Hay
Date
June 3, 2025, 7:38 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   24.088133] ==================================================================
[   24.088231] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   24.088231] 
[   24.088294] Corrupted memory at 0x00000000057d2b75 [ ! ] (in kfence-#102):
[   24.088443]  test_corruption+0x284/0x378
[   24.088490]  kunit_try_run_case+0x170/0x3f0
[   24.088536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.088581]  kthread+0x328/0x630
[   24.088619]  ret_from_fork+0x10/0x20
[   24.088660] 
[   24.088684] kfence-#102: 0x000000007834d2bf-0x000000006af668ba, size=32, cache=kmalloc-32
[   24.088684] 
[   24.088743] allocated by task 311 on cpu 1 at 24.087848s (0.000890s ago):
[   24.088805]  test_alloc+0x29c/0x628
[   24.088850]  test_corruption+0x198/0x378
[   24.088889]  kunit_try_run_case+0x170/0x3f0
[   24.088929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.088972]  kthread+0x328/0x630
[   24.089007]  ret_from_fork+0x10/0x20
[   24.089046] 
[   24.089069] freed by task 311 on cpu 1 at 24.087957s (0.001108s ago):
[   24.089129]  test_corruption+0x284/0x378
[   24.089167]  kunit_try_run_case+0x170/0x3f0
[   24.089207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.089250]  kthread+0x328/0x630
[   24.089284]  ret_from_fork+0x10/0x20
[   24.089321] 
[   24.089368] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   24.089456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.089486] Hardware name: linux,dummy-virt (DT)
[   24.089522] ==================================================================
[   23.464146] ==================================================================
[   23.464251] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   23.464251] 
[   23.464319] Corrupted memory at 0x0000000049129c9c [ ! . . . . . . . . . . . . . . . ] (in kfence-#96):
[   23.465457]  test_corruption+0x278/0x378
[   23.465512]  kunit_try_run_case+0x170/0x3f0
[   23.465560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.465605]  kthread+0x328/0x630
[   23.465644]  ret_from_fork+0x10/0x20
[   23.465686] 
[   23.465711] kfence-#96: 0x000000000f52b70a-0x0000000048f0aafc, size=32, cache=kmalloc-32
[   23.465711] 
[   23.465770] allocated by task 311 on cpu 1 at 23.463862s (0.001903s ago):
[   23.465834]  test_alloc+0x29c/0x628
[   23.465875]  test_corruption+0xdc/0x378
[   23.465915]  kunit_try_run_case+0x170/0x3f0
[   23.465955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.465999]  kthread+0x328/0x630
[   23.466033]  ret_from_fork+0x10/0x20
[   23.466072] 
[   23.466097] freed by task 311 on cpu 1 at 23.463968s (0.002125s ago):
[   23.466157]  test_corruption+0x278/0x378
[   23.466197]  kunit_try_run_case+0x170/0x3f0
[   23.466237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.466281]  kthread+0x328/0x630
[   23.466315]  ret_from_fork+0x10/0x20
[   23.466354] 
[   23.466399] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   23.466489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.466517] Hardware name: linux,dummy-virt (DT)
[   23.466552] ==================================================================
[   24.192083] ==================================================================
[   24.192181] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   24.192181] 
[   24.192243] Corrupted memory at 0x0000000036029ed6 [ ! . . . . . . . . . . . . . . . ] (in kfence-#103):
[   24.192579]  test_corruption+0x120/0x378
[   24.192629]  kunit_try_run_case+0x170/0x3f0
[   24.192673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.192718]  kthread+0x328/0x630
[   24.192756]  ret_from_fork+0x10/0x20
[   24.192796] 
[   24.192828] kfence-#103: 0x00000000dc7d01ba-0x00000000e3ad14c8, size=32, cache=test
[   24.192828] 
[   24.192885] allocated by task 313 on cpu 1 at 24.191920s (0.000960s ago):
[   24.192949]  test_alloc+0x230/0x628
[   24.192989]  test_corruption+0xdc/0x378
[   24.193029]  kunit_try_run_case+0x170/0x3f0
[   24.193070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193114]  kthread+0x328/0x630
[   24.193149]  ret_from_fork+0x10/0x20
[   24.193188] 
[   24.193211] freed by task 313 on cpu 1 at 24.191989s (0.001218s ago):
[   24.193271]  test_corruption+0x120/0x378
[   24.193312]  kunit_try_run_case+0x170/0x3f0
[   24.193351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193395]  kthread+0x328/0x630
[   24.193439]  ret_from_fork+0x10/0x20
[   24.193478] 
[   24.193522] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   24.193602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.193632] Hardware name: linux,dummy-virt (DT)
[   24.193665] ==================================================================
[   24.399974] ==================================================================
[   24.400067] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   24.400067] 
[   24.400128] Corrupted memory at 0x00000000ba8a0396 [ ! ] (in kfence-#105):
[   24.400243]  test_corruption+0x1d8/0x378
[   24.400290]  kunit_try_run_case+0x170/0x3f0
[   24.400333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.400377]  kthread+0x328/0x630
[   24.400415]  ret_from_fork+0x10/0x20
[   24.400470] 
[   24.400493] kfence-#105: 0x0000000006a011a7-0x0000000044831441, size=32, cache=test
[   24.400493] 
[   24.400548] allocated by task 313 on cpu 1 at 24.399822s (0.000722s ago):
[   24.400610]  test_alloc+0x230/0x628
[   24.400649]  test_corruption+0x198/0x378
[   24.400690]  kunit_try_run_case+0x170/0x3f0
[   24.400730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.400773]  kthread+0x328/0x630
[   24.400808]  ret_from_fork+0x10/0x20
[   24.400854] 
[   24.400879] freed by task 313 on cpu 1 at 24.399882s (0.000992s ago):
[   24.400940]  test_corruption+0x1d8/0x378
[   24.400982]  kunit_try_run_case+0x170/0x3f0
[   24.401022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.401065]  kthread+0x328/0x630
[   24.401101]  ret_from_fork+0x10/0x20
[   24.401140] 
[   24.401184] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   24.401265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.401296] Hardware name: linux,dummy-virt (DT)
[   24.401330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   20.410524] ==================================================================
[   20.410608] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.410682] Read of size 1 at addr fff00000c65b1900 by task kunit_try_catch/227
[   20.410735] 
[   20.410793] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.410883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.410910] Hardware name: linux,dummy-virt (DT)
[   20.410943] Call trace:
[   20.411031]  show_stack+0x20/0x38 (C)
[   20.411085]  dump_stack_lvl+0x8c/0xd0
[   20.411152]  print_report+0x118/0x608
[   20.411205]  kasan_report+0xdc/0x128
[   20.411281]  __asan_report_load1_noabort+0x20/0x30
[   20.411336]  mempool_uaf_helper+0x314/0x340
[   20.411413]  mempool_kmalloc_uaf+0xc4/0x120
[   20.411550]  kunit_try_run_case+0x170/0x3f0
[   20.411601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.411677]  kthread+0x328/0x630
[   20.411721]  ret_from_fork+0x10/0x20
[   20.411773] 
[   20.412180] Allocated by task 227:
[   20.412292]  kasan_save_stack+0x3c/0x68
[   20.412334]  kasan_save_track+0x20/0x40
[   20.412372]  kasan_save_alloc_info+0x40/0x58
[   20.412408]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.412464]  remove_element+0x130/0x1f8
[   20.412503]  mempool_alloc_preallocated+0x58/0xc0
[   20.412541]  mempool_uaf_helper+0xa4/0x340
[   20.412576]  mempool_kmalloc_uaf+0xc4/0x120
[   20.412614]  kunit_try_run_case+0x170/0x3f0
[   20.412650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.412694]  kthread+0x328/0x630
[   20.412726]  ret_from_fork+0x10/0x20
[   20.412762] 
[   20.412780] Freed by task 227:
[   20.412846]  kasan_save_stack+0x3c/0x68
[   20.412885]  kasan_save_track+0x20/0x40
[   20.412921]  kasan_save_free_info+0x4c/0x78
[   20.412998]  __kasan_mempool_poison_object+0xc0/0x150
[   20.413297]  mempool_free+0x28c/0x328
[   20.413332]  mempool_uaf_helper+0x104/0x340
[   20.413369]  mempool_kmalloc_uaf+0xc4/0x120
[   20.413518]  kunit_try_run_case+0x170/0x3f0
[   20.413604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.413675]  kthread+0x328/0x630
[   20.413723]  ret_from_fork+0x10/0x20
[   20.413769] 
[   20.413801] The buggy address belongs to the object at fff00000c65b1900
[   20.413801]  which belongs to the cache kmalloc-128 of size 128
[   20.413897] The buggy address is located 0 bytes inside of
[   20.413897]  freed 128-byte region [fff00000c65b1900, fff00000c65b1980)
[   20.414016] 
[   20.414068] The buggy address belongs to the physical page:
[   20.414144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   20.414216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.414269] page_type: f5(slab)
[   20.414309] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.414358] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.414399] page dumped because: kasan: bad access detected
[   20.414441] 
[   20.414459] Memory state around the buggy address:
[   20.414492]  fff00000c65b1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.414657]  fff00000c65b1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.414781] >fff00000c65b1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.414904]                    ^
[   20.414964]  fff00000c65b1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.415249]  fff00000c65b1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.415442] ==================================================================
[   20.431068] ==================================================================
[   20.431135] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.431220] Read of size 1 at addr fff00000c58a5240 by task kunit_try_catch/231
[   20.431271] 
[   20.431335] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.431500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.431599] Hardware name: linux,dummy-virt (DT)
[   20.431660] Call trace:
[   20.431682]  show_stack+0x20/0x38 (C)
[   20.431754]  dump_stack_lvl+0x8c/0xd0
[   20.431802]  print_report+0x118/0x608
[   20.431849]  kasan_report+0xdc/0x128
[   20.431984]  __asan_report_load1_noabort+0x20/0x30
[   20.432033]  mempool_uaf_helper+0x314/0x340
[   20.432110]  mempool_slab_uaf+0xc0/0x118
[   20.432272]  kunit_try_run_case+0x170/0x3f0
[   20.432404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.432571]  kthread+0x328/0x630
[   20.432674]  ret_from_fork+0x10/0x20
[   20.432835] 
[   20.432874] Allocated by task 231:
[   20.432904]  kasan_save_stack+0x3c/0x68
[   20.433001]  kasan_save_track+0x20/0x40
[   20.433266]  kasan_save_alloc_info+0x40/0x58
[   20.433360]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.433508]  remove_element+0x16c/0x1f8
[   20.433595]  mempool_alloc_preallocated+0x58/0xc0
[   20.433655]  mempool_uaf_helper+0xa4/0x340
[   20.433938]  mempool_slab_uaf+0xc0/0x118
[   20.434006]  kunit_try_run_case+0x170/0x3f0
[   20.434104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.434221]  kthread+0x328/0x630
[   20.434306]  ret_from_fork+0x10/0x20
[   20.434393] 
[   20.434500] Freed by task 231:
[   20.434528]  kasan_save_stack+0x3c/0x68
[   20.434566]  kasan_save_track+0x20/0x40
[   20.434774]  kasan_save_free_info+0x4c/0x78
[   20.434858]  __kasan_mempool_poison_object+0xc0/0x150
[   20.434939]  mempool_free+0x28c/0x328
[   20.435064]  mempool_uaf_helper+0x104/0x340
[   20.435143]  mempool_slab_uaf+0xc0/0x118
[   20.435180]  kunit_try_run_case+0x170/0x3f0
[   20.435216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.435259]  kthread+0x328/0x630
[   20.435290]  ret_from_fork+0x10/0x20
[   20.435324] 
[   20.435343] The buggy address belongs to the object at fff00000c58a5240
[   20.435343]  which belongs to the cache test_cache of size 123
[   20.435445] The buggy address is located 0 bytes inside of
[   20.435445]  freed 123-byte region [fff00000c58a5240, fff00000c58a52bb)
[   20.435505] 
[   20.435526] The buggy address belongs to the physical page:
[   20.435570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a5
[   20.435713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.435790] page_type: f5(slab)
[   20.435885] raw: 0bfffe0000000000 fff00000c65c9640 dead000000000122 0000000000000000
[   20.435973] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.436042] page dumped because: kasan: bad access detected
[   20.436072] 
[   20.436091] Memory state around the buggy address:
[   20.436147]  fff00000c58a5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436191]  fff00000c58a5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.436232] >fff00000c58a5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.436555]                                            ^
[   20.436718]  fff00000c58a5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436851]  fff00000c58a5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.436917] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   20.998418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   21.012043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   20.963706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   20.869606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   20.860620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   22.196150] ==================================================================
[   22.196227] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.196227] 
[   22.196320] Out-of-bounds write at 0x0000000003e52060 (1B left of kfence-#84):
[   22.196375]  test_out_of_bounds_write+0x100/0x240
[   22.196435]  kunit_try_run_case+0x170/0x3f0
[   22.196481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.196527]  kthread+0x328/0x630
[   22.196565]  ret_from_fork+0x10/0x20
[   22.196616] 
[   22.196641] kfence-#84: 0x00000000945ae29a-0x0000000053702eea, size=32, cache=kmalloc-32
[   22.196641] 
[   22.196694] allocated by task 291 on cpu 1 at 22.195828s (0.000862s ago):
[   22.196795]  test_alloc+0x29c/0x628
[   22.196841]  test_out_of_bounds_write+0xc8/0x240
[   22.196882]  kunit_try_run_case+0x170/0x3f0
[   22.196932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.197011]  kthread+0x328/0x630
[   22.197045]  ret_from_fork+0x10/0x20
[   22.197113] 
[   22.197157] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.197257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.197287] Hardware name: linux,dummy-virt (DT)
[   22.197320] ==================================================================
[   22.408676] ==================================================================
[   22.408929] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.408929] 
[   22.409030] Out-of-bounds write at 0x000000004601b10d (1B left of kfence-#86):
[   22.409121]  test_out_of_bounds_write+0x100/0x240
[   22.409173]  kunit_try_run_case+0x170/0x3f0
[   22.409315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.409371]  kthread+0x328/0x630
[   22.409603]  ret_from_fork+0x10/0x20
[   22.409661] 
[   22.409691] kfence-#86: 0x0000000096c64e9d-0x000000004a744bf2, size=32, cache=test
[   22.409691] 
[   22.409765] allocated by task 293 on cpu 1 at 22.408566s (0.001189s ago):
[   22.409891]  test_alloc+0x230/0x628
[   22.409941]  test_out_of_bounds_write+0xc8/0x240
[   22.409984]  kunit_try_run_case+0x170/0x3f0
[   22.410043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.410096]  kthread+0x328/0x630
[   22.410150]  ret_from_fork+0x10/0x20
[   22.410208] 
[   22.410253] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.410365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.410403] Hardware name: linux,dummy-virt (DT)
[   22.410454] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure Automatically assigned
[   94.902258] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.911960] Modules linked in:
[   94.913086] CPU: 0 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   94.914338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.914664] Hardware name: linux,dummy-virt (DT)
[   94.914977] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.915307] pc : kunit_test_null_dereference+0x70/0x170
[   94.916251] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.917179] sp : ffff800082037d30
[   94.917762] x29: ffff800082037d90 x28: 0000000000000000 x27: 0000000000000000
[   94.918776] x26: 1ffe000018b28541 x25: 0000000000000000 x24: 0000000000000004
[   94.919836] x23: fff00000c5942a0c x22: ffff9fc2fb858458 x21: fff00000c41eee08
[   94.920851] x20: 1ffff00010406fa6 x19: ffff800080087990 x18: 0000000055299f6c
[   94.921573] x17: 0000000000000001 x16: fff00000c097543c x15: fff00000ff616b08
[   94.921938] x14: 0000000000018fff x13: 1ffe00001b48cdcd x12: fffd80001968911c
[   94.922285] x11: 1ffe00001968911b x10: fffd80001968911b x9 : ffff9fc2fb84f8c0
[   94.923508] x8 : ffff800082037c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.924676] x5 : ffff700010406fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.925570] x2 : dfff800000000000 x1 : fff00000cb448000 x0 : ffff800080087990
[   94.926714] Call trace:
[   94.927142]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.927971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.929403]  kthread+0x328/0x630
[   94.929993]  ret_from_fork+0x10/0x20
[   94.930678] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.931165] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   51.136323] ==================================================================
[   51.136375] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.136375] 
[   51.136473] Use-after-free read at 0x00000000e33fe1fd (in kfence-#149):
[   51.136524]  test_krealloc+0x51c/0x830
[   51.136570]  kunit_try_run_case+0x170/0x3f0
[   51.136613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.136658]  kthread+0x328/0x630
[   51.136696]  ret_from_fork+0x10/0x20
[   51.136736] 
[   51.136760] kfence-#149: 0x00000000e33fe1fd-0x00000000da82f877, size=32, cache=kmalloc-32
[   51.136760] 
[   51.136820] allocated by task 337 on cpu 0 at 51.135725s (0.001085s ago):
[   51.136886]  test_alloc+0x29c/0x628
[   51.136926]  test_krealloc+0xc0/0x830
[   51.136966]  kunit_try_run_case+0x170/0x3f0
[   51.137005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.137050]  kthread+0x328/0x630
[   51.137084]  ret_from_fork+0x10/0x20
[   51.137122] 
[   51.137145] freed by task 337 on cpu 0 at 51.135937s (0.001206s ago):
[   51.137206]  krealloc_noprof+0x148/0x360
[   51.137246]  test_krealloc+0x1dc/0x830
[   51.137285]  kunit_try_run_case+0x170/0x3f0
[   51.137324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.137367]  kthread+0x328/0x630
[   51.137403]  ret_from_fork+0x10/0x20
[   51.137451] 
[   51.137495] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   51.137575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.137605] Hardware name: linux,dummy-virt (DT)
[   51.137640] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   51.063915] ==================================================================
[   51.064020] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.064020] 
[   51.064120] Use-after-free read at 0x00000000bf04db14 (in kfence-#148):
[   51.064175]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.064225]  kunit_try_run_case+0x170/0x3f0
[   51.064271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.064317]  kthread+0x328/0x630
[   51.064355]  ret_from_fork+0x10/0x20
[   51.064395] 
[   51.064418] kfence-#148: 0x00000000bf04db14-0x0000000092e8e4c1, size=32, cache=test
[   51.064418] 
[   51.064492] allocated by task 335 on cpu 1 at 51.035691s (0.028796s ago):
[   51.064563]  test_alloc+0x230/0x628
[   51.064603]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.064646]  kunit_try_run_case+0x170/0x3f0
[   51.064685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.064728]  kthread+0x328/0x630
[   51.064764]  ret_from_fork+0x10/0x20
[   51.064801] 
[   51.064834] freed by task 335 on cpu 1 at 51.035804s (0.029026s ago):
[   51.064889]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.064932]  kunit_try_run_case+0x170/0x3f0
[   51.064972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.065015]  kthread+0x328/0x630
[   51.065049]  ret_from_fork+0x10/0x20
[   51.065089] 
[   51.065134] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   51.065215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.065243] Hardware name: linux,dummy-virt (DT)
[   51.065280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   28.584976] ==================================================================
[   28.585141] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   28.585141] 
[   28.585247] Invalid read at 0x000000006af6c3c2:
[   28.585315]  test_invalid_access+0xdc/0x1f0
[   28.585369]  kunit_try_run_case+0x170/0x3f0
[   28.585420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.585489]  kthread+0x328/0x630
[   28.585533]  ret_from_fork+0x10/0x20
[   28.585586] 
[   28.585637] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   28.585727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.586092] Hardware name: linux,dummy-virt (DT)
[   28.586156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   20.641169] ==================================================================
[   20.641250] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.641317] Read of size 1 at addr ffff800080a97b5f by task kunit_try_catch/251
[   20.641610] 
[   20.641735] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.642043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.642183] Hardware name: linux,dummy-virt (DT)
[   20.642358] Call trace:
[   20.642382]  show_stack+0x20/0x38 (C)
[   20.642679]  dump_stack_lvl+0x8c/0xd0
[   20.643283]  print_report+0x310/0x608
[   20.643568]  kasan_report+0xdc/0x128
[   20.643644]  __asan_report_load1_noabort+0x20/0x30
[   20.643698]  kasan_alloca_oob_left+0x2b8/0x310
[   20.643747]  kunit_try_run_case+0x170/0x3f0
[   20.643799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.643855]  kthread+0x328/0x630
[   20.643900]  ret_from_fork+0x10/0x20
[   20.644153] 
[   20.644224] The buggy address belongs to stack of task kunit_try_catch/251
[   20.644494] 
[   20.644528] The buggy address belongs to the virtual mapping at
[   20.644528]  [ffff800080a90000, ffff800080a99000) created by:
[   20.644528]  kernel_clone+0x150/0x7a8
[   20.644610] 
[   20.644634] The buggy address belongs to the physical page:
[   20.644668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd
[   20.644722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.644792] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.644862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.644906] page dumped because: kasan: bad access detected
[   20.645103] 
[   20.645125] Memory state around the buggy address:
[   20.645477]  ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.645770]  ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.645817] >ffff800080a97b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.645858]                                                     ^
[   20.645951]  ffff800080a97b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.645996]  ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.646151] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   28.352010] ==================================================================
[   28.352103] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.352103] 
[   28.352166] Corrupted memory at 0x00000000cfba42a4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143):
[   28.352487]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.352536]  kunit_try_run_case+0x170/0x3f0
[   28.352580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.352622]  kthread+0x328/0x630
[   28.352661]  ret_from_fork+0x10/0x20
[   28.352701] 
[   28.352725] kfence-#143: 0x000000005e274b6c-0x000000006f7eca48, size=73, cache=kmalloc-96
[   28.352725] 
[   28.352781] allocated by task 325 on cpu 0 at 28.351767s (0.001010s ago):
[   28.352850]  test_alloc+0x29c/0x628
[   28.352890]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   28.352933]  kunit_try_run_case+0x170/0x3f0
[   28.352973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.353015]  kthread+0x328/0x630
[   28.353051]  ret_from_fork+0x10/0x20
[   28.353089] 
[   28.353112] freed by task 325 on cpu 0 at 28.351915s (0.001193s ago):
[   28.353175]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.353217]  kunit_try_run_case+0x170/0x3f0
[   28.353257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.353301]  kthread+0x328/0x630
[   28.353336]  ret_from_fork+0x10/0x20
[   28.353375] 
[   28.353418] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   28.353510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.353539] Hardware name: linux,dummy-virt (DT)
[   28.353573] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   28.248064] ==================================================================
[   28.248153] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.248153] 
[   28.248252] Out-of-bounds read at 0x00000000a753c172 (105B right of kfence-#142):
[   28.248314]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.248364]  kunit_try_run_case+0x170/0x3f0
[   28.248410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.248472]  kthread+0x328/0x630
[   28.248510]  ret_from_fork+0x10/0x20
[   28.248550] 
[   28.248577] kfence-#142: 0x00000000c1caea93-0x00000000ab11a409, size=73, cache=kmalloc-96
[   28.248577] 
[   28.248631] allocated by task 323 on cpu 0 at 28.247821s (0.000807s ago):
[   28.248702]  test_alloc+0x29c/0x628
[   28.248743]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.248786]  kunit_try_run_case+0x170/0x3f0
[   28.248834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.248875]  kthread+0x328/0x630
[   28.248909]  ret_from_fork+0x10/0x20
[   28.248949] 
[   28.248996] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   28.249077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.249106] Hardware name: linux,dummy-virt (DT)
[   28.249141] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   23.252271] ==================================================================
[   23.252344] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   23.252344] 
[   23.252465] Invalid free of 0x00000000cdd0bcc7 (in kfence-#94):
[   23.252534]  test_invalid_addr_free+0xec/0x238
[   23.252606]  kunit_try_run_case+0x170/0x3f0
[   23.252651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.252703]  kthread+0x328/0x630
[   23.252760]  ret_from_fork+0x10/0x20
[   23.252850] 
[   23.253117] kfence-#94: 0x0000000016109bed-0x0000000063283060, size=32, cache=test
[   23.253117] 
[   23.253219] allocated by task 309 on cpu 1 at 23.252143s (0.001046s ago):
[   23.253286]  test_alloc+0x230/0x628
[   23.253332]  test_invalid_addr_free+0xd4/0x238
[   23.253563]  kunit_try_run_case+0x170/0x3f0
[   23.253651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.253698]  kthread+0x328/0x630
[   23.253734]  ret_from_fork+0x10/0x20
[   23.253784] 
[   23.253836] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   23.253918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.253948] Hardware name: linux,dummy-virt (DT)
[   23.253990] ==================================================================
[   23.148637] ==================================================================
[   23.148722] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   23.148722] 
[   23.148809] Invalid free of 0x000000000716ec25 (in kfence-#93):
[   23.148906]  test_invalid_addr_free+0x1ac/0x238
[   23.148970]  kunit_try_run_case+0x170/0x3f0
[   23.149017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.149062]  kthread+0x328/0x630
[   23.149326]  ret_from_fork+0x10/0x20
[   23.149384] 
[   23.149410] kfence-#93: 0x00000000d5137858-0x00000000812dd8ba, size=32, cache=kmalloc-32
[   23.149410] 
[   23.149479] allocated by task 307 on cpu 1 at 23.148241s (0.001235s ago):
[   23.149545]  test_alloc+0x29c/0x628
[   23.149596]  test_invalid_addr_free+0xd4/0x238
[   23.149650]  kunit_try_run_case+0x170/0x3f0
[   23.149691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.149734]  kthread+0x328/0x630
[   23.149770]  ret_from_fork+0x10/0x20
[   23.149825] 
[   23.149871] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   23.149951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.149981] Hardware name: linux,dummy-virt (DT)
[   23.150017] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   23.041575] ==================================================================
[   23.041664] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   23.041664] 
[   23.042038] Invalid free of 0x000000004ac2cf51 (in kfence-#92):
[   23.042150]  test_double_free+0x100/0x238
[   23.042208]  kunit_try_run_case+0x170/0x3f0
[   23.042255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.042301]  kthread+0x328/0x630
[   23.042502]  ret_from_fork+0x10/0x20
[   23.042710] 
[   23.042745] kfence-#92: 0x000000004ac2cf51-0x000000002fa93f85, size=32, cache=test
[   23.042745] 
[   23.042947] allocated by task 305 on cpu 1 at 23.040990s (0.001948s ago):
[   23.043191]  test_alloc+0x230/0x628
[   23.043249]  test_double_free+0xd4/0x238
[   23.043310]  kunit_try_run_case+0x170/0x3f0
[   23.043698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.043832]  kthread+0x328/0x630
[   23.043871]  ret_from_fork+0x10/0x20
[   23.043928] 
[   23.044116] freed by task 305 on cpu 1 at 23.041178s (0.002771s ago):
[   23.044378]  test_double_free+0xf0/0x238
[   23.044496]  kunit_try_run_case+0x170/0x3f0
[   23.044780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.044976]  kthread+0x328/0x630
[   23.045149]  ret_from_fork+0x10/0x20
[   23.045205] 
[   23.045417] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   23.045666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.045841] Hardware name: linux,dummy-virt (DT)
[   23.046068] ==================================================================
[   22.938551] ==================================================================
[   22.938788] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   22.938788] 
[   22.938911] Invalid free of 0x00000000bbecc36f (in kfence-#91):
[   22.939294]  test_double_free+0x1bc/0x238
[   22.939402]  kunit_try_run_case+0x170/0x3f0
[   22.939584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.939633]  kthread+0x328/0x630
[   22.940044]  ret_from_fork+0x10/0x20
[   22.940181] 
[   22.940237] kfence-#91: 0x00000000bbecc36f-0x0000000077703c52, size=32, cache=kmalloc-32
[   22.940237] 
[   22.940682] allocated by task 303 on cpu 1 at 22.937660s (0.002968s ago):
[   22.940870]  test_alloc+0x29c/0x628
[   22.941009]  test_double_free+0xd4/0x238
[   22.941384]  kunit_try_run_case+0x170/0x3f0
[   22.941738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.941936]  kthread+0x328/0x630
[   22.941995]  ret_from_fork+0x10/0x20
[   22.942202] 
[   22.942252] freed by task 303 on cpu 1 at 22.938066s (0.004180s ago):
[   22.942495]  test_double_free+0x1ac/0x238
[   22.942673]  kunit_try_run_case+0x170/0x3f0
[   22.942723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.942943]  kthread+0x328/0x630
[   22.943126]  ret_from_fork+0x10/0x20
[   22.943316] 
[   22.943605] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.943799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.943834] Hardware name: linux,dummy-virt (DT)
[   22.944220] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   22.517582] ==================================================================
[   22.518012] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.518012] 
[   22.518202] Use-after-free read at 0x00000000a14afa81 (in kfence-#87):
[   22.518520]  test_use_after_free_read+0x114/0x248
[   22.518714]  kunit_try_run_case+0x170/0x3f0
[   22.518862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.519157]  kthread+0x328/0x630
[   22.519303]  ret_from_fork+0x10/0x20
[   22.519710] 
[   22.519797] kfence-#87: 0x00000000a14afa81-0x00000000646ee562, size=32, cache=kmalloc-32
[   22.519797] 
[   22.519901] allocated by task 295 on cpu 1 at 22.516773s (0.003102s ago):
[   22.519974]  test_alloc+0x29c/0x628
[   22.520013]  test_use_after_free_read+0xd0/0x248
[   22.520055]  kunit_try_run_case+0x170/0x3f0
[   22.520095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.520242]  kthread+0x328/0x630
[   22.520282]  ret_from_fork+0x10/0x20
[   22.520550] 
[   22.521118] freed by task 295 on cpu 1 at 22.516867s (0.003986s ago):
[   22.521323]  test_use_after_free_read+0x1c0/0x248
[   22.521736]  kunit_try_run_case+0x170/0x3f0
[   22.521931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.521984]  kthread+0x328/0x630
[   22.522020]  ret_from_fork+0x10/0x20
[   22.522080] 
[   22.522132] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.522406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.522590] Hardware name: linux,dummy-virt (DT)
[   22.522671] ==================================================================
[   22.622144] ==================================================================
[   22.622227] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.622227] 
[   22.622606] Use-after-free read at 0x00000000e86ddff5 (in kfence-#88):
[   22.622669]  test_use_after_free_read+0x114/0x248
[   22.622771]  kunit_try_run_case+0x170/0x3f0
[   22.622816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.622860]  kthread+0x328/0x630
[   22.623162]  ret_from_fork+0x10/0x20
[   22.623295] 
[   22.623323] kfence-#88: 0x00000000e86ddff5-0x00000000516e3525, size=32, cache=test
[   22.623323] 
[   22.623396] allocated by task 297 on cpu 1 at 22.621548s (0.001834s ago):
[   22.623817]  test_alloc+0x230/0x628
[   22.623884]  test_use_after_free_read+0xd0/0x248
[   22.623953]  kunit_try_run_case+0x170/0x3f0
[   22.624112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.624219]  kthread+0x328/0x630
[   22.624316]  ret_from_fork+0x10/0x20
[   22.624601] 
[   22.624782] freed by task 297 on cpu 1 at 22.621613s (0.003135s ago):
[   22.625223]  test_use_after_free_read+0xf0/0x248
[   22.625330]  kunit_try_run_case+0x170/0x3f0
[   22.625589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.625759]  kthread+0x328/0x630
[   22.626073]  ret_from_fork+0x10/0x20
[   22.626272] 
[   22.626465] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.626579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.627022] Hardware name: linux,dummy-virt (DT)
[   22.627194] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   22.092354] ==================================================================
[   22.092470] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.092470] 
[   22.092551] Out-of-bounds read at 0x00000000ca232e99 (32B right of kfence-#83):
