Hay
Date
June 3, 2025, 7:38 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   19.921394] ==================================================================
[   19.921718] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   19.921906] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.922520] 
[   19.922741] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.923072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.923109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.923138] Call Trace:
[   19.923167]  <TASK>
[   19.923218]  dump_stack_lvl+0x73/0xb0
[   19.923272]  print_report+0xd1/0x650
[   19.923302]  ? __virt_addr_valid+0x1db/0x2d0
[   19.923331]  ? strncpy_from_user+0x2e/0x1d0
[   19.923405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.923439]  ? strncpy_from_user+0x2e/0x1d0
[   19.923478]  kasan_report+0x141/0x180
[   19.923555]  ? strncpy_from_user+0x2e/0x1d0
[   19.923624]  kasan_check_range+0x10c/0x1c0
[   19.923666]  __kasan_check_write+0x18/0x20
[   19.923710]  strncpy_from_user+0x2e/0x1d0
[   19.923738]  ? __kasan_check_read+0x15/0x20
[   19.923764]  copy_user_test_oob+0x760/0x10f0
[   19.923795]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.923823]  ? finish_task_switch.isra.0+0x153/0x700
[   19.923854]  ? __switch_to+0x47/0xf50
[   19.923886]  ? __schedule+0x10cc/0x2b60
[   19.923916]  ? __pfx_read_tsc+0x10/0x10
[   19.923944]  ? ktime_get_ts64+0x86/0x230
[   19.923973]  kunit_try_run_case+0x1a5/0x480
[   19.924001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.924026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.924055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.924083]  ? __kthread_parkme+0x82/0x180
[   19.924108]  ? preempt_count_sub+0x50/0x80
[   19.924137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.924165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.924211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.924247]  kthread+0x337/0x6f0
[   19.924275]  ? trace_preempt_on+0x20/0xc0
[   19.924304]  ? __pfx_kthread+0x10/0x10
[   19.924330]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.924359]  ? calculate_sigpending+0x7b/0xa0
[   19.924391]  ? __pfx_kthread+0x10/0x10
[   19.924525]  ret_from_fork+0x116/0x1d0
[   19.924554]  ? __pfx_kthread+0x10/0x10
[   19.924578]  ret_from_fork_asm+0x1a/0x30
[   19.924615]  </TASK>
[   19.924630] 
[   19.936363] Allocated by task 302:
[   19.936734]  kasan_save_stack+0x45/0x70
[   19.936878]  kasan_save_track+0x18/0x40
[   19.937158]  kasan_save_alloc_info+0x3b/0x50
[   19.937504]  __kasan_kmalloc+0xb7/0xc0
[   19.937604]  __kmalloc_noprof+0x1c9/0x500
[   19.937907]  kunit_kmalloc_array+0x25/0x60
[   19.938030]  copy_user_test_oob+0xab/0x10f0
[   19.938331]  kunit_try_run_case+0x1a5/0x480
[   19.938487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.938708]  kthread+0x337/0x6f0
[   19.938921]  ret_from_fork+0x116/0x1d0
[   19.939032]  ret_from_fork_asm+0x1a/0x30
[   19.939179] 
[   19.939504] The buggy address belongs to the object at ffff888103341c00
[   19.939504]  which belongs to the cache kmalloc-128 of size 128
[   19.940039] The buggy address is located 0 bytes inside of
[   19.940039]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.940265] 
[   19.940400] The buggy address belongs to the physical page:
[   19.940770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.941352] flags: 0x200000000000000(node=0|zone=2)
[   19.941756] page_type: f5(slab)
[   19.941906] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.942745] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.942917] page dumped because: kasan: bad access detected
[   19.943037] 
[   19.943182] Memory state around the buggy address:
[   19.943782]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.944228]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.944634] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.945115]                                                                 ^
[   19.945466]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.945918]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.946407] ==================================================================
[   19.947518] ==================================================================
[   19.948309] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   19.948544] Write of size 1 at addr ffff888103341c78 by task kunit_try_catch/302
[   19.948712] 
[   19.948885] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.948947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.948963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.948990] Call Trace:
[   19.949016]  <TASK>
[   19.949043]  dump_stack_lvl+0x73/0xb0
[   19.949075]  print_report+0xd1/0x650
[   19.949105]  ? __virt_addr_valid+0x1db/0x2d0
[   19.949132]  ? strncpy_from_user+0x1a5/0x1d0
[   19.949156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.949182]  ? strncpy_from_user+0x1a5/0x1d0
[   19.949207]  kasan_report+0x141/0x180
[   19.949233]  ? strncpy_from_user+0x1a5/0x1d0
[   19.949261]  __asan_report_store1_noabort+0x1b/0x30
[   19.949322]  strncpy_from_user+0x1a5/0x1d0
[   19.949364]  copy_user_test_oob+0x760/0x10f0
[   19.949399]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.949424]  ? finish_task_switch.isra.0+0x153/0x700
[   19.949451]  ? __switch_to+0x47/0xf50
[   19.949495]  ? __schedule+0x10cc/0x2b60
[   19.949524]  ? __pfx_read_tsc+0x10/0x10
[   19.949550]  ? ktime_get_ts64+0x86/0x230
[   19.949579]  kunit_try_run_case+0x1a5/0x480
[   19.949607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.949630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.949659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.949687]  ? __kthread_parkme+0x82/0x180
[   19.949712]  ? preempt_count_sub+0x50/0x80
[   19.949739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.949764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.949794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.949821]  kthread+0x337/0x6f0
[   19.949846]  ? trace_preempt_on+0x20/0xc0
[   19.949873]  ? __pfx_kthread+0x10/0x10
[   19.949897]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.949925]  ? calculate_sigpending+0x7b/0xa0
[   19.949953]  ? __pfx_kthread+0x10/0x10
[   19.949979]  ret_from_fork+0x116/0x1d0
[   19.950001]  ? __pfx_kthread+0x10/0x10
[   19.950028]  ret_from_fork_asm+0x1a/0x30
[   19.950065]  </TASK>
[   19.950080] 
[   19.957166] Allocated by task 302:
[   19.957508]  kasan_save_stack+0x45/0x70
[   19.957796]  kasan_save_track+0x18/0x40
[   19.958032]  kasan_save_alloc_info+0x3b/0x50
[   19.958172]  __kasan_kmalloc+0xb7/0xc0
[   19.958439]  __kmalloc_noprof+0x1c9/0x500
[   19.958590]  kunit_kmalloc_array+0x25/0x60
[   19.958796]  copy_user_test_oob+0xab/0x10f0
[   19.959022]  kunit_try_run_case+0x1a5/0x480
[   19.959293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.959539]  kthread+0x337/0x6f0
[   19.959734]  ret_from_fork+0x116/0x1d0
[   19.959849]  ret_from_fork_asm+0x1a/0x30
[   19.959963] 
[   19.960111] The buggy address belongs to the object at ffff888103341c00
[   19.960111]  which belongs to the cache kmalloc-128 of size 128
[   19.960524] The buggy address is located 0 bytes to the right of
[   19.960524]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.961193] 
[   19.961328] The buggy address belongs to the physical page:
[   19.961554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.961739] flags: 0x200000000000000(node=0|zone=2)
[   19.961874] page_type: f5(slab)
[   19.961980] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.962151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.962314] page dumped because: kasan: bad access detected
[   19.962700] 
[   19.962845] Memory state around the buggy address:
[   19.963359]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.963875]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.964061] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.964263]                                                                 ^
[   19.964782]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.964993]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.965418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   19.896782] ==================================================================
[   19.897205] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   19.897388] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.897564] 
[   19.897817] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.897885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.897903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.897929] Call Trace:
[   19.897952]  <TASK>
[   19.897972]  dump_stack_lvl+0x73/0xb0
[   19.898003]  print_report+0xd1/0x650
[   19.898031]  ? __virt_addr_valid+0x1db/0x2d0
[   19.898059]  ? copy_user_test_oob+0x604/0x10f0
[   19.898084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.898109]  ? copy_user_test_oob+0x604/0x10f0
[   19.898135]  kasan_report+0x141/0x180
[   19.898159]  ? copy_user_test_oob+0x604/0x10f0
[   19.898190]  kasan_check_range+0x10c/0x1c0
[   19.898230]  __kasan_check_read+0x15/0x20
[   19.898256]  copy_user_test_oob+0x604/0x10f0
[   19.898286]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.898311]  ? finish_task_switch.isra.0+0x153/0x700
[   19.898337]  ? __switch_to+0x47/0xf50
[   19.898366]  ? __schedule+0x10cc/0x2b60
[   19.898392]  ? __pfx_read_tsc+0x10/0x10
[   19.898415]  ? ktime_get_ts64+0x86/0x230
[   19.898443]  kunit_try_run_case+0x1a5/0x480
[   19.898480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.898506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.898531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.898557]  ? __kthread_parkme+0x82/0x180
[   19.898579]  ? preempt_count_sub+0x50/0x80
[   19.898603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.898625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.898650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.898676]  kthread+0x337/0x6f0
[   19.898696]  ? trace_preempt_on+0x20/0xc0
[   19.898720]  ? __pfx_kthread+0x10/0x10
[   19.898741]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.898764]  ? calculate_sigpending+0x7b/0xa0
[   19.898789]  ? __pfx_kthread+0x10/0x10
[   19.898812]  ret_from_fork+0x116/0x1d0
[   19.898831]  ? __pfx_kthread+0x10/0x10
[   19.898852]  ret_from_fork_asm+0x1a/0x30
[   19.898885]  </TASK>
[   19.898899] 
[   19.908156] Allocated by task 302:
[   19.908547]  kasan_save_stack+0x45/0x70
[   19.908893]  kasan_save_track+0x18/0x40
[   19.909193]  kasan_save_alloc_info+0x3b/0x50
[   19.909733]  __kasan_kmalloc+0xb7/0xc0
[   19.909949]  __kmalloc_noprof+0x1c9/0x500
[   19.910156]  kunit_kmalloc_array+0x25/0x60
[   19.910728]  copy_user_test_oob+0xab/0x10f0
[   19.911148]  kunit_try_run_case+0x1a5/0x480
[   19.911271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.911842]  kthread+0x337/0x6f0
[   19.912179]  ret_from_fork+0x116/0x1d0
[   19.912299]  ret_from_fork_asm+0x1a/0x30
[   19.912420] 
[   19.912853] The buggy address belongs to the object at ffff888103341c00
[   19.912853]  which belongs to the cache kmalloc-128 of size 128
[   19.913694] The buggy address is located 0 bytes inside of
[   19.913694]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.914211] 
[   19.914286] The buggy address belongs to the physical page:
[   19.914844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.915225] flags: 0x200000000000000(node=0|zone=2)
[   19.915479] page_type: f5(slab)
[   19.915695] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.916026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.916984] page dumped because: kasan: bad access detected
[   19.917651] 
[   19.917771] Memory state around the buggy address:
[   19.917904]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.918207]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.918615] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.918773]                                                                 ^
[   19.919260]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.919529]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.920053] ==================================================================
[   19.877627] ==================================================================
[   19.878378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   19.878688] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.878995] 
[   19.879085] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.879140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.879194] Call Trace:
[   19.879248]  <TASK>
[   19.879273]  dump_stack_lvl+0x73/0xb0
[   19.879305]  print_report+0xd1/0x650
[   19.879345]  ? __virt_addr_valid+0x1db/0x2d0
[   19.879381]  ? copy_user_test_oob+0x557/0x10f0
[   19.879421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.879451]  ? copy_user_test_oob+0x557/0x10f0
[   19.879491]  kasan_report+0x141/0x180
[   19.879531]  ? copy_user_test_oob+0x557/0x10f0
[   19.879564]  kasan_check_range+0x10c/0x1c0
[   19.879603]  __kasan_check_write+0x18/0x20
[   19.879628]  copy_user_test_oob+0x557/0x10f0
[   19.879666]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.879696]  ? finish_task_switch.isra.0+0x153/0x700
[   19.879724]  ? __switch_to+0x47/0xf50
[   19.879766]  ? __schedule+0x10cc/0x2b60
[   19.879794]  ? __pfx_read_tsc+0x10/0x10
[   19.879830]  ? ktime_get_ts64+0x86/0x230
[   19.879859]  kunit_try_run_case+0x1a5/0x480
[   19.879899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.879924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.879951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.879991]  ? __kthread_parkme+0x82/0x180
[   19.880015]  ? preempt_count_sub+0x50/0x80
[   19.880053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.880079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.880107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.880134]  kthread+0x337/0x6f0
[   19.880157]  ? trace_preempt_on+0x20/0xc0
[   19.880184]  ? __pfx_kthread+0x10/0x10
[   19.880207]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.880232]  ? calculate_sigpending+0x7b/0xa0
[   19.880260]  ? __pfx_kthread+0x10/0x10
[   19.880285]  ret_from_fork+0x116/0x1d0
[   19.880307]  ? __pfx_kthread+0x10/0x10
[   19.880330]  ret_from_fork_asm+0x1a/0x30
[   19.880364]  </TASK>
[   19.880380] 
[   19.887537] Allocated by task 302:
[   19.887814]  kasan_save_stack+0x45/0x70
[   19.888030]  kasan_save_track+0x18/0x40
[   19.888142]  kasan_save_alloc_info+0x3b/0x50
[   19.888256]  __kasan_kmalloc+0xb7/0xc0
[   19.888358]  __kmalloc_noprof+0x1c9/0x500
[   19.888477]  kunit_kmalloc_array+0x25/0x60
[   19.888851]  copy_user_test_oob+0xab/0x10f0
[   19.889188]  kunit_try_run_case+0x1a5/0x480
[   19.889563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.889968]  kthread+0x337/0x6f0
[   19.890080]  ret_from_fork+0x116/0x1d0
[   19.890318]  ret_from_fork_asm+0x1a/0x30
[   19.890568] 
[   19.890697] The buggy address belongs to the object at ffff888103341c00
[   19.890697]  which belongs to the cache kmalloc-128 of size 128
[   19.891152] The buggy address is located 0 bytes inside of
[   19.891152]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.891684] 
[   19.891751] The buggy address belongs to the physical page:
[   19.891883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.892059] flags: 0x200000000000000(node=0|zone=2)
[   19.892541] page_type: f5(slab)
[   19.892795] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.893275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.893608] page dumped because: kasan: bad access detected
[   19.893727] 
[   19.893786] Memory state around the buggy address:
[   19.894136]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.894609]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894761] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.894901]                                                                 ^
[   19.895040]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.895184]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.895826] ==================================================================
[   19.858238] ==================================================================
[   19.858613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   19.859065] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.859514] 
[   19.859645] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.859700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.859737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.859767] Call Trace:
[   19.859789]  <TASK>
[   19.859819]  dump_stack_lvl+0x73/0xb0
[   19.859854]  print_report+0xd1/0x650
[   19.859880]  ? __virt_addr_valid+0x1db/0x2d0
[   19.859908]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.859934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.859960]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.859986]  kasan_report+0x141/0x180
[   19.860012]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.860042]  kasan_check_range+0x10c/0x1c0
[   19.860068]  __kasan_check_read+0x15/0x20
[   19.860091]  copy_user_test_oob+0x4aa/0x10f0
[   19.860118]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.860158]  ? finish_task_switch.isra.0+0x153/0x700
[   19.860185]  ? __switch_to+0x47/0xf50
[   19.860228]  ? __schedule+0x10cc/0x2b60
[   19.860256]  ? __pfx_read_tsc+0x10/0x10
[   19.860280]  ? ktime_get_ts64+0x86/0x230
[   19.860310]  kunit_try_run_case+0x1a5/0x480
[   19.860335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.860357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.860397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.860426]  ? __kthread_parkme+0x82/0x180
[   19.860451]  ? preempt_count_sub+0x50/0x80
[   19.860495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.860519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.860547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.860575]  kthread+0x337/0x6f0
[   19.860597]  ? trace_preempt_on+0x20/0xc0
[   19.860625]  ? __pfx_kthread+0x10/0x10
[   19.860649]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.860673]  ? calculate_sigpending+0x7b/0xa0
[   19.860713]  ? __pfx_kthread+0x10/0x10
[   19.860740]  ret_from_fork+0x116/0x1d0
[   19.860763]  ? __pfx_kthread+0x10/0x10
[   19.860801]  ret_from_fork_asm+0x1a/0x30
[   19.860836]  </TASK>
[   19.860861] 
[   19.868423] Allocated by task 302:
[   19.868614]  kasan_save_stack+0x45/0x70
[   19.868735]  kasan_save_track+0x18/0x40
[   19.868843]  kasan_save_alloc_info+0x3b/0x50
[   19.868959]  __kasan_kmalloc+0xb7/0xc0
[   19.869062]  __kmalloc_noprof+0x1c9/0x500
[   19.869171]  kunit_kmalloc_array+0x25/0x60
[   19.869277]  copy_user_test_oob+0xab/0x10f0
[   19.869389]  kunit_try_run_case+0x1a5/0x480
[   19.869508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.869640]  kthread+0x337/0x6f0
[   19.869892]  ret_from_fork+0x116/0x1d0
[   19.870180]  ret_from_fork_asm+0x1a/0x30
[   19.870576] 
[   19.870733] The buggy address belongs to the object at ffff888103341c00
[   19.870733]  which belongs to the cache kmalloc-128 of size 128
[   19.871796] The buggy address is located 0 bytes inside of
[   19.871796]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.872148] 
[   19.872238] The buggy address belongs to the physical page:
[   19.872660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.872921] flags: 0x200000000000000(node=0|zone=2)
[   19.873053] page_type: f5(slab)
[   19.873346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.873814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.874171] page dumped because: kasan: bad access detected
[   19.874439] 
[   19.874591] Memory state around the buggy address:
[   19.874815]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.875136]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.875481] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.875818]                                                                 ^
[   19.876123]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876746]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876967] ==================================================================
[   19.839187] ==================================================================
[   19.839620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   19.839910] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.840190] 
[   19.840391] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.840470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.840489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.840517] Call Trace:
[   19.840555]  <TASK>
[   19.840584]  dump_stack_lvl+0x73/0xb0
[   19.840629]  print_report+0xd1/0x650
[   19.840662]  ? __virt_addr_valid+0x1db/0x2d0
[   19.840701]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.840760]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840789]  kasan_report+0x141/0x180
[   19.840814]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.840846]  kasan_check_range+0x10c/0x1c0
[   19.840873]  __kasan_check_write+0x18/0x20
[   19.840894]  copy_user_test_oob+0x3fd/0x10f0
[   19.840923]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.840959]  ? finish_task_switch.isra.0+0x153/0x700
[   19.840988]  ? __switch_to+0x47/0xf50
[   19.841027]  ? __schedule+0x10cc/0x2b60
[   19.841058]  ? __pfx_read_tsc+0x10/0x10
[   19.841083]  ? ktime_get_ts64+0x86/0x230
[   19.841123]  kunit_try_run_case+0x1a5/0x480
[   19.841151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.841175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.841244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.841273]  ? __kthread_parkme+0x82/0x180
[   19.841298]  ? preempt_count_sub+0x50/0x80
[   19.841324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.841348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.841376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.841401]  kthread+0x337/0x6f0
[   19.841424]  ? trace_preempt_on+0x20/0xc0
[   19.841451]  ? __pfx_kthread+0x10/0x10
[   19.841495]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.841520]  ? calculate_sigpending+0x7b/0xa0
[   19.841547]  ? __pfx_kthread+0x10/0x10
[   19.841571]  ret_from_fork+0x116/0x1d0
[   19.841593]  ? __pfx_kthread+0x10/0x10
[   19.841616]  ret_from_fork_asm+0x1a/0x30
[   19.841651]  </TASK>
[   19.841667] 
[   19.848216] Allocated by task 302:
[   19.848322]  kasan_save_stack+0x45/0x70
[   19.848663]  kasan_save_track+0x18/0x40
[   19.848980]  kasan_save_alloc_info+0x3b/0x50
[   19.849387]  __kasan_kmalloc+0xb7/0xc0
[   19.849749]  __kmalloc_noprof+0x1c9/0x500
[   19.850020]  kunit_kmalloc_array+0x25/0x60
[   19.850196]  copy_user_test_oob+0xab/0x10f0
[   19.850497]  kunit_try_run_case+0x1a5/0x480
[   19.850617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.850756]  kthread+0x337/0x6f0
[   19.851028]  ret_from_fork+0x116/0x1d0
[   19.851439]  ret_from_fork_asm+0x1a/0x30
[   19.851796] 
[   19.851889] The buggy address belongs to the object at ffff888103341c00
[   19.851889]  which belongs to the cache kmalloc-128 of size 128
[   19.852225] The buggy address is located 0 bytes inside of
[   19.852225]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.852919] 
[   19.853093] The buggy address belongs to the physical page:
[   19.853386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.853665] flags: 0x200000000000000(node=0|zone=2)
[   19.853802] page_type: f5(slab)
[   19.853908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.854079] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.854326] page dumped because: kasan: bad access detected
[   19.854763] 
[   19.854918] Memory state around the buggy address:
[   19.855328]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.855778]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855936] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.856243]                                                                 ^
[   19.856775]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.857084]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.857478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user: Failure Automatically assigned
[   19.814114] ==================================================================
[   19.814477] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   19.814669] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.814989] 
[   19.815190] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.815255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.815271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.815298] Call Trace:
[   19.815325]  <TASK>
[   19.815362]  dump_stack_lvl+0x73/0xb0
[   19.815416]  print_report+0xd1/0x650
[   19.815445]  ? __virt_addr_valid+0x1db/0x2d0
[   19.815490]  ? _copy_to_user+0x3c/0x70
[   19.815515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.815541]  ? _copy_to_user+0x3c/0x70
[   19.815579]  kasan_report+0x141/0x180
[   19.815605]  ? _copy_to_user+0x3c/0x70
[   19.815647]  kasan_check_range+0x10c/0x1c0
[   19.815675]  __kasan_check_read+0x15/0x20
[   19.815707]  _copy_to_user+0x3c/0x70
[   19.815736]  copy_user_test_oob+0x364/0x10f0
[   19.815766]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.815805]  ? finish_task_switch.isra.0+0x153/0x700
[   19.815833]  ? __switch_to+0x47/0xf50
[   19.815862]  ? __schedule+0x10cc/0x2b60
[   19.815889]  ? __pfx_read_tsc+0x10/0x10
[   19.815913]  ? ktime_get_ts64+0x86/0x230
[   19.815942]  kunit_try_run_case+0x1a5/0x480
[   19.815967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.815990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.816018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.816045]  ? __kthread_parkme+0x82/0x180
[   19.816069]  ? preempt_count_sub+0x50/0x80
[   19.816095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.816121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.816147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.816189]  kthread+0x337/0x6f0
[   19.816212]  ? trace_preempt_on+0x20/0xc0
[   19.816252]  ? __pfx_kthread+0x10/0x10
[   19.816277]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.816333]  ? calculate_sigpending+0x7b/0xa0
[   19.816362]  ? __pfx_kthread+0x10/0x10
[   19.816388]  ret_from_fork+0x116/0x1d0
[   19.816410]  ? __pfx_kthread+0x10/0x10
[   19.816435]  ret_from_fork_asm+0x1a/0x30
[   19.816487]  </TASK>
[   19.816503] 
[   19.823412] Allocated by task 302:
[   19.823729]  kasan_save_stack+0x45/0x70
[   19.824040]  kasan_save_track+0x18/0x40
[   19.824379]  kasan_save_alloc_info+0x3b/0x50
[   19.824511]  __kasan_kmalloc+0xb7/0xc0
[   19.824620]  __kmalloc_noprof+0x1c9/0x500
[   19.824729]  kunit_kmalloc_array+0x25/0x60
[   19.824929]  copy_user_test_oob+0xab/0x10f0
[   19.825265]  kunit_try_run_case+0x1a5/0x480
[   19.825613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.826030]  kthread+0x337/0x6f0
[   19.826277]  ret_from_fork+0x116/0x1d0
[   19.826489]  ret_from_fork_asm+0x1a/0x30
[   19.826718] 
[   19.826886] The buggy address belongs to the object at ffff888103341c00
[   19.826886]  which belongs to the cache kmalloc-128 of size 128
[   19.827686] The buggy address is located 0 bytes inside of
[   19.827686]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.827943] 
[   19.828012] The buggy address belongs to the physical page:
[   19.828219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.828808] flags: 0x200000000000000(node=0|zone=2)
[   19.829371] page_type: f5(slab)
[   19.829650] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.829956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.830311] page dumped because: kasan: bad access detected
[   19.830444] 
[   19.830521] Memory state around the buggy address:
[   19.830645]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.831060]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831822] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.832178]                                                                 ^
[   19.832586]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832907]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.833259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user: Failure Automatically assigned
[   19.784279] ==================================================================
[   19.785572] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90
[   19.785808] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302
[   19.786007] 
[   19.786152] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.786242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.786261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.786290] Call Trace:
[   19.786311]  <TASK>
[   19.786342]  dump_stack_lvl+0x73/0xb0
[   19.786383]  print_report+0xd1/0x650
[   19.786415]  ? __virt_addr_valid+0x1db/0x2d0
[   19.786449]  ? _copy_from_user+0x32/0x90
[   19.786492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.786524]  ? _copy_from_user+0x32/0x90
[   19.786549]  kasan_report+0x141/0x180
[   19.786576]  ? _copy_from_user+0x32/0x90
[   19.786606]  kasan_check_range+0x10c/0x1c0
[   19.786636]  __kasan_check_write+0x18/0x20
[   19.786659]  _copy_from_user+0x32/0x90
[   19.786687]  copy_user_test_oob+0x2be/0x10f0
[   19.786719]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.786747]  ? finish_task_switch.isra.0+0x153/0x700
[   19.786779]  ? __switch_to+0x47/0xf50
[   19.786811]  ? __schedule+0x10cc/0x2b60
[   19.786842]  ? __pfx_read_tsc+0x10/0x10
[   19.786869]  ? ktime_get_ts64+0x86/0x230
[   19.786901]  kunit_try_run_case+0x1a5/0x480
[   19.786928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.786950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.786981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.787009]  ? __kthread_parkme+0x82/0x180
[   19.787035]  ? preempt_count_sub+0x50/0x80
[   19.787061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.787086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.787115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.787145]  kthread+0x337/0x6f0
[   19.787170]  ? trace_preempt_on+0x20/0xc0
[   19.787219]  ? __pfx_kthread+0x10/0x10
[   19.787296]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.787324]  ? calculate_sigpending+0x7b/0xa0
[   19.787381]  ? __pfx_kthread+0x10/0x10
[   19.787410]  ret_from_fork+0x116/0x1d0
[   19.787435]  ? __pfx_kthread+0x10/0x10
[   19.787474]  ret_from_fork_asm+0x1a/0x30
[   19.787518]  </TASK>
[   19.787535] 
[   19.797737] Allocated by task 302:
[   19.798079]  kasan_save_stack+0x45/0x70
[   19.798222]  kasan_save_track+0x18/0x40
[   19.798327]  kasan_save_alloc_info+0x3b/0x50
[   19.798885]  __kasan_kmalloc+0xb7/0xc0
[   19.799067]  __kmalloc_noprof+0x1c9/0x500
[   19.799505]  kunit_kmalloc_array+0x25/0x60
[   19.799701]  copy_user_test_oob+0xab/0x10f0
[   19.799819]  kunit_try_run_case+0x1a5/0x480
[   19.799926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.800098]  kthread+0x337/0x6f0
[   19.800583]  ret_from_fork+0x116/0x1d0
[   19.800960]  ret_from_fork_asm+0x1a/0x30
[   19.801274] 
[   19.801884] The buggy address belongs to the object at ffff888103341c00
[   19.801884]  which belongs to the cache kmalloc-128 of size 128
[   19.802708] The buggy address is located 0 bytes inside of
[   19.802708]  allocated 120-byte region [ffff888103341c00, ffff888103341c78)
[   19.803200] 
[   19.803380] The buggy address belongs to the physical page:
[   19.803861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.804218] flags: 0x200000000000000(node=0|zone=2)
[   19.804365] page_type: f5(slab)
[   19.804756] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.805408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.805779] page dumped because: kasan: bad access detected
[   19.806015] 
[   19.806113] Memory state around the buggy address:
[   19.807035]  ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.807282]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.807754] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.808205]                                                                 ^
[   19.808638]  ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.808880]  ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.809468] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   19.735912] ==================================================================
[   19.736550] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   19.736778] Write of size 8 at addr ffff888103341b78 by task kunit_try_catch/298
[   19.737438] 
[   19.737628] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.737714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.737732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.737761] Call Trace:
[   19.737780]  <TASK>
[   19.737805]  dump_stack_lvl+0x73/0xb0
[   19.737840]  print_report+0xd1/0x650
[   19.737867]  ? __virt_addr_valid+0x1db/0x2d0
[   19.737895]  ? copy_to_kernel_nofault+0x99/0x260
[   19.737921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.737949]  ? copy_to_kernel_nofault+0x99/0x260
[   19.737976]  kasan_report+0x141/0x180
[   19.738002]  ? copy_to_kernel_nofault+0x99/0x260
[   19.738033]  kasan_check_range+0x10c/0x1c0
[   19.738060]  __kasan_check_write+0x18/0x20
[   19.738082]  copy_to_kernel_nofault+0x99/0x260
[   19.738110]  copy_to_kernel_nofault_oob+0x288/0x560
[   19.738136]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.738162]  ? finish_task_switch.isra.0+0x153/0x700
[   19.738189]  ? __schedule+0x10cc/0x2b60
[   19.738244]  ? trace_hardirqs_on+0x37/0xe0
[   19.738280]  ? __pfx_read_tsc+0x10/0x10
[   19.738307]  ? ktime_get_ts64+0x86/0x230
[   19.738336]  kunit_try_run_case+0x1a5/0x480
[   19.738362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.738415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.738444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.738484]  ? __kthread_parkme+0x82/0x180
[   19.738508]  ? preempt_count_sub+0x50/0x80
[   19.738535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.738559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.738586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.738613]  kthread+0x337/0x6f0
[   19.738636]  ? trace_preempt_on+0x20/0xc0
[   19.738661]  ? __pfx_kthread+0x10/0x10
[   19.738706]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.738735]  ? calculate_sigpending+0x7b/0xa0
[   19.738764]  ? __pfx_kthread+0x10/0x10
[   19.738790]  ret_from_fork+0x116/0x1d0
[   19.738814]  ? __pfx_kthread+0x10/0x10
[   19.738838]  ret_from_fork_asm+0x1a/0x30
[   19.738873]  </TASK>
[   19.738888] 
[   19.750637] Allocated by task 298:
[   19.751079]  kasan_save_stack+0x45/0x70
[   19.751482]  kasan_save_track+0x18/0x40
[   19.751978]  kasan_save_alloc_info+0x3b/0x50
[   19.752361]  __kasan_kmalloc+0xb7/0xc0
[   19.752675]  __kmalloc_cache_noprof+0x189/0x420
[   19.753438]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.753634]  kunit_try_run_case+0x1a5/0x480
[   19.754000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.754549]  kthread+0x337/0x6f0
[   19.754800]  ret_from_fork+0x116/0x1d0
[   19.754934]  ret_from_fork_asm+0x1a/0x30
[   19.755231] 
[   19.755369] The buggy address belongs to the object at ffff888103341b00
[   19.755369]  which belongs to the cache kmalloc-128 of size 128
[   19.755821] The buggy address is located 0 bytes to the right of
[   19.755821]  allocated 120-byte region [ffff888103341b00, ffff888103341b78)
[   19.756271] 
[   19.756342] The buggy address belongs to the physical page:
[   19.756594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.757248] flags: 0x200000000000000(node=0|zone=2)
[   19.757601] page_type: f5(slab)
[   19.758512] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.758709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.759240] page dumped because: kasan: bad access detected
[   19.759611] 
[   19.760044] Memory state around the buggy address:
[   19.760186]  ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.760584]  ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.760946] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.761315]                                                                 ^
[   19.761610]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.762122]  ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.762541] ==================================================================
[   19.710632] ==================================================================
[   19.711742] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   19.712563] Read of size 8 at addr ffff888103341b78 by task kunit_try_catch/298
[   19.713096] 
[   19.713522] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.713600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.713618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.713646] Call Trace:
[   19.713666]  <TASK>
[   19.713703]  dump_stack_lvl+0x73/0xb0
[   19.713754]  print_report+0xd1/0x650
[   19.713785]  ? __virt_addr_valid+0x1db/0x2d0
[   19.713816]  ? copy_to_kernel_nofault+0x225/0x260
[   19.713844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.713872]  ? copy_to_kernel_nofault+0x225/0x260
[   19.713955]  kasan_report+0x141/0x180
[   19.714026]  ? copy_to_kernel_nofault+0x225/0x260
[   19.714065]  __asan_report_load8_noabort+0x18/0x20
[   19.714093]  copy_to_kernel_nofault+0x225/0x260
[   19.714123]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   19.714151]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.714178]  ? finish_task_switch.isra.0+0x153/0x700
[   19.714232]  ? __schedule+0x10cc/0x2b60
[   19.714308]  ? trace_hardirqs_on+0x37/0xe0
[   19.714347]  ? __pfx_read_tsc+0x10/0x10
[   19.714375]  ? ktime_get_ts64+0x86/0x230
[   19.714406]  kunit_try_run_case+0x1a5/0x480
[   19.714436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.714479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.714511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.714539]  ? __kthread_parkme+0x82/0x180
[   19.714565]  ? preempt_count_sub+0x50/0x80
[   19.714591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.714617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.714646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.714673]  kthread+0x337/0x6f0
[   19.714696]  ? trace_preempt_on+0x20/0xc0
[   19.714809]  ? __pfx_kthread+0x10/0x10
[   19.714851]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.714881]  ? calculate_sigpending+0x7b/0xa0
[   19.714911]  ? __pfx_kthread+0x10/0x10
[   19.714935]  ret_from_fork+0x116/0x1d0
[   19.714962]  ? __pfx_kthread+0x10/0x10
[   19.714985]  ret_from_fork_asm+0x1a/0x30
[   19.715022]  </TASK>
[   19.715037] 
[   19.726029] Allocated by task 298:
[   19.726311]  kasan_save_stack+0x45/0x70
[   19.726606]  kasan_save_track+0x18/0x40
[   19.726739]  kasan_save_alloc_info+0x3b/0x50
[   19.726943]  __kasan_kmalloc+0xb7/0xc0
[   19.727126]  __kmalloc_cache_noprof+0x189/0x420
[   19.727395]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.727545]  kunit_try_run_case+0x1a5/0x480
[   19.727667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.728083]  kthread+0x337/0x6f0
[   19.728358]  ret_from_fork+0x116/0x1d0
[   19.728486]  ret_from_fork_asm+0x1a/0x30
[   19.728607] 
[   19.728829] The buggy address belongs to the object at ffff888103341b00
[   19.728829]  which belongs to the cache kmalloc-128 of size 128
[   19.729489] The buggy address is located 0 bytes to the right of
[   19.729489]  allocated 120-byte region [ffff888103341b00, ffff888103341b78)
[   19.730020] 
[   19.730237] The buggy address belongs to the physical page:
[   19.730615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   19.730848] flags: 0x200000000000000(node=0|zone=2)
[   19.730998] page_type: f5(slab)
[   19.731336] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.731858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.732038] page dumped because: kasan: bad access detected
[   19.732175] 
[   19.732351] Memory state around the buggy address:
[   19.732775]  ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.733235]  ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.733504] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.733672]                                                                 ^
[   19.734129]  ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.734511]  ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.734826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   18.629415] ==================================================================
[   18.629961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   18.630385] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.630622] 
[   18.630760] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.630846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.630871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.630915] Call Trace:
[   18.630958]  <TASK>
[   18.630995]  dump_stack_lvl+0x73/0xb0
[   18.631056]  print_report+0xd1/0x650
[   18.631107]  ? __virt_addr_valid+0x1db/0x2d0
[   18.631155]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.631247]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631295]  kasan_report+0x141/0x180
[   18.631350]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631407]  __asan_report_load4_noabort+0x18/0x20
[   18.631466]  kasan_atomics_helper+0x4a02/0x5450
[   18.631522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.631570]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.631616]  ? kasan_atomics+0x152/0x310
[   18.631673]  kasan_atomics+0x1dc/0x310
[   18.631724]  ? __pfx_kasan_atomics+0x10/0x10
[   18.631778]  ? __pfx_read_tsc+0x10/0x10
[   18.631823]  ? ktime_get_ts64+0x86/0x230
[   18.631879]  kunit_try_run_case+0x1a5/0x480
[   18.631927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.631973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.632030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.632085]  ? __kthread_parkme+0x82/0x180
[   18.632127]  ? preempt_count_sub+0x50/0x80
[   18.632175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.632220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.632274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.632325]  kthread+0x337/0x6f0
[   18.632370]  ? trace_preempt_on+0x20/0xc0
[   18.632422]  ? __pfx_kthread+0x10/0x10
[   18.632516]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.632573]  ? calculate_sigpending+0x7b/0xa0
[   18.632629]  ? __pfx_kthread+0x10/0x10
[   18.632677]  ret_from_fork+0x116/0x1d0
[   18.632718]  ? __pfx_kthread+0x10/0x10
[   18.632766]  ret_from_fork_asm+0x1a/0x30
[   18.632838]  </TASK>
[   18.632866] 
[   18.643315] Allocated by task 282:
[   18.643722]  kasan_save_stack+0x45/0x70
[   18.644119]  kasan_save_track+0x18/0x40
[   18.644448]  kasan_save_alloc_info+0x3b/0x50
[   18.644707]  __kasan_kmalloc+0xb7/0xc0
[   18.645030]  __kmalloc_cache_noprof+0x189/0x420
[   18.645429]  kasan_atomics+0x95/0x310
[   18.645666]  kunit_try_run_case+0x1a5/0x480
[   18.646033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.646333]  kthread+0x337/0x6f0
[   18.646594]  ret_from_fork+0x116/0x1d0
[   18.646903]  ret_from_fork_asm+0x1a/0x30
[   18.647286] 
[   18.647480] The buggy address belongs to the object at ffff8881033ecb00
[   18.647480]  which belongs to the cache kmalloc-64 of size 64
[   18.647939] The buggy address is located 0 bytes to the right of
[   18.647939]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.648430] 
[   18.648635] The buggy address belongs to the physical page:
[   18.649082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.649722] flags: 0x200000000000000(node=0|zone=2)
[   18.650142] page_type: f5(slab)
[   18.650476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.651045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.651391] page dumped because: kasan: bad access detected
[   18.653617] 
[   18.653705] Memory state around the buggy address:
[   18.653828]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.653980]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.654123] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.654507]                                      ^
[   18.655026]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.655658]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.656250] ==================================================================
[   18.360905] ==================================================================
[   18.361403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   18.361744] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.362388] 
[   18.362849] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.362971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.363003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.363051] Call Trace:
[   18.363101]  <TASK>
[   18.363147]  dump_stack_lvl+0x73/0xb0
[   18.363533]  print_report+0xd1/0x650
[   18.363612]  ? __virt_addr_valid+0x1db/0x2d0
[   18.363673]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.363787]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363840]  kasan_report+0x141/0x180
[   18.363897]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363960]  kasan_check_range+0x10c/0x1c0
[   18.364010]  __kasan_check_write+0x18/0x20
[   18.364050]  kasan_atomics_helper+0xde0/0x5450
[   18.364093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.364131]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.364175]  ? kasan_atomics+0x152/0x310
[   18.364246]  kasan_atomics+0x1dc/0x310
[   18.364304]  ? __pfx_kasan_atomics+0x10/0x10
[   18.364354]  ? __pfx_read_tsc+0x10/0x10
[   18.364422]  ? ktime_get_ts64+0x86/0x230
[   18.364493]  kunit_try_run_case+0x1a5/0x480
[   18.364545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.364642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.364694]  ? __kthread_parkme+0x82/0x180
[   18.364741]  ? preempt_count_sub+0x50/0x80
[   18.364796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.364886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.364931]  kthread+0x337/0x6f0
[   18.364974]  ? trace_preempt_on+0x20/0xc0
[   18.365025]  ? __pfx_kthread+0x10/0x10
[   18.365073]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.365119]  ? calculate_sigpending+0x7b/0xa0
[   18.365189]  ? __pfx_kthread+0x10/0x10
[   18.365276]  ret_from_fork+0x116/0x1d0
[   18.365324]  ? __pfx_kthread+0x10/0x10
[   18.365374]  ret_from_fork_asm+0x1a/0x30
[   18.365449]  </TASK>
[   18.365490] 
[   18.376424] Allocated by task 282:
[   18.376845]  kasan_save_stack+0x45/0x70
[   18.377160]  kasan_save_track+0x18/0x40
[   18.377534]  kasan_save_alloc_info+0x3b/0x50
[   18.377757]  __kasan_kmalloc+0xb7/0xc0
[   18.377952]  __kmalloc_cache_noprof+0x189/0x420
[   18.378176]  kasan_atomics+0x95/0x310
[   18.378566]  kunit_try_run_case+0x1a5/0x480
[   18.378947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.379409]  kthread+0x337/0x6f0
[   18.379747]  ret_from_fork+0x116/0x1d0
[   18.380117]  ret_from_fork_asm+0x1a/0x30
[   18.380565] 
[   18.380714] The buggy address belongs to the object at ffff8881033ecb00
[   18.380714]  which belongs to the cache kmalloc-64 of size 64
[   18.381212] The buggy address is located 0 bytes to the right of
[   18.381212]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.381669] 
[   18.381804] The buggy address belongs to the physical page:
[   18.382048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.382367] flags: 0x200000000000000(node=0|zone=2)
[   18.382874] page_type: f5(slab)
[   18.383284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.383926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.384609] page dumped because: kasan: bad access detected
[   18.385043] 
[   18.385205] Memory state around the buggy address:
[   18.385499]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385964]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.386269] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.386827]                                      ^
[   18.387299]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387649]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387934] ==================================================================
[   18.490344] ==================================================================
[   18.491037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   18.491768] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.492418] 
[   18.492682] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.492801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.492832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.492884] Call Trace:
[   18.492955]  <TASK>
[   18.493003]  dump_stack_lvl+0x73/0xb0
[   18.493076]  print_report+0xd1/0x650
[   18.493126]  ? __virt_addr_valid+0x1db/0x2d0
[   18.493178]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.493346]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493396]  kasan_report+0x141/0x180
[   18.493451]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493525]  __asan_report_load4_noabort+0x18/0x20
[   18.493569]  kasan_atomics_helper+0x4a36/0x5450
[   18.493617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.493669]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.493720]  ? kasan_atomics+0x152/0x310
[   18.493779]  kasan_atomics+0x1dc/0x310
[   18.493826]  ? __pfx_kasan_atomics+0x10/0x10
[   18.493901]  ? __pfx_read_tsc+0x10/0x10
[   18.493947]  ? ktime_get_ts64+0x86/0x230
[   18.494008]  kunit_try_run_case+0x1a5/0x480
[   18.494063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.494110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.494148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.494176]  ? __kthread_parkme+0x82/0x180
[   18.494245]  ? preempt_count_sub+0x50/0x80
[   18.494279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.494304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.494333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.494363]  kthread+0x337/0x6f0
[   18.494386]  ? trace_preempt_on+0x20/0xc0
[   18.494414]  ? __pfx_kthread+0x10/0x10
[   18.494438]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.494486]  ? calculate_sigpending+0x7b/0xa0
[   18.494517]  ? __pfx_kthread+0x10/0x10
[   18.494543]  ret_from_fork+0x116/0x1d0
[   18.494565]  ? __pfx_kthread+0x10/0x10
[   18.494590]  ret_from_fork_asm+0x1a/0x30
[   18.494626]  </TASK>
[   18.494641] 
[   18.510039] Allocated by task 282:
[   18.510578]  kasan_save_stack+0x45/0x70
[   18.511160]  kasan_save_track+0x18/0x40
[   18.511750]  kasan_save_alloc_info+0x3b/0x50
[   18.512033]  __kasan_kmalloc+0xb7/0xc0
[   18.512991]  __kmalloc_cache_noprof+0x189/0x420
[   18.513627]  kasan_atomics+0x95/0x310
[   18.513931]  kunit_try_run_case+0x1a5/0x480
[   18.514312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.514782]  kthread+0x337/0x6f0
[   18.515015]  ret_from_fork+0x116/0x1d0
[   18.515385]  ret_from_fork_asm+0x1a/0x30
[   18.515794] 
[   18.516004] The buggy address belongs to the object at ffff8881033ecb00
[   18.516004]  which belongs to the cache kmalloc-64 of size 64
[   18.516611] The buggy address is located 0 bytes to the right of
[   18.516611]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.517597] 
[   18.517741] The buggy address belongs to the physical page:
[   18.518349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.519035] flags: 0x200000000000000(node=0|zone=2)
[   18.519508] page_type: f5(slab)
[   18.519889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.520243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.520880] page dumped because: kasan: bad access detected
[   18.521180] 
[   18.521371] Memory state around the buggy address:
[   18.521714]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522038]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.523067]                                      ^
[   18.523536]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524105]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524634] ==================================================================
[   18.763625] ==================================================================
[   18.763894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   18.764161] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.766156] 
[   18.766541] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.766660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.766687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.766725] Call Trace:
[   18.766757]  <TASK>
[   18.766784]  dump_stack_lvl+0x73/0xb0
[   18.766850]  print_report+0xd1/0x650
[   18.766884]  ? __virt_addr_valid+0x1db/0x2d0
[   18.766914]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.766941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.766969]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.766995]  kasan_report+0x141/0x180
[   18.767022]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.767054]  __asan_report_load4_noabort+0x18/0x20
[   18.767079]  kasan_atomics_helper+0x49ce/0x5450
[   18.767106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.767132]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.767158]  ? kasan_atomics+0x152/0x310
[   18.767191]  kasan_atomics+0x1dc/0x310
[   18.767271]  ? __pfx_kasan_atomics+0x10/0x10
[   18.767335]  ? __pfx_read_tsc+0x10/0x10
[   18.767409]  ? ktime_get_ts64+0x86/0x230
[   18.767483]  kunit_try_run_case+0x1a5/0x480
[   18.767532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.767557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.767589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.767618]  ? __kthread_parkme+0x82/0x180
[   18.767643]  ? preempt_count_sub+0x50/0x80
[   18.767673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.767698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.767726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.767754]  kthread+0x337/0x6f0
[   18.767778]  ? trace_preempt_on+0x20/0xc0
[   18.767805]  ? __pfx_kthread+0x10/0x10
[   18.767829]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.767855]  ? calculate_sigpending+0x7b/0xa0
[   18.767884]  ? __pfx_kthread+0x10/0x10
[   18.767908]  ret_from_fork+0x116/0x1d0
[   18.767931]  ? __pfx_kthread+0x10/0x10
[   18.767954]  ret_from_fork_asm+0x1a/0x30
[   18.767991]  </TASK>
[   18.768005] 
[   18.783062] Allocated by task 282:
[   18.783362]  kasan_save_stack+0x45/0x70
[   18.783864]  kasan_save_track+0x18/0x40
[   18.784447]  kasan_save_alloc_info+0x3b/0x50
[   18.784690]  __kasan_kmalloc+0xb7/0xc0
[   18.785196]  __kmalloc_cache_noprof+0x189/0x420
[   18.785654]  kasan_atomics+0x95/0x310
[   18.785873]  kunit_try_run_case+0x1a5/0x480
[   18.786113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.786639]  kthread+0x337/0x6f0
[   18.787006]  ret_from_fork+0x116/0x1d0
[   18.787255]  ret_from_fork_asm+0x1a/0x30
[   18.787485] 
[   18.787610] The buggy address belongs to the object at ffff8881033ecb00
[   18.787610]  which belongs to the cache kmalloc-64 of size 64
[   18.788506] The buggy address is located 0 bytes to the right of
[   18.788506]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.789260] 
[   18.789426] The buggy address belongs to the physical page:
[   18.789939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.790441] flags: 0x200000000000000(node=0|zone=2)
[   18.790849] page_type: f5(slab)
[   18.791051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.791373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.792015] page dumped because: kasan: bad access detected
[   18.792486] 
[   18.792708] Memory state around the buggy address:
[   18.793070]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.793768]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.794057] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.794612]                                      ^
[   18.795074]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.795588]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.795979] ==================================================================
[   18.111607] ==================================================================
[   18.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   18.113193] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.114235] 
[   18.114606] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.114717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.114737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.114764] Call Trace:
[   18.114790]  <TASK>
[   18.114815]  dump_stack_lvl+0x73/0xb0
[   18.114856]  print_report+0xd1/0x650
[   18.114885]  ? __virt_addr_valid+0x1db/0x2d0
[   18.114912]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.114937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.114963]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.114988]  kasan_report+0x141/0x180
[   18.115013]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.115043]  kasan_check_range+0x10c/0x1c0
[   18.115070]  __kasan_check_write+0x18/0x20
[   18.115094]  kasan_atomics_helper+0x8f9/0x5450
[   18.115120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.115145]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.115171]  ? kasan_atomics+0x152/0x310
[   18.115211]  kasan_atomics+0x1dc/0x310
[   18.115272]  ? __pfx_kasan_atomics+0x10/0x10
[   18.115302]  ? __pfx_read_tsc+0x10/0x10
[   18.115328]  ? ktime_get_ts64+0x86/0x230
[   18.115373]  kunit_try_run_case+0x1a5/0x480
[   18.115401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.115424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.115473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.115508]  ? __kthread_parkme+0x82/0x180
[   18.115535]  ? preempt_count_sub+0x50/0x80
[   18.115564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.115589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.115619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.115648]  kthread+0x337/0x6f0
[   18.115672]  ? trace_preempt_on+0x20/0xc0
[   18.115700]  ? __pfx_kthread+0x10/0x10
[   18.115723]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.115749]  ? calculate_sigpending+0x7b/0xa0
[   18.115778]  ? __pfx_kthread+0x10/0x10
[   18.115803]  ret_from_fork+0x116/0x1d0
[   18.115825]  ? __pfx_kthread+0x10/0x10
[   18.115849]  ret_from_fork_asm+0x1a/0x30
[   18.115885]  </TASK>
[   18.115899] 
[   18.128229] Allocated by task 282:
[   18.128687]  kasan_save_stack+0x45/0x70
[   18.129157]  kasan_save_track+0x18/0x40
[   18.129590]  kasan_save_alloc_info+0x3b/0x50
[   18.129992]  __kasan_kmalloc+0xb7/0xc0
[   18.130409]  __kmalloc_cache_noprof+0x189/0x420
[   18.130785]  kasan_atomics+0x95/0x310
[   18.130954]  kunit_try_run_case+0x1a5/0x480
[   18.131332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.131662]  kthread+0x337/0x6f0
[   18.131997]  ret_from_fork+0x116/0x1d0
[   18.132349]  ret_from_fork_asm+0x1a/0x30
[   18.132604] 
[   18.132814] The buggy address belongs to the object at ffff8881033ecb00
[   18.132814]  which belongs to the cache kmalloc-64 of size 64
[   18.133615] The buggy address is located 0 bytes to the right of
[   18.133615]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.134357] 
[   18.134535] The buggy address belongs to the physical page:
[   18.134936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.135422] flags: 0x200000000000000(node=0|zone=2)
[   18.135810] page_type: f5(slab)
[   18.136136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.136623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.137071] page dumped because: kasan: bad access detected
[   18.137521] 
[   18.137643] Memory state around the buggy address:
[   18.138054]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.138513]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.138998] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.139494]                                      ^
[   18.139854]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140357]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140786] ==================================================================
[   18.028049] ==================================================================
[   18.028388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   18.028662] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.030075] 
[   18.030635] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.030770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.030794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.030824] Call Trace:
[   18.030851]  <TASK>
[   18.030878]  dump_stack_lvl+0x73/0xb0
[   18.030924]  print_report+0xd1/0x650
[   18.030952]  ? __virt_addr_valid+0x1db/0x2d0
[   18.030981]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.031032]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031059]  kasan_report+0x141/0x180
[   18.031085]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031114]  kasan_check_range+0x10c/0x1c0
[   18.031141]  __kasan_check_write+0x18/0x20
[   18.031164]  kasan_atomics_helper+0x72f/0x5450
[   18.031206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.031268]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.031311]  ? kasan_atomics+0x152/0x310
[   18.031362]  kasan_atomics+0x1dc/0x310
[   18.031395]  ? __pfx_kasan_atomics+0x10/0x10
[   18.031425]  ? __pfx_read_tsc+0x10/0x10
[   18.031452]  ? ktime_get_ts64+0x86/0x230
[   18.031505]  kunit_try_run_case+0x1a5/0x480
[   18.031532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.031556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.031587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.031615]  ? __kthread_parkme+0x82/0x180
[   18.031641]  ? preempt_count_sub+0x50/0x80
[   18.031670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.031695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.031723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.031752]  kthread+0x337/0x6f0
[   18.031777]  ? trace_preempt_on+0x20/0xc0
[   18.031804]  ? __pfx_kthread+0x10/0x10
[   18.031829]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.031855]  ? calculate_sigpending+0x7b/0xa0
[   18.031884]  ? __pfx_kthread+0x10/0x10
[   18.031910]  ret_from_fork+0x116/0x1d0
[   18.031933]  ? __pfx_kthread+0x10/0x10
[   18.031958]  ret_from_fork_asm+0x1a/0x30
[   18.031994]  </TASK>
[   18.032009] 
[   18.040721] Allocated by task 282:
[   18.041046]  kasan_save_stack+0x45/0x70
[   18.041434]  kasan_save_track+0x18/0x40
[   18.041758]  kasan_save_alloc_info+0x3b/0x50
[   18.042088]  __kasan_kmalloc+0xb7/0xc0
[   18.042435]  __kmalloc_cache_noprof+0x189/0x420
[   18.042814]  kasan_atomics+0x95/0x310
[   18.043123]  kunit_try_run_case+0x1a5/0x480
[   18.043520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.043946]  kthread+0x337/0x6f0
[   18.044291]  ret_from_fork+0x116/0x1d0
[   18.044641]  ret_from_fork_asm+0x1a/0x30
[   18.044957] 
[   18.045137] The buggy address belongs to the object at ffff8881033ecb00
[   18.045137]  which belongs to the cache kmalloc-64 of size 64
[   18.045874] The buggy address is located 0 bytes to the right of
[   18.045874]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.046560] 
[   18.046755] The buggy address belongs to the physical page:
[   18.047072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.047552] flags: 0x200000000000000(node=0|zone=2)
[   18.047796] page_type: f5(slab)
[   18.047995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.048341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.048866] page dumped because: kasan: bad access detected
[   18.049362] 
[   18.049552] Memory state around the buggy address:
[   18.049945]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.050495]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.051027] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.051579]                                      ^
[   18.051815]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.052339]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.052854] ==================================================================
[   19.083913] ==================================================================
[   19.085114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   19.085810] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.086497] 
[   19.086751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.086866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.086900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.086950] Call Trace:
[   19.086999]  <TASK>
[   19.087058]  dump_stack_lvl+0x73/0xb0
[   19.087139]  print_report+0xd1/0x650
[   19.087195]  ? __virt_addr_valid+0x1db/0x2d0
[   19.087266]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.087472]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087526]  kasan_report+0x141/0x180
[   19.087586]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087639]  kasan_check_range+0x10c/0x1c0
[   19.087694]  __kasan_check_write+0x18/0x20
[   19.087744]  kasan_atomics_helper+0x1818/0x5450
[   19.087800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.087853]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.087903]  ? kasan_atomics+0x152/0x310
[   19.087963]  kasan_atomics+0x1dc/0x310
[   19.088015]  ? __pfx_kasan_atomics+0x10/0x10
[   19.088068]  ? __pfx_read_tsc+0x10/0x10
[   19.088099]  ? ktime_get_ts64+0x86/0x230
[   19.088131]  kunit_try_run_case+0x1a5/0x480
[   19.088157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.088181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.088424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.088514]  ? __kthread_parkme+0x82/0x180
[   19.088558]  ? preempt_count_sub+0x50/0x80
[   19.088588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.088613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.088642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.088669]  kthread+0x337/0x6f0
[   19.088692]  ? trace_preempt_on+0x20/0xc0
[   19.088718]  ? __pfx_kthread+0x10/0x10
[   19.088740]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.088765]  ? calculate_sigpending+0x7b/0xa0
[   19.088793]  ? __pfx_kthread+0x10/0x10
[   19.088815]  ret_from_fork+0x116/0x1d0
[   19.088839]  ? __pfx_kthread+0x10/0x10
[   19.088863]  ret_from_fork_asm+0x1a/0x30
[   19.088897]  </TASK>
[   19.088912] 
[   19.099798] Allocated by task 282:
[   19.100208]  kasan_save_stack+0x45/0x70
[   19.100660]  kasan_save_track+0x18/0x40
[   19.100909]  kasan_save_alloc_info+0x3b/0x50
[   19.101151]  __kasan_kmalloc+0xb7/0xc0
[   19.101530]  __kmalloc_cache_noprof+0x189/0x420
[   19.101949]  kasan_atomics+0x95/0x310
[   19.102185]  kunit_try_run_case+0x1a5/0x480
[   19.102527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.102813]  kthread+0x337/0x6f0
[   19.103104]  ret_from_fork+0x116/0x1d0
[   19.103545]  ret_from_fork_asm+0x1a/0x30
[   19.103894] 
[   19.104052] The buggy address belongs to the object at ffff8881033ecb00
[   19.104052]  which belongs to the cache kmalloc-64 of size 64
[   19.104782] The buggy address is located 0 bytes to the right of
[   19.104782]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.105298] 
[   19.105450] The buggy address belongs to the physical page:
[   19.105724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.106098] flags: 0x200000000000000(node=0|zone=2)
[   19.106418] page_type: f5(slab)
[   19.106747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.107380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.108054] page dumped because: kasan: bad access detected
[   19.108498] 
[   19.108744] Memory state around the buggy address:
[   19.109156]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.109722]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.110074] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.110838]                                      ^
[   19.111100]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.111729]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.112095] ==================================================================
[   19.234483] ==================================================================
[   19.235133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   19.235898] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.236726] 
[   19.237033] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.237146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.237180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.237282] Call Trace:
[   19.237342]  <TASK>
[   19.237388]  dump_stack_lvl+0x73/0xb0
[   19.237506]  print_report+0xd1/0x650
[   19.237559]  ? __virt_addr_valid+0x1db/0x2d0
[   19.237594]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.237645]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237668]  kasan_report+0x141/0x180
[   19.237692]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237738]  kasan_check_range+0x10c/0x1c0
[   19.237776]  __kasan_check_write+0x18/0x20
[   19.237799]  kasan_atomics_helper+0x1b22/0x5450
[   19.237825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.237852]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.237876]  ? kasan_atomics+0x152/0x310
[   19.237904]  kasan_atomics+0x1dc/0x310
[   19.237930]  ? __pfx_kasan_atomics+0x10/0x10
[   19.237955]  ? __pfx_read_tsc+0x10/0x10
[   19.237980]  ? ktime_get_ts64+0x86/0x230
[   19.238011]  kunit_try_run_case+0x1a5/0x480
[   19.238036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.238058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.238085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.238111]  ? __kthread_parkme+0x82/0x180
[   19.238135]  ? preempt_count_sub+0x50/0x80
[   19.238163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.238186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.238261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.238290]  kthread+0x337/0x6f0
[   19.238313]  ? trace_preempt_on+0x20/0xc0
[   19.238339]  ? __pfx_kthread+0x10/0x10
[   19.238362]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.238386]  ? calculate_sigpending+0x7b/0xa0
[   19.238413]  ? __pfx_kthread+0x10/0x10
[   19.238436]  ret_from_fork+0x116/0x1d0
[   19.238475]  ? __pfx_kthread+0x10/0x10
[   19.238501]  ret_from_fork_asm+0x1a/0x30
[   19.238537]  </TASK>
[   19.238550] 
[   19.251874] Allocated by task 282:
[   19.252423]  kasan_save_stack+0x45/0x70
[   19.252881]  kasan_save_track+0x18/0x40
[   19.253160]  kasan_save_alloc_info+0x3b/0x50
[   19.254274]  __kasan_kmalloc+0xb7/0xc0
[   19.254708]  __kmalloc_cache_noprof+0x189/0x420
[   19.255071]  kasan_atomics+0x95/0x310
[   19.256555]  kunit_try_run_case+0x1a5/0x480
[   19.256784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.257252]  kthread+0x337/0x6f0
[   19.257443]  ret_from_fork+0x116/0x1d0
[   19.257836]  ret_from_fork_asm+0x1a/0x30
[   19.258023] 
[   19.258169] The buggy address belongs to the object at ffff8881033ecb00
[   19.258169]  which belongs to the cache kmalloc-64 of size 64
[   19.258667] The buggy address is located 0 bytes to the right of
[   19.258667]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.259212] 
[   19.259396] The buggy address belongs to the physical page:
[   19.259817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.260407] flags: 0x200000000000000(node=0|zone=2)
[   19.260772] page_type: f5(slab)
[   19.261093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.262646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.263060] page dumped because: kasan: bad access detected
[   19.263402] 
[   19.263581] Memory state around the buggy address:
[   19.263836]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.264502]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.265070] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.265703]                                      ^
[   19.266144]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.266780]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.267120] ==================================================================
[   17.873113] ==================================================================
[   17.874007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   17.874385] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.875044] 
[   17.875476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.875606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.875642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.875698] Call Trace:
[   17.875742]  <TASK>
[   17.875782]  dump_stack_lvl+0x73/0xb0
[   17.875852]  print_report+0xd1/0x650
[   17.876263]  ? __virt_addr_valid+0x1db/0x2d0
[   17.876321]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.876406]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876439]  kasan_report+0x141/0x180
[   17.876491]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876533]  __asan_report_store4_noabort+0x1b/0x30
[   17.876567]  kasan_atomics_helper+0x4b3a/0x5450
[   17.876604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.876638]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.876671]  ? kasan_atomics+0x152/0x310
[   17.876737]  kasan_atomics+0x1dc/0x310
[   17.876776]  ? __pfx_kasan_atomics+0x10/0x10
[   17.876817]  ? __pfx_read_tsc+0x10/0x10
[   17.876856]  ? ktime_get_ts64+0x86/0x230
[   17.876903]  kunit_try_run_case+0x1a5/0x480
[   17.876944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.876973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.877004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.877033]  ? __kthread_parkme+0x82/0x180
[   17.877057]  ? preempt_count_sub+0x50/0x80
[   17.877086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.877109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.877139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.877168]  kthread+0x337/0x6f0
[   17.877192]  ? trace_preempt_on+0x20/0xc0
[   17.877259]  ? __pfx_kthread+0x10/0x10
[   17.877287]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.877313]  ? calculate_sigpending+0x7b/0xa0
[   17.877342]  ? __pfx_kthread+0x10/0x10
[   17.877368]  ret_from_fork+0x116/0x1d0
[   17.877391]  ? __pfx_kthread+0x10/0x10
[   17.877415]  ret_from_fork_asm+0x1a/0x30
[   17.877467]  </TASK>
[   17.877487] 
[   17.893421] Allocated by task 282:
[   17.893915]  kasan_save_stack+0x45/0x70
[   17.895070]  kasan_save_track+0x18/0x40
[   17.895364]  kasan_save_alloc_info+0x3b/0x50
[   17.895800]  __kasan_kmalloc+0xb7/0xc0
[   17.896108]  __kmalloc_cache_noprof+0x189/0x420
[   17.896909]  kasan_atomics+0x95/0x310
[   17.897219]  kunit_try_run_case+0x1a5/0x480
[   17.897439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.898032]  kthread+0x337/0x6f0
[   17.898769]  ret_from_fork+0x116/0x1d0
[   17.899148]  ret_from_fork_asm+0x1a/0x30
[   17.899825] 
[   17.900034] The buggy address belongs to the object at ffff8881033ecb00
[   17.900034]  which belongs to the cache kmalloc-64 of size 64
[   17.900808] The buggy address is located 0 bytes to the right of
[   17.900808]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.901818] 
[   17.901963] The buggy address belongs to the physical page:
[   17.902709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.903766] flags: 0x200000000000000(node=0|zone=2)
[   17.904053] page_type: f5(slab)
[   17.904257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.904908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.906530] page dumped because: kasan: bad access detected
[   17.907088] 
[   17.907504] Memory state around the buggy address:
[   17.908508]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.909136]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.909627] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.910671]                                      ^
[   17.911328]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911632]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.912552] ==================================================================
[   18.458935] ==================================================================
[   18.459887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   18.460231] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.460525] 
[   18.460702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.460822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.460863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.460915] Call Trace:
[   18.461321]  <TASK>
[   18.461387]  dump_stack_lvl+0x73/0xb0
[   18.461468]  print_report+0xd1/0x650
[   18.461513]  ? __virt_addr_valid+0x1db/0x2d0
[   18.461608]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.461696]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461742]  kasan_report+0x141/0x180
[   18.461793]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461850]  kasan_check_range+0x10c/0x1c0
[   18.461907]  __kasan_check_write+0x18/0x20
[   18.461953]  kasan_atomics_helper+0xfa9/0x5450
[   18.462007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.462060]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.462109]  ? kasan_atomics+0x152/0x310
[   18.462166]  kasan_atomics+0x1dc/0x310
[   18.462218]  ? __pfx_kasan_atomics+0x10/0x10
[   18.462273]  ? __pfx_read_tsc+0x10/0x10
[   18.462321]  ? ktime_get_ts64+0x86/0x230
[   18.462373]  kunit_try_run_case+0x1a5/0x480
[   18.462418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.462472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.462526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.462575]  ? __kthread_parkme+0x82/0x180
[   18.462618]  ? preempt_count_sub+0x50/0x80
[   18.462666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.462709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.462755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.462802]  kthread+0x337/0x6f0
[   18.462845]  ? trace_preempt_on+0x20/0xc0
[   18.462894]  ? __pfx_kthread+0x10/0x10
[   18.462937]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.462984]  ? calculate_sigpending+0x7b/0xa0
[   18.463034]  ? __pfx_kthread+0x10/0x10
[   18.463080]  ret_from_fork+0x116/0x1d0
[   18.463120]  ? __pfx_kthread+0x10/0x10
[   18.463160]  ret_from_fork_asm+0x1a/0x30
[   18.463226]  </TASK>
[   18.463252] 
[   18.475950] Allocated by task 282:
[   18.476308]  kasan_save_stack+0x45/0x70
[   18.476660]  kasan_save_track+0x18/0x40
[   18.476983]  kasan_save_alloc_info+0x3b/0x50
[   18.477258]  __kasan_kmalloc+0xb7/0xc0
[   18.477670]  __kmalloc_cache_noprof+0x189/0x420
[   18.477919]  kasan_atomics+0x95/0x310
[   18.478132]  kunit_try_run_case+0x1a5/0x480
[   18.478395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.478656]  kthread+0x337/0x6f0
[   18.478866]  ret_from_fork+0x116/0x1d0
[   18.479080]  ret_from_fork_asm+0x1a/0x30
[   18.479333] 
[   18.479539] The buggy address belongs to the object at ffff8881033ecb00
[   18.479539]  which belongs to the cache kmalloc-64 of size 64
[   18.480543] The buggy address is located 0 bytes to the right of
[   18.480543]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.481601] 
[   18.481814] The buggy address belongs to the physical page:
[   18.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.482975] flags: 0x200000000000000(node=0|zone=2)
[   18.483494] page_type: f5(slab)
[   18.483827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.484488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.485111] page dumped because: kasan: bad access detected
[   18.485564] 
[   18.485696] Memory state around the buggy address:
[   18.485936]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.486268]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.486656] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.487271]                                      ^
[   18.487727]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.488360]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.488885] ==================================================================
[   18.201635] ==================================================================
[   18.202339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   18.203213] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.203784] 
[   18.203932] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.204022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.204045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.204083] Call Trace:
[   18.204148]  <TASK>
[   18.204213]  dump_stack_lvl+0x73/0xb0
[   18.204341]  print_report+0xd1/0x650
[   18.204417]  ? __virt_addr_valid+0x1db/0x2d0
[   18.204497]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.204629]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204694]  kasan_report+0x141/0x180
[   18.204759]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204821]  kasan_check_range+0x10c/0x1c0
[   18.204889]  __kasan_check_write+0x18/0x20
[   18.204948]  kasan_atomics_helper+0xac7/0x5450
[   18.205011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.205074]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.205131]  ? kasan_atomics+0x152/0x310
[   18.205227]  kasan_atomics+0x1dc/0x310
[   18.205282]  ? __pfx_kasan_atomics+0x10/0x10
[   18.205340]  ? __pfx_read_tsc+0x10/0x10
[   18.205395]  ? ktime_get_ts64+0x86/0x230
[   18.205463]  kunit_try_run_case+0x1a5/0x480
[   18.205508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.205552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.205612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.205670]  ? __kthread_parkme+0x82/0x180
[   18.205723]  ? preempt_count_sub+0x50/0x80
[   18.205781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.205831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.205890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.205946]  kthread+0x337/0x6f0
[   18.205996]  ? trace_preempt_on+0x20/0xc0
[   18.206056]  ? __pfx_kthread+0x10/0x10
[   18.206108]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.206163]  ? calculate_sigpending+0x7b/0xa0
[   18.206250]  ? __pfx_kthread+0x10/0x10
[   18.206303]  ret_from_fork+0x116/0x1d0
[   18.206351]  ? __pfx_kthread+0x10/0x10
[   18.206402]  ret_from_fork_asm+0x1a/0x30
[   18.206482]  </TASK>
[   18.206506] 
[   18.218414] Allocated by task 282:
[   18.218665]  kasan_save_stack+0x45/0x70
[   18.218919]  kasan_save_track+0x18/0x40
[   18.219110]  kasan_save_alloc_info+0x3b/0x50
[   18.219316]  __kasan_kmalloc+0xb7/0xc0
[   18.219700]  __kmalloc_cache_noprof+0x189/0x420
[   18.220138]  kasan_atomics+0x95/0x310
[   18.220544]  kunit_try_run_case+0x1a5/0x480
[   18.220976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.221645]  kthread+0x337/0x6f0
[   18.222039]  ret_from_fork+0x116/0x1d0
[   18.222425]  ret_from_fork_asm+0x1a/0x30
[   18.222847] 
[   18.223054] The buggy address belongs to the object at ffff8881033ecb00
[   18.223054]  which belongs to the cache kmalloc-64 of size 64
[   18.224090] The buggy address is located 0 bytes to the right of
[   18.224090]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.225266] 
[   18.225529] The buggy address belongs to the physical page:
[   18.226030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.226787] flags: 0x200000000000000(node=0|zone=2)
[   18.227291] page_type: f5(slab)
[   18.227636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.228430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.229177] page dumped because: kasan: bad access detected
[   18.229720] 
[   18.229845] Memory state around the buggy address:
[   18.230058]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.230793]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231175] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.231686]                                      ^
[   18.232091]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232866]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.233574] ==================================================================
[   18.987414] ==================================================================
[   18.988074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   18.988724] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.989358] 
[   18.989594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.989697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.989724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.989774] Call Trace:
[   18.990288]  <TASK>
[   18.990338]  dump_stack_lvl+0x73/0xb0
[   18.990409]  print_report+0xd1/0x650
[   18.990469]  ? __virt_addr_valid+0x1db/0x2d0
[   18.990522]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.990615]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990660]  kasan_report+0x141/0x180
[   18.990706]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990762]  kasan_check_range+0x10c/0x1c0
[   18.990809]  __kasan_check_write+0x18/0x20
[   18.990849]  kasan_atomics_helper+0x164f/0x5450
[   18.990898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.990945]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.990990]  ? kasan_atomics+0x152/0x310
[   18.991044]  kasan_atomics+0x1dc/0x310
[   18.991090]  ? __pfx_kasan_atomics+0x10/0x10
[   18.991138]  ? __pfx_read_tsc+0x10/0x10
[   18.991181]  ? ktime_get_ts64+0x86/0x230
[   18.991268]  kunit_try_run_case+0x1a5/0x480
[   18.991317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.991370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.991424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.991493]  ? __kthread_parkme+0x82/0x180
[   18.991534]  ? preempt_count_sub+0x50/0x80
[   18.991579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.991621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.991669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.991722]  kthread+0x337/0x6f0
[   18.991763]  ? trace_preempt_on+0x20/0xc0
[   18.991813]  ? __pfx_kthread+0x10/0x10
[   18.991862]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.991910]  ? calculate_sigpending+0x7b/0xa0
[   18.991954]  ? __pfx_kthread+0x10/0x10
[   18.991994]  ret_from_fork+0x116/0x1d0
[   18.992035]  ? __pfx_kthread+0x10/0x10
[   18.992072]  ret_from_fork_asm+0x1a/0x30
[   18.992131]  </TASK>
[   18.992155] 
[   19.005850] Allocated by task 282:
[   19.006249]  kasan_save_stack+0x45/0x70
[   19.006632]  kasan_save_track+0x18/0x40
[   19.006907]  kasan_save_alloc_info+0x3b/0x50
[   19.007335]  __kasan_kmalloc+0xb7/0xc0
[   19.007637]  __kmalloc_cache_noprof+0x189/0x420
[   19.008002]  kasan_atomics+0x95/0x310
[   19.008273]  kunit_try_run_case+0x1a5/0x480
[   19.008508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.008972]  kthread+0x337/0x6f0
[   19.009339]  ret_from_fork+0x116/0x1d0
[   19.009696]  ret_from_fork_asm+0x1a/0x30
[   19.009969] 
[   19.010159] The buggy address belongs to the object at ffff8881033ecb00
[   19.010159]  which belongs to the cache kmalloc-64 of size 64
[   19.010733] The buggy address is located 0 bytes to the right of
[   19.010733]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.011718] 
[   19.011944] The buggy address belongs to the physical page:
[   19.012376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.012813] flags: 0x200000000000000(node=0|zone=2)
[   19.013300] page_type: f5(slab)
[   19.013833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.014789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.015237] page dumped because: kasan: bad access detected
[   19.016118] 
[   19.016271] Memory state around the buggy address:
[   19.016575]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.017142]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.017735] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.018249]                                      ^
[   19.018742]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.019137]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.019637] ==================================================================
[   18.143077] ==================================================================
[   18.144177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   18.144708] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.145288] 
[   18.145508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.145621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.145663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.145733] Call Trace:
[   18.145786]  <TASK>
[   18.145830]  dump_stack_lvl+0x73/0xb0
[   18.145912]  print_report+0xd1/0x650
[   18.145982]  ? __virt_addr_valid+0x1db/0x2d0
[   18.146041]  ? kasan_atomics_helper+0x992/0x5450
[   18.146084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.146113]  ? kasan_atomics_helper+0x992/0x5450
[   18.146139]  kasan_report+0x141/0x180
[   18.146167]  ? kasan_atomics_helper+0x992/0x5450
[   18.146220]  kasan_check_range+0x10c/0x1c0
[   18.146289]  __kasan_check_write+0x18/0x20
[   18.146333]  kasan_atomics_helper+0x992/0x5450
[   18.146385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.146437]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.146502]  ? kasan_atomics+0x152/0x310
[   18.146567]  kasan_atomics+0x1dc/0x310
[   18.146615]  ? __pfx_kasan_atomics+0x10/0x10
[   18.146668]  ? __pfx_read_tsc+0x10/0x10
[   18.146716]  ? ktime_get_ts64+0x86/0x230
[   18.146789]  kunit_try_run_case+0x1a5/0x480
[   18.146860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.146903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.146952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.146990]  ? __kthread_parkme+0x82/0x180
[   18.147016]  ? preempt_count_sub+0x50/0x80
[   18.147046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.147103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.147133]  kthread+0x337/0x6f0
[   18.147157]  ? trace_preempt_on+0x20/0xc0
[   18.147186]  ? __pfx_kthread+0x10/0x10
[   18.147247]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.147278]  ? calculate_sigpending+0x7b/0xa0
[   18.147308]  ? __pfx_kthread+0x10/0x10
[   18.147334]  ret_from_fork+0x116/0x1d0
[   18.147372]  ? __pfx_kthread+0x10/0x10
[   18.147400]  ret_from_fork_asm+0x1a/0x30
[   18.147439]  </TASK>
[   18.147488] 
[   18.158032] Allocated by task 282:
[   18.158465]  kasan_save_stack+0x45/0x70
[   18.158732]  kasan_save_track+0x18/0x40
[   18.158937]  kasan_save_alloc_info+0x3b/0x50
[   18.159151]  __kasan_kmalloc+0xb7/0xc0
[   18.159437]  __kmalloc_cache_noprof+0x189/0x420
[   18.159876]  kasan_atomics+0x95/0x310
[   18.160229]  kunit_try_run_case+0x1a5/0x480
[   18.160659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.161112]  kthread+0x337/0x6f0
[   18.161405]  ret_from_fork+0x116/0x1d0
[   18.161894]  ret_from_fork_asm+0x1a/0x30
[   18.162203] 
[   18.162404] The buggy address belongs to the object at ffff8881033ecb00
[   18.162404]  which belongs to the cache kmalloc-64 of size 64
[   18.163106] The buggy address is located 0 bytes to the right of
[   18.163106]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.163820] 
[   18.163967] The buggy address belongs to the physical page:
[   18.164210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.164870] flags: 0x200000000000000(node=0|zone=2)
[   18.165406] page_type: f5(slab)
[   18.165757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.166304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.166710] page dumped because: kasan: bad access detected
[   18.167108] 
[   18.167321] Memory state around the buggy address:
[   18.167612]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.167913]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168375] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.168935]                                      ^
[   18.169416]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169917]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.170333] ==================================================================
[   19.473076] ==================================================================
[   19.473570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   19.473903] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.474417] 
