Hay
Date
May 29, 2025, 7:10 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   28.423507] ==================================================================
[   28.423711] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   28.423711] 
[   28.424099] Corrupted memory at 0x000000004de638d1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#128):
[   28.427979]  test_corruption+0x278/0x378
[   28.428128]  kunit_try_run_case+0x170/0x3f0
[   28.428305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.428479]  kthread+0x328/0x630
[   28.428617]  ret_from_fork+0x10/0x20
[   28.428723] 
[   28.428789] kfence-#128: 0x00000000a5bae94a-0x00000000fd105cb6, size=32, cache=kmalloc-32
[   28.428789] 
[   28.428932] allocated by task 311 on cpu 1 at 28.421858s (0.007065s ago):
[   28.429080]  test_alloc+0x29c/0x628
[   28.429196]  test_corruption+0xdc/0x378
[   28.429348]  kunit_try_run_case+0x170/0x3f0
[   28.429466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.429566]  kthread+0x328/0x630
[   28.429654]  ret_from_fork+0x10/0x20
[   28.429759] 
[   28.429814] freed by task 311 on cpu 1 at 28.422383s (0.007423s ago):
[   28.430237]  test_corruption+0x278/0x378
[   28.430563]  kunit_try_run_case+0x170/0x3f0
[   28.430854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.431007]  kthread+0x328/0x630
[   28.431116]  ret_from_fork+0x10/0x20
[   28.431207] 
[   28.431322] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.431766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.431866] Hardware name: linux,dummy-virt (DT)
[   28.431988] ==================================================================
[   28.839177] ==================================================================
[   28.839342] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   28.839342] 
[   28.839492] Corrupted memory at 0x000000004a181def [ ! ] (in kfence-#132):
[   28.839760]  test_corruption+0x1d8/0x378
[   28.839878]  kunit_try_run_case+0x170/0x3f0
[   28.840339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.840508]  kthread+0x328/0x630
[   28.840606]  ret_from_fork+0x10/0x20
[   28.840955] 
[   28.841047] kfence-#132: 0x0000000093783987-0x00000000d2995e42, size=32, cache=test
[   28.841047] 
[   28.841317] allocated by task 313 on cpu 1 at 28.838891s (0.002391s ago):
[   28.841492]  test_alloc+0x230/0x628
[   28.841588]  test_corruption+0x198/0x378
[   28.841694]  kunit_try_run_case+0x170/0x3f0
[   28.841795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.841907]  kthread+0x328/0x630
[   28.841995]  ret_from_fork+0x10/0x20
[   28.842089] 
[   28.842147] freed by task 313 on cpu 1 at 28.838994s (0.003144s ago):
[   28.842306]  test_corruption+0x1d8/0x378
[   28.842420]  kunit_try_run_case+0x170/0x3f0
[   28.842521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.843029]  kthread+0x328/0x630
[   28.843232]  ret_from_fork+0x10/0x20
[   28.843321] 
[   28.843421] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.843634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.843705] Hardware name: linux,dummy-virt (DT)
[   28.843786] ==================================================================
[   28.525752] ==================================================================
[   28.525916] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   28.525916] 
[   28.526051] Corrupted memory at 0x000000005b75adb2 [ ! ] (in kfence-#129):
[   28.528575]  test_corruption+0x284/0x378
[   28.529646]  kunit_try_run_case+0x170/0x3f0
[   28.529971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.530544]  kthread+0x328/0x630
[   28.530650]  ret_from_fork+0x10/0x20
[   28.530711] 
[   28.530745] kfence-#129: 0x0000000049d36293-0x0000000096f6aa09, size=32, cache=kmalloc-32
[   28.530745] 
[   28.530859] allocated by task 311 on cpu 1 at 28.525213s (0.005638s ago):
[   28.530954]  test_alloc+0x29c/0x628
[   28.531003]  test_corruption+0x198/0x378
[   28.531050]  kunit_try_run_case+0x170/0x3f0
[   28.531096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.531144]  kthread+0x328/0x630
[   28.531184]  ret_from_fork+0x10/0x20
[   28.531226] 
[   28.531254] freed by task 311 on cpu 1 at 28.525407s (0.005843s ago):
[   28.531321]  test_corruption+0x284/0x378
[   28.531366]  kunit_try_run_case+0x170/0x3f0
[   28.531442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.531527]  kthread+0x328/0x630
[   28.531635]  ret_from_fork+0x10/0x20
[   28.531726] 
[   28.531898] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.532123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.532286] Hardware name: linux,dummy-virt (DT)
[   28.532437] ==================================================================
[   28.733161] ==================================================================
[   28.733327] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   28.733327] 
[   28.733474] Corrupted memory at 0x00000000818f1114 [ ! . . . . . . . . . . . . . . . ] (in kfence-#131):
[   28.735157]  test_corruption+0x120/0x378
[   28.735288]  kunit_try_run_case+0x170/0x3f0
[   28.735390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.735505]  kthread+0x328/0x630
[   28.735612]  ret_from_fork+0x10/0x20
[   28.735753] 
[   28.735818] kfence-#131: 0x000000000f67576a-0x00000000f2179426, size=32, cache=test
[   28.735818] 
[   28.736020] allocated by task 313 on cpu 1 at 28.732861s (0.003146s ago):
[   28.736243]  test_alloc+0x230/0x628
[   28.736375]  test_corruption+0xdc/0x378
[   28.736490]  kunit_try_run_case+0x170/0x3f0
[   28.736589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.736700]  kthread+0x328/0x630
[   28.736807]  ret_from_fork+0x10/0x20
[   28.736943] 
[   28.737012] freed by task 313 on cpu 1 at 28.732973s (0.004031s ago):
[   28.737178]  test_corruption+0x120/0x378
[   28.737278]  kunit_try_run_case+0x170/0x3f0
[   28.737383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.737493]  kthread+0x328/0x630
[   28.737576]  ret_from_fork+0x10/0x20
[   28.737675] 
[   28.737884] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.738121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.738188] Hardware name: linux,dummy-virt (DT)
[   28.738268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   23.395530] ==================================================================
[   23.395732] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   23.395908] Read of size 1 at addr fff00000c725e000 by task kunit_try_catch/213
[   23.396036] 
[   23.396133] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   23.396351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.396457] Hardware name: linux,dummy-virt (DT)
[   23.396531] Call trace:
[   23.396587]  show_stack+0x20/0x38 (C)
[   23.396762]  dump_stack_lvl+0x8c/0xd0
[   23.396915]  print_report+0x118/0x608
[   23.397015]  kasan_report+0xdc/0x128
[   23.397114]  __asan_report_load1_noabort+0x20/0x30
[   23.397239]  kmem_cache_rcu_uaf+0x388/0x468
[   23.397367]  kunit_try_run_case+0x170/0x3f0
[   23.397546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.397686]  kthread+0x328/0x630
[   23.397785]  ret_from_fork+0x10/0x20
[   23.397926] 
[   23.397971] Allocated by task 213:
[   23.398042]  kasan_save_stack+0x3c/0x68
[   23.398142]  kasan_save_track+0x20/0x40
[   23.398229]  kasan_save_alloc_info+0x40/0x58
[   23.398316]  __kasan_slab_alloc+0xa8/0xb0
[   23.398469]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   23.398577]  kmem_cache_rcu_uaf+0x12c/0x468
[   23.398678]  kunit_try_run_case+0x170/0x3f0
[   23.398835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.398966]  kthread+0x328/0x630
[   23.399159]  ret_from_fork+0x10/0x20
[   23.399248] 
[   23.399287] Freed by task 0:
[   23.399347]  kasan_save_stack+0x3c/0x68
[   23.399447]  kasan_save_track+0x20/0x40
[   23.399556]  kasan_save_free_info+0x4c/0x78
[   23.399640]  __kasan_slab_free+0x6c/0x98
[   23.399726]  slab_free_after_rcu_debug+0xd4/0x2f8
[   23.399809]  rcu_core+0x9f4/0x1e20
[   23.399879]  rcu_core_si+0x18/0x30
[   23.399996]  handle_softirqs+0x374/0xb28
[   23.400080]  __do_softirq+0x1c/0x28
[   23.400193] 
[   23.400277] Last potentially related work creation:
[   23.400408]  kasan_save_stack+0x3c/0x68
[   23.400547]  kasan_record_aux_stack+0xb4/0xc8
[   23.400707]  kmem_cache_free+0x120/0x470
[   23.400797]  kmem_cache_rcu_uaf+0x16c/0x468
[   23.400887]  kunit_try_run_case+0x170/0x3f0
[   23.400999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.401174]  kthread+0x328/0x630
[   23.401249]  ret_from_fork+0x10/0x20
[   23.401330] 
[   23.401469] The buggy address belongs to the object at fff00000c725e000
[   23.401469]  which belongs to the cache test_cache of size 200
[   23.401663] The buggy address is located 0 bytes inside of
[   23.401663]  freed 200-byte region [fff00000c725e000, fff00000c725e0c8)
[   23.401830] 
[   23.401922] The buggy address belongs to the physical page:
[   23.402031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725e
[   23.402193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.402310] page_type: f5(slab)
[   23.402478] raw: 0bfffe0000000000 fff00000c787b280 dead000000000122 0000000000000000
[   23.402582] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   23.402699] page dumped because: kasan: bad access detected
[   23.402789] 
[   23.402839] Memory state around the buggy address:
[   23.402920]  fff00000c725df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.403014]  fff00000c725df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.403092] >fff00000c725e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.403165]                    ^
[   23.403231]  fff00000c725e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   23.403409]  fff00000c725e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.403574] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   25.381436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   25.125371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   25.222438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   24.896209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   24.942518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   24.916901] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   24.843817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure Automatically assigned
[  103.577965] Internal error: Oops: 0000000096000005 [#1]  SMP
[  103.583906] Modules linked in:
[  103.584844] CPU: 0 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[  103.585996] Tainted: [B]=BAD_PAGE, [N]=TEST
[  103.586633] Hardware name: linux,dummy-virt (DT)
[  103.587511] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  103.588294] pc : kunit_test_null_dereference+0x70/0x170
[  103.588837] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  103.589258] sp : ffff8000822c7d30
[  103.589619] x29: ffff8000822c7d90 x28: 0000000000000000 x27: 0000000000000000
[  103.590509] x26: 1ffe000019717081 x25: 0000000000000000 x24: 0000000000000004
[  103.591235] x23: fff00000cb8b840c x22: ffffa940cee58308 x21: fff00000c43c8d88
[  103.591976] x20: 1ffff00010458fa6 x19: ffff800080087990 x18: 00000000d6413a2e
[  103.592730] x17: 00000000e931dd6e x16: 0000000000000100 x15: 0000000068e63496
[  103.593451] x14: 00000000e9e175e0 x13: 1ffe00001b488989 x12: fffd800018f1762c
[  103.594175] x11: 1ffe000018f1762b x10: fffd800018f1762b x9 : ffffa940cee4f770
[  103.595034] x8 : ffff8000822c7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  103.595754] x5 : ffff700010458fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  103.596463] x2 : dfff800000000000 x1 : fff00000c78ba880 x0 : ffff800080087990
[  103.597195] Call trace:
[  103.597623]  kunit_test_null_dereference+0x70/0x170 (P)
[  103.598153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  103.598647]  kthread+0x328/0x630
[  103.599088]  ret_from_fork+0x10/0x20
[  103.599959] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  103.600813] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   55.056140] ==================================================================
[   55.056266] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   55.056266] 
[   55.056395] Use-after-free read at 0x000000006cecd953 (in kfence-#175):
[   55.056479]  test_krealloc+0x51c/0x830
[   55.056534]  kunit_try_run_case+0x170/0x3f0
[   55.056586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.056637]  kthread+0x328/0x630
[   55.056681]  ret_from_fork+0x10/0x20
[   55.056729] 
[   55.056758] kfence-#175: 0x000000006cecd953-0x0000000038064440, size=32, cache=kmalloc-32
[   55.056758] 
[   55.056822] allocated by task 337 on cpu 0 at 55.055311s (0.001506s ago):
[   55.056903]  test_alloc+0x29c/0x628
[   55.056953]  test_krealloc+0xc0/0x830
[   55.056998]  kunit_try_run_case+0x170/0x3f0
[   55.057044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.057092]  kthread+0x328/0x630
[   55.057134]  ret_from_fork+0x10/0x20
[   55.057176] 
[   55.057206] freed by task 337 on cpu 0 at 55.055626s (0.001575s ago):
[   55.057275]  krealloc_noprof+0x148/0x360
[   55.057326]  test_krealloc+0x1dc/0x830
[   55.057370]  kunit_try_run_case+0x170/0x3f0
[   55.057426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.057480]  kthread+0x328/0x630
[   55.057522]  ret_from_fork+0x10/0x20
[   55.057569] 
[   55.057630] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   55.057726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.057761] Hardware name: linux,dummy-virt (DT)
[   55.057805] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   54.887368] ==================================================================
[   54.887525] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   54.887525] 
[   54.887654] Use-after-free read at 0x00000000ebf57921 (in kfence-#173):
[   54.887720]  test_memcache_typesafe_by_rcu+0x280/0x560
[   54.887780]  kunit_try_run_case+0x170/0x3f0
[   54.887835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.887887]  kthread+0x328/0x630
[   54.887933]  ret_from_fork+0x10/0x20
[   54.887978] 
[   54.888008] kfence-#173: 0x00000000ebf57921-0x000000000e7fd7a6, size=32, cache=test
[   54.888008] 
[   54.888070] allocated by task 335 on cpu 0 at 54.851253s (0.036812s ago):
[   54.888154]  test_alloc+0x230/0x628
[   54.888203]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   54.888253]  kunit_try_run_case+0x170/0x3f0
[   54.888298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.888347]  kthread+0x328/0x630
[   54.888388]  ret_from_fork+0x10/0x20
[   54.888449] 
[   54.888477] freed by task 335 on cpu 0 at 54.851418s (0.037054s ago):
[   54.888545]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   54.888597]  kunit_try_run_case+0x170/0x3f0
[   54.888641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.888688]  kthread+0x328/0x630
[   54.888728]  ret_from_fork+0x10/0x20
[   54.888771] 
[   54.888829] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   54.888922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.888957] Hardware name: linux,dummy-virt (DT)
[   54.888998] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   32.822212] ==================================================================
[   32.822487] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   32.822487] 
[   32.822700] Invalid read at 0x00000000caefb15b:
[   32.822995]  test_invalid_access+0xdc/0x1f0
[   32.823156]  kunit_try_run_case+0x170/0x3f0
[   32.823283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.823407]  kthread+0x328/0x630
[   32.823519]  ret_from_fork+0x10/0x20
[   32.823649] 
[   32.823768] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   32.823980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.824072] Hardware name: linux,dummy-virt (DT)
[   32.824169] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   26.757117] ==================================================================
[   26.757477] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.757477] 
[   26.757797] Out-of-bounds write at 0x000000002a37a40c (1B left of kfence-#112):
[   26.757927]  test_out_of_bounds_write+0x100/0x240
[   26.758046]  kunit_try_run_case+0x170/0x3f0
[   26.758157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.758262]  kthread+0x328/0x630
[   26.758356]  ret_from_fork+0x10/0x20
[   26.758785] 
[   26.758989] kfence-#112: 0x000000000da62d09-0x00000000452f3d23, size=32, cache=kmalloc-32
[   26.758989] 
[   26.759371] allocated by task 291 on cpu 1 at 26.756478s (0.002881s ago):
[   26.759651]  test_alloc+0x29c/0x628
[   26.759819]  test_out_of_bounds_write+0xc8/0x240
[   26.760113]  kunit_try_run_case+0x170/0x3f0
[   26.760378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.760492]  kthread+0x328/0x630
[   26.760819]  ret_from_fork+0x10/0x20
[   26.761015] 
[   26.761311] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.761620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.761936] Hardware name: linux,dummy-virt (DT)
[   26.762022] ==================================================================
[   27.277185] ==================================================================
[   27.277684] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   27.277684] 
[   27.278225] Out-of-bounds write at 0x000000006fc9863b (1B left of kfence-#117):
[   27.279149]  test_out_of_bounds_write+0x100/0x240
[   27.279334]  kunit_try_run_case+0x170/0x3f0
[   27.279448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.279554]  kthread+0x328/0x630
[   27.280188]  ret_from_fork+0x10/0x20
[   27.280577] 
[   27.281034] kfence-#117: 0x00000000d7526c94-0x00000000b721b68d, size=32, cache=test
[   27.281034] 
[   27.281185] allocated by task 293 on cpu 1 at 27.276771s (0.004403s ago):
[   27.281361]  test_alloc+0x230/0x628
[   27.281482]  test_out_of_bounds_write+0xc8/0x240
[   27.281587]  kunit_try_run_case+0x170/0x3f0
[   27.281689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.281797]  kthread+0x328/0x630
[   27.281885]  ret_from_fork+0x10/0x20
[   27.281979] 
[   27.282079] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   27.282282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.282353] Hardware name: linux,dummy-virt (DT)
[   27.282438] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   32.587691] ==================================================================
[   32.587866] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.587866] 
[   32.587948] Corrupted memory at 0x00000000bc5ba393 [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[   32.588310]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.588371]  kunit_try_run_case+0x170/0x3f0
[   32.588452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.588505]  kthread+0x328/0x630
[   32.588547]  ret_from_fork+0x10/0x20
[   32.588593] 
[   32.588622] kfence-#168: 0x00000000f1c003b6-0x00000000b07da2b5, size=73, cache=kmalloc-96
[   32.588622] 
[   32.588687] allocated by task 325 on cpu 0 at 32.587219s (0.001463s ago):
[   32.588764]  test_alloc+0x29c/0x628
[   32.588813]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   32.588863]  kunit_try_run_case+0x170/0x3f0
[   32.588908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.588957]  kthread+0x328/0x630
[   32.588997]  ret_from_fork+0x10/0x20
[   32.589042] 
[   32.589070] freed by task 325 on cpu 0 at 32.587465s (0.001600s ago):
[   32.589141]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.589192]  kunit_try_run_case+0x170/0x3f0
[   32.589238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.589285]  kthread+0x328/0x630
[   32.589327]  ret_from_fork+0x10/0x20
[   32.589370] 
[   32.589430] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   32.589531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.589565] Hardware name: linux,dummy-virt (DT)
[   32.589605] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   32.379634] ==================================================================
[   32.379809] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   32.379809] 
[   32.379934] Out-of-bounds read at 0x00000000ca9eb9e6 (105B right of kfence-#166):
[   32.380007]  test_kmalloc_aligned_oob_read+0x238/0x468
[   32.380065]  kunit_try_run_case+0x170/0x3f0
[   32.380116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.380166]  kthread+0x328/0x630
[   32.380211]  ret_from_fork+0x10/0x20
[   32.380256] 
[   32.380284] kfence-#166: 0x000000000f97f6c4-0x00000000206bd9e6, size=73, cache=kmalloc-96
[   32.380284] 
[   32.380345] allocated by task 323 on cpu 0 at 32.379200s (0.001140s ago):
[   32.380452]  test_alloc+0x29c/0x628
[   32.380503]  test_kmalloc_aligned_oob_read+0x100/0x468
[   32.380554]  kunit_try_run_case+0x170/0x3f0
[   32.380599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.380647]  kthread+0x328/0x630
[   32.380688]  ret_from_fork+0x10/0x20
[   32.380730] 
[   32.380786] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   32.380879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.380911] Hardware name: linux,dummy-virt (DT)
[   32.380952] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   28.212615] ==================================================================
[   28.212841] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   28.212841] 
[   28.212992] Invalid free of 0x00000000caa90f78 (in kfence-#126):
[   28.213132]  test_invalid_addr_free+0xec/0x238
[   28.213339]  kunit_try_run_case+0x170/0x3f0
[   28.213455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.213551]  kthread+0x328/0x630
[   28.213645]  ret_from_fork+0x10/0x20
[   28.213739] 
[   28.213795] kfence-#126: 0x00000000002681c5-0x000000007b3d20ee, size=32, cache=test
[   28.213795] 
[   28.213924] allocated by task 309 on cpu 1 at 28.212144s (0.001772s ago):
[   28.214083]  test_alloc+0x230/0x628
[   28.214171]  test_invalid_addr_free+0xd4/0x238
[   28.214381]  kunit_try_run_case+0x170/0x3f0
[   28.214614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.214850]  kthread+0x328/0x630
[   28.214941]  ret_from_fork+0x10/0x20
[   28.215278] 
[   28.215423] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.215673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.215773] Hardware name: linux,dummy-virt (DT)
[   28.215861] ==================================================================
[   28.112359] ==================================================================
[   28.112539] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   28.112539] 
[   28.112681] Invalid free of 0x000000008fc115df (in kfence-#125):
[   28.113534]  test_invalid_addr_free+0x1ac/0x238
[   28.113694]  kunit_try_run_case+0x170/0x3f0
[   28.113809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.113925]  kthread+0x328/0x630
[   28.114025]  ret_from_fork+0x10/0x20
[   28.114128] 
[   28.114197] kfence-#125: 0x000000007d750a3c-0x00000000557a2836, size=32, cache=kmalloc-32
[   28.114197] 
[   28.114332] allocated by task 307 on cpu 1 at 28.111771s (0.002541s ago):
[   28.114710]  test_alloc+0x29c/0x628
[   28.114930]  test_invalid_addr_free+0xd4/0x238
[   28.115026]  kunit_try_run_case+0x170/0x3f0
[   28.115130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.115630]  kthread+0x328/0x630
[   28.115813]  ret_from_fork+0x10/0x20
[   28.116094] 
[   28.116372] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.116849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.116943] Hardware name: linux,dummy-virt (DT)
[   28.117237] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   28.005044] ==================================================================
[   28.005205] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   28.005205] 
[   28.005341] Invalid free of 0x00000000e27eb523 (in kfence-#124):
[   28.005722]  test_double_free+0x100/0x238
[   28.006015]  kunit_try_run_case+0x170/0x3f0
[   28.006344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.006491]  kthread+0x328/0x630
[   28.006611]  ret_from_fork+0x10/0x20
[   28.006702] 
[   28.006764] kfence-#124: 0x00000000e27eb523-0x0000000012778aca, size=32, cache=test
[   28.006764] 
[   28.006907] allocated by task 305 on cpu 1 at 28.004664s (0.002235s ago):
[   28.007070]  test_alloc+0x230/0x628
[   28.007182]  test_double_free+0xd4/0x238
[   28.007275]  kunit_try_run_case+0x170/0x3f0
[   28.007360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.007693]  kthread+0x328/0x630
[   28.007801]  ret_from_fork+0x10/0x20
[   28.007898] 
[   28.007954] freed by task 305 on cpu 1 at 28.004743s (0.003202s ago):
[   28.008186]  test_double_free+0xf0/0x238
[   28.008371]  kunit_try_run_case+0x170/0x3f0
[   28.008522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.008642]  kthread+0x328/0x630
[   28.008732]  ret_from_fork+0x10/0x20
[   28.008828] 
[   28.008933] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   28.009144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.009223] Hardware name: linux,dummy-virt (DT)
[   28.009310] ==================================================================
[   27.900687] ==================================================================
[   27.901215] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   27.901215] 
[   27.901386] Invalid free of 0x0000000058d44c5c (in kfence-#123):
[   27.901588]  test_double_free+0x1bc/0x238
[   27.901710]  kunit_try_run_case+0x170/0x3f0
[   27.902193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.902329]  kthread+0x328/0x630
[   27.902463]  ret_from_fork+0x10/0x20
[   27.902776] 
[   27.903035] kfence-#123: 0x0000000058d44c5c-0x00000000e4898a37, size=32, cache=kmalloc-32
[   27.903035] 
[   27.903289] allocated by task 303 on cpu 1 at 27.899855s (0.003424s ago):
[   27.903477]  test_alloc+0x29c/0x628
[   27.903578]  test_double_free+0xd4/0x238
[   27.903675]  kunit_try_run_case+0x170/0x3f0
[   27.904641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.904824]  kthread+0x328/0x630
[   27.905275]  ret_from_fork+0x10/0x20
[   27.905756] 
[   27.905956] freed by task 303 on cpu 1 at 27.899998s (0.005948s ago):
[   27.906124]  test_double_free+0x1ac/0x238
[   27.906626]  kunit_try_run_case+0x170/0x3f0
[   27.906768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.906967]  kthread+0x328/0x630
[   27.907072]  ret_from_fork+0x10/0x20
[   27.907254] 
[   27.907361] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   27.907792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.907889] Hardware name: linux,dummy-virt (DT)
[   27.908254] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   27.484611] ==================================================================
[   27.484852] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   27.484852] 
[   27.485088] Use-after-free read at 0x000000000d181f01 (in kfence-#119):
[   27.485476]  test_use_after_free_read+0x114/0x248
[   27.485634]  kunit_try_run_case+0x170/0x3f0
[   27.485742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.486674]  kthread+0x328/0x630
[   27.486803]  ret_from_fork+0x10/0x20
[   27.486926] 
[   27.486989] kfence-#119: 0x000000000d181f01-0x00000000b6c70eb9, size=32, cache=kmalloc-32
[   27.486989] 
[   27.487825] allocated by task 295 on cpu 1 at 27.483662s (0.004064s ago):
[   27.488909]  test_alloc+0x29c/0x628
[   27.489037]  test_use_after_free_read+0xd0/0x248
[   27.489585]  kunit_try_run_case+0x170/0x3f0
[   27.490099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.490984]  kthread+0x328/0x630
[   27.491299]  ret_from_fork+0x10/0x20
[   27.491490] 
[   27.492823] freed by task 295 on cpu 1 at 27.483803s (0.008717s ago):
[   27.493106]  test_use_after_free_read+0x1c0/0x248
[   27.493223]  kunit_try_run_case+0x170/0x3f0
[   27.493320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.493449]  kthread+0x328/0x630
[   27.493539]  ret_from_fork+0x10/0x20
[   27.494441] 
[   27.495291] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   27.496079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.496413] Hardware name: linux,dummy-virt (DT)
[   27.496504] ==================================================================
[   27.589789] ==================================================================
[   27.590256] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   27.590256] 
[   27.590485] Use-after-free read at 0x00000000d66fab2b (in kfence-#120):
[   27.590649]  test_use_after_free_read+0x114/0x248
[   27.590906]  kunit_try_run_case+0x170/0x3f0
[   27.591236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.591463]  kthread+0x328/0x630
[   27.591575]  ret_from_fork+0x10/0x20
[   27.591672] 
[   27.591760] kfence-#120: 0x00000000d66fab2b-0x0000000001f9cdaa, size=32, cache=test
[   27.591760] 
[   27.591878] allocated by task 297 on cpu 1 at 27.589020s (0.002850s ago):
[   27.592042]  test_alloc+0x230/0x628
[   27.592148]  test_use_after_free_read+0xd0/0x248
[   27.592254]  kunit_try_run_case+0x170/0x3f0
[   27.592337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.592690]  kthread+0x328/0x630
[   27.592836]  ret_from_fork+0x10/0x20
[   27.592986] 
[   27.593045] freed by task 297 on cpu 1 at 27.589283s (0.003754s ago):
[   27.593366]  test_use_after_free_read+0xf0/0x248
[   27.593538]  kunit_try_run_case+0x170/0x3f0
[   27.593660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.593780]  kthread+0x328/0x630
[   27.593909]  ret_from_fork+0x10/0x20
[   27.594029] 
[   27.594153] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   27.594947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.595018] Hardware name: linux,dummy-virt (DT)
[   27.595066] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   26.342447] ==================================================================
[   26.342978] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   26.342978] 
[   26.343350] Out-of-bounds read at 0x00000000ff0c7053 (32B right of kfence-#108):
[   26.343510]  test_out_of_bounds_read+0x1c8/0x3e0
[   26.343628]  kunit_try_run_case+0x170/0x3f0
[   26.343862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.344471]  kthread+0x328/0x630
[   26.344582]  ret_from_fork+0x10/0x20
[   26.344869] 
[   26.345038] kfence-#108: 0x0000000012faa4ac-0x00000000fa0691e8, size=32, cache=kmalloc-32
[   26.345038] 
[   26.345210] allocated by task 287 on cpu 1 at 26.341175s (0.003987s ago):
[   26.345661]  test_alloc+0x29c/0x628
[   26.346014]  test_out_of_bounds_read+0x198/0x3e0
[   26.346202]  kunit_try_run_case+0x170/0x3f0
[   26.346321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.346427]  kthread+0x328/0x630
[   26.346518]  ret_from_fork+0x10/0x20
[   26.346613] 
[   26.347279] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.347493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.347553] Hardware name: linux,dummy-virt (DT)
[   26.348101] ==================================================================
[   26.653262] ==================================================================
[   26.653447] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   26.653447] 
[   26.654156] Out-of-bounds read at 0x000000007d51eaec (32B right of kfence-#111):
[   26.654806]  test_out_of_bounds_read+0x1c8/0x3e0
[   26.655613]  kunit_try_run_case+0x170/0x3f0
[   26.656416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.657085]  kthread+0x328/0x630
[   26.657339]  ret_from_fork+0x10/0x20
[   26.657534] 
[   26.657593] kfence-#111: 0x00000000ecacf602-0x000000006442ddbf, size=32, cache=test
[   26.657593] 
[   26.658453] allocated by task 289 on cpu 1 at 26.653094s (0.005324s ago):
[   26.659156]  test_alloc+0x230/0x628
[   26.659640]  test_out_of_bounds_read+0x198/0x3e0
[   26.660192]  kunit_try_run_case+0x170/0x3f0
[   26.660298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.660904]  kthread+0x328/0x630
[   26.661212]  ret_from_fork+0x10/0x20
[   26.661490] 
[   26.661764] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.661987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.662685] Hardware name: linux,dummy-virt (DT)
[   26.662814] ==================================================================
[   26.240531] ==================================================================
[   26.241274] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   26.241274] 
[   26.242005] Out-of-bounds read at 0x000000005a0cac36 (1B left of kfence-#107):
[   26.243133]  test_out_of_bounds_read+0x114/0x3e0
[   26.243216]  kunit_try_run_case+0x170/0x3f0
[   26.243273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.243325]  kthread+0x328/0x630
[   26.243370]  ret_from_fork+0x10/0x20
[   26.243613] 
[   26.244367] kfence-#107: 0x000000008cf39261-0x00000000b5b1cb45, size=32, cache=kmalloc-32
[   26.244367] 
[   26.245370] allocated by task 287 on cpu 1 at 26.236532s (0.008720s ago):
[   26.246896]  test_alloc+0x29c/0x628
[   26.247065]  test_out_of_bounds_read+0xdc/0x3e0
[   26.247161]  kunit_try_run_case+0x170/0x3f0
[   26.247255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.247370]  kthread+0x328/0x630
[   26.247901]  ret_from_fork+0x10/0x20
[   26.248456] 
[   26.248874] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.249468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.249696] Hardware name: linux,dummy-virt (DT)
[   26.249973] ==================================================================
[   26.547767] ==================================================================
[   26.547938] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   26.547938] 
[   26.548199] Out-of-bounds read at 0x000000004d78b883 (1B left of kfence-#110):
[   26.548347]  test_out_of_bounds_read+0x114/0x3e0
[   26.548482]  kunit_try_run_case+0x170/0x3f0
[   26.548584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.548684]  kthread+0x328/0x630
[   26.548914]  ret_from_fork+0x10/0x20
[   26.549056] 
[   26.549254] kfence-#110: 0x0000000009948346-0x0000000020b2acef, size=32, cache=test
[   26.549254] 
[   26.549416] allocated by task 289 on cpu 1 at 26.547468s (0.001926s ago):
[   26.549693]  test_alloc+0x230/0x628
[   26.549793]  test_out_of_bounds_read+0xdc/0x3e0
[   26.549900]  kunit_try_run_case+0x170/0x3f0
[   26.550225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.550385]  kthread+0x328/0x630
[   26.550774]  ret_from_fork+0x10/0x20
[   26.550971] 
[   26.551094] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.551322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.551468] Hardware name: linux,dummy-virt (DT)
[   26.551679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   26.114161] ==================================================================
[   26.114302] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   26.114436] Write of size 1 at addr fff00000c7883378 by task kunit_try_catch/285
[   26.114590] 
[   26.114695] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.114928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.115001] Hardware name: linux,dummy-virt (DT)
[   26.115092] Call trace:
[   26.115189]  show_stack+0x20/0x38 (C)
[   26.115348]  dump_stack_lvl+0x8c/0xd0
[   26.115524]  print_report+0x118/0x608
[   26.115669]  kasan_report+0xdc/0x128
[   26.115814]  __asan_report_store1_noabort+0x20/0x30
[   26.115937]  strncpy_from_user+0x270/0x2a0
[   26.116083]  copy_user_test_oob+0x5c0/0xec8
[   26.116195]  kunit_try_run_case+0x170/0x3f0
[   26.116312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.116434]  kthread+0x328/0x630
[   26.116530]  ret_from_fork+0x10/0x20
[   26.116649] 
[   26.116706] Allocated by task 285:
[   26.116827]  kasan_save_stack+0x3c/0x68
[   26.116947]  kasan_save_track+0x20/0x40
[   26.117049]  kasan_save_alloc_info+0x40/0x58
[   26.117189]  __kasan_kmalloc+0xd4/0xd8
[   26.117313]  __kmalloc_noprof+0x190/0x4d0
[   26.117435]  kunit_kmalloc_array+0x34/0x88
[   26.117534]  copy_user_test_oob+0xac/0xec8
[   26.117652]  kunit_try_run_case+0x170/0x3f0
[   26.117751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.117863]  kthread+0x328/0x630
[   26.117988]  ret_from_fork+0x10/0x20
[   26.118097] 
[   26.118183] The buggy address belongs to the object at fff00000c7883300
[   26.118183]  which belongs to the cache kmalloc-128 of size 128
[   26.118425] The buggy address is located 0 bytes to the right of
[   26.118425]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.118601] 
[   26.118659] The buggy address belongs to the physical page:
[   26.118747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.118902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.119014] page_type: f5(slab)
[   26.119097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.119227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.119336] page dumped because: kasan: bad access detected
[   26.119439] 
[   26.119506] Memory state around the buggy address:
[   26.119592]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.119728]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.119846] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.119949]                                                                 ^
[   26.120063]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.120290]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.120441] ==================================================================
[   26.105188] ==================================================================
[   26.105378] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   26.105550] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.105722] 
[   26.105839] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.106057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.106133] Hardware name: linux,dummy-virt (DT)
[   26.106216] Call trace:
[   26.106279]  show_stack+0x20/0x38 (C)
[   26.106453]  dump_stack_lvl+0x8c/0xd0
[   26.106575]  print_report+0x118/0x608
[   26.106743]  kasan_report+0xdc/0x128
[   26.106902]  kasan_check_range+0x100/0x1a8
[   26.107385]  __kasan_check_write+0x20/0x30
[   26.107541]  strncpy_from_user+0x3c/0x2a0
[   26.107659]  copy_user_test_oob+0x5c0/0xec8
[   26.108046]  kunit_try_run_case+0x170/0x3f0
[   26.108245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.108489]  kthread+0x328/0x630
[   26.109657]  ret_from_fork+0x10/0x20
[   26.109771] 
[   26.109799] Allocated by task 285:
[   26.109838]  kasan_save_stack+0x3c/0x68
[   26.109891]  kasan_save_track+0x20/0x40
[   26.109938]  kasan_save_alloc_info+0x40/0x58
[   26.109980]  __kasan_kmalloc+0xd4/0xd8
[   26.110025]  __kmalloc_noprof+0x190/0x4d0
[   26.110073]  kunit_kmalloc_array+0x34/0x88
[   26.110120]  copy_user_test_oob+0xac/0xec8
[   26.110163]  kunit_try_run_case+0x170/0x3f0
[   26.110209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.110260]  kthread+0x328/0x630
[   26.110300]  ret_from_fork+0x10/0x20
[   26.110354] 
[   26.110412] The buggy address belongs to the object at fff00000c7883300
[   26.110412]  which belongs to the cache kmalloc-128 of size 128
[   26.110563] The buggy address is located 0 bytes inside of
[   26.110563]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.110731] 
[   26.110844] The buggy address belongs to the physical page:
[   26.110991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.111135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.111268] page_type: f5(slab)
[   26.111376] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.111527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.111697] page dumped because: kasan: bad access detected
[   26.111825] 
[   26.111893] Memory state around the buggy address:
[   26.111987]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.112079]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.112177] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.112256]                                                                 ^
[   26.112339]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.112443]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.112541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   26.080959] ==================================================================
[   26.081145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   26.081304] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.081463] 
[   26.081552] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.082059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.082135] Hardware name: linux,dummy-virt (DT)
[   26.082502] Call trace:
[   26.082678]  show_stack+0x20/0x38 (C)
[   26.082854]  dump_stack_lvl+0x8c/0xd0
[   26.083160]  print_report+0x118/0x608
[   26.083483]  kasan_report+0xdc/0x128
[   26.083692]  kasan_check_range+0x100/0x1a8
[   26.083968]  __kasan_check_write+0x20/0x30
[   26.084192]  copy_user_test_oob+0x434/0xec8
[   26.084532]  kunit_try_run_case+0x170/0x3f0
[   26.084728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.084829]  kthread+0x328/0x630
[   26.084927]  ret_from_fork+0x10/0x20
[   26.085102] 
[   26.085191] Allocated by task 285:
[   26.085283]  kasan_save_stack+0x3c/0x68
[   26.085387]  kasan_save_track+0x20/0x40
[   26.085500]  kasan_save_alloc_info+0x40/0x58
[   26.085634]  __kasan_kmalloc+0xd4/0xd8
[   26.085729]  __kmalloc_noprof+0x190/0x4d0
[   26.085844]  kunit_kmalloc_array+0x34/0x88
[   26.085941]  copy_user_test_oob+0xac/0xec8
[   26.086053]  kunit_try_run_case+0x170/0x3f0
[   26.086146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.086290]  kthread+0x328/0x630
[   26.086915]  ret_from_fork+0x10/0x20
[   26.087602] 
[   26.087719] The buggy address belongs to the object at fff00000c7883300
[   26.087719]  which belongs to the cache kmalloc-128 of size 128
[   26.087910] The buggy address is located 0 bytes inside of
[   26.087910]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.088054] 
[   26.088101] The buggy address belongs to the physical page:
[   26.088326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.088490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.088617] page_type: f5(slab)
[   26.088721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.089946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.090108] page dumped because: kasan: bad access detected
[   26.090199] 
[   26.090250] Memory state around the buggy address:
[   26.090374]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.090503]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091022] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.091189]                                                                 ^
[   26.091309]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091476]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091770] ==================================================================
[   26.093652] ==================================================================
[   26.093856] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   26.094041] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.094235] 
[   26.094326] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.094547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.095084] Hardware name: linux,dummy-virt (DT)
[   26.095189] Call trace:
[   26.095480]  show_stack+0x20/0x38 (C)
[   26.095719]  dump_stack_lvl+0x8c/0xd0
[   26.096019]  print_report+0x118/0x608
[   26.096204]  kasan_report+0xdc/0x128
[   26.096338]  kasan_check_range+0x100/0x1a8
[   26.096530]  __kasan_check_read+0x20/0x30
[   26.096710]  copy_user_test_oob+0x4a0/0xec8
[   26.096844]  kunit_try_run_case+0x170/0x3f0
[   26.096980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.097165]  kthread+0x328/0x630
[   26.097321]  ret_from_fork+0x10/0x20
[   26.097455] 
[   26.097506] Allocated by task 285:
[   26.097615]  kasan_save_stack+0x3c/0x68
[   26.097738]  kasan_save_track+0x20/0x40
[   26.097985]  kasan_save_alloc_info+0x40/0x58
[   26.098231]  __kasan_kmalloc+0xd4/0xd8
[   26.098492]  __kmalloc_noprof+0x190/0x4d0
[   26.098918]  kunit_kmalloc_array+0x34/0x88
[   26.099120]  copy_user_test_oob+0xac/0xec8
[   26.099282]  kunit_try_run_case+0x170/0x3f0
[   26.099376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.099493]  kthread+0x328/0x630
[   26.099607]  ret_from_fork+0x10/0x20
[   26.099699] 
[   26.099755] The buggy address belongs to the object at fff00000c7883300
[   26.099755]  which belongs to the cache kmalloc-128 of size 128
[   26.099902] The buggy address is located 0 bytes inside of
[   26.099902]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.100362] 
[   26.100468] The buggy address belongs to the physical page:
[   26.100575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.100765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.101107] page_type: f5(slab)
[   26.101220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.101357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.101477] page dumped because: kasan: bad access detected
[   26.101587] 
[   26.101638] Memory state around the buggy address:
[   26.101722]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.101839]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102126] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.102290]                                                                 ^
[   26.102489]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102613]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102983] ==================================================================
[   26.013878] ==================================================================
[   26.014057] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   26.014220] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.014349] 
[   26.015072] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.015375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.015475] Hardware name: linux,dummy-virt (DT)
[   26.015558] Call trace:
[   26.015669]  show_stack+0x20/0x38 (C)
[   26.015951]  dump_stack_lvl+0x8c/0xd0
[   26.016183]  print_report+0x118/0x608
[   26.016701]  kasan_report+0xdc/0x128
[   26.016960]  kasan_check_range+0x100/0x1a8
[   26.017285]  __kasan_check_read+0x20/0x30
[   26.017725]  copy_user_test_oob+0x728/0xec8
[   26.017948]  kunit_try_run_case+0x170/0x3f0
[   26.018138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.018554]  kthread+0x328/0x630
[   26.018723]  ret_from_fork+0x10/0x20
[   26.019002] 
[   26.019067] Allocated by task 285:
[   26.019152]  kasan_save_stack+0x3c/0x68
[   26.019250]  kasan_save_track+0x20/0x40
[   26.019340]  kasan_save_alloc_info+0x40/0x58
[   26.019769]  __kasan_kmalloc+0xd4/0xd8
[   26.019997]  __kmalloc_noprof+0x190/0x4d0
[   26.020120]  kunit_kmalloc_array+0x34/0x88
[   26.020491]  copy_user_test_oob+0xac/0xec8
[   26.020583]  kunit_try_run_case+0x170/0x3f0
[   26.020682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.021040]  kthread+0x328/0x630
[   26.021252]  ret_from_fork+0x10/0x20
[   26.021580] 
[   26.021642] The buggy address belongs to the object at fff00000c7883300
[   26.021642]  which belongs to the cache kmalloc-128 of size 128
[   26.021810] The buggy address is located 0 bytes inside of
[   26.021810]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.021973] 
[   26.022034] The buggy address belongs to the physical page:
[   26.022295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.022468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.022667] page_type: f5(slab)
[   26.022932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.023065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.023419] page dumped because: kasan: bad access detected
[   26.023520] 
[   26.023583] Memory state around the buggy address:
[   26.023804]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.023934]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024271] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.024374]                                                                 ^
[   26.024569]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024809]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024944] ==================================================================
[   26.064869] ==================================================================
[   26.064998] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   26.065120] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.065250] 
[   26.065340] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.066389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.066545] Hardware name: linux,dummy-virt (DT)
[   26.066682] Call trace:
[   26.066775]  show_stack+0x20/0x38 (C)
[   26.067024]  dump_stack_lvl+0x8c/0xd0
[   26.067505]  print_report+0x118/0x608
[   26.067977]  kasan_report+0xdc/0x128
[   26.068236]  kasan_check_range+0x100/0x1a8
[   26.068513]  __kasan_check_read+0x20/0x30
[   26.068879]  copy_user_test_oob+0x3c8/0xec8
[   26.069187]  kunit_try_run_case+0x170/0x3f0
[   26.069389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.069519]  kthread+0x328/0x630
[   26.069907]  ret_from_fork+0x10/0x20
[   26.070209] 
[   26.070332] Allocated by task 285:
[   26.070690]  kasan_save_stack+0x3c/0x68
[   26.070851]  kasan_save_track+0x20/0x40
[   26.070946]  kasan_save_alloc_info+0x40/0x58
[   26.071036]  __kasan_kmalloc+0xd4/0xd8
[   26.071269]  __kmalloc_noprof+0x190/0x4d0
[   26.071507]  kunit_kmalloc_array+0x34/0x88
