Hay
Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   28.991108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   28.979763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   28.845777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   28.955838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   29.076610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   28.875850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   28.719295] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[  112.844132] Internal error: Oops: 0000000096000005 [#1]  SMP
[  112.854467] Modules linked in:
[  112.856586] CPU: 0 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[  112.857856] Tainted: [B]=BAD_PAGE, [N]=TEST
[  112.858322] Hardware name: linux,dummy-virt (DT)
[  112.859776] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.860814] pc : kunit_test_null_dereference+0x70/0x170
[  112.861459] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.862247] sp : ffff800081fd7d30
[  112.862595] x29: ffff800081fd7d90 x28: 0000000000000000 x27: 0000000000000000
[  112.864455] x26: 1ffe00001937f5c1 x25: 0000000000000000 x24: 0000000000000004
[  112.865067] x23: fff00000c9bfae0c x22: ffffa1cc18658c48 x21: fff00000c47dcb08
[  112.865488] x20: 1ffff000103fafa6 x19: ffff800080087990 x18: fff00000c111e888
[  112.866094] x17: 0000000000000000 x16: fff00000da444d28 x15: fff00000ff616b08
[  112.867667] x14: 0000000000018fff x13: 1ffe00001b488989 x12: fffd8000188343a4
[  112.868717] x11: 1ffe0000188343a3 x10: fffd8000188343a3 x9 : ffffa1cc186500b0
[  112.869602] x8 : ffff800081fd7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  112.870555] x5 : ffff7000103fafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  112.871475] x2 : dfff800000000000 x1 : fff00000c41a1440 x0 : ffff800080087990
[  112.872455] Call trace:
[  112.872859]  kunit_test_null_dereference+0x70/0x170 (P)
[  112.873499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.874998]  kthread+0x328/0x630
[  112.875633]  ret_from_fork+0x10/0x20
[  112.876607] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  112.877726] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   58.088200] ==================================================================
[   58.088291] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   58.088291] 
[   58.088385] Use-after-free read at 0x00000000a0d4fc1b (in kfence-#203):
[   58.088451]  test_krealloc+0x51c/0x830
[   58.088513]  kunit_try_run_case+0x170/0x3f0
[   58.088572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.088630]  kthread+0x328/0x630
[   58.088697]  ret_from_fork+0x10/0x20
[   58.088755] 
[   58.088783] kfence-#203: 0x00000000a0d4fc1b-0x000000009622f8a3, size=32, cache=kmalloc-32
[   58.088783] 
[   58.088852] allocated by task 338 on cpu 0 at 58.087260s (0.001586s ago):
[   58.088935]  test_alloc+0x29c/0x628
[   58.088990]  test_krealloc+0xc0/0x830
[   58.089041]  kunit_try_run_case+0x170/0x3f0
[   58.089094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.089149]  kthread+0x328/0x630
[   58.089193]  ret_from_fork+0x10/0x20
[   58.089241] 
[   58.089277] freed by task 338 on cpu 0 at 58.087709s (0.001563s ago):
[   58.089355]  krealloc_noprof+0x148/0x360
[   58.089406]  test_krealloc+0x1dc/0x830
[   58.089455]  kunit_try_run_case+0x170/0x3f0
[   58.089506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.089561]  kthread+0x328/0x630
[   58.089605]  ret_from_fork+0x10/0x20
[   58.089653] 
[   58.089718] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.089813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.089848] Hardware name: linux,dummy-virt (DT)
[   58.089889] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   57.914403] ==================================================================
[   57.914506] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   57.914506] 
[   57.914618] Use-after-free read at 0x000000003b712d0f (in kfence-#201):
[   57.914743]  test_memcache_typesafe_by_rcu+0x280/0x560
[   57.914810]  kunit_try_run_case+0x170/0x3f0
[   57.914871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.914930]  kthread+0x328/0x630
[   57.914979]  ret_from_fork+0x10/0x20
[   57.915029] 
[   57.915058] kfence-#201: 0x000000003b712d0f-0x00000000db1a369e, size=32, cache=test
[   57.915058] 
[   57.915122] allocated by task 336 on cpu 1 at 57.882025s (0.033092s ago):
[   57.915206]  test_alloc+0x230/0x628
[   57.915262]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   57.915317]  kunit_try_run_case+0x170/0x3f0
[   57.915367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.915422]  kthread+0x328/0x630
[   57.915465]  ret_from_fork+0x10/0x20
[   57.915513] 
[   57.915540] freed by task 336 on cpu 1 at 57.882138s (0.033398s ago):
[   57.915610]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   57.915664]  kunit_try_run_case+0x170/0x3f0
[   57.915733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.915791]  kthread+0x328/0x630
[   57.915833]  ret_from_fork+0x10/0x20
[   57.915883] 
[   57.915935] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.916031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.916067] Hardware name: linux,dummy-virt (DT)
[   57.916110] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   37.833142] ==================================================================
[   37.833368] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   37.833368] 
[   37.833576] Invalid read at 0x0000000016bed776:
[   37.833744]  test_invalid_access+0xdc/0x1f0
[   37.833876]  kunit_try_run_case+0x170/0x3f0
[   37.833999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.834124]  kthread+0x328/0x630
[   37.834235]  ret_from_fork+0x10/0x20
[   37.834363] 
[   37.834478] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.839882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.839986] Hardware name: linux,dummy-virt (DT)
[   37.842000] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   31.197931] ==================================================================
[   31.198481] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.198481] 
[   31.198703] Out-of-bounds write at 0x0000000050041dbf (1B left of kfence-#136):
[   31.199067]  test_out_of_bounds_write+0x100/0x240
[   31.199322]  kunit_try_run_case+0x170/0x3f0
[   31.200178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.200460]  kthread+0x328/0x630
[   31.200676]  ret_from_fork+0x10/0x20
[   31.200814] 
[   31.200954] kfence-#136: 0x00000000e9f557db-0x00000000d8040c5a, size=32, cache=kmalloc-32
[   31.200954] 
[   31.201367] allocated by task 292 on cpu 1 at 31.196844s (0.004495s ago):
[   31.201579]  test_alloc+0x29c/0x628
[   31.201702]  test_out_of_bounds_write+0xc8/0x240
[   31.201813]  kunit_try_run_case+0x170/0x3f0
[   31.201915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.202107]  kthread+0x328/0x630
[   31.202234]  ret_from_fork+0x10/0x20
[   31.202479] 
[   31.202580] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.203321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.203404] Hardware name: linux,dummy-virt (DT)
[   31.203500] ==================================================================
[   31.302998] ==================================================================
[   31.303148] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.303148] 
[   31.303331] Out-of-bounds write at 0x00000000cb5347bf (1B left of kfence-#137):
[   31.303459]  test_out_of_bounds_write+0x100/0x240
[   31.303574]  kunit_try_run_case+0x170/0x3f0
[   31.303701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.303829]  kthread+0x328/0x630
[   31.304132]  ret_from_fork+0x10/0x20
[   31.304439] 
[   31.304507] kfence-#137: 0x00000000d2a77333-0x00000000d7abab4d, size=32, cache=test
[   31.304507] 
[   31.304642] allocated by task 294 on cpu 1 at 31.302553s (0.002072s ago):
[   31.305043]  test_alloc+0x230/0x628
[   31.305189]  test_out_of_bounds_write+0xc8/0x240
[   31.305330]  kunit_try_run_case+0x170/0x3f0
[   31.305454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.305794]  kthread+0x328/0x630
[   31.305894]  ret_from_fork+0x10/0x20
[   31.305994] 
[   31.306088] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.306276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.306342] Hardware name: linux,dummy-virt (DT)
[   31.306430] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   37.602314] ==================================================================
[   37.602480] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   37.602480] 
[   37.602616] Corrupted memory at 0x00000000acb64a5c [ ! . . . . . . . . . . . . . . . ] (in kfence-#197):
[   37.603448]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   37.603568]  kunit_try_run_case+0x170/0x3f0
[   37.603675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.603805]  kthread+0x328/0x630
[   37.603895]  ret_from_fork+0x10/0x20
[   37.603989] 
[   37.604045] kfence-#197: 0x0000000065019b87-0x0000000009836750, size=73, cache=kmalloc-96
[   37.604045] 
[   37.604179] allocated by task 326 on cpu 1 at 37.601893s (0.002276s ago):
[   37.604335]  test_alloc+0x29c/0x628
[   37.604448]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   37.604570]  kunit_try_run_case+0x170/0x3f0
[   37.604711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.604824]  kthread+0x328/0x630
[   37.604922]  ret_from_fork+0x10/0x20
[   37.605034] 
[   37.605097] freed by task 326 on cpu 1 at 37.602107s (0.002982s ago):
[   37.605267]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   37.605389]  kunit_try_run_case+0x170/0x3f0
[   37.605506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.605631]  kthread+0x328/0x630
[   37.605769]  ret_from_fork+0x10/0x20
[   37.605885] 
[   37.605984] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.606175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.606249] Hardware name: linux,dummy-virt (DT)
[   37.606329] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   37.391979] ==================================================================
[   37.392165] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   37.392165] 
[   37.392375] Out-of-bounds read at 0x0000000047d7907b (105B right of kfence-#195):
[   37.392467]  test_kmalloc_aligned_oob_read+0x238/0x468
[   37.392538]  kunit_try_run_case+0x170/0x3f0
[   37.392600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.392662]  kthread+0x328/0x630
[   37.392749]  ret_from_fork+0x10/0x20
[   37.392806] 
[   37.392838] kfence-#195: 0x000000003d684eeb-0x00000000ade149b2, size=73, cache=kmalloc-96
[   37.392838] 
[   37.392908] allocated by task 324 on cpu 1 at 37.391568s (0.001335s ago):
[   37.392995]  test_alloc+0x29c/0x628
[   37.393052]  test_kmalloc_aligned_oob_read+0x100/0x468
[   37.393111]  kunit_try_run_case+0x170/0x3f0
[   37.393162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.393218]  kthread+0x328/0x630
[   37.393279]  ret_from_fork+0x10/0x20
[   37.393328] 
[   37.393381] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   37.393480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.393516] Hardware name: linux,dummy-virt (DT)
[   37.393558] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   32.680444] ==================================================================
[   32.680596] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   32.680596] 
[   32.681089] Corrupted memory at 0x0000000097372a95 [ ! . . . . . . . . . . . . . . . ] (in kfence-#150):
[   32.682417]  test_corruption+0x120/0x378
[   32.682539]  kunit_try_run_case+0x170/0x3f0
[   32.682663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.682794]  kthread+0x328/0x630
[   32.682941]  ret_from_fork+0x10/0x20
[   32.683071] 
[   32.683142] kfence-#150: 0x00000000641b6be0-0x000000004b887354, size=32, cache=test
[   32.683142] 
[   32.683297] allocated by task 314 on cpu 1 at 32.680105s (0.003182s ago):
[   32.683514]  test_alloc+0x230/0x628
[   32.683633]  test_corruption+0xdc/0x378
[   32.683768]  kunit_try_run_case+0x170/0x3f0
[   32.683883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.684038]  kthread+0x328/0x630
[   32.684260]  ret_from_fork+0x10/0x20
[   32.684429] 
[   32.684531] freed by task 314 on cpu 1 at 32.680245s (0.004275s ago):
[   32.684813]  test_corruption+0x120/0x378
[   32.685067]  kunit_try_run_case+0x170/0x3f0
[   32.685222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.685349]  kthread+0x328/0x630
[   32.685462]  ret_from_fork+0x10/0x20
[   32.685598] 
[   32.685749] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.686063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.686208] Hardware name: linux,dummy-virt (DT)
[   32.686349] ==================================================================
[   32.897317] ==================================================================
[   32.897587] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   32.897587] 
[   32.897755] Corrupted memory at 0x00000000c0dca648 [ ! ] (in kfence-#152):
[   32.898014]  test_corruption+0x1d8/0x378
[   32.898131]  kunit_try_run_case+0x170/0x3f0
[   32.898245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.898374]  kthread+0x328/0x630
[   32.898491]  ret_from_fork+0x10/0x20
[   32.898768] 
[   32.898839] kfence-#152: 0x00000000afefb277-0x0000000035ccd762, size=32, cache=test
[   32.898839] 
[   32.899042] allocated by task 314 on cpu 1 at 32.896500s (0.002531s ago):
[   32.899356]  test_alloc+0x230/0x628
[   32.899800]  test_corruption+0x198/0x378
[   32.899956]  kunit_try_run_case+0x170/0x3f0
[   32.900122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.900251]  kthread+0x328/0x630
[   32.900349]  ret_from_fork+0x10/0x20
[   32.900576] 
[   32.900706] freed by task 314 on cpu 1 at 32.896593s (0.004103s ago):
[   32.900873]  test_corruption+0x1d8/0x378
[   32.900980]  kunit_try_run_case+0x170/0x3f0
[   32.901083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.901215]  kthread+0x328/0x630
[   32.901345]  ret_from_fork+0x10/0x20
[   32.901642] 
[   32.901783] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.901971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.902047] Hardware name: linux,dummy-virt (DT)
[   32.902139] ==================================================================
[   32.248994] ==================================================================
[   32.249215] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   32.249215] 
[   32.249398] Corrupted memory at 0x0000000067c6269d [ ! . . . . . . . . . . . . . . . ] (in kfence-#146):
[   32.253616]  test_corruption+0x278/0x378
[   32.253806]  kunit_try_run_case+0x170/0x3f0
[   32.254121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.254322]  kthread+0x328/0x630
[   32.254512]  ret_from_fork+0x10/0x20
[   32.254621] 
[   32.254703] kfence-#146: 0x0000000090933676-0x00000000a19ed4c8, size=32, cache=kmalloc-32
[   32.254703] 
[   32.254912] allocated by task 312 on cpu 1 at 32.248032s (0.006822s ago):
[   32.255097]  test_alloc+0x29c/0x628
[   32.255236]  test_corruption+0xdc/0x378
[   32.255532]  kunit_try_run_case+0x170/0x3f0
[   32.255672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.255828]  kthread+0x328/0x630
[   32.255946]  ret_from_fork+0x10/0x20
[   32.256066] 
[   32.256130] freed by task 312 on cpu 1 at 32.248414s (0.007706s ago):
[   32.256281]  test_corruption+0x278/0x378
[   32.256383]  kunit_try_run_case+0x170/0x3f0
[   32.256539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256749]  kthread+0x328/0x630
[   32.256865]  ret_from_fork+0x10/0x20
[   32.256981] 
[   32.257094] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.257393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.257516] Hardware name: linux,dummy-virt (DT)
[   32.257662] ==================================================================
[   32.358514] ==================================================================
[   32.358669] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   32.358669] 
[   32.358836] Corrupted memory at 0x000000001f10adea [ ! ] (in kfence-#147):
[   32.359638]  test_corruption+0x284/0x378
[   32.359786]  kunit_try_run_case+0x170/0x3f0
[   32.359912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.360410]  kthread+0x328/0x630
[   32.360534]  ret_from_fork+0x10/0x20
[   32.360659] 
[   32.360774] kfence-#147: 0x00000000d2721b8f-0x000000002be53a7b, size=32, cache=kmalloc-32
[   32.360774] 
[   32.360995] allocated by task 312 on cpu 1 at 32.358067s (0.002919s ago):
[   32.361264]  test_alloc+0x29c/0x628
[   32.361447]  test_corruption+0x198/0x378
[   32.361572]  kunit_try_run_case+0x170/0x3f0
[   32.361758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.362172]  kthread+0x328/0x630
[   32.362277]  ret_from_fork+0x10/0x20
[   32.362448] 
[   32.362614] freed by task 312 on cpu 1 at 32.358220s (0.004375s ago):
[   32.362812]  test_corruption+0x284/0x378
[   32.363025]  kunit_try_run_case+0x170/0x3f0
[   32.363260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.363513]  kthread+0x328/0x630
[   32.363841]  ret_from_fork+0x10/0x20
[   32.364253] 
[   32.364353] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.364628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.364749] Hardware name: linux,dummy-virt (DT)
[   32.365009] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   32.144664] ==================================================================
[   32.145033] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   32.145033] 
[   32.145180] Invalid free of 0x00000000104ee6cd (in kfence-#145):
[   32.145326]  test_invalid_addr_free+0xec/0x238
[   32.145606]  kunit_try_run_case+0x170/0x3f0
[   32.145745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.145861]  kthread+0x328/0x630
[   32.145960]  ret_from_fork+0x10/0x20
[   32.146744] 
[   32.146846] kfence-#145: 0x0000000078cbb499-0x0000000080a26f17, size=32, cache=test
[   32.146846] 
[   32.147030] allocated by task 310 on cpu 1 at 32.144448s (0.002571s ago):
[   32.147402]  test_alloc+0x230/0x628
[   32.148345]  test_invalid_addr_free+0xd4/0x238
[   32.148647]  kunit_try_run_case+0x170/0x3f0
[   32.149423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.149568]  kthread+0x328/0x630
[   32.150223]  ret_from_fork+0x10/0x20
[   32.150561] 
[   32.150662] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.150878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.150957] Hardware name: linux,dummy-virt (DT)
[   32.152337] ==================================================================
[   32.040546] ==================================================================
[   32.040709] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   32.040709] 
[   32.042193] Invalid free of 0x000000005c3b1913 (in kfence-#144):
[   32.042813]  test_invalid_addr_free+0x1ac/0x238
[   32.042957]  kunit_try_run_case+0x170/0x3f0
[   32.043080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.043202]  kthread+0x328/0x630
[   32.043316]  ret_from_fork+0x10/0x20
[   32.043421] 
[   32.046568] kfence-#144: 0x000000008bee79c4-0x0000000026dae1e6, size=32, cache=kmalloc-32
[   32.046568] 
[   32.046794] allocated by task 308 on cpu 1 at 32.040312s (0.006472s ago):
[   32.046959]  test_alloc+0x29c/0x628
[   32.047071]  test_invalid_addr_free+0xd4/0x238
[   32.047182]  kunit_try_run_case+0x170/0x3f0
[   32.047285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.048820]  kthread+0x328/0x630
[   32.048923]  ret_from_fork+0x10/0x20
[   32.049023] 
[   32.049121] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.049338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.049425] Hardware name: linux,dummy-virt (DT)
[   32.049523] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   31.937769] ==================================================================
[   31.938186] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   31.938186] 
[   31.938345] Invalid free of 0x000000006929e8fb (in kfence-#143):
[   31.938614]  test_double_free+0x100/0x238
[   31.938776]  kunit_try_run_case+0x170/0x3f0
[   31.938885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.939001]  kthread+0x328/0x630
[   31.939361]  ret_from_fork+0x10/0x20
[   31.939787] 
[   31.939926] kfence-#143: 0x000000006929e8fb-0x0000000054e45aee, size=32, cache=test
[   31.939926] 
[   31.940359] allocated by task 306 on cpu 1 at 31.935742s (0.004605s ago):
[   31.940733]  test_alloc+0x230/0x628
[   31.941044]  test_double_free+0xd4/0x238
[   31.941281]  kunit_try_run_case+0x170/0x3f0
[   31.941388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.941494]  kthread+0x328/0x630
[   31.941638]  ret_from_fork+0x10/0x20
[   31.941800] 
[   31.941935] freed by task 306 on cpu 1 at 31.935862s (0.006034s ago):
[   31.942094]  test_double_free+0xf0/0x238
[   31.942195]  kunit_try_run_case+0x170/0x3f0
[   31.942341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.942452]  kthread+0x328/0x630
[   31.942549]  ret_from_fork+0x10/0x20
[   31.942648] 
[   31.942808] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.943024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.943111] Hardware name: linux,dummy-virt (DT)
[   31.943392] ==================================================================
[   31.829044] ==================================================================
[   31.829241] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   31.829241] 
[   31.829398] Invalid free of 0x00000000cac9a336 (in kfence-#142):
[   31.829541]  test_double_free+0x1bc/0x238
[   31.829658]  kunit_try_run_case+0x170/0x3f0
[   31.829799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.829904]  kthread+0x328/0x630
[   31.830001]  ret_from_fork+0x10/0x20
[   31.830099] 
[   31.830162] kfence-#142: 0x00000000cac9a336-0x0000000098261a3d, size=32, cache=kmalloc-32
[   31.830162] 
[   31.830289] allocated by task 304 on cpu 1 at 31.828147s (0.002135s ago):
[   31.830438]  test_alloc+0x29c/0x628
[   31.830539]  test_double_free+0xd4/0x238
[   31.830722]  kunit_try_run_case+0x170/0x3f0
[   31.830844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.830980]  kthread+0x328/0x630
[   31.831443]  ret_from_fork+0x10/0x20
[   31.831863] 
[   31.832102] freed by task 304 on cpu 1 at 31.828261s (0.003831s ago):
[   31.832268]  test_double_free+0x1ac/0x238
[   31.832375]  kunit_try_run_case+0x170/0x3f0
[   31.832479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.832590]  kthread+0x328/0x630
[   31.832758]  ret_from_fork+0x10/0x20
[   31.832935] 
[   31.833782] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.834034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.834121] Hardware name: linux,dummy-virt (DT)
[   31.834400] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   31.407283] ==================================================================
[   31.407471] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   31.407471] 
[   31.407705] Use-after-free read at 0x00000000816ec846 (in kfence-#138):
[   31.407828]  test_use_after_free_read+0x114/0x248
[   31.407948]  kunit_try_run_case+0x170/0x3f0
[   31.408061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.408168]  kthread+0x328/0x630
[   31.408266]  ret_from_fork+0x10/0x20
[   31.408365] 
[   31.408424] kfence-#138: 0x00000000816ec846-0x00000000dc4bc93f, size=32, cache=kmalloc-32
[   31.408424] 
[   31.408548] allocated by task 296 on cpu 1 at 31.406270s (0.002270s ago):
[   31.408748]  test_alloc+0x29c/0x628
[   31.409137]  test_use_after_free_read+0xd0/0x248
[   31.409540]  kunit_try_run_case+0x170/0x3f0
[   31.409918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.410233]  kthread+0x328/0x630
[   31.410335]  ret_from_fork+0x10/0x20
[   31.410455] 
[   31.410726] freed by task 296 on cpu 1 at 31.406397s (0.004163s ago):
[   31.411046]  test_use_after_free_read+0x1c0/0x248
[   31.411348]  kunit_try_run_case+0x170/0x3f0
[   31.411546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.411808]  kthread+0x328/0x630
[   31.412166]  ret_from_fork+0x10/0x20
[   31.412547] 
[   31.413306] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.413504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.413578] Hardware name: linux,dummy-virt (DT)
[   31.413661] ==================================================================
[   31.510008] ==================================================================
[   31.510157] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   31.510157] 
[   31.510898] Use-after-free read at 0x000000004c9dde6f (in kfence-#139):
[   31.511041]  test_use_after_free_read+0x114/0x248
[   31.511843]  kunit_try_run_case+0x170/0x3f0
[   31.511982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.512113]  kthread+0x328/0x630
[   31.512221]  ret_from_fork+0x10/0x20
[   31.513484] 
[   31.513555] kfence-#139: 0x000000004c9dde6f-0x00000000d5fdb9d7, size=32, cache=test
[   31.513555] 
[   31.513702] allocated by task 298 on cpu 1 at 31.509094s (0.004577s ago):
[   31.513873]  test_alloc+0x230/0x628
[   31.513974]  test_use_after_free_read+0xd0/0x248
[   31.514076]  kunit_try_run_case+0x170/0x3f0
[   31.514176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.514278]  kthread+0x328/0x630
[   31.514367]  ret_from_fork+0x10/0x20
[   31.514461] 
[   31.514513] freed by task 298 on cpu 1 at 31.509188s (0.005318s ago):
[   31.515330]  test_use_after_free_read+0xf0/0x248
[   31.515477]  kunit_try_run_case+0x170/0x3f0
[   31.515589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.515731]  kthread+0x328/0x630
[   31.515828]  ret_from_fork+0x10/0x20
[   31.515957] 
[   31.516063] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.516583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.516678] Hardware name: linux,dummy-virt (DT)
[   31.516924] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   25.593282] ==================================================================
[   25.593510] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   25.593652] Read of size 4 at addr fff00000c77ed180 by task swapper/0/0
[   25.593780] 
[   25.596502] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.597861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.597932] Hardware name: linux,dummy-virt (DT)
[   25.598010] Call trace:
[   25.598066]  show_stack+0x20/0x38 (C)
[   25.599562]  dump_stack_lvl+0x8c/0xd0
[   25.599726]  print_report+0x118/0x608
[   25.599939]  kasan_report+0xdc/0x128
[   25.600404]  __asan_report_load4_noabort+0x20/0x30
[   25.600613]  rcu_uaf_reclaim+0x64/0x70
[   25.600778]  rcu_core+0x9f4/0x1e20
[   25.601117]  rcu_core_si+0x18/0x30
[   25.601238]  handle_softirqs+0x374/0xb28
[   25.601596]  __do_softirq+0x1c/0x28
[   25.601725]  ____do_softirq+0x18/0x30
[   25.601858]  call_on_irq_stack+0x24/0x30
[   25.602395]  do_softirq_own_stack+0x24/0x38
[   25.602925]  __irq_exit_rcu+0x1fc/0x318
[   25.603148]  irq_exit_rcu+0x1c/0x80
[   25.603422]  el1_interrupt+0x38/0x58
[   25.603618]  el1h_64_irq_handler+0x18/0x28
[   25.603757]  el1h_64_irq+0x6c/0x70
[   25.603957]  arch_local_irq_enable+0x4/0x8 (P)
[   25.604109]  do_idle+0x384/0x4e8
[   25.604274]  cpu_startup_entry+0x64/0x80
[   25.604409]  rest_init+0x160/0x188
[   25.604915]  start_kernel+0x314/0x3d8
[   25.605131]  __primary_switched+0x8c/0xa0
[   25.605371] 
[   25.605482] Allocated by task 199:
[   25.605559]  kasan_save_stack+0x3c/0x68
[   25.605671]  kasan_save_track+0x20/0x40
[   25.605790]  kasan_save_alloc_info+0x40/0x58
[   25.605897]  __kasan_kmalloc+0xd4/0xd8
[   25.606091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.606301]  rcu_uaf+0xb0/0x2d8
[   25.606414]  kunit_try_run_case+0x170/0x3f0
[   25.606527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.606652]  kthread+0x328/0x630
[   25.606914]  ret_from_fork+0x10/0x20
[   25.607102] 
[   25.607147] Freed by task 0:
[   25.607630]  kasan_save_stack+0x3c/0x68
[   25.607840]  kasan_save_track+0x20/0x40
[   25.608062]  kasan_save_free_info+0x4c/0x78
[   25.608237]  __kasan_slab_free+0x6c/0x98
[   25.608350]  kfree+0x214/0x3c8
[   25.608449]  rcu_uaf_reclaim+0x28/0x70
[   25.608559]  rcu_core+0x9f4/0x1e20
[   25.608663]  rcu_core_si+0x18/0x30
[   25.608778]  handle_softirqs+0x374/0xb28
[   25.609407]  __do_softirq+0x1c/0x28
[   25.609520] 
[   25.609617] Last potentially related work creation:
[   25.609785]  kasan_save_stack+0x3c/0x68
[   25.610012]  kasan_record_aux_stack+0xb4/0xc8
[   25.610146]  __call_rcu_common.constprop.0+0x70/0x8b0
[   25.610436]  call_rcu+0x18/0x30
[   25.610546]  rcu_uaf+0x14c/0x2d8
[   25.610783]  kunit_try_run_case+0x170/0x3f0
[   25.611342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.611425]  kthread+0x328/0x630
[   25.611470]  ret_from_fork+0x10/0x20
[   25.611562] 
[   25.611734] The buggy address belongs to the object at fff00000c77ed180
[   25.611734]  which belongs to the cache kmalloc-32 of size 32
[   25.611914] The buggy address is located 0 bytes inside of
[   25.611914]  freed 32-byte region [fff00000c77ed180, fff00000c77ed1a0)
[   25.612314] 
[   25.612371] The buggy address belongs to the physical page:
[   25.612447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ed
[   25.612574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.612770] page_type: f5(slab)
[   25.612890] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.613025] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.613134] page dumped because: kasan: bad access detected
[   25.613215] 
[   25.613393] Memory state around the buggy address:
[   25.613591]  fff00000c77ed080: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   25.613864]  fff00000c77ed100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.614124] >fff00000c77ed180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   25.614218]                    ^
[   25.614339]  fff00000c77ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.614479]  fff00000c77ed280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.614727] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   25.325060] ==================================================================
[   25.325409] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   25.325566] Read of size 1 at addr fff00000c77e8378 by task kunit_try_catch/197
[   25.325720] 
[   25.325794] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.325990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326156] Hardware name: linux,dummy-virt (DT)
[   25.326242] Call trace:
[   25.326291]  show_stack+0x20/0x38 (C)
[   25.326408]  dump_stack_lvl+0x8c/0xd0
[   25.326551]  print_report+0x118/0x608
[   25.326938]  kasan_report+0xdc/0x128
[   25.327193]  __asan_report_load1_noabort+0x20/0x30
[   25.327430]  ksize_uaf+0x544/0x5f8
[   25.327584]  kunit_try_run_case+0x170/0x3f0
[   25.327842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.328096]  kthread+0x328/0x630
[   25.328258]  ret_from_fork+0x10/0x20
[   25.328473] 
[   25.328523] Allocated by task 197:
[   25.328659]  kasan_save_stack+0x3c/0x68
[   25.329021]  kasan_save_track+0x20/0x40
[   25.329142]  kasan_save_alloc_info+0x40/0x58
[   25.329325]  __kasan_kmalloc+0xd4/0xd8
[   25.329450]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.330574]  ksize_uaf+0xb8/0x5f8
[   25.330708]  kunit_try_run_case+0x170/0x3f0
[   25.330816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.330926]  kthread+0x328/0x630
[   25.331035]  ret_from_fork+0x10/0x20
[   25.331253] 
[   25.331307] Freed by task 197:
[   25.331391]  kasan_save_stack+0x3c/0x68
[   25.331491]  kasan_save_track+0x20/0x40
[   25.331581]  kasan_save_free_info+0x4c/0x78
[   25.331742]  __kasan_slab_free+0x6c/0x98
[   25.331845]  kfree+0x214/0x3c8
[   25.331925]  ksize_uaf+0x11c/0x5f8
[   25.332016]  kunit_try_run_case+0x170/0x3f0
[   25.332285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.332414]  kthread+0x328/0x630
[   25.332509]  ret_from_fork+0x10/0x20
[   25.332779] 
[   25.332837] The buggy address belongs to the object at fff00000c77e8300
[   25.332837]  which belongs to the cache kmalloc-128 of size 128
[   25.333431] The buggy address is located 120 bytes inside of
[   25.333431]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.334085] 
[   25.334491] The buggy address belongs to the physical page:
[   25.334578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.334778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.334905] page_type: f5(slab)
[   25.335151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.335283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.335640] page dumped because: kasan: bad access detected
[   25.335739] 
[   25.335787] Memory state around the buggy address:
[   25.335859]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.335960]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.336099] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.336784]                                                                 ^
[   25.337065]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.337297]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.337441] ==================================================================
[   25.284579] ==================================================================
[   25.286327] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   25.287323] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197
[   25.287527] 
[   25.287637] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.288069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.288195] Hardware name: linux,dummy-virt (DT)
[   25.288321] Call trace:
[   25.288409]  show_stack+0x20/0x38 (C)
[   25.288589]  dump_stack_lvl+0x8c/0xd0
[   25.288735]  print_report+0x118/0x608
[   25.288858]  kasan_report+0xdc/0x128
[   25.288968]  __kasan_check_byte+0x54/0x70
[   25.289084]  ksize+0x30/0x88
[   25.289208]  ksize_uaf+0x168/0x5f8
[   25.289356]  kunit_try_run_case+0x170/0x3f0
[   25.289776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.290391]  kthread+0x328/0x630
[   25.290539]  ret_from_fork+0x10/0x20
[   25.290819] 
[   25.290909] Allocated by task 197:
[   25.290999]  kasan_save_stack+0x3c/0x68
[   25.291106]  kasan_save_track+0x20/0x40
[   25.291209]  kasan_save_alloc_info+0x40/0x58
[   25.291308]  __kasan_kmalloc+0xd4/0xd8
[   25.292630]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.292837]  ksize_uaf+0xb8/0x5f8
[   25.293024]  kunit_try_run_case+0x170/0x3f0
[   25.293192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.293340]  kthread+0x328/0x630
[   25.293921]  ret_from_fork+0x10/0x20
[   25.294088] 
[   25.294175] Freed by task 197:
[   25.294381]  kasan_save_stack+0x3c/0x68
[   25.294482]  kasan_save_track+0x20/0x40
[   25.294577]  kasan_save_free_info+0x4c/0x78
[   25.295511]  __kasan_slab_free+0x6c/0x98
[   25.295654]  kfree+0x214/0x3c8
[   25.295848]  ksize_uaf+0x11c/0x5f8
[   25.296115]  kunit_try_run_case+0x170/0x3f0
[   25.296390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.296505]  kthread+0x328/0x630
[   25.297292]  ret_from_fork+0x10/0x20
[   25.297650] 
[   25.297951] The buggy address belongs to the object at fff00000c77e8300
[   25.297951]  which belongs to the cache kmalloc-128 of size 128
[   25.298535] The buggy address is located 0 bytes inside of
[   25.298535]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.298898] 
[   25.299000] The buggy address belongs to the physical page:
[   25.299075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.299950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.300175] page_type: f5(slab)
[   25.300420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.300557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.301174] page dumped because: kasan: bad access detected
[   25.301621] 
[   25.301674] Memory state around the buggy address:
[   25.301938]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.302409]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.302516] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.302608]                    ^
[   25.303294]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.303414]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.303983] ==================================================================
[   25.306985] ==================================================================
[   25.307728] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   25.308536] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197
[   25.308694] 
[   25.308768] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.309587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.310178] Hardware name: linux,dummy-virt (DT)
[   25.310363] Call trace:
[   25.310449]  show_stack+0x20/0x38 (C)
[   25.311015]  dump_stack_lvl+0x8c/0xd0
[   25.311481]  print_report+0x118/0x608
[   25.311611]  kasan_report+0xdc/0x128
[   25.312172]  __asan_report_load1_noabort+0x20/0x30
[   25.312539]  ksize_uaf+0x598/0x5f8
[   25.312924]  kunit_try_run_case+0x170/0x3f0
[   25.313046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.313175]  kthread+0x328/0x630
[   25.313301]  ret_from_fork+0x10/0x20
[   25.313868] 
[   25.314443] Allocated by task 197:
[   25.314528]  kasan_save_stack+0x3c/0x68
[   25.314884]  kasan_save_track+0x20/0x40
[   25.315113]  kasan_save_alloc_info+0x40/0x58
[   25.315223]  __kasan_kmalloc+0xd4/0xd8
[   25.315727]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.315846]  ksize_uaf+0xb8/0x5f8
[   25.316351]  kunit_try_run_case+0x170/0x3f0
[   25.316720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.316934]  kthread+0x328/0x630
[   25.317034]  ret_from_fork+0x10/0x20
[   25.317144] 
[   25.317195] Freed by task 197:
[   25.317355]  kasan_save_stack+0x3c/0x68
[   25.317488]  kasan_save_track+0x20/0x40
[   25.317614]  kasan_save_free_info+0x4c/0x78
[   25.317891]  __kasan_slab_free+0x6c/0x98
[   25.318063]  kfree+0x214/0x3c8
[   25.318207]  ksize_uaf+0x11c/0x5f8
[   25.318469]  kunit_try_run_case+0x170/0x3f0
[   25.318582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.318809]  kthread+0x328/0x630
[   25.318940]  ret_from_fork+0x10/0x20
[   25.319050] 
[   25.319105] The buggy address belongs to the object at fff00000c77e8300
[   25.319105]  which belongs to the cache kmalloc-128 of size 128
[   25.319295] The buggy address is located 0 bytes inside of
[   25.319295]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.319542] 
[   25.319599] The buggy address belongs to the physical page:
[   25.319788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.319929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.320044] page_type: f5(slab)
[   25.321132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.321489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.321592] page dumped because: kasan: bad access detected
[   25.322583] 
[   25.322729] Memory state around the buggy address:
[   25.322836]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.322951]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323060] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.323214]                    ^
[   25.323298]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323452]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323557] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   25.225453] ==================================================================
[   25.225621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.225784] Read of size 1 at addr fff00000c77e8273 by task kunit_try_catch/195
[   25.225899] 
[   25.225983] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.226183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.226249] Hardware name: linux,dummy-virt (DT)
[   25.226324] Call trace:
[   25.226375]  show_stack+0x20/0x38 (C)
[   25.226502]  dump_stack_lvl+0x8c/0xd0
[   25.226622]  print_report+0x118/0x608
[   25.226777]  kasan_report+0xdc/0x128
[   25.226895]  __asan_report_load1_noabort+0x20/0x30
[   25.227010]  ksize_unpoisons_memory+0x628/0x740
[   25.227133]  kunit_try_run_case+0x170/0x3f0
[   25.227258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.227389]  kthread+0x328/0x630
[   25.228810]  ret_from_fork+0x10/0x20
[   25.229083] 
[   25.229134] Allocated by task 195:
[   25.229207]  kasan_save_stack+0x3c/0x68
[   25.229391]  kasan_save_track+0x20/0x40
[   25.229750]  kasan_save_alloc_info+0x40/0x58
[   25.230422]  __kasan_kmalloc+0xd4/0xd8
[   25.230539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.230668]  ksize_unpoisons_memory+0xc0/0x740
[   25.231832]  kunit_try_run_case+0x170/0x3f0
[   25.232046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.232572]  kthread+0x328/0x630
[   25.233053]  ret_from_fork+0x10/0x20
[   25.233191] 
[   25.233474] The buggy address belongs to the object at fff00000c77e8200
[   25.233474]  which belongs to the cache kmalloc-128 of size 128
[   25.233746] The buggy address is located 0 bytes to the right of
[   25.233746]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.234040] 
[   25.234093] The buggy address belongs to the physical page:
[   25.234569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.234882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.235016] page_type: f5(slab)
[   25.235324] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.235466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.236048] page dumped because: kasan: bad access detected
[   25.236146] 
[   25.236199] Memory state around the buggy address:
[   25.236788]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.237496]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237631] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.237988]                                                              ^
[   25.238278]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238386]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238481] ==================================================================
[   25.241366] ==================================================================
[   25.241472] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.241587] Read of size 1 at addr fff00000c77e8278 by task kunit_try_catch/195
[   25.241722] 
[   25.241799] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.241993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.242056] Hardware name: linux,dummy-virt (DT)
[   25.242135] Call trace:
[   25.242187]  show_stack+0x20/0x38 (C)
[   25.243640]  dump_stack_lvl+0x8c/0xd0
[   25.243905]  print_report+0x118/0x608
[   25.244040]  kasan_report+0xdc/0x128
[   25.244202]  __asan_report_load1_noabort+0x20/0x30
[   25.244454]  ksize_unpoisons_memory+0x618/0x740
[   25.245286]  kunit_try_run_case+0x170/0x3f0
[   25.245700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.246323]  kthread+0x328/0x630
[   25.246795]  ret_from_fork+0x10/0x20
[   25.247174] 
[   25.247223] Allocated by task 195:
[   25.247299]  kasan_save_stack+0x3c/0x68
[   25.247405]  kasan_save_track+0x20/0x40
[   25.247497]  kasan_save_alloc_info+0x40/0x58
[   25.248202]  __kasan_kmalloc+0xd4/0xd8
[   25.248492]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.249401]  ksize_unpoisons_memory+0xc0/0x740
[   25.249722]  kunit_try_run_case+0x170/0x3f0
[   25.250261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.250489]  kthread+0x328/0x630
[   25.250699]  ret_from_fork+0x10/0x20
[   25.251171] 
[   25.251222] The buggy address belongs to the object at fff00000c77e8200
[   25.251222]  which belongs to the cache kmalloc-128 of size 128
[   25.251643] The buggy address is located 5 bytes to the right of
[   25.251643]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.252241] 
[   25.252503] The buggy address belongs to the physical page:
[   25.252572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.252715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.252830] page_type: f5(slab)
[   25.252925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.253044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.254352] page dumped because: kasan: bad access detected
[   25.254458] 
[   25.254509] Memory state around the buggy address:
[   25.254595]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.254777]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.254838] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.254894]                                                                 ^
[   25.254999]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255138]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255258] ==================================================================
[   25.256853] ==================================================================
[   25.256967] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.257283] Read of size 1 at addr fff00000c77e827f by task kunit_try_catch/195
[   25.257405] 
[   25.257474] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.257667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.257751] Hardware name: linux,dummy-virt (DT)
[   25.257826] Call trace:
[   25.257890]  show_stack+0x20/0x38 (C)
[   25.258145]  dump_stack_lvl+0x8c/0xd0
[   25.258290]  print_report+0x118/0x608
[   25.258430]  kasan_report+0xdc/0x128
[   25.258577]  __asan_report_load1_noabort+0x20/0x30
[   25.258822]  ksize_unpoisons_memory+0x690/0x740
[   25.259079]  kunit_try_run_case+0x170/0x3f0
[   25.259250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.259381]  kthread+0x328/0x630
[   25.259486]  ret_from_fork+0x10/0x20
[   25.259613] 
[   25.259735] Allocated by task 195:
[   25.259820]  kasan_save_stack+0x3c/0x68
[   25.260135]  kasan_save_track+0x20/0x40
[   25.260337]  kasan_save_alloc_info+0x40/0x58
[   25.260984]  __kasan_kmalloc+0xd4/0xd8
[   25.261168]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.261279]  ksize_unpoisons_memory+0xc0/0x740
[   25.261394]  kunit_try_run_case+0x170/0x3f0
[   25.261670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.262072]  kthread+0x328/0x630
[   25.262813]  ret_from_fork+0x10/0x20
[   25.263362] 
[   25.263431] The buggy address belongs to the object at fff00000c77e8200
[   25.263431]  which belongs to the cache kmalloc-128 of size 128
[   25.263584] The buggy address is located 12 bytes to the right of
[   25.263584]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.263994] 
[   25.264063] The buggy address belongs to the physical page:
[   25.264137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.264260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.264379] page_type: f5(slab)
[   25.264477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.264612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.264891] page dumped because: kasan: bad access detected
[   25.264979] 
[   25.265107] Memory state around the buggy address:
[   25.265181]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.265369]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.265607] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.265720]                                                                 ^
[   25.265822]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.266008]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.266164] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   30.660264] ==================================================================
[   30.660577] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.660577] 
[   30.660878] Out-of-bounds read at 0x00000000b25dd63f (1B left of kfence-#131):
[   30.661018]  test_out_of_bounds_read+0x114/0x3e0
[   30.661156]  kunit_try_run_case+0x170/0x3f0
[   30.661482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.661612]  kthread+0x328/0x630
[   30.661929]  ret_from_fork+0x10/0x20
[   30.662045] 
[   30.662106] kfence-#131: 0x0000000065e59076-0x00000000069e2a41, size=32, cache=test
[   30.662106] 
[   30.662225] allocated by task 290 on cpu 1 at 30.660099s (0.002118s ago):