[   19.474692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.474802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.474836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.474891] Call Trace:
[   19.474939]  <TASK>
[   19.474987]  dump_stack_lvl+0x73/0xb0
[   19.475048]  print_report+0xd1/0x650
[   19.475100]  ? __virt_addr_valid+0x1db/0x2d0
[   19.475152]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.475329]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475409]  kasan_report+0x141/0x180
[   19.475483]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475544]  __asan_report_load8_noabort+0x18/0x20
[   19.475598]  kasan_atomics_helper+0x4f71/0x5450
[   19.475657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.475718]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.475775]  ? kasan_atomics+0x152/0x310
[   19.475835]  kasan_atomics+0x1dc/0x310
[   19.475889]  ? __pfx_kasan_atomics+0x10/0x10
[   19.475954]  ? __pfx_read_tsc+0x10/0x10
[   19.476018]  ? ktime_get_ts64+0x86/0x230
[   19.476082]  kunit_try_run_case+0x1a5/0x480
[   19.476128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.476263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.476331]  ? __kthread_parkme+0x82/0x180
[   19.476399]  ? preempt_count_sub+0x50/0x80
[   19.476462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.476581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.476657]  kthread+0x337/0x6f0
[   19.476708]  ? trace_preempt_on+0x20/0xc0
[   19.476755]  ? __pfx_kthread+0x10/0x10
[   19.476794]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.476824]  ? calculate_sigpending+0x7b/0xa0
[   19.476854]  ? __pfx_kthread+0x10/0x10
[   19.476880]  ret_from_fork+0x116/0x1d0
[   19.476905]  ? __pfx_kthread+0x10/0x10
[   19.476929]  ret_from_fork_asm+0x1a/0x30
[   19.476967]  </TASK>
[   19.476982] 
[   19.487148] Allocated by task 282:
[   19.487595]  kasan_save_stack+0x45/0x70
[   19.488014]  kasan_save_track+0x18/0x40
[   19.488481]  kasan_save_alloc_info+0x3b/0x50
[   19.488866]  __kasan_kmalloc+0xb7/0xc0
[   19.489191]  __kmalloc_cache_noprof+0x189/0x420
[   19.489606]  kasan_atomics+0x95/0x310
[   19.489968]  kunit_try_run_case+0x1a5/0x480
[   19.490402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.490715]  kthread+0x337/0x6f0
[   19.490947]  ret_from_fork+0x116/0x1d0
[   19.491141]  ret_from_fork_asm+0x1a/0x30
[   19.491535] 
[   19.491687] The buggy address belongs to the object at ffff8881033ecb00
[   19.491687]  which belongs to the cache kmalloc-64 of size 64
[   19.493145] The buggy address is located 0 bytes to the right of
[   19.493145]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.494106] 
[   19.495447] The buggy address belongs to the physical page:
[   19.495919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.496716] flags: 0x200000000000000(node=0|zone=2)
[   19.497395] page_type: f5(slab)
[   19.497552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.497735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.497923] page dumped because: kasan: bad access detected
[   19.498067] 
[   19.498138] Memory state around the buggy address:
[   19.498438]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.498928]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499320] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.500047]                                      ^
[   19.500408]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500764]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.501240] ==================================================================
[   17.603376] ==================================================================
[   17.604397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   17.605029] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.605353] 
[   17.605587] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.605692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.605723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.605770] Call Trace:
[   17.605801]  <TASK>
[   17.605839]  dump_stack_lvl+0x73/0xb0
[   17.605901]  print_report+0xd1/0x650
[   17.605947]  ? __virt_addr_valid+0x1db/0x2d0
[   17.605994]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.606089]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606141]  kasan_report+0x141/0x180
[   17.606192]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606256]  __asan_report_load4_noabort+0x18/0x20
[   17.606306]  kasan_atomics_helper+0x4bbc/0x5450
[   17.606350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.606394]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.606439]  ? kasan_atomics+0x152/0x310
[   17.606565]  kasan_atomics+0x1dc/0x310
[   17.606642]  ? __pfx_kasan_atomics+0x10/0x10
[   17.606706]  ? __pfx_read_tsc+0x10/0x10
[   17.606751]  ? ktime_get_ts64+0x86/0x230
[   17.606795]  kunit_try_run_case+0x1a5/0x480
[   17.606846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.606881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.606928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.606978]  ? __kthread_parkme+0x82/0x180
[   17.607032]  ? preempt_count_sub+0x50/0x80
[   17.607091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.607136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.607167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.607217]  kthread+0x337/0x6f0
[   17.607253]  ? trace_preempt_on+0x20/0xc0
[   17.607281]  ? __pfx_kthread+0x10/0x10
[   17.607305]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.607331]  ? calculate_sigpending+0x7b/0xa0
[   17.607374]  ? __pfx_kthread+0x10/0x10
[   17.607399]  ret_from_fork+0x116/0x1d0
[   17.607422]  ? __pfx_kthread+0x10/0x10
[   17.607445]  ret_from_fork_asm+0x1a/0x30
[   17.607504]  </TASK>
[   17.607519] 
[   17.621796] Allocated by task 282:
[   17.622601]  kasan_save_stack+0x45/0x70
[   17.623037]  kasan_save_track+0x18/0x40
[   17.623596]  kasan_save_alloc_info+0x3b/0x50
[   17.624109]  __kasan_kmalloc+0xb7/0xc0
[   17.624316]  __kmalloc_cache_noprof+0x189/0x420
[   17.624619]  kasan_atomics+0x95/0x310
[   17.625188]  kunit_try_run_case+0x1a5/0x480
[   17.625604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.626384]  kthread+0x337/0x6f0
[   17.626866]  ret_from_fork+0x116/0x1d0
[   17.627154]  ret_from_fork_asm+0x1a/0x30
[   17.627621] 
[   17.628033] The buggy address belongs to the object at ffff8881033ecb00
[   17.628033]  which belongs to the cache kmalloc-64 of size 64
[   17.628895] The buggy address is located 0 bytes to the right of
[   17.628895]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.630362] 
[   17.630587] The buggy address belongs to the physical page:
[   17.631391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.632161] flags: 0x200000000000000(node=0|zone=2)
[   17.632489] page_type: f5(slab)
[   17.632932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.633541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.634514] page dumped because: kasan: bad access detected
[   17.634814] 
[   17.635123] Memory state around the buggy address:
[   17.635612]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.636132]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.636723] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.637243]                                      ^
[   17.637586]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.638547]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.639197] ==================================================================
[   19.113806] ==================================================================
[   19.114447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   19.114855] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.115227] 
[   19.115463] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.115550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.115569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.115596] Call Trace:
[   19.115622]  <TASK>
[   19.115653]  dump_stack_lvl+0x73/0xb0
[   19.115713]  print_report+0xd1/0x650
[   19.115757]  ? __virt_addr_valid+0x1db/0x2d0
[   19.115802]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.115851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.115931]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.115980]  kasan_report+0x141/0x180
[   19.116029]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.116091]  kasan_check_range+0x10c/0x1c0
[   19.116149]  __kasan_check_write+0x18/0x20
[   19.116195]  kasan_atomics_helper+0x18b1/0x5450
[   19.116288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.116343]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.116395]  ? kasan_atomics+0x152/0x310
[   19.116452]  kasan_atomics+0x1dc/0x310
[   19.116519]  ? __pfx_kasan_atomics+0x10/0x10
[   19.116592]  ? __pfx_read_tsc+0x10/0x10
[   19.116644]  ? ktime_get_ts64+0x86/0x230
[   19.116706]  kunit_try_run_case+0x1a5/0x480
[   19.116778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.116839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.116912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.116980]  ? __kthread_parkme+0x82/0x180
[   19.117032]  ? preempt_count_sub+0x50/0x80
[   19.117103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.117166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.117252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.117308]  kthread+0x337/0x6f0
[   19.117352]  ? trace_preempt_on+0x20/0xc0
[   19.117405]  ? __pfx_kthread+0x10/0x10
[   19.117465]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.117524]  ? calculate_sigpending+0x7b/0xa0
[   19.117586]  ? __pfx_kthread+0x10/0x10
[   19.117642]  ret_from_fork+0x116/0x1d0
[   19.117693]  ? __pfx_kthread+0x10/0x10
[   19.117745]  ret_from_fork_asm+0x1a/0x30
[   19.117823]  </TASK>
[   19.117855] 
[   19.128849] Allocated by task 282:
[   19.129142]  kasan_save_stack+0x45/0x70
[   19.129437]  kasan_save_track+0x18/0x40
[   19.129832]  kasan_save_alloc_info+0x3b/0x50
[   19.130194]  __kasan_kmalloc+0xb7/0xc0
[   19.130652]  __kmalloc_cache_noprof+0x189/0x420
[   19.131058]  kasan_atomics+0x95/0x310
[   19.131501]  kunit_try_run_case+0x1a5/0x480
[   19.131874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.132399]  kthread+0x337/0x6f0
[   19.132751]  ret_from_fork+0x116/0x1d0
[   19.133108]  ret_from_fork_asm+0x1a/0x30
[   19.133583] 
[   19.133774] The buggy address belongs to the object at ffff8881033ecb00
[   19.133774]  which belongs to the cache kmalloc-64 of size 64
[   19.134631] The buggy address is located 0 bytes to the right of
[   19.134631]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.135086] 
[   19.135215] The buggy address belongs to the physical page:
[   19.135711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.136528] flags: 0x200000000000000(node=0|zone=2)
[   19.137012] page_type: f5(slab)
[   19.137360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.137731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.138014] page dumped because: kasan: bad access detected
[   19.138252] 
[   19.138470] Memory state around the buggy address:
[   19.138968]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.139591]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.140169] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.140606]                                      ^
[   19.140844]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141121]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141658] ==================================================================
[   18.389290] ==================================================================
[   18.391160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   18.391855] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.392551] 
[   18.392800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.392940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.392974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.393031] Call Trace:
[   18.393092]  <TASK>
[   18.393139]  dump_stack_lvl+0x73/0xb0
[   18.393208]  print_report+0xd1/0x650
[   18.393258]  ? __virt_addr_valid+0x1db/0x2d0
[   18.393324]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.393441]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393500]  kasan_report+0x141/0x180
[   18.393530]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393559]  kasan_check_range+0x10c/0x1c0
[   18.393597]  __kasan_check_write+0x18/0x20
[   18.393638]  kasan_atomics_helper+0xe78/0x5450
[   18.393681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.393728]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.393776]  ? kasan_atomics+0x152/0x310
[   18.393833]  kasan_atomics+0x1dc/0x310
[   18.393894]  ? __pfx_kasan_atomics+0x10/0x10
[   18.393968]  ? __pfx_read_tsc+0x10/0x10
[   18.394020]  ? ktime_get_ts64+0x86/0x230
[   18.394080]  kunit_try_run_case+0x1a5/0x480
[   18.394130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.394170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.394228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.394272]  ? __kthread_parkme+0x82/0x180
[   18.394314]  ? preempt_count_sub+0x50/0x80
[   18.394366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.394421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.394494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.394554]  kthread+0x337/0x6f0
[   18.394605]  ? trace_preempt_on+0x20/0xc0
[   18.394664]  ? __pfx_kthread+0x10/0x10
[   18.394711]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.394760]  ? calculate_sigpending+0x7b/0xa0
[   18.394822]  ? __pfx_kthread+0x10/0x10
[   18.394873]  ret_from_fork+0x116/0x1d0
[   18.394941]  ? __pfx_kthread+0x10/0x10
[   18.394992]  ret_from_fork_asm+0x1a/0x30
[   18.395087]  </TASK>
[   18.395120] 
[   18.407274] Allocated by task 282:
[   18.407656]  kasan_save_stack+0x45/0x70
[   18.408102]  kasan_save_track+0x18/0x40
[   18.408539]  kasan_save_alloc_info+0x3b/0x50
[   18.408833]  __kasan_kmalloc+0xb7/0xc0
[   18.409049]  __kmalloc_cache_noprof+0x189/0x420
[   18.409265]  kasan_atomics+0x95/0x310
[   18.409502]  kunit_try_run_case+0x1a5/0x480
[   18.409894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.410393]  kthread+0x337/0x6f0
[   18.410928]  ret_from_fork+0x116/0x1d0
[   18.411441]  ret_from_fork_asm+0x1a/0x30
[   18.411905] 
[   18.412109] The buggy address belongs to the object at ffff8881033ecb00
[   18.412109]  which belongs to the cache kmalloc-64 of size 64
[   18.412896] The buggy address is located 0 bytes to the right of
[   18.412896]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.413677] 
[   18.413904] The buggy address belongs to the physical page:
[   18.414238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.414725] flags: 0x200000000000000(node=0|zone=2)
[   18.415129] page_type: f5(slab)
[   18.415569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.416117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.416650] page dumped because: kasan: bad access detected
[   18.417068] 
[   18.417311] Memory state around the buggy address:
[   18.417694]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.418000]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.418293] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.418782]                                      ^
[   18.419331]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420305]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420914] ==================================================================
[   19.410285] ==================================================================
[   19.411008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   19.411581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.412134] 
[   19.412439] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.412598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.412682] Call Trace:
[   19.412768]  <TASK>
[   19.412816]  dump_stack_lvl+0x73/0xb0
[   19.412884]  print_report+0xd1/0x650
[   19.412934]  ? __virt_addr_valid+0x1db/0x2d0
[   19.412978]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.413067]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413118]  kasan_report+0x141/0x180
[   19.413249]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413314]  kasan_check_range+0x10c/0x1c0
[   19.413367]  __kasan_check_write+0x18/0x20
[   19.413447]  kasan_atomics_helper+0x1eaa/0x5450
[   19.413515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.413566]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.413652]  ? kasan_atomics+0x152/0x310
[   19.413717]  kasan_atomics+0x1dc/0x310
[   19.413772]  ? __pfx_kasan_atomics+0x10/0x10
[   19.413828]  ? __pfx_read_tsc+0x10/0x10
[   19.413897]  ? ktime_get_ts64+0x86/0x230
[   19.413954]  kunit_try_run_case+0x1a5/0x480
[   19.414028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.414092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.414144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.414230]  ? __kthread_parkme+0x82/0x180
[   19.414285]  ? preempt_count_sub+0x50/0x80
[   19.414347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.414399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.414451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.414508]  kthread+0x337/0x6f0
[   19.414533]  ? trace_preempt_on+0x20/0xc0
[   19.414561]  ? __pfx_kthread+0x10/0x10
[   19.414584]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.414611]  ? calculate_sigpending+0x7b/0xa0
[   19.414640]  ? __pfx_kthread+0x10/0x10
[   19.414664]  ret_from_fork+0x116/0x1d0
[   19.414687]  ? __pfx_kthread+0x10/0x10
[   19.414710]  ret_from_fork_asm+0x1a/0x30
[   19.414747]  </TASK>
[   19.414761] 
[   19.428019] Allocated by task 282:
[   19.428174]  kasan_save_stack+0x45/0x70
[   19.428593]  kasan_save_track+0x18/0x40
[   19.429235]  kasan_save_alloc_info+0x3b/0x50
[   19.429684]  __kasan_kmalloc+0xb7/0xc0
[   19.430033]  __kmalloc_cache_noprof+0x189/0x420
[   19.430442]  kasan_atomics+0x95/0x310
[   19.430880]  kunit_try_run_case+0x1a5/0x480
[   19.431366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.431880]  kthread+0x337/0x6f0
[   19.432100]  ret_from_fork+0x116/0x1d0
[   19.432631]  ret_from_fork_asm+0x1a/0x30
[   19.433092] 
[   19.433329] The buggy address belongs to the object at ffff8881033ecb00
[   19.433329]  which belongs to the cache kmalloc-64 of size 64
[   19.434132] The buggy address is located 0 bytes to the right of
[   19.434132]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.435056] 
[   19.435416] The buggy address belongs to the physical page:
[   19.435965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.436590] flags: 0x200000000000000(node=0|zone=2)
[   19.437067] page_type: f5(slab)
[   19.437314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.437843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.438201] page dumped because: kasan: bad access detected
[   19.438673] 
[   19.438851] Memory state around the buggy address:
[   19.439119]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.439611]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.439909] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.440431]                                      ^
[   19.440874]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441384]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441679] ==================================================================
[   18.331619] ==================================================================
[   18.332114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   18.332758] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.333238] 
[   18.333404] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.333506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.333534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.333581] Call Trace:
[   18.333624]  <TASK>
[   18.333692]  dump_stack_lvl+0x73/0xb0
[   18.333757]  print_report+0xd1/0x650
[   18.333808]  ? __virt_addr_valid+0x1db/0x2d0
[   18.333857]  ? kasan_atomics_helper+0xd47/0x5450
[   18.333901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.333967]  ? kasan_atomics_helper+0xd47/0x5450
[   18.334015]  kasan_report+0x141/0x180
[   18.334065]  ? kasan_atomics_helper+0xd47/0x5450
[   18.334121]  kasan_check_range+0x10c/0x1c0
[   18.334189]  __kasan_check_write+0x18/0x20
[   18.334237]  kasan_atomics_helper+0xd47/0x5450
[   18.334299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.334348]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.334383]  ? kasan_atomics+0x152/0x310
[   18.334415]  kasan_atomics+0x1dc/0x310
[   18.334440]  ? __pfx_kasan_atomics+0x10/0x10
[   18.334488]  ? __pfx_read_tsc+0x10/0x10
[   18.334524]  ? ktime_get_ts64+0x86/0x230
[   18.334567]  kunit_try_run_case+0x1a5/0x480
[   18.334615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.334652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.334725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.334776]  ? __kthread_parkme+0x82/0x180
[   18.334820]  ? preempt_count_sub+0x50/0x80
[   18.334871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.334934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.334991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.335039]  kthread+0x337/0x6f0
[   18.335082]  ? trace_preempt_on+0x20/0xc0
[   18.335131]  ? __pfx_kthread+0x10/0x10
[   18.335164]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.335196]  ? calculate_sigpending+0x7b/0xa0
[   18.335252]  ? __pfx_kthread+0x10/0x10
[   18.335280]  ret_from_fork+0x116/0x1d0
[   18.335305]  ? __pfx_kthread+0x10/0x10
[   18.335330]  ret_from_fork_asm+0x1a/0x30
[   18.335380]  </TASK>
[   18.335396] 
[   18.347325] Allocated by task 282:
[   18.347756]  kasan_save_stack+0x45/0x70
[   18.348262]  kasan_save_track+0x18/0x40
[   18.348614]  kasan_save_alloc_info+0x3b/0x50
[   18.348921]  __kasan_kmalloc+0xb7/0xc0
[   18.349155]  __kmalloc_cache_noprof+0x189/0x420
[   18.349677]  kasan_atomics+0x95/0x310
[   18.349939]  kunit_try_run_case+0x1a5/0x480
[   18.350350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.350657]  kthread+0x337/0x6f0
[   18.350993]  ret_from_fork+0x116/0x1d0
[   18.351262]  ret_from_fork_asm+0x1a/0x30
[   18.351673] 
[   18.351796] The buggy address belongs to the object at ffff8881033ecb00
[   18.351796]  which belongs to the cache kmalloc-64 of size 64
[   18.352230] The buggy address is located 0 bytes to the right of
[   18.352230]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.353031] 
[   18.353222] The buggy address belongs to the physical page:
[   18.353813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.354479] flags: 0x200000000000000(node=0|zone=2)
[   18.354718] page_type: f5(slab)
[   18.354923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.355579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.356007] page dumped because: kasan: bad access detected
[   18.356352] 
[   18.356555] Memory state around the buggy address:
[   18.356910]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.357516]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.357901] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.358319]                                      ^
[   18.358724]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359274]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359760] ==================================================================
[   17.721990] ==================================================================
[   17.722378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   17.722794] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.723508] 
[   17.723749] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.723858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.723886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.723936] Call Trace:
[   17.723980]  <TASK>
[   17.724020]  dump_stack_lvl+0x73/0xb0
[   17.724086]  print_report+0xd1/0x650
[   17.724138]  ? __virt_addr_valid+0x1db/0x2d0
[   17.724228]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.724328]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724366]  kasan_report+0x141/0x180
[   17.724428]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724486]  __asan_report_store4_noabort+0x1b/0x30
[   17.724522]  kasan_atomics_helper+0x4b6e/0x5450
[   17.724560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.724596]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.724629]  ? kasan_atomics+0x152/0x310
[   17.724674]  kasan_atomics+0x1dc/0x310
[   17.724722]  ? __pfx_kasan_atomics+0x10/0x10
[   17.724761]  ? __pfx_read_tsc+0x10/0x10
[   17.724843]  ? ktime_get_ts64+0x86/0x230
[   17.724897]  kunit_try_run_case+0x1a5/0x480
[   17.724942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.724984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.725043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.725100]  ? __kthread_parkme+0x82/0x180
[   17.725151]  ? preempt_count_sub+0x50/0x80
[   17.725237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.725291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.725349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.725406]  kthread+0x337/0x6f0
[   17.725463]  ? trace_preempt_on+0x20/0xc0
[   17.725521]  ? __pfx_kthread+0x10/0x10
[   17.725572]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.725625]  ? calculate_sigpending+0x7b/0xa0
[   17.725671]  ? __pfx_kthread+0x10/0x10
[   17.725711]  ret_from_fork+0x116/0x1d0
[   17.725750]  ? __pfx_kthread+0x10/0x10
[   17.725792]  ret_from_fork_asm+0x1a/0x30
[   17.725883]  </TASK>
[   17.726105] 
[   17.742928] Allocated by task 282:
[   17.743640]  kasan_save_stack+0x45/0x70
[   17.743889]  kasan_save_track+0x18/0x40
[   17.744246]  kasan_save_alloc_info+0x3b/0x50
[   17.744515]  __kasan_kmalloc+0xb7/0xc0
[   17.744824]  __kmalloc_cache_noprof+0x189/0x420
[   17.745085]  kasan_atomics+0x95/0x310
[   17.745407]  kunit_try_run_case+0x1a5/0x480
[   17.746562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.747042]  kthread+0x337/0x6f0
[   17.747709]  ret_from_fork+0x116/0x1d0
[   17.747969]  ret_from_fork_asm+0x1a/0x30
[   17.748875] 
[   17.749096] The buggy address belongs to the object at ffff8881033ecb00
[   17.749096]  which belongs to the cache kmalloc-64 of size 64
[   17.750335] The buggy address is located 0 bytes to the right of
[   17.750335]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.751339] 
[   17.751644] The buggy address belongs to the physical page:
[   17.752182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.753286] flags: 0x200000000000000(node=0|zone=2)
[   17.753921] page_type: f5(slab)
[   17.754122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.754616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.755801] page dumped because: kasan: bad access detected
[   17.756104] 
[   17.756286] Memory state around the buggy address:
[   17.756592]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.757144]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.757592] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.758590]                                      ^
[   17.759154]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.759523]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.760693] ==================================================================
[   19.326283] ==================================================================
[   19.327093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   19.327755] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.328116] 
[   19.328374] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.328485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.328518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.328567] Call Trace:
[   19.328613]  <TASK>
[   19.328659]  dump_stack_lvl+0x73/0xb0
[   19.328730]  print_report+0xd1/0x650
[   19.328785]  ? __virt_addr_valid+0x1db/0x2d0
[   19.328836]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.328884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.328937]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.328991]  kasan_report+0x141/0x180
[   19.329047]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.329105]  kasan_check_range+0x10c/0x1c0
[   19.329158]  __kasan_check_write+0x18/0x20
[   19.329242]  kasan_atomics_helper+0x1ce1/0x5450
[   19.329297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.329342]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.329393]  ? kasan_atomics+0x152/0x310
[   19.329462]  kasan_atomics+0x1dc/0x310
[   19.329520]  ? __pfx_kasan_atomics+0x10/0x10
[   19.329579]  ? __pfx_read_tsc+0x10/0x10
[   19.329630]  ? ktime_get_ts64+0x86/0x230
[   19.329694]  kunit_try_run_case+0x1a5/0x480
[   19.329751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.329799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.329857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.329915]  ? __kthread_parkme+0x82/0x180
[   19.329967]  ? preempt_count_sub+0x50/0x80
[   19.330021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.330064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.330117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.330165]  kthread+0x337/0x6f0
[   19.330240]  ? trace_preempt_on+0x20/0xc0
[   19.330294]  ? __pfx_kthread+0x10/0x10
[   19.330339]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.330384]  ? calculate_sigpending+0x7b/0xa0
[   19.330432]  ? __pfx_kthread+0x10/0x10
[   19.330490]  ret_from_fork+0x116/0x1d0
[   19.330538]  ? __pfx_kthread+0x10/0x10
[   19.330589]  ret_from_fork_asm+0x1a/0x30
[   19.330656]  </TASK>
[   19.330676] 
[   19.340285] Allocated by task 282:
[   19.340668]  kasan_save_stack+0x45/0x70
[   19.341068]  kasan_save_track+0x18/0x40
[   19.341447]  kasan_save_alloc_info+0x3b/0x50
[   19.341825]  __kasan_kmalloc+0xb7/0xc0
[   19.342135]  __kmalloc_cache_noprof+0x189/0x420
[   19.342553]  kasan_atomics+0x95/0x310
[   19.342851]  kunit_try_run_case+0x1a5/0x480
[   19.343097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.343514]  kthread+0x337/0x6f0
[   19.343716]  ret_from_fork+0x116/0x1d0
[   19.344042]  ret_from_fork_asm+0x1a/0x30
[   19.344417] 
[   19.344616] The buggy address belongs to the object at ffff8881033ecb00
[   19.344616]  which belongs to the cache kmalloc-64 of size 64
[   19.345291] The buggy address is located 0 bytes to the right of
[   19.345291]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.345939] 
[   19.346117] The buggy address belongs to the physical page:
[   19.346429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.346929] flags: 0x200000000000000(node=0|zone=2)
[   19.347360] page_type: f5(slab)
[   19.347615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.348069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.348410] page dumped because: kasan: bad access detected
[   19.348818] 
[   19.348994] Memory state around the buggy address:
[   19.349421]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.349990]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.350365] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.350661]                                      ^
[   19.350886]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.351166]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.351462] ==================================================================
[   18.526832] ==================================================================
[   18.527469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   18.527765] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.528950] 
[   18.529145] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.529228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.529247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.529277] Call Trace:
[   18.529305]  <TASK>
[   18.529332]  dump_stack_lvl+0x73/0xb0
[   18.529378]  print_report+0xd1/0x650
[   18.529407]  ? __virt_addr_valid+0x1db/0x2d0
[   18.529435]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.529510]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529536]  kasan_report+0x141/0x180
[   18.529563]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529594]  kasan_check_range+0x10c/0x1c0
[   18.529622]  __kasan_check_write+0x18/0x20
[   18.529644]  kasan_atomics_helper+0x1079/0x5450
[   18.529672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.529699]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.529725]  ? kasan_atomics+0x152/0x310
[   18.529755]  kasan_atomics+0x1dc/0x310
[   18.529782]  ? __pfx_kasan_atomics+0x10/0x10
[   18.529810]  ? __pfx_read_tsc+0x10/0x10
[   18.529837]  ? ktime_get_ts64+0x86/0x230
[   18.529867]  kunit_try_run_case+0x1a5/0x480
[   18.529893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.529916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.529945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.529974]  ? __kthread_parkme+0x82/0x180
[   18.529999]  ? preempt_count_sub+0x50/0x80
[   18.530026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.530051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.530079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.530107]  kthread+0x337/0x6f0
[   18.530131]  ? trace_preempt_on+0x20/0xc0
[   18.530159]  ? __pfx_kthread+0x10/0x10
[   18.530184]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.530257]  ? calculate_sigpending+0x7b/0xa0
[   18.530320]  ? __pfx_kthread+0x10/0x10
[   18.530371]  ret_from_fork+0x116/0x1d0
[   18.530413]  ? __pfx_kthread+0x10/0x10
[   18.530476]  ret_from_fork_asm+0x1a/0x30
[   18.530551]  </TASK>
[   18.530602] 
[   18.546693] Allocated by task 282:
[   18.547361]  kasan_save_stack+0x45/0x70
[   18.547681]  kasan_save_track+0x18/0x40
[   18.548013]  kasan_save_alloc_info+0x3b/0x50
[   18.548726]  __kasan_kmalloc+0xb7/0xc0
[   18.549029]  __kmalloc_cache_noprof+0x189/0x420
[   18.549265]  kasan_atomics+0x95/0x310
[   18.549727]  kunit_try_run_case+0x1a5/0x480
[   18.550243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.550767]  kthread+0x337/0x6f0
[   18.551022]  ret_from_fork+0x116/0x1d0
[   18.551523]  ret_from_fork_asm+0x1a/0x30
[   18.551807] 
[   18.551981] The buggy address belongs to the object at ffff8881033ecb00
[   18.551981]  which belongs to the cache kmalloc-64 of size 64
[   18.552786] The buggy address is located 0 bytes to the right of
[   18.552786]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.553908] 
[   18.554072] The buggy address belongs to the physical page:
[   18.554744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.555243] flags: 0x200000000000000(node=0|zone=2)
[   18.555891] page_type: f5(slab)
[   18.556221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.556973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.557542] page dumped because: kasan: bad access detected
[   18.558108] 
[   18.558277] Memory state around the buggy address:
[   18.558578]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559006]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559854] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.560477]                                      ^
[   18.561065]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.561851]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562604] ==================================================================
[   19.594428] ==================================================================
[   19.595004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   19.595538] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.595917] 
[   19.596067] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.596124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.596140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.596185] Call Trace:
[   19.596228]  <TASK>
[   19.596250]  dump_stack_lvl+0x73/0xb0
[   19.596282]  print_report+0xd1/0x650
[   19.596309]  ? __virt_addr_valid+0x1db/0x2d0
[   19.596356]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.596410]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596437]  kasan_report+0x141/0x180
[   19.596475]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596526]  kasan_check_range+0x10c/0x1c0
[   19.596559]  __kasan_check_write+0x18/0x20
[   19.596583]  kasan_atomics_helper+0x218a/0x5450
[   19.596610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.596636]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.596680]  ? kasan_atomics+0x152/0x310
[   19.596713]  kasan_atomics+0x1dc/0x310
[   19.596740]  ? __pfx_kasan_atomics+0x10/0x10
[   19.596769]  ? __pfx_read_tsc+0x10/0x10
[   19.596795]  ? ktime_get_ts64+0x86/0x230
[   19.596825]  kunit_try_run_case+0x1a5/0x480
[   19.596872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.596895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.596925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.596954]  ? __kthread_parkme+0x82/0x180
[   19.596979]  ? preempt_count_sub+0x50/0x80
[   19.597022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.597057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.597086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.597115]  kthread+0x337/0x6f0
[   19.597136]  ? trace_preempt_on+0x20/0xc0
[   19.597163]  ? __pfx_kthread+0x10/0x10
[   19.597205]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.597239]  ? calculate_sigpending+0x7b/0xa0
[   19.597267]  ? __pfx_kthread+0x10/0x10
[   19.597293]  ret_from_fork+0x116/0x1d0
[   19.597316]  ? __pfx_kthread+0x10/0x10
[   19.597340]  ret_from_fork_asm+0x1a/0x30
[   19.597396]  </TASK>
[   19.597413] 
[   19.605016] Allocated by task 282:
[   19.605284]  kasan_save_stack+0x45/0x70
[   19.605429]  kasan_save_track+0x18/0x40
[   19.605639]  kasan_save_alloc_info+0x3b/0x50
[   19.605791]  __kasan_kmalloc+0xb7/0xc0
[   19.605924]  __kmalloc_cache_noprof+0x189/0x420
[   19.606261]  kasan_atomics+0x95/0x310
[   19.606551]  kunit_try_run_case+0x1a5/0x480
[   19.606662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.606790]  kthread+0x337/0x6f0
[   19.607057]  ret_from_fork+0x116/0x1d0
[   19.607345]  ret_from_fork_asm+0x1a/0x30
[   19.607639] 
[   19.607754] The buggy address belongs to the object at ffff8881033ecb00
[   19.607754]  which belongs to the cache kmalloc-64 of size 64
[   19.608098] The buggy address is located 0 bytes to the right of
[   19.608098]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.608676] 
[   19.608802] The buggy address belongs to the physical page:
[   19.609093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.609411] flags: 0x200000000000000(node=0|zone=2)
[   19.609766] page_type: f5(slab)
[   19.609945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.610152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.610657] page dumped because: kasan: bad access detected
[   19.611013] 
[   19.611145] Memory state around the buggy address:
[   19.611419]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611790]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612098] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612306]                                      ^
[   19.612607]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613032]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613366] ==================================================================
[   19.550634] ==================================================================
[   19.551122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   19.551939] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.552285] 
[   19.552443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.552515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.552531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.552558] Call Trace:
[   19.552583]  <TASK>
[   19.552609]  dump_stack_lvl+0x73/0xb0
[   19.552645]  print_report+0xd1/0x650
[   19.552672]  ? __virt_addr_valid+0x1db/0x2d0
[   19.552700]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.552786]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552849]  kasan_report+0x141/0x180
[   19.552878]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552922]  kasan_check_range+0x10c/0x1c0
[   19.552952]  __kasan_check_write+0x18/0x20
[   19.552975]  kasan_atomics_helper+0x20c8/0x5450
[   19.553002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.553030]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.553056]  ? kasan_atomics+0x152/0x310
[   19.553089]  kasan_atomics+0x1dc/0x310
[   19.553118]  ? __pfx_kasan_atomics+0x10/0x10
[   19.553147]  ? __pfx_read_tsc+0x10/0x10
[   19.553174]  ? ktime_get_ts64+0x86/0x230
[   19.553219]  kunit_try_run_case+0x1a5/0x480
[   19.553251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.553274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.553302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.553331]  ? __kthread_parkme+0x82/0x180
[   19.553356]  ? preempt_count_sub+0x50/0x80
[   19.553385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.553530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.553561]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.553588]  kthread+0x337/0x6f0
[   19.553611]  ? trace_preempt_on+0x20/0xc0
[   19.553637]  ? __pfx_kthread+0x10/0x10
[   19.553662]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.553687]  ? calculate_sigpending+0x7b/0xa0
[   19.553714]  ? __pfx_kthread+0x10/0x10
[   19.553740]  ret_from_fork+0x116/0x1d0
[   19.553766]  ? __pfx_kthread+0x10/0x10
[   19.553791]  ret_from_fork_asm+0x1a/0x30
[   19.553828]  </TASK>
[   19.553843] 
[   19.564142] Allocated by task 282:
[   19.564603]  kasan_save_stack+0x45/0x70
[   19.564951]  kasan_save_track+0x18/0x40
[   19.565155]  kasan_save_alloc_info+0x3b/0x50
[   19.565521]  __kasan_kmalloc+0xb7/0xc0
[   19.565865]  __kmalloc_cache_noprof+0x189/0x420
[   19.566044]  kasan_atomics+0x95/0x310
[   19.566223]  kunit_try_run_case+0x1a5/0x480
[   19.566374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.566579]  kthread+0x337/0x6f0
[   19.566744]  ret_from_fork+0x116/0x1d0
[   19.566921]  ret_from_fork_asm+0x1a/0x30
[   19.567117] 
[   19.567753] The buggy address belongs to the object at ffff8881033ecb00
[   19.567753]  which belongs to the cache kmalloc-64 of size 64
[   19.568193] The buggy address is located 0 bytes to the right of
[   19.568193]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.568912] 
[   19.568998] The buggy address belongs to the physical page:
[   19.569174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.569871] flags: 0x200000000000000(node=0|zone=2)
[   19.570219] page_type: f5(slab)
[   19.570485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.570739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.571164] page dumped because: kasan: bad access detected
[   19.571419] 
[   19.571677] Memory state around the buggy address:
[   19.572044]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.572267]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.572812] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.573436]                                      ^
[   19.573645]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.574171]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.574495] ==================================================================
[   17.686155] ==================================================================
[   17.686521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   17.687491] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.688528] 
[   17.689351] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.689438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.689502] Call Trace:
[   17.689526]  <TASK>
[   17.689554]  dump_stack_lvl+0x73/0xb0
[   17.689602]  print_report+0xd1/0x650
[   17.689630]  ? __virt_addr_valid+0x1db/0x2d0
[   17.689658]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.689708]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689733]  kasan_report+0x141/0x180
[   17.689757]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689787]  __asan_report_load4_noabort+0x18/0x20
[   17.689814]  kasan_atomics_helper+0x4b88/0x5450
[   17.689889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.689929]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.689970]  ? kasan_atomics+0x152/0x310
[   17.690003]  kasan_atomics+0x1dc/0x310
[   17.690031]  ? __pfx_kasan_atomics+0x10/0x10
[   17.690058]  ? __pfx_read_tsc+0x10/0x10
[   17.690083]  ? ktime_get_ts64+0x86/0x230
[   17.690113]  kunit_try_run_case+0x1a5/0x480
[   17.690138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.690188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.690231]  ? __kthread_parkme+0x82/0x180
[   17.690257]  ? preempt_count_sub+0x50/0x80
[   17.690284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.690337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.690366]  kthread+0x337/0x6f0
[   17.690388]  ? trace_preempt_on+0x20/0xc0
[   17.690414]  ? __pfx_kthread+0x10/0x10
[   17.690438]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.690483]  ? calculate_sigpending+0x7b/0xa0
[   17.690514]  ? __pfx_kthread+0x10/0x10
[   17.690539]  ret_from_fork+0x116/0x1d0
[   17.690561]  ? __pfx_kthread+0x10/0x10
[   17.690584]  ret_from_fork_asm+0x1a/0x30
[   17.690620]  </TASK>
[   17.690633] 
[   17.705909] Allocated by task 282:
[   17.706111]  kasan_save_stack+0x45/0x70
[   17.706312]  kasan_save_track+0x18/0x40
[   17.706487]  kasan_save_alloc_info+0x3b/0x50
[   17.706668]  __kasan_kmalloc+0xb7/0xc0
[   17.706966]  __kmalloc_cache_noprof+0x189/0x420
[   17.707225]  kasan_atomics+0x95/0x310
[   17.707431]  kunit_try_run_case+0x1a5/0x480
[   17.708560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.709340]  kthread+0x337/0x6f0
[   17.709887]  ret_from_fork+0x116/0x1d0
[   17.710299]  ret_from_fork_asm+0x1a/0x30
[   17.710635] 
[   17.710998] The buggy address belongs to the object at ffff8881033ecb00
[   17.710998]  which belongs to the cache kmalloc-64 of size 64
[   17.712323] The buggy address is located 0 bytes to the right of
[   17.712323]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.713023] 
[   17.713535] The buggy address belongs to the physical page:
[   17.714019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.714673] flags: 0x200000000000000(node=0|zone=2)
[   17.715217] page_type: f5(slab)
[   17.715434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.716244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.717158] page dumped because: kasan: bad access detected
[   17.717524] 
[   17.717747] Memory state around the buggy address:
[   17.718077]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.718596]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.719206] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.719908]                                      ^
[   17.720092]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720403]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720982] ==================================================================
[   19.201168] ==================================================================
[   19.201801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   19.202581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.203142] 
[   19.203420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.203538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.203567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.203614] Call Trace:
[   19.203659]  <TASK>
[   19.203704]  dump_stack_lvl+0x73/0xb0
[   19.203781]  print_report+0xd1/0x650
[   19.203840]  ? __virt_addr_valid+0x1db/0x2d0
[   19.203897]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.203954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.204009]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.204066]  kasan_report+0x141/0x180
[   19.204122]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.204188]  kasan_check_range+0x10c/0x1c0
[   19.204242]  __kasan_check_write+0x18/0x20
[   19.204294]  kasan_atomics_helper+0x1a7f/0x5450
[   19.204347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.204395]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.204445]  ? kasan_atomics+0x152/0x310
[   19.204514]  kasan_atomics+0x1dc/0x310
[   19.204561]  ? __pfx_kasan_atomics+0x10/0x10
[   19.204611]  ? __pfx_read_tsc+0x10/0x10
[   19.204659]  ? ktime_get_ts64+0x86/0x230
[   19.204717]  kunit_try_run_case+0x1a5/0x480
[   19.204766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.204812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.204870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.204925]  ? __kthread_parkme+0x82/0x180
[   19.204974]  ? preempt_count_sub+0x50/0x80
[   19.205032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.205082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.205146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.205190]  kthread+0x337/0x6f0
[   19.205253]  ? trace_preempt_on+0x20/0xc0
[   19.205298]  ? __pfx_kthread+0x10/0x10
[   19.205336]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.205379]  ? calculate_sigpending+0x7b/0xa0
[   19.205430]  ? __pfx_kthread+0x10/0x10
[   19.205484]  ret_from_fork+0x116/0x1d0
[   19.205527]  ? __pfx_kthread+0x10/0x10
[   19.205567]  ret_from_fork_asm+0x1a/0x30
[   19.205635]  </TASK>
[   19.205663] 
[   19.219955] Allocated by task 282:
[   19.220328]  kasan_save_stack+0x45/0x70
[   19.220854]  kasan_save_track+0x18/0x40
[   19.221355]  kasan_save_alloc_info+0x3b/0x50
[   19.221804]  __kasan_kmalloc+0xb7/0xc0
[   19.222214]  __kmalloc_cache_noprof+0x189/0x420
[   19.222553]  kasan_atomics+0x95/0x310
[   19.222673]  kunit_try_run_case+0x1a5/0x480
[   19.222780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.222901]  kthread+0x337/0x6f0
[   19.222996]  ret_from_fork+0x116/0x1d0
[   19.223091]  ret_from_fork_asm+0x1a/0x30
[   19.223193] 
[   19.223392] The buggy address belongs to the object at ffff8881033ecb00
[   19.223392]  which belongs to the cache kmalloc-64 of size 64
[   19.224472] The buggy address is located 0 bytes to the right of
[   19.224472]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.225539] 
[   19.225775] The buggy address belongs to the physical page:
[   19.226283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.226940] flags: 0x200000000000000(node=0|zone=2)
[   19.227156] page_type: f5(slab)
[   19.227935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.229526] page dumped because: kasan: bad access detected
[   19.229859] 
[   19.229997] Memory state around the buggy address:
[   19.230610]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231059]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231416] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.231898]                                      ^
[   19.232296]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.232621]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.233494] ==================================================================
[   17.834581] ==================================================================
[   17.835104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   17.835930] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.836367] 
[   17.836638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.836990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.837030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.837079] Call Trace:
[   17.837130]  <TASK>
[   17.837190]  dump_stack_lvl+0x73/0xb0
[   17.837295]  print_report+0xd1/0x650
[   17.837343]  ? __virt_addr_valid+0x1db/0x2d0
[   17.837395]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.837528]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837589]  kasan_report+0x141/0x180
[   17.837634]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837694]  kasan_check_range+0x10c/0x1c0
[   17.837759]  __kasan_check_write+0x18/0x20
[   17.837807]  kasan_atomics_helper+0x4a0/0x5450
[   17.837863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.837918]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.837973]  ? kasan_atomics+0x152/0x310
[   17.838014]  kasan_atomics+0x1dc/0x310
[   17.838043]  ? __pfx_kasan_atomics+0x10/0x10
[   17.838072]  ? __pfx_read_tsc+0x10/0x10
[   17.838100]  ? ktime_get_ts64+0x86/0x230
[   17.838132]  kunit_try_run_case+0x1a5/0x480
[   17.838159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.838182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.838223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.838260]  ? __kthread_parkme+0x82/0x180
[   17.838286]  ? preempt_count_sub+0x50/0x80
[   17.838314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.838338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.838368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.838397]  kthread+0x337/0x6f0
[   17.838421]  ? trace_preempt_on+0x20/0xc0
[   17.838450]  ? __pfx_kthread+0x10/0x10
[   17.838508]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.838548]  ? calculate_sigpending+0x7b/0xa0
[   17.838591]  ? __pfx_kthread+0x10/0x10
[   17.838628]  ret_from_fork+0x116/0x1d0
[   17.838661]  ? __pfx_kthread+0x10/0x10
[   17.838696]  ret_from_fork_asm+0x1a/0x30
[   17.838744]  </TASK>
[   17.838767] 
[   17.853604] Allocated by task 282:
[   17.853944]  kasan_save_stack+0x45/0x70
[   17.854629]  kasan_save_track+0x18/0x40
[   17.855570]  kasan_save_alloc_info+0x3b/0x50
[   17.856058]  __kasan_kmalloc+0xb7/0xc0
[   17.856492]  __kmalloc_cache_noprof+0x189/0x420
[   17.856982]  kasan_atomics+0x95/0x310
[   17.857263]  kunit_try_run_case+0x1a5/0x480
[   17.857652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.858268]  kthread+0x337/0x6f0
[   17.858589]  ret_from_fork+0x116/0x1d0
[   17.858925]  ret_from_fork_asm+0x1a/0x30
[   17.859914] 
[   17.860057] The buggy address belongs to the object at ffff8881033ecb00
[   17.860057]  which belongs to the cache kmalloc-64 of size 64
[   17.860815] The buggy address is located 0 bytes to the right of
[   17.860815]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.862620] 
[   17.863440] The buggy address belongs to the physical page:
[   17.864031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.864622] flags: 0x200000000000000(node=0|zone=2)
[   17.865243] page_type: f5(slab)
[   17.865526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.866022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.866726] page dumped because: kasan: bad access detected
[   17.867418] 
[   17.867648] Memory state around the buggy address:
[   17.868359]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.868746]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.869314] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.869949]                                      ^
[   17.870405]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870925]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.871578] ==================================================================
[   19.380959] ==================================================================
[   19.381712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   19.381993] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.382274] 
[   19.382398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.383308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.383365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.383417] Call Trace:
[   19.383478]  <TASK>
[   19.383522]  dump_stack_lvl+0x73/0xb0
[   19.383601]  print_report+0xd1/0x650
[   19.383661]  ? __virt_addr_valid+0x1db/0x2d0
[   19.383714]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.383786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.383848]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.383906]  kasan_report+0x141/0x180
[   19.383965]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.384033]  kasan_check_range+0x10c/0x1c0
[   19.384094]  __kasan_check_write+0x18/0x20
[   19.384139]  kasan_atomics_helper+0x1e12/0x5450
[   19.384191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.384235]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.384279]  ? kasan_atomics+0x152/0x310
[   19.384336]  kasan_atomics+0x1dc/0x310
[   19.384386]  ? __pfx_kasan_atomics+0x10/0x10
[   19.384443]  ? __pfx_read_tsc+0x10/0x10
[   19.384506]  ? ktime_get_ts64+0x86/0x230
[   19.384569]  kunit_try_run_case+0x1a5/0x480
[   19.384628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.384679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.384740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.384799]  ? __kthread_parkme+0x82/0x180
[   19.384850]  ? preempt_count_sub+0x50/0x80
[   19.384923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.384968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.385018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.385076]  kthread+0x337/0x6f0
[   19.385126]  ? trace_preempt_on+0x20/0xc0
[   19.385182]  ? __pfx_kthread+0x10/0x10
[   19.385228]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.385282]  ? calculate_sigpending+0x7b/0xa0
[   19.385339]  ? __pfx_kthread+0x10/0x10
[   19.385393]  ret_from_fork+0x116/0x1d0
[   19.385438]  ? __pfx_kthread+0x10/0x10
[   19.385501]  ret_from_fork_asm+0x1a/0x30
[   19.385579]  </TASK>
[   19.385608] 
[   19.395919] Allocated by task 282:
[   19.396177]  kasan_save_stack+0x45/0x70
[   19.396464]  kasan_save_track+0x18/0x40
[   19.396840]  kasan_save_alloc_info+0x3b/0x50
[   19.397330]  __kasan_kmalloc+0xb7/0xc0
[   19.397727]  __kmalloc_cache_noprof+0x189/0x420
[   19.398132]  kasan_atomics+0x95/0x310
[   19.398549]  kunit_try_run_case+0x1a5/0x480
[   19.398958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.399481]  kthread+0x337/0x6f0
[   19.399845]  ret_from_fork+0x116/0x1d0
[   19.400246]  ret_from_fork_asm+0x1a/0x30
[   19.400653] 
[   19.400846] The buggy address belongs to the object at ffff8881033ecb00
[   19.400846]  which belongs to the cache kmalloc-64 of size 64
[   19.401479] The buggy address is located 0 bytes to the right of
[   19.401479]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.401932] 
[   19.402061] The buggy address belongs to the physical page:
[   19.402318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.402922] flags: 0x200000000000000(node=0|zone=2)
[   19.403462] page_type: f5(slab)
[   19.403862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.404525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.405096] page dumped because: kasan: bad access detected
[   19.405534] 
[   19.405655] Memory state around the buggy address:
[   19.405882]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406171]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406641] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.407294]                                      ^
[   19.407749]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408373]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408951] ==================================================================
[   17.762034] ==================================================================
[   17.762958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   17.763970] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.764717] 
[   17.764864] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.764957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.764981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.765020] Call Trace:
[   17.765061]  <TASK>
[   17.765100]  dump_stack_lvl+0x73/0xb0
[   17.765153]  print_report+0xd1/0x650
[   17.765249]  ? __virt_addr_valid+0x1db/0x2d0
[   17.765334]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.765469]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765525]  kasan_report+0x141/0x180
[   17.765581]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765638]  kasan_check_range+0x10c/0x1c0
[   17.765688]  __kasan_check_read+0x15/0x20
[   17.765968]  kasan_atomics_helper+0x3df/0x5450
[   17.766143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.766209]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.766258]  ? kasan_atomics+0x152/0x310
[   17.766323]  kasan_atomics+0x1dc/0x310
[   17.766382]  ? __pfx_kasan_atomics+0x10/0x10
[   17.766441]  ? __pfx_read_tsc+0x10/0x10
[   17.766516]  ? ktime_get_ts64+0x86/0x230
[   17.766552]  kunit_try_run_case+0x1a5/0x480
[   17.766581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.766605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.766638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.766667]  ? __kthread_parkme+0x82/0x180
[   17.766700]  ? preempt_count_sub+0x50/0x80
[   17.766747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.766772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.766802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.766832]  kthread+0x337/0x6f0
[   17.766857]  ? trace_preempt_on+0x20/0xc0
[   17.766885]  ? __pfx_kthread+0x10/0x10
[   17.766909]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.766936]  ? calculate_sigpending+0x7b/0xa0
[   17.766965]  ? __pfx_kthread+0x10/0x10
[   17.766990]  ret_from_fork+0x116/0x1d0
[   17.767013]  ? __pfx_kthread+0x10/0x10
[   17.767038]  ret_from_fork_asm+0x1a/0x30
[   17.767075]  </TASK>
[   17.767090] 
[   17.778020] Allocated by task 282:
[   17.778440]  kasan_save_stack+0x45/0x70
[   17.778954]  kasan_save_track+0x18/0x40
[   17.779312]  kasan_save_alloc_info+0x3b/0x50
[   17.779560]  __kasan_kmalloc+0xb7/0xc0
[   17.779768]  __kmalloc_cache_noprof+0x189/0x420
[   17.779991]  kasan_atomics+0x95/0x310
[   17.780228]  kunit_try_run_case+0x1a5/0x480
[   17.780445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.780914]  kthread+0x337/0x6f0
[   17.781208]  ret_from_fork+0x116/0x1d0
[   17.781536]  ret_from_fork_asm+0x1a/0x30
[   17.781877] 
[   17.782369] The buggy address belongs to the object at ffff8881033ecb00
[   17.782369]  which belongs to the cache kmalloc-64 of size 64
[   17.783444] The buggy address is located 0 bytes to the right of
[   17.783444]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.784133] 
[   17.784268] The buggy address belongs to the physical page:
[   17.784521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.785105] flags: 0x200000000000000(node=0|zone=2)
[   17.785757] page_type: f5(slab)
[   17.786057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.786760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.787444] page dumped because: kasan: bad access detected
[   17.787913] 
[   17.788102] Memory state around the buggy address:
[   17.788608]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.789307]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.789841] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.790483]                                      ^
[   17.790682]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.790931]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.791600] ==================================================================
[   18.054375] ==================================================================
[   18.054936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   18.055544] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.056029] 
[   18.056296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.056410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.056443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.056503] Call Trace:
[   18.056549]  <TASK>
[   18.056589]  dump_stack_lvl+0x73/0xb0
[   18.056660]  print_report+0xd1/0x650
[   18.056716]  ? __virt_addr_valid+0x1db/0x2d0
[   18.056769]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.056820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.056868]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.056916]  kasan_report+0x141/0x180
[   18.056964]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.057024]  kasan_check_range+0x10c/0x1c0
[   18.057080]  __kasan_check_write+0x18/0x20
[   18.057129]  kasan_atomics_helper+0x7c7/0x5450
[   18.057184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.057280]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.057336]  ? kasan_atomics+0x152/0x310
[   18.057402]  kasan_atomics+0x1dc/0x310
[   18.057467]  ? __pfx_kasan_atomics+0x10/0x10
[   18.057525]  ? __pfx_read_tsc+0x10/0x10
[   18.057572]  ? ktime_get_ts64+0x86/0x230
[   18.057628]  kunit_try_run_case+0x1a5/0x480
[   18.057679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.057726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.057789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.057848]  ? __kthread_parkme+0x82/0x180
[   18.057900]  ? preempt_count_sub+0x50/0x80
[   18.057959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.058012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.058061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.058116]  kthread+0x337/0x6f0
[   18.058164]  ? trace_preempt_on+0x20/0xc0
[   18.058256]  ? __pfx_kthread+0x10/0x10
[   18.058301]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.058348]  ? calculate_sigpending+0x7b/0xa0
[   18.058398]  ? __pfx_kthread+0x10/0x10
[   18.058438]  ret_from_fork+0x116/0x1d0
[   18.058490]  ? __pfx_kthread+0x10/0x10
[   18.058534]  ret_from_fork_asm+0x1a/0x30
[   18.058597]  </TASK>
[   18.058624] 
[   18.069559] Allocated by task 282:
[   18.069917]  kasan_save_stack+0x45/0x70
[   18.070226]  kasan_save_track+0x18/0x40
[   18.070510]  kasan_save_alloc_info+0x3b/0x50
[   18.070812]  __kasan_kmalloc+0xb7/0xc0
[   18.071077]  __kmalloc_cache_noprof+0x189/0x420
[   18.071330]  kasan_atomics+0x95/0x310
[   18.071621]  kunit_try_run_case+0x1a5/0x480
[   18.071993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.072462]  kthread+0x337/0x6f0
[   18.072751]  ret_from_fork+0x116/0x1d0
[   18.073071]  ret_from_fork_asm+0x1a/0x30
[   18.073322] 
[   18.073512] The buggy address belongs to the object at ffff8881033ecb00
[   18.073512]  which belongs to the cache kmalloc-64 of size 64
[   18.074084] The buggy address is located 0 bytes to the right of
[   18.074084]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.074748] 
[   18.074877] The buggy address belongs to the physical page:
[   18.075094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.075444] flags: 0x200000000000000(node=0|zone=2)
[   18.075686] page_type: f5(slab)
[   18.075864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.076144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.076444] page dumped because: kasan: bad access detected
[   18.076878] 
[   18.077066] Memory state around the buggy address:
[   18.077490]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078006]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078589] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.079095]                                      ^
[   18.079527]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.080070]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.080630] ==================================================================
[   18.797056] ==================================================================
[   18.798303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   18.798991] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.799733] 
[   18.799918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.800037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.800073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.800164] Call Trace:
[   18.800229]  <TASK>
[   18.800303]  dump_stack_lvl+0x73/0xb0
[   18.800397]  print_report+0xd1/0x650
[   18.800465]  ? __virt_addr_valid+0x1db/0x2d0
[   18.800523]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.800661]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800736]  kasan_report+0x141/0x180
[   18.800794]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800856]  kasan_check_range+0x10c/0x1c0
[   18.800914]  __kasan_check_read+0x15/0x20
[   18.800995]  kasan_atomics_helper+0x13b5/0x5450
[   18.801064]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.801120]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.801163]  ? kasan_atomics+0x152/0x310
[   18.801204]  kasan_atomics+0x1dc/0x310
[   18.801273]  ? __pfx_kasan_atomics+0x10/0x10
[   18.801303]  ? __pfx_read_tsc+0x10/0x10
[   18.801331]  ? ktime_get_ts64+0x86/0x230
[   18.801363]  kunit_try_run_case+0x1a5/0x480
[   18.801390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.801413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.801444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.801498]  ? __kthread_parkme+0x82/0x180
[   18.801524]  ? preempt_count_sub+0x50/0x80
[   18.801552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.801577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.801608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.801636]  kthread+0x337/0x6f0
[   18.801660]  ? trace_preempt_on+0x20/0xc0
[   18.801687]  ? __pfx_kthread+0x10/0x10
[   18.801711]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.801736]  ? calculate_sigpending+0x7b/0xa0
[   18.801765]  ? __pfx_kthread+0x10/0x10
[   18.801788]  ret_from_fork+0x116/0x1d0
[   18.801810]  ? __pfx_kthread+0x10/0x10
[   18.801835]  ret_from_fork_asm+0x1a/0x30
[   18.801871]  </TASK>
[   18.801886] 
[   18.816589] Allocated by task 282:
[   18.816927]  kasan_save_stack+0x45/0x70
[   18.817939]  kasan_save_track+0x18/0x40
[   18.818205]  kasan_save_alloc_info+0x3b/0x50
[   18.818893]  __kasan_kmalloc+0xb7/0xc0
[   18.819090]  __kmalloc_cache_noprof+0x189/0x420
[   18.819750]  kasan_atomics+0x95/0x310
[   18.820041]  kunit_try_run_case+0x1a5/0x480
[   18.820539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.820839]  kthread+0x337/0x6f0
[   18.821352]  ret_from_fork+0x116/0x1d0
[   18.821601]  ret_from_fork_asm+0x1a/0x30
[   18.821915] 
[   18.822048] The buggy address belongs to the object at ffff8881033ecb00
[   18.822048]  which belongs to the cache kmalloc-64 of size 64
[   18.823256] The buggy address is located 0 bytes to the right of
[   18.823256]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.823782] 
[   18.824290] The buggy address belongs to the physical page:
[   18.824811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.825330] flags: 0x200000000000000(node=0|zone=2)
[   18.825859] page_type: f5(slab)
[   18.826091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.826726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.827084] page dumped because: kasan: bad access detected
[   18.827581] 
[   18.828048] Memory state around the buggy address:
[   18.828332]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.829115]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.829635] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.829988]                                      ^
[   18.830700]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831082]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831850] ==================================================================
[   19.575176] ==================================================================
[   19.575910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   19.576398] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.576711] 
[   19.576868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.576932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.576977] Call Trace:
[   19.577004]  <TASK>
[   19.577030]  dump_stack_lvl+0x73/0xb0
[   19.577067]  print_report+0xd1/0x650
[   19.577095]  ? __virt_addr_valid+0x1db/0x2d0
[   19.577124]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.577178]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577252]  kasan_report+0x141/0x180
[   19.577298]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577346]  __asan_report_load8_noabort+0x18/0x20
[   19.577371]  kasan_atomics_helper+0x4fb2/0x5450
[   19.577399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.577427]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.577462]  ? kasan_atomics+0x152/0x310
[   19.577500]  kasan_atomics+0x1dc/0x310
[   19.577529]  ? __pfx_kasan_atomics+0x10/0x10
[   19.577559]  ? __pfx_read_tsc+0x10/0x10
[   19.577586]  ? ktime_get_ts64+0x86/0x230
[   19.577616]  kunit_try_run_case+0x1a5/0x480
[   19.577644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.577668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.577698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.577729]  ? __kthread_parkme+0x82/0x180
[   19.577755]  ? preempt_count_sub+0x50/0x80
[   19.577784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.577809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.577839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.577868]  kthread+0x337/0x6f0
[   19.577892]  ? trace_preempt_on+0x20/0xc0
[   19.577919]  ? __pfx_kthread+0x10/0x10
[   19.577946]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.577973]  ? calculate_sigpending+0x7b/0xa0
[   19.578003]  ? __pfx_kthread+0x10/0x10
[   19.578030]  ret_from_fork+0x116/0x1d0
[   19.578053]  ? __pfx_kthread+0x10/0x10
[   19.578077]  ret_from_fork_asm+0x1a/0x30
[   19.578116]  </TASK>
[   19.578130] 
[   19.585582] Allocated by task 282:
[   19.585821]  kasan_save_stack+0x45/0x70
[   19.585936]  kasan_save_track+0x18/0x40
[   19.586037]  kasan_save_alloc_info+0x3b/0x50
[   19.586142]  __kasan_kmalloc+0xb7/0xc0
[   19.586330]  __kmalloc_cache_noprof+0x189/0x420
[   19.586508]  kasan_atomics+0x95/0x310
[   19.586656]  kunit_try_run_case+0x1a5/0x480
[   19.586799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.586965]  kthread+0x337/0x6f0
[   19.587080]  ret_from_fork+0x116/0x1d0
[   19.587372]  ret_from_fork_asm+0x1a/0x30
[   19.587678] 
[   19.587817] The buggy address belongs to the object at ffff8881033ecb00
[   19.587817]  which belongs to the cache kmalloc-64 of size 64
[   19.588557] The buggy address is located 0 bytes to the right of
[   19.588557]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.589088] 
[   19.589156] The buggy address belongs to the physical page:
[   19.589304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.589484] flags: 0x200000000000000(node=0|zone=2)
[   19.589823] page_type: f5(slab)
[   19.590030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.590526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.590995] page dumped because: kasan: bad access detected
[   19.591236] 
[   19.591369] Memory state around the buggy address:
[   19.591501]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591651]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591795] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.592271]                                      ^
[   19.592613]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593072]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593377] ==================================================================
[   19.636035] ==================================================================
[   19.636611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   19.637140] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.637477] 
[   19.637638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.637839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.637888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.637919] Call Trace:
[   19.637949]  <TASK>
[   19.637977]  dump_stack_lvl+0x73/0xb0
[   19.638033]  print_report+0xd1/0x650
[   19.638063]  ? __virt_addr_valid+0x1db/0x2d0
[   19.638093]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.638149]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638176]  kasan_report+0x141/0x180
[   19.638218]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638252]  kasan_check_range+0x10c/0x1c0
[   19.638281]  __kasan_check_write+0x18/0x20
[   19.638306]  kasan_atomics_helper+0x224c/0x5450
[   19.638333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.638361]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.638387]  ? kasan_atomics+0x152/0x310
[   19.638420]  kasan_atomics+0x1dc/0x310
[   19.638448]  ? __pfx_kasan_atomics+0x10/0x10
[   19.638500]  ? __pfx_read_tsc+0x10/0x10
[   19.638529]  ? ktime_get_ts64+0x86/0x230
[   19.638560]  kunit_try_run_case+0x1a5/0x480
[   19.638589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.638614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.638645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.638677]  ? __kthread_parkme+0x82/0x180
[   19.638705]  ? preempt_count_sub+0x50/0x80
[   19.638735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.638762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.638793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.638826]  kthread+0x337/0x6f0
[   19.638853]  ? trace_preempt_on+0x20/0xc0
[   19.638883]  ? __pfx_kthread+0x10/0x10
[   19.638910]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.638940]  ? calculate_sigpending+0x7b/0xa0
[   19.638974]  ? __pfx_kthread+0x10/0x10
[   19.639003]  ret_from_fork+0x116/0x1d0
[   19.639029]  ? __pfx_kthread+0x10/0x10
[   19.639057]  ret_from_fork_asm+0x1a/0x30
[   19.639098]  </TASK>
[   19.639114] 
[   19.647954] Allocated by task 282:
[   19.648254]  kasan_save_stack+0x45/0x70
[   19.648514]  kasan_save_track+0x18/0x40
[   19.648667]  kasan_save_alloc_info+0x3b/0x50
[   19.648814]  __kasan_kmalloc+0xb7/0xc0
[   19.648953]  __kmalloc_cache_noprof+0x189/0x420
[   19.649289]  kasan_atomics+0x95/0x310
[   19.649591]  kunit_try_run_case+0x1a5/0x480
[   19.649918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.650338]  kthread+0x337/0x6f0
[   19.650609]  ret_from_fork+0x116/0x1d0
[   19.650869]  ret_from_fork_asm+0x1a/0x30
[   19.651146] 
[   19.651335] The buggy address belongs to the object at ffff8881033ecb00
[   19.651335]  which belongs to the cache kmalloc-64 of size 64
[   19.651843] The buggy address is located 0 bytes to the right of
[   19.651843]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.652402] 
[   19.652515] The buggy address belongs to the physical page:
[   19.653370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.653610] flags: 0x200000000000000(node=0|zone=2)
[   19.653749] page_type: f5(slab)
[   19.653889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.654436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655482] page dumped because: kasan: bad access detected
[   19.655871] 
[   19.655985] Memory state around the buggy address:
[   19.656234]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656562]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656727] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.657148]                                      ^
[   19.657502]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.657843]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.658234] ==================================================================
[   18.267042] ==================================================================
[   18.267520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   18.268284] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.269073] 
[   18.269649] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.269725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.269743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.269772] Call Trace:
[   18.269798]  <TASK>
[   18.269828]  dump_stack_lvl+0x73/0xb0
[   18.269873]  print_report+0xd1/0x650
[   18.269901]  ? __virt_addr_valid+0x1db/0x2d0
[   18.269930]  ? kasan_atomics_helper+0xc70/0x5450
[   18.269955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.269982]  ? kasan_atomics_helper+0xc70/0x5450
[   18.270007]  kasan_report+0x141/0x180
[   18.270032]  ? kasan_atomics_helper+0xc70/0x5450
[   18.270063]  kasan_check_range+0x10c/0x1c0
[   18.270089]  __kasan_check_write+0x18/0x20
[   18.270111]  kasan_atomics_helper+0xc70/0x5450
[   18.270135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.270159]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.270184]  ? kasan_atomics+0x152/0x310
[   18.270246]  kasan_atomics+0x1dc/0x310
[   18.270277]  ? __pfx_kasan_atomics+0x10/0x10
[   18.270306]  ? __pfx_read_tsc+0x10/0x10
[   18.270332]  ? ktime_get_ts64+0x86/0x230
[   18.270360]  kunit_try_run_case+0x1a5/0x480
[   18.270386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.270408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.270437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.270486]  ? __kthread_parkme+0x82/0x180
[   18.270514]  ? preempt_count_sub+0x50/0x80
[   18.270545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.270568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.270598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.270626]  kthread+0x337/0x6f0
[   18.270650]  ? trace_preempt_on+0x20/0xc0
[   18.270677]  ? __pfx_kthread+0x10/0x10
[   18.270701]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.270726]  ? calculate_sigpending+0x7b/0xa0
[   18.270756]  ? __pfx_kthread+0x10/0x10
[   18.270780]  ret_from_fork+0x116/0x1d0
[   18.270803]  ? __pfx_kthread+0x10/0x10
[   18.270826]  ret_from_fork_asm+0x1a/0x30
[   18.270861]  </TASK>
[   18.270875] 
[   18.284791] Allocated by task 282:
[   18.285035]  kasan_save_stack+0x45/0x70
[   18.285320]  kasan_save_track+0x18/0x40
[   18.286009]  kasan_save_alloc_info+0x3b/0x50
[   18.286192]  __kasan_kmalloc+0xb7/0xc0
[   18.286772]  __kmalloc_cache_noprof+0x189/0x420
[   18.287225]  kasan_atomics+0x95/0x310
[   18.287618]  kunit_try_run_case+0x1a5/0x480
[   18.288032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.288858]  kthread+0x337/0x6f0
[   18.289104]  ret_from_fork+0x116/0x1d0
[   18.289296]  ret_from_fork_asm+0x1a/0x30
[   18.289797] 
[   18.290006] The buggy address belongs to the object at ffff8881033ecb00
[   18.290006]  which belongs to the cache kmalloc-64 of size 64
[   18.291179] The buggy address is located 0 bytes to the right of
[   18.291179]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.291784] 
[   18.292165] The buggy address belongs to the physical page:
[   18.292533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.293066] flags: 0x200000000000000(node=0|zone=2)
[   18.293477] page_type: f5(slab)
[   18.293833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.294239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.294724] page dumped because: kasan: bad access detected
[   18.295133] 
[   18.295267] Memory state around the buggy address:
[   18.295528]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.296106]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.296470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.297017]                                      ^
[   18.297428]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.297742]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.298300] ==================================================================
[   18.563835] ==================================================================
[   18.564830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   18.565440] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.565761] 
[   18.565972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.566078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.566110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.566163] Call Trace:
[   18.566206]  <TASK>
[   18.566537]  dump_stack_lvl+0x73/0xb0
[   18.566627]  print_report+0xd1/0x650
[   18.566687]  ? __virt_addr_valid+0x1db/0x2d0
[   18.566747]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.566817]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566845]  kasan_report+0x141/0x180
[   18.566871]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566902]  __asan_report_load4_noabort+0x18/0x20
[   18.566926]  kasan_atomics_helper+0x4a1c/0x5450
[   18.566953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.566980]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.567006]  ? kasan_atomics+0x152/0x310
[   18.567037]  kasan_atomics+0x1dc/0x310
[   18.567065]  ? __pfx_kasan_atomics+0x10/0x10
[   18.567093]  ? __pfx_read_tsc+0x10/0x10
[   18.567119]  ? ktime_get_ts64+0x86/0x230
[   18.567147]  kunit_try_run_case+0x1a5/0x480
[   18.567174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.567219]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.567259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.567291]  ? __kthread_parkme+0x82/0x180
[   18.567316]  ? preempt_count_sub+0x50/0x80
[   18.567385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.567416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.567447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.567498]  kthread+0x337/0x6f0
[   18.567523]  ? trace_preempt_on+0x20/0xc0
[   18.567552]  ? __pfx_kthread+0x10/0x10
[   18.567577]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.567604]  ? calculate_sigpending+0x7b/0xa0
[   18.567633]  ? __pfx_kthread+0x10/0x10
[   18.567659]  ret_from_fork+0x116/0x1d0
[   18.567682]  ? __pfx_kthread+0x10/0x10
[   18.567706]  ret_from_fork_asm+0x1a/0x30
[   18.567744]  </TASK>
[   18.567759] 
[   18.581790] Allocated by task 282:
[   18.582574]  kasan_save_stack+0x45/0x70
[   18.582903]  kasan_save_track+0x18/0x40
[   18.583190]  kasan_save_alloc_info+0x3b/0x50
[   18.583799]  __kasan_kmalloc+0xb7/0xc0
[   18.584067]  __kmalloc_cache_noprof+0x189/0x420
[   18.584703]  kasan_atomics+0x95/0x310
[   18.584958]  kunit_try_run_case+0x1a5/0x480
[   18.585152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.585736]  kthread+0x337/0x6f0
[   18.585959]  ret_from_fork+0x116/0x1d0
[   18.586174]  ret_from_fork_asm+0x1a/0x30
[   18.587107] 
[   18.587239] The buggy address belongs to the object at ffff8881033ecb00
[   18.587239]  which belongs to the cache kmalloc-64 of size 64
[   18.588450] The buggy address is located 0 bytes to the right of
[   18.588450]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.589551] 
[   18.589809] The buggy address belongs to the physical page:
[   18.590033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.590672] flags: 0x200000000000000(node=0|zone=2)
[   18.591286] page_type: f5(slab)
[   18.591842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.592299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.592898] page dumped because: kasan: bad access detected
[   18.593225] 
[   18.593817] Memory state around the buggy address:
[   18.594128]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.594695]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.595173] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.595970]                                      ^
[   18.596478]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.596875]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.597525] ==================================================================
[   17.913775] ==================================================================
[   17.914856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   17.916402] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.917849] 
[   17.918036] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.918145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.918177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.918224] Call Trace:
[   17.918268]  <TASK>
[   17.918310]  dump_stack_lvl+0x73/0xb0
[   17.918386]  print_report+0xd1/0x650
[   17.918435]  ? __virt_addr_valid+0x1db/0x2d0
[   17.918498]  ? kasan_atomics_helper+0x565/0x5450
[   17.918571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.918618]  ? kasan_atomics_helper+0x565/0x5450
[   17.918667]  kasan_report+0x141/0x180
[   17.918716]  ? kasan_atomics_helper+0x565/0x5450
[   17.918773]  kasan_check_range+0x10c/0x1c0
[   17.918825]  __kasan_check_write+0x18/0x20
[   17.918868]  kasan_atomics_helper+0x565/0x5450
[   17.918917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.918965]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.919005]  ? kasan_atomics+0x152/0x310
[   17.919053]  kasan_atomics+0x1dc/0x310
[   17.919095]  ? __pfx_kasan_atomics+0x10/0x10
[   17.919139]  ? __pfx_read_tsc+0x10/0x10
[   17.919194]  ? ktime_get_ts64+0x86/0x230
[   17.919241]  kunit_try_run_case+0x1a5/0x480
[   17.919284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.919324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.919385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.919430]  ? __kthread_parkme+0x82/0x180
[   17.921094]  ? preempt_count_sub+0x50/0x80
[   17.921177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.921265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.921323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.921371]  kthread+0x337/0x6f0
[   17.921412]  ? trace_preempt_on+0x20/0xc0
[   17.921478]  ? __pfx_kthread+0x10/0x10
[   17.921521]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.921568]  ? calculate_sigpending+0x7b/0xa0
[   17.921618]  ? __pfx_kthread+0x10/0x10
[   17.921662]  ret_from_fork+0x116/0x1d0
[   17.921949]  ? __pfx_kthread+0x10/0x10
[   17.922005]  ret_from_fork_asm+0x1a/0x30
[   17.922072]  </TASK>
[   17.922098] 
[   17.941360] Allocated by task 282:
[   17.942813]  kasan_save_stack+0x45/0x70
[   17.943053]  kasan_save_track+0x18/0x40
[   17.943196]  kasan_save_alloc_info+0x3b/0x50
[   17.943865]  __kasan_kmalloc+0xb7/0xc0
[   17.944544]  __kmalloc_cache_noprof+0x189/0x420
[   17.944758]  kasan_atomics+0x95/0x310
[   17.945452]  kunit_try_run_case+0x1a5/0x480
[   17.945969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.946423]  kthread+0x337/0x6f0
[   17.946616]  ret_from_fork+0x116/0x1d0
[   17.946919]  ret_from_fork_asm+0x1a/0x30
[   17.947273] 
[   17.947412] The buggy address belongs to the object at ffff8881033ecb00
[   17.947412]  which belongs to the cache kmalloc-64 of size 64
[   17.948533] The buggy address is located 0 bytes to the right of
[   17.948533]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.949023] 
[   17.949240] The buggy address belongs to the physical page:
[   17.949850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.950523] flags: 0x200000000000000(node=0|zone=2)
[   17.950971] page_type: f5(slab)
[   17.952285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.952683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.953306] page dumped because: kasan: bad access detected
[   17.953926] 
[   17.954101] Memory state around the buggy address:
[   17.954518]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.955734]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.956258] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.956909]                                      ^
[   17.957545]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958169]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958730] ==================================================================
[   17.996533] ==================================================================
[   17.997207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   17.997844] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.998617] 
[   17.998865] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.998965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.998990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.999031] Call Trace:
[   17.999071]  <TASK>
[   17.999112]  dump_stack_lvl+0x73/0xb0
[   17.999175]  print_report+0xd1/0x650
[   17.999253]  ? __virt_addr_valid+0x1db/0x2d0
[   17.999295]  ? kasan_atomics_helper+0x697/0x5450
[   17.999332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.999385]  ? kasan_atomics_helper+0x697/0x5450
[   17.999428]  kasan_report+0x141/0x180
[   17.999491]  ? kasan_atomics_helper+0x697/0x5450
[   17.999545]  kasan_check_range+0x10c/0x1c0
[   17.999596]  __kasan_check_write+0x18/0x20
[   17.999643]  kasan_atomics_helper+0x697/0x5450
[   17.999724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.999784]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.999834]  ? kasan_atomics+0x152/0x310
[   17.999899]  kasan_atomics+0x1dc/0x310
[   17.999963]  ? __pfx_kasan_atomics+0x10/0x10
[   18.000019]  ? __pfx_read_tsc+0x10/0x10
[   18.000073]  ? ktime_get_ts64+0x86/0x230
[   18.000137]  kunit_try_run_case+0x1a5/0x480
[   18.000222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.000275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.000332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.000379]  ? __kthread_parkme+0x82/0x180