[   22.092606]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.092673]  kunit_try_run_case+0x170/0x3f0
[   22.092736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.092885]  kthread+0x328/0x630
[   22.092924]  ret_from_fork+0x10/0x20
[   22.092963] 
[   22.092988] kfence-#83: 0x000000000a12d390-0x00000000625af727, size=32, cache=test
[   22.092988] 
[   22.093060] allocated by task 289 on cpu 1 at 22.092274s (0.000781s ago):
[   22.093130]  test_alloc+0x230/0x628
[   22.093171]  test_out_of_bounds_read+0x198/0x3e0
[   22.093213]  kunit_try_run_case+0x170/0x3f0
[   22.093269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.093436]  kthread+0x328/0x630
[   22.093504]  ret_from_fork+0x10/0x20
[   22.093683] 
[   22.093729] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   22.093812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.093840] Hardware name: linux,dummy-virt (DT)
[   22.093872] ==================================================================
[   21.984140] ==================================================================
[   21.984385] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.984385] 
[   21.984486] Out-of-bounds read at 0x000000002cad4313 (1B left of kfence-#82):
[   21.984543]  test_out_of_bounds_read+0x114/0x3e0
[   21.984590]  kunit_try_run_case+0x170/0x3f0
[   21.984633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.984675]  kthread+0x328/0x630
[   21.984713]  ret_from_fork+0x10/0x20
[   21.984751] 
[   21.984774] kfence-#82: 0x0000000064f0dfbd-0x00000000821e94c9, size=32, cache=test
[   21.984774] 
[   21.984838] allocated by task 289 on cpu 1 at 21.983957s (0.000869s ago):
[   21.985321]  test_alloc+0x230/0x628
[   21.985556]  test_out_of_bounds_read+0xdc/0x3e0
[   21.985599]  kunit_try_run_case+0x170/0x3f0
[   21.985807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.986033]  kthread+0x328/0x630
[   21.986219]  ret_from_fork+0x10/0x20
[   21.986264] 
[   21.986434] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.986520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.986547] Hardware name: linux,dummy-virt (DT)
[   21.986579] ==================================================================
[   21.880116] ==================================================================
[   21.880212] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.880212] 
[   21.880318] Out-of-bounds read at 0x00000000945418ee (32B right of kfence-#81):
[   21.880376]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.880434]  kunit_try_run_case+0x170/0x3f0
[   21.880480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.880559]  kthread+0x328/0x630
[   21.880606]  ret_from_fork+0x10/0x20
[   21.880759] 
[   21.880835] kfence-#81: 0x00000000eb656d6a-0x000000006617d380, size=32, cache=kmalloc-32
[   21.880835] 
[   21.880888] allocated by task 287 on cpu 1 at 21.879915s (0.000968s ago):
[   21.880959]  test_alloc+0x29c/0x628
[   21.881000]  test_out_of_bounds_read+0x198/0x3e0
[   21.881041]  kunit_try_run_case+0x170/0x3f0
[   21.881080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.881124]  kthread+0x328/0x630
[   21.881159]  ret_from_fork+0x10/0x20
[   21.881207] 
[   21.881250] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.881331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.881359] Hardware name: linux,dummy-virt (DT)
[   21.881393] ==================================================================
[   21.775397] ==================================================================
[   21.776559] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.776559] 
[   21.777327] Out-of-bounds read at 0x0000000013da60c7 (1B left of kfence-#80):
[   21.778234]  test_out_of_bounds_read+0x114/0x3e0
[   21.778399]  kunit_try_run_case+0x170/0x3f0
[   21.778495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.778599]  kthread+0x328/0x630
[   21.778907]  ret_from_fork+0x10/0x20
[   21.779089] 
[   21.779869] kfence-#80: 0x0000000055586c0e-0x000000004d5fdac6, size=32, cache=kmalloc-32
[   21.779869] 
[   21.780696] allocated by task 287 on cpu 1 at 21.773492s (0.007021s ago):
[   21.781939]  test_alloc+0x29c/0x628
[   21.782025]  test_out_of_bounds_read+0xdc/0x3e0
[   21.782091]  kunit_try_run_case+0x170/0x3f0
[   21.782132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.782186]  kthread+0x328/0x630
[   21.782224]  ret_from_fork+0x10/0x20
[   21.782320] 
[   21.782449] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.782549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.782588] Hardware name: linux,dummy-virt (DT)
[   21.782647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   21.623161] ==================================================================
[   21.623557] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.623721] Write of size 1 at addr fff00000c58a9678 by task kunit_try_catch/285
[   21.623834] 
[   21.623870] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.623960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.624405] Hardware name: linux,dummy-virt (DT)
[   21.624477] Call trace:
[   21.624655]  show_stack+0x20/0x38 (C)
[   21.624903]  dump_stack_lvl+0x8c/0xd0
[   21.625175]  print_report+0x118/0x608
[   21.625365]  kasan_report+0xdc/0x128
[   21.625589]  __asan_report_store1_noabort+0x20/0x30
[   21.625800]  strncpy_from_user+0x270/0x2a0
[   21.626018]  copy_user_test_oob+0x5c0/0xec8
[   21.626192]  kunit_try_run_case+0x170/0x3f0
[   21.626457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.626888]  kthread+0x328/0x630
[   21.627093]  ret_from_fork+0x10/0x20
[   21.627151] 
[   21.627172] Allocated by task 285:
[   21.627203]  kasan_save_stack+0x3c/0x68
[   21.627339]  kasan_save_track+0x20/0x40
[   21.627405]  kasan_save_alloc_info+0x40/0x58
[   21.627869]  __kasan_kmalloc+0xd4/0xd8
[   21.628024]  __kmalloc_noprof+0x198/0x4c8
[   21.628146]  kunit_kmalloc_array+0x34/0x88
[   21.628381]  copy_user_test_oob+0xac/0xec8
[   21.628444]  kunit_try_run_case+0x170/0x3f0
[   21.628487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.628602]  kthread+0x328/0x630
[   21.628855]  ret_from_fork+0x10/0x20
[   21.629163] 
[   21.629291] The buggy address belongs to the object at fff00000c58a9600
[   21.629291]  which belongs to the cache kmalloc-128 of size 128
[   21.629763] The buggy address is located 0 bytes to the right of
[   21.629763]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.629951] 
[   21.630135] The buggy address belongs to the physical page:
[   21.630277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.630539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.630660] page_type: f5(slab)
[   21.630806] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.630885] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.631015] page dumped because: kasan: bad access detected
[   21.631063] 
[   21.631116] Memory state around the buggy address:
[   21.631171]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.631217]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.631262] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.631304]                                                                 ^
[   21.631363]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.632058]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.632139] ==================================================================
[   21.612095] ==================================================================
[   21.612158] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.612646] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.612759] 
[   21.613128] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.613529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.613677] Hardware name: linux,dummy-virt (DT)
[   21.613720] Call trace:
[   21.613771]  show_stack+0x20/0x38 (C)
[   21.614006]  dump_stack_lvl+0x8c/0xd0
[   21.614258]  print_report+0x118/0x608
[   21.614329]  kasan_report+0xdc/0x128
[   21.614541]  kasan_check_range+0x100/0x1a8
[   21.614661]  __kasan_check_write+0x20/0x30
[   21.614722]  strncpy_from_user+0x3c/0x2a0
[   21.615129]  copy_user_test_oob+0x5c0/0xec8
[   21.615244]  kunit_try_run_case+0x170/0x3f0
[   21.615438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.615502]  kthread+0x328/0x630
[   21.615554]  ret_from_fork+0x10/0x20
[   21.615834] 
[   21.615868] Allocated by task 285:
[   21.615903]  kasan_save_stack+0x3c/0x68
[   21.615949]  kasan_save_track+0x20/0x40
[   21.616004]  kasan_save_alloc_info+0x40/0x58
[   21.616044]  __kasan_kmalloc+0xd4/0xd8
[   21.616081]  __kmalloc_noprof+0x198/0x4c8
[   21.616130]  kunit_kmalloc_array+0x34/0x88
[   21.616167]  copy_user_test_oob+0xac/0xec8
[   21.616220]  kunit_try_run_case+0x170/0x3f0
[   21.616274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.616321]  kthread+0x328/0x630
[   21.616364]  ret_from_fork+0x10/0x20
[   21.616416] 
[   21.616567] The buggy address belongs to the object at fff00000c58a9600
[   21.616567]  which belongs to the cache kmalloc-128 of size 128
[   21.617207] The buggy address is located 0 bytes inside of
[   21.617207]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.617420] 
[   21.617683] The buggy address belongs to the physical page:
[   21.618032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.618221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.618616] page_type: f5(slab)
[   21.618828] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.619081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.619161] page dumped because: kasan: bad access detected
[   21.619498] 
[   21.619688] Memory state around the buggy address:
[   21.619986]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.620078]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.620134] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.620374]                                                                 ^
[   21.620739]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.620894]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.621540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   21.574346] ==================================================================
[   21.574734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.574891] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.574977] 
[   21.575013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.575180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.575209] Hardware name: linux,dummy-virt (DT)
[   21.575250] Call trace:
[   21.575442]  show_stack+0x20/0x38 (C)
[   21.575762]  dump_stack_lvl+0x8c/0xd0
[   21.575885]  print_report+0x118/0x608
[   21.576005]  kasan_report+0xdc/0x128
[   21.576054]  kasan_check_range+0x100/0x1a8
[   21.576119]  __kasan_check_write+0x20/0x30
[   21.576168]  copy_user_test_oob+0x35c/0xec8
[   21.576217]  kunit_try_run_case+0x170/0x3f0
[   21.576576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.576730]  kthread+0x328/0x630
[   21.576840]  ret_from_fork+0x10/0x20
[   21.577295] 
[   21.577414] Allocated by task 285:
[   21.577561]  kasan_save_stack+0x3c/0x68
[   21.577717]  kasan_save_track+0x20/0x40
[   21.577763]  kasan_save_alloc_info+0x40/0x58
[   21.577836]  __kasan_kmalloc+0xd4/0xd8
[   21.578103]  __kmalloc_noprof+0x198/0x4c8
[   21.578356]  kunit_kmalloc_array+0x34/0x88
[   21.578435]  copy_user_test_oob+0xac/0xec8
[   21.578488]  kunit_try_run_case+0x170/0x3f0
[   21.578527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.578573]  kthread+0x328/0x630
[   21.578607]  ret_from_fork+0x10/0x20
[   21.578656] 
[   21.578688] The buggy address belongs to the object at fff00000c58a9600
[   21.578688]  which belongs to the cache kmalloc-128 of size 128
[   21.578763] The buggy address is located 0 bytes inside of
[   21.578763]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.578850] 
[   21.578892] The buggy address belongs to the physical page:
[   21.578942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.579005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.579067] page_type: f5(slab)
[   21.579110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.579163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.579206] page dumped because: kasan: bad access detected
[   21.579239] 
[   21.579280] Memory state around the buggy address:
[   21.579330]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.579688]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.579850] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.579898]                                                                 ^
[   21.579943]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.579988]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.580259] ==================================================================
[   21.533992] ==================================================================
[   21.534170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.534267] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.534323] 
[   21.534382] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.535577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.535669] Hardware name: linux,dummy-virt (DT)
[   21.535740] Call trace:
[   21.535865]  show_stack+0x20/0x38 (C)
[   21.535951]  dump_stack_lvl+0x8c/0xd0
[   21.536397]  print_report+0x118/0x608
[   21.536617]  kasan_report+0xdc/0x128
[   21.536762]  kasan_check_range+0x100/0x1a8
[   21.536858]  __kasan_check_write+0x20/0x30
[   21.537009]  copy_user_test_oob+0x234/0xec8
[   21.537079]  kunit_try_run_case+0x170/0x3f0
[   21.537746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.537819]  kthread+0x328/0x630
[   21.538558]  ret_from_fork+0x10/0x20
[   21.538619] 
[   21.538886] Allocated by task 285:
[   21.539096]  kasan_save_stack+0x3c/0x68
[   21.539186]  kasan_save_track+0x20/0x40
[   21.539329]  kasan_save_alloc_info+0x40/0x58
[   21.539431]  __kasan_kmalloc+0xd4/0xd8
[   21.539575]  __kmalloc_noprof+0x198/0x4c8
[   21.539623]  kunit_kmalloc_array+0x34/0x88
[   21.539662]  copy_user_test_oob+0xac/0xec8
[   21.539937]  kunit_try_run_case+0x170/0x3f0
[   21.540056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.540165]  kthread+0x328/0x630
[   21.540243]  ret_from_fork+0x10/0x20
[   21.540376] 
[   21.540456] The buggy address belongs to the object at fff00000c58a9600
[   21.540456]  which belongs to the cache kmalloc-128 of size 128
[   21.540861] The buggy address is located 0 bytes inside of
[   21.540861]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.541017] 
[   21.541074] The buggy address belongs to the physical page:
[   21.541206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.541345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.541511] page_type: f5(slab)
[   21.541573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.542018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.542113] page dumped because: kasan: bad access detected
[   21.542178] 
[   21.542388] Memory state around the buggy address:
[   21.542601]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.542739]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.542883] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.542974]                                                                 ^
[   21.543350]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.543525]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.543591] ==================================================================
[   21.592707] ==================================================================
[   21.592807] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.592880] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.592935] 
[   21.593145] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.593340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.593380] Hardware name: linux,dummy-virt (DT)
[   21.593414] Call trace:
[   21.593449]  show_stack+0x20/0x38 (C)
[   21.594058]  dump_stack_lvl+0x8c/0xd0
[   21.594156]  print_report+0x118/0x608
[   21.594393]  kasan_report+0xdc/0x128
[   21.594496]  kasan_check_range+0x100/0x1a8
[   21.594558]  __kasan_check_write+0x20/0x30
[   21.594674]  copy_user_test_oob+0x434/0xec8
[   21.594748]  kunit_try_run_case+0x170/0x3f0
[   21.595064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.595275]  kthread+0x328/0x630
[   21.595328]  ret_from_fork+0x10/0x20
[   21.595677] 
[   21.595745] Allocated by task 285:
[   21.595861]  kasan_save_stack+0x3c/0x68
[   21.595951]  kasan_save_track+0x20/0x40
[   21.596199]  kasan_save_alloc_info+0x40/0x58
[   21.596256]  __kasan_kmalloc+0xd4/0xd8
[   21.596597]  __kmalloc_noprof+0x198/0x4c8
[   21.597022]  kunit_kmalloc_array+0x34/0x88
[   21.597149]  copy_user_test_oob+0xac/0xec8
[   21.597247]  kunit_try_run_case+0x170/0x3f0
[   21.597404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.597500]  kthread+0x328/0x630
[   21.597810]  ret_from_fork+0x10/0x20
[   21.597961] 
[   21.597984] The buggy address belongs to the object at fff00000c58a9600
[   21.597984]  which belongs to the cache kmalloc-128 of size 128
[   21.598106] The buggy address is located 0 bytes inside of
[   21.598106]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.598177] 
[   21.598225] The buggy address belongs to the physical page:
[   21.598272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.598332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.598403] page_type: f5(slab)
[   21.598476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.598529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.598581] page dumped because: kasan: bad access detected
[   21.598616] 
[   21.598638] Memory state around the buggy address:
[   21.598672]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.598717]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598769] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.598818]                                                                 ^
[   21.598865]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598915]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.598961] ==================================================================
[   21.554901] ==================================================================
[   21.554990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.555055] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.555109] 
[   21.556967] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.557311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.557344] Hardware name: linux,dummy-virt (DT)
[   21.558133] Call trace:
[   21.558242]  show_stack+0x20/0x38 (C)
[   21.558632]  dump_stack_lvl+0x8c/0xd0
[   21.558795]  print_report+0x118/0x608
[   21.559186]  kasan_report+0xdc/0x128
[   21.559340]  kasan_check_range+0x100/0x1a8
[   21.559698]  __kasan_check_read+0x20/0x30
[   21.559841]  copy_user_test_oob+0x728/0xec8
[   21.559931]  kunit_try_run_case+0x170/0x3f0
[   21.560250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.560389]  kthread+0x328/0x630
[   21.560497]  ret_from_fork+0x10/0x20
[   21.560624] 
[   21.560645] Allocated by task 285:
[   21.560712]  kasan_save_stack+0x3c/0x68
[   21.561029]  kasan_save_track+0x20/0x40
[   21.561170]  kasan_save_alloc_info+0x40/0x58
[   21.561215]  __kasan_kmalloc+0xd4/0xd8
[   21.561534]  __kmalloc_noprof+0x198/0x4c8
[   21.561623]  kunit_kmalloc_array+0x34/0x88
[   21.561681]  copy_user_test_oob+0xac/0xec8
[   21.561720]  kunit_try_run_case+0x170/0x3f0
[   21.561761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.561828]  kthread+0x328/0x630
[   21.561869]  ret_from_fork+0x10/0x20
[   21.561913] 
[   21.561937] The buggy address belongs to the object at fff00000c58a9600
[   21.561937]  which belongs to the cache kmalloc-128 of size 128
[   21.562017] The buggy address is located 0 bytes inside of
[   21.562017]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.562081] 
[   21.562104] The buggy address belongs to the physical page:
[   21.562150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.562206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.562261] page_type: f5(slab)
[   21.562306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.562359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.562401] page dumped because: kasan: bad access detected
[   21.562461] 
[   21.562490] Memory state around the buggy address:
[   21.562527]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.562572]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562626] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.562695]                                                                 ^
[   21.562761]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562813]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.562855] ==================================================================
[   21.599198] ==================================================================
[   21.599243] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.599313] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.599365] 
[   21.600012] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.600295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.600386] Hardware name: linux,dummy-virt (DT)
[   21.600917] Call trace:
[   21.601023]  show_stack+0x20/0x38 (C)
[   21.601296]  dump_stack_lvl+0x8c/0xd0
[   21.601716]  print_report+0x118/0x608
[   21.601910]  kasan_report+0xdc/0x128
[   21.602080]  kasan_check_range+0x100/0x1a8
[   21.602136]  __kasan_check_read+0x20/0x30
[   21.602183]  copy_user_test_oob+0x4a0/0xec8
[   21.602407]  kunit_try_run_case+0x170/0x3f0
[   21.602654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.603040]  kthread+0x328/0x630
[   21.603213]  ret_from_fork+0x10/0x20
[   21.603499] 
[   21.603539] Allocated by task 285:
[   21.603573]  kasan_save_stack+0x3c/0x68
[   21.603750]  kasan_save_track+0x20/0x40
[   21.603940]  kasan_save_alloc_info+0x40/0x58
[   21.604041]  __kasan_kmalloc+0xd4/0xd8
[   21.604235]  __kmalloc_noprof+0x198/0x4c8
[   21.604522]  kunit_kmalloc_array+0x34/0x88
[   21.604673]  copy_user_test_oob+0xac/0xec8
[   21.604774]  kunit_try_run_case+0x170/0x3f0
[   21.604827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.605063]  kthread+0x328/0x630
[   21.605660]  ret_from_fork+0x10/0x20
[   21.605799] 
[   21.605879] The buggy address belongs to the object at fff00000c58a9600
[   21.605879]  which belongs to the cache kmalloc-128 of size 128
[   21.606054] The buggy address is located 0 bytes inside of
[   21.606054]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.606138] 
[   21.606169] The buggy address belongs to the physical page:
[   21.606343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.606495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.606860] page_type: f5(slab)
[   21.607017] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.607492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.607777] page dumped because: kasan: bad access detected
[   21.608034] 
[   21.608214] Memory state around the buggy address:
[   21.608464]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.608702]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.608952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.609065]                                                                 ^
[   21.609503]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609603]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609647] ==================================================================
[   21.581806] ==================================================================
[   21.582290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.582626] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285
[   21.582715] 
[   21.582749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.582835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.583107] Hardware name: linux,dummy-virt (DT)
[   21.583157] Call trace:
[   21.583448]  show_stack+0x20/0x38 (C)
[   21.583729]  dump_stack_lvl+0x8c/0xd0
[   21.583868]  print_report+0x118/0x608
[   21.583979]  kasan_report+0xdc/0x128
[   21.584029]  kasan_check_range+0x100/0x1a8
[   21.584080]  __kasan_check_read+0x20/0x30
[   21.584127]  copy_user_test_oob+0x3c8/0xec8
[   21.584757]  kunit_try_run_case+0x170/0x3f0
[   21.584950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.585124]  kthread+0x328/0x630
[   21.585320]  ret_from_fork+0x10/0x20
[   21.585401] 
[   21.585717] Allocated by task 285:
[   21.585837]  kasan_save_stack+0x3c/0x68
[   21.586125]  kasan_save_track+0x20/0x40
[   21.586621]  kasan_save_alloc_info+0x40/0x58
[   21.586790]  __kasan_kmalloc+0xd4/0xd8
[   21.587330]  __kmalloc_noprof+0x198/0x4c8
[   21.587415]  kunit_kmalloc_array+0x34/0x88
[   21.587580]  copy_user_test_oob+0xac/0xec8
[   21.587660]  kunit_try_run_case+0x170/0x3f0
[   21.587702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587749]  kthread+0x328/0x630
[   21.587783]  ret_from_fork+0x10/0x20
[   21.587822] 
[   21.587844] The buggy address belongs to the object at fff00000c58a9600
[   21.587844]  which belongs to the cache kmalloc-128 of size 128
[   21.588617] The buggy address is located 0 bytes inside of
[   21.588617]  allocated 120-byte region [fff00000c58a9600, fff00000c58a9678)
[   21.588805] 
[   21.588927] The buggy address belongs to the physical page:
[   21.589205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.589269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.589539] page_type: f5(slab)
[   21.589601] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.589967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.590284] page dumped because: kasan: bad access detected
[   21.590516] 
[   21.590647] Memory state around the buggy address:
[   21.590845]  fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.590907]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.590952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.590993]                                                                 ^
[   21.591059]  fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591103]  fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   21.477865] ==================================================================
[   21.477943] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.478015] Read of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281
[   21.478070] 
[   21.478111] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.478199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.478229] Hardware name: linux,dummy-virt (DT)
[   21.478262] Call trace:
[   21.478288]  show_stack+0x20/0x38 (C)
[   21.478342]  dump_stack_lvl+0x8c/0xd0
[   21.478651]  print_report+0x118/0x608
[   21.478704]  kasan_report+0xdc/0x128
[   21.478751]  __asan_report_load8_noabort+0x20/0x30
[   21.479359]  copy_to_kernel_nofault+0x204/0x250
[   21.479469]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.479638]  kunit_try_run_case+0x170/0x3f0
[   21.479714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.479770]  kthread+0x328/0x630
[   21.480118]  ret_from_fork+0x10/0x20
[   21.480309] 
[   21.480360] Allocated by task 281:
[   21.480423]  kasan_save_stack+0x3c/0x68
[   21.480653]  kasan_save_track+0x20/0x40
[   21.480824]  kasan_save_alloc_info+0x40/0x58
[   21.481020]  __kasan_kmalloc+0xd4/0xd8
[   21.481193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.481279]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.481320]  kunit_try_run_case+0x170/0x3f0
[   21.481518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.481749]  kthread+0x328/0x630
[   21.481811]  ret_from_fork+0x10/0x20
[   21.481947] 
[   21.482028] The buggy address belongs to the object at fff00000c58a9500
[   21.482028]  which belongs to the cache kmalloc-128 of size 128
[   21.482182] The buggy address is located 0 bytes to the right of
[   21.482182]  allocated 120-byte region [fff00000c58a9500, fff00000c58a9578)
[   21.482598] 
[   21.482781] The buggy address belongs to the physical page:
[   21.482936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.483044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.483130] page_type: f5(slab)
[   21.483173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.483369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.484014] page dumped because: kasan: bad access detected
[   21.484075] 
[   21.484107] Memory state around the buggy address:
[   21.484146]  fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.484192]  fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.484481] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.484810]                                                                 ^
[   21.485305]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485388]  fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485616] ==================================================================
[   21.487116] ==================================================================
[   21.487174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.487228] Write of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281
[   21.487329] 
[   21.487377] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.487831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.487940] Hardware name: linux,dummy-virt (DT)
[   21.488042] Call trace:
[   21.488167]  show_stack+0x20/0x38 (C)
[   21.488226]  dump_stack_lvl+0x8c/0xd0
[   21.488448]  print_report+0x118/0x608
[   21.488640]  kasan_report+0xdc/0x128
[   21.488774]  kasan_check_range+0x100/0x1a8
[   21.489161]  __kasan_check_write+0x20/0x30
[   21.489377]  copy_to_kernel_nofault+0x8c/0x250
[   21.489657]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.489921]  kunit_try_run_case+0x170/0x3f0
[   21.490139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490209]  kthread+0x328/0x630
[   21.490415]  ret_from_fork+0x10/0x20
[   21.490621] 
[   21.490646] Allocated by task 281:
[   21.490679]  kasan_save_stack+0x3c/0x68
[   21.490722]  kasan_save_track+0x20/0x40
[   21.490763]  kasan_save_alloc_info+0x40/0x58
[   21.490801]  __kasan_kmalloc+0xd4/0xd8
[   21.490840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.490889]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.490930]  kunit_try_run_case+0x170/0x3f0
[   21.490979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.491025]  kthread+0x328/0x630
[   21.491058]  ret_from_fork+0x10/0x20
[   21.491104] 
[   21.491135] The buggy address belongs to the object at fff00000c58a9500
[   21.491135]  which belongs to the cache kmalloc-128 of size 128
[   21.491202] The buggy address is located 0 bytes to the right of
[   21.491202]  allocated 120-byte region [fff00000c58a9500, fff00000c58a9578)
[   21.491270] 
[   21.491290] The buggy address belongs to the physical page:
[   21.491347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   21.491436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.491867] page_type: f5(slab)
[   21.491916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.491971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.492484] page dumped because: kasan: bad access detected
[   21.492814] 
[   21.492958] Memory state around the buggy address:
[   21.493039]  fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.493213]  fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493408] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.493492]                                                                 ^
[   21.493680]  fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493923]  fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure Automatically assigned
[   21.414033] ==================================================================
[   21.414397] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   21.414564] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   21.414650] 
[   21.414689] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.415015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.415061] Hardware name: linux,dummy-virt (DT)
[   21.415096] Call trace:
[   21.415123]  show_stack+0x20/0x38 (C)
[   21.415177]  dump_stack_lvl+0x8c/0xd0
[   21.415228]  print_report+0x310/0x608
[   21.415588]  kasan_report+0xdc/0x128
[   21.415755]  __asan_report_load1_noabort+0x20/0x30
[   21.416026]  vmalloc_oob+0x578/0x5d0
[   21.416187]  kunit_try_run_case+0x170/0x3f0
[   21.416328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.416398]  kthread+0x328/0x630
[   21.416738]  ret_from_fork+0x10/0x20
[   21.416874] 
[   21.417022] The buggy address belongs to the virtual mapping at
[   21.417022]  [ffff8000800fe000, ffff800080100000) created by:
[   21.417022]  vmalloc_oob+0x98/0x5d0
[   21.417104] 
[   21.417129] The buggy address belongs to the physical page:
[   21.417338] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c4
[   21.417696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.418139] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.418458] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.418549] page dumped because: kasan: bad access detected
[   21.418725] 
[   21.418751] Memory state around the buggy address:
[   21.418912]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.419099]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.419157] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.419447]                                                              ^
[   21.419651]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.419704]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.419895] ==================================================================
[   21.421632] ==================================================================
[   21.421698] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   21.421750] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   21.421800] 
[   21.421841] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.421929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.421957] Hardware name: linux,dummy-virt (DT)
[   21.421990] Call trace:
[   21.422013]  show_stack+0x20/0x38 (C)
[   21.422073]  dump_stack_lvl+0x8c/0xd0
[   21.422125]  print_report+0x310/0x608
[   21.422171]  kasan_report+0xdc/0x128
[   21.422219]  __asan_report_load1_noabort+0x20/0x30
[   21.422267]  vmalloc_oob+0x51c/0x5d0
[   21.422313]  kunit_try_run_case+0x170/0x3f0
[   21.422364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.422419]  kthread+0x328/0x630
[   21.423084]  ret_from_fork+0x10/0x20
[   21.423162] 
[   21.423201] The buggy address belongs to the virtual mapping at
[   21.423201]  [ffff8000800fe000, ffff800080100000) created by:
[   21.423201]  vmalloc_oob+0x98/0x5d0
[   21.423411] 
[   21.423456] The buggy address belongs to the physical page:
[   21.423573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c4