[   30.662468]  test_alloc+0x230/0x628
[   30.662575]  test_out_of_bounds_read+0xdc/0x3e0
[   30.662704]  kunit_try_run_case+0x170/0x3f0
[   30.662830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.663266]  kthread+0x328/0x630
[   30.663391]  ret_from_fork+0x10/0x20
[   30.663503] 
[   30.663607] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.663826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.664079] Hardware name: linux,dummy-virt (DT)
[   30.664179] ==================================================================
[   30.872177] ==================================================================
[   30.872332] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   30.872332] 
[   30.872530] Out-of-bounds read at 0x00000000e7ad4ce4 (32B right of kfence-#133):
[   30.872717]  test_out_of_bounds_read+0x1c8/0x3e0
[   30.872948]  kunit_try_run_case+0x170/0x3f0
[   30.873062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.873181]  kthread+0x328/0x630
[   30.873298]  ret_from_fork+0x10/0x20
[   30.873397] 
[   30.873459] kfence-#133: 0x0000000060b919ef-0x000000007ef3bc70, size=32, cache=test
[   30.873459] 
[   30.873578] allocated by task 290 on cpu 1 at 30.871976s (0.001594s ago):
[   30.873752]  test_alloc+0x230/0x628
[   30.873855]  test_out_of_bounds_read+0x198/0x3e0
[   30.873957]  kunit_try_run_case+0x170/0x3f0
[   30.874055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.874160]  kthread+0x328/0x630
[   30.874266]  ret_from_fork+0x10/0x20
[   30.874393] 
[   30.874561] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.874898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.874988] Hardware name: linux,dummy-virt (DT)
[   30.875202] ==================================================================
[   30.237279] ==================================================================
[   30.237564] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.237564] 
[   30.237844] Out-of-bounds read at 0x00000000daa260de (1B left of kfence-#127):
[   30.238095]  test_out_of_bounds_read+0x114/0x3e0
[   30.238342]  kunit_try_run_case+0x170/0x3f0
[   30.238470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.238583]  kthread+0x328/0x630
[   30.238866]  ret_from_fork+0x10/0x20
[   30.239036] 
[   30.239191] kfence-#127: 0x00000000e97adcf7-0x00000000bbfbe399, size=32, cache=kmalloc-32
[   30.239191] 
[   30.239382] allocated by task 288 on cpu 1 at 30.236308s (0.003065s ago):
[   30.239547]  test_alloc+0x29c/0x628
[   30.239651]  test_out_of_bounds_read+0xdc/0x3e0
[   30.239773]  kunit_try_run_case+0x170/0x3f0
[   30.239926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.240107]  kthread+0x328/0x630
[   30.240256]  ret_from_fork+0x10/0x20
[   30.240365] 
[   30.240552] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.240961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.241040] Hardware name: linux,dummy-virt (DT)
[   30.241177] ==================================================================
[   30.449537] ==================================================================
[   30.449713] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   30.449713] 
[   30.450116] Out-of-bounds read at 0x00000000f02c4d09 (32B right of kfence-#129):
[   30.450707]  test_out_of_bounds_read+0x1c8/0x3e0
[   30.450854]  kunit_try_run_case+0x170/0x3f0
[   30.451404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.451541]  kthread+0x328/0x630
[   30.452267]  ret_from_fork+0x10/0x20
[   30.452398] 
[   30.452474] kfence-#129: 0x000000005c90d312-0x00000000e663bc63, size=32, cache=kmalloc-32
[   30.452474] 
[   30.452703] allocated by task 288 on cpu 1 at 30.448766s (0.003928s ago):
[   30.453478]  test_alloc+0x29c/0x628
[   30.454051]  test_out_of_bounds_read+0x198/0x3e0
[   30.454393]  kunit_try_run_case+0x170/0x3f0
[   30.454759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.454899]  kthread+0x328/0x630
[   30.455015]  ret_from_fork+0x10/0x20
[   30.455853] 
[   30.455970] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.456202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.456240] Hardware name: linux,dummy-virt (DT)
[   30.456280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[   24.082511] ==================================================================
[   24.082815] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330
[   24.082815] 
[   24.082978] Out-of-bounds read at 0x000000007748945b (4096B right of kfence-#86):
[   24.083562]  kmalloc_node_oob_right+0x160/0x330
[   24.083674]  kunit_try_run_case+0x170/0x3f0
[   24.083805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.083931]  kthread+0x328/0x630
[   24.084196]  ret_from_fork+0x10/0x20
[   24.084436] 
[   24.085146] kfence-#86: 0x00000000028b77d8-0x00000000363bdff7, size=4096, cache=kmalloc-4k
[   24.085146] 
[   24.085910] allocated by task 141 on cpu 0 at 24.079275s (0.006234s ago):
[   24.088428]  kmalloc_node_oob_right+0xbc/0x330
[   24.089011]  kunit_try_run_case+0x170/0x3f0
[   24.089194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.089559]  kthread+0x328/0x630
[   24.089719]  ret_from_fork+0x10/0x20
[   24.090471] 
[   24.090828] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.091377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.091444] Hardware name: linux,dummy-virt (DT)
[   24.091915] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   30.088773] ==================================================================
[   30.089033] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.090696] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.090840] 
[   30.090973] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.091186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091550] Hardware name: linux,dummy-virt (DT)
[   30.091663] Call trace:
[   30.091739]  show_stack+0x20/0x38 (C)
[   30.091869]  dump_stack_lvl+0x8c/0xd0
[   30.091992]  print_report+0x118/0x608
[   30.092117]  kasan_report+0xdc/0x128
[   30.092239]  kasan_check_range+0x100/0x1a8
[   30.093739]  __kasan_check_write+0x20/0x30
[   30.093942]  strncpy_from_user+0x3c/0x2a0
[   30.094077]  copy_user_test_oob+0x5c0/0xec8
[   30.094566]  kunit_try_run_case+0x170/0x3f0
[   30.094876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.095016]  kthread+0x328/0x630
[   30.095131]  ret_from_fork+0x10/0x20
[   30.095241] 
[   30.095286] Allocated by task 286:
[   30.095355]  kasan_save_stack+0x3c/0x68
[   30.095463]  kasan_save_track+0x20/0x40
[   30.095560]  kasan_save_alloc_info+0x40/0x58
[   30.095652]  __kasan_kmalloc+0xd4/0xd8
[   30.095764]  __kmalloc_noprof+0x190/0x4d0
[   30.095865]  kunit_kmalloc_array+0x34/0x88
[   30.095964]  copy_user_test_oob+0xac/0xec8
[   30.096062]  kunit_try_run_case+0x170/0x3f0
[   30.096162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.096359]  kthread+0x328/0x630
[   30.096668]  ret_from_fork+0x10/0x20
[   30.096788] 
[   30.096842] The buggy address belongs to the object at fff00000c56e8f00
[   30.096842]  which belongs to the cache kmalloc-128 of size 128
[   30.096981] The buggy address is located 0 bytes inside of
[   30.096981]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.097137] 
[   30.097188] The buggy address belongs to the physical page:
[   30.097278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.098464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.098778] page_type: f5(slab)
[   30.099117] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.099967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.100121] page dumped because: kasan: bad access detected
[   30.100208] 
[   30.100258] Memory state around the buggy address:
[   30.100344]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.100462]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.100573] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.101182]                                                                 ^
[   30.101664]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.101920]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.102461] ==================================================================
[   30.104744] ==================================================================
[   30.104853] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.104962] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/286
[   30.105083] 
[   30.105152] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.105379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.105449] Hardware name: linux,dummy-virt (DT)
[   30.105522] Call trace:
[   30.105582]  show_stack+0x20/0x38 (C)
[   30.105716]  dump_stack_lvl+0x8c/0xd0
[   30.105849]  print_report+0x118/0x608
[   30.107002]  kasan_report+0xdc/0x128
[   30.107432]  __asan_report_store1_noabort+0x20/0x30
[   30.107762]  strncpy_from_user+0x270/0x2a0
[   30.107894]  copy_user_test_oob+0x5c0/0xec8
[   30.108112]  kunit_try_run_case+0x170/0x3f0
[   30.108265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.108402]  kthread+0x328/0x630
[   30.108533]  ret_from_fork+0x10/0x20
[   30.108760] 
[   30.108817] Allocated by task 286:
[   30.108905]  kasan_save_stack+0x3c/0x68
[   30.109022]  kasan_save_track+0x20/0x40
[   30.109131]  kasan_save_alloc_info+0x40/0x58
[   30.109236]  __kasan_kmalloc+0xd4/0xd8
[   30.109395]  __kmalloc_noprof+0x190/0x4d0
[   30.109507]  kunit_kmalloc_array+0x34/0x88
[   30.109611]  copy_user_test_oob+0xac/0xec8
[   30.109767]  kunit_try_run_case+0x170/0x3f0
[   30.109936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.110116]  kthread+0x328/0x630
[   30.110373]  ret_from_fork+0x10/0x20
[   30.110478] 
[   30.110570] The buggy address belongs to the object at fff00000c56e8f00
[   30.110570]  which belongs to the cache kmalloc-128 of size 128
[   30.110747] The buggy address is located 0 bytes to the right of
[   30.110747]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.110974] 
[   30.111085] The buggy address belongs to the physical page:
[   30.111212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.111361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.111496] page_type: f5(slab)
[   30.111672] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.111967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.112359] page dumped because: kasan: bad access detected
[   30.112506] 
[   30.112557] Memory state around the buggy address:
[   30.112659]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.112818]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.113130] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.113286]                                                                 ^
[   30.113390]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.113500]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.113632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   30.012532] ==================================================================
[   30.012728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.013997] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.014142] 
[   30.014234] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.014466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.014537] Hardware name: linux,dummy-virt (DT)
[   30.014617] Call trace:
[   30.014677]  show_stack+0x20/0x38 (C)
[   30.014824]  dump_stack_lvl+0x8c/0xd0
[   30.014986]  print_report+0x118/0x608
[   30.015749]  kasan_report+0xdc/0x128
[   30.015908]  kasan_check_range+0x100/0x1a8
[   30.016055]  __kasan_check_write+0x20/0x30
[   30.016201]  copy_user_test_oob+0x35c/0xec8
[   30.016352]  kunit_try_run_case+0x170/0x3f0
[   30.016491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.016645]  kthread+0x328/0x630
[   30.016966]  ret_from_fork+0x10/0x20
[   30.017119] 
[   30.017181] Allocated by task 286:
[   30.017285]  kasan_save_stack+0x3c/0x68
[   30.017407]  kasan_save_track+0x20/0x40
[   30.017525]  kasan_save_alloc_info+0x40/0x58
[   30.017806]  __kasan_kmalloc+0xd4/0xd8
[   30.018107]  __kmalloc_noprof+0x190/0x4d0
[   30.018245]  kunit_kmalloc_array+0x34/0x88
[   30.018506]  copy_user_test_oob+0xac/0xec8
[   30.018693]  kunit_try_run_case+0x170/0x3f0
[   30.018797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.018920]  kthread+0x328/0x630
[   30.019103]  ret_from_fork+0x10/0x20
[   30.019277] 
[   30.019434] The buggy address belongs to the object at fff00000c56e8f00
[   30.019434]  which belongs to the cache kmalloc-128 of size 128
[   30.019911] The buggy address is located 0 bytes inside of
[   30.019911]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.020255] 
[   30.020330] The buggy address belongs to the physical page:
[   30.020420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.020573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.020736] page_type: f5(slab)
[   30.020840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.021657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.022059] page dumped because: kasan: bad access detected
[   30.022234] 
[   30.022438] Memory state around the buggy address:
[   30.022561]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.022694]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.022815] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.022920]                                                                 ^
[   30.023021]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.025647]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.025783] ==================================================================
[   29.966133] ==================================================================
[   29.966428] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   29.966736] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   29.966873] 
[   29.967077] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.967301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.967393] Hardware name: linux,dummy-virt (DT)
[   29.967641] Call trace:
[   29.967733]  show_stack+0x20/0x38 (C)
[   29.967874]  dump_stack_lvl+0x8c/0xd0
[   29.968135]  print_report+0x118/0x608
[   29.968288]  kasan_report+0xdc/0x128
[   29.968417]  kasan_check_range+0x100/0x1a8
[   29.969042]  __kasan_check_write+0x20/0x30
[   29.969113]  copy_user_test_oob+0x234/0xec8
[   29.969192]  kunit_try_run_case+0x170/0x3f0
[   29.970274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.970430]  kthread+0x328/0x630
[   29.970553]  ret_from_fork+0x10/0x20
[   29.970776] 
[   29.970839] Allocated by task 286:
[   29.970967]  kasan_save_stack+0x3c/0x68
[   29.971095]  kasan_save_track+0x20/0x40
[   29.971231]  kasan_save_alloc_info+0x40/0x58
[   29.971554]  __kasan_kmalloc+0xd4/0xd8
[   29.971673]  __kmalloc_noprof+0x190/0x4d0
[   29.971842]  kunit_kmalloc_array+0x34/0x88
[   29.971941]  copy_user_test_oob+0xac/0xec8
[   29.972038]  kunit_try_run_case+0x170/0x3f0
[   29.972200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.972488]  kthread+0x328/0x630
[   29.972714]  ret_from_fork+0x10/0x20
[   29.972887] 
[   29.972967] The buggy address belongs to the object at fff00000c56e8f00
[   29.972967]  which belongs to the cache kmalloc-128 of size 128
[   29.973188] The buggy address is located 0 bytes inside of
[   29.973188]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   29.973638] 
[   29.973718] The buggy address belongs to the physical page:
[   29.973813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.973975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.974178] page_type: f5(slab)
[   29.974300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.974497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.974611] page dumped because: kasan: bad access detected
[   29.974770] 
[   29.974867] Memory state around the buggy address:
[   29.974966]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.975091]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.975301] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.975440]                                                                 ^
[   29.975576]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.975789]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.975936] ==================================================================
[   29.986174] ==================================================================
[   29.986329] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   29.986463] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   29.986596] 
[   29.986773] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.987596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.987726] Hardware name: linux,dummy-virt (DT)
[   29.988069] Call trace:
[   29.988264]  show_stack+0x20/0x38 (C)
[   29.988403]  dump_stack_lvl+0x8c/0xd0
[   29.988537]  print_report+0x118/0x608
[   29.988926]  kasan_report+0xdc/0x128
[   29.989131]  kasan_check_range+0x100/0x1a8
[   29.989402]  __kasan_check_read+0x20/0x30
[   29.989783]  copy_user_test_oob+0x728/0xec8
[   29.989971]  kunit_try_run_case+0x170/0x3f0
[   29.990111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.990247]  kthread+0x328/0x630
[   29.990370]  ret_from_fork+0x10/0x20
[   29.990541] 
[   29.990627] Allocated by task 286:
[   29.990728]  kasan_save_stack+0x3c/0x68
[   29.990852]  kasan_save_track+0x20/0x40
[   29.990975]  kasan_save_alloc_info+0x40/0x58
[   29.991177]  __kasan_kmalloc+0xd4/0xd8
[   29.991543]  __kmalloc_noprof+0x190/0x4d0
[   29.991676]  kunit_kmalloc_array+0x34/0x88
[   29.991802]  copy_user_test_oob+0xac/0xec8
[   29.991899]  kunit_try_run_case+0x170/0x3f0
[   29.992295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.992589]  kthread+0x328/0x630
[   29.992706]  ret_from_fork+0x10/0x20
[   29.993183] 
[   29.993275] The buggy address belongs to the object at fff00000c56e8f00
[   29.993275]  which belongs to the cache kmalloc-128 of size 128
[   29.993579] The buggy address is located 0 bytes inside of
[   29.993579]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   29.993809] 
[   29.993866] The buggy address belongs to the physical page:
[   29.993946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.994075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.994201] page_type: f5(slab)
[   29.994350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.994573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.994767] page dumped because: kasan: bad access detected
[   29.994855] 
[   29.994916] Memory state around the buggy address:
[   29.995135]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.995351]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995560] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.995661]                                                                 ^
[   29.995796]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995925]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.996032] ==================================================================
[   30.028944] ==================================================================
[   30.029118] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.029354] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.029548] 
[   30.029635] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.030080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.030159] Hardware name: linux,dummy-virt (DT)
[   30.030282] Call trace:
[   30.030357]  show_stack+0x20/0x38 (C)
[   30.030563]  dump_stack_lvl+0x8c/0xd0
[   30.030949]  print_report+0x118/0x608
[   30.031095]  kasan_report+0xdc/0x128
[   30.031305]  kasan_check_range+0x100/0x1a8
[   30.031658]  __kasan_check_read+0x20/0x30
[   30.031802]  copy_user_test_oob+0x3c8/0xec8
[   30.031924]  kunit_try_run_case+0x170/0x3f0
[   30.032044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.032177]  kthread+0x328/0x630
[   30.032339]  ret_from_fork+0x10/0x20
[   30.032460] 
[   30.032511] Allocated by task 286:
[   30.032583]  kasan_save_stack+0x3c/0x68
[   30.032734]  kasan_save_track+0x20/0x40
[   30.032858]  kasan_save_alloc_info+0x40/0x58
[   30.032980]  __kasan_kmalloc+0xd4/0xd8
[   30.033097]  __kmalloc_noprof+0x190/0x4d0
[   30.033217]  kunit_kmalloc_array+0x34/0x88
[   30.033373]  copy_user_test_oob+0xac/0xec8
[   30.033484]  kunit_try_run_case+0x170/0x3f0
[   30.033605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.033934]  kthread+0x328/0x630
[   30.034195]  ret_from_fork+0x10/0x20
[   30.034318] 
[   30.034378] The buggy address belongs to the object at fff00000c56e8f00
[   30.034378]  which belongs to the cache kmalloc-128 of size 128
[   30.034537] The buggy address is located 0 bytes inside of
[   30.034537]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.034797] 
[   30.035010] The buggy address belongs to the physical page:
[   30.035533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.035880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.036006] page_type: f5(slab)
[   30.036573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.037298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.037460] page dumped because: kasan: bad access detected
[   30.037836] 
[   30.038130] Memory state around the buggy address:
[   30.038221]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.038330]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.038484] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.038605]                                                                 ^
[   30.039002]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.039115]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.039755] ==================================================================
[   30.068074] ==================================================================
[   30.068193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.068334] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.068456] 
[   30.068539] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.073127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.073206] Hardware name: linux,dummy-virt (DT)
[   30.073916] Call trace:
[   30.073984]  show_stack+0x20/0x38 (C)
[   30.074111]  dump_stack_lvl+0x8c/0xd0
[   30.075353]  print_report+0x118/0x608
[   30.075745]  kasan_report+0xdc/0x128
[   30.075860]  kasan_check_range+0x100/0x1a8
[   30.075992]  __kasan_check_read+0x20/0x30
[   30.077768]  copy_user_test_oob+0x4a0/0xec8
[   30.078290]  kunit_try_run_case+0x170/0x3f0
[   30.078565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.079064]  kthread+0x328/0x630
[   30.079389]  ret_from_fork+0x10/0x20
[   30.079619] 
[   30.079737] Allocated by task 286:
[   30.079827]  kasan_save_stack+0x3c/0x68
[   30.080003]  kasan_save_track+0x20/0x40
[   30.080109]  kasan_save_alloc_info+0x40/0x58
[   30.080232]  __kasan_kmalloc+0xd4/0xd8
[   30.080379]  __kmalloc_noprof+0x190/0x4d0
[   30.080487]  kunit_kmalloc_array+0x34/0x88
[   30.080672]  copy_user_test_oob+0xac/0xec8
[   30.080832]  kunit_try_run_case+0x170/0x3f0
[   30.081375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.081550]  kthread+0x328/0x630
[   30.081658]  ret_from_fork+0x10/0x20
[   30.082075] 
[   30.082129] The buggy address belongs to the object at fff00000c56e8f00
[   30.082129]  which belongs to the cache kmalloc-128 of size 128
[   30.082556] The buggy address is located 0 bytes inside of
[   30.082556]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.082759] 
[   30.082919] The buggy address belongs to the physical page:
[   30.083005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.083143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.083284] page_type: f5(slab)
[   30.083384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.083511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.083613] page dumped because: kasan: bad access detected
[   30.083714] 
[   30.083769] Memory state around the buggy address:
[   30.083849]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.083956]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.084062] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.084158]                                                                 ^
[   30.084260]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.084367]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.084460] ==================================================================
[   30.042209] ==================================================================
[   30.042476] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.042893] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.043247] 
[   30.043347] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.043924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.044111] Hardware name: linux,dummy-virt (DT)
[   30.044199] Call trace:
[   30.044473]  show_stack+0x20/0x38 (C)
[   30.044697]  dump_stack_lvl+0x8c/0xd0
[   30.045049]  print_report+0x118/0x608
[   30.045176]  kasan_report+0xdc/0x128
[   30.045322]  kasan_check_range+0x100/0x1a8
[   30.045450]  __kasan_check_write+0x20/0x30
[   30.045615]  copy_user_test_oob+0x434/0xec8
[   30.046047]  kunit_try_run_case+0x170/0x3f0
[   30.046479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047161]  kthread+0x328/0x630
[   30.047533]  ret_from_fork+0x10/0x20
[   30.047997] 
[   30.048068] Allocated by task 286:
[   30.048162]  kasan_save_stack+0x3c/0x68
[   30.048348]  kasan_save_track+0x20/0x40
[   30.048458]  kasan_save_alloc_info+0x40/0x58
[   30.048846]  __kasan_kmalloc+0xd4/0xd8
[   30.049138]  __kmalloc_noprof+0x190/0x4d0
[   30.049412]  kunit_kmalloc_array+0x34/0x88
[   30.049862]  copy_user_test_oob+0xac/0xec8
[   30.050116]  kunit_try_run_case+0x170/0x3f0
[   30.050446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.050581]  kthread+0x328/0x630
[   30.050841]  ret_from_fork+0x10/0x20
[   30.051198] 
[   30.051306] The buggy address belongs to the object at fff00000c56e8f00
[   30.051306]  which belongs to the cache kmalloc-128 of size 128
[   30.051472] The buggy address is located 0 bytes inside of
[   30.051472]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.051876] 
[   30.052007] The buggy address belongs to the physical page:
[   30.053283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.053475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.054573] page_type: f5(slab)
[   30.054903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.055513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.056479] page dumped because: kasan: bad access detected
[   30.056574] 
[   30.057420] Memory state around the buggy address:
[   30.057907]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.058424]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.058542] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.058641]                                                                 ^
[   30.058769]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.060229]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.061526] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   29.861880] ==================================================================
[   29.862033] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   29.862188] Read of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282
[   29.862312] 
[   29.865878] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.866835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.866905] Hardware name: linux,dummy-virt (DT)
[   29.868173] Call trace:
[   29.868273]  show_stack+0x20/0x38 (C)
[   29.868540]  dump_stack_lvl+0x8c/0xd0
[   29.868671]  print_report+0x118/0x608
[   29.870586]  kasan_report+0xdc/0x128
[   29.870867]  __asan_report_load8_noabort+0x20/0x30
[   29.871215]  copy_to_kernel_nofault+0x204/0x250
[   29.871380]  copy_to_kernel_nofault_oob+0x158/0x418
[   29.871662]  kunit_try_run_case+0x170/0x3f0
[   29.871826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871957]  kthread+0x328/0x630
[   29.872120]  ret_from_fork+0x10/0x20
[   29.872286] 
[   29.872452] Allocated by task 282:
[   29.872667]  kasan_save_stack+0x3c/0x68
[   29.872798]  kasan_save_track+0x20/0x40
[   29.872900]  kasan_save_alloc_info+0x40/0x58
[   29.872997]  __kasan_kmalloc+0xd4/0xd8
[   29.873142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.873271]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.873382]  kunit_try_run_case+0x170/0x3f0
[   29.873514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873758]  kthread+0x328/0x630
[   29.873870]  ret_from_fork+0x10/0x20
[   29.873981] 
[   29.874045] The buggy address belongs to the object at fff00000c56e8e00
[   29.874045]  which belongs to the cache kmalloc-128 of size 128
[   29.874205] The buggy address is located 0 bytes to the right of
[   29.874205]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   29.874380] 
[   29.874598] The buggy address belongs to the physical page:
[   29.874806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.874969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.875115] page_type: f5(slab)
[   29.875300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.875444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.875822] page dumped because: kasan: bad access detected
[   29.876039] 
[   29.876136] Memory state around the buggy address:
[   29.876368]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.876482]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876591] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.876701]                                                                 ^
[   29.876810]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876918]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877077] ==================================================================
[   29.879375] ==================================================================
[   29.879529] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   29.879660] Write of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282
[   29.879826] 
[   29.880058] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.880182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.880228] Hardware name: linux,dummy-virt (DT)
[   29.880363] Call trace:
[   29.880497]  show_stack+0x20/0x38 (C)
[   29.880731]  dump_stack_lvl+0x8c/0xd0
[   29.881111]  print_report+0x118/0x608
[   29.881401]  kasan_report+0xdc/0x128
[   29.881587]  kasan_check_range+0x100/0x1a8
[   29.881728]  __kasan_check_write+0x20/0x30
[   29.881849]  copy_to_kernel_nofault+0x8c/0x250
[   29.881973]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   29.882105]  kunit_try_run_case+0x170/0x3f0
[   29.882228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.882361]  kthread+0x328/0x630
[   29.882474]  ret_from_fork+0x10/0x20
[   29.882599] 
[   29.882731] Allocated by task 282:
[   29.882828]  kasan_save_stack+0x3c/0x68
[   29.882949]  kasan_save_track+0x20/0x40
[   29.883072]  kasan_save_alloc_info+0x40/0x58
[   29.883400]  __kasan_kmalloc+0xd4/0xd8
[   29.883525]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.883653]  copy_to_kernel_nofault_oob+0xc8/0x418
[   29.883791]  kunit_try_run_case+0x170/0x3f0
[   29.883912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.884086]  kthread+0x328/0x630
[   29.884192]  ret_from_fork+0x10/0x20
[   29.884360] 
[   29.884429] The buggy address belongs to the object at fff00000c56e8e00
[   29.884429]  which belongs to the cache kmalloc-128 of size 128
[   29.884605] The buggy address is located 0 bytes to the right of
[   29.884605]  allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78)
[   29.884896] 
[   29.884958] The buggy address belongs to the physical page:
[   29.885053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   29.885189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.885398] page_type: f5(slab)
[   29.885700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.886037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.886179] page dumped because: kasan: bad access detected
[   29.886302] 
[   29.886358] Memory state around the buggy address:
[   29.886452]  fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.886583]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.886931] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.887025]                                                                 ^
[   29.887256]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887754]  fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887876] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   29.691625] ==================================================================
[   29.691761] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   29.692100] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270
[   29.692459] 
[   29.692546] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.692781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.692908] Hardware name: linux,dummy-virt (DT)
[   29.693046] Call trace:
[   29.693144]  show_stack+0x20/0x38 (C)
[   29.693404]  dump_stack_lvl+0x8c/0xd0
[   29.693550]  print_report+0x310/0x608
[   29.693717]  kasan_report+0xdc/0x128
[   29.694050]  __asan_report_load1_noabort+0x20/0x30
[   29.694273]  vmalloc_oob+0x51c/0x5d0
[   29.694405]  kunit_try_run_case+0x170/0x3f0
[   29.694695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.694841]  kthread+0x328/0x630
[   29.694989]  ret_from_fork+0x10/0x20
[   29.695202] 
[   29.695317] The buggy address belongs to the virtual mapping at
[   29.695317]  [ffff8000800fe000, ffff800080100000) created by:
[   29.695317]  vmalloc_oob+0x98/0x5d0
[   29.695497] 
[   29.695553] The buggy address belongs to the physical page:
[   29.696241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   29.696435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.696646] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.696845] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.696994] page dumped because: kasan: bad access detected
[   29.697170] 
[   29.697267] Memory state around the buggy address:
[   29.697409]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.697514]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.697704] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.697811]                                                                 ^
[   29.697924]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.698176]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.698277] ==================================================================
[   29.681863] ==================================================================
[   29.682034] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   29.682184] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270
[   29.682306] 
[   29.682397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.682605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.682714] Hardware name: linux,dummy-virt (DT)
[   29.682815] Call trace:
[   29.682891]  show_stack+0x20/0x38 (C)
[   29.683045]  dump_stack_lvl+0x8c/0xd0
[   29.683828]  print_report+0x310/0x608
[   29.683985]  kasan_report+0xdc/0x128
[   29.684185]  __asan_report_load1_noabort+0x20/0x30
[   29.684357]  vmalloc_oob+0x578/0x5d0
[   29.684653]  kunit_try_run_case+0x170/0x3f0
[   29.684821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.684996]  kthread+0x328/0x630
[   29.685587]  ret_from_fork+0x10/0x20
[   29.685966] 
[   29.686042] The buggy address belongs to the virtual mapping at
[   29.686042]  [ffff8000800fe000, ffff800080100000) created by:
[   29.686042]  vmalloc_oob+0x98/0x5d0
[   29.686480] 
[   29.686561] The buggy address belongs to the physical page:
[   29.687113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   29.687487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.687758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.687967] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.688168] page dumped because: kasan: bad access detected
[   29.688309] 
[   29.688412] Memory state around the buggy address:
[   29.688498]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.688972]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.689098] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.689210]                                                              ^
[   29.689504]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.689667]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.689869] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   29.330678] ==================================================================
[   29.331107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.331324] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.331513] 
[   29.331613] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.331839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.331946] Hardware name: linux,dummy-virt (DT)
[   29.332029] Call trace:
[   29.332086]  show_stack+0x20/0x38 (C)
[   29.332204]  dump_stack_lvl+0x8c/0xd0
[   29.332327]  print_report+0x118/0x608
[   29.332472]  kasan_report+0xdc/0x128
[   29.332596]  kasan_check_range+0x100/0x1a8
[   29.332741]  __kasan_check_write+0x20/0x30
[   29.332948]  kasan_atomics_helper+0xf20/0x4858
[   29.333453]  kasan_atomics+0x198/0x2e0
[   29.333777]  kunit_try_run_case+0x170/0x3f0
[   29.334032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.334221]  kthread+0x328/0x630
[   29.334342]  ret_from_fork+0x10/0x20
[   29.335031] 
[   29.335274] Allocated by task 266:
[   29.335593]  kasan_save_stack+0x3c/0x68
[   29.335789]  kasan_save_track+0x20/0x40
[   29.335995]  kasan_save_alloc_info+0x40/0x58
[   29.336358]  __kasan_kmalloc+0xd4/0xd8
[   29.336776]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.336937]  kasan_atomics+0xb8/0x2e0
[   29.337264]  kunit_try_run_case+0x170/0x3f0
[   29.337614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.337908]  kthread+0x328/0x630
[   29.338402]  ret_from_fork+0x10/0x20
[   29.338736] 
[   29.338808] The buggy address belongs to the object at fff00000c7772d80
[   29.338808]  which belongs to the cache kmalloc-64 of size 64
[   29.338971] The buggy address is located 0 bytes to the right of
[   29.338971]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.340840] 
[   29.340874] The buggy address belongs to the physical page:
[   29.340915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.341005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.341221] page_type: f5(slab)
[   29.341353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.341483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.341600] page dumped because: kasan: bad access detected
[   29.341743] 
[   29.341796] Memory state around the buggy address:
[   29.341907]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342010]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342148] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.342246]                                      ^
[   29.342330]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342440]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342560] ==================================================================
[   29.343106] ==================================================================
[   29.343223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.343361] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.343499] 
[   29.343580] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.343812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.343898] Hardware name: linux,dummy-virt (DT)
[   29.343986] Call trace:
[   29.344056]  show_stack+0x20/0x38 (C)
[   29.344201]  dump_stack_lvl+0x8c/0xd0
[   29.344354]  print_report+0x118/0x608
[   29.344511]  kasan_report+0xdc/0x128
[   29.344665]  kasan_check_range+0x100/0x1a8
[   29.344825]  __kasan_check_write+0x20/0x30
[   29.344995]  kasan_atomics_helper+0xf88/0x4858
[   29.345133]  kasan_atomics+0x198/0x2e0
[   29.345275]  kunit_try_run_case+0x170/0x3f0
[   29.345571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.345777]  kthread+0x328/0x630
[   29.345901]  ret_from_fork+0x10/0x20
[   29.346016] 
[   29.346074] Allocated by task 266:
[   29.346159]  kasan_save_stack+0x3c/0x68
[   29.346274]  kasan_save_track+0x20/0x40
[   29.346397]  kasan_save_alloc_info+0x40/0x58
[   29.346593]  __kasan_kmalloc+0xd4/0xd8
[   29.346747]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.346912]  kasan_atomics+0xb8/0x2e0
[   29.347065]  kunit_try_run_case+0x170/0x3f0
[   29.347366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.347531]  kthread+0x328/0x630
[   29.347727]  ret_from_fork+0x10/0x20
[   29.348068] 
[   29.348127] The buggy address belongs to the object at fff00000c7772d80
[   29.348127]  which belongs to the cache kmalloc-64 of size 64
[   29.348268] The buggy address is located 0 bytes to the right of
[   29.348268]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.349477] 
[   29.349633] The buggy address belongs to the physical page:
[   29.350414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.350553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.351395] page_type: f5(slab)
[   29.351534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.351728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.351871] page dumped because: kasan: bad access detected
[   29.351946] 
[   29.351994] Memory state around the buggy address:
[   29.352072]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.352172]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.352288] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.352471]                                      ^
[   29.352559]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.352851]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.353128] ==================================================================
[   29.309353] ==================================================================
[   29.309469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.309602] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.309761] 
[   29.309860] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.310114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.310237] Hardware name: linux,dummy-virt (DT)
[   29.310365] Call trace:
[   29.310433]  show_stack+0x20/0x38 (C)
[   29.310562]  dump_stack_lvl+0x8c/0xd0
[   29.310776]  print_report+0x118/0x608
[   29.310929]  kasan_report+0xdc/0x128
[   29.311085]  __asan_report_store8_noabort+0x20/0x30
[   29.311248]  kasan_atomics_helper+0x3e5c/0x4858
[   29.311445]  kasan_atomics+0x198/0x2e0
[   29.311577]  kunit_try_run_case+0x170/0x3f0
[   29.311766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.311965]  kthread+0x328/0x630
[   29.312112]  ret_from_fork+0x10/0x20
[   29.312239] 
[   29.312290] Allocated by task 266:
[   29.312473]  kasan_save_stack+0x3c/0x68
[   29.312626]  kasan_save_track+0x20/0x40
[   29.312770]  kasan_save_alloc_info+0x40/0x58
[   29.312953]  __kasan_kmalloc+0xd4/0xd8
[   29.313127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.313299]  kasan_atomics+0xb8/0x2e0
[   29.313475]  kunit_try_run_case+0x170/0x3f0
[   29.313591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.313722]  kthread+0x328/0x630
[   29.313811]  ret_from_fork+0x10/0x20
[   29.313926] 
[   29.313984] The buggy address belongs to the object at fff00000c7772d80
[   29.313984]  which belongs to the cache kmalloc-64 of size 64
[   29.314125] The buggy address is located 0 bytes to the right of
[   29.314125]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.314283] 
[   29.314349] The buggy address belongs to the physical page:
[   29.314424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.314567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.314706] page_type: f5(slab)
[   29.314825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.315077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.315225] page dumped because: kasan: bad access detected
[   29.315317] 
[   29.315379] Memory state around the buggy address:
[   29.315466]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.315586]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.315769] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.315900]                                      ^
[   29.316114]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.316289]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.316746] ==================================================================
[   29.552928] ==================================================================
[   29.554291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.554505] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.554643] 
[   29.555482] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.555973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.556069] Hardware name: linux,dummy-virt (DT)
[   29.556161] Call trace:
[   29.556414]  show_stack+0x20/0x38 (C)
[   29.556599]  dump_stack_lvl+0x8c/0xd0
[   29.556982]  print_report+0x118/0x608
[   29.557231]  kasan_report+0xdc/0x128
[   29.557376]  __asan_report_load8_noabort+0x20/0x30
[   29.557539]  kasan_atomics_helper+0x3db0/0x4858
[   29.557755]  kasan_atomics+0x198/0x2e0
[   29.557948]  kunit_try_run_case+0x170/0x3f0
[   29.558107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.558264]  kthread+0x328/0x630
[   29.558445]  ret_from_fork+0x10/0x20
[   29.558577] 
[   29.558703] Allocated by task 266:
[   29.558789]  kasan_save_stack+0x3c/0x68
[   29.559104]  kasan_save_track+0x20/0x40
[   29.559233]  kasan_save_alloc_info+0x40/0x58
[   29.559344]  __kasan_kmalloc+0xd4/0xd8
[   29.559617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.559868]  kasan_atomics+0xb8/0x2e0
[   29.559973]  kunit_try_run_case+0x170/0x3f0
[   29.560074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.560357]  kthread+0x328/0x630
[   29.560461]  ret_from_fork+0x10/0x20
[   29.560596] 
[   29.560648] The buggy address belongs to the object at fff00000c7772d80
[   29.560648]  which belongs to the cache kmalloc-64 of size 64
[   29.561033] The buggy address is located 0 bytes to the right of
[   29.561033]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.561466] 
[   29.561577] The buggy address belongs to the physical page:
[   29.561655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.561804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.562053] page_type: f5(slab)
[   29.562224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.562371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.562487] page dumped because: kasan: bad access detected
[   29.562575] 
[   29.562666] Memory state around the buggy address:
[   29.562772]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563007]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563131] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.563239]                                      ^
[   29.563343]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563468]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563572] ==================================================================
[   29.633073] ==================================================================
[   29.633171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.633303] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.633431] 
[   29.633505] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.634041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.634116] Hardware name: linux,dummy-virt (DT)
[   29.634185] Call trace:
[   29.634236]  show_stack+0x20/0x38 (C)
[   29.635393]  dump_stack_lvl+0x8c/0xd0
[   29.635550]  print_report+0x118/0x608
[   29.636514]  kasan_report+0xdc/0x128
[   29.636669]  kasan_check_range+0x100/0x1a8
[   29.636835]  __kasan_check_write+0x20/0x30
[   29.636968]  kasan_atomics_helper+0x17ec/0x4858
[   29.637109]  kasan_atomics+0x198/0x2e0
[   29.637261]  kunit_try_run_case+0x170/0x3f0