[   26.072078]  copy_user_test_oob+0xac/0xec8
[   26.072350]  kunit_try_run_case+0x170/0x3f0
[   26.072582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.072697]  kthread+0x328/0x630
[   26.072780]  ret_from_fork+0x10/0x20
[   26.072874] 
[   26.073601] The buggy address belongs to the object at fff00000c7883300
[   26.073601]  which belongs to the cache kmalloc-128 of size 128
[   26.073843] The buggy address is located 0 bytes inside of
[   26.073843]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.074554] 
[   26.074637] The buggy address belongs to the physical page:
[   26.074958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.075436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.075553] page_type: f5(slab)
[   26.075638] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.075761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.075862] page dumped because: kasan: bad access detected
[   26.076656] 
[   26.076789] Memory state around the buggy address:
[   26.076979]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.077264]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077394] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.077668]                                                                 ^
[   26.078103]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.078365]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.078482] ==================================================================
[   25.977699] ==================================================================
[   25.977954] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   25.978138] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   25.978270] 
[   25.978376] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.978635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.978722] Hardware name: linux,dummy-virt (DT)
[   25.979231] Call trace:
[   25.979424]  show_stack+0x20/0x38 (C)
[   25.979593]  dump_stack_lvl+0x8c/0xd0
[   25.979874]  print_report+0x118/0x608
[   25.980102]  kasan_report+0xdc/0x128
[   25.980657]  kasan_check_range+0x100/0x1a8
[   25.980847]  __kasan_check_write+0x20/0x30
[   25.981063]  copy_user_test_oob+0x234/0xec8
[   25.981219]  kunit_try_run_case+0x170/0x3f0
[   25.981346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.981922]  kthread+0x328/0x630
[   25.982167]  ret_from_fork+0x10/0x20
[   25.982537] 
[   25.982595] Allocated by task 285:
[   25.982667]  kasan_save_stack+0x3c/0x68
[   25.982760]  kasan_save_track+0x20/0x40
[   25.982872]  kasan_save_alloc_info+0x40/0x58
[   25.983266]  __kasan_kmalloc+0xd4/0xd8
[   25.983883]  __kmalloc_noprof+0x190/0x4d0
[   25.984112]  kunit_kmalloc_array+0x34/0x88
[   25.984432]  copy_user_test_oob+0xac/0xec8
[   25.984508]  kunit_try_run_case+0x170/0x3f0
[   25.984557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.984614]  kthread+0x328/0x630
[   25.984686]  ret_from_fork+0x10/0x20
[   25.984817] 
[   25.984885] The buggy address belongs to the object at fff00000c7883300
[   25.984885]  which belongs to the cache kmalloc-128 of size 128
[   25.985037] The buggy address is located 0 bytes inside of
[   25.985037]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   25.985205] 
[   25.985292] The buggy address belongs to the physical page:
[   25.985436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   25.985644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.985778] page_type: f5(slab)
[   25.985885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.986013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.986124] page dumped because: kasan: bad access detected
[   25.986214] 
[   25.986273] Memory state around the buggy address:
[   25.986425]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.986539]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.986701] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.986947]                                                                 ^
[   25.987273]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.987517]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.987610] ==================================================================
[   26.049309] ==================================================================
[   26.050657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   26.050940] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285
[   26.051154] 
[   26.051460] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   26.051861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.052448] Hardware name: linux,dummy-virt (DT)
[   26.052679] Call trace:
[   26.052780]  show_stack+0x20/0x38 (C)
[   26.052995]  dump_stack_lvl+0x8c/0xd0
[   26.053223]  print_report+0x118/0x608
[   26.053461]  kasan_report+0xdc/0x128
[   26.053657]  kasan_check_range+0x100/0x1a8
[   26.054201]  __kasan_check_write+0x20/0x30
[   26.054456]  copy_user_test_oob+0x35c/0xec8
[   26.054802]  kunit_try_run_case+0x170/0x3f0
[   26.055002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.055220]  kthread+0x328/0x630
[   26.055448]  ret_from_fork+0x10/0x20
[   26.055648] 
[   26.055708] Allocated by task 285:
[   26.055898]  kasan_save_stack+0x3c/0x68
[   26.056189]  kasan_save_track+0x20/0x40
[   26.056683]  kasan_save_alloc_info+0x40/0x58
[   26.056893]  __kasan_kmalloc+0xd4/0xd8
[   26.057071]  __kmalloc_noprof+0x190/0x4d0
[   26.057173]  kunit_kmalloc_array+0x34/0x88
[   26.057576]  copy_user_test_oob+0xac/0xec8
[   26.057779]  kunit_try_run_case+0x170/0x3f0
[   26.058291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.058491]  kthread+0x328/0x630
[   26.058578]  ret_from_fork+0x10/0x20
[   26.058662] 
[   26.058707] The buggy address belongs to the object at fff00000c7883300
[   26.058707]  which belongs to the cache kmalloc-128 of size 128
[   26.058872] The buggy address is located 0 bytes inside of
[   26.058872]  allocated 120-byte region [fff00000c7883300, fff00000c7883378)
[   26.059040] 
[   26.059097] The buggy address belongs to the physical page:
[   26.059192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   26.059327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.059477] page_type: f5(slab)
[   26.059582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.060335] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.060464] page dumped because: kasan: bad access detected
[   26.060636] 
[   26.060793] Memory state around the buggy address:
[   26.061016]  fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.061503]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062040] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.062279]                                                                 ^
[   26.062506]  fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062619]  fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062705] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   25.891904] ==================================================================
[   25.892325] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   25.892510] Read of size 8 at addr fff00000c7883278 by task kunit_try_catch/281
[   25.892642] 
[   25.892742] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.892969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.893039] Hardware name: linux,dummy-virt (DT)
[   25.893129] Call trace:
[   25.893192]  show_stack+0x20/0x38 (C)
[   25.893327]  dump_stack_lvl+0x8c/0xd0
[   25.893473]  print_report+0x118/0x608
[   25.893602]  kasan_report+0xdc/0x128
[   25.893721]  __asan_report_load8_noabort+0x20/0x30
[   25.893848]  copy_to_kernel_nofault+0x204/0x250
[   25.893976]  copy_to_kernel_nofault_oob+0x158/0x418
[   25.894112]  kunit_try_run_case+0x170/0x3f0
[   25.894237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.894587]  kthread+0x328/0x630
[   25.894755]  ret_from_fork+0x10/0x20
[   25.894929] 
[   25.894978] Allocated by task 281:
[   25.895160]  kasan_save_stack+0x3c/0x68
[   25.895280]  kasan_save_track+0x20/0x40
[   25.895371]  kasan_save_alloc_info+0x40/0x58
[   25.895474]  __kasan_kmalloc+0xd4/0xd8
[   25.895577]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.895766]  copy_to_kernel_nofault_oob+0xc8/0x418
[   25.895892]  kunit_try_run_case+0x170/0x3f0
[   25.895993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.896087]  kthread+0x328/0x630
[   25.896592]  ret_from_fork+0x10/0x20
[   25.896909] 
[   25.896997] The buggy address belongs to the object at fff00000c7883200
[   25.896997]  which belongs to the cache kmalloc-128 of size 128
[   25.897413] The buggy address is located 0 bytes to the right of
[   25.897413]  allocated 120-byte region [fff00000c7883200, fff00000c7883278)
[   25.898022] 
[   25.898382] The buggy address belongs to the physical page:
[   25.898484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   25.898610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.899099] page_type: f5(slab)
[   25.899235] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.899352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.900167] page dumped because: kasan: bad access detected
[   25.900583] 
[   25.901011] Memory state around the buggy address:
[   25.901558]  fff00000c7883100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.902067]  fff00000c7883180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.902436] >fff00000c7883200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.902557]                                                                 ^
[   25.902675]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.902788]  fff00000c7883300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.902938] ==================================================================
[   25.903922] ==================================================================
[   25.904057] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   25.904203] Write of size 8 at addr fff00000c7883278 by task kunit_try_catch/281
[   25.904336] 
[   25.904435] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.904655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.904729] Hardware name: linux,dummy-virt (DT)
[   25.904818] Call trace:
[   25.904879]  show_stack+0x20/0x38 (C)
[   25.905014]  dump_stack_lvl+0x8c/0xd0
[   25.905144]  print_report+0x118/0x608
[   25.905270]  kasan_report+0xdc/0x128
[   25.905388]  kasan_check_range+0x100/0x1a8
[   25.907283]  __kasan_check_write+0x20/0x30
[   25.907454]  copy_to_kernel_nofault+0x8c/0x250
[   25.907592]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   25.907712]  kunit_try_run_case+0x170/0x3f0
[   25.907933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.908141]  kthread+0x328/0x630
[   25.908267]  ret_from_fork+0x10/0x20
[   25.908414] 
[   25.908491] Allocated by task 281:
[   25.908570]  kasan_save_stack+0x3c/0x68
[   25.908682]  kasan_save_track+0x20/0x40
[   25.908778]  kasan_save_alloc_info+0x40/0x58
[   25.908878]  __kasan_kmalloc+0xd4/0xd8
[   25.908980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.909081]  copy_to_kernel_nofault_oob+0xc8/0x418
[   25.909189]  kunit_try_run_case+0x170/0x3f0
[   25.909326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.909444]  kthread+0x328/0x630
[   25.909530]  ret_from_fork+0x10/0x20
[   25.909656] 
[   25.909745] The buggy address belongs to the object at fff00000c7883200
[   25.909745]  which belongs to the cache kmalloc-128 of size 128
[   25.909922] The buggy address is located 0 bytes to the right of
[   25.909922]  allocated 120-byte region [fff00000c7883200, fff00000c7883278)
[   25.910102] 
[   25.910170] The buggy address belongs to the physical page:
[   25.910258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   25.910442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.910665] page_type: f5(slab)
[   25.910846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.911082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.911179] page dumped because: kasan: bad access detected
[   25.911248] 
[   25.911543] Memory state around the buggy address:
[   25.911654]  fff00000c7883100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.911776]  fff00000c7883180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.912798] >fff00000c7883200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.912946]                                                                 ^
[   25.913062]  fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.913182]  fff00000c7883300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.913282] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure Automatically assigned
[   25.818260] ==================================================================
[   25.818385] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   25.819055] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   25.819224] 
[   25.819287] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.819412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.819453] Hardware name: linux,dummy-virt (DT)
[   25.819531] Call trace:
[   25.819587]  show_stack+0x20/0x38 (C)
[   25.819674]  dump_stack_lvl+0x8c/0xd0
[   25.819900]  print_report+0x310/0x608
[   25.819990]  kasan_report+0xdc/0x128
[   25.820058]  __asan_report_load1_noabort+0x20/0x30
[   25.820265]  vmalloc_oob+0x578/0x5d0
[   25.820490]  kunit_try_run_case+0x170/0x3f0
[   25.820566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.820632]  kthread+0x328/0x630
[   25.820850]  ret_from_fork+0x10/0x20
[   25.821056] 
[   25.821238] The buggy address belongs to the virtual mapping at
[   25.821238]  [ffff8000800fe000, ffff800080100000) created by:
[   25.821238]  vmalloc_oob+0x98/0x5d0
[   25.821382] 
[   25.821427] The buggy address belongs to the physical page:
[   25.821475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c9
[   25.821658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.821772] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.821895] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.821953] page dumped because: kasan: bad access detected
[   25.822111] 
[   25.822334] Memory state around the buggy address:
[   25.822479]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.822550]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.822606] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.822696]                                                              ^
[   25.822784]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.823083]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.823186] ==================================================================
[   25.827263] ==================================================================
[   25.827356] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   25.827459] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   25.827524] 
[   25.827575] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.827680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.827715] Hardware name: linux,dummy-virt (DT)
[   25.827759] Call trace:
[   25.827793]  show_stack+0x20/0x38 (C)
[   25.827860]  dump_stack_lvl+0x8c/0xd0
[   25.827926]  print_report+0x310/0x608
[   25.827988]  kasan_report+0xdc/0x128
[   25.828045]  __asan_report_load1_noabort+0x20/0x30
[   25.828282]  vmalloc_oob+0x51c/0x5d0
[   25.828384]  kunit_try_run_case+0x170/0x3f0
[   25.828519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.828689]  kthread+0x328/0x630
[   25.828823]  ret_from_fork+0x10/0x20
[   25.828981] 
[   25.829030] The buggy address belongs to the virtual mapping at
[   25.829030]  [ffff8000800fe000, ffff800080100000) created by:
[   25.829030]  vmalloc_oob+0x98/0x5d0
[   25.829135] 
[   25.829177] The buggy address belongs to the physical page:
[   25.829229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c9
[   25.829299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.829381] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.829457] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.829511] page dumped because: kasan: bad access detected
[   25.829554] 
[   25.829860] Memory state around the buggy address:
[   25.829938]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.830053]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.830121] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.830219]                                                                 ^
[   25.830286]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.830388]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.830508] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   25.535534] ==================================================================
[   25.535671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   25.535799] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.535917] 
[   25.535996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.536181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.536251] Hardware name: linux,dummy-virt (DT)
[   25.536335] Call trace:
[   25.536394]  show_stack+0x20/0x38 (C)
[   25.536533]  dump_stack_lvl+0x8c/0xd0
[   25.536656]  print_report+0x118/0x608
[   25.536768]  kasan_report+0xdc/0x128
[   25.536883]  kasan_check_range+0x100/0x1a8
[   25.537006]  __kasan_check_write+0x20/0x30
[   25.537119]  kasan_atomics_helper+0xeb8/0x4858
[   25.537239]  kasan_atomics+0x198/0x2e0
[   25.537359]  kunit_try_run_case+0x170/0x3f0
[   25.537736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.537886]  kthread+0x328/0x630
[   25.538620]  ret_from_fork+0x10/0x20
[   25.538745] 
[   25.538855] Allocated by task 265:
[   25.539115]  kasan_save_stack+0x3c/0x68
[   25.539246]  kasan_save_track+0x20/0x40
[   25.539358]  kasan_save_alloc_info+0x40/0x58
[   25.539473]  __kasan_kmalloc+0xd4/0xd8
[   25.539599]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.539704]  kasan_atomics+0xb8/0x2e0
[   25.539822]  kunit_try_run_case+0x170/0x3f0
[   25.539933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.540040]  kthread+0x328/0x630
[   25.540118]  ret_from_fork+0x10/0x20
[   25.540370] 
[   25.540440] The buggy address belongs to the object at fff00000c7884f80
[   25.540440]  which belongs to the cache kmalloc-64 of size 64
[   25.540609] The buggy address is located 0 bytes to the right of
[   25.540609]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.540778] 
[   25.540840] The buggy address belongs to the physical page:
[   25.540926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.541051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.541172] page_type: f5(slab)
[   25.541271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.541414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.541526] page dumped because: kasan: bad access detected
[   25.541612] 
[   25.541662] Memory state around the buggy address:
[   25.541744]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.541856]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.541970] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.542072]                                      ^
[   25.542162]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.542275]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.542448] ==================================================================
[   25.691027] ==================================================================
[   25.691135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   25.691229] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.691290] 
[   25.691558] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.691681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.691913] Hardware name: linux,dummy-virt (DT)
[   25.691969] Call trace:
[   25.692001]  show_stack+0x20/0x38 (C)
[   25.692226]  dump_stack_lvl+0x8c/0xd0
[   25.692438]  print_report+0x118/0x608
[   25.692513]  kasan_report+0xdc/0x128
[   25.692595]  kasan_check_range+0x100/0x1a8
[   25.692665]  __kasan_check_write+0x20/0x30
[   25.692724]  kasan_atomics_helper+0x147c/0x4858
[   25.692782]  kasan_atomics+0x198/0x2e0
[   25.692837]  kunit_try_run_case+0x170/0x3f0
[   25.692894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.692961]  kthread+0x328/0x630
[   25.693011]  ret_from_fork+0x10/0x20
[   25.693069] 
[   25.693095] Allocated by task 265:
[   25.693133]  kasan_save_stack+0x3c/0x68
[   25.693188]  kasan_save_track+0x20/0x40
[   25.693236]  kasan_save_alloc_info+0x40/0x58
[   25.693283]  __kasan_kmalloc+0xd4/0xd8
[   25.693329]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.693378]  kasan_atomics+0xb8/0x2e0
[   25.693443]  kunit_try_run_case+0x170/0x3f0
[   25.693645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.693719]  kthread+0x328/0x630
[   25.694348]  ret_from_fork+0x10/0x20
[   25.694476] 
[   25.694510] The buggy address belongs to the object at fff00000c7884f80
[   25.694510]  which belongs to the cache kmalloc-64 of size 64
[   25.694586] The buggy address is located 0 bytes to the right of
[   25.694586]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.694663] 
[   25.695732] The buggy address belongs to the physical page:
[   25.695838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.695914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.696544] page_type: f5(slab)
[   25.696615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.696775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.696921] page dumped because: kasan: bad access detected
[   25.697408] 
[   25.697449] Memory state around the buggy address:
[   25.697746]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.697832]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.697938] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.697991]                                      ^
[   25.698233]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.698559]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.698721] ==================================================================
[   25.228443] ==================================================================
[   25.228562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   25.228674] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.229824]  kasan_check_range+0x100/0x1a8
[   25.231143]  kasan_save_track+0x20/0x40
[   25.232114]  kthread+0x328/0x630
[   25.234088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.235123] page dumped because: kasan: bad access detected
[   25.237011] ==================================================================
[   25.347790] ==================================================================
[   25.347927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   25.348064] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.348196] 
[   25.348282] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.349190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.349388] Hardware name: linux,dummy-virt (DT)
[   25.349596] Call trace:
[   25.349680]  show_stack+0x20/0x38 (C)
[   25.350255]  dump_stack_lvl+0x8c/0xd0
[   25.350703]  print_report+0x118/0x608
[   25.350858]  kasan_report+0xdc/0x128
[   25.351224]  kasan_check_range+0x100/0x1a8
[   25.351614]  __kasan_check_write+0x20/0x30
[   25.352037]  kasan_atomics_helper+0xad4/0x4858
[   25.352570]  kasan_atomics+0x198/0x2e0
[   25.352714]  kunit_try_run_case+0x170/0x3f0
[   25.352948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.353239]  kthread+0x328/0x630
[   25.353362]  ret_from_fork+0x10/0x20
[   25.353502] 
[   25.354045] Allocated by task 265:
[   25.354484]  kasan_save_stack+0x3c/0x68
[   25.354646]  kasan_save_track+0x20/0x40
[   25.354768]  kasan_save_alloc_info+0x40/0x58
[   25.355282]  __kasan_kmalloc+0xd4/0xd8
[   25.356242] The buggy address is located 0 bytes to the right of
[   25.356242]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.356807] 
[   25.356968] The buggy address belongs to the physical page:
[   25.357055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.357171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.357286] page_type: f5(slab)
[   25.357444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.357744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.357999] page dumped because: kasan: bad access detected
[   25.358449] 
[   25.358522] Memory state around the buggy address:
[   25.358769]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359038]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359145] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.359238]                                      ^
[   25.359701]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.359954]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.360358] ==================================================================
[   25.444521] ==================================================================
[   25.444670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   25.444799] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.444921] 
[   25.445020] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.445244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.445319] Hardware name: linux,dummy-virt (DT)
[   25.446933] Call trace:
[   25.447053]  show_stack+0x20/0x38 (C)
[   25.447355]  dump_stack_lvl+0x8c/0xd0
[   25.447862]  print_report+0x118/0x608
[   25.448228]  kasan_report+0xdc/0x128
[   25.448358]  kasan_check_range+0x100/0x1a8
[   25.448877]  __kasan_check_write+0x20/0x30
[   25.449330]  kasan_atomics_helper+0xd3c/0x4858
[   25.449888]  kasan_atomics+0x198/0x2e0
[   25.450043]  kunit_try_run_case+0x170/0x3f0
[   25.450484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.450660]  kthread+0x328/0x630
[   25.451115]  ret_from_fork+0x10/0x20
[   25.451638] 
[   25.451989] Allocated by task 265:
[   25.452244]  kasan_save_stack+0x3c/0x68
[   25.452908]  kasan_save_track+0x20/0x40
[   25.453407]  kasan_save_alloc_info+0x40/0x58
[   25.453549]  __kasan_kmalloc+0xd4/0xd8
[   25.453661]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.454178]  kasan_atomics+0xb8/0x2e0
[   25.454333]  kunit_try_run_case+0x170/0x3f0
[   25.454448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.454545]  kthread+0x328/0x630
[   25.454631]  ret_from_fork+0x10/0x20
[   25.454726] 
[   25.455559] The buggy address belongs to the object at fff00000c7884f80
[   25.455559]  which belongs to the cache kmalloc-64 of size 64
[   25.455748] The buggy address is located 0 bytes to the right of
[   25.455748]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.456660] 
[   25.456741] The buggy address belongs to the physical page:
[   25.456988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.457193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.457701] page_type: f5(slab)
[   25.457838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.457978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.458955] page dumped because: kasan: bad access detected
[   25.459090] 
[   25.459155] Memory state around the buggy address:
[   25.459395]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459568]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459660] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.459751]                                      ^
[   25.459842]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.460673]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.460955] ==================================================================
[   25.498390] ==================================================================
[   25.498617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   25.498811] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.498943] 
[   25.499034] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.499608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.499955] Hardware name: linux,dummy-virt (DT)
[   25.500135] Call trace:
[   25.500223]  show_stack+0x20/0x38 (C)
[   25.500467]  dump_stack_lvl+0x8c/0xd0
[   25.500683]  print_report+0x118/0x608
[   25.500878]  kasan_report+0xdc/0x128
[   25.501217]  __asan_report_load8_noabort+0x20/0x30
[   25.501688]  kasan_atomics_helper+0x3f58/0x4858
[   25.501864]  kasan_atomics+0x198/0x2e0
[   25.501988]  kunit_try_run_case+0x170/0x3f0
[   25.502106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.502251]  kthread+0x328/0x630
[   25.502798]  ret_from_fork+0x10/0x20
[   25.503302] 
[   25.503355] Allocated by task 265:
[   25.503436]  kasan_save_stack+0x3c/0x68
[   25.503539]  kasan_save_track+0x20/0x40
[   25.503631]  kasan_save_alloc_info+0x40/0x58
[   25.503788]  __kasan_kmalloc+0xd4/0xd8
[   25.503933]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.504274]  kasan_atomics+0xb8/0x2e0
[   25.504762]  kunit_try_run_case+0x170/0x3f0
[   25.505206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.505824]  kthread+0x328/0x630
[   25.506444]  ret_from_fork+0x10/0x20
[   25.506860] 
[   25.506943] The buggy address belongs to the object at fff00000c7884f80
[   25.506943]  which belongs to the cache kmalloc-64 of size 64
[   25.507142] The buggy address is located 0 bytes to the right of
[   25.507142]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.507318] 
[   25.507974] The buggy address belongs to the physical page:
[   25.508068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.508205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.508343] page_type: f5(slab)
[   25.508458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.509908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.510102] page dumped because: kasan: bad access detected
[   25.510225] 
[   25.510286] Memory state around the buggy address:
[   25.510456]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.510562]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.510927] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.511043]                                      ^
[   25.511133]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.511838]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.511958] ==================================================================
[   25.661217] ==================================================================
[   25.661334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   25.661434] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.661496] 
[   25.661797] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.661914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.661951] Hardware name: linux,dummy-virt (DT)
[   25.661993] Call trace:
[   25.662024]  show_stack+0x20/0x38 (C)
[   25.662279]  dump_stack_lvl+0x8c/0xd0
[   25.662428]  print_report+0x118/0x608
[   25.662558]  kasan_report+0xdc/0x128
[   25.662829]  kasan_check_range+0x100/0x1a8
[   25.663018]  __kasan_check_write+0x20/0x30
[   25.663183]  kasan_atomics_helper+0x12d8/0x4858
[   25.663307]  kasan_atomics+0x198/0x2e0
[   25.663367]  kunit_try_run_case+0x170/0x3f0
[   25.663440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.663507]  kthread+0x328/0x630
[   25.663959]  ret_from_fork+0x10/0x20
[   25.664169] 
[   25.664247] Allocated by task 265:
[   25.664336]  kasan_save_stack+0x3c/0x68
[   25.664475]  kasan_save_track+0x20/0x40
[   25.664525]  kasan_save_alloc_info+0x40/0x58
[   25.664584]  __kasan_kmalloc+0xd4/0xd8
[   25.664636]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.664822]  kasan_atomics+0xb8/0x2e0
[   25.664874]  kunit_try_run_case+0x170/0x3f0
[   25.664934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.664989]  kthread+0x328/0x630
[   25.665315]  ret_from_fork+0x10/0x20
[   25.665386] 
[   25.665548] The buggy address belongs to the object at fff00000c7884f80
[   25.665548]  which belongs to the cache kmalloc-64 of size 64
[   25.665931] The buggy address is located 0 bytes to the right of
[   25.665931]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.666027] 
[   25.666070] The buggy address belongs to the physical page:
[   25.666115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.666376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.666518] page_type: f5(slab)
[   25.666747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.666813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.666972] page dumped because: kasan: bad access detected
[   25.667018] 
[   25.667044] Memory state around the buggy address:
[   25.667097]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.667152]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.667447] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.667611]                                      ^
[   25.667664]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.667743]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.667801] ==================================================================
[   25.486081] ==================================================================
[   25.486426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   25.488274] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.488432] 
[   25.488536] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.488765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.488852] Hardware name: linux,dummy-virt (DT)
[   25.488935] Call trace:
[   25.489000]  show_stack+0x20/0x38 (C)
[   25.489140]  dump_stack_lvl+0x8c/0xd0
[   25.489271]  print_report+0x118/0x608
[   25.489392]  kasan_report+0xdc/0x128
[   25.489528]  kasan_check_range+0x100/0x1a8
[   25.489659]  __kasan_check_read+0x20/0x30
[   25.491111]  kasan_atomics_helper+0xdd4/0x4858
[   25.491744]  kasan_atomics+0x198/0x2e0
[   25.491958]  kunit_try_run_case+0x170/0x3f0
[   25.492150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.492564]  kthread+0x328/0x630
[   25.492810]  ret_from_fork+0x10/0x20
[   25.493169] 
[   25.493264] Allocated by task 265:
[   25.494423]  kasan_save_stack+0x3c/0x68
[   25.494907]  kasan_save_track+0x20/0x40
[   25.495154]  kasan_save_alloc_info+0x40/0x58
[   25.495285]  __kasan_kmalloc+0xd4/0xd8
[   25.495416]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.495497]  kasan_atomics+0xb8/0x2e0
[   25.495546]  kunit_try_run_case+0x170/0x3f0
[   25.495594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.495651]  kthread+0x328/0x630
[   25.495693]  ret_from_fork+0x10/0x20
[   25.495738] 
[   25.495770] The buggy address belongs to the object at fff00000c7884f80
[   25.495770]  which belongs to the cache kmalloc-64 of size 64
[   25.495845] The buggy address is located 0 bytes to the right of
[   25.495845]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.495916] 
[   25.495945] The buggy address belongs to the physical page:
[   25.495983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.496048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.496110] page_type: f5(slab)
[   25.496162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.496222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.496270] page dumped because: kasan: bad access detected
[   25.496310] 
[   25.496333] Memory state around the buggy address:
[   25.496375]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.496469]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.496787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.497176]                                      ^
[   25.497234]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.497302]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.497393] ==================================================================
[   25.751604] ==================================================================
[   25.751916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   25.752271] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.752383] 
[   25.752447] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.752545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.752580] Hardware name: linux,dummy-virt (DT)
[   25.752620] Call trace:
[   25.752650]  show_stack+0x20/0x38 (C)
[   25.752713]  dump_stack_lvl+0x8c/0xd0
[   25.752774]  print_report+0x118/0x608
[   25.752829]  kasan_report+0xdc/0x128
[   25.752885]  __asan_report_load8_noabort+0x20/0x30
[   25.752942]  kasan_atomics_helper+0x3df4/0x4858
[   25.752998]  kasan_atomics+0x198/0x2e0
[   25.753053]  kunit_try_run_case+0x170/0x3f0
[   25.753109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.753172]  kthread+0x328/0x630
[   25.753221]  ret_from_fork+0x10/0x20
[   25.753282] 
[   25.753306] Allocated by task 265:
[   25.755956]  kasan_save_stack+0x3c/0x68
[   25.756542]  kasan_save_track+0x20/0x40
[   25.757077]  kasan_save_alloc_info+0x40/0x58
[   25.757343]  __kasan_kmalloc+0xd4/0xd8
[   25.757745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.757953]  kasan_atomics+0xb8/0x2e0
[   25.758492]  kunit_try_run_case+0x170/0x3f0
[   25.758562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.758619]  kthread+0x328/0x630
[   25.758920]  ret_from_fork+0x10/0x20
[   25.758972] 
[   25.759469] The buggy address belongs to the object at fff00000c7884f80
[   25.759469]  which belongs to the cache kmalloc-64 of size 64
[   25.759794] The buggy address is located 0 bytes to the right of
[   25.759794]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.760367] 
[   25.760431] The buggy address belongs to the physical page:
[   25.760668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.760952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.761022] page_type: f5(slab)
[   25.761075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.761339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.761682] page dumped because: kasan: bad access detected
[   25.761746] 
[   25.761774] Memory state around the buggy address:
[   25.761817]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.761871]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.761922] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.763073]                                      ^
[   25.763313]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.763583]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.763737] ==================================================================
[   25.593737] ==================================================================
[   25.593875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   25.594006] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.594128] 
[   25.594221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.595076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.595225] Hardware name: linux,dummy-virt (DT)
[   25.595323] Call trace:
[   25.595500]  show_stack+0x20/0x38 (C)
[   25.595783]  dump_stack_lvl+0x8c/0xd0
[   25.596181]  print_report+0x118/0x608
[   25.596301]  kasan_report+0xdc/0x128
[   25.596483]  kasan_check_range+0x100/0x1a8
[   25.596681]  __kasan_check_write+0x20/0x30
[   25.596942]  kasan_atomics_helper+0x10c0/0x4858
[   25.597281]  kasan_atomics+0x198/0x2e0
[   25.597763]  kunit_try_run_case+0x170/0x3f0
[   25.598154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.598291]  kthread+0x328/0x630
[   25.598770]  ret_from_fork+0x10/0x20
[   25.599269] 
[   25.599777] Allocated by task 265:
[   25.599951]  kasan_save_stack+0x3c/0x68
[   25.600067]  kasan_save_track+0x20/0x40
[   25.600621]  kasan_save_alloc_info+0x40/0x58
[   25.600885]  __kasan_kmalloc+0xd4/0xd8
[   25.601192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.601542]  kasan_atomics+0xb8/0x2e0
[   25.601655]  kunit_try_run_case+0x170/0x3f0
[   25.601728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.601784]  kthread+0x328/0x630
[   25.601846]  ret_from_fork+0x10/0x20
[   25.601939] 
[   25.602001] The buggy address belongs to the object at fff00000c7884f80
[   25.602001]  which belongs to the cache kmalloc-64 of size 64
[   25.602192] The buggy address is located 0 bytes to the right of
[   25.602192]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.602422] 
[   25.602482] The buggy address belongs to the physical page:
[   25.602588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.602723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.602850] page_type: f5(slab)
[   25.602958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.603119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.603260] page dumped because: kasan: bad access detected
[   25.603375] 
[   25.603459] Memory state around the buggy address:
[   25.603627]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.603736]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.603825] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.603905]                                      ^
[   25.603990]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.604096]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.604193] ==================================================================
[   25.316251] ==================================================================
[   25.316437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   25.316653] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.316871] 
[   25.316973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.317511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.317594] Hardware name: linux,dummy-virt (DT)
[   25.317679] Call trace:
[   25.317746]  show_stack+0x20/0x38 (C)
[   25.318126]  dump_stack_lvl+0x8c/0xd0
[   25.318545]  print_report+0x118/0x608
[   25.318916]  kasan_report+0xdc/0x128
[   25.319231]  kasan_check_range+0x100/0x1a8
[   25.319505]  __kasan_check_write+0x20/0x30
[   25.319711]  kasan_atomics_helper+0x99c/0x4858
[   25.319850]  kasan_atomics+0x198/0x2e0
[   25.319978]  kunit_try_run_case+0x170/0x3f0
[   25.320105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.320247]  kthread+0x328/0x630
[   25.320356]  ret_from_fork+0x10/0x20
[   25.320499] 
[   25.320758] Allocated by task 265:
[   25.320984]  kasan_save_stack+0x3c/0x68
[   25.321286]  kasan_save_track+0x20/0x40
[   25.321637]  kasan_save_alloc_info+0x40/0x58
[   25.321888]  __kasan_kmalloc+0xd4/0xd8
[   25.322035]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.322483]  kasan_atomics+0xb8/0x2e0
[   25.322588]  kunit_try_run_case+0x170/0x3f0
[   25.322792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.323112]  kthread+0x328/0x630
[   25.323466]  ret_from_fork+0x10/0x20
[   25.323632] 
[   25.323796] The buggy address belongs to the object at fff00000c7884f80
[   25.323796]  which belongs to the cache kmalloc-64 of size 64
[   25.324080] The buggy address is located 0 bytes to the right of
[   25.324080]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.324582] 
[   25.324650] The buggy address belongs to the physical page:
[   25.324915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.325297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.325468] page_type: f5(slab)
[   25.325722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.326254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.326466] page dumped because: kasan: bad access detected
[   25.326780] 
[   25.326852] Memory state around the buggy address:
[   25.326963]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.327070]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.327157] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.327648]                                      ^
[   25.328041]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.328326]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.328554] ==================================================================
[   25.561665] ==================================================================
[   25.561817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   25.562073] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.562205] 
[   25.562393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.562796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.563009] Hardware name: linux,dummy-virt (DT)
[   25.563171] Call trace:
[   25.563227]  show_stack+0x20/0x38 (C)
[   25.563346]  dump_stack_lvl+0x8c/0xd0
[   25.563474]  print_report+0x118/0x608
[   25.564844]  kasan_report+0xdc/0x128
[   25.565471]  kasan_check_range+0x100/0x1a8
[   25.565625]  __kasan_check_write+0x20/0x30
[   25.566489]  kasan_atomics_helper+0xff0/0x4858
[   25.567186]  kasan_atomics+0x198/0x2e0
[   25.567384]  kunit_try_run_case+0x170/0x3f0
[   25.567525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.567669]  kthread+0x328/0x630
[   25.567775]  ret_from_fork+0x10/0x20
[   25.567878] 
[   25.567931] Allocated by task 265:
[   25.568007]  kasan_save_stack+0x3c/0x68
[   25.570277]  kasan_save_track+0x20/0x40
[   25.571080]  kasan_save_alloc_info+0x40/0x58
[   25.571180]  __kasan_kmalloc+0xd4/0xd8
[   25.571273]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.572446]  kasan_atomics+0xb8/0x2e0
[   25.572768]  kunit_try_run_case+0x170/0x3f0
[   25.573266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.573388]  kthread+0x328/0x630
[   25.573490]  ret_from_fork+0x10/0x20
[   25.573588] 
[   25.573659] The buggy address belongs to the object at fff00000c7884f80
[   25.573659]  which belongs to the cache kmalloc-64 of size 64
[   25.573821] The buggy address is located 0 bytes to the right of
[   25.573821]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.576276] 
[   25.576367] The buggy address belongs to the physical page:
[   25.576466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.576644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.576844] page_type: f5(slab)
[   25.577007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.577195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.577315] page dumped because: kasan: bad access detected
[   25.577417] 
[   25.577487] Memory state around the buggy address:
[   25.577578]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577726]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577881] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.577990]                                      ^
[   25.578086]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.578246]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.578481] ==================================================================
[   25.361482] ==================================================================
[   25.361777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   25.361925] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.362060] 
[   25.362147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.362758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.362983] Hardware name: linux,dummy-virt (DT)
[   25.363082] Call trace:
[   25.363149]  show_stack+0x20/0x38 (C)
[   25.363280]  dump_stack_lvl+0x8c/0xd0
[   25.363420]  print_report+0x118/0x608
[   25.363544]  kasan_report+0xdc/0x128
[   25.363683]  __asan_report_load4_noabort+0x20/0x30
[   25.363808]  kasan_atomics_helper+0x3dcc/0x4858
[   25.367836]  kasan_save_alloc_info+0x40/0x58
[   25.369265] The buggy address is located 0 bytes to the right of
[   25.369265]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.369360] 
[   25.369557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.369780] page dumped because: kasan: bad access detected
[   25.369883]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.370165] ==================================================================
[   25.668762] ==================================================================
[   25.668846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   25.668927] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.668987] 
[   25.669032] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.669133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.669167] Hardware name: linux,dummy-virt (DT)
[   25.669207] Call trace:
[   25.669237]  show_stack+0x20/0x38 (C)
[   25.669298]  dump_stack_lvl+0x8c/0xd0
[   25.669356]  print_report+0x118/0x608
[   25.669428]  kasan_report+0xdc/0x128
[   25.669487]  kasan_check_range+0x100/0x1a8
[   25.669544]  __kasan_check_write+0x20/0x30
[   25.669599]  kasan_atomics_helper+0x1384/0x4858
[   25.669657]  kasan_atomics+0x198/0x2e0
[   25.669715]  kunit_try_run_case+0x170/0x3f0
[   25.669774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.669836]  kthread+0x328/0x630
[   25.669905]  ret_from_fork+0x10/0x20
[   25.669964] 
[   25.669990] Allocated by task 265:
[   25.670026]  kasan_save_stack+0x3c/0x68
[   25.670080]  kasan_save_track+0x20/0x40
[   25.670127]  kasan_save_alloc_info+0x40/0x58
[   25.670174]  __kasan_kmalloc+0xd4/0xd8
[   25.670219]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.670267]  kasan_atomics+0xb8/0x2e0
[   25.670312]  kunit_try_run_case+0x170/0x3f0
[   25.670680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.670751]  kthread+0x328/0x630
[   25.670805]  ret_from_fork+0x10/0x20
[   25.670885] 
[   25.670917] The buggy address belongs to the object at fff00000c7884f80
[   25.670917]  which belongs to the cache kmalloc-64 of size 64
[   25.670988] The buggy address is located 0 bytes to the right of
[   25.670988]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.671576] 
[   25.671732] The buggy address belongs to the physical page:
[   25.671897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.672019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.672094] page_type: f5(slab)
