.267201] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.267418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267487] Hardware name: linux,dummy-virt (DT)
[   21.267746] Call trace:
[   21.267837]  show_stack+0x20/0x38 (C)
[   21.267949]  dump_stack_lvl+0x8c/0xd0
[   21.268043]  print_report+0x118/0x608
[   21.268153]  kasan_report+0xdc/0x128
[   21.268259]  kasan_check_range+0x100/0x1a8
[   21.268411]  __kasan_check_read+0x20/0x30
[   21.268620]  copy_user_test_oob+0x728/0xec8
[   21.268781]  kunit_try_run_case+0x170/0x3f0
[   21.269359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.269490]  kthread+0x328/0x630
[   21.269588]  ret_from_fork+0x10/0x20
[   21.269701] 
[   21.269751] Allocated by task 285:
[   21.269817]  kasan_save_stack+0x3c/0x68
[   21.269913]  kasan_save_track+0x20/0x40
[   21.270001]  kasan_save_alloc_info+0x40/0x58
[   21.270100]  __kasan_kmalloc+0xd4/0xd8
[   21.270186]  __kmalloc_noprof+0x190/0x4d0
[   21.270278]  kunit_kmalloc_array+0x34/0x88
[   21.270380]  copy_user_test_oob+0xac/0xec8
[   21.270468]  kunit_try_run_case+0x170/0x3f0
[   21.270600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.270712]  kthread+0x328/0x630
[   21.270810]  ret_from_fork+0x10/0x20
[   21.270945] 
[   21.271005] The buggy address belongs to the object at fff00000c7893300
[   21.271005]  which belongs to the cache kmalloc-128 of size 128
[   21.271146] The buggy address is located 0 bytes inside of
[   21.271146]  allocated 120-byte region [fff00000c7893300, fff00000c7893378)
[   21.271278] 
[   21.271331] The buggy address belongs to the physical page:
[   21.271404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.271526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.271669] page_type: f5(slab)
[   21.271757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.271903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.272016] page dumped because: kasan: bad access detected
[   21.272090] 
[   21.272194] Memory state around the buggy address:
[   21.272377]  fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.272497]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.272709] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.272836]                                                                 ^
[   21.272968]  fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273066]  fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   21.165350] ==================================================================
[   21.165529] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.165731] Read of size 8 at addr fff00000c7893278 by task kunit_try_catch/281
[   21.165854] 
[   21.165988] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.166269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.166347] Hardware name: linux,dummy-virt (DT)
[   21.166454] Call trace:
[   21.166535]  show_stack+0x20/0x38 (C)
[   21.166700]  dump_stack_lvl+0x8c/0xd0
[   21.166866]  print_report+0x118/0x608
[   21.166971]  kasan_report+0xdc/0x128
[   21.167078]  __asan_report_load8_noabort+0x20/0x30
[   21.167189]  copy_to_kernel_nofault+0x204/0x250
[   21.167292]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.167417]  kunit_try_run_case+0x170/0x3f0
[   21.167536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.167681]  kthread+0x328/0x630
[   21.167969]  ret_from_fork+0x10/0x20
[   21.168146] 
[   21.168198] Allocated by task 281:
[   21.168276]  kasan_save_stack+0x3c/0x68
[   21.168387]  kasan_save_track+0x20/0x40
[   21.168486]  kasan_save_alloc_info+0x40/0x58
[   21.169065]  __kasan_kmalloc+0xd4/0xd8
[   21.169332]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.169627]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.169945]  kunit_try_run_case+0x170/0x3f0
[   21.170107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.170445]  kthread+0x328/0x630
[   21.170530]  ret_from_fork+0x10/0x20
[   21.170793] 
[   21.170924] The buggy address belongs to the object at fff00000c7893200
[   21.170924]  which belongs to the cache kmalloc-128 of size 128
[   21.171044] The buggy address is located 0 bytes to the right of
[   21.171044]  allocated 120-byte region [fff00000c7893200, fff00000c7893278)
[   21.171180] 
[   21.171575] The buggy address belongs to the physical page:
[   21.171801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.171931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.172276] page_type: f5(slab)
[   21.172484] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.172645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.172993] page dumped because: kasan: bad access detected
[   21.173088] 
[   21.173217] Memory state around the buggy address:
[   21.173500]  fff00000c7893100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.173701]  fff00000c7893180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.174094] >fff00000c7893200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.174195]                                                                 ^
[   21.174678]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.174835]  fff00000c7893300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.174947] ==================================================================
[   21.176186] ==================================================================
[   21.176362] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.176539] Write of size 8 at addr fff00000c7893278 by task kunit_try_catch/281
[   21.176701] 
[   21.176800] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.177049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.177137] Hardware name: linux,dummy-virt (DT)
[   21.177233] Call trace:
[   21.177304]  show_stack+0x20/0x38 (C)
[   21.177408]  dump_stack_lvl+0x8c/0xd0
[   21.177506]  print_report+0x118/0x608
[   21.178127]  kasan_report+0xdc/0x128
[   21.178325]  kasan_check_range+0x100/0x1a8
[   21.178475]  __kasan_check_write+0x20/0x30
[   21.178605]  copy_to_kernel_nofault+0x8c/0x250
[   21.178728]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.178951]  kunit_try_run_case+0x170/0x3f0
[   21.179071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.179196]  kthread+0x328/0x630
[   21.179287]  ret_from_fork+0x10/0x20
[   21.179682] 
[   21.179724] Allocated by task 281:
[   21.179806]  kasan_save_stack+0x3c/0x68
[   21.179913]  kasan_save_track+0x20/0x40
[   21.180011]  kasan_save_alloc_info+0x40/0x58
[   21.180110]  __kasan_kmalloc+0xd4/0xd8
[   21.180206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.180335]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.180416]  kunit_try_run_case+0x170/0x3f0
[   21.180492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.180582]  kthread+0x328/0x630
[   21.180650]  ret_from_fork+0x10/0x20
[   21.180744] 
[   21.180808] The buggy address belongs to the object at fff00000c7893200
[   21.180808]  which belongs to the cache kmalloc-128 of size 128
[   21.180947] The buggy address is located 0 bytes to the right of
[   21.180947]  allocated 120-byte region [fff00000c7893200, fff00000c7893278)
[   21.181162] 
[   21.181214] The buggy address belongs to the physical page:
[   21.181287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893
[   21.181772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.181961] page_type: f5(slab)
[   21.182058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.182456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.182645] page dumped because: kasan: bad access detected
[   21.182846] 
[   21.182897] Memory state around the buggy address:
[   21.182984]  fff00000c7893100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.183090]  fff00000c7893180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183192] >fff00000c7893200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.183275]                                                                 ^
[   21.183359]  fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183452]  fff00000c7893300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure Automatically assigned
[   21.069004] ==================================================================
[   21.069626] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   21.069792] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   21.069929] 
[   21.070053] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.070466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.070538] Hardware name: linux,dummy-virt (DT)
[   21.070622] Call trace:
[   21.070750]  show_stack+0x20/0x38 (C)
[   21.070911]  dump_stack_lvl+0x8c/0xd0
[   21.071013]  print_report+0x310/0x608
[   21.071142]  kasan_report+0xdc/0x128
[   21.071245]  __asan_report_load1_noabort+0x20/0x30
[   21.071358]  vmalloc_oob+0x51c/0x5d0
[   21.071450]  kunit_try_run_case+0x170/0x3f0
[   21.071549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.071673]  kthread+0x328/0x630
[   21.071777]  ret_from_fork+0x10/0x20
[   21.071900] 
[   21.071981] The buggy address belongs to the virtual mapping at
[   21.071981]  [ffff8000800fe000, ffff800080100000) created by:
[   21.071981]  vmalloc_oob+0x98/0x5d0
[   21.072161] 
[   21.072236] The buggy address belongs to the physical page:
[   21.072367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   21.072503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.072689] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.072855] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.072990] page dumped because: kasan: bad access detected
[   21.073101] 
[   21.073170] Memory state around the buggy address:
[   21.073242]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.073358]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.073455] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.073550]                                                                 ^
[   21.073663]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.073754]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.073841] ==================================================================
[   21.058756] ==================================================================
[   21.059145] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   21.059291] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   21.061003] 
[   21.061325] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   21.062228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.062314] Hardware name: linux,dummy-virt (DT)
[   21.062581] Call trace:
[   21.062951]  show_stack+0x20/0x38 (C)
[   21.063086]  dump_stack_lvl+0x8c/0xd0
[   21.063652]  print_report+0x310/0x608
[   21.063886]  kasan_report+0xdc/0x128
[   21.064430]  __asan_report_load1_noabort+0x20/0x30
[   21.064616]  vmalloc_oob+0x578/0x5d0
[   21.064722]  kunit_try_run_case+0x170/0x3f0
[   21.064875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065015]  kthread+0x328/0x630
[   21.065154]  ret_from_fork+0x10/0x20
[   21.065286] 
[   21.065361] The buggy address belongs to the virtual mapping at
[   21.065361]  [ffff8000800fe000, ffff800080100000) created by:
[   21.065361]  vmalloc_oob+0x98/0x5d0
[   21.065529] 
[   21.065872] The buggy address belongs to the physical page:
[   21.065984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   21.066136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.066303] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.066463] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.066570] page dumped because: kasan: bad access detected
[   21.066640] 
[   21.066682] Memory state around the buggy address:
[   21.066757]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.067040]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.067210] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.067352]                                                              ^
[   21.067450]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.067534]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.067608] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   20.792864] ==================================================================
[   20.792989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.793106] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.793222] 
[   20.793301] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.794698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.794998] Hardware name: linux,dummy-virt (DT)
[   20.795103] Call trace:
[   20.795315]  show_stack+0x20/0x38 (C)
[   20.795441]  dump_stack_lvl+0x8c/0xd0
[   20.795537]  print_report+0x118/0x608
[   20.795636]  kasan_report+0xdc/0x128
[   20.796044]  kasan_check_range+0x100/0x1a8
[   20.796925]  __kasan_check_write+0x20/0x30
[   20.797046]  kasan_atomics_helper+0x1384/0x4858
[   20.797165]  kasan_atomics+0x198/0x2e0
[   20.797412]  kunit_try_run_case+0x170/0x3f0
[   20.797654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.797797]  kthread+0x328/0x630
[   20.797899]  ret_from_fork+0x10/0x20
[   20.798017] 
[   20.798065] Allocated by task 265:
[   20.798150]  kasan_save_stack+0x3c/0x68
[   20.798253]  kasan_save_track+0x20/0x40
[   20.798623]  kasan_save_alloc_info+0x40/0x58
[   20.798751]  __kasan_kmalloc+0xd4/0xd8
[   20.798837]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.798925]  kasan_atomics+0xb8/0x2e0
[   20.798994]  kunit_try_run_case+0x170/0x3f0
[   20.799080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.799186]  kthread+0x328/0x630
[   20.799266]  ret_from_fork+0x10/0x20
[   20.800821] 
[   20.800895] The buggy address belongs to the object at fff00000c7892700
[   20.800895]  which belongs to the cache kmalloc-64 of size 64
[   20.801885] The buggy address is located 0 bytes to the right of
[   20.801885]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.802604] 
[   20.802668] The buggy address belongs to the physical page:
[   20.803146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.803272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.803944] page_type: f5(slab)
[   20.804133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.804746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.805176] page dumped because: kasan: bad access detected
[   20.805282] 
[   20.805482] Memory state around the buggy address:
[   20.805687]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.805796]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.805889] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.806267]                                      ^
[   20.806519]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806978]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.807228] ==================================================================
[   20.711516] ==================================================================
[   20.711589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.711658] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.711715] 
[   20.711755] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.711849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.711882] Hardware name: linux,dummy-virt (DT)
[   20.711917] Call trace:
[   20.711946]  show_stack+0x20/0x38 (C)
[   20.712003]  dump_stack_lvl+0x8c/0xd0
[   20.712057]  print_report+0x118/0x608
[   20.712110]  kasan_report+0xdc/0x128
[   20.712163]  kasan_check_range+0x100/0x1a8
[   20.712218]  __kasan_check_write+0x20/0x30
[   20.712269]  kasan_atomics_helper+0xff0/0x4858
[   20.712337]  kasan_atomics+0x198/0x2e0
[   20.712398]  kunit_try_run_case+0x170/0x3f0
[   20.713333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.713856]  kthread+0x328/0x630
[   20.713952]  ret_from_fork+0x10/0x20
[   20.714011] 
[   20.714035] Allocated by task 265:
[   20.714067]  kasan_save_stack+0x3c/0x68
[   20.714116]  kasan_save_track+0x20/0x40
[   20.714289]  kasan_save_alloc_info+0x40/0x58
[   20.714404]  __kasan_kmalloc+0xd4/0xd8
[   20.714546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.714670]  kasan_atomics+0xb8/0x2e0
[   20.714750]  kunit_try_run_case+0x170/0x3f0
[   20.714860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714922]  kthread+0x328/0x630
[   20.714963]  ret_from_fork+0x10/0x20
[   20.715005] 
[   20.715030] The buggy address belongs to the object at fff00000c7892700
[   20.715030]  which belongs to the cache kmalloc-64 of size 64
[   20.715093] The buggy address is located 0 bytes to the right of
[   20.715093]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.715158] 
[   20.715181] The buggy address belongs to the physical page:
[   20.715216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.715505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.715754] page_type: f5(slab)
[   20.715813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.716025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.716087] page dumped because: kasan: bad access detected
[   20.716259] 
[   20.716287] Memory state around the buggy address:
[   20.716480]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.716543]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.716743] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.716861]                                      ^
[   20.716915]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.716965]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.717008] ==================================================================
[   20.954257] ==================================================================
[   20.954384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.954548] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.954789] 
[   20.954874] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.955061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.955152] Hardware name: linux,dummy-virt (DT)
[   20.955227] Call trace:
[   20.955274]  show_stack+0x20/0x38 (C)
[   20.955384]  dump_stack_lvl+0x8c/0xd0
[   20.955514]  print_report+0x118/0x608
[   20.955628]  kasan_report+0xdc/0x128
[   20.955731]  __asan_report_load8_noabort+0x20/0x30
[   20.955844]  kasan_atomics_helper+0x3e10/0x4858
[   20.955974]  kasan_atomics+0x198/0x2e0
[   20.956226]  kunit_try_run_case+0x170/0x3f0
[   20.956384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956573]  kthread+0x328/0x630
[   20.956669]  ret_from_fork+0x10/0x20
[   20.956829] 
[   20.956930] Allocated by task 265:
[   20.957173]  kasan_save_stack+0x3c/0x68
[   20.957400]  kasan_save_track+0x20/0x40
[   20.957529]  kasan_save_alloc_info+0x40/0x58
[   20.957661]  __kasan_kmalloc+0xd4/0xd8
[   20.957782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.957910]  kasan_atomics+0xb8/0x2e0
[   20.958007]  kunit_try_run_case+0x170/0x3f0
[   20.958106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958204]  kthread+0x328/0x630
[   20.958279]  ret_from_fork+0x10/0x20
[   20.958406] 
[   20.958452] The buggy address belongs to the object at fff00000c7892700
[   20.958452]  which belongs to the cache kmalloc-64 of size 64
[   20.958827] The buggy address is located 0 bytes to the right of
[   20.958827]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.959050] 
[   20.959095] The buggy address belongs to the physical page:
[   20.959171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.959561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.959861] page_type: f5(slab)
[   20.960144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.960291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.960417] page dumped because: kasan: bad access detected
[   20.960513] 
[   20.960611] Memory state around the buggy address:
[   20.960863]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961291]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961758] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962187]                                      ^
[   20.962291]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962406]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963247] ==================================================================
[   20.827907] ==================================================================
[   20.828168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.828298] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.828534] 
[   20.828636] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.828842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.828907] Hardware name: linux,dummy-virt (DT)
[   20.828978] Call trace:
[   20.829031]  show_stack+0x20/0x38 (C)
[   20.829145]  dump_stack_lvl+0x8c/0xd0
[   20.829910]  print_report+0x118/0x608
[   20.830338]  kasan_report+0xdc/0x128
[   20.830450]  kasan_check_range+0x100/0x1a8
[   20.830861]  __kasan_check_write+0x20/0x30
[   20.831008]  kasan_atomics_helper+0x1414/0x4858
[   20.831103]  kasan_atomics+0x198/0x2e0
[   20.831194]  kunit_try_run_case+0x170/0x3f0
[   20.831291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.831394]  kthread+0x328/0x630
[   20.831481]  ret_from_fork+0x10/0x20
[   20.831590] 
[   20.832852] Allocated by task 265:
[   20.832952]  kasan_save_stack+0x3c/0x68
[   20.833063]  kasan_save_track+0x20/0x40
[   20.833159]  kasan_save_alloc_info+0x40/0x58
[   20.833761]  __kasan_kmalloc+0xd4/0xd8
[   20.833871]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.834369]  kasan_atomics+0xb8/0x2e0
[   20.834462]  kunit_try_run_case+0x170/0x3f0
[   20.834557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.834671]  kthread+0x328/0x630
[   20.834759]  ret_from_fork+0x10/0x20
[   20.834842] 
[   20.835225] The buggy address belongs to the object at fff00000c7892700
[   20.835225]  which belongs to the cache kmalloc-64 of size 64
[   20.835388] The buggy address is located 0 bytes to the right of
[   20.835388]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.835518] 
[   20.835560] The buggy address belongs to the physical page:
[   20.835634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.835755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.836876] page_type: f5(slab)
[   20.837337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.837582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.837703] page dumped because: kasan: bad access detected
[   20.837921] 
[   20.837983] Memory state around the buggy address:
[   20.838078]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.838186]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.838738] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.838843]                                      ^
[   20.839184]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839331]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839434] ==================================================================
[   20.718098] ==================================================================
[   20.718330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.718473] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.718539] 
[   20.718578] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.718666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.718715] Hardware name: linux,dummy-virt (DT)
[   20.718796] Call trace:
[   20.718848]  show_stack+0x20/0x38 (C)
[   20.718921]  dump_stack_lvl+0x8c/0xd0
[   20.718976]  print_report+0x118/0x608
[   20.719026]  kasan_report+0xdc/0x128
[   20.719073]  kasan_check_range+0x100/0x1a8
[   20.719121]  __kasan_check_write+0x20/0x30
[   20.719180]  kasan_atomics_helper+0x1058/0x4858
[   20.719230]  kasan_atomics+0x198/0x2e0
[   20.719279]  kunit_try_run_case+0x170/0x3f0
[   20.719419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.719536]  kthread+0x328/0x630
[   20.719654]  ret_from_fork+0x10/0x20
[   20.719711] 
[   20.719733] Allocated by task 265:
[   20.719773]  kasan_save_stack+0x3c/0x68
[   20.719823]  kasan_save_track+0x20/0x40
[   20.719863]  kasan_save_alloc_info+0x40/0x58
[   20.719908]  __kasan_kmalloc+0xd4/0xd8
[   20.720108]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.720173]  kasan_atomics+0xb8/0x2e0
[   20.720371]  kunit_try_run_case+0x170/0x3f0
[   20.720649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720709]  kthread+0x328/0x630
[   20.720747]  ret_from_fork+0x10/0x20
[   20.720787] 
[   20.721119] The buggy address belongs to the object at fff00000c7892700
[   20.721119]  which belongs to the cache kmalloc-64 of size 64
[   20.721329] The buggy address is located 0 bytes to the right of
[   20.721329]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.721619] 
[   20.721844] The buggy address belongs to the physical page:
[   20.721896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.721963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.722026] page_type: f5(slab)
[   20.722071] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.722505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.722832] page dumped because: kasan: bad access detected
[   20.722885] 
[   20.722907] Memory state around the buggy address:
[   20.722947]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722992]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.723035] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.723076]                                      ^
[   20.723114]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723176]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723214] ==================================================================
[   20.841941] ==================================================================
[   20.842096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.842224] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.842354] 
[   20.842439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.842654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.843667] Hardware name: linux,dummy-virt (DT)
[   20.843802] Call trace:
[   20.844519]  show_stack+0x20/0x38 (C)
[   20.845112]  dump_stack_lvl+0x8c/0xd0
[   20.845267]  print_report+0x118/0x608
[   20.845396]  kasan_report+0xdc/0x128
[   20.845516]  kasan_check_range+0x100/0x1a8
[   20.845634]  __kasan_check_write+0x20/0x30
[   20.845744]  kasan_atomics_helper+0x147c/0x4858
[   20.845864]  kasan_atomics+0x198/0x2e0
[   20.845970]  kunit_try_run_case+0x170/0x3f0
[   20.846098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.846231]  kthread+0x328/0x630
[   20.847445]  ret_from_fork+0x10/0x20
[   20.847957] 
[   20.848008] Allocated by task 265:
[   20.848074]  kasan_save_stack+0x3c/0x68
[   20.848169]  kasan_save_track+0x20/0x40
[   20.848260]  kasan_save_alloc_info+0x40/0x58
[   20.848373]  __kasan_kmalloc+0xd4/0xd8
[   20.848479]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.848585]  kasan_atomics+0xb8/0x2e0
[   20.848672]  kunit_try_run_case+0x170/0x3f0
[   20.849844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.850021]  kthread+0x328/0x630
[   20.850104]  ret_from_fork+0x10/0x20
[   20.850193] 
[   20.850247] The buggy address belongs to the object at fff00000c7892700
[   20.850247]  which belongs to the cache kmalloc-64 of size 64
[   20.851076] The buggy address is located 0 bytes to the right of
[   20.851076]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.851263] 
[   20.851315] The buggy address belongs to the physical page:
[   20.852278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.852447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.852588] page_type: f5(slab)
[   20.852688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.852808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.852921] page dumped because: kasan: bad access detected
[   20.853006] 
[   20.853054] Memory state around the buggy address:
[   20.854484]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854621]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855168] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855283]                                      ^
[   20.855615]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855728]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855822] ==================================================================
[   20.605138] ==================================================================
[   20.605208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   20.605270] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.605337] 
[   20.605374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.605464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.605494] Hardware name: linux,dummy-virt (DT)
[   20.605526] Call trace:
[   20.605551]  show_stack+0x20/0x38 (C)
[   20.605602]  dump_stack_lvl+0x8c/0xd0
[   20.605653]  print_report+0x118/0x608
[   20.605700]  kasan_report+0xdc/0x128
[   20.605746]  kasan_check_range+0x100/0x1a8
[   20.605795]  __kasan_check_write+0x20/0x30
[   20.605841]  kasan_atomics_helper+0x934/0x4858
[   20.605889]  kasan_atomics+0x198/0x2e0
[   20.606964]  kunit_try_run_case+0x170/0x3f0
[   20.607069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.607176]  kthread+0x328/0x630
[   20.607222]  ret_from_fork+0x10/0x20
[   20.607270] 
[   20.607347] Allocated by task 265:
[   20.607419]  kasan_save_stack+0x3c/0x68
[   20.607524]  kasan_save_track+0x20/0x40
[   20.607574]  kasan_save_alloc_info+0x40/0x58
[   20.607616]  __kasan_kmalloc+0xd4/0xd8
[   20.607654]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.607696]  kasan_atomics+0xb8/0x2e0
[   20.607734]  kunit_try_run_case+0x170/0x3f0
[   20.607773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.608005]  kthread+0x328/0x630
[   20.608075]  ret_from_fork+0x10/0x20
[   20.608253] 
[   20.608373] The buggy address belongs to the object at fff00000c7892700
[   20.608373]  which belongs to the cache kmalloc-64 of size 64
[   20.608444] The buggy address is located 0 bytes to the right of
[   20.608444]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.608521] 
[   20.608546] The buggy address belongs to the physical page:
[   20.608580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.608637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.608691] page_type: f5(slab)
[   20.608736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.608788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.608831] page dumped because: kasan: bad access detected
[   20.609180] 
[   20.609209] Memory state around the buggy address:
[   20.609252]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.609679]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.609801] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.609847]                                      ^
[   20.609902]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.610119]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.610177] ==================================================================
[   20.964503] ==================================================================
[   20.964637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.964752] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.964867] 
[   20.964940] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.965130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.965199] Hardware name: linux,dummy-virt (DT)
[   20.965271] Call trace:
[   20.965338]  show_stack+0x20/0x38 (C)
[   20.965809]  dump_stack_lvl+0x8c/0xd0
[   20.966187]  print_report+0x118/0x608
[   20.966326]  kasan_report+0xdc/0x128
[   20.966514]  kasan_check_range+0x100/0x1a8
[   20.966622]  __kasan_check_write+0x20/0x30
[   20.966813]  kasan_atomics_helper+0x175c/0x4858
[   20.967131]  kasan_atomics+0x198/0x2e0
[   20.967397]  kunit_try_run_case+0x170/0x3f0
[   20.967825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.967947]  kthread+0x328/0x630
[   20.968048]  ret_from_fork+0x10/0x20
[   20.968205] 
[   20.968276] Allocated by task 265:
[   20.968375]  kasan_save_stack+0x3c/0x68
[   20.968534]  kasan_save_track+0x20/0x40
[   20.968671]  kasan_save_alloc_info+0x40/0x58
[   20.968801]  __kasan_kmalloc+0xd4/0xd8
[   20.968922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.969022]  kasan_atomics+0xb8/0x2e0
[   20.969121]  kunit_try_run_case+0x170/0x3f0
[   20.969225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.969357]  kthread+0x328/0x630
[   20.969426]  ret_from_fork+0x10/0x20
[   20.969501] 
[   20.969548] The buggy address belongs to the object at fff00000c7892700
[   20.969548]  which belongs to the cache kmalloc-64 of size 64
[   20.969677] The buggy address is located 0 bytes to the right of
[   20.969677]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.969818] 
[   20.969866] The buggy address belongs to the physical page:
[   20.969946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.970182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.970613] page_type: f5(slab)
[   20.970737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.971101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.971367] page dumped because: kasan: bad access detected
[   20.971449] 
[   20.971494] Memory state around the buggy address:
[   20.971555]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.971660]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.971756] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.971851]                                      ^
[   20.971927]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.972042]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.972140] ==================================================================
[   20.905541] ==================================================================
[   20.905661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.905769] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.905878] 
[   20.905955] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.907477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.907579] Hardware name: linux,dummy-virt (DT)
[   20.907677] Call trace:
[   20.907751]  show_stack+0x20/0x38 (C)
[   20.908008]  dump_stack_lvl+0x8c/0xd0
[   20.909108]  print_report+0x118/0x608
[   20.909639]  kasan_report+0xdc/0x128
[   20.909773]  __asan_report_load8_noabort+0x20/0x30
[   20.909890]  kasan_atomics_helper+0x3db0/0x4858
[   20.910001]  kasan_atomics+0x198/0x2e0
[   20.911117]  kunit_try_run_case+0x170/0x3f0
[   20.911267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.911478]  kthread+0x328/0x630
[   20.911605]  ret_from_fork+0x10/0x20
[   20.911785] 
[   20.911861] Allocated by task 265:
[   20.912350]  kasan_save_stack+0x3c/0x68
[   20.912832]  kasan_save_track+0x20/0x40
[   20.912953]  kasan_save_alloc_info+0x40/0x58
[   20.913052]  __kasan_kmalloc+0xd4/0xd8
[   20.913137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.913637]  kasan_atomics+0xb8/0x2e0
[   20.913753]  kunit_try_run_case+0x170/0x3f0
[   20.913850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.913953]  kthread+0x328/0x630
[   20.914034]  ret_from_fork+0x10/0x20
[   20.914550] 
[   20.914800] The buggy address belongs to the object at fff00000c7892700
[   20.914800]  which belongs to the cache kmalloc-64 of size 64
[   20.915129] The buggy address is located 0 bytes to the right of
[   20.915129]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.915423] 
[   20.915465] The buggy address belongs to the physical page:
[   20.915903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.916051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.916568] page_type: f5(slab)
[   20.917001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.917145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.917254] page dumped because: kasan: bad access detected
[   20.917701] 
[   20.917821] Memory state around the buggy address:
[   20.917951]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.918419]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.918586] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.918684]                                      ^
[   20.918802]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918963]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.919047] ==================================================================
[   20.472076] ==================================================================
[   20.489587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   20.490126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.490390]  show_stack+0x20/0x38 (C)
[   20.490845]  kasan_atomics_helper+0x40a8/0x4858
[   20.491937]  kasan_save_stack+0x3c/0x68
[   20.492697] The buggy address is located 0 bytes to the right of
[   20.492697]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.493660]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.493720]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.494333] ==================================================================
[   20.859131] ==================================================================
[   20.859276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.859397] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.859982] 
[   20.860497] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.860734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.860916] Hardware name: linux,dummy-virt (DT)
[   20.860992] Call trace:
[   20.861044]  show_stack+0x20/0x38 (C)
[   20.861161]  dump_stack_lvl+0x8c/0xd0
[   20.861951]  print_report+0x118/0x608
[   20.862086]  kasan_report+0xdc/0x128
[   20.862194]  kasan_check_range+0x100/0x1a8
[   20.862412]  __kasan_check_write+0x20/0x30
[   20.862506]  kasan_atomics_helper+0x14e4/0x4858
[   20.863038]  kasan_atomics+0x198/0x2e0
[   20.863408]  kunit_try_run_case+0x170/0x3f0
[   20.863651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863759]  kthread+0x328/0x630
[   20.863854]  ret_from_fork+0x10/0x20
[   20.864313] 
[   20.864657] Allocated by task 265:
[   20.864754]  kasan_save_stack+0x3c/0x68
[   20.864851]  kasan_save_track+0x20/0x40
[   20.865199]  kasan_save_alloc_info+0x40/0x58
[   20.865473]  __kasan_kmalloc+0xd4/0xd8
[   20.865570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.865961]  kasan_atomics+0xb8/0x2e0
[   20.866085]  kunit_try_run_case+0x170/0x3f0
[   20.866186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866829]  kthread+0x328/0x630
[   20.866930]  ret_from_fork+0x10/0x20
[   20.866999] 
[   20.867627] The buggy address belongs to the object at fff00000c7892700
[   20.867627]  which belongs to the cache kmalloc-64 of size 64
[   20.867781] The buggy address is located 0 bytes to the right of
[   20.867781]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.868288] 
[   20.868373] The buggy address belongs to the physical page:
[   20.868468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.868906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.869494] page_type: f5(slab)
[   20.869620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.869738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.869851] page dumped because: kasan: bad access detected
[   20.869941] 
[   20.869989] Memory state around the buggy address:
[   20.870079]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.870188]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.870285] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.870390]                                      ^
[   20.870490]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.870935]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.871037] ==================================================================
[   20.733910] ==================================================================
[   20.734311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.734441] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.734623] 
[   20.735247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.735438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.735635] Hardware name: linux,dummy-virt (DT)
[   20.735824] Call trace:
[   20.735929]  show_stack+0x20/0x38 (C)
[   20.735993]  dump_stack_lvl+0x8c/0xd0
[   20.736365]  print_report+0x118/0x608
[   20.736638]  kasan_report+0xdc/0x128
[   20.736701]  kasan_check_range+0x100/0x1a8
[   20.736777]  __kasan_check_write+0x20/0x30
[   20.737211]  kasan_atomics_helper+0x1128/0x4858
[   20.737336]  kasan_atomics+0x198/0x2e0
[   20.737389]  kunit_try_run_case+0x170/0x3f0
[   20.737444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.738070]  kthread+0x328/0x630
[   20.738139]  ret_from_fork+0x10/0x20
[   20.738198] 
[   20.738221] Allocated by task 265:
[   20.738315]  kasan_save_stack+0x3c/0x68
[   20.738479]  kasan_save_track+0x20/0x40
[   20.738636]  kasan_save_alloc_info+0x40/0x58
[   20.738717]  __kasan_kmalloc+0xd4/0xd8
[   20.739079]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.739373]  kasan_atomics+0xb8/0x2e0
[   20.739448]  kunit_try_run_case+0x170/0x3f0
[   20.739527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.739574]  kthread+0x328/0x630
[   20.739610]  ret_from_fork+0x10/0x20
[   20.739650] 
[   20.739675] The buggy address belongs to the object at fff00000c7892700
[   20.739675]  which belongs to the cache kmalloc-64 of size 64