[   29.637669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.637853]  kthread+0x328/0x630
[   29.637980]  ret_from_fork+0x10/0x20
[   29.638109] 
[   29.638170] Allocated by task 266:
[   29.638255]  kasan_save_stack+0x3c/0x68
[   29.638375]  kasan_save_track+0x20/0x40
[   29.638490]  kasan_save_alloc_info+0x40/0x58
[   29.638600]  __kasan_kmalloc+0xd4/0xd8
[   29.638781]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.638895]  kasan_atomics+0xb8/0x2e0
[   29.638996]  kunit_try_run_case+0x170/0x3f0
[   29.639101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.639214]  kthread+0x328/0x630
[   29.639311]  ret_from_fork+0x10/0x20
[   29.639418] 
[   29.639476] The buggy address belongs to the object at fff00000c7772d80
[   29.639476]  which belongs to the cache kmalloc-64 of size 64
[   29.639624] The buggy address is located 0 bytes to the right of
[   29.639624]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.639808] 
[   29.639895] The buggy address belongs to the physical page:
[   29.639977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.640129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.640351] page_type: f5(slab)
[   29.642125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.642323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.642443] page dumped because: kasan: bad access detected
[   29.642537] 
[   29.642594] Memory state around the buggy address:
[   29.644778]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.644913]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.645033] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.646392]                                      ^
[   29.646499]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.646725]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.646875] ==================================================================
[   29.606735] ==================================================================
[   29.607004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.607124] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.607260] 
[   29.607336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.610012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.610091] Hardware name: linux,dummy-virt (DT)
[   29.610188] Call trace:
[   29.610252]  show_stack+0x20/0x38 (C)
[   29.610399]  dump_stack_lvl+0x8c/0xd0
[   29.610532]  print_report+0x118/0x608
[   29.610942]  kasan_report+0xdc/0x128
[   29.611071]  kasan_check_range+0x100/0x1a8
[   29.611197]  __kasan_check_write+0x20/0x30
[   29.611379]  kasan_atomics_helper+0x175c/0x4858
[   29.611519]  kasan_atomics+0x198/0x2e0
[   29.612143]  kunit_try_run_case+0x170/0x3f0
[   29.612307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.612443]  kthread+0x328/0x630
[   29.613646]  ret_from_fork+0x10/0x20
[   29.614129] 
[   29.614239] Allocated by task 266:
[   29.614441]  kasan_save_stack+0x3c/0x68
[   29.614560]  kasan_save_track+0x20/0x40
[   29.615184]  kasan_save_alloc_info+0x40/0x58
[   29.615400]  __kasan_kmalloc+0xd4/0xd8
[   29.615510]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.615620]  kasan_atomics+0xb8/0x2e0
[   29.615741]  kunit_try_run_case+0x170/0x3f0
[   29.615847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.616305]  kthread+0x328/0x630
[   29.616446]  ret_from_fork+0x10/0x20
[   29.616906] 
[   29.616980] The buggy address belongs to the object at fff00000c7772d80
[   29.616980]  which belongs to the cache kmalloc-64 of size 64
[   29.617583] The buggy address is located 0 bytes to the right of
[   29.617583]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.617764] 
[   29.617823] The buggy address belongs to the physical page:
[   29.617907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.618317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.619063] page_type: f5(slab)
[   29.619286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.619425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.619553] page dumped because: kasan: bad access detected
[   29.619638] 
[   29.620316] Memory state around the buggy address:
[   29.620704]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.620846]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.621076] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.621193]                                      ^
[   29.621605]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.621878]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.622125] ==================================================================
[   29.252918] ==================================================================
[   29.253207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.253342] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.253463] 
[   29.253532] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.253762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.253846] Hardware name: linux,dummy-virt (DT)
[   29.254027] Call trace:
[   29.254098]  show_stack+0x20/0x38 (C)
[   29.254272]  dump_stack_lvl+0x8c/0xd0
[   29.254422]  print_report+0x118/0x608
[   29.254566]  kasan_report+0xdc/0x128
[   29.254961]  kasan_check_range+0x100/0x1a8
[   29.255122]  __kasan_check_write+0x20/0x30
[   29.255317]  kasan_atomics_helper+0xd3c/0x4858
[   29.255460]  kasan_atomics+0x198/0x2e0
[   29.256199]  kunit_try_run_case+0x170/0x3f0
[   29.256433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.256988]  kthread+0x328/0x630
[   29.257148]  ret_from_fork+0x10/0x20
[   29.257417] 
[   29.257511] Allocated by task 266:
[   29.257606]  kasan_save_stack+0x3c/0x68
[   29.257739]  kasan_save_track+0x20/0x40
[   29.257855]  kasan_save_alloc_info+0x40/0x58
[   29.257961]  __kasan_kmalloc+0xd4/0xd8
[   29.258397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.258525]  kasan_atomics+0xb8/0x2e0
[   29.258636]  kunit_try_run_case+0x170/0x3f0
[   29.258813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259153]  kthread+0x328/0x630
[   29.259591]  ret_from_fork+0x10/0x20
[   29.259786] 
[   29.259847] The buggy address belongs to the object at fff00000c7772d80
[   29.259847]  which belongs to the cache kmalloc-64 of size 64
[   29.259931] The buggy address is located 0 bytes to the right of
[   29.259931]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.260056] 
[   29.260167] The buggy address belongs to the physical page:
[   29.260253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.260664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.261027] page_type: f5(slab)
[   29.261674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.262095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.262456] page dumped because: kasan: bad access detected
[   29.262705] 
[   29.262776] Memory state around the buggy address:
[   29.262873]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.263201]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.263329] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.263739]                                      ^
[   29.263893]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.264082]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.264198] ==================================================================
[   29.526238] ==================================================================
[   29.526346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.526465] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.526584] 
[   29.527098] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.527402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.527996] Hardware name: linux,dummy-virt (DT)
[   29.528157] Call trace:
[   29.528225]  show_stack+0x20/0x38 (C)
[   29.528352]  dump_stack_lvl+0x8c/0xd0
[   29.528494]  print_report+0x118/0x608
[   29.528673]  kasan_report+0xdc/0x128
[   29.529464]  kasan_check_range+0x100/0x1a8
[   29.529605]  __kasan_check_write+0x20/0x30
[   29.529762]  kasan_atomics_helper+0x154c/0x4858
[   29.530148]  kasan_atomics+0x198/0x2e0
[   29.530468]  kunit_try_run_case+0x170/0x3f0
[   29.530830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.531451]  kthread+0x328/0x630
[   29.532140]  ret_from_fork+0x10/0x20
[   29.532526] 
[   29.533106] Allocated by task 266:
[   29.533345]  kasan_save_stack+0x3c/0x68
[   29.533516]  kasan_save_track+0x20/0x40
[   29.533621]  kasan_save_alloc_info+0x40/0x58
[   29.533745]  __kasan_kmalloc+0xd4/0xd8
[   29.534723]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.534862]  kasan_atomics+0xb8/0x2e0
[   29.535243]  kunit_try_run_case+0x170/0x3f0
[   29.535586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.535731]  kthread+0x328/0x630
[   29.536523]  ret_from_fork+0x10/0x20
[   29.536969] 
[   29.537276] The buggy address belongs to the object at fff00000c7772d80
[   29.537276]  which belongs to the cache kmalloc-64 of size 64
[   29.537436] The buggy address is located 0 bytes to the right of
[   29.537436]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.537594] 
[   29.537650] The buggy address belongs to the physical page:
[   29.537745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.538206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.538744] page_type: f5(slab)
[   29.539043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.539176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.539280] page dumped because: kasan: bad access detected
[   29.539361] 
[   29.539411] Memory state around the buggy address:
[   29.539531]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.539647]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.539917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.540018]                                      ^
[   29.540228]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540339]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540435] ==================================================================
[   29.441460] ==================================================================
[   29.441604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.442804] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.443416] 
[   29.443500] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.443969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.444149] Hardware name: linux,dummy-virt (DT)
[   29.444257] Call trace:
[   29.444405]  show_stack+0x20/0x38 (C)
[   29.444636]  dump_stack_lvl+0x8c/0xd0
[   29.444781]  print_report+0x118/0x608
[   29.444904]  kasan_report+0xdc/0x128
[   29.445051]  kasan_check_range+0x100/0x1a8
[   29.445422]  __kasan_check_write+0x20/0x30
[   29.445615]  kasan_atomics_helper+0x12d8/0x4858
[   29.446258]  kasan_atomics+0x198/0x2e0
[   29.446804]  kunit_try_run_case+0x170/0x3f0
[   29.447362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.447756]  kthread+0x328/0x630
[   29.447952]  ret_from_fork+0x10/0x20
[   29.448078] 
[   29.448129] Allocated by task 266:
[   29.448215]  kasan_save_stack+0x3c/0x68
[   29.448321]  kasan_save_track+0x20/0x40
[   29.448501]  kasan_save_alloc_info+0x40/0x58
[   29.448622]  __kasan_kmalloc+0xd4/0xd8
[   29.448748]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.449453]  kasan_atomics+0xb8/0x2e0
[   29.449579]  kunit_try_run_case+0x170/0x3f0
[   29.449756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.449937]  kthread+0x328/0x630
[   29.451738]  ret_from_fork+0x10/0x20
[   29.451919] 
[   29.452006] The buggy address belongs to the object at fff00000c7772d80
[   29.452006]  which belongs to the cache kmalloc-64 of size 64
[   29.452172] The buggy address is located 0 bytes to the right of
[   29.452172]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.452367] 
[   29.452592] The buggy address belongs to the physical page:
[   29.452786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.452930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.453111] page_type: f5(slab)
[   29.453256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.453391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.453522] page dumped because: kasan: bad access detected
[   29.453640] 
[   29.453708] Memory state around the buggy address:
[   29.453800]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.454115]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.454251] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.454424]                                      ^
[   29.454560]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454775]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454955] ==================================================================
[   29.179693] ==================================================================
[   29.179800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.179916] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.180575] 
[   29.180708] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.180928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.181972]  kasan_atomics_helper+0x3dcc/0x4858
[   29.184093]  kunit_try_run_case+0x170/0x3f0
[   29.184539]  kthread+0x328/0x630
[   29.184642]  ret_from_fork+0x10/0x20
[   29.185717] The buggy address is located 0 bytes to the right of
[   29.185717]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.186365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.188915]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.192416]  __kasan_check_write+0x20/0x30
[   29.193965]  ret_from_fork+0x10/0x20
[   29.197920]  kthread+0x328/0x630
[   29.198829] The buggy address is located 0 bytes to the right of
[   29.198829]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.200034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.200934] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.201363]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.202381] 
[   29.203293]  show_stack+0x20/0x38 (C)
[   29.204208]  __asan_report_load4_noabort+0x20/0x30
[   29.205489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.206549] Allocated by task 266:
[   29.206957]  kasan_save_track+0x20/0x40
[   29.213009] The buggy address belongs to the object at fff00000c7772d80
[   29.213009]  which belongs to the cache kmalloc-64 of size 64
[   29.213453] The buggy address is located 0 bytes to the right of
[   29.213453]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.214259] 
[   29.214368] The buggy address belongs to the physical page:
[   29.214470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.214605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.214905] page_type: f5(slab)
[   29.215130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.215265] page dumped because: kasan: bad access detected
[   29.215351] 
[   29.215400] Memory state around the buggy address:
[   29.215490]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.215624]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.215765] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.215863]                                      ^
[   29.215969]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.217831] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.220608]  kunit_try_run_case+0x170/0x3f0
[   29.223846] The buggy address is located 0 bytes to the right of
[   29.223846]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.224602] The buggy address belongs to the physical page:
[   29.225174] page_type: f5(slab)
[   29.225854]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.227756] 
[   29.228761]  dump_stack_lvl+0x8c/0xd0
[   29.230229]  kthread+0x328/0x630
[   29.232229]  kthread+0x328/0x630
[   29.233424] 
[   29.233573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.234813]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.236560] 
[   29.236996] Call trace:
[   29.241909] 
[   29.242053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.242189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.242420] page_type: f5(slab)
[   29.242733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.242894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.242999] page dumped because: kasan: bad access detected
[   29.243085] 
[   29.243139] Memory state around the buggy address:
[   29.243267]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.243446]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.243593] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.243711]                                      ^
[   29.243795]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244086]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244328] ==================================================================
[   29.277398] ==================================================================
[   29.277506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.277622] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.277765] 
[   29.277842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.278043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.278117] Hardware name: linux,dummy-virt (DT)
[   29.278192] Call trace:
[   29.278250]  show_stack+0x20/0x38 (C)
[   29.278368]  dump_stack_lvl+0x8c/0xd0
[   29.278489]  print_report+0x118/0x608
[   29.278616]  kasan_report+0xdc/0x128
[   29.278825]  kasan_check_range+0x100/0x1a8
[   29.278978]  __kasan_check_read+0x20/0x30
[   29.279125]  kasan_atomics_helper+0xdd4/0x4858
[   29.279276]  kasan_atomics+0x198/0x2e0
[   29.279411]  kunit_try_run_case+0x170/0x3f0
[   29.279971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.280136]  kthread+0x328/0x630
[   29.280253]  ret_from_fork+0x10/0x20
[   29.280373] 
[   29.280425] Allocated by task 266:
[   29.280553]  kasan_save_stack+0x3c/0x68
[   29.280697]  kasan_save_track+0x20/0x40
[   29.282052]  kasan_save_alloc_info+0x40/0x58
[   29.282179]  __kasan_kmalloc+0xd4/0xd8
[   29.282289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.282469]  kasan_atomics+0xb8/0x2e0
[   29.282651]  kunit_try_run_case+0x170/0x3f0
[   29.282786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.282919]  kthread+0x328/0x630
[   29.283025]  ret_from_fork+0x10/0x20
[   29.283187] 
[   29.283488] The buggy address belongs to the object at fff00000c7772d80
[   29.283488]  which belongs to the cache kmalloc-64 of size 64
[   29.283646] The buggy address is located 0 bytes to the right of
[   29.283646]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.283976] 
[   29.284141] The buggy address belongs to the physical page:
[   29.284364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.284700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.284827] page_type: f5(slab)
[   29.284918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.285039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.285211] page dumped because: kasan: bad access detected
[   29.285359] 
[   29.285424] Memory state around the buggy address:
[   29.285548]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285671]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285813] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.285976]                                      ^
[   29.286458]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286721]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286831] ==================================================================
[   29.104432] ==================================================================
[   29.104534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.104652] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.104816] 
[   29.104904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.105101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.105175] Hardware name: linux,dummy-virt (DT)
[   29.105265] Call trace:
[   29.105329]  show_stack+0x20/0x38 (C)
[   29.105463]  dump_stack_lvl+0x8c/0xd0
[   29.105600]  print_report+0x118/0x608
[   29.107810]  kasan_report+0xdc/0x128
[   29.107966]  __asan_report_load4_noabort+0x20/0x30
[   29.108094]  kasan_atomics_helper+0x42d8/0x4858
[   29.108215]  kasan_atomics+0x198/0x2e0
[   29.108332]  kunit_try_run_case+0x170/0x3f0
[   29.108468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.109478]  kthread+0x328/0x630
[   29.109607]  ret_from_fork+0x10/0x20
[   29.113045] The buggy address is located 0 bytes to the right of
[   29.113045]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.116237]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.118895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   29.122732]  kunit_try_run_case+0x170/0x3f0
[   29.122886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.123255]  kthread+0x328/0x630
[   29.123385]  ret_from_fork+0x10/0x20
[   29.123734] 
[   29.123799] Allocated by task 266:
[   29.123895]  kasan_save_stack+0x3c/0x68
[   29.124002]  kasan_save_track+0x20/0x40
[   29.124115]  kasan_save_alloc_info+0x40/0x58
[   29.124233]  __kasan_kmalloc+0xd4/0xd8
[   29.124347]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.124472]  kasan_atomics+0xb8/0x2e0
[   29.124576]  kunit_try_run_case+0x170/0x3f0
[   29.124784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.125098]  kthread+0x328/0x630
[   29.125233]  ret_from_fork+0x10/0x20
[   29.125526] 
[   29.125702] The buggy address belongs to the object at fff00000c7772d80
[   29.125702]  which belongs to the cache kmalloc-64 of size 64
[   29.125862] The buggy address is located 0 bytes to the right of
[   29.125862]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.126038] 
[   29.126102] The buggy address belongs to the physical page:
[   29.126205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.126442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.126589] page_type: f5(slab)
[   29.126765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.126905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.127104] page dumped because: kasan: bad access detected
[   29.127222] 
[   29.127377] Memory state around the buggy address:
[   29.127463]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.128108]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.128227] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.128327]                                      ^
[   29.128410]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.128516]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.129363] ==================================================================
[   29.165172] ==================================================================
[   29.165352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.165515] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.165641] 
[   29.165734] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.165943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.166014] Hardware name: linux,dummy-virt (DT)
[   29.166090] Call trace:
[   29.166147]  show_stack+0x20/0x38 (C)
[   29.166265]  dump_stack_lvl+0x8c/0xd0
[   29.166409]  print_report+0x118/0x608
[   29.167000]  kasan_report+0xdc/0x128
[   29.167340]  kasan_check_range+0x100/0x1a8
[   29.167837]  __kasan_check_write+0x20/0x30
[   29.168453]  kasan_atomics_helper+0xad4/0x4858
[   29.168627]  kasan_atomics+0x198/0x2e0
[   29.169019]  kunit_try_run_case+0x170/0x3f0
[   29.169303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.169599]  kthread+0x328/0x630
[   29.169732]  ret_from_fork+0x10/0x20
[   29.169880] 
[   29.169946] Allocated by task 266:
[   29.170036]  kasan_save_stack+0x3c/0x68
[   29.170147]  kasan_save_track+0x20/0x40
[   29.170244]  kasan_save_alloc_info+0x40/0x58
[   29.170348]  __kasan_kmalloc+0xd4/0xd8
[   29.170449]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.170556]  kasan_atomics+0xb8/0x2e0
[   29.170657]  kunit_try_run_case+0x170/0x3f0
[   29.170788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.170901]  kthread+0x328/0x630
[   29.171661]  ret_from_fork+0x10/0x20
[   29.171950] 
[   29.172867] The buggy address belongs to the object at fff00000c7772d80
[   29.172867]  which belongs to the cache kmalloc-64 of size 64
[   29.173205] The buggy address is located 0 bytes to the right of
[   29.173205]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.174627] 
[   29.174756] The buggy address belongs to the physical page:
[   29.174834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.174909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.174990] page_type: f5(slab)
[   29.175094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.175285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.176188] page dumped because: kasan: bad access detected
[   29.176334] 
[   29.176390] Memory state around the buggy address:
[   29.176868]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.177066]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.177238] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.177447]                                      ^
[   29.177582]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.178307]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.178450] ==================================================================
[   29.622646] ==================================================================
[   29.622906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.623204] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.623342] 
[   29.623535] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.623756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.624163] Hardware name: linux,dummy-virt (DT)
[   29.624261] Call trace:
[   29.624329]  show_stack+0x20/0x38 (C)
[   29.624447]  dump_stack_lvl+0x8c/0xd0
[   29.624579]  print_report+0x118/0x608
[   29.624952]  kasan_report+0xdc/0x128
[   29.625125]  __asan_report_load8_noabort+0x20/0x30
[   29.625740]  kasan_atomics_helper+0x3e20/0x4858
[   29.626171]  kasan_atomics+0x198/0x2e0
[   29.626374]  kunit_try_run_case+0x170/0x3f0
[   29.626529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.626743]  kthread+0x328/0x630
[   29.626873]  ret_from_fork+0x10/0x20
[   29.627166] 
[   29.627255] Allocated by task 266:
[   29.627455]  kasan_save_stack+0x3c/0x68
[   29.627576]  kasan_save_track+0x20/0x40
[   29.627905]  kasan_save_alloc_info+0x40/0x58
[   29.628066]  __kasan_kmalloc+0xd4/0xd8
[   29.628337]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.628451]  kasan_atomics+0xb8/0x2e0
[   29.628594]  kunit_try_run_case+0x170/0x3f0
[   29.629240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.629380]  kthread+0x328/0x630
[   29.629537]  ret_from_fork+0x10/0x20
[   29.629750] 
[   29.629818] The buggy address belongs to the object at fff00000c7772d80
[   29.629818]  which belongs to the cache kmalloc-64 of size 64
[   29.629981] The buggy address is located 0 bytes to the right of
[   29.629981]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.630225] 
[   29.630302] The buggy address belongs to the physical page:
[   29.630381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.630513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.631295] page_type: f5(slab)
[   29.631402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.631527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.631631] page dumped because: kasan: bad access detected
[   29.631856] 
[   29.631913] Memory state around the buggy address:
[   29.632002]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.632119]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.632229] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.632331]                                      ^
[   29.632424]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.632538]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.632625] ==================================================================
[   29.574438] ==================================================================
[   29.574722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.574943] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.575207] 
[   29.575291] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.575639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.575743] Hardware name: linux,dummy-virt (DT)
[   29.575838] Call trace:
[   29.575893]  show_stack+0x20/0x38 (C)
[   29.576027]  dump_stack_lvl+0x8c/0xd0
[   29.576159]  print_report+0x118/0x608
[   29.576287]  kasan_report+0xdc/0x128
[   29.578179]  __asan_report_load8_noabort+0x20/0x30
[   29.578326]  kasan_atomics_helper+0x3df4/0x4858
[   29.578622]  kasan_atomics+0x198/0x2e0
[   29.578925]  kunit_try_run_case+0x170/0x3f0
[   29.579329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.579478]  kthread+0x328/0x630
[   29.579598]  ret_from_fork+0x10/0x20
[   29.579788] 
[   29.579855] Allocated by task 266:
[   29.579991]  kasan_save_stack+0x3c/0x68
[   29.580096]  kasan_save_track+0x20/0x40
[   29.580196]  kasan_save_alloc_info+0x40/0x58
[   29.580297]  __kasan_kmalloc+0xd4/0xd8
[   29.580468]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.580725]  kasan_atomics+0xb8/0x2e0
[   29.580992]  kunit_try_run_case+0x170/0x3f0
[   29.581102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.581217]  kthread+0x328/0x630
[   29.581324]  ret_from_fork+0x10/0x20
[   29.581452] 
[   29.581605] The buggy address belongs to the object at fff00000c7772d80
[   29.581605]  which belongs to the cache kmalloc-64 of size 64
[   29.581773] The buggy address is located 0 bytes to the right of
[   29.581773]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.581952] 
[   29.582016] The buggy address belongs to the physical page:
[   29.582107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.582240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.582561] page_type: f5(slab)
[   29.582902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.583096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.583292] page dumped because: kasan: bad access detected
[   29.583439] 
[   29.583529] Memory state around the buggy address:
[   29.583772]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.583880]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.583987] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.584087]                                      ^
[   29.584213]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584310]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584402] ==================================================================
[   29.244748] ==================================================================
[   29.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.245110] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.245232] 
[   29.245326] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.245552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.245718] Hardware name: linux,dummy-virt (DT)
[   29.245793] Call trace:
[   29.245898]  show_stack+0x20/0x38 (C)
[   29.246037]  dump_stack_lvl+0x8c/0xd0
[   29.246383]  print_report+0x118/0x608
[   29.246738]  kasan_report+0xdc/0x128
[   29.246872]  __asan_report_load4_noabort+0x20/0x30
[   29.247104]  kasan_atomics_helper+0x3dd8/0x4858
[   29.247240]  kasan_atomics+0x198/0x2e0
[   29.247478]  kunit_try_run_case+0x170/0x3f0
[   29.247618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.248055]  kthread+0x328/0x630
[   29.248204]  ret_from_fork+0x10/0x20
[   29.248362] 
[   29.248415] Allocated by task 266:
[   29.248492]  kasan_save_stack+0x3c/0x68
[   29.248616]  kasan_save_track+0x20/0x40
[   29.248734]  kasan_save_alloc_info+0x40/0x58
[   29.248895]  __kasan_kmalloc+0xd4/0xd8
[   29.249001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.249108]  kasan_atomics+0xb8/0x2e0
[   29.249235]  kunit_try_run_case+0x170/0x3f0
[   29.249358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.249591]  kthread+0x328/0x630
[   29.249703]  ret_from_fork+0x10/0x20
[   29.249827] 
[   29.249931] The buggy address belongs to the object at fff00000c7772d80
[   29.249931]  which belongs to the cache kmalloc-64 of size 64
[   29.250185] The buggy address is located 0 bytes to the right of
[   29.250185]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.250352] 
[   29.250411] The buggy address belongs to the physical page:
[   29.250497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.250663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.250817] page_type: f5(slab)
[   29.250927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.251070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.251388] page dumped because: kasan: bad access detected
[   29.251495] 
[   29.251557] Memory state around the buggy address:
[   29.251646]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.251793]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.251990] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.252149]                                      ^
[   29.252239]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.252348]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.252446] ==================================================================
[   29.430990] ==================================================================
[   29.431092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.431213] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.431358] 
[   29.431449] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.431989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.432203] Hardware name: linux,dummy-virt (DT)
[   29.432288] Call trace:
[   29.432343]  show_stack+0x20/0x38 (C)
[   29.432467]  dump_stack_lvl+0x8c/0xd0
[   29.432585]  print_report+0x118/0x608
[   29.432724]  kasan_report+0xdc/0x128
[   29.432851]  kasan_check_range+0x100/0x1a8
[   29.432975]  __kasan_check_write+0x20/0x30
[   29.433088]  kasan_atomics_helper+0x126c/0x4858
[   29.433212]  kasan_atomics+0x198/0x2e0
[   29.433346]  kunit_try_run_case+0x170/0x3f0
[   29.433467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.433601]  kthread+0x328/0x630
[   29.433729]  ret_from_fork+0x10/0x20
[   29.433854] 
[   29.433902] Allocated by task 266:
[   29.433973]  kasan_save_stack+0x3c/0x68
[   29.434074]  kasan_save_track+0x20/0x40
[   29.434176]  kasan_save_alloc_info+0x40/0x58
[   29.434274]  __kasan_kmalloc+0xd4/0xd8
[   29.434373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.434483]  kasan_atomics+0xb8/0x2e0
[   29.434582]  kunit_try_run_case+0x170/0x3f0
[   29.434725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434903]  kthread+0x328/0x630
[   29.435076]  ret_from_fork+0x10/0x20
[   29.435868] 
[   29.436063] The buggy address belongs to the object at fff00000c7772d80
[   29.436063]  which belongs to the cache kmalloc-64 of size 64
[   29.436495] The buggy address is located 0 bytes to the right of
[   29.436495]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.436661] 
[   29.436737] The buggy address belongs to the physical page:
[   29.437618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.437901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.438553] page_type: f5(slab)
[   29.438670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.438835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.439649] page dumped because: kasan: bad access detected
[   29.439824] 
[   29.439886] Memory state around the buggy address:
[   29.440320]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.440438]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.440614] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.440737]                                      ^
[   29.440826]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440932]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.441031] ==================================================================
[   29.455874] ==================================================================
[   29.456360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.456529] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.456656] 
[   29.456757] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.457097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.457435] Hardware name: linux,dummy-virt (DT)
[   29.457751] Call trace:
[   29.457817]  show_stack+0x20/0x38 (C)
[   29.457946]  dump_stack_lvl+0x8c/0xd0
[   29.458073]  print_report+0x118/0x608
[   29.458199]  kasan_report+0xdc/0x128
[   29.458667]  kasan_check_range+0x100/0x1a8
[   29.460701]  __kasan_check_write+0x20/0x30
[   29.460853]  kasan_atomics_helper+0x1384/0x4858
[   29.461004]  kasan_atomics+0x198/0x2e0
[   29.461116]  kunit_try_run_case+0x170/0x3f0
[   29.461184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.461272]  kthread+0x328/0x630
[   29.461330]  ret_from_fork+0x10/0x20
[   29.461394] 
[   29.461419] Allocated by task 266:
[   29.461459]  kasan_save_stack+0x3c/0x68
[   29.461513]  kasan_save_track+0x20/0x40
[   29.461565]  kasan_save_alloc_info+0x40/0x58
[   29.461614]  __kasan_kmalloc+0xd4/0xd8
[   29.461663]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.461748]  kasan_atomics+0xb8/0x2e0
[   29.461800]  kunit_try_run_case+0x170/0x3f0
[   29.461851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.461909]  kthread+0x328/0x630
[   29.461953]  ret_from_fork+0x10/0x20
[   29.461999] 
[   29.462028] The buggy address belongs to the object at fff00000c7772d80
[   29.462028]  which belongs to the cache kmalloc-64 of size 64
[   29.462105] The buggy address is located 0 bytes to the right of
[   29.462105]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.462189] 
[   29.462217] The buggy address belongs to the physical page:
[   29.462257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.462320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.462383] page_type: f5(slab)
[   29.462431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.462493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.462545] page dumped because: kasan: bad access detected
[   29.462587] 
[   29.462610] Memory state around the buggy address:
[   29.462670]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462843]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462957] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.463048]                                      ^
[   29.463211]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463356]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463729] ==================================================================
[   29.486060] ==================================================================
[   29.486263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.486564] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.486713] 
[   29.486810] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.487414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.487499] Hardware name: linux,dummy-virt (DT)
[   29.487607] Call trace:
[   29.487672]  show_stack+0x20/0x38 (C)
[   29.487830]  dump_stack_lvl+0x8c/0xd0
[   29.487963]  print_report+0x118/0x608
[   29.489585]  kasan_report+0xdc/0x128
[   29.489937]  kasan_check_range+0x100/0x1a8
[   29.490448]  __kasan_check_write+0x20/0x30
[   29.490710]  kasan_atomics_helper+0x1414/0x4858
[   29.490864]  kasan_atomics+0x198/0x2e0
[   29.491021]  kunit_try_run_case+0x170/0x3f0
[   29.491377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.491519]  kthread+0x328/0x630
[   29.491650]  ret_from_fork+0x10/0x20
[   29.492610] 
[   29.492677] Allocated by task 266:
[   29.492850]  kasan_save_stack+0x3c/0x68
[   29.492958]  kasan_save_track+0x20/0x40
[   29.493298]  kasan_save_alloc_info+0x40/0x58
[   29.493611]  __kasan_kmalloc+0xd4/0xd8
[   29.493794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.493925]  kasan_atomics+0xb8/0x2e0
[   29.494394]  kunit_try_run_case+0x170/0x3f0
[   29.494543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.494936]  kthread+0x328/0x630
[   29.495070]  ret_from_fork+0x10/0x20
[   29.495414] 
[   29.495535] The buggy address belongs to the object at fff00000c7772d80
[   29.495535]  which belongs to the cache kmalloc-64 of size 64
[   29.495876] The buggy address is located 0 bytes to the right of
[   29.495876]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.496064] 
[   29.496177] The buggy address belongs to the physical page:
[   29.496322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.496582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.496840] page_type: f5(slab)
[   29.496943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.497758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.497870] page dumped because: kasan: bad access detected
[   29.498008] 
[   29.498169] Memory state around the buggy address:
[   29.498288]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.498398]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.498584] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.498818]                                      ^
[   29.498920]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499468]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499841] ==================================================================
[   29.564072] ==================================================================
[   29.564171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.564478] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.564849] 
[   29.565052] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.565588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.565662] Hardware name: linux,dummy-virt (DT)
[   29.565768] Call trace:
[   29.565894]  show_stack+0x20/0x38 (C)
[   29.566092]  dump_stack_lvl+0x8c/0xd0
[   29.566241]  print_report+0x118/0x608
[   29.566446]  kasan_report+0xdc/0x128
[   29.566581]  kasan_check_range+0x100/0x1a8
[   29.566936]  __kasan_check_write+0x20/0x30
[   29.567072]  kasan_atomics_helper+0x1644/0x4858
[   29.567294]  kasan_atomics+0x198/0x2e0
[   29.567445]  kunit_try_run_case+0x170/0x3f0
[   29.567695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.567954]  kthread+0x328/0x630
[   29.568220]  ret_from_fork+0x10/0x20
[   29.568417] 
[   29.568473] Allocated by task 266:
[   29.568594]  kasan_save_stack+0x3c/0x68
[   29.568720]  kasan_save_track+0x20/0x40
[   29.569012]  kasan_save_alloc_info+0x40/0x58
[   29.569301]  __kasan_kmalloc+0xd4/0xd8
[   29.569543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.570007]  kasan_atomics+0xb8/0x2e0
[   29.570143]  kunit_try_run_case+0x170/0x3f0
[   29.570260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.570325]  kthread+0x328/0x630
[   29.570369]  ret_from_fork+0x10/0x20
[   29.570515] 
[   29.570583] The buggy address belongs to the object at fff00000c7772d80
[   29.570583]  which belongs to the cache kmalloc-64 of size 64
[   29.570804] The buggy address is located 0 bytes to the right of
[   29.570804]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.571015] 
[   29.571177] The buggy address belongs to the physical page:
[   29.571362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.571490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.571761] page_type: f5(slab)
[   29.571993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.572161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.572287] page dumped because: kasan: bad access detected
[   29.572378] 
[   29.572425] Memory state around the buggy address:
[   29.572631]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.573161]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.573293] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.573407]                                      ^
[   29.573506]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.573632]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.573824] ==================================================================
[   29.130641] ==================================================================
[   29.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.130935] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.131540] 
[   29.131652] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.132527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.132604] Hardware name: linux,dummy-virt (DT)
[   29.132701] Call trace:
[   29.133184]  show_stack+0x20/0x38 (C)
[   29.133426]  dump_stack_lvl+0x8c/0xd0
[   29.134135]  print_report+0x118/0x608
[   29.134481]  kasan_report+0xdc/0x128
[   29.134631]  kasan_check_range+0x100/0x1a8
[   29.134795]  __kasan_check_write+0x20/0x30
[   29.135595]  kasan_atomics_helper+0x99c/0x4858
[   29.135891]  kasan_atomics+0x198/0x2e0
[   29.136077]  kunit_try_run_case+0x170/0x3f0
[   29.136596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.137002]  kthread+0x328/0x630
[   29.137130]  ret_from_fork+0x10/0x20
[   29.137259] 
[   29.137316] Allocated by task 266:
[   29.137409]  kasan_save_stack+0x3c/0x68
[   29.137534]  kasan_save_track+0x20/0x40
[   29.137828]  kasan_save_alloc_info+0x40/0x58
[   29.137932]  __kasan_kmalloc+0xd4/0xd8
[   29.138035]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.138136]  kasan_atomics+0xb8/0x2e0
[   29.138234]  kunit_try_run_case+0x170/0x3f0
[   29.138345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.139480]  kthread+0x328/0x630
[   29.139711]  ret_from_fork+0x10/0x20
[   29.139824] 
[   29.139938] The buggy address belongs to the object at fff00000c7772d80
[   29.139938]  which belongs to the cache kmalloc-64 of size 64
[   29.140196] The buggy address is located 0 bytes to the right of
[   29.140196]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.140990] 
[   29.141169] The buggy address belongs to the physical page:
[   29.141304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.141443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.141572] page_type: f5(slab)
[   29.141781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.142090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.142209] page dumped because: kasan: bad access detected
[   29.142302] 
[   29.142429] Memory state around the buggy address:
[   29.142523]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142770]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142901] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.143016]                                      ^
[   29.143319]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143440]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143553] ==================================================================
[   29.365196] ==================================================================
[   29.365425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.365556] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.365695] 
[   29.365768] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.365970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.366041] Hardware name: linux,dummy-virt (DT)
[   29.366118] Call trace:
[   29.366175]  show_stack+0x20/0x38 (C)
[   29.366291]  dump_stack_lvl+0x8c/0xd0
[   29.366413]  print_report+0x118/0x608
[   29.366526]  kasan_report+0xdc/0x128
[   29.367215]  kasan_check_range+0x100/0x1a8
[   29.368559]  __kasan_check_write+0x20/0x30
[   29.368721]  kasan_atomics_helper+0x1058/0x4858
[   29.368866]  kasan_atomics+0x198/0x2e0
[   29.368994]  kunit_try_run_case+0x170/0x3f0
[   29.369136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.369279]  kthread+0x328/0x630
[   29.369401]  ret_from_fork+0x10/0x20
[   29.369520] 
[   29.369568] Allocated by task 266:
[   29.369639]  kasan_save_stack+0x3c/0x68
[   29.369770]  kasan_save_track+0x20/0x40
[   29.369874]  kasan_save_alloc_info+0x40/0x58
[   29.369983]  __kasan_kmalloc+0xd4/0xd8
[   29.370092]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.370208]  kasan_atomics+0xb8/0x2e0
[   29.370306]  kunit_try_run_case+0x170/0x3f0
[   29.370416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.370526]  kthread+0x328/0x630
[   29.370613]  ret_from_fork+0x10/0x20
[   29.373340] 
[   29.373403] The buggy address belongs to the object at fff00000c7772d80
[   29.373403]  which belongs to the cache kmalloc-64 of size 64