[   25.672297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.672364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.672429] page dumped because: kasan: bad access detected
[   25.672728] 
[   25.673013] Memory state around the buggy address:
[   25.673162]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.673220]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.673283] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.673352]                                      ^
[   25.673678]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.673859]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.673928] ==================================================================
[   25.522693] ==================================================================
[   25.522924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   25.523385] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.523623] 
[   25.523721] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.524008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.524255] Hardware name: linux,dummy-virt (DT)
[   25.524688] Call trace:
[   25.524749]  show_stack+0x20/0x38 (C)
[   25.525187]  dump_stack_lvl+0x8c/0xd0
[   25.525602]  print_report+0x118/0x608
[   25.525742]  kasan_report+0xdc/0x128
[   25.525872]  __asan_report_store8_noabort+0x20/0x30
[   25.526120]  kasan_atomics_helper+0x3e5c/0x4858
[   25.526276]  kasan_atomics+0x198/0x2e0
[   25.526410]  kunit_try_run_case+0x170/0x3f0
[   25.526986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.527135]  kthread+0x328/0x630
[   25.527235]  ret_from_fork+0x10/0x20
[   25.527349] 
[   25.527414] Allocated by task 265:
[   25.527781]  kasan_save_stack+0x3c/0x68
[   25.528071]  kasan_save_track+0x20/0x40
[   25.528184]  kasan_save_alloc_info+0x40/0x58
[   25.528287]  __kasan_kmalloc+0xd4/0xd8
[   25.528383]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.528497]  kasan_atomics+0xb8/0x2e0
[   25.528594]  kunit_try_run_case+0x170/0x3f0
[   25.528701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.528821]  kthread+0x328/0x630
[   25.529648]  ret_from_fork+0x10/0x20
[   25.530339] 
[   25.530583] The buggy address belongs to the object at fff00000c7884f80
[   25.530583]  which belongs to the cache kmalloc-64 of size 64
[   25.530729] The buggy address is located 0 bytes to the right of
[   25.530729]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.530906] 
[   25.531566] The buggy address belongs to the physical page:
[   25.531707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.531846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.531972] page_type: f5(slab)
[   25.532079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.532213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.532378] page dumped because: kasan: bad access detected
[   25.532505] 
[   25.532576] Memory state around the buggy address:
[   25.532695]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.532856]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.533016] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.533165]                                      ^
[   25.533255]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.533373]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.533898] ==================================================================
[   25.545125] ==================================================================
[   25.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   25.545498] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.545858] 
[   25.545961] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.546306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.546680] Hardware name: linux,dummy-virt (DT)
[   25.546761] Call trace:
[   25.546845]  show_stack+0x20/0x38 (C)
[   25.546993]  dump_stack_lvl+0x8c/0xd0
[   25.547774]  print_report+0x118/0x608
[   25.548345]  kasan_report+0xdc/0x128
[   25.548521]  kasan_check_range+0x100/0x1a8
[   25.548773]  __kasan_check_write+0x20/0x30
[   25.548863]  kasan_atomics_helper+0xf20/0x4858
[   25.549008]  kasan_atomics+0x198/0x2e0
[   25.549127]  kunit_try_run_case+0x170/0x3f0
[   25.549242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.549388]  kthread+0x328/0x630
[   25.549575]  ret_from_fork+0x10/0x20
[   25.549713] 
[   25.549788] Allocated by task 265:
[   25.549897]  kasan_save_stack+0x3c/0x68
[   25.550048]  kasan_save_track+0x20/0x40
[   25.550158]  kasan_save_alloc_info+0x40/0x58
[   25.550256]  __kasan_kmalloc+0xd4/0xd8
[   25.550408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.550510]  kasan_atomics+0xb8/0x2e0
[   25.550609]  kunit_try_run_case+0x170/0x3f0
[   25.550696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.550799]  kthread+0x328/0x630
[   25.550882]  ret_from_fork+0x10/0x20
[   25.550985] 
[   25.551051] The buggy address belongs to the object at fff00000c7884f80
[   25.551051]  which belongs to the cache kmalloc-64 of size 64
[   25.551208] The buggy address is located 0 bytes to the right of
[   25.551208]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.551429] 
[   25.551527] The buggy address belongs to the physical page:
[   25.551616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.551757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.551895] page_type: f5(slab)
[   25.551990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.552099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.552216] page dumped because: kasan: bad access detected
[   25.552301] 
[   25.552349] Memory state around the buggy address:
[   25.552459]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.552610]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.552717] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.552803]                                      ^
[   25.552889]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.552996]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.553081] ==================================================================
[   25.330332] ==================================================================
[   25.330505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   25.330650] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.330784] 
[   25.330883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.331085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.331159] Hardware name: linux,dummy-virt (DT)
[   25.331251] Call trace:
[   25.331313]  show_stack+0x20/0x38 (C)
[   25.331622]  dump_stack_lvl+0x8c/0xd0
[   25.331807]  print_report+0x118/0x608
[   25.331980]  kasan_report+0xdc/0x128
[   25.332157]  kasan_check_range+0x100/0x1a8
[   25.332600]  kasan_atomics+0x198/0x2e0
[   25.333416] 
[   25.334628]  kthread+0x328/0x630
[   25.334755]  ret_from_fork+0x10/0x20
[   25.334877] 
[   25.334972] The buggy address belongs to the object at fff00000c7884f80
[   25.334972]  which belongs to the cache kmalloc-64 of size 64
[   25.335132] The buggy address is located 0 bytes to the right of
[   25.335132]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.335477] 
[   25.335574] The buggy address belongs to the physical page:
[   25.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.335874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.336063] page_type: f5(slab)
[   25.336215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.336391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.336525] page dumped because: kasan: bad access detected
[   25.336651] 
[   25.336736] Memory state around the buggy address:
[   25.336870]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.336991]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.337108] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.337211]                                      ^
[   25.337306]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.337430]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.337531] ==================================================================
[   25.432703] ==================================================================
[   25.432828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   25.432961] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.433142] 
[   25.433238] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.433468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.433546] Hardware name: linux,dummy-virt (DT)
[   25.433627] Call trace:
[   25.433686]  show_stack+0x20/0x38 (C)
[   25.433815]  dump_stack_lvl+0x8c/0xd0
[   25.433933]  print_report+0x118/0x608
[   25.434072]  kasan_report+0xdc/0x128
[   25.434181]  __asan_report_load4_noabort+0x20/0x30
[   25.434300]  kasan_atomics_helper+0x3dd8/0x4858
[   25.434444]  kasan_atomics+0x198/0x2e0
[   25.435016]  kunit_try_run_case+0x170/0x3f0
[   25.435192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.435333]  kthread+0x328/0x630
[   25.435658]  ret_from_fork+0x10/0x20
[   25.436008] 
[   25.436206] Allocated by task 265:
[   25.436289]  kasan_save_stack+0x3c/0x68
[   25.436385]  kasan_save_track+0x20/0x40
[   25.436474]  kasan_save_alloc_info+0x40/0x58
[   25.436585]  __kasan_kmalloc+0xd4/0xd8
[   25.436668]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.436763]  kasan_atomics+0xb8/0x2e0
[   25.436850]  kunit_try_run_case+0x170/0x3f0
[   25.436949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.437350]  kthread+0x328/0x630
[   25.437556]  ret_from_fork+0x10/0x20
[   25.437677] 
[   25.437769] The buggy address belongs to the object at fff00000c7884f80
[   25.437769]  which belongs to the cache kmalloc-64 of size 64
[   25.438155] The buggy address is located 0 bytes to the right of
[   25.438155]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.438594] 
[   25.438669] The buggy address belongs to the physical page:
[   25.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.438894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.439391] page_type: f5(slab)
[   25.439812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.440029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.440354] page dumped because: kasan: bad access detected
[   25.440473] 
[   25.440527] Memory state around the buggy address:
[   25.440624]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.440741]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.441272] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.442043]                                      ^
[   25.442565]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.442831]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.443250] ==================================================================
[   25.463742] ==================================================================
[   25.463888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   25.464036] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.464160] 
[   25.464254] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.464492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.464567] Hardware name: linux,dummy-virt (DT)
[   25.464657] Call trace:
[   25.464724]  show_stack+0x20/0x38 (C)
[   25.464858]  dump_stack_lvl+0x8c/0xd0
[   25.467691]  print_report+0x118/0x608
[   25.467925]  kasan_report+0xdc/0x128
[   25.468054]  __asan_report_load4_noabort+0x20/0x30
[   25.468617]  kasan_atomics_helper+0x3e04/0x4858
[   25.468764]  kasan_atomics+0x198/0x2e0
[   25.469246]  kunit_try_run_case+0x170/0x3f0
[   25.469600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.470107]  kthread+0x328/0x630
[   25.470478]  ret_from_fork+0x10/0x20
[   25.470863] 
[   25.471239] Allocated by task 265:
[   25.471321]  kasan_save_stack+0x3c/0x68
[   25.471680]  kasan_save_track+0x20/0x40
[   25.471910]  kasan_save_alloc_info+0x40/0x58
[   25.472268]  __kasan_kmalloc+0xd4/0xd8
[   25.472390]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.473180]  kasan_atomics+0xb8/0x2e0
[   25.473309]  kunit_try_run_case+0x170/0x3f0
[   25.473420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.474286]  kthread+0x328/0x630
[   25.474606]  ret_from_fork+0x10/0x20
[   25.474746] 
[   25.474811] The buggy address belongs to the object at fff00000c7884f80
[   25.474811]  which belongs to the cache kmalloc-64 of size 64
[   25.475564] The buggy address is located 0 bytes to the right of
[   25.475564]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.475762] 
[   25.476020] The buggy address belongs to the physical page:
[   25.476317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.476863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.477494] page_type: f5(slab)
[   25.477786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.478023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.478388] page dumped because: kasan: bad access detected
[   25.478873] 
[   25.478958] Memory state around the buggy address:
[   25.479081]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.479228]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.479441] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.479591]                                      ^
[   25.479884]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480313]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480514] ==================================================================
[   25.773880] ==================================================================
[   25.773958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   25.774033] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.774093] 
[   25.774138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.774238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.774284] Hardware name: linux,dummy-virt (DT)
[   25.774331] Call trace:
[   25.774389]  show_stack+0x20/0x38 (C)
[   25.774822]  dump_stack_lvl+0x8c/0xd0
[   25.774973]  print_report+0x118/0x608
[   25.775061]  kasan_report+0xdc/0x128
[   25.775513]  __asan_report_load8_noabort+0x20/0x30
[   25.775583]  kasan_atomics_helper+0x3e10/0x4858
[   25.775644]  kasan_atomics+0x198/0x2e0
[   25.775698]  kunit_try_run_case+0x170/0x3f0
[   25.775755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.775901]  kthread+0x328/0x630
[   25.776067]  ret_from_fork+0x10/0x20
[   25.776190] 
[   25.776338] Allocated by task 265:
[   25.776420]  kasan_save_stack+0x3c/0x68
[   25.776690]  kasan_save_track+0x20/0x40
[   25.776747]  kasan_save_alloc_info+0x40/0x58
[   25.776796]  __kasan_kmalloc+0xd4/0xd8
[   25.777100]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.777166]  kasan_atomics+0xb8/0x2e0
[   25.777393]  kunit_try_run_case+0x170/0x3f0
[   25.778023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.778375]  kthread+0x328/0x630
[   25.778527]  ret_from_fork+0x10/0x20
[   25.778898] 
[   25.778943] The buggy address belongs to the object at fff00000c7884f80
[   25.778943]  which belongs to the cache kmalloc-64 of size 64
[   25.779172] The buggy address is located 0 bytes to the right of
[   25.779172]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.779274] 
[   25.779317] The buggy address belongs to the physical page:
[   25.779496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.779616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.779840] page_type: f5(slab)
[   25.779994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.780059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.780111] page dumped because: kasan: bad access detected
[   25.780151] 
[   25.780178] Memory state around the buggy address:
[   25.780220]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780273]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780321] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.780670]                                      ^
[   25.780729]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.780785]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.780936] ==================================================================
[   25.580392] ==================================================================
[   25.580584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   25.580721] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.580922] 
[   25.581023] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.581345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.581414] Hardware name: linux,dummy-virt (DT)
[   25.581484] Call trace:
[   25.581529]  show_stack+0x20/0x38 (C)
[   25.581641]  dump_stack_lvl+0x8c/0xd0
[   25.581754]  print_report+0x118/0x608
[   25.581873]  kasan_report+0xdc/0x128
[   25.581988]  kasan_check_range+0x100/0x1a8
[   25.582463]  __kasan_check_write+0x20/0x30
[   25.582626]  kasan_atomics_helper+0x1058/0x4858
[   25.582759]  kasan_atomics+0x198/0x2e0
[   25.582974]  kunit_try_run_case+0x170/0x3f0
[   25.583196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.583446]  kthread+0x328/0x630
[   25.583631]  ret_from_fork+0x10/0x20
[   25.584001] 
[   25.584333] Allocated by task 265:
[   25.584454]  kasan_save_stack+0x3c/0x68
[   25.585006]  kasan_save_track+0x20/0x40
[   25.585356]  kasan_save_alloc_info+0x40/0x58
[   25.585703]  __kasan_kmalloc+0xd4/0xd8
[   25.585834]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.585995]  kasan_atomics+0xb8/0x2e0
[   25.586264]  kunit_try_run_case+0x170/0x3f0
[   25.586577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.586726]  kthread+0x328/0x630
[   25.586828]  ret_from_fork+0x10/0x20
[   25.587316] 
[   25.587449] The buggy address belongs to the object at fff00000c7884f80
[   25.587449]  which belongs to the cache kmalloc-64 of size 64
[   25.587650] The buggy address is located 0 bytes to the right of
[   25.587650]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.587795] 
[   25.588029] The buggy address belongs to the physical page:
[   25.588164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.588301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.588540] page_type: f5(slab)
[   25.588869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.589077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.589204] page dumped because: kasan: bad access detected
[   25.589333] 
[   25.589381] Memory state around the buggy address:
[   25.589798]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.589929]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.590373] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.590491]                                      ^
[   25.590937]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.591080]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.591586] ==================================================================
[   25.291833] ==================================================================
[   25.292003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   25.292136] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.292276] 
[   25.292359] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.292582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.292659] Hardware name: linux,dummy-virt (DT)
[   25.292740] Call trace:
[   25.292797]  show_stack+0x20/0x38 (C)
[   25.292928]  dump_stack_lvl+0x8c/0xd0
[   25.293702]  print_report+0x118/0x608
[   25.294830]  kasan_report+0xdc/0x128
[   25.295613]  __asan_report_load4_noabort+0x20/0x30
[   25.295786]  kasan_atomics_helper+0x42d8/0x4858
[   25.296663]  kasan_atomics+0x198/0x2e0
[   25.297801]  kunit_try_run_case+0x170/0x3f0
[   25.297969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.298739]  kthread+0x328/0x630
[   25.298930]  ret_from_fork+0x10/0x20
[   25.299427] 
[   25.299497] Allocated by task 265:
[   25.299581]  kasan_save_stack+0x3c/0x68
[   25.299793]  kasan_save_track+0x20/0x40
[   25.299972]  kasan_save_alloc_info+0x40/0x58
[   25.300123]  __kasan_kmalloc+0xd4/0xd8
[   25.300232]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.300681]  kthread+0x328/0x630
[   25.301091] The buggy address is located 0 bytes to the right of
[   25.301091]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.301266] 
[   25.301326] The buggy address belongs to the physical page:
[   25.301424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.301574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.301702] page_type: f5(slab)
[   25.301810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.302151] 
[   25.304938] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.306875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.307097]  kthread+0x328/0x630
[   25.307617]  ret_from_fork+0x10/0x20
[   25.307851] 
[   25.307936] Allocated by task 265:
[   25.308133]  kasan_save_stack+0x3c/0x68
[   25.308352]  kasan_save_track+0x20/0x40
[   25.308480]  kasan_save_alloc_info+0x40/0x58
[   25.308581]  __kasan_kmalloc+0xd4/0xd8
[   25.308685]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.308788]  kasan_atomics+0xb8/0x2e0
[   25.309308]  kunit_try_run_case+0x170/0x3f0
[   25.309668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.310230]  kthread+0x328/0x630
[   25.310387]  ret_from_fork+0x10/0x20
[   25.310496] 
[   25.310563] The buggy address belongs to the object at fff00000c7884f80
[   25.310563]  which belongs to the cache kmalloc-64 of size 64
[   25.310724] The buggy address is located 0 bytes to the right of
[   25.310724]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.311030] 
[   25.311355] The buggy address belongs to the physical page:
[   25.311628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.312040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.312350] page_type: f5(slab)
[   25.312561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.312703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.313445] page dumped because: kasan: bad access detected
[   25.313661] 
[   25.313728] Memory state around the buggy address:
[   25.313818]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.313944]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.314538] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.314747]                                      ^
[   25.315001]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.315238]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.315350] ==================================================================
[   25.004991] ==================================================================
[   25.005197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   25.006609] 
[   25.007111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.007361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.007697] Hardware name: linux,dummy-virt (DT)
[   25.009432]  __asan_report_load4_noabort+0x20/0x30
[   25.009950]  kasan_atomics+0x198/0x2e0
[   25.010329]  kunit_try_run_case+0x170/0x3f0
[   25.011869] Allocated by task 265:
[   25.012186]  kasan_save_stack+0x3c/0x68
[   25.012703]  __kasan_kmalloc+0xd4/0xd8
[   25.013146]  kasan_atomics+0xb8/0x2e0
[   25.013933]  kthread+0x328/0x630
[   25.014870] The buggy address is located 0 bytes to the right of
[   25.014870]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.015437] page_type: f5(slab)
[   25.015682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.016923] page dumped because: kasan: bad access detected
[   25.017041] 
[   25.017091] Memory state around the buggy address:
[   25.017275]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.017545]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.018331]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.018474]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.021204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   25.021339] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.022236] 
[   25.022563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.030383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.034646]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.039546] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.043809]  kunit_try_run_case+0x170/0x3f0
[   25.048193] The buggy address belongs to the object at fff00000c7884f80
[   25.048193]  which belongs to the cache kmalloc-64 of size 64
[   25.050300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.051583] page dumped because: kasan: bad access detected
[   25.051869] 
[   25.052297]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062717] 
[   25.062991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.065917]  kasan_check_range+0x100/0x1a8
[   25.066464]  kunit_try_run_case+0x170/0x3f0
[   25.067444]  kasan_save_alloc_info+0x40/0x58
[   25.071629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.072452] 
[   25.073982]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.078133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.080264]  kasan_atomics_helper+0x2b0/0x4858
[   25.081817]  kasan_save_alloc_info+0x40/0x58
[   25.084176] 
[   25.087360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.087557] page dumped because: kasan: bad access detected
[   25.088453] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.094733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   25.095884]  dump_stack_lvl+0x8c/0xd0
[   25.101314]  kasan_save_track+0x20/0x40
[   25.104127] The buggy address is located 0 bytes to the right of
[   25.104127]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.105456] 
[   25.107498] ==================================================================
[   25.789209] ==================================================================
[   25.789300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   25.789394] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.789645] 
[   25.789850] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.790165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.790205] Hardware name: linux,dummy-virt (DT)
[   25.790246] Call trace:
[   25.790277]  show_stack+0x20/0x38 (C)
[   25.790626]  dump_stack_lvl+0x8c/0xd0
[   25.790738]  print_report+0x118/0x608
[   25.790926]  kasan_report+0xdc/0x128
[   25.790995]  __asan_report_load8_noabort+0x20/0x30
[   25.791055]  kasan_atomics_helper+0x3e20/0x4858
[   25.791113]  kasan_atomics+0x198/0x2e0
[   25.791171]  kunit_try_run_case+0x170/0x3f0
[   25.791261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.791358]  kthread+0x328/0x630
[   25.791418]  ret_from_fork+0x10/0x20
[   25.791495] 
[   25.791528] Allocated by task 265:
[   25.791765]  kasan_save_stack+0x3c/0x68
[   25.791854]  kasan_save_track+0x20/0x40
[   25.791901]  kasan_save_alloc_info+0x40/0x58
[   25.791947]  __kasan_kmalloc+0xd4/0xd8
[   25.791992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.792040]  kasan_atomics+0xb8/0x2e0
[   25.792084]  kunit_try_run_case+0x170/0x3f0
[   25.792144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.792199]  kthread+0x328/0x630
[   25.792253]  ret_from_fork+0x10/0x20
[   25.792337] 
[   25.792381] The buggy address belongs to the object at fff00000c7884f80
[   25.792381]  which belongs to the cache kmalloc-64 of size 64
[   25.792648] The buggy address is located 0 bytes to the right of
[   25.792648]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.792997] 
[   25.793029] The buggy address belongs to the physical page:
[   25.793070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.793135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.793197] page_type: f5(slab)
[   25.793248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.793308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.793358] page dumped because: kasan: bad access detected
[   25.793395] 
[   25.793434] Memory state around the buggy address:
[   25.793475]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.793545]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.793608] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.793673]                                      ^
[   25.793716]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.793766]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.794085] ==================================================================
[   25.700604] ==================================================================
[   25.700695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   25.700785] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.700846] 
[   25.700947] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.701058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.701265] Hardware name: linux,dummy-virt (DT)
[   25.701621] Call trace:
[   25.701724]  show_stack+0x20/0x38 (C)
[   25.701843]  dump_stack_lvl+0x8c/0xd0
[   25.701989]  print_report+0x118/0x608
[   25.702057]  kasan_report+0xdc/0x128
[   25.702175]  kasan_check_range+0x100/0x1a8
[   25.702236]  __kasan_check_write+0x20/0x30
[   25.702598]  kasan_atomics_helper+0x14e4/0x4858
[   25.702814]  kasan_atomics+0x198/0x2e0
[   25.703024]  kunit_try_run_case+0x170/0x3f0
[   25.703196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.703451]  kthread+0x328/0x630
[   25.703520]  ret_from_fork+0x10/0x20
[   25.703584] 
[   25.703764] Allocated by task 265:
[   25.703824]  kasan_save_stack+0x3c/0x68
[   25.703886]  kasan_save_track+0x20/0x40
[   25.704008]  kasan_save_alloc_info+0x40/0x58
[   25.704144]  __kasan_kmalloc+0xd4/0xd8
[   25.704470]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.704664]  kasan_atomics+0xb8/0x2e0
[   25.704874]  kunit_try_run_case+0x170/0x3f0
[   25.705007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.705367]  kthread+0x328/0x630
[   25.705436]  ret_from_fork+0x10/0x20
[   25.705655] 
[   25.705715] The buggy address belongs to the object at fff00000c7884f80
[   25.705715]  which belongs to the cache kmalloc-64 of size 64
[   25.705878] The buggy address is located 0 bytes to the right of
[   25.705878]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.705961] 
[   25.706009] The buggy address belongs to the physical page:
[   25.706396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.706476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.706662] page_type: f5(slab)
[   25.706736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.706927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.707223] page dumped because: kasan: bad access detected
[   25.707446] 
[   25.707528] Memory state around the buggy address:
[   25.707581]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707757]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707817] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.707866]                                      ^
[   25.707966]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.708248]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.708303] ==================================================================
[   25.781760] ==================================================================
[   25.781836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   25.781910] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.781971] 
[   25.782019] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.782120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.782154] Hardware name: linux,dummy-virt (DT)
[   25.782193] Call trace:
[   25.782234]  show_stack+0x20/0x38 (C)
[   25.782296]  dump_stack_lvl+0x8c/0xd0
[   25.782534]  print_report+0x118/0x608
[   25.782957]  kasan_report+0xdc/0x128
[   25.783050]  kasan_check_range+0x100/0x1a8
[   25.783117]  __kasan_check_write+0x20/0x30
[   25.783174]  kasan_atomics_helper+0x175c/0x4858
[   25.783689]  kasan_atomics+0x198/0x2e0
[   25.783764]  kunit_try_run_case+0x170/0x3f0
[   25.783836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.784091]  kthread+0x328/0x630
[   25.784245]  ret_from_fork+0x10/0x20
[   25.784508] 
[   25.784678] Allocated by task 265:
[   25.784725]  kasan_save_stack+0x3c/0x68
[   25.784901]  kasan_save_track+0x20/0x40
[   25.784953]  kasan_save_alloc_info+0x40/0x58
[   25.785327]  __kasan_kmalloc+0xd4/0xd8
[   25.785596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.785655]  kasan_atomics+0xb8/0x2e0
[   25.785889]  kunit_try_run_case+0x170/0x3f0
[   25.785975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.786186]  kthread+0x328/0x630
[   25.786359]  ret_from_fork+0x10/0x20
[   25.786603] 
[   25.786642] The buggy address belongs to the object at fff00000c7884f80
[   25.786642]  which belongs to the cache kmalloc-64 of size 64
[   25.786750] The buggy address is located 0 bytes to the right of
[   25.786750]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.786854] 
[   25.786887] The buggy address belongs to the physical page:
[   25.786929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.786996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.787056] page_type: f5(slab)
[   25.787109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.787172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.787222] page dumped because: kasan: bad access detected
[   25.787816] 
[   25.787852] Memory state around the buggy address:
[   25.788151]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.788355]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.788450] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.788504]                                      ^
[   25.788551]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.788632]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.788728] ==================================================================
[   25.338211] ==================================================================
[   25.338424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   25.338652] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.338786] 
[   25.338883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.339090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.339181] Hardware name: linux,dummy-virt (DT)
[   25.339263] Call trace:
[   25.339325]  show_stack+0x20/0x38 (C)
[   25.339605]  dump_stack_lvl+0x8c/0xd0
[   25.339753]  print_report+0x118/0x608
[   25.339930]  kasan_report+0xdc/0x128
[   25.340061]  kasan_check_range+0x100/0x1a8
[   25.340186]  __kasan_check_write+0x20/0x30
[   25.340310]  kasan_atomics_helper+0xa6c/0x4858
[   25.340451]  kasan_atomics+0x198/0x2e0
[   25.340680]  kunit_try_run_case+0x170/0x3f0
[   25.340799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.340970]  kthread+0x328/0x630
[   25.341087]  ret_from_fork+0x10/0x20
[   25.341208] 
[   25.341263] Allocated by task 265:
[   25.341517]  kasan_save_stack+0x3c/0x68
[   25.341688]  kasan_save_track+0x20/0x40
[   25.341814]  kasan_save_alloc_info+0x40/0x58
[   25.341926]  __kasan_kmalloc+0xd4/0xd8
[   25.342082]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.342190]  kasan_atomics+0xb8/0x2e0
[   25.342281]  kunit_try_run_case+0x170/0x3f0
[   25.342390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.342511]  kthread+0x328/0x630
[   25.342717]  ret_from_fork+0x10/0x20
[   25.342807] 
[   25.342884] The buggy address belongs to the object at fff00000c7884f80
[   25.342884]  which belongs to the cache kmalloc-64 of size 64
[   25.343168] The buggy address is located 0 bytes to the right of
[   25.343168]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.343409] 
[   25.343468] The buggy address belongs to the physical page:
[   25.343552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.343757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.343867] page_type: f5(slab)
[   25.344026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.344184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.344384] page dumped because: kasan: bad access detected
[   25.344592] 
[   25.344646] Memory state around the buggy address:
[   25.344750]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344869]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.345566] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.345821]                                      ^
[   25.345921]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.346280]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.346604] ==================================================================
[   25.716948] ==================================================================
[   25.717016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   25.717284] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.717408] 
[   25.717464] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.717567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.717600] Hardware name: linux,dummy-virt (DT)
[   25.717639] Call trace:
[   25.717669]  show_stack+0x20/0x38 (C)
[   25.717738]  dump_stack_lvl+0x8c/0xd0
[   25.717796]  print_report+0x118/0x608
[   25.717854]  kasan_report+0xdc/0x128
[   25.717905]  kasan_check_range+0x100/0x1a8
[   25.717961]  __kasan_check_write+0x20/0x30
[   25.718013]  kasan_atomics_helper+0x15b4/0x4858
[   25.718068]  kasan_atomics+0x198/0x2e0
[   25.718120]  kunit_try_run_case+0x170/0x3f0
[   25.718174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.718235]  kthread+0x328/0x630
[   25.718283]  ret_from_fork+0x10/0x20
[   25.718339] 
[   25.718363] Allocated by task 265:
[   25.718408]  kasan_save_stack+0x3c/0x68
[   25.718473]  kasan_save_track+0x20/0x40
[   25.718566]  kasan_save_alloc_info+0x40/0x58
[   25.718657]  __kasan_kmalloc+0xd4/0xd8
[   25.718739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.718862]  kasan_atomics+0xb8/0x2e0
[   25.719074]  kunit_try_run_case+0x170/0x3f0
[   25.719164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.719217]  kthread+0x328/0x630
[   25.720141]  ret_from_fork+0x10/0x20
[   25.720201] 
[   25.720243] The buggy address belongs to the object at fff00000c7884f80
[   25.720243]  which belongs to the cache kmalloc-64 of size 64
[   25.720418] The buggy address is located 0 bytes to the right of
[   25.720418]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.720571] 
[   25.720651] The buggy address belongs to the physical page:
[   25.720728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.721000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.721262] page_type: f5(slab)
[   25.721433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.721788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.722373] page dumped because: kasan: bad access detected
[   25.722587] 
[   25.722627] Memory state around the buggy address:
[   25.722680]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.722733]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.722787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.722846]                                      ^
[   25.724231]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.724308]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.724356] ==================================================================
[   25.643048] ==================================================================
[   25.643171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   25.643254] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.643316] 
[   25.643368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.643541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.643595] Hardware name: linux,dummy-virt (DT)
[   25.643660] Call trace:
[   25.643720]  show_stack+0x20/0x38 (C)
[   25.643837]  dump_stack_lvl+0x8c/0xd0
[   25.644363]  print_report+0x118/0x608
[   25.644552]  kasan_report+0xdc/0x128
[   25.644723]  kasan_check_range+0x100/0x1a8
[   25.644870]  __kasan_check_write+0x20/0x30
[   25.644991]  kasan_atomics_helper+0x11f8/0x4858
[   25.645116]  kasan_atomics+0x198/0x2e0
[   25.645228]  kunit_try_run_case+0x170/0x3f0
[   25.645356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.645493]  kthread+0x328/0x630
[   25.645600]  ret_from_fork+0x10/0x20
[   25.646210] 
[   25.646480] Allocated by task 265:
[   25.646610]  kasan_save_stack+0x3c/0x68
[   25.646743]  kasan_save_track+0x20/0x40
[   25.646880]  kasan_save_alloc_info+0x40/0x58
[   25.647030]  __kasan_kmalloc+0xd4/0xd8
[   25.647137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.647246]  kasan_atomics+0xb8/0x2e0
[   25.647344]  kunit_try_run_case+0x170/0x3f0
[   25.647462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.647570]  kthread+0x328/0x630
[   25.647642]  ret_from_fork+0x10/0x20
[   25.649568] 
[   25.649617] The buggy address belongs to the object at fff00000c7884f80
[   25.649617]  which belongs to the cache kmalloc-64 of size 64
[   25.649727] The buggy address is located 0 bytes to the right of
[   25.649727]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.649804] 
[   25.649842] The buggy address belongs to the physical page:
[   25.649924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.650051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.650167] page_type: f5(slab)
[   25.650220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.650277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.650326] page dumped because: kasan: bad access detected
[   25.650378] 
[   25.650416] Memory state around the buggy address:
[   25.650459]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.650509]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.650710] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.651016]                                      ^
[   25.651708]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.652094]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.652806] ==================================================================
[   25.709260] ==================================================================
[   25.709415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   25.709500] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.709562] 
[   25.709608] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.709946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.710246] Hardware name: linux,dummy-virt (DT)
[   25.710366] Call trace:
[   25.710433]  show_stack+0x20/0x38 (C)
[   25.710542]  dump_stack_lvl+0x8c/0xd0
[   25.710609]  print_report+0x118/0x608
[   25.710667]  kasan_report+0xdc/0x128
[   25.710885]  kasan_check_range+0x100/0x1a8
[   25.711071]  __kasan_check_write+0x20/0x30
[   25.711136]  kasan_atomics_helper+0x154c/0x4858
[   25.711198]  kasan_atomics+0x198/0x2e0
[   25.711255]  kunit_try_run_case+0x170/0x3f0
[   25.711312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.711377]  kthread+0x328/0x630
[   25.711630]  ret_from_fork+0x10/0x20
[   25.711700] 
[   25.711740] Allocated by task 265:
[   25.711794]  kasan_save_stack+0x3c/0x68
[   25.711869]  kasan_save_track+0x20/0x40
[   25.711922]  kasan_save_alloc_info+0x40/0x58
[   25.711969]  __kasan_kmalloc+0xd4/0xd8
[   25.712015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.712078]  kasan_atomics+0xb8/0x2e0
[   25.712141]  kunit_try_run_case+0x170/0x3f0
[   25.712210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.712281]  kthread+0x328/0x630
[   25.712326]  ret_from_fork+0x10/0x20
[   25.712372] 
[   25.712412] The buggy address belongs to the object at fff00000c7884f80
[   25.712412]  which belongs to the cache kmalloc-64 of size 64
[   25.712487] The buggy address is located 0 bytes to the right of
[   25.712487]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.712581] 
[   25.712617] The buggy address belongs to the physical page:
[   25.712658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.712724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.712786] page_type: f5(slab)
[   25.712841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.712902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.712951] page dumped because: kasan: bad access detected
[   25.713015] 
[   25.713043] Memory state around the buggy address:
[   25.713086]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.713154]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.713209] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.713272]                                      ^
[   25.713331]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.716451]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.716577] ==================================================================
[   25.674299] ==================================================================
[   25.674377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   25.674696] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.674763] 
[   25.674807] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.674952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.674991] Hardware name: linux,dummy-virt (DT)
[   25.675329] Call trace:
[   25.675379]  show_stack+0x20/0x38 (C)
[   25.675725]  dump_stack_lvl+0x8c/0xd0
[   25.675797]  print_report+0x118/0x608
[   25.675925]  kasan_report+0xdc/0x128
[   25.676048]  __asan_report_load8_noabort+0x20/0x30
[   25.676110]  kasan_atomics_helper+0x3f04/0x4858
[   25.676412]  kasan_atomics+0x198/0x2e0
[   25.676571]  kunit_try_run_case+0x170/0x3f0
[   25.676728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.676970]  kthread+0x328/0x630
[   25.677122]  ret_from_fork+0x10/0x20
[   25.677216] 
[   25.677248] Allocated by task 265:
[   25.677610]  kasan_save_stack+0x3c/0x68
[   25.678156]  kasan_save_track+0x20/0x40
[   25.678231]  kasan_save_alloc_info+0x40/0x58
[   25.678308]  __kasan_kmalloc+0xd4/0xd8
[   25.678454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.678557]  kasan_atomics+0xb8/0x2e0
[   25.678656]  kunit_try_run_case+0x170/0x3f0
[   25.678711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.678788]  kthread+0x328/0x630
[   25.678857]  ret_from_fork+0x10/0x20
[   25.679258] 
[   25.679440] The buggy address belongs to the object at fff00000c7884f80
[   25.679440]  which belongs to the cache kmalloc-64 of size 64
[   25.679790] The buggy address is located 0 bytes to the right of
[   25.679790]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.680079] 
[   25.680431] The buggy address belongs to the physical page:
[   25.680699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.680816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.680935] page_type: f5(slab)
[   25.681224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.681442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.681703] page dumped because: kasan: bad access detected
[   25.681764] 
[   25.682029] Memory state around the buggy address:
[   25.682093]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682150]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682429] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.682505]                                      ^
[   25.682556]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.682994]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.683088] ==================================================================
[   25.605035] ==================================================================
[   25.605168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   25.605325] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.605469] 
[   25.605603] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.605876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.605979] Hardware name: linux,dummy-virt (DT)
[   25.606076] Call trace:
[   25.606163]  show_stack+0x20/0x38 (C)
[   25.606324]  dump_stack_lvl+0x8c/0xd0
[   25.606580]  print_report+0x118/0x608
[   25.607108]  kasan_report+0xdc/0x128
[   25.607834]  kasan_check_range+0x100/0x1a8
[   25.608035]  __kasan_check_write+0x20/0x30
[   25.608917]  kasan_atomics_helper+0x1128/0x4858
[   25.609473]  kasan_atomics+0x198/0x2e0
[   25.610032]  kunit_try_run_case+0x170/0x3f0
[   25.610521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.610655]  kthread+0x328/0x630
[   25.610755]  ret_from_fork+0x10/0x20
[   25.611839] 
[   25.611962] Allocated by task 265:
[   25.612085]  kasan_save_stack+0x3c/0x68
[   25.612512]  kasan_save_track+0x20/0x40
[   25.613309]  kasan_save_alloc_info+0x40/0x58
[   25.613684]  __kasan_kmalloc+0xd4/0xd8
[   25.614297]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.614551]  kasan_atomics+0xb8/0x2e0
[   25.614635]  kunit_try_run_case+0x170/0x3f0
[   25.614724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.614846]  kthread+0x328/0x630
[   25.614943]  ret_from_fork+0x10/0x20
[   25.616215] 
[   25.616706] The buggy address belongs to the object at fff00000c7884f80
[   25.616706]  which belongs to the cache kmalloc-64 of size 64
[   25.617571] The buggy address is located 0 bytes to the right of
[   25.617571]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.618612] 
[   25.619315] The buggy address belongs to the physical page:
[   25.619458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.620487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.620650] page_type: f5(slab)
[   25.621095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.621712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.621945] page dumped because: kasan: bad access detected
[   25.622150] 
[   25.622433] Memory state around the buggy address:
[   25.623127]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.623674]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.624117] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.624861]                                      ^