[   18.000424]  ? preempt_count_sub+0x50/0x80
[   18.000490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.000549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.000622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.000677]  kthread+0x337/0x6f0
[   18.000725]  ? trace_preempt_on+0x20/0xc0
[   18.000774]  ? __pfx_kthread+0x10/0x10
[   18.000834]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.000903]  ? calculate_sigpending+0x7b/0xa0
[   18.000955]  ? __pfx_kthread+0x10/0x10
[   18.000994]  ret_from_fork+0x116/0x1d0
[   18.001030]  ? __pfx_kthread+0x10/0x10
[   18.001054]  ret_from_fork_asm+0x1a/0x30
[   18.001091]  </TASK>
[   18.001107] 
[   18.012114] Allocated by task 282:
[   18.012568]  kasan_save_stack+0x45/0x70
[   18.013115]  kasan_save_track+0x18/0x40
[   18.013555]  kasan_save_alloc_info+0x3b/0x50
[   18.013980]  __kasan_kmalloc+0xb7/0xc0
[   18.014332]  __kmalloc_cache_noprof+0x189/0x420
[   18.014789]  kasan_atomics+0x95/0x310
[   18.015270]  kunit_try_run_case+0x1a5/0x480
[   18.015837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.016410]  kthread+0x337/0x6f0
[   18.016816]  ret_from_fork+0x116/0x1d0
[   18.017237]  ret_from_fork_asm+0x1a/0x30
[   18.017535] 
[   18.017735] The buggy address belongs to the object at ffff8881033ecb00
[   18.017735]  which belongs to the cache kmalloc-64 of size 64
[   18.018687] The buggy address is located 0 bytes to the right of
[   18.018687]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.019716] 
[   18.019874] The buggy address belongs to the physical page:
[   18.020308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.020780] flags: 0x200000000000000(node=0|zone=2)
[   18.021265] page_type: f5(slab)
[   18.021510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.022013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.022506] page dumped because: kasan: bad access detected
[   18.022892] 
[   18.023084] Memory state around the buggy address:
[   18.023573]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.024131]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.024741] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.025080]                                      ^
[   18.025531]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.025990]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.026544] ==================================================================
[   18.171675] ==================================================================
[   18.172504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   18.173092] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.173470] 
[   18.173637] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.173744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.173776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.173829] Call Trace:
[   18.173877]  <TASK>
[   18.173921]  dump_stack_lvl+0x73/0xb0
[   18.173959]  print_report+0xd1/0x650
[   18.173987]  ? __virt_addr_valid+0x1db/0x2d0
[   18.174015]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.174089]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174131]  kasan_report+0x141/0x180
[   18.174175]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174232]  kasan_check_range+0x10c/0x1c0
[   18.174288]  __kasan_check_write+0x18/0x20
[   18.174335]  kasan_atomics_helper+0xa2b/0x5450
[   18.174390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.174443]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.174565]  ? kasan_atomics+0x152/0x310
[   18.174621]  kasan_atomics+0x1dc/0x310
[   18.174669]  ? __pfx_kasan_atomics+0x10/0x10
[   18.174723]  ? __pfx_read_tsc+0x10/0x10
[   18.174775]  ? ktime_get_ts64+0x86/0x230
[   18.174837]  kunit_try_run_case+0x1a5/0x480
[   18.174890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.174938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.175000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.175060]  ? __kthread_parkme+0x82/0x180
[   18.175114]  ? preempt_count_sub+0x50/0x80
[   18.175175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.175274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.175365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.175427]  kthread+0x337/0x6f0
[   18.175480]  ? trace_preempt_on+0x20/0xc0
[   18.175537]  ? __pfx_kthread+0x10/0x10
[   18.175590]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.175648]  ? calculate_sigpending+0x7b/0xa0
[   18.175711]  ? __pfx_kthread+0x10/0x10
[   18.175766]  ret_from_fork+0x116/0x1d0
[   18.175815]  ? __pfx_kthread+0x10/0x10
[   18.175867]  ret_from_fork_asm+0x1a/0x30
[   18.175947]  </TASK>
[   18.175978] 
[   18.189363] Allocated by task 282:
[   18.189751]  kasan_save_stack+0x45/0x70
[   18.190142]  kasan_save_track+0x18/0x40
[   18.190515]  kasan_save_alloc_info+0x3b/0x50
[   18.190859]  __kasan_kmalloc+0xb7/0xc0
[   18.191215]  __kmalloc_cache_noprof+0x189/0x420
[   18.191544]  kasan_atomics+0x95/0x310
[   18.191732]  kunit_try_run_case+0x1a5/0x480
[   18.191912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.192116]  kthread+0x337/0x6f0
[   18.192396]  ret_from_fork+0x116/0x1d0
[   18.192632]  ret_from_fork_asm+0x1a/0x30
[   18.192937] 
[   18.193104] The buggy address belongs to the object at ffff8881033ecb00
[   18.193104]  which belongs to the cache kmalloc-64 of size 64
[   18.193886] The buggy address is located 0 bytes to the right of
[   18.193886]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.194350] 
[   18.194480] The buggy address belongs to the physical page:
[   18.194709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.195044] flags: 0x200000000000000(node=0|zone=2)
[   18.195528] page_type: f5(slab)
[   18.195727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.196032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.196367] page dumped because: kasan: bad access detected
[   18.196777] 
[   18.196994] Memory state around the buggy address:
[   18.197506]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198059]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198742] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.199041]                                      ^
[   18.199308]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.199645]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200034] ==================================================================
[   18.729234] ==================================================================
[   18.731298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   18.732347] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.733014] 
[   18.733247] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.733563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.733612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.733666] Call Trace:
[   18.733725]  <TASK>
[   18.733763]  dump_stack_lvl+0x73/0xb0
[   18.733816]  print_report+0xd1/0x650
[   18.733845]  ? __virt_addr_valid+0x1db/0x2d0
[   18.733874]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.733900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.733926]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.733952]  kasan_report+0x141/0x180
[   18.733977]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.734007]  kasan_check_range+0x10c/0x1c0
[   18.734035]  __kasan_check_write+0x18/0x20
[   18.734057]  kasan_atomics_helper+0x12e6/0x5450
[   18.734084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.734110]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.734135]  ? kasan_atomics+0x152/0x310
[   18.734166]  kasan_atomics+0x1dc/0x310
[   18.734194]  ? __pfx_kasan_atomics+0x10/0x10
[   18.734252]  ? __pfx_read_tsc+0x10/0x10
[   18.734280]  ? ktime_get_ts64+0x86/0x230
[   18.734309]  kunit_try_run_case+0x1a5/0x480
[   18.734337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.734360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.734389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.734416]  ? __kthread_parkme+0x82/0x180
[   18.734440]  ? preempt_count_sub+0x50/0x80
[   18.734491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.734520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.734549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.734578]  kthread+0x337/0x6f0
[   18.734601]  ? trace_preempt_on+0x20/0xc0
[   18.734629]  ? __pfx_kthread+0x10/0x10
[   18.734654]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.734680]  ? calculate_sigpending+0x7b/0xa0
[   18.734708]  ? __pfx_kthread+0x10/0x10
[   18.734732]  ret_from_fork+0x116/0x1d0
[   18.734754]  ? __pfx_kthread+0x10/0x10
[   18.734779]  ret_from_fork_asm+0x1a/0x30
[   18.734815]  </TASK>
[   18.734829] 
[   18.747718] Allocated by task 282:
[   18.747953]  kasan_save_stack+0x45/0x70
[   18.748161]  kasan_save_track+0x18/0x40
[   18.748964]  kasan_save_alloc_info+0x3b/0x50
[   18.749675]  __kasan_kmalloc+0xb7/0xc0
[   18.750186]  __kmalloc_cache_noprof+0x189/0x420
[   18.750789]  kasan_atomics+0x95/0x310
[   18.751116]  kunit_try_run_case+0x1a5/0x480
[   18.751426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.751906]  kthread+0x337/0x6f0
[   18.752118]  ret_from_fork+0x116/0x1d0
[   18.752637]  ret_from_fork_asm+0x1a/0x30
[   18.752882] 
[   18.753004] The buggy address belongs to the object at ffff8881033ecb00
[   18.753004]  which belongs to the cache kmalloc-64 of size 64
[   18.754099] The buggy address is located 0 bytes to the right of
[   18.754099]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.754594] 
[   18.755220] The buggy address belongs to the physical page:
[   18.755674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.756221] flags: 0x200000000000000(node=0|zone=2)
[   18.756563] page_type: f5(slab)
[   18.756850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.757336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.757844] page dumped because: kasan: bad access detected
[   18.758105] 
[   18.758231] Memory state around the buggy address:
[   18.758644]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.759387]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.759899] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.760978]                                      ^
[   18.761652]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762015]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762625] ==================================================================
[   18.925261] ==================================================================
[   18.925940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   18.926637] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.927097] 
[   18.927471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.927594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.927626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.927675] Call Trace:
[   18.927723]  <TASK>
[   18.927771]  dump_stack_lvl+0x73/0xb0
[   18.927831]  print_report+0xd1/0x650
[   18.927861]  ? __virt_addr_valid+0x1db/0x2d0
[   18.927889]  ? kasan_atomics_helper+0x151d/0x5450
[   18.927915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.927944]  ? kasan_atomics_helper+0x151d/0x5450
[   18.927984]  kasan_report+0x141/0x180
[   18.928031]  ? kasan_atomics_helper+0x151d/0x5450
[   18.928091]  kasan_check_range+0x10c/0x1c0
[   18.928146]  __kasan_check_write+0x18/0x20
[   18.928205]  kasan_atomics_helper+0x151d/0x5450
[   18.928250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.928277]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.928303]  ? kasan_atomics+0x152/0x310
[   18.928334]  kasan_atomics+0x1dc/0x310
[   18.928361]  ? __pfx_kasan_atomics+0x10/0x10
[   18.928389]  ? __pfx_read_tsc+0x10/0x10
[   18.928416]  ? ktime_get_ts64+0x86/0x230
[   18.928444]  kunit_try_run_case+0x1a5/0x480
[   18.928500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.928535]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.928565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.928593]  ? __kthread_parkme+0x82/0x180
[   18.928619]  ? preempt_count_sub+0x50/0x80
[   18.928647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.928672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.928700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.928731]  kthread+0x337/0x6f0
[   18.928753]  ? trace_preempt_on+0x20/0xc0
[   18.928779]  ? __pfx_kthread+0x10/0x10
[   18.928803]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.928829]  ? calculate_sigpending+0x7b/0xa0
[   18.928858]  ? __pfx_kthread+0x10/0x10
[   18.928883]  ret_from_fork+0x116/0x1d0
[   18.928906]  ? __pfx_kthread+0x10/0x10
[   18.928929]  ret_from_fork_asm+0x1a/0x30
[   18.928966]  </TASK>
[   18.928981] 
[   18.940302] Allocated by task 282:
[   18.940635]  kasan_save_stack+0x45/0x70
[   18.941038]  kasan_save_track+0x18/0x40
[   18.941427]  kasan_save_alloc_info+0x3b/0x50
[   18.941774]  __kasan_kmalloc+0xb7/0xc0
[   18.942051]  __kmalloc_cache_noprof+0x189/0x420
[   18.942256]  kasan_atomics+0x95/0x310
[   18.942433]  kunit_try_run_case+0x1a5/0x480
[   18.942638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.943018]  kthread+0x337/0x6f0
[   18.943387]  ret_from_fork+0x116/0x1d0
[   18.943745]  ret_from_fork_asm+0x1a/0x30
[   18.944081] 
[   18.944246] The buggy address belongs to the object at ffff8881033ecb00
[   18.944246]  which belongs to the cache kmalloc-64 of size 64
[   18.945486] The buggy address is located 0 bytes to the right of
[   18.945486]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.945948] 
[   18.946120] The buggy address belongs to the physical page:
[   18.946676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.947336] flags: 0x200000000000000(node=0|zone=2)
[   18.947631] page_type: f5(slab)
[   18.947837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.948147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.948736] page dumped because: kasan: bad access detected
[   18.949190] 
[   18.949415] Memory state around the buggy address:
[   18.949815]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.950339]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.950628] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.950906]                                      ^
[   18.951126]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951674]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.952227] ==================================================================
[   19.143484] ==================================================================
[   19.145286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   19.146099] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.146852] 
[   19.147082] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.147201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.147247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.147299] Call Trace:
[   19.147380]  <TASK>
[   19.147424]  dump_stack_lvl+0x73/0xb0
[   19.147511]  print_report+0xd1/0x650
[   19.147566]  ? __virt_addr_valid+0x1db/0x2d0
[   19.147624]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.147740]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147794]  kasan_report+0x141/0x180
[   19.147849]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147917]  kasan_check_range+0x10c/0x1c0
[   19.147977]  __kasan_check_write+0x18/0x20
[   19.148030]  kasan_atomics_helper+0x194a/0x5450
[   19.148087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.148145]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.148199]  ? kasan_atomics+0x152/0x310
[   19.148263]  kasan_atomics+0x1dc/0x310
[   19.148321]  ? __pfx_kasan_atomics+0x10/0x10
[   19.148380]  ? __pfx_read_tsc+0x10/0x10
[   19.148435]  ? ktime_get_ts64+0x86/0x230
[   19.148502]  kunit_try_run_case+0x1a5/0x480
[   19.148572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.148615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.148672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.148744]  ? __kthread_parkme+0x82/0x180
[   19.148808]  ? preempt_count_sub+0x50/0x80
[   19.148866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.148944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.148998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.149052]  kthread+0x337/0x6f0
[   19.149097]  ? trace_preempt_on+0x20/0xc0
[   19.149167]  ? __pfx_kthread+0x10/0x10
[   19.149230]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.149296]  ? calculate_sigpending+0x7b/0xa0
[   19.149345]  ? __pfx_kthread+0x10/0x10
[   19.149389]  ret_from_fork+0x116/0x1d0
[   19.149434]  ? __pfx_kthread+0x10/0x10
[   19.149495]  ret_from_fork_asm+0x1a/0x30
[   19.149570]  </TASK>
[   19.149600] 
[   19.163225] Allocated by task 282:
[   19.163604]  kasan_save_stack+0x45/0x70
[   19.163885]  kasan_save_track+0x18/0x40
[   19.164086]  kasan_save_alloc_info+0x3b/0x50
[   19.164710]  __kasan_kmalloc+0xb7/0xc0
[   19.165276]  __kmalloc_cache_noprof+0x189/0x420
[   19.165488]  kasan_atomics+0x95/0x310
[   19.165717]  kunit_try_run_case+0x1a5/0x480
[   19.165908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.166106]  kthread+0x337/0x6f0
[   19.166245]  ret_from_fork+0x116/0x1d0
[   19.166421]  ret_from_fork_asm+0x1a/0x30
[   19.166633] 
[   19.166740] The buggy address belongs to the object at ffff8881033ecb00
[   19.166740]  which belongs to the cache kmalloc-64 of size 64
[   19.167136] The buggy address is located 0 bytes to the right of
[   19.167136]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.168056] 
[   19.168193] The buggy address belongs to the physical page:
[   19.168421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.168703] flags: 0x200000000000000(node=0|zone=2)
[   19.169103] page_type: f5(slab)
[   19.169342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.169676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.170240] page dumped because: kasan: bad access detected
[   19.170697] 
[   19.170850] Memory state around the buggy address:
[   19.171189]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.171819]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.172112] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.172963]                                      ^
[   19.173410]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.173743]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.174134] ==================================================================
[   19.352951] ==================================================================
[   19.354129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   19.354771] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.355044] 
[   19.355169] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.355258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.355277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.355307] Call Trace:
[   19.355334]  <TASK>
[   19.355372]  dump_stack_lvl+0x73/0xb0
[   19.355410]  print_report+0xd1/0x650
[   19.355438]  ? __virt_addr_valid+0x1db/0x2d0
[   19.355522]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.355571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.355615]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.355663]  kasan_report+0x141/0x180
[   19.355715]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.356071]  kasan_check_range+0x10c/0x1c0
[   19.356565]  __kasan_check_write+0x18/0x20
[   19.356633]  kasan_atomics_helper+0x1d7a/0x5450
[   19.356691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.356748]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.356802]  ? kasan_atomics+0x152/0x310
[   19.356867]  kasan_atomics+0x1dc/0x310
[   19.356923]  ? __pfx_kasan_atomics+0x10/0x10
[   19.356986]  ? __pfx_read_tsc+0x10/0x10
[   19.357040]  ? ktime_get_ts64+0x86/0x230
[   19.357104]  kunit_try_run_case+0x1a5/0x480
[   19.357158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.357200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.357251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.357294]  ? __kthread_parkme+0x82/0x180
[   19.357333]  ? preempt_count_sub+0x50/0x80
[   19.357385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.357431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.357509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.357562]  kthread+0x337/0x6f0
[   19.357611]  ? trace_preempt_on+0x20/0xc0
[   19.357664]  ? __pfx_kthread+0x10/0x10
[   19.357713]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.357761]  ? calculate_sigpending+0x7b/0xa0
[   19.357821]  ? __pfx_kthread+0x10/0x10
[   19.357874]  ret_from_fork+0x116/0x1d0
[   19.357919]  ? __pfx_kthread+0x10/0x10
[   19.357964]  ret_from_fork_asm+0x1a/0x30
[   19.358026]  </TASK>
[   19.358053] 
[   19.368002] Allocated by task 282:
[   19.368393]  kasan_save_stack+0x45/0x70
[   19.368818]  kasan_save_track+0x18/0x40
[   19.369138]  kasan_save_alloc_info+0x3b/0x50
[   19.369433]  __kasan_kmalloc+0xb7/0xc0
[   19.369707]  __kmalloc_cache_noprof+0x189/0x420
[   19.369920]  kasan_atomics+0x95/0x310
[   19.370119]  kunit_try_run_case+0x1a5/0x480
[   19.370369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.370809]  kthread+0x337/0x6f0
[   19.371136]  ret_from_fork+0x116/0x1d0
[   19.371526]  ret_from_fork_asm+0x1a/0x30
[   19.371880] 
[   19.372066] The buggy address belongs to the object at ffff8881033ecb00
[   19.372066]  which belongs to the cache kmalloc-64 of size 64
[   19.372879] The buggy address is located 0 bytes to the right of
[   19.372879]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.373365] 
[   19.373506] The buggy address belongs to the physical page:
[   19.373940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.374569] flags: 0x200000000000000(node=0|zone=2)
[   19.374969] page_type: f5(slab)
[   19.375292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.375860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.376281] page dumped because: kasan: bad access detected
[   19.376635] 
[   19.376760] Memory state around the buggy address:
[   19.376981]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377307]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377610] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.378063]                                      ^
[   19.378484]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379026]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379543] ==================================================================
[   18.299679] ==================================================================
[   18.300373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   18.300846] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.301525] 
[   18.301736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.301847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.301904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.301955] Call Trace:
[   18.302006]  <TASK>
[   18.302052]  dump_stack_lvl+0x73/0xb0
[   18.302126]  print_report+0xd1/0x650
[   18.302180]  ? __virt_addr_valid+0x1db/0x2d0
[   18.302257]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.302359]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302435]  kasan_report+0x141/0x180
[   18.302502]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302586]  __asan_report_load4_noabort+0x18/0x20
[   18.302637]  kasan_atomics_helper+0x4a84/0x5450
[   18.302693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.302745]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.302817]  ? kasan_atomics+0x152/0x310
[   18.302881]  kasan_atomics+0x1dc/0x310
[   18.302936]  ? __pfx_kasan_atomics+0x10/0x10
[   18.302993]  ? __pfx_read_tsc+0x10/0x10
[   18.303041]  ? ktime_get_ts64+0x86/0x230
[   18.303125]  kunit_try_run_case+0x1a5/0x480
[   18.303179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.303223]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.303274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.303334]  ? __kthread_parkme+0x82/0x180
[   18.303396]  ? preempt_count_sub+0x50/0x80
[   18.303462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.303512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.303603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.303659]  kthread+0x337/0x6f0
[   18.303708]  ? trace_preempt_on+0x20/0xc0
[   18.303766]  ? __pfx_kthread+0x10/0x10
[   18.303818]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.303869]  ? calculate_sigpending+0x7b/0xa0
[   18.303901]  ? __pfx_kthread+0x10/0x10
[   18.303927]  ret_from_fork+0x116/0x1d0
[   18.303950]  ? __pfx_kthread+0x10/0x10
[   18.303975]  ret_from_fork_asm+0x1a/0x30
[   18.304013]  </TASK>
[   18.304027] 
[   18.315525] Allocated by task 282:
[   18.315787]  kasan_save_stack+0x45/0x70
[   18.316036]  kasan_save_track+0x18/0x40
[   18.316917]  kasan_save_alloc_info+0x3b/0x50
[   18.317712]  __kasan_kmalloc+0xb7/0xc0
[   18.318178]  __kmalloc_cache_noprof+0x189/0x420
[   18.318774]  kasan_atomics+0x95/0x310
[   18.319003]  kunit_try_run_case+0x1a5/0x480
[   18.319623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.319933]  kthread+0x337/0x6f0
[   18.320152]  ret_from_fork+0x116/0x1d0
[   18.320798]  ret_from_fork_asm+0x1a/0x30
[   18.321449] 
[   18.321718] The buggy address belongs to the object at ffff8881033ecb00
[   18.321718]  which belongs to the cache kmalloc-64 of size 64
[   18.322262] The buggy address is located 0 bytes to the right of
[   18.322262]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.322960] 
[   18.323150] The buggy address belongs to the physical page:
[   18.323663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.324248] flags: 0x200000000000000(node=0|zone=2)
[   18.324649] page_type: f5(slab)
[   18.324852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.325558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.325998] page dumped because: kasan: bad access detected
[   18.326531] 
[   18.326721] Memory state around the buggy address:
[   18.327064]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.327374]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.327955] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.328641]                                      ^
[   18.328910]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329291]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329675] ==================================================================
[   18.598846] ==================================================================
[   18.600335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   18.600806] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.601197] 
[   18.601440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.601570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.601604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.601682] Call Trace:
[   18.601730]  <TASK>
[   18.601776]  dump_stack_lvl+0x73/0xb0
[   18.601865]  print_report+0xd1/0x650
[   18.601919]  ? __virt_addr_valid+0x1db/0x2d0
[   18.601974]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.602078]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602125]  kasan_report+0x141/0x180
[   18.602176]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602493]  kasan_check_range+0x10c/0x1c0
[   18.602580]  __kasan_check_write+0x18/0x20
[   18.602632]  kasan_atomics_helper+0x1148/0x5450
[   18.602663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.602691]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.602716]  ? kasan_atomics+0x152/0x310
[   18.602749]  kasan_atomics+0x1dc/0x310
[   18.602776]  ? __pfx_kasan_atomics+0x10/0x10
[   18.602804]  ? __pfx_read_tsc+0x10/0x10
[   18.602830]  ? ktime_get_ts64+0x86/0x230
[   18.602859]  kunit_try_run_case+0x1a5/0x480
[   18.602885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.602907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.602936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.602965]  ? __kthread_parkme+0x82/0x180
[   18.602990]  ? preempt_count_sub+0x50/0x80
[   18.603018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.603043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.603071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.603100]  kthread+0x337/0x6f0
[   18.603123]  ? trace_preempt_on+0x20/0xc0
[   18.603150]  ? __pfx_kthread+0x10/0x10
[   18.603175]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.603209]  ? calculate_sigpending+0x7b/0xa0
[   18.603269]  ? __pfx_kthread+0x10/0x10
[   18.603296]  ret_from_fork+0x116/0x1d0
[   18.603319]  ? __pfx_kthread+0x10/0x10
[   18.603354]  ret_from_fork_asm+0x1a/0x30
[   18.603398]  </TASK>
[   18.603414] 
[   18.615401] Allocated by task 282:
[   18.615880]  kasan_save_stack+0x45/0x70
[   18.616577]  kasan_save_track+0x18/0x40
[   18.616808]  kasan_save_alloc_info+0x3b/0x50
[   18.617159]  __kasan_kmalloc+0xb7/0xc0
[   18.617783]  __kmalloc_cache_noprof+0x189/0x420
[   18.618058]  kasan_atomics+0x95/0x310
[   18.618687]  kunit_try_run_case+0x1a5/0x480
[   18.618968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.619199]  kthread+0x337/0x6f0
[   18.619847]  ret_from_fork+0x116/0x1d0
[   18.620069]  ret_from_fork_asm+0x1a/0x30
[   18.620529] 
[   18.620663] The buggy address belongs to the object at ffff8881033ecb00
[   18.620663]  which belongs to the cache kmalloc-64 of size 64
[   18.621125] The buggy address is located 0 bytes to the right of
[   18.621125]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.621964] 
[   18.622103] The buggy address belongs to the physical page:
[   18.622442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.622997] flags: 0x200000000000000(node=0|zone=2)
[   18.623489] page_type: f5(slab)
[   18.623712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.624101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.624703] page dumped because: kasan: bad access detected
[   18.625141] 
[   18.625338] Memory state around the buggy address:
[   18.625576]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.626078]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.626506] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.627043]                                      ^
[   18.627358]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.627658]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.628217] ==================================================================
[   17.792436] ==================================================================
[   17.793420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   17.794344] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.795828] 
[   17.796024] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.796140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.796172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.796391] Call Trace:
[   17.796445]  <TASK>
[   17.796499]  dump_stack_lvl+0x73/0xb0
[   17.796574]  print_report+0xd1/0x650
[   17.796619]  ? __virt_addr_valid+0x1db/0x2d0
[   17.796669]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.797279]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797344]  kasan_report+0x141/0x180
[   17.797404]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797480]  __asan_report_load4_noabort+0x18/0x20
[   17.797538]  kasan_atomics_helper+0x4b54/0x5450
[   17.797597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.797656]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.797866]  ? kasan_atomics+0x152/0x310
[   17.797936]  kasan_atomics+0x1dc/0x310
[   17.797996]  ? __pfx_kasan_atomics+0x10/0x10
[   17.798055]  ? __pfx_read_tsc+0x10/0x10
[   17.798108]  ? ktime_get_ts64+0x86/0x230
[   17.798172]  kunit_try_run_case+0x1a5/0x480
[   17.798255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.798365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.798425]  ? __kthread_parkme+0x82/0x180
[   17.798489]  ? preempt_count_sub+0x50/0x80
[   17.798550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.798666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.799433]  kthread+0x337/0x6f0
[   17.799545]  ? trace_preempt_on+0x20/0xc0
[   17.799617]  ? __pfx_kthread+0x10/0x10
[   17.799668]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.799892]  ? calculate_sigpending+0x7b/0xa0
[   17.799957]  ? __pfx_kthread+0x10/0x10
[   17.800015]  ret_from_fork+0x116/0x1d0
[   17.800065]  ? __pfx_kthread+0x10/0x10
[   17.800105]  ret_from_fork_asm+0x1a/0x30
[   17.800145]  </TASK>
[   17.800161] 
[   17.815264] Allocated by task 282:
[   17.815722]  kasan_save_stack+0x45/0x70
[   17.816386]  kasan_save_track+0x18/0x40
[   17.816828]  kasan_save_alloc_info+0x3b/0x50
[   17.817112]  __kasan_kmalloc+0xb7/0xc0
[   17.817559]  __kmalloc_cache_noprof+0x189/0x420
[   17.818046]  kasan_atomics+0x95/0x310
[   17.818608]  kunit_try_run_case+0x1a5/0x480
[   17.819018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.819717]  kthread+0x337/0x6f0
[   17.820397]  ret_from_fork+0x116/0x1d0
[   17.821049]  ret_from_fork_asm+0x1a/0x30
[   17.821288] 
[   17.821451] The buggy address belongs to the object at ffff8881033ecb00
[   17.821451]  which belongs to the cache kmalloc-64 of size 64
[   17.822792] The buggy address is located 0 bytes to the right of
[   17.822792]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.823387] 
[   17.823657] The buggy address belongs to the physical page:
[   17.824096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.824733] flags: 0x200000000000000(node=0|zone=2)
[   17.825787] page_type: f5(slab)
[   17.826034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.826918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.827513] page dumped because: kasan: bad access detected
[   17.828021] 
[   17.828253] Memory state around the buggy address:
[   17.828828]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.829812]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.830507] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.831020]                                      ^
[   17.831608]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832080]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832908] ==================================================================
[   17.640602] ==================================================================
[   17.641382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   17.642065] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.643110] 
[   17.643840] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.643967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.643999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.644045] Call Trace:
[   17.644086]  <TASK>
[   17.644113]  dump_stack_lvl+0x73/0xb0
[   17.644159]  print_report+0xd1/0x650
[   17.644187]  ? __virt_addr_valid+0x1db/0x2d0
[   17.644254]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.644329]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644363]  kasan_report+0x141/0x180
[   17.644402]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644448]  __asan_report_store4_noabort+0x1b/0x30
[   17.644500]  kasan_atomics_helper+0x4ba2/0x5450
[   17.644537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.644573]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.644613]  ? kasan_atomics+0x152/0x310
[   17.644661]  kasan_atomics+0x1dc/0x310
[   17.644698]  ? __pfx_kasan_atomics+0x10/0x10
[   17.644741]  ? __pfx_read_tsc+0x10/0x10
[   17.644780]  ? ktime_get_ts64+0x86/0x230
[   17.644827]  kunit_try_run_case+0x1a5/0x480
[   17.644861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.644884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.644914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.644942]  ? __kthread_parkme+0x82/0x180
[   17.644967]  ? preempt_count_sub+0x50/0x80
[   17.644995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.645019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.645047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.645075]  kthread+0x337/0x6f0
[   17.645097]  ? trace_preempt_on+0x20/0xc0
[   17.645124]  ? __pfx_kthread+0x10/0x10
[   17.645148]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.645174]  ? calculate_sigpending+0x7b/0xa0
[   17.645210]  ? __pfx_kthread+0x10/0x10
[   17.645242]  ret_from_fork+0x116/0x1d0
[   17.645263]  ? __pfx_kthread+0x10/0x10
[   17.645286]  ret_from_fork_asm+0x1a/0x30
[   17.645320]  </TASK>
[   17.645335] 
[   17.665235] Allocated by task 282:
[   17.665666]  kasan_save_stack+0x45/0x70
[   17.666566]  kasan_save_track+0x18/0x40
[   17.666866]  kasan_save_alloc_info+0x3b/0x50
[   17.667274]  __kasan_kmalloc+0xb7/0xc0
[   17.667519]  __kmalloc_cache_noprof+0x189/0x420
[   17.668315]  kasan_atomics+0x95/0x310
[   17.668652]  kunit_try_run_case+0x1a5/0x480
[   17.669585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.670241]  kthread+0x337/0x6f0
[   17.670887]  ret_from_fork+0x116/0x1d0
[   17.671177]  ret_from_fork_asm+0x1a/0x30
[   17.671431] 
[   17.671898] The buggy address belongs to the object at ffff8881033ecb00
[   17.671898]  which belongs to the cache kmalloc-64 of size 64
[   17.672610] The buggy address is located 0 bytes to the right of
[   17.672610]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.674307] 
[   17.674565] The buggy address belongs to the physical page:
[   17.674895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.675671] flags: 0x200000000000000(node=0|zone=2)
[   17.675940] page_type: f5(slab)
[   17.676149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.677273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.677729] page dumped because: kasan: bad access detected
[   17.678271] 
[   17.678655] Memory state around the buggy address:
[   17.679504]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.680523]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.681042] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.681672]                                      ^
[   17.682469]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.683321]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684092] ==================================================================
[   19.269506] ==================================================================
[   19.269949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   19.270636] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.271198] 
[   19.271442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.271643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.271673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.271728] Call Trace:
[   19.271777]  <TASK>
[   19.271825]  dump_stack_lvl+0x73/0xb0
[   19.271898]  print_report+0xd1/0x650
[   19.271959]  ? __virt_addr_valid+0x1db/0x2d0
[   19.272020]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.272108]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272133]  kasan_report+0x141/0x180
[   19.272160]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272206]  kasan_check_range+0x10c/0x1c0
[   19.272286]  __kasan_check_write+0x18/0x20
[   19.272336]  kasan_atomics_helper+0x1c18/0x5450
[   19.272392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.272480]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.272534]  ? kasan_atomics+0x152/0x310
[   19.272609]  kasan_atomics+0x1dc/0x310
[   19.272657]  ? __pfx_kasan_atomics+0x10/0x10
[   19.272705]  ? __pfx_read_tsc+0x10/0x10
[   19.272751]  ? ktime_get_ts64+0x86/0x230
[   19.272812]  kunit_try_run_case+0x1a5/0x480
[   19.272866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.272915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.272956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.272984]  ? __kthread_parkme+0x82/0x180
[   19.273011]  ? preempt_count_sub+0x50/0x80
[   19.273110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.273159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.273216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.273256]  kthread+0x337/0x6f0
[   19.273319]  ? trace_preempt_on+0x20/0xc0
[   19.273349]  ? __pfx_kthread+0x10/0x10
[   19.273375]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.273402]  ? calculate_sigpending+0x7b/0xa0
[   19.273430]  ? __pfx_kthread+0x10/0x10
[   19.273473]  ret_from_fork+0x116/0x1d0
[   19.273501]  ? __pfx_kthread+0x10/0x10
[   19.273524]  ret_from_fork_asm+0x1a/0x30
[   19.273563]  </TASK>
[   19.273577] 
[   19.284331] Allocated by task 282:
[   19.284609]  kasan_save_stack+0x45/0x70
[   19.285009]  kasan_save_track+0x18/0x40
[   19.285400]  kasan_save_alloc_info+0x3b/0x50
[   19.285789]  __kasan_kmalloc+0xb7/0xc0
[   19.286135]  __kmalloc_cache_noprof+0x189/0x420
[   19.286533]  kasan_atomics+0x95/0x310
[   19.286735]  kunit_try_run_case+0x1a5/0x480
[   19.286961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.287407]  kthread+0x337/0x6f0
[   19.287765]  ret_from_fork+0x116/0x1d0
[   19.288114]  ret_from_fork_asm+0x1a/0x30
[   19.288504] 
[   19.288636] The buggy address belongs to the object at ffff8881033ecb00
[   19.288636]  which belongs to the cache kmalloc-64 of size 64
[   19.289071] The buggy address is located 0 bytes to the right of
[   19.289071]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.290044] 
[   19.290278] The buggy address belongs to the physical page:
[   19.290741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.291322] flags: 0x200000000000000(node=0|zone=2)
[   19.291598] page_type: f5(slab)
[   19.291945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.292582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.293005] page dumped because: kasan: bad access detected
[   19.293268] 
[   19.293393] Memory state around the buggy address:
[   19.293847]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294448]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294991] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.295513]                                      ^
[   19.295776]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.296073]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.296688] ==================================================================
[   18.863422] ==================================================================
[   18.864038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   18.864377] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.865069] 
[   18.865357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.865492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.865526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.865574] Call Trace:
[   18.865620]  <TASK>
[   18.865664]  dump_stack_lvl+0x73/0xb0
[   18.865740]  print_report+0xd1/0x650
[   18.865797]  ? __virt_addr_valid+0x1db/0x2d0
[   18.865858]  ? kasan_atomics_helper+0x1467/0x5450
[   18.865907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.865968]  ? kasan_atomics_helper+0x1467/0x5450
[   18.866037]  kasan_report+0x141/0x180
[   18.866092]  ? kasan_atomics_helper+0x1467/0x5450
[   18.866160]  kasan_check_range+0x10c/0x1c0
[   18.866249]  __kasan_check_write+0x18/0x20
[   18.866304]  kasan_atomics_helper+0x1467/0x5450
[   18.866361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.866418]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.866485]  ? kasan_atomics+0x152/0x310
[   18.866553]  kasan_atomics+0x1dc/0x310
[   18.866598]  ? __pfx_kasan_atomics+0x10/0x10
[   18.866649]  ? __pfx_read_tsc+0x10/0x10
[   18.866699]  ? ktime_get_ts64+0x86/0x230
[   18.866757]  kunit_try_run_case+0x1a5/0x480
[   18.866808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.866850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.866915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.866992]  ? __kthread_parkme+0x82/0x180
[   18.867064]  ? preempt_count_sub+0x50/0x80
[   18.867130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.867173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.867260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.867295]  kthread+0x337/0x6f0
[   18.867320]  ? trace_preempt_on+0x20/0xc0
[   18.867364]  ? __pfx_kthread+0x10/0x10
[   18.867392]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.867421]  ? calculate_sigpending+0x7b/0xa0
[   18.867451]  ? __pfx_kthread+0x10/0x10
[   18.867501]  ret_from_fork+0x116/0x1d0
[   18.867528]  ? __pfx_kthread+0x10/0x10
[   18.867554]  ret_from_fork_asm+0x1a/0x30
[   18.867592]  </TASK>
[   18.867608] 
[   18.877766] Allocated by task 282:
[   18.878146]  kasan_save_stack+0x45/0x70
[   18.878569]  kasan_save_track+0x18/0x40
[   18.878852]  kasan_save_alloc_info+0x3b/0x50
[   18.879125]  __kasan_kmalloc+0xb7/0xc0
[   18.879406]  __kmalloc_cache_noprof+0x189/0x420
[   18.881482]  kasan_atomics+0x95/0x310
[   18.881854]  kunit_try_run_case+0x1a5/0x480
[   18.882502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.883090]  kthread+0x337/0x6f0
[   18.883683]  ret_from_fork+0x116/0x1d0
[   18.883929]  ret_from_fork_asm+0x1a/0x30
[   18.884166] 
[   18.884654] The buggy address belongs to the object at ffff8881033ecb00
[   18.884654]  which belongs to the cache kmalloc-64 of size 64
[   18.885622] The buggy address is located 0 bytes to the right of
[   18.885622]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.886521] 
[   18.886655] The buggy address belongs to the physical page:
[   18.887116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.887633] flags: 0x200000000000000(node=0|zone=2)
[   18.888069] page_type: f5(slab)
[   18.888503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.888938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.889446] page dumped because: kasan: bad access detected
[   18.889836] 
[   18.890023] Memory state around the buggy address:
[   18.890353]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.890939]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.891238] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.891974]                                      ^
[   18.892198]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892699]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.893164] ==================================================================
[   19.175545] ==================================================================
[   19.175926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   19.176526] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.176811] 
[   19.176939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.177004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.177021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.177049] Call Trace:
[   19.177075]  <TASK>
[   19.177103]  dump_stack_lvl+0x73/0xb0
[   19.177139]  print_report+0xd1/0x650
[   19.177165]  ? __virt_addr_valid+0x1db/0x2d0
[   19.177194]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.177246]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177271]  kasan_report+0x141/0x180
[   19.177297]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177327]  kasan_check_range+0x10c/0x1c0
[   19.177354]  __kasan_check_write+0x18/0x20
[   19.177377]  kasan_atomics_helper+0x19e3/0x5450
[   19.177403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.177429]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.177681]  ? kasan_atomics+0x152/0x310
[   19.177757]  kasan_atomics+0x1dc/0x310
[   19.177819]  ? __pfx_kasan_atomics+0x10/0x10
[   19.177879]  ? __pfx_read_tsc+0x10/0x10
[   19.177926]  ? ktime_get_ts64+0x86/0x230
[   19.177975]  kunit_try_run_case+0x1a5/0x480
[   19.178014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.178101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.178155]  ? __kthread_parkme+0x82/0x180
[   19.178213]  ? preempt_count_sub+0x50/0x80
[   19.178273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.178379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.178447]  kthread+0x337/0x6f0
[   19.178500]  ? trace_preempt_on+0x20/0xc0
[   19.178547]  ? __pfx_kthread+0x10/0x10
[   19.178589]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.178637]  ? calculate_sigpending+0x7b/0xa0
[   19.178689]  ? __pfx_kthread+0x10/0x10
[   19.178731]  ret_from_fork+0x116/0x1d0
[   19.178767]  ? __pfx_kthread+0x10/0x10
[   19.178803]  ret_from_fork_asm+0x1a/0x30
[   19.178864]  </TASK>
[   19.178890] 
[   19.188486] Allocated by task 282:
[   19.188853]  kasan_save_stack+0x45/0x70
[   19.189228]  kasan_save_track+0x18/0x40
[   19.189579]  kasan_save_alloc_info+0x3b/0x50
[   19.189948]  __kasan_kmalloc+0xb7/0xc0
[   19.190309]  __kmalloc_cache_noprof+0x189/0x420
[   19.190588]  kasan_atomics+0x95/0x310
[   19.190900]  kunit_try_run_case+0x1a5/0x480
[   19.191137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.191472]  kthread+0x337/0x6f0
[   19.191769]  ret_from_fork+0x116/0x1d0
[   19.191975]  ret_from_fork_asm+0x1a/0x30
[   19.192185] 
[   19.192391] The buggy address belongs to the object at ffff8881033ecb00
[   19.192391]  which belongs to the cache kmalloc-64 of size 64
[   19.193183] The buggy address is located 0 bytes to the right of
[   19.193183]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.193851] 
[   19.194020] The buggy address belongs to the physical page:
[   19.194412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.194785] flags: 0x200000000000000(node=0|zone=2)
[   19.195026] page_type: f5(slab)
[   19.195219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.195902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.196482] page dumped because: kasan: bad access detected
[   19.196880] 
[   19.197010] Memory state around the buggy address:
[   19.197229]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.197568]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.198089] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.198827]                                      ^
[   19.199206]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.199549]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.199837] ==================================================================
[   19.658945] ==================================================================
[   19.659431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   19.660025] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.660401] 
[   19.660572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.660633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.660650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.660677] Call Trace:
[   19.660721]  <TASK>
[   19.660750]  dump_stack_lvl+0x73/0xb0
[   19.660785]  print_report+0xd1/0x650
[   19.660813]  ? __virt_addr_valid+0x1db/0x2d0
[   19.660843]  ? kasan_atomics_helper+0x5115/0x5450
[   19.660892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.660921]  ? kasan_atomics_helper+0x5115/0x5450
[   19.660948]  kasan_report+0x141/0x180
[   19.660975]  ? kasan_atomics_helper+0x5115/0x5450
[   19.661006]  __asan_report_load8_noabort+0x18/0x20
[   19.661031]  kasan_atomics_helper+0x5115/0x5450
[   19.661058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.661085]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.661133]  ? kasan_atomics+0x152/0x310
[   19.661168]  kasan_atomics+0x1dc/0x310
[   19.661218]  ? __pfx_kasan_atomics+0x10/0x10
[   19.661251]  ? __pfx_read_tsc+0x10/0x10
[   19.661298]  ? ktime_get_ts64+0x86/0x230
[   19.661331]  kunit_try_run_case+0x1a5/0x480
[   19.661359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.661382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.661412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.661442]  ? __kthread_parkme+0x82/0x180
[   19.661486]  ? preempt_count_sub+0x50/0x80
[   19.661516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.661541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.661571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.661600]  kthread+0x337/0x6f0
[   19.661625]  ? trace_preempt_on+0x20/0xc0
[   19.661653]  ? __pfx_kthread+0x10/0x10
[   19.661678]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.661705]  ? calculate_sigpending+0x7b/0xa0
[   19.661734]  ? __pfx_kthread+0x10/0x10
[   19.661760]  ret_from_fork+0x116/0x1d0
[   19.661785]  ? __pfx_kthread+0x10/0x10
[   19.661809]  ret_from_fork_asm+0x1a/0x30
[   19.661847]  </TASK>
[   19.661861] 
[   19.669802] Allocated by task 282:
[   19.670054]  kasan_save_stack+0x45/0x70
[   19.670308]  kasan_save_track+0x18/0x40
[   19.670549]  kasan_save_alloc_info+0x3b/0x50
[   19.670808]  __kasan_kmalloc+0xb7/0xc0
[   19.671062]  __kmalloc_cache_noprof+0x189/0x420
[   19.671244]  kasan_atomics+0x95/0x310
[   19.671460]  kunit_try_run_case+0x1a5/0x480
[   19.671712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.671937]  kthread+0x337/0x6f0
[   19.672170]  ret_from_fork+0x116/0x1d0
[   19.672332]  ret_from_fork_asm+0x1a/0x30
[   19.672636] 
[   19.672792] The buggy address belongs to the object at ffff8881033ecb00
[   19.672792]  which belongs to the cache kmalloc-64 of size 64
[   19.673314] The buggy address is located 0 bytes to the right of
[   19.673314]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.673873] 
[   19.673981] The buggy address belongs to the physical page:
[   19.674264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.674510] flags: 0x200000000000000(node=0|zone=2)
[   19.674688] page_type: f5(slab)
[   19.674819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.675033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.675609] page dumped because: kasan: bad access detected
[   19.676019] 
[   19.676170] Memory state around the buggy address:
[   19.676506]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.676672]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.676834] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.677026]                                      ^
[   19.677402]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.677963]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678445] ==================================================================
[   18.422888] ==================================================================
[   18.423412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   18.424075] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.424813] 
[   18.425088] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.425213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.425245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.425314] Call Trace:
[   18.425362]  <TASK>
[   18.425410]  dump_stack_lvl+0x73/0xb0
[   18.425505]  print_report+0xd1/0x650
[   18.425580]  ? __virt_addr_valid+0x1db/0x2d0
[   18.425634]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.425749]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425817]  kasan_report+0x141/0x180
[   18.425875]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425939]  kasan_check_range+0x10c/0x1c0
[   18.426008]  __kasan_check_write+0x18/0x20
[   18.426076]  kasan_atomics_helper+0xf10/0x5450
[   18.426132]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.426193]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.426298]  ? kasan_atomics+0x152/0x310
[   18.426361]  kasan_atomics+0x1dc/0x310
[   18.426411]  ? __pfx_kasan_atomics+0x10/0x10
[   18.426479]  ? __pfx_read_tsc+0x10/0x10
[   18.426529]  ? ktime_get_ts64+0x86/0x230
[   18.426578]  kunit_try_run_case+0x1a5/0x480
[   18.426622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.426661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.426708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.426756]  ? __kthread_parkme+0x82/0x180
[   18.426803]  ? preempt_count_sub+0x50/0x80
[   18.426855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.426897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.426948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.427000]  kthread+0x337/0x6f0
[   18.427037]  ? trace_preempt_on+0x20/0xc0
[   18.427080]  ? __pfx_kthread+0x10/0x10
[   18.427119]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.427164]  ? calculate_sigpending+0x7b/0xa0
[   18.427212]  ? __pfx_kthread+0x10/0x10
[   18.427289]  ret_from_fork+0x116/0x1d0
[   18.427332]  ? __pfx_kthread+0x10/0x10
[   18.427426]  ret_from_fork_asm+0x1a/0x30
[   18.427516]  </TASK>
[   18.427544] 
[   18.437830] Allocated by task 282:
[   18.438109]  kasan_save_stack+0x45/0x70
[   18.439898]  kasan_save_track+0x18/0x40
[   18.440380]  kasan_save_alloc_info+0x3b/0x50
[   18.440746]  __kasan_kmalloc+0xb7/0xc0
[   18.441019]  __kmalloc_cache_noprof+0x189/0x420
[   18.441764]  kasan_atomics+0x95/0x310
[   18.442018]  kunit_try_run_case+0x1a5/0x480
[   18.442252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.442494]  kthread+0x337/0x6f0
[   18.442606]  ret_from_fork+0x116/0x1d0
[   18.442711]  ret_from_fork_asm+0x1a/0x30
[   18.442826] 
[   18.442888] The buggy address belongs to the object at ffff8881033ecb00
[   18.442888]  which belongs to the cache kmalloc-64 of size 64
[   18.443142] The buggy address is located 0 bytes to the right of
[   18.443142]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.444405] 
[   18.444686] The buggy address belongs to the physical page:
[   18.445147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.446418] flags: 0x200000000000000(node=0|zone=2)
[   18.446699] page_type: f5(slab)
[   18.446894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.447409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.447988] page dumped because: kasan: bad access detected
[   18.449074] 
[   18.449715] Memory state around the buggy address:
[   18.450597]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452316]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452885] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.454299]                                      ^
[   18.454631]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.455136]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.456702] ==================================================================
[   19.021704] ==================================================================
[   19.022781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   19.023186] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.023620] 
[   19.023922] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.024085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.024121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.024223] Call Trace:
[   19.024284]  <TASK>
[   19.024331]  dump_stack_lvl+0x73/0xb0
[   19.024533]  print_report+0xd1/0x650
[   19.024588]  ? __virt_addr_valid+0x1db/0x2d0
[   19.024639]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.024744]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024797]  kasan_report+0x141/0x180
[   19.024852]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024899]  kasan_check_range+0x10c/0x1c0
[   19.024929]  __kasan_check_write+0x18/0x20
[   19.024953]  kasan_atomics_helper+0x16e7/0x5450
[   19.024981]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.025008]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.025034]  ? kasan_atomics+0x152/0x310
[   19.025065]  kasan_atomics+0x1dc/0x310
[   19.025092]  ? __pfx_kasan_atomics+0x10/0x10
[   19.025121]  ? __pfx_read_tsc+0x10/0x10
[   19.025147]  ? ktime_get_ts64+0x86/0x230
[   19.025178]  kunit_try_run_case+0x1a5/0x480
[   19.025262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.025351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.025383]  ? __kthread_parkme+0x82/0x180
[   19.025409]  ? preempt_count_sub+0x50/0x80
[   19.025440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.025522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.025552]  kthread+0x337/0x6f0
[   19.025576]  ? trace_preempt_on+0x20/0xc0
[   19.025605]  ? __pfx_kthread+0x10/0x10
[   19.025630]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.025658]  ? calculate_sigpending+0x7b/0xa0
[   19.025687]  ? __pfx_kthread+0x10/0x10
[   19.025713]  ret_from_fork+0x116/0x1d0
[   19.025736]  ? __pfx_kthread+0x10/0x10
[   19.025761]  ret_from_fork_asm+0x1a/0x30
[   19.025798]  </TASK>
[   19.025813] 
[   19.039077] Allocated by task 282:
[   19.040032]  kasan_save_stack+0x45/0x70
[   19.040268]  kasan_save_track+0x18/0x40
[   19.040903]  kasan_save_alloc_info+0x3b/0x50
[   19.041374]  __kasan_kmalloc+0xb7/0xc0
[   19.041598]  __kmalloc_cache_noprof+0x189/0x420
[   19.041988]  kasan_atomics+0x95/0x310
[   19.042270]  kunit_try_run_case+0x1a5/0x480
[   19.042526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.042770]  kthread+0x337/0x6f0
[   19.043134]  ret_from_fork+0x116/0x1d0
[   19.043543]  ret_from_fork_asm+0x1a/0x30
[   19.043950] 
[   19.044198] The buggy address belongs to the object at ffff8881033ecb00
[   19.044198]  which belongs to the cache kmalloc-64 of size 64
[   19.044802] The buggy address is located 0 bytes to the right of
[   19.044802]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.045776] 
[   19.046016] The buggy address belongs to the physical page:
[   19.046678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.047108] flags: 0x200000000000000(node=0|zone=2)
[   19.047529] page_type: f5(slab)
[   19.047749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.048317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.048821] page dumped because: kasan: bad access detected
[   19.049351] 
[   19.049556] Memory state around the buggy address:
[   19.049942]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.050347]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.050824] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.051102]                                      ^
[   19.051520]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.052045]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.053120] ==================================================================
[   19.054876] ==================================================================
[   19.055262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   19.055997] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.056727] 
[   19.056978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.057072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.057089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.057116] Call Trace:
[   19.057140]  <TASK>
[   19.057166]  dump_stack_lvl+0x73/0xb0
[   19.057224]  print_report+0xd1/0x650
[   19.057547]  ? __virt_addr_valid+0x1db/0x2d0
[   19.057589]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.057643]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057669]  kasan_report+0x141/0x180
[   19.057695]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057724]  kasan_check_range+0x10c/0x1c0
[   19.057752]  __kasan_check_write+0x18/0x20
[   19.057775]  kasan_atomics_helper+0x177f/0x5450
[   19.057802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.057828]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.057855]  ? kasan_atomics+0x152/0x310
[   19.057883]  kasan_atomics+0x1dc/0x310
[   19.057907]  ? __pfx_kasan_atomics+0x10/0x10
[   19.057934]  ? __pfx_read_tsc+0x10/0x10
[   19.057957]  ? ktime_get_ts64+0x86/0x230
[   19.057984]  kunit_try_run_case+0x1a5/0x480
[   19.058008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.058029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.058056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.058082]  ? __kthread_parkme+0x82/0x180
[   19.058104]  ? preempt_count_sub+0x50/0x80
[   19.058129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.058152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.058178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.058250]  kthread+0x337/0x6f0
[   19.058275]  ? trace_preempt_on+0x20/0xc0
[   19.058302]  ? __pfx_kthread+0x10/0x10
[   19.058324]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.058350]  ? calculate_sigpending+0x7b/0xa0
[   19.058377]  ? __pfx_kthread+0x10/0x10
[   19.058401]  ret_from_fork+0x116/0x1d0
[   19.058423]  ? __pfx_kthread+0x10/0x10
[   19.058446]  ret_from_fork_asm+0x1a/0x30
[   19.058499]  </TASK>
[   19.058512] 
[   19.069516] Allocated by task 282:
[   19.069909]  kasan_save_stack+0x45/0x70
[   19.070325]  kasan_save_track+0x18/0x40
[   19.070660]  kasan_save_alloc_info+0x3b/0x50
[   19.071041]  __kasan_kmalloc+0xb7/0xc0
[   19.071391]  __kmalloc_cache_noprof+0x189/0x420
[   19.071822]  kasan_atomics+0x95/0x310
[   19.072160]  kunit_try_run_case+0x1a5/0x480
[   19.072488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.072727]  kthread+0x337/0x6f0
[   19.072909]  ret_from_fork+0x116/0x1d0
[   19.073102]  ret_from_fork_asm+0x1a/0x30
[   19.073498] 
[   19.073750] The buggy address belongs to the object at ffff8881033ecb00
[   19.073750]  which belongs to the cache kmalloc-64 of size 64
[   19.074864] The buggy address is located 0 bytes to the right of
[   19.074864]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.075655] 
[   19.075822] The buggy address belongs to the physical page:
[   19.076107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.076472] flags: 0x200000000000000(node=0|zone=2)
[   19.076909] page_type: f5(slab)
[   19.077262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.078024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.078732] page dumped because: kasan: bad access detected
[   19.079153] 
[   19.079401] Memory state around the buggy address:
[   19.079761]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.080240]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.080761] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.081234]                                      ^
[   19.081604]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082117]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082467] ==================================================================
[   19.502421] ==================================================================
[   19.502712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   19.503628] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.504526] 
[   19.504628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.504732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.504751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.504789] Call Trace:
[   19.504818]  <TASK>
[   19.504845]  dump_stack_lvl+0x73/0xb0
[   19.504885]  print_report+0xd1/0x650
[   19.504912]  ? __virt_addr_valid+0x1db/0x2d0
[   19.504941]  ? kasan_atomics_helper+0x2006/0x5450
[   19.504967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.504993]  ? kasan_atomics_helper+0x2006/0x5450
[   19.505046]  kasan_report+0x141/0x180
[   19.505077]  ? kasan_atomics_helper+0x2006/0x5450
[   19.505136]  kasan_check_range+0x10c/0x1c0
[   19.505168]  __kasan_check_write+0x18/0x20
[   19.505219]  kasan_atomics_helper+0x2006/0x5450
[   19.505249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.505276]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.505304]  ? kasan_atomics+0x152/0x310
[   19.505335]  kasan_atomics+0x1dc/0x310
[   19.505362]  ? __pfx_kasan_atomics+0x10/0x10
[   19.505390]  ? __pfx_read_tsc+0x10/0x10
[   19.505417]  ? ktime_get_ts64+0x86/0x230
[   19.505446]  kunit_try_run_case+0x1a5/0x480
[   19.505492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.505516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.505546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.505575]  ? __kthread_parkme+0x82/0x180
[   19.505602]  ? preempt_count_sub+0x50/0x80
[   19.505631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.505656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.505684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.505713]  kthread+0x337/0x6f0
[   19.505736]  ? trace_preempt_on+0x20/0xc0
[   19.505765]  ? __pfx_kthread+0x10/0x10
[   19.505789]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.505815]  ? calculate_sigpending+0x7b/0xa0
[   19.505844]  ? __pfx_kthread+0x10/0x10
[   19.505869]  ret_from_fork+0x116/0x1d0
[   19.505892]  ? __pfx_kthread+0x10/0x10
[   19.505916]  ret_from_fork_asm+0x1a/0x30
[   19.505952]  </TASK>
[   19.505966] 
[   19.513093] Allocated by task 282:
[   19.513790]  kasan_save_stack+0x45/0x70
[   19.514135]  kasan_save_track+0x18/0x40
[   19.514405]  kasan_save_alloc_info+0x3b/0x50
[   19.515123]  __kasan_kmalloc+0xb7/0xc0
[   19.515405]  __kmalloc_cache_noprof+0x189/0x420
[   19.516088]  kasan_atomics+0x95/0x310
[   19.516895]  kunit_try_run_case+0x1a5/0x480
[   19.517767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.518376]  kthread+0x337/0x6f0
[   19.518936]  ret_from_fork+0x116/0x1d0
[   19.519293]  ret_from_fork_asm+0x1a/0x30
[   19.519704] 
[   19.519941] The buggy address belongs to the object at ffff8881033ecb00
[   19.519941]  which belongs to the cache kmalloc-64 of size 64
[   19.520849] The buggy address is located 0 bytes to the right of
[   19.520849]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.521756] 
[   19.522004] The buggy address belongs to the physical page:
[   19.522370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.522759] flags: 0x200000000000000(node=0|zone=2)
[   19.522905] page_type: f5(slab)
[   19.523013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.523174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.523899] page dumped because: kasan: bad access detected
[   19.524351] 
[   19.524488] Memory state around the buggy address:
[   19.524940]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525349]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525747] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.526077]                                      ^
[   19.526218]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526675]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526844] ==================================================================
[   18.894269] ==================================================================
[   18.894663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   18.895047] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.895736] 
[   18.895948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.896032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.896055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.896093] Call Trace:
[   18.896132]  <TASK>
[   18.896168]  dump_stack_lvl+0x73/0xb0
[   18.896219]  print_report+0xd1/0x650
[   18.896258]  ? __virt_addr_valid+0x1db/0x2d0
[   18.896297]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.896369]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896407]  kasan_report+0x141/0x180
[   18.896448]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896509]  __asan_report_store8_noabort+0x1b/0x30
[   18.896544]  kasan_atomics_helper+0x50d4/0x5450
[   18.896583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.896621]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.896656]  ? kasan_atomics+0x152/0x310
[   18.896698]  kasan_atomics+0x1dc/0x310
[   18.896748]  ? __pfx_kasan_atomics+0x10/0x10
[   18.896792]  ? __pfx_read_tsc+0x10/0x10
[   18.896834]  ? ktime_get_ts64+0x86/0x230
[   18.896889]  kunit_try_run_case+0x1a5/0x480
[   18.896936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.896982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.897038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.897094]  ? __kthread_parkme+0x82/0x180
[   18.897139]  ? preempt_count_sub+0x50/0x80
[   18.897194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.897244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.897301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.897354]  kthread+0x337/0x6f0
[   18.897400]  ? trace_preempt_on+0x20/0xc0
[   18.897449]  ? __pfx_kthread+0x10/0x10
[   18.897559]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.897604]  ? calculate_sigpending+0x7b/0xa0
[   18.897651]  ? __pfx_kthread+0x10/0x10
[   18.897699]  ret_from_fork+0x116/0x1d0
[   18.897742]  ? __pfx_kthread+0x10/0x10
[   18.897791]  ret_from_fork_asm+0x1a/0x30
[   18.897853]  </TASK>
[   18.897882] 
[   18.909702] Allocated by task 282:
[   18.910098]  kasan_save_stack+0x45/0x70
[   18.910689]  kasan_save_track+0x18/0x40
[   18.911043]  kasan_save_alloc_info+0x3b/0x50
[   18.911476]  __kasan_kmalloc+0xb7/0xc0
[   18.911833]  __kmalloc_cache_noprof+0x189/0x420
[   18.912335]  kasan_atomics+0x95/0x310
[   18.912706]  kunit_try_run_case+0x1a5/0x480
[   18.912969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.913521]  kthread+0x337/0x6f0
[   18.913891]  ret_from_fork+0x116/0x1d0
[   18.914102]  ret_from_fork_asm+0x1a/0x30
[   18.914334] 
[   18.914473] The buggy address belongs to the object at ffff8881033ecb00
[   18.914473]  which belongs to the cache kmalloc-64 of size 64
[   18.915654] The buggy address is located 0 bytes to the right of
[   18.915654]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.916625] 
[   18.916824] The buggy address belongs to the physical page:
[   18.917172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.917898] flags: 0x200000000000000(node=0|zone=2)
[   18.918144] page_type: f5(slab)
[   18.918371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.919082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.919794] page dumped because: kasan: bad access detected
[   18.920305] 
[   18.920492] Memory state around the buggy address:
[   18.920895]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.921519]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.922094] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.922488]                                      ^
[   18.922761]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.923412]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.923953] ==================================================================
[   19.614101] ==================================================================
[   19.615169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   19.615675] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.615969] 
[   19.616057] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.616115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.616131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.616159] Call Trace:
[   19.616183]  <TASK>
[   19.616229]  dump_stack_lvl+0x73/0xb0
[   19.616262]  print_report+0xd1/0x650
[   19.616312]  ? __virt_addr_valid+0x1db/0x2d0
[   19.616342]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.616409]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616435]  kasan_report+0x141/0x180
[   19.616472]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616505]  __asan_report_load8_noabort+0x18/0x20
[   19.616531]  kasan_atomics_helper+0x4fa5/0x5450
[   19.616559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.616585]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.616611]  ? kasan_atomics+0x152/0x310
[   19.616666]  kasan_atomics+0x1dc/0x310
[   19.616694]  ? __pfx_kasan_atomics+0x10/0x10
[   19.616722]  ? __pfx_read_tsc+0x10/0x10
[   19.616749]  ? ktime_get_ts64+0x86/0x230
[   19.616795]  kunit_try_run_case+0x1a5/0x480
[   19.616828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.616851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.616881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.616911]  ? __kthread_parkme+0x82/0x180
[   19.616936]  ? preempt_count_sub+0x50/0x80
[   19.616966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.616991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.617021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.617049]  kthread+0x337/0x6f0
[   19.617071]  ? trace_preempt_on+0x20/0xc0
[   19.617098]  ? __pfx_kthread+0x10/0x10
[   19.617122]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.617148]  ? calculate_sigpending+0x7b/0xa0
[   19.617176]  ? __pfx_kthread+0x10/0x10
[   19.617220]  ret_from_fork+0x116/0x1d0
[   19.617298]  ? __pfx_kthread+0x10/0x10
[   19.617325]  ret_from_fork_asm+0x1a/0x30
[   19.617361]  </TASK>
[   19.617376] 
[   19.625011] Allocated by task 282:
[   19.625302]  kasan_save_stack+0x45/0x70
[   19.625558]  kasan_save_track+0x18/0x40
[   19.625821]  kasan_save_alloc_info+0x3b/0x50
[   19.626020]  __kasan_kmalloc+0xb7/0xc0
[   19.626233]  __kmalloc_cache_noprof+0x189/0x420
[   19.626400]  kasan_atomics+0x95/0x310
[   19.626532]  kunit_try_run_case+0x1a5/0x480
[   19.626814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.627148]  kthread+0x337/0x6f0
[   19.627525]  ret_from_fork+0x116/0x1d0
[   19.627749]  ret_from_fork_asm+0x1a/0x30
[   19.627966] 
[   19.628110] The buggy address belongs to the object at ffff8881033ecb00
[   19.628110]  which belongs to the cache kmalloc-64 of size 64
[   19.628715] The buggy address is located 0 bytes to the right of
[   19.628715]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.629200] 
[   19.629308] The buggy address belongs to the physical page:
[   19.629536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.629932] flags: 0x200000000000000(node=0|zone=2)
[   19.630132] page_type: f5(slab)
[   19.630317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.630676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.631112] page dumped because: kasan: bad access detected
[   19.631305] 
[   19.631394] Memory state around the buggy address:
[   19.631595]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.631830]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.632308] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.632812]                                      ^
[   19.633164]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634496]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635060] ==================================================================
[   19.527932] ==================================================================
[   19.528659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   19.529052] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.529413] 
[   19.529702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.529767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.529811] Call Trace:
[   19.529836]  <TASK>
[   19.529863]  dump_stack_lvl+0x73/0xb0
[   19.529922]  print_report+0xd1/0x650
[   19.529951]  ? __virt_addr_valid+0x1db/0x2d0
[   19.529998]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.530055]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530082]  kasan_report+0x141/0x180
[   19.530108]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530140]  __asan_report_load8_noabort+0x18/0x20
[   19.530165]  kasan_atomics_helper+0x4f98/0x5450
[   19.530192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.530218]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.530245]  ? kasan_atomics+0x152/0x310
[   19.530297]  kasan_atomics+0x1dc/0x310
[   19.530337]  ? __pfx_kasan_atomics+0x10/0x10
[   19.530366]  ? __pfx_read_tsc+0x10/0x10
[   19.530394]  ? ktime_get_ts64+0x86/0x230
[   19.530425]  kunit_try_run_case+0x1a5/0x480
[   19.530451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.530488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.530520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.530549]  ? __kthread_parkme+0x82/0x180
[   19.530574]  ? preempt_count_sub+0x50/0x80
[   19.530602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.530627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.530657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.530688]  kthread+0x337/0x6f0
[   19.530711]  ? trace_preempt_on+0x20/0xc0
[   19.530740]  ? __pfx_kthread+0x10/0x10
[   19.530765]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.530792]  ? calculate_sigpending+0x7b/0xa0
[   19.530821]  ? __pfx_kthread+0x10/0x10
[   19.530847]  ret_from_fork+0x116/0x1d0
[   19.530870]  ? __pfx_kthread+0x10/0x10
[   19.530895]  ret_from_fork_asm+0x1a/0x30
[   19.530931]  </TASK>
[   19.530948] 
[   19.540428] Allocated by task 282:
[   19.540595]  kasan_save_stack+0x45/0x70
[   19.541481]  kasan_save_track+0x18/0x40
[   19.541765]  kasan_save_alloc_info+0x3b/0x50
[   19.542083]  __kasan_kmalloc+0xb7/0xc0
[   19.542229]  __kmalloc_cache_noprof+0x189/0x420
[   19.542344]  kasan_atomics+0x95/0x310
[   19.542442]  kunit_try_run_case+0x1a5/0x480
[   19.542554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.542678]  kthread+0x337/0x6f0
[   19.542769]  ret_from_fork+0x116/0x1d0
[   19.542866]  ret_from_fork_asm+0x1a/0x30
[   19.542967] 
[   19.543081] The buggy address belongs to the object at ffff8881033ecb00
[   19.543081]  which belongs to the cache kmalloc-64 of size 64
[   19.543795] The buggy address is located 0 bytes to the right of
[   19.543795]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.544131] 
[   19.544198] The buggy address belongs to the physical page:
[   19.544321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.544498] flags: 0x200000000000000(node=0|zone=2)
[   19.544696] page_type: f5(slab)
[   19.545513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.546029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.546915] page dumped because: kasan: bad access detected
[   19.547332] 
[   19.547406] Memory state around the buggy address:
[   19.547538]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548103]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548571] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.548975]                                      ^
[   19.549225]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549669]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549870] ==================================================================
[   18.832906] ==================================================================
[   18.833728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   18.834306] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.834574] 
[   18.834738] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.834847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.834866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.834895] Call Trace:
[   18.834921]  <TASK>
[   18.834947]  dump_stack_lvl+0x73/0xb0
[   18.834989]  print_report+0xd1/0x650
[   18.835032]  ? __virt_addr_valid+0x1db/0x2d0
[   18.835063]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.835115]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835140]  kasan_report+0x141/0x180
[   18.835167]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835197]  __asan_report_load8_noabort+0x18/0x20
[   18.835221]  kasan_atomics_helper+0x4eae/0x5450
[   18.835249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.835275]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.835300]  ? kasan_atomics+0x152/0x310
[   18.835331]  kasan_atomics+0x1dc/0x310
[   18.835380]  ? __pfx_kasan_atomics+0x10/0x10
[   18.835410]  ? __pfx_read_tsc+0x10/0x10
[   18.835437]  ? ktime_get_ts64+0x86/0x230
[   18.835601]  kunit_try_run_case+0x1a5/0x480
[   18.835665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.835714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.835771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.835825]  ? __kthread_parkme+0x82/0x180
[   18.835878]  ? preempt_count_sub+0x50/0x80
[   18.835936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.835991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.836046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.836105]  kthread+0x337/0x6f0
[   18.836154]  ? trace_preempt_on+0x20/0xc0
[   18.836211]  ? __pfx_kthread+0x10/0x10
[   18.836260]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.836316]  ? calculate_sigpending+0x7b/0xa0
[   18.836374]  ? __pfx_kthread+0x10/0x10
[   18.836429]  ret_from_fork+0x116/0x1d0
[   18.836491]  ? __pfx_kthread+0x10/0x10
[   18.836562]  ret_from_fork_asm+0x1a/0x30
[   18.836602]  </TASK>
[   18.836617] 
[   18.849289] Allocated by task 282:
[   18.849722]  kasan_save_stack+0x45/0x70
[   18.850175]  kasan_save_track+0x18/0x40
[   18.850627]  kasan_save_alloc_info+0x3b/0x50
[   18.851045]  __kasan_kmalloc+0xb7/0xc0
[   18.851357]  __kmalloc_cache_noprof+0x189/0x420
[   18.851571]  kasan_atomics+0x95/0x310
[   18.851754]  kunit_try_run_case+0x1a5/0x480
[   18.851941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.852157]  kthread+0x337/0x6f0
[   18.852518]  ret_from_fork+0x116/0x1d0
[   18.852849]  ret_from_fork_asm+0x1a/0x30
[   18.853223] 
[   18.853404] The buggy address belongs to the object at ffff8881033ecb00
[   18.853404]  which belongs to the cache kmalloc-64 of size 64
[   18.854415] The buggy address is located 0 bytes to the right of
[   18.854415]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.855432] 
[   18.855655] The buggy address belongs to the physical page:
[   18.856097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.856821] flags: 0x200000000000000(node=0|zone=2)
[   18.857326] page_type: f5(slab)
[   18.857590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.857883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.858593] page dumped because: kasan: bad access detected
[   18.858987] 
[   18.859104] Memory state around the buggy address:
[   18.859438]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.860029]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.860488] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.860909]                                      ^
[   18.861371]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.861721]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.861971] ==================================================================
[   19.298000] ==================================================================
[   19.299039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   19.299517] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.300025] 
[   19.300309] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.300431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.300477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.300535] Call Trace:
[   19.300585]  <TASK>
[   19.300651]  dump_stack_lvl+0x73/0xb0
[   19.300729]  print_report+0xd1/0x650
[   19.300784]  ? __virt_addr_valid+0x1db/0x2d0
[   19.300839]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.300892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.300948]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.301027]  kasan_report+0x141/0x180
[   19.301076]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.301136]  __asan_report_load8_noabort+0x18/0x20
[   19.301187]  kasan_atomics_helper+0x4f30/0x5450
[   19.301281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.301336]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.301389]  ? kasan_atomics+0x152/0x310
[   19.301464]  kasan_atomics+0x1dc/0x310
[   19.301526]  ? __pfx_kasan_atomics+0x10/0x10
[   19.301609]  ? __pfx_read_tsc+0x10/0x10
[   19.301664]  ? ktime_get_ts64+0x86/0x230
[   19.301723]  kunit_try_run_case+0x1a5/0x480
[   19.301781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.301826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.301865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.301899]  ? __kthread_parkme+0x82/0x180
[   19.301925]  ? preempt_count_sub+0x50/0x80
[   19.301955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.301981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.302011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.302040]  kthread+0x337/0x6f0
[   19.302064]  ? trace_preempt_on+0x20/0xc0
[   19.302092]  ? __pfx_kthread+0x10/0x10
[   19.302118]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.302144]  ? calculate_sigpending+0x7b/0xa0
[   19.302173]  ? __pfx_kthread+0x10/0x10
[   19.302222]  ret_from_fork+0x116/0x1d0
[   19.302276]  ? __pfx_kthread+0x10/0x10
[   19.302302]  ret_from_fork_asm+0x1a/0x30
[   19.302342]  </TASK>
[   19.302358] 
[   19.313120] Allocated by task 282:
[   19.313446]  kasan_save_stack+0x45/0x70
[   19.313905]  kasan_save_track+0x18/0x40
[   19.314116]  kasan_save_alloc_info+0x3b/0x50
[   19.314913]  __kasan_kmalloc+0xb7/0xc0
[   19.315501]  __kmalloc_cache_noprof+0x189/0x420
[   19.315718]  kasan_atomics+0x95/0x310
[   19.316036]  kunit_try_run_case+0x1a5/0x480
[   19.316387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.316699]  kthread+0x337/0x6f0
[   19.316992]  ret_from_fork+0x116/0x1d0
[   19.317267]  ret_from_fork_asm+0x1a/0x30
[   19.317623] 
[   19.317759] The buggy address belongs to the object at ffff8881033ecb00
[   19.317759]  which belongs to the cache kmalloc-64 of size 64
[   19.318511] The buggy address is located 0 bytes to the right of
[   19.318511]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.319167] 
[   19.319369] The buggy address belongs to the physical page:
[   19.319748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.320245] flags: 0x200000000000000(node=0|zone=2)
[   19.320646] page_type: f5(slab)
[   19.320966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.321383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.321919] page dumped because: kasan: bad access detected
[   19.322263] 
[   19.322416] Memory state around the buggy address:
[   19.322636]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.323139]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.323481] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.323762]                                      ^
[   19.324144]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324718]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.325263] ==================================================================
[   18.692301] ==================================================================
[   18.693021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   18.693368] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.693667] 
[   18.694290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.694416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.694450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.694515] Call Trace:
[   18.694563]  <TASK>
[   18.694608]  dump_stack_lvl+0x73/0xb0
[   18.694680]  print_report+0xd1/0x650
[   18.694737]  ? __virt_addr_valid+0x1db/0x2d0
[   18.694794]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.694843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.694888]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.694935]  kasan_report+0x141/0x180
[   18.695039]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.695135]  __asan_report_load4_noabort+0x18/0x20
[   18.695185]  kasan_atomics_helper+0x49e8/0x5450
[   18.695258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.695317]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.695406]  ? kasan_atomics+0x152/0x310
[   18.695442]  kasan_atomics+0x1dc/0x310
[   18.695496]  ? __pfx_kasan_atomics+0x10/0x10
[   18.695526]  ? __pfx_read_tsc+0x10/0x10
[   18.695554]  ? ktime_get_ts64+0x86/0x230
[   18.695586]  kunit_try_run_case+0x1a5/0x480
[   18.695613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.695636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.695667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.695696]  ? __kthread_parkme+0x82/0x180
[   18.695721]  ? preempt_count_sub+0x50/0x80
[   18.695752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.695777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.695805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.695834]  kthread+0x337/0x6f0
[   18.695858]  ? trace_preempt_on+0x20/0xc0
[   18.695885]  ? __pfx_kthread+0x10/0x10
[   18.695910]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.695937]  ? calculate_sigpending+0x7b/0xa0
[   18.695966]  ? __pfx_kthread+0x10/0x10
[   18.695990]  ret_from_fork+0x116/0x1d0
[   18.696014]  ? __pfx_kthread+0x10/0x10
[   18.696038]  ret_from_fork_asm+0x1a/0x30
[   18.696074]  </TASK>
[   18.696089] 
[   18.709032] Allocated by task 282:
[   18.709847]  kasan_save_stack+0x45/0x70
[   18.710245]  kasan_save_track+0x18/0x40
[   18.710478]  kasan_save_alloc_info+0x3b/0x50
[   18.710702]  __kasan_kmalloc+0xb7/0xc0
[   18.710926]  __kmalloc_cache_noprof+0x189/0x420
[   18.711171]  kasan_atomics+0x95/0x310
[   18.711516]  kunit_try_run_case+0x1a5/0x480
[   18.711834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.712089]  kthread+0x337/0x6f0
[   18.712427]  ret_from_fork+0x116/0x1d0
[   18.712782]  ret_from_fork_asm+0x1a/0x30
[   18.713082] 