[   29.374073] The buggy address is located 0 bytes to the right of
[   29.374073]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.374770] 
[   29.374836] The buggy address belongs to the physical page:
[   29.374921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.375057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.375187] page_type: f5(slab)
[   29.375286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.375412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.375517] page dumped because: kasan: bad access detected
[   29.375603] 
[   29.375655] Memory state around the buggy address:
[   29.375760]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375877]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375995] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.376094]                                      ^
[   29.376185]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376297]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376395] ==================================================================
[   29.390223] ==================================================================
[   29.390391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.390519] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.390662] 
[   29.390752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.390987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.391080] Hardware name: linux,dummy-virt (DT)
[   29.391434] Call trace:
[   29.391652]  show_stack+0x20/0x38 (C)
[   29.391903]  dump_stack_lvl+0x8c/0xd0
[   29.392137]  print_report+0x118/0x608
[   29.392312]  kasan_report+0xdc/0x128
[   29.392453]  kasan_check_range+0x100/0x1a8
[   29.392842]  __kasan_check_write+0x20/0x30
[   29.392919]  kasan_atomics_helper+0x1128/0x4858
[   29.392985]  kasan_atomics+0x198/0x2e0
[   29.393049]  kunit_try_run_case+0x170/0x3f0
[   29.393114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.393185]  kthread+0x328/0x630
[   29.393239]  ret_from_fork+0x10/0x20
[   29.393312] 
[   29.393337] Allocated by task 266:
[   29.393378]  kasan_save_stack+0x3c/0x68
[   29.393437]  kasan_save_track+0x20/0x40
[   29.393488]  kasan_save_alloc_info+0x40/0x58
[   29.393536]  __kasan_kmalloc+0xd4/0xd8
[   29.393586]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.393643]  kasan_atomics+0xb8/0x2e0
[   29.393729]  kunit_try_run_case+0x170/0x3f0
[   29.393836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.394012]  kthread+0x328/0x630
[   29.394322]  ret_from_fork+0x10/0x20
[   29.394803] 
[   29.394985] The buggy address belongs to the object at fff00000c7772d80
[   29.394985]  which belongs to the cache kmalloc-64 of size 64
[   29.395387] The buggy address is located 0 bytes to the right of
[   29.395387]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.395558] 
[   29.395651] The buggy address belongs to the physical page:
[   29.395761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.395906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.396291] page_type: f5(slab)
[   29.396434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.396697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.396804] page dumped because: kasan: bad access detected
[   29.396954] 
[   29.397070] Memory state around the buggy address:
[   29.397162]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.397289]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.397557] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.397817]                                      ^
[   29.398586]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.398803]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.398916] ==================================================================
[   29.145019] ==================================================================
[   29.145294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.145468] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.145621] 
[   29.145755] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.145973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.146066] Hardware name: linux,dummy-virt (DT)
[   29.146164] Call trace:
[   29.146230]  show_stack+0x20/0x38 (C)
[   29.146363]  dump_stack_lvl+0x8c/0xd0
[   29.146500]  print_report+0x118/0x608
[   29.146655]  kasan_report+0xdc/0x128
[   29.146835]  kasan_check_range+0x100/0x1a8
[   29.146974]  __kasan_check_write+0x20/0x30
[   29.147121]  kasan_atomics_helper+0xa04/0x4858
[   29.147324]  kasan_atomics+0x198/0x2e0
[   29.147487]  kunit_try_run_case+0x170/0x3f0
[   29.147702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.147928]  kthread+0x328/0x630
[   29.148119]  ret_from_fork+0x10/0x20
[   29.148341] 
[   29.148425] Allocated by task 266:
[   29.148531]  kasan_save_stack+0x3c/0x68
[   29.148644]  kasan_save_track+0x20/0x40
[   29.148769]  kasan_save_alloc_info+0x40/0x58
[   29.148865]  __kasan_kmalloc+0xd4/0xd8
[   29.148965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.149088]  kasan_atomics+0xb8/0x2e0
[   29.149189]  kunit_try_run_case+0x170/0x3f0
[   29.149302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.149418]  kthread+0x328/0x630
[   29.149518]  ret_from_fork+0x10/0x20
[   29.149634] 
[   29.149726] The buggy address belongs to the object at fff00000c7772d80
[   29.149726]  which belongs to the cache kmalloc-64 of size 64
[   29.149884] The buggy address is located 0 bytes to the right of
[   29.149884]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.150067] 
[   29.150152] The buggy address belongs to the physical page:
[   29.150268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.150417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.150594] page_type: f5(slab)
[   29.150764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.150839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.150890] page dumped because: kasan: bad access detected
[   29.150965] 
[   29.151083] Memory state around the buggy address:
[   29.151178]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.151290]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.151404] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.151507]                                      ^
[   29.151671]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.152013]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.152117] ==================================================================
[   28.933773] ==================================================================
[   28.935641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.937892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.938112]  show_stack+0x20/0x38 (C)
[   28.939601]  kasan_atomics_helper+0x32c/0x4858
[   28.940972]  kasan_save_stack+0x3c/0x68
[   28.941655]  kasan_atomics+0xb8/0x2e0
[   28.942394] 
[   28.942525] The buggy address is located 0 bytes to the right of
[   28.942525]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   28.943596] page dumped because: kasan: bad access detected
[   28.943708] 
[   28.943824] Memory state around the buggy address:
[   28.943971]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.944603]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.944723] ==================================================================
[   29.300325] ==================================================================
[   29.300437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.300555] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.300675] 
[   29.300766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.300967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.301037] Hardware name: linux,dummy-virt (DT)
[   29.301113] Call trace:
[   29.301166]  show_stack+0x20/0x38 (C)
[   29.301295]  dump_stack_lvl+0x8c/0xd0
[   29.301420]  print_report+0x118/0x608
[   29.301536]  kasan_report+0xdc/0x128
[   29.303038]  kasan_check_range+0x100/0x1a8
[   29.303957]  __kasan_check_write+0x20/0x30
[   29.304246]  kasan_atomics_helper+0xe44/0x4858
[   29.304529]  kasan_atomics+0x198/0x2e0
[   29.304664]  kunit_try_run_case+0x170/0x3f0
[   29.305660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305850]  kthread+0x328/0x630
[   29.305986]  ret_from_fork+0x10/0x20
[   29.306071] 
[   29.306099] Allocated by task 266:
[   29.306143]  kasan_save_stack+0x3c/0x68
[   29.306202]  kasan_save_track+0x20/0x40
[   29.306253]  kasan_save_alloc_info+0x40/0x58
[   29.306302]  __kasan_kmalloc+0xd4/0xd8
[   29.306351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.306408]  kasan_atomics+0xb8/0x2e0
[   29.306458]  kunit_try_run_case+0x170/0x3f0
[   29.306510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.306567]  kthread+0x328/0x630
[   29.306611]  ret_from_fork+0x10/0x20
[   29.306820] 
[   29.306882] The buggy address belongs to the object at fff00000c7772d80
[   29.306882]  which belongs to the cache kmalloc-64 of size 64
[   29.307033] The buggy address is located 0 bytes to the right of
[   29.307033]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.307192] 
[   29.307243] The buggy address belongs to the physical page:
[   29.307323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.307445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.307564] page_type: f5(slab)
[   29.307660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.307810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.307909] page dumped because: kasan: bad access detected
[   29.307986] 
[   29.308046] Memory state around the buggy address:
[   29.308128]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.308235]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.308343] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.308494]                                      ^
[   29.308591]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.308736]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.308848] ==================================================================
[   29.353748] ==================================================================
[   29.353867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.354006] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.354146] 
[   29.354423] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.354756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.355293] Hardware name: linux,dummy-virt (DT)
[   29.355749] Call trace:
[   29.356024]  show_stack+0x20/0x38 (C)
[   29.356284]  dump_stack_lvl+0x8c/0xd0
[   29.356420]  print_report+0x118/0x608
[   29.356844]  kasan_report+0xdc/0x128
[   29.357066]  kasan_check_range+0x100/0x1a8
[   29.357206]  __kasan_check_write+0x20/0x30
[   29.357350]  kasan_atomics_helper+0xff0/0x4858
[   29.357487]  kasan_atomics+0x198/0x2e0
[   29.357694]  kunit_try_run_case+0x170/0x3f0
[   29.358536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.358784]  kthread+0x328/0x630
[   29.358913]  ret_from_fork+0x10/0x20
[   29.359051] 
[   29.359271] Allocated by task 266:
[   29.359360]  kasan_save_stack+0x3c/0x68
[   29.359486]  kasan_save_track+0x20/0x40
[   29.359645]  kasan_save_alloc_info+0x40/0x58
[   29.359814]  __kasan_kmalloc+0xd4/0xd8
[   29.359935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.360061]  kasan_atomics+0xb8/0x2e0
[   29.360173]  kunit_try_run_case+0x170/0x3f0
[   29.360274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.360620]  kthread+0x328/0x630
[   29.360735]  ret_from_fork+0x10/0x20
[   29.360845] 
[   29.360957] The buggy address belongs to the object at fff00000c7772d80
[   29.360957]  which belongs to the cache kmalloc-64 of size 64
[   29.361128] The buggy address is located 0 bytes to the right of
[   29.361128]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.361393] 
[   29.361472] The buggy address belongs to the physical page:
[   29.361579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.361725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.361866] page_type: f5(slab)
[   29.361974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.362119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.362580] page dumped because: kasan: bad access detected
[   29.362727] 
[   29.362789] Memory state around the buggy address:
[   29.362868]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.362977]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363086] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.363180]                                      ^
[   29.363268]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.363383]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.363478] ==================================================================
[   29.595615] ==================================================================
[   29.595854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.595973] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.596099] 
[   29.596167] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.596363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.596433] Hardware name: linux,dummy-virt (DT)
[   29.596509] Call trace:
[   29.596568]  show_stack+0x20/0x38 (C)
[   29.596763]  dump_stack_lvl+0x8c/0xd0
[   29.597113]  print_report+0x118/0x608
[   29.597270]  kasan_report+0xdc/0x128
[   29.597408]  __asan_report_load8_noabort+0x20/0x30
[   29.597585]  kasan_atomics_helper+0x3e10/0x4858
[   29.597841]  kasan_atomics+0x198/0x2e0
[   29.598046]  kunit_try_run_case+0x170/0x3f0
[   29.598279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.598424]  kthread+0x328/0x630
[   29.598558]  ret_from_fork+0x10/0x20
[   29.599367] 
[   29.599452] Allocated by task 266:
[   29.599555]  kasan_save_stack+0x3c/0x68
[   29.599712]  kasan_save_track+0x20/0x40
[   29.599881]  kasan_save_alloc_info+0x40/0x58
[   29.599987]  __kasan_kmalloc+0xd4/0xd8
[   29.600127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.600236]  kasan_atomics+0xb8/0x2e0
[   29.600340]  kunit_try_run_case+0x170/0x3f0
[   29.600441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.600563]  kthread+0x328/0x630
[   29.600847]  ret_from_fork+0x10/0x20
[   29.600951] 
[   29.601004] The buggy address belongs to the object at fff00000c7772d80
[   29.601004]  which belongs to the cache kmalloc-64 of size 64
[   29.601333] The buggy address is located 0 bytes to the right of
[   29.601333]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.602008] 
[   29.602079] The buggy address belongs to the physical page:
[   29.602169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.602426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.602569] page_type: f5(slab)
[   29.602786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.603312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.603429] page dumped because: kasan: bad access detected
[   29.603527] 
[   29.603588] Memory state around the buggy address:
[   29.603677]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603809]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.604801]                                      ^
[   29.605071]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605375]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605507] ==================================================================
[   29.381004] ==================================================================
[   29.381314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.381460] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.381589] 
[   29.381666] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.381898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.381971] Hardware name: linux,dummy-virt (DT)
[   29.382049] Call trace:
[   29.382104]  show_stack+0x20/0x38 (C)
[   29.382223]  dump_stack_lvl+0x8c/0xd0
[   29.383856]  print_report+0x118/0x608
[   29.384135]  kasan_report+0xdc/0x128
[   29.384277]  kasan_check_range+0x100/0x1a8
[   29.384432]  __kasan_check_write+0x20/0x30
[   29.384722]  kasan_atomics_helper+0x10c0/0x4858
[   29.384866]  kasan_atomics+0x198/0x2e0
[   29.384988]  kunit_try_run_case+0x170/0x3f0
[   29.385165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.385556]  kthread+0x328/0x630
[   29.385718]  ret_from_fork+0x10/0x20
[   29.385867] 
[   29.385963] Allocated by task 266:
[   29.386098]  kasan_save_stack+0x3c/0x68
[   29.386208]  kasan_save_track+0x20/0x40
[   29.386308]  kasan_save_alloc_info+0x40/0x58
[   29.386409]  __kasan_kmalloc+0xd4/0xd8
[   29.386546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.386798]  kasan_atomics+0xb8/0x2e0
[   29.386961]  kunit_try_run_case+0x170/0x3f0
[   29.387575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.387970]  kthread+0x328/0x630
[   29.388095]  ret_from_fork+0x10/0x20
[   29.388301] 
[   29.388362] The buggy address belongs to the object at fff00000c7772d80
[   29.388362]  which belongs to the cache kmalloc-64 of size 64
[   29.388554] The buggy address is located 0 bytes to the right of
[   29.388554]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.388937] 
[   29.389038] The buggy address belongs to the physical page:
[   29.389087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.389157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.389221] page_type: f5(slab)
[   29.389288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.389353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.389403] page dumped because: kasan: bad access detected
[   29.389447] 
[   29.389471] Memory state around the buggy address:
[   29.389510]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.389567]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.389621] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.389668]                                      ^
[   29.389744]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389801]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389851] ==================================================================
[   29.399397] ==================================================================
[   29.399503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.399637] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.400175] 
[   29.400493] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.400721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.400795] Hardware name: linux,dummy-virt (DT)
[   29.400869] Call trace:
[   29.400926]  show_stack+0x20/0x38 (C)
[   29.401048]  dump_stack_lvl+0x8c/0xd0
[   29.401169]  print_report+0x118/0x608
[   29.402631]  kasan_report+0xdc/0x128
[   29.402992]  kasan_check_range+0x100/0x1a8
[   29.403117]  __kasan_check_write+0x20/0x30
[   29.403234]  kasan_atomics_helper+0x1190/0x4858
[   29.403359]  kasan_atomics+0x198/0x2e0
[   29.403474]  kunit_try_run_case+0x170/0x3f0
[   29.403603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.408939]  kthread+0x328/0x630
[   29.410739]  ret_from_fork+0x10/0x20
[   29.410937] 
[   29.410995] Allocated by task 266:
[   29.411153]  kasan_save_stack+0x3c/0x68
[   29.411274]  kasan_save_track+0x20/0x40
[   29.411429]  kasan_save_alloc_info+0x40/0x58
[   29.411555]  __kasan_kmalloc+0xd4/0xd8
[   29.411671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.411816]  kasan_atomics+0xb8/0x2e0
[   29.411958]  kunit_try_run_case+0x170/0x3f0
[   29.412207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.412408]  kthread+0x328/0x630
[   29.412746]  ret_from_fork+0x10/0x20
[   29.412969] 
[   29.413023] The buggy address belongs to the object at fff00000c7772d80
[   29.413023]  which belongs to the cache kmalloc-64 of size 64
[   29.413164] The buggy address is located 0 bytes to the right of
[   29.413164]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.413476] 
[   29.413540] The buggy address belongs to the physical page:
[   29.413654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.413806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.413929] page_type: f5(slab)
[   29.414025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.414176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.414284] page dumped because: kasan: bad access detected
[   29.414365] 
[   29.414413] Memory state around the buggy address:
[   29.414487]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414592]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.415457] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.415998]                                      ^
[   29.416916]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.417124]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.417444] ==================================================================
[   29.287729] ==================================================================
[   29.287848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.288051] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.288351] 
[   29.288465] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.288669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.288851] Hardware name: linux,dummy-virt (DT)
[   29.288951] Call trace:
[   29.289175]  show_stack+0x20/0x38 (C)
[   29.289565]  dump_stack_lvl+0x8c/0xd0
[   29.289733]  print_report+0x118/0x608
[   29.289932]  kasan_report+0xdc/0x128
[   29.290239]  __asan_report_load8_noabort+0x20/0x30
[   29.290929]  kasan_atomics_helper+0x3f58/0x4858
[   29.291116]  kasan_atomics+0x198/0x2e0
[   29.291388]  kunit_try_run_case+0x170/0x3f0
[   29.291533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.291716]  kthread+0x328/0x630
[   29.291841]  ret_from_fork+0x10/0x20
[   29.292010] 
[   29.292067] Allocated by task 266:
[   29.292170]  kasan_save_stack+0x3c/0x68
[   29.292321]  kasan_save_track+0x20/0x40
[   29.292453]  kasan_save_alloc_info+0x40/0x58
[   29.292765]  __kasan_kmalloc+0xd4/0xd8
[   29.292904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.293120]  kasan_atomics+0xb8/0x2e0
[   29.293217]  kunit_try_run_case+0x170/0x3f0
[   29.293441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.293557]  kthread+0x328/0x630
[   29.293654]  ret_from_fork+0x10/0x20
[   29.294483] 
[   29.294566] The buggy address belongs to the object at fff00000c7772d80
[   29.294566]  which belongs to the cache kmalloc-64 of size 64
[   29.294978] The buggy address is located 0 bytes to the right of
[   29.294978]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.295274] 
[   29.295445] The buggy address belongs to the physical page:
[   29.295576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.295766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.295899] page_type: f5(slab)
[   29.296207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.296403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.296605] page dumped because: kasan: bad access detected
[   29.296739] 
[   29.296795] Memory state around the buggy address:
[   29.296899]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297099]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297221] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.297609]                                      ^
[   29.298074]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.298339]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299083] ==================================================================
[   29.540920] ==================================================================
[   29.541064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.541203] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.541359] 
[   29.541677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.542126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.542325] Hardware name: linux,dummy-virt (DT)
[   29.542549] Call trace:
[   29.542743]  show_stack+0x20/0x38 (C)
[   29.543030]  dump_stack_lvl+0x8c/0xd0
[   29.543181]  print_report+0x118/0x608
[   29.543394]  kasan_report+0xdc/0x128
[   29.543663]  kasan_check_range+0x100/0x1a8
[   29.544145]  __kasan_check_write+0x20/0x30
[   29.544279]  kasan_atomics_helper+0x15b4/0x4858
[   29.544602]  kasan_atomics+0x198/0x2e0
[   29.544751]  kunit_try_run_case+0x170/0x3f0
[   29.545121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.545272]  kthread+0x328/0x630
[   29.545393]  ret_from_fork+0x10/0x20
[   29.545570] 
[   29.545623] Allocated by task 266:
[   29.545717]  kasan_save_stack+0x3c/0x68
[   29.545845]  kasan_save_track+0x20/0x40
[   29.545971]  kasan_save_alloc_info+0x40/0x58
[   29.546126]  __kasan_kmalloc+0xd4/0xd8
[   29.546277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.546430]  kasan_atomics+0xb8/0x2e0
[   29.546578]  kunit_try_run_case+0x170/0x3f0
[   29.546704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.546822]  kthread+0x328/0x630
[   29.547185]  ret_from_fork+0x10/0x20
[   29.548142] 
[   29.548231] The buggy address belongs to the object at fff00000c7772d80
[   29.548231]  which belongs to the cache kmalloc-64 of size 64
[   29.548395] The buggy address is located 0 bytes to the right of
[   29.548395]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.548563] 
[   29.548630] The buggy address belongs to the physical page:
[   29.548771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.549054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.549186] page_type: f5(slab)
[   29.549514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.549645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.549791] page dumped because: kasan: bad access detected
[   29.549875] 
[   29.549924] Memory state around the buggy address:
[   29.550000]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550118]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550744] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.551034]                                      ^
[   29.551312]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.551997]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.552139] ==================================================================
[   29.500496] ==================================================================
[   29.500740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.501013] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.501942] 
[   29.502059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.502266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.502340] Hardware name: linux,dummy-virt (DT)
[   29.502418] Call trace:
[   29.502477]  show_stack+0x20/0x38 (C)
[   29.503022]  dump_stack_lvl+0x8c/0xd0
[   29.503262]  print_report+0x118/0x608
[   29.503443]  kasan_report+0xdc/0x128
[   29.503677]  kasan_check_range+0x100/0x1a8
[   29.503981]  __kasan_check_write+0x20/0x30
[   29.504116]  kasan_atomics_helper+0x147c/0x4858
[   29.505180]  kasan_atomics+0x198/0x2e0
[   29.505384]  kunit_try_run_case+0x170/0x3f0
[   29.505717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.506401]  kthread+0x328/0x630
[   29.506555]  ret_from_fork+0x10/0x20
[   29.507143] 
[   29.507202] Allocated by task 266:
[   29.507288]  kasan_save_stack+0x3c/0x68
[   29.507869]  kasan_save_track+0x20/0x40
[   29.507984]  kasan_save_alloc_info+0x40/0x58
[   29.508095]  __kasan_kmalloc+0xd4/0xd8
[   29.508539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.508660]  kasan_atomics+0xb8/0x2e0
[   29.508798]  kunit_try_run_case+0x170/0x3f0
[   29.508917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.509035]  kthread+0x328/0x630
[   29.509126]  ret_from_fork+0x10/0x20
[   29.509219] 
[   29.509355] The buggy address belongs to the object at fff00000c7772d80
[   29.509355]  which belongs to the cache kmalloc-64 of size 64
[   29.509519] The buggy address is located 0 bytes to the right of
[   29.509519]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.509677] 
[   29.509762] The buggy address belongs to the physical page:
[   29.509962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.510091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.510213] page_type: f5(slab)
[   29.510312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.510434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.510589] page dumped because: kasan: bad access detected
[   29.510725] 
[   29.510789] Memory state around the buggy address:
[   29.510881]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.511007]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.511134] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.512005]                                      ^
[   29.512108]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.512430]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.512531] ==================================================================
[   29.465097] ==================================================================
[   29.465223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.465355] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.465475] 
[   29.465543] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.465758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.465830] Hardware name: linux,dummy-virt (DT)
[   29.465903] Call trace:
[   29.465961]  show_stack+0x20/0x38 (C)
[   29.466081]  dump_stack_lvl+0x8c/0xd0
[   29.466207]  print_report+0x118/0x608
[   29.466328]  kasan_report+0xdc/0x128
[   29.466448]  __asan_report_load8_noabort+0x20/0x30
[   29.466569]  kasan_atomics_helper+0x3f04/0x4858
[   29.468059]  kasan_atomics+0x198/0x2e0
[   29.468301]  kunit_try_run_case+0x170/0x3f0
[   29.469537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470522]  kthread+0x328/0x630
[   29.470693]  ret_from_fork+0x10/0x20
[   29.470837] 
[   29.470892] Allocated by task 266:
[   29.470970]  kasan_save_stack+0x3c/0x68
[   29.472016]  kasan_save_track+0x20/0x40
[   29.472185]  kasan_save_alloc_info+0x40/0x58
[   29.472396]  __kasan_kmalloc+0xd4/0xd8
[   29.472500]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.473371]  kasan_atomics+0xb8/0x2e0
[   29.473526]  kunit_try_run_case+0x170/0x3f0
[   29.473780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474011]  kthread+0x328/0x630
[   29.474107]  ret_from_fork+0x10/0x20
[   29.475108] 
[   29.475175] The buggy address belongs to the object at fff00000c7772d80
[   29.475175]  which belongs to the cache kmalloc-64 of size 64
[   29.475484] The buggy address is located 0 bytes to the right of
[   29.475484]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.475855] 
[   29.476488] The buggy address belongs to the physical page:
[   29.476717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.477347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.477761] page_type: f5(slab)
[   29.478326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.478552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.479225] page dumped because: kasan: bad access detected
[   29.479348] 
[   29.479402] Memory state around the buggy address:
[   29.480187]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.480709]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.481143] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.481268]                                      ^
[   29.481578]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482066]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482921] ==================================================================
[   29.153873] ==================================================================
[   29.154001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.154367] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.154642] 
[   29.155277] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.155497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.155574] Hardware name: linux,dummy-virt (DT)
[   29.155668] Call trace:
[   29.155755]  show_stack+0x20/0x38 (C)
[   29.155888]  dump_stack_lvl+0x8c/0xd0
[   29.156028]  print_report+0x118/0x608
[   29.156179]  kasan_report+0xdc/0x128
[   29.156740]  kasan_check_range+0x100/0x1a8
[   29.157223]  __kasan_check_write+0x20/0x30
[   29.157534]  kasan_atomics_helper+0xa6c/0x4858
[   29.157858]  kasan_atomics+0x198/0x2e0
[   29.158062]  kunit_try_run_case+0x170/0x3f0
[   29.158196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.158367]  kthread+0x328/0x630
[   29.158670]  ret_from_fork+0x10/0x20
[   29.158838] 
[   29.159131] Allocated by task 266:
[   29.159289]  kasan_save_stack+0x3c/0x68
[   29.159416]  kasan_save_track+0x20/0x40
[   29.159534]  kasan_save_alloc_info+0x40/0x58
[   29.159899]  __kasan_kmalloc+0xd4/0xd8
[   29.160099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.160224]  kasan_atomics+0xb8/0x2e0
[   29.160413]  kunit_try_run_case+0x170/0x3f0
[   29.160944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.161087]  kthread+0x328/0x630
[   29.161203]  ret_from_fork+0x10/0x20
[   29.161350] 
[   29.161489] The buggy address belongs to the object at fff00000c7772d80
[   29.161489]  which belongs to the cache kmalloc-64 of size 64
[   29.161639] The buggy address is located 0 bytes to the right of
[   29.161639]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.161810] 
[   29.161887] The buggy address belongs to the physical page:
[   29.162001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.162135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.162271] page_type: f5(slab)
[   29.162378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.162513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.162618] page dumped because: kasan: bad access detected
[   29.162728] 
[   29.162790] Memory state around the buggy address:
[   29.162881]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163005]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163595] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.163713]                                      ^
[   29.163856]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.164049]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.164192] ==================================================================
[   29.267135] ==================================================================
[   29.267244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.267362] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.267485] 
[   29.267559] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.267781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.267850] Hardware name: linux,dummy-virt (DT)
[   29.267928] Call trace:
[   29.267983]  show_stack+0x20/0x38 (C)
[   29.268109]  dump_stack_lvl+0x8c/0xd0
[   29.268228]  print_report+0x118/0x608
[   29.269025]  kasan_report+0xdc/0x128
[   29.269252]  __asan_report_load4_noabort+0x20/0x30
[   29.269417]  kasan_atomics_helper+0x3e04/0x4858
[   29.269570]  kasan_atomics+0x198/0x2e0
[   29.269715]  kunit_try_run_case+0x170/0x3f0
[   29.270039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270197]  kthread+0x328/0x630
[   29.271181]  ret_from_fork+0x10/0x20
[   29.271468] 
[   29.271528] Allocated by task 266:
[   29.271612]  kasan_save_stack+0x3c/0x68
[   29.271748]  kasan_save_track+0x20/0x40
[   29.271893]  kasan_save_alloc_info+0x40/0x58
[   29.272159]  __kasan_kmalloc+0xd4/0xd8
[   29.272274]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.272438]  kasan_atomics+0xb8/0x2e0
[   29.272541]  kunit_try_run_case+0x170/0x3f0
[   29.272651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.272917]  kthread+0x328/0x630
[   29.273011]  ret_from_fork+0x10/0x20
[   29.273252] 
[   29.273335] The buggy address belongs to the object at fff00000c7772d80
[   29.273335]  which belongs to the cache kmalloc-64 of size 64
[   29.273653] The buggy address is located 0 bytes to the right of
[   29.273653]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.274251] 
[   29.274334] The buggy address belongs to the physical page:
[   29.274457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.274608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.274817] page_type: f5(slab)
[   29.274937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.275068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.275172] page dumped because: kasan: bad access detected
[   29.275463] 
[   29.275653] Memory state around the buggy address:
[   29.275791]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.275907]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.276019] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.276120]                                      ^
[   29.276249]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276374]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276491] ==================================================================
[   29.317499] ==================================================================
[   29.317654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.317912] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.318089] 
[   29.318164] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.318376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.318449] Hardware name: linux,dummy-virt (DT)
[   29.318528] Call trace:
[   29.318583]  show_stack+0x20/0x38 (C)
[   29.318817]  dump_stack_lvl+0x8c/0xd0
[   29.318926]  print_report+0x118/0x608
[   29.318988]  kasan_report+0xdc/0x128
[   29.319884]  kasan_check_range+0x100/0x1a8
[   29.320253]  __kasan_check_write+0x20/0x30
[   29.320608]  kasan_atomics_helper+0xeb8/0x4858
[   29.320818]  kasan_atomics+0x198/0x2e0
[   29.321273]  kunit_try_run_case+0x170/0x3f0
[   29.321408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.321871]  kthread+0x328/0x630
[   29.322019]  ret_from_fork+0x10/0x20
[   29.322600] 
[   29.322703] Allocated by task 266:
[   29.322937]  kasan_save_stack+0x3c/0x68
[   29.323099]  kasan_save_track+0x20/0x40
[   29.323272]  kasan_save_alloc_info+0x40/0x58
[   29.323578]  __kasan_kmalloc+0xd4/0xd8
[   29.323766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.324042]  kasan_atomics+0xb8/0x2e0
[   29.324605]  kunit_try_run_case+0x170/0x3f0
[   29.324886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.325383]  kthread+0x328/0x630
[   29.325626]  ret_from_fork+0x10/0x20
[   29.325798] 
[   29.325904] The buggy address belongs to the object at fff00000c7772d80
[   29.325904]  which belongs to the cache kmalloc-64 of size 64
[   29.326076] The buggy address is located 0 bytes to the right of
[   29.326076]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.326778] 
[   29.326847] The buggy address belongs to the physical page:
[   29.326931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.327751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.327892] page_type: f5(slab)
[   29.328294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.328545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.328661] page dumped because: kasan: bad access detected
[   29.328771] 
[   29.329027] Memory state around the buggy address:
[   29.329110]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.329272]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.329530] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.329643]                                      ^
[   29.329787]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.329910]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330242] ==================================================================
[   29.418465] ==================================================================
[   29.418566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.418703] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.418830] 
[   29.418900] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.419100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.419169] Hardware name: linux,dummy-virt (DT)
[   29.419246] Call trace:
[   29.419301]  show_stack+0x20/0x38 (C)
[   29.419433]  dump_stack_lvl+0x8c/0xd0
[   29.419731]  print_report+0x118/0x608
[   29.419916]  kasan_report+0xdc/0x128
[   29.420720]  kasan_check_range+0x100/0x1a8
[   29.420878]  __kasan_check_write+0x20/0x30
[   29.421272]  kasan_atomics_helper+0x11f8/0x4858
[   29.421466]  kasan_atomics+0x198/0x2e0
[   29.421600]  kunit_try_run_case+0x170/0x3f0
[   29.421752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.421913]  kthread+0x328/0x630
[   29.422528]  ret_from_fork+0x10/0x20
[   29.422718] 
[   29.422803] Allocated by task 266:
[   29.423018]  kasan_save_stack+0x3c/0x68
[   29.423126]  kasan_save_track+0x20/0x40
[   29.423235]  kasan_save_alloc_info+0x40/0x58
[   29.423392]  __kasan_kmalloc+0xd4/0xd8
[   29.423757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.423895]  kasan_atomics+0xb8/0x2e0
[   29.424015]  kunit_try_run_case+0x170/0x3f0
[   29.424141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.424269]  kthread+0x328/0x630
[   29.425172]  ret_from_fork+0x10/0x20
[   29.425333] 
[   29.425388] The buggy address belongs to the object at fff00000c7772d80
[   29.425388]  which belongs to the cache kmalloc-64 of size 64
[   29.425741] The buggy address is located 0 bytes to the right of
[   29.425741]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.426548] 
[   29.426962] The buggy address belongs to the physical page:
[   29.427133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.427427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.427792] page_type: f5(slab)
[   29.427898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.428027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.428131] page dumped because: kasan: bad access detected
[   29.428213] 
[   29.428260] Memory state around the buggy address:
[   29.428336]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.428464]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.428888] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.429011]                                      ^
[   29.429508]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.429778]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.429938] ==================================================================
[   29.585005] ==================================================================
[   29.586198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.586554] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.586873] 
[   29.586971] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.587200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.587283] Hardware name: linux,dummy-virt (DT)
[   29.587370] Call trace:
[   29.587430]  show_stack+0x20/0x38 (C)
[   29.587579]  dump_stack_lvl+0x8c/0xd0
[   29.587742]  print_report+0x118/0x608
[   29.587887]  kasan_report+0xdc/0x128
[   29.588012]  kasan_check_range+0x100/0x1a8
[   29.588131]  __kasan_check_write+0x20/0x30
[   29.588283]  kasan_atomics_helper+0x16d0/0x4858
[   29.588634]  kasan_atomics+0x198/0x2e0
[   29.588777]  kunit_try_run_case+0x170/0x3f0
[   29.588942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.589206]  kthread+0x328/0x630
[   29.589343]  ret_from_fork+0x10/0x20
[   29.589463] 
[   29.589515] Allocated by task 266:
[   29.589590]  kasan_save_stack+0x3c/0x68
[   29.589713]  kasan_save_track+0x20/0x40
[   29.589827]  kasan_save_alloc_info+0x40/0x58
[   29.589948]  __kasan_kmalloc+0xd4/0xd8
[   29.590152]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.590409]  kasan_atomics+0xb8/0x2e0
[   29.590529]  kunit_try_run_case+0x170/0x3f0
[   29.590707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.590923]  kthread+0x328/0x630
[   29.591025]  ret_from_fork+0x10/0x20
[   29.591150] 
[   29.591249] The buggy address belongs to the object at fff00000c7772d80
[   29.591249]  which belongs to the cache kmalloc-64 of size 64
[   29.591397] The buggy address is located 0 bytes to the right of
[   29.591397]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.591559] 
[   29.591619] The buggy address belongs to the physical page:
[   29.591771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.592032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.592168] page_type: f5(slab)
[   29.592265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.592432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.592638] page dumped because: kasan: bad access detected
[   29.592784] 
[   29.592841] Memory state around the buggy address:
[   29.592929]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593034]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593155] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.593288]                                      ^
[   29.593727]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593897]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594006] ==================================================================
[   29.513186] ==================================================================
[   29.513429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.514097] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.514223] 
[   29.514306] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.514794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.514885] Hardware name: linux,dummy-virt (DT)
[   29.514968] Call trace:
[   29.515250]  show_stack+0x20/0x38 (C)
[   29.515605]  dump_stack_lvl+0x8c/0xd0
[   29.515767]  print_report+0x118/0x608
[   29.516114]  kasan_report+0xdc/0x128
[   29.516297]  kasan_check_range+0x100/0x1a8
[   29.516612]  __kasan_check_write+0x20/0x30
[   29.517096]  kasan_atomics_helper+0x14e4/0x4858
[   29.517261]  kasan_atomics+0x198/0x2e0
[   29.517404]  kunit_try_run_case+0x170/0x3f0
[   29.518725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.518981]  kthread+0x328/0x630
[   29.519117]  ret_from_fork+0x10/0x20
[   29.519344] 
[   29.519402] Allocated by task 266:
[   29.519577]  kasan_save_stack+0x3c/0x68
[   29.519776]  kasan_save_track+0x20/0x40
[   29.519891]  kasan_save_alloc_info+0x40/0x58
[   29.520050]  __kasan_kmalloc+0xd4/0xd8
[   29.520283]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.520418]  kasan_atomics+0xb8/0x2e0
[   29.520615]  kunit_try_run_case+0x170/0x3f0
[   29.520813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.520941]  kthread+0x328/0x630
[   29.521295]  ret_from_fork+0x10/0x20
[   29.521451] 
[   29.521509] The buggy address belongs to the object at fff00000c7772d80
[   29.521509]  which belongs to the cache kmalloc-64 of size 64
[   29.521651] The buggy address is located 0 bytes to the right of
[   29.521651]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.521846] 
[   29.522175] The buggy address belongs to the physical page:
[   29.522294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.522435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.522563] page_type: f5(slab)
[   29.522664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.522812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.522941] page dumped because: kasan: bad access detected
[   29.523037] 
[   29.523095] Memory state around the buggy address:
[   29.523388]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523667]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523805] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.523900]                                      ^
[   29.524356]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524924]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.525038] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   28.535443] ==================================================================
[   28.535546] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   28.535664] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260
[   28.535805] 
[   28.535877] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.536074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.536142] Hardware name: linux,dummy-virt (DT)
[   28.536217] Call trace:
[   28.536279]  show_stack+0x20/0x38 (C)
[   28.536397]  dump_stack_lvl+0x8c/0xd0
[   28.536515]  print_report+0x118/0x608
[   28.536630]  kasan_report+0xdc/0x128
[   28.537876]  __asan_report_load1_noabort+0x20/0x30
[   28.538033]  strnlen+0x80/0x88