[   25.625164]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.625697]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.626493] ==================================================================
[   25.628755] ==================================================================
[   25.629605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   25.630575] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.631094] 
[   25.631376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.631620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.631691] Hardware name: linux,dummy-virt (DT)
[   25.631775] Call trace:
[   25.633183]  show_stack+0x20/0x38 (C)
[   25.633918]  dump_stack_lvl+0x8c/0xd0
[   25.634296]  print_report+0x118/0x608
[   25.634436]  kasan_report+0xdc/0x128
[   25.634557]  kasan_check_range+0x100/0x1a8
[   25.634666]  __kasan_check_write+0x20/0x30
[   25.634771]  kasan_atomics_helper+0x1190/0x4858
[   25.634905]  kasan_atomics+0x198/0x2e0
[   25.635031]  kunit_try_run_case+0x170/0x3f0
[   25.636964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.637421]  kthread+0x328/0x630
[   25.638066]  ret_from_fork+0x10/0x20
[   25.638220] 
[   25.638298] Allocated by task 265:
[   25.638450]  kasan_save_stack+0x3c/0x68
[   25.638568]  kasan_save_track+0x20/0x40
[   25.638792]  kasan_save_alloc_info+0x40/0x58
[   25.638912]  __kasan_kmalloc+0xd4/0xd8
[   25.639031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.639142]  kasan_atomics+0xb8/0x2e0
[   25.639243]  kunit_try_run_case+0x170/0x3f0
[   25.639345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.639493]  kthread+0x328/0x630
[   25.639581]  ret_from_fork+0x10/0x20
[   25.639663] 
[   25.639712] The buggy address belongs to the object at fff00000c7884f80
[   25.639712]  which belongs to the cache kmalloc-64 of size 64
[   25.639863] The buggy address is located 0 bytes to the right of
[   25.639863]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.640039] 
[   25.640094] The buggy address belongs to the physical page:
[   25.640169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.640298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.640433] page_type: f5(slab)
[   25.640538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.640721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.640905] page dumped because: kasan: bad access detected
[   25.641003] 
[   25.641050] Memory state around the buggy address:
[   25.641138]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641239]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641341] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.641465]                                      ^
[   25.641550]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.641655]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.641787] ==================================================================
[   25.765611] ==================================================================
[   25.765695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   25.765772] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.765833] 
[   25.765880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.765982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.766014] Hardware name: linux,dummy-virt (DT)
[   25.766054] Call trace:
[   25.766084]  show_stack+0x20/0x38 (C)
[   25.766147]  dump_stack_lvl+0x8c/0xd0
[   25.766205]  print_report+0x118/0x608
[   25.766262]  kasan_report+0xdc/0x128
[   25.766315]  kasan_check_range+0x100/0x1a8
[   25.768313]  __kasan_check_write+0x20/0x30
[   25.768811]  kasan_atomics_helper+0x16d0/0x4858
[   25.769114]  kasan_atomics+0x198/0x2e0
[   25.769578]  kunit_try_run_case+0x170/0x3f0
[   25.769788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.770020]  kthread+0x328/0x630
[   25.770094]  ret_from_fork+0x10/0x20
[   25.770266] 
[   25.770296] Allocated by task 265:
[   25.770576]  kasan_save_stack+0x3c/0x68
[   25.770640]  kasan_save_track+0x20/0x40
[   25.770691]  kasan_save_alloc_info+0x40/0x58
[   25.770738]  __kasan_kmalloc+0xd4/0xd8
[   25.770785]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.770845]  kasan_atomics+0xb8/0x2e0
[   25.770897]  kunit_try_run_case+0x170/0x3f0
[   25.770947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.771211]  kthread+0x328/0x630
[   25.771461]  ret_from_fork+0x10/0x20
[   25.771520] 
[   25.771556] The buggy address belongs to the object at fff00000c7884f80
[   25.771556]  which belongs to the cache kmalloc-64 of size 64
[   25.771628] The buggy address is located 0 bytes to the right of
[   25.771628]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.771701] 
[   25.771731] The buggy address belongs to the physical page:
[   25.771770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.772045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.772117] page_type: f5(slab)
[   25.772172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.772234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.772284] page dumped because: kasan: bad access detected
[   25.772327] 
[   25.772350] Memory state around the buggy address:
[   25.772421]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.772489]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.772545] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.772592]                                      ^
[   25.772636]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.772686]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.772733] ==================================================================
[   25.513483] ==================================================================
[   25.513690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   25.513820] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.513989] 
[   25.514129] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.514347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.514775] Hardware name: linux,dummy-virt (DT)
[   25.514865] Call trace:
[   25.514929]  show_stack+0x20/0x38 (C)
[   25.515154]  dump_stack_lvl+0x8c/0xd0
[   25.515586]  print_report+0x118/0x608
[   25.515804]  kasan_report+0xdc/0x128
[   25.515954]  kasan_check_range+0x100/0x1a8
[   25.516045]  __kasan_check_write+0x20/0x30
[   25.516147]  kasan_atomics_helper+0xe44/0x4858
[   25.516312]  kasan_atomics+0x198/0x2e0
[   25.516620]  kunit_try_run_case+0x170/0x3f0
[   25.517045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.517210]  kthread+0x328/0x630
[   25.517324]  ret_from_fork+0x10/0x20
[   25.517530] 
[   25.517954] Allocated by task 265:
[   25.518127]  kasan_save_stack+0x3c/0x68
[   25.518246]  kasan_save_track+0x20/0x40
[   25.518350]  kasan_save_alloc_info+0x40/0x58
[   25.518686]  __kasan_kmalloc+0xd4/0xd8
[   25.519055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.519173]  kasan_atomics+0xb8/0x2e0
[   25.519380]  kunit_try_run_case+0x170/0x3f0
[   25.519537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.519751]  kthread+0x328/0x630
[   25.520045]  ret_from_fork+0x10/0x20
[   25.520373] 
[   25.520445] The buggy address belongs to the object at fff00000c7884f80
[   25.520445]  which belongs to the cache kmalloc-64 of size 64
[   25.520792] The buggy address is located 0 bytes to the right of
[   25.520792]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.520972] 
[   25.521009] The buggy address belongs to the physical page:
[   25.521050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.521114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.521175] page_type: f5(slab)
[   25.521229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.521289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.521337] page dumped because: kasan: bad access detected
[   25.521376] 
[   25.521424] Memory state around the buggy address:
[   25.521469]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521521]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521572] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.521618]                                      ^
[   25.521659]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.521707]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.521751] ==================================================================
[   25.553708] ==================================================================
[   25.553886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   25.554045] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.554162] 
[   25.554241] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.554498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.554646] Hardware name: linux,dummy-virt (DT)
[   25.554761] Call trace:
[   25.554858]  show_stack+0x20/0x38 (C)
[   25.555040]  dump_stack_lvl+0x8c/0xd0
[   25.555200]  print_report+0x118/0x608
[   25.555371]  kasan_report+0xdc/0x128
[   25.555547]  kasan_check_range+0x100/0x1a8
[   25.555668]  __kasan_check_write+0x20/0x30
[   25.555763]  kasan_atomics_helper+0xf88/0x4858
[   25.555897]  kasan_atomics+0x198/0x2e0
[   25.555998]  kunit_try_run_case+0x170/0x3f0
[   25.556102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.556232]  kthread+0x328/0x630
[   25.556329]  ret_from_fork+0x10/0x20
[   25.556465] 
[   25.556524] Allocated by task 265:
[   25.556615]  kasan_save_stack+0x3c/0x68
[   25.556722]  kasan_save_track+0x20/0x40
[   25.556825]  kasan_save_alloc_info+0x40/0x58
[   25.556924]  __kasan_kmalloc+0xd4/0xd8
[   25.557020]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.557124]  kasan_atomics+0xb8/0x2e0
[   25.557223]  kunit_try_run_case+0x170/0x3f0
[   25.557321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.557434]  kthread+0x328/0x630
[   25.557526]  ret_from_fork+0x10/0x20
[   25.557622] 
[   25.557679] The buggy address belongs to the object at fff00000c7884f80
[   25.557679]  which belongs to the cache kmalloc-64 of size 64
[   25.557814] The buggy address is located 0 bytes to the right of
[   25.557814]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.557976] 
[   25.558043] The buggy address belongs to the physical page:
[   25.558122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.558253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.558439] page_type: f5(slab)
[   25.558532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.558594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.558644] page dumped because: kasan: bad access detected
[   25.558708] 
[   25.558792] Memory state around the buggy address:
[   25.559018]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559243]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559642] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.559961]                                      ^
[   25.560055]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.560169]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.560659] ==================================================================
[   25.653766] ==================================================================
[   25.653846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   25.653926] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.654443] 
[   25.654532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.654645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.654681] Hardware name: linux,dummy-virt (DT)
[   25.654722] Call trace:
[   25.654754]  show_stack+0x20/0x38 (C)
[   25.654836]  dump_stack_lvl+0x8c/0xd0
[   25.654902]  print_report+0x118/0x608
[   25.654958]  kasan_report+0xdc/0x128
[   25.655044]  kasan_check_range+0x100/0x1a8
[   25.655266]  __kasan_check_write+0x20/0x30
[   25.655650]  kasan_atomics_helper+0x126c/0x4858
[   25.655729]  kasan_atomics+0x198/0x2e0
[   25.655786]  kunit_try_run_case+0x170/0x3f0
[   25.655845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.656026]  kthread+0x328/0x630
[   25.656119]  ret_from_fork+0x10/0x20
[   25.656412] 
[   25.656444] Allocated by task 265:
[   25.656483]  kasan_save_stack+0x3c/0x68
[   25.656726]  kasan_save_track+0x20/0x40
[   25.656801]  kasan_save_alloc_info+0x40/0x58
[   25.657004]  __kasan_kmalloc+0xd4/0xd8
[   25.657216]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.657305]  kasan_atomics+0xb8/0x2e0
[   25.657366]  kunit_try_run_case+0x170/0x3f0
[   25.657429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.657486]  kthread+0x328/0x630
[   25.657527]  ret_from_fork+0x10/0x20
[   25.658018] 
[   25.658057] The buggy address belongs to the object at fff00000c7884f80
[   25.658057]  which belongs to the cache kmalloc-64 of size 64
[   25.658445] The buggy address is located 0 bytes to the right of
[   25.658445]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.658746] 
[   25.658781] The buggy address belongs to the physical page:
[   25.658832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.658903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.658965] page_type: f5(slab)
[   25.659019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.659484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.659549] page dumped because: kasan: bad access detected
[   25.659592] 
[   25.659699] Memory state around the buggy address:
[   25.659748]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659802]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659857] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.659907]                                      ^
[   25.659998]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.660241]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.660514] ==================================================================
[   25.794948] ==================================================================
[   25.795022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   25.795096] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.795160] 
[   25.795202] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.795304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.795339] Hardware name: linux,dummy-virt (DT)
[   25.795379] Call trace:
[   25.795422]  show_stack+0x20/0x38 (C)
[   25.795489]  dump_stack_lvl+0x8c/0xd0
[   25.795547]  print_report+0x118/0x608
[   25.795604]  kasan_report+0xdc/0x128
[   25.795658]  kasan_check_range+0x100/0x1a8
[   25.795716]  __kasan_check_write+0x20/0x30
[   25.795770]  kasan_atomics_helper+0x17ec/0x4858
[   25.795827]  kasan_atomics+0x198/0x2e0
[   25.795882]  kunit_try_run_case+0x170/0x3f0
[   25.795937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.795998]  kthread+0x328/0x630
[   25.796046]  ret_from_fork+0x10/0x20
[   25.796103] 
[   25.796128] Allocated by task 265:
[   25.796164]  kasan_save_stack+0x3c/0x68
[   25.796217]  kasan_save_track+0x20/0x40
[   25.796266]  kasan_save_alloc_info+0x40/0x58
[   25.796312]  __kasan_kmalloc+0xd4/0xd8
[   25.796356]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.796430]  kasan_atomics+0xb8/0x2e0
[   25.796483]  kunit_try_run_case+0x170/0x3f0
[   25.796530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.796583]  kthread+0x328/0x630
[   25.796623]  ret_from_fork+0x10/0x20
[   25.796667] 
[   25.796694] The buggy address belongs to the object at fff00000c7884f80
[   25.796694]  which belongs to the cache kmalloc-64 of size 64
[   25.796971] The buggy address is located 0 bytes to the right of
[   25.796971]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.797269] 
[   25.797301] The buggy address belongs to the physical page:
[   25.797343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.797828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.797900] page_type: f5(slab)
[   25.798028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.798175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.798244] page dumped because: kasan: bad access detected
[   25.798328] 
[   25.798379] Memory state around the buggy address:
[   25.798437]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.798542]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.798677] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.798787]                                      ^
[   25.798848]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.798903]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.798949] ==================================================================
[   25.684354] ==================================================================
[   25.684501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   25.684582] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.684641] 
[   25.684684] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.684781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.684814] Hardware name: linux,dummy-virt (DT)
[   25.684853] Call trace:
[   25.684903]  show_stack+0x20/0x38 (C)
[   25.684965]  dump_stack_lvl+0x8c/0xd0
[   25.685023]  print_report+0x118/0x608
[   25.685078]  kasan_report+0xdc/0x128
[   25.685131]  kasan_check_range+0x100/0x1a8
[   25.685184]  __kasan_check_write+0x20/0x30
[   25.685236]  kasan_atomics_helper+0x1414/0x4858
[   25.685292]  kasan_atomics+0x198/0x2e0
[   25.685344]  kunit_try_run_case+0x170/0x3f0
[   25.685782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.686153]  kthread+0x328/0x630
[   25.686230]  ret_from_fork+0x10/0x20
[   25.686293] 
[   25.686319] Allocated by task 265:
[   25.686788]  kasan_save_stack+0x3c/0x68
[   25.686871]  kasan_save_track+0x20/0x40
[   25.686938]  kasan_save_alloc_info+0x40/0x58
[   25.686990]  __kasan_kmalloc+0xd4/0xd8
[   25.687036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.687085]  kasan_atomics+0xb8/0x2e0
[   25.687168]  kunit_try_run_case+0x170/0x3f0
[   25.687232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.687300]  kthread+0x328/0x630
[   25.687342]  ret_from_fork+0x10/0x20
[   25.687434] 
[   25.687627] The buggy address belongs to the object at fff00000c7884f80
[   25.687627]  which belongs to the cache kmalloc-64 of size 64
[   25.687795] The buggy address is located 0 bytes to the right of
[   25.687795]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.688061] 
[   25.688240] The buggy address belongs to the physical page:
[   25.688468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.688556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.688619] page_type: f5(slab)
[   25.689000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.689069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.689121] page dumped because: kasan: bad access detected
[   25.689161] 
[   25.689186] Memory state around the buggy address:
[   25.689228]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.689492]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.689556] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.689709]                                      ^
[   25.689761]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.689861]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.689912] ==================================================================
[   25.738942] ==================================================================
[   25.739025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   25.739102] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.739162] 
[   25.739209] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.739310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.739344] Hardware name: linux,dummy-virt (DT)
[   25.739385] Call trace:
[   25.739430]  show_stack+0x20/0x38 (C)
[   25.739492]  dump_stack_lvl+0x8c/0xd0
[   25.739552]  print_report+0x118/0x608
[   25.739605]  kasan_report+0xdc/0x128
[   25.739660]  kasan_check_range+0x100/0x1a8
[   25.739717]  __kasan_check_write+0x20/0x30
[   25.739771]  kasan_atomics_helper+0x1644/0x4858
[   25.739827]  kasan_atomics+0x198/0x2e0
[   25.739879]  kunit_try_run_case+0x170/0x3f0
[   25.739935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.739995]  kthread+0x328/0x630
[   25.740045]  ret_from_fork+0x10/0x20
[   25.740102] 
[   25.740127] Allocated by task 265:
[   25.740161]  kasan_save_stack+0x3c/0x68
[   25.740215]  kasan_save_track+0x20/0x40
[   25.740262]  kasan_save_alloc_info+0x40/0x58
[   25.740306]  __kasan_kmalloc+0xd4/0xd8
[   25.740350]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.740395]  kasan_atomics+0xb8/0x2e0
[   25.743057]  kunit_try_run_case+0x170/0x3f0
[   25.743731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.743853]  kthread+0x328/0x630
[   25.744019]  ret_from_fork+0x10/0x20
[   25.744297] 
[   25.744443] The buggy address belongs to the object at fff00000c7884f80
[   25.744443]  which belongs to the cache kmalloc-64 of size 64
[   25.745075] The buggy address is located 0 bytes to the right of
[   25.745075]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.745207] 
[   25.745240] The buggy address belongs to the physical page:
[   25.745280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.746424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.746829] page_type: f5(slab)
[   25.746898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.747319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.747726] page dumped because: kasan: bad access detected
[   25.747774] 
[   25.747801] Memory state around the buggy address:
[   25.747849]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.747903]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.747958] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.748006]                                      ^
[   25.748048]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.748100]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.748147] ==================================================================
[   25.727827] ==================================================================
[   25.728268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   25.728432] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.728497] 
[   25.728542] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.728643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.728676] Hardware name: linux,dummy-virt (DT)
[   25.728717] Call trace:
[   25.728745]  show_stack+0x20/0x38 (C)
[   25.728809]  dump_stack_lvl+0x8c/0xd0
[   25.728866]  print_report+0x118/0x608
[   25.728923]  kasan_report+0xdc/0x128
[   25.728977]  __asan_report_load8_noabort+0x20/0x30
[   25.729034]  kasan_atomics_helper+0x3db0/0x4858
[   25.729092]  kasan_atomics+0x198/0x2e0
[   25.729145]  kunit_try_run_case+0x170/0x3f0
[   25.729202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.729264]  kthread+0x328/0x630
[   25.731179]  ret_from_fork+0x10/0x20
[   25.732236] 
[   25.732271] Allocated by task 265:
[   25.732313]  kasan_save_stack+0x3c/0x68
[   25.732385]  kasan_save_track+0x20/0x40
[   25.732449]  kasan_save_alloc_info+0x40/0x58
[   25.733042]  __kasan_kmalloc+0xd4/0xd8
[   25.733345]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.733614]  kasan_atomics+0xb8/0x2e0
[   25.734188]  kunit_try_run_case+0x170/0x3f0
[   25.734496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.734574]  kthread+0x328/0x630
[   25.734621]  ret_from_fork+0x10/0x20
[   25.734926] 
[   25.735149] The buggy address belongs to the object at fff00000c7884f80
[   25.735149]  which belongs to the cache kmalloc-64 of size 64
[   25.735581] The buggy address is located 0 bytes to the right of
[   25.735581]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.736193] 
[   25.736529] The buggy address belongs to the physical page:
[   25.736745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.736855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.736925] page_type: f5(slab)
[   25.736979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.737040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.737091] page dumped because: kasan: bad access detected
[   25.737131] 
[   25.737155] Memory state around the buggy address:
[   25.737199]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.737342]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.737407] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.737479]                                      ^
[   25.737548]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.737629]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.737683] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure Automatically assigned
[   24.752725] ==================================================================
[   24.752947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   24.753121] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261
[   24.753601] 
[   24.753726] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.754018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.754220] Hardware name: linux,dummy-virt (DT)
[   24.754544] Call trace:
[   24.754607]  show_stack+0x20/0x38 (C)
[   24.754869]  dump_stack_lvl+0x8c/0xd0
[   24.755044]  print_report+0x118/0x608
[   24.755339]  kasan_report+0xdc/0x128
[   24.755576]  kasan_check_range+0x100/0x1a8
[   24.755833]  __kasan_check_write+0x20/0x30
[   24.756067]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   24.756529]  kasan_bitops_generic+0x110/0x1c8
[   24.756648]  kunit_try_run_case+0x170/0x3f0
[   24.756831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.757124]  kthread+0x328/0x630
[   24.757441]  ret_from_fork+0x10/0x20
[   24.757565] 
[   24.757876] Allocated by task 261:
[   24.757948]  kasan_save_stack+0x3c/0x68
[   24.758061]  kasan_save_track+0x20/0x40
[   24.758243]  kasan_save_alloc_info+0x40/0x58
[   24.758469]  __kasan_kmalloc+0xd4/0xd8
[   24.758678]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.758739]  kasan_bitops_generic+0xa0/0x1c8
[   24.758885]  kunit_try_run_case+0x170/0x3f0
[   24.759082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.759180]  kthread+0x328/0x630
[   24.759249]  ret_from_fork+0x10/0x20
[   24.759333] 
[   24.759392] The buggy address belongs to the object at fff00000c66b10e0
[   24.759392]  which belongs to the cache kmalloc-16 of size 16
[   24.759940] The buggy address is located 8 bytes inside of
[   24.759940]  allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9)
[   24.760274] 
[   24.760374] The buggy address belongs to the physical page:
[   24.760597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   24.760934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.761213] page_type: f5(slab)
[   24.761416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.761680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.761800] page dumped because: kasan: bad access detected
[   24.761890] 
[   24.762258] Memory state around the buggy address:
[   24.762439]  fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   24.762540]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.762652] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   24.762757]                                                           ^
[   24.763031]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.763281]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.763609] ==================================================================
[   24.855332] ==================================================================
[   24.855470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   24.855605] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261
[   24.855783] 
[   24.855931] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.856238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.856309] Hardware name: linux,dummy-virt (DT)
[   24.856600]  dump_stack_lvl+0x8c/0xd0
[   24.856909]  kasan_report+0xdc/0x128
[   24.857783]  kunit_try_run_case+0x170/0x3f0
[   24.858191]  ret_from_fork+0x10/0x20
[   24.858313] 
[   24.861377]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.864449] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261
[   24.865271]  dump_stack_lvl+0x8c/0xd0
[   24.865789]  __kasan_check_write+0x20/0x30
[   24.866492]  kthread+0x328/0x630
[   24.867045]  kasan_save_track+0x20/0x40
[   24.867263]  __kasan_kmalloc+0xd4/0xd8
[   24.867539]  kunit_try_run_case+0x170/0x3f0
[   24.868377] 
[   24.868608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   24.869527] Memory state around the buggy address:
[   24.870357]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.872097] ==================================================================
[   24.767294] ==================================================================
[   24.767468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   24.767622] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261
[   24.767735] 
[   24.767827] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.768137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.768233] Hardware name: linux,dummy-virt (DT)
[   24.768322] Call trace:
[   24.768382]  show_stack+0x20/0x38 (C)
[   24.768530]  dump_stack_lvl+0x8c/0xd0
[   24.768657]  print_report+0x118/0x608
[   24.768782]  kasan_report+0xdc/0x128
[   24.768899]  __asan_report_load8_noabort+0x20/0x30
[   24.769032]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   24.769222]  kasan_bitops_generic+0x110/0x1c8
[   24.769389]  kunit_try_run_case+0x170/0x3f0
[   24.769542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.769731]  kthread+0x328/0x630
[   24.769847]  ret_from_fork+0x10/0x20
[   24.769971] 
[   24.770026] Allocated by task 261:
[   24.770132]  kasan_save_stack+0x3c/0x68
[   24.770277]  kasan_save_track+0x20/0x40
[   24.770441]  kasan_save_alloc_info+0x40/0x58
[   24.770539]  __kasan_kmalloc+0xd4/0xd8
[   24.770636]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.770719]  kasan_bitops_generic+0xa0/0x1c8
[   24.770810]  kunit_try_run_case+0x170/0x3f0
[   24.770912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.771029]  kthread+0x328/0x630
[   24.771133]  ret_from_fork+0x10/0x20
[   24.771271] 
[   24.771324] The buggy address belongs to the object at fff00000c66b10e0
[   24.771324]  which belongs to the cache kmalloc-16 of size 16
[   24.771476] The buggy address is located 8 bytes inside of
[   24.771476]  allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9)
[   24.771618] 
[   24.771674] The buggy address belongs to the physical page:
[   24.771757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   24.771879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.771984] page_type: f5(slab)
[   24.772102] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.772242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.772391] page dumped because: kasan: bad access detected
[   24.772529] 
[   24.772582] Memory state around the buggy address:
[   24.772664]  fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   24.773081]                                                           ^
[   24.775828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.777168]  kunit_try_run_case+0x170/0x3f0
[   24.777440]  kthread+0x328/0x630
[   24.777537]  ret_from_fork+0x10/0x20
[   24.777645] 
[   24.777698] Allocated by task 261:
[   24.777767]  kasan_save_stack+0x3c/0x68
[   24.778243]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.780571] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   24.782466] 
[   24.783008] Call trace:
[   24.783748]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   24.784609] 
[   24.785147]  __kasan_kmalloc+0xd4/0xd8
[   24.786126] The buggy address is located 8 bytes inside of
[   24.786126]  allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9)
[   24.789249]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.791381] 
[   24.791487] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.793607]  __kasan_check_write+0x20/0x30
[   24.794109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.795261]  kasan_save_track+0x20/0x40
[   24.797631] 
[   24.798747] page dumped because: kasan: bad access detected
[   24.799100]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.800930] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261
[   24.801380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.802265]  kasan_report+0xdc/0x128
[   24.802770]  kasan_check_range+0x100/0x1a8
[   24.803233]  kasan_bitops_generic+0x110/0x1c8
[   24.804490] Allocated by task 261:
[   24.804789]  kasan_save_alloc_info+0x40/0x58
[   24.805802]  kthread+0x328/0x630
[   24.805892]  ret_from_fork+0x10/0x20
[   24.805986] 
[   24.806061] The buggy address belongs to the object at fff00000c66b10e0
[   24.806061]  which belongs to the cache kmalloc-16 of size 16
[   24.807026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.807424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.809000]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.814379]  kunit_try_run_case+0x170/0x3f0
[   24.816489]  kthread+0x328/0x630
[   24.819108] page_type: f5(slab)
[   24.819345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.821288]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.825413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   24.826173] 
[   24.828028] Call trace:
[   24.828197]  show_stack+0x20/0x38 (C)
[   24.828668]  print_report+0x118/0x608
[   24.829734]  __kasan_check_write+0x20/0x30
[   24.830572]  kasan_bitops_generic+0x110/0x1c8
[   24.832298]  ret_from_fork+0x10/0x20
[   24.833179]  kasan_save_stack+0x3c/0x68
[   24.833871]  kasan_save_alloc_info+0x40/0x58
[   24.835090] 
[   24.835150] The buggy address belongs to the object at fff00000c66b10e0
[   24.835150]  which belongs to the cache kmalloc-16 of size 16
[   24.836767] page_type: f5(slab)
[   24.837148] page dumped because: kasan: bad access detected
[   24.838652]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.843655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure Automatically assigned
[   24.715853] ==================================================================
[   24.716181] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   24.716380] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259
[   24.716513] 
[   24.716608] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.716832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.716904] Hardware name: linux,dummy-virt (DT)
[   24.716988] Call trace:
[   24.717055]  show_stack+0x20/0x38 (C)
[   24.718969]  dump_stack_lvl+0x8c/0xd0
[   24.719380]  print_report+0x118/0x608
[   24.719525]  kasan_report+0xdc/0x128
[   24.719862]  __asan_report_load1_noabort+0x20/0x30
[   24.720120]  strnlen+0x80/0x88
[   24.720248]  kasan_strings+0x478/0xb00
[   24.720367]  kunit_try_run_case+0x170/0x3f0
[   24.720648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.721268]  kthread+0x328/0x630
[   24.721880]  ret_from_fork+0x10/0x20
[   24.722576] 
[   24.723012] Allocated by task 259:
[   24.723098]  kasan_save_stack+0x3c/0x68
[   24.723224]  kasan_save_track+0x20/0x40
[   24.723317]  kasan_save_alloc_info+0x40/0x58
[   24.723680]  __kasan_kmalloc+0xd4/0xd8
[   24.724570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.724736]  kasan_strings+0xc8/0xb00
[   24.724843]  kunit_try_run_case+0x170/0x3f0
[   24.724963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.725077]  kthread+0x328/0x630
[   24.725167]  ret_from_fork+0x10/0x20
[   24.725260] 
[   24.725980] Freed by task 259:
[   24.726071]  kasan_save_stack+0x3c/0x68
[   24.726602]  kasan_save_track+0x20/0x40
[   24.726773]  kasan_save_free_info+0x4c/0x78
[   24.726896]  __kasan_slab_free+0x6c/0x98
[   24.727009]  kfree+0x214/0x3c8
[   24.727102]  kasan_strings+0x24c/0xb00
[   24.727226]  kunit_try_run_case+0x170/0x3f0
[   24.727336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.727534]  kthread+0x328/0x630
[   24.727695]  ret_from_fork+0x10/0x20
[   24.728012] 
[   24.728135] The buggy address belongs to the object at fff00000c7876240
[   24.728135]  which belongs to the cache kmalloc-32 of size 32
[   24.728489] The buggy address is located 16 bytes inside of
[   24.728489]  freed 32-byte region [fff00000c7876240, fff00000c7876260)
[   24.728756] 
[   24.728911] The buggy address belongs to the physical page:
[   24.728996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876
[   24.729160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.729674] page_type: f5(slab)
[   24.729809] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.729998] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.730318] page dumped because: kasan: bad access detected
[   24.730469] 
[   24.730523] Memory state around the buggy address:
[   24.730575]  fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.730633]  fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.730683] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.730728]                                                  ^
[   24.730773]  fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.730835]  fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.730884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   24.569752] ==================================================================
[   24.569956] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   24.570129] Read of size 1 at addr ffff800080ac7b4a by task kunit_try_catch/253
[   24.570265] 
[   24.570360] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.570605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.570680] Hardware name: linux,dummy-virt (DT)
[   24.570763] Call trace:
[   24.570834]  show_stack+0x20/0x38 (C)
[   24.570971]  dump_stack_lvl+0x8c/0xd0
[   24.571102]  print_report+0x310/0x608
[   24.571223]  kasan_report+0xdc/0x128
[   24.571346]  __asan_report_load1_noabort+0x20/0x30
[   24.571473]  kasan_alloca_oob_right+0x2dc/0x340
[   24.571587]  kunit_try_run_case+0x170/0x3f0
[   24.571716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.571896]  kthread+0x328/0x630
[   24.572011]  ret_from_fork+0x10/0x20
[   24.572138] 
[   24.572216] The buggy address belongs to stack of task kunit_try_catch/253
[   24.572364] 
[   24.572437] The buggy address belongs to the virtual mapping at
[   24.572437]  [ffff800080ac0000, ffff800080ac9000) created by:
[   24.572437]  kernel_clone+0x150/0x7a8
[   24.572589] 
[   24.572942] The buggy address belongs to the physical page:
[   24.573030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.573149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.573830] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.574011] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.574171] page dumped because: kasan: bad access detected
[   24.574302] 
[   24.574470] Memory state around the buggy address:
[   24.574572]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.574951]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.575105] >ffff800080ac7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   24.575291]                                               ^
[   24.575575]  ffff800080ac7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   24.575684]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   24.576211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure Automatically assigned
[   24.694265] ==================================================================
[   24.695464] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   24.695736] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259
[   24.696152] 
[   24.696705] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.697182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.697274] Hardware name: linux,dummy-virt (DT)
[   24.697362] Call trace:
[   24.697630]  show_stack+0x20/0x38 (C)
[   24.697903]  dump_stack_lvl+0x8c/0xd0
[   24.698286]  print_report+0x118/0x608
[   24.698423]  kasan_report+0xdc/0x128
[   24.698552]  __asan_report_load1_noabort+0x20/0x30
[   24.698670]  strlen+0xa8/0xb0
[   24.698759]  kasan_strings+0x418/0xb00
[   24.698880]  kunit_try_run_case+0x170/0x3f0
[   24.699002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.699676]  kthread+0x328/0x630
[   24.700274]  ret_from_fork+0x10/0x20
[   24.700582] 
[   24.700697] Allocated by task 259:
[   24.700894]  kasan_save_stack+0x3c/0x68
[   24.701007]  kasan_save_track+0x20/0x40
[   24.701354]  kasan_save_alloc_info+0x40/0x58
[   24.701472]  __kasan_kmalloc+0xd4/0xd8
[   24.701780]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.701887]  kasan_strings+0xc8/0xb00
[   24.702246]  kunit_try_run_case+0x170/0x3f0
[   24.702584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.702955]  kthread+0x328/0x630
[   24.703058]  ret_from_fork+0x10/0x20
[   24.703368] 
[   24.703517] Freed by task 259:
[   24.703851]  kasan_save_stack+0x3c/0x68
[   24.704009]  kasan_save_track+0x20/0x40
[   24.704541]  kasan_save_free_info+0x4c/0x78
[   24.704707]  __kasan_slab_free+0x6c/0x98
[   24.704812]  kfree+0x214/0x3c8
[   24.704917]  kasan_strings+0x24c/0xb00
[   24.705011]  kunit_try_run_case+0x170/0x3f0
[   24.705112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.705804]  kthread+0x328/0x630
[   24.705936]  ret_from_fork+0x10/0x20
[   24.706109] 
[   24.706303] The buggy address belongs to the object at fff00000c7876240
[   24.706303]  which belongs to the cache kmalloc-32 of size 32
[   24.706653] The buggy address is located 16 bytes inside of
[   24.706653]  freed 32-byte region [fff00000c7876240, fff00000c7876260)
[   24.706788] 
[   24.706842] The buggy address belongs to the physical page:
[   24.706913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876
[   24.707041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.707177] page_type: f5(slab)
[   24.707284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.707844] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.708254] page dumped because: kasan: bad access detected
[   24.708594] 
[   24.708681] Memory state around the buggy address:
[   24.708911]  fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.709161]  fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.709424] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.709608]                                                  ^
[   24.710328]  fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.710875]  fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.710985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   24.679852] ==================================================================
[   24.680075] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   24.680272] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259
[   24.680444] 
[   24.680532] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.680785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.680858] Hardware name: linux,dummy-virt (DT)
[   24.680947] Call trace:
[   24.681010]  show_stack+0x20/0x38 (C)
[   24.681234]  dump_stack_lvl+0x8c/0xd0
[   24.681419]  print_report+0x118/0x608
[   24.681565]  kasan_report+0xdc/0x128
[   24.681673]  __asan_report_load1_noabort+0x20/0x30
[   24.681811]  kasan_strings+0x95c/0xb00
[   24.681964]  kunit_try_run_case+0x170/0x3f0
[   24.682088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.682263]  kthread+0x328/0x630
[   24.682515]  ret_from_fork+0x10/0x20
[   24.682653] 
[   24.682684] Allocated by task 259:
[   24.682757]  kasan_save_stack+0x3c/0x68
[   24.682863]  kasan_save_track+0x20/0x40
[   24.682948]  kasan_save_alloc_info+0x40/0x58
[   24.683237]  __kasan_kmalloc+0xd4/0xd8
[   24.683347]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.683712]  kasan_strings+0xc8/0xb00
[   24.684013]  kunit_try_run_case+0x170/0x3f0
[   24.684132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.684254]  kthread+0x328/0x630
[   24.684341]  ret_from_fork+0x10/0x20
[   24.684637] 
[   24.684722] Freed by task 259:
[   24.685032]  kasan_save_stack+0x3c/0x68
[   24.685163]  kasan_save_track+0x20/0x40
[   24.685264]  kasan_save_free_info+0x4c/0x78
[   24.685554]  __kasan_slab_free+0x6c/0x98
[   24.685688]  kfree+0x214/0x3c8
[   24.685782]  kasan_strings+0x24c/0xb00
[   24.685889]  kunit_try_run_case+0x170/0x3f0
[   24.685999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.686111]  kthread+0x328/0x630
[   24.686199]  ret_from_fork+0x10/0x20
[   24.686300] 
[   24.686950] The buggy address belongs to the object at fff00000c7876240
[   24.686950]  which belongs to the cache kmalloc-32 of size 32
[   24.687114] The buggy address is located 16 bytes inside of
[   24.687114]  freed 32-byte region [fff00000c7876240, fff00000c7876260)
[   24.687254] 
[   24.687314] The buggy address belongs to the physical page:
[   24.688052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876
[   24.688466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.688794] page_type: f5(slab)
[   24.688902] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.689733] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.689911] page dumped because: kasan: bad access detected
[   24.690151] 
[   24.690412] Memory state around the buggy address:
[   24.690559]  fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.690963]  fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.691081] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.691174]                                                  ^
[   24.691479]  fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.691818]  fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.692047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   24.669352] ==================================================================
[   24.669526] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   24.669679] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259
[   24.669887] 
[   24.670006] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.670279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.670433] Hardware name: linux,dummy-virt (DT)
[   24.670525] Call trace:
[   24.670623]  show_stack+0x20/0x38 (C)
[   24.670801]  dump_stack_lvl+0x8c/0xd0
[   24.670979]  print_report+0x118/0x608
[   24.671148]  kasan_report+0xdc/0x128
[   24.671310]  __asan_report_load1_noabort+0x20/0x30
[   24.671490]  strcmp+0xc0/0xc8
[   24.671654]  kasan_strings+0x340/0xb00
[   24.671788]  kunit_try_run_case+0x170/0x3f0
[   24.671975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.672123]  kthread+0x328/0x630
[   24.672336]  ret_from_fork+0x10/0x20
[   24.672505] 
[   24.672562] Allocated by task 259:
[   24.672634]  kasan_save_stack+0x3c/0x68
[   24.672781]  kasan_save_track+0x20/0x40
[   24.672867]  kasan_save_alloc_info+0x40/0x58
[   24.672986]  __kasan_kmalloc+0xd4/0xd8
[   24.673077]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.673201]  kasan_strings+0xc8/0xb00
[   24.673414]  kunit_try_run_case+0x170/0x3f0
[   24.673591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.673742]  kthread+0x328/0x630
[   24.673864]  ret_from_fork+0x10/0x20
[   24.673955] 
[   24.674013] Freed by task 259:
[   24.674101]  kasan_save_stack+0x3c/0x68
[   24.674197]  kasan_save_track+0x20/0x40
[   24.674410]  kasan_save_free_info+0x4c/0x78
[   24.674513]  __kasan_slab_free+0x6c/0x98
[   24.674622]  kfree+0x214/0x3c8
[   24.674756]  kasan_strings+0x24c/0xb00
[   24.674939]  kunit_try_run_case+0x170/0x3f0
[   24.675126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.675252]  kthread+0x328/0x630
[   24.675443]  ret_from_fork+0x10/0x20
[   24.675570] 
[   24.675632] The buggy address belongs to the object at fff00000c7876240
[   24.675632]  which belongs to the cache kmalloc-32 of size 32
[   24.675777] The buggy address is located 16 bytes inside of
[   24.675777]  freed 32-byte region [fff00000c7876240, fff00000c7876260)
[   24.675974] 
[   24.676038] The buggy address belongs to the physical page:
[   24.676137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876
[   24.676295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.676436] page_type: f5(slab)
[   24.676601] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.676728] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.676868] page dumped because: kasan: bad access detected
[   24.677028] 
[   24.677109] Memory state around the buggy address:
[   24.677206]  fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.677327]  fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.677453] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.677563]                                                  ^
[   24.677666]  fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.677801]  fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.677911] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   24.629730] ==================================================================
[   24.629926] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   24.630110] Read of size 1 at addr fff00000c78760d8 by task kunit_try_catch/257
[   24.630246] 
[   24.630351] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.630578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.630761] Hardware name: linux,dummy-virt (DT)
[   24.630869] Call trace:
[   24.630930]  show_stack+0x20/0x38 (C)
[   24.631086]  dump_stack_lvl+0x8c/0xd0
[   24.631214]  print_report+0x118/0x608
[   24.631359]  kasan_report+0xdc/0x128
[   24.631496]  __asan_report_load1_noabort+0x20/0x30
[   24.631640]  memcmp+0x198/0x1d8
[   24.631759]  kasan_memcmp+0x16c/0x300
[   24.631959]  kunit_try_run_case+0x170/0x3f0
[   24.632087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.632283]  kthread+0x328/0x630