[   20.739971] The buggy address is located 0 bytes to the right of
[   20.739971]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.740045] 
[   20.740071] The buggy address belongs to the physical page:
[   20.740109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.740528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.740593] page_type: f5(slab)
[   20.740641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.740964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.741342] page dumped because: kasan: bad access detected
[   20.741550] 
[   20.741578] Memory state around the buggy address:
[   20.741832]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741930]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741986] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.742029]                                      ^
[   20.742072]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742120]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742165] ==================================================================
[   20.701899] ==================================================================
[   20.701988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.702065] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.702561] 
[   20.702607] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.702713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.702746] Hardware name: linux,dummy-virt (DT)
[   20.703131] Call trace:
[   20.703176]  show_stack+0x20/0x38 (C)
[   20.703236]  dump_stack_lvl+0x8c/0xd0
[   20.703692]  print_report+0x118/0x608
[   20.703795]  kasan_report+0xdc/0x128
[   20.703850]  kasan_check_range+0x100/0x1a8
[   20.703900]  __kasan_check_write+0x20/0x30
[   20.703963]  kasan_atomics_helper+0xf88/0x4858
[   20.704013]  kasan_atomics+0x198/0x2e0
[   20.704059]  kunit_try_run_case+0x170/0x3f0
[   20.704111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.704165]  kthread+0x328/0x630
[   20.704207]  ret_from_fork+0x10/0x20
[   20.704258] 
[   20.704280] Allocated by task 265:
[   20.704314]  kasan_save_stack+0x3c/0x68
[   20.704540]  kasan_save_track+0x20/0x40
[   20.704914]  kasan_save_alloc_info+0x40/0x58
[   20.705212]  __kasan_kmalloc+0xd4/0xd8
[   20.705279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.705343]  kasan_atomics+0xb8/0x2e0
[   20.705387]  kunit_try_run_case+0x170/0x3f0
[   20.706143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.706229]  kthread+0x328/0x630
[   20.706279]  ret_from_fork+0x10/0x20
[   20.706328] 
[   20.706367] The buggy address belongs to the object at fff00000c7892700
[   20.706367]  which belongs to the cache kmalloc-64 of size 64
[   20.706430] The buggy address is located 0 bytes to the right of
[   20.706430]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.706696] 
[   20.706741] The buggy address belongs to the physical page:
[   20.706970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.707034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.707409] page_type: f5(slab)
[   20.707629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.707720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.707942] page dumped because: kasan: bad access detected
[   20.708219] 
[   20.708246] Memory state around the buggy address:
[   20.708289]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.708421]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.708489] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.708685]                                      ^
[   20.708730]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.708790]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.709241] ==================================================================
[   20.809692] ==================================================================
[   20.809819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.809944] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.810062] 
[   20.810142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.810350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.810422] Hardware name: linux,dummy-virt (DT)
[   20.810505] Call trace:
[   20.810560]  show_stack+0x20/0x38 (C)
[   20.810678]  dump_stack_lvl+0x8c/0xd0
[   20.812015]  print_report+0x118/0x608
[   20.812298]  kasan_report+0xdc/0x128
[   20.812589]  __asan_report_load8_noabort+0x20/0x30
[   20.812747]  kasan_atomics_helper+0x3f04/0x4858
[   20.813009]  kasan_atomics+0x198/0x2e0
[   20.813332]  kunit_try_run_case+0x170/0x3f0
[   20.814027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.814176]  kthread+0x328/0x630
[   20.814277]  ret_from_fork+0x10/0x20
[   20.814803] 
[   20.814910] Allocated by task 265:
[   20.815086]  kasan_save_stack+0x3c/0x68
[   20.815183]  kasan_save_track+0x20/0x40
[   20.815754]  kasan_save_alloc_info+0x40/0x58
[   20.815875]  __kasan_kmalloc+0xd4/0xd8
[   20.815963]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.816056]  kasan_atomics+0xb8/0x2e0
[   20.816221]  kunit_try_run_case+0x170/0x3f0
[   20.816334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.817030]  kthread+0x328/0x630
[   20.817135]  ret_from_fork+0x10/0x20
[   20.817473] 
[   20.817769] The buggy address belongs to the object at fff00000c7892700
[   20.817769]  which belongs to the cache kmalloc-64 of size 64
[   20.818565] The buggy address is located 0 bytes to the right of
[   20.818565]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.818786] 
[   20.818868] The buggy address belongs to the physical page:
[   20.819495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.819698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.820030] page_type: f5(slab)
[   20.820590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.820845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.821246] page dumped because: kasan: bad access detected
[   20.821365] 
[   20.821658] Memory state around the buggy address:
[   20.821743]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.822146]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.822426] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.822527]                                      ^
[   20.822834]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.823849]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.824289] ==================================================================
[   20.686819] ==================================================================
[   20.686895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.687097] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.687348] 
[   20.687544] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.687773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.687847] Hardware name: linux,dummy-virt (DT)
[   20.687951] Call trace:
[   20.688097]  show_stack+0x20/0x38 (C)
[   20.688158]  dump_stack_lvl+0x8c/0xd0
[   20.688217]  print_report+0x118/0x608
[   20.688308]  kasan_report+0xdc/0x128
[   20.688559]  kasan_check_range+0x100/0x1a8
[   20.688751]  __kasan_check_write+0x20/0x30
[   20.688801]  kasan_atomics_helper+0xeb8/0x4858
[   20.688987]  kasan_atomics+0x198/0x2e0
[   20.689077]  kunit_try_run_case+0x170/0x3f0
[   20.689334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689442]  kthread+0x328/0x630
[   20.689512]  ret_from_fork+0x10/0x20
[   20.689701] 
[   20.689743] Allocated by task 265:
[   20.689816]  kasan_save_stack+0x3c/0x68
[   20.689864]  kasan_save_track+0x20/0x40
[   20.689907]  kasan_save_alloc_info+0x40/0x58
[   20.689950]  __kasan_kmalloc+0xd4/0xd8
[   20.689988]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.690028]  kasan_atomics+0xb8/0x2e0
[   20.690065]  kunit_try_run_case+0x170/0x3f0
[   20.690104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.690654]  kthread+0x328/0x630
[   20.690700]  ret_from_fork+0x10/0x20
[   20.690791] 
[   20.691010] The buggy address belongs to the object at fff00000c7892700
[   20.691010]  which belongs to the cache kmalloc-64 of size 64
[   20.691658] The buggy address is located 0 bytes to the right of
[   20.691658]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.692118] 
[   20.692176] The buggy address belongs to the physical page:
[   20.692213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.692272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.692339] page_type: f5(slab)
[   20.692386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.692442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.693369] page dumped because: kasan: bad access detected
[   20.693430] 
[   20.693453] Memory state around the buggy address:
[   20.693492]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693541]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693628] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.693670]                                      ^
[   20.693747]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.693826]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.693866] ==================================================================
[   20.618357] ==================================================================
[   20.618415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.618474] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.618526] 
[   20.618560] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.618648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.618676] Hardware name: linux,dummy-virt (DT)
[   20.618707] Call trace:
[   20.618732]  show_stack+0x20/0x38 (C)
[   20.619669]  dump_stack_lvl+0x8c/0xd0
[   20.619769]  print_report+0x118/0x608
[   20.619820]  kasan_report+0xdc/0x128
[   20.620014]  kasan_check_range+0x100/0x1a8
[   20.620074]  __kasan_check_write+0x20/0x30
[   20.620120]  kasan_atomics_helper+0xa04/0x4858
[   20.620264]  kasan_atomics+0x198/0x2e0
[   20.620422]  kunit_try_run_case+0x170/0x3f0
[   20.620548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.620754]  kthread+0x328/0x630
[   20.620862]  ret_from_fork+0x10/0x20
[   20.620993] 
[   20.621015] Allocated by task 265:
[   20.621049]  kasan_save_stack+0x3c/0x68
[   20.621095]  kasan_save_track+0x20/0x40
[   20.621164]  kasan_save_alloc_info+0x40/0x58
[   20.621348]  __kasan_kmalloc+0xd4/0xd8
[   20.621569]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.621667]  kasan_atomics+0xb8/0x2e0
[   20.621717]  kunit_try_run_case+0x170/0x3f0
[   20.621758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.621802]  kthread+0x328/0x630
[   20.621834]  ret_from_fork+0x10/0x20
[   20.621870] 
[   20.622176] The buggy address belongs to the object at fff00000c7892700
[   20.622176]  which belongs to the cache kmalloc-64 of size 64
[   20.622246] The buggy address is located 0 bytes to the right of
[   20.622246]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.622453] 
[   20.622481] The buggy address belongs to the physical page:
[   20.622525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.622856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.622944] page_type: f5(slab)
[   20.622996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.623140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.623185] page dumped because: kasan: bad access detected
[   20.623220] 
[   20.623241] Memory state around the buggy address:
[   20.623276]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623352]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623402] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.623448]                                      ^
[   20.623484]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.623526]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.623564] ==================================================================
[   20.873564] ==================================================================
[   20.873686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.873797] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.873907] 
[   20.874616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.875426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.875512] Hardware name: linux,dummy-virt (DT)
[   20.875604] Call trace:
[   20.875672]  show_stack+0x20/0x38 (C)
[   20.876071]  dump_stack_lvl+0x8c/0xd0
[   20.876205]  print_report+0x118/0x608
[   20.876314]  kasan_report+0xdc/0x128
[   20.876440]  kasan_check_range+0x100/0x1a8
[   20.876570]  __kasan_check_write+0x20/0x30
[   20.877363]  kasan_atomics_helper+0x154c/0x4858
[   20.877504]  kasan_atomics+0x198/0x2e0
[   20.877606]  kunit_try_run_case+0x170/0x3f0
[   20.877722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877841]  kthread+0x328/0x630
[   20.878804]  ret_from_fork+0x10/0x20
[   20.879166] 
[   20.879231] Allocated by task 265:
[   20.879330]  kasan_save_stack+0x3c/0x68
[   20.879553]  kasan_save_track+0x20/0x40
[   20.879640]  kasan_save_alloc_info+0x40/0x58
[   20.879730]  __kasan_kmalloc+0xd4/0xd8
[   20.880271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.880841]  kasan_atomics+0xb8/0x2e0
[   20.880943]  kunit_try_run_case+0x170/0x3f0
[   20.881493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881646]  kthread+0x328/0x630
[   20.881733]  ret_from_fork+0x10/0x20
[   20.882159] 
[   20.882468] The buggy address belongs to the object at fff00000c7892700
[   20.882468]  which belongs to the cache kmalloc-64 of size 64
[   20.882802] The buggy address is located 0 bytes to the right of
[   20.882802]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.882992] 
[   20.883044] The buggy address belongs to the physical page:
[   20.883684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.884055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.884594] page_type: f5(slab)
[   20.884859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.884993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.885096] page dumped because: kasan: bad access detected
[   20.885174] 
[   20.885220] Memory state around the buggy address:
[   20.885764]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885889]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885989] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.886523]                                      ^
[   20.886937]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887248]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887606] ==================================================================
[   20.778432] ==================================================================
[   20.778551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.778716] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.779067] 
[   20.779160] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.779368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.779449] Hardware name: linux,dummy-virt (DT)
[   20.779559] Call trace:
[   20.779622]  show_stack+0x20/0x38 (C)
[   20.779796]  dump_stack_lvl+0x8c/0xd0
[   20.779933]  print_report+0x118/0x608
[   20.780070]  kasan_report+0xdc/0x128
[   20.780173]  kasan_check_range+0x100/0x1a8
[   20.780432]  __kasan_check_write+0x20/0x30
[   20.780557]  kasan_atomics_helper+0x12d8/0x4858
[   20.780822]  kasan_atomics+0x198/0x2e0
[   20.781018]  kunit_try_run_case+0x170/0x3f0
[   20.781249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.781386]  kthread+0x328/0x630
[   20.781488]  ret_from_fork+0x10/0x20
[   20.782074] 
[   20.782229] Allocated by task 265:
[   20.782446]  kasan_save_stack+0x3c/0x68
[   20.782911]  kasan_save_track+0x20/0x40
[   20.783548]  kasan_save_alloc_info+0x40/0x58
[   20.784019]  __kasan_kmalloc+0xd4/0xd8
[   20.784123]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.784647]  kasan_atomics+0xb8/0x2e0
[   20.784749]  kunit_try_run_case+0x170/0x3f0
[   20.784905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.785387]  kthread+0x328/0x630
[   20.787067]  ret_from_fork+0x10/0x20
[   20.787204] 
[   20.787257] The buggy address belongs to the object at fff00000c7892700
[   20.787257]  which belongs to the cache kmalloc-64 of size 64
[   20.787570] The buggy address is located 0 bytes to the right of
[   20.787570]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.787710] 
[   20.787758] The buggy address belongs to the physical page:
[   20.787835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.787963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.788085] page_type: f5(slab)
[   20.788182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.788303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.788400] page dumped because: kasan: bad access detected
[   20.788477] 
[   20.788523] Memory state around the buggy address:
[   20.788600]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788702]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788816] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.788896]                                      ^
[   20.789199]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789694]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789807] ==================================================================
[   20.743400] ==================================================================
[   20.743665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.743881] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.743989] 
[   20.744031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.744121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.744152] Hardware name: linux,dummy-virt (DT)
[   20.744187] Call trace:
[   20.744213]  show_stack+0x20/0x38 (C)
[   20.744268]  dump_stack_lvl+0x8c/0xd0
[   20.744333]  print_report+0x118/0x608
[   20.744386]  kasan_report+0xdc/0x128
[   20.744437]  kasan_check_range+0x100/0x1a8
[   20.744631]  __kasan_check_write+0x20/0x30
[   20.744754]  kasan_atomics_helper+0x1190/0x4858
[   20.744874]  kasan_atomics+0x198/0x2e0
[   20.744983]  kunit_try_run_case+0x170/0x3f0
[   20.745103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.745233]  kthread+0x328/0x630
[   20.745382]  ret_from_fork+0x10/0x20
[   20.745505] 
[   20.745554] Allocated by task 265:
[   20.745626]  kasan_save_stack+0x3c/0x68
[   20.746209]  kasan_save_track+0x20/0x40
[   20.747155]  kasan_save_alloc_info+0x40/0x58
[   20.747294]  __kasan_kmalloc+0xd4/0xd8
[   20.747551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.747675]  kasan_atomics+0xb8/0x2e0
[   20.747771]  kunit_try_run_case+0x170/0x3f0
[   20.747867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.747975]  kthread+0x328/0x630
[   20.748063]  ret_from_fork+0x10/0x20
[   20.748157] 
[   20.748213] The buggy address belongs to the object at fff00000c7892700
[   20.748213]  which belongs to the cache kmalloc-64 of size 64
[   20.748356] The buggy address is located 0 bytes to the right of
[   20.748356]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.748750] 
[   20.748805] The buggy address belongs to the physical page:
[   20.748948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.749384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.749684] page_type: f5(slab)
[   20.749840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.749956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.750056] page dumped because: kasan: bad access detected
[   20.750163] 
[   20.750216] Memory state around the buggy address:
[   20.750316]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.750483]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.750797] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.750891]                                      ^
[   20.750976]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751184]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751361] ==================================================================
[   20.973037] ==================================================================
[   20.973330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.973647] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.973830] 
[   20.973908] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.974109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.974178] Hardware name: linux,dummy-virt (DT)
[   20.974251] Call trace:
[   20.974302]  show_stack+0x20/0x38 (C)
[   20.974433]  dump_stack_lvl+0x8c/0xd0
[   20.974533]  print_report+0x118/0x608
[   20.974642]  kasan_report+0xdc/0x128
[   20.974749]  __asan_report_load8_noabort+0x20/0x30
[   20.974907]  kasan_atomics_helper+0x3e20/0x4858
[   20.975029]  kasan_atomics+0x198/0x2e0
[   20.975459]  kunit_try_run_case+0x170/0x3f0
[   20.975646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.975977]  kthread+0x328/0x630
[   20.976092]  ret_from_fork+0x10/0x20
[   20.976358] 
[   20.976546] Allocated by task 265:
[   20.976777]  kasan_save_stack+0x3c/0x68
[   20.976863]  kasan_save_track+0x20/0x40
[   20.976962]  kasan_save_alloc_info+0x40/0x58
[   20.977052]  __kasan_kmalloc+0xd4/0xd8
[   20.977150]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.977235]  kasan_atomics+0xb8/0x2e0
[   20.977329]  kunit_try_run_case+0x170/0x3f0
[   20.977422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.977530]  kthread+0x328/0x630
[   20.977604]  ret_from_fork+0x10/0x20
[   20.977683] 
[   20.977976] The buggy address belongs to the object at fff00000c7892700
[   20.977976]  which belongs to the cache kmalloc-64 of size 64
[   20.978741] The buggy address is located 0 bytes to the right of
[   20.978741]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.978942] 
[   20.978991] The buggy address belongs to the physical page:
[   20.979066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.979200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.979312] page_type: f5(slab)
[   20.979430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.979724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.979886] page dumped because: kasan: bad access detected
[   20.980024] 
[   20.980072] Memory state around the buggy address:
[   20.980354]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.980489]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.980642] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.980754]                                      ^
[   20.980862]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.981028]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.981171] ==================================================================
[   20.921748] ==================================================================
[   20.922280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.922436] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.922545] 
[   20.923066] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.923395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.923534] Hardware name: linux,dummy-virt (DT)
[   20.923601] Call trace:
[   20.923820]  show_stack+0x20/0x38 (C)
[   20.923944]  dump_stack_lvl+0x8c/0xd0
[   20.924332]  print_report+0x118/0x608
[   20.924463]  kasan_report+0xdc/0x128
[   20.924573]  kasan_check_range+0x100/0x1a8
[   20.924897]  __kasan_check_write+0x20/0x30
[   20.925407]  kasan_atomics_helper+0x1644/0x4858
[   20.925745]  kasan_atomics+0x198/0x2e0
[   20.925858]  kunit_try_run_case+0x170/0x3f0
[   20.925982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.926105]  kthread+0x328/0x630
[   20.926204]  ret_from_fork+0x10/0x20
[   20.926309] 
[   20.926367] Allocated by task 265:
[   20.927119]  kasan_save_stack+0x3c/0x68
[   20.927619]  kasan_save_track+0x20/0x40
[   20.927866]  kasan_save_alloc_info+0x40/0x58
[   20.927971]  __kasan_kmalloc+0xd4/0xd8
[   20.928406]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.928521]  kasan_atomics+0xb8/0x2e0
[   20.928991]  kunit_try_run_case+0x170/0x3f0
[   20.929104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.929539]  kthread+0x328/0x630
[   20.929624]  ret_from_fork+0x10/0x20
[   20.929703] 
[   20.929750] The buggy address belongs to the object at fff00000c7892700
[   20.929750]  which belongs to the cache kmalloc-64 of size 64
[   20.930234] The buggy address is located 0 bytes to the right of
[   20.930234]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.930694] 
[   20.930750] The buggy address belongs to the physical page:
[   20.930821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.931287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.931596] page_type: f5(slab)
[   20.931902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.932007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.932228] page dumped because: kasan: bad access detected
[   20.932471] 
[   20.932684] Memory state around the buggy address:
[   20.932953]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933213]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933329] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.933473]                                      ^
[   20.933557]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.933686]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.933788] ==================================================================
[   20.664069] ==================================================================
[   20.664118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.664195] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.664248] 
[   20.664279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.664379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.664410] Hardware name: linux,dummy-virt (DT)
[   20.664444] Call trace:
[   20.664484]  show_stack+0x20/0x38 (C)
[   20.664541]  dump_stack_lvl+0x8c/0xd0
[   20.664593]  print_report+0x118/0x608
[   20.664667]  kasan_report+0xdc/0x128
[   20.664723]  kasan_check_range+0x100/0x1a8
[   20.664778]  __kasan_check_write+0x20/0x30
[   20.664829]  kasan_atomics_helper+0xd3c/0x4858
[   20.664894]  kasan_atomics+0x198/0x2e0
[   20.665000]  kunit_try_run_case+0x170/0x3f0
[   20.665055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665115]  kthread+0x328/0x630
[   20.665162]  ret_from_fork+0x10/0x20
[   20.665216] 
[   20.665241] Allocated by task 265:
[   20.665273]  kasan_save_stack+0x3c/0x68
[   20.665327]  kasan_save_track+0x20/0x40
[   20.665372]  kasan_save_alloc_info+0x40/0x58
[   20.665413]  __kasan_kmalloc+0xd4/0xd8
[   20.665451]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.665491]  kasan_atomics+0xb8/0x2e0
[   20.665527]  kunit_try_run_case+0x170/0x3f0
[   20.665563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665608]  kthread+0x328/0x630
[   20.665640]  ret_from_fork+0x10/0x20
[   20.665675] 
[   20.665698] The buggy address belongs to the object at fff00000c7892700
[   20.665698]  which belongs to the cache kmalloc-64 of size 64
[   20.665753] The buggy address is located 0 bytes to the right of
[   20.665753]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.665814] 
[   20.665838] The buggy address belongs to the physical page:
[   20.665869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.665919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.665967] page_type: f5(slab)
[   20.666009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.666060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.666100] page dumped because: kasan: bad access detected
[   20.666132] 
[   20.666159] Memory state around the buggy address:
[   20.666228]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.666311]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.666369] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.666408]                                      ^
[   20.666442]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666483]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666533] ==================================================================
[   20.630225] ==================================================================
[   20.630275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.630667] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.630774] 
[   20.630862] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.630969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.631000] Hardware name: linux,dummy-virt (DT)
[   20.631132] Call trace:
[   20.631162]  show_stack+0x20/0x38 (C)
[   20.631254]  dump_stack_lvl+0x8c/0xd0
[   20.631451]  print_report+0x118/0x608
[   20.631640]  kasan_report+0xdc/0x128
[   20.631830]  kasan_check_range+0x100/0x1a8
[   20.631950]  __kasan_check_write+0x20/0x30
[   20.632084]  kasan_atomics_helper+0xad4/0x4858
[   20.632312]  kasan_atomics+0x198/0x2e0
[   20.632398]  kunit_try_run_case+0x170/0x3f0
[   20.632613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.632783]  kthread+0x328/0x630
[   20.632832]  ret_from_fork+0x10/0x20
[   20.632883] 
[   20.632905] Allocated by task 265:
[   20.633131]  kasan_save_stack+0x3c/0x68
[   20.633393]  kasan_save_track+0x20/0x40
[   20.633471]  kasan_save_alloc_info+0x40/0x58
[   20.633716]  __kasan_kmalloc+0xd4/0xd8
[   20.633782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.633826]  kasan_atomics+0xb8/0x2e0
[   20.633908]  kunit_try_run_case+0x170/0x3f0
[   20.633955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.634005]  kthread+0x328/0x630
[   20.634077]  ret_from_fork+0x10/0x20
[   20.634588] 
[   20.634670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.634723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.634773] page_type: f5(slab)
[   20.634856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.634968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.635030] page dumped because: kasan: bad access detected
[   20.635075] 
[   20.635130] Memory state around the buggy address:
[   20.635189]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635233]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635389]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.636144] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.636602]  kasan_report+0xdc/0x128
[   20.638157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.639199] 
[   20.639328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.643813] 
[   20.644124]  kunit_try_run_case+0x170/0x3f0
[   20.645046] 
[   20.645505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.645977]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646421]                                      ^
[   20.647027] ==================================================================
[   20.598803] ==================================================================
[   20.598856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.599071] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.599144] 
[   20.599181] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.599293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.599336] Hardware name: linux,dummy-virt (DT)
[   20.599372] Call trace:
[   20.599395]  show_stack+0x20/0x38 (C)
[   20.599450]  dump_stack_lvl+0x8c/0xd0
[   20.599501]  print_report+0x118/0x608
[   20.599548]  kasan_report+0xdc/0x128
[   20.599769]  __asan_report_load4_noabort+0x20/0x30
[   20.599966]  kasan_atomics_helper+0x42d8/0x4858
[   20.600148]  kasan_atomics+0x198/0x2e0
[   20.600576]  kunit_try_run_case+0x170/0x3f0
[   20.600670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.600732]  kthread+0x328/0x630
[   20.600779]  ret_from_fork+0x10/0x20
[   20.600834] 
[   20.600857] Allocated by task 265:
[   20.600890]  kasan_save_stack+0x3c/0x68
[   20.600940]  kasan_save_track+0x20/0x40
[   20.600983]  kasan_save_alloc_info+0x40/0x58
[   20.601948]  __kasan_kmalloc+0xd4/0xd8
[   20.602218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.602269]  kasan_atomics+0xb8/0x2e0
[   20.602306]  kunit_try_run_case+0x170/0x3f0
[   20.602363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.602410]  kthread+0x328/0x630
[   20.602446]  ret_from_fork+0x10/0x20
[   20.602484] 
[   20.602508] The buggy address belongs to the object at fff00000c7892700
[   20.602508]  which belongs to the cache kmalloc-64 of size 64
[   20.602568] The buggy address is located 0 bytes to the right of
[   20.602568]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.602632] 
[   20.602656] The buggy address belongs to the physical page:
[   20.602871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.603057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.603127] page_type: f5(slab)
[   20.603218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.603293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.603397] page dumped because: kasan: bad access detected
[   20.603446] 
[   20.603467] Memory state around the buggy address:
[   20.603554]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.603620]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.603664] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.603712]                                      ^
[   20.603968]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.604035]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.604078] ==================================================================
[   20.944686] ==================================================================
[   20.944822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.944990] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.945112] 
[   20.945188] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.945385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.945440] Hardware name: linux,dummy-virt (DT)
[   20.945502] Call trace:
[   20.945548]  show_stack+0x20/0x38 (C)
[   20.945649]  dump_stack_lvl+0x8c/0xd0
[   20.945750]  print_report+0x118/0x608
[   20.945853]  kasan_report+0xdc/0x128
[   20.945956]  kasan_check_range+0x100/0x1a8
[   20.946087]  __kasan_check_write+0x20/0x30
[   20.946357]  kasan_atomics_helper+0x16d0/0x4858
[   20.946799]  kasan_atomics+0x198/0x2e0
[   20.947067]  kunit_try_run_case+0x170/0x3f0
[   20.947477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947635]  kthread+0x328/0x630
[   20.947726]  ret_from_fork+0x10/0x20
[   20.947812] 
[   20.947849] Allocated by task 265:
[   20.947913]  kasan_save_stack+0x3c/0x68
[   20.948004]  kasan_save_track+0x20/0x40
[   20.948182]  kasan_save_alloc_info+0x40/0x58
[   20.948286]  __kasan_kmalloc+0xd4/0xd8
[   20.948482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.949045]  kasan_atomics+0xb8/0x2e0
[   20.949139]  kunit_try_run_case+0x170/0x3f0
[   20.949300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949432]  kthread+0x328/0x630
[   20.949514]  ret_from_fork+0x10/0x20
[   20.949604] 
[   20.949653] The buggy address belongs to the object at fff00000c7892700
[   20.949653]  which belongs to the cache kmalloc-64 of size 64
[   20.949795] The buggy address is located 0 bytes to the right of
[   20.949795]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.949982] 
[   20.950033] The buggy address belongs to the physical page:
[   20.950114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.950264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.950400] page_type: f5(slab)
[   20.950528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.950651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.950760] page dumped because: kasan: bad access detected
[   20.951013] 
[   20.951080] Memory state around the buggy address:
[   20.951164]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951439]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.952005] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.952214]                                      ^
[   20.952601]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952858]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952963] ==================================================================
[   20.612568] ==================================================================
[   20.612657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.612759] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.612814] 
[   20.612848] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.612936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.612965] Hardware name: linux,dummy-virt (DT)
[   20.612999] Call trace:
[   20.613023]  show_stack+0x20/0x38 (C)
[   20.613078]  dump_stack_lvl+0x8c/0xd0
[   20.613128]  print_report+0x118/0x608
[   20.613174]  kasan_report+0xdc/0x128
[   20.613221]  kasan_check_range+0x100/0x1a8
[   20.613268]  __kasan_check_write+0x20/0x30
[   20.613313]  kasan_atomics_helper+0x99c/0x4858
[   20.613377]  kasan_atomics+0x198/0x2e0
[   20.613424]  kunit_try_run_case+0x170/0x3f0
[   20.613496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613679]  kthread+0x328/0x630
[   20.613883]  ret_from_fork+0x10/0x20
[   20.614247] 
[   20.614279] Allocated by task 265:
[   20.614312]  kasan_save_stack+0x3c/0x68
[   20.614438]  kasan_save_track+0x20/0x40
[   20.614491]  kasan_save_alloc_info+0x40/0x58
[   20.614646]  __kasan_kmalloc+0xd4/0xd8
[   20.614905]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.614986]  kasan_atomics+0xb8/0x2e0
[   20.615099]  kunit_try_run_case+0x170/0x3f0
[   20.615377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.615433]  kthread+0x328/0x630
[   20.615470]  ret_from_fork+0x10/0x20
[   20.615555] 
[   20.615581] The buggy address belongs to the object at fff00000c7892700
[   20.615581]  which belongs to the cache kmalloc-64 of size 64
[   20.615807] The buggy address is located 0 bytes to the right of
[   20.615807]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.616148] 
[   20.616178] The buggy address belongs to the physical page:
[   20.616213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.616268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.616341] page_type: f5(slab)
[   20.616390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.616444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.616882] page dumped because: kasan: bad access detected
[   20.616931] 
[   20.616958] Memory state around the buggy address:
[   20.617019]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617314]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617379] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.617480]                                      ^
[   20.617520]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.617566]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.618027] ==================================================================
[   20.680153] ==================================================================
[   20.680205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.680259] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.680313] 
[   20.680358] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.680449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.680492] Hardware name: linux,dummy-virt (DT)
[   20.680527] Call trace:
[   20.680554]  show_stack+0x20/0x38 (C)
[   20.680607]  dump_stack_lvl+0x8c/0xd0
[   20.680657]  print_report+0x118/0x608
[   20.680706]  kasan_report+0xdc/0x128
[   20.680766]  kasan_check_range+0x100/0x1a8
[   20.680824]  __kasan_check_write+0x20/0x30
[   20.680869]  kasan_atomics_helper+0xe44/0x4858
[   20.680919]  kasan_atomics+0x198/0x2e0
[   20.680967]  kunit_try_run_case+0x170/0x3f0
[   20.681016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.681129]  kthread+0x328/0x630
[   20.681180]  ret_from_fork+0x10/0x20
[   20.681231] 
[   20.681252] Allocated by task 265:
[   20.681283]  kasan_save_stack+0x3c/0x68
[   20.681338]  kasan_save_track+0x20/0x40
[   20.681382]  kasan_save_alloc_info+0x40/0x58
[   20.681426]  __kasan_kmalloc+0xd4/0xd8
[   20.681465]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.681505]  kasan_atomics+0xb8/0x2e0
[   20.681542]  kunit_try_run_case+0x170/0x3f0
[   20.681582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.681626]  kthread+0x328/0x630
[   20.681660]  ret_from_fork+0x10/0x20
[   20.681708] 
[   20.681734] The buggy address belongs to the object at fff00000c7892700
[   20.681734]  which belongs to the cache kmalloc-64 of size 64
[   20.681794] The buggy address is located 0 bytes to the right of
[   20.681794]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.681857] 
[   20.681878] The buggy address belongs to the physical page:
[   20.681910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.681959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.682007] page_type: f5(slab)
[   20.682048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.682169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.682239] page dumped because: kasan: bad access detected
[   20.682274] 
[   20.682294] Memory state around the buggy address:
[   20.682342]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.682388]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.682431] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.682469]                                      ^
[   20.682504]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.682545]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.682583] ==================================================================