[   18.713270] The buggy address belongs to the object at ffff8881033ecb00
[   18.713270]  which belongs to the cache kmalloc-64 of size 64
[   18.714643] The buggy address is located 0 bytes to the right of
[   18.714643]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.715885] 
[   18.716113] The buggy address belongs to the physical page:
[   18.716772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.717433] flags: 0x200000000000000(node=0|zone=2)
[   18.717657] page_type: f5(slab)
[   18.717818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.719760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.720719] page dumped because: kasan: bad access detected
[   18.721607] 
[   18.721820] Memory state around the buggy address:
[   18.723734]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.724801]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.725900] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.726874]                                      ^
[   18.727598]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.727894]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.728145] ==================================================================
[   18.658281] ==================================================================
[   18.659216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   18.659888] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.660450] 
[   18.660994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.661150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.661198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.661256] Call Trace:
[   18.661307]  <TASK>
[   18.661351]  dump_stack_lvl+0x73/0xb0
[   18.661406]  print_report+0xd1/0x650
[   18.661435]  ? __virt_addr_valid+0x1db/0x2d0
[   18.661490]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.661547]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661574]  kasan_report+0x141/0x180
[   18.661601]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661632]  kasan_check_range+0x10c/0x1c0
[   18.661661]  __kasan_check_write+0x18/0x20
[   18.661685]  kasan_atomics_helper+0x1217/0x5450
[   18.661712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.661739]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.661766]  ? kasan_atomics+0x152/0x310
[   18.661796]  kasan_atomics+0x1dc/0x310
[   18.661823]  ? __pfx_kasan_atomics+0x10/0x10
[   18.661851]  ? __pfx_read_tsc+0x10/0x10
[   18.661877]  ? ktime_get_ts64+0x86/0x230
[   18.661905]  kunit_try_run_case+0x1a5/0x480
[   18.661932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.661956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.661985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.662013]  ? __kthread_parkme+0x82/0x180
[   18.662037]  ? preempt_count_sub+0x50/0x80
[   18.662065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.662089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.662118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.662147]  kthread+0x337/0x6f0
[   18.662171]  ? trace_preempt_on+0x20/0xc0
[   18.662206]  ? __pfx_kthread+0x10/0x10
[   18.662260]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.662288]  ? calculate_sigpending+0x7b/0xa0
[   18.662318]  ? __pfx_kthread+0x10/0x10
[   18.662343]  ret_from_fork+0x116/0x1d0
[   18.662366]  ? __pfx_kthread+0x10/0x10
[   18.662392]  ret_from_fork_asm+0x1a/0x30
[   18.662428]  </TASK>
[   18.662443] 
[   18.676091] Allocated by task 282:
[   18.676524]  kasan_save_stack+0x45/0x70
[   18.676802]  kasan_save_track+0x18/0x40
[   18.677010]  kasan_save_alloc_info+0x3b/0x50
[   18.677841]  __kasan_kmalloc+0xb7/0xc0
[   18.678238]  __kmalloc_cache_noprof+0x189/0x420
[   18.678653]  kasan_atomics+0x95/0x310
[   18.678837]  kunit_try_run_case+0x1a5/0x480
[   18.679016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.679228]  kthread+0x337/0x6f0
[   18.679388]  ret_from_fork+0x116/0x1d0
[   18.680297]  ret_from_fork_asm+0x1a/0x30
[   18.680555] 
[   18.680692] The buggy address belongs to the object at ffff8881033ecb00
[   18.680692]  which belongs to the cache kmalloc-64 of size 64
[   18.681985] The buggy address is located 0 bytes to the right of
[   18.681985]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.683086] 
[   18.683443] The buggy address belongs to the physical page:
[   18.683748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.684201] flags: 0x200000000000000(node=0|zone=2)
[   18.684908] page_type: f5(slab)
[   18.685278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.685939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.686530] page dumped because: kasan: bad access detected
[   18.686864] 
[   18.687046] Memory state around the buggy address:
[   18.687416]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.687936]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.688964] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.689312]                                      ^
[   18.689959]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.690691]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.691085] ==================================================================
[   17.960312] ==================================================================
[   17.960862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   17.961698] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.962448] 
[   17.962739] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.962857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.962889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.962934] Call Trace:
[   17.962979]  <TASK>
[   17.963022]  dump_stack_lvl+0x73/0xb0
[   17.963197]  print_report+0xd1/0x650
[   17.963319]  ? __virt_addr_valid+0x1db/0x2d0
[   17.963385]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.963508]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963558]  kasan_report+0x141/0x180
[   17.963606]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963667]  kasan_check_range+0x10c/0x1c0
[   17.964518]  __kasan_check_write+0x18/0x20
[   17.964582]  kasan_atomics_helper+0x5fe/0x5450
[   17.964612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.964640]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.964667]  ? kasan_atomics+0x152/0x310
[   17.964711]  kasan_atomics+0x1dc/0x310
[   17.964751]  ? __pfx_kasan_atomics+0x10/0x10
[   17.964793]  ? __pfx_read_tsc+0x10/0x10
[   17.964834]  ? ktime_get_ts64+0x86/0x230
[   17.964875]  kunit_try_run_case+0x1a5/0x480
[   17.964902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.964925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.964957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.964986]  ? __kthread_parkme+0x82/0x180
[   17.965009]  ? preempt_count_sub+0x50/0x80
[   17.965037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.965061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.965089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.965117]  kthread+0x337/0x6f0
[   17.965140]  ? trace_preempt_on+0x20/0xc0
[   17.965167]  ? __pfx_kthread+0x10/0x10
[   17.965195]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.965246]  ? calculate_sigpending+0x7b/0xa0
[   17.965274]  ? __pfx_kthread+0x10/0x10
[   17.965299]  ret_from_fork+0x116/0x1d0
[   17.965322]  ? __pfx_kthread+0x10/0x10
[   17.965347]  ret_from_fork_asm+0x1a/0x30
[   17.965384]  </TASK>
[   17.965399] 
[   17.975836] Allocated by task 282:
[   17.976577]  kasan_save_stack+0x45/0x70
[   17.977901]  kasan_save_track+0x18/0x40
[   17.978620]  kasan_save_alloc_info+0x3b/0x50
[   17.979247]  __kasan_kmalloc+0xb7/0xc0
[   17.979624]  __kmalloc_cache_noprof+0x189/0x420
[   17.980261]  kasan_atomics+0x95/0x310
[   17.980497]  kunit_try_run_case+0x1a5/0x480
[   17.980884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.982426]  kthread+0x337/0x6f0
[   17.982968]  ret_from_fork+0x116/0x1d0
[   17.983266]  ret_from_fork_asm+0x1a/0x30
[   17.983511] 
[   17.983948] The buggy address belongs to the object at ffff8881033ecb00
[   17.983948]  which belongs to the cache kmalloc-64 of size 64
[   17.985625] The buggy address is located 0 bytes to the right of
[   17.985625]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.986676] 
[   17.987013] The buggy address belongs to the physical page:
[   17.987429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.988253] flags: 0x200000000000000(node=0|zone=2)
[   17.988884] page_type: f5(slab)
[   17.989490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.990294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.990758] page dumped because: kasan: bad access detected
[   17.991069] 
[   17.991303] Memory state around the buggy address:
[   17.991701]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992147]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992602] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.993232]                                      ^
[   17.993770]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.993994]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.994216] ==================================================================
[   19.442969] ==================================================================
[   19.443688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   19.444469] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.444768] 
[   19.444934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.445042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.445069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.445119] Call Trace:
[   19.445167]  <TASK>
[   19.445210]  dump_stack_lvl+0x73/0xb0
[   19.445281]  print_report+0xd1/0x650
[   19.445332]  ? __virt_addr_valid+0x1db/0x2d0
[   19.445382]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.445499]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445548]  kasan_report+0x141/0x180
[   19.445577]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445609]  kasan_check_range+0x10c/0x1c0
[   19.445637]  __kasan_check_write+0x18/0x20
[   19.445660]  kasan_atomics_helper+0x1f43/0x5450
[   19.445687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.445714]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.445740]  ? kasan_atomics+0x152/0x310
[   19.445771]  kasan_atomics+0x1dc/0x310
[   19.445797]  ? __pfx_kasan_atomics+0x10/0x10
[   19.445826]  ? __pfx_read_tsc+0x10/0x10
[   19.445852]  ? ktime_get_ts64+0x86/0x230
[   19.445882]  kunit_try_run_case+0x1a5/0x480
[   19.445908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.445930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.445959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.445986]  ? __kthread_parkme+0x82/0x180
[   19.446010]  ? preempt_count_sub+0x50/0x80
[   19.446038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.446062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.446089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.446118]  kthread+0x337/0x6f0
[   19.446141]  ? trace_preempt_on+0x20/0xc0
[   19.446168]  ? __pfx_kthread+0x10/0x10
[   19.446196]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.446253]  ? calculate_sigpending+0x7b/0xa0
[   19.446304]  ? __pfx_kthread+0x10/0x10
[   19.446352]  ret_from_fork+0x116/0x1d0
[   19.446399]  ? __pfx_kthread+0x10/0x10
[   19.446448]  ret_from_fork_asm+0x1a/0x30
[   19.446520]  </TASK>
[   19.446544] 
[   19.459233] Allocated by task 282:
[   19.459642]  kasan_save_stack+0x45/0x70
[   19.460034]  kasan_save_track+0x18/0x40
[   19.460581]  kasan_save_alloc_info+0x3b/0x50
[   19.460823]  __kasan_kmalloc+0xb7/0xc0
[   19.461010]  __kmalloc_cache_noprof+0x189/0x420
[   19.461595]  kasan_atomics+0x95/0x310
[   19.461889]  kunit_try_run_case+0x1a5/0x480
[   19.462110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.462576]  kthread+0x337/0x6f0
[   19.462897]  ret_from_fork+0x116/0x1d0
[   19.463154]  ret_from_fork_asm+0x1a/0x30
[   19.463483] 
[   19.463676] The buggy address belongs to the object at ffff8881033ecb00
[   19.463676]  which belongs to the cache kmalloc-64 of size 64
[   19.464509] The buggy address is located 0 bytes to the right of
[   19.464509]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.465308] 
[   19.465517] The buggy address belongs to the physical page:
[   19.465984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.466508] flags: 0x200000000000000(node=0|zone=2)
[   19.466946] page_type: f5(slab)
[   19.467267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.467803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.468096] page dumped because: kasan: bad access detected
[   19.468593] 
[   19.468797] Memory state around the buggy address:
[   19.469250]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469688]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.470040] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.470557]                                      ^
[   19.470923]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471439]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471948] ==================================================================
[   18.235263] ==================================================================
[   18.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   18.236557] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.237083] 
[   18.237384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.237552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.237587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.237636] Call Trace:
[   18.237684]  <TASK>
[   18.237760]  dump_stack_lvl+0x73/0xb0
[   18.237855]  print_report+0xd1/0x650
[   18.237909]  ? __virt_addr_valid+0x1db/0x2d0
[   18.237956]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.238052]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238134]  kasan_report+0x141/0x180
[   18.238238]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238302]  kasan_check_range+0x10c/0x1c0
[   18.238385]  __kasan_check_write+0x18/0x20
[   18.238442]  kasan_atomics_helper+0xb6a/0x5450
[   18.238512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.238568]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.238601]  ? kasan_atomics+0x152/0x310
[   18.238634]  kasan_atomics+0x1dc/0x310
[   18.238662]  ? __pfx_kasan_atomics+0x10/0x10
[   18.238691]  ? __pfx_read_tsc+0x10/0x10
[   18.238718]  ? ktime_get_ts64+0x86/0x230
[   18.238750]  kunit_try_run_case+0x1a5/0x480
[   18.238777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.238801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.238831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.238860]  ? __kthread_parkme+0x82/0x180
[   18.238885]  ? preempt_count_sub+0x50/0x80
[   18.238913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.238938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.238966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.238995]  kthread+0x337/0x6f0
[   18.239018]  ? trace_preempt_on+0x20/0xc0
[   18.239044]  ? __pfx_kthread+0x10/0x10
[   18.239069]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.239094]  ? calculate_sigpending+0x7b/0xa0
[   18.239122]  ? __pfx_kthread+0x10/0x10
[   18.239148]  ret_from_fork+0x116/0x1d0
[   18.239170]  ? __pfx_kthread+0x10/0x10
[   18.239214]  ret_from_fork_asm+0x1a/0x30
[   18.239279]  </TASK>
[   18.239295] 
[   18.251845] Allocated by task 282:
[   18.252120]  kasan_save_stack+0x45/0x70
[   18.252392]  kasan_save_track+0x18/0x40
[   18.252585]  kasan_save_alloc_info+0x3b/0x50
[   18.252702]  __kasan_kmalloc+0xb7/0xc0
[   18.252804]  __kmalloc_cache_noprof+0x189/0x420
[   18.252917]  kasan_atomics+0x95/0x310
[   18.253018]  kunit_try_run_case+0x1a5/0x480
[   18.253120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.253242]  kthread+0x337/0x6f0
[   18.253338]  ret_from_fork+0x116/0x1d0
[   18.253438]  ret_from_fork_asm+0x1a/0x30
[   18.254141] 
[   18.254392] The buggy address belongs to the object at ffff8881033ecb00
[   18.254392]  which belongs to the cache kmalloc-64 of size 64
[   18.256716] The buggy address is located 0 bytes to the right of
[   18.256716]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.257763] 
[   18.257856] The buggy address belongs to the physical page:
[   18.257987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.258164] flags: 0x200000000000000(node=0|zone=2)
[   18.258595] page_type: f5(slab)
[   18.258912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.259534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.260128] page dumped because: kasan: bad access detected
[   18.260562] 
[   18.260692] Memory state around the buggy address:
[   18.261044]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262208]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262866] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.263223]                                      ^
[   18.263425]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.263687]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264197] ==================================================================
[   18.081979] ==================================================================
[   18.083013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   18.083577] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.083962] 
[   18.084222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.084328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.084358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.084407] Call Trace:
[   18.084463]  <TASK>
[   18.084511]  dump_stack_lvl+0x73/0xb0
[   18.084584]  print_report+0xd1/0x650
[   18.084642]  ? __virt_addr_valid+0x1db/0x2d0
[   18.084700]  ? kasan_atomics_helper+0x860/0x5450
[   18.084754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.084809]  ? kasan_atomics_helper+0x860/0x5450
[   18.084863]  kasan_report+0x141/0x180
[   18.084919]  ? kasan_atomics_helper+0x860/0x5450
[   18.084986]  kasan_check_range+0x10c/0x1c0
[   18.085045]  __kasan_check_write+0x18/0x20
[   18.085096]  kasan_atomics_helper+0x860/0x5450
[   18.085153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.085239]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.085297]  ? kasan_atomics+0x152/0x310
[   18.085352]  kasan_atomics+0x1dc/0x310
[   18.085396]  ? __pfx_kasan_atomics+0x10/0x10
[   18.085442]  ? __pfx_read_tsc+0x10/0x10
[   18.085502]  ? ktime_get_ts64+0x86/0x230
[   18.085560]  kunit_try_run_case+0x1a5/0x480
[   18.085612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.085658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.085714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.085770]  ? __kthread_parkme+0x82/0x180
[   18.085818]  ? preempt_count_sub+0x50/0x80
[   18.085874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.085922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.085973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.086027]  kthread+0x337/0x6f0
[   18.086072]  ? trace_preempt_on+0x20/0xc0
[   18.086125]  ? __pfx_kthread+0x10/0x10
[   18.086175]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.086254]  ? calculate_sigpending+0x7b/0xa0
[   18.086300]  ? __pfx_kthread+0x10/0x10
[   18.086347]  ret_from_fork+0x116/0x1d0
[   18.086389]  ? __pfx_kthread+0x10/0x10
[   18.086427]  ret_from_fork_asm+0x1a/0x30
[   18.086505]  </TASK>
[   18.086534] 
[   18.096286] Allocated by task 282:
[   18.096682]  kasan_save_stack+0x45/0x70
[   18.097087]  kasan_save_track+0x18/0x40
[   18.097426]  kasan_save_alloc_info+0x3b/0x50
[   18.097837]  __kasan_kmalloc+0xb7/0xc0
[   18.098222]  __kmalloc_cache_noprof+0x189/0x420
[   18.098500]  kasan_atomics+0x95/0x310
[   18.098682]  kunit_try_run_case+0x1a5/0x480
[   18.098883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.099126]  kthread+0x337/0x6f0
[   18.099513]  ret_from_fork+0x116/0x1d0
[   18.099854]  ret_from_fork_asm+0x1a/0x30
[   18.100285] 
[   18.100496] The buggy address belongs to the object at ffff8881033ecb00
[   18.100496]  which belongs to the cache kmalloc-64 of size 64
[   18.101437] The buggy address is located 0 bytes to the right of
[   18.101437]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.102429] 
[   18.102629] The buggy address belongs to the physical page:
[   18.103051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.103750] flags: 0x200000000000000(node=0|zone=2)
[   18.104165] page_type: f5(slab)
[   18.104492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.105077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.105651] page dumped because: kasan: bad access detected
[   18.106080] 
[   18.106298] Memory state around the buggy address:
[   18.106726]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107347]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107849] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.108602]                                      ^
[   18.109028]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.109813]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.110302] ==================================================================
[   18.953540] ==================================================================
[   18.954060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   18.954399] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.954976] 
[   18.955181] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.955267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.955326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.955382] Call Trace:
[   18.955443]  <TASK>
[   18.955497]  dump_stack_lvl+0x73/0xb0
[   18.955568]  print_report+0xd1/0x650
[   18.955618]  ? __virt_addr_valid+0x1db/0x2d0
[   18.955675]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.955788]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955845]  kasan_report+0x141/0x180
[   18.955902]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955983]  kasan_check_range+0x10c/0x1c0
[   18.956038]  __kasan_check_write+0x18/0x20
[   18.956083]  kasan_atomics_helper+0x15b6/0x5450
[   18.956136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.956204]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.956268]  ? kasan_atomics+0x152/0x310
[   18.956327]  kasan_atomics+0x1dc/0x310
[   18.956385]  ? __pfx_kasan_atomics+0x10/0x10
[   18.956447]  ? __pfx_read_tsc+0x10/0x10
[   18.956516]  ? ktime_get_ts64+0x86/0x230
[   18.956580]  kunit_try_run_case+0x1a5/0x480
[   18.956637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.956688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.956750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.956808]  ? __kthread_parkme+0x82/0x180
[   18.956858]  ? preempt_count_sub+0x50/0x80
[   18.956918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.956972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.957033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.957093]  kthread+0x337/0x6f0
[   18.957142]  ? trace_preempt_on+0x20/0xc0
[   18.957199]  ? __pfx_kthread+0x10/0x10
[   18.957266]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.957319]  ? calculate_sigpending+0x7b/0xa0
[   18.957373]  ? __pfx_kthread+0x10/0x10
[   18.957419]  ret_from_fork+0x116/0x1d0
[   18.957502]  ? __pfx_kthread+0x10/0x10
[   18.957552]  ret_from_fork_asm+0x1a/0x30
[   18.957632]  </TASK>
[   18.957665] 
[   18.969853] Allocated by task 282:
[   18.970451]  kasan_save_stack+0x45/0x70
[   18.970750]  kasan_save_track+0x18/0x40
[   18.971037]  kasan_save_alloc_info+0x3b/0x50
[   18.971479]  __kasan_kmalloc+0xb7/0xc0
[   18.971760]  __kmalloc_cache_noprof+0x189/0x420
[   18.972153]  kasan_atomics+0x95/0x310
[   18.972556]  kunit_try_run_case+0x1a5/0x480
[   18.972861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.973310]  kthread+0x337/0x6f0
[   18.973681]  ret_from_fork+0x116/0x1d0
[   18.973937]  ret_from_fork_asm+0x1a/0x30
[   18.974299] 
[   18.974512] The buggy address belongs to the object at ffff8881033ecb00
[   18.974512]  which belongs to the cache kmalloc-64 of size 64
[   18.975148] The buggy address is located 0 bytes to the right of
[   18.975148]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.975910] 
[   18.976112] The buggy address belongs to the physical page:
[   18.976491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.977057] flags: 0x200000000000000(node=0|zone=2)
[   18.977529] page_type: f5(slab)
[   18.977819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.978292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.978864] page dumped because: kasan: bad access detected
[   18.979181] 
[   18.979429] Memory state around the buggy address:
[   18.979743]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.980296]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.980626] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.980861]                                      ^
[   18.982749]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.983275]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.984601] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   17.305832] ==================================================================
[   17.306356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.307643] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.308537] 
[   17.309280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.309359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.309374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.309400] Call Trace:
[   17.309425]  <TASK>
[   17.309450]  dump_stack_lvl+0x73/0xb0
[   17.309536]  print_report+0xd1/0x650
[   17.309576]  ? __virt_addr_valid+0x1db/0x2d0
[   17.309614]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.309689]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309774]  kasan_report+0x141/0x180
[   17.309815]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309868]  kasan_check_range+0x10c/0x1c0
[   17.309907]  __kasan_check_write+0x18/0x20
[   17.309941]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   17.309987]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.310037]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.310075]  ? kasan_bitops_generic+0x92/0x1c0
[   17.310119]  kasan_bitops_generic+0x121/0x1c0
[   17.310157]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.310211]  ? __pfx_read_tsc+0x10/0x10
[   17.310254]  ? ktime_get_ts64+0x86/0x230
[   17.310316]  kunit_try_run_case+0x1a5/0x480
[   17.310343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.310393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.310420]  ? __kthread_parkme+0x82/0x180
[   17.310443]  ? preempt_count_sub+0x50/0x80
[   17.310496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.310548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.310575]  kthread+0x337/0x6f0
[   17.310598]  ? trace_preempt_on+0x20/0xc0
[   17.310625]  ? __pfx_kthread+0x10/0x10
[   17.310647]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.310672]  ? calculate_sigpending+0x7b/0xa0
[   17.310845]  ? __pfx_kthread+0x10/0x10
[   17.310875]  ret_from_fork+0x116/0x1d0
[   17.310898]  ? __pfx_kthread+0x10/0x10
[   17.310921]  ret_from_fork_asm+0x1a/0x30
[   17.310957]  </TASK>
[   17.310972] 
[   17.326585] Allocated by task 278:
[   17.327141]  kasan_save_stack+0x45/0x70
[   17.328334]  kasan_save_track+0x18/0x40
[   17.328757]  kasan_save_alloc_info+0x3b/0x50
[   17.329120]  __kasan_kmalloc+0xb7/0xc0
[   17.329738]  __kmalloc_cache_noprof+0x189/0x420
[   17.330107]  kasan_bitops_generic+0x92/0x1c0
[   17.330325]  kunit_try_run_case+0x1a5/0x480
[   17.331200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.331655]  kthread+0x337/0x6f0
[   17.331985]  ret_from_fork+0x116/0x1d0
[   17.332865]  ret_from_fork_asm+0x1a/0x30
[   17.333211] 
[   17.333351] The buggy address belongs to the object at ffff8881023809a0
[   17.333351]  which belongs to the cache kmalloc-16 of size 16
[   17.333927] The buggy address is located 8 bytes inside of
[   17.333927]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.335448] 
[   17.335669] The buggy address belongs to the physical page:
[   17.335982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.337069] flags: 0x200000000000000(node=0|zone=2)
[   17.337847] page_type: f5(slab)
[   17.338099] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.338661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.339410] page dumped because: kasan: bad access detected
[   17.339749] 
[   17.340199] Memory state around the buggy address:
[   17.341137]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.341557]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.342146] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.342680]                                   ^
[   17.343285]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.343761]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.344630] ==================================================================
[   17.433108] ==================================================================
[   17.433438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.434399] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.435027] 
[   17.435476] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.435602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.435635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.435687] Call Trace:
[   17.435722]  <TASK>
[   17.435766]  dump_stack_lvl+0x73/0xb0
[   17.435841]  print_report+0xd1/0x650
[   17.435887]  ? __virt_addr_valid+0x1db/0x2d0
[   17.435925]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.435957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.435984]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436015]  kasan_report+0x141/0x180
[   17.436040]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436076]  kasan_check_range+0x10c/0x1c0
[   17.436103]  __kasan_check_write+0x18/0x20
[   17.436125]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   17.436156]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.436188]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.436255]  ? kasan_bitops_generic+0x92/0x1c0
[   17.436324]  kasan_bitops_generic+0x121/0x1c0
[   17.436377]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.436489]  ? __pfx_read_tsc+0x10/0x10
[   17.436518]  ? ktime_get_ts64+0x86/0x230
[   17.436561]  kunit_try_run_case+0x1a5/0x480
[   17.436605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.436629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.436658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.436686]  ? __kthread_parkme+0x82/0x180
[   17.436710]  ? preempt_count_sub+0x50/0x80
[   17.436737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.436761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.436789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.436817]  kthread+0x337/0x6f0
[   17.436839]  ? trace_preempt_on+0x20/0xc0
[   17.436866]  ? __pfx_kthread+0x10/0x10
[   17.436888]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.436914]  ? calculate_sigpending+0x7b/0xa0
[   17.436940]  ? __pfx_kthread+0x10/0x10
[   17.436964]  ret_from_fork+0x116/0x1d0
[   17.436986]  ? __pfx_kthread+0x10/0x10
[   17.437008]  ret_from_fork_asm+0x1a/0x30
[   17.437044]  </TASK>
[   17.437058] 
[   17.451155] Allocated by task 278:
[   17.451673]  kasan_save_stack+0x45/0x70
[   17.452133]  kasan_save_track+0x18/0x40
[   17.452567]  kasan_save_alloc_info+0x3b/0x50
[   17.452844]  __kasan_kmalloc+0xb7/0xc0
[   17.453259]  __kmalloc_cache_noprof+0x189/0x420
[   17.453486]  kasan_bitops_generic+0x92/0x1c0
[   17.453918]  kunit_try_run_case+0x1a5/0x480
[   17.454604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.454940]  kthread+0x337/0x6f0
[   17.455231]  ret_from_fork+0x116/0x1d0
[   17.456085]  ret_from_fork_asm+0x1a/0x30
[   17.456407] 
[   17.456536] The buggy address belongs to the object at ffff8881023809a0
[   17.456536]  which belongs to the cache kmalloc-16 of size 16
[   17.457496] The buggy address is located 8 bytes inside of
[   17.457496]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.458206] 
[   17.458471] The buggy address belongs to the physical page:
[   17.459050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.459528] flags: 0x200000000000000(node=0|zone=2)
[   17.459903] page_type: f5(slab)
[   17.460172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.460648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.461065] page dumped because: kasan: bad access detected
[   17.461523] 
[   17.461646] Memory state around the buggy address:
[   17.462040]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.462776]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.463089] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.463657]                                   ^
[   17.464057]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.464496]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.464995] ==================================================================
[   17.466340] ==================================================================
[   17.466758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.467602] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.468098] 
[   17.468272] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.468381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.468409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.468468] Call Trace:
[   17.468513]  <TASK>
[   17.468556]  dump_stack_lvl+0x73/0xb0
[   17.468626]  print_report+0xd1/0x650
[   17.468679]  ? __virt_addr_valid+0x1db/0x2d0
[   17.468732]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.468803]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468834]  kasan_report+0x141/0x180
[   17.468860]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.468907]  kasan_check_range+0x10c/0x1c0
[   17.468955]  __kasan_check_write+0x18/0x20
[   17.468991]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   17.469039]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.469098]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.469144]  ? kasan_bitops_generic+0x92/0x1c0
[   17.469204]  kasan_bitops_generic+0x121/0x1c0
[   17.470345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.470464]  ? __pfx_read_tsc+0x10/0x10
[   17.470523]  ? ktime_get_ts64+0x86/0x230
[   17.470584]  kunit_try_run_case+0x1a5/0x480
[   17.470640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.470690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.470725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.470754]  ? __kthread_parkme+0x82/0x180
[   17.470779]  ? preempt_count_sub+0x50/0x80
[   17.470806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.470830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.470859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.470886]  kthread+0x337/0x6f0
[   17.470908]  ? trace_preempt_on+0x20/0xc0
[   17.470935]  ? __pfx_kthread+0x10/0x10
[   17.470959]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.470983]  ? calculate_sigpending+0x7b/0xa0
[   17.471011]  ? __pfx_kthread+0x10/0x10
[   17.471034]  ret_from_fork+0x116/0x1d0
[   17.471056]  ? __pfx_kthread+0x10/0x10
[   17.471078]  ret_from_fork_asm+0x1a/0x30
[   17.471114]  </TASK>
[   17.471127] 
[   17.482680] Allocated by task 278:
[   17.482937]  kasan_save_stack+0x45/0x70
[   17.483186]  kasan_save_track+0x18/0x40
[   17.483583]  kasan_save_alloc_info+0x3b/0x50
[   17.483969]  __kasan_kmalloc+0xb7/0xc0
[   17.484288]  __kmalloc_cache_noprof+0x189/0x420
[   17.484812]  kasan_bitops_generic+0x92/0x1c0
[   17.485195]  kunit_try_run_case+0x1a5/0x480
[   17.485578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.486012]  kthread+0x337/0x6f0
[   17.486387]  ret_from_fork+0x116/0x1d0
[   17.486672]  ret_from_fork_asm+0x1a/0x30
[   17.486933] 
[   17.487065] The buggy address belongs to the object at ffff8881023809a0
[   17.487065]  which belongs to the cache kmalloc-16 of size 16
[   17.487513] The buggy address is located 8 bytes inside of
[   17.487513]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.488004] 
[   17.488201] The buggy address belongs to the physical page:
[   17.488668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.489487] flags: 0x200000000000000(node=0|zone=2)
[   17.489925] page_type: f5(slab)
[   17.490254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.490864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.491368] page dumped because: kasan: bad access detected
[   17.491711] 
[   17.491898] Memory state around the buggy address:
[   17.492192]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.492728]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.493160] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.493679]                                   ^
[   17.493916]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494194]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494495] ==================================================================
[   17.560950] ==================================================================
[   17.561524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.562289] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.562787] 
[   17.563061] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.563229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.563265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.563314] Call Trace:
[   17.563367]  <TASK>
[   17.563439]  dump_stack_lvl+0x73/0xb0
[   17.563530]  print_report+0xd1/0x650
[   17.563583]  ? __virt_addr_valid+0x1db/0x2d0
[   17.563634]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.563789]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563827]  kasan_report+0x141/0x180
[   17.563853]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563888]  __asan_report_load8_noabort+0x18/0x20
[   17.563911]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   17.563951]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.564000]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.564045]  ? kasan_bitops_generic+0x92/0x1c0
[   17.564129]  kasan_bitops_generic+0x121/0x1c0
[   17.564236]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.564293]  ? __pfx_read_tsc+0x10/0x10
[   17.564368]  ? ktime_get_ts64+0x86/0x230
[   17.564443]  kunit_try_run_case+0x1a5/0x480
[   17.564500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.564568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.564595]  ? __kthread_parkme+0x82/0x180
[   17.564619]  ? preempt_count_sub+0x50/0x80
[   17.564645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.564695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.564722]  kthread+0x337/0x6f0
[   17.564745]  ? trace_preempt_on+0x20/0xc0
[   17.564771]  ? __pfx_kthread+0x10/0x10
[   17.564793]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.564817]  ? calculate_sigpending+0x7b/0xa0
[   17.564844]  ? __pfx_kthread+0x10/0x10
[   17.564868]  ret_from_fork+0x116/0x1d0
[   17.564889]  ? __pfx_kthread+0x10/0x10
[   17.564911]  ret_from_fork_asm+0x1a/0x30
[   17.564945]  </TASK>
[   17.564959] 
[   17.576666] Allocated by task 278:
[   17.577094]  kasan_save_stack+0x45/0x70
[   17.577553]  kasan_save_track+0x18/0x40
[   17.577923]  kasan_save_alloc_info+0x3b/0x50
[   17.578286]  __kasan_kmalloc+0xb7/0xc0
[   17.578499]  __kmalloc_cache_noprof+0x189/0x420
[   17.578759]  kasan_bitops_generic+0x92/0x1c0
[   17.579188]  kunit_try_run_case+0x1a5/0x480
[   17.579626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579998]  kthread+0x337/0x6f0
[   17.580398]  ret_from_fork+0x116/0x1d0
[   17.580745]  ret_from_fork_asm+0x1a/0x30
[   17.581090] 
[   17.581272] The buggy address belongs to the object at ffff8881023809a0
[   17.581272]  which belongs to the cache kmalloc-16 of size 16
[   17.582001] The buggy address is located 8 bytes inside of
[   17.582001]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.582974] 
[   17.583177] The buggy address belongs to the physical page:
[   17.583517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.584184] flags: 0x200000000000000(node=0|zone=2)
[   17.584793] page_type: f5(slab)
[   17.585540] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.585932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.587423] page dumped because: kasan: bad access detected
[   17.587691] 
[   17.587817] Memory state around the buggy address:
[   17.588075]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.588525]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.589184] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.589939]                                   ^
[   17.590223]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591286]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591637] ==================================================================
[   17.266344] ==================================================================
[   17.267171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.267635] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.268401] 
[   17.268914] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.269020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.269044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.269081] Call Trace:
[   17.269120]  <TASK>
[   17.269157]  dump_stack_lvl+0x73/0xb0
[   17.269219]  print_report+0xd1/0x650
[   17.269258]  ? __virt_addr_valid+0x1db/0x2d0
[   17.269296]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.269339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.269380]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.269426]  kasan_report+0x141/0x180
[   17.270000]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.270061]  kasan_check_range+0x10c/0x1c0
[   17.270091]  __kasan_check_write+0x18/0x20
[   17.270115]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   17.270147]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.270179]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.270213]  ? kasan_bitops_generic+0x92/0x1c0
[   17.270263]  kasan_bitops_generic+0x121/0x1c0
[   17.270290]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.270317]  ? __pfx_read_tsc+0x10/0x10
[   17.270344]  ? ktime_get_ts64+0x86/0x230
[   17.270373]  kunit_try_run_case+0x1a5/0x480
[   17.270399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.270420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.270450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.270501]  ? __kthread_parkme+0x82/0x180
[   17.270525]  ? preempt_count_sub+0x50/0x80
[   17.270556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.270580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.270608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.270636]  kthread+0x337/0x6f0
[   17.270660]  ? trace_preempt_on+0x20/0xc0
[   17.270687]  ? __pfx_kthread+0x10/0x10
[   17.270727]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.270765]  ? calculate_sigpending+0x7b/0xa0
[   17.270807]  ? __pfx_kthread+0x10/0x10
[   17.270844]  ret_from_fork+0x116/0x1d0
[   17.270881]  ? __pfx_kthread+0x10/0x10
[   17.270914]  ret_from_fork_asm+0x1a/0x30
[   17.270952]  </TASK>
[   17.270967] 
[   17.287662] Allocated by task 278:
[   17.288392]  kasan_save_stack+0x45/0x70
[   17.289338]  kasan_save_track+0x18/0x40
[   17.289989]  kasan_save_alloc_info+0x3b/0x50
[   17.290288]  __kasan_kmalloc+0xb7/0xc0
[   17.290663]  __kmalloc_cache_noprof+0x189/0x420
[   17.291218]  kasan_bitops_generic+0x92/0x1c0
[   17.291576]  kunit_try_run_case+0x1a5/0x480
[   17.292258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292621]  kthread+0x337/0x6f0
[   17.293395]  ret_from_fork+0x116/0x1d0
[   17.293594]  ret_from_fork_asm+0x1a/0x30
[   17.293864] 
[   17.294074] The buggy address belongs to the object at ffff8881023809a0
[   17.294074]  which belongs to the cache kmalloc-16 of size 16
[   17.294932] The buggy address is located 8 bytes inside of
[   17.294932]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.295953] 
[   17.296214] The buggy address belongs to the physical page:
[   17.296740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.297443] flags: 0x200000000000000(node=0|zone=2)
[   17.297983] page_type: f5(slab)
[   17.298503] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.299294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.299690] page dumped because: kasan: bad access detected
[   17.300857] 
[   17.301012] Memory state around the buggy address:
[   17.301384]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.302278]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.302733] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.303245]                                   ^
[   17.303668]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304735]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.305161] ==================================================================
[   17.385412] ==================================================================
[   17.385717] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.386060] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.386298] 
[   17.386444] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.386832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.386864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.386992] Call Trace:
[   17.387114]  <TASK>
[   17.387244]  dump_stack_lvl+0x73/0xb0
[   17.387319]  print_report+0xd1/0x650
[   17.387374]  ? __virt_addr_valid+0x1db/0x2d0
[   17.387420]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.387535]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387584]  kasan_report+0x141/0x180
[   17.387622]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.387676]  kasan_check_range+0x10c/0x1c0
[   17.387719]  __kasan_check_write+0x18/0x20
[   17.387750]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   17.390898]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.390990]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.391035]  ? kasan_bitops_generic+0x92/0x1c0
[   17.391093]  kasan_bitops_generic+0x121/0x1c0
[   17.391142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.391185]  ? __pfx_read_tsc+0x10/0x10
[   17.391244]  ? ktime_get_ts64+0x86/0x230
[   17.391297]  kunit_try_run_case+0x1a5/0x480
[   17.391362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.391410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.391484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.391544]  ? __kthread_parkme+0x82/0x180
[   17.391595]  ? preempt_count_sub+0x50/0x80
[   17.391652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.391703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.391814]  kthread+0x337/0x6f0
[   17.391862]  ? trace_preempt_on+0x20/0xc0
[   17.391915]  ? __pfx_kthread+0x10/0x10
[   17.391964]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.392015]  ? calculate_sigpending+0x7b/0xa0
[   17.392072]  ? __pfx_kthread+0x10/0x10
[   17.392120]  ret_from_fork+0x116/0x1d0
[   17.392154]  ? __pfx_kthread+0x10/0x10
[   17.392192]  ret_from_fork_asm+0x1a/0x30
[   17.392250]  </TASK>
[   17.392271] 
[   17.412831] Allocated by task 278:
[   17.413090]  kasan_save_stack+0x45/0x70
[   17.413381]  kasan_save_track+0x18/0x40
[   17.414980]  kasan_save_alloc_info+0x3b/0x50
[   17.415332]  __kasan_kmalloc+0xb7/0xc0
[   17.416026]  __kmalloc_cache_noprof+0x189/0x420
[   17.416403]  kasan_bitops_generic+0x92/0x1c0
[   17.416658]  kunit_try_run_case+0x1a5/0x480
[   17.417300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.418372]  kthread+0x337/0x6f0
[   17.418626]  ret_from_fork+0x116/0x1d0
[   17.418902]  ret_from_fork_asm+0x1a/0x30
[   17.419511] 
[   17.419808] The buggy address belongs to the object at ffff8881023809a0
[   17.419808]  which belongs to the cache kmalloc-16 of size 16
[   17.420802] The buggy address is located 8 bytes inside of
[   17.420802]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.421404] 
[   17.421871] The buggy address belongs to the physical page:
[   17.422194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.422534] flags: 0x200000000000000(node=0|zone=2)
[   17.422880] page_type: f5(slab)
[   17.423913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.425167] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.426047] page dumped because: kasan: bad access detected
[   17.426540] 
[   17.426929] Memory state around the buggy address:
[   17.427189]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.428551]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.429013] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.429474]                                   ^
[   17.429865]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430516]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431239] ==================================================================
[   17.527503] ==================================================================
[   17.527858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.528247] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.529016] 
[   17.529327] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.529439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.529477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.529529] Call Trace:
[   17.529578]  <TASK>
[   17.529623]  dump_stack_lvl+0x73/0xb0
[   17.529693]  print_report+0xd1/0x650
[   17.529750]  ? __virt_addr_valid+0x1db/0x2d0
[   17.529806]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.529872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.529926]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.529989]  kasan_report+0x141/0x180
[   17.530043]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.530116]  kasan_check_range+0x10c/0x1c0
[   17.530172]  __kasan_check_read+0x15/0x20
[   17.530235]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   17.530293]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.530389]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.530465]  ? kasan_bitops_generic+0x92/0x1c0
[   17.530553]  kasan_bitops_generic+0x121/0x1c0
[   17.530646]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.530735]  ? __pfx_read_tsc+0x10/0x10
[   17.530783]  ? ktime_get_ts64+0x86/0x230
[   17.530858]  kunit_try_run_case+0x1a5/0x480
[   17.530909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.530951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.530997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.531044]  ? __kthread_parkme+0x82/0x180
[   17.531092]  ? preempt_count_sub+0x50/0x80
[   17.531175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.531277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.531339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.531404]  kthread+0x337/0x6f0
[   17.531445]  ? trace_preempt_on+0x20/0xc0
[   17.531894]  ? __pfx_kthread+0x10/0x10
[   17.531979]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.532024]  ? calculate_sigpending+0x7b/0xa0
[   17.532056]  ? __pfx_kthread+0x10/0x10
[   17.532081]  ret_from_fork+0x116/0x1d0
[   17.532105]  ? __pfx_kthread+0x10/0x10
[   17.532128]  ret_from_fork_asm+0x1a/0x30
[   17.532164]  </TASK>
[   17.532178] 
[   17.545186] Allocated by task 278:
[   17.545758]  kasan_save_stack+0x45/0x70
[   17.546011]  kasan_save_track+0x18/0x40
[   17.546651]  kasan_save_alloc_info+0x3b/0x50
[   17.547074]  __kasan_kmalloc+0xb7/0xc0
[   17.547450]  __kmalloc_cache_noprof+0x189/0x420
[   17.548172]  kasan_bitops_generic+0x92/0x1c0
[   17.548647]  kunit_try_run_case+0x1a5/0x480
[   17.548852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.549505]  kthread+0x337/0x6f0
[   17.549989]  ret_from_fork+0x116/0x1d0
[   17.550304]  ret_from_fork_asm+0x1a/0x30
[   17.550804] 
[   17.550956] The buggy address belongs to the object at ffff8881023809a0
[   17.550956]  which belongs to the cache kmalloc-16 of size 16
[   17.551754] The buggy address is located 8 bytes inside of
[   17.551754]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.552434] 
[   17.552917] The buggy address belongs to the physical page:
[   17.553231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.553996] flags: 0x200000000000000(node=0|zone=2)
[   17.554223] page_type: f5(slab)
[   17.554497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.555069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.555397] page dumped because: kasan: bad access detected
[   17.555874] 
[   17.556005] Memory state around the buggy address:
[   17.556266]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.556845]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.557569] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.558055]                                   ^
[   17.558313]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.558917]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.559568] ==================================================================
[   17.495968] ==================================================================
[   17.497152] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.497686] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.498162] 
[   17.498422] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.498579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.498893] Call Trace:
[   17.498935]  <TASK>
[   17.498977]  dump_stack_lvl+0x73/0xb0
[   17.499039]  print_report+0xd1/0x650
[   17.499088]  ? __virt_addr_valid+0x1db/0x2d0
[   17.499136]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.499193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.499942]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.499993]  kasan_report+0x141/0x180
[   17.500024]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.500061]  kasan_check_range+0x10c/0x1c0
[   17.500090]  __kasan_check_write+0x18/0x20
[   17.500113]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   17.500144]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.500176]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.500210]  ? kasan_bitops_generic+0x92/0x1c0
[   17.500562]  kasan_bitops_generic+0x121/0x1c0
[   17.500622]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.500680]  ? __pfx_read_tsc+0x10/0x10
[   17.500732]  ? ktime_get_ts64+0x86/0x230
[   17.500793]  kunit_try_run_case+0x1a5/0x480
[   17.500848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.500897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.500956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.501014]  ? __kthread_parkme+0x82/0x180
[   17.501063]  ? preempt_count_sub+0x50/0x80
[   17.501112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.501137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.501165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.501210]  kthread+0x337/0x6f0
[   17.501267]  ? trace_preempt_on+0x20/0xc0
[   17.501294]  ? __pfx_kthread+0x10/0x10
[   17.501316]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.501341]  ? calculate_sigpending+0x7b/0xa0
[   17.501368]  ? __pfx_kthread+0x10/0x10
[   17.501391]  ret_from_fork+0x116/0x1d0
[   17.501411]  ? __pfx_kthread+0x10/0x10
[   17.501434]  ret_from_fork_asm+0x1a/0x30
[   17.501485]  </TASK>
[   17.501500] 
[   17.513812] Allocated by task 278:
[   17.514199]  kasan_save_stack+0x45/0x70
[   17.514529]  kasan_save_track+0x18/0x40
[   17.514865]  kasan_save_alloc_info+0x3b/0x50
[   17.515243]  __kasan_kmalloc+0xb7/0xc0
[   17.515485]  __kmalloc_cache_noprof+0x189/0x420
[   17.515866]  kasan_bitops_generic+0x92/0x1c0
[   17.516167]  kunit_try_run_case+0x1a5/0x480
[   17.516581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516876]  kthread+0x337/0x6f0
[   17.517069]  ret_from_fork+0x116/0x1d0
[   17.517339]  ret_from_fork_asm+0x1a/0x30
[   17.517777] 
[   17.517994] The buggy address belongs to the object at ffff8881023809a0
[   17.517994]  which belongs to the cache kmalloc-16 of size 16
[   17.518872] The buggy address is located 8 bytes inside of
[   17.518872]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.519297] 
[   17.519442] The buggy address belongs to the physical page:
[   17.520019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.520726] flags: 0x200000000000000(node=0|zone=2)
[   17.521126] page_type: f5(slab)
[   17.521559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.522065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.522651] page dumped because: kasan: bad access detected
[   17.522883] 
[   17.523000] Memory state around the buggy address:
[   17.523249]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.523747]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.524502] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.525078]                                   ^
[   17.525316]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.525772]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.526333] ==================================================================
[   17.345667] ==================================================================
[   17.346303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.346894] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.347997] 
[   17.348249] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.349088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.349151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.349199] Call Trace:
[   17.349266]  <TASK>
[   17.349310]  dump_stack_lvl+0x73/0xb0
[   17.349395]  print_report+0xd1/0x650
[   17.349444]  ? __virt_addr_valid+0x1db/0x2d0
[   17.349510]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.349641]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349698]  kasan_report+0x141/0x180
[   17.349746]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349792]  kasan_check_range+0x10c/0x1c0
[   17.349821]  __kasan_check_write+0x18/0x20
[   17.349844]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   17.349875]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   17.349907]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.349932]  ? kasan_bitops_generic+0x92/0x1c0
[   17.349963]  kasan_bitops_generic+0x121/0x1c0
[   17.349990]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.350019]  ? __pfx_read_tsc+0x10/0x10
[   17.350043]  ? ktime_get_ts64+0x86/0x230
[   17.350073]  kunit_try_run_case+0x1a5/0x480
[   17.350097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.350119]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.350147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.350174]  ? __kthread_parkme+0x82/0x180
[   17.350203]  ? preempt_count_sub+0x50/0x80
[   17.350284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.350327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.350396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.350427]  kthread+0x337/0x6f0
[   17.350450]  ? trace_preempt_on+0x20/0xc0
[   17.350502]  ? __pfx_kthread+0x10/0x10
[   17.350527]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.350556]  ? calculate_sigpending+0x7b/0xa0
[   17.350585]  ? __pfx_kthread+0x10/0x10
[   17.350610]  ret_from_fork+0x116/0x1d0
[   17.350634]  ? __pfx_kthread+0x10/0x10
[   17.350658]  ret_from_fork_asm+0x1a/0x30
[   17.350719]  </TASK>
[   17.350743] 
[   17.367092] Allocated by task 278:
[   17.367329]  kasan_save_stack+0x45/0x70
[   17.368644]  kasan_save_track+0x18/0x40
[   17.369191]  kasan_save_alloc_info+0x3b/0x50
[   17.369747]  __kasan_kmalloc+0xb7/0xc0
[   17.370151]  __kmalloc_cache_noprof+0x189/0x420
[   17.370608]  kasan_bitops_generic+0x92/0x1c0
[   17.371436]  kunit_try_run_case+0x1a5/0x480
[   17.372507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.372908]  kthread+0x337/0x6f0
[   17.373073]  ret_from_fork+0x116/0x1d0
[   17.373180]  ret_from_fork_asm+0x1a/0x30
[   17.373409] 
[   17.373550] The buggy address belongs to the object at ffff8881023809a0
[   17.373550]  which belongs to the cache kmalloc-16 of size 16
[   17.374768] The buggy address is located 8 bytes inside of
[   17.374768]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.375597] 
[   17.375783] The buggy address belongs to the physical page:
[   17.376104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.377240] flags: 0x200000000000000(node=0|zone=2)
[   17.377468] page_type: f5(slab)
[   17.377622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.379095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.379560] page dumped because: kasan: bad access detected
[   17.380251] 
[   17.380380] Memory state around the buggy address:
[   17.381540]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.381928]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.382750] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.383199]                                   ^
[   17.384107]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384370]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure Automatically assigned
[   17.105579] ==================================================================
[   17.106220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.107558] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.108275] 
[   17.108581] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.108741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.108771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.108820] Call Trace:
[   17.108859]  <TASK>
[   17.108900]  dump_stack_lvl+0x73/0xb0
[   17.108967]  print_report+0xd1/0x650
[   17.109020]  ? __virt_addr_valid+0x1db/0x2d0
[   17.109072]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.109425]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109482]  kasan_report+0x141/0x180
[   17.109561]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109621]  kasan_check_range+0x10c/0x1c0
[   17.109673]  __kasan_check_write+0x18/0x20
[   17.109716]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.109773]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.109831]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.109885]  ? kasan_bitops_generic+0x92/0x1c0
[   17.109949]  kasan_bitops_generic+0x116/0x1c0
[   17.110000]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.110102]  ? __pfx_read_tsc+0x10/0x10
[   17.110150]  ? ktime_get_ts64+0x86/0x230
[   17.110203]  kunit_try_run_case+0x1a5/0x480
[   17.110250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.110293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.110350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.110410]  ? __kthread_parkme+0x82/0x180
[   17.110471]  ? preempt_count_sub+0x50/0x80
[   17.110526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.110566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.110608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.110654]  kthread+0x337/0x6f0
[   17.110695]  ? trace_preempt_on+0x20/0xc0
[   17.110737]  ? __pfx_kthread+0x10/0x10
[   17.110775]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.110815]  ? calculate_sigpending+0x7b/0xa0
[   17.110865]  ? __pfx_kthread+0x10/0x10
[   17.110906]  ret_from_fork+0x116/0x1d0
[   17.110943]  ? __pfx_kthread+0x10/0x10
[   17.110976]  ret_from_fork_asm+0x1a/0x30
[   17.112008]  </TASK>
[   17.112037] 
[   17.126705] Allocated by task 278:
[   17.126948]  kasan_save_stack+0x45/0x70
[   17.127186]  kasan_save_track+0x18/0x40
[   17.127382]  kasan_save_alloc_info+0x3b/0x50
[   17.127601]  __kasan_kmalloc+0xb7/0xc0
[   17.127782]  __kmalloc_cache_noprof+0x189/0x420
[   17.127977]  kasan_bitops_generic+0x92/0x1c0
[   17.128425]  kunit_try_run_case+0x1a5/0x480
[   17.128881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.129135]  kthread+0x337/0x6f0
[   17.129315]  ret_from_fork+0x116/0x1d0
[   17.129524]  ret_from_fork_asm+0x1a/0x30
[   17.129734] 
[   17.129863] The buggy address belongs to the object at ffff8881023809a0
[   17.129863]  which belongs to the cache kmalloc-16 of size 16
[   17.130251] The buggy address is located 8 bytes inside of
[   17.130251]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.130660] 
[   17.132361] The buggy address belongs to the physical page:
[   17.134198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.134878] flags: 0x200000000000000(node=0|zone=2)
[   17.135730] page_type: f5(slab)
[   17.136074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.137671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.138518] page dumped because: kasan: bad access detected
[   17.139089] 
[   17.139317] Memory state around the buggy address:
[   17.139980]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.141075]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.142228] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.142681]                                   ^
[   17.143517]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144170]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144677] ==================================================================
[   17.063618] ==================================================================
[   17.064488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.065153] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.065870] 
[   17.066469] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.066872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.066908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.066962] Call Trace:
[   17.067011]  <TASK>
[   17.067052]  dump_stack_lvl+0x73/0xb0
[   17.067119]  print_report+0xd1/0x650
[   17.067150]  ? __virt_addr_valid+0x1db/0x2d0
[   17.067178]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.067307]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067365]  kasan_report+0x141/0x180
[   17.067404]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067468]  kasan_check_range+0x10c/0x1c0
[   17.067514]  __kasan_check_write+0x18/0x20
[   17.067549]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   17.067614]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.067663]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.067775]  ? kasan_bitops_generic+0x92/0x1c0
[   17.067812]  kasan_bitops_generic+0x116/0x1c0
[   17.067841]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.067871]  ? __pfx_read_tsc+0x10/0x10
[   17.067898]  ? ktime_get_ts64+0x86/0x230
[   17.067930]  kunit_try_run_case+0x1a5/0x480
[   17.067955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.067978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.068008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.068036]  ? __kthread_parkme+0x82/0x180
[   17.068060]  ? preempt_count_sub+0x50/0x80
[   17.068087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.068111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.068139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.068168]  kthread+0x337/0x6f0
[   17.068193]  ? trace_preempt_on+0x20/0xc0
[   17.068249]  ? __pfx_kthread+0x10/0x10
[   17.068274]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.068300]  ? calculate_sigpending+0x7b/0xa0
[   17.068331]  ? __pfx_kthread+0x10/0x10
[   17.068356]  ret_from_fork+0x116/0x1d0
[   17.068378]  ? __pfx_kthread+0x10/0x10
[   17.068402]  ret_from_fork_asm+0x1a/0x30
[   17.068439]  </TASK>
[   17.068468] 
[   17.085665] Allocated by task 278:
[   17.086345]  kasan_save_stack+0x45/0x70
[   17.086779]  kasan_save_track+0x18/0x40
[   17.087112]  kasan_save_alloc_info+0x3b/0x50
[   17.087980]  __kasan_kmalloc+0xb7/0xc0
[   17.088513]  __kmalloc_cache_noprof+0x189/0x420
[   17.088911]  kasan_bitops_generic+0x92/0x1c0
[   17.089605]  kunit_try_run_case+0x1a5/0x480
[   17.090419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.090668]  kthread+0x337/0x6f0
[   17.091007]  ret_from_fork+0x116/0x1d0
[   17.091697]  ret_from_fork_asm+0x1a/0x30
[   17.092179] 
[   17.092572] The buggy address belongs to the object at ffff8881023809a0
[   17.092572]  which belongs to the cache kmalloc-16 of size 16
[   17.093269] The buggy address is located 8 bytes inside of
[   17.093269]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.094321] 
[   17.094672] The buggy address belongs to the physical page:
[   17.095572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.096110] flags: 0x200000000000000(node=0|zone=2)
[   17.096801] page_type: f5(slab)
[   17.097058] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.098249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.098949] page dumped because: kasan: bad access detected
[   17.099402] 
[   17.099528] Memory state around the buggy address:
[   17.099932]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.100796]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.101341] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.101969]                                   ^
[   17.102757]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103129]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104048] ==================================================================
[   17.225597] ==================================================================
[   17.227149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.228118] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.229414] 
[   17.229692] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.229826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.229854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.229900] Call Trace:
[   17.229945]  <TASK>
[   17.229987]  dump_stack_lvl+0x73/0xb0
[   17.230068]  print_report+0xd1/0x650
[   17.230119]  ? __virt_addr_valid+0x1db/0x2d0
[   17.230160]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.230646]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230726]  kasan_report+0x141/0x180
[   17.230771]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230829]  kasan_check_range+0x10c/0x1c0
[   17.230865]  __kasan_check_write+0x18/0x20
[   17.230887]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.230917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.230946]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.230971]  ? kasan_bitops_generic+0x92/0x1c0
[   17.231002]  kasan_bitops_generic+0x116/0x1c0
[   17.231029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.231056]  ? __pfx_read_tsc+0x10/0x10
[   17.231081]  ? ktime_get_ts64+0x86/0x230
[   17.231109]  kunit_try_run_case+0x1a5/0x480
[   17.231134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.231157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.231185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.231226]  ? __kthread_parkme+0x82/0x180
[   17.231251]  ? preempt_count_sub+0x50/0x80
[   17.231278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.231303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.231331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.231377]  kthread+0x337/0x6f0
[   17.231401]  ? trace_preempt_on+0x20/0xc0
[   17.231428]  ? __pfx_kthread+0x10/0x10
[   17.231451]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.231493]  ? calculate_sigpending+0x7b/0xa0
[   17.231524]  ? __pfx_kthread+0x10/0x10
[   17.231548]  ret_from_fork+0x116/0x1d0
[   17.231570]  ? __pfx_kthread+0x10/0x10
[   17.231594]  ret_from_fork_asm+0x1a/0x30
[   17.231630]  </TASK>
[   17.231645] 
[   17.248434] Allocated by task 278:
[   17.248947]  kasan_save_stack+0x45/0x70
[   17.249478]  kasan_save_track+0x18/0x40
[   17.249957]  kasan_save_alloc_info+0x3b/0x50
[   17.250295]  __kasan_kmalloc+0xb7/0xc0
[   17.251271]  __kmalloc_cache_noprof+0x189/0x420
[   17.251963]  kasan_bitops_generic+0x92/0x1c0
[   17.252626]  kunit_try_run_case+0x1a5/0x480
[   17.253656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.254157]  kthread+0x337/0x6f0
[   17.254567]  ret_from_fork+0x116/0x1d0
[   17.255619]  ret_from_fork_asm+0x1a/0x30
[   17.256308] 
[   17.256620] The buggy address belongs to the object at ffff8881023809a0
[   17.256620]  which belongs to the cache kmalloc-16 of size 16
[   17.257557] The buggy address is located 8 bytes inside of
[   17.257557]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.258608] 
[   17.258892] The buggy address belongs to the physical page:
[   17.259287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.259596] flags: 0x200000000000000(node=0|zone=2)
[   17.259805] page_type: f5(slab)
[   17.259995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.260191] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.260346] page dumped because: kasan: bad access detected
[   17.260494] 
[   17.260620] Memory state around the buggy address:
[   17.261053]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.261875]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.262559] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.263072]                                   ^
[   17.263301]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.263623]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.263893] ==================================================================
[   17.022296] ==================================================================
[   17.022711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.024068] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.024916] 
[   17.025178] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.025296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.025572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.025630] Call Trace:
[   17.025676]  <TASK>
[   17.025748]  dump_stack_lvl+0x73/0xb0
[   17.025832]  print_report+0xd1/0x650
[   17.025865]  ? __virt_addr_valid+0x1db/0x2d0
[   17.025895]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.025927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.025952]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.025983]  kasan_report+0x141/0x180
[   17.026008]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.026042]  kasan_check_range+0x10c/0x1c0
[   17.026070]  __kasan_check_write+0x18/0x20
[   17.026092]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   17.026121]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.026151]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.026177]  ? kasan_bitops_generic+0x92/0x1c0
[   17.026219]  kasan_bitops_generic+0x116/0x1c0
[   17.026260]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.026302]  ? __pfx_read_tsc+0x10/0x10
[   17.026341]  ? ktime_get_ts64+0x86/0x230
[   17.026405]  kunit_try_run_case+0x1a5/0x480
[   17.026435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.026478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.026512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.026541]  ? __kthread_parkme+0x82/0x180
[   17.026566]  ? preempt_count_sub+0x50/0x80
[   17.026595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.026619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.026649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.026676]  kthread+0x337/0x6f0
[   17.026726]  ? trace_preempt_on+0x20/0xc0
[   17.026773]  ? __pfx_kthread+0x10/0x10
[   17.026807]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.026833]  ? calculate_sigpending+0x7b/0xa0
[   17.026862]  ? __pfx_kthread+0x10/0x10
[   17.026886]  ret_from_fork+0x116/0x1d0
[   17.026907]  ? __pfx_kthread+0x10/0x10
[   17.026930]  ret_from_fork_asm+0x1a/0x30
[   17.026967]  </TASK>
[   17.026981] 
[   17.043382] Allocated by task 278:
[   17.044543]  kasan_save_stack+0x45/0x70
[   17.045179]  kasan_save_track+0x18/0x40
[   17.045558]  kasan_save_alloc_info+0x3b/0x50
[   17.045961]  __kasan_kmalloc+0xb7/0xc0
[   17.046333]  __kmalloc_cache_noprof+0x189/0x420
[   17.046842]  kasan_bitops_generic+0x92/0x1c0
[   17.047414]  kunit_try_run_case+0x1a5/0x480
[   17.047735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.048531]  kthread+0x337/0x6f0
[   17.048926]  ret_from_fork+0x116/0x1d0
[   17.049851]  ret_from_fork_asm+0x1a/0x30
[   17.050061] 
[   17.050285] The buggy address belongs to the object at ffff8881023809a0
[   17.050285]  which belongs to the cache kmalloc-16 of size 16
[   17.051422] The buggy address is located 8 bytes inside of
[   17.051422]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.052662] 
[   17.052923] The buggy address belongs to the physical page:
[   17.053500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.054185] flags: 0x200000000000000(node=0|zone=2)
[   17.054576] page_type: f5(slab)
[   17.054884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.055861] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.056883] page dumped because: kasan: bad access detected
[   17.057626] 
[   17.057997] Memory state around the buggy address:
[   17.058316]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.059147]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.059537] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.060193]                                   ^
[   17.060740]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.061635]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.062194] ==================================================================
[   16.980899] ==================================================================
[   16.982419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.983107] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   16.983881] 
[   16.984063] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.984887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.984915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.984944] Call Trace:
[   16.984962]  <TASK>
[   16.984987]  dump_stack_lvl+0x73/0xb0
[   16.985035]  print_report+0xd1/0x650
[   16.985062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.985089]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.985144]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985173]  kasan_report+0x141/0x180
[   16.985203]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985289]  kasan_check_range+0x10c/0x1c0
[   16.985334]  __kasan_check_write+0x18/0x20
[   16.985372]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.985403]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.985432]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.985481]  ? kasan_bitops_generic+0x92/0x1c0
[   16.985539]  kasan_bitops_generic+0x116/0x1c0
[   16.985567]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.985596]  ? __pfx_read_tsc+0x10/0x10
[   16.985621]  ? ktime_get_ts64+0x86/0x230
[   16.985651]  kunit_try_run_case+0x1a5/0x480
[   16.985676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.986066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.986095]  ? __kthread_parkme+0x82/0x180
[   16.986120]  ? preempt_count_sub+0x50/0x80
[   16.986148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.986210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.986263]  kthread+0x337/0x6f0
[   16.986287]  ? trace_preempt_on+0x20/0xc0
[   16.986313]  ? __pfx_kthread+0x10/0x10
[   16.986336]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.986362]  ? calculate_sigpending+0x7b/0xa0
[   16.986389]  ? __pfx_kthread+0x10/0x10
[   16.986412]  ret_from_fork+0x116/0x1d0
[   16.986435]  ? __pfx_kthread+0x10/0x10
[   16.986477]  ret_from_fork_asm+0x1a/0x30
[   16.986515]  </TASK>
[   16.986528] 
[   17.001330] Allocated by task 278:
[   17.001736]  kasan_save_stack+0x45/0x70
[   17.002136]  kasan_save_track+0x18/0x40
[   17.003490]  kasan_save_alloc_info+0x3b/0x50
[   17.004122]  __kasan_kmalloc+0xb7/0xc0
[   17.004839]  __kmalloc_cache_noprof+0x189/0x420
[   17.005445]  kasan_bitops_generic+0x92/0x1c0
[   17.006017]  kunit_try_run_case+0x1a5/0x480
[   17.006619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.007144]  kthread+0x337/0x6f0
[   17.007452]  ret_from_fork+0x116/0x1d0
[   17.008501]  ret_from_fork_asm+0x1a/0x30
[   17.008946] 
[   17.009194] The buggy address belongs to the object at ffff8881023809a0
[   17.009194]  which belongs to the cache kmalloc-16 of size 16
[   17.009897] The buggy address is located 8 bytes inside of
[   17.009897]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.010865] 
[   17.011074] The buggy address belongs to the physical page:
[   17.011431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.011833] flags: 0x200000000000000(node=0|zone=2)
[   17.012104] page_type: f5(slab)
[   17.013298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.014097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.014639] page dumped because: kasan: bad access detected
[   17.015251] 
[   17.015482] Memory state around the buggy address:
[   17.016424]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.017153]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.017735] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.018216]                                   ^
[   17.018584]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.019418]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.019925] ==================================================================
[   17.186370] ==================================================================
[   17.186949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.187572] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.188405] 
[   17.188729] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.188864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.188896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.188950] Call Trace:
[   17.188997]  <TASK>
[   17.189043]  dump_stack_lvl+0x73/0xb0
[   17.189123]  print_report+0xd1/0x650
[   17.189178]  ? __virt_addr_valid+0x1db/0x2d0
[   17.189228]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.189295]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189325]  kasan_report+0x141/0x180
[   17.189350]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189383]  kasan_check_range+0x10c/0x1c0
[   17.189410]  __kasan_check_write+0x18/0x20
[   17.189432]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.189487]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.190275]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.190312]  ? kasan_bitops_generic+0x92/0x1c0
[   17.190345]  kasan_bitops_generic+0x116/0x1c0
[   17.190375]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.190402]  ? __pfx_read_tsc+0x10/0x10
[   17.190428]  ? ktime_get_ts64+0x86/0x230
[   17.190474]  kunit_try_run_case+0x1a5/0x480
[   17.190506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.190528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.190559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.190587]  ? __kthread_parkme+0x82/0x180
[   17.190612]  ? preempt_count_sub+0x50/0x80
[   17.190643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.190667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.190702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.190745]  kthread+0x337/0x6f0
[   17.190779]  ? trace_preempt_on+0x20/0xc0
[   17.190819]  ? __pfx_kthread+0x10/0x10
[   17.190868]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.190893]  ? calculate_sigpending+0x7b/0xa0
[   17.190921]  ? __pfx_kthread+0x10/0x10
[   17.190945]  ret_from_fork+0x116/0x1d0
[   17.190966]  ? __pfx_kthread+0x10/0x10
[   17.190990]  ret_from_fork_asm+0x1a/0x30
[   17.191025]  </TASK>
[   17.191039] 
[   17.208722] Allocated by task 278:
[   17.209158]  kasan_save_stack+0x45/0x70
[   17.209686]  kasan_save_track+0x18/0x40
[   17.210201]  kasan_save_alloc_info+0x3b/0x50
[   17.210864]  __kasan_kmalloc+0xb7/0xc0
[   17.211076]  __kmalloc_cache_noprof+0x189/0x420
[   17.211310]  kasan_bitops_generic+0x92/0x1c0
[   17.211729]  kunit_try_run_case+0x1a5/0x480
[   17.212053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.212850]  kthread+0x337/0x6f0
[   17.213179]  ret_from_fork+0x116/0x1d0
[   17.213532]  ret_from_fork_asm+0x1a/0x30
[   17.213746] 
[   17.213946] The buggy address belongs to the object at ffff8881023809a0
[   17.213946]  which belongs to the cache kmalloc-16 of size 16
[   17.215025] The buggy address is located 8 bytes inside of
[   17.215025]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.215679] 
[   17.215818] The buggy address belongs to the physical page:
[   17.216208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.216811] flags: 0x200000000000000(node=0|zone=2)
[   17.217105] page_type: f5(slab)
[   17.217410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.219195] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.219597] page dumped because: kasan: bad access detected
[   17.219841] 
[   17.220020] Memory state around the buggy address:
[   17.220410]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.221464]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.222596] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.222963]                                   ^
[   17.223227]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224212]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224617] ==================================================================
[   17.145636] ==================================================================
[   17.146715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.147240] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   17.147699] 
[   17.147909] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.148302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.148342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.148396] Call Trace:
[   17.148442]  <TASK>
[   17.148497]  dump_stack_lvl+0x73/0xb0
[   17.148570]  print_report+0xd1/0x650
[   17.148623]  ? __virt_addr_valid+0x1db/0x2d0
[   17.148673]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.148779]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148829]  kasan_report+0x141/0x180
[   17.148877]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.148973]  kasan_check_range+0x10c/0x1c0
[   17.149032]  __kasan_check_write+0x18/0x20
[   17.149083]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.149146]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.149250]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.149297]  ? kasan_bitops_generic+0x92/0x1c0
[   17.149338]  kasan_bitops_generic+0x116/0x1c0
[   17.149370]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.149400]  ? __pfx_read_tsc+0x10/0x10
[   17.149426]  ? ktime_get_ts64+0x86/0x230
[   17.149482]  kunit_try_run_case+0x1a5/0x480
[   17.149513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.149537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.149568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.149597]  ? __kthread_parkme+0x82/0x180
[   17.149621]  ? preempt_count_sub+0x50/0x80
[   17.149649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.149672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.149700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.149728]  kthread+0x337/0x6f0
[   17.149750]  ? trace_preempt_on+0x20/0xc0
[   17.149777]  ? __pfx_kthread+0x10/0x10
[   17.149800]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.149825]  ? calculate_sigpending+0x7b/0xa0
[   17.149856]  ? __pfx_kthread+0x10/0x10
[   17.149881]  ret_from_fork+0x116/0x1d0
[   17.149903]  ? __pfx_kthread+0x10/0x10
[   17.149926]  ret_from_fork_asm+0x1a/0x30
[   17.149962]  </TASK>
[   17.149976] 
[   17.165751] Allocated by task 278:
[   17.166119]  kasan_save_stack+0x45/0x70
[   17.166956]  kasan_save_track+0x18/0x40
[   17.167662]  kasan_save_alloc_info+0x3b/0x50
[   17.167908]  __kasan_kmalloc+0xb7/0xc0
[   17.168340]  __kmalloc_cache_noprof+0x189/0x420
[   17.169169]  kasan_bitops_generic+0x92/0x1c0
[   17.169982]  kunit_try_run_case+0x1a5/0x480
[   17.170177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.171330]  kthread+0x337/0x6f0
[   17.171602]  ret_from_fork+0x116/0x1d0
[   17.172391]  ret_from_fork_asm+0x1a/0x30
[   17.172666] 
[   17.173574] The buggy address belongs to the object at ffff8881023809a0
[   17.173574]  which belongs to the cache kmalloc-16 of size 16
[   17.174070] The buggy address is located 8 bytes inside of
[   17.174070]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   17.175258] 
[   17.176024] The buggy address belongs to the physical page:
[   17.176291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   17.178018] flags: 0x200000000000000(node=0|zone=2)
[   17.178269] page_type: f5(slab)
[   17.178541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.179537] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.180102] page dumped because: kasan: bad access detected
[   17.180629] 
[   17.180914] Memory state around the buggy address:
[   17.181326]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   17.181961]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   17.182673] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.183091]                                   ^
[   17.183575]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.184316]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.185006] ==================================================================
[   16.940041] ==================================================================
[   16.940605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.941578] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278
[   16.941782] 
[   16.941879] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.941943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.941959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.941987] Call Trace:
[   16.942003]  <TASK>
[   16.942029]  dump_stack_lvl+0x73/0xb0
[   16.942070]  print_report+0xd1/0x650
[   16.942098]  ? __virt_addr_valid+0x1db/0x2d0
[   16.942128]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.942183]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942418]  kasan_report+0x141/0x180
[   16.942448]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942499]  kasan_check_range+0x10c/0x1c0
[   16.942528]  __kasan_check_write+0x18/0x20
[   16.942552]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.942582]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.942613]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.942639]  ? kasan_bitops_generic+0x92/0x1c0
[   16.942671]  kasan_bitops_generic+0x116/0x1c0
[   16.942769]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.942800]  ? __pfx_read_tsc+0x10/0x10
[   16.942828]  ? ktime_get_ts64+0x86/0x230
[   16.942857]  kunit_try_run_case+0x1a5/0x480
[   16.942885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.942906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.942936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.942963]  ? __kthread_parkme+0x82/0x180
[   16.942986]  ? preempt_count_sub+0x50/0x80
[   16.943013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.943036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.943065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.943099]  kthread+0x337/0x6f0
[   16.943122]  ? trace_preempt_on+0x20/0xc0
[   16.943149]  ? __pfx_kthread+0x10/0x10
[   16.943171]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.943196]  ? calculate_sigpending+0x7b/0xa0
[   16.943244]  ? __pfx_kthread+0x10/0x10
[   16.943272]  ret_from_fork+0x116/0x1d0
[   16.943294]  ? __pfx_kthread+0x10/0x10
[   16.943317]  ret_from_fork_asm+0x1a/0x30
[   16.943387]  </TASK>
[   16.943403] 
[   16.961222] Allocated by task 278:
[   16.961972]  kasan_save_stack+0x45/0x70
[   16.962722]  kasan_save_track+0x18/0x40
[   16.962998]  kasan_save_alloc_info+0x3b/0x50
[   16.963186]  __kasan_kmalloc+0xb7/0xc0
[   16.963500]  __kmalloc_cache_noprof+0x189/0x420
[   16.963875]  kasan_bitops_generic+0x92/0x1c0
[   16.964081]  kunit_try_run_case+0x1a5/0x480
[   16.965535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.965874]  kthread+0x337/0x6f0
[   16.966288]  ret_from_fork+0x116/0x1d0
[   16.966450]  ret_from_fork_asm+0x1a/0x30
[   16.966679] 
[   16.967326] The buggy address belongs to the object at ffff8881023809a0
[   16.967326]  which belongs to the cache kmalloc-16 of size 16
[   16.969088] The buggy address is located 8 bytes inside of
[   16.969088]  allocated 9-byte region [ffff8881023809a0, ffff8881023809a9)
[   16.969651] 
[   16.969854] The buggy address belongs to the physical page:
[   16.971262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   16.971656] flags: 0x200000000000000(node=0|zone=2)
[   16.972290] page_type: f5(slab)