[   24.632431]  ret_from_fork+0x10/0x20
[   24.632547] 
[   24.632590] Allocated by task 257:
[   24.632662]  kasan_save_stack+0x3c/0x68
[   24.632768]  kasan_save_track+0x20/0x40
[   24.632952]  kasan_save_alloc_info+0x40/0x58
[   24.633052]  __kasan_kmalloc+0xd4/0xd8
[   24.633174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.633285]  kasan_memcmp+0xbc/0x300
[   24.633374]  kunit_try_run_case+0x170/0x3f0
[   24.633494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.633665]  kthread+0x328/0x630
[   24.633754]  ret_from_fork+0x10/0x20
[   24.633842] 
[   24.633895] The buggy address belongs to the object at fff00000c78760c0
[   24.633895]  which belongs to the cache kmalloc-32 of size 32
[   24.634120] The buggy address is located 0 bytes to the right of
[   24.634120]  allocated 24-byte region [fff00000c78760c0, fff00000c78760d8)
[   24.634408] 
[   24.634477] The buggy address belongs to the physical page:
[   24.634590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876
[   24.634747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.634971] page_type: f5(slab)
[   24.635122] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.635236] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.635591] page dumped because: kasan: bad access detected
[   24.635698] 
[   24.635753] Memory state around the buggy address:
[   24.635811]  fff00000c7875f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.635866]  fff00000c7876000: 00 00 00 fc fc fc fc fc 00 00 00 03 fc fc fc fc
[   24.635918] >fff00000c7876080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.635964]                                                     ^
[   24.636010]  fff00000c7876100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.636059]  fff00000c7876180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.636105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   24.542243] ==================================================================
[   24.543056] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   24.543545] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/251
[   24.543671] 
[   24.543765] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.543992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.544068] Hardware name: linux,dummy-virt (DT)
[   24.544152] Call trace:
[   24.544214]  show_stack+0x20/0x38 (C)
[   24.544347]  dump_stack_lvl+0x8c/0xd0
[   24.544490]  print_report+0x310/0x608
[   24.544621]  kasan_report+0xdc/0x128
[   24.545275]  __asan_report_load1_noabort+0x20/0x30
[   24.545589]  kasan_alloca_oob_left+0x2b8/0x310
[   24.545725]  kunit_try_run_case+0x170/0x3f0
[   24.545848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.545985]  kthread+0x328/0x630
[   24.546202]  ret_from_fork+0x10/0x20
[   24.546350] 
[   24.546427] The buggy address belongs to stack of task kunit_try_catch/251
[   24.546796] 
[   24.546912] The buggy address belongs to the virtual mapping at
[   24.546912]  [ffff800080ac0000, ffff800080ac9000) created by:
[   24.546912]  kernel_clone+0x150/0x7a8
[   24.547127] 
[   24.547229] The buggy address belongs to the physical page:
[   24.547428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.547602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.547818] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.547965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.548063] page dumped because: kasan: bad access detected
[   24.548140] 
[   24.548182] Memory state around the buggy address:
[   24.548431]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.548536]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.548646] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   24.548800]                                                     ^
[   24.548952]  ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   24.549116]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   24.549262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   24.511432] ==================================================================
[   24.511935] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   24.512113] Read of size 1 at addr ffff800080a67c2a by task kunit_try_catch/249
[   24.512242] 
[   24.512327] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.512557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.512689] Hardware name: linux,dummy-virt (DT)
[   24.512976] Call trace:
[   24.513046]  show_stack+0x20/0x38 (C)
[   24.513177]  dump_stack_lvl+0x8c/0xd0
[   24.513447]  print_report+0x310/0x608
[   24.513579]  kasan_report+0xdc/0x128
[   24.513695]  __asan_report_load1_noabort+0x20/0x30
[   24.513823]  kasan_stack_oob+0x238/0x270
[   24.514414]  kunit_try_run_case+0x170/0x3f0
[   24.514564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.514704]  kthread+0x328/0x630
[   24.514865]  ret_from_fork+0x10/0x20
[   24.515016] 
[   24.515160] The buggy address belongs to stack of task kunit_try_catch/249
[   24.515370]  and is located at offset 138 in frame:
[   24.515496]  kasan_stack_oob+0x0/0x270
[   24.515757] 
[   24.515820] This frame has 4 objects:
[   24.516307]  [48, 49) '__assertion'
[   24.516441]  [64, 72) 'array'
[   24.516525]  [96, 112) '__assertion'
[   24.516779]  [128, 138) 'stack_array'
[   24.516885] 
[   24.517001] The buggy address belongs to the virtual mapping at
[   24.517001]  [ffff800080a60000, ffff800080a69000) created by:
[   24.517001]  kernel_clone+0x150/0x7a8
[   24.517541] 
[   24.517639] The buggy address belongs to the physical page:
[   24.517766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107256
[   24.517910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.518107] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.518293] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.518454] page dumped because: kasan: bad access detected
[   24.518540] 
[   24.518586] Memory state around the buggy address:
[   24.518919]  ffff800080a67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.519046]  ffff800080a67b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   24.519146] >ffff800080a67c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   24.519230]                                   ^
[   24.519309]  ffff800080a67c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   24.519454]  ffff800080a67d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   24.519560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   24.477477] ==================================================================
[   24.477670] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   24.477828] Read of size 1 at addr ffffa940d57b258d by task kunit_try_catch/245
[   24.477934] 
[   24.478029] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.478209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.478265] Hardware name: linux,dummy-virt (DT)
[   24.478336] Call trace:
[   24.478464]  show_stack+0x20/0x38 (C)
[   24.478588]  dump_stack_lvl+0x8c/0xd0
[   24.478699]  print_report+0x310/0x608
[   24.478793]  kasan_report+0xdc/0x128
[   24.478905]  __asan_report_load1_noabort+0x20/0x30
[   24.479017]  kasan_global_oob_right+0x230/0x270
[   24.479120]  kunit_try_run_case+0x170/0x3f0
[   24.479248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.479372]  kthread+0x328/0x630
[   24.479479]  ret_from_fork+0x10/0x20
[   24.479770] 
[   24.479885] The buggy address belongs to the variable:
[   24.479957]  global_array+0xd/0x40
[   24.480062] 
[   24.480205] The buggy address belongs to the virtual mapping at
[   24.480205]  [ffffa940d3950000, ffffa940d5871000) created by:
[   24.480205]  paging_init+0x66c/0x7d0
[   24.480419] 
[   24.480552] The buggy address belongs to the physical page:
[   24.480641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db2
[   24.480761] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   24.480920] raw: 03fffe0000002000 ffffc1ffc01f6c88 ffffc1ffc01f6c88 0000000000000000
[   24.481041] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.481131] page dumped because: kasan: bad access detected
[   24.481191] 
[   24.481230] Memory state around the buggy address:
[   24.481314]  ffffa940d57b2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.481478]  ffffa940d57b2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   24.481596] >ffffa940d57b2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   24.481675]                       ^
[   24.481743]  ffffa940d57b2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   24.481827]  ffffa940d57b2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.481911] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   24.440377] ==================================================================
[   24.440579] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   24.440778] Free of addr fff00000c7988001 by task kunit_try_catch/243
[   24.440889] 
[   24.440983] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.441201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.441271] Hardware name: linux,dummy-virt (DT)
[   24.441352] Call trace:
[   24.441432]  show_stack+0x20/0x38 (C)
[   24.441553]  dump_stack_lvl+0x8c/0xd0
[   24.441990]  print_report+0x118/0x608
[   24.442110]  kasan_report_invalid_free+0xc0/0xe8
[   24.442294]  __kasan_mempool_poison_object+0xfc/0x150
[   24.442525]  mempool_free+0x28c/0x328
[   24.442649]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   24.442790]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   24.442996]  kunit_try_run_case+0x170/0x3f0
[   24.443166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.443351]  kthread+0x328/0x630
[   24.443480]  ret_from_fork+0x10/0x20
[   24.443612] 
[   24.443869] The buggy address belongs to the physical page:
[   24.443951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107988
[   24.444084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.444179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.444297] page_type: f8(unknown)
[   24.444676] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.444810] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.444920] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.445035] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.445196] head: 0bfffe0000000002 ffffc1ffc31e6201 00000000ffffffff 00000000ffffffff
[   24.445353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.445513] page dumped because: kasan: bad access detected
[   24.445687] 
[   24.445760] Memory state around the buggy address:
[   24.445868]  fff00000c7987f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.445976]  fff00000c7987f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.446082] >fff00000c7988000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.446421]                    ^
[   24.446539]  fff00000c7988080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.446691]  fff00000c7988100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.446864] ==================================================================
[   24.411546] ==================================================================
[   24.411734] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   24.411958] Free of addr fff00000c66adb01 by task kunit_try_catch/241
[   24.412052] 
[   24.412136] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.412309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.412371] Hardware name: linux,dummy-virt (DT)
[   24.412471] Call trace:
[   24.412529]  show_stack+0x20/0x38 (C)
[   24.412669]  dump_stack_lvl+0x8c/0xd0
[   24.412847]  print_report+0x118/0x608
[   24.412968]  kasan_report_invalid_free+0xc0/0xe8
[   24.413095]  check_slab_allocation+0xfc/0x108
[   24.413219]  __kasan_mempool_poison_object+0x78/0x150
[   24.413345]  mempool_free+0x28c/0x328
[   24.413460]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   24.413580]  mempool_kmalloc_invalid_free+0xc0/0x118
[   24.414415]  kunit_try_run_case+0x170/0x3f0
[   24.414594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.414710]  kthread+0x328/0x630
[   24.414805]  ret_from_fork+0x10/0x20
[   24.414979] 
[   24.415017] Allocated by task 241:
[   24.415082]  kasan_save_stack+0x3c/0x68
[   24.415237]  kasan_save_track+0x20/0x40
[   24.415351]  kasan_save_alloc_info+0x40/0x58
[   24.415447]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.415578]  remove_element+0x130/0x1f8
[   24.415677]  mempool_alloc_preallocated+0x58/0xc0
[   24.415838]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   24.415942]  mempool_kmalloc_invalid_free+0xc0/0x118
[   24.416084]  kunit_try_run_case+0x170/0x3f0
[   24.416167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.416270]  kthread+0x328/0x630
[   24.416361]  ret_from_fork+0x10/0x20
[   24.416504] 
[   24.416579] The buggy address belongs to the object at fff00000c66adb00
[   24.416579]  which belongs to the cache kmalloc-128 of size 128
[   24.416784] The buggy address is located 1 bytes inside of
[   24.416784]  128-byte region [fff00000c66adb00, fff00000c66adb80)
[   24.416948] 
[   24.416996] The buggy address belongs to the physical page:
[   24.417074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad
[   24.417257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.417397] page_type: f5(slab)
[   24.417498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.417616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.417769] page dumped because: kasan: bad access detected
[   24.417861] 
[   24.417904] Memory state around the buggy address:
[   24.418018]  fff00000c66ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.418154]  fff00000c66ada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.418319] >fff00000c66adb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.418457]                    ^
[   24.418560]  fff00000c66adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.418736]  fff00000c66adc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.418849] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   24.311566] ==================================================================
[   24.311755] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.312385] Free of addr fff00000c66ad700 by task kunit_try_catch/235
[   24.312695] 
[   24.312802] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.313055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.313134] Hardware name: linux,dummy-virt (DT)
[   24.313230] Call trace:
[   24.313286]  show_stack+0x20/0x38 (C)
[   24.313431]  dump_stack_lvl+0x8c/0xd0
[   24.313541]  print_report+0x118/0x608
[   24.313663]  kasan_report_invalid_free+0xc0/0xe8
[   24.313788]  check_slab_allocation+0xd4/0x108
[   24.313908]  __kasan_mempool_poison_object+0x78/0x150
[   24.314376]  mempool_free+0x28c/0x328
[   24.315063]  mempool_double_free_helper+0x150/0x2e8
[   24.315293]  mempool_kmalloc_double_free+0xc0/0x118
[   24.315735]  kunit_try_run_case+0x170/0x3f0
[   24.315918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.316318]  kthread+0x328/0x630
[   24.316442]  ret_from_fork+0x10/0x20
[   24.316557] 
[   24.317091] Allocated by task 235:
[   24.317206]  kasan_save_stack+0x3c/0x68
[   24.317548]  kasan_save_track+0x20/0x40
[   24.317818]  kasan_save_alloc_info+0x40/0x58
[   24.317922]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.318025]  remove_element+0x130/0x1f8
[   24.318116]  mempool_alloc_preallocated+0x58/0xc0
[   24.318217]  mempool_double_free_helper+0x94/0x2e8
[   24.318313]  mempool_kmalloc_double_free+0xc0/0x118
[   24.318443]  kunit_try_run_case+0x170/0x3f0
[   24.318542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.318648]  kthread+0x328/0x630
[   24.318730]  ret_from_fork+0x10/0x20
[   24.318822] 
[   24.318868] Freed by task 235:
[   24.318934]  kasan_save_stack+0x3c/0x68
[   24.319072]  kasan_save_track+0x20/0x40
[   24.319151]  kasan_save_free_info+0x4c/0x78
[   24.319229]  __kasan_mempool_poison_object+0xc0/0x150
[   24.319358]  mempool_free+0x28c/0x328
[   24.319459]  mempool_double_free_helper+0x100/0x2e8
[   24.319545]  mempool_kmalloc_double_free+0xc0/0x118
[   24.319628]  kunit_try_run_case+0x170/0x3f0
[   24.319710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.319834]  kthread+0x328/0x630
[   24.319922]  ret_from_fork+0x10/0x20
[   24.319998] 
[   24.320053] The buggy address belongs to the object at fff00000c66ad700
[   24.320053]  which belongs to the cache kmalloc-128 of size 128
[   24.320201] The buggy address is located 0 bytes inside of
[   24.320201]  128-byte region [fff00000c66ad700, fff00000c66ad780)
[   24.320333] 
[   24.320390] The buggy address belongs to the physical page:
[   24.320496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad
[   24.320637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.320764] page_type: f5(slab)
[   24.320863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.320996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.321096] page dumped because: kasan: bad access detected
[   24.321160] 
[   24.321193] Memory state around the buggy address:
[   24.321250]  fff00000c66ad600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.321326]  fff00000c66ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.321454] >fff00000c66ad700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.321545]                    ^
[   24.321642]  fff00000c66ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.321730]  fff00000c66ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.321804] ==================================================================
[   24.349140] ==================================================================
[   24.349331] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.352089] Free of addr fff00000c78a4000 by task kunit_try_catch/237
[   24.352459] 
[   24.353071] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.354147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.354515] Hardware name: linux,dummy-virt (DT)
[   24.354603] Call trace:
[   24.354656]  show_stack+0x20/0x38 (C)
[   24.354782]  dump_stack_lvl+0x8c/0xd0
[   24.354897]  print_report+0x118/0x608
[   24.355009]  kasan_report_invalid_free+0xc0/0xe8
[   24.355124]  __kasan_mempool_poison_object+0x14c/0x150
[   24.355239]  mempool_free+0x28c/0x328
[   24.355346]  mempool_double_free_helper+0x150/0x2e8
[   24.357001]  mempool_kmalloc_large_double_free+0xc0/0x118
[   24.357854]  kunit_try_run_case+0x170/0x3f0
[   24.358441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.358581]  kthread+0x328/0x630
[   24.358669]  ret_from_fork+0x10/0x20
[   24.358772] 
[   24.358837] The buggy address belongs to the physical page:
[   24.358914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   24.359053] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.359185] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.359328] page_type: f8(unknown)
[   24.359441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.359572] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.359704] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.359830] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.359957] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   24.360085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.360569] page dumped because: kasan: bad access detected
[   24.360651] 
[   24.360694] Memory state around the buggy address:
[   24.360770]  fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.360879]  fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.361480] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.361580]                    ^
[   24.361626]  fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.361712]  fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.361793] ==================================================================
[   24.385008] ==================================================================
[   24.385189] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.385346] Free of addr fff00000c78a4000 by task kunit_try_catch/239
[   24.385467] 
[   24.385559] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.385775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.385844] Hardware name: linux,dummy-virt (DT)
[   24.385924] Call trace:
[   24.385977]  show_stack+0x20/0x38 (C)
[   24.386101]  dump_stack_lvl+0x8c/0xd0
[   24.386224]  print_report+0x118/0x608
[   24.386339]  kasan_report_invalid_free+0xc0/0xe8
[   24.387231]  __kasan_mempool_poison_pages+0xe0/0xe8
[   24.387517]  mempool_free+0x24c/0x328
[   24.387796]  mempool_double_free_helper+0x150/0x2e8
[   24.387922]  mempool_page_alloc_double_free+0xbc/0x118
[   24.388104]  kunit_try_run_case+0x170/0x3f0
[   24.388334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.388622]  kthread+0x328/0x630
[   24.389227]  ret_from_fork+0x10/0x20
[   24.389580] 
[   24.389694] The buggy address belongs to the physical page:
[   24.389774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   24.390297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.390526] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.391008] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.391272] page dumped because: kasan: bad access detected
[   24.391575] 
[   24.391642] Memory state around the buggy address:
[   24.391828]  fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.391935]  fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.392128] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.392472]                    ^
[   24.392553]  fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.393251]  fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.393497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   24.206603] ==================================================================
[   24.207618] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   24.208113] Read of size 1 at addr fff00000c78a4000 by task kunit_try_catch/229
[   24.208253] 
[   24.208347] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.209497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.209845] Hardware name: linux,dummy-virt (DT)
[   24.210088] Call trace:
[   24.210198]  show_stack+0x20/0x38 (C)
[   24.210789]  dump_stack_lvl+0x8c/0xd0
[   24.211112]  print_report+0x118/0x608
[   24.211436]  kasan_report+0xdc/0x128
[   24.211966]  __asan_report_load1_noabort+0x20/0x30
[   24.212113]  mempool_uaf_helper+0x314/0x340
[   24.212482]  mempool_kmalloc_large_uaf+0xc4/0x120
[   24.212887]  kunit_try_run_case+0x170/0x3f0
[   24.213016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.213428]  kthread+0x328/0x630
[   24.213986]  ret_from_fork+0x10/0x20
[   24.214501] 
[   24.214636] The buggy address belongs to the physical page:
[   24.214984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   24.215147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.215237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.215351] page_type: f8(unknown)
[   24.215453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.215569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.216681] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.217005] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.217252] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff
[   24.217614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.217729] page dumped because: kasan: bad access detected
[   24.218097] 
[   24.218278] Memory state around the buggy address:
[   24.218369]  fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.218740]  fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.219014] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.219090]                    ^
[   24.219149]  fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.219242]  fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.219336] ==================================================================
[   24.290697] ==================================================================
[   24.290995] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   24.291165] Read of size 1 at addr fff00000c78a4000 by task kunit_try_catch/233
[   24.291292] 
[   24.291390] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.291600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.292384] Hardware name: linux,dummy-virt (DT)
[   24.292626] Call trace:
[   24.292838]  show_stack+0x20/0x38 (C)
[   24.292980]  dump_stack_lvl+0x8c/0xd0
[   24.293256]  print_report+0x118/0x608
[   24.293380]  kasan_report+0xdc/0x128
[   24.293585]  __asan_report_load1_noabort+0x20/0x30
[   24.293694]  mempool_uaf_helper+0x314/0x340
[   24.293753]  mempool_page_alloc_uaf+0xc0/0x118
[   24.293809]  kunit_try_run_case+0x170/0x3f0
[   24.293868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.293928]  kthread+0x328/0x630
[   24.293978]  ret_from_fork+0x10/0x20
[   24.294037] 
[   24.294065] The buggy address belongs to the physical page:
[   24.294104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4
[   24.294170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.294253] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.294311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.294373] page dumped because: kasan: bad access detected
[   24.294457] 
[   24.294494] Memory state around the buggy address:
[   24.294564]  fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.294663]  fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.294763] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.294907]                    ^
[   24.294997]  fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.295106]  fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.295204] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   24.169725] ==================================================================
[   24.170018] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   24.170649] Read of size 1 at addr fff00000c66ad300 by task kunit_try_catch/227
[   24.170759] 
[   24.170858] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.171072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.171147] Hardware name: linux,dummy-virt (DT)
[   24.171233] Call trace:
[   24.171346]  show_stack+0x20/0x38 (C)
[   24.172017]  dump_stack_lvl+0x8c/0xd0
[   24.172535]  print_report+0x118/0x608
[   24.172741]  kasan_report+0xdc/0x128
[   24.172987]  __asan_report_load1_noabort+0x20/0x30
[   24.173610]  mempool_uaf_helper+0x314/0x340
[   24.173781]  mempool_kmalloc_uaf+0xc4/0x120
[   24.174004]  kunit_try_run_case+0x170/0x3f0
[   24.174206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.174348]  kthread+0x328/0x630
[   24.174928]  ret_from_fork+0x10/0x20
[   24.175175] 
[   24.175255] Allocated by task 227:
[   24.175435]  kasan_save_stack+0x3c/0x68
[   24.175735]  kasan_save_track+0x20/0x40
[   24.175823]  kasan_save_alloc_info+0x40/0x58
[   24.175908]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.176014]  remove_element+0x130/0x1f8
[   24.176474]  mempool_alloc_preallocated+0x58/0xc0
[   24.176675]  mempool_uaf_helper+0xa4/0x340
[   24.176913]  mempool_kmalloc_uaf+0xc4/0x120
[   24.177026]  kunit_try_run_case+0x170/0x3f0
[   24.177126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.177727]  kthread+0x328/0x630
[   24.177854]  ret_from_fork+0x10/0x20
[   24.178039] 
[   24.178114] Freed by task 227:
[   24.178371]  kasan_save_stack+0x3c/0x68
[   24.178762]  kasan_save_track+0x20/0x40
[   24.178910]  kasan_save_free_info+0x4c/0x78
[   24.179009]  __kasan_mempool_poison_object+0xc0/0x150
[   24.179104]  mempool_free+0x28c/0x328
[   24.179170]  mempool_uaf_helper+0x104/0x340
[   24.179240]  mempool_kmalloc_uaf+0xc4/0x120
[   24.180944]  kunit_try_run_case+0x170/0x3f0
[   24.183435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.183690]  kthread+0x328/0x630
[   24.183753]  ret_from_fork+0x10/0x20
[   24.183834] 
[   24.183867] The buggy address belongs to the object at fff00000c66ad300
[   24.183867]  which belongs to the cache kmalloc-128 of size 128
[   24.183943] The buggy address is located 0 bytes inside of
[   24.183943]  freed 128-byte region [fff00000c66ad300, fff00000c66ad380)
[   24.184059] 
[   24.184087] The buggy address belongs to the physical page:
[   24.184126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad
[   24.184191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.184252] page_type: f5(slab)
[   24.184302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.184360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.184426] page dumped because: kasan: bad access detected
[   24.184465] 
[   24.184486] Memory state around the buggy address:
[   24.184524]  fff00000c66ad200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.184573]  fff00000c66ad280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184620] >fff00000c66ad300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.184662]                    ^
[   24.184695]  fff00000c66ad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184741]  fff00000c66ad400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.184784] ==================================================================
[   24.244827] ==================================================================
[   24.245031] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   24.245182] Read of size 1 at addr fff00000c63de240 by task kunit_try_catch/231
[   24.245293] 
[   24.245382] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.245822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.246005] Hardware name: linux,dummy-virt (DT)
[   24.246094] Call trace:
[   24.246194]  show_stack+0x20/0x38 (C)
[   24.246382]  dump_stack_lvl+0x8c/0xd0
[   24.246477]  print_report+0x118/0x608
[   24.246538]  kasan_report+0xdc/0x128
[   24.246619]  __asan_report_load1_noabort+0x20/0x30
[   24.246678]  mempool_uaf_helper+0x314/0x340
[   24.246729]  mempool_slab_uaf+0xc0/0x118
[   24.246781]  kunit_try_run_case+0x170/0x3f0
[   24.246863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.246925]  kthread+0x328/0x630
[   24.246975]  ret_from_fork+0x10/0x20
[   24.247034] 
[   24.247059] Allocated by task 231:
[   24.247095]  kasan_save_stack+0x3c/0x68
[   24.247148]  kasan_save_track+0x20/0x40
[   24.247191]  kasan_save_alloc_info+0x40/0x58
[   24.247233]  __kasan_mempool_unpoison_object+0xbc/0x180
[   24.247281]  remove_element+0x16c/0x1f8
[   24.247324]  mempool_alloc_preallocated+0x58/0xc0
[   24.247368]  mempool_uaf_helper+0xa4/0x340
[   24.247446]  mempool_slab_uaf+0xc0/0x118
[   24.247550]  kunit_try_run_case+0x170/0x3f0
[   24.247630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.247714]  kthread+0x328/0x630
[   24.247788]  ret_from_fork+0x10/0x20
[   24.247871] 
[   24.247932] Freed by task 231:
[   24.248024]  kasan_save_stack+0x3c/0x68
[   24.248174]  kasan_save_track+0x20/0x40
[   24.248311]  kasan_save_free_info+0x4c/0x78
[   24.248427]  __kasan_mempool_poison_object+0xc0/0x150
[   24.248538]  mempool_free+0x28c/0x328
[   24.248637]  mempool_uaf_helper+0x104/0x340
[   24.248771]  mempool_slab_uaf+0xc0/0x118
[   24.248883]  kunit_try_run_case+0x170/0x3f0
[   24.249002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.249153]  kthread+0x328/0x630
[   24.249247]  ret_from_fork+0x10/0x20
[   24.249351] 
[   24.249423] The buggy address belongs to the object at fff00000c63de240
[   24.249423]  which belongs to the cache test_cache of size 123
[   24.249561] The buggy address is located 0 bytes inside of
[   24.249561]  freed 123-byte region [fff00000c63de240, fff00000c63de2bb)
[   24.249720] 
[   24.249773] The buggy address belongs to the physical page:
[   24.250437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   24.251124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.251303] page_type: f5(slab)
[   24.251416] raw: 0bfffe0000000000 fff00000c63dc000 dead000000000122 0000000000000000
[   24.251760] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   24.251845] page dumped because: kasan: bad access detected
[   24.251918] 
[   24.251960] Memory state around the buggy address:
[   24.252040]  fff00000c63de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.252176]  fff00000c63de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.252277] >fff00000c63de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   24.252752]                                            ^
[   24.252885]  fff00000c63de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.253006]  fff00000c63de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.253115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   24.100568] ==================================================================
[   24.100970] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   24.101146] Read of size 1 at addr fff00000c78a2001 by task kunit_try_catch/223
[   24.101262] 
[   24.101344] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.101557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.101615] Hardware name: linux,dummy-virt (DT)
[   24.101716] Call trace:
[   24.101802]  show_stack+0x20/0x38 (C)
[   24.101983]  dump_stack_lvl+0x8c/0xd0
[   24.102146]  print_report+0x118/0x608
[   24.102259]  kasan_report+0xdc/0x128
[   24.102438]  __asan_report_load1_noabort+0x20/0x30
[   24.102546]  mempool_oob_right_helper+0x2ac/0x2f0
[   24.102651]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   24.102765]  kunit_try_run_case+0x170/0x3f0
[   24.102933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.103096]  kthread+0x328/0x630
[   24.103221]  ret_from_fork+0x10/0x20
[   24.103384] 
[   24.103463] The buggy address belongs to the physical page:
[   24.103568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a0
[   24.103690] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.103795] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.103923] page_type: f8(unknown)
[   24.104013] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.104118] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.104213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.104308] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.104459] head: 0bfffe0000000002 ffffc1ffc31e2801 00000000ffffffff 00000000ffffffff
[   24.104568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.104690] page dumped because: kasan: bad access detected
[   24.104809] 
[   24.104877] Memory state around the buggy address:
[   24.104997]  fff00000c78a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.105108]  fff00000c78a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.105211] >fff00000c78a2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.105308]                    ^
[   24.105383]  fff00000c78a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.105499]  fff00000c78a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.105618] ==================================================================
[   24.076949] ==================================================================
[   24.077083] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   24.077200] Read of size 1 at addr fff00000c6394f73 by task kunit_try_catch/221
[   24.077261] 
[   24.077324] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.077448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.077480] Hardware name: linux,dummy-virt (DT)
[   24.077524] Call trace:
[   24.077555]  show_stack+0x20/0x38 (C)
[   24.077615]  dump_stack_lvl+0x8c/0xd0
[   24.077672]  print_report+0x118/0x608
[   24.077727]  kasan_report+0xdc/0x128
[   24.077780]  __asan_report_load1_noabort+0x20/0x30
[   24.077832]  mempool_oob_right_helper+0x2ac/0x2f0
[   24.077887]  mempool_kmalloc_oob_right+0xc4/0x120
[   24.077940]  kunit_try_run_case+0x170/0x3f0
[   24.077997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.078057]  kthread+0x328/0x630
[   24.078105]  ret_from_fork+0x10/0x20
[   24.078163] 
[   24.078185] Allocated by task 221:
[   24.078219]  kasan_save_stack+0x3c/0x68
[   24.078271]  kasan_save_track+0x20/0x40
[   24.078317]  kasan_save_alloc_info+0x40/0x58
[   24.078437]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.078538]  remove_element+0x130/0x1f8
[   24.078631]  mempool_alloc_preallocated+0x58/0xc0
[   24.078723]  mempool_oob_right_helper+0x98/0x2f0
[   24.078810]  mempool_kmalloc_oob_right+0xc4/0x120
[   24.078923]  kunit_try_run_case+0x170/0x3f0
[   24.078982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.079030]  kthread+0x328/0x630
[   24.079069]  ret_from_fork+0x10/0x20
[   24.079110] 
[   24.079141] The buggy address belongs to the object at fff00000c6394f00
[   24.079141]  which belongs to the cache kmalloc-128 of size 128
[   24.079211] The buggy address is located 0 bytes to the right of
[   24.079211]  allocated 115-byte region [fff00000c6394f00, fff00000c6394f73)
[   24.079279] 
[   24.079307] The buggy address belongs to the physical page:
[   24.079347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394
[   24.079442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.079505] page_type: f5(slab)
[   24.079557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.079616] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   24.079666] page dumped because: kasan: bad access detected
[   24.079704] 
[   24.079727] Memory state around the buggy address:
[   24.079767]  fff00000c6394e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.079817]  fff00000c6394e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.079866] >fff00000c6394f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.079910]                                                              ^
[   24.079956]  fff00000c6394f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.080003]  fff00000c6395000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.080048] ==================================================================
[   24.120636] ==================================================================
[   24.120900] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   24.121050] Read of size 1 at addr fff00000c63d22bb by task kunit_try_catch/225
[   24.121164] 
[   24.121247] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   24.121457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.121512] Hardware name: linux,dummy-virt (DT)
[   24.121577] Call trace:
[   24.121623]  show_stack+0x20/0x38 (C)
[   24.121740]  dump_stack_lvl+0x8c/0xd0
[   24.121843]  print_report+0x118/0x608
[   24.121980]  kasan_report+0xdc/0x128
[   24.122162]  __asan_report_load1_noabort+0x20/0x30
[   24.122307]  mempool_oob_right_helper+0x2ac/0x2f0
[   24.122760]  mempool_slab_oob_right+0xc0/0x118
[   24.123303]  kunit_try_run_case+0x170/0x3f0
[   24.123431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.124236]  kthread+0x328/0x630
[   24.124493]  ret_from_fork+0x10/0x20
[   24.125074] 
[   24.125169] Allocated by task 225:
[   24.125304]  kasan_save_stack+0x3c/0x68
[   24.125517]  kasan_save_track+0x20/0x40
[   24.125616]  kasan_save_alloc_info+0x40/0x58
[   24.125712]  __kasan_mempool_unpoison_object+0xbc/0x180
[   24.125828]  remove_element+0x16c/0x1f8
[   24.125922]  mempool_alloc_preallocated+0x58/0xc0
[   24.126024]  mempool_oob_right_helper+0x98/0x2f0
[   24.126122]  mempool_slab_oob_right+0xc0/0x118
[   24.126229]  kunit_try_run_case+0x170/0x3f0
[   24.127052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.127358]  kthread+0x328/0x630
[   24.128060]  ret_from_fork+0x10/0x20
[   24.128184] 
[   24.128342] The buggy address belongs to the object at fff00000c63d2240
[   24.128342]  which belongs to the cache test_cache of size 123
[   24.128589] The buggy address is located 0 bytes to the right of
[   24.128589]  allocated 123-byte region [fff00000c63d2240, fff00000c63d22bb)
[   24.129189] 
[   24.129291] The buggy address belongs to the physical page:
[   24.129420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d2
[   24.129860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.130009] page_type: f5(slab)
[   24.130112] raw: 0bfffe0000000000 fff00000c1764dc0 dead000000000122 0000000000000000
[   24.131088] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   24.131444] page dumped because: kasan: bad access detected
[   24.131563] 
[   24.131765] Memory state around the buggy address:
[   24.131967]  fff00000c63d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.132184]  fff00000c63d2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   24.132297] >fff00000c63d2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   24.132707]                                         ^
[   24.132970]  fff00000c63d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133141]  fff00000c63d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133444] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   23.477808] ==================================================================
[   23.478071] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   23.478294] Read of size 1 at addr fff00000c1764b40 by task kunit_try_catch/215
[   23.478508] 
[   23.478593] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   23.478808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.478909] Hardware name: linux,dummy-virt (DT)
[   23.479005] Call trace:
[   23.479077]  show_stack+0x20/0x38 (C)
[   23.479205]  dump_stack_lvl+0x8c/0xd0
[   23.479341]  print_report+0x118/0x608
[   23.479531]  kasan_report+0xdc/0x128
[   23.479655]  __kasan_check_byte+0x54/0x70
[   23.479811]  kmem_cache_destroy+0x34/0x218
[   23.479964]  kmem_cache_double_destroy+0x174/0x300
[   23.480093]  kunit_try_run_case+0x170/0x3f0
[   23.480223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.480353]  kthread+0x328/0x630
[   23.480479]  ret_from_fork+0x10/0x20
[   23.480604] 
[   23.480651] Allocated by task 215:
[   23.480728]  kasan_save_stack+0x3c/0x68
[   23.480832]  kasan_save_track+0x20/0x40
[   23.480930]  kasan_save_alloc_info+0x40/0x58
[   23.481025]  __kasan_slab_alloc+0xa8/0xb0
[   23.481124]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   23.481222]  __kmem_cache_create_args+0x178/0x280
[   23.481323]  kmem_cache_double_destroy+0xc0/0x300
[   23.481428]  kunit_try_run_case+0x170/0x3f0
[   23.481519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.481625]  kthread+0x328/0x630
[   23.481713]  ret_from_fork+0x10/0x20
[   23.481810] 
[   23.481864] Freed by task 215:
[   23.481931]  kasan_save_stack+0x3c/0x68
[   23.482120]  kasan_save_track+0x20/0x40
[   23.482220]  kasan_save_free_info+0x4c/0x78
[   23.482307]  __kasan_slab_free+0x6c/0x98
[   23.482480]  kmem_cache_free+0x260/0x470
[   23.482584]  slab_kmem_cache_release+0x38/0x50
[   23.482685]  kmem_cache_release+0x1c/0x30
[   23.482765]  kobject_put+0x17c/0x430
[   23.482913]  sysfs_slab_release+0x1c/0x30
[   23.482999]  kmem_cache_destroy+0x118/0x218
[   23.483090]  kmem_cache_double_destroy+0x128/0x300
[   23.483214]  kunit_try_run_case+0x170/0x3f0
[   23.483334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.483442]  kthread+0x328/0x630
[   23.483509]  ret_from_fork+0x10/0x20
[   23.483575] 
[   23.483654] The buggy address belongs to the object at fff00000c1764b40
[   23.483654]  which belongs to the cache kmem_cache of size 208
[   23.483814] The buggy address is located 0 bytes inside of
[   23.483814]  freed 208-byte region [fff00000c1764b40, fff00000c1764c10)
[   23.483965] 
[   23.484021] The buggy address belongs to the physical page:
[   23.484133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764
[   23.484298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.484507] page_type: f5(slab)
[   23.484635] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   23.484798] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   23.484892] page dumped because: kasan: bad access detected
[   23.484970] 
[   23.485058] Memory state around the buggy address:
[   23.485190]  fff00000c1764a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.485350]  fff00000c1764a80: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   23.485480] >fff00000c1764b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   23.485607]                                            ^
[   23.485698]  fff00000c1764b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.485848]  fff00000c1764c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.486016] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   22.894426] ==================================================================
[   22.895554] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   22.895740] Free of addr fff00000c725d001 by task kunit_try_catch/211
[   22.895843] 
[   22.895954] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.896487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.896663] Hardware name: linux,dummy-virt (DT)
[   22.896849] Call trace:
[   22.896945]  show_stack+0x20/0x38 (C)
[   22.897440]  dump_stack_lvl+0x8c/0xd0
[   22.897842]  print_report+0x118/0x608
[   22.898333]  kasan_report_invalid_free+0xc0/0xe8
[   22.898729]  check_slab_allocation+0xfc/0x108
[   22.898844]  __kasan_slab_pre_free+0x2c/0x48
[   22.898950]  kmem_cache_free+0xf0/0x470
[   22.899966]  kmem_cache_invalid_free+0x184/0x3c8
[   22.900368]  kunit_try_run_case+0x170/0x3f0
[   22.900975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.901169]  kthread+0x328/0x630
[   22.901728]  ret_from_fork+0x10/0x20
[   22.902623] 
[   22.902711] Allocated by task 211:
[   22.902784]  kasan_save_stack+0x3c/0x68
[   22.903582]  kasan_save_track+0x20/0x40
[   22.904220]  kasan_save_alloc_info+0x40/0x58
[   22.904541]  __kasan_slab_alloc+0xa8/0xb0
[   22.905004]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.905125]  kmem_cache_invalid_free+0x12c/0x3c8
[   22.905228]  kunit_try_run_case+0x170/0x3f0
[   22.905325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.905447]  kthread+0x328/0x630
[   22.905534]  ret_from_fork+0x10/0x20
[   22.905629] 
[   22.905682] The buggy address belongs to the object at fff00000c725d000
[   22.905682]  which belongs to the cache test_cache of size 200
[   22.905830] The buggy address is located 1 bytes inside of
[   22.905830]  200-byte region [fff00000c725d000, fff00000c725d0c8)
[   22.907480] 
[   22.907923] The buggy address belongs to the physical page:
[   22.908153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725d
[   22.908692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.909342] page_type: f5(slab)
[   22.910027] raw: 0bfffe0000000000 fff00000c787b140 dead000000000122 0000000000000000
[   22.910253] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   22.910572] page dumped because: kasan: bad access detected
[   22.910965] 
[   22.911005] Memory state around the buggy address:
[   22.911085]  fff00000c725cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.911180]  fff00000c725cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.911259] >fff00000c725d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.911329]                    ^
[   22.911392]  fff00000c725d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.911862]  fff00000c725d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.912081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   22.817620] ==================================================================
[   22.818482] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   22.818923] Free of addr fff00000c725b000 by task kunit_try_catch/209
[   22.819259] 
[   22.819366] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.819760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.819842] Hardware name: linux,dummy-virt (DT)
[   22.819946] Call trace:
[   22.820101]  show_stack+0x20/0x38 (C)
[   22.820258]  dump_stack_lvl+0x8c/0xd0
[   22.820392]  print_report+0x118/0x608
[   22.820970]  kasan_report_invalid_free+0xc0/0xe8
[   22.821272]  check_slab_allocation+0xd4/0x108
[   22.821578]  __kasan_slab_pre_free+0x2c/0x48
[   22.821872]  kmem_cache_free+0xf0/0x470
[   22.822661]  kmem_cache_double_free+0x190/0x3c8
[   22.822958]  kunit_try_run_case+0x170/0x3f0
[   22.823451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.823611]  kthread+0x328/0x630
[   22.823721]  ret_from_fork+0x10/0x20
[   22.823901] 
[   22.823950] Allocated by task 209:
[   22.824037]  kasan_save_stack+0x3c/0x68
[   22.824148]  kasan_save_track+0x20/0x40
[   22.824238]  kasan_save_alloc_info+0x40/0x58
[   22.824332]  __kasan_slab_alloc+0xa8/0xb0
[   22.824432]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.824534]  kmem_cache_double_free+0x12c/0x3c8
[   22.824634]  kunit_try_run_case+0x170/0x3f0
[   22.824725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.824832]  kthread+0x328/0x630
[   22.824911]  ret_from_fork+0x10/0x20
[   22.824996] 
[   22.825040] Freed by task 209:
[   22.825107]  kasan_save_stack+0x3c/0x68
[   22.825201]  kasan_save_track+0x20/0x40
[   22.825288]  kasan_save_free_info+0x4c/0x78
[   22.825382]  __kasan_slab_free+0x6c/0x98
[   22.826245]  kmem_cache_free+0x260/0x470
[   22.826800]  kmem_cache_double_free+0x140/0x3c8
[   22.827059]  kunit_try_run_case+0x170/0x3f0
[   22.827322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.827614]  kthread+0x328/0x630
[   22.827847]  ret_from_fork+0x10/0x20
[   22.828237] 
[   22.828294] The buggy address belongs to the object at fff00000c725b000