[   20.671155] ==================================================================
[   20.671224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.671287] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.671349] 
[   20.671385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.671472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.671502] Hardware name: linux,dummy-virt (DT)
[   20.671536] Call trace:
[   20.671562]  show_stack+0x20/0x38 (C)
[   20.672539]  dump_stack_lvl+0x8c/0xd0
[   20.672754]  print_report+0x118/0x608
[   20.672805]  kasan_report+0xdc/0x128
[   20.672853]  kasan_check_range+0x100/0x1a8
[   20.672902]  __kasan_check_read+0x20/0x30
[   20.672948]  kasan_atomics_helper+0xdd4/0x4858
[   20.672997]  kasan_atomics+0x198/0x2e0
[   20.673044]  kunit_try_run_case+0x170/0x3f0
[   20.673094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.673147]  kthread+0x328/0x630
[   20.673189]  ret_from_fork+0x10/0x20
[   20.673240] 
[   20.673261] Allocated by task 265:
[   20.673294]  kasan_save_stack+0x3c/0x68
[   20.673699]  kasan_save_track+0x20/0x40
[   20.673753]  kasan_save_alloc_info+0x40/0x58
[   20.673798]  __kasan_kmalloc+0xd4/0xd8
[   20.673848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.674100]  kasan_atomics+0xb8/0x2e0
[   20.674148]  kunit_try_run_case+0x170/0x3f0
[   20.674207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.674467]  kthread+0x328/0x630
[   20.674505]  ret_from_fork+0x10/0x20
[   20.674562] 
[   20.674649] The buggy address belongs to the object at fff00000c7892700
[   20.674649]  which belongs to the cache kmalloc-64 of size 64
[   20.675155] The buggy address is located 0 bytes to the right of
[   20.675155]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.675240] 
[   20.675279] The buggy address belongs to the physical page:
[   20.675317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.675674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.675804] page_type: f5(slab)
[   20.675912] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.676011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.676054] page dumped because: kasan: bad access detected
[   20.676088] 
[   20.676108] Memory state around the buggy address:
[   20.676164]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676209]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676252] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.676291]                                      ^
[   20.676336]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676562]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676630] ==================================================================
[   20.725675] ==================================================================
[   20.725746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.725811] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.725865] 
[   20.725899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.725987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.726017] Hardware name: linux,dummy-virt (DT)
[   20.726050] Call trace:
[   20.726075]  show_stack+0x20/0x38 (C)
[   20.726127]  dump_stack_lvl+0x8c/0xd0
[   20.726178]  print_report+0x118/0x608
[   20.726228]  kasan_report+0xdc/0x128
[   20.726273]  kasan_check_range+0x100/0x1a8
[   20.729098]  __kasan_check_write+0x20/0x30
[   20.729478]  kasan_atomics_helper+0x10c0/0x4858
[   20.729753]  kasan_atomics+0x198/0x2e0
[   20.729970]  kunit_try_run_case+0x170/0x3f0
[   20.730307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.730456]  kthread+0x328/0x630
[   20.730562]  ret_from_fork+0x10/0x20
[   20.730665] 
[   20.730688] Allocated by task 265:
[   20.730721]  kasan_save_stack+0x3c/0x68
[   20.731087]  kasan_save_track+0x20/0x40
[   20.731162]  kasan_save_alloc_info+0x40/0x58
[   20.731214]  __kasan_kmalloc+0xd4/0xd8
[   20.731281]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.731333]  kasan_atomics+0xb8/0x2e0
[   20.731393]  kunit_try_run_case+0x170/0x3f0
[   20.731439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.731485]  kthread+0x328/0x630
[   20.731519]  ret_from_fork+0x10/0x20
[   20.731559] 
[   20.731606] The buggy address belongs to the object at fff00000c7892700
[   20.731606]  which belongs to the cache kmalloc-64 of size 64
[   20.731670] The buggy address is located 0 bytes to the right of
[   20.731670]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.731734] 
[   20.731758] The buggy address belongs to the physical page:
[   20.731793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.731847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.731929] page_type: f5(slab)
[   20.732270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.732357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.732414] page dumped because: kasan: bad access detected
[   20.732513] 
[   20.732540] Memory state around the buggy address:
[   20.732578]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.732665]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.732727] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.732798]                                      ^
[   20.732838]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732885]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732926] ==================================================================
[   20.761864] ==================================================================
[   20.762022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.762179] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.762345] 
[   20.762434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.762632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.762696] Hardware name: linux,dummy-virt (DT)
[   20.762799] Call trace:
[   20.762848]  show_stack+0x20/0x38 (C)
[   20.762950]  dump_stack_lvl+0x8c/0xd0
[   20.763297]  print_report+0x118/0x608
[   20.763441]  kasan_report+0xdc/0x128
[   20.763532]  kasan_check_range+0x100/0x1a8
[   20.763636]  __kasan_check_write+0x20/0x30
[   20.763964]  kasan_atomics_helper+0x126c/0x4858
[   20.764120]  kasan_atomics+0x198/0x2e0
[   20.764296]  kunit_try_run_case+0x170/0x3f0
[   20.764655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.764849]  kthread+0x328/0x630
[   20.764950]  ret_from_fork+0x10/0x20
[   20.765271] 
[   20.765436] Allocated by task 265:
[   20.765538]  kasan_save_stack+0x3c/0x68
[   20.765765]  kasan_save_track+0x20/0x40
[   20.766081]  kasan_save_alloc_info+0x40/0x58
[   20.766246]  __kasan_kmalloc+0xd4/0xd8
[   20.766552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.766752]  kasan_atomics+0xb8/0x2e0
[   20.766872]  kunit_try_run_case+0x170/0x3f0
[   20.766971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.767079]  kthread+0x328/0x630
[   20.767163]  ret_from_fork+0x10/0x20
[   20.767251] 
[   20.767302] The buggy address belongs to the object at fff00000c7892700
[   20.767302]  which belongs to the cache kmalloc-64 of size 64
[   20.767451] The buggy address is located 0 bytes to the right of
[   20.767451]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.767606] 
[   20.768441] The buggy address belongs to the physical page:
[   20.768570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.769099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.769405] page_type: f5(slab)
[   20.769730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.770466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.770981] page dumped because: kasan: bad access detected
[   20.771862] 
[   20.771972] Memory state around the buggy address:
[   20.772222]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773009]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773504] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.774217]                                      ^
[   20.774315]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774438]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774536] ==================================================================
[   20.661132] ==================================================================
[   20.661224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.661283] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.661351] 
[   20.661386] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.661476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.661506] Hardware name: linux,dummy-virt (DT)
[   20.661541] Call trace:
[   20.661567]  show_stack+0x20/0x38 (C)
[   20.661616]  dump_stack_lvl+0x8c/0xd0
[   20.661665]  print_report+0x118/0x608
[   20.661713]  kasan_report+0xdc/0x128
[   20.661760]  __asan_report_load4_noabort+0x20/0x30
[   20.661813]  kasan_atomics_helper+0x3dd8/0x4858
[   20.661861]  kasan_atomics+0x198/0x2e0
[   20.661907]  kunit_try_run_case+0x170/0x3f0
[   20.661956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662011]  kthread+0x328/0x630
[   20.662052]  ret_from_fork+0x10/0x20
[   20.662101] 
[   20.662122] Allocated by task 265:
[   20.662151]  kasan_save_stack+0x3c/0x68
[   20.662194]  kasan_save_track+0x20/0x40
[   20.662233]  kasan_save_alloc_info+0x40/0x58
[   20.662274]  __kasan_kmalloc+0xd4/0xd8
[   20.662313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.662365]  kasan_atomics+0xb8/0x2e0
[   20.662402]  kunit_try_run_case+0x170/0x3f0
[   20.662442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662484]  kthread+0x328/0x630
[   20.662517]  ret_from_fork+0x10/0x20
[   20.662734] 
[   20.662811] The buggy address belongs to the object at fff00000c7892700
[   20.662811]  which belongs to the cache kmalloc-64 of size 64
[   20.662872] The buggy address is located 0 bytes to the right of
[   20.662872]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.662936] 
[   20.662958] The buggy address belongs to the physical page:
[   20.662990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.663041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.663092] page_type: f5(slab)
[   20.663132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.663184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.663225] page dumped because: kasan: bad access detected
[   20.663255] 
[   20.663276] Memory state around the buggy address:
[   20.663306]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663362]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663407] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.663446]                                      ^
[   20.663480]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.663522]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.663617] ==================================================================
[   20.695499] ==================================================================
[   20.695665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.695778] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.695843] 
[   20.695878] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.695963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.695994] Hardware name: linux,dummy-virt (DT)
[   20.696026] Call trace:
[   20.696050]  show_stack+0x20/0x38 (C)
[   20.696102]  dump_stack_lvl+0x8c/0xd0
[   20.696151]  print_report+0x118/0x608
[   20.696199]  kasan_report+0xdc/0x128
[   20.696246]  kasan_check_range+0x100/0x1a8
[   20.696295]  __kasan_check_write+0x20/0x30
[   20.696354]  kasan_atomics_helper+0xf20/0x4858
[   20.696405]  kasan_atomics+0x198/0x2e0
[   20.696463]  kunit_try_run_case+0x170/0x3f0
[   20.697407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697920]  kthread+0x328/0x630
[   20.697973]  ret_from_fork+0x10/0x20
[   20.698103] 
[   20.698128] Allocated by task 265:
[   20.698160]  kasan_save_stack+0x3c/0x68
[   20.698205]  kasan_save_track+0x20/0x40
[   20.698244]  kasan_save_alloc_info+0x40/0x58
[   20.698337]  __kasan_kmalloc+0xd4/0xd8
[   20.698461]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.698507]  kasan_atomics+0xb8/0x2e0
[   20.698545]  kunit_try_run_case+0x170/0x3f0
[   20.698597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.698946]  kthread+0x328/0x630
[   20.699347]  ret_from_fork+0x10/0x20
[   20.699430] 
[   20.699689] The buggy address belongs to the object at fff00000c7892700
[   20.699689]  which belongs to the cache kmalloc-64 of size 64
[   20.699775] The buggy address is located 0 bytes to the right of
[   20.699775]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.699846] 
[   20.699869] The buggy address belongs to the physical page:
[   20.699918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.699969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.700031] page_type: f5(slab)
[   20.700090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.700161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.700219] page dumped because: kasan: bad access detected
[   20.700269] 
[   20.700507] Memory state around the buggy address:
[   20.700563]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.700615]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.701002] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.701065]                                      ^
[   20.701108]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701152]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701192] ==================================================================
[   20.982922] ==================================================================
[   20.983200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.983382] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.983526] 
[   20.983600] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.983764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.983829] Hardware name: linux,dummy-virt (DT)
[   20.984471] Call trace:
[   20.984755]  show_stack+0x20/0x38 (C)
[   20.984949]  dump_stack_lvl+0x8c/0xd0
[   20.985077]  print_report+0x118/0x608
[   20.985203]  kasan_report+0xdc/0x128
[   20.985311]  kasan_check_range+0x100/0x1a8
[   20.985645]  __kasan_check_write+0x20/0x30
[   20.986016]  kasan_atomics_helper+0x17ec/0x4858
[   20.986381]  kasan_atomics+0x198/0x2e0
[   20.986494]  kunit_try_run_case+0x170/0x3f0
[   20.986620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.986733]  kthread+0x328/0x630
[   20.986993]  ret_from_fork+0x10/0x20
[   20.987141] 
[   20.987354] Allocated by task 265:
[   20.987440]  kasan_save_stack+0x3c/0x68
[   20.987545]  kasan_save_track+0x20/0x40
[   20.987634]  kasan_save_alloc_info+0x40/0x58
[   20.987768]  __kasan_kmalloc+0xd4/0xd8
[   20.987853]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.988005]  kasan_atomics+0xb8/0x2e0
[   20.988077]  kunit_try_run_case+0x170/0x3f0
[   20.988495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.988726]  kthread+0x328/0x630
[   20.988820]  ret_from_fork+0x10/0x20
[   20.989112] 
[   20.989216] The buggy address belongs to the object at fff00000c7892700
[   20.989216]  which belongs to the cache kmalloc-64 of size 64
[   20.989451] The buggy address is located 0 bytes to the right of
[   20.989451]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.989598] 
[   20.989650] The buggy address belongs to the physical page:
[   20.989716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.989833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.990259] page_type: f5(slab)
[   20.990655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.990844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.990937] page dumped because: kasan: bad access detected
[   20.990997] 
[   20.991083] Memory state around the buggy address:
[   20.991159]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991258]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991374] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.991711]                                      ^
[   20.991827]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.992010]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.992213] ==================================================================
[   20.624573] ==================================================================
[   20.624646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.625092] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.625161] 
[   20.625210] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.625346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.625386] Hardware name: linux,dummy-virt (DT)
[   20.625620] Call trace:
[   20.625673]  show_stack+0x20/0x38 (C)
[   20.625823]  dump_stack_lvl+0x8c/0xd0
[   20.625878]  print_report+0x118/0x608
[   20.626031]  kasan_report+0xdc/0x128
[   20.626084]  kasan_check_range+0x100/0x1a8
[   20.626400]  __kasan_check_write+0x20/0x30
[   20.626484]  kasan_atomics_helper+0xa6c/0x4858
[   20.626538]  kasan_atomics+0x198/0x2e0
[   20.626585]  kunit_try_run_case+0x170/0x3f0
[   20.626637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.626692]  kthread+0x328/0x630
[   20.626736]  ret_from_fork+0x10/0x20
[   20.626823] 
[   20.626846] Allocated by task 265:
[   20.626879]  kasan_save_stack+0x3c/0x68
[   20.626950]  kasan_save_track+0x20/0x40
[   20.627049]  kasan_save_alloc_info+0x40/0x58
[   20.627126]  __kasan_kmalloc+0xd4/0xd8
[   20.627192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.627234]  kasan_atomics+0xb8/0x2e0
[   20.627270]  kunit_try_run_case+0x170/0x3f0
[   20.627310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.627367]  kthread+0x328/0x630
[   20.627403]  ret_from_fork+0x10/0x20
[   20.627440] 
[   20.627979] The buggy address belongs to the object at fff00000c7892700
[   20.627979]  which belongs to the cache kmalloc-64 of size 64
[   20.628050] The buggy address is located 0 bytes to the right of
[   20.628050]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.628126] 
[   20.628151] The buggy address belongs to the physical page:
[   20.628437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.628582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.628635] page_type: f5(slab)
[   20.628947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.629003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.629085] page dumped because: kasan: bad access detected
[   20.629291] 
[   20.629437] Memory state around the buggy address:
[   20.629573]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.629746]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.629794] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.629834]                                      ^
[   20.629870]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.629925]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.629966] ==================================================================
[   20.890691] ==================================================================
[   20.890958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.891103] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.891207] 
[   20.891283] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.892235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.892625] Hardware name: linux,dummy-virt (DT)
[   20.892723] Call trace:
[   20.892795]  show_stack+0x20/0x38 (C)
[   20.892920]  dump_stack_lvl+0x8c/0xd0
[   20.893043]  print_report+0x118/0x608
[   20.893582]  kasan_report+0xdc/0x128
[   20.893984]  kasan_check_range+0x100/0x1a8
[   20.894174]  __kasan_check_write+0x20/0x30
[   20.894445]  kasan_atomics_helper+0x15b4/0x4858
[   20.894827]  kasan_atomics+0x198/0x2e0
[   20.895142]  kunit_try_run_case+0x170/0x3f0
[   20.895698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.895834]  kthread+0x328/0x630
[   20.895918]  ret_from_fork+0x10/0x20
[   20.896720] 
[   20.896804] Allocated by task 265:
[   20.897046]  kasan_save_stack+0x3c/0x68
[   20.897594]  kasan_save_track+0x20/0x40
[   20.897990]  kasan_save_alloc_info+0x40/0x58
[   20.898532]  __kasan_kmalloc+0xd4/0xd8
[   20.898684]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.898962]  kasan_atomics+0xb8/0x2e0
[   20.899053]  kunit_try_run_case+0x170/0x3f0
[   20.899470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.899674]  kthread+0x328/0x630
[   20.899751]  ret_from_fork+0x10/0x20
[   20.899832] 
[   20.900651] The buggy address belongs to the object at fff00000c7892700
[   20.900651]  which belongs to the cache kmalloc-64 of size 64
[   20.900807] The buggy address is located 0 bytes to the right of
[   20.900807]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.901329] 
[   20.901546] The buggy address belongs to the physical page:
[   20.901635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.901758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.901872] page_type: f5(slab)
[   20.902195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.902341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.902460] page dumped because: kasan: bad access detected
[   20.902542] 
[   20.902593] Memory state around the buggy address:
[   20.902671]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.902772]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.902867] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.902969]                                      ^
[   20.903078]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.903209]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.903303] ==================================================================
[   20.677494] ==================================================================
[   20.677559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.677622] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.677672] 
[   20.677707] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.677817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.677848] Hardware name: linux,dummy-virt (DT)
[   20.677883] Call trace:
[   20.677908]  show_stack+0x20/0x38 (C)
[   20.677961]  dump_stack_lvl+0x8c/0xd0
[   20.678009]  print_report+0x118/0x608
[   20.678058]  kasan_report+0xdc/0x128
[   20.678107]  __asan_report_load8_noabort+0x20/0x30
[   20.678160]  kasan_atomics_helper+0x3f58/0x4858
[   20.678211]  kasan_atomics+0x198/0x2e0
[   20.678259]  kunit_try_run_case+0x170/0x3f0
[   20.678308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678380]  kthread+0x328/0x630
[   20.678426]  ret_from_fork+0x10/0x20
[   20.678474] 
[   20.678494] Allocated by task 265:
[   20.678525]  kasan_save_stack+0x3c/0x68
[   20.678568]  kasan_save_track+0x20/0x40
[   20.678608]  kasan_save_alloc_info+0x40/0x58
[   20.678649]  __kasan_kmalloc+0xd4/0xd8
[   20.678686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.678732]  kasan_atomics+0xb8/0x2e0
[   20.678803]  kunit_try_run_case+0x170/0x3f0
[   20.678840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678884]  kthread+0x328/0x630
[   20.678918]  ret_from_fork+0x10/0x20
[   20.678962] 
[   20.678999] The buggy address belongs to the object at fff00000c7892700
[   20.678999]  which belongs to the cache kmalloc-64 of size 64
[   20.679093] The buggy address is located 0 bytes to the right of
[   20.679093]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.679159] 
[   20.679198] The buggy address belongs to the physical page:
[   20.679271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.679337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.679392] page_type: f5(slab)
[   20.679432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.679484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.679525] page dumped because: kasan: bad access detected
[   20.679558] 
[   20.679578] Memory state around the buggy address:
[   20.679609]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.679652]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.679695] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.679733]                                      ^
[   20.679780]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.679832]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.679873] ==================================================================
[   20.682685] ==================================================================
[   20.682730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.682793] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.682845] 
[   20.682879] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.682963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.682992] Hardware name: linux,dummy-virt (DT)
[   20.683026] Call trace:
[   20.683051]  show_stack+0x20/0x38 (C)
[   20.683102]  dump_stack_lvl+0x8c/0xd0
[   20.683163]  print_report+0x118/0x608
[   20.683266]  kasan_report+0xdc/0x128
[   20.683314]  __asan_report_store8_noabort+0x20/0x30
[   20.683376]  kasan_atomics_helper+0x3e5c/0x4858
[   20.683426]  kasan_atomics+0x198/0x2e0
[   20.683473]  kunit_try_run_case+0x170/0x3f0
[   20.683521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.683575]  kthread+0x328/0x630
[   20.683620]  ret_from_fork+0x10/0x20
[   20.683669] 
[   20.683694] Allocated by task 265:
[   20.683725]  kasan_save_stack+0x3c/0x68
[   20.683769]  kasan_save_track+0x20/0x40
[   20.683811]  kasan_save_alloc_info+0x40/0x58
[   20.683854]  __kasan_kmalloc+0xd4/0xd8
[   20.683893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.683935]  kasan_atomics+0xb8/0x2e0
[   20.683985]  kunit_try_run_case+0x170/0x3f0
[   20.684028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684073]  kthread+0x328/0x630
[   20.684105]  ret_from_fork+0x10/0x20
[   20.684143] 
[   20.684164] The buggy address belongs to the object at fff00000c7892700
[   20.684164]  which belongs to the cache kmalloc-64 of size 64
[   20.684224] The buggy address is located 0 bytes to the right of
[   20.684224]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.684289] 
[   20.684310] The buggy address belongs to the physical page:
[   20.684351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.684957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.685032] page_type: f5(slab)
[   20.685081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.685137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.685180] page dumped because: kasan: bad access detected
[   20.685256] 
[   20.685315] Memory state around the buggy address:
[   20.685425]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685481]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685526] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.685564]                                      ^
[   20.685600]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685642]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685680] ==================================================================
[   20.753135] ==================================================================
[   20.753291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.753421] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.753542] 
[   20.753616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.754288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.754391] Hardware name: linux,dummy-virt (DT)
[   20.754462] Call trace:
[   20.754513]  show_stack+0x20/0x38 (C)
[   20.754632]  dump_stack_lvl+0x8c/0xd0
[   20.754737]  print_report+0x118/0x608
[   20.754882]  kasan_report+0xdc/0x128
[   20.755047]  kasan_check_range+0x100/0x1a8
[   20.755310]  __kasan_check_write+0x20/0x30
[   20.755405]  kasan_atomics_helper+0x11f8/0x4858
[   20.755532]  kasan_atomics+0x198/0x2e0
[   20.755633]  kunit_try_run_case+0x170/0x3f0
[   20.755779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.755957]  kthread+0x328/0x630
[   20.756092]  ret_from_fork+0x10/0x20
[   20.756249] 
[   20.756328] Allocated by task 265:
[   20.756436]  kasan_save_stack+0x3c/0x68
[   20.756587]  kasan_save_track+0x20/0x40
[   20.756717]  kasan_save_alloc_info+0x40/0x58
[   20.756834]  __kasan_kmalloc+0xd4/0xd8
[   20.756925]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.757049]  kasan_atomics+0xb8/0x2e0
[   20.757181]  kunit_try_run_case+0x170/0x3f0
[   20.757303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.757425]  kthread+0x328/0x630
[   20.757504]  ret_from_fork+0x10/0x20
[   20.757587] 
[   20.757996] The buggy address belongs to the object at fff00000c7892700
[   20.757996]  which belongs to the cache kmalloc-64 of size 64
[   20.758353] The buggy address is located 0 bytes to the right of
[   20.758353]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.758534] 
[   20.758578] The buggy address belongs to the physical page:
[   20.758643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.758753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.759047] page_type: f5(slab)
[   20.759173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.759281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.759386] page dumped because: kasan: bad access detected
[   20.759459] 
[   20.759501] Memory state around the buggy address:
[   20.759569]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.759671]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.759774] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.759855]                                      ^
[   20.760139]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.760291]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.760428] ==================================================================
[   20.936259] ==================================================================
[   20.936386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.936514] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.936668] 
[   20.936959] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.937165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.937233] Hardware name: linux,dummy-virt (DT)
[   20.937511] Call trace:
[   20.937723]  show_stack+0x20/0x38 (C)
[   20.938810]  dump_stack_lvl+0x8c/0xd0
[   20.938938]  print_report+0x118/0x608
[   20.939045]  kasan_report+0xdc/0x128
[   20.939142]  __asan_report_load8_noabort+0x20/0x30
[   20.939376]  kasan_atomics_helper+0x3df4/0x4858
[   20.939473]  kasan_atomics+0x198/0x2e0
[   20.939588]  kunit_try_run_case+0x170/0x3f0
[   20.939703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.939828]  kthread+0x328/0x630
[   20.939923]  ret_from_fork+0x10/0x20
[   20.940031] 
[   20.940074] Allocated by task 265:
[   20.940146]  kasan_save_stack+0x3c/0x68
[   20.940222]  kasan_save_track+0x20/0x40
[   20.940297]  kasan_save_alloc_info+0x40/0x58
[   20.940399]  __kasan_kmalloc+0xd4/0xd8
[   20.940503]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.940648]  kasan_atomics+0xb8/0x2e0
[   20.940737]  kunit_try_run_case+0x170/0x3f0
[   20.940827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.940930]  kthread+0x328/0x630
[   20.941018]  ret_from_fork+0x10/0x20
[   20.941131] 
[   20.941176] The buggy address belongs to the object at fff00000c7892700
[   20.941176]  which belongs to the cache kmalloc-64 of size 64
[   20.941309] The buggy address is located 0 bytes to the right of
[   20.941309]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.941447] 
[   20.941492] The buggy address belongs to the physical page:
[   20.941608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.941766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.942074] page_type: f5(slab)
[   20.942168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.942279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.942419] page dumped because: kasan: bad access detected
[   20.942536] 
[   20.942596] Memory state around the buggy address:
[   20.942697]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.942811]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.942902] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.943035]                                      ^
[   20.943117]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943220]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943314] ==================================================================
[   20.666623] ==================================================================
[   20.666673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.666736] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.666817] 
[   20.666849] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.666933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666963] Hardware name: linux,dummy-virt (DT)
[   20.666995] Call trace:
[   20.667019]  show_stack+0x20/0x38 (C)
[   20.667069]  dump_stack_lvl+0x8c/0xd0
[   20.667116]  print_report+0x118/0x608
[   20.667162]  kasan_report+0xdc/0x128
[   20.667259]  __asan_report_load4_noabort+0x20/0x30
[   20.667668]  kasan_atomics_helper+0x3e04/0x4858
[   20.667801]  kasan_atomics+0x198/0x2e0
[   20.667851]  kunit_try_run_case+0x170/0x3f0
[   20.667902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667956]  kthread+0x328/0x630
[   20.667998]  ret_from_fork+0x10/0x20
[   20.668048] 
[   20.668070] Allocated by task 265:
[   20.668102]  kasan_save_stack+0x3c/0x68
[   20.668145]  kasan_save_track+0x20/0x40
[   20.668276]  kasan_save_alloc_info+0x40/0x58
[   20.668444]  __kasan_kmalloc+0xd4/0xd8
[   20.668604]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.668649]  kasan_atomics+0xb8/0x2e0
[   20.668687]  kunit_try_run_case+0x170/0x3f0
[   20.668777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.668841]  kthread+0x328/0x630
[   20.668873]  ret_from_fork+0x10/0x20
[   20.668911] 
[   20.668945] The buggy address belongs to the object at fff00000c7892700
[   20.668945]  which belongs to the cache kmalloc-64 of size 64
[   20.669005] The buggy address is located 0 bytes to the right of
[   20.669005]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.669068] 
[   20.669090] The buggy address belongs to the physical page:
[   20.669123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.669175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.669248] page_type: f5(slab)
[   20.669315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.669382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.669447] page dumped because: kasan: bad access detected
[   20.669517] 
[   20.669566] Memory state around the buggy address:
[   20.669606]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.669704]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.669795] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.669832]                                      ^
[   20.669864]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.669906]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.669944] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   20.445874] ==================================================================
[   20.447492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   20.447746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.448162]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   20.448411]  kthread+0x328/0x630
[   20.448532] 
[   20.448725]  __kasan_kmalloc+0xd4/0xd8
[   20.448764]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.449123] The buggy address is located 8 bytes inside of
[   20.449123]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.450412] page dumped because: kasan: bad access detected
[   20.450978]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.451123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure Automatically assigned
[   20.368527] ==================================================================
[   20.368654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.368931] Write of size 8 at addr fff00000c3eeb5e8 by task kunit_try_catch/261
[   20.369120] 
[   20.369311] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.370043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.370140] Hardware name: linux,dummy-virt (DT)
[   20.370427] Call trace:
[   20.370714]  show_stack+0x20/0x38 (C)
[   20.371212]  dump_stack_lvl+0x8c/0xd0
[   20.371464]  print_report+0x118/0x608
[   20.371739]  kasan_report+0xdc/0x128
[   20.372104]  kasan_check_range+0x100/0x1a8
[   20.372173]  __kasan_check_write+0x20/0x30
[   20.372225]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.372279]  kasan_bitops_generic+0x110/0x1c8
[   20.372341]  kunit_try_run_case+0x170/0x3f0
[   20.372398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.372506]  kthread+0x328/0x630
[   20.372618]  ret_from_fork+0x10/0x20
[   20.372685] 
[   20.372737] Allocated by task 261:
[   20.372773]  kasan_save_stack+0x3c/0x68
[   20.372820]  kasan_save_track+0x20/0x40
[   20.372862]  kasan_save_alloc_info+0x40/0x58
[   20.372904]  __kasan_kmalloc+0xd4/0xd8
[   20.372942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.372988]  kasan_bitops_generic+0xa0/0x1c8
[   20.373028]  kunit_try_run_case+0x170/0x3f0
[   20.373067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.373122]  kthread+0x328/0x630
[   20.373189]  ret_from_fork+0x10/0x20
[   20.373246] 
[   20.373269] The buggy address belongs to the object at fff00000c3eeb5e0
[   20.373269]  which belongs to the cache kmalloc-16 of size 16
[   20.373347] The buggy address is located 8 bytes inside of
[   20.373347]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.373472] 
[   20.373499] The buggy address belongs to the physical page:
[   20.373562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   20.373618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.373673] page_type: f5(slab)
[   20.373720] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.373776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.373816] page dumped because: kasan: bad access detected
[   20.373850] 
[   20.373869] Memory state around the buggy address:
[   20.374024] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.375539]  kasan_report+0xdc/0x128
[   20.375964]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.376226]  kunit_try_run_case+0x170/0x3f0
[   20.377406]  kasan_save_alloc_info+0x40/0x58
[   20.378011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.378695] 
[   20.379422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.380045] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.382031]  show_stack+0x20/0x38 (C)
[   20.383484]  kunit_try_run_case+0x170/0x3f0
[   20.383636] 
[   20.383717] The buggy address is located 8 bytes inside of
[   20.383717]  allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9)
[   20.383939] page_type: f5(slab)
[   20.386530] Call trace:
[   20.387272]  kasan_save_stack+0x3c/0x68
[   20.389495] 
[   20.390248] page_type: f5(slab)
[   20.397292]  kunit_try_run_case+0x170/0x3f0
[   20.398727]  kasan_save_track+0x20/0x40
[   20.399896]  kthread+0x328/0x630
[   20.400408] 
[   20.400886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.404019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.406045] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure Automatically assigned
[   20.342880] ==================================================================
[   20.342995] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.343103] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259
[   20.343215] 
[   20.343287] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.343493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.343558] Hardware name: linux,dummy-virt (DT)
[   20.343628] Call trace:
[   20.343680]  show_stack+0x20/0x38 (C)
[   20.343791]  dump_stack_lvl+0x8c/0xd0
[   20.343895]  print_report+0x118/0x608
[   20.344002]  kasan_report+0xdc/0x128
[   20.344106]  __asan_report_load1_noabort+0x20/0x30
[   20.344222]  strnlen+0x80/0x88
[   20.344802]  kasan_strings+0x478/0xb00
[   20.344972]  kunit_try_run_case+0x170/0x3f0
[   20.345096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.345358]  kthread+0x328/0x630
[   20.345513]  ret_from_fork+0x10/0x20
[   20.345778] 
[   20.345825] Allocated by task 259:
[   20.345890]  kasan_save_stack+0x3c/0x68
[   20.345993]  kasan_save_track+0x20/0x40
[   20.346094]  kasan_save_alloc_info+0x40/0x58
[   20.346170]  __kasan_kmalloc+0xd4/0xd8
[   20.346228]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.346294]  kasan_strings+0xc8/0xb00
[   20.346377]  kunit_try_run_case+0x170/0x3f0
[   20.346485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.346618]  kthread+0x328/0x630
[   20.346693]  ret_from_fork+0x10/0x20
[   20.346776] 
[   20.346814] Freed by task 259:
[   20.346875]  kasan_save_stack+0x3c/0x68
[   20.347233]  kasan_save_track+0x20/0x40
[   20.347405]  kasan_save_free_info+0x4c/0x78
[   20.347497]  __kasan_slab_free+0x6c/0x98
[   20.347579]  kfree+0x214/0x3c8
[   20.347649]  kasan_strings+0x24c/0xb00
[   20.347716]  kunit_try_run_case+0x170/0x3f0
[   20.347779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.347865]  kthread+0x328/0x630
[   20.347932]  ret_from_fork+0x10/0x20
[   20.348012] 
[   20.348058] The buggy address belongs to the object at fff00000c7896b80
[   20.348058]  which belongs to the cache kmalloc-32 of size 32
[   20.348186] The buggy address is located 16 bytes inside of