[   21.423654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.423984] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.424334] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.424464] page dumped because: kasan: bad access detected
[   21.424627] 
[   21.424723] Memory state around the buggy address:
[   21.424773]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.424885]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.425029] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.425256]                                                                 ^
[   21.425465]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.425976]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.426115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   21.365133] ==================================================================
[   21.365186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.365384] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.365468] 
[   21.365561] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.365651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.365680] Hardware name: linux,dummy-virt (DT)
[   21.365769] Call trace:
[   21.365808]  show_stack+0x20/0x38 (C)
[   21.365862]  dump_stack_lvl+0x8c/0xd0
[   21.365965]  print_report+0x118/0x608
[   21.366040]  kasan_report+0xdc/0x128
[   21.366108]  __asan_report_load8_noabort+0x20/0x30
[   21.366160]  kasan_atomics_helper+0x3df4/0x4858
[   21.366210]  kasan_atomics+0x198/0x2e0
[   21.366258]  kunit_try_run_case+0x170/0x3f0
[   21.366307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.366476]  kthread+0x328/0x630
[   21.366538]  ret_from_fork+0x10/0x20
[   21.366598] 
[   21.366627] Allocated by task 265:
[   21.366660]  kasan_save_stack+0x3c/0x68
[   21.366700]  kasan_save_track+0x20/0x40
[   21.366756]  kasan_save_alloc_info+0x40/0x58
[   21.366795]  __kasan_kmalloc+0xd4/0xd8
[   21.366835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.366882]  kasan_atomics+0xb8/0x2e0
[   21.366920]  kunit_try_run_case+0x170/0x3f0
[   21.366960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.367016]  kthread+0x328/0x630
[   21.367060]  ret_from_fork+0x10/0x20
[   21.367110] 
[   21.367132] The buggy address belongs to the object at fff00000c58c1080
[   21.367132]  which belongs to the cache kmalloc-64 of size 64
[   21.367199] The buggy address is located 0 bytes to the right of
[   21.367199]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.367264] 
[   21.367287] The buggy address belongs to the physical page:
[   21.367320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.367604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.367662] page_type: f5(slab)
[   21.367702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.367762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.367805] page dumped because: kasan: bad access detected
[   21.367840] 
[   21.367860] Memory state around the buggy address:
[   21.368066]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368127]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.368172] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.368212]                                      ^
[   21.368248]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368352]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368437] ==================================================================
[   21.378183] ==================================================================
[   21.378234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.378298] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.378360] 
[   21.378393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.378493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.379121] Hardware name: linux,dummy-virt (DT)
[   21.379200] Call trace:
[   21.379228]  show_stack+0x20/0x38 (C)
[   21.379296]  dump_stack_lvl+0x8c/0xd0
[   21.379676]  print_report+0x118/0x608
[   21.379782]  kasan_report+0xdc/0x128
[   21.379870]  kasan_check_range+0x100/0x1a8
[   21.380106]  __kasan_check_write+0x20/0x30
[   21.380315]  kasan_atomics_helper+0x175c/0x4858
[   21.380451]  kasan_atomics+0x198/0x2e0
[   21.380537]  kunit_try_run_case+0x170/0x3f0
[   21.380670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.380755]  kthread+0x328/0x630
[   21.380798]  ret_from_fork+0x10/0x20
[   21.380981] 
[   21.381002] Allocated by task 265:
[   21.381032]  kasan_save_stack+0x3c/0x68
[   21.381084]  kasan_save_track+0x20/0x40
[   21.381145]  kasan_save_alloc_info+0x40/0x58
[   21.381251]  __kasan_kmalloc+0xd4/0xd8
[   21.381329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.381463]  kasan_atomics+0xb8/0x2e0
[   21.381551]  kunit_try_run_case+0x170/0x3f0
[   21.381767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.382031]  kthread+0x328/0x630
[   21.382115]  ret_from_fork+0x10/0x20
[   21.382224] 
[   21.382272] The buggy address belongs to the object at fff00000c58c1080
[   21.382272]  which belongs to the cache kmalloc-64 of size 64
[   21.382551] The buggy address is located 0 bytes to the right of
[   21.382551]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.382702] 
[   21.382770] The buggy address belongs to the physical page:
[   21.382839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.382897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.382949] page_type: f5(slab)
[   21.383174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.383304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.383359] page dumped because: kasan: bad access detected
[   21.383588] 
[   21.383731] Memory state around the buggy address:
[   21.383800]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383906]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.383993] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.384076]                                      ^
[   21.384114]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.384261]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.384383] ==================================================================
[   21.054656] ==================================================================
[   21.054944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.055060] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.055135] 
[   21.055170] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.055551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.055607] Hardware name: linux,dummy-virt (DT)
[   21.055646] Call trace:
[   21.055670]  show_stack+0x20/0x38 (C)
[   21.055725]  dump_stack_lvl+0x8c/0xd0
[   21.055776]  print_report+0x118/0x608
[   21.055826]  kasan_report+0xdc/0x128
[   21.055874]  kasan_check_range+0x100/0x1a8
[   21.055924]  __kasan_check_write+0x20/0x30
[   21.055971]  kasan_atomics_helper+0xa04/0x4858
[   21.056022]  kasan_atomics+0x198/0x2e0
[   21.056067]  kunit_try_run_case+0x170/0x3f0
[   21.056117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.056449]  __kasan_kmalloc+0xd4/0xd8
[   21.056704]  kunit_try_run_case+0x170/0x3f0
[   21.057281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057334]  kthread+0x328/0x630
[   21.057369]  ret_from_fork+0x10/0x20
[   21.057410] 
[   21.057446] The buggy address belongs to the object at fff00000c58c1080
[   21.057446]  which belongs to the cache kmalloc-64 of size 64
[   21.057504] The buggy address is located 0 bytes to the right of
[   21.057504]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.057569] 
[   21.059073] The buggy address belongs to the physical page:
[   21.059641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.059910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.060263] page_type: f5(slab)
[   21.060303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.060779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.061174] page dumped because: kasan: bad access detected
[   21.061490] 
[   21.061515] Memory state around the buggy address:
[   21.061897]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.062671]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.062725] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.063230]                                      ^
[   21.063530]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.063897]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.063940] ==================================================================
[   21.085344] ==================================================================
[   21.085409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.085482] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.085535] 
[   21.085570] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.087732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.088279] Hardware name: linux,dummy-virt (DT)
[   21.088325] Call trace:
[   21.088357]  show_stack+0x20/0x38 (C)
[   21.088413]  dump_stack_lvl+0x8c/0xd0
[   21.088952]  print_report+0x118/0x608
[   21.089078]  kasan_report+0xdc/0x128
[   21.089595]  kasan_check_range+0x100/0x1a8
[   21.090249]  __kasan_check_write+0x20/0x30
[   21.090631]  kasan_atomics_helper+0xad4/0x4858
[   21.090693]  kasan_atomics+0x198/0x2e0
[   21.090743]  kunit_try_run_case+0x170/0x3f0
[   21.090804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091590]  kthread+0x328/0x630
[   21.092150]  ret_from_fork+0x10/0x20
[   21.092625] 
[   21.092654] Allocated by task 265:
[   21.092691]  kasan_save_stack+0x3c/0x68
[   21.095746] 
[   21.096114] The buggy address belongs to the object at fff00000c58c1080
[   21.096114]  which belongs to the cache kmalloc-64 of size 64
[   21.096656] The buggy address is located 0 bytes to the right of
[   21.096656]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.097150] 
[   21.097238] The buggy address belongs to the physical page:
[   21.097531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.098011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.099065] page_type: f5(slab)
[   21.099174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.099629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.099820] page dumped because: kasan: bad access detected
[   21.099857] 
[   21.100164] Memory state around the buggy address:
[   21.100556]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.100679]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.100741] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.100783]                                      ^
[   21.102251]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102668]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106224] ==================================================================
[   21.067298] ==================================================================
[   21.067649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.068157] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.068565] 
[   21.068605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.068699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.068729] Hardware name: linux,dummy-virt (DT)
[   21.068763] Call trace:
[   21.069796]  show_stack+0x20/0x38 (C)
[   21.070171]  dump_stack_lvl+0x8c/0xd0
[   21.070259]  print_report+0x118/0x608
[   21.070310]  kasan_report+0xdc/0x128
[   21.071153]  kasan_check_range+0x100/0x1a8
[   21.071307]  __kasan_check_write+0x20/0x30
[   21.071361]  kasan_atomics_helper+0xa6c/0x4858
[   21.071412]  kasan_atomics+0x198/0x2e0
[   21.072051]  kunit_try_run_case+0x170/0x3f0
[   21.072117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.072218]  kthread+0x328/0x630
[   21.072262]  ret_from_fork+0x10/0x20
[   21.072866] 
[   21.072942] Allocated by task 265:
[   21.072976]  kasan_save_stack+0x3c/0x68
[   21.073418]  kasan_save_track+0x20/0x40
[   21.073828]  kasan_save_alloc_info+0x40/0x58
[   21.074407]  __kasan_kmalloc+0xd4/0xd8
[   21.074770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.074876]  kasan_atomics+0xb8/0x2e0
[   21.074972]  kunit_try_run_case+0x170/0x3f0
[   21.075015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.075061]  kthread+0x328/0x630
[   21.075095]  ret_from_fork+0x10/0x20
[   21.075919] 
[   21.076053] The buggy address belongs to the object at fff00000c58c1080
[   21.076053]  which belongs to the cache kmalloc-64 of size 64
[   21.076403] The buggy address is located 0 bytes to the right of
[   21.076403]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.076488] 
[   21.076514] The buggy address belongs to the physical page:
[   21.076547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.076604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078157] page_type: f5(slab)
[   21.078296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.079012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.079861] page dumped because: kasan: bad access detected
[   21.080054] 
[   21.080076] Memory state around the buggy address:
[   21.080156]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.080220]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.080265] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.080305]                                      ^
[   21.081373]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081579]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081880] ==================================================================
[   21.227320] ==================================================================
[   21.227418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.227785] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.228419] 
[   21.228781] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.228955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.229067] Hardware name: linux,dummy-virt (DT)
[   21.229218] Call trace:
[   21.229310]  show_stack+0x20/0x38 (C)
[   21.229643]  dump_stack_lvl+0x8c/0xd0
[   21.229991]  print_report+0x118/0x608
[   21.230165]  kasan_report+0xdc/0x128
[   21.230251]  kasan_check_range+0x100/0x1a8
[   21.230440]  __kasan_check_write+0x20/0x30
[   21.230740]  kasan_atomics_helper+0xeb8/0x4858
[   21.230968]  kasan_atomics+0x198/0x2e0
[   21.231217]  kunit_try_run_case+0x170/0x3f0
[   21.231525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.231722]  kthread+0x328/0x630
[   21.231830]  ret_from_fork+0x10/0x20
[   21.232150] 
[   21.232269] Allocated by task 265:
[   21.232345]  kasan_save_stack+0x3c/0x68
[   21.232768]  kasan_save_track+0x20/0x40
[   21.233028]  kasan_save_alloc_info+0x40/0x58
[   21.233401]  __kasan_kmalloc+0xd4/0xd8
[   21.233613]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.233945]  kasan_atomics+0xb8/0x2e0
[   21.234073]  kunit_try_run_case+0x170/0x3f0
[   21.234214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.234269]  kthread+0x328/0x630
[   21.234306]  ret_from_fork+0x10/0x20
[   21.234349] 
[   21.234377] The buggy address belongs to the object at fff00000c58c1080
[   21.234377]  which belongs to the cache kmalloc-64 of size 64
[   21.234450] The buggy address is located 0 bytes to the right of
[   21.234450]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.234541] 
[   21.234563] The buggy address belongs to the physical page:
[   21.234606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.234659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.234710] page_type: f5(slab)
[   21.234751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.234803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.234846] page dumped because: kasan: bad access detected
[   21.234878] 
[   21.234898] Memory state around the buggy address:
[   21.234946]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235006]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.235059] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.235106]                                      ^
[   21.235139]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235199]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235240] ==================================================================
[   21.207150] ==================================================================
[   21.207377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.207868] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.208036] 
[   21.208106] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.208221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.208250] Hardware name: linux,dummy-virt (DT)
[   21.208665] Call trace:
[   21.208804]  show_stack+0x20/0x38 (C)
[   21.209129]  dump_stack_lvl+0x8c/0xd0
[   21.209247]  print_report+0x118/0x608
[   21.209335]  kasan_report+0xdc/0x128
[   21.209475]  kasan_check_range+0x100/0x1a8
[   21.209525]  __kasan_check_write+0x20/0x30
[   21.209908]  kasan_atomics_helper+0xe44/0x4858
[   21.210350]  kasan_atomics+0x198/0x2e0
[   21.210498]  kunit_try_run_case+0x170/0x3f0
[   21.210607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.210687]  kthread+0x328/0x630
[   21.210922]  ret_from_fork+0x10/0x20
[   21.211167] 
[   21.211365] Allocated by task 265:
[   21.211464]  kasan_save_stack+0x3c/0x68
[   21.211618]  kasan_save_track+0x20/0x40
[   21.211969]  kasan_save_alloc_info+0x40/0x58
[   21.212207]  __kasan_kmalloc+0xd4/0xd8
[   21.212436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.212681]  kasan_atomics+0xb8/0x2e0
[   21.212844]  kunit_try_run_case+0x170/0x3f0
[   21.213037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.213633]  kthread+0x328/0x630
[   21.213821]  ret_from_fork+0x10/0x20
[   21.214002] 
[   21.214060] The buggy address belongs to the object at fff00000c58c1080
[   21.214060]  which belongs to the cache kmalloc-64 of size 64
[   21.214266] The buggy address is located 0 bytes to the right of
[   21.214266]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.214348] 
[   21.214388] The buggy address belongs to the physical page:
[   21.214421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.214483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.214578] page_type: f5(slab)
[   21.214621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.214673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.214730] page dumped because: kasan: bad access detected
[   21.214783] 
[   21.214805] Memory state around the buggy address:
[   21.214839]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.214885]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.214937] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.214993]                                      ^
[   21.215043]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215096]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215137] ==================================================================
[   21.236878] ==================================================================
[   21.237328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.237398] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.237632] 
[   21.237677] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.238068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.238270] Hardware name: linux,dummy-virt (DT)
[   21.238311] Call trace:
[   21.238571]  show_stack+0x20/0x38 (C)
[   21.238641]  dump_stack_lvl+0x8c/0xd0
[   21.238853]  print_report+0x118/0x608
[   21.239035]  kasan_report+0xdc/0x128
[   21.239272]  kasan_check_range+0x100/0x1a8
[   21.239347]  __kasan_check_write+0x20/0x30
[   21.239547]  kasan_atomics_helper+0xf20/0x4858
[   21.239597]  kasan_atomics+0x198/0x2e0
[   21.239646]  kunit_try_run_case+0x170/0x3f0
[   21.240191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.240523]  kthread+0x328/0x630
[   21.240715]  ret_from_fork+0x10/0x20
[   21.240821] 
[   21.240955] Allocated by task 265:
[   21.241060]  kasan_save_stack+0x3c/0x68
[   21.241260]  kasan_save_track+0x20/0x40
[   21.241331]  kasan_save_alloc_info+0x40/0x58
[   21.241448]  __kasan_kmalloc+0xd4/0xd8
[   21.241502]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.241546]  kasan_atomics+0xb8/0x2e0
[   21.241935]  kunit_try_run_case+0x170/0x3f0
[   21.242282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.242439]  kthread+0x328/0x630
[   21.242686]  ret_from_fork+0x10/0x20
[   21.242853] 
[   21.243040] The buggy address belongs to the object at fff00000c58c1080
[   21.243040]  which belongs to the cache kmalloc-64 of size 64
[   21.243239] The buggy address is located 0 bytes to the right of
[   21.243239]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.243311] 
[   21.243334] The buggy address belongs to the physical page:
[   21.243615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.243796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.244025] page_type: f5(slab)
[   21.244241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.244301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.244555] page dumped because: kasan: bad access detected
[   21.244751] 
[   21.244828] Memory state around the buggy address:
[   21.244890]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.245095]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.245533] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.245954]                                      ^
[   21.246085]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246215]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246382] ==================================================================
[   21.216773] ==================================================================
[   21.216832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.217281] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.217365] 
[   21.217400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.217590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217662] Hardware name: linux,dummy-virt (DT)
[   21.217696] Call trace:
[   21.217721]  show_stack+0x20/0x38 (C)
[   21.217773]  dump_stack_lvl+0x8c/0xd0
[   21.218336]  print_report+0x118/0x608
[   21.218495]  kasan_report+0xdc/0x128
[   21.218558]  __asan_report_store8_noabort+0x20/0x30
[   21.218726]  kasan_atomics_helper+0x3e5c/0x4858
[   21.218787]  kasan_atomics+0x198/0x2e0
[   21.218834]  kunit_try_run_case+0x170/0x3f0
[   21.218901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.218956]  kthread+0x328/0x630
[   21.219395]  ret_from_fork+0x10/0x20
[   21.219479] 
[   21.219925] Allocated by task 265:
[   21.220118]  kasan_save_stack+0x3c/0x68
[   21.220363]  kasan_save_track+0x20/0x40
[   21.220436]  kasan_save_alloc_info+0x40/0x58
[   21.220477]  __kasan_kmalloc+0xd4/0xd8
[   21.220538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.220905]  kasan_atomics+0xb8/0x2e0
[   21.221157]  kunit_try_run_case+0x170/0x3f0
[   21.221323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.221450]  kthread+0x328/0x630
[   21.221700]  ret_from_fork+0x10/0x20
[   21.221951] 
[   21.222172] The buggy address belongs to the object at fff00000c58c1080
[   21.222172]  which belongs to the cache kmalloc-64 of size 64
[   21.222561] The buggy address is located 0 bytes to the right of
[   21.222561]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.222929] 
[   21.222958] The buggy address belongs to the physical page:
[   21.223077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.223339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.223793] page_type: f5(slab)
[   21.223856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.224054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.224234] page dumped because: kasan: bad access detected
[   21.224359] 
[   21.224621] Memory state around the buggy address:
[   21.224846]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.224917]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.225123] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.225454]                                      ^
[   21.225542]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.225643]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.225825] ==================================================================
[   21.249245] ==================================================================
[   21.249358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.249450] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.249796] 
[   21.249941] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.250236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.250440] Hardware name: linux,dummy-virt (DT)
[   21.250498] Call trace:
[   21.250601]  show_stack+0x20/0x38 (C)
[   21.250666]  dump_stack_lvl+0x8c/0xd0
[   21.250718]  print_report+0x118/0x608
[   21.250774]  kasan_report+0xdc/0x128
[   21.250821]  kasan_check_range+0x100/0x1a8
[   21.251055]  __kasan_check_write+0x20/0x30
[   21.251119]  kasan_atomics_helper+0xf88/0x4858
[   21.251172]  kasan_atomics+0x198/0x2e0
[   21.251219]  kunit_try_run_case+0x170/0x3f0
[   21.251658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.251739]  kthread+0x328/0x630
[   21.251786]  ret_from_fork+0x10/0x20
[   21.251943] 
[   21.252229] Allocated by task 265:
[   21.252268]  kasan_save_stack+0x3c/0x68
[   21.252314]  kasan_save_track+0x20/0x40
[   21.252354]  kasan_save_alloc_info+0x40/0x58
[   21.252394]  __kasan_kmalloc+0xd4/0xd8
[   21.252444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.252486]  kasan_atomics+0xb8/0x2e0
[   21.252535]  kunit_try_run_case+0x170/0x3f0
[   21.252586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.252632]  kthread+0x328/0x630
[   21.252665]  ret_from_fork+0x10/0x20
[   21.252704] 
[   21.252725] The buggy address belongs to the object at fff00000c58c1080
[   21.252725]  which belongs to the cache kmalloc-64 of size 64
[   21.252785] The buggy address is located 0 bytes to the right of
[   21.252785]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.252869] 
[   21.252911] The buggy address belongs to the physical page:
[   21.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.253006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.253067] page_type: f5(slab)
[   21.253108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.253167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.253211] page dumped because: kasan: bad access detected
[   21.253243] 
[   21.253279] Memory state around the buggy address:
[   21.253313]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253368]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.253414] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.253464]                                      ^
[   21.253499]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253552]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253592] ==================================================================
[   21.033271] ==================================================================
[   21.033322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.033374] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.033461] 
[   21.033497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.033582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033611] Hardware name: linux,dummy-virt (DT)
[   21.033644] Call trace:
[   21.033668]  show_stack+0x20/0x38 (C)
[   21.033717]  dump_stack_lvl+0x8c/0xd0
[   21.033768]  print_report+0x118/0x608
[   21.033815]  kasan_report+0xdc/0x128
[   21.033863]  __asan_report_load4_noabort+0x20/0x30
[   21.033913]  kasan_atomics_helper+0x42d8/0x4858
[   21.033962]  kasan_atomics+0x198/0x2e0
[   21.034009]  kunit_try_run_case+0x170/0x3f0
[   21.034059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.034113]  kthread+0x328/0x630
[   21.034155]  ret_from_fork+0x10/0x20
[   21.034203] 
[   21.034223] Allocated by task 265:
[   21.034253]  kasan_save_stack+0x3c/0x68
[   21.034371]  __kasan_kmalloc+0xd4/0xd8
[   21.038304] The buggy address belongs to the object at fff00000c58c1080
[   21.038304]  which belongs to the cache kmalloc-64 of size 64
[   21.038470] The buggy address is located 0 bytes to the right of
[   21.038470]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.039861]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040166]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.042398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.043286]  __kasan_check_write+0x20/0x30
[   21.043511]  kunit_try_run_case+0x170/0x3f0
[   21.043602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.043723]  kthread+0x328/0x630
[   21.043769]  ret_from_fork+0x10/0x20
[   21.044064] 
[   21.044179] Allocated by task 265:
[   21.044237]  kasan_save_stack+0x3c/0x68
[   21.044343]  kasan_save_track+0x20/0x40
[   21.044386]  kasan_save_alloc_info+0x40/0x58
[   21.044435]  __kasan_kmalloc+0xd4/0xd8
[   21.044491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.044533]  kasan_atomics+0xb8/0x2e0
[   21.044570]  kunit_try_run_case+0x170/0x3f0
[   21.044611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.044670]  kthread+0x328/0x630
[   21.044705]  ret_from_fork+0x10/0x20
[   21.044743] 
[   21.044775] The buggy address belongs to the object at fff00000c58c1080
[   21.044775]  which belongs to the cache kmalloc-64 of size 64
[   21.044854] The buggy address is located 0 bytes to the right of
[   21.044854]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.044918] 
[   21.044946] The buggy address belongs to the physical page:
[   21.044995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.045059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.045110] page_type: f5(slab)
[   21.045178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.045247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.045289] page dumped because: kasan: bad access detected
[   21.045322] 
[   21.045343] Memory state around the buggy address:
[   21.045384]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045453]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.045499] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.045540]                                      ^
[   21.045591]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045644]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045693] ==================================================================
[   21.369077] ==================================================================
[   21.369169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.369224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.369278] 
[   21.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.369480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.369524] Hardware name: linux,dummy-virt (DT)
[   21.369785] Call trace:
[   21.369842]  show_stack+0x20/0x38 (C)
[   21.369913]  dump_stack_lvl+0x8c/0xd0
[   21.369980]  print_report+0x118/0x608
[   21.370046]  kasan_report+0xdc/0x128
[   21.370269]  kasan_check_range+0x100/0x1a8
[   21.370339]  __kasan_check_write+0x20/0x30
[   21.370461]  kasan_atomics_helper+0x16d0/0x4858
[   21.370515]  kasan_atomics+0x198/0x2e0
[   21.370569]  kunit_try_run_case+0x170/0x3f0
[   21.370672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.370749]  kthread+0x328/0x630
[   21.370794]  ret_from_fork+0x10/0x20
[   21.370889] 
[   21.370919] Allocated by task 265:
[   21.370951]  kasan_save_stack+0x3c/0x68
[   21.371000]  kasan_save_track+0x20/0x40
[   21.371234]  kasan_save_alloc_info+0x40/0x58
[   21.371339]  __kasan_kmalloc+0xd4/0xd8
[   21.371442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.371543]  kasan_atomics+0xb8/0x2e0
[   21.371633]  kunit_try_run_case+0x170/0x3f0
[   21.371906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.371998]  kthread+0x328/0x630
[   21.372125]  ret_from_fork+0x10/0x20
[   21.372192] 
[   21.372304] The buggy address belongs to the object at fff00000c58c1080
[   21.372304]  which belongs to the cache kmalloc-64 of size 64
[   21.372373] The buggy address is located 0 bytes to the right of
[   21.372373]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.372452] 
[   21.372476] The buggy address belongs to the physical page:
[   21.372509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.372648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.372729] page_type: f5(slab)
[   21.372859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.373130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.373241] page dumped because: kasan: bad access detected
[   21.373322] 
[   21.373441] Memory state around the buggy address:
[   21.373515]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.373565]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.373794] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.373912]                                      ^
[   21.373969]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374083]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374172] ==================================================================
[   21.344405] ==================================================================
[   21.344486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.344541] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.344609] 
[   21.344805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.344906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.345131] Hardware name: linux,dummy-virt (DT)
[   21.345170] Call trace:
[   21.345321]  show_stack+0x20/0x38 (C)
[   21.345391]  dump_stack_lvl+0x8c/0xd0
[   21.345465]  print_report+0x118/0x608
[   21.345793]  kasan_report+0xdc/0x128
[   21.345875]  kasan_check_range+0x100/0x1a8
[   21.345927]  __kasan_check_write+0x20/0x30
[   21.346076]  kasan_atomics_helper+0x15b4/0x4858
[   21.346128]  kasan_atomics+0x198/0x2e0
[   21.346178]  kunit_try_run_case+0x170/0x3f0
[   21.346225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.346281]  kthread+0x328/0x630
[   21.346324]  ret_from_fork+0x10/0x20
[   21.346589] 
[   21.346866] Allocated by task 265:
[   21.346908]  kasan_save_stack+0x3c/0x68
[   21.346963]  kasan_save_track+0x20/0x40
[   21.347013]  kasan_save_alloc_info+0x40/0x58
[   21.347061]  __kasan_kmalloc+0xd4/0xd8
[   21.347199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.347243]  kasan_atomics+0xb8/0x2e0
[   21.347322]  kunit_try_run_case+0x170/0x3f0
[   21.347372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347562]  kthread+0x328/0x630
[   21.347651]  ret_from_fork+0x10/0x20
[   21.347701] 
[   21.347729] The buggy address belongs to the object at fff00000c58c1080
[   21.347729]  which belongs to the cache kmalloc-64 of size 64
[   21.347789] The buggy address is located 0 bytes to the right of
[   21.347789]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.347855] 
[   21.347876] The buggy address belongs to the physical page:
[   21.347908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.347961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.348010] page_type: f5(slab)
[   21.348050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.348515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.348600] page dumped because: kasan: bad access detected
[   21.348891] 
[   21.349033] Memory state around the buggy address:
[   21.349118]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349171]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.349399] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.349620]                                      ^
[   21.349693]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349889]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349936] ==================================================================
[   21.177274] ==================================================================
[   21.177329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.177380] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.177660] 
[   21.177751] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.177857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.177940] Hardware name: linux,dummy-virt (DT)
[   21.177974] Call trace:
[   21.178014]  show_stack+0x20/0x38 (C)
[   21.178075]  dump_stack_lvl+0x8c/0xd0
[   21.178123]  print_report+0x118/0x608
[   21.178335]  kasan_report+0xdc/0x128
[   21.178501]  kasan_check_range+0x100/0x1a8
[   21.178563]  __kasan_check_write+0x20/0x30
[   21.178612]  kasan_atomics_helper+0xd3c/0x4858
[   21.178679]  kasan_atomics+0x198/0x2e0
[   21.178793]  kunit_try_run_case+0x170/0x3f0
[   21.178872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.178930]  kthread+0x328/0x630
[   21.179131]  ret_from_fork+0x10/0x20
[   21.179194] 
[   21.179234] Allocated by task 265:
[   21.179274]  kasan_save_stack+0x3c/0x68
[   21.179319]  kasan_save_track+0x20/0x40
[   21.179371]  kasan_save_alloc_info+0x40/0x58
[   21.179497]  __kasan_kmalloc+0xd4/0xd8
[   21.179849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.179952]  kasan_atomics+0xb8/0x2e0
[   21.180022]  kunit_try_run_case+0x170/0x3f0
[   21.180193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.180376]  kthread+0x328/0x630
[   21.180453]  ret_from_fork+0x10/0x20
[   21.180515] 
[   21.180635] The buggy address belongs to the object at fff00000c58c1080
[   21.180635]  which belongs to the cache kmalloc-64 of size 64
[   21.180740] The buggy address is located 0 bytes to the right of
[   21.180740]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.181124] 
[   21.181176] The buggy address belongs to the physical page:
[   21.181252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.181307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.181528] page_type: f5(slab)
[   21.181631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.181773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.181852] page dumped because: kasan: bad access detected
[   21.182084] 
[   21.182196] Memory state around the buggy address:
[   21.182233]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.182515]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.182685] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.182782]                                      ^
[   21.183077]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183217]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183260] ==================================================================
[   21.360014] ==================================================================
[   21.360123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.360199] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.360321] 
[   21.360378] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.360481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.360583] Hardware name: linux,dummy-virt (DT)
[   21.360643] Call trace:
[   21.360670]  show_stack+0x20/0x38 (C)
[   21.360721]  dump_stack_lvl+0x8c/0xd0
[   21.360963]  print_report+0x118/0x608
[   21.361057]  kasan_report+0xdc/0x128
[   21.361117]  kasan_check_range+0x100/0x1a8
[   21.361182]  __kasan_check_write+0x20/0x30
[   21.361247]  kasan_atomics_helper+0x1644/0x4858
[   21.361299]  kasan_atomics+0x198/0x2e0
[   21.361552]  kunit_try_run_case+0x170/0x3f0
[   21.361642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.361745]  kthread+0x328/0x630
[   21.361791]  ret_from_fork+0x10/0x20
[   21.361847] 
[   21.361929] Allocated by task 265:
[   21.361969]  kasan_save_stack+0x3c/0x68
[   21.362013]  kasan_save_track+0x20/0x40
[   21.362060]  kasan_save_alloc_info+0x40/0x58
[   21.362117]  __kasan_kmalloc+0xd4/0xd8
[   21.362159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.362201]  kasan_atomics+0xb8/0x2e0
[   21.362240]  kunit_try_run_case+0x170/0x3f0
[   21.362407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.362504]  kthread+0x328/0x630
[   21.362587]  ret_from_fork+0x10/0x20
[   21.362645] 
[   21.362696] The buggy address belongs to the object at fff00000c58c1080
[   21.362696]  which belongs to the cache kmalloc-64 of size 64
[   21.362899] The buggy address is located 0 bytes to the right of
[   21.362899]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.363013] 
[   21.363141] The buggy address belongs to the physical page:
[   21.363197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.363279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.363331] page_type: f5(slab)
[   21.363371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.363434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.363643] page dumped because: kasan: bad access detected
[   21.363800] 
[   21.363860] Memory state around the buggy address:
[   21.363906]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364251]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.364340] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.364497]                                      ^
[   21.364538]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364583]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364624] ==================================================================
[   21.321295] ==================================================================
[   21.321347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.321397] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.321464] 
[   21.321495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.321580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.321608] Hardware name: linux,dummy-virt (DT)
[   21.321640] Call trace:
[   21.321664]  show_stack+0x20/0x38 (C)
[   21.321712]  dump_stack_lvl+0x8c/0xd0
[   21.321763]  print_report+0x118/0x608
[   21.321810]  kasan_report+0xdc/0x128
[   21.321858]  __asan_report_load8_noabort+0x20/0x30
[   21.321907]  kasan_atomics_helper+0x3f04/0x4858
[   21.321957]  kasan_atomics+0x198/0x2e0
[   21.322004]  kunit_try_run_case+0x170/0x3f0
[   21.322055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.322120]  kthread+0x328/0x630
[   21.322168]  ret_from_fork+0x10/0x20
[   21.322218] 
[   21.322239] Allocated by task 265:
[   21.322278]  kasan_save_stack+0x3c/0x68
[   21.322320]  kasan_save_track+0x20/0x40
[   21.322367]  kasan_save_alloc_info+0x40/0x58
[   21.322406]  __kasan_kmalloc+0xd4/0xd8
[   21.322455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.322496]  kasan_atomics+0xb8/0x2e0
[   21.322533]  kunit_try_run_case+0x170/0x3f0
[   21.322573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.322618]  kthread+0x328/0x630
[   21.322651]  ret_from_fork+0x10/0x20
[   21.322689] 
[   21.322710] The buggy address belongs to the object at fff00000c58c1080
[   21.322710]  which belongs to the cache kmalloc-64 of size 64
[   21.322768] The buggy address is located 0 bytes to the right of
[   21.322768]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.322834] 
[   21.322855] The buggy address belongs to the physical page:
[   21.322887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.322939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.322995] page_type: f5(slab)
[   21.323051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.323104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.323210] page dumped because: kasan: bad access detected
[   21.323261] 
[   21.323300] Memory state around the buggy address:
[   21.323437]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323504]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.323547] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.323588]                                      ^
[   21.323622]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323666]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323707] ==================================================================
[   21.285214] ==================================================================
[   21.285269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.285321] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.285841] 
[   21.285894] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.285986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.286014] Hardware name: linux,dummy-virt (DT)
[   21.286048] Call trace:
[   21.286124]  show_stack+0x20/0x38 (C)
[   21.286178]  dump_stack_lvl+0x8c/0xd0
[   21.286514]  print_report+0x118/0x608
[   21.286611]  kasan_report+0xdc/0x128
[   21.286666]  kasan_check_range+0x100/0x1a8
[   21.287052]  __kasan_check_write+0x20/0x30
[   21.287858]  kasan_atomics_helper+0x1128/0x4858
[   21.289469]  kasan_atomics+0x198/0x2e0
[   21.289530]  kunit_try_run_case+0x170/0x3f0
[   21.289583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.289639]  kthread+0x328/0x630
[   21.289682]  ret_from_fork+0x10/0x20
[   21.289733] 
[   21.289754] Allocated by task 265:
[   21.289783]  kasan_save_stack+0x3c/0x68
[   21.289828]  kasan_save_track+0x20/0x40
[   21.289866]  kasan_save_alloc_info+0x40/0x58
[   21.289903]  __kasan_kmalloc+0xd4/0xd8
[   21.289945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.289988]  kasan_atomics+0xb8/0x2e0
[   21.290026]  kunit_try_run_case+0x170/0x3f0
[   21.290066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.290112]  kthread+0x328/0x630
[   21.290147]  ret_from_fork+0x10/0x20
[   21.290185] 
[   21.290206] The buggy address belongs to the object at fff00000c58c1080
[   21.290206]  which belongs to the cache kmalloc-64 of size 64
[   21.290266] The buggy address is located 0 bytes to the right of
[   21.290266]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.290330] 
[   21.290354] The buggy address belongs to the physical page:
[   21.290388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.290455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.290506] page_type: f5(slab)
[   21.290548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.290603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.290645] page dumped because: kasan: bad access detected
[   21.290680] 
[   21.290699] Memory state around the buggy address:
[   21.290734]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290777]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.290822] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.290861]                                      ^
[   21.290895]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290939]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290979] ==================================================================
[   21.323904] ==================================================================
[   21.323949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.323998] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.324050] 
[   21.324079] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.324195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.324232] Hardware name: linux,dummy-virt (DT)
[   21.324281] Call trace:
[   21.324330]  show_stack+0x20/0x38 (C)
[   21.324379]  dump_stack_lvl+0x8c/0xd0
[   21.324475]  print_report+0x118/0x608
[   21.324541]  kasan_report+0xdc/0x128
[   21.324605]  kasan_check_range+0x100/0x1a8
[   21.324656]  __kasan_check_write+0x20/0x30
[   21.324702]  kasan_atomics_helper+0x1414/0x4858
[   21.325007]  kasan_atomics+0x198/0x2e0
[   21.325072]  kunit_try_run_case+0x170/0x3f0
[   21.325139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.325212]  kthread+0x328/0x630
[   21.325271]  ret_from_fork+0x10/0x20
[   21.325349] 
[   21.325469] Allocated by task 265:
[   21.325507]  kasan_save_stack+0x3c/0x68
[   21.325565]  kasan_save_track+0x20/0x40
[   21.325608]  kasan_save_alloc_info+0x40/0x58
[   21.325685]  __kasan_kmalloc+0xd4/0xd8
[   21.325783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.325859]  kasan_atomics+0xb8/0x2e0
[   21.325898]  kunit_try_run_case+0x170/0x3f0
[   21.325938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326150]  kthread+0x328/0x630
[   21.326317]  ret_from_fork+0x10/0x20
[   21.326356] 
[   21.326378] The buggy address belongs to the object at fff00000c58c1080
[   21.326378]  which belongs to the cache kmalloc-64 of size 64
[   21.326469] The buggy address is located 0 bytes to the right of
[   21.326469]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.326554] 
[   21.326594] The buggy address belongs to the physical page:
[   21.326798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.326882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.326963] page_type: f5(slab)
[   21.327037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.327154] page dumped because: kasan: bad access detected
[   21.327204] 
[   21.327244] Memory state around the buggy address:
[   21.327277]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327369]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.327460] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.327501]                                      ^
[   21.327533]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327800]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327841] ==================================================================
[   21.183571] ==================================================================
[   21.183622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.183672] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.183991] 
[   21.184086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.184374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.184442] Hardware name: linux,dummy-virt (DT)
[   21.184486] Call trace:
[   21.184510]  show_stack+0x20/0x38 (C)
[   21.184570]  dump_stack_lvl+0x8c/0xd0
[   21.184675]  print_report+0x118/0x608
[   21.184727]  kasan_report+0xdc/0x128
[   21.184776]  __asan_report_load4_noabort+0x20/0x30
[   21.184838]  kasan_atomics_helper+0x3e04/0x4858
[   21.184890]  kasan_atomics+0x198/0x2e0
[   21.184942]  kunit_try_run_case+0x170/0x3f0
[   21.184993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185053]  kthread+0x328/0x630
[   21.185097]  ret_from_fork+0x10/0x20
[   21.185156] 
[   21.185177] Allocated by task 265:
[   21.185208]  kasan_save_stack+0x3c/0x68
[   21.185251]  kasan_save_track+0x20/0x40
[   21.185300]  kasan_save_alloc_info+0x40/0x58
[   21.185339]  __kasan_kmalloc+0xd4/0xd8
[   21.185386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.185561]  kasan_atomics+0xb8/0x2e0
[   21.185862]  kunit_try_run_case+0x170/0x3f0
[   21.185933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185989]  kthread+0x328/0x630
[   21.186073]  ret_from_fork+0x10/0x20
[   21.186144] 
[   21.186183] The buggy address belongs to the object at fff00000c58c1080
[   21.186183]  which belongs to the cache kmalloc-64 of size 64
[   21.186530] The buggy address is located 0 bytes to the right of
[   21.186530]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.186611] 
[   21.186632] The buggy address belongs to the physical page:
[   21.186664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.186717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186768] page_type: f5(slab)
[   21.186809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.186861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.186903] page dumped because: kasan: bad access detected
[   21.186935] 
[   21.186956] Memory state around the buggy address:
[   21.186988]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187032]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187076] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.187117]                                      ^
[   21.187150]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187194]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187235] ==================================================================
[   21.171686] ==================================================================
[   21.171827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.171883] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.171935] 
[   21.171965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.172307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.172357] Hardware name: linux,dummy-virt (DT)
[   21.172454] Call trace:
[   21.172501]  show_stack+0x20/0x38 (C)
[   21.172587]  dump_stack_lvl+0x8c/0xd0
[   21.172857]  print_report+0x118/0x608
[   21.172974]  kasan_report+0xdc/0x128
[   21.173044]  __asan_report_load4_noabort+0x20/0x30
[   21.173097]  kasan_atomics_helper+0x3dd8/0x4858
[   21.173153]  kasan_atomics+0x198/0x2e0
[   21.173265]  kunit_try_run_case+0x170/0x3f0
[   21.173319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.173535]  kthread+0x328/0x630
[   21.173597]  ret_from_fork+0x10/0x20
[   21.173768] 
[   21.173796] Allocated by task 265:
[   21.173849]  kasan_save_stack+0x3c/0x68
[   21.173902]  kasan_save_track+0x20/0x40
[   21.174132]  kasan_save_alloc_info+0x40/0x58
[   21.174206]  __kasan_kmalloc+0xd4/0xd8
[   21.174301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.174347]  kasan_atomics+0xb8/0x2e0
[   21.174383]  kunit_try_run_case+0x170/0x3f0
[   21.174437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.174484]  kthread+0x328/0x630
[   21.174517]  ret_from_fork+0x10/0x20
[   21.174786] 
[   21.174901] The buggy address belongs to the object at fff00000c58c1080
[   21.174901]  which belongs to the cache kmalloc-64 of size 64
[   21.174984] The buggy address is located 0 bytes to the right of
[   21.174984]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.175269] 
[   21.175304] The buggy address belongs to the physical page:
[   21.175337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.175393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.175604] page_type: f5(slab)
[   21.175738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.175833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.175913] page dumped because: kasan: bad access detected
[   21.176105] 
[   21.176145] Memory state around the buggy address:
[   21.176181]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176244]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.176308] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.176489]                                      ^
[   21.176531]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176578]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176628] ==================================================================
[   21.195040] ==================================================================
[   21.195096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.195438] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.195680] 
[   21.195736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.196440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.196641] Hardware name: linux,dummy-virt (DT)
[   21.196701] Call trace:
[   21.196797]  show_stack+0x20/0x38 (C)
[   21.196892]  dump_stack_lvl+0x8c/0xd0
[   21.196978]  print_report+0x118/0x608
[   21.198088]  kasan_report+0xdc/0x128
[   21.198212]  __asan_report_load8_noabort+0x20/0x30
[   21.198314]  kasan_atomics_helper+0x3f58/0x4858
[   21.198405]  kasan_atomics+0x198/0x2e0
[   21.198743]  kunit_try_run_case+0x170/0x3f0
[   21.199396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.199606]  kthread+0x328/0x630
[   21.199824]  ret_from_fork+0x10/0x20
[   21.200037] 
[   21.200106] Allocated by task 265:
[   21.200215]  kasan_save_stack+0x3c/0x68
[   21.200265]  kasan_save_track+0x20/0x40
[   21.200471]  kasan_save_alloc_info+0x40/0x58
[   21.200706]  __kasan_kmalloc+0xd4/0xd8
[   21.200770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.201082]  kasan_atomics+0xb8/0x2e0
[   21.201136]  kunit_try_run_case+0x170/0x3f0
[   21.201600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201891]  kthread+0x328/0x630
[   21.201959]  ret_from_fork+0x10/0x20
[   21.202023] 
[   21.202160] The buggy address belongs to the object at fff00000c58c1080
[   21.202160]  which belongs to the cache kmalloc-64 of size 64
[   21.202639] The buggy address is located 0 bytes to the right of
[   21.202639]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.202816] 
[   21.202977] The buggy address belongs to the physical page:
[   21.203351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.203650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.203854] page_type: f5(slab)
[   21.203904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.204019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.204193] page dumped because: kasan: bad access detected
[   21.204590] 
[   21.204646] Memory state around the buggy address:
[   21.204697]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204855]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205143] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.205371]                                      ^
[   21.205417]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205677]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205817] ==================================================================
[   21.309991] ==================================================================
[   21.310044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.310101] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.310602] 
[   21.310634] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.310730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.310779] Hardware name: linux,dummy-virt (DT)
[   21.310829] Call trace:
[   21.310854]  show_stack+0x20/0x38 (C)
[   21.310939]  dump_stack_lvl+0x8c/0xd0
[   21.311005]  print_report+0x118/0x608
[   21.311072]  kasan_report+0xdc/0x128
[   21.311119]  kasan_check_range+0x100/0x1a8
[   21.311196]  __kasan_check_write+0x20/0x30
[   21.311262]  kasan_atomics_helper+0x12d8/0x4858
[   21.311608]  kasan_atomics+0x198/0x2e0
[   21.311694]  kunit_try_run_case+0x170/0x3f0
[   21.311827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.311915]  kthread+0x328/0x630
[   21.311989]  ret_from_fork+0x10/0x20
[   21.312158] 
[   21.312229] Allocated by task 265:
[   21.312258]  kasan_save_stack+0x3c/0x68
[   21.312309]  kasan_save_track+0x20/0x40
[   21.312350]  kasan_save_alloc_info+0x40/0x58
[   21.312388]  __kasan_kmalloc+0xd4/0xd8
[   21.312437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.312730]  kasan_atomics+0xb8/0x2e0
[   21.312768]  kunit_try_run_case+0x170/0x3f0
[   21.312809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.312945]  kthread+0x328/0x630
[   21.313021]  ret_from_fork+0x10/0x20
[   21.313060] 
[   21.313082] The buggy address belongs to the object at fff00000c58c1080
[   21.313082]  which belongs to the cache kmalloc-64 of size 64
[   21.313180] The buggy address is located 0 bytes to the right of
[   21.313180]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.313256] 
[   21.313278] The buggy address belongs to the physical page:
[   21.313348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.313443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.313662] page_type: f5(slab)
[   21.313840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.313958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.314035] page dumped because: kasan: bad access detected
[   21.314166] 
[   21.314189] Memory state around the buggy address:
[   21.314220]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314264]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.314365] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.314571]                                      ^
[   21.314772]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314827]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314867] ==================================================================
[   21.328274] ==================================================================
[   21.328402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.328474] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.328525] 
[   21.328573] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.328780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.328845] Hardware name: linux,dummy-virt (DT)
[   21.328885] Call trace:
[   21.328924]  show_stack+0x20/0x38 (C)
[   21.329016]  dump_stack_lvl+0x8c/0xd0
[   21.329093]  print_report+0x118/0x608
[   21.329160]  kasan_report+0xdc/0x128
[   21.329216]  kasan_check_range+0x100/0x1a8
[   21.329344]  __kasan_check_write+0x20/0x30
[   21.329411]  kasan_atomics_helper+0x147c/0x4858
[   21.329471]  kasan_atomics+0x198/0x2e0
[   21.329518]  kunit_try_run_case+0x170/0x3f0
[   21.329720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.329785]  kthread+0x328/0x630
[   21.329866]  ret_from_fork+0x10/0x20
[   21.329947] 
[   21.329986] Allocated by task 265:
[   21.330022]  kasan_save_stack+0x3c/0x68
[   21.330082]  kasan_save_track+0x20/0x40
[   21.330130]  kasan_save_alloc_info+0x40/0x58
[   21.330169]  __kasan_kmalloc+0xd4/0xd8
[   21.330447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.330489]  kasan_atomics+0xb8/0x2e0
[   21.330527]  kunit_try_run_case+0x170/0x3f0
[   21.330574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.330647]  kthread+0x328/0x630
[   21.330698]  ret_from_fork+0x10/0x20
[   21.330827] 
[   21.330876] The buggy address belongs to the object at fff00000c58c1080
[   21.330876]  which belongs to the cache kmalloc-64 of size 64
[   21.330951] The buggy address is located 0 bytes to the right of
[   21.330951]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.331017] 
[   21.331038] The buggy address belongs to the physical page:
[   21.331151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.331204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.331280] page_type: f5(slab)
[   21.331336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.331481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.331575] page dumped because: kasan: bad access detected
[   21.331610] 
[   21.331630] Memory state around the buggy address:
[   21.331661]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.331705]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.331749] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.331789]                                      ^
[   21.331822]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332337]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332412] ==================================================================
[   21.350736] ==================================================================
[   21.350789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.350841] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.351108] 
[   21.351164] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.351445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.351648] Hardware name: linux,dummy-virt (DT)
[   21.351727] Call trace:
[   21.351788]  show_stack+0x20/0x38 (C)
[   21.352065]  dump_stack_lvl+0x8c/0xd0
[   21.352282]  print_report+0x118/0x608
[   21.352383]  kasan_report+0xdc/0x128
[   21.353015]  __asan_report_load8_noabort+0x20/0x30
[   21.353259]  kasan_atomics_helper+0x3db0/0x4858
[   21.353340]  kasan_atomics+0x198/0x2e0
[   21.353717]  kunit_try_run_case+0x170/0x3f0
[   21.353820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.353965]  kthread+0x328/0x630
[   21.354075]  ret_from_fork+0x10/0x20
[   21.354289] 
[   21.354350] Allocated by task 265:
[   21.354406]  kasan_save_stack+0x3c/0x68
[   21.354749]  kasan_save_track+0x20/0x40
[   21.354837]  kasan_save_alloc_info+0x40/0x58
[   21.355343]  __kasan_kmalloc+0xd4/0xd8
[   21.355587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.355694]  kasan_atomics+0xb8/0x2e0
[   21.355761]  kunit_try_run_case+0x170/0x3f0
[   21.356170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.356301]  kthread+0x328/0x630
[   21.356383]  ret_from_fork+0x10/0x20
[   21.356505] 
[   21.356558] The buggy address belongs to the object at fff00000c58c1080
[   21.356558]  which belongs to the cache kmalloc-64 of size 64
[   21.356859] The buggy address is located 0 bytes to the right of
[   21.356859]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.357027] 
[   21.357097] The buggy address belongs to the physical page:
[   21.357132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.357391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.357528] page_type: f5(slab)
[   21.357571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.357624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.357695] page dumped because: kasan: bad access detected
[   21.357755] 
[   21.357776] Memory state around the buggy address:
[   21.357823]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.357868]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.357913] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.357969]                                      ^
[   21.358006]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358060]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358109] ==================================================================
[   21.374753] ==================================================================
[   21.374831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.374926] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.375005] 
[   21.375042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.375273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.375331] Hardware name: linux,dummy-virt (DT)
[   21.375366] Call trace:
[   21.375412]  show_stack+0x20/0x38 (C)
[   21.375546]  dump_stack_lvl+0x8c/0xd0
[   21.375643]  print_report+0x118/0x608
[   21.375781]  kasan_report+0xdc/0x128
[   21.375942]  __asan_report_load8_noabort+0x20/0x30
[   21.376001]  kasan_atomics_helper+0x3e10/0x4858
[   21.376053]  kasan_atomics+0x198/0x2e0
[   21.376108]  kunit_try_run_case+0x170/0x3f0
[   21.376158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376294]  kthread+0x328/0x630
[   21.376383]  ret_from_fork+0x10/0x20
[   21.376519] 
[   21.376541] Allocated by task 265:
[   21.376581]  kasan_save_stack+0x3c/0x68
[   21.376665]  kasan_save_track+0x20/0x40
[   21.376713]  kasan_save_alloc_info+0x40/0x58
[   21.376750]  __kasan_kmalloc+0xd4/0xd8
[   21.376798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.376847]  kasan_atomics+0xb8/0x2e0
[   21.376884]  kunit_try_run_case+0x170/0x3f0
[   21.376932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376982]  kthread+0x328/0x630
[   21.377018]  ret_from_fork+0x10/0x20
[   21.377064] 
[   21.377085] The buggy address belongs to the object at fff00000c58c1080
[   21.377085]  which belongs to the cache kmalloc-64 of size 64
[   21.377144] The buggy address is located 0 bytes to the right of
[   21.377144]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.377218] 
[   21.377239] The buggy address belongs to the physical page:
[   21.377273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.377328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.377379] page_type: f5(slab)
[   21.377444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.377497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.377540] page dumped because: kasan: bad access detected
[   21.377590] 
[   21.377610] Memory state around the buggy address:
[   21.377643]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377698]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.377751] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.377790]                                      ^
[   21.377833]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377878]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377918] ==================================================================
[   21.187982] ==================================================================
[   21.188036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.188086] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.188138] 
[   21.188752] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.189033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.189200] Hardware name: linux,dummy-virt (DT)
[   21.189268] Call trace:
[   21.189318]  show_stack+0x20/0x38 (C)
[   21.189473]  dump_stack_lvl+0x8c/0xd0
[   21.190125]  print_report+0x118/0x608
[   21.190347]  kasan_report+0xdc/0x128
[   21.190503]  kasan_check_range+0x100/0x1a8
[   21.190633]  __kasan_check_read+0x20/0x30
[   21.190811]  kasan_atomics_helper+0xdd4/0x4858
[   21.190865]  kasan_atomics+0x198/0x2e0
[   21.191143]  kunit_try_run_case+0x170/0x3f0
[   21.191482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191764]  kthread+0x328/0x630
[   21.191810]  ret_from_fork+0x10/0x20
[   21.191862] 
[   21.191883] Allocated by task 265:
[   21.192282]  kasan_save_stack+0x3c/0x68
[   21.192355]  kasan_save_track+0x20/0x40
[   21.192396]  kasan_save_alloc_info+0x40/0x58
[   21.192443]  __kasan_kmalloc+0xd4/0xd8
[   21.192483]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.192524]  kasan_atomics+0xb8/0x2e0
[   21.192561]  kunit_try_run_case+0x170/0x3f0
[   21.192609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192655]  kthread+0x328/0x630
[   21.192701]  ret_from_fork+0x10/0x20
[   21.192739] 
[   21.192762] The buggy address belongs to the object at fff00000c58c1080
[   21.192762]  which belongs to the cache kmalloc-64 of size 64
[   21.192829] The buggy address is located 0 bytes to the right of
[   21.192829]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.192909] 
[   21.192932] The buggy address belongs to the physical page:
[   21.192964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.193025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.193076] page_type: f5(slab)
[   21.193116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.193174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.193216] page dumped because: kasan: bad access detected
[   21.193250] 
[   21.193272] Memory state around the buggy address:
[   21.193306]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193365]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.193410] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.193460]                                      ^
[   21.193504]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193561]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193611] ==================================================================
[   21.297340] ==================================================================