[   22.828294]  which belongs to the cache test_cache of size 200
[   22.829159] The buggy address is located 0 bytes inside of
[   22.829159]  200-byte region [fff00000c725b000, fff00000c725b0c8)
[   22.829437] 
[   22.829913] The buggy address belongs to the physical page:
[   22.830005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725b
[   22.830157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.830438] page_type: f5(slab)
[   22.830606] raw: 0bfffe0000000000 fff00000c787b000 dead000000000122 0000000000000000
[   22.830878] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   22.831088] page dumped because: kasan: bad access detected
[   22.831159] 
[   22.831207] Memory state around the buggy address:
[   22.831275]  fff00000c725af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.831394]  fff00000c725af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.831515] >fff00000c725b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.831650]                    ^
[   22.831726]  fff00000c725b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   22.831831]  fff00000c725b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.831922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   22.531664] ==================================================================
[   22.531915] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   22.532561] Read of size 1 at addr fff00000c787b0c8 by task kunit_try_catch/207
[   22.532744] 
[   22.532879] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.533093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.533156] Hardware name: linux,dummy-virt (DT)
[   22.533239] Call trace:
[   22.533297]  show_stack+0x20/0x38 (C)
[   22.533441]  dump_stack_lvl+0x8c/0xd0
[   22.533567]  print_report+0x118/0x608
[   22.533686]  kasan_report+0xdc/0x128
[   22.533800]  __asan_report_load1_noabort+0x20/0x30
[   22.533922]  kmem_cache_oob+0x344/0x430
[   22.534034]  kunit_try_run_case+0x170/0x3f0
[   22.534160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.534297]  kthread+0x328/0x630
[   22.534458]  ret_from_fork+0x10/0x20
[   22.534623] 
[   22.534903] Allocated by task 207:
[   22.534973]  kasan_save_stack+0x3c/0x68
[   22.535062]  kasan_save_track+0x20/0x40
[   22.535147]  kasan_save_alloc_info+0x40/0x58
[   22.535522]  __kasan_slab_alloc+0xa8/0xb0
[   22.535636]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.535772]  kmem_cache_oob+0x12c/0x430
[   22.535876]  kunit_try_run_case+0x170/0x3f0
[   22.536330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.536458]  kthread+0x328/0x630
[   22.536793]  ret_from_fork+0x10/0x20
[   22.536931] 
[   22.536999] The buggy address belongs to the object at fff00000c787b000
[   22.536999]  which belongs to the cache test_cache of size 200
[   22.537184] The buggy address is located 0 bytes to the right of
[   22.537184]  allocated 200-byte region [fff00000c787b000, fff00000c787b0c8)
[   22.537334] 
[   22.537386] The buggy address belongs to the physical page:
[   22.537484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787b
[   22.537893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.538090] page_type: f5(slab)
[   22.538184] raw: 0bfffe0000000000 fff00000c5696dc0 dead000000000122 0000000000000000
[   22.538414] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   22.538551] page dumped because: kasan: bad access detected
[   22.538666] 
[   22.538731] Memory state around the buggy address:
[   22.538826]  fff00000c787af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.538918]  fff00000c787b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.539019] >fff00000c787b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.539100]                                               ^
[   22.539214]  fff00000c787b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.539757]  fff00000c787b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.539932] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   22.431681] ==================================================================
[   22.432087] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   22.432620] Read of size 8 at addr fff00000c669e640 by task kunit_try_catch/200
[   22.432787] 
[   22.433072] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.433556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.433630] Hardware name: linux,dummy-virt (DT)
[   22.433716] Call trace:
[   22.433778]  show_stack+0x20/0x38 (C)
[   22.433911]  dump_stack_lvl+0x8c/0xd0
[   22.434383]  print_report+0x118/0x608
[   22.434532]  kasan_report+0xdc/0x128
[   22.434664]  __asan_report_load8_noabort+0x20/0x30
[   22.434793]  workqueue_uaf+0x480/0x4a8
[   22.434907]  kunit_try_run_case+0x170/0x3f0
[   22.435012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.435612]  kthread+0x328/0x630
[   22.436111]  ret_from_fork+0x10/0x20
[   22.436347] 
[   22.436791] Allocated by task 200:
[   22.436927]  kasan_save_stack+0x3c/0x68
[   22.437049]  kasan_save_track+0x20/0x40
[   22.437513]  kasan_save_alloc_info+0x40/0x58
[   22.437694]  __kasan_kmalloc+0xd4/0xd8
[   22.437811]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.438448]  workqueue_uaf+0x13c/0x4a8
[   22.438669]  kunit_try_run_case+0x170/0x3f0
[   22.439422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.439646]  kthread+0x328/0x630
[   22.439829]  ret_from_fork+0x10/0x20
[   22.439922] 
[   22.440456] Freed by task 44:
[   22.440540]  kasan_save_stack+0x3c/0x68
[   22.441032]  kasan_save_track+0x20/0x40
[   22.441146]  kasan_save_free_info+0x4c/0x78
[   22.441789]  __kasan_slab_free+0x6c/0x98
[   22.442086]  kfree+0x214/0x3c8
[   22.442188]  workqueue_uaf_work+0x18/0x30
[   22.442284]  process_one_work+0x530/0xf98
[   22.443032]  worker_thread+0x8ac/0xf28
[   22.443156]  kthread+0x328/0x630
[   22.443320]  ret_from_fork+0x10/0x20
[   22.443518] 
[   22.443830] Last potentially related work creation:
[   22.443957]  kasan_save_stack+0x3c/0x68
[   22.444319]  kasan_record_aux_stack+0xb4/0xc8
[   22.444439]  __queue_work+0x65c/0x1010
[   22.444535]  queue_work_on+0xbc/0xf8
[   22.444914]  workqueue_uaf+0x210/0x4a8
[   22.445365]  kunit_try_run_case+0x170/0x3f0
[   22.445683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.445804]  kthread+0x328/0x630
[   22.446165]  ret_from_fork+0x10/0x20
[   22.446274] 
[   22.446731] The buggy address belongs to the object at fff00000c669e640
[   22.446731]  which belongs to the cache kmalloc-32 of size 32
[   22.446922] The buggy address is located 0 bytes inside of
[   22.446922]  freed 32-byte region [fff00000c669e640, fff00000c669e660)
[   22.447084] 
[   22.447454] The buggy address belongs to the physical page:
[   22.447831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669e
[   22.448083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.448300] page_type: f5(slab)
[   22.448642] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.448993] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.449318] page dumped because: kasan: bad access detected
[   22.449451] 
[   22.449512] Memory state around the buggy address:
[   22.449944]  fff00000c669e500: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   22.450082]  fff00000c669e580: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.450643] >fff00000c669e600: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   22.450931]                                            ^
[   22.451247]  fff00000c669e680: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451384]  fff00000c669e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   22.372677] ==================================================================
[   22.372955] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   22.373117] Read of size 4 at addr fff00000c669e440 by task swapper/1/0
[   22.373237] 
[   22.373332] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.376695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.376852] Hardware name: linux,dummy-virt (DT)
[   22.376955] Call trace:
[   22.377016]  show_stack+0x20/0x38 (C)
[   22.377172]  dump_stack_lvl+0x8c/0xd0
[   22.377349]  print_report+0x118/0x608
[   22.377481]  kasan_report+0xdc/0x128
[   22.377946]  __asan_report_load4_noabort+0x20/0x30
[   22.378172]  rcu_uaf_reclaim+0x64/0x70
[   22.378333]  rcu_core+0x9f4/0x1e20
[   22.378547]  rcu_core_si+0x18/0x30
[   22.378655]  handle_softirqs+0x374/0xb28
[   22.379014]  __do_softirq+0x1c/0x28
[   22.379171]  ____do_softirq+0x18/0x30
[   22.379340]  call_on_irq_stack+0x24/0x30
[   22.379479]  do_softirq_own_stack+0x24/0x38
[   22.379652]  __irq_exit_rcu+0x1fc/0x318
[   22.379814]  irq_exit_rcu+0x1c/0x80
[   22.379959]  el1_interrupt+0x38/0x58
[   22.380073]  el1h_64_irq_handler+0x18/0x28
[   22.380195]  el1h_64_irq+0x6c/0x70
[   22.380453]  arch_local_irq_enable+0x4/0x8 (P)
[   22.380955]  do_idle+0x384/0x4e8
[   22.381091]  cpu_startup_entry+0x64/0x80
[   22.381491]  secondary_start_kernel+0x288/0x340
[   22.381642]  __secondary_switched+0xc0/0xc8
[   22.381779] 
[   22.381832] Allocated by task 198:
[   22.381906]  kasan_save_stack+0x3c/0x68
[   22.382016]  kasan_save_track+0x20/0x40
[   22.382117]  kasan_save_alloc_info+0x40/0x58
[   22.382211]  __kasan_kmalloc+0xd4/0xd8
[   22.382314]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.382459]  rcu_uaf+0xb0/0x2d8
[   22.382952]  kunit_try_run_case+0x170/0x3f0
[   22.383095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.383204]  kthread+0x328/0x630
[   22.383322]  ret_from_fork+0x10/0x20
[   22.383450] 
[   22.383532] Freed by task 0:
[   22.383617]  kasan_save_stack+0x3c/0x68
[   22.383720]  kasan_save_track+0x20/0x40
[   22.383817]  kasan_save_free_info+0x4c/0x78
[   22.383910]  __kasan_slab_free+0x6c/0x98
[   22.384011]  kfree+0x214/0x3c8
[   22.384099]  rcu_uaf_reclaim+0x28/0x70
[   22.384199]  rcu_core+0x9f4/0x1e20
[   22.384284]  rcu_core_si+0x18/0x30
[   22.384516]  handle_softirqs+0x374/0xb28
[   22.384837]  __do_softirq+0x1c/0x28
[   22.384963] 
[   22.385099] Last potentially related work creation:
[   22.385189]  kasan_save_stack+0x3c/0x68
[   22.385285]  kasan_record_aux_stack+0xb4/0xc8
[   22.385387]  __call_rcu_common.constprop.0+0x70/0x8b0
[   22.385747]  call_rcu+0x18/0x30
[   22.385851]  rcu_uaf+0x14c/0x2d8
[   22.385936]  kunit_try_run_case+0x170/0x3f0
[   22.386033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.386144]  kthread+0x328/0x630
[   22.386220]  ret_from_fork+0x10/0x20
[   22.386872] 
[   22.387061] The buggy address belongs to the object at fff00000c669e440
[   22.387061]  which belongs to the cache kmalloc-32 of size 32
[   22.387261] The buggy address is located 0 bytes inside of
[   22.387261]  freed 32-byte region [fff00000c669e440, fff00000c669e460)
[   22.387385] 
[   22.387444] The buggy address belongs to the physical page:
[   22.387539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669e
[   22.387665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.388050] page_type: f5(slab)
[   22.388185] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.388347] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.388470] page dumped because: kasan: bad access detected
[   22.388550] 
[   22.388596] Memory state around the buggy address:
[   22.388685]  fff00000c669e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.388799]  fff00000c669e380: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.388909] >fff00000c669e400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.389006]                                            ^
[   22.389097]  fff00000c669e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.389210]  fff00000c669e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.389310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   22.117451] ==================================================================
[   22.117587] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   22.117713] Read of size 1 at addr fff00000c7883078 by task kunit_try_catch/196
[   22.117839] 
[   22.117925] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.118139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.118211] Hardware name: linux,dummy-virt (DT)
[   22.118291] Call trace:
[   22.118346]  show_stack+0x20/0x38 (C)
[   22.119382]  dump_stack_lvl+0x8c/0xd0
[   22.119598]  print_report+0x118/0x608
[   22.119727]  kasan_report+0xdc/0x128
[   22.119843]  __asan_report_load1_noabort+0x20/0x30
[   22.120162]  ksize_uaf+0x544/0x5f8
[   22.120603]  kunit_try_run_case+0x170/0x3f0
[   22.120893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.121161]  kthread+0x328/0x630
[   22.121486]  ret_from_fork+0x10/0x20
[   22.121917] 
[   22.121987] Allocated by task 196:
[   22.122194]  kasan_save_stack+0x3c/0x68
[   22.122441]  kasan_save_track+0x20/0x40
[   22.122665]  kasan_save_alloc_info+0x40/0x58
[   22.122867]  __kasan_kmalloc+0xd4/0xd8
[   22.123355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.123488]  ksize_uaf+0xb8/0x5f8
[   22.123608]  kunit_try_run_case+0x170/0x3f0
[   22.123718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.123881]  kthread+0x328/0x630
[   22.123998]  ret_from_fork+0x10/0x20
[   22.124131] 
[   22.124227] Freed by task 196:
[   22.124302]  kasan_save_stack+0x3c/0x68
[   22.124412]  kasan_save_track+0x20/0x40
[   22.124509]  kasan_save_free_info+0x4c/0x78
[   22.124627]  __kasan_slab_free+0x6c/0x98
[   22.124774]  kfree+0x214/0x3c8
[   22.124863]  ksize_uaf+0x11c/0x5f8
[   22.124951]  kunit_try_run_case+0x170/0x3f0
[   22.125052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.125166]  kthread+0x328/0x630
[   22.125250]  ret_from_fork+0x10/0x20
[   22.125350] 
[   22.125426] The buggy address belongs to the object at fff00000c7883000
[   22.125426]  which belongs to the cache kmalloc-128 of size 128
[   22.125573] The buggy address is located 120 bytes inside of
[   22.125573]  freed 128-byte region [fff00000c7883000, fff00000c7883080)
[   22.126171] 
[   22.126252] The buggy address belongs to the physical page:
[   22.126336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   22.126486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.126617] page_type: f5(slab)
[   22.126721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.126867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.126971] page dumped because: kasan: bad access detected
[   22.127308] 
[   22.127453] Memory state around the buggy address:
[   22.127561]  fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.127719]  fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.127845] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.128040]                                                                 ^
[   22.128164]  fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128268]  fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128537] ==================================================================
[   22.089802] ==================================================================
[   22.090422] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   22.090755] Read of size 1 at addr fff00000c7883000 by task kunit_try_catch/196
[   22.090918] 
[   22.091028] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.091253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.091321] Hardware name: linux,dummy-virt (DT)
[   22.091407] Call trace:
[   22.091459]  show_stack+0x20/0x38 (C)
[   22.091560]  dump_stack_lvl+0x8c/0xd0
[   22.091662]  print_report+0x118/0x608
[   22.091788]  kasan_report+0xdc/0x128
[   22.091955]  __kasan_check_byte+0x54/0x70
[   22.092120]  ksize+0x30/0x88
[   22.092271]  ksize_uaf+0x168/0x5f8
[   22.092447]  kunit_try_run_case+0x170/0x3f0
[   22.092564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.092753]  kthread+0x328/0x630
[   22.092979]  ret_from_fork+0x10/0x20
[   22.093290] 
[   22.093335] Allocated by task 196:
[   22.093416]  kasan_save_stack+0x3c/0x68
[   22.093512]  kasan_save_track+0x20/0x40
[   22.093639]  kasan_save_alloc_info+0x40/0x58
[   22.093909]  __kasan_kmalloc+0xd4/0xd8
[   22.094168]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.094318]  ksize_uaf+0xb8/0x5f8
[   22.094450]  kunit_try_run_case+0x170/0x3f0
[   22.094592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.094741]  kthread+0x328/0x630
[   22.094844]  ret_from_fork+0x10/0x20
[   22.094933] 
[   22.095001] Freed by task 196:
[   22.095103]  kasan_save_stack+0x3c/0x68
[   22.095239]  kasan_save_track+0x20/0x40
[   22.095367]  kasan_save_free_info+0x4c/0x78
[   22.095463]  __kasan_slab_free+0x6c/0x98
[   22.095546]  kfree+0x214/0x3c8
[   22.095786]  ksize_uaf+0x11c/0x5f8
[   22.096009]  kunit_try_run_case+0x170/0x3f0
[   22.096161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.096268]  kthread+0x328/0x630
[   22.096351]  ret_from_fork+0x10/0x20
[   22.096451] 
[   22.096751] The buggy address belongs to the object at fff00000c7883000
[   22.096751]  which belongs to the cache kmalloc-128 of size 128
[   22.096900] The buggy address is located 0 bytes inside of
[   22.096900]  freed 128-byte region [fff00000c7883000, fff00000c7883080)
[   22.097064] 
[   22.097130] The buggy address belongs to the physical page:
[   22.097326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   22.097488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.097620] page_type: f5(slab)
[   22.097720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.097847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.097955] page dumped because: kasan: bad access detected
[   22.098102] 
[   22.098153] Memory state around the buggy address:
[   22.098238]  fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.098379]  fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.098493] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.098696]                    ^
[   22.098952]  fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.099048]  fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.099134] ==================================================================
[   22.101072] ==================================================================
[   22.101212] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   22.101356] Read of size 1 at addr fff00000c7883000 by task kunit_try_catch/196
[   22.101477] 
[   22.102388] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.102844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.102955] Hardware name: linux,dummy-virt (DT)
[   22.103301] Call trace:
[   22.103596]  show_stack+0x20/0x38 (C)
[   22.104314]  dump_stack_lvl+0x8c/0xd0
[   22.104913]  print_report+0x118/0x608
[   22.105307]  kasan_report+0xdc/0x128
[   22.106151]  __asan_report_load1_noabort+0x20/0x30
[   22.106339]  ksize_uaf+0x598/0x5f8
[   22.107710]  kunit_try_run_case+0x170/0x3f0
[   22.108076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.108208]  kthread+0x328/0x630
[   22.108309]  ret_from_fork+0x10/0x20
[   22.108446] 
[   22.108494] Allocated by task 196:
[   22.108566]  kasan_save_stack+0x3c/0x68
[   22.108673]  kasan_save_track+0x20/0x40
[   22.110442]  kasan_save_alloc_info+0x40/0x58
[   22.110738]  __kasan_kmalloc+0xd4/0xd8
[   22.110825]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.111179]  ksize_uaf+0xb8/0x5f8
[   22.111356]  kunit_try_run_case+0x170/0x3f0
[   22.111521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.111647]  kthread+0x328/0x630
[   22.111757]  ret_from_fork+0x10/0x20
[   22.111852] 
[   22.111907] Freed by task 196:
[   22.111972]  kasan_save_stack+0x3c/0x68
[   22.112082]  kasan_save_track+0x20/0x40
[   22.112211]  kasan_save_free_info+0x4c/0x78
[   22.112339]  __kasan_slab_free+0x6c/0x98
[   22.112486]  kfree+0x214/0x3c8
[   22.112568]  ksize_uaf+0x11c/0x5f8
[   22.112657]  kunit_try_run_case+0x170/0x3f0
[   22.112751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.112861]  kthread+0x328/0x630
[   22.112938]  ret_from_fork+0x10/0x20
[   22.113037] 
[   22.113113] The buggy address belongs to the object at fff00000c7883000
[   22.113113]  which belongs to the cache kmalloc-128 of size 128
[   22.113300] The buggy address is located 0 bytes inside of
[   22.113300]  freed 128-byte region [fff00000c7883000, fff00000c7883080)
[   22.113463] 
[   22.113515] The buggy address belongs to the physical page:
[   22.113617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883
[   22.113778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.113922] page_type: f5(slab)
[   22.114012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.114143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.114252] page dumped because: kasan: bad access detected
[   22.114358] 
[   22.114449] Memory state around the buggy address:
[   22.114555]  fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.114688]  fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.114828] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.114969]                    ^
[   22.115114]  fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.115223]  fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.115303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   22.036669] ==================================================================
[   22.036865] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   22.037031] Read of size 1 at addr fff00000c5d6ef73 by task kunit_try_catch/194
[   22.037156] 
[   22.037248] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.038534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.038807] Hardware name: linux,dummy-virt (DT)
[   22.038975] Call trace:
[   22.039037]  show_stack+0x20/0x38 (C)
[   22.039198]  dump_stack_lvl+0x8c/0xd0
[   22.039304]  print_report+0x118/0x608
[   22.039674]  kasan_report+0xdc/0x128
[   22.039913]  __asan_report_load1_noabort+0x20/0x30
[   22.040121]  ksize_unpoisons_memory+0x628/0x740
[   22.040458]  kunit_try_run_case+0x170/0x3f0
[   22.040716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.041093]  kthread+0x328/0x630
[   22.041297]  ret_from_fork+0x10/0x20
[   22.041433] 
[   22.041869] Allocated by task 194:
[   22.042452]  kasan_save_stack+0x3c/0x68
[   22.042673]  kasan_save_track+0x20/0x40
[   22.042762]  kasan_save_alloc_info+0x40/0x58
[   22.042923]  __kasan_kmalloc+0xd4/0xd8
[   22.043173]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.043408]  ksize_unpoisons_memory+0xc0/0x740
[   22.043615]  kunit_try_run_case+0x170/0x3f0
[   22.043776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043873]  kthread+0x328/0x630
[   22.043938]  ret_from_fork+0x10/0x20
[   22.044320] 
[   22.044462] The buggy address belongs to the object at fff00000c5d6ef00
[   22.044462]  which belongs to the cache kmalloc-128 of size 128
[   22.044756] The buggy address is located 0 bytes to the right of
[   22.044756]  allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73)
[   22.044939] 
[   22.045068] The buggy address belongs to the physical page:
[   22.045159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   22.045312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.045445] page_type: f5(slab)
[   22.045967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.046149] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.046388] page dumped because: kasan: bad access detected
[   22.046573] 
[   22.046875] Memory state around the buggy address:
[   22.046969]  fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.047080]  fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047266] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.047551]                                                              ^
[   22.047789]  fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047955]  fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.048057] ==================================================================
[   22.051619] ==================================================================
[   22.051743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   22.051886] Read of size 1 at addr fff00000c5d6ef78 by task kunit_try_catch/194
[   22.052009] 
[   22.052093] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.052302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.052369] Hardware name: linux,dummy-virt (DT)
[   22.052926] Call trace:
[   22.054474]  show_stack+0x20/0x38 (C)
[   22.054691]  dump_stack_lvl+0x8c/0xd0
[   22.054892]  print_report+0x118/0x608
[   22.055022]  kasan_report+0xdc/0x128
[   22.055150]  __asan_report_load1_noabort+0x20/0x30
[   22.055426]  ksize_unpoisons_memory+0x618/0x740
[   22.055685]  kunit_try_run_case+0x170/0x3f0
[   22.055925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056049]  kthread+0x328/0x630
[   22.056134]  ret_from_fork+0x10/0x20
[   22.056242] 
[   22.056285] Allocated by task 194:
[   22.056888]  kasan_save_stack+0x3c/0x68
[   22.057111]  kasan_save_track+0x20/0x40
[   22.057217]  kasan_save_alloc_info+0x40/0x58
[   22.057324]  __kasan_kmalloc+0xd4/0xd8
[   22.057429]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.057530]  ksize_unpoisons_memory+0xc0/0x740
[   22.057629]  kunit_try_run_case+0x170/0x3f0
[   22.057793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.058024]  kthread+0x328/0x630
[   22.058122]  ret_from_fork+0x10/0x20
[   22.058275] 
[   22.058660] The buggy address belongs to the object at fff00000c5d6ef00
[   22.058660]  which belongs to the cache kmalloc-128 of size 128
[   22.058921] The buggy address is located 5 bytes to the right of
[   22.058921]  allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73)
[   22.059141] 
[   22.059314] The buggy address belongs to the physical page:
[   22.059393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   22.059678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.059949] page_type: f5(slab)
[   22.060062] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.060193] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.060290] page dumped because: kasan: bad access detected
[   22.060372] 
[   22.061169] Memory state around the buggy address:
[   22.061493]  fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.061621]  fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.061744] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.061843]                                                                 ^
[   22.062423]  fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.062599]  fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.062707] ==================================================================
[   22.066086] ==================================================================
[   22.066225] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   22.066715] Read of size 1 at addr fff00000c5d6ef7f by task kunit_try_catch/194
[   22.066874] 
[   22.066958] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   22.067138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.067201] Hardware name: linux,dummy-virt (DT)
[   22.067278] Call trace:
[   22.067855]  show_stack+0x20/0x38 (C)
[   22.068019]  dump_stack_lvl+0x8c/0xd0
[   22.068200]  print_report+0x118/0x608
[   22.068320]  kasan_report+0xdc/0x128
[   22.068773]  __asan_report_load1_noabort+0x20/0x30
[   22.068949]  ksize_unpoisons_memory+0x690/0x740
[   22.069455]  kunit_try_run_case+0x170/0x3f0
[   22.069778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.070024]  kthread+0x328/0x630
[   22.071582]  ret_from_fork+0x10/0x20
[   22.071723] 
[   22.071749] Allocated by task 194:
[   22.071784]  kasan_save_stack+0x3c/0x68
[   22.071841]  kasan_save_track+0x20/0x40
[   22.071884]  kasan_save_alloc_info+0x40/0x58
[   22.071925]  __kasan_kmalloc+0xd4/0xd8
[   22.071969]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.072015]  ksize_unpoisons_memory+0xc0/0x740
[   22.072058]  kunit_try_run_case+0x170/0x3f0
[   22.072103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.072150]  kthread+0x328/0x630
[   22.072188]  ret_from_fork+0x10/0x20
[   22.072229] 
[   22.072255] The buggy address belongs to the object at fff00000c5d6ef00
[   22.072255]  which belongs to the cache kmalloc-128 of size 128
[   22.072321] The buggy address is located 12 bytes to the right of
[   22.072321]  allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73)
[   22.072393] 
[   22.072442] The buggy address belongs to the physical page:
[   22.072480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   22.072542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.072601] page_type: f5(slab)
[   22.072651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.072708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.072754] page dumped because: kasan: bad access detected
[   22.072790] 
[   22.072810] Memory state around the buggy address:
[   22.072849]  fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.072898]  fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.072946] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.072989]                                                                 ^
[   22.073035]  fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.073080]  fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.073123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   21.989842] ==================================================================
[   21.990436] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   21.990650] Free of addr fff00000c66b10c0 by task kunit_try_catch/192
[   21.990802] 
[   21.990918] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.991138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.991202] Hardware name: linux,dummy-virt (DT)
[   21.991278] Call trace:
[   21.991369]  show_stack+0x20/0x38 (C)
[   21.991735]  dump_stack_lvl+0x8c/0xd0
[   21.991890]  print_report+0x118/0x608
[   21.992018]  kasan_report_invalid_free+0xc0/0xe8
[   21.992197]  check_slab_allocation+0xd4/0x108
[   21.992361]  __kasan_slab_pre_free+0x2c/0x48
[   21.992532]  kfree+0xe8/0x3c8
[   21.992643]  kfree_sensitive+0x3c/0xb0
[   21.992772]  kmalloc_double_kzfree+0x168/0x308
[   21.992881]  kunit_try_run_case+0x170/0x3f0
[   21.992989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.993326]  kthread+0x328/0x630
[   21.993561]  ret_from_fork+0x10/0x20
[   21.993683] 
[   21.993735] Allocated by task 192:
[   21.993944]  kasan_save_stack+0x3c/0x68
[   21.994230]  kasan_save_track+0x20/0x40
[   21.994359]  kasan_save_alloc_info+0x40/0x58
[   21.994464]  __kasan_kmalloc+0xd4/0xd8
[   21.994539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.994616]  kmalloc_double_kzfree+0xb8/0x308
[   21.994690]  kunit_try_run_case+0x170/0x3f0
[   21.994776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994891]  kthread+0x328/0x630
[   21.994979]  ret_from_fork+0x10/0x20
[   21.995084] 
[   21.995130] Freed by task 192:
[   21.995197]  kasan_save_stack+0x3c/0x68
[   21.995390]  kasan_save_track+0x20/0x40
[   21.995633]  kasan_save_free_info+0x4c/0x78
[   21.995859]  __kasan_slab_free+0x6c/0x98
[   21.995984]  kfree+0x214/0x3c8
[   21.996082]  kfree_sensitive+0x80/0xb0
[   21.996186]  kmalloc_double_kzfree+0x11c/0x308
[   21.996309]  kunit_try_run_case+0x170/0x3f0
[   21.996395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.996509]  kthread+0x328/0x630
[   21.996837]  ret_from_fork+0x10/0x20
[   21.997050] 
[   21.997106] The buggy address belongs to the object at fff00000c66b10c0
[   21.997106]  which belongs to the cache kmalloc-16 of size 16
[   21.997259] The buggy address is located 0 bytes inside of
[   21.997259]  16-byte region [fff00000c66b10c0, fff00000c66b10d0)
[   21.997417] 
[   21.997471] The buggy address belongs to the physical page:
[   21.997545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   21.997687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.997808] page_type: f5(slab)
[   21.998171] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.998376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.998501] page dumped because: kasan: bad access detected
[   21.998619] 
[   21.998662] Memory state around the buggy address:
[   21.998780]  fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   21.998911]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.999051] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   21.999167]                                            ^
[   21.999341]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.999448]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.999531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   21.976311] ==================================================================
[   21.976636] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   21.976879] Read of size 1 at addr fff00000c66b10c0 by task kunit_try_catch/192
[   21.977051] 
[   21.977141] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.977436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.977494] Hardware name: linux,dummy-virt (DT)
[   21.977570] Call trace:
[   21.977622]  show_stack+0x20/0x38 (C)
[   21.978146]  dump_stack_lvl+0x8c/0xd0
[   21.978307]  print_report+0x118/0x608
[   21.978507]  kasan_report+0xdc/0x128
[   21.978617]  __kasan_check_byte+0x54/0x70
[   21.978734]  kfree_sensitive+0x30/0xb0
[   21.978842]  kmalloc_double_kzfree+0x168/0x308
[   21.978933]  kunit_try_run_case+0x170/0x3f0
[   21.979034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.979140]  kthread+0x328/0x630
[   21.979222]  ret_from_fork+0x10/0x20
[   21.979334] 
[   21.979378] Allocated by task 192:
[   21.979465]  kasan_save_stack+0x3c/0x68
[   21.979573]  kasan_save_track+0x20/0x40
[   21.979667]  kasan_save_alloc_info+0x40/0x58
[   21.979758]  __kasan_kmalloc+0xd4/0xd8
[   21.979846]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.979980]  kmalloc_double_kzfree+0xb8/0x308
[   21.980068]  kunit_try_run_case+0x170/0x3f0
[   21.980154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.980492]  kthread+0x328/0x630
[   21.980575]  ret_from_fork+0x10/0x20
[   21.980660] 
[   21.980710] Freed by task 192:
[   21.980772]  kasan_save_stack+0x3c/0x68
[   21.981258]  kasan_save_track+0x20/0x40
[   21.981447]  kasan_save_free_info+0x4c/0x78
[   21.981562]  __kasan_slab_free+0x6c/0x98
[   21.981652]  kfree+0x214/0x3c8
[   21.981762]  kfree_sensitive+0x80/0xb0
[   21.981896]  kmalloc_double_kzfree+0x11c/0x308
[   21.982023]  kunit_try_run_case+0x170/0x3f0
[   21.982119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.982236]  kthread+0x328/0x630
[   21.982384]  ret_from_fork+0x10/0x20
[   21.982480] 
[   21.982531] The buggy address belongs to the object at fff00000c66b10c0
[   21.982531]  which belongs to the cache kmalloc-16 of size 16
[   21.983033] The buggy address is located 0 bytes inside of
[   21.983033]  freed 16-byte region [fff00000c66b10c0, fff00000c66b10d0)
[   21.983160] 
[   21.983205] The buggy address belongs to the physical page:
[   21.983295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   21.983434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.983662] page_type: f5(slab)
[   21.983916] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.984073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.984182] page dumped because: kasan: bad access detected
[   21.984298] 
[   21.984363] Memory state around the buggy address:
[   21.984496]  fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   21.984654]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.984803] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   21.984931]                                            ^
[   21.985013]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985143]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   21.921270] ==================================================================
[   21.921472] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   21.921634] Read of size 1 at addr fff00000c5e38b28 by task kunit_try_catch/188
[   21.921761] 
[   21.921856] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.922075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.922148] Hardware name: linux,dummy-virt (DT)
[   21.922888] Call trace:
[   21.923066]  show_stack+0x20/0x38 (C)
[   21.923232]  dump_stack_lvl+0x8c/0xd0
[   21.923366]  print_report+0x118/0x608
[   21.923503]  kasan_report+0xdc/0x128
[   21.923604]  __asan_report_load1_noabort+0x20/0x30
[   21.923701]  kmalloc_uaf2+0x3f4/0x468
[   21.923801]  kunit_try_run_case+0x170/0x3f0
[   21.923975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.924647]  kthread+0x328/0x630
[   21.925029]  ret_from_fork+0x10/0x20
[   21.925284] 
[   21.925331] Allocated by task 188:
[   21.925795]  kasan_save_stack+0x3c/0x68
[   21.926079]  kasan_save_track+0x20/0x40
[   21.926195]  kasan_save_alloc_info+0x40/0x58
[   21.926389]  __kasan_kmalloc+0xd4/0xd8
[   21.926606]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.926716]  kmalloc_uaf2+0xc4/0x468
[   21.927067]  kunit_try_run_case+0x170/0x3f0
[   21.927210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927349]  kthread+0x328/0x630
[   21.927445]  ret_from_fork+0x10/0x20
[   21.927535] 
[   21.927586] Freed by task 188:
[   21.927662]  kasan_save_stack+0x3c/0x68
[   21.927995]  kasan_save_track+0x20/0x40
[   21.928215]  kasan_save_free_info+0x4c/0x78
[   21.928329]  __kasan_slab_free+0x6c/0x98
[   21.928949]  kfree+0x214/0x3c8
[   21.929140]  kmalloc_uaf2+0x134/0x468
[   21.929328]  kunit_try_run_case+0x170/0x3f0
[   21.929454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.929561]  kthread+0x328/0x630
[   21.929985]  ret_from_fork+0x10/0x20
[   21.930215] 
[   21.930670] The buggy address belongs to the object at fff00000c5e38b00
[   21.930670]  which belongs to the cache kmalloc-64 of size 64
[   21.930907] The buggy address is located 40 bytes inside of
[   21.930907]  freed 64-byte region [fff00000c5e38b00, fff00000c5e38b40)
[   21.931162] 
[   21.931365] The buggy address belongs to the physical page:
[   21.931534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38
[   21.931686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.931791] page_type: f5(slab)
[   21.931871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.931979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.932079] page dumped because: kasan: bad access detected
[   21.932428] 
[   21.932766] Memory state around the buggy address:
[   21.932872]  fff00000c5e38a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.933083]  fff00000c5e38a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.933291] >fff00000c5e38b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.933408]                                   ^
[   21.933728]  fff00000c5e38b80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   21.934066]  fff00000c5e38c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.934270] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   21.899930] ==================================================================
[   21.900136] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   21.900308] Write of size 33 at addr fff00000c5e38980 by task kunit_try_catch/186
[   21.900495] 
[   21.900634] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.900935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.901001] Hardware name: linux,dummy-virt (DT)
[   21.901089] Call trace:
[   21.901174]  show_stack+0x20/0x38 (C)
[   21.901360]  dump_stack_lvl+0x8c/0xd0
[   21.901491]  print_report+0x118/0x608
[   21.901606]  kasan_report+0xdc/0x128
[   21.901821]  kasan_check_range+0x100/0x1a8
[   21.902005]  __asan_memset+0x34/0x78
[   21.902170]  kmalloc_uaf_memset+0x170/0x310
[   21.902288]  kunit_try_run_case+0x170/0x3f0
[   21.902426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.902583]  kthread+0x328/0x630
[   21.902712]  ret_from_fork+0x10/0x20
[   21.902851] 
[   21.902900] Allocated by task 186:
[   21.902961]  kasan_save_stack+0x3c/0x68
[   21.903139]  kasan_save_track+0x20/0x40
[   21.903227]  kasan_save_alloc_info+0x40/0x58
[   21.903305]  __kasan_kmalloc+0xd4/0xd8
[   21.903385]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.903485]  kmalloc_uaf_memset+0xb8/0x310
[   21.903573]  kunit_try_run_case+0x170/0x3f0
[   21.903672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.903782]  kthread+0x328/0x630
[   21.903861]  ret_from_fork+0x10/0x20
[   21.903963] 
[   21.904027] Freed by task 186:
[   21.904124]  kasan_save_stack+0x3c/0x68
[   21.904206]  kasan_save_track+0x20/0x40
[   21.904295]  kasan_save_free_info+0x4c/0x78
[   21.904510]  __kasan_slab_free+0x6c/0x98
[   21.904648]  kfree+0x214/0x3c8
[   21.904730]  kmalloc_uaf_memset+0x11c/0x310
[   21.904838]  kunit_try_run_case+0x170/0x3f0
[   21.904988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.905104]  kthread+0x328/0x630
[   21.905184]  ret_from_fork+0x10/0x20
[   21.905276] 
[   21.905341] The buggy address belongs to the object at fff00000c5e38980
[   21.905341]  which belongs to the cache kmalloc-64 of size 64
[   21.905580] The buggy address is located 0 bytes inside of
[   21.905580]  freed 64-byte region [fff00000c5e38980, fff00000c5e389c0)
[   21.905772] 
[   21.905845] The buggy address belongs to the physical page:
[   21.905926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38
[   21.906152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.906344] page_type: f5(slab)
[   21.906443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.906562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.906671] page dumped because: kasan: bad access detected
[   21.906759] 
[   21.906806] Memory state around the buggy address:
[   21.906951]  fff00000c5e38880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.907065]  fff00000c5e38900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.907167] >fff00000c5e38980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.907269]                    ^
[   21.907346]  fff00000c5e38a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.907475]  fff00000c5e38a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.907578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   21.873007] ==================================================================
[   21.873202] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   21.873381] Read of size 1 at addr fff00000c66b10a8 by task kunit_try_catch/184
[   21.873506] 
[   21.873602] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.873814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.873884] Hardware name: linux,dummy-virt (DT)
[   21.873965] Call trace:
[   21.874023]  show_stack+0x20/0x38 (C)
[   21.874149]  dump_stack_lvl+0x8c/0xd0
[   21.874277]  print_report+0x118/0x608
[   21.874467]  kasan_report+0xdc/0x128
[   21.874728]  __asan_report_load1_noabort+0x20/0x30
[   21.874863]  kmalloc_uaf+0x300/0x338
[   21.874965]  kunit_try_run_case+0x170/0x3f0
[   21.875095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.875330]  kthread+0x328/0x630
[   21.875501]  ret_from_fork+0x10/0x20
[   21.875686] 
[   21.875754] Allocated by task 184:
[   21.875854]  kasan_save_stack+0x3c/0x68
[   21.876008]  kasan_save_track+0x20/0x40
[   21.876085]  kasan_save_alloc_info+0x40/0x58
[   21.876154]  __kasan_kmalloc+0xd4/0xd8
[   21.876218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.876326]  kmalloc_uaf+0xb8/0x338
[   21.876407]  kunit_try_run_case+0x170/0x3f0
[   21.876540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.876640]  kthread+0x328/0x630
[   21.876722]  ret_from_fork+0x10/0x20
[   21.876799] 
[   21.876849] Freed by task 184:
[   21.876925]  kasan_save_stack+0x3c/0x68
[   21.877022]  kasan_save_track+0x20/0x40
[   21.877105]  kasan_save_free_info+0x4c/0x78
[   21.877179]  __kasan_slab_free+0x6c/0x98
[   21.877258]  kfree+0x214/0x3c8
[   21.877334]  kmalloc_uaf+0x11c/0x338
[   21.877479]  kunit_try_run_case+0x170/0x3f0
[   21.877600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.877714]  kthread+0x328/0x630
[   21.877800]  ret_from_fork+0x10/0x20
[   21.877888] 
[   21.878066] The buggy address belongs to the object at fff00000c66b10a0
[   21.878066]  which belongs to the cache kmalloc-16 of size 16
[   21.878863] The buggy address is located 8 bytes inside of
[   21.878863]  freed 16-byte region [fff00000c66b10a0, fff00000c66b10b0)
[   21.879134] 
[   21.879320] The buggy address belongs to the physical page:
[   21.879484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   21.880366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.880785] page_type: f5(slab)
[   21.880982] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.881369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.881813] page dumped because: kasan: bad access detected
[   21.881936] 
[   21.882021] Memory state around the buggy address:
[   21.882250]  fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   21.882878]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.883143] >fff00000c66b1080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   21.883259]                                   ^
[   21.883346]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.883462]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.883540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   21.843607] ==================================================================
[   21.843914] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.844154] Read of size 64 at addr fff00000c5e38704 by task kunit_try_catch/182
[   21.844272] 
[   21.844413] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.844728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.844817] Hardware name: linux,dummy-virt (DT)
[   21.844929] Call trace:
[   21.844997]  show_stack+0x20/0x38 (C)
[   21.845140]  dump_stack_lvl+0x8c/0xd0
[   21.845316]  print_report+0x118/0x608
[   21.845484]  kasan_report+0xdc/0x128
[   21.845594]  kasan_check_range+0x100/0x1a8
[   21.845922]  __asan_memmove+0x3c/0x98
[   21.846122]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.846481]  kunit_try_run_case+0x170/0x3f0
[   21.846658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.846860]  kthread+0x328/0x630
[   21.847077]  ret_from_fork+0x10/0x20
[   21.847445] 
[   21.847516] Allocated by task 182:
[   21.847602]  kasan_save_stack+0x3c/0x68
[   21.847729]  kasan_save_track+0x20/0x40
[   21.847834]  kasan_save_alloc_info+0x40/0x58
[   21.847929]  __kasan_kmalloc+0xd4/0xd8
[   21.848021]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.848194]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   21.848423]  kunit_try_run_case+0x170/0x3f0
[   21.848787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.848989]  kthread+0x328/0x630
[   21.849091]  ret_from_fork+0x10/0x20
[   21.849532] 
[   21.849672] The buggy address belongs to the object at fff00000c5e38700
[   21.849672]  which belongs to the cache kmalloc-64 of size 64
[   21.849886] The buggy address is located 4 bytes inside of
[   21.849886]  allocated 64-byte region [fff00000c5e38700, fff00000c5e38740)
[   21.850056] 
[   21.850305] The buggy address belongs to the physical page:
[   21.850443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38
[   21.850570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.850677] page_type: f5(slab)
[   21.850763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.850876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.850954] page dumped because: kasan: bad access detected
[   21.851026] 
[   21.851068] Memory state around the buggy address:
[   21.851445]  fff00000c5e38600: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.851644]  fff00000c5e38680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.851776] >fff00000c5e38700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.852178]                                            ^
[   21.852335]  fff00000c5e38780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.852449]  fff00000c5e38800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.852658] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   21.776861] ==================================================================
[   21.777067] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   21.777231] Read of size 18446744073709551614 at addr fff00000c5e38504 by task kunit_try_catch/180
[   21.780664] 
[   21.781355] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.782288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.782408] Hardware name: linux,dummy-virt (DT)
[   21.782481] Call trace:
[   21.782528]  show_stack+0x20/0x38 (C)
[   21.782669]  dump_stack_lvl+0x8c/0xd0
[   21.784263]  print_report+0x118/0x608
[   21.784976]  kasan_report+0xdc/0x128
[   21.785100]  kasan_check_range+0x100/0x1a8
[   21.785851]  __asan_memmove+0x3c/0x98
[   21.786230]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.786355]  kunit_try_run_case+0x170/0x3f0
[   21.786976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.787075]  kthread+0x328/0x630
[   21.787164]  ret_from_fork+0x10/0x20
[   21.787278] 
[   21.787330] Allocated by task 180:
[   21.788929]  kasan_save_stack+0x3c/0x68
[   21.789065]  kasan_save_track+0x20/0x40
[   21.789825]  kasan_save_alloc_info+0x40/0x58
[   21.790200]  __kasan_kmalloc+0xd4/0xd8
[   21.790491]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.791100]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   21.791537]  kunit_try_run_case+0x170/0x3f0