[   20.348186]  freed 32-byte region [fff00000c7896b80, fff00000c7896ba0)
[   20.348336] 
[   20.348378] The buggy address belongs to the physical page:
[   20.348446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896
[   20.348883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.349007] page_type: f5(slab)
[   20.349133] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.349247] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.349347] page dumped because: kasan: bad access detected
[   20.349432] 
[   20.349495] Memory state around the buggy address:
[   20.349594]  fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.349729]  fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.349831] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.349935]                          ^
[   20.350005]  fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.350100]  fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.350188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure Automatically assigned
[   20.332786] ==================================================================
[   20.332908] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   20.333024] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259
[   20.333146] 
[   20.333471] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.333752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.333998] Hardware name: linux,dummy-virt (DT)
[   20.334096] Call trace:
[   20.334155]  show_stack+0x20/0x38 (C)
[   20.334276]  dump_stack_lvl+0x8c/0xd0
[   20.334440]  print_report+0x118/0x608
[   20.334570]  kasan_report+0xdc/0x128
[   20.334738]  __asan_report_load1_noabort+0x20/0x30
[   20.335017]  strlen+0xa8/0xb0
[   20.335108]  kasan_strings+0x418/0xb00
[   20.335796]  kunit_try_run_case+0x170/0x3f0
[   20.335923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.336054]  kthread+0x328/0x630
[   20.336185]  ret_from_fork+0x10/0x20
[   20.336315] 
[   20.336378] Allocated by task 259:
[   20.336439]  kasan_save_stack+0x3c/0x68
[   20.336543]  kasan_save_track+0x20/0x40
[   20.336852]  kasan_save_alloc_info+0x40/0x58
[   20.336998]  __kasan_kmalloc+0xd4/0xd8
[   20.337115]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.337230]  kasan_strings+0xc8/0xb00
[   20.337342]  kunit_try_run_case+0x170/0x3f0
[   20.337450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.337541]  kthread+0x328/0x630
[   20.337618]  ret_from_fork+0x10/0x20
[   20.337693] 
[   20.337737] Freed by task 259:
[   20.337806]  kasan_save_stack+0x3c/0x68
[   20.337883]  kasan_save_track+0x20/0x40
[   20.338159]  kasan_save_free_info+0x4c/0x78
[   20.338267]  __kasan_slab_free+0x6c/0x98
[   20.338363]  kfree+0x214/0x3c8
[   20.338436]  kasan_strings+0x24c/0xb00
[   20.338506]  kunit_try_run_case+0x170/0x3f0
[   20.338592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.338699]  kthread+0x328/0x630
[   20.338767]  ret_from_fork+0x10/0x20
[   20.339031] 
[   20.339076] The buggy address belongs to the object at fff00000c7896b80
[   20.339076]  which belongs to the cache kmalloc-32 of size 32
[   20.339244] The buggy address is located 16 bytes inside of
[   20.339244]  freed 32-byte region [fff00000c7896b80, fff00000c7896ba0)
[   20.339434] 
[   20.339482] The buggy address belongs to the physical page:
[   20.339556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896
[   20.339672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.339766] page_type: f5(slab)
[   20.340165] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.340347] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.340480] page dumped because: kasan: bad access detected
[   20.340569] 
[   20.340628] Memory state around the buggy address:
[   20.340711]  fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.340824]  fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.340973] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.341064]                          ^
[   20.341336]  fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.341549]  fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.341771] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   20.218012] ==================================================================
[   20.218198] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.218314] Read of size 1 at addr ffff800080a17b5f by task kunit_try_catch/251
[   20.218707] 
[   20.218854] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.219040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.219099] Hardware name: linux,dummy-virt (DT)
[   20.219186] Call trace:
[   20.219254]  show_stack+0x20/0x38 (C)
[   20.219428]  dump_stack_lvl+0x8c/0xd0
[   20.219514]  print_report+0x310/0x608
[   20.219595]  kasan_report+0xdc/0x128
[   20.219679]  __asan_report_load1_noabort+0x20/0x30
[   20.219793]  kasan_alloca_oob_left+0x2b8/0x310
[   20.219899]  kunit_try_run_case+0x170/0x3f0
[   20.220044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.220157]  kthread+0x328/0x630
[   20.220461]  ret_from_fork+0x10/0x20
[   20.220583] 
[   20.220672] The buggy address belongs to stack of task kunit_try_catch/251
[   20.220810] 
[   20.220874] The buggy address belongs to the virtual mapping at
[   20.220874]  [ffff800080a10000, ffff800080a19000) created by:
[   20.220874]  kernel_clone+0x150/0x7a8
[   20.221050] 
[   20.221098] The buggy address belongs to the physical page:
[   20.221171] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8
[   20.221298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.221713] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.221878] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.221998] page dumped because: kasan: bad access detected
[   20.222096] 
[   20.222148] Memory state around the buggy address:
[   20.222223]  ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.222330]  ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.222420] >ffff800080a17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.222508]                                                     ^
[   20.222592]  ffff800080a17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.222696]  ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.222929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   20.322326] ==================================================================
[   20.322508] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   20.322635] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259
[   20.322813] 
[   20.322871] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.322966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.322996] Hardware name: linux,dummy-virt (DT)
[   20.323030] Call trace:
[   20.323058]  show_stack+0x20/0x38 (C)
[   20.323111]  dump_stack_lvl+0x8c/0xd0
[   20.323161]  print_report+0x118/0x608
[   20.323209]  kasan_report+0xdc/0x128
[   20.323256]  __asan_report_load1_noabort+0x20/0x30
[   20.323308]  kasan_strings+0x95c/0xb00
[   20.323400]  kunit_try_run_case+0x170/0x3f0
[   20.323500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.323612]  kthread+0x328/0x630
[   20.324102]  ret_from_fork+0x10/0x20
[   20.324223] 
[   20.324264] Allocated by task 259:
[   20.324476]  kasan_save_stack+0x3c/0x68
[   20.324644]  kasan_save_track+0x20/0x40
[   20.325144]  kasan_save_alloc_info+0x40/0x58
[   20.325240]  __kasan_kmalloc+0xd4/0xd8
[   20.325512]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.325981]  kasan_strings+0xc8/0xb00
[   20.326067]  kunit_try_run_case+0x170/0x3f0
[   20.326181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.326392]  kthread+0x328/0x630
[   20.326843]  ret_from_fork+0x10/0x20
[   20.327117] 
[   20.327181] Freed by task 259:
[   20.327473]  kasan_save_stack+0x3c/0x68
[   20.327598]  kasan_save_track+0x20/0x40
[   20.327697]  kasan_save_free_info+0x4c/0x78
[   20.327774]  __kasan_slab_free+0x6c/0x98
[   20.327993]  kfree+0x214/0x3c8
[   20.328138]  kasan_strings+0x24c/0xb00
[   20.328341]  kunit_try_run_case+0x170/0x3f0
[   20.328460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.328651]  kthread+0x328/0x630
[   20.328739]  ret_from_fork+0x10/0x20
[   20.328847] 
[   20.328917] The buggy address belongs to the object at fff00000c7896b80
[   20.328917]  which belongs to the cache kmalloc-32 of size 32
[   20.329054] The buggy address is located 16 bytes inside of
[   20.329054]  freed 32-byte region [fff00000c7896b80, fff00000c7896ba0)
[   20.329209] 
[   20.329280] The buggy address belongs to the physical page:
[   20.329369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896
[   20.329495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.329608] page_type: f5(slab)
[   20.329700] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.329865] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.330005] page dumped because: kasan: bad access detected
[   20.330106] 
[   20.330171] Memory state around the buggy address:
[   20.330271]  fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.330384]  fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.330477] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.330565]                          ^
[   20.331074]  fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.331173]  fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.331256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   20.305104] ==================================================================
[   20.305231] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.306739] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259
[   20.307164] 
[   20.309234] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.310826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.311007] Hardware name: linux,dummy-virt (DT)
[   20.311176] Call trace:
[   20.311226]  show_stack+0x20/0x38 (C)
[   20.311505]  dump_stack_lvl+0x8c/0xd0
[   20.311725]  print_report+0x118/0x608
[   20.311838]  kasan_report+0xdc/0x128
[   20.311949]  __asan_report_load1_noabort+0x20/0x30
[   20.312071]  strcmp+0xc0/0xc8
[   20.312171]  kasan_strings+0x340/0xb00
[   20.312271]  kunit_try_run_case+0x170/0x3f0
[   20.314015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.314972]  kthread+0x328/0x630
[   20.315085]  ret_from_fork+0x10/0x20
[   20.315419] 
[   20.315469] Allocated by task 259:
[   20.315520]  kasan_save_stack+0x3c/0x68
[   20.315575]  kasan_save_track+0x20/0x40
[   20.315618]  kasan_save_alloc_info+0x40/0x58
[   20.315746]  __kasan_kmalloc+0xd4/0xd8
[   20.316072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.316183]  kasan_strings+0xc8/0xb00
[   20.316291]  kunit_try_run_case+0x170/0x3f0
[   20.316394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.316580]  kthread+0x328/0x630
[   20.316698]  ret_from_fork+0x10/0x20
[   20.316867] 
[   20.316958] Freed by task 259:
[   20.317041]  kasan_save_stack+0x3c/0x68
[   20.317191]  kasan_save_track+0x20/0x40
[   20.317326]  kasan_save_free_info+0x4c/0x78
[   20.317722]  __kasan_slab_free+0x6c/0x98
[   20.317841]  kfree+0x214/0x3c8
[   20.317928]  kasan_strings+0x24c/0xb00
[   20.318013]  kunit_try_run_case+0x170/0x3f0
[   20.318333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.318495]  kthread+0x328/0x630
[   20.318579]  ret_from_fork+0x10/0x20
[   20.318694] 
[   20.318746] The buggy address belongs to the object at fff00000c7896b80
[   20.318746]  which belongs to the cache kmalloc-32 of size 32
[   20.318923] The buggy address is located 16 bytes inside of
[   20.318923]  freed 32-byte region [fff00000c7896b80, fff00000c7896ba0)
[   20.319071] 
[   20.319142] The buggy address belongs to the physical page:
[   20.319248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896
[   20.319366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.319468] page_type: f5(slab)
[   20.319559] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.319676] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.319774] page dumped because: kasan: bad access detected
[   20.319848] 
[   20.319892] Memory state around the buggy address:
[   20.319967]  fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.320070]  fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.320171] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.320262]                          ^
[   20.320343]  fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.320444]  fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.320551] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   20.265095] ==================================================================
[   20.265330] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.265505] Read of size 1 at addr fff00000c78969d8 by task kunit_try_catch/257
[   20.265608] 
[   20.265727] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.265965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.266063] Hardware name: linux,dummy-virt (DT)
[   20.266172] Call trace:
[   20.266247]  show_stack+0x20/0x38 (C)
[   20.266429]  dump_stack_lvl+0x8c/0xd0
[   20.266577]  print_report+0x118/0x608
[   20.266727]  kasan_report+0xdc/0x128
[   20.266868]  __asan_report_load1_noabort+0x20/0x30
[   20.266980]  memcmp+0x198/0x1d8
[   20.267071]  kasan_memcmp+0x16c/0x300
[   20.267205]  kunit_try_run_case+0x170/0x3f0
[   20.267334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.267441]  kthread+0x328/0x630
[   20.267545]  ret_from_fork+0x10/0x20
[   20.267643] 
[   20.267678] Allocated by task 257:
[   20.267742]  kasan_save_stack+0x3c/0x68
[   20.267830]  kasan_save_track+0x20/0x40
[   20.267939]  kasan_save_alloc_info+0x40/0x58
[   20.268135]  __kasan_kmalloc+0xd4/0xd8
[   20.268251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.268405]  kasan_memcmp+0xbc/0x300
[   20.268489]  kunit_try_run_case+0x170/0x3f0
[   20.268583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.268694]  kthread+0x328/0x630
[   20.268873]  ret_from_fork+0x10/0x20
[   20.269054] 
[   20.269127] The buggy address belongs to the object at fff00000c78969c0
[   20.269127]  which belongs to the cache kmalloc-32 of size 32
[   20.269349] The buggy address is located 0 bytes to the right of
[   20.269349]  allocated 24-byte region [fff00000c78969c0, fff00000c78969d8)
[   20.269549] 
[   20.269615] The buggy address belongs to the physical page:
[   20.269692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896
[   20.270081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.270207] page_type: f5(slab)
[   20.270303] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.270434] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.270582] page dumped because: kasan: bad access detected
[   20.270691] 
[   20.270755] Memory state around the buggy address:
[   20.270865]  fff00000c7896880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.270969]  fff00000c7896900: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.271102] >fff00000c7896980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.271199]                                                     ^
[   20.271305]  fff00000c7896a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.271430]  fff00000c7896a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.271511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   20.236855] ==================================================================
[   20.236998] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   20.237519] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/253
[   20.237861] 
[   20.237960] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.238275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.238347] Hardware name: linux,dummy-virt (DT)
[   20.238700] Call trace:
[   20.238842]  show_stack+0x20/0x38 (C)
[   20.238969]  dump_stack_lvl+0x8c/0xd0
[   20.239066]  print_report+0x310/0x608
[   20.239147]  kasan_report+0xdc/0x128
[   20.239233]  __asan_report_load1_noabort+0x20/0x30
[   20.239350]  kasan_alloca_oob_right+0x2dc/0x340
[   20.239515]  kunit_try_run_case+0x170/0x3f0
[   20.239665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.239821]  kthread+0x328/0x630
[   20.239950]  ret_from_fork+0x10/0x20
[   20.240063] 
[   20.240132] The buggy address belongs to stack of task kunit_try_catch/253
[   20.240252] 
[   20.240313] The buggy address belongs to the virtual mapping at
[   20.240313]  [ffff800080a10000, ffff800080a19000) created by:
[   20.240313]  kernel_clone+0x150/0x7a8
[   20.240511] 
[   20.240578] The buggy address belongs to the physical page:
[   20.240667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8
[   20.240834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.241029] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.241194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.241292] page dumped because: kasan: bad access detected
[   20.241366] 
[   20.241403] Memory state around the buggy address:
[   20.241476]  ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.241573]  ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.241677] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.241920]                                               ^
[   20.242045]  ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.242429]  ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.242651] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   20.189718] ==================================================================
[   20.190347] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.190735] Read of size 1 at addr ffff800080a17c2a by task kunit_try_catch/249
[   20.191078] 
[   20.191246] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.191460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.191509] Hardware name: linux,dummy-virt (DT)
[   20.191571] Call trace:
[   20.191619]  show_stack+0x20/0x38 (C)
[   20.191754]  dump_stack_lvl+0x8c/0xd0
[   20.191863]  print_report+0x310/0x608
[   20.191964]  kasan_report+0xdc/0x128
[   20.192062]  __asan_report_load1_noabort+0x20/0x30
[   20.192178]  kasan_stack_oob+0x238/0x270
[   20.192274]  kunit_try_run_case+0x170/0x3f0
[   20.192395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.192530]  kthread+0x328/0x630
[   20.192649]  ret_from_fork+0x10/0x20
[   20.192792] 
[   20.192954] The buggy address belongs to stack of task kunit_try_catch/249
[   20.193172]  and is located at offset 138 in frame:
[   20.193518]  kasan_stack_oob+0x0/0x270
[   20.194157] 
[   20.194270] This frame has 4 objects:
[   20.194485]  [48, 49) '__assertion'
[   20.194606]  [64, 72) 'array'
[   20.194681]  [96, 112) '__assertion'
[   20.195386]  [128, 138) 'stack_array'
[   20.195651] 
[   20.195966] The buggy address belongs to the virtual mapping at
[   20.195966]  [ffff800080a10000, ffff800080a19000) created by:
[   20.195966]  kernel_clone+0x150/0x7a8
[   20.196195] 
[   20.196249] The buggy address belongs to the physical page:
[   20.196339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8
[   20.196762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.197410] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.197575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.197845] page dumped because: kasan: bad access detected
[   20.197943] 
[   20.198187] Memory state around the buggy address:
[   20.198344]  ffff800080a17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.198453]  ffff800080a17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.198795] >ffff800080a17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.198863]                                   ^
[   20.198929]  ffff800080a17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.199040]  ffff800080a17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.199228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   20.120881] ==================================================================
[   20.121222] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.121451] Read of size 1 at addr ffffa132831b15cd by task kunit_try_catch/245
[   20.121570] 
[   20.121676] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.121877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.122592] Hardware name: linux,dummy-virt (DT)
[   20.122755] Call trace:
[   20.122850]  show_stack+0x20/0x38 (C)
[   20.123009]  dump_stack_lvl+0x8c/0xd0
[   20.123135]  print_report+0x310/0x608
[   20.123285]  kasan_report+0xdc/0x128
[   20.123618]  __asan_report_load1_noabort+0x20/0x30
[   20.123750]  kasan_global_oob_right+0x230/0x270
[   20.123853]  kunit_try_run_case+0x170/0x3f0
[   20.124090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.124284]  kthread+0x328/0x630
[   20.124507]  ret_from_fork+0x10/0x20
[   20.124659] 
[   20.125033] The buggy address belongs to the variable:
[   20.125118]  global_array+0xd/0x40
[   20.125229] 
[   20.125602] The buggy address belongs to the virtual mapping at
[   20.125602]  [ffffa13281350000, ffffa13283271000) created by:
[   20.125602]  paging_init+0x66c/0x7d0
[   20.126353] 
[   20.126602] The buggy address belongs to the physical page:
[   20.126683] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db1
[   20.127024] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.127213] raw: 03fffe0000002000 ffffc1ffc01f6c48 ffffc1ffc01f6c48 0000000000000000
[   20.127619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.127708] page dumped because: kasan: bad access detected
[   20.127766] 
[   20.127799] Memory state around the buggy address:
[   20.127871]  ffffa132831b1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.128216]  ffffa132831b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.129647] >ffffa132831b1580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   20.129733]                                               ^
[   20.129818]  ffffa132831b1600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.129913]  ffffa132831b1680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.130003] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   20.060808] ==================================================================
[   20.060982] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.061166] Free of addr fff00000c78c2e01 by task kunit_try_catch/241
[   20.061298] 
[   20.061394] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.061678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.061766] Hardware name: linux,dummy-virt (DT)
[   20.061876] Call trace:
[   20.061937]  show_stack+0x20/0x38 (C)
[   20.062071]  dump_stack_lvl+0x8c/0xd0
[   20.062215]  print_report+0x118/0x608
[   20.062356]  kasan_report_invalid_free+0xc0/0xe8
[   20.062458]  check_slab_allocation+0xfc/0x108
[   20.062659]  __kasan_mempool_poison_object+0x78/0x150
[   20.062850]  mempool_free+0x28c/0x328
[   20.062966]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.063089]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.063203]  kunit_try_run_case+0x170/0x3f0
[   20.063356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.063489]  kthread+0x328/0x630
[   20.063577]  ret_from_fork+0x10/0x20
[   20.063677] 
[   20.063716] Allocated by task 241:
[   20.063769]  kasan_save_stack+0x3c/0x68
[   20.064073]  kasan_save_track+0x20/0x40
[   20.064204]  kasan_save_alloc_info+0x40/0x58
[   20.064375]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.064495]  remove_element+0x130/0x1f8
[   20.064595]  mempool_alloc_preallocated+0x58/0xc0
[   20.064888]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.065000]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.065381]  kunit_try_run_case+0x170/0x3f0
[   20.065552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.065654]  kthread+0x328/0x630
[   20.065735]  ret_from_fork+0x10/0x20
[   20.066066] 
[   20.066264] The buggy address belongs to the object at fff00000c78c2e00
[   20.066264]  which belongs to the cache kmalloc-128 of size 128
[   20.066426] The buggy address is located 1 bytes inside of
[   20.066426]  128-byte region [fff00000c78c2e00, fff00000c78c2e80)
[   20.066573] 
[   20.066849] The buggy address belongs to the physical page:
[   20.066928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   20.067496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.067630] page_type: f5(slab)
[   20.068055] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.068181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.068280] page dumped because: kasan: bad access detected
[   20.068892] 
[   20.068946] Memory state around the buggy address:
[   20.069111]  fff00000c78c2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.069294]  fff00000c78c2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.069443] >fff00000c78c2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.069533]                    ^
[   20.069602]  fff00000c78c2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.069710]  fff00000c78c2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.070281] ==================================================================
[   20.096617] ==================================================================
[   20.096781] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.097404] Free of addr fff00000c79cc001 by task kunit_try_catch/243
[   20.097527] 
[   20.097609] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.098184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.098273] Hardware name: linux,dummy-virt (DT)
[   20.098358] Call trace:
[   20.098435]  show_stack+0x20/0x38 (C)
[   20.098570]  dump_stack_lvl+0x8c/0xd0
[   20.098890]  print_report+0x118/0x608
[   20.098987]  kasan_report_invalid_free+0xc0/0xe8
[   20.099111]  __kasan_mempool_poison_object+0xfc/0x150
[   20.099270]  mempool_free+0x28c/0x328
[   20.099368]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.099588]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.099745]  kunit_try_run_case+0x170/0x3f0
[   20.099860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.100174]  kthread+0x328/0x630
[   20.100496]  ret_from_fork+0x10/0x20
[   20.100668] 
[   20.100730] The buggy address belongs to the physical page:
[   20.100893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc
[   20.101061] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.101569] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.102064] page_type: f8(unknown)
[   20.102189] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.102328] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.102746] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.102917] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.103024] head: 0bfffe0000000002 ffffc1ffc31e7301 00000000ffffffff 00000000ffffffff
[   20.103120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.103208] page dumped because: kasan: bad access detected
[   20.103271] 
[   20.103340] Memory state around the buggy address:
[   20.103418]  fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.103695]  fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.103836] >fff00000c79cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.103924]                    ^
[   20.104030]  fff00000c79cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.104127]  fff00000c79cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.104375] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   20.012924] ==================================================================
[   20.013055] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.013172] Free of addr fff00000c79cc000 by task kunit_try_catch/237
[   20.013272] 
[   20.013688] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.013927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.013998] Hardware name: linux,dummy-virt (DT)
[   20.014068] Call trace:
[   20.014173]  show_stack+0x20/0x38 (C)
[   20.014301]  dump_stack_lvl+0x8c/0xd0
[   20.014422]  print_report+0x118/0x608
[   20.014784]  kasan_report_invalid_free+0xc0/0xe8
[   20.014902]  __kasan_mempool_poison_object+0x14c/0x150
[   20.015197]  mempool_free+0x28c/0x328
[   20.015305]  mempool_double_free_helper+0x150/0x2e8
[   20.015430]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.015544]  kunit_try_run_case+0x170/0x3f0
[   20.015647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.015763]  kthread+0x328/0x630
[   20.015865]  ret_from_fork+0x10/0x20
[   20.015959] 
[   20.016000] The buggy address belongs to the physical page:
[   20.016059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc
[   20.016188] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.016341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.016469] page_type: f8(unknown)
[   20.016557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.016662] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.016932] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.017049] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.017164] head: 0bfffe0000000002 ffffc1ffc31e7301 00000000ffffffff 00000000ffffffff
[   20.017274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.017371] page dumped because: kasan: bad access detected
[   20.017446] 
[   20.017495] Memory state around the buggy address:
[   20.017646]  fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.017758]  fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.018129] >fff00000c79cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.018243]                    ^
[   20.018634]  fff00000c79cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.018781]  fff00000c79cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.018838] ==================================================================
[   20.044421] ==================================================================
[   20.044692] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.045081] Free of addr fff00000c79cc000 by task kunit_try_catch/239
[   20.045270] 
[   20.045379] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.045894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.045967] Hardware name: linux,dummy-virt (DT)
[   20.046042] Call trace:
[   20.046095]  show_stack+0x20/0x38 (C)
[   20.046211]  dump_stack_lvl+0x8c/0xd0
[   20.046327]  print_report+0x118/0x608
[   20.046436]  kasan_report_invalid_free+0xc0/0xe8
[   20.046552]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.046669]  mempool_free+0x24c/0x328
[   20.046810]  mempool_double_free_helper+0x150/0x2e8
[   20.046920]  mempool_page_alloc_double_free+0xbc/0x118
[   20.047276]  kunit_try_run_case+0x170/0x3f0
[   20.047612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.047782]  kthread+0x328/0x630
[   20.048026]  ret_from_fork+0x10/0x20
[   20.048148] 
[   20.048226] The buggy address belongs to the physical page:
[   20.048333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc
[   20.048497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.048652] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.048915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.049242] page dumped because: kasan: bad access detected
[   20.049351] 
[   20.049420] Memory state around the buggy address:
[   20.049543]  fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.049693]  fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.049828] >fff00000c79cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.049918]                    ^
[   20.050007]  fff00000c79cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.050108]  fff00000c79cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.050200] ==================================================================
[   19.984983] ==================================================================
[   19.985653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.986329] Free of addr fff00000c78c2a00 by task kunit_try_catch/235
[   19.986502] 
[   19.986651] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.986857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.986915] Hardware name: linux,dummy-virt (DT)
[   19.986987] Call trace:
[   19.987039]  show_stack+0x20/0x38 (C)
[   19.987148]  dump_stack_lvl+0x8c/0xd0
[   19.987249]  print_report+0x118/0x608
[   19.987365]  kasan_report_invalid_free+0xc0/0xe8
[   19.987474]  check_slab_allocation+0xd4/0x108
[   19.987580]  __kasan_mempool_poison_object+0x78/0x150
[   19.987693]  mempool_free+0x28c/0x328
[   19.987790]  mempool_double_free_helper+0x150/0x2e8
[   19.987898]  mempool_kmalloc_double_free+0xc0/0x118
[   19.988002]  kunit_try_run_case+0x170/0x3f0
[   19.988116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.988237]  kthread+0x328/0x630
[   19.989986]  ret_from_fork+0x10/0x20
[   19.990169] 
[   19.990232] Allocated by task 235:
[   19.990316]  kasan_save_stack+0x3c/0x68
[   19.990430]  kasan_save_track+0x20/0x40
[   19.990522]  kasan_save_alloc_info+0x40/0x58
[   19.990608]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.990699]  remove_element+0x130/0x1f8
[   19.991294]  mempool_alloc_preallocated+0x58/0xc0
[   19.991483]  mempool_double_free_helper+0x94/0x2e8
[   19.991654]  mempool_kmalloc_double_free+0xc0/0x118
[   19.991815]  kunit_try_run_case+0x170/0x3f0
[   19.992002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.992108]  kthread+0x328/0x630
[   19.992338]  ret_from_fork+0x10/0x20
[   19.992784] 
[   19.992947] Freed by task 235:
[   19.993343]  kasan_save_stack+0x3c/0x68
[   19.993872]  kasan_save_track+0x20/0x40
[   19.993958]  kasan_save_free_info+0x4c/0x78
[   19.994481]  __kasan_mempool_poison_object+0xc0/0x150
[   19.994575]  mempool_free+0x28c/0x328
[   19.994944]  mempool_double_free_helper+0x100/0x2e8
[   19.995044]  mempool_kmalloc_double_free+0xc0/0x118
[   19.995143]  kunit_try_run_case+0x170/0x3f0
[   19.995402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.995570]  kthread+0x328/0x630
[   19.995662]  ret_from_fork+0x10/0x20
[   19.995739] 
[   19.995845] The buggy address belongs to the object at fff00000c78c2a00
[   19.995845]  which belongs to the cache kmalloc-128 of size 128
[   19.996074] The buggy address is located 0 bytes inside of
[   19.996074]  128-byte region [fff00000c78c2a00, fff00000c78c2a80)
[   19.996256] 
[   19.996327] The buggy address belongs to the physical page:
[   19.996424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   19.996573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.996705] page_type: f5(slab)
[   19.996795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.996916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.997013] page dumped because: kasan: bad access detected
[   19.997087] 
[   19.997150] Memory state around the buggy address:
[   19.997234]  fff00000c78c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.997348]  fff00000c78c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.997466] >fff00000c78c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.997571]                    ^
[   19.997646]  fff00000c78c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.997746]  fff00000c78c2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.997838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   19.881307] ==================================================================
[   19.881645] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.881778] Read of size 1 at addr fff00000c797c000 by task kunit_try_catch/229
[   19.881885] 
[   19.881964] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.882226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.882288] Hardware name: linux,dummy-virt (DT)
[   19.882374] Call trace:
[   19.882430]  show_stack+0x20/0x38 (C)
[   19.882551]  dump_stack_lvl+0x8c/0xd0
[   19.882680]  print_report+0x118/0x608
[   19.882820]  kasan_report+0xdc/0x128
[   19.882970]  __asan_report_load1_noabort+0x20/0x30
[   19.883123]  mempool_uaf_helper+0x314/0x340
[   19.883238]  mempool_kmalloc_large_uaf+0xc4/0x120
[   19.883332]  kunit_try_run_case+0x170/0x3f0
[   19.883420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.883525]  kthread+0x328/0x630
[   19.883632]  ret_from_fork+0x10/0x20
[   19.883732] 
[   19.883777] The buggy address belongs to the physical page:
[   19.883946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797c
[   19.884219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.884393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.884546] page_type: f8(unknown)
[   19.884641] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.884740] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.884848] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.885170] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.885387] head: 0bfffe0000000002 ffffc1ffc31e5f01 00000000ffffffff 00000000ffffffff
[   19.885571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.885675] page dumped because: kasan: bad access detected
[   19.885749] 
[   19.885787] Memory state around the buggy address:
[   19.886371]  fff00000c797bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.886813]  fff00000c797bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.886916] >fff00000c797c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.887126]                    ^
[   19.887197]  fff00000c797c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.887420]  fff00000c797c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.887523] ==================================================================
[   19.960628] ==================================================================
[   19.960819] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.960969] Read of size 1 at addr fff00000c797c000 by task kunit_try_catch/233
[   19.961086] 
[   19.961195] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.961476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.961577] Hardware name: linux,dummy-virt (DT)
[   19.961682] Call trace:
[   19.961769]  show_stack+0x20/0x38 (C)
[   19.961887]  dump_stack_lvl+0x8c/0xd0
[   19.962050]  print_report+0x118/0x608
[   19.962188]  kasan_report+0xdc/0x128
[   19.962309]  __asan_report_load1_noabort+0x20/0x30
[   19.962422]  mempool_uaf_helper+0x314/0x340
[   19.962520]  mempool_page_alloc_uaf+0xc0/0x118
[   19.962632]  kunit_try_run_case+0x170/0x3f0
[   19.962808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.962934]  kthread+0x328/0x630
[   19.963047]  ret_from_fork+0x10/0x20
[   19.963162] 
[   19.963214] The buggy address belongs to the physical page:
[   19.963286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797c
[   19.963439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.963638] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.963793] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.963906] page dumped because: kasan: bad access detected
[   19.964028] 
[   19.964072] Memory state around the buggy address:
[   19.964361]  fff00000c797bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.964626]  fff00000c797bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.964814] >fff00000c797c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.964896]                    ^
[   19.964952]  fff00000c797c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.965050]  fff00000c797c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.965649] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   19.909963] ==================================================================
[   19.910117] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.910246] Read of size 1 at addr fff00000c789d240 by task kunit_try_catch/231
[   19.910371] 
[   19.910783] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.911722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.911780] Hardware name: linux,dummy-virt (DT)
[   19.911855] Call trace:
[   19.911904]  show_stack+0x20/0x38 (C)
[   19.912033]  dump_stack_lvl+0x8c/0xd0
[   19.912140]  print_report+0x118/0x608
[   19.912249]  kasan_report+0xdc/0x128
[   19.912360]  __asan_report_load1_noabort+0x20/0x30
[   19.912482]  mempool_uaf_helper+0x314/0x340
[   19.912583]  mempool_slab_uaf+0xc0/0x118
[   19.912686]  kunit_try_run_case+0x170/0x3f0
[   19.912795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.913086]  kthread+0x328/0x630
[   19.913212]  ret_from_fork+0x10/0x20
[   19.913838] 
[   19.913890] Allocated by task 231:
[   19.913960]  kasan_save_stack+0x3c/0x68
[   19.914065]  kasan_save_track+0x20/0x40
[   19.914164]  kasan_save_alloc_info+0x40/0x58
[   19.914264]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.914384]  remove_element+0x16c/0x1f8
[   19.914702]  mempool_alloc_preallocated+0x58/0xc0
[   19.914864]  mempool_uaf_helper+0xa4/0x340
[   19.914959]  mempool_slab_uaf+0xc0/0x118
[   19.915052]  kunit_try_run_case+0x170/0x3f0
[   19.915143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.915250]  kthread+0x328/0x630
[   19.918084]  ret_from_fork+0x10/0x20
[   19.918231] 
[   19.918298] Freed by task 231:
[   19.918380]  kasan_save_stack+0x3c/0x68
[   19.918455]  kasan_save_track+0x20/0x40
[   19.918668]  kasan_save_free_info+0x4c/0x78
[   19.919160]  __kasan_mempool_poison_object+0xc0/0x150
[   19.919272]  mempool_free+0x28c/0x328