[   28.538165]  kasan_strings+0x478/0xb00
[   28.538345]  kunit_try_run_case+0x170/0x3f0
[   28.538746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.538939]  kthread+0x328/0x630
[   28.539060]  ret_from_fork+0x10/0x20
[   28.539207] 
[   28.539336] Allocated by task 260:
[   28.539416]  kasan_save_stack+0x3c/0x68
[   28.539544]  kasan_save_track+0x20/0x40
[   28.539888]  kasan_save_alloc_info+0x40/0x58
[   28.540095]  __kasan_kmalloc+0xd4/0xd8
[   28.540197]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.540366]  kasan_strings+0xc8/0xb00
[   28.540488]  kunit_try_run_case+0x170/0x3f0
[   28.540596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.540725]  kthread+0x328/0x630
[   28.542438]  ret_from_fork+0x10/0x20
[   28.542583] 
[   28.542733] Freed by task 260:
[   28.542839]  kasan_save_stack+0x3c/0x68
[   28.542949]  kasan_save_track+0x20/0x40
[   28.543058]  kasan_save_free_info+0x4c/0x78
[   28.544611]  __kasan_slab_free+0x6c/0x98
[   28.544794]  kfree+0x214/0x3c8
[   28.544950]  kasan_strings+0x24c/0xb00
[   28.545199]  kunit_try_run_case+0x170/0x3f0
[   28.545329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.545448]  kthread+0x328/0x630
[   28.545540]  ret_from_fork+0x10/0x20
[   28.545636] 
[   28.546015] The buggy address belongs to the object at fff00000c7895c40
[   28.546015]  which belongs to the cache kmalloc-32 of size 32
[   28.547704] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.549079]  fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.574366]  dump_stack_lvl+0x8c/0xd0
[   28.575544]  kthread+0x328/0x630
[   28.580123]  kunit_try_run_case+0x170/0x3f0
[   28.581628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.585841]  fff00000c61bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.590218]  kasan_report+0xdc/0x128
[   28.591740]  kasan_bitops_generic+0x110/0x1c8
[   28.592830] 
[   28.593384]  __kasan_kmalloc+0xd4/0xd8
[   28.594822] 
[   28.596908]  fff00000c61bf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.603850] Call trace:
[   28.605474]  kasan_check_range+0x100/0x1a8
[   28.606493]  kasan_bitops_generic+0x110/0x1c8
[   28.606714]  kunit_try_run_case+0x170/0x3f0
[   28.607301]  kthread+0x328/0x630
[   28.608271] 
[   28.608588]  kasan_save_stack+0x3c/0x68
[   28.610864] 
[   28.611699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bf
[   28.613960]                       ^
[   28.617751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.619419]  __asan_report_load8_noabort+0x20/0x30
[   28.625720]  __kasan_kmalloc+0xd4/0xd8
[   28.627646] 
[   28.629075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.639342]  kasan_report+0xdc/0x128
[   28.642895]  kthread+0x328/0x630
[   28.645812] The buggy address is located 8 bytes inside of
[   28.645812]  allocated 9-byte region [fff00000c61bf780, fff00000c61bf789)
[   28.651588] 
[   28.655183]  kasan_check_range+0x100/0x1a8
[   28.655622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.657469] 
[   28.659938] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   28.523631] ==================================================================
[   28.523760] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   28.523876] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260
[   28.523999] 
[   28.524070] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.524279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.524364] Hardware name: linux,dummy-virt (DT)
[   28.524490] Call trace:
[   28.524658]  show_stack+0x20/0x38 (C)
[   28.525052]  dump_stack_lvl+0x8c/0xd0
[   28.525182]  print_report+0x118/0x608
[   28.525315]  kasan_report+0xdc/0x128
[   28.525439]  __asan_report_load1_noabort+0x20/0x30
[   28.525568]  strlen+0xa8/0xb0
[   28.525712]  kasan_strings+0x418/0xb00
[   28.526062]  kunit_try_run_case+0x170/0x3f0
[   28.526193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.526329]  kthread+0x328/0x630
[   28.526442]  ret_from_fork+0x10/0x20
[   28.526571] 
[   28.526618] Allocated by task 260:
[   28.526747]  kasan_save_stack+0x3c/0x68
[   28.526932]  kasan_save_track+0x20/0x40
[   28.527074]  kasan_save_alloc_info+0x40/0x58
[   28.527246]  __kasan_kmalloc+0xd4/0xd8
[   28.527359]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.527498]  kasan_strings+0xc8/0xb00
[   28.527639]  kunit_try_run_case+0x170/0x3f0
[   28.527876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.528036]  kthread+0x328/0x630
[   28.528155]  ret_from_fork+0x10/0x20
[   28.528281] 
[   28.528342] Freed by task 260:
[   28.528419]  kasan_save_stack+0x3c/0x68
[   28.528538]  kasan_save_track+0x20/0x40
[   28.528754]  kasan_save_free_info+0x4c/0x78
[   28.528871]  __kasan_slab_free+0x6c/0x98
[   28.529016]  kfree+0x214/0x3c8
[   28.529116]  kasan_strings+0x24c/0xb00
[   28.529212]  kunit_try_run_case+0x170/0x3f0
[   28.529348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.529561]  kthread+0x328/0x630
[   28.529863]  ret_from_fork+0x10/0x20
[   28.530039] 
[   28.530127] The buggy address belongs to the object at fff00000c7895c40
[   28.530127]  which belongs to the cache kmalloc-32 of size 32
[   28.530270] The buggy address is located 16 bytes inside of
[   28.530270]  freed 32-byte region [fff00000c7895c40, fff00000c7895c60)
[   28.530425] 
[   28.530489] The buggy address belongs to the physical page:
[   28.530740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   28.531469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.531762] page_type: f5(slab)
[   28.532055] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.532188] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.532292] page dumped because: kasan: bad access detected
[   28.532381] 
[   28.532442] Memory state around the buggy address:
[   28.532522]  fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.532636]  fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   28.532817] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.533015]                                                  ^
[   28.533258]  fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.533418]  fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.533973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   28.512621] ==================================================================
[   28.512803] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   28.513013] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260
[   28.513226] 
[   28.513331] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.513554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.513627] Hardware name: linux,dummy-virt (DT)
[   28.514148] Call trace:
[   28.514235]  show_stack+0x20/0x38 (C)
[   28.514387]  dump_stack_lvl+0x8c/0xd0
[   28.514576]  print_report+0x118/0x608
[   28.514775]  kasan_report+0xdc/0x128
[   28.514842]  __asan_report_load1_noabort+0x20/0x30
[   28.514917]  kasan_strings+0x95c/0xb00
[   28.515173]  kunit_try_run_case+0x170/0x3f0
[   28.515307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.515444]  kthread+0x328/0x630
[   28.515550]  ret_from_fork+0x10/0x20
[   28.515677] 
[   28.515748] Allocated by task 260:
[   28.515893]  kasan_save_stack+0x3c/0x68
[   28.516173]  kasan_save_track+0x20/0x40
[   28.516326]  kasan_save_alloc_info+0x40/0x58
[   28.516456]  __kasan_kmalloc+0xd4/0xd8
[   28.516560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.516668]  kasan_strings+0xc8/0xb00
[   28.516798]  kunit_try_run_case+0x170/0x3f0
[   28.516923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.517053]  kthread+0x328/0x630
[   28.517147]  ret_from_fork+0x10/0x20
[   28.517255] 
[   28.517371] Freed by task 260:
[   28.517478]  kasan_save_stack+0x3c/0x68
[   28.517601]  kasan_save_track+0x20/0x40
[   28.517734]  kasan_save_free_info+0x4c/0x78
[   28.518027]  __kasan_slab_free+0x6c/0x98
[   28.518139]  kfree+0x214/0x3c8
[   28.518237]  kasan_strings+0x24c/0xb00
[   28.518353]  kunit_try_run_case+0x170/0x3f0
[   28.518532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.518711]  kthread+0x328/0x630
[   28.518840]  ret_from_fork+0x10/0x20
[   28.519211] 
[   28.519317] The buggy address belongs to the object at fff00000c7895c40
[   28.519317]  which belongs to the cache kmalloc-32 of size 32
[   28.519462] The buggy address is located 16 bytes inside of
[   28.519462]  freed 32-byte region [fff00000c7895c40, fff00000c7895c60)
[   28.519616] 
[   28.519677] The buggy address belongs to the physical page:
[   28.519794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   28.519995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.520218] page_type: f5(slab)
[   28.520409] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.520671] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.520820] page dumped because: kasan: bad access detected
[   28.520962] 
[   28.521012] Memory state around the buggy address:
[   28.521090]  fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.521284]  fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   28.521591] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.521951]                                                  ^
[   28.522366]  fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.522533]  fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.522696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   28.490495] ==================================================================
[   28.490735] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   28.490972] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260
[   28.491283] 
[   28.491374] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.491774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.491865] Hardware name: linux,dummy-virt (DT)
[   28.492450] Call trace:
[   28.492567]  show_stack+0x20/0x38 (C)
[   28.493051]  dump_stack_lvl+0x8c/0xd0
[   28.494069]  print_report+0x118/0x608
[   28.494745]  kasan_report+0xdc/0x128
[   28.495632]  __asan_report_load1_noabort+0x20/0x30
[   28.495813]  strcmp+0xc0/0xc8
[   28.496237]  kasan_strings+0x340/0xb00
[   28.496546]  kunit_try_run_case+0x170/0x3f0
[   28.497218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.497411]  kthread+0x328/0x630
[   28.498130]  ret_from_fork+0x10/0x20
[   28.498503] 
[   28.498608] Allocated by task 260:
[   28.499004]  kasan_save_stack+0x3c/0x68
[   28.499236]  kasan_save_track+0x20/0x40
[   28.499424]  kasan_save_alloc_info+0x40/0x58
[   28.500149]  __kasan_kmalloc+0xd4/0xd8
[   28.500256]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.500365]  kasan_strings+0xc8/0xb00
[   28.500460]  kunit_try_run_case+0x170/0x3f0
[   28.500809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.501770]  kthread+0x328/0x630
[   28.502732]  ret_from_fork+0x10/0x20
[   28.503841] 
[   28.503874] Freed by task 260:
[   28.503955]  kasan_save_stack+0x3c/0x68
[   28.504066]  kasan_save_track+0x20/0x40
[   28.504171]  kasan_save_free_info+0x4c/0x78
[   28.504270]  __kasan_slab_free+0x6c/0x98
[   28.504366]  kfree+0x214/0x3c8
[   28.504460]  kasan_strings+0x24c/0xb00
[   28.504766]  kunit_try_run_case+0x170/0x3f0
[   28.505266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.505470]  kthread+0x328/0x630
[   28.505604]  ret_from_fork+0x10/0x20
[   28.506109] 
[   28.506218] The buggy address belongs to the object at fff00000c7895c40
[   28.506218]  which belongs to the cache kmalloc-32 of size 32
[   28.506485] The buggy address is located 16 bytes inside of
[   28.506485]  freed 32-byte region [fff00000c7895c40, fff00000c7895c60)
[   28.507115] 
[   28.507185] The buggy address belongs to the physical page:
[   28.507356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   28.507563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.507758] page_type: f5(slab)
[   28.507876] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.508375] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.508559] page dumped because: kasan: bad access detected
[   28.508765] 
[   28.508931] Memory state around the buggy address:
[   28.509133]  fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.509339]  fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   28.509857] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.510025]                                                  ^
[   28.510249]  fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.510493]  fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.510793] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   28.452138] ==================================================================
[   28.452310] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   28.452879] Read of size 1 at addr fff00000c7895a98 by task kunit_try_catch/258
[   28.453072] 
[   28.453281] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.453492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.453565] Hardware name: linux,dummy-virt (DT)
[   28.453650] Call trace:
[   28.453748]  show_stack+0x20/0x38 (C)
[   28.454512]  dump_stack_lvl+0x8c/0xd0
[   28.454779]  print_report+0x118/0x608
[   28.455060]  kasan_report+0xdc/0x128
[   28.455539]  __asan_report_load1_noabort+0x20/0x30
[   28.455766]  memcmp+0x198/0x1d8
[   28.455946]  kasan_memcmp+0x16c/0x300
[   28.456104]  kunit_try_run_case+0x170/0x3f0
[   28.456265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.456407]  kthread+0x328/0x630
[   28.456570]  ret_from_fork+0x10/0x20
[   28.456746] 
[   28.457074] Allocated by task 258:
[   28.457414]  kasan_save_stack+0x3c/0x68
[   28.457552]  kasan_save_track+0x20/0x40
[   28.457754]  kasan_save_alloc_info+0x40/0x58
[   28.457870]  __kasan_kmalloc+0xd4/0xd8
[   28.457976]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.458469]  kasan_memcmp+0xbc/0x300
[   28.458566]  kunit_try_run_case+0x170/0x3f0
[   28.458930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.459071]  kthread+0x328/0x630
[   28.459376]  ret_from_fork+0x10/0x20
[   28.459491] 
[   28.459551] The buggy address belongs to the object at fff00000c7895a80
[   28.459551]  which belongs to the cache kmalloc-32 of size 32
[   28.460261] The buggy address is located 0 bytes to the right of
[   28.460261]  allocated 24-byte region [fff00000c7895a80, fff00000c7895a98)
[   28.460528] 
[   28.460595] The buggy address belongs to the physical page:
[   28.460774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   28.460996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.461161] page_type: f5(slab)
[   28.461369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.461645] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.461772] page dumped because: kasan: bad access detected
[   28.461869] 
[   28.462317] Memory state around the buggy address:
[   28.462409]  fff00000c7895980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   28.462535]  fff00000c7895a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.462782] >fff00000c7895a80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.462887]                             ^
[   28.462977]  fff00000c7895b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.463136]  fff00000c7895b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.463458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   28.388459] ==================================================================
[   28.388538] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   28.388618] Read of size 1 at addr ffff800080a57b4a by task kunit_try_catch/254
[   28.388706] 
[   28.388802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.389064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.389458] Hardware name: linux,dummy-virt (DT)
[   28.389542] Call trace:
[   28.389609]  show_stack+0x20/0x38 (C)
[   28.390196]  dump_stack_lvl+0x8c/0xd0
[   28.390346]  print_report+0x310/0x608
[   28.390603]  kasan_report+0xdc/0x128
[   28.391246]  __asan_report_load1_noabort+0x20/0x30
[   28.391457]  kasan_alloca_oob_right+0x2dc/0x340
[   28.392032]  kunit_try_run_case+0x170/0x3f0
[   28.392721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.393489]  kthread+0x328/0x630
[   28.393640]  ret_from_fork+0x10/0x20
[   28.393836] 
[   28.393896] The buggy address belongs to stack of task kunit_try_catch/254
[   28.394105] 
[   28.394264] The buggy address belongs to the virtual mapping at
[   28.394264]  [ffff800080a50000, ffff800080a59000) created by:
[   28.394264]  kernel_clone+0x150/0x7a8
[   28.394669] 
[   28.394886] The buggy address belongs to the physical page:
[   28.395041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760
[   28.395304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.395874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.397621] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.398750] page dumped because: kasan: bad access detected
[   28.398842] 
[   28.398908] Memory state around the buggy address:
[   28.398999]  ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.399113]  ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.399225] >ffff800080a57b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   28.399329]                                               ^
[   28.399533]  ffff800080a57b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.399640]  ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.399815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   28.358500] ==================================================================
[   28.358673] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   28.359647] Read of size 1 at addr ffff800080a57b5f by task kunit_try_catch/252
[   28.359973] 
[   28.360073] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.360283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.360354] Hardware name: linux,dummy-virt (DT)
[   28.360439] Call trace:
[   28.360552]  show_stack+0x20/0x38 (C)
[   28.360948]  dump_stack_lvl+0x8c/0xd0
[   28.361133]  print_report+0x310/0x608
[   28.361283]  kasan_report+0xdc/0x128
[   28.361407]  __asan_report_load1_noabort+0x20/0x30
[   28.361535]  kasan_alloca_oob_left+0x2b8/0x310
[   28.361661]  kunit_try_run_case+0x170/0x3f0
[   28.361808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.361944]  kthread+0x328/0x630
[   28.362065]  ret_from_fork+0x10/0x20
[   28.362190] 
[   28.362266] The buggy address belongs to stack of task kunit_try_catch/252
[   28.362776] 
[   28.362856] The buggy address belongs to the virtual mapping at
[   28.362856]  [ffff800080a50000, ffff800080a59000) created by:
[   28.362856]  kernel_clone+0x150/0x7a8
[   28.363212] 
[   28.363303] The buggy address belongs to the physical page:
[   28.363470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760
[   28.363661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.363849] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.363982] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.364137] page dumped because: kasan: bad access detected
[   28.364446] 
[   28.364510] Memory state around the buggy address:
[   28.364840]  ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.364966]  ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.365556] >ffff800080a57b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   28.365662]                                                     ^
[   28.365840]  ffff800080a57b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.365984]  ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.366090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   28.328618] ==================================================================
[   28.328824] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   28.328983] Read of size 1 at addr ffff800080a57c2a by task kunit_try_catch/250
[   28.329102] 
[   28.329190] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.329408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.329473] Hardware name: linux,dummy-virt (DT)
[   28.329547] Call trace:
[   28.329600]  show_stack+0x20/0x38 (C)
[   28.330752]  dump_stack_lvl+0x8c/0xd0
[   28.330999]  print_report+0x310/0x608
[   28.331081]  kasan_report+0xdc/0x128
[   28.331245]  __asan_report_load1_noabort+0x20/0x30
[   28.331400]  kasan_stack_oob+0x238/0x270
[   28.331522]  kunit_try_run_case+0x170/0x3f0
[   28.331656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.332509]  kthread+0x328/0x630
[   28.332696]  ret_from_fork+0x10/0x20
[   28.333753] 
[   28.334408] The buggy address belongs to stack of task kunit_try_catch/250
[   28.334827]  and is located at offset 138 in frame:
[   28.335245]  kasan_stack_oob+0x0/0x270
[   28.336145] 
[   28.336252] This frame has 4 objects:
[   28.336456]  [48, 49) '__assertion'
[   28.337413]  [64, 72) 'array'
[   28.337722]  [96, 112) '__assertion'
[   28.338220]  [128, 138) 'stack_array'
[   28.338466] 
[   28.338862] The buggy address belongs to the virtual mapping at
[   28.338862]  [ffff800080a50000, ffff800080a59000) created by:
[   28.338862]  kernel_clone+0x150/0x7a8
[   28.339213] 
[   28.339284] The buggy address belongs to the physical page:
[   28.339368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760
[   28.339575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.339786] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.339951] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.340143] page dumped because: kasan: bad access detected
[   28.340299] 
[   28.340353] Memory state around the buggy address:
[   28.340429]  ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.340583]  ffff800080a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   28.340707] >ffff800080a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   28.340971]                                   ^
[   28.341200]  ffff800080a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   28.341511]  ffff800080a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.342127] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   28.257127] ==================================================================
[   28.257303] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   28.257449] Read of size 1 at addr ffffa1cc1efb258d by task kunit_try_catch/246
[   28.257569] 
[   28.257674] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.258218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.258306] Hardware name: linux,dummy-virt (DT)
[   28.258397] Call trace:
[   28.258466]  show_stack+0x20/0x38 (C)
[   28.258618]  dump_stack_lvl+0x8c/0xd0
[   28.258838]  print_report+0x310/0x608
[   28.258975]  kasan_report+0xdc/0x128
[   28.259174]  __asan_report_load1_noabort+0x20/0x30
[   28.259345]  kasan_global_oob_right+0x230/0x270
[   28.259596]  kunit_try_run_case+0x170/0x3f0
[   28.259787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.260020]  kthread+0x328/0x630
[   28.260212]  ret_from_fork+0x10/0x20
[   28.260363] 
[   28.260530] The buggy address belongs to the variable:
[   28.260650]  global_array+0xd/0x40
[   28.260810] 
[   28.261009] The buggy address belongs to the virtual mapping at
[   28.261009]  [ffffa1cc1d150000, ffffa1cc1f071000) created by:
[   28.261009]  paging_init+0x66c/0x7d0
[   28.261345] 
[   28.261474] The buggy address belongs to the physical page:
[   28.261564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db2
[   28.261721] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   28.261924] raw: 03fffe0000002000 ffffc1ffc01f6c88 ffffc1ffc01f6c88 0000000000000000
[   28.262131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.262245] page dumped because: kasan: bad access detected
[   28.262415] 
[   28.262495] Memory state around the buggy address:
[   28.262655]  ffffa1cc1efb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.262848]  ffffa1cc1efb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   28.262966] >ffffa1cc1efb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   28.263124]                       ^
[   28.263252]  ffffa1cc1efb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   28.263389]  ffffa1cc1efb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.263520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   28.192382] ==================================================================
[   28.192535] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.193825] Free of addr fff00000c56e8a01 by task kunit_try_catch/242
[   28.194087] 
[   28.194211] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.195401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.195479] Hardware name: linux,dummy-virt (DT)
[   28.195554] Call trace:
[   28.196700]  show_stack+0x20/0x38 (C)
[   28.197175]  dump_stack_lvl+0x8c/0xd0
[   28.197658]  print_report+0x118/0x608
[   28.198369]  kasan_report_invalid_free+0xc0/0xe8
[   28.198767]  check_slab_allocation+0xfc/0x108
[   28.199218]  __kasan_mempool_poison_object+0x78/0x150
[   28.199362]  mempool_free+0x28c/0x328
[   28.199477]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.199921]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.200217]  kunit_try_run_case+0x170/0x3f0
[   28.200453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.200949]  kthread+0x328/0x630
[   28.201064]  ret_from_fork+0x10/0x20
[   28.201196] 
[   28.201252] Allocated by task 242:
[   28.201330]  kasan_save_stack+0x3c/0x68
[   28.201898]  kasan_save_track+0x20/0x40
[   28.202418]  kasan_save_alloc_info+0x40/0x58
[   28.202827]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.203333]  remove_element+0x130/0x1f8
[   28.203967]  mempool_alloc_preallocated+0x58/0xc0
[   28.204323]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   28.204431]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.204533]  kunit_try_run_case+0x170/0x3f0
[   28.205216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.205770]  kthread+0x328/0x630
[   28.205942]  ret_from_fork+0x10/0x20
[   28.206042] 
[   28.206103] The buggy address belongs to the object at fff00000c56e8a00
[   28.206103]  which belongs to the cache kmalloc-128 of size 128
[   28.206429] The buggy address is located 1 bytes inside of
[   28.206429]  128-byte region [fff00000c56e8a00, fff00000c56e8a80)
[   28.206573] 
[   28.206664] The buggy address belongs to the physical page:
[   28.206909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   28.207181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.207457] page_type: f5(slab)
[   28.207558] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.207698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.207810] page dumped because: kasan: bad access detected
[   28.207968] 
[   28.208025] Memory state around the buggy address:
[   28.208164]  fff00000c56e8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.208310]  fff00000c56e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.208427] >fff00000c56e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.208529]                    ^
[   28.208606]  fff00000c56e8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.208763]  fff00000c56e8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.208869] ==================================================================
[   28.232214] ==================================================================
[   28.232363] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.232512] Free of addr fff00000c78d8001 by task kunit_try_catch/244
[   28.232621] 
[   28.232841] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.233083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.233159] Hardware name: linux,dummy-virt (DT)
[   28.233900] Call trace:
[   28.234005]  show_stack+0x20/0x38 (C)
[   28.234142]  dump_stack_lvl+0x8c/0xd0
[   28.234409]  print_report+0x118/0x608
[   28.234701]  kasan_report_invalid_free+0xc0/0xe8
[   28.235019]  __kasan_mempool_poison_object+0xfc/0x150
[   28.235157]  mempool_free+0x28c/0x328
[   28.235270]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.235446]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   28.235761]  kunit_try_run_case+0x170/0x3f0
[   28.236127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.236295]  kthread+0x328/0x630
[   28.236467]  ret_from_fork+0x10/0x20
[   28.236755] 
[   28.236815] The buggy address belongs to the physical page:
[   28.236936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   28.237158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.237297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.237534] page_type: f8(unknown)
[   28.237655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.237887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.238088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.238328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.238453] head: 0bfffe0000000002 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff
[   28.238736] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.238851] page dumped because: kasan: bad access detected
[   28.238977] 
[   28.239071] Memory state around the buggy address:
[   28.239186]  fff00000c78d7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.239344]  fff00000c78d7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.239459] >fff00000c78d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.239553]                    ^
[   28.239663]  fff00000c78d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.239904]  fff00000c78d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.240047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   28.119737] ==================================================================
[   28.119873] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.120244] Free of addr fff00000c78d4000 by task kunit_try_catch/238
[   28.120470] 
[   28.120573] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.120938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.121015] Hardware name: linux,dummy-virt (DT)
[   28.121483] Call trace:
[   28.121544]  show_stack+0x20/0x38 (C)
[   28.121677]  dump_stack_lvl+0x8c/0xd0
[   28.121829]  print_report+0x118/0x608
[   28.121946]  kasan_report_invalid_free+0xc0/0xe8
[   28.122075]  __kasan_mempool_poison_object+0x14c/0x150
[   28.122929]  mempool_free+0x28c/0x328
[   28.123164]  mempool_double_free_helper+0x150/0x2e8
[   28.123845]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.124211]  kunit_try_run_case+0x170/0x3f0
[   28.124439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.124609]  kthread+0x328/0x630
[   28.124744]  ret_from_fork+0x10/0x20
[   28.125491] 
[   28.125658] The buggy address belongs to the physical page:
[   28.126156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4
[   28.126435] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.126851] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.126990] page_type: f8(unknown)
[   28.127128] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.127345] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.127467] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.127583] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.127724] head: 0bfffe0000000002 ffffc1ffc31e3501 00000000ffffffff 00000000ffffffff
[   28.127847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.127973] page dumped because: kasan: bad access detected
[   28.128190] 
[   28.128238] Memory state around the buggy address:
[   28.128315]  fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.128430]  fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.128709] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.128806]                    ^
[   28.129445]  fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.129824]  fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.129938] ==================================================================
[   28.148333] ==================================================================
[   28.148466] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.148613] Free of addr fff00000c78d4000 by task kunit_try_catch/240
[   28.148752] 
[   28.148846] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.149050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.149536] Hardware name: linux,dummy-virt (DT)
[   28.149986] Call trace:
[   28.150100]  show_stack+0x20/0x38 (C)
[   28.150386]  dump_stack_lvl+0x8c/0xd0
[   28.150671]  print_report+0x118/0x608
[   28.151054]  kasan_report_invalid_free+0xc0/0xe8
[   28.151190]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.151422]  mempool_free+0x24c/0x328
[   28.151540]  mempool_double_free_helper+0x150/0x2e8
[   28.151879]  mempool_page_alloc_double_free+0xbc/0x118
[   28.152146]  kunit_try_run_case+0x170/0x3f0
[   28.152283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.152627]  kthread+0x328/0x630
[   28.152969]  ret_from_fork+0x10/0x20
[   28.153114] 
[   28.153168] The buggy address belongs to the physical page:
[   28.153243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4
[   28.153388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.153550] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.154408] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.154964] page dumped because: kasan: bad access detected
[   28.155045] 
[   28.155278] Memory state around the buggy address:
[   28.155492]  fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.155704]  fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.156217] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.156313]                    ^
[   28.156875]  fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.157414]  fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.158103] ==================================================================
[   28.073221] ==================================================================
[   28.073393] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.073534] Free of addr fff00000c56e8700 by task kunit_try_catch/236
[   28.073638] 
[   28.074488] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.074948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.075023] Hardware name: linux,dummy-virt (DT)
[   28.075186] Call trace:
[   28.075567]  show_stack+0x20/0x38 (C)
[   28.076155]  dump_stack_lvl+0x8c/0xd0
[   28.076662]  print_report+0x118/0x608
[   28.076802]  kasan_report_invalid_free+0xc0/0xe8
[   28.076931]  check_slab_allocation+0xd4/0x108
[   28.077054]  __kasan_mempool_poison_object+0x78/0x150
[   28.077181]  mempool_free+0x28c/0x328
[   28.077323]  mempool_double_free_helper+0x150/0x2e8
[   28.077445]  mempool_kmalloc_double_free+0xc0/0x118
[   28.079063]  kunit_try_run_case+0x170/0x3f0
[   28.079215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.080550]  kthread+0x328/0x630
[   28.080948]  ret_from_fork+0x10/0x20
[   28.081173] 
[   28.081347] Allocated by task 236:
[   28.081426]  kasan_save_stack+0x3c/0x68
[   28.082053]  kasan_save_track+0x20/0x40
[   28.082225]  kasan_save_alloc_info+0x40/0x58
[   28.082900]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.083338]  remove_element+0x130/0x1f8
[   28.083489]  mempool_alloc_preallocated+0x58/0xc0
[   28.083616]  mempool_double_free_helper+0x94/0x2e8
[   28.084266]  mempool_kmalloc_double_free+0xc0/0x118
[   28.084385]  kunit_try_run_case+0x170/0x3f0
[   28.084491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.085968]  kthread+0x328/0x630
[   28.086275]  ret_from_fork+0x10/0x20
[   28.086380] 
[   28.086904] Freed by task 236:
[   28.087484]  kasan_save_stack+0x3c/0x68
[   28.087634]  kasan_save_track+0x20/0x40
[   28.087775]  kasan_save_free_info+0x4c/0x78
[   28.087887]  __kasan_mempool_poison_object+0xc0/0x150
[   28.088006]  mempool_free+0x28c/0x328
[   28.088254]  mempool_double_free_helper+0x100/0x2e8
[   28.088479]  mempool_kmalloc_double_free+0xc0/0x118
[   28.088648]  kunit_try_run_case+0x170/0x3f0
[   28.088945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.089191]  kthread+0x328/0x630
[   28.089289]  ret_from_fork+0x10/0x20
[   28.089382] 
[   28.089444] The buggy address belongs to the object at fff00000c56e8700
[   28.089444]  which belongs to the cache kmalloc-128 of size 128
[   28.089647] The buggy address is located 0 bytes inside of
[   28.089647]  128-byte region [fff00000c56e8700, fff00000c56e8780)
[   28.090322] 
[   28.090580] The buggy address belongs to the physical page:
[   28.090708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   28.091000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.091172] page_type: f5(slab)
[   28.091409] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.091534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.091630] page dumped because: kasan: bad access detected
[   28.091780] 
[   28.091876] Memory state around the buggy address:
[   28.091991]  fff00000c56e8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.092114]  fff00000c56e8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.092225] >fff00000c56e8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.092399]                    ^
[   28.092587]  fff00000c56e8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.092859]  fff00000c56e8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.093128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   27.920593] ==================================================================
[   27.920840] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   27.921042] Read of size 1 at addr fff00000c78d0000 by task kunit_try_catch/230
[   27.921237] 
[   27.921337] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.921546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.921714] Hardware name: linux,dummy-virt (DT)
[   27.921824] Call trace:
[   27.921958]  show_stack+0x20/0x38 (C)
[   27.922154]  dump_stack_lvl+0x8c/0xd0
[   27.922344]  print_report+0x118/0x608
[   27.922553]  kasan_report+0xdc/0x128
[   27.922675]  __asan_report_load1_noabort+0x20/0x30
[   27.923033]  mempool_uaf_helper+0x314/0x340
[   27.923208]  mempool_kmalloc_large_uaf+0xc4/0x120
[   27.923355]  kunit_try_run_case+0x170/0x3f0
[   27.923489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.923644]  kthread+0x328/0x630
[   27.923818]  ret_from_fork+0x10/0x20
[   27.924138] 
[   27.924242] The buggy address belongs to the physical page:
[   27.924399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0
[   27.924528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.924631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.924782] page_type: f8(unknown)
[   27.924961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.925151] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.925304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.925432] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.925623] head: 0bfffe0000000002 ffffc1ffc31e3401 00000000ffffffff 00000000ffffffff
[   27.925954] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.926084] page dumped because: kasan: bad access detected
[   27.926240] 
[   27.926286] Memory state around the buggy address:
[   27.926468]  fff00000c78cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.926601]  fff00000c78cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.926750] >fff00000c78d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.926851]                    ^
[   27.926921]  fff00000c78d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.927029]  fff00000c78d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.927126] ==================================================================
[   28.038485] ==================================================================
[   28.038625] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.038831] Read of size 1 at addr fff00000c78d0000 by task kunit_try_catch/234
[   28.038968] 
[   28.039071] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   28.042914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.043012] Hardware name: linux,dummy-virt (DT)
[   28.043155] Call trace:
[   28.043220]  show_stack+0x20/0x38 (C)
[   28.043353]  dump_stack_lvl+0x8c/0xd0
[   28.043485]  print_report+0x118/0x608
[   28.044187]  kasan_report+0xdc/0x128
[   28.044315]  __asan_report_load1_noabort+0x20/0x30
[   28.044457]  mempool_uaf_helper+0x314/0x340
[   28.044580]  mempool_page_alloc_uaf+0xc0/0x118
[   28.044743]  kunit_try_run_case+0x170/0x3f0
[   28.044867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.044996]  kthread+0x328/0x630
[   28.045101]  ret_from_fork+0x10/0x20
[   28.045214] 
[   28.045276] The buggy address belongs to the physical page:
[   28.045352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0
[   28.045478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.045622] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.045769] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.045870] page dumped because: kasan: bad access detected
[   28.045941] 
[   28.045988] Memory state around the buggy address:
[   28.046076]  fff00000c78cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.049014]  fff00000c78cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.049148] >fff00000c78d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.049260]                    ^
[   28.049338]  fff00000c78d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.049447]  fff00000c78d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.049542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   27.876549] ==================================================================
[   27.876699] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   27.876854] Read of size 1 at addr fff00000c56e8300 by task kunit_try_catch/228
[   27.876972] 
[   27.877055] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.877275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.877341] Hardware name: linux,dummy-virt (DT)
[   27.877415] Call trace:
[   27.877470]  show_stack+0x20/0x38 (C)
[   27.877596]  dump_stack_lvl+0x8c/0xd0
[   27.878352]  print_report+0x118/0x608
[   27.878455]  kasan_report+0xdc/0x128
[   27.878555]  __asan_report_load1_noabort+0x20/0x30
[   27.878753]  mempool_uaf_helper+0x314/0x340
[   27.878961]  mempool_kmalloc_uaf+0xc4/0x120
[   27.879201]  kunit_try_run_case+0x170/0x3f0
[   27.879334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.879487]  kthread+0x328/0x630
[   27.879612]  ret_from_fork+0x10/0x20
[   27.879788] 
[   27.879869] Allocated by task 228:
[   27.880000]  kasan_save_stack+0x3c/0x68
[   27.880110]  kasan_save_track+0x20/0x40
[   27.880235]  kasan_save_alloc_info+0x40/0x58
[   27.880382]  __kasan_mempool_unpoison_object+0x11c/0x180
[   27.880624]  remove_element+0x130/0x1f8
[   27.880756]  mempool_alloc_preallocated+0x58/0xc0
[   27.880870]  mempool_uaf_helper+0xa4/0x340
[   27.880979]  mempool_kmalloc_uaf+0xc4/0x120
[   27.881092]  kunit_try_run_case+0x170/0x3f0
[   27.881192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.881704]  kthread+0x328/0x630
[   27.882030]  ret_from_fork+0x10/0x20
[   27.882134] 
[   27.882181] Freed by task 228:
[   27.882367]  kasan_save_stack+0x3c/0x68
[   27.882465]  kasan_save_track+0x20/0x40
[   27.882777]  kasan_save_free_info+0x4c/0x78
[   27.882892]  __kasan_mempool_poison_object+0xc0/0x150
[   27.883318]  mempool_free+0x28c/0x328
[   27.883500]  mempool_uaf_helper+0x104/0x340
[   27.883623]  mempool_kmalloc_uaf+0xc4/0x120
[   27.883914]  kunit_try_run_case+0x170/0x3f0
[   27.884030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.884255]  kthread+0x328/0x630
[   27.884550]  ret_from_fork+0x10/0x20
[   27.884700] 
[   27.884772] The buggy address belongs to the object at fff00000c56e8300
[   27.884772]  which belongs to the cache kmalloc-128 of size 128
[   27.884976] The buggy address is located 0 bytes inside of
[   27.884976]  freed 128-byte region [fff00000c56e8300, fff00000c56e8380)
[   27.885138] 
[   27.885196] The buggy address belongs to the physical page:
[   27.885296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   27.885437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.885824] page_type: f5(slab)
[   27.885961] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.886124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.886227] page dumped because: kasan: bad access detected
[   27.886332] 
[   27.886378] Memory state around the buggy address:
[   27.886462]  fff00000c56e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.886613]  fff00000c56e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.887348] >fff00000c56e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.887473]                    ^
[   27.887678]  fff00000c56e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.888114]  fff00000c56e8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.888231] ==================================================================
[   27.960494] ==================================================================
[   27.961143] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   27.961334] Read of size 1 at addr fff00000c7895240 by task kunit_try_catch/232
[   27.961449] 
[   27.961523] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.963265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.963875] Hardware name: linux,dummy-virt (DT)
[   27.964486] Call trace:
[   27.964651]  show_stack+0x20/0x38 (C)
[   27.965093]  dump_stack_lvl+0x8c/0xd0
[   27.966161]  print_report+0x118/0x608
[   27.966430]  kasan_report+0xdc/0x128
[   27.967253]  __asan_report_load1_noabort+0x20/0x30
[   27.967766]  mempool_uaf_helper+0x314/0x340
[   27.968074]  mempool_slab_uaf+0xc0/0x118
[   27.968348]  kunit_try_run_case+0x170/0x3f0
[   27.968558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.968768]  kthread+0x328/0x630
[   27.968891]  ret_from_fork+0x10/0x20
[   27.969491] 
[   27.969563] Allocated by task 232:
[   27.969666]  kasan_save_stack+0x3c/0x68
[   27.969794]  kasan_save_track+0x20/0x40
[   27.969969]  kasan_save_alloc_info+0x40/0x58
[   27.970072]  __kasan_mempool_unpoison_object+0xbc/0x180
[   27.970406]  remove_element+0x16c/0x1f8
[   27.970790]  mempool_alloc_preallocated+0x58/0xc0
[   27.971079]  mempool_uaf_helper+0xa4/0x340
[   27.971211]  mempool_slab_uaf+0xc0/0x118
[   27.971362]  kunit_try_run_case+0x170/0x3f0
[   27.971464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.971797]  kthread+0x328/0x630
[   27.972183]  ret_from_fork+0x10/0x20
[   27.972301] 
[   27.972351] Freed by task 232:
[   27.972934]  kasan_save_stack+0x3c/0x68
[   27.973141]  kasan_save_track+0x20/0x40
[   27.973328]  kasan_save_free_info+0x4c/0x78
[   27.973907]  __kasan_mempool_poison_object+0xc0/0x150
[   27.974108]  mempool_free+0x28c/0x328
[   27.974463]  mempool_uaf_helper+0x104/0x340
[   27.974991]  mempool_slab_uaf+0xc0/0x118
[   27.975093]  kunit_try_run_case+0x170/0x3f0
[   27.975215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.975316]  kthread+0x328/0x630
[   27.975406]  ret_from_fork+0x10/0x20
[   27.975812] 
[   27.976019] The buggy address belongs to the object at fff00000c7895240
[   27.976019]  which belongs to the cache test_cache of size 123
[   27.976158] The buggy address is located 0 bytes inside of
[   27.976158]  freed 123-byte region [fff00000c7895240, fff00000c78952bb)
[   27.976917] 
[   27.977241] The buggy address belongs to the physical page:
[   27.977354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   27.977880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.978644] page_type: f5(slab)
[   27.978806] raw: 0bfffe0000000000 fff00000c56eb280 dead000000000122 0000000000000000
[   27.979366] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.979593] page dumped because: kasan: bad access detected
[   27.979675] 
[   27.979739] Memory state around the buggy address:
[   27.979819]  fff00000c7895100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.980034]  fff00000c7895180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.980151] >fff00000c7895200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.980558]                                            ^