[   16.972570] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.972961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.973795] page dumped because: kasan: bad access detected
[   16.974719] 
[   16.975099] Memory state around the buggy address:
[   16.975398]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.976109]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   16.976530] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.977092]                                   ^
[   16.977696]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.978241]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.978596] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure Automatically assigned
[   16.906913] ==================================================================
[   16.907950] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   16.908343] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276
[   16.908545] 
[   16.908718] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.908775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.908790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.908814] Call Trace:
[   16.908923]  <TASK>
[   16.908949]  dump_stack_lvl+0x73/0xb0
[   16.908982]  print_report+0xd1/0x650
[   16.909009]  ? __virt_addr_valid+0x1db/0x2d0
[   16.909036]  ? strnlen+0x73/0x80
[   16.909057]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.909081]  ? strnlen+0x73/0x80
[   16.909102]  kasan_report+0x141/0x180
[   16.909126]  ? strnlen+0x73/0x80
[   16.909152]  __asan_report_load1_noabort+0x18/0x20
[   16.909175]  strnlen+0x73/0x80
[   16.909196]  kasan_strings+0x615/0xe80
[   16.909276]  ? trace_hardirqs_on+0x37/0xe0
[   16.909338]  ? __pfx_kasan_strings+0x10/0x10
[   16.909365]  ? finish_task_switch.isra.0+0x153/0x700
[   16.909396]  ? __switch_to+0x47/0xf50
[   16.909426]  ? __schedule+0x10cc/0x2b60
[   16.909465]  ? __pfx_read_tsc+0x10/0x10
[   16.909496]  ? ktime_get_ts64+0x86/0x230
[   16.909524]  kunit_try_run_case+0x1a5/0x480
[   16.909550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.909599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.909639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.909667]  ? __kthread_parkme+0x82/0x180
[   16.909703]  ? preempt_count_sub+0x50/0x80
[   16.909732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.909757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.909783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.909810]  kthread+0x337/0x6f0
[   16.909831]  ? trace_preempt_on+0x20/0xc0
[   16.909892]  ? __pfx_kthread+0x10/0x10
[   16.909917]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.909944]  ? calculate_sigpending+0x7b/0xa0
[   16.909971]  ? __pfx_kthread+0x10/0x10
[   16.909994]  ret_from_fork+0x116/0x1d0
[   16.910016]  ? __pfx_kthread+0x10/0x10
[   16.910038]  ret_from_fork_asm+0x1a/0x30
[   16.910073]  </TASK>
[   16.910087] 
[   16.920681] Allocated by task 276:
[   16.921055]  kasan_save_stack+0x45/0x70
[   16.921375]  kasan_save_track+0x18/0x40
[   16.921668]  kasan_save_alloc_info+0x3b/0x50
[   16.922005]  __kasan_kmalloc+0xb7/0xc0
[   16.922276]  __kmalloc_cache_noprof+0x189/0x420
[   16.922530]  kasan_strings+0xc0/0xe80
[   16.922745]  kunit_try_run_case+0x1a5/0x480
[   16.923011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.923365]  kthread+0x337/0x6f0
[   16.923591]  ret_from_fork+0x116/0x1d0
[   16.923942]  ret_from_fork_asm+0x1a/0x30
[   16.924198] 
[   16.924337] Freed by task 276:
[   16.924544]  kasan_save_stack+0x45/0x70
[   16.924812]  kasan_save_track+0x18/0x40
[   16.925059]  kasan_save_free_info+0x3f/0x60
[   16.925320]  __kasan_slab_free+0x56/0x70
[   16.925601]  kfree+0x222/0x3f0
[   16.925885]  kasan_strings+0x2aa/0xe80
[   16.926071]  kunit_try_run_case+0x1a5/0x480
[   16.926403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.926580]  kthread+0x337/0x6f0
[   16.926912]  ret_from_fork+0x116/0x1d0
[   16.927073]  ret_from_fork_asm+0x1a/0x30
[   16.927308] 
[   16.927416] The buggy address belongs to the object at ffff888103349900
[   16.927416]  which belongs to the cache kmalloc-32 of size 32
[   16.928046] The buggy address is located 16 bytes inside of
[   16.928046]  freed 32-byte region [ffff888103349900, ffff888103349920)
[   16.928761] 
[   16.928914] The buggy address belongs to the physical page:
[   16.929051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.929258] flags: 0x200000000000000(node=0|zone=2)
[   16.929398] page_type: f5(slab)
[   16.929644] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.930279] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.930492] page dumped because: kasan: bad access detected
[   16.930667] 
[   16.930817] Memory state around the buggy address:
[   16.931165]  ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc
[   16.931696]  ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.932024] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.932329]                          ^
[   16.932631]  ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.932995]  ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.933487] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure Automatically assigned
[   16.877126] ==================================================================
[   16.877502] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   16.877669] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276
[   16.878273] 
[   16.878463] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.878525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.878552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.878579] Call Trace:
[   16.878604]  <TASK>
[   16.878644]  dump_stack_lvl+0x73/0xb0
[   16.878676]  print_report+0xd1/0x650
[   16.878706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.878803]  ? strlen+0x8f/0xb0
[   16.878837]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.878868]  ? strlen+0x8f/0xb0
[   16.878889]  kasan_report+0x141/0x180
[   16.878928]  ? strlen+0x8f/0xb0
[   16.878955]  __asan_report_load1_noabort+0x18/0x20
[   16.878989]  strlen+0x8f/0xb0
[   16.879013]  kasan_strings+0x57b/0xe80
[   16.879035]  ? trace_hardirqs_on+0x37/0xe0
[   16.879079]  ? __pfx_kasan_strings+0x10/0x10
[   16.879104]  ? finish_task_switch.isra.0+0x153/0x700
[   16.879130]  ? __switch_to+0x47/0xf50
[   16.879159]  ? __schedule+0x10cc/0x2b60
[   16.879187]  ? __pfx_read_tsc+0x10/0x10
[   16.879229]  ? ktime_get_ts64+0x86/0x230
[   16.879259]  kunit_try_run_case+0x1a5/0x480
[   16.879286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.879321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.879359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.879404]  ? __kthread_parkme+0x82/0x180
[   16.879428]  ? preempt_count_sub+0x50/0x80
[   16.879463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.879491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.879532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.879559]  kthread+0x337/0x6f0
[   16.879595]  ? trace_preempt_on+0x20/0xc0
[   16.879623]  ? __pfx_kthread+0x10/0x10
[   16.879647]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.879671]  ? calculate_sigpending+0x7b/0xa0
[   16.879698]  ? __pfx_kthread+0x10/0x10
[   16.879794]  ret_from_fork+0x116/0x1d0
[   16.879819]  ? __pfx_kthread+0x10/0x10
[   16.879843]  ret_from_fork_asm+0x1a/0x30
[   16.879878]  </TASK>
[   16.879894] 
[   16.888502] Allocated by task 276:
[   16.888740]  kasan_save_stack+0x45/0x70
[   16.888875]  kasan_save_track+0x18/0x40
[   16.888973]  kasan_save_alloc_info+0x3b/0x50
[   16.889584]  __kasan_kmalloc+0xb7/0xc0
[   16.889911]  __kmalloc_cache_noprof+0x189/0x420
[   16.891156]  kasan_strings+0xc0/0xe80
[   16.891474]  kunit_try_run_case+0x1a5/0x480
[   16.892020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.892399]  kthread+0x337/0x6f0
[   16.892702]  ret_from_fork+0x116/0x1d0
[   16.893125]  ret_from_fork_asm+0x1a/0x30
[   16.893506] 
[   16.893620] Freed by task 276:
[   16.894279]  kasan_save_stack+0x45/0x70
[   16.894491]  kasan_save_track+0x18/0x40
[   16.894649]  kasan_save_free_info+0x3f/0x60
[   16.895479]  __kasan_slab_free+0x56/0x70
[   16.895757]  kfree+0x222/0x3f0
[   16.896059]  kasan_strings+0x2aa/0xe80
[   16.896196]  kunit_try_run_case+0x1a5/0x480
[   16.896512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.897008]  kthread+0x337/0x6f0
[   16.897178]  ret_from_fork+0x116/0x1d0
[   16.897494]  ret_from_fork_asm+0x1a/0x30
[   16.897919] 
[   16.898043] The buggy address belongs to the object at ffff888103349900
[   16.898043]  which belongs to the cache kmalloc-32 of size 32
[   16.898702] The buggy address is located 16 bytes inside of
[   16.898702]  freed 32-byte region [ffff888103349900, ffff888103349920)
[   16.899879] 
[   16.900034] The buggy address belongs to the physical page:
[   16.900209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.900400] flags: 0x200000000000000(node=0|zone=2)
[   16.901265] page_type: f5(slab)
[   16.901514] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.902258] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.902464] page dumped because: kasan: bad access detected
[   16.903004] 
[   16.903180] Memory state around the buggy address:
[   16.903576]  ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc
[   16.904567]  ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.904766] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.905129]                          ^
[   16.905319]  ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.905659]  ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.906137] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   16.846065] ==================================================================
[   16.846690] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   16.847774] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276
[   16.848558] 
[   16.848665] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.848725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.848740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.848765] Call Trace:
[   16.848789]  <TASK>
[   16.848814]  dump_stack_lvl+0x73/0xb0
[   16.848854]  print_report+0xd1/0x650
[   16.848880]  ? __virt_addr_valid+0x1db/0x2d0
[   16.849041]  ? kasan_strings+0xcbc/0xe80
[   16.849064]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.849088]  ? kasan_strings+0xcbc/0xe80
[   16.849111]  kasan_report+0x141/0x180
[   16.849134]  ? kasan_strings+0xcbc/0xe80
[   16.849163]  __asan_report_load1_noabort+0x18/0x20
[   16.849186]  kasan_strings+0xcbc/0xe80
[   16.849537]  ? trace_hardirqs_on+0x37/0xe0
[   16.849580]  ? __pfx_kasan_strings+0x10/0x10
[   16.849604]  ? finish_task_switch.isra.0+0x153/0x700
[   16.849630]  ? __switch_to+0x47/0xf50
[   16.849657]  ? __schedule+0x10cc/0x2b60
[   16.849684]  ? __pfx_read_tsc+0x10/0x10
[   16.849796]  ? ktime_get_ts64+0x86/0x230
[   16.849826]  kunit_try_run_case+0x1a5/0x480
[   16.849852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.849873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.849899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.849926]  ? __kthread_parkme+0x82/0x180
[   16.849948]  ? preempt_count_sub+0x50/0x80
[   16.849973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.849995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.850021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.850047]  kthread+0x337/0x6f0
[   16.850069]  ? trace_preempt_on+0x20/0xc0
[   16.850093]  ? __pfx_kthread+0x10/0x10
[   16.850116]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.850139]  ? calculate_sigpending+0x7b/0xa0
[   16.850166]  ? __pfx_kthread+0x10/0x10
[   16.850190]  ret_from_fork+0x116/0x1d0
[   16.850210]  ? __pfx_kthread+0x10/0x10
[   16.850232]  ret_from_fork_asm+0x1a/0x30
[   16.850267]  </TASK>
[   16.850280] 
[   16.860805] Allocated by task 276:
[   16.861742]  kasan_save_stack+0x45/0x70
[   16.862110]  kasan_save_track+0x18/0x40
[   16.862872]  kasan_save_alloc_info+0x3b/0x50
[   16.863166]  __kasan_kmalloc+0xb7/0xc0
[   16.863787]  __kmalloc_cache_noprof+0x189/0x420
[   16.864369]  kasan_strings+0xc0/0xe80
[   16.864571]  kunit_try_run_case+0x1a5/0x480
[   16.864692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.864827]  kthread+0x337/0x6f0
[   16.864927]  ret_from_fork+0x116/0x1d0
[   16.865033]  ret_from_fork_asm+0x1a/0x30
[   16.865156] 
[   16.865220] Freed by task 276:
[   16.865309]  kasan_save_stack+0x45/0x70
[   16.865413]  kasan_save_track+0x18/0x40
[   16.865612]  kasan_save_free_info+0x3f/0x60
[   16.865834]  __kasan_slab_free+0x56/0x70
[   16.866037]  kfree+0x222/0x3f0
[   16.866467]  kasan_strings+0x2aa/0xe80
[   16.867067]  kunit_try_run_case+0x1a5/0x480
[   16.867676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.868290]  kthread+0x337/0x6f0
[   16.868442]  ret_from_fork+0x116/0x1d0
[   16.868636]  ret_from_fork_asm+0x1a/0x30
[   16.868998] 
[   16.869288] The buggy address belongs to the object at ffff888103349900
[   16.869288]  which belongs to the cache kmalloc-32 of size 32
[   16.870363] The buggy address is located 16 bytes inside of
[   16.870363]  freed 32-byte region [ffff888103349900, ffff888103349920)
[   16.870907] 
[   16.871099] The buggy address belongs to the physical page:
[   16.871491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.872086] flags: 0x200000000000000(node=0|zone=2)
[   16.872224] page_type: f5(slab)
[   16.872493] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.872949] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.873245] page dumped because: kasan: bad access detected
[   16.873541] 
[   16.874031] Memory state around the buggy address:
[   16.874203]  ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc
[   16.874506]  ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.874814] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.875478]                          ^
[   16.875780]  ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.876014]  ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.876367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   16.816108] ==================================================================
[   16.817239] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   16.817432] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276
[   16.817726] 
[   16.817886] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.817948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.817962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.817988] Call Trace:
[   16.818007]  <TASK>
[   16.818031]  dump_stack_lvl+0x73/0xb0
[   16.818061]  print_report+0xd1/0x650
[   16.818091]  ? __virt_addr_valid+0x1db/0x2d0
[   16.818120]  ? strcmp+0xb0/0xc0
[   16.818141]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.818168]  ? strcmp+0xb0/0xc0
[   16.818188]  kasan_report+0x141/0x180
[   16.818212]  ? strcmp+0xb0/0xc0
[   16.818239]  __asan_report_load1_noabort+0x18/0x20
[   16.818353]  strcmp+0xb0/0xc0
[   16.818377]  kasan_strings+0x431/0xe80
[   16.818401]  ? trace_hardirqs_on+0x37/0xe0
[   16.818428]  ? __pfx_kasan_strings+0x10/0x10
[   16.818452]  ? finish_task_switch.isra.0+0x153/0x700
[   16.818494]  ? __switch_to+0x47/0xf50
[   16.818524]  ? __schedule+0x10cc/0x2b60
[   16.818551]  ? __pfx_read_tsc+0x10/0x10
[   16.818575]  ? ktime_get_ts64+0x86/0x230
[   16.818603]  kunit_try_run_case+0x1a5/0x480
[   16.818630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.818651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.818680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.818706]  ? __kthread_parkme+0x82/0x180
[   16.818730]  ? preempt_count_sub+0x50/0x80
[   16.818755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.818828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.818859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.818886]  kthread+0x337/0x6f0
[   16.818907]  ? trace_preempt_on+0x20/0xc0
[   16.818932]  ? __pfx_kthread+0x10/0x10
[   16.818954]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.818979]  ? calculate_sigpending+0x7b/0xa0
[   16.819007]  ? __pfx_kthread+0x10/0x10
[   16.819031]  ret_from_fork+0x116/0x1d0
[   16.819052]  ? __pfx_kthread+0x10/0x10
[   16.819075]  ret_from_fork_asm+0x1a/0x30
[   16.819111]  </TASK>
[   16.819124] 
[   16.829859] Allocated by task 276:
[   16.830332]  kasan_save_stack+0x45/0x70
[   16.830651]  kasan_save_track+0x18/0x40
[   16.830767]  kasan_save_alloc_info+0x3b/0x50
[   16.831179]  __kasan_kmalloc+0xb7/0xc0
[   16.831374]  __kmalloc_cache_noprof+0x189/0x420
[   16.831516]  kasan_strings+0xc0/0xe80
[   16.831881]  kunit_try_run_case+0x1a5/0x480
[   16.833013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.833265]  kthread+0x337/0x6f0
[   16.833508]  ret_from_fork+0x116/0x1d0
[   16.833819]  ret_from_fork_asm+0x1a/0x30
[   16.834488] 
[   16.834802] Freed by task 276:
[   16.835228]  kasan_save_stack+0x45/0x70
[   16.835487]  kasan_save_track+0x18/0x40
[   16.835603]  kasan_save_free_info+0x3f/0x60
[   16.835739]  __kasan_slab_free+0x56/0x70
[   16.836027]  kfree+0x222/0x3f0
[   16.836260]  kasan_strings+0x2aa/0xe80
[   16.836497]  kunit_try_run_case+0x1a5/0x480
[   16.836712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.836974]  kthread+0x337/0x6f0
[   16.837153]  ret_from_fork+0x116/0x1d0
[   16.837347]  ret_from_fork_asm+0x1a/0x30
[   16.837574] 
[   16.837641] The buggy address belongs to the object at ffff888103349900
[   16.837641]  which belongs to the cache kmalloc-32 of size 32
[   16.837902] The buggy address is located 16 bytes inside of
[   16.837902]  freed 32-byte region [ffff888103349900, ffff888103349920)
[   16.838407] 
[   16.838561] The buggy address belongs to the physical page:
[   16.839039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.839579] flags: 0x200000000000000(node=0|zone=2)
[   16.840992] page_type: f5(slab)
[   16.841330] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.841811] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.842351] page dumped because: kasan: bad access detected
[   16.842558] 
[   16.842705] Memory state around the buggy address:
[   16.842962]  ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc
[   16.843225]  ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.843426] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.843893]                          ^
[   16.844372]  ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.844779]  ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.845379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   13.686301] ==================================================================
[   13.687011] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   13.687492] Write of size 1 at addr ffff88810394a00a by task kunit_try_catch/163
[   13.688492] 
[   13.688681] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.689179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.689215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.689253] Call Trace:
[   13.689282]  <TASK>
[   13.689317]  dump_stack_lvl+0x73/0xb0
[   13.689398]  print_report+0xd1/0x650
[   13.689424]  ? __virt_addr_valid+0x1db/0x2d0
[   13.689451]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.689498]  ? kasan_addr_to_slab+0x11/0xa0
[   13.689521]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.689545]  kasan_report+0x141/0x180
[   13.689568]  ? kmalloc_large_oob_right+0x2e9/0x330
[   13.689596]  __asan_report_store1_noabort+0x1b/0x30
[   13.689618]  kmalloc_large_oob_right+0x2e9/0x330
[   13.689642]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   13.689666]  ? __schedule+0x10cc/0x2b60
[   13.689699]  ? __pfx_read_tsc+0x10/0x10
[   13.689735]  ? ktime_get_ts64+0x86/0x230
[   13.689777]  kunit_try_run_case+0x1a5/0x480
[   13.689816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.689842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.689868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.689893]  ? __kthread_parkme+0x82/0x180
[   13.689916]  ? preempt_count_sub+0x50/0x80
[   13.689941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.689963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.689988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.690013]  kthread+0x337/0x6f0
[   13.690034]  ? trace_preempt_on+0x20/0xc0
[   13.690059]  ? __pfx_kthread+0x10/0x10
[   13.690080]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.690104]  ? calculate_sigpending+0x7b/0xa0
[   13.690129]  ? __pfx_kthread+0x10/0x10
[   13.690153]  ret_from_fork+0x116/0x1d0
[   13.690173]  ? __pfx_kthread+0x10/0x10
[   13.690200]  ret_from_fork_asm+0x1a/0x30
[   13.690247]  </TASK>
[   13.690261] 
[   13.705636] The buggy address belongs to the physical page:
[   13.706105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948
[   13.706567] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.706889] flags: 0x200000000000040(head|node=0|zone=2)
[   13.707415] page_type: f8(unknown)
[   13.707754] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.708440] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.709190] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.709828] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.710115] head: 0200000000000002 ffffea00040e5201 00000000ffffffff 00000000ffffffff
[   13.710601] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.711296] page dumped because: kasan: bad access detected
[   13.711609] 
[   13.711902] Memory state around the buggy address:
[   13.712120]  ffff888103949f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.713180]  ffff888103949f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.713972] >ffff88810394a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.714507]                       ^
[   13.714678]  ffff88810394a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.715518]  ffff88810394a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.716097] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   13.639033] ==================================================================
[   13.639822] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   13.640991] Write of size 1 at addr ffff888102a45f00 by task kunit_try_catch/161
[   13.641820] 
[   13.642069] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.642203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.642228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.642268] Call Trace:
[   13.642296]  <TASK>
[   13.642339]  dump_stack_lvl+0x73/0xb0
[   13.642450]  print_report+0xd1/0x650
[   13.642533]  ? __virt_addr_valid+0x1db/0x2d0
[   13.642589]  ? kmalloc_big_oob_right+0x316/0x370
[   13.642636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.642683]  ? kmalloc_big_oob_right+0x316/0x370
[   13.642918]  kasan_report+0x141/0x180
[   13.642986]  ? kmalloc_big_oob_right+0x316/0x370
[   13.643035]  __asan_report_store1_noabort+0x1b/0x30
[   13.643074]  kmalloc_big_oob_right+0x316/0x370
[   13.643102]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   13.643128]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   13.643156]  kunit_try_run_case+0x1a5/0x480
[   13.643184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.643244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.643278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.643304]  ? __kthread_parkme+0x82/0x180
[   13.643330]  ? preempt_count_sub+0x50/0x80
[   13.643396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.643421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.643447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.643493]  kthread+0x337/0x6f0
[   13.643516]  ? trace_preempt_on+0x20/0xc0
[   13.643544]  ? __pfx_kthread+0x10/0x10
[   13.643566]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.643590]  ? calculate_sigpending+0x7b/0xa0
[   13.643616]  ? __pfx_kthread+0x10/0x10
[   13.643639]  ret_from_fork+0x116/0x1d0
[   13.643661]  ? __pfx_kthread+0x10/0x10
[   13.643687]  ret_from_fork_asm+0x1a/0x30
[   13.643770]  </TASK>
[   13.643793] 
[   13.656029] Allocated by task 161:
[   13.656404]  kasan_save_stack+0x45/0x70
[   13.656802]  kasan_save_track+0x18/0x40
[   13.657596]  kasan_save_alloc_info+0x3b/0x50
[   13.659155]  __kasan_kmalloc+0xb7/0xc0
[   13.659371]  __kmalloc_cache_noprof+0x189/0x420
[   13.660727]  kmalloc_big_oob_right+0xa9/0x370
[   13.662722]  kunit_try_run_case+0x1a5/0x480
[   13.663067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.663324]  kthread+0x337/0x6f0
[   13.664215]  ret_from_fork+0x116/0x1d0
[   13.664419]  ret_from_fork_asm+0x1a/0x30
[   13.665063] 
[   13.665545] The buggy address belongs to the object at ffff888102a44000
[   13.665545]  which belongs to the cache kmalloc-8k of size 8192
[   13.665950] The buggy address is located 0 bytes to the right of
[   13.665950]  allocated 7936-byte region [ffff888102a44000, ffff888102a45f00)
[   13.668080] 
[   13.668317] The buggy address belongs to the physical page:
[   13.669769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a40
[   13.670180] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.670476] flags: 0x200000000000040(head|node=0|zone=2)
[   13.670729] page_type: f5(slab)
[   13.670913] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   13.671154] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   13.671418] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   13.672308] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   13.672724] head: 0200000000000003 ffffea00040a9001 00000000ffffffff 00000000ffffffff
[   13.673400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   13.674002] page dumped because: kasan: bad access detected
[   13.674287] 
[   13.674410] Memory state around the buggy address:
[   13.674646]  ffff888102a45e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.675181]  ffff888102a45e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.675878] >ffff888102a45f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.677312]                    ^
[   13.678359]  ffff888102a45f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.679015]  ffff888102a46000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.679701] ==================================================================
<8>[  391.998977] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti KNOWN ISSUE - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti: Failure Automatically assigned
[  124.107986] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   52.190395] ==================================================================
[   52.190893] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0
[   52.190893] 
[   52.191252] Use-after-free read at 0x(____ptrval____) (in kfence-#160):
[   52.191702]  test_krealloc+0x6fc/0xbe0
[   52.191893]  kunit_try_run_case+0x1a5/0x480
[   52.192250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.192728]  kthread+0x337/0x6f0
[   52.192929]  ret_from_fork+0x116/0x1d0
[   52.193132]  ret_from_fork_asm+0x1a/0x30
[   52.193522] 
[   52.193752] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   52.193752] 
[   52.194431] allocated by task 354 on cpu 1 at 52.189384s (0.005041s ago):
[   52.194944]  test_alloc+0x364/0x10f0
[   52.195350]  test_krealloc+0xad/0xbe0
[   52.195567]  kunit_try_run_case+0x1a5/0x480
[   52.195953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.196195]  kthread+0x337/0x6f0
[   52.196387]  ret_from_fork+0x116/0x1d0
[   52.196758]  ret_from_fork_asm+0x1a/0x30
[   52.197138] 
[   52.197387] freed by task 354 on cpu 1 at 52.189915s (0.007467s ago):
[   52.197882]  krealloc_noprof+0x108/0x340
[   52.198302]  test_krealloc+0x226/0xbe0
[   52.198518]  kunit_try_run_case+0x1a5/0x480
[   52.198907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.199401]  kthread+0x337/0x6f0
[   52.199671]  ret_from_fork+0x116/0x1d0
[   52.199913]  ret_from_fork_asm+0x1a/0x30
[   52.200295] 
[   52.200580] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   52.201088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.201291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.201935] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   52.114991] ==================================================================
[   52.115496] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670
[   52.115496] 
[   52.116100] Use-after-free read at 0x(____ptrval____) (in kfence-#159):
[   52.116656]  test_memcache_typesafe_by_rcu+0x2ec/0x670
[   52.116953]  kunit_try_run_case+0x1a5/0x480
[   52.117152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.117693]  kthread+0x337/0x6f0
[   52.118062]  ret_from_fork+0x116/0x1d0
[   52.118440]  ret_from_fork_asm+0x1a/0x30
[   52.118688] 
[   52.118821] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   52.118821] 
[   52.119660] allocated by task 352 on cpu 1 at 52.085221s (0.034432s ago):
[   52.120293]  test_alloc+0x2a6/0x10f0
[   52.120645]  test_memcache_typesafe_by_rcu+0x16f/0x670
[   52.121006]  kunit_try_run_case+0x1a5/0x480
[   52.121482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.121887]  kthread+0x337/0x6f0
[   52.122326]  ret_from_fork+0x116/0x1d0
[   52.122654]  ret_from_fork_asm+0x1a/0x30
[   52.122959] 
[   52.123232] freed by task 352 on cpu 1 at 52.085391s (0.037835s ago):
[   52.123844]  test_memcache_typesafe_by_rcu+0x1bf/0x670
[   52.124253]  kunit_try_run_case+0x1a5/0x480
[   52.124650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   52.124965]  kthread+0x337/0x6f0
[   52.125349]  ret_from_fork+0x116/0x1d0
[   52.125676]  ret_from_fork_asm+0x1a/0x30
[   52.125922] 
[   52.126167] CPU: 1 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   52.126733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.127089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.127721] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   27.561407] ==================================================================
[   27.562045] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210
[   27.562045] 
[   27.563012] Invalid read at 0x(____ptrval____):
[   27.563496]  test_invalid_access+0xf0/0x210
[   27.563916]  kunit_try_run_case+0x1a5/0x480
[   27.564151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.564481]  kthread+0x337/0x6f0
[   27.564812]  ret_from_fork+0x116/0x1d0
[   27.565152]  ret_from_fork_asm+0x1a/0x30
[   27.565982] 
[   27.566257] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   27.567055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.568058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.569080] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   27.333814] ==================================================================
[   27.334246] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.334246] 
[   27.334589] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#153):
[   27.336287]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.336721]  kunit_try_run_case+0x1a5/0x480
[   27.337029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.337478]  kthread+0x337/0x6f0
[   27.337765]  ret_from_fork+0x116/0x1d0
[   27.338127]  ret_from_fork_asm+0x1a/0x30
[   27.338523] 
[   27.338657] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   27.338657] 
[   27.339594] allocated by task 342 on cpu 1 at 27.333391s (0.006197s ago):
[   27.340015]  test_alloc+0x364/0x10f0
[   27.340421]  test_kmalloc_aligned_oob_write+0xc8/0x340
[   27.340913]  kunit_try_run_case+0x1a5/0x480
[   27.341311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.341707]  kthread+0x337/0x6f0
[   27.342067]  ret_from_fork+0x116/0x1d0
[   27.342382]  ret_from_fork_asm+0x1a/0x30
[   27.342781] 
[   27.342964] freed by task 342 on cpu 1 at 27.333613s (0.009344s ago):
[   27.343539]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   27.343948]  kunit_try_run_case+0x1a5/0x480
[   27.344418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.344785]  kthread+0x337/0x6f0
[   27.345102]  ret_from_fork+0x116/0x1d0
[   27.345512]  ret_from_fork_asm+0x1a/0x30
[   27.345822] 
[   27.346017] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   27.346915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.347221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.347747] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   27.229575] ==================================================================
[   27.230021] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560
[   27.230021] 
[   27.230412] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#152):
[   27.231044]  test_kmalloc_aligned_oob_read+0x27e/0x560
[   27.231495]  kunit_try_run_case+0x1a5/0x480
[   27.231723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.232172]  kthread+0x337/0x6f0
[   27.232462]  ret_from_fork+0x116/0x1d0
[   27.232743]  ret_from_fork_asm+0x1a/0x30
[   27.233063] 
[   27.233235] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   27.233235] 
[   27.233717] allocated by task 340 on cpu 0 at 27.229266s (0.004445s ago):
[   27.234217]  test_alloc+0x364/0x10f0
[   27.234588]  test_kmalloc_aligned_oob_read+0x105/0x560
[   27.234979]  kunit_try_run_case+0x1a5/0x480
[   27.235435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.235764]  kthread+0x337/0x6f0
[   27.236096]  ret_from_fork+0x116/0x1d0
[   27.236370]  ret_from_fork_asm+0x1a/0x30
[   27.236826] 
[   27.237082] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   27.237546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.237908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.238738] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   22.237563] ==================================================================
[   22.238017] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0
[   22.238017] 
[   22.238306] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#104):
[   22.239605]  test_corruption+0x131/0x3e0
[   22.239939]  kunit_try_run_case+0x1a5/0x480
[   22.240180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.240625]  kthread+0x337/0x6f0
[   22.241021]  ret_from_fork+0x116/0x1d0
[   22.241329]  ret_from_fork_asm+0x1a/0x30
[   22.241610] 
[   22.241771] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   22.241771] 
[   22.242376] allocated by task 330 on cpu 1 at 22.237319s (0.005051s ago):
[   22.242901]  test_alloc+0x2a6/0x10f0
[   22.243095]  test_corruption+0xe6/0x3e0
[   22.244196]  kunit_try_run_case+0x1a5/0x480
[   22.244666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.245067]  kthread+0x337/0x6f0
[   22.245640]  ret_from_fork+0x116/0x1d0
[   22.245887]  ret_from_fork_asm+0x1a/0x30
[   22.246109] 
[   22.246565] freed by task 330 on cpu 1 at 22.237419s (0.009137s ago):
[   22.247019]  test_corruption+0x131/0x3e0
[   22.247204]  kunit_try_run_case+0x1a5/0x480
[   22.247619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.247917]  kthread+0x337/0x6f0
[   22.248168]  ret_from_fork+0x116/0x1d0
[   22.248564]  ret_from_fork_asm+0x1a/0x30
[   22.248862] 
[   22.249091] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   22.249878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.250087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.250693] ==================================================================
[   22.653544] ==================================================================
[   22.654000] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0
[   22.654000] 
[   22.654287] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#108):
[   22.654930]  test_corruption+0x216/0x3e0
[   22.655312]  kunit_try_run_case+0x1a5/0x480
[   22.655595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.655973]  kthread+0x337/0x6f0
[   22.656245]  ret_from_fork+0x116/0x1d0
[   22.656480]  ret_from_fork_asm+0x1a/0x30
[   22.656744] 
[   22.656913] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   22.656913] 
[   22.657643] allocated by task 330 on cpu 1 at 22.653315s (0.004323s ago):
[   22.658229]  test_alloc+0x2a6/0x10f0
[   22.658483]  test_corruption+0x1cb/0x3e0
[   22.658756]  kunit_try_run_case+0x1a5/0x480
[   22.659101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.659484]  kthread+0x337/0x6f0
[   22.659679]  ret_from_fork+0x116/0x1d0
[   22.659874]  ret_from_fork_asm+0x1a/0x30
[   22.660116] 
[   22.660283] freed by task 330 on cpu 1 at 22.653400s (0.006878s ago):
[   22.660865]  test_corruption+0x216/0x3e0
[   22.661221]  kunit_try_run_case+0x1a5/0x480
[   22.661594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.661949]  kthread+0x337/0x6f0
[   22.662106]  ret_from_fork+0x116/0x1d0
[   22.662298]  ret_from_fork_asm+0x1a/0x30
[   22.662519] 
[   22.662698] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   22.663175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.663466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.664011] ==================================================================
[   22.029764] ==================================================================
[   22.030197] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0
[   22.030197] 
[   22.030539] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#102):
[   22.031195]  test_corruption+0x2df/0x3e0
[   22.031430]  kunit_try_run_case+0x1a5/0x480
[   22.031653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.032175]  kthread+0x337/0x6f0
[   22.032501]  ret_from_fork+0x116/0x1d0
[   22.032796]  ret_from_fork_asm+0x1a/0x30
[   22.033132] 
[   22.033260] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   22.033260] 
[   22.033632] allocated by task 328 on cpu 0 at 22.029358s (0.004270s ago):
[   22.034306]  test_alloc+0x364/0x10f0
[   22.034645]  test_corruption+0x1cb/0x3e0
[   22.034997]  kunit_try_run_case+0x1a5/0x480
[   22.035227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.035621]  kthread+0x337/0x6f0
[   22.035811]  ret_from_fork+0x116/0x1d0
[   22.036007]  ret_from_fork_asm+0x1a/0x30
[   22.036352] 
[   22.036567] freed by task 328 on cpu 0 at 22.029521s (0.007041s ago):
[   22.037053]  test_corruption+0x2df/0x3e0
[   22.037501]  kunit_try_run_case+0x1a5/0x480
[   22.037862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.038254]  kthread+0x337/0x6f0
[   22.038438]  ret_from_fork+0x116/0x1d0
[   22.038769]  ret_from_fork_asm+0x1a/0x30
[   22.039018] 
[   22.039207] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   22.039985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.040320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.040928] ==================================================================
[   21.925727] ==================================================================
[   21.926160] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0
[   21.926160] 
[   21.926903] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#101):
[   21.928706]  test_corruption+0x2d2/0x3e0
[   21.929019]  kunit_try_run_case+0x1a5/0x480
[   21.929587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.929854]  kthread+0x337/0x6f0
[   21.930331]  ret_from_fork+0x116/0x1d0
[   21.930605]  ret_from_fork_asm+0x1a/0x30
[   21.930886] 
[   21.931027] kfence-#101: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   21.931027] 
[   21.931903] allocated by task 328 on cpu 0 at 21.925434s (0.006462s ago):
[   21.932517]  test_alloc+0x364/0x10f0
[   21.932713]  test_corruption+0xe6/0x3e0
[   21.933056]  kunit_try_run_case+0x1a5/0x480
[   21.933285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.933608]  kthread+0x337/0x6f0
[   21.933920]  ret_from_fork+0x116/0x1d0
[   21.934330]  ret_from_fork_asm+0x1a/0x30
[   21.934719] 
[   21.934925] freed by task 328 on cpu 0 at 21.925584s (0.009336s ago):
[   21.935319]  test_corruption+0x2d2/0x3e0
[   21.935714]  kunit_try_run_case+0x1a5/0x480
[   21.936074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.936436]  kthread+0x337/0x6f0
[   21.936785]  ret_from_fork+0x116/0x1d0
[   21.937149]  ret_from_fork_asm+0x1a/0x30
[   21.937489] 
[   21.937750] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.938383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.938756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.939407] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   21.821465] ==================================================================
[   21.821910] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260
[   21.821910] 
[   21.822205] Invalid free of 0x(____ptrval____) (in kfence-#100):
[   21.823068]  test_invalid_addr_free+0xfb/0x260
[   21.823396]  kunit_try_run_case+0x1a5/0x480
[   21.823620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.824007]  kthread+0x337/0x6f0
[   21.824408]  ret_from_fork+0x116/0x1d0
[   21.824768]  ret_from_fork_asm+0x1a/0x30
[   21.825105] 
[   21.825234] kfence-#100: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   21.825234] 
[   21.825909] allocated by task 326 on cpu 1 at 21.821259s (0.004645s ago):
[   21.826327]  test_alloc+0x2a6/0x10f0
[   21.826619]  test_invalid_addr_free+0xdb/0x260
[   21.827003]  kunit_try_run_case+0x1a5/0x480
[   21.827380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.827756]  kthread+0x337/0x6f0
[   21.827949]  ret_from_fork+0x116/0x1d0
[   21.828148]  ret_from_fork_asm+0x1a/0x30
[   21.828506] 
[   21.828795] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.829762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.830081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.830673] ==================================================================
[   21.717540] ==================================================================
[   21.718076] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260
[   21.718076] 
[   21.719221] Invalid free of 0x(____ptrval____) (in kfence-#99):
[   21.719787]  test_invalid_addr_free+0x1e1/0x260
[   21.720150]  kunit_try_run_case+0x1a5/0x480
[   21.720508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.720863]  kthread+0x337/0x6f0
[   21.721122]  ret_from_fork+0x116/0x1d0
[   21.721484]  ret_from_fork_asm+0x1a/0x30
[   21.721718] 
[   21.721837] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   21.721837] 
[   21.722466] allocated by task 324 on cpu 0 at 21.717306s (0.005143s ago):
[   21.722890]  test_alloc+0x364/0x10f0
[   21.723327]  test_invalid_addr_free+0xdb/0x260
[   21.723772]  kunit_try_run_case+0x1a5/0x480
[   21.724041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.724656]  kthread+0x337/0x6f0
[   21.724903]  ret_from_fork+0x116/0x1d0
[   21.725290]  ret_from_fork_asm+0x1a/0x30
[   21.725643] 
[   21.726007] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.726797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.727102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.727669] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   21.509697] ==================================================================
[   21.510223] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260
[   21.510223] 
[   21.510633] Invalid free of 0x(____ptrval____) (in kfence-#97):
[   21.511964]  test_double_free+0x1d3/0x260
[   21.512451]  kunit_try_run_case+0x1a5/0x480
[   21.512889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.513323]  kthread+0x337/0x6f0
[   21.513609]  ret_from_fork+0x116/0x1d0
[   21.513934]  ret_from_fork_asm+0x1a/0x30
[   21.514242] 
[   21.514466] kfence-#97: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   21.514466] 
[   21.514895] allocated by task 320 on cpu 0 at 21.509370s (0.005519s ago):
[   21.515519]  test_alloc+0x364/0x10f0
[   21.515769]  test_double_free+0xdb/0x260
[   21.516136]  kunit_try_run_case+0x1a5/0x480
[   21.516425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.516910]  kthread+0x337/0x6f0
[   21.517107]  ret_from_fork+0x116/0x1d0
[   21.517308]  ret_from_fork_asm+0x1a/0x30
[   21.517688] 
[   21.518322] freed by task 320 on cpu 0 at 21.509476s (0.008840s ago):
[   21.518801]  test_double_free+0x1e0/0x260
[   21.519019]  kunit_try_run_case+0x1a5/0x480
[   21.519445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.519907]  kthread+0x337/0x6f0
[   21.520296]  ret_from_fork+0x116/0x1d0
[   21.520649]  ret_from_fork_asm+0x1a/0x30
[   21.521013] 
[   21.521281] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.521922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.522131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.523135] ==================================================================
[   21.613795] ==================================================================
[   21.614279] BUG: KFENCE: invalid free in test_double_free+0x112/0x260
[   21.614279] 
[   21.614973] Invalid free of 0x(____ptrval____) (in kfence-#98):
[   21.615225]  test_double_free+0x112/0x260
[   21.615439]  kunit_try_run_case+0x1a5/0x480
[   21.615653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.615870]  kthread+0x337/0x6f0
[   21.616037]  ret_from_fork+0x116/0x1d0
[   21.616204]  ret_from_fork_asm+0x1a/0x30
[   21.616378] 
[   21.616512] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   21.616512] 
[   21.617210] allocated by task 322 on cpu 1 at 21.613485s (0.003719s ago):
[   21.617552]  test_alloc+0x2a6/0x10f0
[   21.617738]  test_double_free+0xdb/0x260
[   21.617927]  kunit_try_run_case+0x1a5/0x480
[   21.618118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.618346]  kthread+0x337/0x6f0
[   21.618695]  ret_from_fork+0x116/0x1d0
[   21.619587]  ret_from_fork_asm+0x1a/0x30
[   21.620141] 
[   21.622869] freed by task 322 on cpu 1 at 21.613584s (0.009277s ago):
[   21.623870]  test_double_free+0xfa/0x260
[   21.624154]  kunit_try_run_case+0x1a5/0x480
[   21.624905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.625380]  kthread+0x337/0x6f0
[   21.625600]  ret_from_fork+0x116/0x1d0
[   21.626047]  ret_from_fork_asm+0x1a/0x30
[   21.626333] 
[   21.626904] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.627848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.628146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.628918] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   21.197528] ==================================================================
[   21.197991] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   21.197991] 
[   21.198371] Use-after-free read at 0x(____ptrval____) (in kfence-#94):
[   21.198914]  test_use_after_free_read+0x129/0x270
[   21.199212]  kunit_try_run_case+0x1a5/0x480
[   21.199713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.200094]  kthread+0x337/0x6f0
[   21.200463]  ret_from_fork+0x116/0x1d0
[   21.200743]  ret_from_fork_asm+0x1a/0x30
[   21.201021] 
[   21.201180] kfence-#94: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   21.201180] 
[   21.201893] allocated by task 314 on cpu 1 at 21.197287s (0.004601s ago):
[   21.202663]  test_alloc+0x2a6/0x10f0
[   21.202894]  test_use_after_free_read+0xdc/0x270
[   21.203118]  kunit_try_run_case+0x1a5/0x480
[   21.203544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.204019]  kthread+0x337/0x6f0
[   21.204307]  ret_from_fork+0x116/0x1d0
[   21.204573]  ret_from_fork_asm+0x1a/0x30
[   21.204993] 
[   21.205188] freed by task 314 on cpu 1 at 21.197388s (0.007795s ago):
[   21.205656]  test_use_after_free_read+0xfb/0x270
[   21.205926]  kunit_try_run_case+0x1a5/0x480
[   21.206294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.206736]  kthread+0x337/0x6f0
[   21.207161]  ret_from_fork+0x116/0x1d0
[   21.207480]  ret_from_fork_asm+0x1a/0x30
[   21.207699] 
[   21.207939] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.209074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.209409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.209943] ==================================================================
[   21.094659] ==================================================================
[   21.095328] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   21.095328] 
[   21.096005] Use-after-free read at 0x(____ptrval____) (in kfence-#93):
[   21.096571]  test_use_after_free_read+0x129/0x270
[   21.096965]  kunit_try_run_case+0x1a5/0x480
[   21.097184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.097865]  kthread+0x337/0x6f0
[   21.098443]  ret_from_fork+0x116/0x1d0
[   21.099133]  ret_from_fork_asm+0x1a/0x30
[   21.099681] 
[   21.099846] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   21.099846] 
[   21.101158] allocated by task 312 on cpu 1 at 21.094266s (0.006886s ago):
[   21.101569]  test_alloc+0x364/0x10f0
[   21.101938]  test_use_after_free_read+0xdc/0x270
[   21.102385]  kunit_try_run_case+0x1a5/0x480
[   21.102805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.103052]  kthread+0x337/0x6f0
[   21.103468]  ret_from_fork+0x116/0x1d0
[   21.103832]  ret_from_fork_asm+0x1a/0x30
[   21.104055] 
[   21.104184] freed by task 312 on cpu 1 at 21.094392s (0.009789s ago):
[   21.104444]  test_use_after_free_read+0x1e7/0x270
[   21.104723]  kunit_try_run_case+0x1a5/0x480
[   21.104950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.105903]  kthread+0x337/0x6f0
[   21.106271]  ret_from_fork+0x116/0x1d0
[   21.106737]  ret_from_fork_asm+0x1a/0x30
[   21.107333] 
[   21.107539] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   21.108214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.108504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.109053] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   20.989449] ==================================================================
[   20.990112] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   20.990112] 
[   20.990903] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#92):
[   20.991396]  test_out_of_bounds_write+0x10d/0x260
[   20.991642]  kunit_try_run_case+0x1a5/0x480
[   20.992009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.993038]  kthread+0x337/0x6f0
[   20.993474]  ret_from_fork+0x116/0x1d0
[   20.993727]  ret_from_fork_asm+0x1a/0x30
[   20.993948] 
[   20.994066] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   20.994066] 
[   20.995286] allocated by task 310 on cpu 0 at 20.989354s (0.005925s ago):
[   20.996088]  test_alloc+0x2a6/0x10f0
[   20.996484]  test_out_of_bounds_write+0xd4/0x260
[   20.996775]  kunit_try_run_case+0x1a5/0x480
[   20.997018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.997681]  kthread+0x337/0x6f0
[   20.997918]  ret_from_fork+0x116/0x1d0
[   20.998138]  ret_from_fork_asm+0x1a/0x30
[   20.998807] 
[   20.999277] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.999962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.000178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.000898] ==================================================================
[   20.885520] ==================================================================
[   20.886064] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   20.886064] 
[   20.886644] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#91):
[   20.887097]  test_out_of_bounds_write+0x10d/0x260
[   20.887409]  kunit_try_run_case+0x1a5/0x480
[   20.887843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.888263]  kthread+0x337/0x6f0
[   20.888531]  ret_from_fork+0x116/0x1d0
[   20.888872]  ret_from_fork_asm+0x1a/0x30
[   20.889095] 
[   20.889279] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   20.889279] 
[   20.890122] allocated by task 308 on cpu 1 at 20.885311s (0.004804s ago):
[   20.890613]  test_alloc+0x364/0x10f0
[   20.891120]  test_out_of_bounds_write+0xd4/0x260
[   20.891530]  kunit_try_run_case+0x1a5/0x480
[   20.891866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.892124]  kthread+0x337/0x6f0
[   20.892465]  ret_from_fork+0x116/0x1d0
[   20.892958]  ret_from_fork_asm+0x1a/0x30
[   20.893361] 
[   20.893617] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.894165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.894560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.895323] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   20.781681] ==================================================================
[   20.782213] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   20.782213] 
[   20.782748] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#90):
[   20.783240]  test_out_of_bounds_read+0x216/0x4e0
[   20.783545]  kunit_try_run_case+0x1a5/0x480
[   20.783754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.784065]  kthread+0x337/0x6f0
[   20.784388]  ret_from_fork+0x116/0x1d0
[   20.784999]  ret_from_fork_asm+0x1a/0x30
[   20.785433] 
[   20.785654] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   20.785654] 
[   20.786255] allocated by task 306 on cpu 0 at 20.781585s (0.004664s ago):
[   20.786931]  test_alloc+0x2a6/0x10f0
[   20.787171]  test_out_of_bounds_read+0x1e2/0x4e0
[   20.787622]  kunit_try_run_case+0x1a5/0x480
[   20.787871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.788119]  kthread+0x337/0x6f0
[   20.788336]  ret_from_fork+0x116/0x1d0
[   20.788685]  ret_from_fork_asm+0x1a/0x30
[   20.789103] 
[   20.789339] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.790195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.790474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.791020] ==================================================================
[   20.677413] ==================================================================
[   20.677990] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   20.677990] 
[   20.678616] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#89):
[   20.679102]  test_out_of_bounds_read+0x126/0x4e0
[   20.679430]  kunit_try_run_case+0x1a5/0x480
[   20.680022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.680587]  kthread+0x337/0x6f0
[   20.680967]  ret_from_fork+0x116/0x1d0
[   20.681552]  ret_from_fork_asm+0x1a/0x30
[   20.682038] 
[   20.682331] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   20.682331] 
[   20.682906] allocated by task 306 on cpu 0 at 20.677304s (0.005595s ago):
[   20.683692]  test_alloc+0x2a6/0x10f0
[   20.684137]  test_out_of_bounds_read+0xed/0x4e0
[   20.684583]  kunit_try_run_case+0x1a5/0x480
[   20.684885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.685282]  kthread+0x337/0x6f0
[   20.685673]  ret_from_fork+0x116/0x1d0
[   20.686064]  ret_from_fork_asm+0x1a/0x30
[   20.686353] 
[   20.686680] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.687542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.687921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.688561] ==================================================================
[   20.158597] ==================================================================
[   20.159164] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   20.159164] 
[   20.159935] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#84):
[   20.160616]  test_out_of_bounds_read+0x126/0x4e0
[   20.160935]  kunit_try_run_case+0x1a5/0x480
[   20.161241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.161529]  kthread+0x337/0x6f0
[   20.161710]  ret_from_fork+0x116/0x1d0
[   20.161902]  ret_from_fork_asm+0x1a/0x30
[   20.162116] 
[   20.162269] kfence-#84: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   20.162269] 
[   20.163016] allocated by task 304 on cpu 1 at 20.157312s (0.005698s ago):
[   20.163803]  test_alloc+0x364/0x10f0
[   20.164182]  test_out_of_bounds_read+0xed/0x4e0
[   20.164604]  kunit_try_run_case+0x1a5/0x480
[   20.164985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.165316]  kthread+0x337/0x6f0
[   20.165591]  ret_from_fork+0x116/0x1d0
[   20.165825]  ret_from_fork_asm+0x1a/0x30
[   20.166124] 
[   20.166367] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.167248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.167520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.167863] ==================================================================
[   20.573498] ==================================================================
[   20.573893] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   20.573893] 
[   20.574176] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#88):
[   20.574666]  test_out_of_bounds_read+0x216/0x4e0
[   20.574952]  kunit_try_run_case+0x1a5/0x480
[   20.575269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.575465]  kthread+0x337/0x6f0
[   20.575786]  ret_from_fork+0x116/0x1d0
[   20.576013]  ret_from_fork_asm+0x1a/0x30
[   20.576126] 
[   20.576193] kfence-#88: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   20.576193] 
[   20.576782] allocated by task 304 on cpu 1 at 20.573268s (0.003510s ago):
[   20.577177]  test_alloc+0x364/0x10f0
[   20.577362]  test_out_of_bounds_read+0x1e2/0x4e0
[   20.577493]  kunit_try_run_case+0x1a5/0x480
[   20.577810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.578115]  kthread+0x337/0x6f0
[   20.578329]  ret_from_fork+0x116/0x1d0
[   20.578434]  ret_from_fork_asm+0x1a/0x30
[   20.578720] 
[   20.578853] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   20.579164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.579521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.579794] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   13.611243] ==================================================================
[   13.612878] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520
[   13.612878] 
[   13.613794] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#50):
[   13.616227]  kmalloc_track_caller_oob_right+0x288/0x520
[   13.616941]  kunit_try_run_case+0x1a5/0x480
[   13.617204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.618201]  kthread+0x337/0x6f0
[   13.618495]  ret_from_fork+0x116/0x1d0
[   13.618671]  ret_from_fork_asm+0x1a/0x30
[   13.619314] 
[   13.620215] kfence-#50: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   13.620215] 
[   13.621269] allocated by task 159 on cpu 1 at 13.607371s (0.013768s ago):
[   13.622501]  kmalloc_track_caller_oob_right+0x19a/0x520
[   13.623026]  kunit_try_run_case+0x1a5/0x480
[   13.623233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.623913]  kthread+0x337/0x6f0
[   13.624431]  ret_from_fork+0x116/0x1d0
[   13.624801]  ret_from_fork_asm+0x1a/0x30
[   13.625487] 
[   13.625907] freed by task 159 on cpu 1 at 13.610447s (0.015305s ago):
[   13.626485]  kmalloc_track_caller_oob_right+0x288/0x520
[   13.626841]  kunit_try_run_case+0x1a5/0x480
[   13.627151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.628380]  kthread+0x337/0x6f0
[   13.628770]  ret_from_fork+0x116/0x1d0
[   13.629234]  ret_from_fork_asm+0x1a/0x30
[   13.629838] 
[   13.630362] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.631681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.632030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.632342] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   16.784983] ==================================================================
[   16.785448] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   16.785905] Read of size 1 at addr ffff888103349898 by task kunit_try_catch/274
[   16.786905] 
[   16.787166] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.787238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.787260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.787288] Call Trace:
[   16.787306]  <TASK>
[   16.787332]  dump_stack_lvl+0x73/0xb0
[   16.787406]  print_report+0xd1/0x650
[   16.787435]  ? __virt_addr_valid+0x1db/0x2d0
[   16.787479]  ? memcmp+0x1b4/0x1d0
[   16.787502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.787573]  ? memcmp+0x1b4/0x1d0
[   16.787645]  kasan_report+0x141/0x180
[   16.787734]  ? memcmp+0x1b4/0x1d0
[   16.787774]  __asan_report_load1_noabort+0x18/0x20
[   16.787801]  memcmp+0x1b4/0x1d0
[   16.787825]  kasan_memcmp+0x18f/0x390
[   16.787851]  ? __pfx_kasan_memcmp+0x10/0x10
[   16.787874]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.787911]  ? __pfx_kasan_memcmp+0x10/0x10
[   16.787942]  kunit_try_run_case+0x1a5/0x480
[   16.787967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.787989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.788017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.788044]  ? __kthread_parkme+0x82/0x180
[   16.788069]  ? preempt_count_sub+0x50/0x80
[   16.788095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.788118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.788144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.788171]  kthread+0x337/0x6f0
[   16.788192]  ? trace_preempt_on+0x20/0xc0
[   16.788239]  ? __pfx_kthread+0x10/0x10
[   16.788267]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.788293]  ? calculate_sigpending+0x7b/0xa0
[   16.788321]  ? __pfx_kthread+0x10/0x10
[   16.788345]  ret_from_fork+0x116/0x1d0
[   16.788369]  ? __pfx_kthread+0x10/0x10
[   16.788393]  ret_from_fork_asm+0x1a/0x30
[   16.788429]  </TASK>
[   16.788444] 
[   16.797137] Allocated by task 274:
[   16.797509]  kasan_save_stack+0x45/0x70
[   16.797936]  kasan_save_track+0x18/0x40
[   16.798149]  kasan_save_alloc_info+0x3b/0x50
[   16.798431]  __kasan_kmalloc+0xb7/0xc0
[   16.798674]  __kmalloc_cache_noprof+0x189/0x420
[   16.799026]  kasan_memcmp+0xb7/0x390
[   16.799207]  kunit_try_run_case+0x1a5/0x480
[   16.799518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.800475]  kthread+0x337/0x6f0
[   16.800633]  ret_from_fork+0x116/0x1d0
[   16.800749]  ret_from_fork_asm+0x1a/0x30
[   16.801473] 
[   16.801601] The buggy address belongs to the object at ffff888103349880
[   16.801601]  which belongs to the cache kmalloc-32 of size 32
[   16.802302] The buggy address is located 0 bytes to the right of
[   16.802302]  allocated 24-byte region [ffff888103349880, ffff888103349898)
[   16.802854] 
[   16.803020] The buggy address belongs to the physical page:
[   16.803269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.803519] flags: 0x200000000000000(node=0|zone=2)
[   16.803902] page_type: f5(slab)
[   16.804062] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   16.804476] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.805111] page dumped because: kasan: bad access detected
[   16.805406] 
[   16.805514] Memory state around the buggy address:
[   16.805640]  ffff888103349780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.806090]  ffff888103349800: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   16.806394] >ffff888103349880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806710]                             ^
[   16.806824]  ffff888103349900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.807421]  ffff888103349980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.807672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   16.752183] ==================================================================
[   16.752787] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   16.753512] Read of size 1 at addr ffff8881039c7c4a by task kunit_try_catch/270
[   16.754207] 
[   16.754535] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.754612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.754629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.754689] Call Trace:
[   16.754722]  <TASK>
[   16.754750]  dump_stack_lvl+0x73/0xb0
[   16.754810]  print_report+0xd1/0x650
[   16.754838]  ? __virt_addr_valid+0x1db/0x2d0
[   16.754866]  ? kasan_alloca_oob_right+0x329/0x390
[   16.754892]  ? kasan_addr_to_slab+0x11/0xa0
[   16.754916]  ? kasan_alloca_oob_right+0x329/0x390
[   16.754942]  kasan_report+0x141/0x180
[   16.754967]  ? kasan_alloca_oob_right+0x329/0x390
[   16.754997]  __asan_report_load1_noabort+0x18/0x20
[   16.755020]  kasan_alloca_oob_right+0x329/0x390
[   16.755046]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.755071]  ? finish_task_switch.isra.0+0x153/0x700
[   16.755097]  ? __ww_mutex_lock.constprop.0+0xc5e/0x1e90
[   16.755122]  ? trace_hardirqs_on+0x37/0xe0
[   16.755149]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   16.755176]  ? __schedule+0x10cc/0x2b60
[   16.755201]  ? __pfx_read_tsc+0x10/0x10
[   16.755242]  ? ktime_get_ts64+0x86/0x230
[   16.755273]  kunit_try_run_case+0x1a5/0x480
[   16.755300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.755322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.755365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.755402]  ? __kthread_parkme+0x82/0x180
[   16.755426]  ? preempt_count_sub+0x50/0x80
[   16.755451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.755497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.755526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.755553]  kthread+0x337/0x6f0
[   16.755577]  ? trace_preempt_on+0x20/0xc0
[   16.755602]  ? __pfx_kthread+0x10/0x10
[   16.755625]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.755650]  ? calculate_sigpending+0x7b/0xa0
[   16.755679]  ? __pfx_kthread+0x10/0x10
[   16.755703]  ret_from_fork+0x116/0x1d0
[   16.755726]  ? __pfx_kthread+0x10/0x10
[   16.755747]  ret_from_fork_asm+0x1a/0x30
[   16.755781]  </TASK>
[   16.755795] 
[   16.765241] The buggy address belongs to stack of task kunit_try_catch/270
[   16.765724] 
[   16.765849] The buggy address belongs to the physical page:
[   16.766144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c7
[   16.766770] flags: 0x200000000000000(node=0|zone=2)
[   16.767048] raw: 0200000000000000 ffffea00040e71c8 ffffea00040e71c8 0000000000000000
[   16.767292] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.767756] page dumped because: kasan: bad access detected
[   16.768075] 
[   16.768207] Memory state around the buggy address:
[   16.768520]  ffff8881039c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.768898]  ffff8881039c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.769402] >ffff8881039c7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   16.769845]                                               ^
[   16.770154]  ffff8881039c7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   16.770479]  ffff8881039c7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.770676] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   16.727637] ==================================================================
[   16.728296] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   16.728777] Read of size 1 at addr ffff888103a1fc3f by task kunit_try_catch/268
[   16.729225] 
[   16.729409] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.729489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.729506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.729544] Call Trace:
[   16.729563]  <TASK>
[   16.729589]  dump_stack_lvl+0x73/0xb0
[   16.729634]  print_report+0xd1/0x650
[   16.729666]  ? __virt_addr_valid+0x1db/0x2d0
[   16.729694]  ? kasan_alloca_oob_left+0x320/0x380
[   16.729793]  ? kasan_addr_to_slab+0x11/0xa0
[   16.729819]  ? kasan_alloca_oob_left+0x320/0x380
[   16.729861]  kasan_report+0x141/0x180
[   16.729888]  ? kasan_alloca_oob_left+0x320/0x380
[   16.729919]  __asan_report_load1_noabort+0x18/0x20
[   16.729943]  kasan_alloca_oob_left+0x320/0x380
[   16.729971]  ? finish_task_switch.isra.0+0x153/0x700
[   16.729997]  ? __ww_mutex_lock.constprop.0+0xc5e/0x1e90
[   16.730024]  ? trace_hardirqs_on+0x37/0xe0
[   16.730052]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   16.730080]  ? __schedule+0x10cc/0x2b60
[   16.730105]  ? __pfx_read_tsc+0x10/0x10
[   16.730142]  ? ktime_get_ts64+0x86/0x230
[   16.730175]  kunit_try_run_case+0x1a5/0x480
[   16.730225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.730249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.730275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.730301]  ? __kthread_parkme+0x82/0x180
[   16.730325]  ? preempt_count_sub+0x50/0x80
[   16.730350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.730373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.730399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.730426]  kthread+0x337/0x6f0
[   16.730447]  ? trace_preempt_on+0x20/0xc0
[   16.730490]  ? __pfx_kthread+0x10/0x10
[   16.730515]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.730539]  ? calculate_sigpending+0x7b/0xa0
[   16.730567]  ? __pfx_kthread+0x10/0x10
[   16.730590]  ret_from_fork+0x116/0x1d0
[   16.730613]  ? __pfx_kthread+0x10/0x10
[   16.730636]  ret_from_fork_asm+0x1a/0x30
[   16.730670]  </TASK>
[   16.730743] 
[   16.739922] The buggy address belongs to stack of task kunit_try_catch/268
[   16.740481] 
[   16.740651] The buggy address belongs to the physical page:
[   16.740947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a1f
[   16.741472] flags: 0x200000000000000(node=0|zone=2)
[   16.741650] raw: 0200000000000000 ffffea00040e87c8 ffffea00040e87c8 0000000000000000
[   16.742136] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.742657] page dumped because: kasan: bad access detected
[   16.742924] 
[   16.742988] Memory state around the buggy address:
[   16.743111]  ffff888103a1fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.743315]  ffff888103a1fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.743836] >ffff888103a1fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   16.744101]                                         ^
[   16.744231]  ffff888103a1fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   16.744385]  ffff888103a1fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.745027] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   16.701150] ==================================================================
[   16.702200] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   16.703066] Read of size 1 at addr ffff8881039c7d02 by task kunit_try_catch/266
[   16.703506] 
[   16.703657] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.703810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.703828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.703870] Call Trace:
[   16.703890]  <TASK>
[   16.703927]  dump_stack_lvl+0x73/0xb0
[   16.703971]  print_report+0xd1/0x650
[   16.703998]  ? __virt_addr_valid+0x1db/0x2d0
[   16.704029]  ? kasan_stack_oob+0x2b5/0x300
[   16.704053]  ? kasan_addr_to_slab+0x11/0xa0
[   16.704077]  ? kasan_stack_oob+0x2b5/0x300
[   16.704101]  kasan_report+0x141/0x180
[   16.704129]  ? kasan_stack_oob+0x2b5/0x300
[   16.704158]  __asan_report_load1_noabort+0x18/0x20
[   16.704184]  kasan_stack_oob+0x2b5/0x300
[   16.704237]  ? __pfx_kasan_stack_oob+0x10/0x10
[   16.704261]  ? finish_task_switch.isra.0+0x153/0x700
[   16.704303]  ? __switch_to+0x47/0xf50
[   16.704335]  ? __schedule+0x10cc/0x2b60
[   16.704365]  ? __pfx_read_tsc+0x10/0x10
[   16.704392]  ? ktime_get_ts64+0x86/0x230
[   16.704425]  kunit_try_run_case+0x1a5/0x480
[   16.704467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.704495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.704528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.704556]  ? __kthread_parkme+0x82/0x180
[   16.704580]  ? preempt_count_sub+0x50/0x80
[   16.704607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.704631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.704661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.704764]  kthread+0x337/0x6f0
[   16.704793]  ? trace_preempt_on+0x20/0xc0
[   16.704826]  ? __pfx_kthread+0x10/0x10
[   16.704849]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.704877]  ? calculate_sigpending+0x7b/0xa0
[   16.704906]  ? __pfx_kthread+0x10/0x10
[   16.704930]  ret_from_fork+0x116/0x1d0
[   16.704952]  ? __pfx_kthread+0x10/0x10
[   16.704977]  ret_from_fork_asm+0x1a/0x30
[   16.705013]  </TASK>
[   16.705027] 
[   16.714358] The buggy address belongs to stack of task kunit_try_catch/266
[   16.714969]  and is located at offset 138 in frame:
[   16.715290]  kasan_stack_oob+0x0/0x300
[   16.715740] 
[   16.715991] This frame has 4 objects:
[   16.716407]  [48, 49) '__assertion'
[   16.716450]  [64, 72) 'array'
[   16.716584]  [96, 112) '__assertion'
[   16.716839]  [128, 138) 'stack_array'
[   16.717079] 
[   16.717354] The buggy address belongs to the physical page:
[   16.717889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c7
[   16.718380] flags: 0x200000000000000(node=0|zone=2)
[   16.718817] raw: 0200000000000000 ffffea00040e71c8 ffffea00040e71c8 0000000000000000
[   16.719128] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.719470] page dumped because: kasan: bad access detected
[   16.719837] 
[   16.719933] Memory state around the buggy address:
[   16.720151]  ffff8881039c7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.720474]  ffff8881039c7c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   16.720929] >ffff8881039c7d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   16.721342]                    ^
[   16.721489]  ffff8881039c7d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   16.721950]  ffff8881039c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.722320] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   16.674666] ==================================================================
[   16.675540] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   16.676052] Read of size 1 at addr ffffffff8f47ae4d by task kunit_try_catch/262
[   16.676616] 
[   16.676859] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.676929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.676947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.676974] Call Trace:
[   16.676993]  <TASK>
[   16.677020]  dump_stack_lvl+0x73/0xb0
[   16.677057]  print_report+0xd1/0x650
[   16.677093]  ? __virt_addr_valid+0x1db/0x2d0
[   16.677127]  ? kasan_global_oob_right+0x286/0x2d0
[   16.677152]  ? kasan_addr_to_slab+0x11/0xa0
[   16.677210]  ? kasan_global_oob_right+0x286/0x2d0
[   16.677250]  kasan_report+0x141/0x180
[   16.677277]  ? kasan_global_oob_right+0x286/0x2d0
[   16.677322]  __asan_report_load1_noabort+0x18/0x20
[   16.677347]  kasan_global_oob_right+0x286/0x2d0
[   16.677372]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   16.677401]  ? __schedule+0x10cc/0x2b60
[   16.677429]  ? __pfx_read_tsc+0x10/0x10
[   16.677466]  ? ktime_get_ts64+0x86/0x230
[   16.677499]  kunit_try_run_case+0x1a5/0x480
[   16.677525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.677551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.677579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.677606]  ? __kthread_parkme+0x82/0x180
[   16.677643]  ? preempt_count_sub+0x50/0x80
[   16.677672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.677710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.677741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.677770]  kthread+0x337/0x6f0
[   16.677791]  ? trace_preempt_on+0x20/0xc0
[   16.677819]  ? __pfx_kthread+0x10/0x10
[   16.677842]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.677868]  ? calculate_sigpending+0x7b/0xa0
[   16.677897]  ? __pfx_kthread+0x10/0x10
[   16.677921]  ret_from_fork+0x116/0x1d0
[   16.677941]  ? __pfx_kthread+0x10/0x10
[   16.677964]  ret_from_fork_asm+0x1a/0x30
[   16.678001]  </TASK>
[   16.678017] 
[   16.685766] The buggy address belongs to the variable:
[   16.686007]  global_array+0xd/0x40
[   16.686137] 
[   16.686355] The buggy address belongs to the physical page:
[   16.686748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7947a
[   16.687041] flags: 0x100000000002000(reserved|node=0|zone=1)
[   16.687236] raw: 0100000000002000 ffffea0001e51e88 ffffea0001e51e88 0000000000000000
[   16.687770] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.687998] page dumped because: kasan: bad access detected
[   16.688397] 
[   16.688471] Memory state around the buggy address:
[   16.688598]  ffffffff8f47ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.688757]  ffffffff8f47ad80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.689189] >ffffffff8f47ae00: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   16.689706]                                               ^
[   16.690099]  ffffffff8f47ae80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   16.690301]  ffffffff8f47af00: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   16.690467] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   16.646633] ==================================================================
[   16.647184] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.647479] Free of addr ffff888103964001 by task kunit_try_catch/260
[   16.648219] 
[   16.648505] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.648568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.648583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.648607] Call Trace:
[   16.648628]  <TASK>
[   16.648654]  dump_stack_lvl+0x73/0xb0
[   16.648690]  print_report+0xd1/0x650
[   16.648717]  ? __virt_addr_valid+0x1db/0x2d0
[   16.648744]  ? kasan_addr_to_slab+0x11/0xa0
[   16.648767]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.648794]  kasan_report_invalid_free+0x10a/0x130
[   16.648821]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.648851]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.648879]  __kasan_mempool_poison_object+0x102/0x1d0
[   16.648905]  mempool_free+0x2ec/0x380
[   16.648931]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.648959]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   16.649019]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.649046]  ? finish_task_switch.isra.0+0x153/0x700
[   16.649090]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   16.649120]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   16.649151]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.649204]  ? __pfx_mempool_kfree+0x10/0x10
[   16.649488]  ? __pfx_read_tsc+0x10/0x10
[   16.649531]  ? ktime_get_ts64+0x86/0x230
[   16.649561]  kunit_try_run_case+0x1a5/0x480
[   16.649593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.649616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.649646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.649674]  ? __kthread_parkme+0x82/0x180
[   16.649716]  ? preempt_count_sub+0x50/0x80
[   16.649746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.649773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.649805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.649833]  kthread+0x337/0x6f0
[   16.649856]  ? trace_preempt_on+0x20/0xc0
[   16.649884]  ? __pfx_kthread+0x10/0x10
[   16.649908]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.649935]  ? calculate_sigpending+0x7b/0xa0
[   16.649964]  ? __pfx_kthread+0x10/0x10
[   16.649989]  ret_from_fork+0x116/0x1d0
[   16.650154]  ? __pfx_kthread+0x10/0x10
[   16.650185]  ret_from_fork_asm+0x1a/0x30
[   16.650225]  </TASK>
[   16.650240] 
[   16.660319] The buggy address belongs to the physical page:
[   16.660621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103964
[   16.661354] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.661897] flags: 0x200000000000040(head|node=0|zone=2)
[   16.662257] page_type: f8(unknown)
[   16.662583] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.663131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.663469] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.663778] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.664255] head: 0200000000000002 ffffea00040e5901 00000000ffffffff 00000000ffffffff
[   16.664589] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.664954] page dumped because: kasan: bad access detected
[   16.665180] 
[   16.665285] Memory state around the buggy address:
[   16.665509]  ffff888103963f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.666001]  ffff888103963f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.666227] >ffff888103964000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.666378]                    ^
[   16.666611]  ffff888103964080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.667166]  ffff888103964100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.667492] ==================================================================
[   16.604415] ==================================================================
[   16.605410] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.606062] Free of addr ffff888103341801 by task kunit_try_catch/258
[   16.606882] 
[   16.607386] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.607481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.607500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.607525] Call Trace:
[   16.607547]  <TASK>
[   16.607573]  dump_stack_lvl+0x73/0xb0
[   16.607782]  print_report+0xd1/0x650
[   16.607823]  ? __virt_addr_valid+0x1db/0x2d0
[   16.607858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.607883]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.607912]  kasan_report_invalid_free+0x10a/0x130
[   16.607941]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.607970]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.607997]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.608024]  check_slab_allocation+0x11f/0x130
[   16.608048]  __kasan_mempool_poison_object+0x91/0x1d0
[   16.608075]  mempool_free+0x2ec/0x380
[   16.608105]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.608134]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   16.608162]  ? update_load_avg+0x1be/0x21b0
[   16.608202]  ? dequeue_entities+0x27e/0x1740
[   16.608233]  ? finish_task_switch.isra.0+0x153/0x700
[   16.608267]  mempool_kmalloc_invalid_free+0xed/0x140
[   16.608296]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   16.608326]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.608347]  ? __pfx_mempool_kfree+0x10/0x10
[   16.608371]  ? __pfx_read_tsc+0x10/0x10
[   16.608396]  ? ktime_get_ts64+0x86/0x230
[   16.608423]  kunit_try_run_case+0x1a5/0x480
[   16.608450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.608491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.608523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.608552]  ? __kthread_parkme+0x82/0x180
[   16.608578]  ? preempt_count_sub+0x50/0x80
[   16.608604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.608628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.608762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.608790]  kthread+0x337/0x6f0
[   16.608813]  ? trace_preempt_on+0x20/0xc0
[   16.608841]  ? __pfx_kthread+0x10/0x10
[   16.608863]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.608888]  ? calculate_sigpending+0x7b/0xa0
[   16.608916]  ? __pfx_kthread+0x10/0x10
[   16.608940]  ret_from_fork+0x116/0x1d0
[   16.608960]  ? __pfx_kthread+0x10/0x10
[   16.608982]  ret_from_fork_asm+0x1a/0x30
[   16.609019]  </TASK>
[   16.609034] 
[   16.625055] Allocated by task 258:
[   16.625358]  kasan_save_stack+0x45/0x70
[   16.625625]  kasan_save_track+0x18/0x40
[   16.625909]  kasan_save_alloc_info+0x3b/0x50
[   16.626158]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.626625]  remove_element+0x11e/0x190
[   16.626916]  mempool_alloc_preallocated+0x4d/0x90
[   16.627184]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   16.627487]  mempool_kmalloc_invalid_free+0xed/0x140
[   16.628102]  kunit_try_run_case+0x1a5/0x480
[   16.628525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.629005]  kthread+0x337/0x6f0
[   16.629500]  ret_from_fork+0x116/0x1d0
[   16.630085]  ret_from_fork_asm+0x1a/0x30
[   16.630370] 
[   16.630617] The buggy address belongs to the object at ffff888103341800
[   16.630617]  which belongs to the cache kmalloc-128 of size 128
[   16.631485] The buggy address is located 1 bytes inside of
[   16.631485]  128-byte region [ffff888103341800, ffff888103341880)
[   16.632547] 
[   16.633081] The buggy address belongs to the physical page:
[   16.633546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   16.634061] flags: 0x200000000000000(node=0|zone=2)
[   16.634439] page_type: f5(slab)
[   16.634585] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.635102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.635413] page dumped because: kasan: bad access detected
[   16.636155] 
[   16.636418] Memory state around the buggy address:
[   16.636940]  ffff888103341700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.637197]  ffff888103341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.637369] >ffff888103341800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.638014]                    ^
[   16.638254]  ffff888103341880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639181]  ffff888103341900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.639488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   16.507065] ==================================================================
[   16.507796] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   16.508517] Free of addr ffff888103341400 by task kunit_try_catch/252
[   16.509299] 
[   16.509646] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.509820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.509840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.509868] Call Trace:
[   16.509889]  <TASK>
[   16.509919]  dump_stack_lvl+0x73/0xb0
[   16.509977]  print_report+0xd1/0x650
[   16.510010]  ? __virt_addr_valid+0x1db/0x2d0
[   16.510044]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.510070]  ? mempool_double_free_helper+0x184/0x370
[   16.510097]  kasan_report_invalid_free+0x10a/0x130
[   16.510125]  ? mempool_double_free_helper+0x184/0x370
[   16.510154]  ? mempool_double_free_helper+0x184/0x370
[   16.510180]  ? mempool_double_free_helper+0x184/0x370
[   16.510207]  check_slab_allocation+0x101/0x130
[   16.510254]  __kasan_mempool_poison_object+0x91/0x1d0
[   16.510284]  mempool_free+0x2ec/0x380
[   16.510311]  ? __wake_up+0x49/0x60
[   16.510344]  mempool_double_free_helper+0x184/0x370
[   16.510370]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   16.510399]  ? __kasan_check_write+0x18/0x20
[   16.510424]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.510450]  ? finish_task_switch.isra.0+0x153/0x700
[   16.510510]  mempool_kmalloc_double_free+0xed/0x140
[   16.510539]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   16.510574]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.510597]  ? __pfx_mempool_kfree+0x10/0x10
[   16.510622]  ? __pfx_read_tsc+0x10/0x10
[   16.510650]  ? ktime_get_ts64+0x86/0x230
[   16.510680]  kunit_try_run_case+0x1a5/0x480
[   16.510724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.510753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.510784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.510812]  ? __kthread_parkme+0x82/0x180
[   16.510837]  ? preempt_count_sub+0x50/0x80
[   16.510863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.510887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.510917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.510946]  kthread+0x337/0x6f0
[   16.510969]  ? trace_preempt_on+0x20/0xc0
[   16.510998]  ? __pfx_kthread+0x10/0x10
[   16.511022]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.511047]  ? calculate_sigpending+0x7b/0xa0
[   16.511077]  ? __pfx_kthread+0x10/0x10
[   16.511102]  ret_from_fork+0x116/0x1d0
[   16.511125]  ? __pfx_kthread+0x10/0x10
[   16.511148]  ret_from_fork_asm+0x1a/0x30
[   16.511186]  </TASK>
[   16.511200] 
[   16.523966] Allocated by task 252:
[   16.524620]  kasan_save_stack+0x45/0x70
[   16.525100]  kasan_save_track+0x18/0x40
[   16.525257]  kasan_save_alloc_info+0x3b/0x50
[   16.525510]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.526189]  remove_element+0x11e/0x190
[   16.526429]  mempool_alloc_preallocated+0x4d/0x90
[   16.526765]  mempool_double_free_helper+0x8a/0x370
[   16.527095]  mempool_kmalloc_double_free+0xed/0x140
[   16.527589]  kunit_try_run_case+0x1a5/0x480
[   16.528158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.528357]  kthread+0x337/0x6f0
[   16.528527]  ret_from_fork+0x116/0x1d0
[   16.528783]  ret_from_fork_asm+0x1a/0x30
[   16.529245] 
[   16.529363] Freed by task 252:
[   16.529479]  kasan_save_stack+0x45/0x70
[   16.530191]  kasan_save_track+0x18/0x40
[   16.530416]  kasan_save_free_info+0x3f/0x60
[   16.530764]  __kasan_mempool_poison_object+0x131/0x1d0
[   16.531055]  mempool_free+0x2ec/0x380
[   16.531317]  mempool_double_free_helper+0x109/0x370
[   16.531795]  mempool_kmalloc_double_free+0xed/0x140
[   16.532039]  kunit_try_run_case+0x1a5/0x480
[   16.532225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.532594]  kthread+0x337/0x6f0
[   16.532849]  ret_from_fork+0x116/0x1d0
[   16.533091]  ret_from_fork_asm+0x1a/0x30
[   16.533386] 
[   16.533541] The buggy address belongs to the object at ffff888103341400
[   16.533541]  which belongs to the cache kmalloc-128 of size 128
[   16.534333] The buggy address is located 0 bytes inside of
[   16.534333]  128-byte region [ffff888103341400, ffff888103341480)
[   16.535033] 
[   16.535182] The buggy address belongs to the physical page:
[   16.535500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   16.536074] flags: 0x200000000000000(node=0|zone=2)
[   16.536490] page_type: f5(slab)
[   16.536706] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.537106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.537555] page dumped because: kasan: bad access detected
[   16.537942] 
[   16.538133] Memory state around the buggy address:
[   16.538835]  ffff888103341300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.539105]  ffff888103341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.539295] >ffff888103341400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.539526]                    ^
[   16.539810]  ffff888103341480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.540730]  ffff888103341500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.541573] ==================================================================
[   16.576321] ==================================================================
[   16.577705] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   16.578224] Free of addr ffff888102ad4000 by task kunit_try_catch/256
[   16.578420] 
[   16.578834] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.578925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.578940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.578967] Call Trace:
[   16.578985]  <TASK>
[   16.579011]  dump_stack_lvl+0x73/0xb0
[   16.579055]  print_report+0xd1/0x650
[   16.579082]  ? __virt_addr_valid+0x1db/0x2d0
[   16.579111]  ? kasan_addr_to_slab+0x11/0xa0
[   16.579135]  ? mempool_double_free_helper+0x184/0x370
[   16.579163]  kasan_report_invalid_free+0x10a/0x130
[   16.579190]  ? mempool_double_free_helper+0x184/0x370
[   16.579257]  ? mempool_double_free_helper+0x184/0x370
[   16.579312]  __kasan_mempool_poison_pages+0x115/0x130
[   16.579353]  mempool_free+0x290/0x380
[   16.579594]  mempool_double_free_helper+0x184/0x370
[   16.579660]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   16.579716]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.579749]  ? irqentry_exit+0x2a/0x60
[   16.579773]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.579805]  mempool_page_alloc_double_free+0xe8/0x140
[   16.579834]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   16.579867]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   16.579893]  ? __pfx_mempool_free_pages+0x10/0x10
[   16.579916]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   16.579947]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   16.579981]  kunit_try_run_case+0x1a5/0x480
[   16.580007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.580029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.580058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.580087]  ? __kthread_parkme+0x82/0x180
[   16.580112]  ? preempt_count_sub+0x50/0x80
[   16.580139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.580163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.580191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.580243]  kthread+0x337/0x6f0
[   16.580269]  ? trace_preempt_on+0x20/0xc0
[   16.580298]  ? __pfx_kthread+0x10/0x10
[   16.580323]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.580349]  ? calculate_sigpending+0x7b/0xa0
[   16.580378]  ? __pfx_kthread+0x10/0x10
[   16.580403]  ret_from_fork+0x116/0x1d0
[   16.580427]  ? __pfx_kthread+0x10/0x10