[   19.919533]  mempool_uaf_helper+0x104/0x340
[   19.919629]  mempool_slab_uaf+0xc0/0x118
[   19.919751]  kunit_try_run_case+0x170/0x3f0
[   19.919893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.920068]  kthread+0x328/0x630
[   19.920167]  ret_from_fork+0x10/0x20
[   19.920289] 
[   19.920802] The buggy address belongs to the object at fff00000c789d240
[   19.920802]  which belongs to the cache test_cache of size 123
[   19.921183] The buggy address is located 0 bytes inside of
[   19.921183]  freed 123-byte region [fff00000c789d240, fff00000c789d2bb)
[   19.921374] 
[   19.921426] The buggy address belongs to the physical page:
[   19.922114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789d
[   19.922806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.923013] page_type: f5(slab)
[   19.923174] raw: 0bfffe0000000000 fff00000c794a640 dead000000000122 0000000000000000
[   19.923467] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.923549] page dumped because: kasan: bad access detected
[   19.923617] 
[   19.923655] Memory state around the buggy address:
[   19.923982]  fff00000c789d100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.924134]  fff00000c789d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.924278] >fff00000c789d200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.924378]                                            ^
[   19.924467]  fff00000c789d280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.924626]  fff00000c789d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.924762] ==================================================================
[   19.851572] ==================================================================
[   19.851811] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.852009] Read of size 1 at addr fff00000c78c2600 by task kunit_try_catch/227
[   19.852145] 
[   19.852283] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.852509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.852576] Hardware name: linux,dummy-virt (DT)
[   19.852660] Call trace:
[   19.852837]  show_stack+0x20/0x38 (C)
[   19.853005]  dump_stack_lvl+0x8c/0xd0
[   19.853241]  print_report+0x118/0x608
[   19.853367]  kasan_report+0xdc/0x128
[   19.853464]  __asan_report_load1_noabort+0x20/0x30
[   19.853576]  mempool_uaf_helper+0x314/0x340
[   19.853959]  mempool_kmalloc_uaf+0xc4/0x120
[   19.854081]  kunit_try_run_case+0x170/0x3f0
[   19.854264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.854405]  kthread+0x328/0x630
[   19.854685]  ret_from_fork+0x10/0x20
[   19.855362] 
[   19.855448] Allocated by task 227:
[   19.855690]  kasan_save_stack+0x3c/0x68
[   19.855799]  kasan_save_track+0x20/0x40
[   19.855899]  kasan_save_alloc_info+0x40/0x58
[   19.855988]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.856723]  remove_element+0x130/0x1f8
[   19.857628]  mempool_alloc_preallocated+0x58/0xc0
[   19.857863]  mempool_uaf_helper+0xa4/0x340
[   19.858479]  mempool_kmalloc_uaf+0xc4/0x120
[   19.858947]  kunit_try_run_case+0x170/0x3f0
[   19.859347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.860019]  kthread+0x328/0x630
[   19.860096]  ret_from_fork+0x10/0x20
[   19.860716] 
[   19.860976] Freed by task 227:
[   19.861126]  kasan_save_stack+0x3c/0x68
[   19.861739]  kasan_save_track+0x20/0x40
[   19.862211]  kasan_save_free_info+0x4c/0x78
[   19.862827]  __kasan_mempool_poison_object+0xc0/0x150
[   19.862937]  mempool_free+0x28c/0x328
[   19.863155]  mempool_uaf_helper+0x104/0x340
[   19.863534]  mempool_kmalloc_uaf+0xc4/0x120
[   19.863816]  kunit_try_run_case+0x170/0x3f0
[   19.864342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.864467]  kthread+0x328/0x630
[   19.864583]  ret_from_fork+0x10/0x20
[   19.864717] 
[   19.864790] The buggy address belongs to the object at fff00000c78c2600
[   19.864790]  which belongs to the cache kmalloc-128 of size 128
[   19.864944] The buggy address is located 0 bytes inside of
[   19.864944]  freed 128-byte region [fff00000c78c2600, fff00000c78c2680)
[   19.865137] 
[   19.865209] The buggy address belongs to the physical page:
[   19.865329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   19.865486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.865638] page_type: f5(slab)
[   19.865735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.865870] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.865978] page dumped because: kasan: bad access detected
[   19.866071] 
[   19.866134] Memory state around the buggy address:
[   19.866226]  fff00000c78c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.867174]  fff00000c78c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867290] >fff00000c78c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.867376]                    ^
[   19.867494]  fff00000c78c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867611]  fff00000c78c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.867835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   19.751103] ==================================================================
[   19.751220] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.751308] Read of size 1 at addr fff00000c4693d73 by task kunit_try_catch/221
[   19.751389] 
[   19.751439] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.751534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.751564] Hardware name: linux,dummy-virt (DT)
[   19.751601] Call trace:
[   19.751632]  show_stack+0x20/0x38 (C)
[   19.751699]  dump_stack_lvl+0x8c/0xd0
[   19.751762]  print_report+0x118/0x608
[   19.751818]  kasan_report+0xdc/0x128
[   19.751871]  __asan_report_load1_noabort+0x20/0x30
[   19.751929]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.751986]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752040]  kunit_try_run_case+0x170/0x3f0
[   19.752102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752160]  kthread+0x328/0x630
[   19.752211]  ret_from_fork+0x10/0x20
[   19.752269] 
[   19.752291] Allocated by task 221:
[   19.752333]  kasan_save_stack+0x3c/0x68
[   19.752381]  kasan_save_track+0x20/0x40
[   19.752419]  kasan_save_alloc_info+0x40/0x58
[   19.752475]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.752521]  remove_element+0x130/0x1f8
[   19.752562]  mempool_alloc_preallocated+0x58/0xc0
[   19.752602]  mempool_oob_right_helper+0x98/0x2f0
[   19.752642]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752680]  kunit_try_run_case+0x170/0x3f0
[   19.752719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752761]  kthread+0x328/0x630
[   19.752795]  ret_from_fork+0x10/0x20
[   19.752832] 
[   19.752854] The buggy address belongs to the object at fff00000c4693d00
[   19.752854]  which belongs to the cache kmalloc-128 of size 128
[   19.752912] The buggy address is located 0 bytes to the right of
[   19.752912]  allocated 115-byte region [fff00000c4693d00, fff00000c4693d73)
[   19.752975] 
[   19.753001] The buggy address belongs to the physical page:
[   19.753038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104693
[   19.753099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.753157] page_type: f5(slab)
[   19.753204] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.753256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.753298] page dumped because: kasan: bad access detected
[   19.753342] 
[   19.753364] Memory state around the buggy address:
[   19.753402]  fff00000c4693c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753448]  fff00000c4693c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753491] >fff00000c4693d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753531]                                                              ^
[   19.753571]  fff00000c4693d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753614]  fff00000c4693e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753655] ==================================================================
[   19.807504] ==================================================================
[   19.807720] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.807876] Read of size 1 at addr fff00000c789f2bb by task kunit_try_catch/225
[   19.808029] 
[   19.808151] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.808403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808462] Hardware name: linux,dummy-virt (DT)
[   19.808538] Call trace:
[   19.808590]  show_stack+0x20/0x38 (C)
[   19.808741]  dump_stack_lvl+0x8c/0xd0
[   19.809218]  print_report+0x118/0x608
[   19.809364]  kasan_report+0xdc/0x128
[   19.809501]  __asan_report_load1_noabort+0x20/0x30
[   19.809604]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.809695]  mempool_slab_oob_right+0xc0/0x118
[   19.809947]  kunit_try_run_case+0x170/0x3f0
[   19.810061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810185]  kthread+0x328/0x630
[   19.810587]  ret_from_fork+0x10/0x20
[   19.810745] 
[   19.810801] Allocated by task 225:
[   19.810901]  kasan_save_stack+0x3c/0x68
[   19.811031]  kasan_save_track+0x20/0x40
[   19.811145]  kasan_save_alloc_info+0x40/0x58
[   19.811263]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.811412]  remove_element+0x16c/0x1f8
[   19.811537]  mempool_alloc_preallocated+0x58/0xc0
[   19.811630]  mempool_oob_right_helper+0x98/0x2f0
[   19.811714]  mempool_slab_oob_right+0xc0/0x118
[   19.811805]  kunit_try_run_case+0x170/0x3f0
[   19.811893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.812003]  kthread+0x328/0x630
[   19.812107]  ret_from_fork+0x10/0x20
[   19.812231] 
[   19.812283] The buggy address belongs to the object at fff00000c789f240
[   19.812283]  which belongs to the cache test_cache of size 123
[   19.812414] The buggy address is located 0 bytes to the right of
[   19.812414]  allocated 123-byte region [fff00000c789f240, fff00000c789f2bb)
[   19.812584] 
[   19.812640] The buggy address belongs to the physical page:
[   19.812704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789f
[   19.812850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.812968] page_type: f5(slab)
[   19.813070] raw: 0bfffe0000000000 fff00000c794a500 dead000000000122 0000000000000000
[   19.813196] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.813292] page dumped because: kasan: bad access detected
[   19.813385] 
[   19.813432] Memory state around the buggy address:
[   19.813507]  fff00000c789f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.814506]  fff00000c789f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.814654] >fff00000c789f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.814806]                                         ^
[   19.814991]  fff00000c789f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.815197]  fff00000c789f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.815401] ==================================================================
[   19.774907] ==================================================================
[   19.775056] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.775210] Read of size 1 at addr fff00000c797a001 by task kunit_try_catch/223
[   19.776020] 
[   19.776107] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.776301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.776379] Hardware name: linux,dummy-virt (DT)
[   19.776462] Call trace:
[   19.776527]  show_stack+0x20/0x38 (C)
[   19.776656]  dump_stack_lvl+0x8c/0xd0
[   19.776775]  print_report+0x118/0x608
[   19.776880]  kasan_report+0xdc/0x128
[   19.777018]  __asan_report_load1_noabort+0x20/0x30
[   19.777279]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.777482]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.777586]  kunit_try_run_case+0x170/0x3f0
[   19.777712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.777823]  kthread+0x328/0x630
[   19.777910]  ret_from_fork+0x10/0x20
[   19.778005] 
[   19.778050] The buggy address belongs to the physical page:
[   19.778450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107978
[   19.778579] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.778683] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.778836] page_type: f8(unknown)
[   19.778932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.779384] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.779496] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.779590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.779718] head: 0bfffe0000000002 ffffc1ffc31e5e01 00000000ffffffff 00000000ffffffff
[   19.780017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.780126] page dumped because: kasan: bad access detected
[   19.780238] 
[   19.780343] Memory state around the buggy address:
[   19.780479]  fff00000c7979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.780761]  fff00000c7979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.781058] >fff00000c797a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.781161]                    ^
[   19.781575]  fff00000c797a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.782099]  fff00000c797a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.782408] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   19.181764] ==================================================================
[   19.181878] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.181971] Read of size 1 at addr fff00000c794a280 by task kunit_try_catch/215
[   19.182030] 
[   19.182079] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.182180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.182210] Hardware name: linux,dummy-virt (DT)
[   19.182248] Call trace:
[   19.182279]  show_stack+0x20/0x38 (C)
[   19.182355]  dump_stack_lvl+0x8c/0xd0
[   19.182418]  print_report+0x118/0x608
[   19.182472]  kasan_report+0xdc/0x128
[   19.182522]  __kasan_check_byte+0x54/0x70
[   19.182574]  kmem_cache_destroy+0x34/0x218
[   19.182627]  kmem_cache_double_destroy+0x174/0x300
[   19.182680]  kunit_try_run_case+0x170/0x3f0
[   19.182736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.182798]  kthread+0x328/0x630
[   19.182847]  ret_from_fork+0x10/0x20
[   19.182898] 
[   19.182920] Allocated by task 215:
[   19.182952]  kasan_save_stack+0x3c/0x68
[   19.182999]  kasan_save_track+0x20/0x40
[   19.183038]  kasan_save_alloc_info+0x40/0x58
[   19.183078]  __kasan_slab_alloc+0xa8/0xb0
[   19.183115]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.183158]  __kmem_cache_create_args+0x178/0x280
[   19.183196]  kmem_cache_double_destroy+0xc0/0x300
[   19.183236]  kunit_try_run_case+0x170/0x3f0
[   19.183275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.183327]  kthread+0x328/0x630
[   19.183365]  ret_from_fork+0x10/0x20
[   19.183404] 
[   19.183425] Freed by task 215:
[   19.183452]  kasan_save_stack+0x3c/0x68
[   19.183492]  kasan_save_track+0x20/0x40
[   19.183528]  kasan_save_free_info+0x4c/0x78
[   19.183569]  __kasan_slab_free+0x6c/0x98
[   19.183608]  kmem_cache_free+0x260/0x470
[   19.183644]  slab_kmem_cache_release+0x38/0x50
[   19.183685]  kmem_cache_release+0x1c/0x30
[   19.183721]  kobject_put+0x17c/0x430
[   19.183758]  sysfs_slab_release+0x1c/0x30
[   19.183795]  kmem_cache_destroy+0x118/0x218
[   19.183834]  kmem_cache_double_destroy+0x128/0x300
[   19.183873]  kunit_try_run_case+0x170/0x3f0
[   19.183913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.183957]  kthread+0x328/0x630
[   19.183989]  ret_from_fork+0x10/0x20
[   19.184025] 
[   19.184047] The buggy address belongs to the object at fff00000c794a280
[   19.184047]  which belongs to the cache kmem_cache of size 208
[   19.184108] The buggy address is located 0 bytes inside of
[   19.184108]  freed 208-byte region [fff00000c794a280, fff00000c794a350)
[   19.184170] 
[   19.184193] The buggy address belongs to the physical page:
[   19.184228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a
[   19.184285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.184350] page_type: f5(slab)
[   19.184400] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.184463] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.184512] page dumped because: kasan: bad access detected
[   19.184546] 
[   19.184569] Memory state around the buggy address:
[   19.184604]  fff00000c794a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.184649]  fff00000c794a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184693] >fff00000c794a280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.184730]                    ^
[   19.184762]  fff00000c794a300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.184807]  fff00000c794a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184849] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   19.028059] ==================================================================
[   19.028427] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.028604] Read of size 1 at addr fff00000c794e000 by task kunit_try_catch/213
[   19.028659] 
[   19.028705] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.028795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.028822] Hardware name: linux,dummy-virt (DT)
[   19.028860] Call trace:
[   19.028885]  show_stack+0x20/0x38 (C)
[   19.028943]  dump_stack_lvl+0x8c/0xd0
[   19.028995]  print_report+0x118/0x608
[   19.029043]  kasan_report+0xdc/0x128
[   19.029086]  __asan_report_load1_noabort+0x20/0x30
[   19.029136]  kmem_cache_rcu_uaf+0x388/0x468
[   19.029182]  kunit_try_run_case+0x170/0x3f0
[   19.029233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.029285]  kthread+0x328/0x630
[   19.029339]  ret_from_fork+0x10/0x20
[   19.029396] 
[   19.029415] Allocated by task 213:
[   19.029447]  kasan_save_stack+0x3c/0x68
[   19.029492]  kasan_save_track+0x20/0x40
[   19.029530]  kasan_save_alloc_info+0x40/0x58
[   19.029567]  __kasan_slab_alloc+0xa8/0xb0
[   19.029604]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.029643]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.029678]  kunit_try_run_case+0x170/0x3f0
[   19.029714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.029754]  kthread+0x328/0x630
[   19.029785]  ret_from_fork+0x10/0x20
[   19.029820] 
[   19.029838] Freed by task 0:
[   19.029864]  kasan_save_stack+0x3c/0x68
[   19.029899]  kasan_save_track+0x20/0x40
[   19.029935]  kasan_save_free_info+0x4c/0x78
[   19.029973]  __kasan_slab_free+0x6c/0x98
[   19.030019]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.030091]  rcu_core+0x9f4/0x1e20
[   19.030173]  rcu_core_si+0x18/0x30
[   19.030205]  handle_softirqs+0x374/0xb28
[   19.030761]  __do_softirq+0x1c/0x28
[   19.030908] 
[   19.030933] Last potentially related work creation:
[   19.030963]  kasan_save_stack+0x3c/0x68
[   19.031011]  kasan_record_aux_stack+0xb4/0xc8
[   19.031060]  kmem_cache_free+0x120/0x470
[   19.031097]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.031134]  kunit_try_run_case+0x170/0x3f0
[   19.031170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.031211]  kthread+0x328/0x630
[   19.031381]  ret_from_fork+0x10/0x20
[   19.031529] 
[   19.031687] The buggy address belongs to the object at fff00000c794e000
[   19.031687]  which belongs to the cache test_cache of size 200
[   19.032142] The buggy address is located 0 bytes inside of
[   19.032142]  freed 200-byte region [fff00000c794e000, fff00000c794e0c8)
[   19.033113] 
[   19.033266] The buggy address belongs to the physical page:
[   19.033329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794e
[   19.033399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.033853] page_type: f5(slab)
[   19.034152] raw: 0bfffe0000000000 fff00000c794a140 dead000000000122 0000000000000000
[   19.034442] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.034590] page dumped because: kasan: bad access detected
[   19.034628] 
[   19.034647] Memory state around the buggy address:
[   19.034744]  fff00000c794df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.035104]  fff00000c794df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.035206] >fff00000c794e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.035247]                    ^
[   19.035334]  fff00000c794e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.035381]  fff00000c794e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.035422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   18.445580] ==================================================================
[   18.445749] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   18.445892] Free of addr fff00000c794d001 by task kunit_try_catch/211
[   18.445980] 
[   18.446512] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   18.446837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.446926] Hardware name: linux,dummy-virt (DT)
[   18.447043] Call trace:
[   18.447102]  show_stack+0x20/0x38 (C)
[   18.447209]  dump_stack_lvl+0x8c/0xd0
[   18.447304]  print_report+0x118/0x608
[   18.447438]  kasan_report_invalid_free+0xc0/0xe8
[   18.447532]  check_slab_allocation+0xfc/0x108
[   18.447732]  __kasan_slab_pre_free+0x2c/0x48
[   18.448060]  kmem_cache_free+0xf0/0x470
[   18.448225]  kmem_cache_invalid_free+0x184/0x3c8
[   18.448399]  kunit_try_run_case+0x170/0x3f0
[   18.448534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.448658]  kthread+0x328/0x630
[   18.448745]  ret_from_fork+0x10/0x20
[   18.448873] 
[   18.448938] Allocated by task 211:
[   18.449036]  kasan_save_stack+0x3c/0x68
[   18.449170]  kasan_save_track+0x20/0x40
[   18.449279]  kasan_save_alloc_info+0x40/0x58
[   18.449386]  __kasan_slab_alloc+0xa8/0xb0
[   18.449474]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.449591]  kmem_cache_invalid_free+0x12c/0x3c8
[   18.449716]  kunit_try_run_case+0x170/0x3f0
[   18.449801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.449933]  kthread+0x328/0x630
[   18.450033]  ret_from_fork+0x10/0x20
[   18.450139] 
[   18.450200] The buggy address belongs to the object at fff00000c794d000
[   18.450200]  which belongs to the cache test_cache of size 200
[   18.450365] The buggy address is located 1 bytes inside of
[   18.450365]  200-byte region [fff00000c794d000, fff00000c794d0c8)
[   18.450483] 
[   18.450528] The buggy address belongs to the physical page:
[   18.450604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794d
[   18.450823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.450935] page_type: f5(slab)
[   18.451025] raw: 0bfffe0000000000 fff00000c794a000 dead000000000122 0000000000000000
[   18.451119] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.451200] page dumped because: kasan: bad access detected
[   18.451261] 
[   18.451299] Memory state around the buggy address:
[   18.451390]  fff00000c794cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451498]  fff00000c794cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451582] >fff00000c794d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.451651]                    ^
[   18.451696]  fff00000c794d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.451759]  fff00000c794d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   18.394097] ==================================================================
[   18.394210] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.394298] Free of addr fff00000c794a000 by task kunit_try_catch/209
[   18.394498] 
[   18.394573] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   18.394802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.394858] Hardware name: linux,dummy-virt (DT)
[   18.394942] Call trace:
[   18.394994]  show_stack+0x20/0x38 (C)
[   18.395115]  dump_stack_lvl+0x8c/0xd0
[   18.395232]  print_report+0x118/0x608
[   18.395346]  kasan_report_invalid_free+0xc0/0xe8
[   18.395462]  check_slab_allocation+0xd4/0x108
[   18.395574]  __kasan_slab_pre_free+0x2c/0x48
[   18.395662]  kmem_cache_free+0xf0/0x470
[   18.395756]  kmem_cache_double_free+0x190/0x3c8
[   18.395888]  kunit_try_run_case+0x170/0x3f0
[   18.396055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.396185]  kthread+0x328/0x630
[   18.396282]  ret_from_fork+0x10/0x20
[   18.396409] 
[   18.396449] Allocated by task 209:
[   18.396530]  kasan_save_stack+0x3c/0x68
[   18.396635]  kasan_save_track+0x20/0x40
[   18.396725]  kasan_save_alloc_info+0x40/0x58
[   18.396813]  __kasan_slab_alloc+0xa8/0xb0
[   18.396904]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.397000]  kmem_cache_double_free+0x12c/0x3c8
[   18.397124]  kunit_try_run_case+0x170/0x3f0
[   18.397244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.397360]  kthread+0x328/0x630
[   18.397423]  ret_from_fork+0x10/0x20
[   18.397498] 
[   18.397534] Freed by task 209:
[   18.397624]  kasan_save_stack+0x3c/0x68
[   18.397754]  kasan_save_track+0x20/0x40
[   18.397824]  kasan_save_free_info+0x4c/0x78
[   18.397903]  __kasan_slab_free+0x6c/0x98
[   18.397973]  kmem_cache_free+0x260/0x470
[   18.398054]  kmem_cache_double_free+0x140/0x3c8
[   18.398130]  kunit_try_run_case+0x170/0x3f0
[   18.398218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.398313]  kthread+0x328/0x630
[   18.398431]  ret_from_fork+0x10/0x20
[   18.398503] 
[   18.398547] The buggy address belongs to the object at fff00000c794a000
[   18.398547]  which belongs to the cache test_cache of size 200
[   18.398682] The buggy address is located 0 bytes inside of
[   18.398682]  200-byte region [fff00000c794a000, fff00000c794a0c8)
[   18.398830] 
[   18.398874] The buggy address belongs to the physical page:
[   18.398939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a
[   18.399053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.399198] page_type: f5(slab)
[   18.399353] raw: 0bfffe0000000000 fff00000c3e3cdc0 dead000000000122 0000000000000000
[   18.399525] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.399627] page dumped because: kasan: bad access detected
[   18.399700] 
[   18.399740] Memory state around the buggy address:
[   18.399815]  fff00000c7949f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.399921]  fff00000c7949f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400023] >fff00000c794a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.400097]                    ^
[   18.400314]  fff00000c794a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.400512]  fff00000c794a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   18.161746] ==================================================================
[   18.162895] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.163466] Read of size 1 at addr fff00000c79490c8 by task kunit_try_catch/207
[   18.163616] 
[   18.163707] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   18.163904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.163959] Hardware name: linux,dummy-virt (DT)
[   18.164020] Call trace:
[   18.164101]  show_stack+0x20/0x38 (C)
[   18.164231]  dump_stack_lvl+0x8c/0xd0
[   18.164395]  print_report+0x118/0x608
[   18.164529]  kasan_report+0xdc/0x128
[   18.164650]  __asan_report_load1_noabort+0x20/0x30
[   18.165650]  kmem_cache_oob+0x344/0x430
[   18.165808]  kunit_try_run_case+0x170/0x3f0
[   18.166214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.166532]  kthread+0x328/0x630
[   18.166673]  ret_from_fork+0x10/0x20
[   18.167092] 
[   18.167400] Allocated by task 207:
[   18.167930]  kasan_save_stack+0x3c/0x68
[   18.168400]  kasan_save_track+0x20/0x40
[   18.169544]  kasan_save_alloc_info+0x40/0x58
[   18.169675]  __kasan_slab_alloc+0xa8/0xb0
[   18.171206]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   18.171570]  kmem_cache_oob+0x12c/0x430
[   18.171685]  kunit_try_run_case+0x170/0x3f0
[   18.172250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.172481]  kthread+0x328/0x630
[   18.172716]  ret_from_fork+0x10/0x20
[   18.173221] 
[   18.173293] The buggy address belongs to the object at fff00000c7949000
[   18.173293]  which belongs to the cache test_cache of size 200
[   18.173452] The buggy address is located 0 bytes to the right of
[   18.173452]  allocated 200-byte region [fff00000c7949000, fff00000c79490c8)
[   18.174713] 
[   18.175167] The buggy address belongs to the physical page:
[   18.175248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107949
[   18.175643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.175815] page_type: f5(slab)
[   18.175912] raw: 0bfffe0000000000 fff00000c3e3cc80 dead000000000122 0000000000000000
[   18.176028] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.176129] page dumped because: kasan: bad access detected
[   18.177547] 
[   18.177740] Memory state around the buggy address:
[   18.178067]  fff00000c7948f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.178224]  fff00000c7949000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.178351] >fff00000c7949080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.178442]                                               ^
[   18.178524]  fff00000c7949100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.178624]  fff00000c7949180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.178714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   18.081312] ==================================================================
[   18.081491] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.081631] Read of size 8 at addr fff00000c78b61c0 by task kunit_try_catch/200
[   18.081773] 
[   18.081859] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   18.082072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.082167] Hardware name: linux,dummy-virt (DT)
[   18.082263] Call trace:
[   18.082368]  show_stack+0x20/0x38 (C)
[   18.082549]  dump_stack_lvl+0x8c/0xd0
[   18.082700]  print_report+0x118/0x608
[   18.082891]  kasan_report+0xdc/0x128
[   18.082998]  __asan_report_load8_noabort+0x20/0x30
[   18.083122]  workqueue_uaf+0x480/0x4a8
[   18.083255]  kunit_try_run_case+0x170/0x3f0
[   18.083385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.083523]  kthread+0x328/0x630
[   18.083622]  ret_from_fork+0x10/0x20
[   18.083747] 
[   18.083772] Allocated by task 200:
[   18.083811]  kasan_save_stack+0x3c/0x68
[   18.083862]  kasan_save_track+0x20/0x40
[   18.083903]  kasan_save_alloc_info+0x40/0x58
[   18.083947]  __kasan_kmalloc+0xd4/0xd8
[   18.083987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.084032]  workqueue_uaf+0x13c/0x4a8
[   18.084072]  kunit_try_run_case+0x170/0x3f0
[   18.084113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.084160]  kthread+0x328/0x630
[   18.084196]  ret_from_fork+0x10/0x20
[   18.084235] 
[   18.084257] Freed by task 10:
[   18.084285]  kasan_save_stack+0x3c/0x68
[   18.084353]  kasan_save_track+0x20/0x40
[   18.084433]  kasan_save_free_info+0x4c/0x78
[   18.084586]  __kasan_slab_free+0x6c/0x98
[   18.084758]  kfree+0x214/0x3c8
[   18.084862]  workqueue_uaf_work+0x18/0x30
[   18.084956]  process_one_work+0x530/0xf98
[   18.085277]  worker_thread+0x8ac/0xf28
[   18.085617]  kthread+0x328/0x630
[   18.085685]  ret_from_fork+0x10/0x20
[   18.085770] 
[   18.085816] Last potentially related work creation:
[   18.085880]  kasan_save_stack+0x3c/0x68
[   18.085973]  kasan_record_aux_stack+0xb4/0xc8
[   18.086066]  __queue_work+0x65c/0x1010
[   18.086577]  queue_work_on+0xbc/0xf8
[   18.086742]  workqueue_uaf+0x210/0x4a8
[   18.087296]  kunit_try_run_case+0x170/0x3f0
[   18.087431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.087544]  kthread+0x328/0x630
[   18.088136]  ret_from_fork+0x10/0x20
[   18.088369] 
[   18.088519] The buggy address belongs to the object at fff00000c78b61c0
[   18.088519]  which belongs to the cache kmalloc-32 of size 32
[   18.088688] The buggy address is located 0 bytes inside of
[   18.088688]  freed 32-byte region [fff00000c78b61c0, fff00000c78b61e0)
[   18.088899] 
[   18.088963] The buggy address belongs to the physical page:
[   18.089333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b6
[   18.089673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.089835] page_type: f5(slab)
[   18.089929] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.090045] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.090554] page dumped because: kasan: bad access detected
[   18.090651] 
[   18.090695] Memory state around the buggy address:
[   18.090772]  fff00000c78b6080: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   18.090869]  fff00000c78b6100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.090968] >fff00000c78b6180: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   18.091058]                                            ^
[   18.091219]  fff00000c78b6200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091568]  fff00000c78b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   18.043605] ==================================================================
[   18.043855] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   18.043987] Read of size 4 at addr fff00000c78c3f80 by task swapper/0/0
[   18.044086] 
[   18.044164] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   18.044367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.044423] Hardware name: linux,dummy-virt (DT)
[   18.044505] Call trace:
[   18.044560]  show_stack+0x20/0x38 (C)
[   18.044673]  dump_stack_lvl+0x8c/0xd0
[   18.044778]  print_report+0x118/0x608
[   18.044885]  kasan_report+0xdc/0x128
[   18.044983]  __asan_report_load4_noabort+0x20/0x30
[   18.045100]  rcu_uaf_reclaim+0x64/0x70
[   18.045201]  rcu_core+0x9f4/0x1e20
[   18.045306]  rcu_core_si+0x18/0x30
[   18.046293]  handle_softirqs+0x374/0xb28
[   18.046506]  __do_softirq+0x1c/0x28
[   18.046639]  ____do_softirq+0x18/0x30
[   18.046802]  call_on_irq_stack+0x24/0x30
[   18.046887]  do_softirq_own_stack+0x24/0x38
[   18.046977]  __irq_exit_rcu+0x1fc/0x318
[   18.047395]  irq_exit_rcu+0x1c/0x80
[   18.047530]  el1_interrupt+0x38/0x58
[   18.047625]  el1h_64_irq_handler+0x18/0x28
[   18.047704]  el1h_64_irq+0x6c/0x70
[   18.047882]  arch_local_irq_enable+0x4/0x8 (P)
[   18.047988]  do_idle+0x384/0x4e8
[   18.048123]  cpu_startup_entry+0x68/0x80
[   18.048211]  rest_init+0x160/0x188
[   18.048301]  start_kernel+0x314/0x3d8
[   18.048571]  __primary_switched+0x8c/0xa0
[   18.048900] 
[   18.048959] Allocated by task 198:
[   18.049021]  kasan_save_stack+0x3c/0x68
[   18.049147]  kasan_save_track+0x20/0x40
[   18.049271]  kasan_save_alloc_info+0x40/0x58
[   18.049385]  __kasan_kmalloc+0xd4/0xd8
[   18.049457]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.049575]  rcu_uaf+0xb0/0x2d8
[   18.049677]  kunit_try_run_case+0x170/0x3f0
[   18.049799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.049902]  kthread+0x328/0x630
[   18.049996]  ret_from_fork+0x10/0x20
[   18.050103] 
[   18.050144] Freed by task 0:
[   18.050199]  kasan_save_stack+0x3c/0x68
[   18.050274]  kasan_save_track+0x20/0x40
[   18.050356]  kasan_save_free_info+0x4c/0x78
[   18.050452]  __kasan_slab_free+0x6c/0x98
[   18.050560]  kfree+0x214/0x3c8
[   18.050660]  rcu_uaf_reclaim+0x28/0x70
[   18.050793]  rcu_core+0x9f4/0x1e20
[   18.050861]  rcu_core_si+0x18/0x30
[   18.050927]  handle_softirqs+0x374/0xb28
[   18.051005]  __do_softirq+0x1c/0x28
[   18.051158] 
[   18.051482] Last potentially related work creation:
[   18.051649]  kasan_save_stack+0x3c/0x68
[   18.051930]  kasan_record_aux_stack+0xb4/0xc8
[   18.052036]  __call_rcu_common.constprop.0+0x70/0x8b0
[   18.052160]  call_rcu+0x18/0x30
[   18.052222]  rcu_uaf+0x14c/0x2d8
[   18.052330]  kunit_try_run_case+0x170/0x3f0
[   18.052418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.052564]  kthread+0x328/0x630
[   18.052632]  ret_from_fork+0x10/0x20
[   18.052767] 
[   18.052848] The buggy address belongs to the object at fff00000c78c3f80
[   18.052848]  which belongs to the cache kmalloc-32 of size 32
[   18.053006] The buggy address is located 0 bytes inside of
[   18.053006]  freed 32-byte region [fff00000c78c3f80, fff00000c78c3fa0)
[   18.053134] 
[   18.053193] The buggy address belongs to the physical page:
[   18.053298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c3
[   18.053467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.053580] page_type: f5(slab)
[   18.053672] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.053781] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.053868] page dumped because: kasan: bad access detected
[   18.053929] 
[   18.053967] Memory state around the buggy address:
[   18.054053]  fff00000c78c3e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.054191]  fff00000c78c3f00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.054328] >fff00000c78c3f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.054419]                    ^
[   18.054481]  fff00000c78c4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.054574]  fff00000c78c4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.054655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   17.918610] ==================================================================
[   17.918968] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.919083] Read of size 1 at addr fff00000c78c2378 by task kunit_try_catch/196
[   17.919212] 
[   17.919274] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.919442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.919490] Hardware name: linux,dummy-virt (DT)
[   17.919544] Call trace:
[   17.919590]  show_stack+0x20/0x38 (C)
[   17.919695]  dump_stack_lvl+0x8c/0xd0
[   17.919824]  print_report+0x118/0x608
[   17.919923]  kasan_report+0xdc/0x128
[   17.920074]  __asan_report_load1_noabort+0x20/0x30
[   17.920228]  ksize_uaf+0x544/0x5f8
[   17.920382]  kunit_try_run_case+0x170/0x3f0
[   17.920561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.920688]  kthread+0x328/0x630
[   17.920787]  ret_from_fork+0x10/0x20
[   17.920889] 
[   17.920928] Allocated by task 196:
[   17.920990]  kasan_save_stack+0x3c/0x68
[   17.921072]  kasan_save_track+0x20/0x40
[   17.921176]  kasan_save_alloc_info+0x40/0x58
[   17.921343]  __kasan_kmalloc+0xd4/0xd8
[   17.921571]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.921670]  ksize_uaf+0xb8/0x5f8
[   17.922012]  kunit_try_run_case+0x170/0x3f0
[   17.922137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.922882]  kthread+0x328/0x630
[   17.923122]  ret_from_fork+0x10/0x20
[   17.923864] 
[   17.924147] Freed by task 196:
[   17.924212]  kasan_save_stack+0x3c/0x68
[   17.924675]  kasan_save_track+0x20/0x40
[   17.924764]  kasan_save_free_info+0x4c/0x78
[   17.924851]  __kasan_slab_free+0x6c/0x98
[   17.925993]  kfree+0x214/0x3c8
[   17.926578]  ksize_uaf+0x11c/0x5f8
[   17.926839]  kunit_try_run_case+0x170/0x3f0
[   17.926919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926997]  kthread+0x328/0x630
[   17.927062]  ret_from_fork+0x10/0x20
[   17.927875] 
[   17.928062] The buggy address belongs to the object at fff00000c78c2300
[   17.928062]  which belongs to the cache kmalloc-128 of size 128
[   17.928824] The buggy address is located 120 bytes inside of
[   17.928824]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.929329] 
[   17.929483] The buggy address belongs to the physical page:
[   17.929574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.929806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.930187] page_type: f5(slab)
[   17.930412] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.930623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.930712] page dumped because: kasan: bad access detected
[   17.931055] 
[   17.931100] Memory state around the buggy address:
[   17.931173]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.931276]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931378] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.931456]                                                                 ^
[   17.931550]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931645]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931740] ==================================================================
[   17.909113] ==================================================================
[   17.909818] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.910267] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196
[   17.910658] 
[   17.910752] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.911042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.911101] Hardware name: linux,dummy-virt (DT)
[   17.911170] Call trace:
[   17.911226]  show_stack+0x20/0x38 (C)
[   17.911367]  dump_stack_lvl+0x8c/0xd0
[   17.911484]  print_report+0x118/0x608
[   17.911584]  kasan_report+0xdc/0x128
[   17.911671]  __asan_report_load1_noabort+0x20/0x30
[   17.911771]  ksize_uaf+0x598/0x5f8
[   17.911846]  kunit_try_run_case+0x170/0x3f0
[   17.911959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.912093]  kthread+0x328/0x630
[   17.912196]  ret_from_fork+0x10/0x20
[   17.912357] 
[   17.912393] Allocated by task 196:
[   17.912457]  kasan_save_stack+0x3c/0x68
[   17.912538]  kasan_save_track+0x20/0x40