[   21.297512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.297578] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.297632] 
[   21.297667] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.297755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.297782] Hardware name: linux,dummy-virt (DT)
[   21.297816] Call trace:
[   21.297839]  show_stack+0x20/0x38 (C)
[   21.297891]  dump_stack_lvl+0x8c/0xd0
[   21.297942]  print_report+0x118/0x608
[   21.297989]  kasan_report+0xdc/0x128
[   21.298094]  kasan_check_range+0x100/0x1a8
[   21.298153]  __kasan_check_write+0x20/0x30
[   21.298238]  kasan_atomics_helper+0x1190/0x4858
[   21.298288]  kasan_atomics+0x198/0x2e0
[   21.298335]  kunit_try_run_case+0x170/0x3f0
[   21.298384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.298462]  kthread+0x328/0x630
[   21.298507]  ret_from_fork+0x10/0x20
[   21.298556] 
[   21.298576] Allocated by task 265:
[   21.298608]  kasan_save_stack+0x3c/0x68
[   21.298650]  kasan_save_track+0x20/0x40
[   21.298688]  kasan_save_alloc_info+0x40/0x58
[   21.298728]  __kasan_kmalloc+0xd4/0xd8
[   21.298767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.298808]  kasan_atomics+0xb8/0x2e0
[   21.298846]  kunit_try_run_case+0x170/0x3f0
[   21.298896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.298943]  kthread+0x328/0x630
[   21.298978]  ret_from_fork+0x10/0x20
[   21.299015] 
[   21.299038] The buggy address belongs to the object at fff00000c58c1080
[   21.299038]  which belongs to the cache kmalloc-64 of size 64
[   21.299105] The buggy address is located 0 bytes to the right of
[   21.299105]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.299171] 
[   21.299193] The buggy address belongs to the physical page:
[   21.299233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.299286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.299347] page_type: f5(slab)
[   21.299396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.299473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.299516] page dumped because: kasan: bad access detected
[   21.299552] 
[   21.299574] Memory state around the buggy address:
[   21.299608]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299653]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.299696] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.299736]                                      ^
[   21.299771]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299815]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299855] ==================================================================
[   21.047040] ==================================================================
[   21.047250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.047353] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.047673] 
[   21.047732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.047870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.047912] Hardware name: linux,dummy-virt (DT)
[   21.047945] Call trace:
[   21.047971]  show_stack+0x20/0x38 (C)
[   21.048031]  dump_stack_lvl+0x8c/0xd0
[   21.048324]  print_report+0x118/0x608
[   21.048478]  kasan_report+0xdc/0x128
[   21.048623]  kasan_check_range+0x100/0x1a8
[   21.048732]  __kasan_check_write+0x20/0x30
[   21.049017]  kasan_atomics_helper+0x99c/0x4858
[   21.049151]  kasan_atomics+0x198/0x2e0
[   21.049248]  kunit_try_run_case+0x170/0x3f0
[   21.049380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049490]  kthread+0x328/0x630
[   21.049666]  ret_from_fork+0x10/0x20
[   21.049724] 
[   21.049777] Allocated by task 265:
[   21.049849]  kasan_save_stack+0x3c/0x68
[   21.050005]  kasan_save_track+0x20/0x40
[   21.050070]  kasan_save_alloc_info+0x40/0x58
[   21.050133]  __kasan_kmalloc+0xd4/0xd8
[   21.050401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.050520]  kasan_atomics+0xb8/0x2e0
[   21.050634]  kunit_try_run_case+0x170/0x3f0
[   21.050758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.050805]  kthread+0x328/0x630
[   21.051066]  ret_from_fork+0x10/0x20
[   21.051188] 
[   21.051237] The buggy address belongs to the object at fff00000c58c1080
[   21.051237]  which belongs to the cache kmalloc-64 of size 64
[   21.051366] The buggy address is located 0 bytes to the right of
[   21.051366]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.051468] 
[   21.051712] The buggy address belongs to the physical page:
[   21.051845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.051930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.052048] page_type: f5(slab)
[   21.052133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.052233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.052445] page dumped because: kasan: bad access detected
[   21.052615] 
[   21.052664] Memory state around the buggy address:
[   21.052755]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052875]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.052941] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.053176]                                      ^
[   21.053264]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053442]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053601] ==================================================================
[   21.254806] ==================================================================
[   21.254861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.254913] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.255227] 
[   21.255273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.255371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.255574] Hardware name: linux,dummy-virt (DT)
[   21.255705] Call trace:
[   21.255739]  show_stack+0x20/0x38 (C)
[   21.256131]  dump_stack_lvl+0x8c/0xd0
[   21.256310]  print_report+0x118/0x608
[   21.256631]  kasan_report+0xdc/0x128
[   21.256778]  kasan_check_range+0x100/0x1a8
[   21.257002]  __kasan_check_write+0x20/0x30
[   21.257054]  kasan_atomics_helper+0xff0/0x4858
[   21.257511]  kasan_atomics+0x198/0x2e0
[   21.258078]  kunit_try_run_case+0x170/0x3f0
[   21.258431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.258578]  kthread+0x328/0x630
[   21.258663]  ret_from_fork+0x10/0x20
[   21.259107] 
[   21.259173] Allocated by task 265:
[   21.259721]  kasan_save_stack+0x3c/0x68
[   21.259906]  kasan_save_track+0x20/0x40
[   21.259955]  kasan_save_alloc_info+0x40/0x58
[   21.260150]  __kasan_kmalloc+0xd4/0xd8
[   21.260389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.260849]  kasan_atomics+0xb8/0x2e0
[   21.260905]  kunit_try_run_case+0x170/0x3f0
[   21.260973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.261320]  kthread+0x328/0x630
[   21.261391]  ret_from_fork+0x10/0x20
[   21.261588] 
[   21.261700] The buggy address belongs to the object at fff00000c58c1080
[   21.261700]  which belongs to the cache kmalloc-64 of size 64
[   21.261765] The buggy address is located 0 bytes to the right of
[   21.261765]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.262384] 
[   21.262455] The buggy address belongs to the physical page:
[   21.262506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.262777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.263129] page_type: f5(slab)
[   21.263204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.263420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.263483] page dumped because: kasan: bad access detected
[   21.263519] 
[   21.263539] Memory state around the buggy address:
[   21.264083]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264408]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.264574] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.264651]                                      ^
[   21.264884]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.265212]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.265309] ==================================================================
[   21.303376] ==================================================================
[   21.303568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.303648] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.303753] 
[   21.303886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.304014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.304334] Hardware name: linux,dummy-virt (DT)
[   21.304402] Call trace:
[   21.304490]  show_stack+0x20/0x38 (C)
[   21.304590]  dump_stack_lvl+0x8c/0xd0
[   21.304726]  print_report+0x118/0x608
[   21.304838]  kasan_report+0xdc/0x128
[   21.304986]  kasan_check_range+0x100/0x1a8
[   21.305096]  __kasan_check_write+0x20/0x30
[   21.305180]  kasan_atomics_helper+0x126c/0x4858
[   21.305291]  kasan_atomics+0x198/0x2e0
[   21.305366]  kunit_try_run_case+0x170/0x3f0
[   21.305417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.305741]  kthread+0x328/0x630
[   21.305784]  ret_from_fork+0x10/0x20
[   21.305834] 
[   21.305934] Allocated by task 265:
[   21.305997]  kasan_save_stack+0x3c/0x68
[   21.306159]  kasan_save_track+0x20/0x40
[   21.306229]  kasan_save_alloc_info+0x40/0x58
[   21.306343]  __kasan_kmalloc+0xd4/0xd8
[   21.306663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.306740]  kasan_atomics+0xb8/0x2e0
[   21.306808]  kunit_try_run_case+0x170/0x3f0
[   21.306851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.307160]  kthread+0x328/0x630
[   21.307208]  ret_from_fork+0x10/0x20
[   21.307278] 
[   21.307405] The buggy address belongs to the object at fff00000c58c1080
[   21.307405]  which belongs to the cache kmalloc-64 of size 64
[   21.307496] The buggy address is located 0 bytes to the right of
[   21.307496]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.307599] 
[   21.307866] The buggy address belongs to the physical page:
[   21.307960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.308073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.308170] page_type: f5(slab)
[   21.308232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.308332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.308374] page dumped because: kasan: bad access detected
[   21.308409] 
[   21.308752] Memory state around the buggy address:
[   21.308784]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.308833]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.308875] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.308915]                                      ^
[   21.308974]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309054]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309226] ==================================================================
[   21.338959] ==================================================================
[   21.339218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.339418] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.339530] 
[   21.339600] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.339770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.339798] Hardware name: linux,dummy-virt (DT)
[   21.339918] Call trace:
[   21.339958]  show_stack+0x20/0x38 (C)
[   21.340159]  dump_stack_lvl+0x8c/0xd0
[   21.340240]  print_report+0x118/0x608
[   21.340411]  kasan_report+0xdc/0x128
[   21.340498]  kasan_check_range+0x100/0x1a8
[   21.340601]  __kasan_check_write+0x20/0x30
[   21.340840]  kasan_atomics_helper+0x154c/0x4858
[   21.341056]  kasan_atomics+0x198/0x2e0
[   21.341143]  kunit_try_run_case+0x170/0x3f0
[   21.341364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.341445]  kthread+0x328/0x630
[   21.341687]  ret_from_fork+0x10/0x20
[   21.341907] 
[   21.341939] Allocated by task 265:
[   21.341978]  kasan_save_stack+0x3c/0x68
[   21.342023]  kasan_save_track+0x20/0x40
[   21.342064]  kasan_save_alloc_info+0x40/0x58
[   21.342105]  __kasan_kmalloc+0xd4/0xd8
[   21.342151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.342192]  kasan_atomics+0xb8/0x2e0
[   21.342241]  kunit_try_run_case+0x170/0x3f0
[   21.342283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.342330]  kthread+0x328/0x630
[   21.342363]  ret_from_fork+0x10/0x20
[   21.342401] 
[   21.342434] The buggy address belongs to the object at fff00000c58c1080
[   21.342434]  which belongs to the cache kmalloc-64 of size 64
[   21.342494] The buggy address is located 0 bytes to the right of
[   21.342494]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.342570] 
[   21.342596] The buggy address belongs to the physical page:
[   21.342642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.342694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.342752] page_type: f5(slab)
[   21.342800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.342853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.342895] page dumped because: kasan: bad access detected
[   21.342929] 
[   21.342949] Memory state around the buggy address:
[   21.342981]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343034]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.343078] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.343126]                                      ^
[   21.343159]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343203]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343249] ==================================================================
[   21.300051] ==================================================================
[   21.300098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.300146] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.300249] 
[   21.300291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.300375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.300404] Hardware name: linux,dummy-virt (DT)
[   21.300473] Call trace:
[   21.300499]  show_stack+0x20/0x38 (C)
[   21.300548]  dump_stack_lvl+0x8c/0xd0
[   21.300596]  print_report+0x118/0x608
[   21.300644]  kasan_report+0xdc/0x128
[   21.300691]  kasan_check_range+0x100/0x1a8
[   21.300741]  __kasan_check_write+0x20/0x30
[   21.300786]  kasan_atomics_helper+0x11f8/0x4858
[   21.300842]  kasan_atomics+0x198/0x2e0
[   21.300887]  kunit_try_run_case+0x170/0x3f0
[   21.300936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.300990]  kthread+0x328/0x630
[   21.301032]  ret_from_fork+0x10/0x20
[   21.301087] 
[   21.301119] Allocated by task 265:
[   21.301168]  kasan_save_stack+0x3c/0x68
[   21.301215]  kasan_save_track+0x20/0x40
[   21.301291]  kasan_save_alloc_info+0x40/0x58
[   21.301348]  __kasan_kmalloc+0xd4/0xd8
[   21.301395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.301447]  kasan_atomics+0xb8/0x2e0
[   21.301488]  kunit_try_run_case+0x170/0x3f0
[   21.301536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.301601]  kthread+0x328/0x630
[   21.301645]  ret_from_fork+0x10/0x20
[   21.301903] 
[   21.301932] The buggy address belongs to the object at fff00000c58c1080
[   21.301932]  which belongs to the cache kmalloc-64 of size 64
[   21.301990] The buggy address is located 0 bytes to the right of
[   21.301990]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.302057] 
[   21.302303] The buggy address belongs to the physical page:
[   21.302365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.302417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.302477] page_type: f5(slab)
[   21.302531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.302603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.302662] page dumped because: kasan: bad access detected
[   21.302697] 
[   21.302735] Memory state around the buggy address:
[   21.302767]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302810]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.303079] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.303137]                                      ^
[   21.303172]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.303216]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.303256] ==================================================================
[   21.333082] ==================================================================
[   21.333189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.333264] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.333505] 
[   21.333541] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.333630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.333658] Hardware name: linux,dummy-virt (DT)
[   21.333690] Call trace:
[   21.333715]  show_stack+0x20/0x38 (C)
[   21.333779]  dump_stack_lvl+0x8c/0xd0
[   21.333831]  print_report+0x118/0x608
[   21.333878]  kasan_report+0xdc/0x128
[   21.333926]  kasan_check_range+0x100/0x1a8
[   21.333975]  __kasan_check_write+0x20/0x30
[   21.334022]  kasan_atomics_helper+0x14e4/0x4858
[   21.334071]  kasan_atomics+0x198/0x2e0
[   21.334118]  kunit_try_run_case+0x170/0x3f0
[   21.334165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.334219]  kthread+0x328/0x630
[   21.334263]  ret_from_fork+0x10/0x20
[   21.334324] 
[   21.334352] Allocated by task 265:
[   21.334381]  kasan_save_stack+0x3c/0x68
[   21.334435]  kasan_save_track+0x20/0x40
[   21.334862]  kasan_save_alloc_info+0x40/0x58
[   21.334909]  __kasan_kmalloc+0xd4/0xd8
[   21.334957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.335015]  kasan_atomics+0xb8/0x2e0
[   21.335124]  kunit_try_run_case+0x170/0x3f0
[   21.335173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.335240]  kthread+0x328/0x630
[   21.335291]  ret_from_fork+0x10/0x20
[   21.335437] 
[   21.335493] The buggy address belongs to the object at fff00000c58c1080
[   21.335493]  which belongs to the cache kmalloc-64 of size 64
[   21.335586] The buggy address is located 0 bytes to the right of
[   21.335586]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.335655] 
[   21.335676] The buggy address belongs to the physical page:
[   21.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.335762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.335810] page_type: f5(slab)
[   21.335850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.335902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.336384] page dumped because: kasan: bad access detected
[   21.336464] 
[   21.336535] Memory state around the buggy address:
[   21.336855]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337017]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.337064] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.337164]                                      ^
[   21.337590]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337679]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337761] ==================================================================
[   21.315126] ==================================================================
[   21.315176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.315224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.315275] 
[   21.315306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.315883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315996] Hardware name: linux,dummy-virt (DT)
[   21.316065] Call trace:
[   21.316101]  show_stack+0x20/0x38 (C)
[   21.316170]  dump_stack_lvl+0x8c/0xd0
[   21.316257]  print_report+0x118/0x608
[   21.316307]  kasan_report+0xdc/0x128
[   21.316363]  kasan_check_range+0x100/0x1a8
[   21.316489]  __kasan_check_write+0x20/0x30
[   21.316575]  kasan_atomics_helper+0x1384/0x4858
[   21.316691]  kasan_atomics+0x198/0x2e0
[   21.316737]  kunit_try_run_case+0x170/0x3f0
[   21.316787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.316847]  kthread+0x328/0x630
[   21.317093]  ret_from_fork+0x10/0x20
[   21.317261] 
[   21.317341] Allocated by task 265:
[   21.317445]  kasan_save_stack+0x3c/0x68
[   21.317594]  kasan_save_track+0x20/0x40
[   21.317699]  kasan_save_alloc_info+0x40/0x58
[   21.317991]  __kasan_kmalloc+0xd4/0xd8
[   21.318114]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.318155]  kasan_atomics+0xb8/0x2e0
[   21.318415]  kunit_try_run_case+0x170/0x3f0
[   21.318491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.318588]  kthread+0x328/0x630
[   21.318646]  ret_from_fork+0x10/0x20
[   21.318814] 
[   21.318883] The buggy address belongs to the object at fff00000c58c1080
[   21.318883]  which belongs to the cache kmalloc-64 of size 64
[   21.318987] The buggy address is located 0 bytes to the right of
[   21.318987]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.319269] 
[   21.319390] The buggy address belongs to the physical page:
[   21.319453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.319556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.319640] page_type: f5(slab)
[   21.319750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.319802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.319844] page dumped because: kasan: bad access detected
[   21.319878] 
[   21.319898] Memory state around the buggy address:
[   21.319929]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320130]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.320320] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.320442]                                      ^
[   21.320533]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320660]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320750] ==================================================================
[   21.384869] ==================================================================
[   21.385083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.385254] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.385319] 
[   21.385376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.385560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.385609] Hardware name: linux,dummy-virt (DT)
[   21.385668] Call trace:
[   21.385836]  show_stack+0x20/0x38 (C)
[   21.385904]  dump_stack_lvl+0x8c/0xd0
[   21.385993]  print_report+0x118/0x608
[   21.386075]  kasan_report+0xdc/0x128
[   21.386141]  __asan_report_load8_noabort+0x20/0x30
[   21.386339]  kasan_atomics_helper+0x3e20/0x4858
[   21.386405]  kasan_atomics+0x198/0x2e0
[   21.386543]  kunit_try_run_case+0x170/0x3f0
[   21.386596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.386726]  kthread+0x328/0x630
[   21.386804]  ret_from_fork+0x10/0x20
[   21.386871] 
[   21.386909] Allocated by task 265:
[   21.387087]  kasan_save_stack+0x3c/0x68
[   21.387144]  kasan_save_track+0x20/0x40
[   21.387233]  kasan_save_alloc_info+0x40/0x58
[   21.387291]  __kasan_kmalloc+0xd4/0xd8
[   21.387338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.387443]  kasan_atomics+0xb8/0x2e0
[   21.387534]  kunit_try_run_case+0x170/0x3f0
[   21.387753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.387816]  kthread+0x328/0x630
[   21.387851]  ret_from_fork+0x10/0x20
[   21.387889] 
[   21.387917] The buggy address belongs to the object at fff00000c58c1080
[   21.387917]  which belongs to the cache kmalloc-64 of size 64
[   21.387979] The buggy address is located 0 bytes to the right of
[   21.387979]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.388045] 
[   21.388167] The buggy address belongs to the physical page:
[   21.388231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.388361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.388524] page_type: f5(slab)
[   21.388614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.388886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.388992] page dumped because: kasan: bad access detected
[   21.389071] 
[   21.389092] Memory state around the buggy address:
[   21.389127]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.389486]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.389583] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.389798]                                      ^
[   21.389903]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.389970]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.390107] ==================================================================
[   21.390822] ==================================================================
[   21.390875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.390973] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.391028] 
[   21.391076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.391227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.391275] Hardware name: linux,dummy-virt (DT)
[   21.391310] Call trace:
[   21.391349]  show_stack+0x20/0x38 (C)
[   21.391563]  dump_stack_lvl+0x8c/0xd0
[   21.391631]  print_report+0x118/0x608
[   21.391680]  kasan_report+0xdc/0x128
[   21.391728]  kasan_check_range+0x100/0x1a8
[   21.391777]  __kasan_check_write+0x20/0x30
[   21.391960]  kasan_atomics_helper+0x17ec/0x4858
[   21.392018]  kasan_atomics+0x198/0x2e0
[   21.392076]  kunit_try_run_case+0x170/0x3f0
[   21.392124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.392190]  kthread+0x328/0x630
[   21.392244]  ret_from_fork+0x10/0x20
[   21.392298] 
[   21.392329] Allocated by task 265:
[   21.392368]  kasan_save_stack+0x3c/0x68
[   21.392410]  kasan_save_track+0x20/0x40
[   21.392611]  kasan_save_alloc_info+0x40/0x58
[   21.392651]  __kasan_kmalloc+0xd4/0xd8
[   21.392689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.392738]  kasan_atomics+0xb8/0x2e0
[   21.392886]  kunit_try_run_case+0x170/0x3f0
[   21.392964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.393147]  kthread+0x328/0x630
[   21.393234]  ret_from_fork+0x10/0x20
[   21.393410] 
[   21.393445] The buggy address belongs to the object at fff00000c58c1080
[   21.393445]  which belongs to the cache kmalloc-64 of size 64
[   21.393610] The buggy address is located 0 bytes to the right of
[   21.393610]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.393732] 
[   21.393866] The buggy address belongs to the physical page:
[   21.393901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.393955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.394255] page_type: f5(slab)
[   21.394330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.394453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.394534] page dumped because: kasan: bad access detected
[   21.394813] 
[   21.394880] Memory state around the buggy address:
[   21.394985]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395046]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.395089] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.395371]                                      ^
[   21.395502]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395589]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395862] ==================================================================
[   21.276737] ==================================================================
[   21.277177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.277249] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.277301] 
[   21.277442] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.277877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.278119] Hardware name: linux,dummy-virt (DT)
[   21.278167] Call trace:
[   21.278211]  show_stack+0x20/0x38 (C)
[   21.278405]  dump_stack_lvl+0x8c/0xd0
[   21.278495]  print_report+0x118/0x608
[   21.278912]  kasan_report+0xdc/0x128
[   21.279061]  kasan_check_range+0x100/0x1a8
[   21.279116]  __kasan_check_write+0x20/0x30
[   21.279193]  kasan_atomics_helper+0x10c0/0x4858
[   21.279316]  kasan_atomics+0x198/0x2e0
[   21.279520]  kunit_try_run_case+0x170/0x3f0
[   21.279719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.280054]  kthread+0x328/0x630
[   21.280219]  ret_from_fork+0x10/0x20
[   21.280474] 
[   21.280542] Allocated by task 265:
[   21.280686]  kasan_save_stack+0x3c/0x68
[   21.280781]  kasan_save_track+0x20/0x40
[   21.280825]  kasan_save_alloc_info+0x40/0x58
[   21.280898]  __kasan_kmalloc+0xd4/0xd8
[   21.281274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.281353]  kasan_atomics+0xb8/0x2e0
[   21.281581]  kunit_try_run_case+0x170/0x3f0
[   21.281634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.281680]  kthread+0x328/0x630
[   21.281870]  ret_from_fork+0x10/0x20
[   21.281924] 
[   21.281964] The buggy address belongs to the object at fff00000c58c1080
[   21.281964]  which belongs to the cache kmalloc-64 of size 64
[   21.282031] The buggy address is located 0 bytes to the right of
[   21.282031]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.282098] 
[   21.282123] The buggy address belongs to the physical page:
[   21.282157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.282230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.282281] page_type: f5(slab)
[   21.282322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.282384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.282436] page dumped because: kasan: bad access detected
[   21.282496] 
[   21.282544] Memory state around the buggy address:
[   21.282844]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283255]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.283322] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.283445]                                      ^
[   21.283625]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.284166]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.284334] ==================================================================
[   21.266858] ==================================================================
[   21.267120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.267214] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.267276] 
[   21.267380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.267493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267869] Hardware name: linux,dummy-virt (DT)
[   21.268001] Call trace:
[   21.268195]  show_stack+0x20/0x38 (C)
[   21.268300]  dump_stack_lvl+0x8c/0xd0
[   21.268400]  print_report+0x118/0x608
[   21.268568]  kasan_report+0xdc/0x128
[   21.268623]  kasan_check_range+0x100/0x1a8
[   21.268696]  __kasan_check_write+0x20/0x30
[   21.268744]  kasan_atomics_helper+0x1058/0x4858
[   21.268968]  kasan_atomics+0x198/0x2e0
[   21.269298]  kunit_try_run_case+0x170/0x3f0
[   21.269572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.269714]  kthread+0x328/0x630
[   21.269811]  ret_from_fork+0x10/0x20
[   21.269964] 
[   21.270080] Allocated by task 265:
[   21.270125]  kasan_save_stack+0x3c/0x68
[   21.270170]  kasan_save_track+0x20/0x40
[   21.270390]  kasan_save_alloc_info+0x40/0x58
[   21.270583]  __kasan_kmalloc+0xd4/0xd8
[   21.270911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.271026]  kasan_atomics+0xb8/0x2e0
[   21.271087]  kunit_try_run_case+0x170/0x3f0
[   21.271174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.271463]  kthread+0x328/0x630
[   21.271632]  ret_from_fork+0x10/0x20
[   21.271819] 
[   21.271889] The buggy address belongs to the object at fff00000c58c1080
[   21.271889]  which belongs to the cache kmalloc-64 of size 64
[   21.272157] The buggy address is located 0 bytes to the right of
[   21.272157]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.272379] 
[   21.272504] The buggy address belongs to the physical page:
[   21.272776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.273135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.273482] page_type: f5(slab)
[   21.273759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.273827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.273872] page dumped because: kasan: bad access detected
[   21.273909] 
[   21.273964] Memory state around the buggy address:
[   21.274009]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274065]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.274110] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.274151]                                      ^
[   21.274185]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274238]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure Automatically assigned
[   20.749832] ==================================================================
[   20.749888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.750021] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.750185] 
[   20.750281] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.750402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.750458] Hardware name: linux,dummy-virt (DT)
[   20.750493] Call trace:
[   20.750534]  show_stack+0x20/0x38 (C)
[   20.750585]  dump_stack_lvl+0x8c/0xd0
[   20.750652]  print_report+0x118/0x608
[   20.750728]  kasan_report+0xdc/0x128
[   20.750793]  __asan_report_load8_noabort+0x20/0x30
[   20.750873]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.750926]  kasan_bitops_generic+0x110/0x1c8
[   20.750982]  kunit_try_run_case+0x170/0x3f0
[   20.751033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.751088]  kthread+0x328/0x630
[   20.751502]  ret_from_fork+0x10/0x20
[   20.751652] 
[   20.751741] Allocated by task 261:
[   20.751820]  kasan_save_stack+0x3c/0x68
[   20.751973]  kasan_save_track+0x20/0x40
[   20.752071]  kasan_save_alloc_info+0x40/0x58
[   20.752193]  __kasan_kmalloc+0xd4/0xd8
[   20.752253]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.752292]  kasan_bitops_generic+0xa0/0x1c8
[   20.752333]  kunit_try_run_case+0x170/0x3f0
[   20.752657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752724]  kthread+0x328/0x630
[   20.753021]  ret_from_fork+0x10/0x20
[   20.753095] 
[   20.753168] The buggy address belongs to the object at fff00000c4473c00
[   20.753168]  which belongs to the cache kmalloc-16 of size 16
[   20.753256] The buggy address is located 8 bytes inside of
[   20.753256]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.753361] 
[   20.753470] The buggy address belongs to the physical page:
[   20.753537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.753595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.753925] page_type: f5(slab)
[   20.754002] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.754099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.754186] page dumped because: kasan: bad access detected
[   20.754301] 
[   20.754380] Memory state around the buggy address:
[   20.754451]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.754502]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.754548] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754589]                       ^
[   20.754619]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754664]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.754726] ==================================================================
[   20.759231] ==================================================================
[   20.759271] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.759330] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.759416] 
[   20.759460] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.759789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.760034] Hardware name: linux,dummy-virt (DT)