[   16.580452]  ret_from_fork_asm+0x1a/0x30
[   16.580512]  </TASK>
[   16.580527] 
[   16.589921] The buggy address belongs to the physical page:
[   16.590126] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   16.590808] flags: 0x200000000000000(node=0|zone=2)
[   16.590982] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   16.591166] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.594312] page dumped because: kasan: bad access detected
[   16.594826] 
[   16.594979] Memory state around the buggy address:
[   16.595385]  ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.595943]  ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.596121] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.596291]                    ^
[   16.597006]  ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.597920]  ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.598120] ==================================================================
[   16.546433] ==================================================================
[   16.546946] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   16.547485] Free of addr ffff888102ad4000 by task kunit_try_catch/254
[   16.548046] 
[   16.548244] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.548336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.548362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.548390] Call Trace:
[   16.548406]  <TASK>
[   16.548429]  dump_stack_lvl+0x73/0xb0
[   16.548474]  print_report+0xd1/0x650
[   16.548500]  ? __virt_addr_valid+0x1db/0x2d0
[   16.548529]  ? kasan_addr_to_slab+0x11/0xa0
[   16.548551]  ? mempool_double_free_helper+0x184/0x370
[   16.548578]  kasan_report_invalid_free+0x10a/0x130
[   16.548605]  ? mempool_double_free_helper+0x184/0x370
[   16.548660]  ? mempool_double_free_helper+0x184/0x370
[   16.548757]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   16.548790]  mempool_free+0x2ec/0x380
[   16.548909]  mempool_double_free_helper+0x184/0x370
[   16.549020]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   16.549052]  ? update_load_avg+0x1be/0x21b0
[   16.549085]  ? dequeue_entities+0x27e/0x1740
[   16.549113]  ? finish_task_switch.isra.0+0x153/0x700
[   16.549143]  mempool_kmalloc_large_double_free+0xed/0x140
[   16.549172]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   16.549215]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.549240]  ? __pfx_mempool_kfree+0x10/0x10
[   16.549263]  ? __pfx_read_tsc+0x10/0x10
[   16.549290]  ? ktime_get_ts64+0x86/0x230
[   16.549316]  kunit_try_run_case+0x1a5/0x480
[   16.549342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.549363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.549392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.549421]  ? __kthread_parkme+0x82/0x180
[   16.549445]  ? preempt_count_sub+0x50/0x80
[   16.549493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.549518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.549547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.549575]  kthread+0x337/0x6f0
[   16.549597]  ? trace_preempt_on+0x20/0xc0
[   16.549624]  ? __pfx_kthread+0x10/0x10
[   16.549647]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.549674]  ? calculate_sigpending+0x7b/0xa0
[   16.549701]  ? __pfx_kthread+0x10/0x10
[   16.549736]  ret_from_fork+0x116/0x1d0
[   16.549758]  ? __pfx_kthread+0x10/0x10
[   16.549781]  ret_from_fork_asm+0x1a/0x30
[   16.549816]  </TASK>
[   16.549830] 
[   16.561912] The buggy address belongs to the physical page:
[   16.562366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   16.562822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.563160] flags: 0x200000000000040(head|node=0|zone=2)
[   16.563450] page_type: f8(unknown)
[   16.563915] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.564488] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.564852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.565032] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.565235] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff
[   16.565675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.566163] page dumped because: kasan: bad access detected
[   16.566679] 
[   16.566828] Memory state around the buggy address:
[   16.567168]  ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.567737]  ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.568170] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.568573]                    ^
[   16.568799]  ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.569366]  ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.569789] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   16.369927] ==================================================================
[   16.370502] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   16.371730] Read of size 1 at addr ffff888102ad0000 by task kunit_try_catch/246
[   16.373264] 
[   16.373437] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.373534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.373558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.373599] Call Trace:
[   16.373622]  <TASK>
[   16.373660]  dump_stack_lvl+0x73/0xb0
[   16.373730]  print_report+0xd1/0x650
[   16.373776]  ? __virt_addr_valid+0x1db/0x2d0
[   16.373822]  ? mempool_uaf_helper+0x392/0x400
[   16.373947]  ? kasan_addr_to_slab+0x11/0xa0
[   16.374010]  ? mempool_uaf_helper+0x392/0x400
[   16.374052]  kasan_report+0x141/0x180
[   16.374094]  ? mempool_uaf_helper+0x392/0x400
[   16.374137]  __asan_report_load1_noabort+0x18/0x20
[   16.374175]  mempool_uaf_helper+0x392/0x400
[   16.374225]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.374266]  ? __kasan_check_write+0x18/0x20
[   16.374301]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.374344]  ? finish_task_switch.isra.0+0x153/0x700
[   16.374390]  mempool_kmalloc_large_uaf+0xef/0x140
[   16.374436]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   16.374506]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.374552]  ? __pfx_mempool_kfree+0x10/0x10
[   16.374591]  ? __pfx_read_tsc+0x10/0x10
[   16.374667]  ? ktime_get_ts64+0x86/0x230
[   16.374707]  kunit_try_run_case+0x1a5/0x480
[   16.374756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.374790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.374845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.374892]  ? __kthread_parkme+0x82/0x180
[   16.374936]  ? preempt_count_sub+0x50/0x80
[   16.374981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.375111]  kthread+0x337/0x6f0
[   16.375153]  ? trace_preempt_on+0x20/0xc0
[   16.375200]  ? __pfx_kthread+0x10/0x10
[   16.375249]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.375296]  ? calculate_sigpending+0x7b/0xa0
[   16.375373]  ? __pfx_kthread+0x10/0x10
[   16.375422]  ret_from_fork+0x116/0x1d0
[   16.375484]  ? __pfx_kthread+0x10/0x10
[   16.375518]  ret_from_fork_asm+0x1a/0x30
[   16.375574]  </TASK>
[   16.375590] 
[   16.392742] The buggy address belongs to the physical page:
[   16.393640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   16.394249] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.394854] flags: 0x200000000000040(head|node=0|zone=2)
[   16.396026] page_type: f8(unknown)
[   16.396702] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.397084] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.397788] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.398384] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.399172] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   16.399647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.400846] page dumped because: kasan: bad access detected
[   16.401067] 
[   16.401596] Memory state around the buggy address:
[   16.402197]  ffff888102acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.402938]  ffff888102acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.403478] >ffff888102ad0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.404154]                    ^
[   16.404348]  ffff888102ad0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.405582]  ffff888102ad0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.406182] ==================================================================
[   16.478290] ==================================================================
[   16.478739] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   16.478944] Read of size 1 at addr ffff888102ad4000 by task kunit_try_catch/250
[   16.479934] 
[   16.480043] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.480109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.480125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.480153] Call Trace:
[   16.480172]  <TASK>
[   16.480199]  dump_stack_lvl+0x73/0xb0
[   16.480241]  print_report+0xd1/0x650
[   16.480268]  ? __virt_addr_valid+0x1db/0x2d0
[   16.480296]  ? mempool_uaf_helper+0x392/0x400
[   16.480322]  ? kasan_addr_to_slab+0x11/0xa0
[   16.480345]  ? mempool_uaf_helper+0x392/0x400
[   16.480370]  kasan_report+0x141/0x180
[   16.480547]  ? mempool_uaf_helper+0x392/0x400
[   16.480587]  __asan_report_load1_noabort+0x18/0x20
[   16.480612]  mempool_uaf_helper+0x392/0x400
[   16.480639]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.480667]  ? __kasan_check_write+0x18/0x20
[   16.480808]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.480845]  ? irqentry_exit+0x2a/0x60
[   16.480872]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   16.480905]  mempool_page_alloc_uaf+0xed/0x140
[   16.480933]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   16.480966]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   16.480994]  ? __pfx_mempool_free_pages+0x10/0x10
[   16.481020]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   16.481053]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   16.481122]  kunit_try_run_case+0x1a5/0x480
[   16.481154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.481178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.481237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.481270]  ? __kthread_parkme+0x82/0x180
[   16.481315]  ? preempt_count_sub+0x50/0x80
[   16.481350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.481376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.481413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.481447]  kthread+0x337/0x6f0
[   16.481500]  ? trace_preempt_on+0x20/0xc0
[   16.481534]  ? __pfx_kthread+0x10/0x10
[   16.481563]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.481597]  ? calculate_sigpending+0x7b/0xa0
[   16.481632]  ? __pfx_kthread+0x10/0x10
[   16.481661]  ret_from_fork+0x116/0x1d0
[   16.482160]  ? __pfx_kthread+0x10/0x10
[   16.482250]  ret_from_fork_asm+0x1a/0x30
[   16.482299]  </TASK>
[   16.482315] 
[   16.494680] The buggy address belongs to the physical page:
[   16.495064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   16.495262] flags: 0x200000000000000(node=0|zone=2)
[   16.495741] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   16.496511] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.497012] page dumped because: kasan: bad access detected
[   16.497263] 
[   16.497558] Memory state around the buggy address:
[   16.497837]  ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.498308]  ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.498497] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.498939]                    ^
[   16.499205]  ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.499690]  ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.500542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   16.414636] ==================================================================
[   16.415553] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   16.416170] Read of size 1 at addr ffff888103349240 by task kunit_try_catch/248
[   16.416450] 
[   16.416616] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.416723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.416755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.416805] Call Trace:
[   16.416839]  <TASK>
[   16.416883]  dump_stack_lvl+0x73/0xb0
[   16.416953]  print_report+0xd1/0x650
[   16.417045]  ? __virt_addr_valid+0x1db/0x2d0
[   16.417092]  ? mempool_uaf_helper+0x392/0x400
[   16.417132]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.417172]  ? mempool_uaf_helper+0x392/0x400
[   16.417215]  kasan_report+0x141/0x180
[   16.417262]  ? mempool_uaf_helper+0x392/0x400
[   16.417336]  __asan_report_load1_noabort+0x18/0x20
[   16.417384]  mempool_uaf_helper+0x392/0x400
[   16.417443]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.417506]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.417548]  ? finish_task_switch.isra.0+0x153/0x700
[   16.417628]  mempool_slab_uaf+0xea/0x140
[   16.417693]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   16.417747]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   16.417799]  ? __pfx_mempool_free_slab+0x10/0x10
[   16.417855]  ? __pfx_read_tsc+0x10/0x10
[   16.417908]  ? ktime_get_ts64+0x86/0x230
[   16.417967]  kunit_try_run_case+0x1a5/0x480
[   16.418023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.418129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.418187]  ? __kthread_parkme+0x82/0x180
[   16.418292]  ? preempt_count_sub+0x50/0x80
[   16.418353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.418420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.418447]  kthread+0x337/0x6f0
[   16.418495]  ? trace_preempt_on+0x20/0xc0
[   16.418523]  ? __pfx_kthread+0x10/0x10
[   16.418546]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.418570]  ? calculate_sigpending+0x7b/0xa0
[   16.418597]  ? __pfx_kthread+0x10/0x10
[   16.418621]  ret_from_fork+0x116/0x1d0
[   16.418642]  ? __pfx_kthread+0x10/0x10
[   16.418665]  ret_from_fork_asm+0x1a/0x30
[   16.418745]  </TASK>
[   16.418772] 
[   16.435378] Allocated by task 248:
[   16.435649]  kasan_save_stack+0x45/0x70
[   16.436270]  kasan_save_track+0x18/0x40
[   16.436757]  kasan_save_alloc_info+0x3b/0x50
[   16.437131]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   16.437395]  remove_element+0x11e/0x190
[   16.437891]  mempool_alloc_preallocated+0x4d/0x90
[   16.439172]  mempool_uaf_helper+0x96/0x400
[   16.439433]  mempool_slab_uaf+0xea/0x140
[   16.439629]  kunit_try_run_case+0x1a5/0x480
[   16.439996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.440260]  kthread+0x337/0x6f0
[   16.441070]  ret_from_fork+0x116/0x1d0
[   16.441543]  ret_from_fork_asm+0x1a/0x30
[   16.441910] 
[   16.442470] Freed by task 248:
[   16.442830]  kasan_save_stack+0x45/0x70
[   16.443655]  kasan_save_track+0x18/0x40
[   16.444233]  kasan_save_free_info+0x3f/0x60
[   16.444861]  __kasan_mempool_poison_object+0x131/0x1d0
[   16.445443]  mempool_free+0x2ec/0x380
[   16.446054]  mempool_uaf_helper+0x11a/0x400
[   16.446304]  mempool_slab_uaf+0xea/0x140
[   16.447199]  kunit_try_run_case+0x1a5/0x480
[   16.447440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.447909]  kthread+0x337/0x6f0
[   16.448169]  ret_from_fork+0x116/0x1d0
[   16.449342]  ret_from_fork_asm+0x1a/0x30
[   16.449702] 
[   16.449975] The buggy address belongs to the object at ffff888103349240
[   16.449975]  which belongs to the cache test_cache of size 123
[   16.450965] The buggy address is located 0 bytes inside of
[   16.450965]  freed 123-byte region [ffff888103349240, ffff8881033492bb)
[   16.452320] 
[   16.452725] The buggy address belongs to the physical page:
[   16.453387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.454082] flags: 0x200000000000000(node=0|zone=2)
[   16.454631] page_type: f5(slab)
[   16.454932] raw: 0200000000000000 ffff888103342140 dead000000000122 0000000000000000
[   16.455434] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   16.455744] page dumped because: kasan: bad access detected
[   16.455946] 
[   16.456028] Memory state around the buggy address:
[   16.456203]  ffff888103349100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.456435]  ffff888103349180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.456700] >ffff888103349200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   16.457172]                                            ^
[   16.457836]  ffff888103349280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.458491]  ffff888103349300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459077] ==================================================================
[   16.307737] ==================================================================
[   16.308537] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   16.310118] Read of size 1 at addr ffff8881033dc500 by task kunit_try_catch/244
[   16.310633] 
[   16.310871] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.310968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.310992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.311038] Call Trace:
[   16.311071]  <TASK>
[   16.311115]  dump_stack_lvl+0x73/0xb0
[   16.311192]  print_report+0xd1/0x650
[   16.311237]  ? __virt_addr_valid+0x1db/0x2d0
[   16.311283]  ? mempool_uaf_helper+0x392/0x400
[   16.311325]  ? kasan_complete_mode_report_info+0x64/0x200
[   16.311402]  ? mempool_uaf_helper+0x392/0x400
[   16.311448]  kasan_report+0x141/0x180
[   16.311512]  ? mempool_uaf_helper+0x392/0x400
[   16.311564]  __asan_report_load1_noabort+0x18/0x20
[   16.311605]  mempool_uaf_helper+0x392/0x400
[   16.311655]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   16.311708]  ? __kasan_check_write+0x18/0x20
[   16.311748]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.311790]  ? finish_task_switch.isra.0+0x153/0x700
[   16.311823]  mempool_kmalloc_uaf+0xef/0x140
[   16.311849]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   16.311878]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.311903]  ? __pfx_mempool_kfree+0x10/0x10
[   16.311928]  ? __pfx_read_tsc+0x10/0x10
[   16.311954]  ? ktime_get_ts64+0x86/0x230
[   16.311983]  kunit_try_run_case+0x1a5/0x480
[   16.312010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.312062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.312090]  ? __kthread_parkme+0x82/0x180
[   16.312113]  ? preempt_count_sub+0x50/0x80
[   16.312139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.312190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.312218]  kthread+0x337/0x6f0
[   16.312240]  ? trace_preempt_on+0x20/0xc0
[   16.312268]  ? __pfx_kthread+0x10/0x10
[   16.312291]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.312316]  ? calculate_sigpending+0x7b/0xa0
[   16.312344]  ? __pfx_kthread+0x10/0x10
[   16.312368]  ret_from_fork+0x116/0x1d0
[   16.312390]  ? __pfx_kthread+0x10/0x10
[   16.312414]  ret_from_fork_asm+0x1a/0x30
[   16.312451]  </TASK>
[   16.312517] 
[   16.336332] Allocated by task 244:
[   16.336972]  kasan_save_stack+0x45/0x70
[   16.337657]  kasan_save_track+0x18/0x40
[   16.338002]  kasan_save_alloc_info+0x3b/0x50
[   16.338246]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.338442]  remove_element+0x11e/0x190
[   16.338686]  mempool_alloc_preallocated+0x4d/0x90
[   16.339792]  mempool_uaf_helper+0x96/0x400
[   16.340277]  mempool_kmalloc_uaf+0xef/0x140
[   16.340896]  kunit_try_run_case+0x1a5/0x480
[   16.341345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.341778]  kthread+0x337/0x6f0
[   16.342116]  ret_from_fork+0x116/0x1d0
[   16.342524]  ret_from_fork_asm+0x1a/0x30
[   16.343099] 
[   16.343308] Freed by task 244:
[   16.344112]  kasan_save_stack+0x45/0x70
[   16.344359]  kasan_save_track+0x18/0x40
[   16.344781]  kasan_save_free_info+0x3f/0x60
[   16.345389]  __kasan_mempool_poison_object+0x131/0x1d0
[   16.346013]  mempool_free+0x2ec/0x380
[   16.346562]  mempool_uaf_helper+0x11a/0x400
[   16.347123]  mempool_kmalloc_uaf+0xef/0x140
[   16.347646]  kunit_try_run_case+0x1a5/0x480
[   16.348352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.348752]  kthread+0x337/0x6f0
[   16.349048]  ret_from_fork+0x116/0x1d0
[   16.349997]  ret_from_fork_asm+0x1a/0x30
[   16.350446] 
[   16.350586] The buggy address belongs to the object at ffff8881033dc500
[   16.350586]  which belongs to the cache kmalloc-128 of size 128
[   16.351598] The buggy address is located 0 bytes inside of
[   16.351598]  freed 128-byte region [ffff8881033dc500, ffff8881033dc580)
[   16.352697] 
[   16.352927] The buggy address belongs to the physical page:
[   16.353328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   16.353861] flags: 0x200000000000000(node=0|zone=2)
[   16.355251] page_type: f5(slab)
[   16.355565] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.356013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.356811] page dumped because: kasan: bad access detected
[   16.357160] 
[   16.357563] Memory state around the buggy address:
[   16.357824]  ffff8881033dc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.358276]  ffff8881033dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.358744] >ffff8881033dc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.359119]                    ^
[   16.359922]  ffff8881033dc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360867]  ffff8881033dc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.362093] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   16.228328] ==================================================================
[   16.229002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.229669] Read of size 1 at addr ffff888103962001 by task kunit_try_catch/240
[   16.230351] 
[   16.230545] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.230651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.230683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.230730] Call Trace:
[   16.230760]  <TASK>
[   16.230798]  dump_stack_lvl+0x73/0xb0
[   16.230864]  print_report+0xd1/0x650
[   16.230913]  ? __virt_addr_valid+0x1db/0x2d0
[   16.230956]  ? mempool_oob_right_helper+0x318/0x380
[   16.230986]  ? kasan_addr_to_slab+0x11/0xa0
[   16.231017]  ? mempool_oob_right_helper+0x318/0x380
[   16.231044]  kasan_report+0x141/0x180
[   16.231071]  ? mempool_oob_right_helper+0x318/0x380
[   16.231116]  __asan_report_load1_noabort+0x18/0x20
[   16.231148]  mempool_oob_right_helper+0x318/0x380
[   16.231175]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.231212]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.231598]  ? finish_task_switch.isra.0+0x153/0x700
[   16.231716]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   16.231811]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   16.231900]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.231953]  ? __pfx_mempool_kfree+0x10/0x10
[   16.232007]  ? __pfx_read_tsc+0x10/0x10
[   16.232055]  ? ktime_get_ts64+0x86/0x230
[   16.232105]  kunit_try_run_case+0x1a5/0x480
[   16.232132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.232154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.232182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.232232]  ? __kthread_parkme+0x82/0x180
[   16.232266]  ? preempt_count_sub+0x50/0x80
[   16.232291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.232315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.232341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.232368]  kthread+0x337/0x6f0
[   16.232389]  ? trace_preempt_on+0x20/0xc0
[   16.232415]  ? __pfx_kthread+0x10/0x10
[   16.232438]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.232479]  ? calculate_sigpending+0x7b/0xa0
[   16.232509]  ? __pfx_kthread+0x10/0x10
[   16.232532]  ret_from_fork+0x116/0x1d0
[   16.232553]  ? __pfx_kthread+0x10/0x10
[   16.232575]  ret_from_fork_asm+0x1a/0x30
[   16.232607]  </TASK>
[   16.232621] 
[   16.247112] The buggy address belongs to the physical page:
[   16.248346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103960
[   16.248859] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.249176] flags: 0x200000000000040(head|node=0|zone=2)
[   16.249531] page_type: f8(unknown)
[   16.249759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.250196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.251100] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.251373] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.252210] head: 0200000000000002 ffffea00040e5801 00000000ffffffff 00000000ffffffff
[   16.252659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.253017] page dumped because: kasan: bad access detected
[   16.253725] 
[   16.253843] Memory state around the buggy address:
[   16.254062]  ffff888103961f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.254847]  ffff888103961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.255191] >ffff888103962000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.256012]                    ^
[   16.256300]  ffff888103962080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.256839]  ffff888103962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.257366] ==================================================================
[   16.183500] ==================================================================
[   16.184178] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.184778] Read of size 1 at addr ffff888103341073 by task kunit_try_catch/238
[   16.185522] 
[   16.186072] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.186194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.186697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.186764] Call Trace:
[   16.186797]  <TASK>
[   16.186839]  dump_stack_lvl+0x73/0xb0
[   16.186915]  print_report+0xd1/0x650
[   16.186964]  ? __virt_addr_valid+0x1db/0x2d0
[   16.187014]  ? mempool_oob_right_helper+0x318/0x380
[   16.187060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.187110]  ? mempool_oob_right_helper+0x318/0x380
[   16.187161]  kasan_report+0x141/0x180
[   16.187202]  ? mempool_oob_right_helper+0x318/0x380
[   16.187292]  __asan_report_load1_noabort+0x18/0x20
[   16.187382]  mempool_oob_right_helper+0x318/0x380
[   16.187426]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.187482]  ? update_load_avg+0x1be/0x21b0
[   16.187516]  ? dequeue_entities+0x27e/0x1740
[   16.187547]  ? finish_task_switch.isra.0+0x153/0x700
[   16.187575]  mempool_kmalloc_oob_right+0xf2/0x150
[   16.187601]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   16.187628]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.187651]  ? __pfx_mempool_kfree+0x10/0x10
[   16.187675]  ? __pfx_read_tsc+0x10/0x10
[   16.187750]  ? ktime_get_ts64+0x86/0x230
[   16.187801]  kunit_try_run_case+0x1a5/0x480
[   16.187836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.187858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.187884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.187910]  ? __kthread_parkme+0x82/0x180
[   16.187933]  ? preempt_count_sub+0x50/0x80
[   16.187957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.187979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.188029]  kthread+0x337/0x6f0
[   16.188050]  ? trace_preempt_on+0x20/0xc0
[   16.188075]  ? __pfx_kthread+0x10/0x10
[   16.188097]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.188119]  ? calculate_sigpending+0x7b/0xa0
[   16.188144]  ? __pfx_kthread+0x10/0x10
[   16.188169]  ret_from_fork+0x116/0x1d0
[   16.188190]  ? __pfx_kthread+0x10/0x10
[   16.188243]  ret_from_fork_asm+0x1a/0x30
[   16.188279]  </TASK>
[   16.188293] 
[   16.202417] Allocated by task 238:
[   16.202908]  kasan_save_stack+0x45/0x70
[   16.203384]  kasan_save_track+0x18/0x40
[   16.203789]  kasan_save_alloc_info+0x3b/0x50
[   16.204247]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.204589]  remove_element+0x11e/0x190
[   16.204798]  mempool_alloc_preallocated+0x4d/0x90
[   16.205010]  mempool_oob_right_helper+0x8a/0x380
[   16.205265]  mempool_kmalloc_oob_right+0xf2/0x150
[   16.205670]  kunit_try_run_case+0x1a5/0x480
[   16.206066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.206671]  kthread+0x337/0x6f0
[   16.207104]  ret_from_fork+0x116/0x1d0
[   16.207516]  ret_from_fork_asm+0x1a/0x30
[   16.207875] 
[   16.208004] The buggy address belongs to the object at ffff888103341000
[   16.208004]  which belongs to the cache kmalloc-128 of size 128
[   16.209641] The buggy address is located 0 bytes to the right of
[   16.209641]  allocated 115-byte region [ffff888103341000, ffff888103341073)
[   16.210407] 
[   16.210672] The buggy address belongs to the physical page:
[   16.211312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   16.212727] flags: 0x200000000000000(node=0|zone=2)
[   16.213419] page_type: f5(slab)
[   16.213945] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.214291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.214872] page dumped because: kasan: bad access detected
[   16.215426] 
[   16.215625] Memory state around the buggy address:
[   16.216623]  ffff888103340f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.217615]  ffff888103340f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.218152] >ffff888103341000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.218737]                                                              ^
[   16.219338]  ffff888103341080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.220330]  ffff888103341100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.221351] ==================================================================
[   16.264999] ==================================================================
[   16.265701] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.266681] Read of size 1 at addr ffff8881033452bb by task kunit_try_catch/242
[   16.267164] 
[   16.267796] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.267913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.267942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.267980] Call Trace:
[   16.267999]  <TASK>
[   16.268028]  dump_stack_lvl+0x73/0xb0
[   16.268089]  print_report+0xd1/0x650
[   16.268117]  ? __virt_addr_valid+0x1db/0x2d0
[   16.268143]  ? mempool_oob_right_helper+0x318/0x380
[   16.268168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.268195]  ? mempool_oob_right_helper+0x318/0x380
[   16.268415]  kasan_report+0x141/0x180
[   16.268443]  ? mempool_oob_right_helper+0x318/0x380
[   16.268498]  __asan_report_load1_noabort+0x18/0x20
[   16.268522]  mempool_oob_right_helper+0x318/0x380
[   16.268547]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.268575]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.268601]  ? finish_task_switch.isra.0+0x153/0x700
[   16.268629]  mempool_slab_oob_right+0xed/0x140
[   16.268652]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   16.268679]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   16.268702]  ? __pfx_mempool_free_slab+0x10/0x10
[   16.268726]  ? __pfx_read_tsc+0x10/0x10
[   16.268750]  ? ktime_get_ts64+0x86/0x230
[   16.268776]  kunit_try_run_case+0x1a5/0x480
[   16.268800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.268848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.268873]  ? __kthread_parkme+0x82/0x180
[   16.268896]  ? preempt_count_sub+0x50/0x80
[   16.268920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.268970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.268996]  kthread+0x337/0x6f0
[   16.269016]  ? trace_preempt_on+0x20/0xc0
[   16.269042]  ? __pfx_kthread+0x10/0x10
[   16.269065]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.269089]  ? calculate_sigpending+0x7b/0xa0
[   16.269115]  ? __pfx_kthread+0x10/0x10
[   16.269138]  ret_from_fork+0x116/0x1d0
[   16.269158]  ? __pfx_kthread+0x10/0x10
[   16.269181]  ret_from_fork_asm+0x1a/0x30
[   16.269246]  </TASK>
[   16.269263] 
[   16.280444] Allocated by task 242:
[   16.280715]  kasan_save_stack+0x45/0x70
[   16.280967]  kasan_save_track+0x18/0x40
[   16.281316]  kasan_save_alloc_info+0x3b/0x50
[   16.281662]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   16.282021]  remove_element+0x11e/0x190
[   16.282281]  mempool_alloc_preallocated+0x4d/0x90
[   16.282536]  mempool_oob_right_helper+0x8a/0x380
[   16.282899]  mempool_slab_oob_right+0xed/0x140
[   16.283277]  kunit_try_run_case+0x1a5/0x480
[   16.283593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.283848]  kthread+0x337/0x6f0
[   16.284077]  ret_from_fork+0x116/0x1d0
[   16.284292]  ret_from_fork_asm+0x1a/0x30
[   16.284512] 
[   16.284701] The buggy address belongs to the object at ffff888103345240
[   16.284701]  which belongs to the cache test_cache of size 123
[   16.285600] The buggy address is located 0 bytes to the right of
[   16.285600]  allocated 123-byte region [ffff888103345240, ffff8881033452bb)
[   16.286326] 
[   16.286452] The buggy address belongs to the physical page:
[   16.286679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103345
[   16.286974] flags: 0x200000000000000(node=0|zone=2)
[   16.287330] page_type: f5(slab)
[   16.287658] raw: 0200000000000000 ffff888103342000 dead000000000122 0000000000000000
[   16.288259] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   16.288810] page dumped because: kasan: bad access detected
[   16.289186] 
[   16.289355] Memory state around the buggy address:
[   16.289622]  ffff888103345180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.289889]  ffff888103345200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   16.291715] >ffff888103345280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   16.292297]                                         ^
[   16.292624]  ffff888103345300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293005]  ffff888103345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.294632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   15.597414] ==================================================================
[   15.597876] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   15.598242] Read of size 1 at addr ffff888101117c80 by task kunit_try_catch/232
[   15.598749] 
[   15.599331] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.599439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.599465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.599525] Call Trace:
[   15.599544]  <TASK>
[   15.599586]  dump_stack_lvl+0x73/0xb0
[   15.599647]  print_report+0xd1/0x650
[   15.599680]  ? __virt_addr_valid+0x1db/0x2d0
[   15.599761]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.599787]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.599814]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.599838]  kasan_report+0x141/0x180
[   15.599864]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.599892]  ? kmem_cache_double_destroy+0x1bf/0x380
[   15.599917]  __kasan_check_byte+0x3d/0x50
[   15.599942]  kmem_cache_destroy+0x25/0x1d0
[   15.599970]  kmem_cache_double_destroy+0x1bf/0x380
[   15.600214]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   15.600266]  ? finish_task_switch.isra.0+0x153/0x700
[   15.600300]  ? __switch_to+0x47/0xf50
[   15.600334]  ? __pfx_read_tsc+0x10/0x10
[   15.600362]  ? ktime_get_ts64+0x86/0x230
[   15.600393]  kunit_try_run_case+0x1a5/0x480
[   15.600420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.600441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.600492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.600520]  ? __kthread_parkme+0x82/0x180
[   15.600545]  ? preempt_count_sub+0x50/0x80
[   15.600570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.600594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.600622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.600649]  kthread+0x337/0x6f0
[   15.600671]  ? trace_preempt_on+0x20/0xc0
[   15.600699]  ? __pfx_kthread+0x10/0x10
[   15.600724]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.600750]  ? calculate_sigpending+0x7b/0xa0
[   15.600779]  ? __pfx_kthread+0x10/0x10
[   15.600803]  ret_from_fork+0x116/0x1d0
[   15.600825]  ? __pfx_kthread+0x10/0x10
[   15.600848]  ret_from_fork_asm+0x1a/0x30
[   15.600882]  </TASK>
[   15.600897] 
[   15.610757] Allocated by task 232:
[   15.611008]  kasan_save_stack+0x45/0x70
[   15.611384]  kasan_save_track+0x18/0x40
[   15.611565]  kasan_save_alloc_info+0x3b/0x50
[   15.612236]  __kasan_slab_alloc+0x91/0xa0
[   15.612379]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.612585]  __kmem_cache_create_args+0x169/0x240
[   15.613073]  kmem_cache_double_destroy+0xd5/0x380
[   15.613288]  kunit_try_run_case+0x1a5/0x480
[   15.613577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613963]  kthread+0x337/0x6f0
[   15.614202]  ret_from_fork+0x116/0x1d0
[   15.614422]  ret_from_fork_asm+0x1a/0x30
[   15.614649] 
[   15.614881] Freed by task 232:
[   15.615060]  kasan_save_stack+0x45/0x70
[   15.615296]  kasan_save_track+0x18/0x40
[   15.615562]  kasan_save_free_info+0x3f/0x60
[   15.615970]  __kasan_slab_free+0x56/0x70
[   15.616539]  kmem_cache_free+0x249/0x420
[   15.616874]  slab_kmem_cache_release+0x2e/0x40
[   15.617009]  kmem_cache_release+0x16/0x20
[   15.617129]  kobject_put+0x181/0x450
[   15.617555]  sysfs_slab_release+0x16/0x20
[   15.617836]  kmem_cache_destroy+0xf0/0x1d0
[   15.618084]  kmem_cache_double_destroy+0x14e/0x380
[   15.618431]  kunit_try_run_case+0x1a5/0x480
[   15.618600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.619099]  kthread+0x337/0x6f0
[   15.619390]  ret_from_fork+0x116/0x1d0
[   15.619606]  ret_from_fork_asm+0x1a/0x30
[   15.620272] 
[   15.620370] The buggy address belongs to the object at ffff888101117c80
[   15.620370]  which belongs to the cache kmem_cache of size 208
[   15.620888] The buggy address is located 0 bytes inside of
[   15.620888]  freed 208-byte region [ffff888101117c80, ffff888101117d50)
[   15.621351] 
[   15.621480] The buggy address belongs to the physical page:
[   15.621725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101117
[   15.622150] flags: 0x200000000000000(node=0|zone=2)
[   15.622299] page_type: f5(slab)
[   15.622407] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   15.623008] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   15.623408] page dumped because: kasan: bad access detected
[   15.623606] 
[   15.624035] Memory state around the buggy address:
[   15.624365]  ffff888101117b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.624771]  ffff888101117c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.625014] >ffff888101117c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.625370]                    ^
[   15.625553]  ffff888101117d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   15.625946]  ffff888101117d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.626160] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   15.533056] ==================================================================
[   15.533722] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   15.533961] Read of size 1 at addr ffff8881033e6000 by task kunit_try_catch/230
[   15.534130] 
[   15.534602] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.534671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.534686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.534713] Call Trace:
[   15.534732]  <TASK>
[   15.534760]  dump_stack_lvl+0x73/0xb0
[   15.534799]  print_report+0xd1/0x650
[   15.534829]  ? __virt_addr_valid+0x1db/0x2d0
[   15.534858]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   15.534918]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.534945]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   15.534971]  kasan_report+0x141/0x180
[   15.534997]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   15.535028]  __asan_report_load1_noabort+0x18/0x20
[   15.535051]  kmem_cache_rcu_uaf+0x3e3/0x510
[   15.535077]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   15.535102]  ? finish_task_switch.isra.0+0x153/0x700
[   15.535129]  ? __switch_to+0x47/0xf50
[   15.535162]  ? __pfx_read_tsc+0x10/0x10
[   15.535188]  ? ktime_get_ts64+0x86/0x230
[   15.535217]  kunit_try_run_case+0x1a5/0x480
[   15.535243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.535265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.535294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.535321]  ? __kthread_parkme+0x82/0x180
[   15.535379]  ? preempt_count_sub+0x50/0x80
[   15.535412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.535435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.535476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.535506]  kthread+0x337/0x6f0
[   15.535528]  ? trace_preempt_on+0x20/0xc0
[   15.535556]  ? __pfx_kthread+0x10/0x10
[   15.535610]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.535635]  ? calculate_sigpending+0x7b/0xa0
[   15.535663]  ? __pfx_kthread+0x10/0x10
[   15.535687]  ret_from_fork+0x116/0x1d0
[   15.535708]  ? __pfx_kthread+0x10/0x10
[   15.535732]  ret_from_fork_asm+0x1a/0x30
[   15.535767]  </TASK>
[   15.535781] 
[   15.544363] Allocated by task 230:
[   15.545269]  kasan_save_stack+0x45/0x70
[   15.545524]  kasan_save_track+0x18/0x40
[   15.546178]  kasan_save_alloc_info+0x3b/0x50
[   15.546448]  __kasan_slab_alloc+0x91/0xa0
[   15.546696]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.546978]  kmem_cache_rcu_uaf+0x155/0x510
[   15.547237]  kunit_try_run_case+0x1a5/0x480
[   15.547515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547805]  kthread+0x337/0x6f0
[   15.548008]  ret_from_fork+0x116/0x1d0
[   15.548239]  ret_from_fork_asm+0x1a/0x30
[   15.548642] 
[   15.549269] Freed by task 0:
[   15.549372]  kasan_save_stack+0x45/0x70
[   15.549616]  kasan_save_track+0x18/0x40
[   15.549843]  kasan_save_free_info+0x3f/0x60
[   15.550291]  __kasan_slab_free+0x56/0x70
[   15.550730]  slab_free_after_rcu_debug+0xe4/0x310
[   15.551178]  rcu_core+0x66f/0x1c40
[   15.551453]  rcu_core_si+0x12/0x20
[   15.551697]  handle_softirqs+0x209/0x730
[   15.552654]  __irq_exit_rcu+0xc9/0x110
[   15.552968]  irq_exit_rcu+0x12/0x20
[   15.553383]  sysvec_apic_timer_interrupt+0x81/0x90
[   15.553844]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   15.554431] 
[   15.554689] Last potentially related work creation:
[   15.555043]  kasan_save_stack+0x45/0x70
[   15.555496]  kasan_record_aux_stack+0xb2/0xc0
[   15.555936]  kmem_cache_free+0x131/0x420
[   15.556362]  kmem_cache_rcu_uaf+0x194/0x510
[   15.556668]  kunit_try_run_case+0x1a5/0x480
[   15.557122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.557414]  kthread+0x337/0x6f0
[   15.557659]  ret_from_fork+0x116/0x1d0
[   15.558220]  ret_from_fork_asm+0x1a/0x30
[   15.558675] 
[   15.558919] The buggy address belongs to the object at ffff8881033e6000
[   15.558919]  which belongs to the cache test_cache of size 200
[   15.559213] The buggy address is located 0 bytes inside of
[   15.559213]  freed 200-byte region [ffff8881033e6000, ffff8881033e60c8)
[   15.560212] 
[   15.560349] The buggy address belongs to the physical page:
[   15.560669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033e6
[   15.561009] flags: 0x200000000000000(node=0|zone=2)
[   15.561162] page_type: f5(slab)
[   15.561393] raw: 0200000000000000 ffff8881033e3000 dead000000000122 0000000000000000
[   15.562159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   15.562671] page dumped because: kasan: bad access detected
[   15.563110] 
[   15.563520] Memory state around the buggy address:
[   15.563702]  ffff8881033e5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563903]  ffff8881033e5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.564236] >ffff8881033e6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.564510]                    ^
[   15.564771]  ffff8881033e6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   15.565023]  ffff8881033e6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.565273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   15.471367] ==================================================================
[   15.471906] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   15.472372] Free of addr ffff88810333d001 by task kunit_try_catch/228
[   15.472896] 
[   15.473048] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.473111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.473126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.473150] Call Trace:
[   15.473168]  <TASK>
[   15.473194]  dump_stack_lvl+0x73/0xb0
[   15.473238]  print_report+0xd1/0x650
[   15.473267]  ? __virt_addr_valid+0x1db/0x2d0
[   15.473313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.473341]  ? kmem_cache_invalid_free+0x1d8/0x460
[   15.473366]  kasan_report_invalid_free+0x10a/0x130
[   15.473396]  ? kmem_cache_invalid_free+0x1d8/0x460
[   15.473432]  ? kmem_cache_invalid_free+0x1d8/0x460
[   15.473469]  check_slab_allocation+0x11f/0x130
[   15.473500]  __kasan_slab_pre_free+0x28/0x40
[   15.473524]  kmem_cache_free+0xed/0x420
[   15.473548]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   15.473572]  ? kmem_cache_invalid_free+0x1d8/0x460
[   15.473601]  kmem_cache_invalid_free+0x1d8/0x460
[   15.473625]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   15.473648]  ? finish_task_switch.isra.0+0x153/0x700
[   15.473676]  ? __switch_to+0x47/0xf50
[   15.473715]  ? __pfx_read_tsc+0x10/0x10
[   15.473806]  ? ktime_get_ts64+0x86/0x230
[   15.473868]  kunit_try_run_case+0x1a5/0x480
[   15.473900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.473955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.473982]  ? __kthread_parkme+0x82/0x180
[   15.474006]  ? preempt_count_sub+0x50/0x80
[   15.474033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.474057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.474083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.474108]  kthread+0x337/0x6f0
[   15.474129]  ? trace_preempt_on+0x20/0xc0
[   15.474158]  ? __pfx_kthread+0x10/0x10
[   15.474181]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.474223]  ? calculate_sigpending+0x7b/0xa0
[   15.474254]  ? __pfx_kthread+0x10/0x10
[   15.474280]  ret_from_fork+0x116/0x1d0
[   15.474301]  ? __pfx_kthread+0x10/0x10
[   15.474325]  ret_from_fork_asm+0x1a/0x30
[   15.474369]  </TASK>
[   15.474383] 
[   15.484781] Allocated by task 228:
[   15.485117]  kasan_save_stack+0x45/0x70
[   15.485298]  kasan_save_track+0x18/0x40
[   15.485407]  kasan_save_alloc_info+0x3b/0x50
[   15.485824]  __kasan_slab_alloc+0x91/0xa0
[   15.486009]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.486127]  kmem_cache_invalid_free+0x157/0x460
[   15.486420]  kunit_try_run_case+0x1a5/0x480
[   15.486818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.487185]  kthread+0x337/0x6f0
[   15.487325]  ret_from_fork+0x116/0x1d0
[   15.487564]  ret_from_fork_asm+0x1a/0x30
[   15.488163] 
[   15.488291] The buggy address belongs to the object at ffff88810333d000
[   15.488291]  which belongs to the cache test_cache of size 200
[   15.488869] The buggy address is located 1 bytes inside of
[   15.488869]  200-byte region [ffff88810333d000, ffff88810333d0c8)
[   15.489186] 
[   15.489362] The buggy address belongs to the physical page:
[   15.489588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10333d
[   15.490055] flags: 0x200000000000000(node=0|zone=2)
[   15.490270] page_type: f5(slab)
[   15.490440] raw: 0200000000000000 ffff888101117b40 dead000000000122 0000000000000000
[   15.490754] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   15.491108] page dumped because: kasan: bad access detected
[   15.491442] 
[   15.491521] Memory state around the buggy address:
[   15.491870]  ffff88810333cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.492175]  ffff88810333cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.492535] >ffff88810333d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.493193]                    ^
[   15.493407]  ffff88810333d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   15.493696]  ffff88810333d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   15.430609] ==================================================================
[   15.431132] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   15.431324] Free of addr ffff8881033e3000 by task kunit_try_catch/226
[   15.431522] 
[   15.431745] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.431809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.431824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.431875] Call Trace:
[   15.431892]  <TASK>
[   15.431918]  dump_stack_lvl+0x73/0xb0
[   15.431952]  print_report+0xd1/0x650
[   15.431979]  ? __virt_addr_valid+0x1db/0x2d0
[   15.432009]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.432058]  ? kmem_cache_double_free+0x1e5/0x480
[   15.432083]  kasan_report_invalid_free+0x10a/0x130
[   15.432109]  ? kmem_cache_double_free+0x1e5/0x480
[   15.432132]  ? kmem_cache_double_free+0x1e5/0x480
[   15.432154]  check_slab_allocation+0x101/0x130
[   15.432178]  __kasan_slab_pre_free+0x28/0x40
[   15.432201]  kmem_cache_free+0xed/0x420
[   15.432276]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   15.432299]  ? kmem_cache_double_free+0x1e5/0x480
[   15.432324]  kmem_cache_double_free+0x1e5/0x480
[   15.432346]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   15.432368]  ? finish_task_switch.isra.0+0x153/0x700
[   15.432395]  ? __switch_to+0x47/0xf50
[   15.432427]  ? __pfx_read_tsc+0x10/0x10
[   15.432463]  ? ktime_get_ts64+0x86/0x230
[   15.432494]  kunit_try_run_case+0x1a5/0x480
[   15.432520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.432541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.432570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.432597]  ? __kthread_parkme+0x82/0x180
[   15.432620]  ? preempt_count_sub+0x50/0x80
[   15.432644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.432666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.432693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.432976]  kthread+0x337/0x6f0
[   15.433041]  ? trace_preempt_on+0x20/0xc0
[   15.433075]  ? __pfx_kthread+0x10/0x10
[   15.433122]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.433171]  ? calculate_sigpending+0x7b/0xa0
[   15.433203]  ? __pfx_kthread+0x10/0x10
[   15.433228]  ret_from_fork+0x116/0x1d0
[   15.433251]  ? __pfx_kthread+0x10/0x10
[   15.433273]  ret_from_fork_asm+0x1a/0x30
[   15.433309]  </TASK>
[   15.433323] 
[   15.444120] Allocated by task 226:
[   15.444502]  kasan_save_stack+0x45/0x70
[   15.444844]  kasan_save_track+0x18/0x40
[   15.445301]  kasan_save_alloc_info+0x3b/0x50
[   15.445496]  __kasan_slab_alloc+0x91/0xa0
[   15.445607]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.445833]  kmem_cache_double_free+0x14f/0x480
[   15.446445]  kunit_try_run_case+0x1a5/0x480
[   15.446591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.447009]  kthread+0x337/0x6f0
[   15.447251]  ret_from_fork+0x116/0x1d0
[   15.447605]  ret_from_fork_asm+0x1a/0x30
[   15.447780] 
[   15.448153] Freed by task 226:
[   15.448590]  kasan_save_stack+0x45/0x70
[   15.448818]  kasan_save_track+0x18/0x40
[   15.449038]  kasan_save_free_info+0x3f/0x60
[   15.449147]  __kasan_slab_free+0x56/0x70
[   15.449290]  kmem_cache_free+0x249/0x420
[   15.449650]  kmem_cache_double_free+0x16a/0x480
[   15.450079]  kunit_try_run_case+0x1a5/0x480
[   15.450322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.450593]  kthread+0x337/0x6f0
[   15.450815]  ret_from_fork+0x116/0x1d0
[   15.451372]  ret_from_fork_asm+0x1a/0x30
[   15.451634] 
[   15.452047] The buggy address belongs to the object at ffff8881033e3000
[   15.452047]  which belongs to the cache test_cache of size 200
[   15.452703] The buggy address is located 0 bytes inside of
[   15.452703]  200-byte region [ffff8881033e3000, ffff8881033e30c8)
[   15.453586] 
[   15.453783] The buggy address belongs to the physical page:
[   15.454112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033e3
[   15.454844] flags: 0x200000000000000(node=0|zone=2)
[   15.455123] page_type: f5(slab)
[   15.455253] raw: 0200000000000000 ffff8881018acdc0 dead000000000122 0000000000000000
[   15.455765] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   15.456270] page dumped because: kasan: bad access detected
[   15.456424] 
[   15.456511] Memory state around the buggy address:
[   15.456645]  ffff8881033e2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.457378]  ffff8881033e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.457998] >ffff8881033e3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.458412]                    ^
[   15.458624]  ffff8881033e3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   15.459217]  ffff8881033e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   15.385322] ==================================================================
[   15.385738] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   15.385981] Read of size 1 at addr ffff88810333b0c8 by task kunit_try_catch/224
[   15.386135] 
[   15.386570] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.386630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.386644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.386669] Call Trace:
[   15.386684]  <TASK>
[   15.386710]  dump_stack_lvl+0x73/0xb0
[   15.386746]  print_report+0xd1/0x650
[   15.386771]  ? __virt_addr_valid+0x1db/0x2d0
[   15.386799]  ? kmem_cache_oob+0x402/0x530
[   15.386819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.386843]  ? kmem_cache_oob+0x402/0x530
[   15.386863]  kasan_report+0x141/0x180
[   15.386887]  ? kmem_cache_oob+0x402/0x530
[   15.386912]  __asan_report_load1_noabort+0x18/0x20
[   15.386934]  kmem_cache_oob+0x402/0x530
[   15.386954]  ? trace_hardirqs_on+0x37/0xe0
[   15.386981]  ? __pfx_kmem_cache_oob+0x10/0x10
[   15.387001]  ? finish_task_switch.isra.0+0x153/0x700
[   15.387026]  ? __switch_to+0x47/0xf50
[   15.387058]  ? __pfx_read_tsc+0x10/0x10
[   15.387082]  ? ktime_get_ts64+0x86/0x230
[   15.387201]  kunit_try_run_case+0x1a5/0x480
[   15.387231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.387252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.387280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.387306]  ? __kthread_parkme+0x82/0x180
[   15.387330]  ? preempt_count_sub+0x50/0x80
[   15.387367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.387392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.387419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.387445]  kthread+0x337/0x6f0
[   15.387491]  ? trace_preempt_on+0x20/0xc0
[   15.387516]  ? __pfx_kthread+0x10/0x10
[   15.387540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.387563]  ? calculate_sigpending+0x7b/0xa0
[   15.387590]  ? __pfx_kthread+0x10/0x10
[   15.387613]  ret_from_fork+0x116/0x1d0
[   15.387635]  ? __pfx_kthread+0x10/0x10
[   15.387656]  ret_from_fork_asm+0x1a/0x30
[   15.387689]  </TASK>
[   15.387743] 
[   15.397840] Allocated by task 224:
[   15.398410]  kasan_save_stack+0x45/0x70
[   15.398753]  kasan_save_track+0x18/0x40
[   15.399032]  kasan_save_alloc_info+0x3b/0x50
[   15.399263]  __kasan_slab_alloc+0x91/0xa0
[   15.399378]  kmem_cache_alloc_noprof+0x123/0x3f0
[   15.399728]  kmem_cache_oob+0x157/0x530
[   15.399950]  kunit_try_run_case+0x1a5/0x480
[   15.400064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.400603]  kthread+0x337/0x6f0
[   15.400865]  ret_from_fork+0x116/0x1d0
[   15.400996]  ret_from_fork_asm+0x1a/0x30
[   15.401171] 
[   15.401345] The buggy address belongs to the object at ffff88810333b000
[   15.401345]  which belongs to the cache test_cache of size 200
[   15.402046] The buggy address is located 0 bytes to the right of
[   15.402046]  allocated 200-byte region [ffff88810333b000, ffff88810333b0c8)
[   15.402675] 
[   15.403363] The buggy address belongs to the physical page:
[   15.403551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10333b
[   15.404058] flags: 0x200000000000000(node=0|zone=2)
[   15.404488] page_type: f5(slab)
[   15.404844] raw: 0200000000000000 ffff888101117a00 dead000000000122 0000000000000000
[   15.405229] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   15.405585] page dumped because: kasan: bad access detected
[   15.405964] 
[   15.406068] Memory state around the buggy address:
[   15.406386]  ffff88810333af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406822]  ffff88810333b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.407224] >ffff88810333b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   15.407676]                                               ^
[   15.408220]  ffff88810333b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409063]  ffff88810333b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   15.338717] ==================================================================
[   15.339155] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560
[   15.339428] Read of size 8 at addr ffff8881033355c0 by task kunit_try_catch/217
[   15.340046] 
[   15.340406] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.340483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.340499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.340523] Call Trace:
[   15.340540]  <TASK>
[   15.340583]  dump_stack_lvl+0x73/0xb0
[   15.340622]  print_report+0xd1/0x650
[   15.340649]  ? __virt_addr_valid+0x1db/0x2d0
[   15.340677]  ? workqueue_uaf+0x4d6/0x560
[   15.340807]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.340835]  ? workqueue_uaf+0x4d6/0x560
[   15.340859]  kasan_report+0x141/0x180
[   15.340884]  ? workqueue_uaf+0x4d6/0x560
[   15.340913]  __asan_report_load8_noabort+0x18/0x20
[   15.340936]  workqueue_uaf+0x4d6/0x560
[   15.340960]  ? __pfx_workqueue_uaf+0x10/0x10
[   15.340985]  ? __schedule+0x10cc/0x2b60
[   15.341013]  ? __pfx_read_tsc+0x10/0x10
[   15.341040]  ? ktime_get_ts64+0x86/0x230
[   15.341069]  kunit_try_run_case+0x1a5/0x480
[   15.341093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.341114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.341140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.341164]  ? __kthread_parkme+0x82/0x180
[   15.341211]  ? preempt_count_sub+0x50/0x80
[   15.341238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.341260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.341297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.341321]  kthread+0x337/0x6f0
[   15.341343]  ? trace_preempt_on+0x20/0xc0
[   15.341368]  ? __pfx_kthread+0x10/0x10
[   15.341412]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.341436]  ? calculate_sigpending+0x7b/0xa0
[   15.341476]  ? __pfx_kthread+0x10/0x10
[   15.341501]  ret_from_fork+0x116/0x1d0
[   15.341522]  ? __pfx_kthread+0x10/0x10
[   15.341543]  ret_from_fork_asm+0x1a/0x30
[   15.341580]  </TASK>
[   15.341594] 
[   15.350474] Allocated by task 217:
[   15.350782]  kasan_save_stack+0x45/0x70
[   15.351241]  kasan_save_track+0x18/0x40
[   15.351545]  kasan_save_alloc_info+0x3b/0x50
[   15.352076]  __kasan_kmalloc+0xb7/0xc0
[   15.352477]  __kmalloc_cache_noprof+0x189/0x420
[   15.352971]  workqueue_uaf+0x152/0x560
[   15.353166]  kunit_try_run_case+0x1a5/0x480
[   15.353301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353541]  kthread+0x337/0x6f0
[   15.354129]  ret_from_fork+0x116/0x1d0
[   15.354569]  ret_from_fork_asm+0x1a/0x30
[   15.354960] 
[   15.355186] Freed by task 41:
[   15.355606]  kasan_save_stack+0x45/0x70
[   15.356026]  kasan_save_track+0x18/0x40
[   15.356534]  kasan_save_free_info+0x3f/0x60
[   15.356738]  __kasan_slab_free+0x56/0x70
[   15.357011]  kfree+0x222/0x3f0
[   15.357158]  workqueue_uaf_work+0x12/0x20
[   15.357489]  process_one_work+0x5ee/0xf60
[   15.358042]  worker_thread+0x758/0x1220
[   15.358464]  kthread+0x337/0x6f0
[   15.358780]  ret_from_fork+0x116/0x1d0
[   15.359154]  ret_from_fork_asm+0x1a/0x30
[   15.359310] 
[   15.359523] Last potentially related work creation:
[   15.359867]  kasan_save_stack+0x45/0x70
[   15.360507]  kasan_record_aux_stack+0xb2/0xc0
[   15.360864]  __queue_work+0x626/0xeb0
[   15.361170]  queue_work_on+0xb6/0xc0
[   15.361487]  workqueue_uaf+0x26d/0x560
[   15.361623]  kunit_try_run_case+0x1a5/0x480
[   15.361991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.362332]  kthread+0x337/0x6f0
[   15.362576]  ret_from_fork+0x116/0x1d0
[   15.362774]  ret_from_fork_asm+0x1a/0x30
[   15.362981] 
[   15.363074] The buggy address belongs to the object at ffff8881033355c0
[   15.363074]  which belongs to the cache kmalloc-32 of size 32
[   15.364208] The buggy address is located 0 bytes inside of
[   15.364208]  freed 32-byte region [ffff8881033355c0, ffff8881033355e0)
[   15.365014] 
[   15.365086] The buggy address belongs to the physical page:
[   15.365758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103335
[   15.366312] flags: 0x200000000000000(node=0|zone=2)
[   15.367060] page_type: f5(slab)
[   15.367473] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   15.368046] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   15.368253] page dumped because: kasan: bad access detected
[   15.368589] 
[   15.368828] Memory state around the buggy address:
[   15.369235]  ffff888103335480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   15.369739]  ffff888103335500: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   15.369912] >ffff888103335580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   15.370066]                                            ^
[   15.370196]  ffff888103335600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370352]  ffff888103335680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370549] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   15.300002] ==================================================================
[   15.300784] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   15.301173] Read of size 4 at addr ffff8881033354c0 by task swapper/1/0
[   15.301869] 
[   15.302051] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.302112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.302127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.302151] Call Trace:
[   15.302193]  <IRQ>
[   15.302369]  dump_stack_lvl+0x73/0xb0
[   15.302414]  print_report+0xd1/0x650
[   15.302442]  ? __virt_addr_valid+0x1db/0x2d0
[   15.302488]  ? rcu_uaf_reclaim+0x50/0x60
[   15.302511]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.302534]  ? rcu_uaf_reclaim+0x50/0x60
[   15.302556]  kasan_report+0x141/0x180
[   15.302581]  ? rcu_uaf_reclaim+0x50/0x60
[   15.302608]  __asan_report_load4_noabort+0x18/0x20
[   15.302631]  rcu_uaf_reclaim+0x50/0x60
[   15.302653]  rcu_core+0x66f/0x1c40
[   15.302684]  ? __pfx_rcu_core+0x10/0x10
[   15.302707]  ? ktime_get+0x6b/0x150
[   15.302735]  rcu_core_si+0x12/0x20
[   15.302757]  handle_softirqs+0x209/0x730
[   15.302780]  ? hrtimer_interrupt+0x2fe/0x780
[   15.302804]  ? __pfx_handle_softirqs+0x10/0x10
[   15.302831]  __irq_exit_rcu+0xc9/0x110
[   15.302852]  irq_exit_rcu+0x12/0x20
[   15.302872]  sysvec_apic_timer_interrupt+0x81/0x90
[   15.302901]  </IRQ>
[   15.302938]  <TASK>
[   15.302951]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   15.303064] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   15.303375] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 a8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   15.303513] RSP: 0000:ffff88810087fdc8 EFLAGS: 00010212
[   15.303636] RAX: ffff8881cbd5b000 RBX: ffff88810085b000 RCX: ffffffff8ceb1245
[   15.303695] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 0000000000016aec
[   15.303747] RBP: ffff88810087fdd0 R08: 0000000000000001 R09: ffffed102b62618a
[   15.303797] R10: ffff88815b130c53 R11: 0000000000039800 R12: 0000000000000001
[   15.303849] R13: ffffed102010b600 R14: ffffffff8ebc3190 R15: 0000000000000000
[   15.303921]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   15.303990]  ? default_idle+0xd/0x20
[   15.304017]  arch_cpu_idle+0xd/0x20
[   15.304040]  default_idle_call+0x48/0x80
[   15.304063]  do_idle+0x379/0x4f0
[   15.304092]  ? __pfx_do_idle+0x10/0x10
[   15.304123]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   15.304153]  ? complete+0x15b/0x1d0
[   15.304186]  cpu_startup_entry+0x5c/0x70
[   15.304216]  start_secondary+0x211/0x290
[   15.304241]  ? __pfx_start_secondary+0x10/0x10
[   15.304270]  common_startup_64+0x13e/0x148
[   15.304308]  </TASK>
[   15.304322] 
[   15.315158] Allocated by task 215:
[   15.315547]  kasan_save_stack+0x45/0x70
[   15.315927]  kasan_save_track+0x18/0x40
[   15.316187]  kasan_save_alloc_info+0x3b/0x50
[   15.316391]  __kasan_kmalloc+0xb7/0xc0
[   15.316659]  __kmalloc_cache_noprof+0x189/0x420
[   15.316925]  rcu_uaf+0xb0/0x330
[   15.317054]  kunit_try_run_case+0x1a5/0x480
[   15.317342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.317627]  kthread+0x337/0x6f0
[   15.317813]  ret_from_fork+0x116/0x1d0
[   15.318022]  ret_from_fork_asm+0x1a/0x30
[   15.318285] 
[   15.318361] Freed by task 0:
[   15.318551]  kasan_save_stack+0x45/0x70
[   15.318755]  kasan_save_track+0x18/0x40
[   15.318900]  kasan_save_free_info+0x3f/0x60
[   15.319012]  __kasan_slab_free+0x56/0x70
[   15.319131]  kfree+0x222/0x3f0
[   15.319312]  rcu_uaf_reclaim+0x1f/0x60
[   15.319432]  rcu_core+0x66f/0x1c40
[   15.319659]  rcu_core_si+0x12/0x20
[   15.319832]  handle_softirqs+0x209/0x730
[   15.320781]  __irq_exit_rcu+0xc9/0x110
[   15.321350]  irq_exit_rcu+0x12/0x20
[   15.321489]  sysvec_apic_timer_interrupt+0x81/0x90
[   15.321779]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   15.322002] 
[   15.322152] Last potentially related work creation:
[   15.322502]  kasan_save_stack+0x45/0x70
[   15.322758]  kasan_record_aux_stack+0xb2/0xc0
[   15.322917]  __call_rcu_common.constprop.0+0x72/0x9d0
[   15.323189]  call_rcu+0x12/0x20
[   15.323390]  rcu_uaf+0x168/0x330
[   15.323507]  kunit_try_run_case+0x1a5/0x480
[   15.323836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324089]  kthread+0x337/0x6f0
[   15.324317]  ret_from_fork+0x116/0x1d0
[   15.324466]  ret_from_fork_asm+0x1a/0x30
[   15.324728] 
[   15.324808] The buggy address belongs to the object at ffff8881033354c0
[   15.324808]  which belongs to the cache kmalloc-32 of size 32
[   15.325302] The buggy address is located 0 bytes inside of
[   15.325302]  freed 32-byte region [ffff8881033354c0, ffff8881033354e0)
[   15.325761] 
[   15.325920] The buggy address belongs to the physical page:
[   15.326061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103335
[   15.326488] flags: 0x200000000000000(node=0|zone=2)
[   15.326680] page_type: f5(slab)
[   15.326921] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   15.327282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   15.327508] page dumped because: kasan: bad access detected
[   15.327861] 
[   15.327956] Memory state around the buggy address:
[   15.328187]  ffff888103335380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   15.328550]  ffff888103335400: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   15.328845] >ffff888103335480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   15.329143]                                            ^
[   15.329378]  ffff888103335500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329710]  ffff888103335580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   15.218315] ==================================================================
[   15.219010] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   15.219597] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213
[   15.219932] 
[   15.220228] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.220334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.220362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.220408] Call Trace:
[   15.220445]  <TASK>
[   15.220505]  dump_stack_lvl+0x73/0xb0
[   15.220592]  print_report+0xd1/0x650
[   15.220641]  ? __virt_addr_valid+0x1db/0x2d0
[   15.220693]  ? ksize_uaf+0x5fe/0x6c0
[   15.220749]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.220816]  ? ksize_uaf+0x5fe/0x6c0
[   15.220863]  kasan_report+0x141/0x180
[   15.220914]  ? ksize_uaf+0x5fe/0x6c0
[   15.220978]  __asan_report_load1_noabort+0x18/0x20
[   15.221041]  ksize_uaf+0x5fe/0x6c0
[   15.221092]  ? __pfx_ksize_uaf+0x10/0x10
[   15.221132]  ? __schedule+0x10cc/0x2b60
[   15.221175]  ? __pfx_read_tsc+0x10/0x10
[   15.221255]  ? ktime_get_ts64+0x86/0x230
[   15.221309]  kunit_try_run_case+0x1a5/0x480
[   15.221360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.221403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.221451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.221520]  ? __kthread_parkme+0x82/0x180
[   15.221581]  ? preempt_count_sub+0x50/0x80
[   15.221638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.221687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.221742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.221779]  kthread+0x337/0x6f0
[   15.221802]  ? trace_preempt_on+0x20/0xc0
[   15.221828]  ? __pfx_kthread+0x10/0x10
[   15.221851]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.221875]  ? calculate_sigpending+0x7b/0xa0
[   15.221903]  ? __pfx_kthread+0x10/0x10
[   15.221927]  ret_from_fork+0x116/0x1d0
[   15.221947]  ? __pfx_kthread+0x10/0x10
[   15.221969]  ret_from_fork_asm+0x1a/0x30
[   15.222003]  </TASK>
[   15.222017] 
[   15.232708] Allocated by task 213:
[   15.233049]  kasan_save_stack+0x45/0x70
[   15.233397]  kasan_save_track+0x18/0x40
[   15.233597]  kasan_save_alloc_info+0x3b/0x50
[   15.233978]  __kasan_kmalloc+0xb7/0xc0
[   15.234285]  __kmalloc_cache_noprof+0x189/0x420
[   15.234531]  ksize_uaf+0xaa/0x6c0
[   15.234805]  kunit_try_run_case+0x1a5/0x480
[   15.235056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.235520]  kthread+0x337/0x6f0
[   15.235722]  ret_from_fork+0x116/0x1d0
[   15.235915]  ret_from_fork_asm+0x1a/0x30
[   15.236213] 
[   15.236417] Freed by task 213:
[   15.236693]  kasan_save_stack+0x45/0x70
[   15.236951]  kasan_save_track+0x18/0x40
[   15.237233]  kasan_save_free_info+0x3f/0x60
[   15.237626]  __kasan_slab_free+0x56/0x70
[   15.237841]  kfree+0x222/0x3f0
[   15.238085]  ksize_uaf+0x12c/0x6c0
[   15.238448]  kunit_try_run_case+0x1a5/0x480
[   15.238755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.239030]  kthread+0x337/0x6f0
[   15.239204]  ret_from_fork+0x116/0x1d0
[   15.239406]  ret_from_fork_asm+0x1a/0x30
[   15.239771] 
[   15.239940] The buggy address belongs to the object at ffff8881033dc200
[   15.239940]  which belongs to the cache kmalloc-128 of size 128
[   15.241087] The buggy address is located 0 bytes inside of
[   15.241087]  freed 128-byte region [ffff8881033dc200, ffff8881033dc280)
[   15.241701] 
[   15.241877] The buggy address belongs to the physical page:
[   15.242202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.242603] flags: 0x200000000000000(node=0|zone=2)
[   15.242841] page_type: f5(slab)
[   15.243032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.243578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.244098] page dumped because: kasan: bad access detected
[   15.244433] 
[   15.244580] Memory state around the buggy address:
[   15.244788]  ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.245061]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245577] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.246074]                    ^
[   15.246423]  ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246781]  ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247154] ==================================================================
[   15.248769] ==================================================================
[   15.249182] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   15.251163] Read of size 1 at addr ffff8881033dc278 by task kunit_try_catch/213
[   15.251622] 
[   15.251855] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.251958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.251986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.252028] Call Trace:
[   15.252069]  <TASK>
[   15.252110]  dump_stack_lvl+0x73/0xb0
[   15.252192]  print_report+0xd1/0x650
[   15.252245]  ? __virt_addr_valid+0x1db/0x2d0
[   15.252313]  ? ksize_uaf+0x5e4/0x6c0
[   15.252357]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.252404]  ? ksize_uaf+0x5e4/0x6c0
[   15.252444]  kasan_report+0x141/0x180
[   15.252505]  ? ksize_uaf+0x5e4/0x6c0
[   15.252558]  __asan_report_load1_noabort+0x18/0x20
[   15.252601]  ksize_uaf+0x5e4/0x6c0
[   15.252641]  ? __pfx_ksize_uaf+0x10/0x10
[   15.252684]  ? __schedule+0x10cc/0x2b60
[   15.252735]  ? __pfx_read_tsc+0x10/0x10
[   15.252780]  ? ktime_get_ts64+0x86/0x230
[   15.252830]  kunit_try_run_case+0x1a5/0x480
[   15.252879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.252922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.252971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.253017]  ? __kthread_parkme+0x82/0x180
[   15.253058]  ? preempt_count_sub+0x50/0x80
[   15.253111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.253150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.253194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.253276]  kthread+0x337/0x6f0
[   15.253311]  ? trace_preempt_on+0x20/0xc0
[   15.253351]  ? __pfx_kthread+0x10/0x10
[   15.253392]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.253437]  ? calculate_sigpending+0x7b/0xa0
[   15.253495]  ? __pfx_kthread+0x10/0x10
[   15.253533]  ret_from_fork+0x116/0x1d0
[   15.253570]  ? __pfx_kthread+0x10/0x10
[   15.253612]  ret_from_fork_asm+0x1a/0x30
[   15.253678]  </TASK>
[   15.253701] 
[   15.266605] Allocated by task 213:
[   15.266852]  kasan_save_stack+0x45/0x70
[   15.267125]  kasan_save_track+0x18/0x40
[   15.267959]  kasan_save_alloc_info+0x3b/0x50
[   15.268282]  __kasan_kmalloc+0xb7/0xc0
[   15.268886]  __kmalloc_cache_noprof+0x189/0x420
[   15.269150]  ksize_uaf+0xaa/0x6c0
[   15.269328]  kunit_try_run_case+0x1a5/0x480
[   15.269995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.270240]  kthread+0x337/0x6f0
[   15.270518]  ret_from_fork+0x116/0x1d0
[   15.270711]  ret_from_fork_asm+0x1a/0x30
[   15.271765] 
[   15.271926] Freed by task 213:
[   15.272196]  kasan_save_stack+0x45/0x70
[   15.272382]  kasan_save_track+0x18/0x40
[   15.272990]  kasan_save_free_info+0x3f/0x60
[   15.273175]  __kasan_slab_free+0x56/0x70
[   15.273344]  kfree+0x222/0x3f0
[   15.273703]  ksize_uaf+0x12c/0x6c0
[   15.274017]  kunit_try_run_case+0x1a5/0x480
[   15.274282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.274927]  kthread+0x337/0x6f0
[   15.275183]  ret_from_fork+0x116/0x1d0
[   15.277079]  ret_from_fork_asm+0x1a/0x30
[   15.277289] 
[   15.277397] The buggy address belongs to the object at ffff8881033dc200
[   15.277397]  which belongs to the cache kmalloc-128 of size 128
[   15.278970] The buggy address is located 120 bytes inside of
[   15.278970]  freed 128-byte region [ffff8881033dc200, ffff8881033dc280)
[   15.279790] 
[   15.279921] The buggy address belongs to the physical page:
[   15.280129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.280405] flags: 0x200000000000000(node=0|zone=2)
[   15.280608] page_type: f5(slab)
[   15.280776] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.282620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.283121] page dumped because: kasan: bad access detected
[   15.284155] 
[   15.284329] Memory state around the buggy address:
[   15.284614]  ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.284878]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.285169] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.285525]                                                                 ^
[   15.286693]  ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.287157]  ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288002] ==================================================================
[   15.183372] ==================================================================
[   15.184673] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   15.185361] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213
[   15.185653] 
[   15.185815] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.185920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.185944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.185970] Call Trace:
[   15.185986]  <TASK>
[   15.186010]  dump_stack_lvl+0x73/0xb0
[   15.186049]  print_report+0xd1/0x650
[   15.186081]  ? __virt_addr_valid+0x1db/0x2d0
[   15.186122]  ? ksize_uaf+0x19d/0x6c0
[   15.186146]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.186170]  ? ksize_uaf+0x19d/0x6c0
[   15.186196]  kasan_report+0x141/0x180
[   15.186282]  ? ksize_uaf+0x19d/0x6c0
[   15.186325]  ? ksize_uaf+0x19d/0x6c0
[   15.186385]  __kasan_check_byte+0x3d/0x50
[   15.186449]  ksize+0x20/0x60
[   15.186518]  ksize_uaf+0x19d/0x6c0
[   15.186584]  ? __pfx_ksize_uaf+0x10/0x10
[   15.186655]  ? __schedule+0x10cc/0x2b60
[   15.186728]  ? __pfx_read_tsc+0x10/0x10
[   15.186796]  ? ktime_get_ts64+0x86/0x230
[   15.186866]  kunit_try_run_case+0x1a5/0x480
[   15.186897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.186919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.186947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.186974]  ? __kthread_parkme+0x82/0x180
[   15.186998]  ? preempt_count_sub+0x50/0x80
[   15.187024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.187074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.187101]  kthread+0x337/0x6f0
[   15.187122]  ? trace_preempt_on+0x20/0xc0
[   15.187149]  ? __pfx_kthread+0x10/0x10
[   15.187172]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.187200]  ? calculate_sigpending+0x7b/0xa0
[   15.187264]  ? __pfx_kthread+0x10/0x10
[   15.187288]  ret_from_fork+0x116/0x1d0
[   15.187310]  ? __pfx_kthread+0x10/0x10
[   15.187333]  ret_from_fork_asm+0x1a/0x30
[   15.187380]  </TASK>
[   15.187393] 
[   15.199404] Allocated by task 213:
[   15.199773]  kasan_save_stack+0x45/0x70
[   15.200177]  kasan_save_track+0x18/0x40
[   15.200660]  kasan_save_alloc_info+0x3b/0x50
[   15.201126]  __kasan_kmalloc+0xb7/0xc0
[   15.201577]  __kmalloc_cache_noprof+0x189/0x420
[   15.201920]  ksize_uaf+0xaa/0x6c0
[   15.202282]  kunit_try_run_case+0x1a5/0x480
[   15.202655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.202976]  kthread+0x337/0x6f0
[   15.203308]  ret_from_fork+0x116/0x1d0
[   15.203693]  ret_from_fork_asm+0x1a/0x30
[   15.204045] 
[   15.204286] Freed by task 213:
[   15.204489]  kasan_save_stack+0x45/0x70
[   15.204867]  kasan_save_track+0x18/0x40
[   15.205184]  kasan_save_free_info+0x3f/0x60
[   15.205592]  __kasan_slab_free+0x56/0x70
[   15.205848]  kfree+0x222/0x3f0
[   15.206151]  ksize_uaf+0x12c/0x6c0
[   15.206428]  kunit_try_run_case+0x1a5/0x480
[   15.206682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.207133]  kthread+0x337/0x6f0
[   15.207434]  ret_from_fork+0x116/0x1d0
[   15.207763]  ret_from_fork_asm+0x1a/0x30
[   15.208120] 
[   15.208301] The buggy address belongs to the object at ffff8881033dc200
[   15.208301]  which belongs to the cache kmalloc-128 of size 128
[   15.208937] The buggy address is located 0 bytes inside of
[   15.208937]  freed 128-byte region [ffff8881033dc200, ffff8881033dc280)
[   15.209865] 
[   15.210057] The buggy address belongs to the physical page:
[   15.210504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.211056] flags: 0x200000000000000(node=0|zone=2)
[   15.211410] page_type: f5(slab)
[   15.211610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.212087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.212725] page dumped because: kasan: bad access detected
[   15.212963] 
[   15.213177] Memory state around the buggy address:
[   15.213598]  ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.214092]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214614] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.215059]                    ^
[   15.215292]  ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.215882]  ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.216285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   15.143297] ==================================================================
[   15.143710] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   15.144698] Read of size 1 at addr ffff8881033dc17f by task kunit_try_catch/211
[   15.145280] 
[   15.145540] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.145649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.145678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.145726] Call Trace:
[   15.145765]  <TASK>
[   15.145793]  dump_stack_lvl+0x73/0xb0
[   15.145840]  print_report+0xd1/0x650
[   15.145867]  ? __virt_addr_valid+0x1db/0x2d0
[   15.145897]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.145938]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.145967]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.145993]  kasan_report+0x141/0x180
[   15.146018]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.146048]  __asan_report_load1_noabort+0x18/0x20
[   15.146071]  ksize_unpoisons_memory+0x7b6/0x9b0
[   15.146098]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.146123]  ? finish_task_switch.isra.0+0x153/0x700
[   15.146148]  ? __switch_to+0x47/0xf50
[   15.146176]  ? __schedule+0x10cc/0x2b60
[   15.146211]  ? __pfx_read_tsc+0x10/0x10
[   15.146538]  ? ktime_get_ts64+0x86/0x230
[   15.146622]  kunit_try_run_case+0x1a5/0x480
[   15.146678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.146772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.146800]  ? __kthread_parkme+0x82/0x180
[   15.146824]  ? preempt_count_sub+0x50/0x80
[   15.146849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.146899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.146925]  kthread+0x337/0x6f0
[   15.146947]  ? trace_preempt_on+0x20/0xc0
[   15.146973]  ? __pfx_kthread+0x10/0x10
[   15.146996]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.147021]  ? calculate_sigpending+0x7b/0xa0
[   15.147050]  ? __pfx_kthread+0x10/0x10
[   15.147073]  ret_from_fork+0x116/0x1d0
[   15.147094]  ? __pfx_kthread+0x10/0x10
[   15.147116]  ret_from_fork_asm+0x1a/0x30
[   15.147150]  </TASK>
[   15.147164] 
[   15.162874] Allocated by task 211:
[   15.163659]  kasan_save_stack+0x45/0x70
[   15.163957]  kasan_save_track+0x18/0x40
[   15.164176]  kasan_save_alloc_info+0x3b/0x50
[   15.164807]  __kasan_kmalloc+0xb7/0xc0
[   15.165032]  __kmalloc_cache_noprof+0x189/0x420
[   15.165242]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.165761]  kunit_try_run_case+0x1a5/0x480
[   15.166345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167096]  kthread+0x337/0x6f0
[   15.167318]  ret_from_fork+0x116/0x1d0
[   15.167505]  ret_from_fork_asm+0x1a/0x30
[   15.167674] 
[   15.167774] The buggy address belongs to the object at ffff8881033dc100
[   15.167774]  which belongs to the cache kmalloc-128 of size 128
[   15.168172] The buggy address is located 12 bytes to the right of
[   15.168172]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.168582] 
[   15.168676] The buggy address belongs to the physical page:
[   15.168876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.169140] flags: 0x200000000000000(node=0|zone=2)
[   15.169332] page_type: f5(slab)
[   15.170704] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.171091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.171356] page dumped because: kasan: bad access detected
[   15.172236] 
[   15.172420] Memory state around the buggy address:
[   15.172872]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.174190]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174735] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.175700]                                                                 ^
[   15.176032]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.176574]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177112] ==================================================================
[   15.066074] ==================================================================
[   15.066637] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   15.067403] Read of size 1 at addr ffff8881033dc173 by task kunit_try_catch/211
[   15.067907] 
[   15.068902] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.069300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.069324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.069350] Call Trace:
[   15.069370]  <TASK>
[   15.069396]  dump_stack_lvl+0x73/0xb0
[   15.069443]  print_report+0xd1/0x650
[   15.069496]  ? __virt_addr_valid+0x1db/0x2d0
[   15.069524]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.069575]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069601]  kasan_report+0x141/0x180
[   15.069625]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069655]  __asan_report_load1_noabort+0x18/0x20
[   15.069677]  ksize_unpoisons_memory+0x81c/0x9b0
[   15.069752]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.069800]  ? finish_task_switch.isra.0+0x153/0x700
[   15.069842]  ? __switch_to+0x47/0xf50
[   15.069885]  ? __schedule+0x10cc/0x2b60
[   15.069925]  ? __pfx_read_tsc+0x10/0x10
[   15.069960]  ? ktime_get_ts64+0x86/0x230
[   15.069999]  kunit_try_run_case+0x1a5/0x480
[   15.070037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.070103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.070140]  ? __kthread_parkme+0x82/0x180
[   15.070174]  ? preempt_count_sub+0x50/0x80
[   15.070225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.070381]  kthread+0x337/0x6f0
[   15.070405]  ? trace_preempt_on+0x20/0xc0
[   15.070432]  ? __pfx_kthread+0x10/0x10
[   15.070473]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.070505]  ? calculate_sigpending+0x7b/0xa0
[   15.070534]  ? __pfx_kthread+0x10/0x10
[   15.070557]  ret_from_fork+0x116/0x1d0
[   15.070579]  ? __pfx_kthread+0x10/0x10
[   15.070602]  ret_from_fork_asm+0x1a/0x30
[   15.070639]  </TASK>
[   15.070653] 
[   15.085618] Allocated by task 211:
[   15.085990]  kasan_save_stack+0x45/0x70
[   15.086260]  kasan_save_track+0x18/0x40
[   15.086574]  kasan_save_alloc_info+0x3b/0x50
[   15.086860]  __kasan_kmalloc+0xb7/0xc0
[   15.087130]  __kmalloc_cache_noprof+0x189/0x420
[   15.087418]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.088825]  kunit_try_run_case+0x1a5/0x480
[   15.089063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090122]  kthread+0x337/0x6f0
[   15.090426]  ret_from_fork+0x116/0x1d0
[   15.090612]  ret_from_fork_asm+0x1a/0x30
[   15.091274] 
[   15.091549] The buggy address belongs to the object at ffff8881033dc100
[   15.091549]  which belongs to the cache kmalloc-128 of size 128
[   15.091947] The buggy address is located 0 bytes to the right of
[   15.091947]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.093637] 
[   15.093936] The buggy address belongs to the physical page:
[   15.094207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.094791] flags: 0x200000000000000(node=0|zone=2)
[   15.095158] page_type: f5(slab)
[   15.096119] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.096726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.097514] page dumped because: kasan: bad access detected
[   15.098277] 
[   15.098531] Memory state around the buggy address:
[   15.099145]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.099480]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100536] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.100923]                                                              ^
[   15.101341]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101758]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102204] ==================================================================
[   15.103042] ==================================================================
[   15.103801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   15.104257] Read of size 1 at addr ffff8881033dc178 by task kunit_try_catch/211
[   15.105541] 
[   15.105896] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.106009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.106038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.106079] Call Trace:
[   15.106121]  <TASK>
[   15.106157]  dump_stack_lvl+0x73/0xb0
[   15.106228]  print_report+0xd1/0x650
[   15.106282]  ? __virt_addr_valid+0x1db/0x2d0
[   15.106333]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.106437]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106502]  kasan_report+0x141/0x180
[   15.106546]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106605]  __asan_report_load1_noabort+0x18/0x20
[   15.106647]  ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106692]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.106876]  ? finish_task_switch.isra.0+0x153/0x700
[   15.106930]  ? __switch_to+0x47/0xf50
[   15.106983]  ? __schedule+0x10cc/0x2b60
[   15.107030]  ? __pfx_read_tsc+0x10/0x10
[   15.107070]  ? ktime_get_ts64+0x86/0x230
[   15.107120]  kunit_try_run_case+0x1a5/0x480
[   15.107170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.107280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.107309]  ? __kthread_parkme+0x82/0x180
[   15.107333]  ? preempt_count_sub+0x50/0x80
[   15.107370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.107448]  kthread+0x337/0x6f0
[   15.107495]  ? trace_preempt_on+0x20/0xc0
[   15.107521]  ? __pfx_kthread+0x10/0x10
[   15.107545]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.107570]  ? calculate_sigpending+0x7b/0xa0
[   15.107598]  ? __pfx_kthread+0x10/0x10
[   15.107622]  ret_from_fork+0x116/0x1d0
[   15.107642]  ? __pfx_kthread+0x10/0x10
[   15.107665]  ret_from_fork_asm+0x1a/0x30
[   15.107741]  </TASK>
[   15.107772] 
[   15.123262] Allocated by task 211:
[   15.124564]  kasan_save_stack+0x45/0x70
[   15.125164]  kasan_save_track+0x18/0x40
[   15.125884]  kasan_save_alloc_info+0x3b/0x50
[   15.126553]  __kasan_kmalloc+0xb7/0xc0
[   15.126761]  __kmalloc_cache_noprof+0x189/0x420
[   15.127306]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.127776]  kunit_try_run_case+0x1a5/0x480
[   15.128008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128407]  kthread+0x337/0x6f0
[   15.128668]  ret_from_fork+0x116/0x1d0
[   15.128938]  ret_from_fork_asm+0x1a/0x30
[   15.129148] 
[   15.129451] The buggy address belongs to the object at ffff8881033dc100
[   15.129451]  which belongs to the cache kmalloc-128 of size 128
[   15.130857] The buggy address is located 5 bytes to the right of
[   15.130857]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.131837] 
[   15.132606] The buggy address belongs to the physical page:
[   15.132940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.134047] flags: 0x200000000000000(node=0|zone=2)
[   15.134359] page_type: f5(slab)
[   15.134553] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.135414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.136397] page dumped because: kasan: bad access detected
[   15.136719] 
[   15.137192] Memory state around the buggy address:
[   15.137622]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.138088]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.138628] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.139321]                                                                 ^
[   15.140064]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.140937]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   15.016355] ==================================================================
[   15.019691] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   15.020494] Free of addr ffff888102380980 by task kunit_try_catch/209
[   15.020996] 
[   15.021372] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.021826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.021878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.021917] Call Trace:
[   15.021955]  <TASK>
[   15.021990]  dump_stack_lvl+0x73/0xb0
[   15.022052]  print_report+0xd1/0x650
[   15.022089]  ? __virt_addr_valid+0x1db/0x2d0
[   15.022127]  ? kasan_complete_mode_report_info+0x64/0x200