[   17.912850]  kasan_save_alloc_info+0x40/0x58
[   17.912937]  __kasan_kmalloc+0xd4/0xd8
[   17.913024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.913383]  ksize_uaf+0xb8/0x5f8
[   17.913533]  kunit_try_run_case+0x170/0x3f0
[   17.913612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.913698]  kthread+0x328/0x630
[   17.913762]  ret_from_fork+0x10/0x20
[   17.914022] 
[   17.914098] Freed by task 196:
[   17.914168]  kasan_save_stack+0x3c/0x68
[   17.914246]  kasan_save_track+0x20/0x40
[   17.914333]  kasan_save_free_info+0x4c/0x78
[   17.914411]  __kasan_slab_free+0x6c/0x98
[   17.914477]  kfree+0x214/0x3c8
[   17.914548]  ksize_uaf+0x11c/0x5f8
[   17.914621]  kunit_try_run_case+0x170/0x3f0
[   17.914700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.914804]  kthread+0x328/0x630
[   17.914877]  ret_from_fork+0x10/0x20
[   17.914954] 
[   17.914998] The buggy address belongs to the object at fff00000c78c2300
[   17.914998]  which belongs to the cache kmalloc-128 of size 128
[   17.915129] The buggy address is located 0 bytes inside of
[   17.915129]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.915262] 
[   17.915307] The buggy address belongs to the physical page:
[   17.915387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.915494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.915956] page_type: f5(slab)
[   17.916112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.916259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.916384] page dumped because: kasan: bad access detected
[   17.916456] 
[   17.916496] Memory state around the buggy address:
[   17.916558]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.916675]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.916767] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.917004]                    ^
[   17.917114]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.917211]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.917299] ==================================================================
[   17.897406] ==================================================================
[   17.897556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.898039] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196
[   17.898198] 
[   17.898295] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.898558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.898628] Hardware name: linux,dummy-virt (DT)
[   17.898705] Call trace:
[   17.898791]  show_stack+0x20/0x38 (C)
[   17.898970]  dump_stack_lvl+0x8c/0xd0
[   17.899110]  print_report+0x118/0x608
[   17.899206]  kasan_report+0xdc/0x128
[   17.899332]  __kasan_check_byte+0x54/0x70
[   17.899717]  ksize+0x30/0x88
[   17.900078]  ksize_uaf+0x168/0x5f8
[   17.900199]  kunit_try_run_case+0x170/0x3f0
[   17.900339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.900479]  kthread+0x328/0x630
[   17.900603]  ret_from_fork+0x10/0x20
[   17.900745] 
[   17.900789] Allocated by task 196:
[   17.900862]  kasan_save_stack+0x3c/0x68
[   17.900999]  kasan_save_track+0x20/0x40
[   17.901114]  kasan_save_alloc_info+0x40/0x58
[   17.901233]  __kasan_kmalloc+0xd4/0xd8
[   17.901333]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.901409]  ksize_uaf+0xb8/0x5f8
[   17.901481]  kunit_try_run_case+0x170/0x3f0
[   17.901828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.901984]  kthread+0x328/0x630
[   17.902215]  ret_from_fork+0x10/0x20
[   17.902262] 
[   17.902284] Freed by task 196:
[   17.902333]  kasan_save_stack+0x3c/0x68
[   17.902437]  kasan_save_track+0x20/0x40
[   17.902547]  kasan_save_free_info+0x4c/0x78
[   17.902633]  __kasan_slab_free+0x6c/0x98
[   17.902709]  kfree+0x214/0x3c8
[   17.902815]  ksize_uaf+0x11c/0x5f8
[   17.902904]  kunit_try_run_case+0x170/0x3f0
[   17.902975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.903057]  kthread+0x328/0x630
[   17.903119]  ret_from_fork+0x10/0x20
[   17.903223] 
[   17.903262] The buggy address belongs to the object at fff00000c78c2300
[   17.903262]  which belongs to the cache kmalloc-128 of size 128
[   17.903629] The buggy address is located 0 bytes inside of
[   17.903629]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.903778] 
[   17.903843] The buggy address belongs to the physical page:
[   17.903954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.904093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.904327] page_type: f5(slab)
[   17.904571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.904707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.905016] page dumped because: kasan: bad access detected
[   17.905235] 
[   17.905387] Memory state around the buggy address:
[   17.905684]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.906034]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906164] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.906248]                    ^
[   17.906642]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906847]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906938] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   17.817926] ==================================================================
[   17.818376] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.818757] Read of size 1 at addr fff00000c78c2273 by task kunit_try_catch/194
[   17.818961] 
[   17.819063] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.819271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.819418] Hardware name: linux,dummy-virt (DT)
[   17.819487] Call trace:
[   17.819536]  show_stack+0x20/0x38 (C)
[   17.819656]  dump_stack_lvl+0x8c/0xd0
[   17.819811]  print_report+0x118/0x608
[   17.819918]  kasan_report+0xdc/0x128
[   17.820230]  __asan_report_load1_noabort+0x20/0x30
[   17.820465]  ksize_unpoisons_memory+0x628/0x740
[   17.820604]  kunit_try_run_case+0x170/0x3f0
[   17.820785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.820959]  kthread+0x328/0x630
[   17.821090]  ret_from_fork+0x10/0x20
[   17.821250] 
[   17.821313] Allocated by task 194:
[   17.821421]  kasan_save_stack+0x3c/0x68
[   17.821528]  kasan_save_track+0x20/0x40
[   17.821606]  kasan_save_alloc_info+0x40/0x58
[   17.821685]  __kasan_kmalloc+0xd4/0xd8
[   17.821760]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.821874]  ksize_unpoisons_memory+0xc0/0x740
[   17.821956]  kunit_try_run_case+0x170/0x3f0
[   17.822041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.822130]  kthread+0x328/0x630
[   17.822238]  ret_from_fork+0x10/0x20
[   17.822334] 
[   17.822375] The buggy address belongs to the object at fff00000c78c2200
[   17.822375]  which belongs to the cache kmalloc-128 of size 128
[   17.822502] The buggy address is located 0 bytes to the right of
[   17.822502]  allocated 115-byte region [fff00000c78c2200, fff00000c78c2273)
[   17.822654] 
[   17.822701] The buggy address belongs to the physical page:
[   17.822926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.823048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.823158] page_type: f5(slab)
[   17.823274] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.823453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.823547] page dumped because: kasan: bad access detected
[   17.823610] 
[   17.823643] Memory state around the buggy address:
[   17.823704]  fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.823789]  fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.823907] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.823984]                                                              ^
[   17.824069]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824151]  fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824229] ==================================================================
[   17.845519] ==================================================================
[   17.845648] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.845776] Read of size 1 at addr fff00000c78c227f by task kunit_try_catch/194
[   17.845894] 
[   17.845972] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.847419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.847591] Hardware name: linux,dummy-virt (DT)
[   17.848304] Call trace:
[   17.848404]  show_stack+0x20/0x38 (C)
[   17.849129]  dump_stack_lvl+0x8c/0xd0
[   17.849415]  print_report+0x118/0x608
[   17.849545]  kasan_report+0xdc/0x128
[   17.850293]  __asan_report_load1_noabort+0x20/0x30
[   17.850511]  ksize_unpoisons_memory+0x690/0x740
[   17.851234]  kunit_try_run_case+0x170/0x3f0
[   17.851872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.852096]  kthread+0x328/0x630
[   17.852408]  ret_from_fork+0x10/0x20
[   17.852821] 
[   17.852867] Allocated by task 194:
[   17.852938]  kasan_save_stack+0x3c/0x68
[   17.853782]  kasan_save_track+0x20/0x40
[   17.854111]  kasan_save_alloc_info+0x40/0x58
[   17.854652]  __kasan_kmalloc+0xd4/0xd8
[   17.854934]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.855179]  ksize_unpoisons_memory+0xc0/0x740
[   17.855504]  kunit_try_run_case+0x170/0x3f0
[   17.855605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.856090]  kthread+0x328/0x630
[   17.856284]  ret_from_fork+0x10/0x20
[   17.856520] 
[   17.856571] The buggy address belongs to the object at fff00000c78c2200
[   17.856571]  which belongs to the cache kmalloc-128 of size 128
[   17.856715] The buggy address is located 12 bytes to the right of
[   17.856715]  allocated 115-byte region [fff00000c78c2200, fff00000c78c2273)
[   17.857424] 
[   17.857692] The buggy address belongs to the physical page:
[   17.858060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.858593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.858712] page_type: f5(slab)
[   17.858810] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.859695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.859930] page dumped because: kasan: bad access detected
[   17.860359] 
[   17.860588] Memory state around the buggy address:
[   17.861064]  fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.861533]  fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.861640] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.861733]                                                                 ^
[   17.861828]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.861927]  fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863281] ==================================================================
[   17.825693] ==================================================================
[   17.825842] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.825994] Read of size 1 at addr fff00000c78c2278 by task kunit_try_catch/194
[   17.826150] 
[   17.826248] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.826449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.826507] Hardware name: linux,dummy-virt (DT)
[   17.826567] Call trace:
[   17.826617]  show_stack+0x20/0x38 (C)
[   17.826736]  dump_stack_lvl+0x8c/0xd0
[   17.826920]  print_report+0x118/0x608
[   17.827072]  kasan_report+0xdc/0x128
[   17.827224]  __asan_report_load1_noabort+0x20/0x30
[   17.827372]  ksize_unpoisons_memory+0x618/0x740
[   17.827485]  kunit_try_run_case+0x170/0x3f0
[   17.827587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.827736]  kthread+0x328/0x630
[   17.827830]  ret_from_fork+0x10/0x20
[   17.827934] 
[   17.827972] Allocated by task 194:
[   17.828033]  kasan_save_stack+0x3c/0x68
[   17.828115]  kasan_save_track+0x20/0x40
[   17.828188]  kasan_save_alloc_info+0x40/0x58
[   17.828283]  __kasan_kmalloc+0xd4/0xd8
[   17.828376]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.828474]  ksize_unpoisons_memory+0xc0/0x740
[   17.828568]  kunit_try_run_case+0x170/0x3f0
[   17.828651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.828742]  kthread+0x328/0x630
[   17.828810]  ret_from_fork+0x10/0x20
[   17.828897] 
[   17.828957] The buggy address belongs to the object at fff00000c78c2200
[   17.828957]  which belongs to the cache kmalloc-128 of size 128
[   17.829165] The buggy address is located 5 bytes to the right of
[   17.829165]  allocated 115-byte region [fff00000c78c2200, fff00000c78c2273)
[   17.829753] 
[   17.829817] The buggy address belongs to the physical page:
[   17.829890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.830011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.830579] page_type: f5(slab)
[   17.830697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.830899] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.831005] page dumped because: kasan: bad access detected
[   17.831061] 
[   17.831095] Memory state around the buggy address:
[   17.831156]  fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.831242]  fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.831754] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.831859]                                                                 ^
[   17.832127]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832733]  fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832848] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   17.787644] ==================================================================
[   17.787829] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.787945] Free of addr fff00000c3eeb5c0 by task kunit_try_catch/192
[   17.788039] 
[   17.788106] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.788269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.788371] Hardware name: linux,dummy-virt (DT)
[   17.788442] Call trace:
[   17.788513]  show_stack+0x20/0x38 (C)
[   17.788775]  dump_stack_lvl+0x8c/0xd0
[   17.788943]  print_report+0x118/0x608
[   17.789103]  kasan_report_invalid_free+0xc0/0xe8
[   17.789231]  check_slab_allocation+0xd4/0x108
[   17.789457]  __kasan_slab_pre_free+0x2c/0x48
[   17.790331]  kfree+0xe8/0x3c8
[   17.790515]  kfree_sensitive+0x3c/0xb0
[   17.790643]  kmalloc_double_kzfree+0x168/0x308
[   17.790763]  kunit_try_run_case+0x170/0x3f0
[   17.790892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.791024]  kthread+0x328/0x630
[   17.791136]  ret_from_fork+0x10/0x20
[   17.791257] 
[   17.791298] Allocated by task 192:
[   17.791376]  kasan_save_stack+0x3c/0x68
[   17.791469]  kasan_save_track+0x20/0x40
[   17.791550]  kasan_save_alloc_info+0x40/0x58
[   17.791643]  __kasan_kmalloc+0xd4/0xd8
[   17.791727]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.791818]  kmalloc_double_kzfree+0xb8/0x308
[   17.791906]  kunit_try_run_case+0x170/0x3f0
[   17.791989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.792087]  kthread+0x328/0x630
[   17.792159]  ret_from_fork+0x10/0x20
[   17.792242] 
[   17.792285] Freed by task 192:
[   17.792781]  kasan_save_stack+0x3c/0x68
[   17.792931]  kasan_save_track+0x20/0x40
[   17.793027]  kasan_save_free_info+0x4c/0x78
[   17.793140]  __kasan_slab_free+0x6c/0x98
[   17.793277]  kfree+0x214/0x3c8
[   17.793383]  kfree_sensitive+0x80/0xb0
[   17.793495]  kmalloc_double_kzfree+0x11c/0x308
[   17.793568]  kunit_try_run_case+0x170/0x3f0
[   17.793840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.794227]  kthread+0x328/0x630
[   17.794388]  ret_from_fork+0x10/0x20
[   17.794567] 
[   17.794624] The buggy address belongs to the object at fff00000c3eeb5c0
[   17.794624]  which belongs to the cache kmalloc-16 of size 16
[   17.795124] The buggy address is located 0 bytes inside of
[   17.795124]  16-byte region [fff00000c3eeb5c0, fff00000c3eeb5d0)
[   17.795508] 
[   17.795574] The buggy address belongs to the physical page:
[   17.795701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   17.795845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.795963] page_type: f5(slab)
[   17.796139] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.796697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.796824] page dumped because: kasan: bad access detected
[   17.796908] 
[   17.796971] Memory state around the buggy address:
[   17.797094]  fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.797226]  fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.797331] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.797437]                                            ^
[   17.797519]  fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.797632]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.797751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   17.776694] ==================================================================
[   17.777052] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   17.777218] Read of size 1 at addr fff00000c3eeb5c0 by task kunit_try_catch/192
[   17.777336] 
[   17.777791] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.778596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.778675] Hardware name: linux,dummy-virt (DT)
[   17.778749] Call trace:
[   17.778849]  show_stack+0x20/0x38 (C)
[   17.778977]  dump_stack_lvl+0x8c/0xd0
[   17.779403]  print_report+0x118/0x608
[   17.779536]  kasan_report+0xdc/0x128
[   17.779643]  __kasan_check_byte+0x54/0x70
[   17.779751]  kfree_sensitive+0x30/0xb0
[   17.779976]  kmalloc_double_kzfree+0x168/0x308
[   17.780245]  kunit_try_run_case+0x170/0x3f0
[   17.780415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.780582]  kthread+0x328/0x630
[   17.780758]  ret_from_fork+0x10/0x20
[   17.780892] 
[   17.780956] Allocated by task 192:
[   17.781018]  kasan_save_stack+0x3c/0x68
[   17.781136]  kasan_save_track+0x20/0x40
[   17.781239]  kasan_save_alloc_info+0x40/0x58
[   17.781345]  __kasan_kmalloc+0xd4/0xd8
[   17.781419]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.781505]  kmalloc_double_kzfree+0xb8/0x308
[   17.781738]  kunit_try_run_case+0x170/0x3f0
[   17.782018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.782141]  kthread+0x328/0x630
[   17.782240]  ret_from_fork+0x10/0x20
[   17.782348] 
[   17.782395] Freed by task 192:
[   17.782492]  kasan_save_stack+0x3c/0x68
[   17.782568]  kasan_save_track+0x20/0x40
[   17.782646]  kasan_save_free_info+0x4c/0x78
[   17.782727]  __kasan_slab_free+0x6c/0x98
[   17.783135]  kfree+0x214/0x3c8
[   17.783247]  kfree_sensitive+0x80/0xb0
[   17.783355]  kmalloc_double_kzfree+0x11c/0x308
[   17.783480]  kunit_try_run_case+0x170/0x3f0
[   17.783570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.783648]  kthread+0x328/0x630
[   17.783727]  ret_from_fork+0x10/0x20
[   17.783802] 
[   17.783848] The buggy address belongs to the object at fff00000c3eeb5c0
[   17.783848]  which belongs to the cache kmalloc-16 of size 16
[   17.783969] The buggy address is located 0 bytes inside of
[   17.783969]  freed 16-byte region [fff00000c3eeb5c0, fff00000c3eeb5d0)
[   17.784093] 
[   17.784299] The buggy address belongs to the physical page:
[   17.784558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   17.784720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.784854] page_type: f5(slab)
[   17.784955] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.785073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.785170] page dumped because: kasan: bad access detected
[   17.785238] 
[   17.785277] Memory state around the buggy address:
[   17.785386]  fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.785528]  fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.785670] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.785790]                                            ^
[   17.785899]  fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.786034]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.786123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   17.737228] ==================================================================
[   17.737392] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   17.737525] Read of size 1 at addr fff00000c78c47a8 by task kunit_try_catch/188
[   17.737638] 
[   17.737713] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.738236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.738303] Hardware name: linux,dummy-virt (DT)
[   17.738490] Call trace:
[   17.738554]  show_stack+0x20/0x38 (C)
[   17.738908]  dump_stack_lvl+0x8c/0xd0
[   17.739033]  print_report+0x118/0x608
[   17.739406]  kasan_report+0xdc/0x128
[   17.739682]  __asan_report_load1_noabort+0x20/0x30
[   17.739835]  kmalloc_uaf2+0x3f4/0x468
[   17.740164]  kunit_try_run_case+0x170/0x3f0
[   17.740299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.740436]  kthread+0x328/0x630
[   17.740710]  ret_from_fork+0x10/0x20
[   17.741091] 
[   17.741153] Allocated by task 188:
[   17.741362]  kasan_save_stack+0x3c/0x68
[   17.741642]  kasan_save_track+0x20/0x40
[   17.741797]  kasan_save_alloc_info+0x40/0x58
[   17.741887]  __kasan_kmalloc+0xd4/0xd8
[   17.741964]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.742049]  kmalloc_uaf2+0xc4/0x468
[   17.742125]  kunit_try_run_case+0x170/0x3f0
[   17.742209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.742301]  kthread+0x328/0x630
[   17.742385]  ret_from_fork+0x10/0x20
[   17.742464] 
[   17.742713] Freed by task 188:
[   17.742797]  kasan_save_stack+0x3c/0x68
[   17.743109]  kasan_save_track+0x20/0x40
[   17.743284]  kasan_save_free_info+0x4c/0x78
[   17.743533]  __kasan_slab_free+0x6c/0x98
[   17.743615]  kfree+0x214/0x3c8
[   17.743687]  kmalloc_uaf2+0x134/0x468
[   17.744114]  kunit_try_run_case+0x170/0x3f0
[   17.744425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.744551]  kthread+0x328/0x630
[   17.744726]  ret_from_fork+0x10/0x20
[   17.744913] 
[   17.744985] The buggy address belongs to the object at fff00000c78c4780
[   17.744985]  which belongs to the cache kmalloc-64 of size 64
[   17.745298] The buggy address is located 40 bytes inside of
[   17.745298]  freed 64-byte region [fff00000c78c4780, fff00000c78c47c0)
[   17.745644] 
[   17.745781] The buggy address belongs to the physical page:
[   17.745877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4
[   17.746537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.746692] page_type: f5(slab)
[   17.746782] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.746878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.746996] page dumped because: kasan: bad access detected
[   17.747070] 
[   17.747105] Memory state around the buggy address:
[   17.747174]  fff00000c78c4680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.747294]  fff00000c78c4700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.747435] >fff00000c78c4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.747522]                                   ^
[   17.747594]  fff00000c78c4800: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   17.747709]  fff00000c78c4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.747794] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   17.719403] ==================================================================
[   17.719586] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   17.719748] Write of size 33 at addr fff00000c78c4600 by task kunit_try_catch/186
[   17.719904] 
[   17.719987] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.720155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.720217] Hardware name: linux,dummy-virt (DT)
[   17.720283] Call trace:
[   17.720367]  show_stack+0x20/0x38 (C)
[   17.720509]  dump_stack_lvl+0x8c/0xd0
[   17.720615]  print_report+0x118/0x608
[   17.720719]  kasan_report+0xdc/0x128
[   17.720860]  kasan_check_range+0x100/0x1a8
[   17.720976]  __asan_memset+0x34/0x78
[   17.721079]  kmalloc_uaf_memset+0x170/0x310
[   17.721182]  kunit_try_run_case+0x170/0x3f0
[   17.721292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.721421]  kthread+0x328/0x630
[   17.721516]  ret_from_fork+0x10/0x20
[   17.721638] 
[   17.721677] Allocated by task 186:
[   17.721742]  kasan_save_stack+0x3c/0x68
[   17.721949]  kasan_save_track+0x20/0x40
[   17.722038]  kasan_save_alloc_info+0x40/0x58
[   17.722103]  __kasan_kmalloc+0xd4/0xd8
[   17.722156]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.722262]  kmalloc_uaf_memset+0xb8/0x310
[   17.722393]  kunit_try_run_case+0x170/0x3f0
[   17.722520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.722608]  kthread+0x328/0x630
[   17.722676]  ret_from_fork+0x10/0x20
[   17.722796] 
[   17.722835] Freed by task 186:
[   17.722897]  kasan_save_stack+0x3c/0x68
[   17.723034]  kasan_save_track+0x20/0x40
[   17.723133]  kasan_save_free_info+0x4c/0x78
[   17.723207]  __kasan_slab_free+0x6c/0x98
[   17.723293]  kfree+0x214/0x3c8
[   17.723391]  kmalloc_uaf_memset+0x11c/0x310
[   17.723502]  kunit_try_run_case+0x170/0x3f0
[   17.723622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.723738]  kthread+0x328/0x630
[   17.723805]  ret_from_fork+0x10/0x20
[   17.723885] 
[   17.723928] The buggy address belongs to the object at fff00000c78c4600
[   17.723928]  which belongs to the cache kmalloc-64 of size 64
[   17.724043] The buggy address is located 0 bytes inside of
[   17.724043]  freed 64-byte region [fff00000c78c4600, fff00000c78c4640)
[   17.724183] 
[   17.724227] The buggy address belongs to the physical page:
[   17.724335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4
[   17.724544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.724677] page_type: f5(slab)
[   17.724798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.724965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.725100] page dumped because: kasan: bad access detected
[   17.725186] 
[   17.725225] Memory state around the buggy address:
[   17.725327]  fff00000c78c4500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.725417]  fff00000c78c4580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.725510] >fff00000c78c4600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.725598]                    ^
[   17.725698]  fff00000c78c4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.725806]  fff00000c78c4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.725902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   17.692539] ==================================================================
[   17.692676] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   17.692796] Read of size 1 at addr fff00000c3eeb5a8 by task kunit_try_catch/184
[   17.692906] 
[   17.692981] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.693170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.693223] Hardware name: linux,dummy-virt (DT)
[   17.693292] Call trace:
[   17.693356]  show_stack+0x20/0x38 (C)
[   17.693479]  dump_stack_lvl+0x8c/0xd0
[   17.693626]  print_report+0x118/0x608
[   17.693880]  kasan_report+0xdc/0x128
[   17.694468]  __asan_report_load1_noabort+0x20/0x30
[   17.694844]  kmalloc_uaf+0x300/0x338
[   17.694952]  kunit_try_run_case+0x170/0x3f0
[   17.695063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.695180]  kthread+0x328/0x630
[   17.695270]  ret_from_fork+0x10/0x20
[   17.696138] 
[   17.696213] Allocated by task 184:
[   17.696306]  kasan_save_stack+0x3c/0x68
[   17.696480]  kasan_save_track+0x20/0x40
[   17.696608]  kasan_save_alloc_info+0x40/0x58
[   17.696708]  __kasan_kmalloc+0xd4/0xd8
[   17.696788]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.696891]  kmalloc_uaf+0xb8/0x338
[   17.697006]  kunit_try_run_case+0x170/0x3f0
[   17.697131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.697266]  kthread+0x328/0x630
[   17.697398]  ret_from_fork+0x10/0x20
[   17.697523] 
[   17.697568] Freed by task 184:
[   17.697634]  kasan_save_stack+0x3c/0x68
[   17.697720]  kasan_save_track+0x20/0x40
[   17.697804]  kasan_save_free_info+0x4c/0x78
[   17.697894]  __kasan_slab_free+0x6c/0x98
[   17.697974]  kfree+0x214/0x3c8
[   17.698049]  kmalloc_uaf+0x11c/0x338
[   17.698122]  kunit_try_run_case+0x170/0x3f0
[   17.698216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.698347]  kthread+0x328/0x630
[   17.698410]  ret_from_fork+0x10/0x20
[   17.698480] 
[   17.698519] The buggy address belongs to the object at fff00000c3eeb5a0
[   17.698519]  which belongs to the cache kmalloc-16 of size 16
[   17.698933] The buggy address is located 8 bytes inside of
[   17.698933]  freed 16-byte region [fff00000c3eeb5a0, fff00000c3eeb5b0)
[   17.699068] 
[   17.699115] The buggy address belongs to the physical page:
[   17.699380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   17.699498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.699626] page_type: f5(slab)
[   17.699718] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.699818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.699908] page dumped because: kasan: bad access detected
[   17.699981] 
[   17.700022] Memory state around the buggy address:
[   17.700095]  fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.700191]  fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.700283] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   17.700379]                                   ^
[   17.700474]  fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.700572]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.700928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   17.666182] ==================================================================
[   17.666335] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.666457] Read of size 64 at addr fff00000c78c4304 by task kunit_try_catch/182
[   17.666564] 
[   17.666641] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.668096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.668172] Hardware name: linux,dummy-virt (DT)
[   17.668244] Call trace:
[   17.668297]  show_stack+0x20/0x38 (C)
[   17.668809]  dump_stack_lvl+0x8c/0xd0
[   17.668923]  print_report+0x118/0x608
[   17.669093]  kasan_report+0xdc/0x128
[   17.669184]  kasan_check_range+0x100/0x1a8
[   17.669292]  __asan_memmove+0x3c/0x98
[   17.669402]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.669578]  kunit_try_run_case+0x170/0x3f0
[   17.669703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669863]  kthread+0x328/0x630
[   17.669998]  ret_from_fork+0x10/0x20
[   17.670106] 
[   17.670149] Allocated by task 182:
[   17.670256]  kasan_save_stack+0x3c/0x68
[   17.670359]  kasan_save_track+0x20/0x40
[   17.670440]  kasan_save_alloc_info+0x40/0x58
[   17.670523]  __kasan_kmalloc+0xd4/0xd8
[   17.670609]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.670700]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   17.670819]  kunit_try_run_case+0x170/0x3f0
[   17.670912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.671009]  kthread+0x328/0x630
[   17.671084]  ret_from_fork+0x10/0x20
[   17.671162] 
[   17.671203] The buggy address belongs to the object at fff00000c78c4300
[   17.671203]  which belongs to the cache kmalloc-64 of size 64
[   17.671339] The buggy address is located 4 bytes inside of
[   17.671339]  allocated 64-byte region [fff00000c78c4300, fff00000c78c4340)
[   17.671477] 
[   17.671527] The buggy address belongs to the physical page:
[   17.671625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4
[   17.671761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.671865] page_type: f5(slab)
[   17.671951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.672067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.672162] page dumped because: kasan: bad access detected
[   17.672249] 
[   17.672292] Memory state around the buggy address:
[   17.672421]  fff00000c78c4200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.672547]  fff00000c78c4280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.672628] >fff00000c78c4300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.673247]                                            ^
[   17.673440]  fff00000c78c4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674094]  fff00000c78c4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674733] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   17.640910] ==================================================================
[   17.641060] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   17.641186] Read of size 18446744073709551614 at addr fff00000c78c4084 by task kunit_try_catch/180
[   17.641460] 
[   17.641548] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.641749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.642219] Hardware name: linux,dummy-virt (DT)
[   17.642492] Call trace:
[   17.642645]  show_stack+0x20/0x38 (C)
[   17.642948]  dump_stack_lvl+0x8c/0xd0
[   17.643071]  print_report+0x118/0x608
[   17.643262]  kasan_report+0xdc/0x128
[   17.643425]  kasan_check_range+0x100/0x1a8
[   17.643531]  __asan_memmove+0x3c/0x98
[   17.643613]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.643696]  kunit_try_run_case+0x170/0x3f0
[   17.643789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.643897]  kthread+0x328/0x630
[   17.643994]  ret_from_fork+0x10/0x20
[   17.644136] 
[   17.644173] Allocated by task 180:
[   17.644229]  kasan_save_stack+0x3c/0x68
[   17.644348]  kasan_save_track+0x20/0x40
[   17.644421]  kasan_save_alloc_info+0x40/0x58
[   17.644518]  __kasan_kmalloc+0xd4/0xd8
[   17.644597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.644696]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   17.644827]  kunit_try_run_case+0x170/0x3f0
[   17.644915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.645080]  kthread+0x328/0x630
[   17.645175]  ret_from_fork+0x10/0x20
[   17.645255] 
[   17.645301] The buggy address belongs to the object at fff00000c78c4080
[   17.645301]  which belongs to the cache kmalloc-64 of size 64
[   17.645436] The buggy address is located 4 bytes inside of
[   17.645436]  64-byte region [fff00000c78c4080, fff00000c78c40c0)
[   17.645557] 
[   17.645605] The buggy address belongs to the physical page:
[   17.645675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4
[   17.645789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.645899] page_type: f5(slab)
[   17.645987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.646101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.646194] page dumped because: kasan: bad access detected
[   17.646263] 
[   17.646304] Memory state around the buggy address:
[   17.646408]  fff00000c78c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.646544]  fff00000c78c4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.646676] >fff00000c78c4080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.646818]                    ^
[   17.646871]  fff00000c78c4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.646960]  fff00000c78c4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.647082] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   17.621670] ==================================================================
[   17.621803] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   17.621925] Write of size 16 at addr fff00000c78c2169 by task kunit_try_catch/178
[   17.622035] 
[   17.622114] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.622302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.623080] Hardware name: linux,dummy-virt (DT)
[   17.623215] Call trace:
[   17.623266]  show_stack+0x20/0x38 (C)
[   17.623402]  dump_stack_lvl+0x8c/0xd0
[   17.623513]  print_report+0x118/0x608
[   17.623599]  kasan_report+0xdc/0x128
[   17.623678]  kasan_check_range+0x100/0x1a8
[   17.623768]  __asan_memset+0x34/0x78
[   17.623939]  kmalloc_oob_memset_16+0x150/0x2f8
[   17.624178]  kunit_try_run_case+0x170/0x3f0
[   17.624374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.624967]  kthread+0x328/0x630
[   17.625371]  ret_from_fork+0x10/0x20
[   17.625597] 
[   17.625666] Allocated by task 178:
[   17.625831]  kasan_save_stack+0x3c/0x68
[   17.625963]  kasan_save_track+0x20/0x40
[   17.626159]  kasan_save_alloc_info+0x40/0x58
[   17.626242]  __kasan_kmalloc+0xd4/0xd8
[   17.626484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.626716]  kmalloc_oob_memset_16+0xb0/0x2f8
[   17.626964]  kunit_try_run_case+0x170/0x3f0
[   17.627084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.627174]  kthread+0x328/0x630
[   17.627394]  ret_from_fork+0x10/0x20
[   17.627484] 
[   17.627728] The buggy address belongs to the object at fff00000c78c2100
[   17.627728]  which belongs to the cache kmalloc-128 of size 128
[   17.627861] The buggy address is located 105 bytes inside of
[   17.627861]  allocated 120-byte region [fff00000c78c2100, fff00000c78c2178)
[   17.627981] 
[   17.628022] The buggy address belongs to the physical page:
[   17.628081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.628233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.628376] page_type: f5(slab)
[   17.628630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.628977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.629070] page dumped because: kasan: bad access detected
[   17.629197] 
[   17.629370] Memory state around the buggy address:
[   17.629436]  fff00000c78c2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.629524]  fff00000c78c2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.629781] >fff00000c78c2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.630003]                                                                 ^
[   17.630216]  fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630347]  fff00000c78c2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   17.536990] ==================================================================
[   17.537133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   17.537259] Write of size 4 at addr fff00000c78c2075 by task kunit_try_catch/174
[   17.537380] 
[   17.537463] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.537649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.537704] Hardware name: linux,dummy-virt (DT)
[   17.537767] Call trace:
[   17.537817]  show_stack+0x20/0x38 (C)
[   17.537927]  dump_stack_lvl+0x8c/0xd0
[   17.538566]  print_report+0x118/0x608
[   17.538788]  kasan_report+0xdc/0x128
[   17.538899]  kasan_check_range+0x100/0x1a8
[   17.539658]  __asan_memset+0x34/0x78
[   17.539863]  kmalloc_oob_memset_4+0x150/0x300
[   17.540082]  kunit_try_run_case+0x170/0x3f0
[   17.540687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.540917]  kthread+0x328/0x630
[   17.541086]  ret_from_fork+0x10/0x20
[   17.541244] 
[   17.541313] Allocated by task 174:
[   17.541389]  kasan_save_stack+0x3c/0x68
[   17.541940]  kasan_save_track+0x20/0x40
[   17.542141]  kasan_save_alloc_info+0x40/0x58
[   17.542232]  __kasan_kmalloc+0xd4/0xd8
[   17.542542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.543035]  kmalloc_oob_memset_4+0xb0/0x300
[   17.543410]  kunit_try_run_case+0x170/0x3f0
[   17.543488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.543574]  kthread+0x328/0x630
[   17.544218]  ret_from_fork+0x10/0x20
[   17.544316] 
[   17.544373] The buggy address belongs to the object at fff00000c78c2000
[   17.544373]  which belongs to the cache kmalloc-128 of size 128
[   17.544500] The buggy address is located 117 bytes inside of
[   17.544500]  allocated 120-byte region [fff00000c78c2000, fff00000c78c2078)
[   17.544642] 
[   17.544689] The buggy address belongs to the physical page:
[   17.544762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.544877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.544990] page_type: f5(slab)
[   17.545082] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.545188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.545277] page dumped because: kasan: bad access detected
[   17.545358] 
[   17.546597] Memory state around the buggy address:
[   17.547086]  fff00000c78c1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.547186]  fff00000c78c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.547261] >fff00000c78c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.547347]                                                                 ^
[   17.548242]  fff00000c78c2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.548624]  fff00000c78c2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.549033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   17.508494] ==================================================================
[   17.508642] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   17.509032] Write of size 2 at addr fff00000c3ef0f77 by task kunit_try_catch/172
[   17.509151] 
[   17.509238] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.509457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.509516] Hardware name: linux,dummy-virt (DT)
[   17.509580] Call trace:
[   17.510812]  show_stack+0x20/0x38 (C)
[   17.510965]  dump_stack_lvl+0x8c/0xd0
[   17.511065]  print_report+0x118/0x608
[   17.511126]  kasan_report+0xdc/0x128
[   17.511217]  kasan_check_range+0x100/0x1a8
[   17.511377]  __asan_memset+0x34/0x78
[   17.511493]  kmalloc_oob_memset_2+0x150/0x2f8
[   17.511597]  kunit_try_run_case+0x170/0x3f0