[   20.760100] Call trace:
[   20.760183]  show_stack+0x20/0x38 (C)
[   20.760868]  kasan_bitops_generic+0x110/0x1c8
[   20.762561] 
[   20.762999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.764034]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.765853]  kasan_check_range+0x100/0x1a8
[   20.768716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.777506] page dumped because: kasan: bad access detected
[   20.779413] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.781880] 
[   20.782639]  dump_stack_lvl+0x8c/0xd0
[   20.783259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.784520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.785076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.786365]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.787478]  show_stack+0x20/0x38 (C)
[   20.788690] 
[   20.789823]  kthread+0x328/0x630
[   20.790695] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.791031]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792588]  dump_stack_lvl+0x8c/0xd0
[   20.793200]  kthread+0x328/0x630
[   20.793808] 
[   20.794078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.794982]                       ^
[   20.795625] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.796285]  kasan_report+0xdc/0x128
[   20.797743]  kasan_save_alloc_info+0x40/0x58
[   20.800189]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.801363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   20.801839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.802023]  dump_stack_lvl+0x8c/0xd0
[   20.802220]  __asan_report_load8_noabort+0x20/0x30
[   20.803290]  kunit_try_run_case+0x170/0x3f0
[   20.805093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.805634]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.806364] ==================================================================
[   20.755707] ==================================================================
[   20.755764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.755816] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.755867] 
[   20.755899] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.756138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.756205] Hardware name: linux,dummy-virt (DT)
[   20.756239] Call trace:
[   20.756287]  show_stack+0x20/0x38 (C)
[   20.756339]  dump_stack_lvl+0x8c/0xd0
[   20.756406]  print_report+0x118/0x608
[   20.756526]  kasan_report+0xdc/0x128
[   20.756592]  kasan_check_range+0x100/0x1a8
[   20.756656]  __kasan_check_write+0x20/0x30
[   20.756704]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.756999]  kasan_bitops_generic+0x110/0x1c8
[   20.757094]  kunit_try_run_case+0x170/0x3f0
[   20.757146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.757230]  kthread+0x328/0x630
[   20.757275]  ret_from_fork+0x10/0x20
[   20.757369] 
[   20.757408] Allocated by task 261:
[   20.757468]  kasan_save_stack+0x3c/0x68
[   20.757513]  kasan_save_track+0x20/0x40
[   20.757588]  kasan_save_alloc_info+0x40/0x58
[   20.757634]  __kasan_kmalloc+0xd4/0xd8
[   20.757691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.757745]  kasan_bitops_generic+0xa0/0x1c8
[   20.757900]  kunit_try_run_case+0x170/0x3f0
[   20.757944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.758092]  kthread+0x328/0x630
[   20.758209]  ret_from_fork+0x10/0x20
[   20.758258] 
[   20.758286] The buggy address belongs to the object at fff00000c4473c00
[   20.758286]  which belongs to the cache kmalloc-16 of size 16
[   20.758346] The buggy address is located 8 bytes inside of
[   20.758346]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.758409] 
[   20.758443] The buggy address belongs to the physical page:
[   20.758475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.758527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.758576] page_type: f5(slab)
[   20.758629] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.758691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.758740] page dumped because: kasan: bad access detected
[   20.758782] 
[   20.758805] Memory state around the buggy address:
[   20.758839]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.758891]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.758936] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.758987]                       ^
[   20.759016]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.759060]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.759110] ==================================================================
[   20.743230] ==================================================================
[   20.743325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.743484] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261
[   20.743572] 
[   20.743609] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.743914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.744078] Hardware name: linux,dummy-virt (DT)
[   20.744193] Call trace:
[   20.744234]  show_stack+0x20/0x38 (C)
[   20.744315]  dump_stack_lvl+0x8c/0xd0
[   20.744630]  print_report+0x118/0x608
[   20.744770]  kasan_report+0xdc/0x128
[   20.744864]  kasan_check_range+0x100/0x1a8
[   20.744916]  __kasan_check_write+0x20/0x30
[   20.745224]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.745563]  kasan_bitops_generic+0x110/0x1c8
[   20.745650]  kunit_try_run_case+0x170/0x3f0
[   20.745717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.745773]  kthread+0x328/0x630
[   20.745819]  ret_from_fork+0x10/0x20
[   20.745877] 
[   20.745901] Allocated by task 261:
[   20.745931]  kasan_save_stack+0x3c/0x68
[   20.745975]  kasan_save_track+0x20/0x40
[   20.746025]  kasan_save_alloc_info+0x40/0x58
[   20.746062]  __kasan_kmalloc+0xd4/0xd8
[   20.746100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.746152]  kasan_bitops_generic+0xa0/0x1c8
[   20.746193]  kunit_try_run_case+0x170/0x3f0
[   20.746240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.746291]  kthread+0x328/0x630
[   20.746326]  ret_from_fork+0x10/0x20
[   20.746365] 
[   20.746395] The buggy address belongs to the object at fff00000c4473c00
[   20.746395]  which belongs to the cache kmalloc-16 of size 16
[   20.746466] The buggy address is located 8 bytes inside of
[   20.746466]  allocated 9-byte region [fff00000c4473c00, fff00000c4473c09)
[   20.746531] 
[   20.746554] The buggy address belongs to the physical page:
[   20.746589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   20.746775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.747049] page_type: f5(slab)
[   20.747247] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.747373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.747606] page dumped because: kasan: bad access detected
[   20.747687] 
[   20.747720] Memory state around the buggy address:
[   20.747793]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.747862]  fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.747907] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.747945]                       ^
[   20.748039]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748203]  fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748296] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure Automatically assigned
[   20.726443] ==================================================================
[   20.726495] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.726546] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259
[   20.726597] 
[   20.726627] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.726713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.726741] Hardware name: linux,dummy-virt (DT)
[   20.726772] Call trace:
[   20.726977]  show_stack+0x20/0x38 (C)
[   20.727044]  dump_stack_lvl+0x8c/0xd0
[   20.727094]  print_report+0x118/0x608
[   20.727369]  kasan_report+0xdc/0x128
[   20.727492]  __asan_report_load1_noabort+0x20/0x30
[   20.727640]  strnlen+0x80/0x88
[   20.727732]  kasan_strings+0x478/0xb00
[   20.727861]  kunit_try_run_case+0x170/0x3f0
[   20.727970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.728167]  kthread+0x328/0x630
[   20.728249]  ret_from_fork+0x10/0x20
[   20.728324] 
[   20.728345] Allocated by task 259:
[   20.728376]  kasan_save_stack+0x3c/0x68
[   20.728420]  kasan_save_track+0x20/0x40
[   20.728471]  kasan_save_alloc_info+0x40/0x58
[   20.728510]  __kasan_kmalloc+0xd4/0xd8
[   20.728755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.728899]  kasan_strings+0xc8/0xb00
[   20.728952]  kunit_try_run_case+0x170/0x3f0
[   20.729003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.729049]  kthread+0x328/0x630
[   20.729094]  ret_from_fork+0x10/0x20
[   20.729142] 
[   20.729172] Freed by task 259:
[   20.729203]  kasan_save_stack+0x3c/0x68
[   20.729242]  kasan_save_track+0x20/0x40
[   20.729285]  kasan_save_free_info+0x4c/0x78
[   20.729322]  __kasan_slab_free+0x6c/0x98
[   20.729371]  kfree+0x214/0x3c8
[   20.729431]  kasan_strings+0x24c/0xb00
[   20.729470]  kunit_try_run_case+0x170/0x3f0
[   20.729510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.729557]  kthread+0x328/0x630
[   20.729592]  ret_from_fork+0x10/0x20
[   20.729636] 
[   20.729659] The buggy address belongs to the object at fff00000c58ba040
[   20.729659]  which belongs to the cache kmalloc-32 of size 32
[   20.729733] The buggy address is located 16 bytes inside of
[   20.729733]  freed 32-byte region [fff00000c58ba040, fff00000c58ba060)
[   20.729812] 
[   20.729842] The buggy address belongs to the physical page:
[   20.729875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba
[   20.729944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.730003] page_type: f5(slab)
[   20.730043] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.730105] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.730148] page dumped because: kasan: bad access detected
[   20.730180] 
[   20.730227] Memory state around the buggy address:
[   20.730262]  fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.730307]  fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.730360] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.730408]                                                  ^
[   20.730929]  fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.731186]  fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.731319] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure Automatically assigned
[   20.717862] ==================================================================
[   20.718405] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   20.718552] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259
[   20.718607] 
[   20.718988] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.719196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.719303] Hardware name: linux,dummy-virt (DT)
[   20.719416] Call trace:
[   20.719450]  show_stack+0x20/0x38 (C)
[   20.719504]  dump_stack_lvl+0x8c/0xd0
[   20.719572]  print_report+0x118/0x608
[   20.719621]  kasan_report+0xdc/0x128
[   20.719922]  __asan_report_load1_noabort+0x20/0x30
[   20.720043]  strlen+0xa8/0xb0
[   20.720196]  kasan_strings+0x418/0xb00
[   20.720275]  kunit_try_run_case+0x170/0x3f0
[   20.720326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720460]  kthread+0x328/0x630
[   20.720507]  ret_from_fork+0x10/0x20
[   20.720565] 
[   20.720795] Allocated by task 259:
[   20.721127]  kasan_save_stack+0x3c/0x68
[   20.721174]  kasan_save_track+0x20/0x40
[   20.721215]  kasan_save_alloc_info+0x40/0x58
[   20.721254]  __kasan_kmalloc+0xd4/0xd8
[   20.721311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.721367]  kasan_strings+0xc8/0xb00
[   20.721503]  kunit_try_run_case+0x170/0x3f0
[   20.721544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.721641]  kthread+0x328/0x630
[   20.721808]  ret_from_fork+0x10/0x20
[   20.721895] 
[   20.721941] Freed by task 259:
[   20.721969]  kasan_save_stack+0x3c/0x68
[   20.722008]  kasan_save_track+0x20/0x40
[   20.722067]  kasan_save_free_info+0x4c/0x78
[   20.722259]  __kasan_slab_free+0x6c/0x98
[   20.722305]  kfree+0x214/0x3c8
[   20.722668]  kasan_strings+0x24c/0xb00
[   20.723011]  kunit_try_run_case+0x170/0x3f0
[   20.723061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.723108]  kthread+0x328/0x630
[   20.723433]  ret_from_fork+0x10/0x20
[   20.723622] 
[   20.723648] The buggy address belongs to the object at fff00000c58ba040
[   20.723648]  which belongs to the cache kmalloc-32 of size 32
[   20.723707] The buggy address is located 16 bytes inside of
[   20.723707]  freed 32-byte region [fff00000c58ba040, fff00000c58ba060)
[   20.724046] 
[   20.724079] The buggy address belongs to the physical page:
[   20.724192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba
[   20.724249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.724364] page_type: f5(slab)
[   20.724406] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.724515] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.724591] page dumped because: kasan: bad access detected
[   20.724655] 
[   20.724676] Memory state around the buggy address:
[   20.725128]  fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.725225]  fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.725319] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.725499]                                                  ^
[   20.725558]  fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.725605]  fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.725645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   20.709372] ==================================================================
[   20.709455] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   20.709725] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259
[   20.709824] 
[   20.709961] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.710300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.710359] Hardware name: linux,dummy-virt (DT)
[   20.710451] Call trace:
[   20.710474]  show_stack+0x20/0x38 (C)
[   20.710615]  dump_stack_lvl+0x8c/0xd0
[   20.710972]  print_report+0x118/0x608
[   20.711027]  kasan_report+0xdc/0x128
[   20.711073]  __asan_report_load1_noabort+0x20/0x30
[   20.711123]  kasan_strings+0x95c/0xb00
[   20.711643]  kunit_try_run_case+0x170/0x3f0
[   20.712063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.712216]  kthread+0x328/0x630
[   20.712262]  ret_from_fork+0x10/0x20
[   20.712526] 
[   20.712652] Allocated by task 259:
[   20.712695]  kasan_save_stack+0x3c/0x68
[   20.712741]  kasan_save_track+0x20/0x40
[   20.712781]  kasan_save_alloc_info+0x40/0x58
[   20.712825]  __kasan_kmalloc+0xd4/0xd8
[   20.712873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.712914]  kasan_strings+0xc8/0xb00
[   20.713141]  kunit_try_run_case+0x170/0x3f0
[   20.713397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.713785]  kthread+0x328/0x630
[   20.713825]  ret_from_fork+0x10/0x20
[   20.714021] 
[   20.714262] Freed by task 259:
[   20.714358]  kasan_save_stack+0x3c/0x68
[   20.714463]  kasan_save_track+0x20/0x40
[   20.714558]  kasan_save_free_info+0x4c/0x78
[   20.714604]  __kasan_slab_free+0x6c/0x98
[   20.714644]  kfree+0x214/0x3c8
[   20.714678]  kasan_strings+0x24c/0xb00
[   20.714718]  kunit_try_run_case+0x170/0x3f0
[   20.714759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714806]  kthread+0x328/0x630
[   20.714851]  ret_from_fork+0x10/0x20
[   20.714891] 
[   20.714912] The buggy address belongs to the object at fff00000c58ba040
[   20.714912]  which belongs to the cache kmalloc-32 of size 32
[   20.715347] The buggy address is located 16 bytes inside of
[   20.715347]  freed 32-byte region [fff00000c58ba040, fff00000c58ba060)
[   20.715580] 
[   20.715605] The buggy address belongs to the physical page:
[   20.715768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba
[   20.715835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.715997] page_type: f5(slab)
[   20.716208] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.716495] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.716546] page dumped because: kasan: bad access detected
[   20.716583] 
[   20.716642] Memory state around the buggy address:
[   20.716782]  fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.716853]  fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.716905] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.717107]                                                  ^
[   20.717149]  fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.717248]  fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.717415] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   20.699341] ==================================================================
[   20.699550] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.699657] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259
[   20.699710] 
[   20.699746] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.700019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.700065] Hardware name: linux,dummy-virt (DT)
[   20.700483] Call trace:
[   20.700674]  show_stack+0x20/0x38 (C)
[   20.700971]  dump_stack_lvl+0x8c/0xd0
[   20.701354]  print_report+0x118/0x608
[   20.701433]  kasan_report+0xdc/0x128
[   20.701481]  __asan_report_load1_noabort+0x20/0x30
[   20.701532]  strcmp+0xc0/0xc8
[   20.701577]  kasan_strings+0x340/0xb00
[   20.701624]  kunit_try_run_case+0x170/0x3f0
[   20.701685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.701739]  kthread+0x328/0x630
[   20.701912]  ret_from_fork+0x10/0x20
[   20.701965] 
[   20.701985] Allocated by task 259:
[   20.702015]  kasan_save_stack+0x3c/0x68
[   20.702867]  kasan_save_track+0x20/0x40
[   20.702924]  kasan_save_alloc_info+0x40/0x58
[   20.702970]  __kasan_kmalloc+0xd4/0xd8
[   20.703008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.703158]  kasan_strings+0xc8/0xb00
[   20.703227]  kunit_try_run_case+0x170/0x3f0
[   20.703300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703348]  kthread+0x328/0x630
[   20.703437]  ret_from_fork+0x10/0x20
[   20.703966] 
[   20.704069] Freed by task 259:
[   20.704375]  kasan_save_stack+0x3c/0x68
[   20.704435]  kasan_save_track+0x20/0x40
[   20.704475]  kasan_save_free_info+0x4c/0x78
[   20.704512]  __kasan_slab_free+0x6c/0x98
[   20.704578]  kfree+0x214/0x3c8
[   20.704613]  kasan_strings+0x24c/0xb00
[   20.704673]  kunit_try_run_case+0x170/0x3f0
[   20.704794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.704967]  kthread+0x328/0x630
[   20.705197]  ret_from_fork+0x10/0x20
[   20.705240] 
[   20.705718] The buggy address belongs to the object at fff00000c58ba040
[   20.705718]  which belongs to the cache kmalloc-32 of size 32
[   20.705805] The buggy address is located 16 bytes inside of
[   20.705805]  freed 32-byte region [fff00000c58ba040, fff00000c58ba060)
[   20.706132] 
[   20.706169] The buggy address belongs to the physical page:
[   20.706210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba
[   20.706331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.706564] page_type: f5(slab)
[   20.706715] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.706768] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.707060] page dumped because: kasan: bad access detected
[   20.707149] 
[   20.707176] Memory state around the buggy address:
[   20.707212]  fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.707258]  fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.707303] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.707615]                                                  ^
[   20.707762]  fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.707811]  fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.707852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   20.681317] ==================================================================
[   20.681388] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.681477] Read of size 1 at addr fff00000c58a7e98 by task kunit_try_catch/257
[   20.681746] 
[   20.681783] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.682184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.682213] Hardware name: linux,dummy-virt (DT)
[   20.682318] Call trace:
[   20.682342]  show_stack+0x20/0x38 (C)
[   20.682398]  dump_stack_lvl+0x8c/0xd0
[   20.682755]  print_report+0x118/0x608
[   20.682845]  kasan_report+0xdc/0x128
[   20.682895]  __asan_report_load1_noabort+0x20/0x30
[   20.682945]  memcmp+0x198/0x1d8
[   20.682992]  kasan_memcmp+0x16c/0x300
[   20.683040]  kunit_try_run_case+0x170/0x3f0
[   20.683759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684035]  kthread+0x328/0x630
[   20.684087]  ret_from_fork+0x10/0x20
[   20.684141] 
[   20.684161] Allocated by task 257:
[   20.684222]  kasan_save_stack+0x3c/0x68
[   20.684418]  kasan_save_track+0x20/0x40
[   20.684477]  kasan_save_alloc_info+0x40/0x58
[   20.684573]  __kasan_kmalloc+0xd4/0xd8
[   20.684653]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.684721]  kasan_memcmp+0xbc/0x300
[   20.684796]  kunit_try_run_case+0x170/0x3f0
[   20.684943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684990]  kthread+0x328/0x630
[   20.685029]  ret_from_fork+0x10/0x20
[   20.685067] 
[   20.685091] The buggy address belongs to the object at fff00000c58a7e80
[   20.685091]  which belongs to the cache kmalloc-32 of size 32
[   20.685190] The buggy address is located 0 bytes to the right of
[   20.685190]  allocated 24-byte region [fff00000c58a7e80, fff00000c58a7e98)
[   20.685497] 
[   20.685546] The buggy address belongs to the physical page:
[   20.685582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   20.685847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.686068] page_type: f5(slab)
[   20.686399] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.686474] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.686624] page dumped because: kasan: bad access detected
[   20.686787] 
[   20.686810] Memory state around the buggy address:
[   20.686922]  fff00000c58a7d80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   20.686980]  fff00000c58a7e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.687119] >fff00000c58a7e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.687177]                             ^
[   20.687209]  fff00000c58a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.687436]  fff00000c58a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.687699] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   20.657479] ==================================================================
[   20.657548] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   20.657883] Read of size 1 at addr ffff800080a97b4a by task kunit_try_catch/253
[   20.658073] 
[   20.658218] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.658335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.658363] Hardware name: linux,dummy-virt (DT)
[   20.658397] Call trace:
[   20.658438]  show_stack+0x20/0x38 (C)
[   20.658690]  dump_stack_lvl+0x8c/0xd0
[   20.658763]  print_report+0x310/0x608
[   20.658819]  kasan_report+0xdc/0x128
[   20.658922]  __asan_report_load1_noabort+0x20/0x30
[   20.659098]  kasan_alloca_oob_right+0x2dc/0x340
[   20.659181]  kunit_try_run_case+0x170/0x3f0
[   20.659236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.659440]  kthread+0x328/0x630
[   20.659509]  ret_from_fork+0x10/0x20
[   20.659833] 
[   20.659858] The buggy address belongs to stack of task kunit_try_catch/253
[   20.659914] 
[   20.659944] The buggy address belongs to the virtual mapping at
[   20.659944]  [ffff800080a90000, ffff800080a99000) created by:
[   20.659944]  kernel_clone+0x150/0x7a8
[   20.660323] 
[   20.660369] The buggy address belongs to the physical page:
[   20.660480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd
[   20.660535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.660606] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.660658] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.660702] page dumped because: kasan: bad access detected
[   20.660760] 
[   20.660824] Memory state around the buggy address:
[   20.660913]  ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.660970]  ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.661017] >ffff800080a97b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.661057]                                               ^
[   20.661095]  ffff800080a97b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.661138]  ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.661224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   20.625286] ==================================================================
[   20.625368] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.625739] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/249
[   20.626071] 
[   20.626717] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.627121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.627392] Hardware name: linux,dummy-virt (DT)
[   20.627440] Call trace:
[   20.627466]  show_stack+0x20/0x38 (C)
[   20.627548]  dump_stack_lvl+0x8c/0xd0
[   20.627636]  print_report+0x310/0x608
[   20.627694]  kasan_report+0xdc/0x128
[   20.627742]  __asan_report_load1_noabort+0x20/0x30
[   20.627793]  kasan_stack_oob+0x238/0x270
[   20.627839]  kunit_try_run_case+0x170/0x3f0
[   20.627890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.627945]  kthread+0x328/0x630
[   20.627992]  ret_from_fork+0x10/0x20
[   20.628043] 
[   20.628106] The buggy address belongs to stack of task kunit_try_catch/249
[   20.628888]  and is located at offset 138 in frame:
[   20.628991]  kasan_stack_oob+0x0/0x270
[   20.629173] 
[   20.629473] This frame has 4 objects:
[   20.629736]  [48, 49) '__assertion'
[   20.629778]  [64, 72) 'array'
[   20.629858]  [96, 112) '__assertion'
[   20.629910]  [128, 138) 'stack_array'
[   20.630081] 
[   20.630118] The buggy address belongs to the virtual mapping at
[   20.630118]  [ffff800080a90000, ffff800080a99000) created by:
[   20.630118]  kernel_clone+0x150/0x7a8
[   20.630204] 
[   20.630298] The buggy address belongs to the physical page:
[   20.630444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd
[   20.630503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.630949] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.631103] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.631236] page dumped because: kasan: bad access detected
[   20.631299] 
[   20.631431] Memory state around the buggy address:
[   20.631513]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.631559]  ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.631603] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.631688]                                   ^
[   20.631807]  ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.631852]  ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.631915] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   20.568545] ==================================================================
[   20.568632] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.568704] Read of size 1 at addr ffff9fc3021b558d by task kunit_try_catch/245
[   20.568755] 
[   20.568801] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.568894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.568922] Hardware name: linux,dummy-virt (DT)
[   20.568957] Call trace:
[   20.573217]  show_stack+0x20/0x38 (C)
[   20.573655]  dump_stack_lvl+0x8c/0xd0
[   20.574276]  print_report+0x310/0x608
[   20.574646]  kasan_report+0xdc/0x128
[   20.574713]  __asan_report_load1_noabort+0x20/0x30
[   20.575526]  kasan_global_oob_right+0x230/0x270
[   20.575609]  kunit_try_run_case+0x170/0x3f0
[   20.575659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.576350]  kthread+0x328/0x630
[   20.577097]  ret_from_fork+0x10/0x20
[   20.577662] 
[   20.578024] The buggy address belongs to the variable:
[   20.578327]  global_array+0xd/0x40
[   20.578390] 
[   20.579689] The buggy address belongs to the virtual mapping at
[   20.579689]  [ffff9fc300350000, ffff9fc302271000) created by:
[   20.579689]  paging_init+0x66c/0x7d0
[   20.580275] 
[   20.580792] The buggy address belongs to the physical page:
[   20.581337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db5
[   20.581416] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.581969] raw: 03fffe0000002000 ffffc1ffc01f6d48 ffffc1ffc01f6d48 0000000000000000
[   20.582508] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.582834] page dumped because: kasan: bad access detected
[   20.583143] 
[   20.583352] Memory state around the buggy address:
[   20.583800]  ffff9fc3021b5480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.584070]  ffff9fc3021b5500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   20.584475] >ffff9fc3021b5580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   20.584692]                       ^
[   20.585144]  ffff9fc3021b5600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   20.585540]  ffff9fc3021b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.586124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   20.493648] ==================================================================
[   20.493724] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.493784] Free of addr fff00000c58a9101 by task kunit_try_catch/241
[   20.493825] 
[   20.493857] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.493944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.493970] Hardware name: linux,dummy-virt (DT)
[   20.494002] Call trace:
[   20.494025]  show_stack+0x20/0x38 (C)
[   20.494074]  dump_stack_lvl+0x8c/0xd0
[   20.494124]  print_report+0x118/0x608
[   20.494172]  kasan_report_invalid_free+0xc0/0xe8
[   20.494222]  check_slab_allocation+0xfc/0x108
[   20.494271]  __kasan_mempool_poison_object+0x78/0x150
[   20.494322]  mempool_free+0x28c/0x328
[   20.494367]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.494419]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.494591]  kunit_try_run_case+0x170/0x3f0
[   20.494739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.495032]  kthread+0x328/0x630
[   20.495260]  ret_from_fork+0x10/0x20
[   20.495443] 
[   20.495464] Allocated by task 241:
[   20.495493]  kasan_save_stack+0x3c/0x68
[   20.495534]  kasan_save_track+0x20/0x40
[   20.495570]  kasan_save_alloc_info+0x40/0x58
[   20.495609]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.495653]  remove_element+0x130/0x1f8
[   20.495689]  mempool_alloc_preallocated+0x58/0xc0
[   20.495726]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.495768]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.495806]  kunit_try_run_case+0x170/0x3f0
[   20.495843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.495904]  kthread+0x328/0x630
[   20.495958]  ret_from_fork+0x10/0x20
[   20.496055] 
[   20.496198] The buggy address belongs to the object at fff00000c58a9100
[   20.496198]  which belongs to the cache kmalloc-128 of size 128
[   20.496290] The buggy address is located 1 bytes inside of
[   20.496290]  128-byte region [fff00000c58a9100, fff00000c58a9180)
[   20.496349] 
[   20.496369] The buggy address belongs to the physical page:
[   20.496400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   20.496464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.496515] page_type: f5(slab)
[   20.496556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.496606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.496645] page dumped because: kasan: bad access detected
[   20.496702] 
[   20.496719] Memory state around the buggy address:
[   20.496752]  fff00000c58a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.496794]  fff00000c58a9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.496842] >fff00000c58a9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.496879]                    ^
[   20.496930]  fff00000c58a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.496979]  fff00000c58a9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.497019] ==================================================================
[   20.511314] ==================================================================
[   20.511395] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.511483] Free of addr fff00000c79b0001 by task kunit_try_catch/243
[   20.511528] 
[   20.511566] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.511654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.511682] Hardware name: linux,dummy-virt (DT)
[   20.514128] Call trace:
[   20.514175]  show_stack+0x20/0x38 (C)
[   20.514378]  dump_stack_lvl+0x8c/0xd0
[   20.514451]  print_report+0x118/0x608
[   20.514501]  kasan_report_invalid_free+0xc0/0xe8
[   20.514552]  __kasan_mempool_poison_object+0xfc/0x150
[   20.514603]  mempool_free+0x28c/0x328
[   20.514650]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.516682]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.517463]  kunit_try_run_case+0x170/0x3f0
[   20.517637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.518204]  kthread+0x328/0x630
[   20.518822]  ret_from_fork+0x10/0x20
[   20.519027] 
[   20.519052] The buggy address belongs to the physical page:
[   20.519664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0
[   20.520293] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.520374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.520449] page_type: f8(unknown)
[   20.520495] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.520547] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.521913] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.522766] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.522842] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff
[   20.522892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.523530] page dumped because: kasan: bad access detected
[   20.524131] 
[   20.524406] Memory state around the buggy address:
[   20.524697]  fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.524776]  fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.525372] >fff00000c79b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.525996]                    ^
[   20.526273]  fff00000c79b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.526667]  fff00000c79b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.526713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   20.476454] ==================================================================
[   20.476524] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.476581] Free of addr fff00000c79b0000 by task kunit_try_catch/237
[   20.476641] 
[   20.476676] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.476763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.476791] Hardware name: linux,dummy-virt (DT)
[   20.476829] Call trace:
[   20.476851]  show_stack+0x20/0x38 (C)
[   20.476900]  dump_stack_lvl+0x8c/0xd0
[   20.476949]  print_report+0x118/0x608
[   20.476996]  kasan_report_invalid_free+0xc0/0xe8
[   20.477053]  __kasan_mempool_poison_object+0x14c/0x150
[   20.477142]  mempool_free+0x28c/0x328
[   20.477358]  mempool_double_free_helper+0x150/0x2e8
[   20.477548]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.477842]  kunit_try_run_case+0x170/0x3f0
[   20.477896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.477955]  kthread+0x328/0x630
[   20.478005]  ret_from_fork+0x10/0x20
[   20.478252] 
[   20.478297] The buggy address belongs to the physical page:
[   20.478344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0
[   20.479174] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.479355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.479431] page_type: f8(unknown)
[   20.479474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.479523] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.479571] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.479619] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.479667] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff
[   20.479945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.479988] page dumped because: kasan: bad access detected
[   20.480020] 
[   20.480038] Memory state around the buggy address:
[   20.480079]  fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.480123]  fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.480165] >fff00000c79b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.480203]                    ^
[   20.480231]  fff00000c79b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.480273]  fff00000c79b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.480311] ==================================================================
[   20.485761] ==================================================================
[   20.485822] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.485881] Free of addr fff00000c79b0000 by task kunit_try_catch/239
[   20.485926] 
[   20.485960] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.486061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.486088] Hardware name: linux,dummy-virt (DT)
[   20.486120] Call trace:
[   20.486141]  show_stack+0x20/0x38 (C)
[   20.486191]  dump_stack_lvl+0x8c/0xd0
[   20.486241]  print_report+0x118/0x608
[   20.486356]  kasan_report_invalid_free+0xc0/0xe8
[   20.486407]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.486657]  mempool_free+0x24c/0x328
[   20.486737]  mempool_double_free_helper+0x150/0x2e8
[   20.486981]  mempool_page_alloc_double_free+0xbc/0x118
[   20.487083]  kunit_try_run_case+0x170/0x3f0
[   20.487234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.487436]  kthread+0x328/0x630
[   20.487521]  ret_from_fork+0x10/0x20
[   20.487588] 
[   20.487619] The buggy address belongs to the physical page:
[   20.487651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0
[   20.487704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.487769] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.487818] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.487858] page dumped because: kasan: bad access detected
[   20.487888] 
[   20.487906] Memory state around the buggy address:
[   20.487938]  fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.487982]  fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.488024] >fff00000c79b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.488064]                    ^
[   20.488091]  fff00000c79b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.488132]  fff00000c79b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.488170] ==================================================================
[   20.461808] ==================================================================
[   20.461918] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.461976] Free of addr fff00000c65b1d00 by task kunit_try_catch/235
[   20.462044] 
[   20.462079] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.462164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.462191] Hardware name: linux,dummy-virt (DT)
[   20.462232] Call trace:
[   20.462273]  show_stack+0x20/0x38 (C)
[   20.462350]  dump_stack_lvl+0x8c/0xd0
[   20.462656]  print_report+0x118/0x608
[   20.462712]  kasan_report_invalid_free+0xc0/0xe8
[   20.462761]  check_slab_allocation+0xd4/0x108
[   20.462833]  __kasan_mempool_poison_object+0x78/0x150
[   20.462884]  mempool_free+0x28c/0x328
[   20.462932]  mempool_double_free_helper+0x150/0x2e8
[   20.462981]  mempool_kmalloc_double_free+0xc0/0x118
[   20.463060]  kunit_try_run_case+0x170/0x3f0
[   20.463150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.463262]  kthread+0x328/0x630
[   20.463451]  ret_from_fork+0x10/0x20
[   20.463576] 
[   20.463837] Allocated by task 235:
[   20.463896]  kasan_save_stack+0x3c/0x68
[   20.464157]  kasan_save_track+0x20/0x40
[   20.464282]  kasan_save_alloc_info+0x40/0x58
[   20.464373]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.464465]  remove_element+0x130/0x1f8
[   20.464512]  mempool_alloc_preallocated+0x58/0xc0
[   20.464551]  mempool_double_free_helper+0x94/0x2e8
[   20.464590]  mempool_kmalloc_double_free+0xc0/0x118
[   20.464906]  kunit_try_run_case+0x170/0x3f0
[   20.464979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.465058]  kthread+0x328/0x630
[   20.465114]  ret_from_fork+0x10/0x20
[   20.465200] 
[   20.465252] Freed by task 235:
[   20.465298]  kasan_save_stack+0x3c/0x68
[   20.465371]  kasan_save_track+0x20/0x40
[   20.465419]  kasan_save_free_info+0x4c/0x78
[   20.465482]  __kasan_mempool_poison_object+0xc0/0x150
[   20.465549]  mempool_free+0x28c/0x328
[   20.465608]  mempool_double_free_helper+0x100/0x2e8
[   20.465719]  mempool_kmalloc_double_free+0xc0/0x118
[   20.465821]  kunit_try_run_case+0x170/0x3f0
[   20.465913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.465956]  kthread+0x328/0x630
[   20.466017]  ret_from_fork+0x10/0x20
[   20.466183] 
[   20.466294] The buggy address belongs to the object at fff00000c65b1d00
[   20.466294]  which belongs to the cache kmalloc-128 of size 128
[   20.466474] The buggy address is located 0 bytes inside of
[   20.466474]  128-byte region [fff00000c65b1d00, fff00000c65b1d80)
[   20.466558] 
[   20.466742] The buggy address belongs to the physical page:
[   20.466821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   20.466974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.467061] page_type: f5(slab)
[   20.467157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.467248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.467383] page dumped because: kasan: bad access detected
[   20.467485] 
[   20.467539] Memory state around the buggy address:
[   20.467628]  fff00000c65b1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.467728]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.467848] >fff00000c65b1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.467951]                    ^
[   20.468031]  fff00000c65b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.468122]  fff00000c65b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.468194] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   20.455523] ==================================================================
[   20.455589] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.455777] Read of size 1 at addr fff00000c79a8000 by task kunit_try_catch/233
[   20.455830] 
[   20.455867] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.456046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.456206] Hardware name: linux,dummy-virt (DT)
[   20.456286] Call trace:
[   20.456352]  show_stack+0x20/0x38 (C)
[   20.456901]  dump_stack_lvl+0x8c/0xd0
[   20.456962]  print_report+0x118/0x608
[   20.457009]  kasan_report+0xdc/0x128
[   20.457056]  __asan_report_load1_noabort+0x20/0x30
[   20.457109]  mempool_uaf_helper+0x314/0x340
[   20.457155]  mempool_page_alloc_uaf+0xc0/0x118
[   20.457204]  kunit_try_run_case+0x170/0x3f0
[   20.457256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.457308]  kthread+0x328/0x630
[   20.457352]  ret_from_fork+0x10/0x20
[   20.457403] 
[   20.457437] The buggy address belongs to the physical page:
[   20.457587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a8
[   20.457735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.457813] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.457865] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.457915] page dumped because: kasan: bad access detected
[   20.457953] 
[   20.457971] Memory state around the buggy address:
[   20.458004]  fff00000c79a7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.458055]  fff00000c79a7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.458097] >fff00000c79a8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.458135]                    ^
[   20.458162]  fff00000c79a8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.458211]  fff00000c79a8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.458250] ==================================================================
[   20.421241] ==================================================================
[   20.421300] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.421355] Read of size 1 at addr fff00000c79a8000 by task kunit_try_catch/229
[   20.421405] 
[   20.421469] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.421556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.421583] Hardware name: linux,dummy-virt (DT)
[   20.421614] Call trace:
[   20.421636]  show_stack+0x20/0x38 (C)
[   20.421694]  dump_stack_lvl+0x8c/0xd0
[   20.421751]  print_report+0x118/0x608
[   20.421799]  kasan_report+0xdc/0x128
[   20.421844]  __asan_report_load1_noabort+0x20/0x30
[   20.421892]  mempool_uaf_helper+0x314/0x340
[   20.421938]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.421986]  kunit_try_run_case+0x170/0x3f0
[   20.422042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.422096]  kthread+0x328/0x630
[   20.422137]  ret_from_fork+0x10/0x20
[   20.422185] 
[   20.422204] The buggy address belongs to the physical page:
[   20.422244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a8
[   20.422296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.422341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.422393] page_type: f8(unknown)
[   20.423051] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.423141] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.423198] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.423252] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.423307] head: 0bfffe0000000002 ffffc1ffc31e6a01 00000000ffffffff 00000000ffffffff
[   20.423384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.423441] page dumped because: kasan: bad access detected
[   20.423482] 
[   20.423596] Memory state around the buggy address:
[   20.423636]  fff00000c79a7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.423709]  fff00000c79a7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.423752] >fff00000c79a8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.423789]                    ^
[   20.423815]  fff00000c79a8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.423857]  fff00000c79a8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.423895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   20.392945] ==================================================================
[   20.393025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.393119] Read of size 1 at addr fff00000c588b2bb by task kunit_try_catch/225
[   20.393171] 
[   20.393236] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.393363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.393400] Hardware name: linux,dummy-virt (DT)
[   20.393466] Call trace:
[   20.393491]  show_stack+0x20/0x38 (C)
[   20.393540]  dump_stack_lvl+0x8c/0xd0
[   20.393592]  print_report+0x118/0x608
[   20.393639]  kasan_report+0xdc/0x128
[   20.393695]  __asan_report_load1_noabort+0x20/0x30
[   20.393744]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.393794]  mempool_slab_oob_right+0xc0/0x118
[   20.393850]  kunit_try_run_case+0x170/0x3f0
[   20.393899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.393953]  kthread+0x328/0x630
[   20.393995]  ret_from_fork+0x10/0x20
[   20.394043] 
[   20.394061] Allocated by task 225:
[   20.394090]  kasan_save_stack+0x3c/0x68
[   20.394129]  kasan_save_track+0x20/0x40
[   20.394175]  kasan_save_alloc_info+0x40/0x58
[   20.394213]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.394264]  remove_element+0x16c/0x1f8
[   20.394302]  mempool_alloc_preallocated+0x58/0xc0
[   20.394341]  mempool_oob_right_helper+0x98/0x2f0
[   20.394384]  mempool_slab_oob_right+0xc0/0x118
[   20.394433]  kunit_try_run_case+0x170/0x3f0
[   20.394470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.394514]  kthread+0x328/0x630
[   20.394545]  ret_from_fork+0x10/0x20
[   20.394580] 
[   20.394600] The buggy address belongs to the object at fff00000c588b240
[   20.394600]  which belongs to the cache test_cache of size 123
[   20.394655] The buggy address is located 0 bytes to the right of
[   20.394655]  allocated 123-byte region [fff00000c588b240, fff00000c588b2bb)
[   20.394715] 
[   20.394737] The buggy address belongs to the physical page:
[   20.394767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10588b
[   20.394817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.394889] page_type: f5(slab)
[   20.394932] raw: 0bfffe0000000000 fff00000c65c9500 dead000000000122 0000000000000000
[   20.394980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.395020] page dumped because: kasan: bad access detected
[   20.395051] 
[   20.395068] Memory state around the buggy address:
[   20.395102]  fff00000c588b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.395146]  fff00000c588b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.395188] >fff00000c588b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.395225]                                         ^
[   20.395257]  fff00000c588b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.395299]  fff00000c588b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.395374] ==================================================================
[   20.342369] ==================================================================
[   20.342475] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.342556] Read of size 1 at addr fff00000c657ca73 by task kunit_try_catch/221
[   20.342608] 
[   20.342653] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.342746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.342774] Hardware name: linux,dummy-virt (DT)
[   20.342809] Call trace:
[   20.342833]  show_stack+0x20/0x38 (C)
[   20.342888]  dump_stack_lvl+0x8c/0xd0
[   20.342940]  print_report+0x118/0x608
[   20.342988]  kasan_report+0xdc/0x128
[   20.343033]  __asan_report_load1_noabort+0x20/0x30
[   20.343080]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.343127]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.343176]  kunit_try_run_case+0x170/0x3f0
[   20.343227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.343280]  kthread+0x328/0x630
[   20.343324]  ret_from_fork+0x10/0x20
[   20.343392] 
[   20.343412] Allocated by task 221:
[   20.343454]  kasan_save_stack+0x3c/0x68
[   20.343498]  kasan_save_track+0x20/0x40
[   20.343535]  kasan_save_alloc_info+0x40/0x58
[   20.343572]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.343616]  remove_element+0x130/0x1f8
[   20.343653]  mempool_alloc_preallocated+0x58/0xc0
[   20.343692]  mempool_oob_right_helper+0x98/0x2f0
[   20.343730]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.343769]  kunit_try_run_case+0x170/0x3f0
[   20.343806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.343849]  kthread+0x328/0x630
[   20.343881]  ret_from_fork+0x10/0x20
[   20.343916] 
[   20.343936] The buggy address belongs to the object at fff00000c657ca00
[   20.343936]  which belongs to the cache kmalloc-128 of size 128
[   20.343994] The buggy address is located 0 bytes to the right of
[   20.343994]  allocated 115-byte region [fff00000c657ca00, fff00000c657ca73)
[   20.344057] 
[   20.344078] The buggy address belongs to the physical page:
[   20.344113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   20.344166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.344221] page_type: f5(slab)
[   20.344264] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.344316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.344357] page dumped because: kasan: bad access detected
[   20.344389] 
[   20.344408] Memory state around the buggy address:
[   20.344450]  fff00000c657c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.344493]  fff00000c657c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344536] >fff00000c657ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.344576]                                                              ^
[   20.344615]  fff00000c657ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344656]  fff00000c657cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.344695] ==================================================================
[   20.373838] ==================================================================
[   20.373922] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.373999] Read of size 1 at addr fff00000c795e001 by task kunit_try_catch/223
[   20.374049] 
[   20.374089] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.374178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.374206] Hardware name: linux,dummy-virt (DT)
[   20.374239] Call trace:
[   20.374264]  show_stack+0x20/0x38 (C)
[   20.374314]  dump_stack_lvl+0x8c/0xd0
[   20.374366]  print_report+0x118/0x608
[   20.374413]  kasan_report+0xdc/0x128
[   20.374476]  __asan_report_load1_noabort+0x20/0x30
[   20.374524]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.374572]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.374622]  kunit_try_run_case+0x170/0x3f0
[   20.374674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.374726]  kthread+0x328/0x630
[   20.374772]  ret_from_fork+0x10/0x20
[   20.374819] 
[   20.374842] The buggy address belongs to the physical page:
[   20.374877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.374931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.374977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.375036] page_type: f8(unknown)
[   20.375081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.375130] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.375180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.375228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.375276] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff
[   20.375325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.375408] page dumped because: kasan: bad access detected
[   20.375447] 
[   20.375487] Memory state around the buggy address:
[   20.375521]  fff00000c795df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.375564]  fff00000c795df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.375607] >fff00000c795e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375646]                    ^
[   20.375673]  fff00000c795e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375715]  fff00000c795e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375753] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   19.783213] ==================================================================
[   19.783303] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.783418] Read of size 1 at addr fff00000c65c9280 by task kunit_try_catch/215
[   19.783480] 
[   19.783520] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   19.783610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.783638] Hardware name: linux,dummy-virt (DT)
[   19.783672] Call trace:
[   19.783698]  show_stack+0x20/0x38 (C)
[   19.783749]  dump_stack_lvl+0x8c/0xd0
[   19.783801]  print_report+0x118/0x608
[   19.783847]  kasan_report+0xdc/0x128
[   19.783892]  __kasan_check_byte+0x54/0x70
[   19.783939]  kmem_cache_destroy+0x34/0x218
[   19.783988]  kmem_cache_double_destroy+0x174/0x300
[   19.784043]  kunit_try_run_case+0x170/0x3f0
[   19.784093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.784147]  kthread+0x328/0x630
[   19.784191]  ret_from_fork+0x10/0x20
[   19.784238] 
[   19.784257] Allocated by task 215:
[   19.784287]  kasan_save_stack+0x3c/0x68
[   19.784326]  kasan_save_track+0x20/0x40
[   19.784365]  kasan_save_alloc_info+0x40/0x58
[   19.784400]  __kasan_slab_alloc+0xa8/0xb0
[   19.784447]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.784487]  __kmem_cache_create_args+0x178/0x280
[   19.784527]  kmem_cache_double_destroy+0xc0/0x300
[   19.784565]  kunit_try_run_case+0x170/0x3f0
[   19.784604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.784648]  kthread+0x328/0x630
[   19.784679]  ret_from_fork+0x10/0x20
[   19.784715] 
[   19.784733] Freed by task 215:
[   19.784759]  kasan_save_stack+0x3c/0x68
[   19.784797]  kasan_save_track+0x20/0x40
[   19.784838]  kasan_save_free_info+0x4c/0x78
[   19.784874]  __kasan_slab_free+0x6c/0x98
[   19.784911]  kmem_cache_free+0x260/0x468
[   19.784947]  slab_kmem_cache_release+0x38/0x50
[   19.784986]  kmem_cache_release+0x1c/0x30
[   19.785022]  kobject_put+0x17c/0x420
[   19.785058]  sysfs_slab_release+0x1c/0x30
[   19.785094]  kmem_cache_destroy+0x118/0x218
[   19.785133]  kmem_cache_double_destroy+0x128/0x300
[   19.785171]  kunit_try_run_case+0x170/0x3f0
[   19.785209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.785252]  kthread+0x328/0x630
[   19.785284]  ret_from_fork+0x10/0x20
[   19.785318] 
[   19.785339] The buggy address belongs to the object at fff00000c65c9280
[   19.785339]  which belongs to the cache kmem_cache of size 208
[   19.785396] The buggy address is located 0 bytes inside of
[   19.785396]  freed 208-byte region [fff00000c65c9280, fff00000c65c9350)
[   19.785466] 
[   19.785487] The buggy address belongs to the physical page:
[   19.785521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c9
[   19.785575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.785630] page_type: f5(slab)
[   19.785672] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.785723] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.785765] page dumped because: kasan: bad access detected
[   19.785799] 
[   19.785816] Memory state around the buggy address:
[   19.785850]  fff00000c65c9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.785893]  fff00000c65c9200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.785937] >fff00000c65c9280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.785983]                    ^
[   19.786014]  fff00000c65c9300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.786055]  fff00000c65c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.786095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   19.529135] ==================================================================
[   19.529461] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.529586] Read of size 1 at addr fff00000c65d7000 by task kunit_try_catch/213
[   19.529640] 
[   19.529690] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   19.529787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529813] Hardware name: linux,dummy-virt (DT)
[   19.529874] Call trace:
[   19.529899]  show_stack+0x20/0x38 (C)
[   19.529969]  dump_stack_lvl+0x8c/0xd0
[   19.530030]  print_report+0x118/0x608
[   19.530098]  kasan_report+0xdc/0x128
[   19.530145]  __asan_report_load1_noabort+0x20/0x30
[   19.530194]  kmem_cache_rcu_uaf+0x388/0x468
[   19.530255]  kunit_try_run_case+0x170/0x3f0
[   19.530522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530612]  kthread+0x328/0x630
[   19.530658]  ret_from_fork+0x10/0x20
[   19.530730] 
[   19.530749] Allocated by task 213:
[   19.530781]  kasan_save_stack+0x3c/0x68
[   19.530838]  kasan_save_track+0x20/0x40
[   19.530883]  kasan_save_alloc_info+0x40/0x58
[   19.531100]  __kasan_slab_alloc+0xa8/0xb0
[   19.531179]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.531239]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.531285]  kunit_try_run_case+0x170/0x3f0
[   19.531338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.531410]  kthread+0x328/0x630
[   19.531455]  ret_from_fork+0x10/0x20
[   19.531491] 
[   19.531509] Freed by task 0:
[   19.531810]  kasan_save_stack+0x3c/0x68
[   19.531885]  kasan_save_track+0x20/0x40
[   19.531933]  kasan_save_free_info+0x4c/0x78
[   19.532021]  __kasan_slab_free+0x6c/0x98
[   19.532057]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.532130]  rcu_core+0x9f4/0x1e20
[   19.532505]  rcu_core_si+0x18/0x30
[   19.532610]  handle_softirqs+0x374/0xb28
[   19.532678]  __do_softirq+0x1c/0x28
[   19.532735] 
[   19.532771] Last potentially related work creation:
[   19.532860]  kasan_save_stack+0x3c/0x68
[   19.532929]  kasan_record_aux_stack+0xb4/0xc8
[   19.533014]  kmem_cache_free+0x120/0x468
[   19.533103]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.533180]  kunit_try_run_case+0x170/0x3f0
[   19.533253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533523]  kthread+0x328/0x630
[   19.533612]  ret_from_fork+0x10/0x20
[   19.533728] 
[   19.533800] The buggy address belongs to the object at fff00000c65d7000
[   19.533800]  which belongs to the cache test_cache of size 200
[   19.533938] The buggy address is located 0 bytes inside of
[   19.533938]  freed 200-byte region [fff00000c65d7000, fff00000c65d70c8)
[   19.534048] 
[   19.534091] The buggy address belongs to the physical page:
[   19.534124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d7
[   19.534406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.534509] page_type: f5(slab)
[   19.534562] raw: 0bfffe0000000000 fff00000c65c9140 dead000000000122 0000000000000000
[   19.534614] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.534656] page dumped because: kasan: bad access detected
[   19.534688] 
[   19.534717] Memory state around the buggy address:
[   19.534777]  fff00000c65d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.534836]  fff00000c65d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.534890] >fff00000c65d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.534946]                    ^
[   19.534976]  fff00000c65d7080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.535028]  fff00000c65d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.535097] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   19.022342] ==================================================================
[   19.022552] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   19.022839] Free of addr fff00000c65da001 by task kunit_try_catch/211
[   19.022965] 
[   19.023167] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   19.023412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.023450] Hardware name: linux,dummy-virt (DT)
[   19.023485] Call trace:
[   19.023508]  show_stack+0x20/0x38 (C)
[   19.023563]  dump_stack_lvl+0x8c/0xd0
[   19.023613]  print_report+0x118/0x608
[   19.023743]  kasan_report_invalid_free+0xc0/0xe8
[   19.024255]  check_slab_allocation+0xfc/0x108
[   19.024308]  __kasan_slab_pre_free+0x2c/0x48
[   19.024499]  kmem_cache_free+0xf0/0x468
[   19.024876]  kmem_cache_invalid_free+0x184/0x3c8
[   19.025088]  kunit_try_run_case+0x170/0x3f0
[   19.025256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.025397]  kthread+0x328/0x630
[   19.025455]  ret_from_fork+0x10/0x20
[   19.025521] 
[   19.025574] Allocated by task 211:
[   19.025603]  kasan_save_stack+0x3c/0x68
[   19.025814]  kasan_save_track+0x20/0x40
[   19.025945]  kasan_save_alloc_info+0x40/0x58
[   19.025990]  __kasan_slab_alloc+0xa8/0xb0
[   19.026045]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.026086]  kmem_cache_invalid_free+0x12c/0x3c8
[   19.026125]  kunit_try_run_case+0x170/0x3f0
[   19.026195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.026239]  kthread+0x328/0x630
[   19.026278]  ret_from_fork+0x10/0x20
[   19.026437] 
[   19.026458] The buggy address belongs to the object at fff00000c65da000
[   19.026458]  which belongs to the cache test_cache of size 200
[   19.026515] The buggy address is located 1 bytes inside of
[   19.026515]  200-byte region [fff00000c65da000, fff00000c65da0c8)
[   19.026573] 
[   19.026596] The buggy address belongs to the physical page:
[   19.026629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065da
[   19.026685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.026930] page_type: f5(slab)
[   19.027127] raw: 0bfffe0000000000 fff00000c65c9000 dead000000000122 0000000000000000
[   19.027328] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.027538] page dumped because: kasan: bad access detected
[   19.027573] 
[   19.027591] Memory state around the buggy address:
[   19.027626]  fff00000c65d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.027670]  fff00000c65d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.027713] >fff00000c65da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.027750]                    ^
[   19.027777]  fff00000c65da080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.028106]  fff00000c65da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.028268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   18.981156] ==================================================================
[   18.981251] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.981509] Free of addr fff00000c65c9000 by task kunit_try_catch/209
[   18.981565] 
[   18.981763] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.981883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.981937] Hardware name: linux,dummy-virt (DT)
[   18.981974] Call trace:
[   18.982013]  show_stack+0x20/0x38 (C)
[   18.982069]  dump_stack_lvl+0x8c/0xd0
[   18.982166]  print_report+0x118/0x608
[   18.982215]  kasan_report_invalid_free+0xc0/0xe8
[   18.982303]  check_slab_allocation+0xd4/0x108
[   18.982471]  __kasan_slab_pre_free+0x2c/0x48
[   18.982598]  kmem_cache_free+0xf0/0x468
[   18.982679]  kmem_cache_double_free+0x190/0x3c8
[   18.982747]  kunit_try_run_case+0x170/0x3f0
[   18.982798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.982853]  kthread+0x328/0x630
[   18.982897]  ret_from_fork+0x10/0x20
[   18.982947] 
[   18.982982] Allocated by task 209:
[   18.983139]  kasan_save_stack+0x3c/0x68
[   18.983184]  kasan_save_track+0x20/0x40
[   18.983219]  kasan_save_alloc_info+0x40/0x58
[   18.983257]  __kasan_slab_alloc+0xa8/0xb0
[   18.983418]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.983568]  kmem_cache_double_free+0x12c/0x3c8
[   18.983619]  kunit_try_run_case+0x170/0x3f0
[   18.983658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.983724]  kthread+0x328/0x630
[   18.983757]  ret_from_fork+0x10/0x20
[   18.983793] 
[   18.983811] Freed by task 209:
[   18.983930]  kasan_save_stack+0x3c/0x68
[   18.983972]  kasan_save_track+0x20/0x40
[   18.984007]  kasan_save_free_info+0x4c/0x78
[   18.984043]  __kasan_slab_free+0x6c/0x98
[   18.984079]  kmem_cache_free+0x260/0x468
[   18.984116]  kmem_cache_double_free+0x140/0x3c8
[   18.984154]  kunit_try_run_case+0x170/0x3f0
[   18.984190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.984234]  kthread+0x328/0x630
[   18.984318]  ret_from_fork+0x10/0x20
[   18.984375] 
[   18.984494] The buggy address belongs to the object at fff00000c65c9000
[   18.984494]  which belongs to the cache test_cache of size 200
[   18.984611] The buggy address is located 0 bytes inside of
[   18.984611]  200-byte region [fff00000c65c9000, fff00000c65c90c8)
[   18.984742] 
[   18.984852] The buggy address belongs to the physical page:
[   18.984931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c9
[   18.984988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.985043] page_type: f5(slab)
[   18.985085] raw: 0bfffe0000000000 fff00000c16fadc0 dead000000000122 0000000000000000
[   18.985135] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.985317] page dumped because: kasan: bad access detected
[   18.985402] 
[   18.985452] Memory state around the buggy address:
[   18.985537]  fff00000c65c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.985623]  fff00000c65c8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.985687] >fff00000c65c9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.985728]                    ^
[   18.985755]  fff00000c65c9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.985798]  fff00000c65c9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.985838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   18.721765] ==================================================================
[   18.721836] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.721901] Read of size 1 at addr fff00000c65cb0c8 by task kunit_try_catch/207
[   18.721953] 
[   18.721991] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.722270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.722328] Hardware name: linux,dummy-virt (DT)
[   18.722362] Call trace:
[   18.722394]  show_stack+0x20/0x38 (C)
[   18.722638]  dump_stack_lvl+0x8c/0xd0
[   18.722996]  print_report+0x118/0x608
[   18.723075]  kasan_report+0xdc/0x128
[   18.723134]  __asan_report_load1_noabort+0x20/0x30
[   18.723184]  kmem_cache_oob+0x344/0x430
[   18.723228]  kunit_try_run_case+0x170/0x3f0
[   18.723402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.723508]  kthread+0x328/0x630
[   18.723623]  ret_from_fork+0x10/0x20
[   18.723772] 
[   18.723810] Allocated by task 207:
[   18.723840]  kasan_save_stack+0x3c/0x68
[   18.723901]  kasan_save_track+0x20/0x40
[   18.724177]  kasan_save_alloc_info+0x40/0x58
[   18.724267]  __kasan_slab_alloc+0xa8/0xb0
[   18.724340]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.724379]  kmem_cache_oob+0x12c/0x430
[   18.724416]  kunit_try_run_case+0x170/0x3f0
[   18.724463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.724690]  kthread+0x328/0x630
[   18.724790]  ret_from_fork+0x10/0x20
[   18.724916] 
[   18.724999] The buggy address belongs to the object at fff00000c65cb000
[   18.724999]  which belongs to the cache test_cache of size 200
[   18.725114] The buggy address is located 0 bytes to the right of
[   18.725114]  allocated 200-byte region [fff00000c65cb000, fff00000c65cb0c8)
[   18.725242] 
[   18.725311] The buggy address belongs to the physical page:
[   18.725343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb
[   18.725733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.725871] page_type: f5(slab)
[   18.725958] raw: 0bfffe0000000000 fff00000c16fac80 dead000000000122 0000000000000000