[   27.981166]  fff00000c7895280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.981286]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.982006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   27.731935] ==================================================================
[   27.732032] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.732129] Read of size 1 at addr fff00000c61c8f73 by task kunit_try_catch/222
[   27.732192] 
[   27.732243] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.732349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.732383] Hardware name: linux,dummy-virt (DT)
[   27.732424] Call trace:
[   27.732452]  show_stack+0x20/0x38 (C)
[   27.732521]  dump_stack_lvl+0x8c/0xd0
[   27.732590]  print_report+0x118/0x608
[   27.732648]  kasan_report+0xdc/0x128
[   27.732729]  __asan_report_load1_noabort+0x20/0x30
[   27.732792]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.732855]  mempool_kmalloc_oob_right+0xc4/0x120
[   27.732917]  kunit_try_run_case+0x170/0x3f0
[   27.732981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.733050]  kthread+0x328/0x630
[   27.733104]  ret_from_fork+0x10/0x20
[   27.733165] 
[   27.733187] Allocated by task 222:
[   27.733227]  kasan_save_stack+0x3c/0x68
[   27.733297]  kasan_save_track+0x20/0x40
[   27.733349]  kasan_save_alloc_info+0x40/0x58
[   27.733395]  __kasan_mempool_unpoison_object+0x11c/0x180
[   27.733451]  remove_element+0x130/0x1f8
[   27.733502]  mempool_alloc_preallocated+0x58/0xc0
[   27.733551]  mempool_oob_right_helper+0x98/0x2f0
[   27.733600]  mempool_kmalloc_oob_right+0xc4/0x120
[   27.733647]  kunit_try_run_case+0x170/0x3f0
[   27.733711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.733770]  kthread+0x328/0x630
[   27.733814]  ret_from_fork+0x10/0x20
[   27.733864] 
[   27.733889] The buggy address belongs to the object at fff00000c61c8f00
[   27.733889]  which belongs to the cache kmalloc-128 of size 128
[   27.733961] The buggy address is located 0 bytes to the right of
[   27.733961]  allocated 115-byte region [fff00000c61c8f00, fff00000c61c8f73)
[   27.734037] 
[   27.734065] The buggy address belongs to the physical page:
[   27.734104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8
[   27.734172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.734236] page_type: f5(slab)
[   27.734286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.734349] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   27.734399] page dumped because: kasan: bad access detected
[   27.734438] 
[   27.734459] Memory state around the buggy address:
[   27.734500]  fff00000c61c8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.734554]  fff00000c61c8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734606] >fff00000c61c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.734745]                                                              ^
[   27.734857]  fff00000c61c8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734966]  fff00000c61c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.735061] ==================================================================
[   27.764705] ==================================================================
[   27.764846] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.765003] Read of size 1 at addr fff00000c78ce001 by task kunit_try_catch/224
[   27.765262] 
[   27.765430] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.765832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.765978] Hardware name: linux,dummy-virt (DT)
[   27.766067] Call trace:
[   27.766128]  show_stack+0x20/0x38 (C)
[   27.766262]  dump_stack_lvl+0x8c/0xd0
[   27.766382]  print_report+0x118/0x608
[   27.766512]  kasan_report+0xdc/0x128
[   27.766805]  __asan_report_load1_noabort+0x20/0x30
[   27.766953]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.767096]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   27.767287]  kunit_try_run_case+0x170/0x3f0
[   27.767432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.767590]  kthread+0x328/0x630
[   27.767732]  ret_from_fork+0x10/0x20
[   27.767907] 
[   27.767964] The buggy address belongs to the physical page:
[   27.768051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cc
[   27.768229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.768399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.768746] page_type: f8(unknown)
[   27.768847] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.768971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.769094] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.769326] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.769615] head: 0bfffe0000000002 ffffc1ffc31e3301 00000000ffffffff 00000000ffffffff
[   27.769761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.769872] page dumped because: kasan: bad access detected
[   27.769964] 
[   27.770018] Memory state around the buggy address:
[   27.770111]  fff00000c78cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.770221]  fff00000c78cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.770338] >fff00000c78ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770437]                    ^
[   27.770508]  fff00000c78ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770723]  fff00000c78ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770811] ==================================================================
[   27.801156] ==================================================================
[   27.801331] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.801481] Read of size 1 at addr fff00000c78b42bb by task kunit_try_catch/226
[   27.801597] 
[   27.801708] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.801932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.802013] Hardware name: linux,dummy-virt (DT)
[   27.802106] Call trace:
[   27.802179]  show_stack+0x20/0x38 (C)
[   27.802316]  dump_stack_lvl+0x8c/0xd0
[   27.802458]  print_report+0x118/0x608
[   27.802595]  kasan_report+0xdc/0x128
[   27.802948]  __asan_report_load1_noabort+0x20/0x30
[   27.803088]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.803284]  mempool_slab_oob_right+0xc0/0x118
[   27.803460]  kunit_try_run_case+0x170/0x3f0
[   27.804674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.805008]  kthread+0x328/0x630
[   27.805155]  ret_from_fork+0x10/0x20
[   27.806023] 
[   27.806564] Allocated by task 226:
[   27.807289]  kasan_save_stack+0x3c/0x68
[   27.807788]  kasan_save_track+0x20/0x40
[   27.808494]  kasan_save_alloc_info+0x40/0x58
[   27.808948]  __kasan_mempool_unpoison_object+0xbc/0x180
[   27.809437]  remove_element+0x16c/0x1f8
[   27.809630]  mempool_alloc_preallocated+0x58/0xc0
[   27.810945]  mempool_oob_right_helper+0x98/0x2f0
[   27.811105]  mempool_slab_oob_right+0xc0/0x118
[   27.811237]  kunit_try_run_case+0x170/0x3f0
[   27.811473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.811811]  kthread+0x328/0x630
[   27.812093]  ret_from_fork+0x10/0x20
[   27.812189] 
[   27.813129] The buggy address belongs to the object at fff00000c78b4240
[   27.813129]  which belongs to the cache test_cache of size 123
[   27.814186] The buggy address is located 0 bytes to the right of
[   27.814186]  allocated 123-byte region [fff00000c78b4240, fff00000c78b42bb)
[   27.814338] 
[   27.814391] The buggy address belongs to the physical page:
[   27.814467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4
[   27.814592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.816128] page_type: f5(slab)
[   27.816284] raw: 0bfffe0000000000 fff00000c56eb140 dead000000000122 0000000000000000
[   27.816417] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.817793] page dumped because: kasan: bad access detected
[   27.818335] 
[   27.818461] Memory state around the buggy address:
[   27.818541]  fff00000c78b4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.818653]  fff00000c78b4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   27.818776] >fff00000c78b4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   27.820176]                                         ^
[   27.820257]  fff00000c78b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820361]  fff00000c78b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820455] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   27.114254] ==================================================================
[   27.114548] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   27.115021] Read of size 1 at addr fff00000c5bfedc0 by task kunit_try_catch/216
[   27.115161] 
[   27.115783] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.116132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.116208] Hardware name: linux,dummy-virt (DT)
[   27.116303] Call trace:
[   27.116366]  show_stack+0x20/0x38 (C)
[   27.116492]  dump_stack_lvl+0x8c/0xd0
[   27.117406]  print_report+0x118/0x608
[   27.117565]  kasan_report+0xdc/0x128
[   27.118161]  __kasan_check_byte+0x54/0x70
[   27.118960]  kmem_cache_destroy+0x34/0x218
[   27.119100]  kmem_cache_double_destroy+0x174/0x300
[   27.119238]  kunit_try_run_case+0x170/0x3f0
[   27.119764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.120003]  kthread+0x328/0x630
[   27.120184]  ret_from_fork+0x10/0x20
[   27.120308] 
[   27.120359] Allocated by task 216:
[   27.120433]  kasan_save_stack+0x3c/0x68
[   27.120757]  kasan_save_track+0x20/0x40
[   27.120864]  kasan_save_alloc_info+0x40/0x58
[   27.120955]  __kasan_slab_alloc+0xa8/0xb0
[   27.121052]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   27.121156]  __kmem_cache_create_args+0x178/0x280
[   27.121266]  kmem_cache_double_destroy+0xc0/0x300
[   27.121366]  kunit_try_run_case+0x170/0x3f0
[   27.121481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.121589]  kthread+0x328/0x630
[   27.121676]  ret_from_fork+0x10/0x20
[   27.122507] 
[   27.122660] Freed by task 216:
[   27.122754]  kasan_save_stack+0x3c/0x68
[   27.122810]  kasan_save_track+0x20/0x40
[   27.122948]  kasan_save_free_info+0x4c/0x78
[   27.123051]  __kasan_slab_free+0x6c/0x98
[   27.123162]  kmem_cache_free+0x260/0x470
[   27.123270]  slab_kmem_cache_release+0x38/0x50
[   27.123578]  kmem_cache_release+0x1c/0x30
[   27.123702]  kobject_put+0x17c/0x430
[   27.123970]  sysfs_slab_release+0x1c/0x30
[   27.124168]  kmem_cache_destroy+0x118/0x218
[   27.124283]  kmem_cache_double_destroy+0x128/0x300
[   27.126721]  kunit_try_run_case+0x170/0x3f0
[   27.126841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.126967]  kthread+0x328/0x630
[   27.127071]  ret_from_fork+0x10/0x20
[   27.127256] 
[   27.127310] The buggy address belongs to the object at fff00000c5bfedc0
[   27.127310]  which belongs to the cache kmem_cache of size 208
[   27.127720] The buggy address is located 0 bytes inside of
[   27.127720]  freed 208-byte region [fff00000c5bfedc0, fff00000c5bfee90)
[   27.128991] 
[   27.129048] The buggy address belongs to the physical page:
[   27.129622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bfe
[   27.129823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.130468] page_type: f5(slab)
[   27.130605] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   27.130846] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   27.131404] page dumped because: kasan: bad access detected
[   27.131500] 
[   27.131615] Memory state around the buggy address:
[   27.131827]  fff00000c5bfec80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.132004]  fff00000c5bfed00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   27.132113] >fff00000c5bfed80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.132217]                                            ^
[   27.132348]  fff00000c5bfee00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.132556]  fff00000c5bfee80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.132829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   26.764774] ==================================================================
[   26.764952] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   26.766670] Read of size 1 at addr fff00000c77f9000 by task kunit_try_catch/214
[   26.767914] 
[   26.768008] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.768751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.768839] Hardware name: linux,dummy-virt (DT)
[   26.768935] Call trace:
[   26.768992]  show_stack+0x20/0x38 (C)
[   26.769103]  dump_stack_lvl+0x8c/0xd0
[   26.769170]  print_report+0x118/0x608
[   26.769229]  kasan_report+0xdc/0x128
[   26.769304]  __asan_report_load1_noabort+0x20/0x30
[   26.769364]  kmem_cache_rcu_uaf+0x388/0x468
[   26.769422]  kunit_try_run_case+0x170/0x3f0
[   26.769489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.769566]  kthread+0x328/0x630
[   26.769631]  ret_from_fork+0x10/0x20
[   26.769814] 
[   26.769880] Allocated by task 214:
[   26.770251]  kasan_save_stack+0x3c/0x68
[   26.770524]  kasan_save_track+0x20/0x40
[   26.770718]  kasan_save_alloc_info+0x40/0x58
[   26.770805]  __kasan_slab_alloc+0xa8/0xb0
[   26.770859]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   26.770916]  kmem_cache_rcu_uaf+0x12c/0x468
[   26.771017]  kunit_try_run_case+0x170/0x3f0
[   26.771209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.771391]  kthread+0x328/0x630
[   26.771483]  ret_from_fork+0x10/0x20
[   26.771575] 
[   26.771656] Freed by task 0:
[   26.771746]  kasan_save_stack+0x3c/0x68
[   26.771843]  kasan_save_track+0x20/0x40
[   26.771948]  kasan_save_free_info+0x4c/0x78
[   26.772054]  __kasan_slab_free+0x6c/0x98
[   26.772153]  slab_free_after_rcu_debug+0xd4/0x2f8
[   26.772252]  rcu_core+0x9f4/0x1e20
[   26.772355]  rcu_core_si+0x18/0x30
[   26.772442]  handle_softirqs+0x374/0xb28
[   26.772556]  __do_softirq+0x1c/0x28
[   26.772659] 
[   26.772869] Last potentially related work creation:
[   26.772936]  kasan_save_stack+0x3c/0x68
[   26.773161]  kasan_record_aux_stack+0xb4/0xc8
[   26.773542]  kmem_cache_free+0x120/0x470
[   26.773788]  kmem_cache_rcu_uaf+0x16c/0x468
[   26.774012]  kunit_try_run_case+0x170/0x3f0
[   26.774177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.774303]  kthread+0x328/0x630
[   26.774392]  ret_from_fork+0x10/0x20
[   26.774511] 
[   26.774611] The buggy address belongs to the object at fff00000c77f9000
[   26.774611]  which belongs to the cache test_cache of size 200
[   26.774973] The buggy address is located 0 bytes inside of
[   26.774973]  freed 200-byte region [fff00000c77f9000, fff00000c77f90c8)
[   26.775598] 
[   26.775654] The buggy address belongs to the physical page:
[   26.775754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f9
[   26.776130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.776649] page_type: f5(slab)
[   26.777292] raw: 0bfffe0000000000 fff00000c5bfec80 dead000000000122 0000000000000000
[   26.777945] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.778363] page dumped because: kasan: bad access detected
[   26.779085] 
[   26.779299] Memory state around the buggy address:
[   26.779625]  fff00000c77f8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.780116]  fff00000c77f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.780278] >fff00000c77f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.781259]                    ^
[   26.781336]  fff00000c77f9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   26.781995]  fff00000c77f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.782151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   26.103392] ==================================================================
[   26.103664] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   26.103946] Free of addr fff00000c77f8001 by task kunit_try_catch/212
[   26.104100] 
[   26.104381] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.104593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.104660] Hardware name: linux,dummy-virt (DT)
[   26.104756] Call trace:
[   26.104814]  show_stack+0x20/0x38 (C)
[   26.105319]  dump_stack_lvl+0x8c/0xd0
[   26.105475]  print_report+0x118/0x608
[   26.105611]  kasan_report_invalid_free+0xc0/0xe8
[   26.105766]  check_slab_allocation+0xfc/0x108
[   26.105899]  __kasan_slab_pre_free+0x2c/0x48
[   26.106123]  kmem_cache_free+0xf0/0x470
[   26.106386]  kmem_cache_invalid_free+0x184/0x3c8
[   26.106697]  kunit_try_run_case+0x170/0x3f0
[   26.106972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.107189]  kthread+0x328/0x630
[   26.107523]  ret_from_fork+0x10/0x20
[   26.107785] 
[   26.107841] Allocated by task 212:
[   26.108011]  kasan_save_stack+0x3c/0x68
[   26.108118]  kasan_save_track+0x20/0x40
[   26.108211]  kasan_save_alloc_info+0x40/0x58
[   26.108313]  __kasan_slab_alloc+0xa8/0xb0
[   26.108581]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   26.108747]  kmem_cache_invalid_free+0x12c/0x3c8
[   26.108982]  kunit_try_run_case+0x170/0x3f0
[   26.109084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.109260]  kthread+0x328/0x630
[   26.109353]  ret_from_fork+0x10/0x20
[   26.109626] 
[   26.109732] The buggy address belongs to the object at fff00000c77f8000
[   26.109732]  which belongs to the cache test_cache of size 200
[   26.109874] The buggy address is located 1 bytes inside of
[   26.109874]  200-byte region [fff00000c77f8000, fff00000c77f80c8)
[   26.110063] 
[   26.110126] The buggy address belongs to the physical page:
[   26.110211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8
[   26.110347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.110697] page_type: f5(slab)
[   26.110805] raw: 0bfffe0000000000 fff00000c5bfeb40 dead000000000122 0000000000000000
[   26.110935] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.111078] page dumped because: kasan: bad access detected
[   26.111164] 
[   26.111210] Memory state around the buggy address:
[   26.111298]  fff00000c77f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111449]  fff00000c77f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111561] >fff00000c77f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.111646]                    ^
[   26.111739]  fff00000c77f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.111930]  fff00000c77f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.112118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   26.027201] ==================================================================
[   26.027780] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   26.028478] Free of addr fff00000c77f5000 by task kunit_try_catch/210
[   26.028585] 
[   26.029382] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.030223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.030291] Hardware name: linux,dummy-virt (DT)
[   26.030371] Call trace:
[   26.030425]  show_stack+0x20/0x38 (C)
[   26.030554]  dump_stack_lvl+0x8c/0xd0
[   26.032385]  print_report+0x118/0x608
[   26.032819]  kasan_report_invalid_free+0xc0/0xe8
[   26.033427]  check_slab_allocation+0xd4/0x108
[   26.034016]  __kasan_slab_pre_free+0x2c/0x48
[   26.034212]  kmem_cache_free+0xf0/0x470
[   26.034575]  kmem_cache_double_free+0x190/0x3c8
[   26.034805]  kunit_try_run_case+0x170/0x3f0
[   26.035305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.035733]  kthread+0x328/0x630
[   26.035949]  ret_from_fork+0x10/0x20
[   26.036124] 
[   26.036174] Allocated by task 210:
[   26.036264]  kasan_save_stack+0x3c/0x68
[   26.036532]  kasan_save_track+0x20/0x40
[   26.036632]  kasan_save_alloc_info+0x40/0x58
[   26.036745]  __kasan_slab_alloc+0xa8/0xb0
[   26.036845]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   26.036943]  kmem_cache_double_free+0x12c/0x3c8
[   26.037035]  kunit_try_run_case+0x170/0x3f0
[   26.037128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.037309]  kthread+0x328/0x630
[   26.037500]  ret_from_fork+0x10/0x20
[   26.037594] 
[   26.037643] Freed by task 210:
[   26.037727]  kasan_save_stack+0x3c/0x68
[   26.037836]  kasan_save_track+0x20/0x40
[   26.038017]  kasan_save_free_info+0x4c/0x78
[   26.038236]  __kasan_slab_free+0x6c/0x98
[   26.038342]  kmem_cache_free+0x260/0x470
[   26.038453]  kmem_cache_double_free+0x140/0x3c8
[   26.038707]  kunit_try_run_case+0x170/0x3f0
[   26.038818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.039002]  kthread+0x328/0x630
[   26.039139]  ret_from_fork+0x10/0x20
[   26.039320] 
[   26.039436] The buggy address belongs to the object at fff00000c77f5000
[   26.039436]  which belongs to the cache test_cache of size 200
[   26.039644] The buggy address is located 0 bytes inside of
[   26.039644]  200-byte region [fff00000c77f5000, fff00000c77f50c8)
[   26.039861] 
[   26.039914] The buggy address belongs to the physical page:
[   26.039993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f5
[   26.040130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.040254] page_type: f5(slab)
[   26.040358] raw: 0bfffe0000000000 fff00000c5bfea00 dead000000000122 0000000000000000
[   26.040483] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.040629] page dumped because: kasan: bad access detected
[   26.040980] 
[   26.041254] Memory state around the buggy address:
[   26.041505]  fff00000c77f4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.041613]  fff00000c77f4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.041734] >fff00000c77f5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.042063]                    ^
[   26.042505]  fff00000c77f5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   26.042610]  fff00000c77f5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.042943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   25.729385] ==================================================================
[   25.729516] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   25.729652] Read of size 1 at addr fff00000c77f30c8 by task kunit_try_catch/208
[   25.729792] 
[   25.729877] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.730074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.730138] Hardware name: linux,dummy-virt (DT)
[   25.730215] Call trace:
[   25.730265]  show_stack+0x20/0x38 (C)
[   25.730386]  dump_stack_lvl+0x8c/0xd0
[   25.730507]  print_report+0x118/0x608
[   25.730622]  kasan_report+0xdc/0x128
[   25.730798]  __asan_report_load1_noabort+0x20/0x30
[   25.731011]  kmem_cache_oob+0x344/0x430
[   25.731213]  kunit_try_run_case+0x170/0x3f0
[   25.731358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.731568]  kthread+0x328/0x630
[   25.731722]  ret_from_fork+0x10/0x20
[   25.731859] 
[   25.732005] Allocated by task 208:
[   25.732077]  kasan_save_stack+0x3c/0x68
[   25.732270]  kasan_save_track+0x20/0x40
[   25.732373]  kasan_save_alloc_info+0x40/0x58
[   25.732492]  __kasan_slab_alloc+0xa8/0xb0
[   25.732636]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   25.732841]  kmem_cache_oob+0x12c/0x430
[   25.733114]  kunit_try_run_case+0x170/0x3f0
[   25.733289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.733400]  kthread+0x328/0x630
[   25.733488]  ret_from_fork+0x10/0x20
[   25.733575] 
[   25.733620] The buggy address belongs to the object at fff00000c77f3000
[   25.733620]  which belongs to the cache test_cache of size 200
[   25.733801] The buggy address is located 0 bytes to the right of
[   25.733801]  allocated 200-byte region [fff00000c77f3000, fff00000c77f30c8)
[   25.734042] 
[   25.734197] The buggy address belongs to the physical page:
[   25.734418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f3
[   25.734590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.734736] page_type: f5(slab)
[   25.734856] raw: 0bfffe0000000000 fff00000c5bfe8c0 dead000000000122 0000000000000000
[   25.734994] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   25.735105] page dumped because: kasan: bad access detected
[   25.735269] 
[   25.735329] Memory state around the buggy address:
[   25.735421]  fff00000c77f2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.735538]  fff00000c77f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.735660] >fff00000c77f3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.735780]                                               ^
[   25.735880]  fff00000c77f3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.736205]  fff00000c77f3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.736322] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   25.643936] ==================================================================
[   25.646072] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   25.646204] Read of size 8 at addr fff00000c77ed380 by task kunit_try_catch/201
[   25.649478] 
[   25.649583] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.652175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.652561] Hardware name: linux,dummy-virt (DT)
[   25.652650] Call trace:
[   25.652736]  show_stack+0x20/0x38 (C)
[   25.652889]  dump_stack_lvl+0x8c/0xd0
[   25.653021]  print_report+0x118/0x608
[   25.653763]  kasan_report+0xdc/0x128
[   25.653888]  __asan_report_load8_noabort+0x20/0x30
[   25.654011]  workqueue_uaf+0x480/0x4a8
[   25.654118]  kunit_try_run_case+0x170/0x3f0
[   25.654240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.654364]  kthread+0x328/0x630
[   25.654468]  ret_from_fork+0x10/0x20
[   25.654579] 
[   25.654626] Allocated by task 201:
[   25.654714]  kasan_save_stack+0x3c/0x68
[   25.654826]  kasan_save_track+0x20/0x40
[   25.655034]  kasan_save_alloc_info+0x40/0x58
[   25.655782]  __kasan_kmalloc+0xd4/0xd8
[   25.655902]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.656354]  workqueue_uaf+0x13c/0x4a8
[   25.656471]  kunit_try_run_case+0x170/0x3f0
[   25.656566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.656671]  kthread+0x328/0x630
[   25.656773]  ret_from_fork+0x10/0x20
[   25.656856] 
[   25.656899] Freed by task 76:
[   25.656966]  kasan_save_stack+0x3c/0x68
[   25.657811]  kasan_save_track+0x20/0x40
[   25.657911]  kasan_save_free_info+0x4c/0x78
[   25.658004]  __kasan_slab_free+0x6c/0x98
[   25.658099]  kfree+0x214/0x3c8
[   25.658210]  workqueue_uaf_work+0x18/0x30
[   25.658428]  process_one_work+0x530/0xf98
[   25.658565]  worker_thread+0x8ac/0xf28
[   25.658653]  kthread+0x328/0x630
[   25.658760]  ret_from_fork+0x10/0x20
[   25.658859] 
[   25.659000] Last potentially related work creation:
[   25.659180]  kasan_save_stack+0x3c/0x68
[   25.659470]  kasan_record_aux_stack+0xb4/0xc8
[   25.659587]  __queue_work+0x65c/0x1010
[   25.659758]  queue_work_on+0xbc/0xf8
[   25.659865]  workqueue_uaf+0x210/0x4a8
[   25.659981]  kunit_try_run_case+0x170/0x3f0
[   25.660098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.660222]  kthread+0x328/0x630
[   25.660568]  ret_from_fork+0x10/0x20
[   25.661029] 
[   25.661462] The buggy address belongs to the object at fff00000c77ed380
[   25.661462]  which belongs to the cache kmalloc-32 of size 32
[   25.661611] The buggy address is located 0 bytes inside of
[   25.661611]  freed 32-byte region [fff00000c77ed380, fff00000c77ed3a0)
[   25.661969] 
[   25.662056] The buggy address belongs to the physical page:
[   25.662135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ed
[   25.662271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.662411] page_type: f5(slab)
[   25.662719] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.662851] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.662953] page dumped because: kasan: bad access detected
[   25.663035] 
[   25.663081] Memory state around the buggy address:
[   25.663189]  fff00000c77ed280: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   25.663310]  fff00000c77ed300: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   25.663656] >fff00000c77ed380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.664110]                    ^
[   25.664189]  fff00000c77ed400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664298]  fff00000c77ed480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   25.182331] ==================================================================
[   25.182472] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   25.182585] Free of addr fff00000c5ed4d40 by task kunit_try_catch/193
[   25.185547] 
[   25.185632] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.185844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.185907] Hardware name: linux,dummy-virt (DT)
[   25.185977] Call trace:
[   25.186037]  show_stack+0x20/0x38 (C)
[   25.186145]  dump_stack_lvl+0x8c/0xd0
[   25.186255]  print_report+0x118/0x608
[   25.186374]  kasan_report_invalid_free+0xc0/0xe8
[   25.186487]  check_slab_allocation+0xd4/0x108
[   25.186605]  __kasan_slab_pre_free+0x2c/0x48
[   25.189143]  kfree+0xe8/0x3c8
[   25.189671]  kfree_sensitive+0x3c/0xb0
[   25.190547]  kmalloc_double_kzfree+0x168/0x308
[   25.190817]  kunit_try_run_case+0x170/0x3f0
[   25.190929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.191051]  kthread+0x328/0x630
[   25.191162]  ret_from_fork+0x10/0x20
[   25.191485] 
[   25.191540] Allocated by task 193:
[   25.191923]  kasan_save_stack+0x3c/0x68
[   25.192249]  kasan_save_track+0x20/0x40
[   25.193261]  kasan_save_alloc_info+0x40/0x58
[   25.193377]  __kasan_kmalloc+0xd4/0xd8
[   25.193467]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.193565]  kmalloc_double_kzfree+0xb8/0x308
[   25.193658]  kunit_try_run_case+0x170/0x3f0
[   25.193771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.193872]  kthread+0x328/0x630
[   25.193954]  ret_from_fork+0x10/0x20
[   25.194037] 
[   25.194084] Freed by task 193:
[   25.194143]  kasan_save_stack+0x3c/0x68
[   25.194243]  kasan_save_track+0x20/0x40
[   25.194339]  kasan_save_free_info+0x4c/0x78
[   25.194450]  __kasan_slab_free+0x6c/0x98
[   25.194570]  kfree+0x214/0x3c8
[   25.195501]  kfree_sensitive+0x80/0xb0
[   25.195619]  kmalloc_double_kzfree+0x11c/0x308
[   25.195814]  kunit_try_run_case+0x170/0x3f0
[   25.195964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.196081]  kthread+0x328/0x630
[   25.196167]  ret_from_fork+0x10/0x20
[   25.196274] 
[   25.196382] The buggy address belongs to the object at fff00000c5ed4d40
[   25.196382]  which belongs to the cache kmalloc-16 of size 16
[   25.196656] The buggy address is located 0 bytes inside of
[   25.196656]  16-byte region [fff00000c5ed4d40, fff00000c5ed4d50)
[   25.197097] 
[   25.197312] The buggy address belongs to the physical page:
[   25.197661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   25.197806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.197923] page_type: f5(slab)
[   25.198215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.199652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.199787] page dumped because: kasan: bad access detected
[   25.199898] 
[   25.200023] Memory state around the buggy address:
[   25.200256]  fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.200867]  fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.201007] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   25.201113]                                            ^
[   25.201856]  fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.202182]  fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.202734] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   25.162284] ==================================================================
[   25.162417] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   25.162546] Read of size 1 at addr fff00000c5ed4d40 by task kunit_try_catch/193
[   25.163747] 
[   25.163836] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.164036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.164096] Hardware name: linux,dummy-virt (DT)
[   25.164168] Call trace:
[   25.164222]  show_stack+0x20/0x38 (C)
[   25.164342]  dump_stack_lvl+0x8c/0xd0
[   25.164459]  print_report+0x118/0x608
[   25.164568]  kasan_report+0xdc/0x128
[   25.165319]  __kasan_check_byte+0x54/0x70
[   25.166113]  kfree_sensitive+0x30/0xb0
[   25.166242]  kmalloc_double_kzfree+0x168/0x308
[   25.166355]  kunit_try_run_case+0x170/0x3f0
[   25.166473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.166599]  kthread+0x328/0x630
[   25.168092]  ret_from_fork+0x10/0x20
[   25.168768] 
[   25.168817] Allocated by task 193:
[   25.168880]  kasan_save_stack+0x3c/0x68
[   25.168981]  kasan_save_track+0x20/0x40
[   25.169068]  kasan_save_alloc_info+0x40/0x58
[   25.169160]  __kasan_kmalloc+0xd4/0xd8
[   25.169256]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.169354]  kmalloc_double_kzfree+0xb8/0x308
[   25.169452]  kunit_try_run_case+0x170/0x3f0
[   25.169541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.169650]  kthread+0x328/0x630
[   25.169760]  ret_from_fork+0x10/0x20
[   25.169847] 
[   25.169891] Freed by task 193:
[   25.169950]  kasan_save_stack+0x3c/0x68
[   25.170047]  kasan_save_track+0x20/0x40
[   25.170140]  kasan_save_free_info+0x4c/0x78
[   25.170226]  __kasan_slab_free+0x6c/0x98
[   25.170316]  kfree+0x214/0x3c8
[   25.170405]  kfree_sensitive+0x80/0xb0
[   25.170489]  kmalloc_double_kzfree+0x11c/0x308
[   25.170583]  kunit_try_run_case+0x170/0x3f0
[   25.170675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.174441]  kthread+0x328/0x630
[   25.175153]  ret_from_fork+0x10/0x20
[   25.175610] 
[   25.175661] The buggy address belongs to the object at fff00000c5ed4d40
[   25.175661]  which belongs to the cache kmalloc-16 of size 16
[   25.175820] The buggy address is located 0 bytes inside of
[   25.175820]  freed 16-byte region [fff00000c5ed4d40, fff00000c5ed4d50)
[   25.175963] 
[   25.176014] The buggy address belongs to the physical page:
[   25.176087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   25.176205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.176320] page_type: f5(slab)
[   25.176408] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.176529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.176623] page dumped because: kasan: bad access detected
[   25.176716] 
[   25.176762] Memory state around the buggy address:
[   25.176856]  fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.176961]  fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.177060] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   25.177156]                                            ^
[   25.177232]  fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.177347]  fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.180649] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   25.093067] ==================================================================
[   25.093273] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   25.093703] Read of size 1 at addr fff00000c77e79a8 by task kunit_try_catch/189
[   25.093856] 
[   25.093983] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.094191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.094320] Hardware name: linux,dummy-virt (DT)
[   25.094404] Call trace:
[   25.094521]  show_stack+0x20/0x38 (C)
[   25.094657]  dump_stack_lvl+0x8c/0xd0
[   25.094886]  print_report+0x118/0x608
[   25.095022]  kasan_report+0xdc/0x128
[   25.095190]  __asan_report_load1_noabort+0x20/0x30
[   25.095349]  kmalloc_uaf2+0x3f4/0x468
[   25.095463]  kunit_try_run_case+0x170/0x3f0
[   25.095631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.095809]  kthread+0x328/0x630
[   25.095981]  ret_from_fork+0x10/0x20
[   25.096113] 
[   25.096237] Allocated by task 189:
[   25.096380]  kasan_save_stack+0x3c/0x68
[   25.096521]  kasan_save_track+0x20/0x40
[   25.097398]  kasan_save_alloc_info+0x40/0x58
[   25.097907]  __kasan_kmalloc+0xd4/0xd8
[   25.098223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.098333]  kmalloc_uaf2+0xc4/0x468
[   25.098508]  kunit_try_run_case+0x170/0x3f0
[   25.099234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.099393]  kthread+0x328/0x630
[   25.099722]  ret_from_fork+0x10/0x20
[   25.100200] 
[   25.100252] Freed by task 189:
[   25.100321]  kasan_save_stack+0x3c/0x68
[   25.100422]  kasan_save_track+0x20/0x40
[   25.100518]  kasan_save_free_info+0x4c/0x78
[   25.100611]  __kasan_slab_free+0x6c/0x98
[   25.100721]  kfree+0x214/0x3c8
[   25.100823]  kmalloc_uaf2+0x134/0x468
[   25.101080]  kunit_try_run_case+0x170/0x3f0
[   25.101209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.101327]  kthread+0x328/0x630
[   25.101413]  ret_from_fork+0x10/0x20
[   25.101535] 
[   25.101664] The buggy address belongs to the object at fff00000c77e7980
[   25.101664]  which belongs to the cache kmalloc-64 of size 64
[   25.101823] The buggy address is located 40 bytes inside of
[   25.101823]  freed 64-byte region [fff00000c77e7980, fff00000c77e79c0)
[   25.102936] 
[   25.102996] The buggy address belongs to the physical page:
[   25.103097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7
[   25.103289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.103407] page_type: f5(slab)
[   25.103509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.103983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.104105] page dumped because: kasan: bad access detected
[   25.104265] 
[   25.104317] Memory state around the buggy address:
[   25.104444]  fff00000c77e7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.104581]  fff00000c77e7900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.104723] >fff00000c77e7980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.105225]                                   ^
[   25.105361]  fff00000c77e7a00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   25.105474]  fff00000c77e7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.105566] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   25.048697] ==================================================================
[   25.048851] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   25.049085] Write of size 33 at addr fff00000c77e7800 by task kunit_try_catch/187
[   25.049290] 
[   25.049400] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.049620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.049702] Hardware name: linux,dummy-virt (DT)
[   25.049775] Call trace:
[   25.049830]  show_stack+0x20/0x38 (C)
[   25.049954]  dump_stack_lvl+0x8c/0xd0
[   25.050079]  print_report+0x118/0x608
[   25.050194]  kasan_report+0xdc/0x128
[   25.050713]  kasan_check_range+0x100/0x1a8
[   25.051119]  __asan_memset+0x34/0x78
[   25.051487]  kmalloc_uaf_memset+0x170/0x310
[   25.051645]  kunit_try_run_case+0x170/0x3f0
[   25.051927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.052321]  kthread+0x328/0x630
[   25.052459]  ret_from_fork+0x10/0x20
[   25.052936] 
[   25.053119] Allocated by task 187:
[   25.053213]  kasan_save_stack+0x3c/0x68
[   25.053645]  kasan_save_track+0x20/0x40
[   25.054059]  kasan_save_alloc_info+0x40/0x58
[   25.054267]  __kasan_kmalloc+0xd4/0xd8
[   25.054410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.054631]  kmalloc_uaf_memset+0xb8/0x310
[   25.054768]  kunit_try_run_case+0x170/0x3f0
[   25.054875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.055052]  kthread+0x328/0x630
[   25.055147]  ret_from_fork+0x10/0x20
[   25.055238] 
[   25.055291] Freed by task 187:
[   25.055561]  kasan_save_stack+0x3c/0x68
[   25.055673]  kasan_save_track+0x20/0x40
[   25.055802]  kasan_save_free_info+0x4c/0x78
[   25.056034]  __kasan_slab_free+0x6c/0x98
[   25.056482]  kfree+0x214/0x3c8
[   25.056720]  kmalloc_uaf_memset+0x11c/0x310
[   25.056818]  kunit_try_run_case+0x170/0x3f0
[   25.056907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.057017]  kthread+0x328/0x630
[   25.057113]  ret_from_fork+0x10/0x20
[   25.057376] 
[   25.057423] The buggy address belongs to the object at fff00000c77e7800
[   25.057423]  which belongs to the cache kmalloc-64 of size 64
[   25.057735] The buggy address is located 0 bytes inside of
[   25.057735]  freed 64-byte region [fff00000c77e7800, fff00000c77e7840)
[   25.057893] 
[   25.057942] The buggy address belongs to the physical page:
[   25.058018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7
[   25.058493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.058725] page_type: f5(slab)
[   25.058830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.058957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.059323] page dumped because: kasan: bad access detected
[   25.059528] 
[   25.059572] Memory state around the buggy address:
[   25.059649]  fff00000c77e7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.059832]  fff00000c77e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.059938] >fff00000c77e7800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.060029]                    ^
[   25.060095]  fff00000c77e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.060248]  fff00000c77e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.060415] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   25.008916] ==================================================================
[   25.009037] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   25.009154] Read of size 1 at addr fff00000c5ed4d28 by task kunit_try_catch/185
[   25.009284] 
[   25.009357] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.009550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.009613] Hardware name: linux,dummy-virt (DT)
[   25.009709] Call trace:
[   25.009782]  show_stack+0x20/0x38 (C)
[   25.010227]  dump_stack_lvl+0x8c/0xd0
[   25.010770]  print_report+0x118/0x608
[   25.011436]  kasan_report+0xdc/0x128
[   25.011608]  __asan_report_load1_noabort+0x20/0x30
[   25.011754]  kmalloc_uaf+0x300/0x338
[   25.011868]  kunit_try_run_case+0x170/0x3f0
[   25.012041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.012193]  kthread+0x328/0x630
[   25.012312]  ret_from_fork+0x10/0x20
[   25.012744] 
[   25.012796] Allocated by task 185:
[   25.013263]  kasan_save_stack+0x3c/0x68
[   25.013374]  kasan_save_track+0x20/0x40
[   25.013471]  kasan_save_alloc_info+0x40/0x58
[   25.013563]  __kasan_kmalloc+0xd4/0xd8
[   25.013887]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.014138]  kmalloc_uaf+0xb8/0x338
[   25.014282]  kunit_try_run_case+0x170/0x3f0
[   25.014389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.014552]  kthread+0x328/0x630
[   25.014768]  ret_from_fork+0x10/0x20
[   25.015271] 
[   25.015356] Freed by task 185:
[   25.015427]  kasan_save_stack+0x3c/0x68
[   25.015540]  kasan_save_track+0x20/0x40
[   25.015716]  kasan_save_free_info+0x4c/0x78
[   25.015997]  __kasan_slab_free+0x6c/0x98
[   25.016275]  kfree+0x214/0x3c8
[   25.016368]  kmalloc_uaf+0x11c/0x338
[   25.016459]  kunit_try_run_case+0x170/0x3f0
[   25.016567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.016769]  kthread+0x328/0x630
[   25.016877]  ret_from_fork+0x10/0x20
[   25.017445] 
[   25.017574] The buggy address belongs to the object at fff00000c5ed4d20
[   25.017574]  which belongs to the cache kmalloc-16 of size 16
[   25.017958] The buggy address is located 8 bytes inside of
[   25.017958]  freed 16-byte region [fff00000c5ed4d20, fff00000c5ed4d30)
[   25.018117] 
[   25.018173] The buggy address belongs to the physical page:
[   25.018246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   25.018390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.018929] page_type: f5(slab)
[   25.019118] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.019251] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.019735] page dumped because: kasan: bad access detected
[   25.019883] 
[   25.019941] Memory state around the buggy address:
[   25.020050]  fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.020335]  fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.020444] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   25.020539]                                   ^
[   25.020628]  fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.020811]  fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.020997] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   24.984598] ==================================================================
[   24.984736] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   24.984873] Read of size 64 at addr fff00000c77e7504 by task kunit_try_catch/183
[   24.984989] 
[   24.985078] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.985721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.985815] Hardware name: linux,dummy-virt (DT)
[   24.985893] Call trace:
[   24.986454]  show_stack+0x20/0x38 (C)
[   24.986589]  dump_stack_lvl+0x8c/0xd0
[   24.986946]  print_report+0x118/0x608
[   24.987121]  kasan_report+0xdc/0x128
[   24.987521]  kasan_check_range+0x100/0x1a8
[   24.987767]  __asan_memmove+0x3c/0x98
[   24.987933]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   24.988068]  kunit_try_run_case+0x170/0x3f0
[   24.988204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.988559]  kthread+0x328/0x630
[   24.988723]  ret_from_fork+0x10/0x20
[   24.988852] 
[   24.988972] Allocated by task 183:
[   24.989043]  kasan_save_stack+0x3c/0x68
[   24.989144]  kasan_save_track+0x20/0x40
[   24.989237]  kasan_save_alloc_info+0x40/0x58
[   24.989383]  __kasan_kmalloc+0xd4/0xd8
[   24.989631]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.989764]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   24.989886]  kunit_try_run_case+0x170/0x3f0
[   24.990002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.990383]  kthread+0x328/0x630
[   24.990489]  ret_from_fork+0x10/0x20
[   24.990595] 
[   24.990785] The buggy address belongs to the object at fff00000c77e7500
[   24.990785]  which belongs to the cache kmalloc-64 of size 64
[   24.990978] The buggy address is located 4 bytes inside of
[   24.990978]  allocated 64-byte region [fff00000c77e7500, fff00000c77e7540)
[   24.991274] 
[   24.991374] The buggy address belongs to the physical page:
[   24.991587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7
[   24.991743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.991866] page_type: f5(slab)
[   24.992398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.992531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.992859] page dumped because: kasan: bad access detected
[   24.993296] 
[   24.993594] Memory state around the buggy address:
[   24.993760]  fff00000c77e7400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.994315]  fff00000c77e7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.994663] >fff00000c77e7500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.994779]                                            ^
[   24.994881]  fff00000c77e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.995034]  fff00000c77e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.995344] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   24.949112] ==================================================================
[   24.949350] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   24.949533] Read of size 18446744073709551614 at addr fff00000c77e7384 by task kunit_try_catch/181
[   24.949750] 
[   24.949842] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.950046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.950111] Hardware name: linux,dummy-virt (DT)
[   24.950189] Call trace:
[   24.950277]  show_stack+0x20/0x38 (C)
[   24.950489]  dump_stack_lvl+0x8c/0xd0
[   24.950623]  print_report+0x118/0x608
[   24.950837]  kasan_report+0xdc/0x128
[   24.951279]  kasan_check_range+0x100/0x1a8
[   24.951422]  __asan_memmove+0x3c/0x98
[   24.951530]  kmalloc_memmove_negative_size+0x154/0x2e0
[   24.951648]  kunit_try_run_case+0x170/0x3f0
[   24.952210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.953168]  kthread+0x328/0x630
[   24.953903]  ret_from_fork+0x10/0x20
[   24.954028] 
[   24.954073] Allocated by task 181:
[   24.954868]  kasan_save_stack+0x3c/0x68
[   24.955122]  kasan_save_track+0x20/0x40