[   15.022162]  ? kfree_sensitive+0x2e/0x90
[   15.022224]  kasan_report_invalid_free+0x10a/0x130
[   15.022268]  ? kfree_sensitive+0x2e/0x90
[   15.022305]  ? kfree_sensitive+0x2e/0x90
[   15.022341]  check_slab_allocation+0x101/0x130
[   15.022380]  __kasan_slab_pre_free+0x28/0x40
[   15.022420]  kfree+0xf0/0x3f0
[   15.022449]  ? kfree_sensitive+0x2e/0x90
[   15.022502]  kfree_sensitive+0x2e/0x90
[   15.022539]  kmalloc_double_kzfree+0x19c/0x350
[   15.022585]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   15.022634]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   15.022717]  kunit_try_run_case+0x1a5/0x480
[   15.023036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.023132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023173]  ? __kthread_parkme+0x82/0x180
[   15.023237]  ? preempt_count_sub+0x50/0x80
[   15.023274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.023393]  kthread+0x337/0x6f0
[   15.023425]  ? trace_preempt_on+0x20/0xc0
[   15.023474]  ? __pfx_kthread+0x10/0x10
[   15.023509]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.023545]  ? calculate_sigpending+0x7b/0xa0
[   15.023572]  ? __pfx_kthread+0x10/0x10
[   15.023596]  ret_from_fork+0x116/0x1d0
[   15.023619]  ? __pfx_kthread+0x10/0x10
[   15.023642]  ret_from_fork_asm+0x1a/0x30
[   15.023677]  </TASK>
[   15.023711] 
[   15.039651] Allocated by task 209:
[   15.039893]  kasan_save_stack+0x45/0x70
[   15.040580]  kasan_save_track+0x18/0x40
[   15.040858]  kasan_save_alloc_info+0x3b/0x50
[   15.041650]  __kasan_kmalloc+0xb7/0xc0
[   15.042199]  __kmalloc_cache_noprof+0x189/0x420
[   15.042674]  kmalloc_double_kzfree+0xa9/0x350
[   15.043004]  kunit_try_run_case+0x1a5/0x480
[   15.043592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043851]  kthread+0x337/0x6f0
[   15.044809]  ret_from_fork+0x116/0x1d0
[   15.045173]  ret_from_fork_asm+0x1a/0x30
[   15.045615] 
[   15.045788] Freed by task 209:
[   15.046104]  kasan_save_stack+0x45/0x70
[   15.046436]  kasan_save_track+0x18/0x40
[   15.047134]  kasan_save_free_info+0x3f/0x60
[   15.047536]  __kasan_slab_free+0x56/0x70
[   15.047735]  kfree+0x222/0x3f0
[   15.047877]  kfree_sensitive+0x67/0x90
[   15.048038]  kmalloc_double_kzfree+0x12b/0x350
[   15.048211]  kunit_try_run_case+0x1a5/0x480
[   15.048379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049361]  kthread+0x337/0x6f0
[   15.049578]  ret_from_fork+0x116/0x1d0
[   15.050080]  ret_from_fork_asm+0x1a/0x30
[   15.050304] 
[   15.050402] The buggy address belongs to the object at ffff888102380980
[   15.050402]  which belongs to the cache kmalloc-16 of size 16
[   15.051898] The buggy address is located 0 bytes inside of
[   15.051898]  16-byte region [ffff888102380980, ffff888102380990)
[   15.052772] 
[   15.052900] The buggy address belongs to the physical page:
[   15.053337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   15.053835] flags: 0x200000000000000(node=0|zone=2)
[   15.054234] page_type: f5(slab)
[   15.054427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.054811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.055627] page dumped because: kasan: bad access detected
[   15.055848] 
[   15.055966] Memory state around the buggy address:
[   15.056431]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.056887]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.057155] >ffff888102380980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057716]                    ^
[   15.057997]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059126]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059969] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   14.970130] ==================================================================
[   14.971473] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   14.972209] Read of size 1 at addr ffff888102380980 by task kunit_try_catch/209
[   14.972652] 
[   14.973193] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.973279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.973294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.973321] Call Trace:
[   14.973339]  <TASK>
[   14.973365]  dump_stack_lvl+0x73/0xb0
[   14.973407]  print_report+0xd1/0x650
[   14.973435]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973487]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.973528]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.973568]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.973614]  kasan_report+0x141/0x180
[   14.973658]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.973708]  ? kmalloc_double_kzfree+0x19c/0x350
[   14.973756]  __kasan_check_byte+0x3d/0x50
[   14.973802]  kfree_sensitive+0x22/0x90
[   14.973849]  kmalloc_double_kzfree+0x19c/0x350
[   14.973896]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   14.973946]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   14.974023]  kunit_try_run_case+0x1a5/0x480
[   14.974297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.974433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.974484]  ? __kthread_parkme+0x82/0x180
[   14.974513]  ? preempt_count_sub+0x50/0x80
[   14.974540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.974616]  kthread+0x337/0x6f0
[   14.974637]  ? trace_preempt_on+0x20/0xc0
[   14.974664]  ? __pfx_kthread+0x10/0x10
[   14.974695]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974761]  ? calculate_sigpending+0x7b/0xa0
[   14.974805]  ? __pfx_kthread+0x10/0x10
[   14.974842]  ret_from_fork+0x116/0x1d0
[   14.974866]  ? __pfx_kthread+0x10/0x10
[   14.974889]  ret_from_fork_asm+0x1a/0x30
[   14.974925]  </TASK>
[   14.974938] 
[   14.990788] Allocated by task 209:
[   14.991546]  kasan_save_stack+0x45/0x70
[   14.992036]  kasan_save_track+0x18/0x40
[   14.992486]  kasan_save_alloc_info+0x3b/0x50
[   14.992982]  __kasan_kmalloc+0xb7/0xc0
[   14.993187]  __kmalloc_cache_noprof+0x189/0x420
[   14.994151]  kmalloc_double_kzfree+0xa9/0x350
[   14.994419]  kunit_try_run_case+0x1a5/0x480
[   14.994605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.995297]  kthread+0x337/0x6f0
[   14.995803]  ret_from_fork+0x116/0x1d0
[   14.996374]  ret_from_fork_asm+0x1a/0x30
[   14.996803] 
[   14.997000] Freed by task 209:
[   14.997388]  kasan_save_stack+0x45/0x70
[   14.998243]  kasan_save_track+0x18/0x40
[   14.998667]  kasan_save_free_info+0x3f/0x60
[   14.999365]  __kasan_slab_free+0x56/0x70
[   14.999947]  kfree+0x222/0x3f0
[   15.000201]  kfree_sensitive+0x67/0x90
[   15.000665]  kmalloc_double_kzfree+0x12b/0x350
[   15.001031]  kunit_try_run_case+0x1a5/0x480
[   15.001628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.002523]  kthread+0x337/0x6f0
[   15.002829]  ret_from_fork+0x116/0x1d0
[   15.003142]  ret_from_fork_asm+0x1a/0x30
[   15.003495] 
[   15.003733] The buggy address belongs to the object at ffff888102380980
[   15.003733]  which belongs to the cache kmalloc-16 of size 16
[   15.004726] The buggy address is located 0 bytes inside of
[   15.004726]  freed 16-byte region [ffff888102380980, ffff888102380990)
[   15.005822] 
[   15.006023] The buggy address belongs to the physical page:
[   15.006265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380
[   15.006984] flags: 0x200000000000000(node=0|zone=2)
[   15.007221] page_type: f5(slab)
[   15.007405] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.008865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.009137] page dumped because: kasan: bad access detected
[   15.009344] 
[   15.009447] Memory state around the buggy address:
[   15.009665]  ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.009920]  ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.010176] >ffff888102380980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011517]                    ^
[   15.011715]  ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014258]  ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.015108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   14.925403] ==================================================================
[   14.925978] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   14.926980] Read of size 1 at addr ffff888103333928 by task kunit_try_catch/205
[   14.927407] 
[   14.927779] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.927915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.927983] Call Trace:
[   14.928011]  <TASK>
[   14.928049]  dump_stack_lvl+0x73/0xb0
[   14.928121]  print_report+0xd1/0x650
[   14.928174]  ? __virt_addr_valid+0x1db/0x2d0
[   14.928311]  ? kmalloc_uaf2+0x4a8/0x520
[   14.928366]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.928418]  ? kmalloc_uaf2+0x4a8/0x520
[   14.928481]  kasan_report+0x141/0x180
[   14.928535]  ? kmalloc_uaf2+0x4a8/0x520
[   14.928589]  __asan_report_load1_noabort+0x18/0x20
[   14.928618]  kmalloc_uaf2+0x4a8/0x520
[   14.928641]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   14.928662]  ? finish_task_switch.isra.0+0x153/0x700
[   14.928689]  ? __switch_to+0x47/0xf50
[   14.928718]  ? __schedule+0x10cc/0x2b60
[   14.928745]  ? __pfx_read_tsc+0x10/0x10
[   14.928768]  ? ktime_get_ts64+0x86/0x230
[   14.928797]  kunit_try_run_case+0x1a5/0x480
[   14.928821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.928867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.928892]  ? __kthread_parkme+0x82/0x180
[   14.928913]  ? preempt_count_sub+0x50/0x80
[   14.928937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.928983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.929007]  kthread+0x337/0x6f0
[   14.929027]  ? trace_preempt_on+0x20/0xc0
[   14.929051]  ? __pfx_kthread+0x10/0x10
[   14.929073]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.929096]  ? calculate_sigpending+0x7b/0xa0
[   14.929120]  ? __pfx_kthread+0x10/0x10
[   14.929142]  ret_from_fork+0x116/0x1d0
[   14.929162]  ? __pfx_kthread+0x10/0x10
[   14.929184]  ret_from_fork_asm+0x1a/0x30
[   14.929260]  </TASK>
[   14.929275] 
[   14.941424] Allocated by task 205:
[   14.941913]  kasan_save_stack+0x45/0x70
[   14.942389]  kasan_save_track+0x18/0x40
[   14.942788]  kasan_save_alloc_info+0x3b/0x50
[   14.943337]  __kasan_kmalloc+0xb7/0xc0
[   14.943775]  __kmalloc_cache_noprof+0x189/0x420
[   14.944231]  kmalloc_uaf2+0xc6/0x520
[   14.944592]  kunit_try_run_case+0x1a5/0x480
[   14.944972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945360]  kthread+0x337/0x6f0
[   14.945730]  ret_from_fork+0x116/0x1d0
[   14.945942]  ret_from_fork_asm+0x1a/0x30
[   14.946356] 
[   14.946541] Freed by task 205:
[   14.946761]  kasan_save_stack+0x45/0x70
[   14.947164]  kasan_save_track+0x18/0x40
[   14.947623]  kasan_save_free_info+0x3f/0x60
[   14.947978]  __kasan_slab_free+0x56/0x70
[   14.948254]  kfree+0x222/0x3f0
[   14.948567]  kmalloc_uaf2+0x14c/0x520
[   14.948892]  kunit_try_run_case+0x1a5/0x480
[   14.949153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.949607]  kthread+0x337/0x6f0
[   14.949870]  ret_from_fork+0x116/0x1d0
[   14.950176]  ret_from_fork_asm+0x1a/0x30
[   14.950424] 
[   14.950648] The buggy address belongs to the object at ffff888103333900
[   14.950648]  which belongs to the cache kmalloc-64 of size 64
[   14.951409] The buggy address is located 40 bytes inside of
[   14.951409]  freed 64-byte region [ffff888103333900, ffff888103333940)
[   14.951943] 
[   14.952162] The buggy address belongs to the physical page:
[   14.952646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333
[   14.953120] flags: 0x200000000000000(node=0|zone=2)
[   14.953591] page_type: f5(slab)
[   14.953839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.954374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.954811] page dumped because: kasan: bad access detected
[   14.955160] 
[   14.955312] Memory state around the buggy address:
[   14.955726]  ffff888103333800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.956279]  ffff888103333880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.956614] >ffff888103333900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.957028]                                   ^
[   14.957445]  ffff888103333980: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   14.957955]  ffff888103333a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.958403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   14.881103] ==================================================================
[   14.881806] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360
[   14.882367] Write of size 33 at addr ffff888103333880 by task kunit_try_catch/203
[   14.882825] 
[   14.883024] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.883123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.883152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.883200] Call Trace:
[   14.883232]  <TASK>
[   14.883277]  dump_stack_lvl+0x73/0xb0
[   14.883357]  print_report+0xd1/0x650
[   14.883403]  ? __virt_addr_valid+0x1db/0x2d0
[   14.883450]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.884223]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.884282]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.884327]  kasan_report+0x141/0x180
[   14.884377]  ? kmalloc_uaf_memset+0x1a3/0x360
[   14.884434]  kasan_check_range+0x10c/0x1c0
[   14.884501]  __asan_memset+0x27/0x50
[   14.884549]  kmalloc_uaf_memset+0x1a3/0x360
[   14.884599]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   14.884655]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   14.884758]  kunit_try_run_case+0x1a5/0x480
[   14.884814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.884851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.884893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.884934]  ? __kthread_parkme+0x82/0x180
[   14.884972]  ? preempt_count_sub+0x50/0x80
[   14.885013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.885047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.885090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.885127]  kthread+0x337/0x6f0
[   14.885149]  ? trace_preempt_on+0x20/0xc0
[   14.885176]  ? __pfx_kthread+0x10/0x10
[   14.885220]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.885253]  ? calculate_sigpending+0x7b/0xa0
[   14.885281]  ? __pfx_kthread+0x10/0x10
[   14.885304]  ret_from_fork+0x116/0x1d0
[   14.885327]  ? __pfx_kthread+0x10/0x10
[   14.885349]  ret_from_fork_asm+0x1a/0x30
[   14.885386]  </TASK>
[   14.885400] 
[   14.897484] Allocated by task 203:
[   14.897971]  kasan_save_stack+0x45/0x70
[   14.898857]  kasan_save_track+0x18/0x40
[   14.899112]  kasan_save_alloc_info+0x3b/0x50
[   14.899862]  __kasan_kmalloc+0xb7/0xc0
[   14.900826]  __kmalloc_cache_noprof+0x189/0x420
[   14.901081]  kmalloc_uaf_memset+0xa9/0x360
[   14.901638]  kunit_try_run_case+0x1a5/0x480
[   14.902241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.902912]  kthread+0x337/0x6f0
[   14.903114]  ret_from_fork+0x116/0x1d0
[   14.903616]  ret_from_fork_asm+0x1a/0x30
[   14.904169] 
[   14.904580] Freed by task 203:
[   14.904827]  kasan_save_stack+0x45/0x70
[   14.905310]  kasan_save_track+0x18/0x40
[   14.905495]  kasan_save_free_info+0x3f/0x60
[   14.905978]  __kasan_slab_free+0x56/0x70
[   14.906621]  kfree+0x222/0x3f0
[   14.907235]  kmalloc_uaf_memset+0x12b/0x360
[   14.907590]  kunit_try_run_case+0x1a5/0x480
[   14.907804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.908090]  kthread+0x337/0x6f0
[   14.908711]  ret_from_fork+0x116/0x1d0
[   14.909410]  ret_from_fork_asm+0x1a/0x30
[   14.909905] 
[   14.910103] The buggy address belongs to the object at ffff888103333880
[   14.910103]  which belongs to the cache kmalloc-64 of size 64
[   14.910752] The buggy address is located 0 bytes inside of
[   14.910752]  freed 64-byte region [ffff888103333880, ffff8881033338c0)
[   14.911652] 
[   14.911820] The buggy address belongs to the physical page:
[   14.912094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333
[   14.912721] flags: 0x200000000000000(node=0|zone=2)
[   14.912998] page_type: f5(slab)
[   14.913183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.913857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.914236] page dumped because: kasan: bad access detected
[   14.914639] 
[   14.914753] Memory state around the buggy address:
[   14.915136]  ffff888103333780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.915711]  ffff888103333800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.915996] >ffff888103333880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.917614]                    ^
[   14.918028]  ffff888103333900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.918682]  ffff888103333980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   14.840642] ==================================================================
[   14.841615] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   14.842118] Read of size 1 at addr ffff888101c20688 by task kunit_try_catch/201
[   14.842806] 
[   14.843086] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.843191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843267] Call Trace:
[   14.843296]  <TASK>
[   14.843358]  dump_stack_lvl+0x73/0xb0
[   14.843428]  print_report+0xd1/0x650
[   14.843488]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843538]  ? kmalloc_uaf+0x320/0x380
[   14.843588]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.843635]  ? kmalloc_uaf+0x320/0x380
[   14.843700]  kasan_report+0x141/0x180
[   14.843743]  ? kmalloc_uaf+0x320/0x380
[   14.843791]  __asan_report_load1_noabort+0x18/0x20
[   14.843835]  kmalloc_uaf+0x320/0x380
[   14.843878]  ? __pfx_kmalloc_uaf+0x10/0x10
[   14.843934]  ? __schedule+0x10cc/0x2b60
[   14.844002]  ? __pfx_read_tsc+0x10/0x10
[   14.844048]  ? ktime_get_ts64+0x86/0x230
[   14.844086]  kunit_try_run_case+0x1a5/0x480
[   14.844113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.844160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.844185]  ? __kthread_parkme+0x82/0x180
[   14.844219]  ? preempt_count_sub+0x50/0x80
[   14.844308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844383]  kthread+0x337/0x6f0
[   14.844405]  ? trace_preempt_on+0x20/0xc0
[   14.844430]  ? __pfx_kthread+0x10/0x10
[   14.844452]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844502]  ? calculate_sigpending+0x7b/0xa0
[   14.844529]  ? __pfx_kthread+0x10/0x10
[   14.844552]  ret_from_fork+0x116/0x1d0
[   14.844574]  ? __pfx_kthread+0x10/0x10
[   14.844596]  ret_from_fork_asm+0x1a/0x30
[   14.844630]  </TASK>
[   14.844643] 
[   14.856924] Allocated by task 201:
[   14.857426]  kasan_save_stack+0x45/0x70
[   14.857863]  kasan_save_track+0x18/0x40
[   14.858270]  kasan_save_alloc_info+0x3b/0x50
[   14.858670]  __kasan_kmalloc+0xb7/0xc0
[   14.859030]  __kmalloc_cache_noprof+0x189/0x420
[   14.859532]  kmalloc_uaf+0xaa/0x380
[   14.859789]  kunit_try_run_case+0x1a5/0x480
[   14.859993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.860444]  kthread+0x337/0x6f0
[   14.860753]  ret_from_fork+0x116/0x1d0
[   14.861062]  ret_from_fork_asm+0x1a/0x30
[   14.861394] 
[   14.861548] Freed by task 201:
[   14.861716]  kasan_save_stack+0x45/0x70
[   14.862037]  kasan_save_track+0x18/0x40
[   14.862387]  kasan_save_free_info+0x3f/0x60
[   14.862677]  __kasan_slab_free+0x56/0x70
[   14.862879]  kfree+0x222/0x3f0
[   14.863143]  kmalloc_uaf+0x12c/0x380
[   14.863501]  kunit_try_run_case+0x1a5/0x480
[   14.863871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864143]  kthread+0x337/0x6f0
[   14.864483]  ret_from_fork+0x116/0x1d0
[   14.864825]  ret_from_fork_asm+0x1a/0x30
[   14.865118] 
[   14.865322] The buggy address belongs to the object at ffff888101c20680
[   14.865322]  which belongs to the cache kmalloc-16 of size 16
[   14.866010] The buggy address is located 8 bytes inside of
[   14.866010]  freed 16-byte region [ffff888101c20680, ffff888101c20690)
[   14.866618] 
[   14.866755] The buggy address belongs to the physical page:
[   14.866993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20
[   14.867706] flags: 0x200000000000000(node=0|zone=2)
[   14.868151] page_type: f5(slab)
[   14.868447] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.869029] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.869582] page dumped because: kasan: bad access detected
[   14.870007] 
[   14.870245] Memory state around the buggy address:
[   14.870557]  ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.871098]  ffff888101c20600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.871703] >ffff888101c20680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.872089]                       ^
[   14.872447]  ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.872976]  ffff888101c20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873464] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   14.797599] ==================================================================
[   14.798396] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   14.799152] Read of size 64 at addr ffff888103333784 by task kunit_try_catch/199
[   14.799784] 
[   14.800088] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.800221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.800247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.800286] Call Trace:
[   14.800307]  <TASK>
[   14.800342]  dump_stack_lvl+0x73/0xb0
[   14.800405]  print_report+0xd1/0x650
[   14.800446]  ? __virt_addr_valid+0x1db/0x2d0
[   14.800500]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.800545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.800591]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.800634]  kasan_report+0x141/0x180
[   14.800714]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   14.800781]  kasan_check_range+0x10c/0x1c0
[   14.800823]  __asan_memmove+0x27/0x70
[   14.800863]  kmalloc_memmove_invalid_size+0x16f/0x330
[   14.800914]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   14.801032]  ? __schedule+0x10cc/0x2b60
[   14.801122]  ? __pfx_read_tsc+0x10/0x10
[   14.801171]  ? ktime_get_ts64+0x86/0x230
[   14.801256]  kunit_try_run_case+0x1a5/0x480
[   14.801306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.801445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.801551]  ? __kthread_parkme+0x82/0x180
[   14.801615]  ? preempt_count_sub+0x50/0x80
[   14.801669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.801772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.801827]  kthread+0x337/0x6f0
[   14.801882]  ? trace_preempt_on+0x20/0xc0
[   14.801925]  ? __pfx_kthread+0x10/0x10
[   14.801960]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.801997]  ? calculate_sigpending+0x7b/0xa0
[   14.802036]  ? __pfx_kthread+0x10/0x10
[   14.802071]  ret_from_fork+0x116/0x1d0
[   14.802102]  ? __pfx_kthread+0x10/0x10
[   14.802134]  ret_from_fork_asm+0x1a/0x30
[   14.802185]  </TASK>
[   14.802242] 
[   14.815854] Allocated by task 199:
[   14.816112]  kasan_save_stack+0x45/0x70
[   14.816674]  kasan_save_track+0x18/0x40
[   14.817215]  kasan_save_alloc_info+0x3b/0x50
[   14.817610]  __kasan_kmalloc+0xb7/0xc0
[   14.818045]  __kmalloc_cache_noprof+0x189/0x420
[   14.818450]  kmalloc_memmove_invalid_size+0xac/0x330
[   14.819474]  kunit_try_run_case+0x1a5/0x480
[   14.819824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.820076]  kthread+0x337/0x6f0
[   14.820267]  ret_from_fork+0x116/0x1d0
[   14.820618]  ret_from_fork_asm+0x1a/0x30
[   14.821123] 
[   14.821323] The buggy address belongs to the object at ffff888103333780
[   14.821323]  which belongs to the cache kmalloc-64 of size 64
[   14.822387] The buggy address is located 4 bytes inside of
[   14.822387]  allocated 64-byte region [ffff888103333780, ffff8881033337c0)
[   14.823301] 
[   14.823453] The buggy address belongs to the physical page:
[   14.823702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333
[   14.824904] flags: 0x200000000000000(node=0|zone=2)
[   14.825373] page_type: f5(slab)
[   14.825680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.826531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.826838] page dumped because: kasan: bad access detected
[   14.827054] 
[   14.827172] Memory state around the buggy address:
[   14.827637]  ffff888103333680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.829097]  ffff888103333700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.830013] >ffff888103333780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.830682]                                            ^
[   14.831205]  ffff888103333800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.832167]  ffff888103333880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.832990] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   14.757450] ==================================================================
[   14.758588] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   14.759769] Read of size 18446744073709551614 at addr ffff8881033d4a04 by task kunit_try_catch/197
[   14.760602] 
[   14.760767] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.761054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.761090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.761132] Call Trace:
[   14.761163]  <TASK>
[   14.761202]  dump_stack_lvl+0x73/0xb0
[   14.761260]  print_report+0xd1/0x650
[   14.761289]  ? __virt_addr_valid+0x1db/0x2d0
[   14.761317]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.761345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.761369]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.761433]  kasan_report+0x141/0x180
[   14.761490]  ? kmalloc_memmove_negative_size+0x171/0x330
[   14.761549]  kasan_check_range+0x10c/0x1c0
[   14.761598]  __asan_memmove+0x27/0x70
[   14.761645]  kmalloc_memmove_negative_size+0x171/0x330
[   14.761698]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   14.761759]  ? __schedule+0x10cc/0x2b60
[   14.761801]  ? __pfx_read_tsc+0x10/0x10
[   14.761840]  ? ktime_get_ts64+0x86/0x230
[   14.761882]  kunit_try_run_case+0x1a5/0x480
[   14.761916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.761946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.761984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.762022]  ? __kthread_parkme+0x82/0x180
[   14.762054]  ? preempt_count_sub+0x50/0x80
[   14.762093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.762126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.762201]  kthread+0x337/0x6f0
[   14.762232]  ? trace_preempt_on+0x20/0xc0
[   14.762270]  ? __pfx_kthread+0x10/0x10
[   14.762303]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.762340]  ? calculate_sigpending+0x7b/0xa0
[   14.762371]  ? __pfx_kthread+0x10/0x10
[   14.762395]  ret_from_fork+0x116/0x1d0
[   14.762416]  ? __pfx_kthread+0x10/0x10
[   14.762438]  ret_from_fork_asm+0x1a/0x30
[   14.762493]  </TASK>
[   14.762507] 
[   14.775952] Allocated by task 197:
[   14.776227]  kasan_save_stack+0x45/0x70
[   14.776482]  kasan_save_track+0x18/0x40
[   14.776689]  kasan_save_alloc_info+0x3b/0x50
[   14.776900]  __kasan_kmalloc+0xb7/0xc0
[   14.777093]  __kmalloc_cache_noprof+0x189/0x420
[   14.777484]  kmalloc_memmove_negative_size+0xac/0x330
[   14.777913]  kunit_try_run_case+0x1a5/0x480
[   14.778279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.778854]  kthread+0x337/0x6f0
[   14.779367]  ret_from_fork+0x116/0x1d0
[   14.779861]  ret_from_fork_asm+0x1a/0x30
[   14.780135] 
[   14.780341] The buggy address belongs to the object at ffff8881033d4a00
[   14.780341]  which belongs to the cache kmalloc-64 of size 64
[   14.781348] The buggy address is located 4 bytes inside of
[   14.781348]  64-byte region [ffff8881033d4a00, ffff8881033d4a40)
[   14.783651] 
[   14.783923] The buggy address belongs to the physical page:
[   14.784143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033d4
[   14.784787] flags: 0x200000000000000(node=0|zone=2)
[   14.785081] page_type: f5(slab)
[   14.785281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.785957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.786427] page dumped because: kasan: bad access detected
[   14.786889] 
[   14.787119] Memory state around the buggy address:
[   14.787403]  ffff8881033d4900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.788049]  ffff8881033d4980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.788701] >ffff8881033d4a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.789256]                    ^
[   14.789576]  ffff8881033d4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789962]  ffff8881033d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.790150] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   14.709568] ==================================================================
[   14.710346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   14.711381] Write of size 16 at addr ffff888103324d69 by task kunit_try_catch/195
[   14.711766] 
[   14.712228] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.712349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.712375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.712420] Call Trace:
[   14.712452]  <TASK>
[   14.712504]  dump_stack_lvl+0x73/0xb0
[   14.712578]  print_report+0xd1/0x650
[   14.712623]  ? __virt_addr_valid+0x1db/0x2d0
[   14.712668]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.712716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.712765]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.712815]  kasan_report+0x141/0x180
[   14.712856]  ? kmalloc_oob_memset_16+0x166/0x330
[   14.712901]  kasan_check_range+0x10c/0x1c0
[   14.712940]  __asan_memset+0x27/0x50
[   14.712975]  kmalloc_oob_memset_16+0x166/0x330
[   14.713033]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   14.713081]  ? __schedule+0x10cc/0x2b60
[   14.713155]  ? __pfx_read_tsc+0x10/0x10
[   14.713235]  ? ktime_get_ts64+0x86/0x230
[   14.713298]  kunit_try_run_case+0x1a5/0x480
[   14.713351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.713396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.713443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.713498]  ? __kthread_parkme+0x82/0x180
[   14.713523]  ? preempt_count_sub+0x50/0x80
[   14.713550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.713572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.713599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.713625]  kthread+0x337/0x6f0
[   14.713646]  ? trace_preempt_on+0x20/0xc0
[   14.713672]  ? __pfx_kthread+0x10/0x10
[   14.713807]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.713837]  ? calculate_sigpending+0x7b/0xa0
[   14.713863]  ? __pfx_kthread+0x10/0x10
[   14.713885]  ret_from_fork+0x116/0x1d0
[   14.713906]  ? __pfx_kthread+0x10/0x10
[   14.713927]  ret_from_fork_asm+0x1a/0x30
[   14.713960]  </TASK>
[   14.713973] 
[   14.728618] Allocated by task 195:
[   14.729203]  kasan_save_stack+0x45/0x70
[   14.729603]  kasan_save_track+0x18/0x40
[   14.730132]  kasan_save_alloc_info+0x3b/0x50
[   14.730618]  __kasan_kmalloc+0xb7/0xc0
[   14.731516]  __kmalloc_cache_noprof+0x189/0x420
[   14.732001]  kmalloc_oob_memset_16+0xac/0x330
[   14.732882]  kunit_try_run_case+0x1a5/0x480
[   14.733144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733364]  kthread+0x337/0x6f0
[   14.734124]  ret_from_fork+0x116/0x1d0
[   14.734710]  ret_from_fork_asm+0x1a/0x30
[   14.735047] 
[   14.735182] The buggy address belongs to the object at ffff888103324d00
[   14.735182]  which belongs to the cache kmalloc-128 of size 128
[   14.735887] The buggy address is located 105 bytes inside of
[   14.735887]  allocated 120-byte region [ffff888103324d00, ffff888103324d78)
[   14.736971] 
[   14.737267] The buggy address belongs to the physical page:
[   14.737642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   14.738160] flags: 0x200000000000000(node=0|zone=2)
[   14.738548] page_type: f5(slab)
[   14.738911] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.739372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.739627] page dumped because: kasan: bad access detected
[   14.740111] 
[   14.740345] Memory state around the buggy address:
[   14.740799]  ffff888103324c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.741317]  ffff888103324c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.741657] >ffff888103324d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.741916]                                                                 ^
[   14.742169]  ffff888103324d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742410]  ffff888103324e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure Automatically assigned
[   14.666135] ==================================================================
[   14.666820] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   14.667809] Write of size 8 at addr ffff8881033dc071 by task kunit_try_catch/193
[   14.668817] 
[   14.669146] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.669317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669414] Call Trace:
[   14.669445]  <TASK>
[   14.669500]  dump_stack_lvl+0x73/0xb0
[   14.669603]  print_report+0xd1/0x650
[   14.669672]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669831]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.669873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669907]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.669932]  kasan_report+0x141/0x180
[   14.669959]  ? kmalloc_oob_memset_8+0x166/0x330
[   14.669988]  kasan_check_range+0x10c/0x1c0
[   14.670014]  __asan_memset+0x27/0x50
[   14.670037]  kmalloc_oob_memset_8+0x166/0x330
[   14.670062]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   14.670089]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   14.670118]  kunit_try_run_case+0x1a5/0x480
[   14.670144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.670165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.670194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.670235]  ? __kthread_parkme+0x82/0x180
[   14.670259]  ? preempt_count_sub+0x50/0x80
[   14.670286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.670309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.670362]  kthread+0x337/0x6f0
[   14.670384]  ? trace_preempt_on+0x20/0xc0
[   14.670412]  ? __pfx_kthread+0x10/0x10
[   14.670434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.670479]  ? calculate_sigpending+0x7b/0xa0
[   14.670510]  ? __pfx_kthread+0x10/0x10
[   14.670534]  ret_from_fork+0x116/0x1d0
[   14.670557]  ? __pfx_kthread+0x10/0x10
[   14.670579]  ret_from_fork_asm+0x1a/0x30
[   14.670614]  </TASK>
[   14.670628] 
[   14.684522] Allocated by task 193:
[   14.685088]  kasan_save_stack+0x45/0x70
[   14.685727]  kasan_save_track+0x18/0x40
[   14.685967]  kasan_save_alloc_info+0x3b/0x50
[   14.686191]  __kasan_kmalloc+0xb7/0xc0
[   14.686480]  __kmalloc_cache_noprof+0x189/0x420
[   14.686762]  kmalloc_oob_memset_8+0xac/0x330
[   14.687355]  kunit_try_run_case+0x1a5/0x480
[   14.688753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689009]  kthread+0x337/0x6f0
[   14.689623]  ret_from_fork+0x116/0x1d0
[   14.689970]  ret_from_fork_asm+0x1a/0x30
[   14.690554] 
[   14.690896] The buggy address belongs to the object at ffff8881033dc000
[   14.690896]  which belongs to the cache kmalloc-128 of size 128
[   14.692065] The buggy address is located 113 bytes inside of
[   14.692065]  allocated 120-byte region [ffff8881033dc000, ffff8881033dc078)
[   14.692947] 
[   14.693436] The buggy address belongs to the physical page:
[   14.694152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   14.694595] flags: 0x200000000000000(node=0|zone=2)
[   14.694887] page_type: f5(slab)
[   14.695201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.695586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.695953] page dumped because: kasan: bad access detected
[   14.696232] 
[   14.696412] Memory state around the buggy address:
[   14.697908]  ffff8881033dbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698298]  ffff8881033dbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698794] >ffff8881033dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.699200]                                                                 ^
[   14.700314]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700634]  ffff8881033dc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.701573] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   14.628221] ==================================================================
[   14.628804] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   14.629720] Write of size 4 at addr ffff88810335df75 by task kunit_try_catch/191
[   14.630483] 
[   14.630865] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.631074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.631102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.631141] Call Trace:
[   14.631161]  <TASK>
[   14.631188]  dump_stack_lvl+0x73/0xb0
[   14.631260]  print_report+0xd1/0x650
[   14.631288]  ? __virt_addr_valid+0x1db/0x2d0
[   14.631315]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.631339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.631380]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.631405]  kasan_report+0x141/0x180
[   14.631430]  ? kmalloc_oob_memset_4+0x166/0x330
[   14.631478]  kasan_check_range+0x10c/0x1c0
[   14.631509]  __asan_memset+0x27/0x50
[   14.631531]  kmalloc_oob_memset_4+0x166/0x330
[   14.631556]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   14.631582]  ? __schedule+0x10cc/0x2b60
[   14.631609]  ? __pfx_read_tsc+0x10/0x10
[   14.631635]  ? ktime_get_ts64+0x86/0x230
[   14.631663]  kunit_try_run_case+0x1a5/0x480
[   14.631688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.631737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.631764]  ? __kthread_parkme+0x82/0x180
[   14.631787]  ? preempt_count_sub+0x50/0x80
[   14.631813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.631862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.631889]  kthread+0x337/0x6f0
[   14.631910]  ? trace_preempt_on+0x20/0xc0
[   14.631936]  ? __pfx_kthread+0x10/0x10
[   14.631959]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.631983]  ? calculate_sigpending+0x7b/0xa0
[   14.632011]  ? __pfx_kthread+0x10/0x10
[   14.632034]  ret_from_fork+0x116/0x1d0
[   14.632055]  ? __pfx_kthread+0x10/0x10
[   14.632077]  ret_from_fork_asm+0x1a/0x30
[   14.632113]  </TASK>
[   14.632126] 
[   14.643591] Allocated by task 191:
[   14.643864]  kasan_save_stack+0x45/0x70
[   14.644281]  kasan_save_track+0x18/0x40
[   14.644637]  kasan_save_alloc_info+0x3b/0x50
[   14.645011]  __kasan_kmalloc+0xb7/0xc0
[   14.645353]  __kmalloc_cache_noprof+0x189/0x420
[   14.645709]  kmalloc_oob_memset_4+0xac/0x330
[   14.646007]  kunit_try_run_case+0x1a5/0x480
[   14.646298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.646597]  kthread+0x337/0x6f0
[   14.646841]  ret_from_fork+0x116/0x1d0
[   14.647117]  ret_from_fork_asm+0x1a/0x30
[   14.647585] 
[   14.647820] The buggy address belongs to the object at ffff88810335df00
[   14.647820]  which belongs to the cache kmalloc-128 of size 128
[   14.648825] The buggy address is located 117 bytes inside of
[   14.648825]  allocated 120-byte region [ffff88810335df00, ffff88810335df78)
[   14.649804] 
[   14.650076] The buggy address belongs to the physical page:
[   14.650602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10335d
[   14.651055] flags: 0x200000000000000(node=0|zone=2)
[   14.651521] page_type: f5(slab)
[   14.651721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.652026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.652556] page dumped because: kasan: bad access detected
[   14.653721] 
[   14.653918] Memory state around the buggy address:
[   14.654319]  ffff88810335de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.654890]  ffff88810335de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.655445] >ffff88810335df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.657031]                                                                 ^
[   14.657372]  ffff88810335df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657953]  ffff88810335e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.658629] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   14.585116] ==================================================================
[   14.585706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   14.586903] Write of size 2 at addr ffff88810335de77 by task kunit_try_catch/189
[   14.587486] 
[   14.588193] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.588540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.588564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.588591] Call Trace:
[   14.588609]  <TASK>
[   14.588637]  dump_stack_lvl+0x73/0xb0
[   14.588705]  print_report+0xd1/0x650
[   14.588780]  ? __virt_addr_valid+0x1db/0x2d0
[   14.588824]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.588861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.588900]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.588935]  kasan_report+0x141/0x180
[   14.588961]  ? kmalloc_oob_memset_2+0x166/0x330
[   14.588990]  kasan_check_range+0x10c/0x1c0
[   14.589017]  __asan_memset+0x27/0x50
[   14.589039]  kmalloc_oob_memset_2+0x166/0x330
[   14.589065]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   14.589092]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   14.589121]  kunit_try_run_case+0x1a5/0x480
[   14.589146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.589208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.589255]  ? __kthread_parkme+0x82/0x180
[   14.589281]  ? preempt_count_sub+0x50/0x80
[   14.589307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.589357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.589383]  kthread+0x337/0x6f0
[   14.589405]  ? trace_preempt_on+0x20/0xc0
[   14.589432]  ? __pfx_kthread+0x10/0x10
[   14.589470]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.589500]  ? calculate_sigpending+0x7b/0xa0
[   14.589528]  ? __pfx_kthread+0x10/0x10
[   14.589551]  ret_from_fork+0x116/0x1d0
[   14.589575]  ? __pfx_kthread+0x10/0x10
[   14.589598]  ret_from_fork_asm+0x1a/0x30
[   14.589633]  </TASK>
[   14.589647] 
[   14.604565] Allocated by task 189:
[   14.605103]  kasan_save_stack+0x45/0x70
[   14.605571]  kasan_save_track+0x18/0x40
[   14.605820]  kasan_save_alloc_info+0x3b/0x50
[   14.606376]  __kasan_kmalloc+0xb7/0xc0
[   14.606888]  __kmalloc_cache_noprof+0x189/0x420
[   14.607111]  kmalloc_oob_memset_2+0xac/0x330
[   14.607339]  kunit_try_run_case+0x1a5/0x480
[   14.608285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.609042]  kthread+0x337/0x6f0
[   14.609364]  ret_from_fork+0x116/0x1d0
[   14.609825]  ret_from_fork_asm+0x1a/0x30
[   14.610051] 
[   14.610444] The buggy address belongs to the object at ffff88810335de00
[   14.610444]  which belongs to the cache kmalloc-128 of size 128
[   14.611278] The buggy address is located 119 bytes inside of
[   14.611278]  allocated 120-byte region [ffff88810335de00, ffff88810335de78)
[   14.612356] 
[   14.612951] The buggy address belongs to the physical page:
[   14.613441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10335d
[   14.614272] flags: 0x200000000000000(node=0|zone=2)
[   14.614635] page_type: f5(slab)
[   14.615126] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.615582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.616411] page dumped because: kasan: bad access detected
[   14.617038] 
[   14.617160] Memory state around the buggy address:
[   14.617624]  ffff88810335dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.619296]  ffff88810335dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.619810] >ffff88810335de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.620309]                                                                 ^
[   14.620748]  ffff88810335de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621082]  ffff88810335df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622065] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   14.543322] ==================================================================
[   14.544043] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   14.544484] Write of size 128 at addr ffff888103324c00 by task kunit_try_catch/187
[   14.544949] 
[   14.545150] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.545247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.545271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.545384] Call Trace:
[   14.545416]  <TASK>
[   14.545507]  dump_stack_lvl+0x73/0xb0
[   14.545582]  print_report+0xd1/0x650
[   14.545628]  ? __virt_addr_valid+0x1db/0x2d0
[   14.545677]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.545716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.545762]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.545807]  kasan_report+0x141/0x180
[   14.545852]  ? kmalloc_oob_in_memset+0x15f/0x320
[   14.545911]  kasan_check_range+0x10c/0x1c0
[   14.545963]  __asan_memset+0x27/0x50
[   14.546008]  kmalloc_oob_in_memset+0x15f/0x320
[   14.546059]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   14.546111]  ? __schedule+0x10cc/0x2b60
[   14.546164]  ? __pfx_read_tsc+0x10/0x10
[   14.546213]  ? ktime_get_ts64+0x86/0x230
[   14.546264]  kunit_try_run_case+0x1a5/0x480
[   14.546305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.546344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.546392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.546479]  ? __kthread_parkme+0x82/0x180
[   14.546522]  ? preempt_count_sub+0x50/0x80
[   14.546563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.546597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.546639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.546678]  kthread+0x337/0x6f0
[   14.546714]  ? trace_preempt_on+0x20/0xc0
[   14.546759]  ? __pfx_kthread+0x10/0x10
[   14.546797]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.546841]  ? calculate_sigpending+0x7b/0xa0
[   14.546892]  ? __pfx_kthread+0x10/0x10
[   14.546925]  ret_from_fork+0x116/0x1d0
[   14.546947]  ? __pfx_kthread+0x10/0x10
[   14.546969]  ret_from_fork_asm+0x1a/0x30
[   14.547004]  </TASK>
[   14.547018] 
[   14.560832] Allocated by task 187:
[   14.561415]  kasan_save_stack+0x45/0x70
[   14.561768]  kasan_save_track+0x18/0x40
[   14.562128]  kasan_save_alloc_info+0x3b/0x50
[   14.562536]  __kasan_kmalloc+0xb7/0xc0
[   14.562734]  __kmalloc_cache_noprof+0x189/0x420
[   14.563260]  kmalloc_oob_in_memset+0xac/0x320
[   14.563792]  kunit_try_run_case+0x1a5/0x480
[   14.564174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.565229]  kthread+0x337/0x6f0
[   14.565496]  ret_from_fork+0x116/0x1d0
[   14.566021]  ret_from_fork_asm+0x1a/0x30
[   14.566570] 
[   14.566905] The buggy address belongs to the object at ffff888103324c00
[   14.566905]  which belongs to the cache kmalloc-128 of size 128
[   14.567937] The buggy address is located 0 bytes inside of
[   14.567937]  allocated 120-byte region [ffff888103324c00, ffff888103324c78)
[   14.569090] 
[   14.569228] The buggy address belongs to the physical page:
[   14.569699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   14.570453] flags: 0x200000000000000(node=0|zone=2)
[   14.570776] page_type: f5(slab)
[   14.570976] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.571467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.572258] page dumped because: kasan: bad access detected
[   14.572866] 
[   14.573097] Memory state around the buggy address:
[   14.573481]  ffff888103324b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.574145]  ffff888103324b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.574666] >ffff888103324c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.575404]                                                                 ^
[   14.576516]  ffff888103324c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576991]  ffff888103324d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577654] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   14.494489] ==================================================================
[   14.495591] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   14.496070] Read of size 16 at addr ffff888101c20660 by task kunit_try_catch/185
[   14.496547] 
[   14.496819] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.496926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.496950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.496990] Call Trace:
[   14.497017]  <TASK>
[   14.497055]  dump_stack_lvl+0x73/0xb0
[   14.497129]  print_report+0xd1/0x650
[   14.497174]  ? __virt_addr_valid+0x1db/0x2d0
[   14.497328]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.497377]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.497419]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.497476]  kasan_report+0x141/0x180
[   14.497525]  ? kmalloc_uaf_16+0x47b/0x4c0
[   14.497583]  __asan_report_load16_noabort+0x18/0x20
[   14.497631]  kmalloc_uaf_16+0x47b/0x4c0
[   14.497680]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   14.497725]  ? __schedule+0x10cc/0x2b60
[   14.497771]  ? __pfx_read_tsc+0x10/0x10
[   14.497978]  ? ktime_get_ts64+0x86/0x230
[   14.498032]  kunit_try_run_case+0x1a5/0x480
[   14.498081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.498120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.498171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.498372]  ? __kthread_parkme+0x82/0x180
[   14.498434]  ? preempt_count_sub+0x50/0x80
[   14.498509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.498535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.498563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.498588]  kthread+0x337/0x6f0
[   14.498609]  ? trace_preempt_on+0x20/0xc0
[   14.498636]  ? __pfx_kthread+0x10/0x10
[   14.498658]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.498682]  ? calculate_sigpending+0x7b/0xa0
[   14.498820]  ? __pfx_kthread+0x10/0x10
[   14.498848]  ret_from_fork+0x116/0x1d0
[   14.498870]  ? __pfx_kthread+0x10/0x10
[   14.498892]  ret_from_fork_asm+0x1a/0x30
[   14.498927]  </TASK>
[   14.498941] 
[   14.513863] Allocated by task 185:
[   14.514261]  kasan_save_stack+0x45/0x70
[   14.514658]  kasan_save_track+0x18/0x40
[   14.514999]  kasan_save_alloc_info+0x3b/0x50
[   14.515296]  __kasan_kmalloc+0xb7/0xc0
[   14.515982]  __kmalloc_cache_noprof+0x189/0x420
[   14.516516]  kmalloc_uaf_16+0x15b/0x4c0
[   14.517448]  kunit_try_run_case+0x1a5/0x480
[   14.518453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.518751]  kthread+0x337/0x6f0
[   14.519168]  ret_from_fork+0x116/0x1d0
[   14.519881]  ret_from_fork_asm+0x1a/0x30
[   14.520167] 
[   14.520571] Freed by task 185:
[   14.521021]  kasan_save_stack+0x45/0x70
[   14.521624]  kasan_save_track+0x18/0x40
[   14.522157]  kasan_save_free_info+0x3f/0x60
[   14.522346]  __kasan_slab_free+0x56/0x70
[   14.522504]  kfree+0x222/0x3f0
[   14.522630]  kmalloc_uaf_16+0x1d6/0x4c0
[   14.523382]  kunit_try_run_case+0x1a5/0x480
[   14.523646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.523888]  kthread+0x337/0x6f0
[   14.524735]  ret_from_fork+0x116/0x1d0
[   14.525189]  ret_from_fork_asm+0x1a/0x30
[   14.525887] 
[   14.526004] The buggy address belongs to the object at ffff888101c20660
[   14.526004]  which belongs to the cache kmalloc-16 of size 16
[   14.527063] The buggy address is located 0 bytes inside of
[   14.527063]  freed 16-byte region [ffff888101c20660, ffff888101c20670)
[   14.527916] 
[   14.528417] The buggy address belongs to the physical page:
[   14.529148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20
[   14.529400] flags: 0x200000000000000(node=0|zone=2)
[   14.529597] page_type: f5(slab)
[   14.529739] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.530559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.530868] page dumped because: kasan: bad access detected
[   14.531299] 
[   14.531433] Memory state around the buggy address:
[   14.532007]  ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.532434]  ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.533753] >ffff888101c20600: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   14.534350]                                                        ^
[   14.534985]  ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.535432]  ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.535763] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   14.442491] ==================================================================
[   14.443118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   14.444174] Write of size 16 at addr ffff888101c20600 by task kunit_try_catch/183
[   14.444937] 
[   14.445364] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.445487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.445518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.445563] Call Trace:
[   14.445592]  <TASK>
[   14.445633]  dump_stack_lvl+0x73/0xb0
[   14.445716]  print_report+0xd1/0x650
[   14.445767]  ? __virt_addr_valid+0x1db/0x2d0
[   14.445816]  ? kmalloc_oob_16+0x452/0x4a0
[   14.445853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.445882]  ? kmalloc_oob_16+0x452/0x4a0
[   14.445904]  kasan_report+0x141/0x180
[   14.445926]  ? kmalloc_oob_16+0x452/0x4a0
[   14.445953]  __asan_report_store16_noabort+0x1b/0x30
[   14.445974]  kmalloc_oob_16+0x452/0x4a0
[   14.445996]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   14.446020]  ? __schedule+0x10cc/0x2b60
[   14.446046]  ? __pfx_read_tsc+0x10/0x10
[   14.446070]  ? ktime_get_ts64+0x86/0x230
[   14.446098]  kunit_try_run_case+0x1a5/0x480
[   14.446124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.446144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.446170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.446195]  ? __kthread_parkme+0x82/0x180
[   14.446218]  ? preempt_count_sub+0x50/0x80
[   14.446243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.446265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.446290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.446315]  kthread+0x337/0x6f0
[   14.446335]  ? trace_preempt_on+0x20/0xc0
[   14.446361]  ? __pfx_kthread+0x10/0x10
[   14.446383]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.446406]  ? calculate_sigpending+0x7b/0xa0
[   14.446431]  ? __pfx_kthread+0x10/0x10
[   14.446473]  ret_from_fork+0x116/0x1d0
[   14.446531]  ? __pfx_kthread+0x10/0x10
[   14.446555]  ret_from_fork_asm+0x1a/0x30
[   14.446589]  </TASK>
[   14.446603] 
[   14.459870] Allocated by task 183:
[   14.460299]  kasan_save_stack+0x45/0x70
[   14.462753]  kasan_save_track+0x18/0x40
[   14.463013]  kasan_save_alloc_info+0x3b/0x50
[   14.463207]  __kasan_kmalloc+0xb7/0xc0
[   14.463397]  __kmalloc_cache_noprof+0x189/0x420
[   14.463677]  kmalloc_oob_16+0xa8/0x4a0
[   14.463998]  kunit_try_run_case+0x1a5/0x480
[   14.464299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.466058]  kthread+0x337/0x6f0
[   14.466433]  ret_from_fork+0x116/0x1d0
[   14.466874]  ret_from_fork_asm+0x1a/0x30
[   14.467055] 
[   14.467156] The buggy address belongs to the object at ffff888101c20600
[   14.467156]  which belongs to the cache kmalloc-16 of size 16
[   14.467594] The buggy address is located 0 bytes inside of
[   14.467594]  allocated 13-byte region [ffff888101c20600, ffff888101c2060d)
[   14.468085] 
[   14.468632] The buggy address belongs to the physical page:
[   14.470055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20
[   14.470841] flags: 0x200000000000000(node=0|zone=2)
[   14.471170] page_type: f5(slab)
[   14.471490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.472200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.472551] page dumped because: kasan: bad access detected
[   14.472915] 
[   14.473045] Memory state around the buggy address:
[   14.473463]  ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.474838]  ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   14.475531] >ffff888101c20600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.477169]                       ^
[   14.481786]  ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482353]  ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   14.392279] ==================================================================
[   14.393492] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   14.393828] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181
[   14.394106] 
[   14.394263] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.394417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.394447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.394513] Call Trace:
[   14.394558]  <TASK>
[   14.394599]  dump_stack_lvl+0x73/0xb0
[   14.394666]  print_report+0xd1/0x650
[   14.394787]  ? __virt_addr_valid+0x1db/0x2d0
[   14.394859]  ? krealloc_uaf+0x53c/0x5e0
[   14.394902]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.394941]  ? krealloc_uaf+0x53c/0x5e0
[   14.394979]  kasan_report+0x141/0x180
[   14.395021]  ? krealloc_uaf+0x53c/0x5e0
[   14.395076]  __asan_report_load1_noabort+0x18/0x20
[   14.395151]  krealloc_uaf+0x53c/0x5e0
[   14.395231]  ? __pfx_krealloc_uaf+0x10/0x10
[   14.395281]  ? finish_task_switch.isra.0+0x153/0x700
[   14.395332]  ? __switch_to+0x47/0xf50
[   14.395429]  ? __schedule+0x10cc/0x2b60
[   14.395502]  ? __pfx_read_tsc+0x10/0x10
[   14.395548]  ? ktime_get_ts64+0x86/0x230
[   14.395583]  kunit_try_run_case+0x1a5/0x480
[   14.395610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.395659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.395705]  ? __kthread_parkme+0x82/0x180
[   14.395772]  ? preempt_count_sub+0x50/0x80
[   14.395811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.395893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.395938]  kthread+0x337/0x6f0
[   14.395980]  ? trace_preempt_on+0x20/0xc0
[   14.396025]  ? __pfx_kthread+0x10/0x10
[   14.396070]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.396118]  ? calculate_sigpending+0x7b/0xa0
[   14.396167]  ? __pfx_kthread+0x10/0x10
[   14.396228]  ret_from_fork+0x116/0x1d0
[   14.396269]  ? __pfx_kthread+0x10/0x10
[   14.396324]  ret_from_fork_asm+0x1a/0x30
[   14.396395]  </TASK>
[   14.396420] 
[   14.410151] Allocated by task 181:
[   14.410436]  kasan_save_stack+0x45/0x70
[   14.411284]  kasan_save_track+0x18/0x40
[   14.411551]  kasan_save_alloc_info+0x3b/0x50
[   14.412274]  __kasan_kmalloc+0xb7/0xc0
[   14.412595]  __kmalloc_cache_noprof+0x189/0x420
[   14.413168]  krealloc_uaf+0xbb/0x5e0
[   14.413467]  kunit_try_run_case+0x1a5/0x480
[   14.414066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414567]  kthread+0x337/0x6f0
[   14.414847]  ret_from_fork+0x116/0x1d0
[   14.415106]  ret_from_fork_asm+0x1a/0x30
[   14.415801] 
[   14.416101] Freed by task 181:
[   14.416522]  kasan_save_stack+0x45/0x70
[   14.417204]  kasan_save_track+0x18/0x40
[   14.417542]  kasan_save_free_info+0x3f/0x60
[   14.418199]  __kasan_slab_free+0x56/0x70
[   14.418579]  kfree+0x222/0x3f0
[   14.419102]  krealloc_uaf+0x13d/0x5e0
[   14.419835]  kunit_try_run_case+0x1a5/0x480
[   14.420333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420564]  kthread+0x337/0x6f0
[   14.420811]  ret_from_fork+0x116/0x1d0
[   14.421577]  ret_from_fork_asm+0x1a/0x30
[   14.422271] 
[   14.422407] The buggy address belongs to the object at ffff888100342000
[   14.422407]  which belongs to the cache kmalloc-256 of size 256
[   14.423555] The buggy address is located 0 bytes inside of
[   14.423555]  freed 256-byte region [ffff888100342000, ffff888100342100)
[   14.424028] 
[   14.424159] The buggy address belongs to the physical page:
[   14.424383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   14.425120] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.425613] flags: 0x200000000000040(head|node=0|zone=2)
[   14.426074] page_type: f5(slab)
[   14.426475] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.426876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.427780] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.428569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.429512] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   14.430261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.430845] page dumped because: kasan: bad access detected
[   14.431482] 
[   14.431638] Memory state around the buggy address:
[   14.432024]  ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.432669]  ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.432889] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.433343]                    ^
[   14.433696]  ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.434565]  ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.435383] ==================================================================
[   14.341532] ==================================================================
[   14.342795] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   14.343418] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181
[   14.344652] 
[   14.345015] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.345132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.345161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.345206] Call Trace:
[   14.345237]  <TASK>
[   14.345281]  dump_stack_lvl+0x73/0xb0
[   14.345355]  print_report+0xd1/0x650
[   14.345405]  ? __virt_addr_valid+0x1db/0x2d0
[   14.345467]  ? krealloc_uaf+0x1b8/0x5e0
[   14.345522]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.345580]  ? krealloc_uaf+0x1b8/0x5e0
[   14.345624]  kasan_report+0x141/0x180
[   14.345671]  ? krealloc_uaf+0x1b8/0x5e0
[   14.345720]  ? krealloc_uaf+0x1b8/0x5e0
[   14.345824]  __kasan_check_byte+0x3d/0x50
[   14.345863]  krealloc_noprof+0x3f/0x340
[   14.345900]  krealloc_uaf+0x1b8/0x5e0
[   14.345931]  ? __pfx_krealloc_uaf+0x10/0x10
[   14.345960]  ? finish_task_switch.isra.0+0x153/0x700
[   14.345993]  ? __switch_to+0x47/0xf50
[   14.346029]  ? __schedule+0x10cc/0x2b60
[   14.346063]  ? __pfx_read_tsc+0x10/0x10
[   14.346094]  ? ktime_get_ts64+0x86/0x230
[   14.346133]  kunit_try_run_case+0x1a5/0x480
[   14.346172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.346200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.346239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.346278]  ? __kthread_parkme+0x82/0x180
[   14.346310]  ? preempt_count_sub+0x50/0x80
[   14.346345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.346375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.346412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.346492]  kthread+0x337/0x6f0
[   14.346518]  ? trace_preempt_on+0x20/0xc0
[   14.346545]  ? __pfx_kthread+0x10/0x10
[   14.346567]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.346592]  ? calculate_sigpending+0x7b/0xa0
[   14.346618]  ? __pfx_kthread+0x10/0x10
[   14.346641]  ret_from_fork+0x116/0x1d0
[   14.346661]  ? __pfx_kthread+0x10/0x10
[   14.346687]  ret_from_fork_asm+0x1a/0x30
[   14.346778]  </TASK>
[   14.346802] 
[   14.363373] Allocated by task 181:
[   14.363672]  kasan_save_stack+0x45/0x70
[   14.364254]  kasan_save_track+0x18/0x40
[   14.365043]  kasan_save_alloc_info+0x3b/0x50
[   14.365422]  __kasan_kmalloc+0xb7/0xc0
[   14.366070]  __kmalloc_cache_noprof+0x189/0x420
[   14.366416]  krealloc_uaf+0xbb/0x5e0
[   14.366960]  kunit_try_run_case+0x1a5/0x480
[   14.367171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.368140]  kthread+0x337/0x6f0
[   14.368392]  ret_from_fork+0x116/0x1d0
[   14.368564]  ret_from_fork_asm+0x1a/0x30
[   14.368905] 
[   14.369402] Freed by task 181:
[   14.369705]  kasan_save_stack+0x45/0x70
[   14.370609]  kasan_save_track+0x18/0x40
[   14.371070]  kasan_save_free_info+0x3f/0x60
[   14.371869]  __kasan_slab_free+0x56/0x70
[   14.372172]  kfree+0x222/0x3f0
[   14.372357]  krealloc_uaf+0x13d/0x5e0
[   14.372744]  kunit_try_run_case+0x1a5/0x480
[   14.373351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.374168]  kthread+0x337/0x6f0
[   14.374382]  ret_from_fork+0x116/0x1d0
[   14.375033]  ret_from_fork_asm+0x1a/0x30
[   14.375611] 
[   14.375796] The buggy address belongs to the object at ffff888100342000
[   14.375796]  which belongs to the cache kmalloc-256 of size 256
[   14.377236] The buggy address is located 0 bytes inside of
[   14.377236]  freed 256-byte region [ffff888100342000, ffff888100342100)
[   14.378341] 
[   14.378765] The buggy address belongs to the physical page:
[   14.379083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   14.379647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.380439] flags: 0x200000000000040(head|node=0|zone=2)
[   14.380876] page_type: f5(slab)
[   14.381319] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.381657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.382216] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.382974] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.383660] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   14.384767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.385086] page dumped because: kasan: bad access detected
[   14.385262] 
[   14.385395] Memory state around the buggy address:
[   14.386446]  ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387353]  ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.388171] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.388878]                    ^
[   14.389202]  ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.390370]  ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.390878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   14.217514] ==================================================================
[   14.217803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   14.218144] Write of size 1 at addr ffff88810394e0d0 by task kunit_try_catch/179
[   14.219593] 
[   14.220263] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.220408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.220441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.220499] Call Trace:
[   14.220542]  <TASK>
[   14.220584]  dump_stack_lvl+0x73/0xb0
[   14.220639]  print_report+0xd1/0x650
[   14.220666]  ? __virt_addr_valid+0x1db/0x2d0
[   14.220700]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   14.220779]  ? kasan_addr_to_slab+0x11/0xa0
[   14.220816]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   14.220853]  kasan_report+0x141/0x180
[   14.220886]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   14.220926]  __asan_report_store1_noabort+0x1b/0x30
[   14.220958]  krealloc_less_oob_helper+0xe23/0x11d0
[   14.220999]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.221033]  ? finish_task_switch.isra.0+0x153/0x700
[   14.221068]  ? __switch_to+0x47/0xf50
[   14.221109]  ? __schedule+0x10cc/0x2b60
[   14.221145]  ? __pfx_read_tsc+0x10/0x10
[   14.221182]  krealloc_large_less_oob+0x1c/0x30
[   14.221250]  kunit_try_run_case+0x1a5/0x480
[   14.221277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.221297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.221324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.221348]  ? __kthread_parkme+0x82/0x180
[   14.221371]  ? preempt_count_sub+0x50/0x80
[   14.221394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.221415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.221440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.221487]  kthread+0x337/0x6f0
[   14.221511]  ? trace_preempt_on+0x20/0xc0
[   14.221536]  ? __pfx_kthread+0x10/0x10
[   14.221557]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.221580]  ? calculate_sigpending+0x7b/0xa0
[   14.221605]  ? __pfx_kthread+0x10/0x10
[   14.221627]  ret_from_fork+0x116/0x1d0
[   14.221646]  ? __pfx_kthread+0x10/0x10
[   14.221666]  ret_from_fork_asm+0x1a/0x30
[   14.221714]  </TASK>
[   14.221740] 
[   14.234995] The buggy address belongs to the physical page:
[   14.235244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c
[   14.236694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.237873] flags: 0x200000000000040(head|node=0|zone=2)
[   14.238292] page_type: f8(unknown)
[   14.238470] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.238733] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.239019] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.239283] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.239553] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff
[   14.239811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.240062] page dumped because: kasan: bad access detected
[   14.240255] 
[   14.240351] Memory state around the buggy address:
[   14.242320]  ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.242595]  ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.243394] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   14.243808]                                                  ^
[   14.244448]  ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.244769]  ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.245566] ==================================================================
[   13.939106] ==================================================================
[   13.940785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.941805] Write of size 1 at addr ffff888100ab48d0 by task kunit_try_catch/175
[   13.942697] 
[   13.942864] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.942957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.942981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.943023] Call Trace:
[   13.943061]  <TASK>
[   13.943098]  dump_stack_lvl+0x73/0xb0
[   13.943165]  print_report+0xd1/0x650
[   13.943209]  ? __virt_addr_valid+0x1db/0x2d0
[   13.943255]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.943299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.943340]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.943404]  kasan_report+0x141/0x180
[   13.943441]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.944229]  __asan_report_store1_noabort+0x1b/0x30
[   13.944312]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.944358]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.944395]  ? finish_task_switch.isra.0+0x153/0x700
[   13.944434]  ? __switch_to+0x47/0xf50
[   13.944546]  ? __schedule+0x10cc/0x2b60
[   13.944587]  ? __pfx_read_tsc+0x10/0x10
[   13.944624]  krealloc_less_oob+0x1c/0x30
[   13.944657]  kunit_try_run_case+0x1a5/0x480
[   13.944695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.944755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.944800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.944840]  ? __kthread_parkme+0x82/0x180
[   13.944874]  ? preempt_count_sub+0x50/0x80
[   13.944914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.944940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.944966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.944991]  kthread+0x337/0x6f0
[   13.945012]  ? trace_preempt_on+0x20/0xc0
[   13.945037]  ? __pfx_kthread+0x10/0x10
[   13.945059]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.945082]  ? calculate_sigpending+0x7b/0xa0
[   13.945107]  ? __pfx_kthread+0x10/0x10
[   13.945129]  ret_from_fork+0x116/0x1d0
[   13.945150]  ? __pfx_kthread+0x10/0x10
[   13.945171]  ret_from_fork_asm+0x1a/0x30
[   13.945226]  </TASK>
[   13.945248] 
[   13.959684] Allocated by task 175:
[   13.960061]  kasan_save_stack+0x45/0x70
[   13.960385]  kasan_save_track+0x18/0x40
[   13.961747]  kasan_save_alloc_info+0x3b/0x50
[   13.961974]  __kasan_krealloc+0x190/0x1f0
[   13.962120]  krealloc_noprof+0xf3/0x340
[   13.962258]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.963465]  krealloc_less_oob+0x1c/0x30
[   13.964050]  kunit_try_run_case+0x1a5/0x480
[   13.964493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.964803]  kthread+0x337/0x6f0
[   13.965358]  ret_from_fork+0x116/0x1d0
[   13.966161]  ret_from_fork_asm+0x1a/0x30
[   13.966635] 
[   13.966839] The buggy address belongs to the object at ffff888100ab4800
[   13.966839]  which belongs to the cache kmalloc-256 of size 256
[   13.967854] The buggy address is located 7 bytes to the right of
[   13.967854]  allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9)
[   13.968751] 
[   13.968994] The buggy address belongs to the physical page:
[   13.970281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   13.970616] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.971588] flags: 0x200000000000040(head|node=0|zone=2)
[   13.972346] page_type: f5(slab)
[   13.972775] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.973185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.974087] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.975298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.975917] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   13.977001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.977355] page dumped because: kasan: bad access detected
[   13.977575] 
[   13.977719] Memory state around the buggy address:
[   13.978554]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.979175]  ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.979607] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.980820]                                                  ^
[   13.981159]  ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.982211]  ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.982515] ==================================================================
[   13.983860] ==================================================================
[   13.984357] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.985539] Write of size 1 at addr ffff888100ab48da by task kunit_try_catch/175
[   13.986680] 
[   13.986925] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.987024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.987045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.987079] Call Trace:
[   13.987116]  <TASK>
[   13.987153]  dump_stack_lvl+0x73/0xb0
[   13.987217]  print_report+0xd1/0x650
[   13.987254]  ? __virt_addr_valid+0x1db/0x2d0
[   13.987291]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.987327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.987375]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.987695]  kasan_report+0x141/0x180
[   13.987827]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.987896]  __asan_report_store1_noabort+0x1b/0x30
[   13.987936]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.987981]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.988015]  ? finish_task_switch.isra.0+0x153/0x700
[   13.988041]  ? __switch_to+0x47/0xf50
[   13.988069]  ? __schedule+0x10cc/0x2b60
[   13.988095]  ? __pfx_read_tsc+0x10/0x10
[   13.988121]  krealloc_less_oob+0x1c/0x30
[   13.988144]  kunit_try_run_case+0x1a5/0x480
[   13.988168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.988189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.988243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.988271]  ? __kthread_parkme+0x82/0x180
[   13.988293]  ? preempt_count_sub+0x50/0x80
[   13.988317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.988339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.988365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.988390]  kthread+0x337/0x6f0
[   13.988411]  ? trace_preempt_on+0x20/0xc0
[   13.988436]  ? __pfx_kthread+0x10/0x10
[   13.988478]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.988506]  ? calculate_sigpending+0x7b/0xa0
[   13.988532]  ? __pfx_kthread+0x10/0x10
[   13.988554]  ret_from_fork+0x116/0x1d0
[   13.988575]  ? __pfx_kthread+0x10/0x10
[   13.988597]  ret_from_fork_asm+0x1a/0x30
[   13.988632]  </TASK>
[   13.988645] 
[   14.004392] Allocated by task 175:
[   14.005008]  kasan_save_stack+0x45/0x70
[   14.006254]  kasan_save_track+0x18/0x40
[   14.006548]  kasan_save_alloc_info+0x3b/0x50
[   14.006733]  __kasan_krealloc+0x190/0x1f0
[   14.007231]  krealloc_noprof+0xf3/0x340
[   14.007569]  krealloc_less_oob_helper+0x1aa/0x11d0
[   14.007964]  krealloc_less_oob+0x1c/0x30
[   14.008201]  kunit_try_run_case+0x1a5/0x480
[   14.008443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.009018]  kthread+0x337/0x6f0
[   14.009301]  ret_from_fork+0x116/0x1d0
[   14.009501]  ret_from_fork_asm+0x1a/0x30
[   14.010606] 
[   14.010979] The buggy address belongs to the object at ffff888100ab4800
[   14.010979]  which belongs to the cache kmalloc-256 of size 256
[   14.011778] The buggy address is located 17 bytes to the right of
[   14.011778]  allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9)
[   14.012809] 
[   14.012947] The buggy address belongs to the physical page:
[   14.013254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   14.013779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.014185] flags: 0x200000000000040(head|node=0|zone=2)
[   14.014719] page_type: f5(slab)
[   14.015027] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.015312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.016689] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.017316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.017821] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   14.018340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.018736] page dumped because: kasan: bad access detected
[   14.019169] 
[   14.019387] Memory state around the buggy address:
[   14.019815]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020287]  ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.020578] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   14.021097]                                                     ^
[   14.021625]  ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.022097]  ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.023647] ==================================================================
[   14.024922] ==================================================================
[   14.026013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   14.026502] Write of size 1 at addr ffff888100ab48ea by task kunit_try_catch/175
[   14.027553] 
[   14.028091] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.028194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.028234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.028283] Call Trace:
[   14.028326]  <TASK>
[   14.028404]  dump_stack_lvl+0x73/0xb0
[   14.028505]  print_report+0xd1/0x650
[   14.028556]  ? __virt_addr_valid+0x1db/0x2d0
[   14.028599]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.028628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.028651]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.028676]  kasan_report+0x141/0x180
[   14.028699]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.028747]  __asan_report_store1_noabort+0x1b/0x30
[   14.028812]  krealloc_less_oob_helper+0xe90/0x11d0
[   14.028857]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.028900]  ? finish_task_switch.isra.0+0x153/0x700
[   14.028925]  ? __switch_to+0x47/0xf50
[   14.028952]  ? __schedule+0x10cc/0x2b60
[   14.028977]  ? __pfx_read_tsc+0x10/0x10
[   14.029002]  krealloc_less_oob+0x1c/0x30
[   14.029025]  kunit_try_run_case+0x1a5/0x480
[   14.029049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.029069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.029094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.029118]  ? __kthread_parkme+0x82/0x180
[   14.029139]  ? preempt_count_sub+0x50/0x80
[   14.029162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.029183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.029246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.029275]  kthread+0x337/0x6f0
[   14.029295]  ? trace_preempt_on+0x20/0xc0
[   14.029320]  ? __pfx_kthread+0x10/0x10
[   14.029341]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.029363]  ? calculate_sigpending+0x7b/0xa0
[   14.029389]  ? __pfx_kthread+0x10/0x10
[   14.029411]  ret_from_fork+0x116/0x1d0
[   14.029430]  ? __pfx_kthread+0x10/0x10
[   14.029451]  ret_from_fork_asm+0x1a/0x30
[   14.029504]  </TASK>
[   14.029517] 
[   14.045243] Allocated by task 175:
[   14.045514]  kasan_save_stack+0x45/0x70
[   14.046204]  kasan_save_track+0x18/0x40
[   14.046595]  kasan_save_alloc_info+0x3b/0x50
[   14.047166]  __kasan_krealloc+0x190/0x1f0
[   14.047515]  krealloc_noprof+0xf3/0x340
[   14.047973]  krealloc_less_oob_helper+0x1aa/0x11d0
[   14.048405]  krealloc_less_oob+0x1c/0x30
[   14.048622]  kunit_try_run_case+0x1a5/0x480
[   14.049285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.049635]  kthread+0x337/0x6f0
[   14.050019]  ret_from_fork+0x116/0x1d0
[   14.050376]  ret_from_fork_asm+0x1a/0x30
[   14.050637] 
[   14.051003] The buggy address belongs to the object at ffff888100ab4800
[   14.051003]  which belongs to the cache kmalloc-256 of size 256
[   14.052070] The buggy address is located 33 bytes to the right of
[   14.052070]  allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9)
[   14.053081] 
[   14.053258] The buggy address belongs to the physical page:
[   14.053577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   14.054329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.055265] flags: 0x200000000000040(head|node=0|zone=2)
[   14.055521] page_type: f5(slab)
[   14.055973] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.056492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.057088] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.057946] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.058599] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   14.059192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.059825] page dumped because: kasan: bad access detected
[   14.060134] 
[   14.061303] Memory state around the buggy address:
[   14.061550]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.061804]  ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.062447] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   14.062983]                                                           ^
[   14.063405]  ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.063945]  ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.065266] ==================================================================
[   14.246592] ==================================================================
[   14.247034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   14.247361] Write of size 1 at addr ffff88810394e0da by task kunit_try_catch/179
[   14.248687] 
[   14.249469] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.249565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.249587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.249622] Call Trace:
[   14.249660]  <TASK>
[   14.249696]  dump_stack_lvl+0x73/0xb0
[   14.249758]  print_report+0xd1/0x650
[   14.249798]  ? __virt_addr_valid+0x1db/0x2d0
[   14.249835]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   14.249873]  ? kasan_addr_to_slab+0x11/0xa0
[   14.249907]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   14.249952]  kasan_report+0x141/0x180
[   14.249999]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   14.250059]  __asan_report_store1_noabort+0x1b/0x30
[   14.250105]  krealloc_less_oob_helper+0xec6/0x11d0
[   14.250347]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.250412]  ? finish_task_switch.isra.0+0x153/0x700
[   14.250520]  ? __switch_to+0x47/0xf50
[   14.250560]  ? __schedule+0x10cc/0x2b60
[   14.250589]  ? __pfx_read_tsc+0x10/0x10
[   14.250615]  krealloc_large_less_oob+0x1c/0x30
[   14.250640]  kunit_try_run_case+0x1a5/0x480
[   14.250664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.250688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.250751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.250791]  ? __kthread_parkme+0x82/0x180
[   14.250827]  ? preempt_count_sub+0x50/0x80
[   14.250857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.250880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.250904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.250927]  kthread+0x337/0x6f0
[   14.250946]  ? trace_preempt_on+0x20/0xc0
[   14.250970]  ? __pfx_kthread+0x10/0x10
[   14.250990]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.251011]  ? calculate_sigpending+0x7b/0xa0
[   14.251036]  ? __pfx_kthread+0x10/0x10
[   14.251058]  ret_from_fork+0x116/0x1d0
[   14.251076]  ? __pfx_kthread+0x10/0x10
[   14.251096]  ret_from_fork_asm+0x1a/0x30
[   14.251128]  </TASK>
[   14.251141] 
[   14.267092] The buggy address belongs to the physical page:
[   14.268046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c
[   14.268666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.269144] flags: 0x200000000000040(head|node=0|zone=2)
[   14.269407] page_type: f8(unknown)
[   14.269727] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.270125] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.270724] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.271090] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.271714] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff
[   14.272083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.272554] page dumped because: kasan: bad access detected
[   14.273035] 
[   14.273224] Memory state around the buggy address:
[   14.273479]  ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.273766]  ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.274040] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   14.274646]                                                     ^
[   14.275903]  ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.276688]  ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.277182] ==================================================================
[   13.897505] ==================================================================
[   13.898625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.899541] Write of size 1 at addr ffff888100ab48c9 by task kunit_try_catch/175
[   13.900776] 
[   13.901172] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.901369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.901400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.901441] Call Trace:
[   13.901490]  <TASK>
[   13.901519]  dump_stack_lvl+0x73/0xb0
[   13.901570]  print_report+0xd1/0x650
[   13.901597]  ? __virt_addr_valid+0x1db/0x2d0
[   13.901623]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.901649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.901673]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.901752]  kasan_report+0x141/0x180
[   13.901798]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.901846]  __asan_report_store1_noabort+0x1b/0x30
[   13.901871]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.901898]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.901924]  ? finish_task_switch.isra.0+0x153/0x700
[   13.901950]  ? __switch_to+0x47/0xf50
[   13.901979]  ? __schedule+0x10cc/0x2b60
[   13.902005]  ? __pfx_read_tsc+0x10/0x10
[   13.902031]  krealloc_less_oob+0x1c/0x30
[   13.902054]  kunit_try_run_case+0x1a5/0x480
[   13.902078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.902099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.902125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.902150]  ? __kthread_parkme+0x82/0x180
[   13.902172]  ? preempt_count_sub+0x50/0x80
[   13.902211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.902261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.902288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.902314]  kthread+0x337/0x6f0
[   13.902335]  ? trace_preempt_on+0x20/0xc0
[   13.902362]  ? __pfx_kthread+0x10/0x10
[   13.902384]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.902408]  ? calculate_sigpending+0x7b/0xa0
[   13.902434]  ? __pfx_kthread+0x10/0x10
[   13.902472]  ret_from_fork+0x116/0x1d0
[   13.902498]  ? __pfx_kthread+0x10/0x10
[   13.902521]  ret_from_fork_asm+0x1a/0x30
[   13.902555]  </TASK>
[   13.902569] 
[   13.914941] Allocated by task 175:
[   13.915340]  kasan_save_stack+0x45/0x70
[   13.915758]  kasan_save_track+0x18/0x40
[   13.916197]  kasan_save_alloc_info+0x3b/0x50
[   13.916387]  __kasan_krealloc+0x190/0x1f0
[   13.917237]  krealloc_noprof+0xf3/0x340
[   13.917539]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.918626]  krealloc_less_oob+0x1c/0x30
[   13.919086]  kunit_try_run_case+0x1a5/0x480
[   13.919432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.919864]  kthread+0x337/0x6f0
[   13.920223]  ret_from_fork+0x116/0x1d0
[   13.920496]  ret_from_fork_asm+0x1a/0x30
[   13.920957] 
[   13.921179] The buggy address belongs to the object at ffff888100ab4800
[   13.921179]  which belongs to the cache kmalloc-256 of size 256
[   13.922371] The buggy address is located 0 bytes to the right of
[   13.922371]  allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9)
[   13.923141] 
[   13.923387] The buggy address belongs to the physical page:
[   13.924268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   13.924897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.925757] flags: 0x200000000000040(head|node=0|zone=2)
[   13.926548] page_type: f5(slab)
[   13.926837] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.927086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.927362] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.928317] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.928571] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   13.928789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.931079] page dumped because: kasan: bad access detected
[   13.931509] 
[   13.931615] Memory state around the buggy address:
[   13.931825]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.932095]  ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.932350] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.932618]                                               ^
[   13.932859]  ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.933135]  ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.933414] ==================================================================
[   14.278248] ==================================================================
[   14.278774] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   14.279645] Write of size 1 at addr ffff88810394e0ea by task kunit_try_catch/179
[   14.280768] 
[   14.281487] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.281563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.281577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.281601] Call Trace:
[   14.281625]  <TASK>
[   14.281649]  dump_stack_lvl+0x73/0xb0
[   14.281702]  print_report+0xd1/0x650
[   14.281775]  ? __virt_addr_valid+0x1db/0x2d0
[   14.281818]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.281856]  ? kasan_addr_to_slab+0x11/0xa0
[   14.281887]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.281925]  kasan_report+0x141/0x180
[   14.281959]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   14.282002]  __asan_report_store1_noabort+0x1b/0x30
[   14.282033]  krealloc_less_oob_helper+0xe90/0x11d0
[   14.282071]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.282107]  ? finish_task_switch.isra.0+0x153/0x700
[   14.282143]  ? __switch_to+0x47/0xf50
[   14.282183]  ? __schedule+0x10cc/0x2b60
[   14.282241]  ? __pfx_read_tsc+0x10/0x10
[   14.282284]  krealloc_large_less_oob+0x1c/0x30
[   14.282321]  kunit_try_run_case+0x1a5/0x480
[   14.282348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.282368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.282394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.282419]  ? __kthread_parkme+0x82/0x180
[   14.282441]  ? preempt_count_sub+0x50/0x80
[   14.282491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.282516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.282541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.282565]  kthread+0x337/0x6f0