[   21.791918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.792134]  kthread+0x328/0x630
[   21.792214]  ret_from_fork+0x10/0x20
[   21.795067] 
[   21.795134] The buggy address belongs to the object at fff00000c5e38500
[   21.795134]  which belongs to the cache kmalloc-64 of size 64
[   21.795286] The buggy address is located 4 bytes inside of
[   21.795286]  64-byte region [fff00000c5e38500, fff00000c5e38540)
[   21.795418] 
[   21.795466] The buggy address belongs to the physical page:
[   21.795530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38
[   21.795627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.795738] page_type: f5(slab)
[   21.795837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.795965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.796069] page dumped because: kasan: bad access detected
[   21.796151] 
[   21.796196] Memory state around the buggy address:
[   21.796284]  fff00000c5e38400: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   21.796395]  fff00000c5e38480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.796523] >fff00000c5e38500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.796637]                    ^
[   21.796711]  fff00000c5e38580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.796823]  fff00000c5e38600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.796921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   21.703672] ==================================================================
[   21.704137] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   21.704344] Write of size 16 at addr fff00000c5d6ee69 by task kunit_try_catch/178
[   21.704472] 
[   21.704559] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.704775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.704839] Hardware name: linux,dummy-virt (DT)
[   21.704915] Call trace:
[   21.704969]  show_stack+0x20/0x38 (C)
[   21.705091]  dump_stack_lvl+0x8c/0xd0
[   21.705211]  print_report+0x118/0x608
[   21.705323]  kasan_report+0xdc/0x128
[   21.705440]  kasan_check_range+0x100/0x1a8
[   21.705550]  __asan_memset+0x34/0x78
[   21.705656]  kmalloc_oob_memset_16+0x150/0x2f8
[   21.705769]  kunit_try_run_case+0x170/0x3f0
[   21.705886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.706011]  kthread+0x328/0x630
[   21.706112]  ret_from_fork+0x10/0x20
[   21.706226] 
[   21.706272] Allocated by task 178:
[   21.706341]  kasan_save_stack+0x3c/0x68
[   21.706457]  kasan_save_track+0x20/0x40
[   21.706542]  kasan_save_alloc_info+0x40/0x58
[   21.707135]  __kasan_kmalloc+0xd4/0xd8
[   21.707435]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.707725]  kmalloc_oob_memset_16+0xb0/0x2f8
[   21.707842]  kunit_try_run_case+0x170/0x3f0
[   21.707932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.708067]  kthread+0x328/0x630
[   21.708170]  ret_from_fork+0x10/0x20
[   21.708273] 
[   21.708360] The buggy address belongs to the object at fff00000c5d6ee00
[   21.708360]  which belongs to the cache kmalloc-128 of size 128
[   21.708546] The buggy address is located 105 bytes inside of
[   21.708546]  allocated 120-byte region [fff00000c5d6ee00, fff00000c5d6ee78)
[   21.708740] 
[   21.708813] The buggy address belongs to the physical page:
[   21.708888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   21.709016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.709138] page_type: f5(slab)
[   21.709230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.709348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.709461] page dumped because: kasan: bad access detected
[   21.709541] 
[   21.709585] Memory state around the buggy address:
[   21.709798]  fff00000c5d6ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.710032]  fff00000c5d6ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.710349] >fff00000c5d6ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.710454]                                                                 ^
[   21.710593]  fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.710699]  fff00000c5d6ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.710844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure Automatically assigned
[   21.633227] ==================================================================
[   21.633723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   21.633909] Write of size 8 at addr fff00000c5d6ed71 by task kunit_try_catch/176
[   21.634031] 
[   21.634115] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.634220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.634250] Hardware name: linux,dummy-virt (DT)
[   21.634288] Call trace:
[   21.634316]  show_stack+0x20/0x38 (C)
[   21.634474]  dump_stack_lvl+0x8c/0xd0
[   21.634587]  print_report+0x118/0x608
[   21.634681]  kasan_report+0xdc/0x128
[   21.634786]  kasan_check_range+0x100/0x1a8
[   21.634924]  __asan_memset+0x34/0x78
[   21.635034]  kmalloc_oob_memset_8+0x150/0x2f8
[   21.635152]  kunit_try_run_case+0x170/0x3f0
[   21.635275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.635644]  kthread+0x328/0x630
[   21.635784]  ret_from_fork+0x10/0x20
[   21.636417] 
[   21.636492] Allocated by task 176:
[   21.636675]  kasan_save_stack+0x3c/0x68
[   21.636860]  kasan_save_track+0x20/0x40
[   21.636965]  kasan_save_alloc_info+0x40/0x58
[   21.637063]  __kasan_kmalloc+0xd4/0xd8
[   21.637657]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.637827]  kmalloc_oob_memset_8+0xb0/0x2f8
[   21.637914]  kunit_try_run_case+0x170/0x3f0
[   21.638024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.638146]  kthread+0x328/0x630
[   21.638235]  ret_from_fork+0x10/0x20
[   21.638326] 
[   21.638392] The buggy address belongs to the object at fff00000c5d6ed00
[   21.638392]  which belongs to the cache kmalloc-128 of size 128
[   21.638532] The buggy address is located 113 bytes inside of
[   21.638532]  allocated 120-byte region [fff00000c5d6ed00, fff00000c5d6ed78)
[   21.638804] 
[   21.638870] The buggy address belongs to the physical page:
[   21.638939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   21.639038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.639579] page_type: f5(slab)
[   21.639701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.639822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.639933] page dumped because: kasan: bad access detected
[   21.640003] 
[   21.640047] Memory state around the buggy address:
[   21.640390]  fff00000c5d6ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.640535]  fff00000c5d6ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.640654] >fff00000c5d6ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.640787]                                                                 ^
[   21.640892]  fff00000c5d6ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.640995]  fff00000c5d6ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.641088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   21.594219] ==================================================================
[   21.594572] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   21.594732] Write of size 4 at addr fff00000c5d6ec75 by task kunit_try_catch/174
[   21.594854] 
[   21.594931] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.595112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.595174] Hardware name: linux,dummy-virt (DT)
[   21.595251] Call trace:
[   21.595308]  show_stack+0x20/0x38 (C)
[   21.595446]  dump_stack_lvl+0x8c/0xd0
[   21.595569]  print_report+0x118/0x608
[   21.596087]  kasan_report+0xdc/0x128
[   21.596308]  kasan_check_range+0x100/0x1a8
[   21.596786]  __asan_memset+0x34/0x78
[   21.597096]  kmalloc_oob_memset_4+0x150/0x300
[   21.597364]  kunit_try_run_case+0x170/0x3f0
[   21.597663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.597813]  kthread+0x328/0x630
[   21.598221]  ret_from_fork+0x10/0x20
[   21.598475] 
[   21.598589] Allocated by task 174:
[   21.598762]  kasan_save_stack+0x3c/0x68
[   21.599004]  kasan_save_track+0x20/0x40
[   21.599088]  kasan_save_alloc_info+0x40/0x58
[   21.599160]  __kasan_kmalloc+0xd4/0xd8
[   21.599239]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.599328]  kmalloc_oob_memset_4+0xb0/0x300
[   21.599818]  kunit_try_run_case+0x170/0x3f0
[   21.600049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.600287]  kthread+0x328/0x630
[   21.600537]  ret_from_fork+0x10/0x20
[   21.600658] 
[   21.600712] The buggy address belongs to the object at fff00000c5d6ec00
[   21.600712]  which belongs to the cache kmalloc-128 of size 128
[   21.601243] The buggy address is located 117 bytes inside of
[   21.601243]  allocated 120-byte region [fff00000c5d6ec00, fff00000c5d6ec78)
[   21.601406] 
[   21.601503] The buggy address belongs to the physical page:
[   21.601615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   21.601800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.602015] page_type: f5(slab)
[   21.602118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.602554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.602902] page dumped because: kasan: bad access detected
[   21.602989] 
[   21.603039] Memory state around the buggy address:
[   21.603121]  fff00000c5d6eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.603227]  fff00000c5d6eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.603315] >fff00000c5d6ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.603384]                                                                 ^
[   21.604012]  fff00000c5d6ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.604161]  fff00000c5d6ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.604314] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   21.548871] ==================================================================
[   21.549063] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   21.549221] Write of size 2 at addr fff00000c5d6eb77 by task kunit_try_catch/172
[   21.549345] 
[   21.549451] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.549666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.549729] Hardware name: linux,dummy-virt (DT)
[   21.549804] Call trace:
[   21.549860]  show_stack+0x20/0x38 (C)
[   21.549980]  dump_stack_lvl+0x8c/0xd0
[   21.550106]  print_report+0x118/0x608
[   21.550222]  kasan_report+0xdc/0x128
[   21.550330]  kasan_check_range+0x100/0x1a8
[   21.554646]  __asan_memset+0x34/0x78
[   21.555384]  kmalloc_oob_memset_2+0x150/0x2f8
[   21.555930]  kunit_try_run_case+0x170/0x3f0
[   21.556116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.556221]  kthread+0x328/0x630
[   21.556316]  ret_from_fork+0x10/0x20
[   21.557055] 
[   21.557111] Allocated by task 172:
[   21.557698]  kasan_save_stack+0x3c/0x68
[   21.557929]  kasan_save_track+0x20/0x40
[   21.558020]  kasan_save_alloc_info+0x40/0x58
[   21.558875]  __kasan_kmalloc+0xd4/0xd8
[   21.559044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.559185]  kmalloc_oob_memset_2+0xb0/0x2f8
[   21.559316]  kunit_try_run_case+0x170/0x3f0
[   21.559455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.559559]  kthread+0x328/0x630
[   21.559792]  ret_from_fork+0x10/0x20
[   21.560105] 
[   21.560163] The buggy address belongs to the object at fff00000c5d6eb00
[   21.560163]  which belongs to the cache kmalloc-128 of size 128
[   21.561163] The buggy address is located 119 bytes inside of
[   21.561163]  allocated 120-byte region [fff00000c5d6eb00, fff00000c5d6eb78)
[   21.561747] 
[   21.561982] The buggy address belongs to the physical page:
[   21.562338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   21.562656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.562978] page_type: f5(slab)
[   21.563323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.563716] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.563811] page dumped because: kasan: bad access detected
[   21.564463] 
[   21.564511] Memory state around the buggy address:
[   21.564592]  fff00000c5d6ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.565005]  fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.565202] >fff00000c5d6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.565302]                                                                 ^
[   21.565414]  fff00000c5d6eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.565529]  fff00000c5d6ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.565623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   21.509548] ==================================================================
[   21.509743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   21.510636] Write of size 128 at addr fff00000c5d6ea00 by task kunit_try_catch/170
[   21.510937] 
[   21.511409] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.511714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.511783] Hardware name: linux,dummy-virt (DT)
[   21.511948] Call trace:
[   21.512413]  show_stack+0x20/0x38 (C)
[   21.512811]  dump_stack_lvl+0x8c/0xd0
[   21.512961]  print_report+0x118/0x608
[   21.513076]  kasan_report+0xdc/0x128
[   21.513190]  kasan_check_range+0x100/0x1a8
[   21.513524]  __asan_memset+0x34/0x78
[   21.513645]  kmalloc_oob_in_memset+0x144/0x2d0
[   21.513783]  kunit_try_run_case+0x170/0x3f0
[   21.513908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.514034]  kthread+0x328/0x630
[   21.514143]  ret_from_fork+0x10/0x20
[   21.514265] 
[   21.514327] Allocated by task 170:
[   21.514792]  kasan_save_stack+0x3c/0x68
[   21.515493]  kasan_save_track+0x20/0x40
[   21.515849]  kasan_save_alloc_info+0x40/0x58
[   21.515972]  __kasan_kmalloc+0xd4/0xd8
[   21.516067]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.516164]  kmalloc_oob_in_memset+0xb0/0x2d0
[   21.516493]  kunit_try_run_case+0x170/0x3f0
[   21.516608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.516980]  kthread+0x328/0x630
[   21.517091]  ret_from_fork+0x10/0x20
[   21.517179] 
[   21.517760] The buggy address belongs to the object at fff00000c5d6ea00
[   21.517760]  which belongs to the cache kmalloc-128 of size 128
[   21.518123] The buggy address is located 0 bytes inside of
[   21.518123]  allocated 120-byte region [fff00000c5d6ea00, fff00000c5d6ea78)
[   21.518453] 
[   21.518528] The buggy address belongs to the physical page:
[   21.518674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   21.518785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.519414] page_type: f5(slab)
[   21.519543] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.520039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.520223] page dumped because: kasan: bad access detected
[   21.520316] 
[   21.520363] Memory state around the buggy address:
[   21.520529]  fff00000c5d6e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.520646]  fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.520934] >fff00000c5d6ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.521061]                                                                 ^
[   21.521577]  fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521856]  fff00000c5d6eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521951] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   21.470309] ==================================================================
[   21.470586] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   21.470775] Read of size 16 at addr fff00000c66b1080 by task kunit_try_catch/168
[   21.470970] 
[   21.471109] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.471363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.471443] Hardware name: linux,dummy-virt (DT)
[   21.471515] Call trace:
[   21.471571]  show_stack+0x20/0x38 (C)
[   21.471751]  dump_stack_lvl+0x8c/0xd0
[   21.471932]  print_report+0x118/0x608
[   21.472096]  kasan_report+0xdc/0x128
[   21.472435]  __asan_report_load16_noabort+0x20/0x30
[   21.472946]  kmalloc_uaf_16+0x3bc/0x438
[   21.473057]  kunit_try_run_case+0x170/0x3f0
[   21.473167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.473279]  kthread+0x328/0x630
[   21.473365]  ret_from_fork+0x10/0x20
[   21.473485] 
[   21.473528] Allocated by task 168:
[   21.473593]  kasan_save_stack+0x3c/0x68
[   21.473975]  kasan_save_track+0x20/0x40
[   21.474069]  kasan_save_alloc_info+0x40/0x58
[   21.474163]  __kasan_kmalloc+0xd4/0xd8
[   21.474253]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.474481]  kmalloc_uaf_16+0x140/0x438
[   21.474570]  kunit_try_run_case+0x170/0x3f0
[   21.474653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.474752]  kthread+0x328/0x630
[   21.474837]  ret_from_fork+0x10/0x20
[   21.474949] 
[   21.475161] Freed by task 168:
[   21.475254]  kasan_save_stack+0x3c/0x68
[   21.475437]  kasan_save_track+0x20/0x40
[   21.475571]  kasan_save_free_info+0x4c/0x78
[   21.475698]  __kasan_slab_free+0x6c/0x98
[   21.475786]  kfree+0x214/0x3c8
[   21.475882]  kmalloc_uaf_16+0x190/0x438
[   21.476005]  kunit_try_run_case+0x170/0x3f0
[   21.476099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.476206]  kthread+0x328/0x630
[   21.476285]  ret_from_fork+0x10/0x20
[   21.476376] 
[   21.476440] The buggy address belongs to the object at fff00000c66b1080
[   21.476440]  which belongs to the cache kmalloc-16 of size 16
[   21.476587] The buggy address is located 0 bytes inside of
[   21.476587]  freed 16-byte region [fff00000c66b1080, fff00000c66b1090)
[   21.476747] 
[   21.476867] The buggy address belongs to the physical page:
[   21.476969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   21.477165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.477312] page_type: f5(slab)
[   21.477422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.477542] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.477690] page dumped because: kasan: bad access detected
[   21.477783] 
[   21.477833] Memory state around the buggy address:
[   21.477925]  fff00000c66b0f80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   21.478252]  fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   21.478529] >fff00000c66b1080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.478743]                    ^
[   21.479029]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.479222]  fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.479442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   21.443593] ==================================================================
[   21.443791] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   21.443949] Write of size 16 at addr fff00000c66b1020 by task kunit_try_catch/166
[   21.444074] 
[   21.444163] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.444375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.444519] Hardware name: linux,dummy-virt (DT)
[   21.444594] Call trace:
[   21.444649]  show_stack+0x20/0x38 (C)
[   21.444829]  dump_stack_lvl+0x8c/0xd0
[   21.444971]  print_report+0x118/0x608
[   21.445083]  kasan_report+0xdc/0x128
[   21.445387]  __asan_report_store16_noabort+0x20/0x30
[   21.445763]  kmalloc_oob_16+0x3a0/0x3f8
[   21.445897]  kunit_try_run_case+0x170/0x3f0
[   21.446191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.446341]  kthread+0x328/0x630
[   21.446480]  ret_from_fork+0x10/0x20
[   21.446590] 
[   21.446633] Allocated by task 166:
[   21.446704]  kasan_save_stack+0x3c/0x68
[   21.446840]  kasan_save_track+0x20/0x40
[   21.446924]  kasan_save_alloc_info+0x40/0x58
[   21.447276]  __kasan_kmalloc+0xd4/0xd8
[   21.447379]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.447518]  kmalloc_oob_16+0xb4/0x3f8
[   21.447596]  kunit_try_run_case+0x170/0x3f0
[   21.447744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.447864]  kthread+0x328/0x630
[   21.447944]  ret_from_fork+0x10/0x20
[   21.448026] 
[   21.448072] The buggy address belongs to the object at fff00000c66b1020
[   21.448072]  which belongs to the cache kmalloc-16 of size 16
[   21.448304] The buggy address is located 0 bytes inside of
[   21.448304]  allocated 13-byte region [fff00000c66b1020, fff00000c66b102d)
[   21.448684] 
[   21.448837] The buggy address belongs to the physical page:
[   21.448924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1
[   21.449054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.449184] page_type: f5(slab)
[   21.449284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.449418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.449519] page dumped because: kasan: bad access detected
[   21.449600] 
[   21.449654] Memory state around the buggy address:
[   21.449731]  fff00000c66b0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.449907]  fff00000c66b0f80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   21.450202] >fff00000c66b1000: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   21.450367]                                   ^
[   21.450452]  fff00000c66b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.450600]  fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.450695] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   21.417944] ==================================================================
[   21.418102] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   21.418342] Read of size 1 at addr fff00000c4729800 by task kunit_try_catch/164
[   21.418797] 
[   21.418905] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.419078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.419136] Hardware name: linux,dummy-virt (DT)
[   21.419197] Call trace:
[   21.419247]  show_stack+0x20/0x38 (C)
[   21.419390]  dump_stack_lvl+0x8c/0xd0
[   21.419535]  print_report+0x118/0x608
[   21.419654]  kasan_report+0xdc/0x128
[   21.419767]  __asan_report_load1_noabort+0x20/0x30
[   21.419896]  krealloc_uaf+0x4c8/0x520
[   21.420013]  kunit_try_run_case+0x170/0x3f0
[   21.420133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.420264]  kthread+0x328/0x630
[   21.420376]  ret_from_fork+0x10/0x20
[   21.420498] 
[   21.420541] Allocated by task 164:
[   21.420606]  kasan_save_stack+0x3c/0x68
[   21.420749]  kasan_save_track+0x20/0x40
[   21.420857]  kasan_save_alloc_info+0x40/0x58
[   21.420963]  __kasan_kmalloc+0xd4/0xd8
[   21.421054]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.421516]  krealloc_uaf+0xc8/0x520
[   21.421607]  kunit_try_run_case+0x170/0x3f0
[   21.421730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.422063]  kthread+0x328/0x630
[   21.422239]  ret_from_fork+0x10/0x20
[   21.422496] 
[   21.422673] Freed by task 164:
[   21.422766]  kasan_save_stack+0x3c/0x68
[   21.422864]  kasan_save_track+0x20/0x40
[   21.422945]  kasan_save_free_info+0x4c/0x78
[   21.423542]  __kasan_slab_free+0x6c/0x98
[   21.423640]  kfree+0x214/0x3c8
[   21.423682]  krealloc_uaf+0x12c/0x520
[   21.423723]  kunit_try_run_case+0x170/0x3f0
[   21.423802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.423908]  kthread+0x328/0x630
[   21.424048]  ret_from_fork+0x10/0x20
[   21.424151] 
[   21.424202] The buggy address belongs to the object at fff00000c4729800
[   21.424202]  which belongs to the cache kmalloc-256 of size 256
[   21.424346] The buggy address is located 0 bytes inside of
[   21.424346]  freed 256-byte region [fff00000c4729800, fff00000c4729900)
[   21.424513] 
[   21.424566] The buggy address belongs to the physical page:
[   21.424646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.424780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.424897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.425037] page_type: f5(slab)
[   21.425163] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.425333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.425463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.425580] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.425748] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.426056] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.426301] page dumped because: kasan: bad access detected
[   21.426611] 
[   21.426672] Memory state around the buggy address:
[   21.426749]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.426867]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.426958] >fff00000c4729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.427033]                    ^
[   21.427093]  fff00000c4729880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.427188]  fff00000c4729900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.427581] ==================================================================
[   21.402545] ==================================================================
[   21.402757] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   21.402923] Read of size 1 at addr fff00000c4729800 by task kunit_try_catch/164
[   21.403047] 
[   21.403143] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.403357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.403429] Hardware name: linux,dummy-virt (DT)
[   21.403501] Call trace:
[   21.403554]  show_stack+0x20/0x38 (C)
[   21.403675]  dump_stack_lvl+0x8c/0xd0
[   21.403801]  print_report+0x118/0x608
[   21.403991]  kasan_report+0xdc/0x128
[   21.405093]  __kasan_check_byte+0x54/0x70
[   21.405234]  krealloc_noprof+0x44/0x360
[   21.405351]  krealloc_uaf+0x180/0x520
[   21.405680]  kunit_try_run_case+0x170/0x3f0
[   21.405801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.405959]  kthread+0x328/0x630
[   21.406088]  ret_from_fork+0x10/0x20
[   21.406216] 
[   21.406263] Allocated by task 164:
[   21.406331]  kasan_save_stack+0x3c/0x68
[   21.406490]  kasan_save_track+0x20/0x40
[   21.406601]  kasan_save_alloc_info+0x40/0x58
[   21.406936]  __kasan_kmalloc+0xd4/0xd8
[   21.407050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.407140]  krealloc_uaf+0xc8/0x520
[   21.407219]  kunit_try_run_case+0x170/0x3f0
[   21.407450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.407567]  kthread+0x328/0x630
[   21.407649]  ret_from_fork+0x10/0x20
[   21.407781] 
[   21.407874] Freed by task 164:
[   21.408518]  kasan_save_stack+0x3c/0x68
[   21.408648]  kasan_save_track+0x20/0x40
[   21.408905]  kasan_save_free_info+0x4c/0x78
[   21.409769]  __kasan_slab_free+0x6c/0x98
[   21.409921]  kfree+0x214/0x3c8
[   21.410274]  krealloc_uaf+0x12c/0x520
[   21.410396]  kunit_try_run_case+0x170/0x3f0
[   21.410635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.410756]  kthread+0x328/0x630
[   21.410851]  ret_from_fork+0x10/0x20
[   21.410984] 
[   21.411053] The buggy address belongs to the object at fff00000c4729800
[   21.411053]  which belongs to the cache kmalloc-256 of size 256
[   21.411383] The buggy address is located 0 bytes inside of
[   21.411383]  freed 256-byte region [fff00000c4729800, fff00000c4729900)
[   21.411706] 
[   21.411763] The buggy address belongs to the physical page:
[   21.411936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.412224] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.412385] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.412762] page_type: f5(slab)
[   21.413003] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.413247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.413369] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.413501] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.413619] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.413731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.413833] page dumped because: kasan: bad access detected
[   21.413910] 
[   21.414278] Memory state around the buggy address:
[   21.414511]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.414613]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.414714] >fff00000c4729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.415054]                    ^
[   21.415135]  fff00000c4729880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.415247]  fff00000c4729900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.415407] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   21.249300] ==================================================================
[   21.249506] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   21.249942] Write of size 1 at addr fff00000c47296d0 by task kunit_try_catch/158
[   21.250160] 
[   21.250302] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.250546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.250609] Hardware name: linux,dummy-virt (DT)
[   21.250679] Call trace:
[   21.250733]  show_stack+0x20/0x38 (C)
[   21.251048]  dump_stack_lvl+0x8c/0xd0
[   21.251175]  print_report+0x118/0x608
[   21.251301]  kasan_report+0xdc/0x128
[   21.251433]  __asan_report_store1_noabort+0x20/0x30
[   21.251565]  krealloc_less_oob_helper+0xb9c/0xc50
[   21.251839]  krealloc_less_oob+0x20/0x38
[   21.252041]  kunit_try_run_case+0x170/0x3f0
[   21.252253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.253600]  kthread+0x328/0x630
[   21.253679]  ret_from_fork+0x10/0x20
[   21.253745] 
[   21.253768] Allocated by task 158:
[   21.253802]  kasan_save_stack+0x3c/0x68
[   21.253853]  kasan_save_track+0x20/0x40
[   21.253896]  kasan_save_alloc_info+0x40/0x58
[   21.253936]  __kasan_krealloc+0x118/0x178
[   21.253977]  krealloc_noprof+0x128/0x360
[   21.254019]  krealloc_less_oob_helper+0x168/0xc50
[   21.254061]  krealloc_less_oob+0x20/0x38
[   21.254101]  kunit_try_run_case+0x170/0x3f0
[   21.254143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.254190]  kthread+0x328/0x630
[   21.254226]  ret_from_fork+0x10/0x20
[   21.254265] 
[   21.254289] The buggy address belongs to the object at fff00000c4729600
[   21.254289]  which belongs to the cache kmalloc-256 of size 256
[   21.254386] The buggy address is located 7 bytes to the right of
[   21.254386]  allocated 201-byte region [fff00000c4729600, fff00000c47296c9)
[   21.254624] 
[   21.254674] The buggy address belongs to the physical page:
[   21.254743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.254857] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.254967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.255105] page_type: f5(slab)
[   21.255208] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.255410] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.255599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.255725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.255849] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.255975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.256078] page dumped because: kasan: bad access detected
[   21.256154] 
[   21.256197] Memory state around the buggy address:
[   21.256291]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.256436]  fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.256537] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.256628]                                                  ^
[   21.257262]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.257910]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.258029] ==================================================================
[   21.380150] ==================================================================
[   21.380265] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.380383] Write of size 1 at addr fff00000c65ea0eb by task kunit_try_catch/162
[   21.380520] 
[   21.380615] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.380828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.380884] Hardware name: linux,dummy-virt (DT)
[   21.380955] Call trace:
[   21.381009]  show_stack+0x20/0x38 (C)
[   21.381155]  dump_stack_lvl+0x8c/0xd0
[   21.381279]  print_report+0x118/0x608
[   21.381392]  kasan_report+0xdc/0x128
[   21.381521]  __asan_report_store1_noabort+0x20/0x30
[   21.381658]  krealloc_less_oob_helper+0xa58/0xc50
[   21.381789]  krealloc_large_less_oob+0x20/0x38
[   21.381923]  kunit_try_run_case+0x170/0x3f0
[   21.382037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.382160]  kthread+0x328/0x630
[   21.382271]  ret_from_fork+0x10/0x20
[   21.382447] 
[   21.382541] The buggy address belongs to the physical page:
[   21.382621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.382751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.382860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.382966] page_type: f8(unknown)
[   21.383055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.383178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.383303] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.383458] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.383586] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.383745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.383863] page dumped because: kasan: bad access detected
[   21.383970] 
[   21.384033] Memory state around the buggy address:
[   21.384143]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.384288]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.384392] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.384481]                                                           ^
[   21.384572]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.384717]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.384812] ==================================================================
[   21.352816] ==================================================================
[   21.353548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   21.353739] Write of size 1 at addr fff00000c65ea0d0 by task kunit_try_catch/162
[   21.353869] 
[   21.353961] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.354172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.354235] Hardware name: linux,dummy-virt (DT)
[   21.354313] Call trace:
[   21.354968]  show_stack+0x20/0x38 (C)
[   21.355210]  dump_stack_lvl+0x8c/0xd0
[   21.356027]  print_report+0x118/0x608
[   21.356429]  kasan_report+0xdc/0x128
[   21.356650]  __asan_report_store1_noabort+0x20/0x30
[   21.356863]  krealloc_less_oob_helper+0xb9c/0xc50
[   21.357217]  krealloc_large_less_oob+0x20/0x38
[   21.357562]  kunit_try_run_case+0x170/0x3f0
[   21.357699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.358125]  kthread+0x328/0x630
[   21.358799]  ret_from_fork+0x10/0x20
[   21.358972] 
[   21.359019] The buggy address belongs to the physical page:
[   21.359083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.359205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.360007] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.360607] page_type: f8(unknown)
[   21.360725] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.360922] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.361134] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.361269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.361609] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.362048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.362179] page dumped because: kasan: bad access detected
[   21.362495] 
[   21.362561] Memory state around the buggy address:
[   21.362638]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.362721]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.362797] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.362885]                                                  ^
[   21.363217]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.363496]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.363593] ==================================================================
[   21.239289] ==================================================================
[   21.239483] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   21.239639] Write of size 1 at addr fff00000c47296c9 by task kunit_try_catch/158
[   21.240077] 
[   21.240347] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.240656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.240742] Hardware name: linux,dummy-virt (DT)
[   21.240830] Call trace:
[   21.240889]  show_stack+0x20/0x38 (C)
[   21.241023]  dump_stack_lvl+0x8c/0xd0
[   21.241149]  print_report+0x118/0x608
[   21.241246]  kasan_report+0xdc/0x128
[   21.241331]  __asan_report_store1_noabort+0x20/0x30
[   21.241452]  krealloc_less_oob_helper+0xa48/0xc50
[   21.241586]  krealloc_less_oob+0x20/0x38
[   21.241696]  kunit_try_run_case+0x170/0x3f0
[   21.241978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.242309]  kthread+0x328/0x630
[   21.242528]  ret_from_fork+0x10/0x20
[   21.242663] 
[   21.242709] Allocated by task 158:
[   21.242772]  kasan_save_stack+0x3c/0x68
[   21.242866]  kasan_save_track+0x20/0x40
[   21.242951]  kasan_save_alloc_info+0x40/0x58
[   21.243062]  __kasan_krealloc+0x118/0x178
[   21.243164]  krealloc_noprof+0x128/0x360
[   21.243258]  krealloc_less_oob_helper+0x168/0xc50
[   21.243358]  krealloc_less_oob+0x20/0x38
[   21.243465]  kunit_try_run_case+0x170/0x3f0
[   21.243561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.243665]  kthread+0x328/0x630
[   21.243744]  ret_from_fork+0x10/0x20
[   21.243831] 
[   21.243883] The buggy address belongs to the object at fff00000c4729600
[   21.243883]  which belongs to the cache kmalloc-256 of size 256
[   21.244029] The buggy address is located 0 bytes to the right of
[   21.244029]  allocated 201-byte region [fff00000c4729600, fff00000c47296c9)
[   21.244197] 
[   21.244274] The buggy address belongs to the physical page:
[   21.244378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.244508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.244618] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.244760] page_type: f5(slab)
[   21.245081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.245498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.245653] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.245772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.246106] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.246259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.246381] page dumped because: kasan: bad access detected
[   21.246484] 
[   21.246534] Memory state around the buggy address:
[   21.246616]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246721]  fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.246836] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.246934]                                               ^
[   21.247020]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.247112]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.247180] ==================================================================
[   21.365566] ==================================================================
[   21.365684] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.365821] Write of size 1 at addr fff00000c65ea0da by task kunit_try_catch/162
[   21.366134] 
[   21.366238] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.366867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.366975] Hardware name: linux,dummy-virt (DT)
[   21.367187] Call trace:
[   21.367272]  show_stack+0x20/0x38 (C)
[   21.367623]  dump_stack_lvl+0x8c/0xd0
[   21.367703]  print_report+0x118/0x608
[   21.367760]  kasan_report+0xdc/0x128
[   21.367835]  __asan_report_store1_noabort+0x20/0x30
[   21.367919]  krealloc_less_oob_helper+0xa80/0xc50
[   21.367974]  krealloc_large_less_oob+0x20/0x38
[   21.368027]  kunit_try_run_case+0x170/0x3f0
[   21.368081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.368139]  kthread+0x328/0x630
[   21.368188]  ret_from_fork+0x10/0x20
[   21.368247] 
[   21.368274] The buggy address belongs to the physical page:
[   21.368312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.368373] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.368444] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.368509] page_type: f8(unknown)
[   21.368557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.368612] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.368666] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.368718] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.368770] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.368821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.368864] page dumped because: kasan: bad access detected
[   21.368898] 
[   21.368918] Memory state around the buggy address:
[   21.368955]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.369001]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.369047] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.369088]                                                     ^
[   21.369130]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.369175]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.369216] ==================================================================
[   21.260054] ==================================================================
[   21.260639] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.260805] Write of size 1 at addr fff00000c47296da by task kunit_try_catch/158
[   21.260926] 
[   21.261376] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.261619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.261688] Hardware name: linux,dummy-virt (DT)
[   21.261767] Call trace:
[   21.261836]  show_stack+0x20/0x38 (C)
[   21.261973]  dump_stack_lvl+0x8c/0xd0
[   21.262088]  print_report+0x118/0x608
[   21.262205]  kasan_report+0xdc/0x128
[   21.262321]  __asan_report_store1_noabort+0x20/0x30
[   21.262706]  krealloc_less_oob_helper+0xa80/0xc50
[   21.262862]  krealloc_less_oob+0x20/0x38
[   21.263634]  kunit_try_run_case+0x170/0x3f0
[   21.263829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.264030]  kthread+0x328/0x630
[   21.264136]  ret_from_fork+0x10/0x20
[   21.264250] 
[   21.264301] Allocated by task 158:
[   21.264370]  kasan_save_stack+0x3c/0x68
[   21.264482]  kasan_save_track+0x20/0x40
[   21.264574]  kasan_save_alloc_info+0x40/0x58
[   21.264661]  __kasan_krealloc+0x118/0x178
[   21.264749]  krealloc_noprof+0x128/0x360
[   21.264841]  krealloc_less_oob_helper+0x168/0xc50
[   21.264937]  krealloc_less_oob+0x20/0x38
[   21.265023]  kunit_try_run_case+0x170/0x3f0
[   21.265126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.265269]  kthread+0x328/0x630
[   21.265353]  ret_from_fork+0x10/0x20
[   21.265448] 
[   21.265513] The buggy address belongs to the object at fff00000c4729600
[   21.265513]  which belongs to the cache kmalloc-256 of size 256
[   21.265704] The buggy address is located 17 bytes to the right of
[   21.265704]  allocated 201-byte region [fff00000c4729600, fff00000c47296c9)
[   21.265861] 
[   21.265911] The buggy address belongs to the physical page:
[   21.265992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.266138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.266297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.266470] page_type: f5(slab)
[   21.266561] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.266687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.266825] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.266927] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.267033] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.267146] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.267251] page dumped because: kasan: bad access detected
[   21.267332] 
[   21.267380] Memory state around the buggy address:
[   21.267472]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.267588]  fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.267670] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.267764]                                                     ^
[   21.267849]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.267928]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.267999] ==================================================================
[   21.277507] ==================================================================
[   21.277625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.277753] Write of size 1 at addr fff00000c47296eb by task kunit_try_catch/158
[   21.277878] 
[   21.277999] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.278189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.278246] Hardware name: linux,dummy-virt (DT)
[   21.278311] Call trace:
[   21.278372]  show_stack+0x20/0x38 (C)
[   21.278500]  dump_stack_lvl+0x8c/0xd0
[   21.278609]  print_report+0x118/0x608
[   21.278711]  kasan_report+0xdc/0x128
[   21.278913]  __asan_report_store1_noabort+0x20/0x30
[   21.279068]  krealloc_less_oob_helper+0xa58/0xc50
[   21.279213]  krealloc_less_oob+0x20/0x38
[   21.279350]  kunit_try_run_case+0x170/0x3f0
[   21.279503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.279621]  kthread+0x328/0x630
[   21.279709]  ret_from_fork+0x10/0x20
[   21.279818] 
[   21.279866] Allocated by task 158:
[   21.279926]  kasan_save_stack+0x3c/0x68
[   21.280008]  kasan_save_track+0x20/0x40
[   21.280082]  kasan_save_alloc_info+0x40/0x58
[   21.280185]  __kasan_krealloc+0x118/0x178
[   21.280271]  krealloc_noprof+0x128/0x360
[   21.280437]  krealloc_less_oob_helper+0x168/0xc50
[   21.280537]  krealloc_less_oob+0x20/0x38
[   21.280630]  kunit_try_run_case+0x170/0x3f0
[   21.280778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.280883]  kthread+0x328/0x630
[   21.280965]  ret_from_fork+0x10/0x20
[   21.281051] 
[   21.281100] The buggy address belongs to the object at fff00000c4729600
[   21.281100]  which belongs to the cache kmalloc-256 of size 256
[   21.281240] The buggy address is located 34 bytes to the right of
[   21.281240]  allocated 201-byte region [fff00000c4729600, fff00000c47296c9)
[   21.281407] 
[   21.281462] The buggy address belongs to the physical page:
[   21.281539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.281672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.281787] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.281913] page_type: f5(slab)
[   21.282008] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.282131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.282253] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.282406] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.282518] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.282640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.282745] page dumped because: kasan: bad access detected
[   21.282811] 
[   21.282857] Memory state around the buggy address:
[   21.282926]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283019]  fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.283128] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.283227]                                                           ^
[   21.283330]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283439]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283631] ==================================================================
[   21.372862] ==================================================================
[   21.373673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.373856] Write of size 1 at addr fff00000c65ea0ea by task kunit_try_catch/162
[   21.374270] 
[   21.374540] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.374735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.374792] Hardware name: linux,dummy-virt (DT)
[   21.374872] Call trace:
[   21.374931]  show_stack+0x20/0x38 (C)
[   21.375054]  dump_stack_lvl+0x8c/0xd0
[   21.375176]  print_report+0x118/0x608
[   21.375287]  kasan_report+0xdc/0x128
[   21.375378]  __asan_report_store1_noabort+0x20/0x30
[   21.375485]  krealloc_less_oob_helper+0xae4/0xc50
[   21.375590]  krealloc_large_less_oob+0x20/0x38
[   21.375707]  kunit_try_run_case+0x170/0x3f0
[   21.375824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.375958]  kthread+0x328/0x630
[   21.376066]  ret_from_fork+0x10/0x20
[   21.376184] 
[   21.376233] The buggy address belongs to the physical page:
[   21.376310] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.376481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.376600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.376730] page_type: f8(unknown)
[   21.376825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.376947] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.377071] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.377192] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.377313] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.377436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.377518] page dumped because: kasan: bad access detected
[   21.377587] 
[   21.377647] Memory state around the buggy address:
[   21.377738]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.377845]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.377939] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.378031]                                                           ^
[   21.378131]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.378243]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.378342] ==================================================================
[   21.269478] ==================================================================