[   17.511693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.512326]  kthread+0x328/0x630
[   17.512481]  ret_from_fork+0x10/0x20
[   17.512605] 
[   17.512650] Allocated by task 172:
[   17.512715]  kasan_save_stack+0x3c/0x68
[   17.512807]  kasan_save_track+0x20/0x40
[   17.512888]  kasan_save_alloc_info+0x40/0x58
[   17.512975]  __kasan_kmalloc+0xd4/0xd8
[   17.513434]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.513642]  kmalloc_oob_memset_2+0xb0/0x2f8
[   17.514205]  kunit_try_run_case+0x170/0x3f0
[   17.514419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.514618]  kthread+0x328/0x630
[   17.514686]  ret_from_fork+0x10/0x20
[   17.514841] 
[   17.514886] The buggy address belongs to the object at fff00000c3ef0f00
[   17.514886]  which belongs to the cache kmalloc-128 of size 128
[   17.515062] The buggy address is located 119 bytes inside of
[   17.515062]  allocated 120-byte region [fff00000c3ef0f00, fff00000c3ef0f78)
[   17.515352] 
[   17.515478] The buggy address belongs to the physical page:
[   17.515558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   17.515660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.515760] page_type: f5(slab)
[   17.516199] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.516313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.516569] page dumped because: kasan: bad access detected
[   17.516778] 
[   17.516847] Memory state around the buggy address:
[   17.517081]  fff00000c3ef0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.517296]  fff00000c3ef0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.517415] >fff00000c3ef0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.517501]                                                                 ^
[   17.517594]  fff00000c3ef0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.517911]  fff00000c3ef1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.518062] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   17.464995] ==================================================================
[   17.465828] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   17.466292] Write of size 128 at addr fff00000c3ef0e00 by task kunit_try_catch/170
[   17.466711] 
[   17.466892] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.467058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.467111] Hardware name: linux,dummy-virt (DT)
[   17.467176] Call trace:
[   17.467230]  show_stack+0x20/0x38 (C)
[   17.468287]  dump_stack_lvl+0x8c/0xd0
[   17.469367]  print_report+0x118/0x608
[   17.469611]  kasan_report+0xdc/0x128
[   17.470085]  kasan_check_range+0x100/0x1a8
[   17.470307]  __asan_memset+0x34/0x78
[   17.470866]  kmalloc_oob_in_memset+0x144/0x2d0
[   17.471073]  kunit_try_run_case+0x170/0x3f0
[   17.471171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.471273]  kthread+0x328/0x630
[   17.471375]  ret_from_fork+0x10/0x20
[   17.471492] 
[   17.471537] Allocated by task 170:
[   17.471603]  kasan_save_stack+0x3c/0x68
[   17.471697]  kasan_save_track+0x20/0x40
[   17.471780]  kasan_save_alloc_info+0x40/0x58
[   17.473161]  __kasan_kmalloc+0xd4/0xd8
[   17.473706]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.474161]  kmalloc_oob_in_memset+0xb0/0x2d0
[   17.474601]  kunit_try_run_case+0x170/0x3f0
[   17.474902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.475251]  kthread+0x328/0x630
[   17.475330]  ret_from_fork+0x10/0x20
[   17.475631] 
[   17.476096] The buggy address belongs to the object at fff00000c3ef0e00
[   17.476096]  which belongs to the cache kmalloc-128 of size 128
[   17.476426] The buggy address is located 0 bytes inside of
[   17.476426]  allocated 120-byte region [fff00000c3ef0e00, fff00000c3ef0e78)
[   17.476632] 
[   17.476681] The buggy address belongs to the physical page:
[   17.476755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   17.476872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.476984] page_type: f5(slab)
[   17.477071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.477183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.477276] page dumped because: kasan: bad access detected
[   17.477356] 
[   17.478822] Memory state around the buggy address:
[   17.479023]  fff00000c3ef0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.479218]  fff00000c3ef0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.479335] >fff00000c3ef0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.479405]                                                                 ^
[   17.480054]  fff00000c3ef0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.480246]  fff00000c3ef0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.480478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   17.418514] ==================================================================
[   17.418736] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   17.418905] Read of size 16 at addr fff00000c3eeb580 by task kunit_try_catch/168
[   17.419133] 
[   17.419209] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.419451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.419519] Hardware name: linux,dummy-virt (DT)
[   17.419595] Call trace:
[   17.419643]  show_stack+0x20/0x38 (C)
[   17.419746]  dump_stack_lvl+0x8c/0xd0
[   17.419868]  print_report+0x118/0x608
[   17.419972]  kasan_report+0xdc/0x128
[   17.420065]  __asan_report_load16_noabort+0x20/0x30
[   17.420213]  kmalloc_uaf_16+0x3bc/0x438
[   17.420312]  kunit_try_run_case+0x170/0x3f0
[   17.420502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.420648]  kthread+0x328/0x630
[   17.420762]  ret_from_fork+0x10/0x20
[   17.420877] 
[   17.420918] Allocated by task 168:
[   17.420982]  kasan_save_stack+0x3c/0x68
[   17.421066]  kasan_save_track+0x20/0x40
[   17.421150]  kasan_save_alloc_info+0x40/0x58
[   17.421250]  __kasan_kmalloc+0xd4/0xd8
[   17.421371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.421461]  kmalloc_uaf_16+0x140/0x438
[   17.421537]  kunit_try_run_case+0x170/0x3f0
[   17.421616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.421711]  kthread+0x328/0x630
[   17.421783]  ret_from_fork+0x10/0x20
[   17.421858] 
[   17.421898] Freed by task 168:
[   17.421955]  kasan_save_stack+0x3c/0x68
[   17.422036]  kasan_save_track+0x20/0x40
[   17.422113]  kasan_save_free_info+0x4c/0x78
[   17.422197]  __kasan_slab_free+0x6c/0x98
[   17.422278]  kfree+0x214/0x3c8
[   17.422356]  kmalloc_uaf_16+0x190/0x438
[   17.422429]  kunit_try_run_case+0x170/0x3f0
[   17.422666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.422774]  kthread+0x328/0x630
[   17.422848]  ret_from_fork+0x10/0x20
[   17.422928] 
[   17.422971] The buggy address belongs to the object at fff00000c3eeb580
[   17.422971]  which belongs to the cache kmalloc-16 of size 16
[   17.423164] The buggy address is located 0 bytes inside of
[   17.423164]  freed 16-byte region [fff00000c3eeb580, fff00000c3eeb590)
[   17.423299] 
[   17.423354] The buggy address belongs to the physical page:
[   17.423418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   17.423594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.423771] page_type: f5(slab)
[   17.424348] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.424576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.424789] page dumped because: kasan: bad access detected
[   17.424873] 
[   17.425133] Memory state around the buggy address:
[   17.425215]  fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.425439]  fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   17.425746] >fff00000c3eeb580: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.425919]                    ^
[   17.426022]  fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.426296]  fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.426465] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   17.398158] ==================================================================
[   17.398330] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   17.398463] Write of size 16 at addr fff00000c3eeb520 by task kunit_try_catch/166
[   17.398574] 
[   17.398652] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.399219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.399368] Hardware name: linux,dummy-virt (DT)
[   17.399684] Call trace:
[   17.399740]  show_stack+0x20/0x38 (C)
[   17.399847]  dump_stack_lvl+0x8c/0xd0
[   17.399973]  print_report+0x118/0x608
[   17.400291]  kasan_report+0xdc/0x128
[   17.400430]  __asan_report_store16_noabort+0x20/0x30
[   17.400586]  kmalloc_oob_16+0x3a0/0x3f8
[   17.400712]  kunit_try_run_case+0x170/0x3f0
[   17.400820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.400926]  kthread+0x328/0x630
[   17.401287]  ret_from_fork+0x10/0x20
[   17.401455] 
[   17.401507] Allocated by task 166:
[   17.401564]  kasan_save_stack+0x3c/0x68
[   17.401667]  kasan_save_track+0x20/0x40
[   17.401776]  kasan_save_alloc_info+0x40/0x58
[   17.401890]  __kasan_kmalloc+0xd4/0xd8
[   17.401987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.402104]  kmalloc_oob_16+0xb4/0x3f8
[   17.402182]  kunit_try_run_case+0x170/0x3f0
[   17.402266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.402361]  kthread+0x328/0x630
[   17.402420]  ret_from_fork+0x10/0x20
[   17.402490] 
[   17.402951] The buggy address belongs to the object at fff00000c3eeb520
[   17.402951]  which belongs to the cache kmalloc-16 of size 16
[   17.403127] The buggy address is located 0 bytes inside of
[   17.403127]  allocated 13-byte region [fff00000c3eeb520, fff00000c3eeb52d)
[   17.403251] 
[   17.403515] The buggy address belongs to the physical page:
[   17.403616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb
[   17.403766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.403957] page_type: f5(slab)
[   17.404105] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.404221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.404654] page dumped because: kasan: bad access detected
[   17.404753] 
[   17.404794] Memory state around the buggy address:
[   17.404906]  fff00000c3eeb400: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.405073]  fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.405225] >fff00000c3eeb500: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   17.405309]                                   ^
[   17.405650]  fff00000c3eeb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.405810]  fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.406013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   17.352639] ==================================================================
[   17.352756] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.352871] Read of size 1 at addr fff00000c6323200 by task kunit_try_catch/164
[   17.352979] 
[   17.353055] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.353646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.353736] Hardware name: linux,dummy-virt (DT)
[   17.353895] Call trace:
[   17.353943]  show_stack+0x20/0x38 (C)
[   17.354795]  dump_stack_lvl+0x8c/0xd0
[   17.355424]  print_report+0x118/0x608
[   17.355830]  kasan_report+0xdc/0x128
[   17.356212]  __asan_report_load1_noabort+0x20/0x30
[   17.356438]  krealloc_uaf+0x4c8/0x520
[   17.357186]  kunit_try_run_case+0x170/0x3f0
[   17.358025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.358181]  kthread+0x328/0x630
[   17.358585]  ret_from_fork+0x10/0x20
[   17.358907] 
[   17.358950] Allocated by task 164:
[   17.359211]  kasan_save_stack+0x3c/0x68
[   17.359609]  kasan_save_track+0x20/0x40
[   17.359691]  kasan_save_alloc_info+0x40/0x58
[   17.360214]  __kasan_kmalloc+0xd4/0xd8
[   17.360763]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.361004]  krealloc_uaf+0xc8/0x520
[   17.361352]  kunit_try_run_case+0x170/0x3f0
[   17.361529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.361845]  kthread+0x328/0x630
[   17.361918]  ret_from_fork+0x10/0x20
[   17.362500] 
[   17.362698] Freed by task 164:
[   17.363026]  kasan_save_stack+0x3c/0x68
[   17.363114]  kasan_save_track+0x20/0x40
[   17.363184]  kasan_save_free_info+0x4c/0x78
[   17.363260]  __kasan_slab_free+0x6c/0x98
[   17.363828]  kfree+0x214/0x3c8
[   17.364404]  krealloc_uaf+0x12c/0x520
[   17.364603]  kunit_try_run_case+0x170/0x3f0
[   17.364971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.365254]  kthread+0x328/0x630
[   17.365409]  ret_from_fork+0x10/0x20
[   17.365491] 
[   17.365539] The buggy address belongs to the object at fff00000c6323200
[   17.365539]  which belongs to the cache kmalloc-256 of size 256
[   17.365667] The buggy address is located 0 bytes inside of
[   17.365667]  freed 256-byte region [fff00000c6323200, fff00000c6323300)
[   17.365801] 
[   17.365846] The buggy address belongs to the physical page:
[   17.366451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.367073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.367673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.367957] page_type: f5(slab)
[   17.368584] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.368943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.369062] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.369174] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.369284] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.369406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.369499] page dumped because: kasan: bad access detected
[   17.369565] 
[   17.369604] Memory state around the buggy address:
[   17.370272]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.371120]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.371624] >fff00000c6323200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.371708]                    ^
[   17.371764]  fff00000c6323280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.371836]  fff00000c6323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.371914] ==================================================================
[   17.325676] ==================================================================
[   17.325864] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.326678] Read of size 1 at addr fff00000c6323200 by task kunit_try_catch/164
[   17.327945] 
[   17.328036] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.328781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.328879] Hardware name: linux,dummy-virt (DT)
[   17.329081] Call trace:
[   17.329135]  show_stack+0x20/0x38 (C)
[   17.329489]  dump_stack_lvl+0x8c/0xd0
[   17.329842]  print_report+0x118/0x608
[   17.329951]  kasan_report+0xdc/0x128
[   17.330261]  __kasan_check_byte+0x54/0x70
[   17.330480]  krealloc_noprof+0x44/0x360
[   17.330698]  krealloc_uaf+0x180/0x520
[   17.330849]  kunit_try_run_case+0x170/0x3f0
[   17.331106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.331237]  kthread+0x328/0x630
[   17.332073]  ret_from_fork+0x10/0x20
[   17.332194] 
[   17.332235] Allocated by task 164:
[   17.332785]  kasan_save_stack+0x3c/0x68
[   17.332959]  kasan_save_track+0x20/0x40
[   17.333215]  kasan_save_alloc_info+0x40/0x58
[   17.333794]  __kasan_kmalloc+0xd4/0xd8
[   17.333985]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.334316]  krealloc_uaf+0xc8/0x520
[   17.334633]  kunit_try_run_case+0x170/0x3f0
[   17.334836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.335145]  kthread+0x328/0x630
[   17.335516]  ret_from_fork+0x10/0x20
[   17.335595] 
[   17.335976] Freed by task 164:
[   17.336210]  kasan_save_stack+0x3c/0x68
[   17.336330]  kasan_save_track+0x20/0x40
[   17.336413]  kasan_save_free_info+0x4c/0x78
[   17.336504]  __kasan_slab_free+0x6c/0x98
[   17.336589]  kfree+0x214/0x3c8
[   17.337090]  krealloc_uaf+0x12c/0x520
[   17.337381]  kunit_try_run_case+0x170/0x3f0
[   17.337896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.338171]  kthread+0x328/0x630
[   17.338276]  ret_from_fork+0x10/0x20
[   17.338386] 
[   17.338795] The buggy address belongs to the object at fff00000c6323200
[   17.338795]  which belongs to the cache kmalloc-256 of size 256
[   17.339425] The buggy address is located 0 bytes inside of
[   17.339425]  freed 256-byte region [fff00000c6323200, fff00000c6323300)
[   17.340046] 
[   17.340333] The buggy address belongs to the physical page:
[   17.340589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.341017] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.341190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.341636] page_type: f5(slab)
[   17.342081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.342490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.342773] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.343466] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.343591] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.343699] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.343774] page dumped because: kasan: bad access detected
[   17.343830] 
[   17.344567] Memory state around the buggy address:
[   17.344773]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345020]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345653] >fff00000c6323200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.346338]                    ^
[   17.346422]  fff00000c6323280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.346522]  fff00000c6323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.347185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   17.208064] ==================================================================
[   17.208200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.208306] Write of size 1 at addr fff00000c63230eb by task kunit_try_catch/158
[   17.208436] 
[   17.208527] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.208729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.208790] Hardware name: linux,dummy-virt (DT)
[   17.208855] Call trace:
[   17.208899]  show_stack+0x20/0x38 (C)
[   17.209014]  dump_stack_lvl+0x8c/0xd0
[   17.209126]  print_report+0x118/0x608
[   17.209231]  kasan_report+0xdc/0x128
[   17.209354]  __asan_report_store1_noabort+0x20/0x30
[   17.209465]  krealloc_less_oob_helper+0xa58/0xc50
[   17.210030]  krealloc_less_oob+0x20/0x38
[   17.210193]  kunit_try_run_case+0x170/0x3f0
[   17.210359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.210524]  kthread+0x328/0x630
[   17.210651]  ret_from_fork+0x10/0x20
[   17.210824] 
[   17.210865] Allocated by task 158:
[   17.211218]  kasan_save_stack+0x3c/0x68
[   17.211635]  kasan_save_track+0x20/0x40
[   17.211714]  kasan_save_alloc_info+0x40/0x58
[   17.211794]  __kasan_krealloc+0x118/0x178
[   17.212108]  krealloc_noprof+0x128/0x360
[   17.212196]  krealloc_less_oob_helper+0x168/0xc50
[   17.212333]  krealloc_less_oob+0x20/0x38
[   17.212469]  kunit_try_run_case+0x170/0x3f0
[   17.212600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.212738]  kthread+0x328/0x630
[   17.212826]  ret_from_fork+0x10/0x20
[   17.212940] 
[   17.213003] The buggy address belongs to the object at fff00000c6323000
[   17.213003]  which belongs to the cache kmalloc-256 of size 256
[   17.213150] The buggy address is located 34 bytes to the right of
[   17.213150]  allocated 201-byte region [fff00000c6323000, fff00000c63230c9)
[   17.213303] 
[   17.213354] The buggy address belongs to the physical page:
[   17.213423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.213607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.213702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.214035] page_type: f5(slab)
[   17.214117] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.214221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.214605] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.214798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.214880] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.214932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.215002] page dumped because: kasan: bad access detected
[   17.215037] 
[   17.215057] Memory state around the buggy address:
[   17.215097]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.215159]  fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.215214] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.215253]                                                           ^
[   17.215295]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.215362]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.215403] ==================================================================
[   17.256756] ==================================================================
[   17.256882] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.257001] Write of size 1 at addr fff00000c65b60c9 by task kunit_try_catch/162
[   17.257096] 
[   17.257172] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.257372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.257434] Hardware name: linux,dummy-virt (DT)
[   17.257503] Call trace:
[   17.257560]  show_stack+0x20/0x38 (C)
[   17.257685]  dump_stack_lvl+0x8c/0xd0
[   17.257830]  print_report+0x118/0x608
[   17.257964]  kasan_report+0xdc/0x128
[   17.258125]  __asan_report_store1_noabort+0x20/0x30
[   17.258285]  krealloc_less_oob_helper+0xa48/0xc50
[   17.258448]  krealloc_large_less_oob+0x20/0x38
[   17.258578]  kunit_try_run_case+0x170/0x3f0
[   17.258674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.258812]  kthread+0x328/0x630
[   17.258899]  ret_from_fork+0x10/0x20
[   17.259001] 
[   17.259044] The buggy address belongs to the physical page:
[   17.259130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.259307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.259427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.259550] page_type: f8(unknown)
[   17.259640] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.259755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.259889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.259988] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.260077] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.260197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.260282] page dumped because: kasan: bad access detected
[   17.260360] 
[   17.260397] Memory state around the buggy address:
[   17.260467]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.260569]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.260658] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.260738]                                               ^
[   17.260848]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.260982]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.261106] ==================================================================
[   17.183676] ==================================================================
[   17.183798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.183959] Write of size 1 at addr fff00000c63230da by task kunit_try_catch/158
[   17.184084] 
[   17.184159] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.184366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.184434] Hardware name: linux,dummy-virt (DT)
[   17.184522] Call trace:
[   17.184976]  show_stack+0x20/0x38 (C)
[   17.185481]  dump_stack_lvl+0x8c/0xd0
[   17.185596]  print_report+0x118/0x608
[   17.185702]  kasan_report+0xdc/0x128
[   17.185803]  __asan_report_store1_noabort+0x20/0x30
[   17.185916]  krealloc_less_oob_helper+0xa80/0xc50
[   17.186022]  krealloc_less_oob+0x20/0x38
[   17.186125]  kunit_try_run_case+0x170/0x3f0
[   17.186230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.186354]  kthread+0x328/0x630
[   17.186449]  ret_from_fork+0x10/0x20
[   17.186555] 
[   17.186597] Allocated by task 158:
[   17.186659]  kasan_save_stack+0x3c/0x68
[   17.186746]  kasan_save_track+0x20/0x40
[   17.186841]  kasan_save_alloc_info+0x40/0x58
[   17.186927]  __kasan_krealloc+0x118/0x178
[   17.187008]  krealloc_noprof+0x128/0x360
[   17.187090]  krealloc_less_oob_helper+0x168/0xc50
[   17.187175]  krealloc_less_oob+0x20/0x38
[   17.187252]  kunit_try_run_case+0x170/0x3f0
[   17.188016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.188794]  kthread+0x328/0x630
[   17.188894]  ret_from_fork+0x10/0x20
[   17.188969] 
[   17.189016] The buggy address belongs to the object at fff00000c6323000
[   17.189016]  which belongs to the cache kmalloc-256 of size 256
[   17.189145] The buggy address is located 17 bytes to the right of
[   17.189145]  allocated 201-byte region [fff00000c6323000, fff00000c63230c9)
[   17.189295] 
[   17.189356] The buggy address belongs to the physical page:
[   17.189393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.189450] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.189496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.189555] page_type: f5(slab)
[   17.189599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.189650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.189699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.189746] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.189793] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.189840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.189878] page dumped because: kasan: bad access detected
[   17.189909] 
[   17.189927] Memory state around the buggy address:
[   17.189958]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189999]  fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.190039] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.190076]                                                     ^
[   17.190112]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.190152]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.190188] ==================================================================
[   17.157766] ==================================================================
[   17.157914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.158041] Write of size 1 at addr fff00000c63230c9 by task kunit_try_catch/158
[   17.158147] 
[   17.158226] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.158566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.158820] Hardware name: linux,dummy-virt (DT)
[   17.158903] Call trace:
[   17.158960]  show_stack+0x20/0x38 (C)
[   17.159172]  dump_stack_lvl+0x8c/0xd0
[   17.159506]  print_report+0x118/0x608
[   17.159661]  kasan_report+0xdc/0x128
[   17.159757]  __asan_report_store1_noabort+0x20/0x30
[   17.160057]  krealloc_less_oob_helper+0xa48/0xc50
[   17.160229]  krealloc_less_oob+0x20/0x38
[   17.160387]  kunit_try_run_case+0x170/0x3f0
[   17.160686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.160950]  kthread+0x328/0x630
[   17.161069]  ret_from_fork+0x10/0x20
[   17.161438] 
[   17.161694] Allocated by task 158:
[   17.161979]  kasan_save_stack+0x3c/0x68
[   17.162397]  kasan_save_track+0x20/0x40
[   17.162626]  kasan_save_alloc_info+0x40/0x58
[   17.162926]  __kasan_krealloc+0x118/0x178
[   17.163299]  krealloc_noprof+0x128/0x360
[   17.163398]  krealloc_less_oob_helper+0x168/0xc50
[   17.163949]  krealloc_less_oob+0x20/0x38
[   17.164114]  kunit_try_run_case+0x170/0x3f0
[   17.164429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.164595]  kthread+0x328/0x630
[   17.164702]  ret_from_fork+0x10/0x20
[   17.164826] 
[   17.164901] The buggy address belongs to the object at fff00000c6323000
[   17.164901]  which belongs to the cache kmalloc-256 of size 256
[   17.165042] The buggy address is located 0 bytes to the right of
[   17.165042]  allocated 201-byte region [fff00000c6323000, fff00000c63230c9)
[   17.165196] 
[   17.165261] The buggy address belongs to the physical page:
[   17.165377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.165532] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.165639] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.165812] page_type: f5(slab)
[   17.165933] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.166082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.166219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.166359] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.166448] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.166719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.166812] page dumped because: kasan: bad access detected
[   17.167125] 
[   17.167171] Memory state around the buggy address:
[   17.167279]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.167513]  fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.167618] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.167738]                                               ^
[   17.167906]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.168017]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.168128] ==================================================================
[   17.293239] ==================================================================
[   17.293376] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.293486] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/162
[   17.293598] 
[   17.293667] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.293859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.294610] Hardware name: linux,dummy-virt (DT)
[   17.295346] Call trace:
[   17.295710]  show_stack+0x20/0x38 (C)
[   17.296199]  dump_stack_lvl+0x8c/0xd0
[   17.296526]  print_report+0x118/0x608
[   17.297082]  kasan_report+0xdc/0x128
[   17.297339]  __asan_report_store1_noabort+0x20/0x30
[   17.297485]  krealloc_less_oob_helper+0xa58/0xc50
[   17.297604]  krealloc_large_less_oob+0x20/0x38
[   17.297745]  kunit_try_run_case+0x170/0x3f0
[   17.297899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.298040]  kthread+0x328/0x630
[   17.298567]  ret_from_fork+0x10/0x20
[   17.298761] 
[   17.298809] The buggy address belongs to the physical page:
[   17.298936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.299209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.299496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.299623] page_type: f8(unknown)
[   17.299780] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.300248] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.300737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.301156] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.301333] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.301790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.301955] page dumped because: kasan: bad access detected
[   17.302031] 
[   17.302069] Memory state around the buggy address:
[   17.302137]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.302235]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.302516] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.303131]                                                           ^
[   17.303273]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.303383]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.303835] ==================================================================
[   17.262076] ==================================================================
[   17.262171] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.262274] Write of size 1 at addr fff00000c65b60d0 by task kunit_try_catch/162
[   17.262380] 
[   17.262445] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.262634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.262724] Hardware name: linux,dummy-virt (DT)
[   17.262824] Call trace:
[   17.262894]  show_stack+0x20/0x38 (C)
[   17.262963]  dump_stack_lvl+0x8c/0xd0
[   17.263159]  print_report+0x118/0x608
[   17.263291]  kasan_report+0xdc/0x128
[   17.263492]  __asan_report_store1_noabort+0x20/0x30
[   17.264102]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.264257]  krealloc_large_less_oob+0x20/0x38
[   17.264371]  kunit_try_run_case+0x170/0x3f0
[   17.264487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.264759]  kthread+0x328/0x630
[   17.264969]  ret_from_fork+0x10/0x20
[   17.265207] 
[   17.265348] The buggy address belongs to the physical page:
[   17.265427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.265566] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.265675] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.265807] page_type: f8(unknown)
[   17.265900] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.266408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.266807] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.266953] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.267148] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.267378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.267564] page dumped because: kasan: bad access detected
[   17.267709] 
[   17.267754] Memory state around the buggy address:
[   17.267822]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.268382]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.268530] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.268729]                                                  ^
[   17.268823]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.268928]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.269016] ==================================================================
[   17.282645] ==================================================================
[   17.282992] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.283458] Write of size 1 at addr fff00000c65b60ea by task kunit_try_catch/162
[   17.283589] 
[   17.283834] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.284105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.284288] Hardware name: linux,dummy-virt (DT)
[   17.284373] Call trace:
[   17.284663]  show_stack+0x20/0x38 (C)
[   17.285197]  dump_stack_lvl+0x8c/0xd0
[   17.285522]  print_report+0x118/0x608
[   17.285635]  kasan_report+0xdc/0x128
[   17.286114]  __asan_report_store1_noabort+0x20/0x30
[   17.286496]  krealloc_less_oob_helper+0xae4/0xc50
[   17.286687]  krealloc_large_less_oob+0x20/0x38
[   17.286818]  kunit_try_run_case+0x170/0x3f0
[   17.286917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.287482]  kthread+0x328/0x630
[   17.287656]  ret_from_fork+0x10/0x20
[   17.287833] 
[   17.287883] The buggy address belongs to the physical page:
[   17.287959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.288078] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.288185] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.288573] page_type: f8(unknown)
[   17.288743] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.289254] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.289555] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.289663] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.289774] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.289880] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.289979] page dumped because: kasan: bad access detected
[   17.290047] 
[   17.290086] Memory state around the buggy address:
[   17.290154]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.290249]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.290357] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.290444]                                                           ^
[   17.290530]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.290628]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.290730] ==================================================================
[   17.270038] ==================================================================
[   17.270198] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.270555] Write of size 1 at addr fff00000c65b60da by task kunit_try_catch/162
[   17.270858] 
[   17.270933] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.271134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.271199] Hardware name: linux,dummy-virt (DT)
[   17.271275] Call trace:
[   17.271607]  show_stack+0x20/0x38 (C)
[   17.271906]  dump_stack_lvl+0x8c/0xd0
[   17.272030]  print_report+0x118/0x608
[   17.272927]  kasan_report+0xdc/0x128
[   17.273542]  __asan_report_store1_noabort+0x20/0x30
[   17.273998]  krealloc_less_oob_helper+0xa80/0xc50
[   17.274119]  krealloc_large_less_oob+0x20/0x38
[   17.275083]  kunit_try_run_case+0x170/0x3f0
[   17.275525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.275657]  kthread+0x328/0x630
[   17.276013]  ret_from_fork+0x10/0x20
[   17.276192] 
[   17.276241] The buggy address belongs to the physical page:
[   17.276369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.276692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.277103] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.277278] page_type: f8(unknown)
[   17.277552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.277666] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.277954] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.278374] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.278855] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.279157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.279313] page dumped because: kasan: bad access detected
[   17.279406] 
[   17.279503] Memory state around the buggy address:
[   17.279584]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.279731]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.279846] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.279919]                                                     ^
[   17.280181]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.280314]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.280744] ==================================================================
[   17.192726] ==================================================================
[   17.192843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.192954] Write of size 1 at addr fff00000c63230ea by task kunit_try_catch/158
[   17.193070] 
[   17.193146] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.193347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.193415] Hardware name: linux,dummy-virt (DT)
[   17.193487] Call trace:
[   17.193536]  show_stack+0x20/0x38 (C)
[   17.193651]  dump_stack_lvl+0x8c/0xd0
[   17.193762]  print_report+0x118/0x608
[   17.193870]  kasan_report+0xdc/0x128
[   17.193976]  __asan_report_store1_noabort+0x20/0x30
[   17.194096]  krealloc_less_oob_helper+0xae4/0xc50
[   17.195843]  krealloc_less_oob+0x20/0x38
[   17.196912]  kunit_try_run_case+0x170/0x3f0
[   17.197446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.198126]  kthread+0x328/0x630
[   17.198650]  ret_from_fork+0x10/0x20
[   17.199310] 
[   17.199365] Allocated by task 158:
[   17.199427]  kasan_save_stack+0x3c/0x68
[   17.199512]  kasan_save_track+0x20/0x40
[   17.199578]  kasan_save_alloc_info+0x40/0x58
[   17.199642]  __kasan_krealloc+0x118/0x178
[   17.199730]  krealloc_noprof+0x128/0x360
[   17.199806]  krealloc_less_oob_helper+0x168/0xc50
[   17.199990]  krealloc_less_oob+0x20/0x38
[   17.200236]  kunit_try_run_case+0x170/0x3f0
[   17.200809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.200922]  kthread+0x328/0x630
[   17.201181]  ret_from_fork+0x10/0x20
[   17.201727] 
[   17.201789] The buggy address belongs to the object at fff00000c6323000
[   17.201789]  which belongs to the cache kmalloc-256 of size 256
[   17.201928] The buggy address is located 33 bytes to the right of
[   17.201928]  allocated 201-byte region [fff00000c6323000, fff00000c63230c9)
[   17.202065] 
[   17.202109] The buggy address belongs to the physical page:
[   17.202182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.202297] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.202406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.203789] page_type: f5(slab)
[   17.203949] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.204104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.204270] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.204395] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.204523] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.204638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.204723] page dumped because: kasan: bad access detected
[   17.204791] 
[   17.204831] Memory state around the buggy address:
[   17.204901]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.204998]  fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.205132] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.205218]                                                           ^
[   17.205325]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.205406]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.205485] ==================================================================
[   17.169669] ==================================================================
[   17.169784] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.169889] Write of size 1 at addr fff00000c63230d0 by task kunit_try_catch/158
[   17.170000] 
[   17.170072] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.170262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.170373] Hardware name: linux,dummy-virt (DT)