[   14.282585]  ? trace_preempt_on+0x20/0xc0
[   14.282610]  ? __pfx_kthread+0x10/0x10
[   14.282631]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.282654]  ? calculate_sigpending+0x7b/0xa0
[   14.282679]  ? __pfx_kthread+0x10/0x10
[   14.282810]  ret_from_fork+0x116/0x1d0
[   14.282835]  ? __pfx_kthread+0x10/0x10
[   14.282856]  ret_from_fork_asm+0x1a/0x30
[   14.282890]  </TASK>
[   14.282903] 
[   14.294536] The buggy address belongs to the physical page:
[   14.295065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c
[   14.295747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.296261] flags: 0x200000000000040(head|node=0|zone=2)
[   14.297419] page_type: f8(unknown)
[   14.298259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.299556] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.300178] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.300860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.301389] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff
[   14.301970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.302426] page dumped because: kasan: bad access detected
[   14.302898] 
[   14.303040] Memory state around the buggy address:
[   14.303440]  ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.303814]  ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.304032] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   14.304232]                                                           ^
[   14.304792]  ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.305378]  ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.305887] ==================================================================
[   14.066028] ==================================================================
[   14.066352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   14.067208] Write of size 1 at addr ffff888100ab48eb by task kunit_try_catch/175
[   14.068241] 
[   14.068539] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.068643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.068670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.068721] Call Trace:
[   14.068768]  <TASK>
[   14.068825]  dump_stack_lvl+0x73/0xb0
[   14.068897]  print_report+0xd1/0x650
[   14.068947]  ? __virt_addr_valid+0x1db/0x2d0
[   14.068995]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.069384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.069439]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.069495]  kasan_report+0x141/0x180
[   14.069524]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.069555]  __asan_report_store1_noabort+0x1b/0x30
[   14.069586]  krealloc_less_oob_helper+0xd47/0x11d0
[   14.069630]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.069676]  ? finish_task_switch.isra.0+0x153/0x700
[   14.069723]  ? __switch_to+0x47/0xf50
[   14.069771]  ? __schedule+0x10cc/0x2b60
[   14.069821]  ? __pfx_read_tsc+0x10/0x10
[   14.069873]  krealloc_less_oob+0x1c/0x30
[   14.069916]  kunit_try_run_case+0x1a5/0x480
[   14.070325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.070370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.070398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.070424]  ? __kthread_parkme+0x82/0x180
[   14.070447]  ? preempt_count_sub+0x50/0x80
[   14.070488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.070512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.070539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.070565]  kthread+0x337/0x6f0
[   14.070586]  ? trace_preempt_on+0x20/0xc0
[   14.070613]  ? __pfx_kthread+0x10/0x10
[   14.070635]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.070659]  ? calculate_sigpending+0x7b/0xa0
[   14.070688]  ? __pfx_kthread+0x10/0x10
[   14.070760]  ret_from_fork+0x116/0x1d0
[   14.070804]  ? __pfx_kthread+0x10/0x10
[   14.070835]  ret_from_fork_asm+0x1a/0x30
[   14.070871]  </TASK>
[   14.070884] 
[   14.087173] Allocated by task 175:
[   14.087581]  kasan_save_stack+0x45/0x70
[   14.088480]  kasan_save_track+0x18/0x40
[   14.089036]  kasan_save_alloc_info+0x3b/0x50
[   14.089314]  __kasan_krealloc+0x190/0x1f0
[   14.089537]  krealloc_noprof+0xf3/0x340
[   14.090196]  krealloc_less_oob_helper+0x1aa/0x11d0
[   14.090499]  krealloc_less_oob+0x1c/0x30
[   14.090839]  kunit_try_run_case+0x1a5/0x480
[   14.091368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091727]  kthread+0x337/0x6f0
[   14.091934]  ret_from_fork+0x116/0x1d0
[   14.092213]  ret_from_fork_asm+0x1a/0x30
[   14.093035] 
[   14.093394] The buggy address belongs to the object at ffff888100ab4800
[   14.093394]  which belongs to the cache kmalloc-256 of size 256
[   14.094033] The buggy address is located 34 bytes to the right of
[   14.094033]  allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9)
[   14.094679] 
[   14.094891] The buggy address belongs to the physical page:
[   14.095449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   14.096283] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.096965] flags: 0x200000000000040(head|node=0|zone=2)
[   14.097216] page_type: f5(slab)
[   14.097576] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.098470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.099023] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.099623] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.100280] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   14.100641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.100872] page dumped because: kasan: bad access detected
[   14.101572] 
[   14.102044] Memory state around the buggy address:
[   14.103051]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103892]  ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.104794] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   14.105173]                                                           ^
[   14.105995]  ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107053]  ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107560] ==================================================================
[   14.178331] ==================================================================
[   14.179265] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   14.179645] Write of size 1 at addr ffff88810394e0c9 by task kunit_try_catch/179
[   14.180072] 
[   14.180496] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.180613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.180643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.180687] Call Trace:
[   14.180716]  <TASK>
[   14.180753]  dump_stack_lvl+0x73/0xb0
[   14.180819]  print_report+0xd1/0x650
[   14.180891]  ? __virt_addr_valid+0x1db/0x2d0
[   14.180939]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   14.181121]  ? kasan_addr_to_slab+0x11/0xa0
[   14.181161]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   14.181203]  kasan_report+0x141/0x180
[   14.181262]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   14.181314]  __asan_report_store1_noabort+0x1b/0x30
[   14.181355]  krealloc_less_oob_helper+0xd70/0x11d0
[   14.181405]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.181469]  ? finish_task_switch.isra.0+0x153/0x700
[   14.181517]  ? __switch_to+0x47/0xf50
[   14.181570]  ? __schedule+0x10cc/0x2b60
[   14.181621]  ? __pfx_read_tsc+0x10/0x10
[   14.181672]  krealloc_large_less_oob+0x1c/0x30
[   14.181870]  kunit_try_run_case+0x1a5/0x480
[   14.181929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.181974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.182035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.182076]  ? __kthread_parkme+0x82/0x180
[   14.182111]  ? preempt_count_sub+0x50/0x80
[   14.182147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.182243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.182287]  kthread+0x337/0x6f0
[   14.182311]  ? trace_preempt_on+0x20/0xc0
[   14.182337]  ? __pfx_kthread+0x10/0x10
[   14.182358]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.182382]  ? calculate_sigpending+0x7b/0xa0
[   14.182407]  ? __pfx_kthread+0x10/0x10
[   14.182429]  ret_from_fork+0x116/0x1d0
[   14.182449]  ? __pfx_kthread+0x10/0x10
[   14.182497]  ret_from_fork_asm+0x1a/0x30
[   14.182531]  </TASK>
[   14.182545] 
[   14.198929] The buggy address belongs to the physical page:
[   14.199442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c
[   14.200075] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.203847] flags: 0x200000000000040(head|node=0|zone=2)
[   14.204573] page_type: f8(unknown)
[   14.205728] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.207303] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.207700] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.207996] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.209373] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff
[   14.209636] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.210180] page dumped because: kasan: bad access detected
[   14.211235] 
[   14.211437] Memory state around the buggy address:
[   14.211744]  ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.212403]  ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.213698] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   14.214079]                                               ^
[   14.214794]  ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.215360]  ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.216119] ==================================================================
[   14.306539] ==================================================================
[   14.307280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   14.307787] Write of size 1 at addr ffff88810394e0eb by task kunit_try_catch/179
[   14.308214] 
[   14.308439] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.308539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.308558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.308594] Call Trace:
[   14.308632]  <TASK>
[   14.308666]  dump_stack_lvl+0x73/0xb0
[   14.308755]  print_report+0xd1/0x650
[   14.308802]  ? __virt_addr_valid+0x1db/0x2d0
[   14.308850]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.308897]  ? kasan_addr_to_slab+0x11/0xa0
[   14.308944]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.308998]  kasan_report+0x141/0x180
[   14.309050]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   14.309114]  __asan_report_store1_noabort+0x1b/0x30
[   14.309168]  krealloc_less_oob_helper+0xd47/0x11d0
[   14.309256]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   14.309318]  ? finish_task_switch.isra.0+0x153/0x700
[   14.309365]  ? __switch_to+0x47/0xf50
[   14.309421]  ? __schedule+0x10cc/0x2b60
[   14.309487]  ? __pfx_read_tsc+0x10/0x10
[   14.309538]  krealloc_large_less_oob+0x1c/0x30
[   14.309594]  kunit_try_run_case+0x1a5/0x480
[   14.309646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.309691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.309746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.309800]  ? __kthread_parkme+0x82/0x180
[   14.309849]  ? preempt_count_sub+0x50/0x80
[   14.309900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.309956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.309993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.310029]  kthread+0x337/0x6f0
[   14.310068]  ? trace_preempt_on+0x20/0xc0
[   14.310105]  ? __pfx_kthread+0x10/0x10
[   14.310137]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.310173]  ? calculate_sigpending+0x7b/0xa0
[   14.310224]  ? __pfx_kthread+0x10/0x10
[   14.310259]  ret_from_fork+0x116/0x1d0
[   14.310289]  ? __pfx_kthread+0x10/0x10
[   14.310325]  ret_from_fork_asm+0x1a/0x30
[   14.310386]  </TASK>
[   14.310408] 
[   14.319870] The buggy address belongs to the physical page:
[   14.320435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c
[   14.321101] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.321740] flags: 0x200000000000040(head|node=0|zone=2)
[   14.322171] page_type: f8(unknown)
[   14.322523] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.323306] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.323984] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.324344] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.325024] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff
[   14.325516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.325987] page dumped because: kasan: bad access detected
[   14.326222] 
[   14.326343] Memory state around the buggy address:
[   14.326575]  ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.327138]  ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.327791] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   14.328232]                                                           ^
[   14.328564]  ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.329056]  ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.329561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   14.145353] ==================================================================
[   14.145814] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   14.146261] Write of size 1 at addr ffff8881038ba0f0 by task kunit_try_catch/177
[   14.146832] 
[   14.147055] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.147154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.147182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.148231] Call Trace:
[   14.148293]  <TASK>
[   14.148336]  dump_stack_lvl+0x73/0xb0
[   14.148414]  print_report+0xd1/0x650
[   14.148479]  ? __virt_addr_valid+0x1db/0x2d0
[   14.148535]  ? krealloc_more_oob_helper+0x7eb/0x930
[   14.148589]  ? kasan_addr_to_slab+0x11/0xa0
[   14.148637]  ? krealloc_more_oob_helper+0x7eb/0x930
[   14.148677]  kasan_report+0x141/0x180
[   14.148719]  ? krealloc_more_oob_helper+0x7eb/0x930
[   14.148784]  __asan_report_store1_noabort+0x1b/0x30
[   14.148833]  krealloc_more_oob_helper+0x7eb/0x930
[   14.148884]  ? __schedule+0x10cc/0x2b60
[   14.148938]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   14.148994]  ? finish_task_switch.isra.0+0x153/0x700
[   14.149074]  ? __switch_to+0x47/0xf50
[   14.149129]  ? __schedule+0x10cc/0x2b60
[   14.149170]  ? __pfx_read_tsc+0x10/0x10
[   14.149230]  krealloc_large_more_oob+0x1c/0x30
[   14.149273]  kunit_try_run_case+0x1a5/0x480
[   14.149299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.149321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.149349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.149375]  ? __kthread_parkme+0x82/0x180
[   14.149398]  ? preempt_count_sub+0x50/0x80
[   14.149424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.149446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.149500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.149528]  kthread+0x337/0x6f0
[   14.149551]  ? trace_preempt_on+0x20/0xc0
[   14.149576]  ? __pfx_kthread+0x10/0x10
[   14.149599]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.149623]  ? calculate_sigpending+0x7b/0xa0
[   14.149648]  ? __pfx_kthread+0x10/0x10
[   14.149669]  ret_from_fork+0x116/0x1d0
[   14.149695]  ? __pfx_kthread+0x10/0x10
[   14.149751]  ret_from_fork_asm+0x1a/0x30
[   14.149808]  </TASK>
[   14.149824] 
[   14.159086] The buggy address belongs to the physical page:
[   14.159516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b8
[   14.160115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.160691] flags: 0x200000000000040(head|node=0|zone=2)
[   14.160959] page_type: f8(unknown)
[   14.161159] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.161498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.162094] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.162879] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.163506] head: 0200000000000002 ffffea00040e2e01 00000000ffffffff 00000000ffffffff
[   14.163925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.164249] page dumped because: kasan: bad access detected
[   14.164502] 
[   14.164687] Memory state around the buggy address:
[   14.165162]  ffff8881038b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.165692]  ffff8881038ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.166351] >ffff8881038ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   14.166557]                                                              ^
[   14.166770]  ffff8881038ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.166971]  ffff8881038ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.167502] ==================================================================
[   13.823255] ==================================================================
[   13.823991] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   13.825515] Write of size 1 at addr ffff888100ab46eb by task kunit_try_catch/173
[   13.826275] 
[   13.826474] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.826618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.826663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.826868] Call Trace:
[   13.826953]  <TASK>
[   13.826996]  dump_stack_lvl+0x73/0xb0
[   13.827047]  print_report+0xd1/0x650
[   13.827075]  ? __virt_addr_valid+0x1db/0x2d0
[   13.827103]  ? krealloc_more_oob_helper+0x821/0x930
[   13.827137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.827175]  ? krealloc_more_oob_helper+0x821/0x930
[   13.827245]  kasan_report+0x141/0x180
[   13.827273]  ? krealloc_more_oob_helper+0x821/0x930
[   13.827303]  __asan_report_store1_noabort+0x1b/0x30
[   13.827325]  krealloc_more_oob_helper+0x821/0x930
[   13.827362]  ? trace_hardirqs_on+0x37/0xe0
[   13.827398]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.827423]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.827472]  ? __pfx_krealloc_more_oob+0x10/0x10
[   13.827506]  krealloc_more_oob+0x1c/0x30
[   13.827530]  kunit_try_run_case+0x1a5/0x480
[   13.827556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.827577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.827605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.827631]  ? __kthread_parkme+0x82/0x180
[   13.827655]  ? preempt_count_sub+0x50/0x80
[   13.827681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.827703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.827729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.827791]  kthread+0x337/0x6f0
[   13.827826]  ? trace_preempt_on+0x20/0xc0
[   13.827862]  ? __pfx_kthread+0x10/0x10
[   13.827896]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.827932]  ? calculate_sigpending+0x7b/0xa0
[   13.827968]  ? __pfx_kthread+0x10/0x10
[   13.827991]  ret_from_fork+0x116/0x1d0
[   13.828014]  ? __pfx_kthread+0x10/0x10
[   13.828036]  ret_from_fork_asm+0x1a/0x30
[   13.828069]  </TASK>
[   13.828082] 
[   13.839683] Allocated by task 173:
[   13.840088]  kasan_save_stack+0x45/0x70
[   13.840629]  kasan_save_track+0x18/0x40
[   13.841082]  kasan_save_alloc_info+0x3b/0x50
[   13.841317]  __kasan_krealloc+0x190/0x1f0
[   13.841731]  krealloc_noprof+0xf3/0x340
[   13.842171]  krealloc_more_oob_helper+0x1a9/0x930
[   13.842365]  krealloc_more_oob+0x1c/0x30
[   13.842608]  kunit_try_run_case+0x1a5/0x480
[   13.843000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.843496]  kthread+0x337/0x6f0
[   13.843813]  ret_from_fork+0x116/0x1d0
[   13.844143]  ret_from_fork_asm+0x1a/0x30
[   13.844603] 
[   13.844805] The buggy address belongs to the object at ffff888100ab4600
[   13.844805]  which belongs to the cache kmalloc-256 of size 256
[   13.845619] The buggy address is located 0 bytes to the right of
[   13.845619]  allocated 235-byte region [ffff888100ab4600, ffff888100ab46eb)
[   13.846078] 
[   13.846237] The buggy address belongs to the physical page:
[   13.846559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   13.847148] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.847769] flags: 0x200000000000040(head|node=0|zone=2)
[   13.848245] page_type: f5(slab)
[   13.848439] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.849263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.849831] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.850130] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.852200] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   13.852747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.853079] page dumped because: kasan: bad access detected
[   13.853351] 
[   13.853483] Memory state around the buggy address:
[   13.853716]  ffff888100ab4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.853988]  ffff888100ab4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.854307] >ffff888100ab4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.854823]                                                           ^
[   13.855385]  ffff888100ab4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.855919]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.856509] ==================================================================
[   14.114116] ==================================================================
[   14.114738] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   14.115616] Write of size 1 at addr ffff8881038ba0eb by task kunit_try_catch/177
[   14.116250] 
[   14.116413] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   14.116522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.116548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.116591] Call Trace:
[   14.116620]  <TASK>
[   14.116663]  dump_stack_lvl+0x73/0xb0
[   14.116732]  print_report+0xd1/0x650
[   14.116775]  ? __virt_addr_valid+0x1db/0x2d0
[   14.116815]  ? krealloc_more_oob_helper+0x821/0x930
[   14.116853]  ? kasan_addr_to_slab+0x11/0xa0
[   14.116889]  ? krealloc_more_oob_helper+0x821/0x930
[   14.116928]  kasan_report+0x141/0x180
[   14.116972]  ? krealloc_more_oob_helper+0x821/0x930
[   14.117028]  __asan_report_store1_noabort+0x1b/0x30
[   14.117072]  krealloc_more_oob_helper+0x821/0x930
[   14.117118]  ? __schedule+0x10cc/0x2b60
[   14.117166]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   14.117760]  ? finish_task_switch.isra.0+0x153/0x700
[   14.117851]  ? __switch_to+0x47/0xf50
[   14.117893]  ? __schedule+0x10cc/0x2b60
[   14.117931]  ? __pfx_read_tsc+0x10/0x10
[   14.117971]  krealloc_large_more_oob+0x1c/0x30
[   14.118010]  kunit_try_run_case+0x1a5/0x480
[   14.118047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.118078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.118117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.118156]  ? __kthread_parkme+0x82/0x180
[   14.118240]  ? preempt_count_sub+0x50/0x80
[   14.118296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.118354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.118385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.118411]  kthread+0x337/0x6f0
[   14.118434]  ? trace_preempt_on+0x20/0xc0
[   14.118483]  ? __pfx_kthread+0x10/0x10
[   14.118509]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.118533]  ? calculate_sigpending+0x7b/0xa0
[   14.118560]  ? __pfx_kthread+0x10/0x10
[   14.118583]  ret_from_fork+0x116/0x1d0
[   14.118605]  ? __pfx_kthread+0x10/0x10
[   14.118627]  ret_from_fork_asm+0x1a/0x30
[   14.118661]  </TASK>
[   14.118676] 
[   14.134481] The buggy address belongs to the physical page:
[   14.135518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b8
[   14.136507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.137084] flags: 0x200000000000040(head|node=0|zone=2)
[   14.137495] page_type: f8(unknown)
[   14.137697] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.138499] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.139158] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.139505] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.140205] head: 0200000000000002 ffffea00040e2e01 00000000ffffffff 00000000ffffffff
[   14.140495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.140744] page dumped because: kasan: bad access detected
[   14.140928] 
[   14.141022] Memory state around the buggy address:
[   14.141199]  ffff8881038b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.141429]  ffff8881038ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.141703] >ffff8881038ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   14.141971]                                                           ^
[   14.142228]  ffff8881038ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.143405]  ffff8881038ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.144063] ==================================================================
[   13.857524] ==================================================================
[   13.858377] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   13.859148] Write of size 1 at addr ffff888100ab46f0 by task kunit_try_catch/173
[   13.859730] 
[   13.859892] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.859992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.860052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.860090] Call Trace:
[   13.860129]  <TASK>
[   13.860167]  dump_stack_lvl+0x73/0xb0
[   13.860253]  print_report+0xd1/0x650
[   13.860293]  ? __virt_addr_valid+0x1db/0x2d0
[   13.860332]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.860368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.860402]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.860440]  kasan_report+0x141/0x180
[   13.860495]  ? krealloc_more_oob_helper+0x7eb/0x930
[   13.860545]  __asan_report_store1_noabort+0x1b/0x30
[   13.860586]  krealloc_more_oob_helper+0x7eb/0x930
[   13.860629]  ? trace_hardirqs_on+0x37/0xe0
[   13.860678]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   13.860740]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.860810]  ? __pfx_krealloc_more_oob+0x10/0x10
[   13.860871]  krealloc_more_oob+0x1c/0x30
[   13.860913]  kunit_try_run_case+0x1a5/0x480
[   13.860954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.860994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.861044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.861092]  ? __kthread_parkme+0x82/0x180
[   13.861138]  ? preempt_count_sub+0x50/0x80
[   13.861189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.861236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.861291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.861344]  kthread+0x337/0x6f0
[   13.861390]  ? trace_preempt_on+0x20/0xc0
[   13.861439]  ? __pfx_kthread+0x10/0x10
[   13.861499]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.861549]  ? calculate_sigpending+0x7b/0xa0
[   13.861602]  ? __pfx_kthread+0x10/0x10
[   13.861652]  ret_from_fork+0x116/0x1d0
[   13.861698]  ? __pfx_kthread+0x10/0x10
[   13.861746]  ret_from_fork_asm+0x1a/0x30
[   13.861820]  </TASK>
[   13.861848] 
[   13.871586] Allocated by task 173:
[   13.871844]  kasan_save_stack+0x45/0x70
[   13.872090]  kasan_save_track+0x18/0x40
[   13.872324]  kasan_save_alloc_info+0x3b/0x50
[   13.872601]  __kasan_krealloc+0x190/0x1f0
[   13.872950]  krealloc_noprof+0xf3/0x340
[   13.873333]  krealloc_more_oob_helper+0x1a9/0x930
[   13.873790]  krealloc_more_oob+0x1c/0x30
[   13.874118]  kunit_try_run_case+0x1a5/0x480
[   13.874472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.874900]  kthread+0x337/0x6f0
[   13.875240]  ret_from_fork+0x116/0x1d0
[   13.875600]  ret_from_fork_asm+0x1a/0x30
[   13.876016] 
[   13.876222] The buggy address belongs to the object at ffff888100ab4600
[   13.876222]  which belongs to the cache kmalloc-256 of size 256
[   13.876725] The buggy address is located 5 bytes to the right of
[   13.876725]  allocated 235-byte region [ffff888100ab4600, ffff888100ab46eb)
[   13.877725] 
[   13.877890] The buggy address belongs to the physical page:
[   13.878128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4
[   13.878470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.879063] flags: 0x200000000000040(head|node=0|zone=2)
[   13.879593] page_type: f5(slab)
[   13.879894] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.880343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.880574] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.881055] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.881689] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff
[   13.882101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.883443] page dumped because: kasan: bad access detected
[   13.883930] 
[   13.884052] Memory state around the buggy address:
[   13.884334]  ffff888100ab4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.885056]  ffff888100ab4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.885641] >ffff888100ab4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   13.886912]                                                              ^
[   13.887553]  ffff888100ab4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.888235]  ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.888548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   13.793476] ==================================================================
[   13.795016] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   13.795520] Read of size 1 at addr ffff888103990000 by task kunit_try_catch/171
[   13.796104] 
[   13.796295] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.796364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.796379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.796404] Call Trace:
[   13.796422]  <TASK>
[   13.796447]  dump_stack_lvl+0x73/0xb0
[   13.796505]  print_report+0xd1/0x650
[   13.796532]  ? __virt_addr_valid+0x1db/0x2d0
[   13.796558]  ? page_alloc_uaf+0x356/0x3d0
[   13.796583]  ? kasan_addr_to_slab+0x11/0xa0
[   13.796605]  ? page_alloc_uaf+0x356/0x3d0
[   13.796630]  kasan_report+0x141/0x180
[   13.796654]  ? page_alloc_uaf+0x356/0x3d0
[   13.796683]  __asan_report_load1_noabort+0x18/0x20
[   13.796705]  page_alloc_uaf+0x356/0x3d0
[   13.796729]  ? __pfx_page_alloc_uaf+0x10/0x10
[   13.796755]  ? __schedule+0x10cc/0x2b60
[   13.796781]  ? __pfx_read_tsc+0x10/0x10
[   13.796805]  ? ktime_get_ts64+0x86/0x230
[   13.796833]  kunit_try_run_case+0x1a5/0x480
[   13.796856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.796877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.796904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.796930]  ? __kthread_parkme+0x82/0x180
[   13.796953]  ? preempt_count_sub+0x50/0x80
[   13.796979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.797028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.797054]  kthread+0x337/0x6f0
[   13.797075]  ? trace_preempt_on+0x20/0xc0
[   13.797101]  ? __pfx_kthread+0x10/0x10
[   13.797123]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.797147]  ? calculate_sigpending+0x7b/0xa0
[   13.797174]  ? __pfx_kthread+0x10/0x10
[   13.797203]  ret_from_fork+0x116/0x1d0
[   13.797264]  ? __pfx_kthread+0x10/0x10
[   13.797306]  ret_from_fork_asm+0x1a/0x30
[   13.797373]  </TASK>
[   13.797397] 
[   13.809204] The buggy address belongs to the physical page:
[   13.809775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990
[   13.810528] flags: 0x200000000000000(node=0|zone=2)
[   13.811043] page_type: f0(buddy)
[   13.811510] raw: 0200000000000000 ffff88817fffb460 ffff88817fffb460 0000000000000000
[   13.812168] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   13.812776] page dumped because: kasan: bad access detected
[   13.813106] 
[   13.813257] Memory state around the buggy address:
[   13.813492]  ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.813877]  ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.814222] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.814731]                    ^
[   13.814913]  ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.815497]  ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.815965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   13.754157] ==================================================================
[   13.754837] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   13.756035] Free of addr ffff888103948001 by task kunit_try_catch/167
[   13.756325] 
[   13.756471] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.756562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.756585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.756617] Call Trace:
[   13.756635]  <TASK>
[   13.756661]  dump_stack_lvl+0x73/0xb0
[   13.756702]  print_report+0xd1/0x650
[   13.756729]  ? __virt_addr_valid+0x1db/0x2d0
[   13.756757]  ? kasan_addr_to_slab+0x11/0xa0
[   13.756779]  ? kfree+0x274/0x3f0
[   13.756898]  kasan_report_invalid_free+0x10a/0x130
[   13.756959]  ? kfree+0x274/0x3f0
[   13.757003]  ? kfree+0x274/0x3f0
[   13.757036]  __kasan_kfree_large+0x86/0xd0
[   13.757078]  free_large_kmalloc+0x4b/0x110
[   13.757130]  kfree+0x274/0x3f0
[   13.757176]  kmalloc_large_invalid_free+0x120/0x2b0
[   13.757239]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   13.757295]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   13.757356]  kunit_try_run_case+0x1a5/0x480
[   13.757406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.757531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.757584]  ? __kthread_parkme+0x82/0x180
[   13.757633]  ? preempt_count_sub+0x50/0x80
[   13.757697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.757803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.757855]  kthread+0x337/0x6f0
[   13.757901]  ? trace_preempt_on+0x20/0xc0
[   13.757957]  ? __pfx_kthread+0x10/0x10
[   13.757997]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.758037]  ? calculate_sigpending+0x7b/0xa0
[   13.758108]  ? __pfx_kthread+0x10/0x10
[   13.758148]  ret_from_fork+0x116/0x1d0
[   13.758186]  ? __pfx_kthread+0x10/0x10
[   13.758256]  ret_from_fork_asm+0x1a/0x30
[   13.758297]  </TASK>
[   13.758311] 
[   13.770631] The buggy address belongs to the physical page:
[   13.771054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948
[   13.771418] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.771712] flags: 0x200000000000040(head|node=0|zone=2)
[   13.772119] page_type: f8(unknown)
[   13.772441] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.773143] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.773883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.774699] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.775004] head: 0200000000000002 ffffea00040e5201 00000000ffffffff 00000000ffffffff
[   13.775354] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.775991] page dumped because: kasan: bad access detected
[   13.776426] 
[   13.776657] Memory state around the buggy address:
[   13.777070]  ffff888103947f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.777484]  ffff888103947f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.777766] >ffff888103948000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.778297]                    ^
[   13.778657]  ffff888103948080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.779122]  ffff888103948100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.779524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   13.722356] ==================================================================
[   13.723118] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   13.723498] Read of size 1 at addr ffff888103948000 by task kunit_try_catch/165
[   13.723855] 
[   13.723995] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.724054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.724068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.724091] Call Trace:
[   13.724108]  <TASK>
[   13.724133]  dump_stack_lvl+0x73/0xb0
[   13.724166]  print_report+0xd1/0x650
[   13.724190]  ? __virt_addr_valid+0x1db/0x2d0
[   13.724702]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.724770]  ? kasan_addr_to_slab+0x11/0xa0
[   13.725163]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.725218]  kasan_report+0x141/0x180
[   13.725273]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.725353]  __asan_report_load1_noabort+0x18/0x20
[   13.725385]  kmalloc_large_uaf+0x2f1/0x340
[   13.725409]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   13.725435]  ? __schedule+0x10cc/0x2b60
[   13.725486]  ? __pfx_read_tsc+0x10/0x10
[   13.725516]  ? ktime_get_ts64+0x86/0x230
[   13.725544]  kunit_try_run_case+0x1a5/0x480
[   13.725568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.725589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.725617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.725643]  ? __kthread_parkme+0x82/0x180
[   13.725666]  ? preempt_count_sub+0x50/0x80
[   13.725692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.725714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.725740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.725765]  kthread+0x337/0x6f0
[   13.725787]  ? trace_preempt_on+0x20/0xc0
[   13.725812]  ? __pfx_kthread+0x10/0x10
[   13.725834]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.725858]  ? calculate_sigpending+0x7b/0xa0
[   13.725884]  ? __pfx_kthread+0x10/0x10
[   13.725907]  ret_from_fork+0x116/0x1d0
[   13.725928]  ? __pfx_kthread+0x10/0x10
[   13.725950]  ret_from_fork_asm+0x1a/0x30
[   13.725983]  </TASK>
[   13.725996] 
[   13.735988] The buggy address belongs to the physical page:
[   13.736539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948
[   13.737356] flags: 0x200000000000000(node=0|zone=2)
[   13.737826] raw: 0200000000000000 ffffea00040e5308 ffff88815b139f80 0000000000000000
[   13.738123] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.738867] page dumped because: kasan: bad access detected
[   13.739082] 
[   13.739273] Memory state around the buggy address:
[   13.739783]  ffff888103947f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.740098]  ffff888103947f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.740739] >ffff888103948000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.741225]                    ^
[   13.741651]  ffff888103948080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.742058]  ffff888103948100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.742417] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   13.570876] ==================================================================
[   13.571687] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.572489] Write of size 1 at addr ffff888103324a78 by task kunit_try_catch/159
[   13.572742] 
[   13.572894] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.572982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.573005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.573047] Call Trace:
[   13.573072]  <TASK>
[   13.573108]  dump_stack_lvl+0x73/0xb0
[   13.573170]  print_report+0xd1/0x650
[   13.573210]  ? __virt_addr_valid+0x1db/0x2d0
[   13.573251]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.573293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.573368]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.573415]  kasan_report+0x141/0x180
[   13.573467]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.573524]  __asan_report_store1_noabort+0x1b/0x30
[   13.573569]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   13.573618]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   13.573669]  ? __schedule+0x10cc/0x2b60
[   13.573721]  ? __pfx_read_tsc+0x10/0x10
[   13.573769]  ? ktime_get_ts64+0x86/0x230
[   13.573824]  kunit_try_run_case+0x1a5/0x480
[   13.573871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.573962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.574023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.574067]  ? __kthread_parkme+0x82/0x180
[   13.574110]  ? preempt_count_sub+0x50/0x80
[   13.574159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.574302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.574349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.574408]  kthread+0x337/0x6f0
[   13.574448]  ? trace_preempt_on+0x20/0xc0
[   13.574499]  ? __pfx_kthread+0x10/0x10
[   13.574536]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.574584]  ? calculate_sigpending+0x7b/0xa0
[   13.574635]  ? __pfx_kthread+0x10/0x10
[   13.574711]  ret_from_fork+0x116/0x1d0
[   13.574760]  ? __pfx_kthread+0x10/0x10
[   13.574809]  ret_from_fork_asm+0x1a/0x30
[   13.574882]  </TASK>
[   13.574910] 
[   13.592034] Allocated by task 159:
[   13.592412]  kasan_save_stack+0x45/0x70
[   13.592939]  kasan_save_track+0x18/0x40
[   13.593351]  kasan_save_alloc_info+0x3b/0x50
[   13.593664]  __kasan_kmalloc+0xb7/0xc0
[   13.594042]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.594492]  kmalloc_track_caller_oob_right+0x99/0x520
[   13.595043]  kunit_try_run_case+0x1a5/0x480
[   13.595497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.595984]  kthread+0x337/0x6f0
[   13.596319]  ret_from_fork+0x116/0x1d0
[   13.596599]  ret_from_fork_asm+0x1a/0x30
[   13.596996] 
[   13.597198] The buggy address belongs to the object at ffff888103324a00
[   13.597198]  which belongs to the cache kmalloc-128 of size 128
[   13.598064] The buggy address is located 0 bytes to the right of
[   13.598064]  allocated 120-byte region [ffff888103324a00, ffff888103324a78)
[   13.598598] 
[   13.598789] The buggy address belongs to the physical page:
[   13.599352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   13.600080] flags: 0x200000000000000(node=0|zone=2)
[   13.600397] page_type: f5(slab)
[   13.600800] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.601289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.601791] page dumped because: kasan: bad access detected
[   13.602279] 
[   13.602407] Memory state around the buggy address:
[   13.602657]  ffff888103324900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.603251]  ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.603995] >ffff888103324a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.604583]                                                                 ^
[   13.605034]  ffff888103324a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.605366]  ffff888103324b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.606107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   13.526273] ==================================================================
[   13.526887] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   13.527125] Read of size 1 at addr ffff8881038d1000 by task kunit_try_catch/157
[   13.527635] 
[   13.528316] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.528403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.528422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.528450] Call Trace:
[   13.528480]  <TASK>
[   13.528509]  dump_stack_lvl+0x73/0xb0
[   13.528553]  print_report+0xd1/0x650
[   13.528580]  ? __virt_addr_valid+0x1db/0x2d0
[   13.528609]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.528635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.528660]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.528686]  kasan_report+0x141/0x180
[   13.528710]  ? kmalloc_node_oob_right+0x369/0x3c0
[   13.528741]  __asan_report_load1_noabort+0x18/0x20
[   13.529147]  kmalloc_node_oob_right+0x369/0x3c0
[   13.529178]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   13.529207]  ? __schedule+0x10cc/0x2b60
[   13.529422]  ? __pfx_read_tsc+0x10/0x10
[   13.529520]  ? ktime_get_ts64+0x86/0x230
[   13.529553]  kunit_try_run_case+0x1a5/0x480
[   13.529583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.529604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.529632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.529660]  ? __kthread_parkme+0x82/0x180
[   13.529687]  ? preempt_count_sub+0x50/0x80
[   13.529877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.529905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.529934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.529962]  kthread+0x337/0x6f0
[   13.529985]  ? trace_preempt_on+0x20/0xc0
[   13.530012]  ? __pfx_kthread+0x10/0x10
[   13.530035]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.530061]  ? calculate_sigpending+0x7b/0xa0
[   13.530089]  ? __pfx_kthread+0x10/0x10
[   13.530113]  ret_from_fork+0x116/0x1d0
[   13.530135]  ? __pfx_kthread+0x10/0x10
[   13.530158]  ret_from_fork_asm+0x1a/0x30
[   13.530195]  </TASK>
[   13.530218] 
[   13.545598] Allocated by task 157:
[   13.546151]  kasan_save_stack+0x45/0x70
[   13.546626]  kasan_save_track+0x18/0x40
[   13.547091]  kasan_save_alloc_info+0x3b/0x50
[   13.547398]  __kasan_kmalloc+0xb7/0xc0
[   13.548115]  __kmalloc_cache_node_noprof+0x188/0x420
[   13.548638]  kmalloc_node_oob_right+0xab/0x3c0
[   13.549139]  kunit_try_run_case+0x1a5/0x480
[   13.549992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.550375]  kthread+0x337/0x6f0
[   13.550836]  ret_from_fork+0x116/0x1d0
[   13.551125]  ret_from_fork_asm+0x1a/0x30
[   13.551596] 
[   13.551842] The buggy address belongs to the object at ffff8881038d0000
[   13.551842]  which belongs to the cache kmalloc-4k of size 4096
[   13.552926] The buggy address is located 0 bytes to the right of
[   13.552926]  allocated 4096-byte region [ffff8881038d0000, ffff8881038d1000)
[   13.553821] 
[   13.554188] The buggy address belongs to the physical page:
[   13.555068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d0
[   13.555865] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.556525] flags: 0x200000000000040(head|node=0|zone=2)
[   13.557133] page_type: f5(slab)
[   13.557321] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   13.557886] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   13.558620] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   13.559143] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   13.560118] head: 0200000000000003 ffffea00040e3401 00000000ffffffff 00000000ffffffff
[   13.560614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   13.561376] page dumped because: kasan: bad access detected
[   13.561917] 
[   13.562051] Memory state around the buggy address:
[   13.562513]  ffff8881038d0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.562979]  ffff8881038d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.563385] >ffff8881038d1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.563935]                    ^
[   13.564207]  ffff8881038d1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.564745]  ffff8881038d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.565345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure Automatically assigned
[   13.492406] ==================================================================
[   13.493114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   13.493347] Read of size 1 at addr ffff888101c205df by task kunit_try_catch/155
[   13.493524] 
[   13.493769] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.494012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.494036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.494062] Call Trace:
[   13.494081]  <TASK>
[   13.494106]  dump_stack_lvl+0x73/0xb0
[   13.494144]  print_report+0xd1/0x650
[   13.494169]  ? __virt_addr_valid+0x1db/0x2d0
[   13.494196]  ? kmalloc_oob_left+0x361/0x3c0
[   13.494231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.494255]  ? kmalloc_oob_left+0x361/0x3c0
[   13.494277]  kasan_report+0x141/0x180
[   13.494300]  ? kmalloc_oob_left+0x361/0x3c0
[   13.494380]  __asan_report_load1_noabort+0x18/0x20
[   13.494434]  kmalloc_oob_left+0x361/0x3c0
[   13.494501]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   13.494538]  ? __schedule+0x10cc/0x2b60
[   13.494581]  ? __pfx_read_tsc+0x10/0x10
[   13.494606]  ? ktime_get_ts64+0x86/0x230
[   13.494634]  kunit_try_run_case+0x1a5/0x480
[   13.494660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.494752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.494786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.494812]  ? __kthread_parkme+0x82/0x180
[   13.494835]  ? preempt_count_sub+0x50/0x80
[   13.494862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.494884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.494947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.494973]  kthread+0x337/0x6f0
[   13.495009]  ? trace_preempt_on+0x20/0xc0
[   13.495036]  ? __pfx_kthread+0x10/0x10
[   13.495089]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.495113]  ? calculate_sigpending+0x7b/0xa0
[   13.495159]  ? __pfx_kthread+0x10/0x10
[   13.495183]  ret_from_fork+0x116/0x1d0
[   13.495222]  ? __pfx_kthread+0x10/0x10
[   13.495267]  ret_from_fork_asm+0x1a/0x30
[   13.495302]  </TASK>
[   13.495316] 
[   13.505578] Allocated by task 25:
[   13.506022]  kasan_save_stack+0x45/0x70
[   13.506363]  kasan_save_track+0x18/0x40
[   13.506652]  kasan_save_alloc_info+0x3b/0x50
[   13.507372]  __kasan_kmalloc+0xb7/0xc0
[   13.507674]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   13.508057]  kvasprintf+0xc5/0x150
[   13.508188]  __kthread_create_on_node+0x18b/0x3a0
[   13.508606]  kthread_create_on_node+0xab/0xe0
[   13.509028]  create_worker+0x3e5/0x7b0
[   13.509282]  worker_thread+0x992/0x1220
[   13.509538]  kthread+0x337/0x6f0
[   13.510093]  ret_from_fork+0x116/0x1d0
[   13.510428]  ret_from_fork_asm+0x1a/0x30
[   13.510604] 
[   13.510784] The buggy address belongs to the object at ffff888101c205c0
[   13.510784]  which belongs to the cache kmalloc-16 of size 16
[   13.511376] The buggy address is located 18 bytes to the right of
[   13.511376]  allocated 13-byte region [ffff888101c205c0, ffff888101c205cd)
[   13.512871] 
[   13.513042] The buggy address belongs to the physical page:
[   13.513845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20
[   13.514700] flags: 0x200000000000000(node=0|zone=2)
[   13.515202] page_type: f5(slab)
[   13.515484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.515690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.516126] page dumped because: kasan: bad access detected
[   13.516556] 
[   13.516914] Memory state around the buggy address:
[   13.517503]  ffff888101c20480: 00 01 fc fc fa fb fc fc 00 01 fc fc 00 01 fc fc
[   13.517917]  ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.518567] >ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc 00 07 fc fc
[   13.519479]                                                     ^
[   13.519856]  ffff888101c20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.520173]  ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.520603] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   13.436590] ==================================================================
[   13.437447] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   13.437883] Write of size 1 at addr ffff888103324978 by task kunit_try_catch/153
[   13.438379] 
[   13.438507] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.438567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.438582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.438607] Call Trace:
[   13.438632]  <TASK>
[   13.438657]  dump_stack_lvl+0x73/0xb0
[   13.438692]  print_report+0xd1/0x650
[   13.438717]  ? __virt_addr_valid+0x1db/0x2d0
[   13.438744]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.438768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.438792]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.438817]  kasan_report+0x141/0x180
[   13.438842]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.438870]  __asan_report_store1_noabort+0x1b/0x30
[   13.438895]  kmalloc_oob_right+0x6bd/0x7f0
[   13.438920]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.438945]  ? __schedule+0x10cc/0x2b60
[   13.438973]  ? __pfx_read_tsc+0x10/0x10
[   13.438997]  ? ktime_get_ts64+0x86/0x230
[   13.439026]  kunit_try_run_case+0x1a5/0x480
[   13.439051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.439073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.439099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.439125]  ? __kthread_parkme+0x82/0x180
[   13.439148]  ? preempt_count_sub+0x50/0x80
[   13.439174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.439197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.439230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.439268]  kthread+0x337/0x6f0
[   13.439291]  ? trace_preempt_on+0x20/0xc0
[   13.439368]  ? __pfx_kthread+0x10/0x10
[   13.439398]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.439425]  ? calculate_sigpending+0x7b/0xa0
[   13.439452]  ? __pfx_kthread+0x10/0x10
[   13.439489]  ret_from_fork+0x116/0x1d0
[   13.439511]  ? __pfx_kthread+0x10/0x10
[   13.439534]  ret_from_fork_asm+0x1a/0x30
[   13.439570]  </TASK>
[   13.439584] 
[   13.449697] Allocated by task 153:
[   13.450066]  kasan_save_stack+0x45/0x70
[   13.450340]  kasan_save_track+0x18/0x40
[   13.450562]  kasan_save_alloc_info+0x3b/0x50
[   13.450755]  __kasan_kmalloc+0xb7/0xc0
[   13.450969]  __kmalloc_cache_noprof+0x189/0x420
[   13.451116]  kmalloc_oob_right+0xa9/0x7f0
[   13.451269]  kunit_try_run_case+0x1a5/0x480
[   13.451536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.452189]  kthread+0x337/0x6f0
[   13.452386]  ret_from_fork+0x116/0x1d0
[   13.452570]  ret_from_fork_asm+0x1a/0x30
[   13.452882] 
[   13.453004] The buggy address belongs to the object at ffff888103324900
[   13.453004]  which belongs to the cache kmalloc-128 of size 128
[   13.453667] The buggy address is located 5 bytes to the right of
[   13.453667]  allocated 115-byte region [ffff888103324900, ffff888103324973)
[   13.454357] 
[   13.454428] The buggy address belongs to the physical page:
[   13.454656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   13.455100] flags: 0x200000000000000(node=0|zone=2)
[   13.455359] page_type: f5(slab)
[   13.455490] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.456272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.456652] page dumped because: kasan: bad access detected
[   13.456853] 
[   13.457000] Memory state around the buggy address:
[   13.457237]  ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.457594]  ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.457878] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.458063]                                                                 ^
[   13.458368]  ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.458948]  ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.459396] ==================================================================
[   13.402228] ==================================================================
[   13.402923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.403961] Write of size 1 at addr ffff888103324973 by task kunit_try_catch/153
[   13.404257] 
[   13.405598] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.406470] Tainted: [N]=TEST
[   13.406536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.406927] Call Trace:
[   13.407065]  <TASK>
[   13.407291]  dump_stack_lvl+0x73/0xb0
[   13.407432]  print_report+0xd1/0x650
[   13.407484]  ? __virt_addr_valid+0x1db/0x2d0
[   13.407519]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.407543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.407567]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.407590]  kasan_report+0x141/0x180
[   13.407614]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.407641]  __asan_report_store1_noabort+0x1b/0x30
[   13.407664]  kmalloc_oob_right+0x6f0/0x7f0
[   13.407688]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.407712]  ? __schedule+0x10cc/0x2b60
[   13.407737]  ? __pfx_read_tsc+0x10/0x10
[   13.407762]  ? ktime_get_ts64+0x86/0x230
[   13.407796]  kunit_try_run_case+0x1a5/0x480
[   13.407831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.407852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.407880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.407905]  ? __kthread_parkme+0x82/0x180
[   13.407930]  ? preempt_count_sub+0x50/0x80
[   13.407956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.407979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.408004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.408030]  kthread+0x337/0x6f0
[   13.408051]  ? trace_preempt_on+0x20/0xc0
[   13.408077]  ? __pfx_kthread+0x10/0x10
[   13.408099]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.408122]  ? calculate_sigpending+0x7b/0xa0
[   13.408148]  ? __pfx_kthread+0x10/0x10
[   13.408171]  ret_from_fork+0x116/0x1d0
[   13.408192]  ? __pfx_kthread+0x10/0x10
[   13.408214]  ret_from_fork_asm+0x1a/0x30
[   13.408279]  </TASK>
[   13.408365] 
[   13.420946] Allocated by task 153:
[   13.421296]  kasan_save_stack+0x45/0x70
[   13.421658]  kasan_save_track+0x18/0x40
[   13.421926]  kasan_save_alloc_info+0x3b/0x50
[   13.422247]  __kasan_kmalloc+0xb7/0xc0
[   13.422551]  __kmalloc_cache_noprof+0x189/0x420
[   13.423048]  kmalloc_oob_right+0xa9/0x7f0
[   13.424021]  kunit_try_run_case+0x1a5/0x480
[   13.424390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.424777]  kthread+0x337/0x6f0
[   13.425062]  ret_from_fork+0x116/0x1d0
[   13.425303]  ret_from_fork_asm+0x1a/0x30
[   13.425637] 
[   13.426685] The buggy address belongs to the object at ffff888103324900
[   13.426685]  which belongs to the cache kmalloc-128 of size 128
[   13.427255] The buggy address is located 0 bytes to the right of
[   13.427255]  allocated 115-byte region [ffff888103324900, ffff888103324973)
[   13.427807] 
[   13.428033] The buggy address belongs to the physical page:
[   13.428595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   13.429323] flags: 0x200000000000000(node=0|zone=2)
[   13.430095] page_type: f5(slab)
[   13.430719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.431166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.431612] page dumped because: kasan: bad access detected
[   13.431805] 
[   13.431975] Memory state around the buggy address:
[   13.432499]  ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.432909]  ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.433671] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.434000]                                                              ^
[   13.434211]  ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.434359]  ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435199] ==================================================================
[   13.460302] ==================================================================
[   13.460647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   13.461068] Read of size 1 at addr ffff888103324980 by task kunit_try_catch/153
[   13.461420] 
[   13.461572] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   13.461630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.461644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.461671] Call Trace:
[   13.461858]  <TASK>
[   13.461889]  dump_stack_lvl+0x73/0xb0
[   13.461926]  print_report+0xd1/0x650
[   13.461953]  ? __virt_addr_valid+0x1db/0x2d0
[   13.461982]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.462005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.462028]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.462052]  kasan_report+0x141/0x180
[   13.462076]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.462105]  __asan_report_load1_noabort+0x18/0x20
[   13.462128]  kmalloc_oob_right+0x68a/0x7f0
[   13.462152]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.462178]  ? __schedule+0x10cc/0x2b60
[   13.462207]  ? __pfx_read_tsc+0x10/0x10
[   13.462234]  ? ktime_get_ts64+0x86/0x230
[   13.462262]  kunit_try_run_case+0x1a5/0x480
[   13.462286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.462307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.462354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.462382]  ? __kthread_parkme+0x82/0x180
[   13.462405]  ? preempt_count_sub+0x50/0x80
[   13.462433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.462464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.462495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.462522]  kthread+0x337/0x6f0
[   13.462543]  ? trace_preempt_on+0x20/0xc0
[   13.462570]  ? __pfx_kthread+0x10/0x10
[   13.462592]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.462616]  ? calculate_sigpending+0x7b/0xa0
[   13.462644]  ? __pfx_kthread+0x10/0x10
[   13.462667]  ret_from_fork+0x116/0x1d0
[   13.462703]  ? __pfx_kthread+0x10/0x10
[   13.462727]  ret_from_fork_asm+0x1a/0x30
[   13.462766]  </TASK>
[   13.462780] 
[   13.474662] Allocated by task 153:
[   13.475038]  kasan_save_stack+0x45/0x70
[   13.475435]  kasan_save_track+0x18/0x40
[   13.475783]  kasan_save_alloc_info+0x3b/0x50
[   13.475970]  __kasan_kmalloc+0xb7/0xc0
[   13.476275]  __kmalloc_cache_noprof+0x189/0x420
[   13.476450]  kmalloc_oob_right+0xa9/0x7f0
[   13.476877]  kunit_try_run_case+0x1a5/0x480
[   13.477185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.477492]  kthread+0x337/0x6f0
[   13.477627]  ret_from_fork+0x116/0x1d0
[   13.478196]  ret_from_fork_asm+0x1a/0x30
[   13.478598] 
[   13.478975] The buggy address belongs to the object at ffff888103324900
[   13.478975]  which belongs to the cache kmalloc-128 of size 128
[   13.479493] The buggy address is located 13 bytes to the right of
[   13.479493]  allocated 115-byte region [ffff888103324900, ffff888103324973)
[   13.480252] 
[   13.480325] The buggy address belongs to the physical page:
[   13.480449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   13.481138] flags: 0x200000000000000(node=0|zone=2)
[   13.481381] page_type: f5(slab)
[   13.481614] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.482535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.483023] page dumped because: kasan: bad access detected
[   13.483301] 
[   13.483543] Memory state around the buggy address:
[   13.483791]  ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.484260]  ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.484469] >ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.485073]                    ^
[   13.485325]  ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.485688]  ffff888103324a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.485972] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale: Failure Automatically assigned
------------[ cut here ]------------
[  169.954673] WARNING: CPU: 0 PID: 2817 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  169.955568] Modules linked in:
[  169.956931] CPU: 0 UID: 0 PID: 2817 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  169.957487] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  169.957817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  169.958260] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  169.959036] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 90 aa 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  169.960049] RSP: 0000:ffff888108f67c78 EFLAGS: 00010286
[  169.960305] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  169.961242] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8d43cb9c
[  169.961534] RBP: ffff888108f67ca0 R08: 0000000000000000 R09: ffffed1020c489e0
[  169.962198] R10: ffff888106244f07 R11: 0000000000000000 R12: ffffffff8d43cb88
[  169.962456] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f67d38
[  169.963181] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  169.964237] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  169.964439] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  169.964652] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  169.965150] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  169.965538] Call Trace:
[  169.965678]  <TASK>
[  169.965860]  drm_test_rect_calc_vscale+0x108/0x270
[  169.966242]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  169.967461]  ? __schedule+0x10cc/0x2b60
[  169.967878]  ? __pfx_read_tsc+0x10/0x10
[  169.968550]  ? ktime_get_ts64+0x86/0x230
[  169.968993]  kunit_try_run_case+0x1a5/0x480
[  169.969206]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.969564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  169.970173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  169.970616]  ? __kthread_parkme+0x82/0x180
[  169.971111]  ? preempt_count_sub+0x50/0x80
[  169.971464]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.972052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  169.972356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  169.972924]  kthread+0x337/0x6f0
[  169.973365]  ? trace_preempt_on+0x20/0xc0
[  169.973641]  ? __pfx_kthread+0x10/0x10
[  169.974131]  ? _raw_spin_unlock_irq+0x47/0x80
[  169.974906]  ? calculate_sigpending+0x7b/0xa0
[  169.975246]  ? __pfx_kthread+0x10/0x10
[  169.975620]  ret_from_fork+0x116/0x1d0
[  169.976098]  ? __pfx_kthread+0x10/0x10
[  169.976490]  ret_from_fork_asm+0x1a/0x30
[  169.976949]  </TASK>
[  169.977084] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  169.983443] WARNING: CPU: 0 PID: 2819 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  169.984328] Modules linked in:
[  169.984633] CPU: 0 UID: 0 PID: 2819 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  169.985501] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  169.985872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  169.986386] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  169.986919] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 90 aa 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  169.987961] RSP: 0000:ffff888108f47c78 EFLAGS: 00010286
[  169.988350] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  169.988814] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8d43cbd4
[  169.989304] RBP: ffff888108f47ca0 R08: 0000000000000000 R09: ffffed1020f49800
[  169.989665] R10: ffff888107a4c007 R11: 0000000000000000 R12: ffffffff8d43cbc0
[  169.990266] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f47d38
[  169.990498] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  169.991635] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  169.991936] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  169.992379] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  169.992573] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  169.992928] Call Trace:
[  169.993199]  <TASK>
[  169.993469]  drm_test_rect_calc_vscale+0x108/0x270
[  169.993923]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  169.994468]  ? __schedule+0x10cc/0x2b60
[  169.994651]  ? __pfx_read_tsc+0x10/0x10
[  169.995206]  ? ktime_get_ts64+0x86/0x230
[  169.996190]  kunit_try_run_case+0x1a5/0x480
[  169.996486]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.996930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  169.997267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  169.997513]  ? __kthread_parkme+0x82/0x180
[  169.997979]  ? preempt_count_sub+0x50/0x80
[  169.998205]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.998394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  169.998593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  169.998793]  kthread+0x337/0x6f0
[  169.999597]  ? trace_preempt_on+0x20/0xc0
[  170.000193]  ? __pfx_kthread+0x10/0x10
[  170.000415]  ? _raw_spin_unlock_irq+0x47/0x80
[  170.000603]  ? calculate_sigpending+0x7b/0xa0
[  170.000784]  ? __pfx_kthread+0x10/0x10
[  170.000939]  ret_from_fork+0x116/0x1d0
[  170.001098]  ? __pfx_kthread+0x10/0x10
[  170.001257]  ret_from_fork_asm+0x1a/0x30
[  170.001444]  </TASK>
[  170.001566] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale: Failure Automatically assigned
------------[ cut here ]------------
[  169.909565] WARNING: CPU: 1 PID: 2807 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  169.911277] Modules linked in:
[  169.911580] CPU: 1 UID: 0 PID: 2807 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  169.912645] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  169.913318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  169.913516] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  169.913651] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  169.915329] RSP: 0000:ffff88810800fc78 EFLAGS: 00010286
[  169.915661] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  169.916012] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8d43cbd8
[  169.916355] RBP: ffff88810800fca0 R08: 0000000000000000 R09: ffffed1020c48940
[  169.916713] R10: ffff888106244a07 R11: 0000000000000000 R12: ffffffff8d43cbc0
[  169.917081] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810800fd38
[  169.918114] FS:  0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000
[  169.918593] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  169.919246] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  169.920052] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403
[  169.920493] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  169.921166] Call Trace:
[  169.921459]  <TASK>
[  169.921952]  drm_test_rect_calc_hscale+0x108/0x270
[  169.922231]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  169.922782]  ? __schedule+0x10cc/0x2b60
[  169.923319]  ? __pfx_read_tsc+0x10/0x10
[  169.923622]  ? ktime_get_ts64+0x86/0x230
[  169.924152]  kunit_try_run_case+0x1a5/0x480
[  169.924590]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.924810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  169.925856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  169.926225]  ? __kthread_parkme+0x82/0x180
[  169.926523]  ? preempt_count_sub+0x50/0x80
[  169.926800]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.927023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  169.927907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  169.928268]  kthread+0x337/0x6f0
[  169.929133]  ? trace_preempt_on+0x20/0xc0
[  169.929531]  ? __pfx_kthread+0x10/0x10
[  169.930062]  ? _raw_spin_unlock_irq+0x47/0x80
[  169.930492]  ? calculate_sigpending+0x7b/0xa0
[  169.930749]  ? __pfx_kthread+0x10/0x10
[  169.931447]  ret_from_fork+0x116/0x1d0
[  169.931721]  ? __pfx_kthread+0x10/0x10
[  169.932301]  ret_from_fork_asm+0x1a/0x30
[  169.932687]  </TASK>
[  169.932891] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  169.878486] WARNING: CPU: 1 PID: 2805 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  169.879880] Modules linked in:
[  169.880166] CPU: 1 UID: 0 PID: 2805 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  169.881444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  169.882031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  169.883246] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  169.883648] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  169.885081] RSP: 0000:ffff888108f9fc78 EFLAGS: 00010286
[  169.885368] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  169.886259] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8d43cba0
[  169.886667] RBP: ffff888108f9fca0 R08: 0000000000000000 R09: ffffed1020c48900
[  169.887512] R10: ffff888106244807 R11: 0000000000000000 R12: ffffffff8d43cb88
[  169.888055] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f9fd38
[  169.888360] FS:  0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000
[  169.889340] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  169.889863] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  169.890215] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403
[  169.891034] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  169.891528] Call Trace:
[  169.892377]  <TASK>
[  169.892583]  drm_test_rect_calc_hscale+0x108/0x270
[  169.892806]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  169.893622]  ? __schedule+0x10cc/0x2b60
[  169.894097]  ? __pfx_read_tsc+0x10/0x10
[  169.894316]  ? ktime_get_ts64+0x86/0x230
[  169.894663]  kunit_try_run_case+0x1a5/0x480
[  169.895260]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.895619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  169.896189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  169.896439]  ? __kthread_parkme+0x82/0x180
[  169.896997]  ? preempt_count_sub+0x50/0x80
[  169.897435]  ? __pfx_kunit_try_run_case+0x10/0x10
[  169.897836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  169.898287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  169.898922]  kthread+0x337/0x6f0
[  169.899190]  ? trace_preempt_on+0x20/0xc0
[  169.900341]  ? __pfx_kthread+0x10/0x10
[  169.900706]  ? _raw_spin_unlock_irq+0x47/0x80
[  169.901074]  ? calculate_sigpending+0x7b/0xa0
[  169.901455]  ? __pfx_kthread+0x10/0x10
[  169.901761]  ret_from_fork+0x116/0x1d0
[  169.902415]  ? __pfx_kthread+0x10/0x10
[  169.903162]  ret_from_fork_asm+0x1a/0x30
[  169.903614]  </TASK>
[  169.903843] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count: Failure Automatically assigned
------------[ cut here ]------------
[  168.887726] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count))
[  168.887910] WARNING: CPU: 0 PID: 2622 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x3ed/0x6c0
[  168.890273] Modules linked in:
[  168.890717] CPU: 0 UID: 0 PID: 2622 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  168.891647] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  168.892138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  168.892694] RIP: 0010:drm_gem_shmem_free+0x3ed/0x6c0
[  168.893594] Code: 85 f6 0f 84 ba 01 00 00 4c 89 e7 e8 9d 27 80 00 48 c7 c1 80 1a 3f 8d 4c 89 f2 48 c7 c7 40 17 3f 8d 48 89 c6 e8 94 c1 73 fe 90 <0f> 0b 90 90 e9 09 ff ff ff 90 48 b8 00 00 00 00 00 fc ff df 48 8d
[  168.895039] RSP: 0000:ffff88810159fd18 EFLAGS: 00010286
[  168.895319] RAX: 0000000000000000 RBX: ffff888102502400 RCX: 1ffffffff1c24c5c
[  168.896498] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[  168.897179] RBP: ffff88810159fd48 R08: 0000000000000000 R09: fffffbfff1c24c5c
[  168.897669] R10: 0000000000000003 R11: 0000000000039408 R12: ffff888103a04000
[  168.898028] R13: ffff8881025024f8 R14: ffff888107aa9200 R15: ffff8881003c7b40
[  168.898292] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  168.898564] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  168.898897] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  168.899381] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  168.900088] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  168.900882] Call Trace:
[  168.901168]  <TASK>
[  168.901441]  ? trace_preempt_on+0x20/0xc0
[  168.901847]  ? __pfx_drm_gem_shmem_free_wrapper+0x10/0x10
[  168.902236]  drm_gem_shmem_free_wrapper+0x12/0x20
[  168.902541]  __kunit_action_free+0x57/0x70
[  168.902911]  kunit_remove_resource+0x133/0x200
[  168.903313]  ? preempt_count_sub+0x50/0x80
[  168.903706]  kunit_cleanup+0x7a/0x120
[  168.904013]  kunit_try_run_case_cleanup+0xbd/0xf0
[  168.904220]  ? __pfx_kunit_try_run_case_cleanup+0x10/0x10
[  168.904788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  168.905266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  168.905622]  kthread+0x337/0x6f0
[  168.906052]  ? trace_preempt_on+0x20/0xc0
[  168.906453]  ? __pfx_kthread+0x10/0x10
[  168.906876]  ? _raw_spin_unlock_irq+0x47/0x80
[  168.907319]  ? calculate_sigpending+0x7b/0xa0
[  168.907850]  ? __pfx_kthread+0x10/0x10
[  168.908078]  ret_from_fork+0x116/0x1d0
[  168.908426]  ? __pfx_kthread+0x10/0x10
[  168.908814]  ret_from_fork_asm+0x1a/0x30
[  168.909073]  </TASK>
[  168.909321] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init: Failure Automatically assigned
------------[ cut here ]------------
[  168.681233] WARNING: CPU: 0 PID: 2603 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300
[  168.681826] Modules linked in:
[  168.682197] CPU: 0 UID: 0 PID: 2603 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  168.683012] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  168.683512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  168.684267] RIP: 0010:drm_framebuffer_init+0x44/0x300
[  168.684665] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41
[  168.687008] RSP: 0000:ffff88810159fb30 EFLAGS: 00010246
[  168.687309] RAX: dffffc0000000000 RBX: ffff88810159fc28 RCX: 0000000000000000
[  168.687565] RDX: 1ffff110202b3f8e RSI: ffff88810159fc28 RDI: ffff88810159fc70
[  168.687796] RBP: ffff88810159fb70 R08: ffff888103a77000 R09: ffffffff8d3e1da0
[  168.688028] R10: 0000000000000003 R11: 00000000169a8e6a R12: ffff888103a77000
[  168.690358] R13: ffff8881003c7ae8 R14: ffff88810159fba8 R15: 0000000000000000
[  168.690836] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  168.691126] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  168.691362] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  168.691623] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  168.694021] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  168.694293] Call Trace:
[  168.694999]  <TASK>
[  168.695257]  ? add_dr+0xc1/0x1d0
[  168.695587]  drm_test_framebuffer_init_bad_format+0xfc/0x240
[  168.695812]  ? add_dr+0x148/0x1d0
[  168.695972]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  168.697008]  ? __drmm_add_action+0x1a4/0x280
[  168.697428]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  168.697687]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  168.699012]  ? __drmm_add_action_or_reset+0x22/0x50
[  168.699293]  ? __schedule+0x10cc/0x2b60
[  168.700541]  ? __pfx_read_tsc+0x10/0x10
[  168.701655]  ? ktime_get_ts64+0x86/0x230
[  168.702062]  kunit_try_run_case+0x1a5/0x480
[  168.703440]  ? __pfx_kunit_try_run_case+0x10/0x10
[  168.703816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  168.704153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  168.704554]  ? __kthread_parkme+0x82/0x180
[  168.704892]  ? preempt_count_sub+0x50/0x80
[  168.705472]  ? __pfx_kunit_try_run_case+0x10/0x10
[  168.706203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  168.706995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  168.707533]  kthread+0x337/0x6f0
[  168.708298]  ? trace_preempt_on+0x20/0xc0
[  168.708685]  ? __pfx_kthread+0x10/0x10
[  168.709492]  ? _raw_spin_unlock_irq+0x47/0x80
[  168.710205]  ? calculate_sigpending+0x7b/0xa0
[  168.710525]  ? __pfx_kthread+0x10/0x10
[  168.711104]  ret_from_fork+0x116/0x1d0
[  168.711423]  ? __pfx_kthread+0x10/0x10
[  168.711811]  ret_from_fork_asm+0x1a/0x30
[  168.712236]  </TASK>
[  168.712489] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head: Failure Automatically assigned
------------[ cut here ]------------
[  168.631602] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head))
[  168.632437] WARNING: CPU: 0 PID: 2599 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0
[  168.634528] Modules linked in:
[  168.635103] CPU: 0 UID: 0 PID: 2599 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  168.635773] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  168.636368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  168.637039] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0
[  168.637342] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 cb 41 87 00 48 c7 c1 60 cd 3d 8d 4c 89 fa 48 c7 c7 c0 cd 3d 8d 48 89 c6 e8 c2 db 7a fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea
[  168.638187] RSP: 0000:ffff8881011efb68 EFLAGS: 00010282
[  168.638908] RAX: 0000000000000000 RBX: ffff8881011efc40 RCX: 1ffffffff1c24c5c
[  168.639375] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[  168.640155] RBP: ffff8881011efb90 R08: 0000000000000000 R09: fffffbfff1c24c5c
[  168.640553] R10: 0000000000000003 R11: 0000000000037ad0 R12: ffff8881011efc18
[  168.641205] R13: ffff888100f73000 R14: ffff888103a73000 R15: ffff888106586a00
[  168.641885] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  168.642362] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  168.642895] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  168.643245] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  168.643499] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  168.644306] Call Trace:
[  168.644529]  <TASK>
[  168.644908]  drm_test_framebuffer_free+0x1ab/0x610
[  168.645409]  ? __pfx_drm_test_framebuffer_free+0x10/0x10
[  168.645818]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  168.646322]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  168.646675]  ? __drmm_add_action_or_reset+0x22/0x50
[  168.647133]  ? __schedule+0x10cc/0x2b60
[  168.647596]  ? __pfx_read_tsc+0x10/0x10
[  168.647888]  ? ktime_get_ts64+0x86/0x230
[  168.648646]  kunit_try_run_case+0x1a5/0x480
[  168.649146]  ? __pfx_kunit_try_run_case+0x10/0x10
[  168.649351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  168.649602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  168.650580]  ? __kthread_parkme+0x82/0x180
[  168.651014]  ? preempt_count_sub+0x50/0x80
[  168.651492]  ? __pfx_kunit_try_run_case+0x10/0x10
[  168.651716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  168.652311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  168.652678]  kthread+0x337/0x6f0
[  168.653037]  ? trace_preempt_on+0x20/0xc0
[  168.654181]  ? __pfx_kthread+0x10/0x10
[  168.654471]  ? _raw_spin_unlock_irq+0x47/0x80
[  168.654810]  ? calculate_sigpending+0x7b/0xa0
[  168.655418]  ? __pfx_kthread+0x10/0x10
[  168.655676]  ret_from_fork+0x116/0x1d0
[  168.656120]  ? __pfx_kthread+0x10/0x10
[  168.656452]  ret_from_fork_asm+0x1a/0x30
[  168.657051]  </TASK>
[  168.657307] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register: Failure Automatically assigned
------------[ cut here ]------------
[  166.601547] WARNING: CPU: 0 PID: 2029 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  166.602339] Modules linked in:
[  166.602602] CPU: 0 UID: 0 PID: 2029 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  166.604960] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  166.605424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  166.605745] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  166.606508] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d e9 82 f5 25 02 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68
[  166.607608] RSP: 0000:ffff888102c87c90 EFLAGS: 00010246
[  166.608188] RAX: dffffc0000000000 RBX: ffff8881027f4000 RCX: 0000000000000000
[  166.608576] RDX: 1ffff110204fe832 RSI: ffffffff8a643b58 RDI: ffff8881027f4190
[  166.609116] RBP: ffff888102c87ca0 R08: 1ffff11020078f69 R09: ffffed1020590f65
[  166.609516] R10: 0000000000000003 R11: ffffffff89b87518 R12: 0000000000000000
[  166.609875] R13: ffff888102c87d38 R14: ffff8881003c7c50 R15: ffff8881003c7c58
[  166.610216] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  166.610834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  166.611196] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  166.611505] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  166.612192] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  166.612857] Call Trace:
[  166.613161]  <TASK>
[  166.613387]  drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290
[  166.614020]  ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10
[  166.614646]  ? __schedule+0x10cc/0x2b60
[  166.615206]  ? __pfx_read_tsc+0x10/0x10
[  166.615490]  ? ktime_get_ts64+0x86/0x230
[  166.616008]  kunit_try_run_case+0x1a5/0x480
[  166.616347]  ? __pfx_kunit_try_run_case+0x10/0x10
[  166.616630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  166.617164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  166.617555]  ? __kthread_parkme+0x82/0x180
[  166.617931]  ? preempt_count_sub+0x50/0x80
[  166.618350]  ? __pfx_kunit_try_run_case+0x10/0x10
[  166.618628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  166.619294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  166.619637]  kthread+0x337/0x6f0
[  166.620178]  ? trace_preempt_on+0x20/0xc0
[  166.620533]  ? __pfx_kthread+0x10/0x10
[  166.621163]  ? _raw_spin_unlock_irq+0x47/0x80
[  166.621512]  ? calculate_sigpending+0x7b/0xa0
[  166.621967]  ? __pfx_kthread+0x10/0x10
[  166.622368]  ret_from_fork+0x116/0x1d0
[  166.622630]  ? __pfx_kthread+0x10/0x10
[  166.623128]  ret_from_fork_asm+0x1a/0x30
[  166.623431]  </TASK>
[  166.623674] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  166.712937] WARNING: CPU: 1 PID: 2037 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  166.713969] Modules linked in:
[  166.714231] CPU: 1 UID: 0 PID: 2037 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  166.715257] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  166.715603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  166.716320] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  166.716671] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d e9 82 f5 25 02 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68
[  166.717885] RSP: 0000:ffff888102c7fc90 EFLAGS: 00010246
[  166.718305] RAX: dffffc0000000000 RBX: ffff888102e10000 RCX: 0000000000000000
[  166.718921] RDX: 1ffff110205c2032 RSI: ffffffff8a643b58 RDI: ffff888102e10190
[  166.719365] RBP: ffff888102c7fca0 R08: 1ffff11020078f69 R09: ffffed102058ff65
[  166.720058] R10: 0000000000000003 R11: ffffffff89b87518 R12: 0000000000000000
[  166.720365] R13: ffff888102c7fd38 R14: ffff8881003c7c50 R15: ffff8881003c7c58
[  166.721098] FS:  0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000
[  166.721391] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  166.721963] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  166.722337] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403
[  166.722761] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  166.723539] Call Trace:
[  166.723980]  <TASK>
[  166.724220]  drm_test_drm_connector_dynamic_register_no_init+0x104/0x290
[  166.724614]  ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10
[  166.724935]  ? __schedule+0x10cc/0x2b60
[  166.725192]  ? __pfx_read_tsc+0x10/0x10
[  166.725674]  ? ktime_get_ts64+0x86/0x230
[  166.726179]  kunit_try_run_case+0x1a5/0x480
[  166.726600]  ? __pfx_kunit_try_run_case+0x10/0x10
[  166.727155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  166.727436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  166.728015]  ? __kthread_parkme+0x82/0x180
[  166.728446]  ? preempt_count_sub+0x50/0x80
[  166.728916]  ? __pfx_kunit_try_run_case+0x10/0x10
[  166.729358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  166.729893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  166.730292]  kthread+0x337/0x6f0
[  166.730611]  ? trace_preempt_on+0x20/0xc0
[  166.731126]  ? __pfx_kthread+0x10/0x10
[  166.731463]  ? _raw_spin_unlock_irq+0x47/0x80
[  166.731853]  ? calculate_sigpending+0x7b/0xa0
[  166.732288]  ? __pfx_kthread+0x10/0x10
[  166.732532]  ret_from_fork+0x116/0x1d0
[  166.733017]  ? __pfx_kthread+0x10/0x10
[  166.733279]  ret_from_fork_asm+0x1a/0x30
[  166.733632]  </TASK>
[  166.733954] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure Automatically assigned
------------[ cut here ]------------
[  124.860963] WARNING: CPU: 1 PID: 721 at lib/math/int_log.c:120 intlog10+0x2a/0x40
[  124.861900] Modules linked in:
[  124.862185] CPU: 1 UID: 0 PID: 721 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  124.863972] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  124.864660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  124.865530] RIP: 0010:intlog10+0x2a/0x40
[  124.866849] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90
[  124.867668] RSP: 0000:ffff8881088b7cb0 EFLAGS: 00010246
[  124.868945] RAX: 0000000000000000 RBX: ffff8881003c7ae8 RCX: 1ffff11021116fb4
[  124.869478] RDX: 1ffffffff1a53dfc RSI: 1ffff11021116fb3 RDI: 0000000000000000
[  124.869876] RBP: ffff8881088b7d60 R08: 0000000000000000 R09: ffffed10210e5a00
[  124.870094] R10: ffff88810872d007 R11: 0000000000000000 R12: 1ffff11021116f97
[  124.870229] R13: ffffffff8d29efe0 R14: 0000000000000000 R15: ffff8881088b7d38
[  124.870356] FS:  0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000
[  124.870834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  124.871178] CR2: ffff88815a942000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  124.871534] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403
[  124.872038] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  124.872535] Call Trace:
[  124.872927]  <TASK>
[  124.873054]  ? intlog10_test+0xf2/0x220
[  124.873328]  ? __pfx_intlog10_test+0x10/0x10
[  124.873497]  ? __schedule+0x10cc/0x2b60
[  124.873623]  ? __pfx_read_tsc+0x10/0x10
[  124.873764]  ? ktime_get_ts64+0x86/0x230
[  124.873885]  kunit_try_run_case+0x1a5/0x480
[  124.874000]  ? __pfx_kunit_try_run_case+0x10/0x10
[  124.874112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  124.874549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  124.874810]  ? __kthread_parkme+0x82/0x180
[  124.875052]  ? preempt_count_sub+0x50/0x80
[  124.875794]  ? __pfx_kunit_try_run_case+0x10/0x10
[  124.876374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  124.876847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  124.877283]  kthread+0x337/0x6f0
[  124.877461]  ? trace_preempt_on+0x20/0xc0
[  124.877609]  ? __pfx_kthread+0x10/0x10
[  124.877845]  ? _raw_spin_unlock_irq+0x47/0x80
[  124.878423]  ? calculate_sigpending+0x7b/0xa0
[  124.878997]  ? __pfx_kthread+0x10/0x10
[  124.879278]  ret_from_fork+0x116/0x1d0
[  124.879434]  ? __pfx_kthread+0x10/0x10
[  124.879633]  ret_from_fork_asm+0x1a/0x30
[  124.879867]  </TASK>
[  124.880042] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure Automatically assigned
------------[ cut here ]------------
[  124.810561] WARNING: CPU: 0 PID: 703 at lib/math/int_log.c:63 intlog2+0xdf/0x110
[  124.811321] Modules linked in:
[  124.811830] CPU: 0 UID: 0 PID: 703 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[  124.812523] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  124.812639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  124.813017] RIP: 0010:intlog2+0xdf/0x110
[  124.813168] Code: 29 8d c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d e9 52 98 86 02 90 <0f> 0b 90 31 c0 e9 47 98 86 02 89 45 e4 e8 6f 20 52 ff 8b 45 e4 eb
[  124.814619] RSP: 0000:ffff88810874fcb0 EFLAGS: 00010246
[  124.814972] RAX: 0000000000000000 RBX: ffff8881003c7ae8 RCX: 1ffff110210e9fb4
[  124.815608] RDX: 1ffffffff1a53e50 RSI: 1ffff110210e9fb3 RDI: 0000000000000000
[  124.816032] RBP: ffff88810874fd60 R08: 0000000000000000 R09: ffffed102048aa80
[  124.816598] R10: ffff888102455407 R11: 0000000000000000 R12: 1ffff110210e9f97
[  124.817332] R13: ffffffff8d29f280 R14: 0000000000000000 R15: ffff88810874fd38
[  124.818092] FS:  0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000
[  124.818549] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  124.818906] CR2: dffffc0000000000 CR3: 00000000780bc000 CR4: 00000000000006f0
[  124.819063] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402
[  124.819483] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  124.820067] Call Trace:
[  124.820359]  <TASK>
[  124.820516]  ? intlog2_test+0xf2/0x220
[  124.820823]  ? __pfx_intlog2_test+0x10/0x10
[  124.821118]  ? __schedule+0x10cc/0x2b60
[  124.821410]  ? __pfx_read_tsc+0x10/0x10
[  124.821552]  ? ktime_get_ts64+0x86/0x230
[  124.821663]  kunit_try_run_case+0x1a5/0x480
[  124.821849]  ? __pfx_kunit_try_run_case+0x10/0x10
[  124.821962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  124.822138]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  124.822451]  ? __kthread_parkme+0x82/0x180
[  124.822726]  ? preempt_count_sub+0x50/0x80
[  124.822972]  ? __pfx_kunit_try_run_case+0x10/0x10
[  124.823233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  124.823390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  124.824189]  kthread+0x337/0x6f0
[  124.824454]  ? trace_preempt_on+0x20/0xc0
[  124.824610]  ? __pfx_kthread+0x10/0x10
[  124.824966]  ? _raw_spin_unlock_irq+0x47/0x80
[  124.825186]  ? calculate_sigpending+0x7b/0xa0
[  124.825430]  ? __pfx_kthread+0x10/0x10
[  124.825674]  ret_from_fork+0x116/0x1d0
[  124.826020]  ? __pfx_kthread+0x10/0x10
[  124.826280]  ret_from_fork_asm+0x1a/0x30
[  124.826546]  </TASK>
[  124.827071] ---[ end trace 0000000000000000 ]---
<8>[  391.698669] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>