[   21.269597] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.269715] Write of size 1 at addr fff00000c47296ea by task kunit_try_catch/158
[   21.269835] 
[   21.269917] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.270122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.270200] Hardware name: linux,dummy-virt (DT)
[   21.270269] Call trace:
[   21.270321]  show_stack+0x20/0x38 (C)
[   21.270449]  dump_stack_lvl+0x8c/0xd0
[   21.270568]  print_report+0x118/0x608
[   21.270676]  kasan_report+0xdc/0x128
[   21.270777]  __asan_report_store1_noabort+0x20/0x30
[   21.270912]  krealloc_less_oob_helper+0xae4/0xc50
[   21.271071]  krealloc_less_oob+0x20/0x38
[   21.271177]  kunit_try_run_case+0x170/0x3f0
[   21.271302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.271418]  kthread+0x328/0x630
[   21.271535]  ret_from_fork+0x10/0x20
[   21.271644] 
[   21.271686] Allocated by task 158:
[   21.271753]  kasan_save_stack+0x3c/0x68
[   21.271839]  kasan_save_track+0x20/0x40
[   21.271921]  kasan_save_alloc_info+0x40/0x58
[   21.272006]  __kasan_krealloc+0x118/0x178
[   21.272084]  krealloc_noprof+0x128/0x360
[   21.272171]  krealloc_less_oob_helper+0x168/0xc50
[   21.272298]  krealloc_less_oob+0x20/0x38
[   21.272392]  kunit_try_run_case+0x170/0x3f0
[   21.272499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.272605]  kthread+0x328/0x630
[   21.272683]  ret_from_fork+0x10/0x20
[   21.272763] 
[   21.272813] The buggy address belongs to the object at fff00000c4729600
[   21.272813]  which belongs to the cache kmalloc-256 of size 256
[   21.272961] The buggy address is located 33 bytes to the right of
[   21.272961]  allocated 201-byte region [fff00000c4729600, fff00000c47296c9)
[   21.273197] 
[   21.273253] The buggy address belongs to the physical page:
[   21.273348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.273510] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.273674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.273859] page_type: f5(slab)
[   21.273973] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.274147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.274283] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.274466] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.274582] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.274707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.274800] page dumped because: kasan: bad access detected
[   21.274886] 
[   21.274927] Memory state around the buggy address:
[   21.275002]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275111]  fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.275222] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.275337]                                                           ^
[   21.275469]  fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275599]  fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275695] ==================================================================
[   21.334944] ==================================================================
[   21.335547] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   21.335745] Write of size 1 at addr fff00000c65ea0c9 by task kunit_try_catch/162
[   21.335855] 
[   21.335942] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.336121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.336180] Hardware name: linux,dummy-virt (DT)
[   21.336254] Call trace:
[   21.336304]  show_stack+0x20/0x38 (C)
[   21.336428]  dump_stack_lvl+0x8c/0xd0
[   21.336535]  print_report+0x118/0x608
[   21.336690]  kasan_report+0xdc/0x128
[   21.336942]  __asan_report_store1_noabort+0x20/0x30
[   21.337071]  krealloc_less_oob_helper+0xa48/0xc50
[   21.337193]  krealloc_large_less_oob+0x20/0x38
[   21.337319]  kunit_try_run_case+0x170/0x3f0
[   21.337458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.337609]  kthread+0x328/0x630
[   21.337949]  ret_from_fork+0x10/0x20
[   21.338972] 
[   21.339235] The buggy address belongs to the physical page:
[   21.339626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.340550] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.340724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.341963] page_type: f8(unknown)
[   21.342076] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.342205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.342334] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.343423] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.344391] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.344693] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.345196] page dumped because: kasan: bad access detected
[   21.345342] 
[   21.345392] Memory state around the buggy address:
[   21.345550]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.345754]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.345918] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.346011]                                               ^
[   21.346352]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.346796]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.346966] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   21.311346] ==================================================================
[   21.311664] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   21.312160] Write of size 1 at addr fff00000c65ea0f0 by task kunit_try_catch/160
[   21.312344] 
[   21.312498] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.312712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.312778] Hardware name: linux,dummy-virt (DT)
[   21.312856] Call trace:
[   21.312912]  show_stack+0x20/0x38 (C)
[   21.313034]  dump_stack_lvl+0x8c/0xd0
[   21.313157]  print_report+0x118/0x608
[   21.313275]  kasan_report+0xdc/0x128
[   21.313389]  __asan_report_store1_noabort+0x20/0x30
[   21.313972]  krealloc_more_oob_helper+0x5c0/0x678
[   21.315001]  krealloc_large_more_oob+0x20/0x38
[   21.315340]  kunit_try_run_case+0x170/0x3f0
[   21.315500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.315809]  kthread+0x328/0x630
[   21.316221]  ret_from_fork+0x10/0x20
[   21.316575] 
[   21.316725] The buggy address belongs to the physical page:
[   21.316821] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.317231] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.319411] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.319499] page_type: f8(unknown)
[   21.319551] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.319607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.319661] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.319713] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.319765] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.319817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.319860] page dumped because: kasan: bad access detected
[   21.319894] 
[   21.319915] Memory state around the buggy address:
[   21.319953]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.320000]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.320046] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.320087]                                                              ^
[   21.320133]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.320177]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.320220] ==================================================================
[   21.297021] ==================================================================
[   21.297208] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   21.297741] Write of size 1 at addr fff00000c65ea0eb by task kunit_try_catch/160
[   21.298121] 
[   21.298325] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.298994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.299067] Hardware name: linux,dummy-virt (DT)
[   21.299304] Call trace:
[   21.299485]  show_stack+0x20/0x38 (C)
[   21.299761]  dump_stack_lvl+0x8c/0xd0
[   21.299889]  print_report+0x118/0x608
[   21.300011]  kasan_report+0xdc/0x128
[   21.300123]  __asan_report_store1_noabort+0x20/0x30
[   21.300248]  krealloc_more_oob_helper+0x60c/0x678
[   21.300373]  krealloc_large_more_oob+0x20/0x38
[   21.300507]  kunit_try_run_case+0x170/0x3f0
[   21.300629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.300761]  kthread+0x328/0x630
[   21.300868]  ret_from_fork+0x10/0x20
[   21.301379] 
[   21.301535] The buggy address belongs to the physical page:
[   21.301628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8
[   21.302009] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.302280] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.302865] page_type: f8(unknown)
[   21.303099] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.303259] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.303561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.303838] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.304216] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff
[   21.304726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.304924] page dumped because: kasan: bad access detected
[   21.305292] 
[   21.305355] Memory state around the buggy address:
[   21.305528]  fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.305777]  fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.306017] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.306140]                                                           ^
[   21.306236]  fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.306343]  fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.306462] ==================================================================
[   21.196693] ==================================================================
[   21.196866] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   21.197021] Write of size 1 at addr fff00000c47294eb by task kunit_try_catch/156
[   21.197149] 
[   21.197243] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.197457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.197514] Hardware name: linux,dummy-virt (DT)
[   21.197583] Call trace:
[   21.197638]  show_stack+0x20/0x38 (C)
[   21.197797]  dump_stack_lvl+0x8c/0xd0
[   21.197921]  print_report+0x118/0x608
[   21.198030]  kasan_report+0xdc/0x128
[   21.198130]  __asan_report_store1_noabort+0x20/0x30
[   21.198248]  krealloc_more_oob_helper+0x60c/0x678
[   21.198382]  krealloc_more_oob+0x20/0x38
[   21.198513]  kunit_try_run_case+0x170/0x3f0
[   21.198644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.198776]  kthread+0x328/0x630
[   21.198899]  ret_from_fork+0x10/0x20
[   21.199034] 
[   21.199086] Allocated by task 156:
[   21.199164]  kasan_save_stack+0x3c/0x68
[   21.199303]  kasan_save_track+0x20/0x40
[   21.199413]  kasan_save_alloc_info+0x40/0x58
[   21.199510]  __kasan_krealloc+0x118/0x178
[   21.199599]  krealloc_noprof+0x128/0x360
[   21.199680]  krealloc_more_oob_helper+0x168/0x678
[   21.199755]  krealloc_more_oob+0x20/0x38
[   21.199873]  kunit_try_run_case+0x170/0x3f0
[   21.200203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.200386]  kthread+0x328/0x630
[   21.200485]  ret_from_fork+0x10/0x20
[   21.200575] 
[   21.200628] The buggy address belongs to the object at fff00000c4729400
[   21.200628]  which belongs to the cache kmalloc-256 of size 256
[   21.200966] The buggy address is located 0 bytes to the right of
[   21.200966]  allocated 235-byte region [fff00000c4729400, fff00000c47294eb)
[   21.201117] 
[   21.201173] The buggy address belongs to the physical page:
[   21.201253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.201385] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.201930] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.202706] page_type: f5(slab)
[   21.203049] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.203705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.203894] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.204128] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.204310] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.204797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.204979] page dumped because: kasan: bad access detected
[   21.205061] 
[   21.205502] Memory state around the buggy address:
[   21.205669]  fff00000c4729380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205893]  fff00000c4729400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.206352] >fff00000c4729480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.206472]                                                           ^
[   21.206563]  fff00000c4729500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.206646]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.206729] ==================================================================
[   21.209049] ==================================================================
[   21.209166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   21.209601] Write of size 1 at addr fff00000c47294f0 by task kunit_try_catch/156
[   21.209858] 
[   21.210247] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.210628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.210701] Hardware name: linux,dummy-virt (DT)
[   21.210850] Call trace:
[   21.210905]  show_stack+0x20/0x38 (C)
[   21.211289]  dump_stack_lvl+0x8c/0xd0
[   21.211483]  print_report+0x118/0x608
[   21.211685]  kasan_report+0xdc/0x128
[   21.211889]  __asan_report_store1_noabort+0x20/0x30
[   21.212138]  krealloc_more_oob_helper+0x5c0/0x678
[   21.212420]  krealloc_more_oob+0x20/0x38
[   21.212992]  kunit_try_run_case+0x170/0x3f0
[   21.213149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.213279]  kthread+0x328/0x630
[   21.213385]  ret_from_fork+0x10/0x20
[   21.213523] 
[   21.213569] Allocated by task 156:
[   21.213638]  kasan_save_stack+0x3c/0x68
[   21.214414]  kasan_save_track+0x20/0x40
[   21.214512]  kasan_save_alloc_info+0x40/0x58
[   21.214556]  __kasan_krealloc+0x118/0x178
[   21.214599]  krealloc_noprof+0x128/0x360
[   21.214641]  krealloc_more_oob_helper+0x168/0x678
[   21.214685]  krealloc_more_oob+0x20/0x38
[   21.214724]  kunit_try_run_case+0x170/0x3f0
[   21.214766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.214813]  kthread+0x328/0x630
[   21.214865]  ret_from_fork+0x10/0x20
[   21.214906] 
[   21.214935] The buggy address belongs to the object at fff00000c4729400
[   21.214935]  which belongs to the cache kmalloc-256 of size 256
[   21.215001] The buggy address is located 5 bytes to the right of
[   21.215001]  allocated 235-byte region [fff00000c4729400, fff00000c47294eb)
[   21.215069] 
[   21.215094] The buggy address belongs to the physical page:
[   21.215132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728
[   21.215192] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.215243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.215305] page_type: f5(slab)
[   21.215353] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.215446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.215576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.215688] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.215783] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff
[   21.215889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.215986] page dumped because: kasan: bad access detected
[   21.216065] 
[   21.216112] Memory state around the buggy address:
[   21.216191]  fff00000c4729380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216298]  fff00000c4729400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.216418] >fff00000c4729480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.216520]                                                              ^
[   21.216627]  fff00000c4729500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216753]  fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   21.173448] ==================================================================
[   21.173614] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   21.173829] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/154
[   21.173948] 
[   21.174040] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.174246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.174315] Hardware name: linux,dummy-virt (DT)
[   21.174421] Call trace:
[   21.174509]  show_stack+0x20/0x38 (C)
[   21.174701]  dump_stack_lvl+0x8c/0xd0
[   21.174893]  print_report+0x118/0x608
[   21.175068]  kasan_report+0xdc/0x128
[   21.175425]  __asan_report_load1_noabort+0x20/0x30
[   21.175577]  page_alloc_uaf+0x328/0x350
[   21.175851]  kunit_try_run_case+0x170/0x3f0
[   21.176124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176422]  kthread+0x328/0x630
[   21.176529]  ret_from_fork+0x10/0x20
[   21.176656] 
[   21.176711] The buggy address belongs to the physical page:
[   21.176788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   21.176913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.177039] page_type: f0(buddy)
[   21.177511] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   21.177763] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   21.177973] page dumped because: kasan: bad access detected
[   21.178049] 
[   21.178334] Memory state around the buggy address:
[   21.178501]  fff00000c78dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.178639]  fff00000c78dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.178763] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.179141]                    ^
[   21.179225]  fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.179327]  fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.179552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   21.115981] ==================================================================
[   21.116209] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   21.116374] Free of addr fff00000c7894001 by task kunit_try_catch/150
[   21.117230] 
[   21.117510] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.118197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.118319] Hardware name: linux,dummy-virt (DT)
[   21.118489] Call trace:
[   21.118609]  show_stack+0x20/0x38 (C)
[   21.118944]  dump_stack_lvl+0x8c/0xd0
[   21.119074]  print_report+0x118/0x608
[   21.119174]  kasan_report_invalid_free+0xc0/0xe8
[   21.119266]  __kasan_kfree_large+0x5c/0xa8
[   21.119361]  free_large_kmalloc+0x64/0x190
[   21.119475]  kfree+0x270/0x3c8
[   21.119573]  kmalloc_large_invalid_free+0x108/0x270
[   21.119693]  kunit_try_run_case+0x170/0x3f0
[   21.119811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.120373]  kthread+0x328/0x630
[   21.120629]  ret_from_fork+0x10/0x20
[   21.120832] 
[   21.121192] The buggy address belongs to the physical page:
[   21.121275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   21.121715] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.121986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.122384] page_type: f8(unknown)
[   21.122586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.122716] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.122904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.123075] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.123250] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   21.123422] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.123509] page dumped because: kasan: bad access detected
[   21.123571] 
[   21.123606] Memory state around the buggy address:
[   21.123696]  fff00000c7893f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123794]  fff00000c7893f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.124191] >fff00000c7894000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.124355]                    ^
[   21.124600]  fff00000c7894080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.124718]  fff00000c7894100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.124864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   21.079826] ==================================================================
[   21.080015] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.080164] Read of size 1 at addr fff00000c7894000 by task kunit_try_catch/148
[   21.080281] 
[   21.081471] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.082321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.082523] Hardware name: linux,dummy-virt (DT)
[   21.082781] Call trace:
[   21.083004]  show_stack+0x20/0x38 (C)
[   21.083409]  dump_stack_lvl+0x8c/0xd0
[   21.083645]  print_report+0x118/0x608
[   21.084262]  kasan_report+0xdc/0x128
[   21.084914]  __asan_report_load1_noabort+0x20/0x30
[   21.085362]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.085703]  kunit_try_run_case+0x170/0x3f0
[   21.085958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.086521]  kthread+0x328/0x630
[   21.086620]  ret_from_fork+0x10/0x20
[   21.086713] 
[   21.086756] The buggy address belongs to the physical page:
[   21.086833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   21.087976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.088307] raw: 0bfffe0000000000 ffffc1ffc31e2608 fff00000da448c40 0000000000000000
[   21.088497] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.088605] page dumped because: kasan: bad access detected
[   21.089153] 
[   21.089341] Memory state around the buggy address:
[   21.089728]  fff00000c7893f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089868]  fff00000c7893f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.091206] >fff00000c7894000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.091314]                    ^
[   21.091431]  fff00000c7894080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.091541]  fff00000c7894100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.091758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   21.056468] ==================================================================
[   21.056663] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.056812] Write of size 1 at addr fff00000c789600a by task kunit_try_catch/146
[   21.056934] 
[   21.057021] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.057246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.057313] Hardware name: linux,dummy-virt (DT)
[   21.057381] Call trace:
[   21.057442]  show_stack+0x20/0x38 (C)
[   21.057587]  dump_stack_lvl+0x8c/0xd0
[   21.057687]  print_report+0x118/0x608
[   21.057790]  kasan_report+0xdc/0x128
[   21.057917]  __asan_report_store1_noabort+0x20/0x30
[   21.058029]  kmalloc_large_oob_right+0x278/0x2b8
[   21.058138]  kunit_try_run_case+0x170/0x3f0
[   21.058259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.058384]  kthread+0x328/0x630
[   21.058546]  ret_from_fork+0x10/0x20
[   21.058661] 
[   21.058760] The buggy address belongs to the physical page:
[   21.058877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   21.059000] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.059110] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.059245] page_type: f8(unknown)
[   21.059351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.059481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.059649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.059814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.060017] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff
[   21.060153] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.060327] page dumped because: kasan: bad access detected
[   21.060463] 
[   21.060543] Memory state around the buggy address:
[   21.060636]  fff00000c7895f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.060741]  fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.060846] >fff00000c7896000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.060952]                       ^
[   21.061070]  fff00000c7896080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.061179]  fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.061274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   21.034036] ==================================================================
[   21.034227] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   21.034435] Write of size 1 at addr fff00000c45adf00 by task kunit_try_catch/144
[   21.034549] 
[   21.034639] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   21.035392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.035467] Hardware name: linux,dummy-virt (DT)
[   21.035726] Call trace:
[   21.035789]  show_stack+0x20/0x38 (C)
[   21.035951]  dump_stack_lvl+0x8c/0xd0
[   21.036114]  print_report+0x118/0x608
[   21.036293]  kasan_report+0xdc/0x128
[   21.036516]  __asan_report_store1_noabort+0x20/0x30
[   21.036702]  kmalloc_big_oob_right+0x2a4/0x2f0
[   21.037057]  kunit_try_run_case+0x170/0x3f0
[   21.037311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.037513]  kthread+0x328/0x630
[   21.037635]  ret_from_fork+0x10/0x20
[   21.037952] 
[   21.038004] Allocated by task 144:
[   21.038126]  kasan_save_stack+0x3c/0x68
[   21.038250]  kasan_save_track+0x20/0x40
[   21.038532]  kasan_save_alloc_info+0x40/0x58
[   21.038623]  __kasan_kmalloc+0xd4/0xd8
[   21.038714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.038829]  kmalloc_big_oob_right+0xb8/0x2f0
[   21.038988]  kunit_try_run_case+0x170/0x3f0
[   21.039092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.039248]  kthread+0x328/0x630
[   21.039537]  ret_from_fork+0x10/0x20
[   21.039684] 
[   21.039902] The buggy address belongs to the object at fff00000c45ac000
[   21.039902]  which belongs to the cache kmalloc-8k of size 8192
[   21.040116] The buggy address is located 0 bytes to the right of
[   21.040116]  allocated 7936-byte region [fff00000c45ac000, fff00000c45adf00)
[   21.040323] 
[   21.040378] The buggy address belongs to the physical page:
[   21.040671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   21.040807] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.040926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.041063] page_type: f5(slab)
[   21.041155] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   21.041275] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.041412] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   21.041537] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.041660] head: 0bfffe0000000003 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   21.041785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   21.041925] page dumped because: kasan: bad access detected
[   21.042007] 
[   21.042054] Memory state around the buggy address:
[   21.042134]  fff00000c45ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.042245]  fff00000c45ade80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.042353] >fff00000c45adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043083]                    ^
[   21.043180]  fff00000c45adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043275]  fff00000c45ae000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043346] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   20.999129] ==================================================================
[   20.999263] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   20.999383] Write of size 1 at addr fff00000c6394c78 by task kunit_try_catch/142
[   20.999504] 
[   20.999586] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.999793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.999857] Hardware name: linux,dummy-virt (DT)
[   20.999931] Call trace:
[   20.999985]  show_stack+0x20/0x38 (C)
[   21.000107]  dump_stack_lvl+0x8c/0xd0
[   21.000222]  print_report+0x118/0x608
[   21.000335]  kasan_report+0xdc/0x128
[   21.000494]  __asan_report_store1_noabort+0x20/0x30
[   21.000626]  kmalloc_track_caller_oob_right+0x418/0x488
[   21.000797]  kunit_try_run_case+0x170/0x3f0
[   21.000916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.001046]  kthread+0x328/0x630
[   21.001147]  ret_from_fork+0x10/0x20
[   21.001265] 
[   21.001315] Allocated by task 142:
[   21.001445]  kasan_save_stack+0x3c/0x68
[   21.001538]  kasan_save_track+0x20/0x40
[   21.001623]  kasan_save_alloc_info+0x40/0x58
[   21.001713]  __kasan_kmalloc+0xd4/0xd8
[   21.001806]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   21.002502]  kmalloc_track_caller_oob_right+0x184/0x488
[   21.002681]  kunit_try_run_case+0x170/0x3f0
[   21.002914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.003075]  kthread+0x328/0x630
[   21.003183]  ret_from_fork+0x10/0x20
[   21.003304] 
[   21.003349] The buggy address belongs to the object at fff00000c6394c00
[   21.003349]  which belongs to the cache kmalloc-128 of size 128
[   21.003669] The buggy address is located 0 bytes to the right of
[   21.003669]  allocated 120-byte region [fff00000c6394c00, fff00000c6394c78)
[   21.003998] 
[   21.004043] The buggy address belongs to the physical page:
[   21.004103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394
[   21.004214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.005702] page_type: f5(slab)
[   21.005886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.006073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.006320] page dumped because: kasan: bad access detected
[   21.006529] 
[   21.006643] Memory state around the buggy address:
[   21.006770]  fff00000c6394b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.006888]  fff00000c6394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.006997] >fff00000c6394c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.007090]                                                                 ^
[   21.007182]  fff00000c6394c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007263]  fff00000c6394d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007725] ==================================================================
[   20.991538] ==================================================================
[   20.991707] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.991849] Write of size 1 at addr fff00000c6394b78 by task kunit_try_catch/142
[   20.991972] 
[   20.992055] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.992250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.992310] Hardware name: linux,dummy-virt (DT)
[   20.992383] Call trace:
[   20.992452]  show_stack+0x20/0x38 (C)
[   20.992579]  dump_stack_lvl+0x8c/0xd0
[   20.992696]  print_report+0x118/0x608
[   20.992808]  kasan_report+0xdc/0x128
[   20.992918]  __asan_report_store1_noabort+0x20/0x30
[   20.993036]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.993168]  kunit_try_run_case+0x170/0x3f0
[   20.993290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.993442]  kthread+0x328/0x630
[   20.993542]  ret_from_fork+0x10/0x20
[   20.993659] 
[   20.993704] Allocated by task 142:
[   20.993774]  kasan_save_stack+0x3c/0x68
[   20.993911]  kasan_save_track+0x20/0x40
[   20.994047]  kasan_save_alloc_info+0x40/0x58
[   20.994175]  __kasan_kmalloc+0xd4/0xd8
[   20.994319]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.994500]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.994606]  kunit_try_run_case+0x170/0x3f0
[   20.994713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.994829]  kthread+0x328/0x630
[   20.994918]  ret_from_fork+0x10/0x20
[   20.995014] 
[   20.995064] The buggy address belongs to the object at fff00000c6394b00
[   20.995064]  which belongs to the cache kmalloc-128 of size 128
[   20.995185] The buggy address is located 0 bytes to the right of
[   20.995185]  allocated 120-byte region [fff00000c6394b00, fff00000c6394b78)
[   20.995336] 
[   20.995368] The buggy address belongs to the physical page:
[   20.995427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394
[   20.995493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.995554] page_type: f5(slab)
[   20.995603] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.995659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.995703] page dumped because: kasan: bad access detected
[   20.995737] 
[   20.995757] Memory state around the buggy address:
[   20.995793]  fff00000c6394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.995840]  fff00000c6394a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.995886] >fff00000c6394b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.995927]                                                                 ^
[   20.995970]  fff00000c6394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.996015]  fff00000c6394c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.996055] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   20.969861] ==================================================================
[   20.970045] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.970199] Read of size 1 at addr fff00000c78b1000 by task kunit_try_catch/140
[   20.970307] 
[   20.970471] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.970668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.970729] Hardware name: linux,dummy-virt (DT)
[   20.971121] Call trace:
[   20.972499]  show_stack+0x20/0x38 (C)
[   20.972587]  dump_stack_lvl+0x8c/0xd0
[   20.972650]  print_report+0x118/0x608
[   20.972706]  kasan_report+0xdc/0x128
[   20.972757]  __asan_report_load1_noabort+0x20/0x30
[   20.972811]  kmalloc_node_oob_right+0x2f4/0x330
[   20.972865]  kunit_try_run_case+0x170/0x3f0
[   20.972922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.972981]  kthread+0x328/0x630
[   20.973030]  ret_from_fork+0x10/0x20
[   20.973089] 
[   20.973111] Allocated by task 140:
[   20.973147]  kasan_save_stack+0x3c/0x68
[   20.973198]  kasan_save_track+0x20/0x40
[   20.973240]  kasan_save_alloc_info+0x40/0x58
[   20.973280]  __kasan_kmalloc+0xd4/0xd8
[   20.973319]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   20.973366]  kmalloc_node_oob_right+0xbc/0x330
[   20.973428]  kunit_try_run_case+0x170/0x3f0
[   20.973473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.973520]  kthread+0x328/0x630
[   20.973556]  ret_from_fork+0x10/0x20
[   20.973594] 
[   20.973617] The buggy address belongs to the object at fff00000c78b0000
[   20.973617]  which belongs to the cache kmalloc-4k of size 4096
[   20.973683] The buggy address is located 0 bytes to the right of
[   20.973683]  allocated 4096-byte region [fff00000c78b0000, fff00000c78b1000)
[   20.973751] 
[   20.973777] The buggy address belongs to the physical page:
[   20.973888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   20.974088] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.974146] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.974227] page_type: f5(slab)
[   20.974282] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   20.974339] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.974996] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   20.975119] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.975229] head: 0bfffe0000000003 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   20.975343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.975457] page dumped because: kasan: bad access detected
[   20.975526] 
[   20.975567] Memory state around the buggy address:
[   20.975639]  fff00000c78b0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.975832]  fff00000c78b0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.975964] >fff00000c78b1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.976059]                    ^
[   20.976126]  fff00000c78b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.976230]  fff00000c78b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.976327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure Automatically assigned
[   20.930285] ==================================================================
[   20.930532] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   20.930723] Read of size 1 at addr fff00000c66b0fff by task kunit_try_catch/138
[   20.930923] 
[   20.931040] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.931249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.931305] Hardware name: linux,dummy-virt (DT)
[   20.931368] Call trace:
[   20.931501]  show_stack+0x20/0x38 (C)
[   20.932424]  dump_stack_lvl+0x8c/0xd0
[   20.932571]  print_report+0x118/0x608
[   20.932678]  kasan_report+0xdc/0x128
[   20.933272]  __asan_report_load1_noabort+0x20/0x30
[   20.933793]  kmalloc_oob_left+0x2ec/0x320
[   20.934265]  kunit_try_run_case+0x170/0x3f0
[   20.934493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.934682]  kthread+0x328/0x630
[   20.934970]  ret_from_fork+0x10/0x20
[   20.935372] 
[   20.935451] The buggy address belongs to the object at fff00000c66b0f00
[   20.935451]  which belongs to the cache cred of size 184
[   20.935588] The buggy address is located 71 bytes to the right of
[   20.935588]  allocated 184-byte region [fff00000c66b0f00, fff00000c66b0fb8)
[   20.935741] 
[   20.935800] The buggy address belongs to the physical page:
[   20.935876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b0
[   20.936006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.936127] page_type: f5(slab)
[   20.936228] raw: 0bfffe0000000000 fff00000c002db40 dead000000000122 0000000000000000
[   20.936354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.936462] page dumped because: kasan: bad access detected
[   20.936539] 
[   20.936581] Memory state around the buggy address:
[   20.937144]  fff00000c66b0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.937571]  fff00000c66b0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.937984] >fff00000c66b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.938091]                                                                 ^
[   20.938197]  fff00000c66b1000: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.938784]  fff00000c66b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.939078] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   20.860844] ==================================================================
[   20.861283] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   20.862369] Write of size 1 at addr fff00000c5d6e973 by task kunit_try_catch/136
[   20.862659] 
[   20.864070] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250529 #1 PREEMPT 
[   20.864266] Tainted: [N]=TEST
[   20.864308] Hardware name: linux,dummy-virt (DT)
[   20.864621] Call trace:
[   20.864841]  show_stack+0x20/0x38 (C)
[   20.865022]  dump_stack_lvl+0x8c/0xd0
[   20.865102]  print_report+0x118/0x608
[   20.865160]  kasan_report+0xdc/0x128
[   20.865212]  __asan_report_store1_noabort+0x20/0x30
[   20.865265]  kmalloc_oob_right+0x5a4/0x660
[   20.865316]  kunit_try_run_case+0x170/0x3f0
[   20.865372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865447]  kthread+0x328/0x630
[   20.865498]  ret_from_fork+0x10/0x20
[   20.865685] 
[   20.865732] Allocated by task 136:
[   20.865870]  kasan_save_stack+0x3c/0x68
[   20.865950]  kasan_save_track+0x20/0x40
[   20.865995]  kasan_save_alloc_info+0x40/0x58
[   20.866036]  __kasan_kmalloc+0xd4/0xd8
[   20.866077]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.866120]  kmalloc_oob_right+0xb0/0x660
[   20.866159]  kunit_try_run_case+0x170/0x3f0
[   20.866200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866246]  kthread+0x328/0x630
[   20.866280]  ret_from_fork+0x10/0x20
[   20.866341] 
[   20.866522] The buggy address belongs to the object at fff00000c5d6e900
[   20.866522]  which belongs to the cache kmalloc-128 of size 128
[   20.866733] The buggy address is located 0 bytes to the right of
[   20.866733]  allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973)
[   20.866823] 
[   20.866932] The buggy address belongs to the physical page:
[   20.867167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   20.867539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.867902] page_type: f5(slab)
[   20.868321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.868408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.868547] page dumped because: kasan: bad access detected
[   20.868598] 
[   20.868630] Memory state around the buggy address:
[   20.868905]  fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.868988]  fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869053] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.869116]                                                              ^
[   20.869214]  fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869262]  fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869334] ==================================================================
[   20.885504] ==================================================================
[   20.885618] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   20.886822] Read of size 1 at addr fff00000c5d6e980 by task kunit_try_catch/136
[   20.887004] 
[   20.887308] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.888675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888868] Hardware name: linux,dummy-virt (DT)
[   20.889032] Call trace:
[   20.889086]  show_stack+0x20/0x38 (C)
[   20.889833]  dump_stack_lvl+0x8c/0xd0
[   20.889965]  print_report+0x118/0x608
[   20.890084]  kasan_report+0xdc/0x128
[   20.890234]  __asan_report_load1_noabort+0x20/0x30
[   20.891270]  kmalloc_oob_right+0x5d0/0x660
[   20.891766]  kunit_try_run_case+0x170/0x3f0
[   20.892124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.893027]  kthread+0x328/0x630
[   20.893180]  ret_from_fork+0x10/0x20
[   20.894258] 
[   20.894310] Allocated by task 136:
[   20.894788]  kasan_save_stack+0x3c/0x68
[   20.895082]  kasan_save_track+0x20/0x40
[   20.895178]  kasan_save_alloc_info+0x40/0x58
[   20.895605]  __kasan_kmalloc+0xd4/0xd8
[   20.895947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.896504]  kmalloc_oob_right+0xb0/0x660
[   20.896690]  kunit_try_run_case+0x170/0x3f0
[   20.896816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.897119]  kthread+0x328/0x630
[   20.897206]  ret_from_fork+0x10/0x20
[   20.897295] 
[   20.897349] The buggy address belongs to the object at fff00000c5d6e900
[   20.897349]  which belongs to the cache kmalloc-128 of size 128
[   20.897505] The buggy address is located 13 bytes to the right of
[   20.897505]  allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973)
[   20.897668] 
[   20.897713] The buggy address belongs to the physical page:
[   20.898146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   20.898451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.899000] page_type: f5(slab)
[   20.899425] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.899630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.899926] page dumped because: kasan: bad access detected
[   20.900080] 
[   20.900306] Memory state around the buggy address:
[   20.900513]  fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.901073]  fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.901181] >fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.901777]                    ^
[   20.902463]  fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902730]  fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.903098] ==================================================================
[   20.875836] ==================================================================
[   20.875944] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   20.876069] Write of size 1 at addr fff00000c5d6e978 by task kunit_try_catch/136
[   20.876181] 
[   20.876263] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   20.876463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.876524] Hardware name: linux,dummy-virt (DT)
[   20.876594] Call trace:
[   20.876649]  show_stack+0x20/0x38 (C)
[   20.876773]  dump_stack_lvl+0x8c/0xd0
[   20.876891]  print_report+0x118/0x608
[   20.877007]  kasan_report+0xdc/0x128
[   20.877121]  __asan_report_store1_noabort+0x20/0x30
[   20.877240]  kmalloc_oob_right+0x538/0x660
[   20.877356]  kunit_try_run_case+0x170/0x3f0
[   20.877683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877840]  kthread+0x328/0x630
[   20.878426]  ret_from_fork+0x10/0x20
[   20.878552] 
[   20.878598] Allocated by task 136:
[   20.878705]  kasan_save_stack+0x3c/0x68
[   20.878832]  kasan_save_track+0x20/0x40
[   20.878923]  kasan_save_alloc_info+0x40/0x58
[   20.878997]  __kasan_kmalloc+0xd4/0xd8
[   20.879067]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.879150]  kmalloc_oob_right+0xb0/0x660
[   20.879225]  kunit_try_run_case+0x170/0x3f0
[   20.879312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.879424]  kthread+0x328/0x630
[   20.879494]  ret_from_fork+0x10/0x20
[   20.879573] 
[   20.879711] The buggy address belongs to the object at fff00000c5d6e900
[   20.879711]  which belongs to the cache kmalloc-128 of size 128
[   20.879877] The buggy address is located 5 bytes to the right of
[   20.879877]  allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973)
[   20.880038] 
[   20.880088] The buggy address belongs to the physical page:
[   20.880167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e
[   20.881272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.881784] page_type: f5(slab)
[   20.882300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.882735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.882896] page dumped because: kasan: bad access detected
[   20.883148] 
[   20.883221] Memory state around the buggy address:
[   20.883311]  fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.883669]  fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.883790] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.883898]                                                                 ^
[   20.883999]  fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884144]  fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884239] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure Automatically assigned
------------[ cut here ]------------
[  104.902639] WARNING: CPU: 0 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  104.903958] Modules linked in:
[  104.904330] CPU: 0 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250529 #1 PREEMPT 
[  104.905381] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  104.905941] Hardware name: linux,dummy-virt (DT)
[  104.906848] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  104.907533] pc : intlog10+0x38/0x48
[  104.907917] lr : intlog10_test+0xe4/0x200
[  104.908240] sp : ffff800082567c10
[  104.908636] x29: ffff800082567c90 x28: 0000000000000000 x27: 0000000000000000
[  104.909530] x26: 1ffe000019574181 x25: 0000000000000000 x24: ffff800082567ce0
[  104.910882] x23: ffff800082567d00 x22: 0000000000000000 x21: 1ffff000104acf82
[  104.911529] x20: ffffa940d18d2fc0 x19: ffff800080087990 x18: 00000000f857ef74
[  104.912010] x17: 000000005aece4c8 x16: fff00000c097583c x15: 00000000ea71d59e
[  104.912309] x14: 00000000e7471688 x13: 1ffe00001b48cdcd x12: ffff75281aaef979
[  104.913085] x11: 1ffff5281aaef978 x10: ffff75281aaef978 x9 : ffffa940cee6ad2c
[  104.913953] x8 : ffffa940d577cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  104.915231] x5 : ffff7000104acf82 x4 : 1ffff00010010f3a x3 : 1ffff5281a31a5f8
[  104.915996] x2 : 1ffff5281a31a5f8 x1 : 0000000000000003 x0 : 0000000000000000
[  104.916753] Call trace:
[  104.917017]  intlog10+0x38/0x48 (P)
[  104.917444]  kunit_try_run_case+0x170/0x3f0
[  104.917959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.918745]  kthread+0x328/0x630
[  104.919075]  ret_from_fork+0x10/0x20
[  104.919569] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure Automatically assigned
------------[ cut here ]------------
[  104.817249] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  104.818318] Modules linked in:
[  104.819300] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250529 #1 PREEMPT 
[  104.820210] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  104.820810] Hardware name: linux,dummy-virt (DT)
[  104.821320] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  104.821999] pc : intlog2+0xd8/0xf8
[  104.822508] lr : intlog2_test+0xe4/0x200
[  104.822901] sp : ffff8000825f7c10
[  104.823411] x29: ffff8000825f7c90 x28: 0000000000000000 x27: 0000000000000000
[  104.824224] x26: 1ffe0000195740c1 x25: 0000000000000000 x24: ffff8000825f7ce0
[  104.825029] x23: ffff8000825f7d00 x22: 0000000000000000 x21: 1ffff000104bef82
[  104.825804] x20: ffffa940d18d2ec0 x19: ffff800080087990 x18: 00000000957a9672
[  104.826608] x17: 00000000a39999d2 x16: 00000000447fa649 x15: 00000000d33b8e31
[  104.827120] x14: 00000000f1f1f1f1 x13: fff00000c0caa700 x12: ffff75281aaef979
[  104.828076] x11: 1ffff5281aaef978 x10: ffff75281aaef978 x9 : ffffa940cee6af2c
[  104.828891] x8 : ffffa940d577cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  104.829648] x5 : ffff7000104bef82 x4 : 1ffff00010010f3a x3 : 1ffff5281a31a5d8
[  104.830585] x2 : 1ffff5281a31a5d8 x1 : 0000000000000003 x0 : 0000000000000000
[  104.831389] Call trace:
[  104.831653]  intlog2+0xd8/0xf8 (P)
[  104.832064]  kunit_try_run_case+0x170/0x3f0
[  104.832643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.833169]  kthread+0x328/0x630
[  104.833506]  ret_from_fork+0x10/0x20
[  104.833939] ---[ end trace 0000000000000000 ]---