[   17.170443] Call trace:
[   17.170486]  show_stack+0x20/0x38 (C)
[   17.170877]  dump_stack_lvl+0x8c/0xd0
[   17.171011]  print_report+0x118/0x608
[   17.171315]  kasan_report+0xdc/0x128
[   17.171752]  __asan_report_store1_noabort+0x20/0x30
[   17.171919]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.172083]  krealloc_less_oob+0x20/0x38
[   17.172195]  kunit_try_run_case+0x170/0x3f0
[   17.172361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.172518]  kthread+0x328/0x630
[   17.172630]  ret_from_fork+0x10/0x20
[   17.172841] 
[   17.172882] Allocated by task 158:
[   17.172943]  kasan_save_stack+0x3c/0x68
[   17.173489]  kasan_save_track+0x20/0x40
[   17.173920]  kasan_save_alloc_info+0x40/0x58
[   17.174343]  __kasan_krealloc+0x118/0x178
[   17.174521]  krealloc_noprof+0x128/0x360
[   17.174608]  krealloc_less_oob_helper+0x168/0xc50
[   17.174696]  krealloc_less_oob+0x20/0x38
[   17.174782]  kunit_try_run_case+0x170/0x3f0
[   17.174861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.174956]  kthread+0x328/0x630
[   17.175661]  ret_from_fork+0x10/0x20
[   17.175746] 
[   17.175783] The buggy address belongs to the object at fff00000c6323000
[   17.175783]  which belongs to the cache kmalloc-256 of size 256
[   17.175890] The buggy address is located 7 bytes to the right of
[   17.175890]  allocated 201-byte region [fff00000c6323000, fff00000c63230c9)
[   17.176030] 
[   17.176097] The buggy address belongs to the physical page:
[   17.176162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.176273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.176389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.176527] page_type: f5(slab)
[   17.176630] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.176750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.176878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.177070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.177246] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.177394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.177532] page dumped because: kasan: bad access detected
[   17.177641] 
[   17.177725] Memory state around the buggy address:
[   17.177798]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.178246]  fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.178355] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.178604]                                                  ^
[   17.178689]  fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.178900]  fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.179040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   17.120105] ==================================================================
[   17.120239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.120440] Write of size 1 at addr fff00000c6322ef0 by task kunit_try_catch/156
[   17.120666] 
[   17.120750] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.121207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.121528] Hardware name: linux,dummy-virt (DT)
[   17.121616] Call trace:
[   17.121776]  show_stack+0x20/0x38 (C)
[   17.121911]  dump_stack_lvl+0x8c/0xd0
[   17.122020]  print_report+0x118/0x608
[   17.122527]  kasan_report+0xdc/0x128
[   17.122656]  __asan_report_store1_noabort+0x20/0x30
[   17.122840]  krealloc_more_oob_helper+0x5c0/0x678
[   17.122970]  krealloc_more_oob+0x20/0x38
[   17.123122]  kunit_try_run_case+0x170/0x3f0
[   17.123231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123347]  kthread+0x328/0x630
[   17.123688]  ret_from_fork+0x10/0x20
[   17.124058] 
[   17.124101] Allocated by task 156:
[   17.124406]  kasan_save_stack+0x3c/0x68
[   17.124554]  kasan_save_track+0x20/0x40
[   17.124666]  kasan_save_alloc_info+0x40/0x58
[   17.125240]  __kasan_krealloc+0x118/0x178
[   17.125352]  krealloc_noprof+0x128/0x360
[   17.125672]  krealloc_more_oob_helper+0x168/0x678
[   17.125813]  krealloc_more_oob+0x20/0x38
[   17.125911]  kunit_try_run_case+0x170/0x3f0
[   17.125996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.126315]  kthread+0x328/0x630
[   17.126398]  ret_from_fork+0x10/0x20
[   17.126477] 
[   17.126980] The buggy address belongs to the object at fff00000c6322e00
[   17.126980]  which belongs to the cache kmalloc-256 of size 256
[   17.127150] The buggy address is located 5 bytes to the right of
[   17.127150]  allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb)
[   17.127294] 
[   17.127645] The buggy address belongs to the physical page:
[   17.127915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.128066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.128273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.128511] page_type: f5(slab)
[   17.128667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.128995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.129219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.129340] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.129979] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.130198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.130280] page dumped because: kasan: bad access detected
[   17.130491] 
[   17.130646] Memory state around the buggy address:
[   17.130938]  fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131058]  fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.131165] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.131251]                                                              ^
[   17.131339]  fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131418]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.131711] ==================================================================
[   17.100834] ==================================================================
[   17.101009] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.101146] Write of size 1 at addr fff00000c6322eeb by task kunit_try_catch/156
[   17.101258] 
[   17.102756] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.103786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.104109] Hardware name: linux,dummy-virt (DT)
[   17.104247] Call trace:
[   17.104296]  show_stack+0x20/0x38 (C)
[   17.104860]  dump_stack_lvl+0x8c/0xd0
[   17.105467]  print_report+0x118/0x608
[   17.106353]  kasan_report+0xdc/0x128
[   17.106896]  __asan_report_store1_noabort+0x20/0x30
[   17.107202]  krealloc_more_oob_helper+0x60c/0x678
[   17.108111]  krealloc_more_oob+0x20/0x38
[   17.108434]  kunit_try_run_case+0x170/0x3f0
[   17.108702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.108963]  kthread+0x328/0x630
[   17.109531]  ret_from_fork+0x10/0x20
[   17.109798] 
[   17.109838] Allocated by task 156:
[   17.109933]  kasan_save_stack+0x3c/0x68
[   17.110103]  kasan_save_track+0x20/0x40
[   17.110182]  kasan_save_alloc_info+0x40/0x58
[   17.110272]  __kasan_krealloc+0x118/0x178
[   17.110366]  krealloc_noprof+0x128/0x360
[   17.111332]  krealloc_more_oob_helper+0x168/0x678
[   17.111971]  krealloc_more_oob+0x20/0x38
[   17.112226]  kunit_try_run_case+0x170/0x3f0
[   17.112331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.112421]  kthread+0x328/0x630
[   17.112505]  ret_from_fork+0x10/0x20
[   17.112584] 
[   17.112633] The buggy address belongs to the object at fff00000c6322e00
[   17.112633]  which belongs to the cache kmalloc-256 of size 256
[   17.112931] The buggy address is located 0 bytes to the right of
[   17.112931]  allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb)
[   17.113251] 
[   17.113349] The buggy address belongs to the physical page:
[   17.113502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322
[   17.113736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.113880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.114327] page_type: f5(slab)
[   17.114604] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.114743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.114933] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.115112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.115206] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff
[   17.115749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.115879] page dumped because: kasan: bad access detected
[   17.115958] 
[   17.115997] Memory state around the buggy address:
[   17.116074]  fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.116179]  fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.116281] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.116643]                                                           ^
[   17.117045]  fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.117149]  fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.117229] ==================================================================
[   17.236241] ==================================================================
[   17.236365] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.236497] Write of size 1 at addr fff00000c65b60f0 by task kunit_try_catch/160
[   17.236630] 
[   17.236712] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.236932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.237002] Hardware name: linux,dummy-virt (DT)
[   17.237074] Call trace:
[   17.237158]  show_stack+0x20/0x38 (C)
[   17.237276]  dump_stack_lvl+0x8c/0xd0
[   17.237398]  print_report+0x118/0x608
[   17.237504]  kasan_report+0xdc/0x128
[   17.237605]  __asan_report_store1_noabort+0x20/0x30
[   17.237718]  krealloc_more_oob_helper+0x5c0/0x678
[   17.237827]  krealloc_large_more_oob+0x20/0x38
[   17.237934]  kunit_try_run_case+0x170/0x3f0
[   17.238046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.238166]  kthread+0x328/0x630
[   17.238264]  ret_from_fork+0x10/0x20
[   17.238382] 
[   17.238960] The buggy address belongs to the physical page:
[   17.239102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.239311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.239427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.239776] page_type: f8(unknown)
[   17.239980] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.240222] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.240492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.240810] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.240972] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.241262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.241465] page dumped because: kasan: bad access detected
[   17.241534] 
[   17.241572] Memory state around the buggy address:
[   17.241643]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.241848]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.242062] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.242261]                                                              ^
[   17.242576]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.242672]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.242841] ==================================================================
[   17.228497] ==================================================================
[   17.229042] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.229199] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/160
[   17.229316] 
[   17.229413] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.229612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.229678] Hardware name: linux,dummy-virt (DT)
[   17.229752] Call trace:
[   17.229805]  show_stack+0x20/0x38 (C)
[   17.229923]  dump_stack_lvl+0x8c/0xd0
[   17.230036]  print_report+0x118/0x608
[   17.230144]  kasan_report+0xdc/0x128
[   17.230255]  __asan_report_store1_noabort+0x20/0x30
[   17.230389]  krealloc_more_oob_helper+0x60c/0x678
[   17.230507]  krealloc_large_more_oob+0x20/0x38
[   17.230619]  kunit_try_run_case+0x170/0x3f0
[   17.230732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.231651]  kthread+0x328/0x630
[   17.231869]  ret_from_fork+0x10/0x20
[   17.232063] 
[   17.232116] The buggy address belongs to the physical page:
[   17.232256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   17.232434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.232761] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.232970] page_type: f8(unknown)
[   17.233069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.233183] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.233501] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.233647] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.233770] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff
[   17.233971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.234077] page dumped because: kasan: bad access detected
[   17.234149] 
[   17.234188] Memory state around the buggy address:
[   17.234259]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.234359]  fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.234457] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.234543]                                                           ^
[   17.234808]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.235199]  fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.235307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   17.060277] ==================================================================
[   17.060445] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.060596] Read of size 1 at addr fff00000c7910000 by task kunit_try_catch/154
[   17.060717] 
[   17.060803] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.061010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.061079] Hardware name: linux,dummy-virt (DT)
[   17.061168] Call trace:
[   17.061251]  show_stack+0x20/0x38 (C)
[   17.061390]  dump_stack_lvl+0x8c/0xd0
[   17.061508]  print_report+0x118/0x608
[   17.061627]  kasan_report+0xdc/0x128
[   17.061720]  __asan_report_load1_noabort+0x20/0x30
[   17.061835]  page_alloc_uaf+0x328/0x350
[   17.061950]  kunit_try_run_case+0x170/0x3f0
[   17.062181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.062327]  kthread+0x328/0x630
[   17.062433]  ret_from_fork+0x10/0x20
[   17.062554] 
[   17.062604] The buggy address belongs to the physical page:
[   17.062704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910
[   17.062912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.063023] page_type: f0(buddy)
[   17.063109] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000
[   17.063209] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.063281] page dumped because: kasan: bad access detected
[   17.063629] 
[   17.063719] Memory state around the buggy address:
[   17.063807]  fff00000c790ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.064037]  fff00000c790ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.064507] >fff00000c7910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.064683]                    ^
[   17.064749]  fff00000c7910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.065089]  fff00000c7910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.065387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   17.020173] ==================================================================
[   17.020422] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.020619] Free of addr fff00000c65b0001 by task kunit_try_catch/150
[   17.020722] 
[   17.021110] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.021480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.021549] Hardware name: linux,dummy-virt (DT)
[   17.021615] Call trace:
[   17.021956]  show_stack+0x20/0x38 (C)
[   17.022099]  dump_stack_lvl+0x8c/0xd0
[   17.022394]  print_report+0x118/0x608
[   17.022676]  kasan_report_invalid_free+0xc0/0xe8
[   17.022969]  __kasan_kfree_large+0x5c/0xa8
[   17.023293]  free_large_kmalloc+0x64/0x190
[   17.023452]  kfree+0x270/0x3c8
[   17.023570]  kmalloc_large_invalid_free+0x108/0x270
[   17.023672]  kunit_try_run_case+0x170/0x3f0
[   17.023937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.024199]  kthread+0x328/0x630
[   17.024411]  ret_from_fork+0x10/0x20
[   17.024538] 
[   17.024591] The buggy address belongs to the physical page:
[   17.024670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   17.024787] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.025149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.025302] page_type: f8(unknown)
[   17.025457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.025607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.025754] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.025895] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.026314] head: 0bfffe0000000002 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff
[   17.026451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.026722] page dumped because: kasan: bad access detected
[   17.026902] 
[   17.026980] Memory state around the buggy address:
[   17.027062]  fff00000c65aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.027308]  fff00000c65aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.027535] >fff00000c65b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.027657]                    ^
[   17.027823]  fff00000c65b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.027902]  fff00000c65b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.027999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   16.994035] ==================================================================
[   16.994209] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   16.995660] Read of size 1 at addr fff00000c65b0000 by task kunit_try_catch/148
[   16.995793] 
[   16.995873] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.996049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.996105] Hardware name: linux,dummy-virt (DT)
[   16.996170] Call trace:
[   16.996226]  show_stack+0x20/0x38 (C)
[   16.996352]  dump_stack_lvl+0x8c/0xd0
[   16.996444]  print_report+0x118/0x608
[   16.996543]  kasan_report+0xdc/0x128
[   16.996634]  __asan_report_load1_noabort+0x20/0x30
[   16.996999]  kmalloc_large_uaf+0x2cc/0x2f8
[   16.997111]  kunit_try_run_case+0x170/0x3f0
[   16.997230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.997439]  kthread+0x328/0x630
[   16.997615]  ret_from_fork+0x10/0x20
[   16.997786] 
[   16.997863] The buggy address belongs to the physical page:
[   16.997983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   16.998107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.998281] raw: 0bfffe0000000000 ffffc1ffc3196d08 fff00000da448c40 0000000000000000
[   16.998418] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.998505] page dumped because: kasan: bad access detected
[   16.998912] 
[   16.998982] Memory state around the buggy address:
[   16.999101]  fff00000c65aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999211]  fff00000c65aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999290] >fff00000c65b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.999365]                    ^
[   16.999572]  fff00000c65b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.999663]  fff00000c65b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.999751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   16.957774] ==================================================================
[   16.957926] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.958044] Write of size 1 at addr fff00000c65ae00a by task kunit_try_catch/146
[   16.958148] 
[   16.958225] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.959052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.959112] Hardware name: linux,dummy-virt (DT)
[   16.959177] Call trace:
[   16.959227]  show_stack+0x20/0x38 (C)
[   16.959407]  dump_stack_lvl+0x8c/0xd0
[   16.959543]  print_report+0x118/0x608
[   16.959645]  kasan_report+0xdc/0x128
[   16.959745]  __asan_report_store1_noabort+0x20/0x30
[   16.959855]  kmalloc_large_oob_right+0x278/0x2b8
[   16.959965]  kunit_try_run_case+0x170/0x3f0
[   16.960090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.960228]  kthread+0x328/0x630
[   16.960333]  ret_from_fork+0x10/0x20
[   16.960436] 
[   16.960530] The buggy address belongs to the physical page:
[   16.960598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ac
[   16.960698] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.960803] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.960929] page_type: f8(unknown)
[   16.961009] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.961101] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.961455] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.961625] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.962133] head: 0bfffe0000000002 ffffc1ffc3196b01 00000000ffffffff 00000000ffffffff
[   16.962262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.962425] page dumped because: kasan: bad access detected
[   16.962882] 
[   16.962931] Memory state around the buggy address:
[   16.963059]  fff00000c65adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.963157]  fff00000c65adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.963517] >fff00000c65ae000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.963838]                       ^
[   16.963911]  fff00000c65ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.963997]  fff00000c65ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.964424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   16.928123] ==================================================================
[   16.928257] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   16.928798] Write of size 1 at addr fff00000c78e1f00 by task kunit_try_catch/144
[   16.928905] 
[   16.928977] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.929148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.929201] Hardware name: linux,dummy-virt (DT)
[   16.929462] Call trace:
[   16.929530]  show_stack+0x20/0x38 (C)
[   16.929658]  dump_stack_lvl+0x8c/0xd0
[   16.929766]  print_report+0x118/0x608
[   16.929884]  kasan_report+0xdc/0x128
[   16.929987]  __asan_report_store1_noabort+0x20/0x30
[   16.930095]  kmalloc_big_oob_right+0x2a4/0x2f0
[   16.930189]  kunit_try_run_case+0x170/0x3f0
[   16.930477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.930591]  kthread+0x328/0x630
[   16.930679]  ret_from_fork+0x10/0x20
[   16.930795] 
[   16.930996] Allocated by task 144:
[   16.931077]  kasan_save_stack+0x3c/0x68
[   16.931231]  kasan_save_track+0x20/0x40
[   16.931302]  kasan_save_alloc_info+0x40/0x58
[   16.931488]  __kasan_kmalloc+0xd4/0xd8
[   16.932065]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.932225]  kmalloc_big_oob_right+0xb8/0x2f0
[   16.932375]  kunit_try_run_case+0x170/0x3f0
[   16.932732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.932830]  kthread+0x328/0x630
[   16.933164]  ret_from_fork+0x10/0x20
[   16.933877] 
[   16.934080] The buggy address belongs to the object at fff00000c78e0000
[   16.934080]  which belongs to the cache kmalloc-8k of size 8192
[   16.934484] The buggy address is located 0 bytes to the right of
[   16.934484]  allocated 7936-byte region [fff00000c78e0000, fff00000c78e1f00)
[   16.935058] 
[   16.935117] The buggy address belongs to the physical page:
[   16.935178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   16.935296] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.935393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.935706] page_type: f5(slab)
[   16.935807] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.935917] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.936024] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.936127] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.936355] head: 0bfffe0000000003 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   16.936546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.936679] page dumped because: kasan: bad access detected
[   16.936778] 
[   16.936848] Memory state around the buggy address:
[   16.936930]  fff00000c78e1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.937026]  fff00000c78e1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.937123] >fff00000c78e1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.937209]                    ^
[   16.937276]  fff00000c78e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.937414]  fff00000c78e2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.937499] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   16.902785] ==================================================================
[   16.902890] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.903229] Write of size 1 at addr fff00000c3ef0d78 by task kunit_try_catch/142
[   16.903397] 
[   16.903487] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.904010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.904107] Hardware name: linux,dummy-virt (DT)
[   16.904183] Call trace:
[   16.904304]  show_stack+0x20/0x38 (C)
[   16.904444]  dump_stack_lvl+0x8c/0xd0
[   16.904592]  print_report+0x118/0x608
[   16.904710]  kasan_report+0xdc/0x128
[   16.905086]  __asan_report_store1_noabort+0x20/0x30
[   16.905556]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.905696]  kunit_try_run_case+0x170/0x3f0
[   16.905829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.906024]  kthread+0x328/0x630
[   16.906141]  ret_from_fork+0x10/0x20
[   16.906571] 
[   16.906614] Allocated by task 142:
[   16.906690]  kasan_save_stack+0x3c/0x68
[   16.906784]  kasan_save_track+0x20/0x40
[   16.906863]  kasan_save_alloc_info+0x40/0x58
[   16.907013]  __kasan_kmalloc+0xd4/0xd8
[   16.907191]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   16.907358]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.907466]  kunit_try_run_case+0x170/0x3f0
[   16.907665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.907749]  kthread+0x328/0x630
[   16.907804]  ret_from_fork+0x10/0x20
[   16.907866] 
[   16.907903] The buggy address belongs to the object at fff00000c3ef0d00
[   16.907903]  which belongs to the cache kmalloc-128 of size 128
[   16.908010] The buggy address is located 0 bytes to the right of
[   16.908010]  allocated 120-byte region [fff00000c3ef0d00, fff00000c3ef0d78)
[   16.908542] 
[   16.908716] The buggy address belongs to the physical page:
[   16.908908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.909016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.909126] page_type: f5(slab)
[   16.909210] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.909489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.909620] page dumped because: kasan: bad access detected
[   16.909703] 
[   16.909738] Memory state around the buggy address:
[   16.909803]  fff00000c3ef0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.910205]  fff00000c3ef0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910391] >fff00000c3ef0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.910573]                                                                 ^
[   16.910755]  fff00000c3ef0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910921]  fff00000c3ef0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910991] ==================================================================
[   16.893902] ==================================================================
[   16.894226] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.894370] Write of size 1 at addr fff00000c3ef0c78 by task kunit_try_catch/142
[   16.894469] 
[   16.894549] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.894737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.894815] Hardware name: linux,dummy-virt (DT)
[   16.894876] Call trace:
[   16.894930]  show_stack+0x20/0x38 (C)
[   16.895369]  dump_stack_lvl+0x8c/0xd0
[   16.895566]  print_report+0x118/0x608
[   16.895765]  kasan_report+0xdc/0x128
[   16.895896]  __asan_report_store1_noabort+0x20/0x30
[   16.896009]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.896108]  kunit_try_run_case+0x170/0x3f0
[   16.896215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.896342]  kthread+0x328/0x630
[   16.896457]  ret_from_fork+0x10/0x20
[   16.896608] 
[   16.896649] Allocated by task 142:
[   16.896717]  kasan_save_stack+0x3c/0x68
[   16.896829]  kasan_save_track+0x20/0x40
[   16.896949]  kasan_save_alloc_info+0x40/0x58
[   16.897081]  __kasan_kmalloc+0xd4/0xd8
[   16.897196]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   16.897302]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.897403]  kunit_try_run_case+0x170/0x3f0
[   16.897483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.897568]  kthread+0x328/0x630
[   16.897645]  ret_from_fork+0x10/0x20
[   16.897773] 
[   16.897838] The buggy address belongs to the object at fff00000c3ef0c00
[   16.897838]  which belongs to the cache kmalloc-128 of size 128
[   16.898001] The buggy address is located 0 bytes to the right of
[   16.898001]  allocated 120-byte region [fff00000c3ef0c00, fff00000c3ef0c78)
[   16.898146] 
[   16.898201] The buggy address belongs to the physical page:
[   16.898285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.898597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.898757] page_type: f5(slab)
[   16.899021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.899288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.899673] page dumped because: kasan: bad access detected
[   16.899748] 
[   16.899784] Memory state around the buggy address:
[   16.899850]  fff00000c3ef0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.899936]  fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.900075] >fff00000c3ef0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.900171]                                                                 ^
[   16.900288]  fff00000c3ef0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.900408]  fff00000c3ef0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.900531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   16.868859] ==================================================================
[   16.869040] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.869172] Read of size 1 at addr fff00000c78d1000 by task kunit_try_catch/140
[   16.869275] 
[   16.869362] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.869636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.869695] Hardware name: linux,dummy-virt (DT)
[   16.869760] Call trace:
[   16.869825]  show_stack+0x20/0x38 (C)
[   16.869957]  dump_stack_lvl+0x8c/0xd0
[   16.870067]  print_report+0x118/0x608
[   16.870626]  kasan_report+0xdc/0x128
[   16.870783]  __asan_report_load1_noabort+0x20/0x30
[   16.870984]  kmalloc_node_oob_right+0x2f4/0x330
[   16.871208]  kunit_try_run_case+0x170/0x3f0
[   16.871480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871802]  kthread+0x328/0x630
[   16.871930]  ret_from_fork+0x10/0x20
[   16.872476] 
[   16.872518] Allocated by task 140:
[   16.872585]  kasan_save_stack+0x3c/0x68
[   16.872677]  kasan_save_track+0x20/0x40
[   16.872755]  kasan_save_alloc_info+0x40/0x58
[   16.872839]  __kasan_kmalloc+0xd4/0xd8
[   16.873470]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   16.874201]  kmalloc_node_oob_right+0xbc/0x330
[   16.874495]  kunit_try_run_case+0x170/0x3f0
[   16.874679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.875272]  kthread+0x328/0x630
[   16.875369]  ret_from_fork+0x10/0x20
[   16.875432] 
[   16.875955] The buggy address belongs to the object at fff00000c78d0000
[   16.875955]  which belongs to the cache kmalloc-4k of size 4096
[   16.876100] The buggy address is located 0 bytes to the right of
[   16.876100]  allocated 4096-byte region [fff00000c78d0000, fff00000c78d1000)
[   16.876240] 
[   16.876285] The buggy address belongs to the physical page:
[   16.877415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0
[   16.878133] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.878443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.878708] page_type: f5(slab)
[   16.878803] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.878916] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.879276] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.879456] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.879554] head: 0bfffe0000000003 ffffc1ffc31e3401 00000000ffffffff 00000000ffffffff
[   16.879733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.879964] page dumped because: kasan: bad access detected
[   16.880207] 
[   16.880275] Memory state around the buggy address:
[   16.880512]  fff00000c78d0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.880652]  fff00000c78d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.881045] >fff00000c78d1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.881189]                    ^
[   16.881299]  fff00000c78d1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.881510]  fff00000c78d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.881643] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child: Failure Automatically assigned
------------[ cut here ]------------
[  142.261638] WARNING: CPU: 0 PID: 1600 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8
[  142.262057] Modules linked in:
[  142.262245] CPU: 0 UID: 0 PID: 1600 Comm: test_ratelimit_ Tainted: G    B D W        N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[  142.263851] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  142.264506] Hardware name: linux,dummy-virt (DT)
[  142.264865] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  142.265380] pc : test_ratelimit_stress_child+0x160/0x1b8
[  142.265843] lr : test_ratelimit_stress_child+0x30/0x1b8
[  142.266256] sp : ffff800089657d90
[  142.266570] x29: ffff800089657d90 x28: 0000000000000000 x27: 0000000000000000
[  142.267202] x26: 1ffe000018c675a1 x25: 0000000000000000 x24: 0000000000000004
[  142.267742] x23: fff00000c633ad0c x22: fff00000cbf3bda8 x21: ffffa1327c964038
[  142.268261] x20: fff00000c633ad00 x19: fff00000cbf3bda8 x18: fff00000c1218b60
[  142.268884] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08
[  142.269146] x14: 0000000000018fff x13: 1ffe00001b48cdcd x12: fffd80001b488849
[  142.269411] x11: 1ffe00001b488848 x10: fffd80001b488848 x9 : ffffa1327f00390c
[  142.269671] x8 : ffff800089657ae8 x7 : 0000000000000001 x6 : ffff800089657c00
[  142.269922] x5 : 0000000000000001 x4 : ffffa132813643e0 x3 : 0000000000000000
[  142.270159] x2 : 1ffe0000197e77b9 x1 : 0000000000000000 x0 : 0000000000000000
[  142.270628] Call trace:
[  142.270989]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  142.271441]  kthread+0x328/0x630
[  142.271747]  ret_from_fork+0x10/0x20
[  142.272066] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure Automatically assigned
------------[ cut here ]------------
[   94.690169] WARNING: CPU: 1 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   94.691247] Modules linked in:
[   94.691636] CPU: 1 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   94.692314] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.693581] Hardware name: linux,dummy-virt (DT)
[   94.693955] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.694523] pc : intlog10+0x38/0x48
[   94.694996] lr : intlog10_test+0xe4/0x200
[   94.695563] sp : ffff800082467c10
[   94.695755] x29: ffff800082467c90 x28: 0000000000000000 x27: 0000000000000000
[   94.696591] x26: 1ffe000018f02bc1 x25: 0000000000000000 x24: ffff800082467ce0
[   94.697274] x23: ffff800082467d00 x22: 0000000000000000 x21: 1ffff0001048cf82
[   94.697960] x20: ffffa1327f2d2d00 x19: ffff800080087990 x18: 00000000c838bd38
[   94.698639] x17: 00000000be7aef34 x16: 00000000076b199b x15: 00000000e2476e82
[   94.699893] x14: 00000000887e71af x13: fff00000c14f7500 x12: ffff74265062f779
[   94.700625] x11: 1ffff4265062f778 x10: ffff74265062f778 x9 : ffffa1327c8680ac
[   94.701391] x8 : ffffa1328317bbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.702063] x5 : ffff70001048cf82 x4 : 1ffff00010010f3a x3 : 1ffff4264fe5a5a0
[   94.702762] x2 : 1ffff4264fe5a5a0 x1 : 0000000000000003 x0 : 0000000000000000
[   94.703719] Call trace:
[   94.703966]  intlog10+0x38/0x48 (P)
[   94.704249]  kunit_try_run_case+0x170/0x3f0
[   94.704776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.705336]  kthread+0x328/0x630
[   94.705650]  ret_from_fork+0x10/0x20
[   94.706072] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure Automatically assigned
------------[ cut here ]------------
[   94.615916] WARNING: CPU: 0 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   94.617110] Modules linked in:
[   94.617605] CPU: 0 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   94.618334] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   94.618793] Hardware name: linux,dummy-virt (DT)
[   94.619263] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.620130] pc : intlog2+0xd8/0xf8
[   94.620823] lr : intlog2_test+0xe4/0x200
[   94.621258] sp : ffff8000823c7c10
[   94.621744] x29: ffff8000823c7c90 x28: 0000000000000000 x27: 0000000000000000
[   94.622376] x26: 1ffe000018f02a21 x25: 0000000000000000 x24: ffff8000823c7ce0
[   94.623237] x23: ffff8000823c7d00 x22: 0000000000000000 x21: 1ffff00010478f82
[   94.623947] x20: ffffa1327f2d2c00 x19: ffff800080087990 x18: fff00000c17653a8
[   94.624428] x17: 00000000e4e09d41 x16: fff00000c097583c x15: fff00000ff616b08
[   94.625227] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cdcd x12: ffff74265062f779
[   94.626013] x11: 1ffff4265062f778 x10: ffff74265062f778 x9 : ffffa1327c8682ac
[   94.626671] x8 : ffffa1328317bbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.627288] x5 : ffff700010478f82 x4 : 1ffff00010010f3a x3 : 1ffff4264fe5a580
[   94.628014] x2 : 1ffff4264fe5a580 x1 : 0000000000000003 x0 : 0000000000000000
[   94.628807] Call trace:
[   94.629035]  intlog2+0xd8/0xf8 (P)
[   94.629453]  kunit_try_run_case+0x170/0x3f0
[   94.629860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.630441]  kthread+0x328/0x630
[   94.630740]  ret_from_fork+0x10/0x20
[   94.631432] ---[ end trace 0000000000000000 ]---
<8>[  312.428564] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
<8>[  312.136200] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_8
[   17.595904] ==================================================================
[   17.596962] BUG: KFENCE: memory corruption in kmalloc_oob_memset_8+0x170/0x2f8
[   17.596962] 
[   17.597146] Corrupted memory at 0x000000007b463737 [ ! . . . . . . . ] (in kfence-#66):
[   17.602679]  kmalloc_oob_memset_8+0x170/0x2f8
[   17.602829]  kunit_try_run_case+0x170/0x3f0
[   17.602949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.603069]  kthread+0x328/0x630
[   17.603165]  ret_from_fork+0x10/0x20
[   17.603264] 
[   17.603330] kfence-#66: 0x00000000e20515be-0x00000000aec0dc85, size=120, cache=kmalloc-128
[   17.603330] 
[   17.603442] allocated by task 176 on cpu 0 at 17.588262s (0.015172s ago):
[   17.603564]  kmalloc_oob_memset_8+0xb0/0x2f8
[   17.603645]  kunit_try_run_case+0x170/0x3f0
[   17.604118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.604311]  kthread+0x328/0x630
[   17.604476]  ret_from_fork+0x10/0x20
[   17.604574] 
[   17.605118] freed by task 176 on cpu 0 at 17.595267s (0.009408s ago):
[   17.605404]  kmalloc_oob_memset_8+0x170/0x2f8
[   17.605528]  kunit_try_run_case+0x170/0x3f0
[   17.605619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.605704]  kthread+0x328/0x630
[   17.605802]  ret_from_fork+0x10/0x20
[   17.605945] 
[   17.606067] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.606315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.606372] Hardware name: linux,dummy-virt (DT)
[   17.606434] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_oob_left
[   16.835312] ==================================================================
[   16.835636] BUG: KFENCE: out-of-bounds read in kmalloc_oob_left+0x160/0x320
[   16.835636] 
[   16.835913] Out-of-bounds read at 0x00000000b858bb47 (1B left of kfence-#59):
[   16.836608]  kmalloc_oob_left+0x160/0x320
[   16.836709]  kunit_try_run_case+0x170/0x3f0
[   16.836796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.836899]  kthread+0x328/0x630
[   16.836976]  ret_from_fork+0x10/0x20
[   16.837164] 
[   16.837847] kfence-#59: 0x0000000039df9df3-0x0000000052896ee2, size=15, cache=kmalloc-16
[   16.837847] 
[   16.838313] allocated by task 138 on cpu 0 at 16.825961s (0.012206s ago):
[   16.839000]  kmalloc_oob_left+0xb8/0x320
[   16.839119]  kunit_try_run_case+0x170/0x3f0
[   16.839206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.839356]  kthread+0x328/0x630
[   16.839456]  ret_from_fork+0x10/0x20
[   16.839635] 
[   16.839772] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.839960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.840015] Hardware name: linux,dummy-virt (DT)
[   16.840092] ==================================================================