[   24.955253]  kasan_save_alloc_info+0x40/0x58
[   24.955366]  __kasan_kmalloc+0xd4/0xd8
[   24.955563]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.955936]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   24.956040]  kunit_try_run_case+0x170/0x3f0
[   24.956518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.957669]  kthread+0x328/0x630
[   24.958375]  ret_from_fork+0x10/0x20
[   24.959180] 
[   24.959244] The buggy address belongs to the object at fff00000c77e7380
[   24.959244]  which belongs to the cache kmalloc-64 of size 64
[   24.959372] The buggy address is located 4 bytes inside of
[   24.959372]  64-byte region [fff00000c77e7380, fff00000c77e73c0)
[   24.959530] 
[   24.959582] The buggy address belongs to the physical page:
[   24.959862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7
[   24.960401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.960523] page_type: f5(slab)
[   24.960721] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.961023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.961146] page dumped because: kasan: bad access detected
[   24.961263] 
[   24.961308] Memory state around the buggy address:
[   24.961382]  fff00000c77e7280: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   24.961555]  fff00000c77e7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.961810] >fff00000c77e7380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.961985]                    ^
[   24.962076]  fff00000c77e7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.962445]  fff00000c77e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.962583] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   24.911070] ==================================================================
[   24.911345] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   24.911485] Write of size 16 at addr fff00000c77e8169 by task kunit_try_catch/179
[   24.911601] 
[   24.911824] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.912578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.912644] Hardware name: linux,dummy-virt (DT)
[   24.912735] Call trace:
[   24.913439]  show_stack+0x20/0x38 (C)
[   24.914085]  dump_stack_lvl+0x8c/0xd0
[   24.914269]  print_report+0x118/0x608
[   24.914385]  kasan_report+0xdc/0x128
[   24.914773]  kasan_check_range+0x100/0x1a8
[   24.914931]  __asan_memset+0x34/0x78
[   24.915058]  kmalloc_oob_memset_16+0x150/0x2f8
[   24.915534]  kunit_try_run_case+0x170/0x3f0
[   24.915972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.916671]  kthread+0x328/0x630
[   24.917103]  ret_from_fork+0x10/0x20
[   24.917277] 
[   24.917425] Allocated by task 179:
[   24.917807]  kasan_save_stack+0x3c/0x68
[   24.917912]  kasan_save_track+0x20/0x40
[   24.918005]  kasan_save_alloc_info+0x40/0x58
[   24.918497]  __kasan_kmalloc+0xd4/0xd8
[   24.918786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.919490]  kmalloc_oob_memset_16+0xb0/0x2f8
[   24.919643]  kunit_try_run_case+0x170/0x3f0
[   24.919758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.919863]  kthread+0x328/0x630
[   24.919953]  ret_from_fork+0x10/0x20
[   24.920049] 
[   24.920493] The buggy address belongs to the object at fff00000c77e8100
[   24.920493]  which belongs to the cache kmalloc-128 of size 128
[   24.921583] The buggy address is located 105 bytes inside of
[   24.921583]  allocated 120-byte region [fff00000c77e8100, fff00000c77e8178)
[   24.921765] 
[   24.921825] The buggy address belongs to the physical page:
[   24.921917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   24.922266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.922430] page_type: f5(slab)
[   24.923029] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.923163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.923745] page dumped because: kasan: bad access detected
[   24.923818] 
[   24.923861] Memory state around the buggy address:
[   24.923937]  fff00000c77e8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.924232]  fff00000c77e8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.924695] >fff00000c77e8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.924803]                                                                 ^
[   24.924913]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.925013]  fff00000c77e8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.925135] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   24.852074] ==================================================================
[   24.852200] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   24.852327] Write of size 8 at addr fff00000c77e8071 by task kunit_try_catch/177
[   24.852438] 
[   24.852515] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.855998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.856778] Hardware name: linux,dummy-virt (DT)
[   24.856870] Call trace:
[   24.856932]  show_stack+0x20/0x38 (C)
[   24.857074]  dump_stack_lvl+0x8c/0xd0
[   24.857209]  print_report+0x118/0x608
[   24.857345]  kasan_report+0xdc/0x128
[   24.857468]  kasan_check_range+0x100/0x1a8
[   24.857585]  __asan_memset+0x34/0x78
[   24.857716]  kmalloc_oob_memset_8+0x150/0x2f8
[   24.857847]  kunit_try_run_case+0x170/0x3f0
[   24.857969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.858090]  kthread+0x328/0x630
[   24.858200]  ret_from_fork+0x10/0x20
[   24.858324] 
[   24.858375] Allocated by task 177:
[   24.858446]  kasan_save_stack+0x3c/0x68
[   24.858553]  kasan_save_track+0x20/0x40
[   24.861166]  kasan_save_alloc_info+0x40/0x58
[   24.861548]  __kasan_kmalloc+0xd4/0xd8
[   24.862389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.862714]  kmalloc_oob_memset_8+0xb0/0x2f8
[   24.862846]  kunit_try_run_case+0x170/0x3f0
[   24.863061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.863177]  kthread+0x328/0x630
[   24.863493]  ret_from_fork+0x10/0x20
[   24.863597] 
[   24.863886] The buggy address belongs to the object at fff00000c77e8000
[   24.863886]  which belongs to the cache kmalloc-128 of size 128
[   24.864147] The buggy address is located 113 bytes inside of
[   24.864147]  allocated 120-byte region [fff00000c77e8000, fff00000c77e8078)
[   24.864287] 
[   24.864334] The buggy address belongs to the physical page:
[   24.864403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   24.864526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.864645] page_type: f5(slab)
[   24.864765] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.864880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.864971] page dumped because: kasan: bad access detected
[   24.866174] 
[   24.866230] Memory state around the buggy address:
[   24.866332]  fff00000c77e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.866448]  fff00000c77e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.867427] >fff00000c77e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.867525]                                                                 ^
[   24.867624]  fff00000c77e8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.868871]  fff00000c77e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.868973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   24.819982] ==================================================================
[   24.820095] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   24.820216] Write of size 4 at addr fff00000c5eeef75 by task kunit_try_catch/175
[   24.820326] 
[   24.820396] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.820587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.820647] Hardware name: linux,dummy-virt (DT)
[   24.821187] Call trace:
[   24.821431]  show_stack+0x20/0x38 (C)
[   24.822429]  dump_stack_lvl+0x8c/0xd0
[   24.822990]  print_report+0x118/0x608
[   24.823804]  kasan_report+0xdc/0x128
[   24.824585]  kasan_check_range+0x100/0x1a8
[   24.824757]  __asan_memset+0x34/0x78
[   24.824883]  kmalloc_oob_memset_4+0x150/0x300
[   24.825182]  kunit_try_run_case+0x170/0x3f0
[   24.825458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.826055]  kthread+0x328/0x630
[   24.826406]  ret_from_fork+0x10/0x20
[   24.826784] 
[   24.826840] Allocated by task 175:
[   24.827373]  kasan_save_stack+0x3c/0x68
[   24.827558]  kasan_save_track+0x20/0x40
[   24.828029]  kasan_save_alloc_info+0x40/0x58
[   24.828159]  __kasan_kmalloc+0xd4/0xd8
[   24.828282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.828667]  kmalloc_oob_memset_4+0xb0/0x300
[   24.829085]  kunit_try_run_case+0x170/0x3f0
[   24.829185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.829668]  kthread+0x328/0x630
[   24.829985]  ret_from_fork+0x10/0x20
[   24.830393] 
[   24.830805] The buggy address belongs to the object at fff00000c5eeef00
[   24.830805]  which belongs to the cache kmalloc-128 of size 128
[   24.830939] The buggy address is located 117 bytes inside of
[   24.830939]  allocated 120-byte region [fff00000c5eeef00, fff00000c5eeef78)
[   24.831473] 
[   24.831534] The buggy address belongs to the physical page:
[   24.831928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.832440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.832560] page_type: f5(slab)
[   24.832888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.833284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.833780] page dumped because: kasan: bad access detected
[   24.833932] 
[   24.834201] Memory state around the buggy address:
[   24.834281]  fff00000c5eeee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.834875]  fff00000c5eeee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.835008] >fff00000c5eeef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.835092]                                                                 ^
[   24.835144]  fff00000c5eeef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.835195]  fff00000c5eef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.835260] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   24.789385] ==================================================================
[   24.789511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   24.789637] Write of size 2 at addr fff00000c5eeee77 by task kunit_try_catch/173
[   24.789769] 
[   24.789849] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.790043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.790105] Hardware name: linux,dummy-virt (DT)
[   24.790173] Call trace:
[   24.790224]  show_stack+0x20/0x38 (C)
[   24.790340]  dump_stack_lvl+0x8c/0xd0
[   24.790460]  print_report+0x118/0x608
[   24.791484]  kasan_report+0xdc/0x128
[   24.791802]  kasan_check_range+0x100/0x1a8
[   24.793779]  __asan_memset+0x34/0x78
[   24.793908]  kmalloc_oob_memset_2+0x150/0x2f8
[   24.794041]  kunit_try_run_case+0x170/0x3f0
[   24.794180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.794325]  kthread+0x328/0x630
[   24.794455]  ret_from_fork+0x10/0x20
[   24.794721] 
[   24.794777] Allocated by task 173:
[   24.795310]  kasan_save_stack+0x3c/0x68
[   24.795505]  kasan_save_track+0x20/0x40
[   24.795693]  kasan_save_alloc_info+0x40/0x58
[   24.796421]  __kasan_kmalloc+0xd4/0xd8
[   24.796521]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.796620]  kmalloc_oob_memset_2+0xb0/0x2f8
[   24.797277]  kunit_try_run_case+0x170/0x3f0
[   24.797400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.797518]  kthread+0x328/0x630
[   24.797609]  ret_from_fork+0x10/0x20
[   24.798503] 
[   24.798564] The buggy address belongs to the object at fff00000c5eeee00
[   24.798564]  which belongs to the cache kmalloc-128 of size 128
[   24.798793] The buggy address is located 119 bytes inside of
[   24.798793]  allocated 120-byte region [fff00000c5eeee00, fff00000c5eeee78)
[   24.798936] 
[   24.798989] The buggy address belongs to the physical page:
[   24.799329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.800228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.800609] page_type: f5(slab)
[   24.801152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.801293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.801397] page dumped because: kasan: bad access detected
[   24.801472] 
[   24.801799] Memory state around the buggy address:
[   24.802624]  fff00000c5eeed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.802921]  fff00000c5eeed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803137] >fff00000c5eeee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.803257]                                                                 ^
[   24.803516]  fff00000c5eeee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803754]  fff00000c5eeef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.803842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.750704] ==================================================================
[   24.750831] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   24.750977] Write of size 128 at addr fff00000c5eeed00 by task kunit_try_catch/171
[   24.751277] 
[   24.751363] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.751804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.751886] Hardware name: linux,dummy-virt (DT)
[   24.751972] Call trace:
[   24.752116]  show_stack+0x20/0x38 (C)
[   24.752240]  dump_stack_lvl+0x8c/0xd0
[   24.752357]  print_report+0x118/0x608
[   24.752471]  kasan_report+0xdc/0x128
[   24.752633]  kasan_check_range+0x100/0x1a8
[   24.752793]  __asan_memset+0x34/0x78
[   24.753011]  kmalloc_oob_in_memset+0x144/0x2d0
[   24.753135]  kunit_try_run_case+0x170/0x3f0
[   24.753319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.753523]  kthread+0x328/0x630
[   24.753659]  ret_from_fork+0x10/0x20
[   24.753869] 
[   24.753974] Allocated by task 171:
[   24.754313]  kasan_save_stack+0x3c/0x68
[   24.754637]  kasan_save_track+0x20/0x40
[   24.755139]  kasan_save_alloc_info+0x40/0x58
[   24.755429]  __kasan_kmalloc+0xd4/0xd8
[   24.755525]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.756394]  kmalloc_oob_in_memset+0xb0/0x2d0
[   24.756502]  kunit_try_run_case+0x170/0x3f0
[   24.757413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.757549]  kthread+0x328/0x630
[   24.757852]  ret_from_fork+0x10/0x20
[   24.758497] 
[   24.758551] The buggy address belongs to the object at fff00000c5eeed00
[   24.758551]  which belongs to the cache kmalloc-128 of size 128
[   24.759127] The buggy address is located 0 bytes inside of
[   24.759127]  allocated 120-byte region [fff00000c5eeed00, fff00000c5eeed78)
[   24.759989] 
[   24.760045] The buggy address belongs to the physical page:
[   24.760120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.761102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.761274] page_type: f5(slab)
[   24.761371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.761485] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.761575] page dumped because: kasan: bad access detected
[   24.762280] 
[   24.762897] Memory state around the buggy address:
[   24.763340]  fff00000c5eeec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.763444]  fff00000c5eeec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.763870] >fff00000c5eeed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.763970]                                                                 ^
[   24.764084]  fff00000c5eeed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.765471]  fff00000c5eeee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.765790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   24.720416] ==================================================================
[   24.720539] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   24.720711] Read of size 16 at addr fff00000c5ed4d00 by task kunit_try_catch/169
[   24.720868] 
[   24.720977] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.721326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.721433] Hardware name: linux,dummy-virt (DT)
[   24.721509] Call trace:
[   24.721565]  show_stack+0x20/0x38 (C)
[   24.721708]  dump_stack_lvl+0x8c/0xd0
[   24.721845]  print_report+0x118/0x608
[   24.722184]  kasan_report+0xdc/0x128
[   24.722304]  __asan_report_load16_noabort+0x20/0x30
[   24.722423]  kmalloc_uaf_16+0x3bc/0x438
[   24.722539]  kunit_try_run_case+0x170/0x3f0
[   24.722747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.722988]  kthread+0x328/0x630
[   24.723206]  ret_from_fork+0x10/0x20
[   24.723342] 
[   24.723414] Allocated by task 169:
[   24.723488]  kasan_save_stack+0x3c/0x68
[   24.723595]  kasan_save_track+0x20/0x40
[   24.723822]  kasan_save_alloc_info+0x40/0x58
[   24.723922]  __kasan_kmalloc+0xd4/0xd8
[   24.724055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.724270]  kmalloc_uaf_16+0x140/0x438
[   24.724420]  kunit_try_run_case+0x170/0x3f0
[   24.724527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.724805]  kthread+0x328/0x630
[   24.724958]  ret_from_fork+0x10/0x20
[   24.725058] 
[   24.725192] Freed by task 169:
[   24.725385]  kasan_save_stack+0x3c/0x68
[   24.725631]  kasan_save_track+0x20/0x40
[   24.725751]  kasan_save_free_info+0x4c/0x78
[   24.725857]  __kasan_slab_free+0x6c/0x98
[   24.725966]  kfree+0x214/0x3c8
[   24.726066]  kmalloc_uaf_16+0x190/0x438
[   24.726276]  kunit_try_run_case+0x170/0x3f0
[   24.726389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.726511]  kthread+0x328/0x630
[   24.726730]  ret_from_fork+0x10/0x20
[   24.726848] 
[   24.727235] The buggy address belongs to the object at fff00000c5ed4d00
[   24.727235]  which belongs to the cache kmalloc-16 of size 16
[   24.727373] The buggy address is located 0 bytes inside of
[   24.727373]  freed 16-byte region [fff00000c5ed4d00, fff00000c5ed4d10)
[   24.727760] 
[   24.727976] The buggy address belongs to the physical page:
[   24.728142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   24.728294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.728415] page_type: f5(slab)
[   24.728507] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.728622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.728735] page dumped because: kasan: bad access detected
[   24.730463] 
[   24.730621] Memory state around the buggy address:
[   24.730766]  fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   24.731021]  fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   24.733212] >fff00000c5ed4d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.733329]                    ^
[   24.733403]  fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.733507]  fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.733593] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   24.701261] ==================================================================
[   24.701390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   24.701505] Write of size 16 at addr fff00000c5ed4ca0 by task kunit_try_catch/167
[   24.701617] 
[   24.701713] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.701928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.702003] Hardware name: linux,dummy-virt (DT)
[   24.702123] Call trace:
[   24.702186]  show_stack+0x20/0x38 (C)
[   24.702327]  dump_stack_lvl+0x8c/0xd0
[   24.702466]  print_report+0x118/0x608
[   24.702745]  kasan_report+0xdc/0x128
[   24.702878]  __asan_report_store16_noabort+0x20/0x30
[   24.703015]  kmalloc_oob_16+0x3a0/0x3f8
[   24.703230]  kunit_try_run_case+0x170/0x3f0
[   24.703382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703526]  kthread+0x328/0x630
[   24.703774]  ret_from_fork+0x10/0x20
[   24.703950] 
[   24.704020] Allocated by task 167:
[   24.704186]  kasan_save_stack+0x3c/0x68
[   24.704338]  kasan_save_track+0x20/0x40
[   24.704434]  kasan_save_alloc_info+0x40/0x58
[   24.704697]  __kasan_kmalloc+0xd4/0xd8
[   24.704793]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.704920]  kmalloc_oob_16+0xb4/0x3f8
[   24.705142]  kunit_try_run_case+0x170/0x3f0
[   24.705284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.705448]  kthread+0x328/0x630
[   24.706002]  ret_from_fork+0x10/0x20
[   24.706121] 
[   24.706175] The buggy address belongs to the object at fff00000c5ed4ca0
[   24.706175]  which belongs to the cache kmalloc-16 of size 16
[   24.706317] The buggy address is located 0 bytes inside of
[   24.706317]  allocated 13-byte region [fff00000c5ed4ca0, fff00000c5ed4cad)
[   24.706466] 
[   24.706526] The buggy address belongs to the physical page:
[   24.706780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   24.706906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.707041] page_type: f5(slab)
[   24.707176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.707403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.707501] page dumped because: kasan: bad access detected
[   24.707572] 
[   24.707662] Memory state around the buggy address:
[   24.707828]  fff00000c5ed4b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.707930]  fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   24.708135] >fff00000c5ed4c80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   24.708227]                                   ^
[   24.708302]  fff00000c5ed4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.708445]  fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.708563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   24.671288] ==================================================================
[   24.671546] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   24.671673] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165
[   24.671804] 
[   24.671880] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.672195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.672351] Hardware name: linux,dummy-virt (DT)
[   24.672739] Call trace:
[   24.672843]  show_stack+0x20/0x38 (C)
[   24.672973]  dump_stack_lvl+0x8c/0xd0
[   24.673096]  print_report+0x118/0x608
[   24.673208]  kasan_report+0xdc/0x128
[   24.673336]  __asan_report_load1_noabort+0x20/0x30
[   24.673456]  krealloc_uaf+0x4c8/0x520
[   24.673566]  kunit_try_run_case+0x170/0x3f0
[   24.673704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.673847]  kthread+0x328/0x630
[   24.674163]  ret_from_fork+0x10/0x20
[   24.674414] 
[   24.674459] Allocated by task 165:
[   24.674620]  kasan_save_stack+0x3c/0x68
[   24.674802]  kasan_save_track+0x20/0x40
[   24.674912]  kasan_save_alloc_info+0x40/0x58
[   24.675021]  __kasan_kmalloc+0xd4/0xd8
[   24.675397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.675828]  krealloc_uaf+0xc8/0x520
[   24.676100]  kunit_try_run_case+0x170/0x3f0
[   24.676459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.676664]  kthread+0x328/0x630
[   24.676773]  ret_from_fork+0x10/0x20
[   24.676869] 
[   24.676917] Freed by task 165:
[   24.677031]  kasan_save_stack+0x3c/0x68
[   24.677180]  kasan_save_track+0x20/0x40
[   24.677296]  kasan_save_free_info+0x4c/0x78
[   24.677630]  __kasan_slab_free+0x6c/0x98
[   24.677949]  kfree+0x214/0x3c8
[   24.678072]  krealloc_uaf+0x12c/0x520
[   24.678323]  kunit_try_run_case+0x170/0x3f0
[   24.678452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.678733]  kthread+0x328/0x630
[   24.678825]  ret_from_fork+0x10/0x20
[   24.678925] 
[   24.678975] The buggy address belongs to the object at fff00000c5fb2200
[   24.678975]  which belongs to the cache kmalloc-256 of size 256
[   24.679159] The buggy address is located 0 bytes inside of
[   24.679159]  freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300)
[   24.679525] 
[   24.679643] The buggy address belongs to the physical page:
[   24.679848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.680004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.680142] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.680296] page_type: f5(slab)
[   24.680467] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.680610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.680795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.681328] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.681558] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.682067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.682167] page dumped because: kasan: bad access detected
[   24.682238] 
[   24.682401] Memory state around the buggy address:
[   24.682505]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.682615]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.682820] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.683017]                    ^
[   24.683160]  fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.683265]  fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.683998] ==================================================================
[   24.649809] ==================================================================
[   24.650275] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   24.650556] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165
[   24.650750] 
[   24.650838] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.651155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.651231] Hardware name: linux,dummy-virt (DT)
[   24.651313] Call trace:
[   24.651376]  show_stack+0x20/0x38 (C)
[   24.651646]  dump_stack_lvl+0x8c/0xd0
[   24.652276]  print_report+0x118/0x608
[   24.652399]  kasan_report+0xdc/0x128
[   24.652650]  __kasan_check_byte+0x54/0x70
[   24.652789]  krealloc_noprof+0x44/0x360
[   24.652962]  krealloc_uaf+0x180/0x520
[   24.653088]  kunit_try_run_case+0x170/0x3f0
[   24.653440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.653581]  kthread+0x328/0x630
[   24.653759]  ret_from_fork+0x10/0x20
[   24.654008] 
[   24.654110] Allocated by task 165:
[   24.654243]  kasan_save_stack+0x3c/0x68
[   24.654346]  kasan_save_track+0x20/0x40
[   24.654443]  kasan_save_alloc_info+0x40/0x58
[   24.654534]  __kasan_kmalloc+0xd4/0xd8
[   24.654623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.654943]  krealloc_uaf+0xc8/0x520
[   24.655061]  kunit_try_run_case+0x170/0x3f0
[   24.655174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.655297]  kthread+0x328/0x630
[   24.655403]  ret_from_fork+0x10/0x20
[   24.655509] 
[   24.655585] Freed by task 165:
[   24.655726]  kasan_save_stack+0x3c/0x68
[   24.656027]  kasan_save_track+0x20/0x40
[   24.656134]  kasan_save_free_info+0x4c/0x78
[   24.656269]  __kasan_slab_free+0x6c/0x98
[   24.656478]  kfree+0x214/0x3c8
[   24.656600]  krealloc_uaf+0x12c/0x520
[   24.656851]  kunit_try_run_case+0x170/0x3f0
[   24.657013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.657120]  kthread+0x328/0x630
[   24.657209]  ret_from_fork+0x10/0x20
[   24.657360] 
[   24.657544] The buggy address belongs to the object at fff00000c5fb2200
[   24.657544]  which belongs to the cache kmalloc-256 of size 256
[   24.657956] The buggy address is located 0 bytes inside of
[   24.657956]  freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300)
[   24.658485] 
[   24.658547] The buggy address belongs to the physical page:
[   24.658708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.658856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.658962] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.659330] page_type: f5(slab)
[   24.659742] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.660527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.661404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.661986] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.662152] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.662425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.662519] page dumped because: kasan: bad access detected
[   24.663344] 
[   24.663969] Memory state around the buggy address:
[   24.664212]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664621]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664970] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.665338]                    ^
[   24.665413]  fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.666368]  fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.666517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   24.632878] ==================================================================
[   24.633009] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   24.633312] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/163
[   24.633572] 
[   24.633646] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.634098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.634162] Hardware name: linux,dummy-virt (DT)
[   24.634234] Call trace:
[   24.634282]  show_stack+0x20/0x38 (C)
[   24.634394]  dump_stack_lvl+0x8c/0xd0
[   24.634505]  print_report+0x118/0x608
[   24.634627]  kasan_report+0xdc/0x128
[   24.634762]  __asan_report_store1_noabort+0x20/0x30
[   24.634939]  krealloc_less_oob_helper+0xa58/0xc50
[   24.635174]  krealloc_large_less_oob+0x20/0x38
[   24.635314]  kunit_try_run_case+0x170/0x3f0
[   24.635462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.635600]  kthread+0x328/0x630
[   24.635739]  ret_from_fork+0x10/0x20
[   24.636050] 
[   24.636102] The buggy address belongs to the physical page:
[   24.636173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.636295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.636412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.636533] page_type: f8(unknown)
[   24.636621] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.636756] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.636871] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.636981] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.637096] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.637210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.637329] page dumped because: kasan: bad access detected
[   24.637415] 
[   24.637519] Memory state around the buggy address:
[   24.637632]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.637765]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.637976] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.638077]                                                           ^
[   24.638186]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.638360]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.638487] ==================================================================
[   24.495738] ==================================================================
[   24.495908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   24.496080] Write of size 1 at addr fff00000c5fb20eb by task kunit_try_catch/159
[   24.496209] 
[   24.496281] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.496569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.496720] Hardware name: linux,dummy-virt (DT)
[   24.496809] Call trace:
[   24.497118]  show_stack+0x20/0x38 (C)
[   24.497261]  dump_stack_lvl+0x8c/0xd0
[   24.497415]  print_report+0x118/0x608
[   24.497629]  kasan_report+0xdc/0x128
[   24.497775]  __asan_report_store1_noabort+0x20/0x30
[   24.497995]  krealloc_less_oob_helper+0xa58/0xc50
[   24.498130]  krealloc_less_oob+0x20/0x38
[   24.498249]  kunit_try_run_case+0x170/0x3f0
[   24.498372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.498503]  kthread+0x328/0x630
[   24.498608]  ret_from_fork+0x10/0x20
[   24.498771] 
[   24.498934] Allocated by task 159:
[   24.499095]  kasan_save_stack+0x3c/0x68
[   24.499211]  kasan_save_track+0x20/0x40
[   24.499324]  kasan_save_alloc_info+0x40/0x58
[   24.499528]  __kasan_krealloc+0x118/0x178
[   24.499643]  krealloc_noprof+0x128/0x360
[   24.499769]  krealloc_less_oob_helper+0x168/0xc50
[   24.499915]  krealloc_less_oob+0x20/0x38
[   24.500038]  kunit_try_run_case+0x170/0x3f0
[   24.500234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.500400]  kthread+0x328/0x630
[   24.500516]  ret_from_fork+0x10/0x20
[   24.500841] 
[   24.500895] The buggy address belongs to the object at fff00000c5fb2000
[   24.500895]  which belongs to the cache kmalloc-256 of size 256
[   24.501104] The buggy address is located 34 bytes to the right of
[   24.501104]  allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9)
[   24.501458] 
[   24.501509] The buggy address belongs to the physical page:
[   24.501578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.501715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.501828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.501975] page_type: f5(slab)
[   24.502228] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.502366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.502520] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.502635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.502781] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.503192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.503301] page dumped because: kasan: bad access detected
[   24.503384] 
[   24.503434] Memory state around the buggy address:
[   24.503516]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.503625]  fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.503823] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.503918]                                                           ^
[   24.504050]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.504236]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.504335] ==================================================================
[   24.486460] ==================================================================
[   24.486708] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   24.486852] Write of size 1 at addr fff00000c5fb20ea by task kunit_try_catch/159
[   24.487132] 
[   24.487222] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.487414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.487475] Hardware name: linux,dummy-virt (DT)
[   24.487548] Call trace:
[   24.487605]  show_stack+0x20/0x38 (C)
[   24.487775]  dump_stack_lvl+0x8c/0xd0
[   24.487954]  print_report+0x118/0x608
[   24.488095]  kasan_report+0xdc/0x128
[   24.488225]  __asan_report_store1_noabort+0x20/0x30
[   24.488403]  krealloc_less_oob_helper+0xae4/0xc50
[   24.488531]  krealloc_less_oob+0x20/0x38
[   24.488654]  kunit_try_run_case+0x170/0x3f0
[   24.488817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.489055]  kthread+0x328/0x630
[   24.489379]  ret_from_fork+0x10/0x20
[   24.489512] 
[   24.489563] Allocated by task 159:
[   24.489643]  kasan_save_stack+0x3c/0x68
[   24.489777]  kasan_save_track+0x20/0x40
[   24.489888]  kasan_save_alloc_info+0x40/0x58
[   24.490093]  __kasan_krealloc+0x118/0x178
[   24.490360]  krealloc_noprof+0x128/0x360
[   24.490458]  krealloc_less_oob_helper+0x168/0xc50
[   24.490570]  krealloc_less_oob+0x20/0x38
[   24.490844]  kunit_try_run_case+0x170/0x3f0
[   24.490944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.491060]  kthread+0x328/0x630
[   24.491301]  ret_from_fork+0x10/0x20
[   24.491394] 
[   24.491469] The buggy address belongs to the object at fff00000c5fb2000
[   24.491469]  which belongs to the cache kmalloc-256 of size 256
[   24.491652] The buggy address is located 33 bytes to the right of
[   24.491652]  allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9)
[   24.491914] 
[   24.491974] The buggy address belongs to the physical page:
[   24.492055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.492189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.492316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.492447] page_type: f5(slab)
[   24.492537] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.492714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.492856] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.492988] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.493153] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.493302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.493434] page dumped because: kasan: bad access detected
[   24.493577] 
[   24.493632] Memory state around the buggy address:
[   24.493735]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.493836]  fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.493925] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.494013]                                                           ^
[   24.494201]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.494303]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.494389] ==================================================================
[   24.620642] ==================================================================
[   24.621267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   24.621594] Write of size 1 at addr fff00000c77b60ea by task kunit_try_catch/163
[   24.621786] 
[   24.621995] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.622196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.622261] Hardware name: linux,dummy-virt (DT)
[   24.622335] Call trace:
[   24.622383]  show_stack+0x20/0x38 (C)
[   24.622496]  dump_stack_lvl+0x8c/0xd0
[   24.622629]  print_report+0x118/0x608
[   24.622842]  kasan_report+0xdc/0x128
[   24.623612]  __asan_report_store1_noabort+0x20/0x30
[   24.623761]  krealloc_less_oob_helper+0xae4/0xc50
[   24.624220]  krealloc_large_less_oob+0x20/0x38
[   24.624398]  kunit_try_run_case+0x170/0x3f0
[   24.624523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.624670]  kthread+0x328/0x630
[   24.624896]  ret_from_fork+0x10/0x20
[   24.625165] 
[   24.625295] The buggy address belongs to the physical page:
[   24.625378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.625531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.625798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.625976] page_type: f8(unknown)
[   24.626067] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.626179] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.626291] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.626402] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.626516] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.627080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.627331] page dumped because: kasan: bad access detected
[   24.627633] 
[   24.627698] Memory state around the buggy address:
[   24.627777]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.627882]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.629301] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.630149]                                                           ^
[   24.630451]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.630555]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.630646] ==================================================================
[   24.589637] ==================================================================
[   24.589772] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.589890] Write of size 1 at addr fff00000c77b60d0 by task kunit_try_catch/163
[   24.590005] 
[   24.590075] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.593798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.593884] Hardware name: linux,dummy-virt (DT)
[   24.594431] Call trace:
[   24.594494]  show_stack+0x20/0x38 (C)
[   24.594626]  dump_stack_lvl+0x8c/0xd0
[   24.595638]  print_report+0x118/0x608
[   24.595809]  kasan_report+0xdc/0x128
[   24.600167]  __asan_report_store1_noabort+0x20/0x30
[   24.600351]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.600500]  krealloc_large_less_oob+0x20/0x38
[   24.600757]  kunit_try_run_case+0x170/0x3f0
[   24.601060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.601209]  kthread+0x328/0x630
[   24.601337]  ret_from_fork+0x10/0x20
[   24.601475] 
[   24.601534] The buggy address belongs to the physical page:
[   24.601906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.602384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.602559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.602708] page_type: f8(unknown)
[   24.602986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.603185] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.603462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.603656] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.603808] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.604721] page dumped because: kasan: bad access detected
[   24.604834] 
[   24.604887] Memory state around the buggy address:
[   24.605197]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.605319]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.605440] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.605610]                                                  ^
[   24.605749]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.606048]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.606415] ==================================================================
[   24.418631] ==================================================================
[   24.418781] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.418921] Write of size 1 at addr fff00000c5fb20c9 by task kunit_try_catch/159
[   24.419034] 
[   24.419111] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.419302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.419364] Hardware name: linux,dummy-virt (DT)
[   24.419435] Call trace:
[   24.419484]  show_stack+0x20/0x38 (C)
[   24.419605]  dump_stack_lvl+0x8c/0xd0
[   24.420400]  print_report+0x118/0x608
[   24.420533]  kasan_report+0xdc/0x128
[   24.420880]  __asan_report_store1_noabort+0x20/0x30
[   24.421076]  krealloc_less_oob_helper+0xa48/0xc50
[   24.421459]  krealloc_less_oob+0x20/0x38
[   24.421635]  kunit_try_run_case+0x170/0x3f0
[   24.422009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.422211]  kthread+0x328/0x630
[   24.422323]  ret_from_fork+0x10/0x20
[   24.423007] 
[   24.423714] Allocated by task 159:
[   24.423803]  kasan_save_stack+0x3c/0x68
[   24.424264]  kasan_save_track+0x20/0x40
[   24.424831]  kasan_save_alloc_info+0x40/0x58
[   24.425060]  __kasan_krealloc+0x118/0x178
[   24.425668]  krealloc_noprof+0x128/0x360
[   24.425786]  krealloc_less_oob_helper+0x168/0xc50
[   24.426428]  krealloc_less_oob+0x20/0x38
[   24.426761]  kunit_try_run_case+0x170/0x3f0
[   24.427035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.428145]  kthread+0x328/0x630
[   24.428669]  ret_from_fork+0x10/0x20
[   24.429031] 
[   24.429087] The buggy address belongs to the object at fff00000c5fb2000
[   24.429087]  which belongs to the cache kmalloc-256 of size 256
[   24.429219] The buggy address is located 0 bytes to the right of
[   24.429219]  allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9)
[   24.429379] 
[   24.429429] The buggy address belongs to the physical page:
[   24.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.429630] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.429755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.432089] page_type: f5(slab)
[   24.432408] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.432525] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.432929] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.433727] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.433850] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.433966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.435153] page dumped because: kasan: bad access detected
[   24.435409] 
[   24.435456] Memory state around the buggy address:
[   24.435756]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.435969]  fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.436068] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.436153]                                               ^
[   24.437113]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.437219]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.438390] ==================================================================
[   24.445601] ==================================================================
[   24.447255] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.448151] Write of size 1 at addr fff00000c5fb20d0 by task kunit_try_catch/159
[   24.448319] 
[   24.448710] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.448934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.448995] Hardware name: linux,dummy-virt (DT)
[   24.449037] Call trace:
[   24.449064]  show_stack+0x20/0x38 (C)
[   24.449160]  dump_stack_lvl+0x8c/0xd0
[   24.449305]  print_report+0x118/0x608
[   24.449656]  kasan_report+0xdc/0x128
[   24.449905]  __asan_report_store1_noabort+0x20/0x30
[   24.450134]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.450355]  krealloc_less_oob+0x20/0x38
[   24.450506]  kunit_try_run_case+0x170/0x3f0
[   24.450736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.451179]  kthread+0x328/0x630
[   24.451410]  ret_from_fork+0x10/0x20
[   24.451635] 
[   24.451751] Allocated by task 159:
[   24.451837]  kasan_save_stack+0x3c/0x68
[   24.452038]  kasan_save_track+0x20/0x40
[   24.452175]  kasan_save_alloc_info+0x40/0x58
[   24.452362]  __kasan_krealloc+0x118/0x178
[   24.452599]  krealloc_noprof+0x128/0x360
[   24.453324]  krealloc_less_oob_helper+0x168/0xc50
[   24.453432]  krealloc_less_oob+0x20/0x38
[   24.453521]  kunit_try_run_case+0x170/0x3f0
[   24.453610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.453733]  kthread+0x328/0x630
[   24.453832]  ret_from_fork+0x10/0x20
[   24.455032] 
[   24.455113] The buggy address belongs to the object at fff00000c5fb2000
[   24.455113]  which belongs to the cache kmalloc-256 of size 256
[   24.455423] The buggy address is located 7 bytes to the right of
[   24.455423]  allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9)
[   24.455847] 
[   24.455966] The buggy address belongs to the physical page:
[   24.456052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.456180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.456295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.456560] page_type: f5(slab)
[   24.456846] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.457600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.457740] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.458570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.458862] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.459002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.459649] page dumped because: kasan: bad access detected
[   24.459744] 
[   24.459792] Memory state around the buggy address:
[   24.459870]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.459973]  fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.460076] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.461510]                                                  ^
[   24.462047]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462428]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462718] ==================================================================
[   24.464128] ==================================================================
[   24.464443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   24.464570] Write of size 1 at addr fff00000c5fb20da by task kunit_try_catch/159
[   24.464952] 
[   24.465062] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.465270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.465336] Hardware name: linux,dummy-virt (DT)
[   24.465411] Call trace:
[   24.465464]  show_stack+0x20/0x38 (C)
[   24.466165]  dump_stack_lvl+0x8c/0xd0
[   24.466403]  print_report+0x118/0x608
[   24.466667]  kasan_report+0xdc/0x128
[   24.466957]  __asan_report_store1_noabort+0x20/0x30
[   24.467328]  krealloc_less_oob_helper+0xa80/0xc50
[   24.467777]  krealloc_less_oob+0x20/0x38
[   24.467955]  kunit_try_run_case+0x170/0x3f0
[   24.468478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.468621]  kthread+0x328/0x630
[   24.468867]  ret_from_fork+0x10/0x20
[   24.469338] 
[   24.469560] Allocated by task 159:
[   24.469789]  kasan_save_stack+0x3c/0x68
[   24.469969]  kasan_save_track+0x20/0x40
[   24.470232]  kasan_save_alloc_info+0x40/0x58
[   24.470541]  __kasan_krealloc+0x118/0x178
[   24.470745]  krealloc_noprof+0x128/0x360
[   24.470848]  krealloc_less_oob_helper+0x168/0xc50
[   24.470956]  krealloc_less_oob+0x20/0x38
[   24.471423]  kunit_try_run_case+0x170/0x3f0
[   24.472227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.472592]  kthread+0x328/0x630
[   24.472943]  ret_from_fork+0x10/0x20
[   24.473037] 
[   24.473086] The buggy address belongs to the object at fff00000c5fb2000
[   24.473086]  which belongs to the cache kmalloc-256 of size 256
[   24.474159] The buggy address is located 17 bytes to the right of
[   24.474159]  allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9)
[   24.474648] 
[   24.474897] The buggy address belongs to the physical page:
[   24.474980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2
[   24.475744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.476206] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.476390] page_type: f5(slab)
[   24.477409] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.477979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.478352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.478653] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.479411] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff
[   24.479552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.479992] page dumped because: kasan: bad access detected
[   24.480068] 
[   24.481077] Memory state around the buggy address:
[   24.481843]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.482300]  fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.482769] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.483096]                                                     ^
[   24.483731]  fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.484296]  fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.484392] ==================================================================
[   24.608157] ==================================================================
[   24.608835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   24.609170] Write of size 1 at addr fff00000c77b60da by task kunit_try_catch/163
[   24.609876] 
[   24.609962] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.610150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.610211] Hardware name: linux,dummy-virt (DT)
[   24.610281] Call trace:
[   24.610331]  show_stack+0x20/0x38 (C)
[   24.610447]  dump_stack_lvl+0x8c/0xd0
[   24.610564]  print_report+0x118/0x608
[   24.612442]  kasan_report+0xdc/0x128
[   24.612876]  __asan_report_store1_noabort+0x20/0x30
[   24.613368]  krealloc_less_oob_helper+0xa80/0xc50
[   24.613499]  krealloc_large_less_oob+0x20/0x38
[   24.613618]  kunit_try_run_case+0x170/0x3f0
[   24.613755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.613913]  kthread+0x328/0x630
[   24.614027]  ret_from_fork+0x10/0x20
[   24.614146] 
[   24.614213] The buggy address belongs to the physical page:
[   24.614303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.614431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.614549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.615470] page_type: f8(unknown)
[   24.615569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.615706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.616238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.616479] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.616731] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.617013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.617121] page dumped because: kasan: bad access detected
[   24.617193] 
[   24.618148] Memory state around the buggy address:
[   24.618290]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.618460]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.618559] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.618652]                                                     ^
[   24.618756]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.618903]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.619145] ==================================================================
[   24.573325] ==================================================================
[   24.573463] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.573779] Write of size 1 at addr fff00000c77b60c9 by task kunit_try_catch/163
[   24.573951] 
[   24.574177] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.574406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.574468] Hardware name: linux,dummy-virt (DT)
[   24.574539] Call trace:
[   24.574599]  show_stack+0x20/0x38 (C)
[   24.574770]  dump_stack_lvl+0x8c/0xd0
[   24.574914]  print_report+0x118/0x608
[   24.575504]  kasan_report+0xdc/0x128
[   24.575637]  __asan_report_store1_noabort+0x20/0x30
[   24.575797]  krealloc_less_oob_helper+0xa48/0xc50
[   24.576173]  krealloc_large_less_oob+0x20/0x38
[   24.576506]  kunit_try_run_case+0x170/0x3f0
[   24.576696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.576849]  kthread+0x328/0x630
[   24.577060]  ret_from_fork+0x10/0x20
[   24.577373] 
[   24.577506] The buggy address belongs to the physical page:
[   24.577727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.577854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.577966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.578089] page_type: f8(unknown)
[   24.578181] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.578295] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.578408] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.578520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.578631] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.578786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.578896] page dumped because: kasan: bad access detected
[   24.578979] 
[   24.579030] Memory state around the buggy address:
[   24.579545]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.579665]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.579793] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.579879]                                               ^
[   24.579957]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.580053]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.580138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   24.541552] ==================================================================
[   24.541653] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.541791] Write of size 1 at addr fff00000c77b60f0 by task kunit_try_catch/161
[   24.541902] 
[   24.541978] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.542165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.542225] Hardware name: linux,dummy-virt (DT)
[   24.542296] Call trace:
[   24.542345]  show_stack+0x20/0x38 (C)
[   24.542461]  dump_stack_lvl+0x8c/0xd0
[   24.542578]  print_report+0x118/0x608
[   24.546554]  kasan_report+0xdc/0x128
[   24.547443]  __asan_report_store1_noabort+0x20/0x30
[   24.547718]  krealloc_more_oob_helper+0x5c0/0x678
[   24.547856]  krealloc_large_more_oob+0x20/0x38
[   24.547977]  kunit_try_run_case+0x170/0x3f0
[   24.548170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.548355]  kthread+0x328/0x630
[   24.548622]  ret_from_fork+0x10/0x20
[   24.548799] 
[   24.548924] The buggy address belongs to the physical page:
[   24.549062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.549187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.549350] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.550709] page_type: f8(unknown)
[   24.550826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.550959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.551097] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.551227] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.551360] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.551500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.552381] page dumped because: kasan: bad access detected
[   24.552469] 
[   24.552519] Memory state around the buggy address:
[   24.552592]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.552697]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.552799] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.553777]                                                              ^
[   24.553876]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.553980]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.554127] ==================================================================
[   24.525336] ==================================================================
[   24.526320] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.527917] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/161
[   24.528041] 
[   24.528960] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.529660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.529769] Hardware name: linux,dummy-virt (DT)
[   24.529986] Call trace:
[   24.530099]  show_stack+0x20/0x38 (C)
[   24.530787]  dump_stack_lvl+0x8c/0xd0
[   24.531417]  print_report+0x118/0x608
[   24.531790]  kasan_report+0xdc/0x128
[   24.532509]  __asan_report_store1_noabort+0x20/0x30
[   24.532937]  krealloc_more_oob_helper+0x60c/0x678
[   24.533063]  krealloc_large_more_oob+0x20/0x38
[   24.534488]  kunit_try_run_case+0x170/0x3f0
[   24.534800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.535262]  kthread+0x328/0x630
[   24.535382]  ret_from_fork+0x10/0x20
[   24.535514] 
[   24.535565] The buggy address belongs to the physical page:
[   24.535640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4
[   24.535789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.536345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.536503] page_type: f8(unknown)
[   24.536626] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.536769] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.536901] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.537027] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.537158] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff
[   24.537934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.538095] page dumped because: kasan: bad access detected
[   24.538214] 
[   24.538291] Memory state around the buggy address:
[   24.538368]  fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.538471]  fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.538568] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.538743]                                                           ^
[   24.538851]  fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.538964]  fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.539065] ==================================================================
[   24.364218] ==================================================================
[   24.364362] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.364496] Write of size 1 at addr fff00000c5fb1eeb by task kunit_try_catch/157
[   24.364607] 
[   24.364705] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.364898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.364959] Hardware name: linux,dummy-virt (DT)
[   24.365030] Call trace:
[   24.365094]  show_stack+0x20/0x38 (C)
[   24.365482]  dump_stack_lvl+0x8c/0xd0
[   24.365964]  print_report+0x118/0x608
[   24.366604]  kasan_report+0xdc/0x128
[   24.366822]  __asan_report_store1_noabort+0x20/0x30
[   24.366975]  krealloc_more_oob_helper+0x60c/0x678
[   24.367135]  krealloc_more_oob+0x20/0x38
[   24.367413]  kunit_try_run_case+0x170/0x3f0
[   24.367548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.367847]  kthread+0x328/0x630
[   24.368063]  ret_from_fork+0x10/0x20
[   24.368384] 
[   24.368449] Allocated by task 157:
[   24.368641]  kasan_save_stack+0x3c/0x68
[   24.368968]  kasan_save_track+0x20/0x40
[   24.369071]  kasan_save_alloc_info+0x40/0x58
[   24.369633]  __kasan_krealloc+0x118/0x178
[   24.369777]  krealloc_noprof+0x128/0x360
[   24.369889]  krealloc_more_oob_helper+0x168/0x678
[   24.370002]  krealloc_more_oob+0x20/0x38
[   24.370554]  kunit_try_run_case+0x170/0x3f0
[   24.370783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.371161]  kthread+0x328/0x630
[   24.371241]  ret_from_fork+0x10/0x20
[   24.371333] 
[   24.371382] The buggy address belongs to the object at fff00000c5fb1e00
[   24.371382]  which belongs to the cache kmalloc-256 of size 256
[   24.371570] The buggy address is located 0 bytes to the right of
[   24.371570]  allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb)
[   24.371751] 
[   24.371806] The buggy address belongs to the physical page:
[   24.371873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0
[   24.371993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.372229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.372361] page_type: f5(slab)
[   24.372457] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.372591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.372802] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.372983] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.373282] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff
[   24.373604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.373750] page dumped because: kasan: bad access detected
[   24.373834] 
[   24.373886] Memory state around the buggy address:
[   24.373971]  fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.374083]  fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.374197] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.374299]                                                           ^
[   24.374401]  fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.374513]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.374604] ==================================================================
[   24.375995] ==================================================================
[   24.376092] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.376201] Write of size 1 at addr fff00000c5fb1ef0 by task kunit_try_catch/157
[   24.376315] 
[   24.376380] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.376564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.376625] Hardware name: linux,dummy-virt (DT)
[   24.376716] Call trace:
[   24.376769]  show_stack+0x20/0x38 (C)
[   24.376886]  dump_stack_lvl+0x8c/0xd0
[   24.377030]  print_report+0x118/0x608
[   24.377169]  kasan_report+0xdc/0x128
[   24.377323]  __asan_report_store1_noabort+0x20/0x30
[   24.377463]  krealloc_more_oob_helper+0x5c0/0x678
[   24.377606]  krealloc_more_oob+0x20/0x38
[   24.377759]  kunit_try_run_case+0x170/0x3f0
[   24.377901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.378047]  kthread+0x328/0x630
[   24.378165]  ret_from_fork+0x10/0x20
[   24.378292] 
[   24.378337] Allocated by task 157:
[   24.378458]  kasan_save_stack+0x3c/0x68
[   24.379289]  kasan_save_track+0x20/0x40
[   24.379482]  kasan_save_alloc_info+0x40/0x58
[   24.380116]  __kasan_krealloc+0x118/0x178
[   24.381021]  krealloc_noprof+0x128/0x360
[   24.381591]  krealloc_more_oob_helper+0x168/0x678
[   24.382978]  krealloc_more_oob+0x20/0x38
[   24.383462]  kunit_try_run_case+0x170/0x3f0
[   24.384592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.384739]  kthread+0x328/0x630
[   24.384842]  ret_from_fork+0x10/0x20
[   24.385465] 
[   24.385934] The buggy address belongs to the object at fff00000c5fb1e00
[   24.385934]  which belongs to the cache kmalloc-256 of size 256
[   24.386606] The buggy address is located 5 bytes to the right of
[   24.386606]  allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb)
[   24.387109] 
[   24.387350] The buggy address belongs to the physical page:
[   24.387433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0
[   24.387558] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.388041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.388237] page_type: f5(slab)
[   24.388333] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.388445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.388559] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.388670] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.388809] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff
[   24.388920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.389027] page dumped because: kasan: bad access detected
[   24.389124] 
[   24.389170] Memory state around the buggy address:
[   24.389274]  fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.389375]  fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.389473] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.389563]                                                              ^
[   24.389664]  fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.389783]  fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.390343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   24.327026] ==================================================================
[   24.327181] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   24.328027] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/155
[   24.330723] 
[   24.330881] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.331257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.331399] Hardware name: linux,dummy-virt (DT)
[   24.331479] Call trace:
[   24.331536]  show_stack+0x20/0x38 (C)
[   24.331671]  dump_stack_lvl+0x8c/0xd0
[   24.331819]  print_report+0x118/0x608
[   24.331932]  kasan_report+0xdc/0x128
[   24.332054]  __asan_report_load1_noabort+0x20/0x30
[   24.332223]  page_alloc_uaf+0x328/0x350
[   24.333332]  kunit_try_run_case+0x170/0x3f0
[   24.333618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.333949]  kthread+0x328/0x630
[   24.334072]  ret_from_fork+0x10/0x20
[   24.334765] 
[   24.334828] The buggy address belongs to the physical page:
[   24.334910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   24.335038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.335278] page_type: f0(buddy)
[   24.336369] raw: 0bfffe0000000000 fff00000ff616310 fff00000ff616310 0000000000000000
[   24.336567] raw: 0000000000000000 000000000000000a 00000000f0000000 0000000000000000
[   24.336660] page dumped because: kasan: bad access detected
[   24.337717] 
[   24.338146] Memory state around the buggy address:
[   24.338299]  fff00000c77fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.338501]  fff00000c77fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.338856] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.338960]                    ^
[   24.339213]  fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.339660]  fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.340264] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   24.262200] ==================================================================
[   24.262384] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   24.262533] Free of addr fff00000c77b0001 by task kunit_try_catch/151
[   24.262701] 
[   24.262960] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.263165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.264085] Hardware name: linux,dummy-virt (DT)
[   24.264177] Call trace:
[   24.264253]  show_stack+0x20/0x38 (C)
[   24.264350]  dump_stack_lvl+0x8c/0xd0
[   24.264417]  print_report+0x118/0x608
[   24.264474]  kasan_report_invalid_free+0xc0/0xe8
[   24.264533]  __kasan_kfree_large+0x5c/0xa8
[   24.264588]  free_large_kmalloc+0x64/0x190
[   24.264642]  kfree+0x270/0x3c8
[   24.265240]  kmalloc_large_invalid_free+0x108/0x270
[   24.265477]  kunit_try_run_case+0x170/0x3f0
[   24.265799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.265927]  kthread+0x328/0x630
[   24.266038]  ret_from_fork+0x10/0x20
[   24.266157] 
[   24.266749] The buggy address belongs to the physical page:
[   24.266987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   24.267315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.267455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.267587] page_type: f8(unknown)
[   24.268503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.269092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.269234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.269367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.270002] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff
[   24.270271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.270751] page dumped because: kasan: bad access detected
[   24.271205] 
[   24.271452] Memory state around the buggy address:
[   24.271836]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.272174]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.272290] >fff00000c77b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.272380]                    ^
[   24.272789]  fff00000c77b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.272890]  fff00000c77b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.272995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   24.240326] ==================================================================
[   24.240482] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   24.240618] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/149
[   24.240749] 
[   24.240830] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.241025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.241085] Hardware name: linux,dummy-virt (DT)
[   24.241154] Call trace:
[   24.241209]  show_stack+0x20/0x38 (C)
[   24.241345]  dump_stack_lvl+0x8c/0xd0
[   24.241462]  print_report+0x118/0x608
[   24.241571]  kasan_report+0xdc/0x128
[   24.241679]  __asan_report_load1_noabort+0x20/0x30
[   24.241814]  kmalloc_large_uaf+0x2cc/0x2f8
[   24.241923]  kunit_try_run_case+0x170/0x3f0
[   24.242039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.242165]  kthread+0x328/0x630
[   24.242273]  ret_from_fork+0x10/0x20
[   24.242384] 
[   24.242432] The buggy address belongs to the physical page:
[   24.242501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   24.242614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.242831] raw: 0bfffe0000000000 ffffc1ffc31ded08 fff00000da448c40 0000000000000000
[   24.242963] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   24.243283] page dumped because: kasan: bad access detected
[   24.243534] 
[   24.245549] Memory state around the buggy address:
[   24.245637]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.245765]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.245863] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.245947]                    ^
[   24.246825]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.246955]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.248327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   24.201510] ==================================================================
[   24.201699] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   24.202247] Write of size 1 at addr fff00000c77b200a by task kunit_try_catch/147
[   24.202788] 
[   24.202907] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.203114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.203183] Hardware name: linux,dummy-virt (DT)
[   24.203259] Call trace:
[   24.203318]  show_stack+0x20/0x38 (C)
[   24.203446]  dump_stack_lvl+0x8c/0xd0
[   24.203835]  print_report+0x118/0x608
[   24.204165]  kasan_report+0xdc/0x128
[   24.204500]  __asan_report_store1_noabort+0x20/0x30
[   24.205233]  kmalloc_large_oob_right+0x278/0x2b8
[   24.205389]  kunit_try_run_case+0x170/0x3f0
[   24.205603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.206169]  kthread+0x328/0x630
[   24.206414]  ret_from_fork+0x10/0x20
[   24.206909] 
[   24.207047] The buggy address belongs to the physical page:
[   24.207400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   24.208353] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.208640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.209463] page_type: f8(unknown)
[   24.209725] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.211022] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.211775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.211926] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.213161] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff
[   24.213338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.214197] page dumped because: kasan: bad access detected
[   24.214816] 
[   24.215344] Memory state around the buggy address:
[   24.215594]  fff00000c77b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.216033]  fff00000c77b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.216728] >fff00000c77b2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.216832]                       ^
[   24.216932]  fff00000c77b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.217374]  fff00000c77b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.217881] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   24.158658] ==================================================================
[   24.159043] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   24.159334] Write of size 1 at addr fff00000c77c9f00 by task kunit_try_catch/145
[   24.159514] 
[   24.159956] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.160198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.160878] Hardware name: linux,dummy-virt (DT)
[   24.160967] Call trace:
[   24.161044]  show_stack+0x20/0x38 (C)
[   24.161736]  dump_stack_lvl+0x8c/0xd0
[   24.161861]  print_report+0x118/0x608
[   24.161983]  kasan_report+0xdc/0x128
[   24.162769]  __asan_report_store1_noabort+0x20/0x30
[   24.163614]  kmalloc_big_oob_right+0x2a4/0x2f0
[   24.163760]  kunit_try_run_case+0x170/0x3f0
[   24.163892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.164604]  kthread+0x328/0x630
[   24.165241]  ret_from_fork+0x10/0x20
[   24.165668] 
[   24.165765] Allocated by task 145:
[   24.166218]  kasan_save_stack+0x3c/0x68
[   24.166325]  kasan_save_track+0x20/0x40
[   24.166801]  kasan_save_alloc_info+0x40/0x58
[   24.167471]  __kasan_kmalloc+0xd4/0xd8
[   24.167624]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.167843]  kmalloc_big_oob_right+0xb8/0x2f0
[   24.168179]  kunit_try_run_case+0x170/0x3f0
[   24.168300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.168605]  kthread+0x328/0x630
[   24.168980]  ret_from_fork+0x10/0x20
[   24.169501] 
[   24.169615] The buggy address belongs to the object at fff00000c77c8000
[   24.169615]  which belongs to the cache kmalloc-8k of size 8192
[   24.169921] The buggy address is located 0 bytes to the right of
[   24.169921]  allocated 7936-byte region [fff00000c77c8000, fff00000c77c9f00)
[   24.170076] 
[   24.170223] The buggy address belongs to the physical page:
[   24.170523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c8
[   24.170957] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.171182] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.171361] page_type: f5(slab)
[   24.171552] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   24.171699] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   24.171840] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   24.172175] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   24.172442] head: 0bfffe0000000003 ffffc1ffc31df201 00000000ffffffff 00000000ffffffff
[   24.172568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   24.172966] page dumped because: kasan: bad access detected
[   24.173073] 
[   24.173348] Memory state around the buggy address:
[   24.173560]  fff00000c77c9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.173662]  fff00000c77c9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.173783] >fff00000c77c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.174832]                    ^
[   24.175048]  fff00000c77c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.175184]  fff00000c77ca000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.175274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   24.140091] ==================================================================
[   24.140253] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   24.140499] Write of size 1 at addr fff00000c5eeec78 by task kunit_try_catch/143
[   24.140623] 
[   24.140709] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.140900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.140963] Hardware name: linux,dummy-virt (DT)
[   24.141031] Call trace:
[   24.141078]  show_stack+0x20/0x38 (C)
[   24.141200]  dump_stack_lvl+0x8c/0xd0
[   24.141334]  print_report+0x118/0x608
[   24.141445]  kasan_report+0xdc/0x128
[   24.141553]  __asan_report_store1_noabort+0x20/0x30
[   24.141671]  kmalloc_track_caller_oob_right+0x418/0x488
[   24.141817]  kunit_try_run_case+0x170/0x3f0
[   24.141936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.142061]  kthread+0x328/0x630
[   24.142169]  ret_from_fork+0x10/0x20
[   24.142286] 
[   24.142328] Allocated by task 143:
[   24.142388]  kasan_save_stack+0x3c/0x68
[   24.142497]  kasan_save_track+0x20/0x40
[   24.142611]  kasan_save_alloc_info+0x40/0x58
[   24.142775]  __kasan_kmalloc+0xd4/0xd8
[   24.142884]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   24.143040]  kmalloc_track_caller_oob_right+0x184/0x488
[   24.143194]  kunit_try_run_case+0x170/0x3f0
[   24.143389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.143594]  kthread+0x328/0x630
[   24.143706]  ret_from_fork+0x10/0x20
[   24.143802] 
[   24.143932] The buggy address belongs to the object at fff00000c5eeec00
[   24.143932]  which belongs to the cache kmalloc-128 of size 128
[   24.144064] The buggy address is located 0 bytes to the right of
[   24.144064]  allocated 120-byte region [fff00000c5eeec00, fff00000c5eeec78)
[   24.144239] 
[   24.144368] The buggy address belongs to the physical page:
[   24.144463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.145175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.145328] page_type: f5(slab)
[   24.145435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.145709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.145849] page dumped because: kasan: bad access detected
[   24.145992] 
[   24.146038] Memory state around the buggy address:
[   24.146153]  fff00000c5eeeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.146426]  fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146527] >fff00000c5eeec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.146613]                                                                 ^
[   24.146726]  fff00000c5eeec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146837]  fff00000c5eeed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146975] ==================================================================
[   24.130572] ==================================================================
[   24.130758] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   24.130924] Write of size 1 at addr fff00000c5eeeb78 by task kunit_try_catch/143
[   24.131050] 
[   24.131138] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.131335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.131403] Hardware name: linux,dummy-virt (DT)
[   24.131501] Call trace:
[   24.131568]  show_stack+0x20/0x38 (C)
[   24.131781]  dump_stack_lvl+0x8c/0xd0
[   24.131995]  print_report+0x118/0x608
[   24.132230]  kasan_report+0xdc/0x128
[   24.132401]  __asan_report_store1_noabort+0x20/0x30
[   24.132646]  kmalloc_track_caller_oob_right+0x40c/0x488
[   24.132881]  kunit_try_run_case+0x170/0x3f0
[   24.133047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.133174]  kthread+0x328/0x630
[   24.133303]  ret_from_fork+0x10/0x20
[   24.133422] 
[   24.133466] Allocated by task 143:
[   24.133535]  kasan_save_stack+0x3c/0x68
[   24.133632]  kasan_save_track+0x20/0x40
[   24.133750]  kasan_save_alloc_info+0x40/0x58
[   24.133900]  __kasan_kmalloc+0xd4/0xd8
[   24.134041]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   24.134172]  kmalloc_track_caller_oob_right+0xa8/0x488
[   24.134294]  kunit_try_run_case+0x170/0x3f0
[   24.134459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.134613]  kthread+0x328/0x630
[   24.134740]  ret_from_fork+0x10/0x20
[   24.134837] 
[   24.134916] The buggy address belongs to the object at fff00000c5eeeb00
[   24.134916]  which belongs to the cache kmalloc-128 of size 128
[   24.135054] The buggy address is located 0 bytes to the right of
[   24.135054]  allocated 120-byte region [fff00000c5eeeb00, fff00000c5eeeb78)
[   24.135231] 
[   24.135293] The buggy address belongs to the physical page:
[   24.135406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.135546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.135698] page_type: f5(slab)
[   24.135882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.136031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.136285] page dumped because: kasan: bad access detected
[   24.136517] 
[   24.136621] Memory state around the buggy address:
[   24.136719]  fff00000c5eeea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.136884]  fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137182] >fff00000c5eeeb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.137317]                                                                 ^
[   24.137577]  fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137730]  fff00000c5eeec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137840] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   24.040813] ==================================================================
[   24.041146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   24.041383] Read of size 1 at addr fff00000c5ed4c7f by task kunit_try_catch/139
[   24.041510] 
[   24.041724] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.041988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.042405] Hardware name: linux,dummy-virt (DT)
[   24.042553] Call trace:
[   24.042729]  show_stack+0x20/0x38 (C)
[   24.042955]  dump_stack_lvl+0x8c/0xd0
[   24.043190]  print_report+0x118/0x608
[   24.043506]  kasan_report+0xdc/0x128
[   24.043626]  __asan_report_load1_noabort+0x20/0x30
[   24.043802]  kmalloc_oob_left+0x2ec/0x320
[   24.044063]  kunit_try_run_case+0x170/0x3f0
[   24.044221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.045130]  kthread+0x328/0x630
[   24.045280]  ret_from_fork+0x10/0x20
[   24.045404] 
[   24.045451] Allocated by task 9:
[   24.045516]  kasan_save_stack+0x3c/0x68
[   24.045616]  kasan_save_track+0x20/0x40
[   24.046102]  kasan_save_alloc_info+0x40/0x58
[   24.046210]  __kasan_kmalloc+0xd4/0xd8
[   24.046311]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   24.046425]  kvasprintf+0xe0/0x180
[   24.046520]  __kthread_create_on_node+0x16c/0x350
[   24.046611]  kthread_create_on_node+0xe4/0x130
[   24.046777]  create_worker+0x380/0x6b8
[   24.047158]  worker_thread+0x5dc/0xf28
[   24.047963]  kthread+0x328/0x630
[   24.048081]  ret_from_fork+0x10/0x20
[   24.048174] 
[   24.048223] The buggy address belongs to the object at fff00000c5ed4c60
[   24.048223]  which belongs to the cache kmalloc-16 of size 16
[   24.048354] The buggy address is located 19 bytes to the right of
[   24.048354]  allocated 12-byte region [fff00000c5ed4c60, fff00000c5ed4c6c)
[   24.048502] 
[   24.048549] The buggy address belongs to the physical page:
[   24.048618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4
[   24.050443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.051303] page_type: f5(slab)
[   24.051427] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.051579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.051730] page dumped because: kasan: bad access detected
[   24.051805] 
[   24.051879] Memory state around the buggy address:
[   24.051955]  fff00000c5ed4b00: fa fb fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   24.052051]  fff00000c5ed4b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.052155] >fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   24.052321]                                                                 ^
[   24.052414]  fff00000c5ed4c80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.052509]  fff00000c5ed4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.052611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   23.996572] ==================================================================
[   23.996669] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   23.996805] Read of size 1 at addr fff00000c5eee980 by task kunit_try_catch/137
[   23.996922] 
[   23.996992] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.997177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.997239] Hardware name: linux,dummy-virt (DT)
[   23.997321] Call trace:
[   23.997370]  show_stack+0x20/0x38 (C)
[   23.997504]  dump_stack_lvl+0x8c/0xd0
[   23.997646]  print_report+0x118/0x608
[   23.998015]  kasan_report+0xdc/0x128
[   23.998153]  __asan_report_load1_noabort+0x20/0x30
[   23.999247]  kmalloc_oob_right+0x5d0/0x660
[   23.999430]  kunit_try_run_case+0x170/0x3f0
[   23.999568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.000286]  kthread+0x328/0x630
[   24.000443]  ret_from_fork+0x10/0x20
[   24.000562] 
[   24.000606] Allocated by task 137:
[   24.001155]  kasan_save_stack+0x3c/0x68
[   24.001717]  kasan_save_track+0x20/0x40
[   24.001825]  kasan_save_alloc_info+0x40/0x58
[   24.001943]  __kasan_kmalloc+0xd4/0xd8
[   24.002053]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.002721]  kmalloc_oob_right+0xb0/0x660
[   24.003180]  kunit_try_run_case+0x170/0x3f0
[   24.003565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.003700]  kthread+0x328/0x630
[   24.003792]  ret_from_fork+0x10/0x20
[   24.003884] 
[   24.004500] The buggy address belongs to the object at fff00000c5eee900
[   24.004500]  which belongs to the cache kmalloc-128 of size 128
[   24.004667] The buggy address is located 13 bytes to the right of
[   24.004667]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   24.004842] 
[   24.004892] The buggy address belongs to the physical page:
[   24.005066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.005285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.005475] page_type: f5(slab)
[   24.005572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.005708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.005801] page dumped because: kasan: bad access detected
[   24.006242] 
[   24.006302] Memory state around the buggy address:
[   24.006383]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.006496]  fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.006607] >fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007062]                    ^
[   24.007268]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007388]  fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007475] ==================================================================
[   23.985409] ==================================================================
[   23.985652] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   23.985956] Write of size 1 at addr fff00000c5eee978 by task kunit_try_catch/137
[   23.986266] 
[   23.986456] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.986749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.986807] Hardware name: linux,dummy-virt (DT)
[   23.986876] Call trace:
[   23.986931]  show_stack+0x20/0x38 (C)
[   23.987063]  dump_stack_lvl+0x8c/0xd0
[   23.987193]  print_report+0x118/0x608
[   23.987326]  kasan_report+0xdc/0x128
[   23.987466]  __asan_report_store1_noabort+0x20/0x30
[   23.988308]  kmalloc_oob_right+0x538/0x660
[   23.989081]  kunit_try_run_case+0x170/0x3f0
[   23.989221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.989369]  kthread+0x328/0x630
[   23.989478]  ret_from_fork+0x10/0x20
[   23.989664] 
[   23.989786] Allocated by task 137:
[   23.989858]  kasan_save_stack+0x3c/0x68
[   23.989963]  kasan_save_track+0x20/0x40
[   23.990223]  kasan_save_alloc_info+0x40/0x58
[   23.990319]  __kasan_kmalloc+0xd4/0xd8
[   23.990553]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.990655]  kmalloc_oob_right+0xb0/0x660
[   23.990781]  kunit_try_run_case+0x170/0x3f0
[   23.991241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.991370]  kthread+0x328/0x630
[   23.991495]  ret_from_fork+0x10/0x20
[   23.991850] 
[   23.992120] The buggy address belongs to the object at fff00000c5eee900
[   23.992120]  which belongs to the cache kmalloc-128 of size 128
[   23.992285] The buggy address is located 5 bytes to the right of
[   23.992285]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   23.992620] 
[   23.992669] The buggy address belongs to the physical page:
[   23.992784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   23.992924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.993032] page_type: f5(slab)
[   23.993122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.993238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.993343] page dumped because: kasan: bad access detected
[   23.993422] 
[   23.993541] Memory state around the buggy address:
[   23.993696]  fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.993812]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.993928] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.994028]                                                                 ^
[   23.994128]  fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.994429]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.994936] ==================================================================
[   23.972652] ==================================================================
[   23.974135] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   23.976157] Write of size 1 at addr fff00000c5eee973 by task kunit_try_catch/137
[   23.976383] 
[   23.978053] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250530 #1 PREEMPT 
[   23.978238] Tainted: [N]=TEST
[   23.978281] Hardware name: linux,dummy-virt (DT)
[   23.978552] Call trace:
[   23.978930]  show_stack+0x20/0x38 (C)
[   23.979175]  dump_stack_lvl+0x8c/0xd0
[   23.979264]  print_report+0x118/0x608
[   23.979328]  kasan_report+0xdc/0x128
[   23.979384]  __asan_report_store1_noabort+0x20/0x30
[   23.979443]  kmalloc_oob_right+0x5a4/0x660
[   23.979501]  kunit_try_run_case+0x170/0x3f0
[   23.979565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.979629]  kthread+0x328/0x630
[   23.979709]  ret_from_fork+0x10/0x20
[   23.979914] 
[   23.979965] Allocated by task 137:
[   23.980104]  kasan_save_stack+0x3c/0x68
[   23.980195]  kasan_save_track+0x20/0x40
[   23.980246]  kasan_save_alloc_info+0x40/0x58
[   23.980292]  __kasan_kmalloc+0xd4/0xd8
[   23.980336]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.980387]  kmalloc_oob_right+0xb0/0x660
[   23.980431]  kunit_try_run_case+0x170/0x3f0
[   23.980476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.980528]  kthread+0x328/0x630
[   23.980566]  ret_from_fork+0x10/0x20
[   23.980632] 
[   23.980733] The buggy address belongs to the object at fff00000c5eee900
[   23.980733]  which belongs to the cache kmalloc-128 of size 128
[   23.980853] The buggy address is located 0 bytes to the right of
[   23.980853]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   23.980936] 
[   23.981034] The buggy address belongs to the physical page:
[   23.981243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   23.981577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.981956] page_type: f5(slab)
[   23.982296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.982375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.982513] page dumped because: kasan: bad access detected
[   23.982591] 
[   23.982626] Memory state around the buggy address:
[   23.983102]  fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.983194]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983265] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.983333]                                                              ^
[   23.983434]  fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983485]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983562] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  114.291945] WARNING: CPU: 1 PID: 705 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  114.293474] Modules linked in:
[  114.293752] CPU: 1 UID: 0 PID: 705 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 PREEMPT 
[  114.294201] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  114.294451] Hardware name: linux,dummy-virt (DT)
[  114.294747] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  114.295316] pc : intlog10+0x38/0x48
[  114.296217] lr : intlog10_test+0xe4/0x200
[  114.297006] sp : ffff800082247c10
[  114.297767] x29: ffff800082247c90 x28: 0000000000000000 x27: 0000000000000000
[  114.299228] x26: 1ffe000018f3f501 x25: 0000000000000000 x24: ffff800082247ce0
[  114.300400] x23: ffff800082247d00 x22: 0000000000000000 x21: 1ffff00010448f82
[  114.301373] x20: ffffa1cc1b0d30c0 x19: ffff800080087990 x18: 0000000008914d6e
[  114.302321] x17: 00000000a572806a x16: fff00000c0975c3c x15: 0000000047722e45
[  114.303922] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: ffff743983def979
[  114.304919] x11: 1ffff43983def978 x10: ffff743983def978 x9 : ffffa1cc1866b66c
[  114.305877] x8 : ffffa1cc1ef7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  114.306869] x5 : ffff700010448f82 x4 : 1ffff00010010f3a x3 : 1ffff4398361a618
[  114.307708] x2 : 1ffff4398361a618 x1 : 0000000000000003 x0 : 0000000000000000
[  114.308674] Call trace:
[  114.309132]  intlog10+0x38/0x48 (P)
[  114.309745]  kunit_try_run_case+0x170/0x3f0
[  114.310369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  114.311264]  kthread+0x328/0x630
[  114.311776]  ret_from_fork+0x10/0x20
[  114.312313] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  114.195652] WARNING: CPU: 0 PID: 687 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  114.197754] Modules linked in:
[  114.198500] CPU: 0 UID: 0 PID: 687 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250530 #1 PREEMPT 
[  114.199898] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  114.200409] Hardware name: linux,dummy-virt (DT)
[  114.201203] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  114.201841] pc : intlog2+0xd8/0xf8
[  114.202358] lr : intlog2_test+0xe4/0x200
[  114.202972] sp : ffff800082217c10
[  114.203425] x29: ffff800082217c90 x28: 0000000000000000 x27: 0000000000000000
[  114.204436] x26: 1ffe000018860341 x25: 0000000000000000 x24: ffff800082217ce0
[  114.205164] x23: ffff800082217d00 x22: 0000000000000000 x21: 1ffff00010442f82
[  114.206197] x20: ffffa1cc1b0d2fc0 x19: ffff800080087990 x18: 00000000e0ebf60a
[  114.207367] x17: 000000002c88365b x16: fff00000c097583c x15: 00000000b0a9061a
[  114.208448] x14: 00000000f1f1f1f1 x13: 1ffe00001b488989 x12: ffff743983def979
[  114.209348] x11: 1ffff43983def978 x10: ffff743983def978 x9 : ffffa1cc1866b86c
[  114.210437] x8 : ffffa1cc1ef7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  114.211558] x5 : ffff700010442f82 x4 : 1ffff00010010f3a x3 : 1ffff4398361a5f8
[  114.212489] x2 : 1ffff4398361a5f8 x1 : 0000000000000003 x0 : 0000000000000000
[  114.213449] Call trace:
[  114.213798]  intlog2+0xd8/0xf8 (P)
[  114.214228]  kunit_try_run_case+0x170/0x3f0
[  114.214726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  114.215303]  kthread+0x328/0x630
[  114.215891]  ret_from_fork+0x10/0x20
[  114.216417] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[  395.575855] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[  395.141169] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>