[   18.726084] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.726152] page dumped because: kasan: bad access detected
[   18.726250] 
[   18.726302] Memory state around the buggy address:
[   18.726359]  fff00000c65caf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.726495]  fff00000c65cb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.726575] >fff00000c65cb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.726635]                                               ^
[   18.726671]  fff00000c65cb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.726912]  fff00000c65cb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.727083] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   18.670330] ==================================================================
[   18.670420] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.670503] Read of size 8 at addr fff00000c5933840 by task kunit_try_catch/200
[   18.670556] 
[   18.671081] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.671487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.671553] Hardware name: linux,dummy-virt (DT)
[   18.671614] Call trace:
[   18.671811]  show_stack+0x20/0x38 (C)
[   18.672076]  dump_stack_lvl+0x8c/0xd0
[   18.672135]  print_report+0x118/0x608
[   18.672326]  kasan_report+0xdc/0x128
[   18.672376]  __asan_report_load8_noabort+0x20/0x30
[   18.672516]  workqueue_uaf+0x480/0x4a8
[   18.672691]  kunit_try_run_case+0x170/0x3f0
[   18.672742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.672797]  kthread+0x328/0x630
[   18.672848]  ret_from_fork+0x10/0x20
[   18.672900] 
[   18.673776] Allocated by task 200:
[   18.673912]  kasan_save_stack+0x3c/0x68
[   18.674240]  kasan_save_track+0x20/0x40
[   18.674281]  kasan_save_alloc_info+0x40/0x58
[   18.674318]  __kasan_kmalloc+0xd4/0xd8
[   18.674357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.674550]  workqueue_uaf+0x13c/0x4a8
[   18.674595]  kunit_try_run_case+0x170/0x3f0
[   18.674634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.674676]  kthread+0x328/0x630
[   18.674834]  ret_from_fork+0x10/0x20
[   18.674901] 
[   18.675016] Freed by task 47:
[   18.675219]  kasan_save_stack+0x3c/0x68
[   18.675266]  kasan_save_track+0x20/0x40
[   18.675302]  kasan_save_free_info+0x4c/0x78
[   18.675871]  __kasan_slab_free+0x6c/0x98
[   18.676193]  kfree+0x214/0x3c8
[   18.676241]  workqueue_uaf_work+0x18/0x30
[   18.676278]  process_one_work+0x530/0xf98
[   18.676317]  worker_thread+0x618/0xf38
[   18.676354]  kthread+0x328/0x630
[   18.676385]  ret_from_fork+0x10/0x20
[   18.676421] 
[   18.676454] Last potentially related work creation:
[   18.676481]  kasan_save_stack+0x3c/0x68
[   18.676520]  kasan_record_aux_stack+0xb4/0xc8
[   18.676557]  __queue_work+0x65c/0x1008
[   18.676592]  queue_work_on+0xbc/0xf8
[   18.676628]  workqueue_uaf+0x210/0x4a8
[   18.677348]  kunit_try_run_case+0x170/0x3f0
[   18.677649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.677752]  kthread+0x328/0x630
[   18.678198]  ret_from_fork+0x10/0x20
[   18.678254] 
[   18.678275] The buggy address belongs to the object at fff00000c5933840
[   18.678275]  which belongs to the cache kmalloc-32 of size 32
[   18.678574] The buggy address is located 0 bytes inside of
[   18.678574]  freed 32-byte region [fff00000c5933840, fff00000c5933860)
[   18.678634] 
[   18.678655] The buggy address belongs to the physical page:
[   18.679257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105933
[   18.679567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.679626] page_type: f5(slab)
[   18.679670] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.680070] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.680339] page dumped because: kasan: bad access detected
[   18.680613] 
[   18.680904] Memory state around the buggy address:
[   18.680942]  fff00000c5933700: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   18.680987]  fff00000c5933780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.681462] >fff00000c5933800: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   18.681508]                                            ^
[   18.681544]  fff00000c5933880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.681597]  fff00000c5933900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.681729] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   18.624213] ==================================================================
[   18.624352] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   18.624439] Read of size 4 at addr fff00000c5933640 by task swapper/1/0
[   18.624486] 
[   18.624526] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.624614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.624642] Hardware name: linux,dummy-virt (DT)
[   18.624676] Call trace:
[   18.624699]  show_stack+0x20/0x38 (C)
[   18.624751]  dump_stack_lvl+0x8c/0xd0
[   18.624801]  print_report+0x118/0x608
[   18.624853]  kasan_report+0xdc/0x128
[   18.624897]  __asan_report_load4_noabort+0x20/0x30
[   18.624944]  rcu_uaf_reclaim+0x64/0x70
[   18.624988]  rcu_core+0x9f4/0x1e20
[   18.625034]  rcu_core_si+0x18/0x30
[   18.625077]  handle_softirqs+0x374/0xb28
[   18.627542]  __do_softirq+0x1c/0x28
[   18.627615]  ____do_softirq+0x18/0x30
[   18.627661]  call_on_irq_stack+0x24/0x30
[   18.627760]  do_softirq_own_stack+0x24/0x38
[   18.627809]  __irq_exit_rcu+0x1fc/0x318
[   18.627853]  irq_exit_rcu+0x1c/0x80
[   18.627897]  el1_interrupt+0x38/0x58
[   18.627940]  el1h_64_irq_handler+0x18/0x28
[   18.627986]  el1h_64_irq+0x6c/0x70
[   18.628090]  arch_local_irq_enable+0x4/0x8 (P)
[   18.628172]  do_idle+0x384/0x4e8
[   18.628366]  cpu_startup_entry+0x64/0x80
[   18.628558]  secondary_start_kernel+0x288/0x340
[   18.628834]  __secondary_switched+0xc0/0xc8
[   18.628924] 
[   18.628945] Allocated by task 198:
[   18.629102]  kasan_save_stack+0x3c/0x68
[   18.629543]  kasan_save_track+0x20/0x40
[   18.629839]  kasan_save_alloc_info+0x40/0x58
[   18.629956]  __kasan_kmalloc+0xd4/0xd8
[   18.629997]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.630220]  rcu_uaf+0xb0/0x2d8
[   18.630259]  kunit_try_run_case+0x170/0x3f0
[   18.630866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.631256]  kthread+0x328/0x630
[   18.631299]  ret_from_fork+0x10/0x20
[   18.631336] 
[   18.631850] Freed by task 0:
[   18.631993]  kasan_save_stack+0x3c/0x68
[   18.632144]  kasan_save_track+0x20/0x40
[   18.632280]  kasan_save_free_info+0x4c/0x78
[   18.632317]  __kasan_slab_free+0x6c/0x98
[   18.632354]  kfree+0x214/0x3c8
[   18.632865]  rcu_uaf_reclaim+0x28/0x70
[   18.632913]  rcu_core+0x9f4/0x1e20
[   18.632950]  rcu_core_si+0x18/0x30
[   18.632984]  handle_softirqs+0x374/0xb28
[   18.633021]  __do_softirq+0x1c/0x28
[   18.633056] 
[   18.633105] Last potentially related work creation:
[   18.633197]  kasan_save_stack+0x3c/0x68
[   18.633239]  kasan_record_aux_stack+0xb4/0xc8
[   18.633277]  __call_rcu_common.constprop.0+0x70/0x8b0
[   18.633358]  call_rcu+0x18/0x30
[   18.633519]  rcu_uaf+0x14c/0x2d8
[   18.633643]  kunit_try_run_case+0x170/0x3f0
[   18.633712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.633757]  kthread+0x328/0x630
[   18.633844]  ret_from_fork+0x10/0x20
[   18.633999] 
[   18.634061] The buggy address belongs to the object at fff00000c5933640
[   18.634061]  which belongs to the cache kmalloc-32 of size 32
[   18.634233] The buggy address is located 0 bytes inside of
[   18.634233]  freed 32-byte region [fff00000c5933640, fff00000c5933660)
[   18.634401] 
[   18.634432] The buggy address belongs to the physical page:
[   18.634947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105933
[   18.635069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.635318] page_type: f5(slab)
[   18.635449] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.635502] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.635769] page dumped because: kasan: bad access detected
[   18.636048] 
[   18.636067] Memory state around the buggy address:
[   18.636558]  fff00000c5933500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.636629]  fff00000c5933580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.637088] >fff00000c5933600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.637243]                                            ^
[   18.637750]  fff00000c5933680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638210]  fff00000c5933700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   18.492928] ==================================================================
[   18.492986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.493036] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196
[   18.493110] 
[   18.493140] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.493252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.493305] Hardware name: linux,dummy-virt (DT)
[   18.493334] Call trace:
[   18.493357]  show_stack+0x20/0x38 (C)
[   18.493418]  dump_stack_lvl+0x8c/0xd0
[   18.493477]  print_report+0x118/0x608
[   18.493539]  kasan_report+0xdc/0x128
[   18.493594]  __asan_report_load1_noabort+0x20/0x30
[   18.493704]  ksize_uaf+0x598/0x5f8
[   18.493748]  kunit_try_run_case+0x170/0x3f0
[   18.493814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.493890]  kthread+0x328/0x630
[   18.493957]  ret_from_fork+0x10/0x20
[   18.494012] 
[   18.494079] Allocated by task 196:
[   18.494147]  kasan_save_stack+0x3c/0x68
[   18.494189]  kasan_save_track+0x20/0x40
[   18.494227]  kasan_save_alloc_info+0x40/0x58
[   18.494263]  __kasan_kmalloc+0xd4/0xd8
[   18.494298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.494369]  ksize_uaf+0xb8/0x5f8
[   18.494404]  kunit_try_run_case+0x170/0x3f0
[   18.494461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.494505]  kthread+0x328/0x630
[   18.494571]  ret_from_fork+0x10/0x20
[   18.494607] 
[   18.494626] Freed by task 196:
[   18.494652]  kasan_save_stack+0x3c/0x68
[   18.494689]  kasan_save_track+0x20/0x40
[   18.494726]  kasan_save_free_info+0x4c/0x78
[   18.494770]  __kasan_slab_free+0x6c/0x98
[   18.494827]  kfree+0x214/0x3c8
[   18.494865]  ksize_uaf+0x11c/0x5f8
[   18.494900]  kunit_try_run_case+0x170/0x3f0
[   18.494955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.495006]  kthread+0x328/0x630
[   18.495065]  ret_from_fork+0x10/0x20
[   18.495133] 
[   18.495158] The buggy address belongs to the object at fff00000c65b1600
[   18.495158]  which belongs to the cache kmalloc-128 of size 128
[   18.495227] The buggy address is located 0 bytes inside of
[   18.495227]  freed 128-byte region [fff00000c65b1600, fff00000c65b1680)
[   18.495289] 
[   18.495308] The buggy address belongs to the physical page:
[   18.495369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.495476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.495539] page_type: f5(slab)
[   18.495846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.495938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.496042] page dumped because: kasan: bad access detected
[   18.496074] 
[   18.496092] Memory state around the buggy address:
[   18.496187]  fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.496342]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.496383] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.496420]                    ^
[   18.496457]  fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.496540]  fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.496654] ==================================================================
[   18.497102] ==================================================================
[   18.497189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.497236] Read of size 1 at addr fff00000c65b1678 by task kunit_try_catch/196
[   18.497406] 
[   18.497448] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.497545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.497590] Hardware name: linux,dummy-virt (DT)
[   18.497637] Call trace:
[   18.497666]  show_stack+0x20/0x38 (C)
[   18.497747]  dump_stack_lvl+0x8c/0xd0
[   18.497823]  print_report+0x118/0x608
[   18.497869]  kasan_report+0xdc/0x128
[   18.497932]  __asan_report_load1_noabort+0x20/0x30
[   18.497994]  ksize_uaf+0x544/0x5f8
[   18.498037]  kunit_try_run_case+0x170/0x3f0
[   18.498084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.498136]  kthread+0x328/0x630
[   18.498181]  ret_from_fork+0x10/0x20
[   18.498229] 
[   18.498247] Allocated by task 196:
[   18.498275]  kasan_save_stack+0x3c/0x68
[   18.498313]  kasan_save_track+0x20/0x40
[   18.498375]  kasan_save_alloc_info+0x40/0x58
[   18.498413]  __kasan_kmalloc+0xd4/0xd8
[   18.498469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.498508]  ksize_uaf+0xb8/0x5f8
[   18.498552]  kunit_try_run_case+0x170/0x3f0
[   18.498589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.498631]  kthread+0x328/0x630
[   18.498664]  ret_from_fork+0x10/0x20
[   18.498699] 
[   18.498717] Freed by task 196:
[   18.498752]  kasan_save_stack+0x3c/0x68
[   18.498790]  kasan_save_track+0x20/0x40
[   18.498827]  kasan_save_free_info+0x4c/0x78
[   18.498864]  __kasan_slab_free+0x6c/0x98
[   18.498901]  kfree+0x214/0x3c8
[   18.498933]  ksize_uaf+0x11c/0x5f8
[   18.498967]  kunit_try_run_case+0x170/0x3f0
[   18.499005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.499048]  kthread+0x328/0x630
[   18.499078]  ret_from_fork+0x10/0x20
[   18.499113] 
[   18.499132] The buggy address belongs to the object at fff00000c65b1600
[   18.499132]  which belongs to the cache kmalloc-128 of size 128
[   18.499190] The buggy address is located 120 bytes inside of
[   18.499190]  freed 128-byte region [fff00000c65b1600, fff00000c65b1680)
[   18.499262] 
[   18.499288] The buggy address belongs to the physical page:
[   18.499326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.499435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.499484] page_type: f5(slab)
[   18.499522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.499783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.499825] page dumped because: kasan: bad access detected
[   18.499854] 
[   18.499872] Memory state around the buggy address:
[   18.499920]  fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.499962]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.500003] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.500058]                                                                 ^
[   18.500099]  fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.500140]  fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.500178] ==================================================================
[   18.485014] ==================================================================
[   18.485106] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.485158] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196
[   18.485235] 
[   18.485267] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.485446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.485487] Hardware name: linux,dummy-virt (DT)
[   18.485583] Call trace:
[   18.485624]  show_stack+0x20/0x38 (C)
[   18.485729]  dump_stack_lvl+0x8c/0xd0
[   18.485815]  print_report+0x118/0x608
[   18.485861]  kasan_report+0xdc/0x128
[   18.485905]  __kasan_check_byte+0x54/0x70
[   18.485951]  ksize+0x30/0x88
[   18.485994]  ksize_uaf+0x168/0x5f8
[   18.486051]  kunit_try_run_case+0x170/0x3f0
[   18.486117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.486170]  kthread+0x328/0x630
[   18.486212]  ret_from_fork+0x10/0x20
[   18.486349] 
[   18.486376] Allocated by task 196:
[   18.486403]  kasan_save_stack+0x3c/0x68
[   18.486462]  kasan_save_track+0x20/0x40
[   18.486498]  kasan_save_alloc_info+0x40/0x58
[   18.486551]  __kasan_kmalloc+0xd4/0xd8
[   18.486655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.486712]  ksize_uaf+0xb8/0x5f8
[   18.486747]  kunit_try_run_case+0x170/0x3f0
[   18.486785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.486828]  kthread+0x328/0x630
[   18.486893]  ret_from_fork+0x10/0x20
[   18.486929] 
[   18.486947] Freed by task 196:
[   18.486988]  kasan_save_stack+0x3c/0x68
[   18.487026]  kasan_save_track+0x20/0x40
[   18.487062]  kasan_save_free_info+0x4c/0x78
[   18.487204]  __kasan_slab_free+0x6c/0x98
[   18.487259]  kfree+0x214/0x3c8
[   18.487387]  ksize_uaf+0x11c/0x5f8
[   18.487451]  kunit_try_run_case+0x170/0x3f0
[   18.487587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.487678]  kthread+0x328/0x630
[   18.487822]  ret_from_fork+0x10/0x20
[   18.487890] 
[   18.487912] The buggy address belongs to the object at fff00000c65b1600
[   18.487912]  which belongs to the cache kmalloc-128 of size 128
[   18.487970] The buggy address is located 0 bytes inside of
[   18.487970]  freed 128-byte region [fff00000c65b1600, fff00000c65b1680)
[   18.488049] 
[   18.488071] The buggy address belongs to the physical page:
[   18.488102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.488156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.488390] page_type: f5(slab)
[   18.488503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.488582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.488709] page dumped because: kasan: bad access detected
[   18.488829] 
[   18.488933] Memory state around the buggy address:
[   18.489072]  fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.489134]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489288] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.489541]                    ^
[   18.489634]  fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489789]  fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489891] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   18.472862] ==================================================================
[   18.472934] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.472999] Read of size 1 at addr fff00000c65b1578 by task kunit_try_catch/194
[   18.473063] 
[   18.473113] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.473214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.473243] Hardware name: linux,dummy-virt (DT)
[   18.473275] Call trace:
[   18.473295]  show_stack+0x20/0x38 (C)
[   18.473407]  dump_stack_lvl+0x8c/0xd0
[   18.473527]  print_report+0x118/0x608
[   18.473596]  kasan_report+0xdc/0x128
[   18.473672]  __asan_report_load1_noabort+0x20/0x30
[   18.473739]  ksize_unpoisons_memory+0x618/0x740
[   18.473807]  kunit_try_run_case+0x170/0x3f0
[   18.473880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.473933]  kthread+0x328/0x630
[   18.473999]  ret_from_fork+0x10/0x20
[   18.474046] 
[   18.474065] Allocated by task 194:
[   18.474193]  kasan_save_stack+0x3c/0x68
[   18.474341]  kasan_save_track+0x20/0x40
[   18.474378]  kasan_save_alloc_info+0x40/0x58
[   18.474414]  __kasan_kmalloc+0xd4/0xd8
[   18.474460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.474518]  ksize_unpoisons_memory+0xc0/0x740
[   18.474575]  kunit_try_run_case+0x170/0x3f0
[   18.474642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.474736]  kthread+0x328/0x630
[   18.474769]  ret_from_fork+0x10/0x20
[   18.474802] 
[   18.474827] The buggy address belongs to the object at fff00000c65b1500
[   18.474827]  which belongs to the cache kmalloc-128 of size 128
[   18.475023] The buggy address is located 5 bytes to the right of
[   18.475023]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.475098] 
[   18.475204] The buggy address belongs to the physical page:
[   18.475253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.475321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.475376] page_type: f5(slab)
[   18.475445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.475603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.475713] page dumped because: kasan: bad access detected
[   18.475745] 
[   18.475763] Memory state around the buggy address:
[   18.475794]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.475857]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.475900] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.475938]                                                                 ^
[   18.475977]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.476040]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.476227] ==================================================================
[   18.477353] ==================================================================
[   18.477409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.477491] Read of size 1 at addr fff00000c65b157f by task kunit_try_catch/194
[   18.477558] 
[   18.477606] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.477696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.477724] Hardware name: linux,dummy-virt (DT)
[   18.477754] Call trace:
[   18.477880]  show_stack+0x20/0x38 (C)
[   18.477939]  dump_stack_lvl+0x8c/0xd0
[   18.478000]  print_report+0x118/0x608
[   18.478045]  kasan_report+0xdc/0x128
[   18.478095]  __asan_report_load1_noabort+0x20/0x30
[   18.478144]  ksize_unpoisons_memory+0x690/0x740
[   18.478194]  kunit_try_run_case+0x170/0x3f0
[   18.478241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.478292]  kthread+0x328/0x630
[   18.478335]  ret_from_fork+0x10/0x20
[   18.478380] 
[   18.478414] Allocated by task 194:
[   18.478460]  kasan_save_stack+0x3c/0x68
[   18.478500]  kasan_save_track+0x20/0x40
[   18.478545]  kasan_save_alloc_info+0x40/0x58
[   18.478581]  __kasan_kmalloc+0xd4/0xd8
[   18.478616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.478670]  ksize_unpoisons_memory+0xc0/0x740
[   18.478706]  kunit_try_run_case+0x170/0x3f0
[   18.478744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.478786]  kthread+0x328/0x630
[   18.478817]  ret_from_fork+0x10/0x20
[   18.478852] 
[   18.478875] The buggy address belongs to the object at fff00000c65b1500
[   18.478875]  which belongs to the cache kmalloc-128 of size 128
[   18.478930] The buggy address is located 12 bytes to the right of
[   18.478930]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.478994] 
[   18.479013] The buggy address belongs to the physical page:
[   18.479052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.479103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.479150] page_type: f5(slab)
[   18.479187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.479237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.479290] page dumped because: kasan: bad access detected
[   18.479322] 
[   18.479339] Memory state around the buggy address:
[   18.479405]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.479460]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479503] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.479542]                                                                 ^
[   18.479581]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479623]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479662] ==================================================================
[   18.467730] ==================================================================
[   18.467858] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.467951] Read of size 1 at addr fff00000c65b1573 by task kunit_try_catch/194
[   18.468085] 
[   18.468175] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.468300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.468382] Hardware name: linux,dummy-virt (DT)
[   18.468497] Call trace:
[   18.468580]  show_stack+0x20/0x38 (C)
[   18.468680]  dump_stack_lvl+0x8c/0xd0
[   18.468780]  print_report+0x118/0x608
[   18.468883]  kasan_report+0xdc/0x128
[   18.468930]  __asan_report_load1_noabort+0x20/0x30
[   18.469006]  ksize_unpoisons_memory+0x628/0x740
[   18.469055]  kunit_try_run_case+0x170/0x3f0
[   18.469104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.469288]  kthread+0x328/0x630
[   18.469334]  ret_from_fork+0x10/0x20
[   18.469383] 
[   18.469402] Allocated by task 194:
[   18.469516]  kasan_save_stack+0x3c/0x68
[   18.469590]  kasan_save_track+0x20/0x40
[   18.469628]  kasan_save_alloc_info+0x40/0x58
[   18.469712]  __kasan_kmalloc+0xd4/0xd8
[   18.469800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.469862]  ksize_unpoisons_memory+0xc0/0x740
[   18.469939]  kunit_try_run_case+0x170/0x3f0
[   18.470035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.470077]  kthread+0x328/0x630
[   18.470155]  ret_from_fork+0x10/0x20
[   18.470299] 
[   18.470320] The buggy address belongs to the object at fff00000c65b1500
[   18.470320]  which belongs to the cache kmalloc-128 of size 128
[   18.470399] The buggy address is located 0 bytes to the right of
[   18.470399]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.470510] 
[   18.470558] The buggy address belongs to the physical page:
[   18.470630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.470716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.470824] page_type: f5(slab)
[   18.470904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.470956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.470996] page dumped because: kasan: bad access detected
[   18.471275] 
[   18.471337] Memory state around the buggy address:
[   18.471471]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.471555]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471597] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.471636]                                                              ^
[   18.471702]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471745]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471785] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   18.454883] ==================================================================
[   18.454957] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   18.455051] Free of addr fff00000c4473be0 by task kunit_try_catch/192
[   18.455145] 
[   18.455194] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.455303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.455329] Hardware name: linux,dummy-virt (DT)
[   18.455445] Call trace:
[   18.455491]  show_stack+0x20/0x38 (C)
[   18.455541]  dump_stack_lvl+0x8c/0xd0
[   18.455588]  print_report+0x118/0x608
[   18.455805]  kasan_report_invalid_free+0xc0/0xe8
[   18.455860]  check_slab_allocation+0xd4/0x108
[   18.455920]  __kasan_slab_pre_free+0x2c/0x48
[   18.455992]  kfree+0xe8/0x3c8
[   18.456128]  kfree_sensitive+0x3c/0xb0
[   18.456253]  kmalloc_double_kzfree+0x168/0x308
[   18.456386]  kunit_try_run_case+0x170/0x3f0
[   18.456505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.456633]  kthread+0x328/0x630
[   18.456744]  ret_from_fork+0x10/0x20
[   18.456964] 
[   18.456984] Allocated by task 192:
[   18.457011]  kasan_save_stack+0x3c/0x68
[   18.457219]  kasan_save_track+0x20/0x40
[   18.457270]  kasan_save_alloc_info+0x40/0x58
[   18.457317]  __kasan_kmalloc+0xd4/0xd8
[   18.457391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.457481]  kmalloc_double_kzfree+0xb8/0x308
[   18.457625]  kunit_try_run_case+0x170/0x3f0
[   18.457716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.457812]  kthread+0x328/0x630
[   18.457949]  ret_from_fork+0x10/0x20
[   18.458012] 
[   18.458056] Freed by task 192:
[   18.458142]  kasan_save_stack+0x3c/0x68
[   18.458234]  kasan_save_track+0x20/0x40
[   18.458311]  kasan_save_free_info+0x4c/0x78
[   18.458366]  __kasan_slab_free+0x6c/0x98
[   18.458663]  kfree+0x214/0x3c8
[   18.458714]  kfree_sensitive+0x80/0xb0
[   18.458784]  kmalloc_double_kzfree+0x11c/0x308
[   18.458939]  kunit_try_run_case+0x170/0x3f0
[   18.459030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.459191]  kthread+0x328/0x630
[   18.459271]  ret_from_fork+0x10/0x20
[   18.459452] 
[   18.459523] The buggy address belongs to the object at fff00000c4473be0
[   18.459523]  which belongs to the cache kmalloc-16 of size 16
[   18.459623] The buggy address is located 0 bytes inside of
[   18.459623]  16-byte region [fff00000c4473be0, fff00000c4473bf0)
[   18.459682] 
[   18.459710] The buggy address belongs to the physical page:
[   18.459741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.459962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.460152] page_type: f5(slab)
[   18.460296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.460399] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.460537] page dumped because: kasan: bad access detected
[   18.460649] 
[   18.460764] Memory state around the buggy address:
[   18.460837]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.460941]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.461067] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.461130]                                                        ^
[   18.461168]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.461219]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.461367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   18.450420] ==================================================================
[   18.450500] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   18.450567] Read of size 1 at addr fff00000c4473be0 by task kunit_try_catch/192
[   18.450630] 
[   18.450676] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.450766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.450793] Hardware name: linux,dummy-virt (DT)
[   18.450834] Call trace:
[   18.450868]  show_stack+0x20/0x38 (C)
[   18.450919]  dump_stack_lvl+0x8c/0xd0
[   18.450968]  print_report+0x118/0x608
[   18.451015]  kasan_report+0xdc/0x128
[   18.451061]  __kasan_check_byte+0x54/0x70
[   18.451118]  kfree_sensitive+0x30/0xb0
[   18.451165]  kmalloc_double_kzfree+0x168/0x308
[   18.451217]  kunit_try_run_case+0x170/0x3f0
[   18.451267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.451319]  kthread+0x328/0x630
[   18.451410]  ret_from_fork+0x10/0x20
[   18.451471] 
[   18.451489] Allocated by task 192:
[   18.451518]  kasan_save_stack+0x3c/0x68
[   18.451558]  kasan_save_track+0x20/0x40
[   18.451596]  kasan_save_alloc_info+0x40/0x58
[   18.451669]  __kasan_kmalloc+0xd4/0xd8
[   18.451709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.451759]  kmalloc_double_kzfree+0xb8/0x308
[   18.451798]  kunit_try_run_case+0x170/0x3f0
[   18.451835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.451904]  kthread+0x328/0x630
[   18.451937]  ret_from_fork+0x10/0x20
[   18.451984] 
[   18.452002] Freed by task 192:
[   18.452030]  kasan_save_stack+0x3c/0x68
[   18.452069]  kasan_save_track+0x20/0x40
[   18.452131]  kasan_save_free_info+0x4c/0x78
[   18.452170]  __kasan_slab_free+0x6c/0x98
[   18.452490]  kfree+0x214/0x3c8
[   18.452528]  kfree_sensitive+0x80/0xb0
[   18.452564]  kmalloc_double_kzfree+0x11c/0x308
[   18.452601]  kunit_try_run_case+0x170/0x3f0
[   18.452639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452683]  kthread+0x328/0x630
[   18.452714]  ret_from_fork+0x10/0x20
[   18.452748] 
[   18.452769] The buggy address belongs to the object at fff00000c4473be0
[   18.452769]  which belongs to the cache kmalloc-16 of size 16
[   18.452832] The buggy address is located 0 bytes inside of
[   18.452832]  freed 16-byte region [fff00000c4473be0, fff00000c4473bf0)
[   18.452892] 
[   18.452913] The buggy address belongs to the physical page:
[   18.452946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.452998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.453050] page_type: f5(slab)
[   18.453091] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.453140] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.453180] page dumped because: kasan: bad access detected
[   18.453212] 
[   18.453229] Memory state around the buggy address:
[   18.453263]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.453306]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.453348] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.453386]                                                        ^
[   18.453433]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.453514]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.453574] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   18.429968] ==================================================================
[   18.430042] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   18.430109] Read of size 1 at addr fff00000c65b5e28 by task kunit_try_catch/188
[   18.430160] 
[   18.430199] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.430286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.430314] Hardware name: linux,dummy-virt (DT)
[   18.430346] Call trace:
[   18.430369]  show_stack+0x20/0x38 (C)
[   18.430420]  dump_stack_lvl+0x8c/0xd0
[   18.433986]  print_report+0x118/0x608
[   18.434036]  kasan_report+0xdc/0x128
[   18.434083]  __asan_report_load1_noabort+0x20/0x30
[   18.434133]  kmalloc_uaf2+0x3f4/0x468
[   18.434179]  kunit_try_run_case+0x170/0x3f0
[   18.434234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.434287]  kthread+0x328/0x630
[   18.434335]  ret_from_fork+0x10/0x20
[   18.434386] 
[   18.434406] Allocated by task 188:
[   18.434695]  kasan_save_stack+0x3c/0x68
[   18.434815]  kasan_save_track+0x20/0x40
[   18.434914]  kasan_save_alloc_info+0x40/0x58
[   18.434969]  __kasan_kmalloc+0xd4/0xd8
[   18.435058]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.435197]  kmalloc_uaf2+0xc4/0x468
[   18.435275]  kunit_try_run_case+0x170/0x3f0
[   18.435550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.435685]  kthread+0x328/0x630
[   18.435744]  ret_from_fork+0x10/0x20
[   18.435826] 
[   18.435934] Freed by task 188:
[   18.436016]  kasan_save_stack+0x3c/0x68
[   18.436055]  kasan_save_track+0x20/0x40
[   18.436092]  kasan_save_free_info+0x4c/0x78
[   18.436136]  __kasan_slab_free+0x6c/0x98
[   18.436173]  kfree+0x214/0x3c8
[   18.436207]  kmalloc_uaf2+0x134/0x468
[   18.436240]  kunit_try_run_case+0x170/0x3f0
[   18.436311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.436388]  kthread+0x328/0x630
[   18.436419]  ret_from_fork+0x10/0x20
[   18.436502] 
[   18.436524] The buggy address belongs to the object at fff00000c65b5e00
[   18.436524]  which belongs to the cache kmalloc-64 of size 64
[   18.436582] The buggy address is located 40 bytes inside of
[   18.436582]  freed 64-byte region [fff00000c65b5e00, fff00000c65b5e40)
[   18.436642] 
[   18.436664] The buggy address belongs to the physical page:
[   18.436696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5
[   18.436812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.436888] page_type: f5(slab)
[   18.436929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.436981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.437023] page dumped because: kasan: bad access detected
[   18.437054] 
[   18.437072] Memory state around the buggy address:
[   18.437165]  fff00000c65b5d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.437254]  fff00000c65b5d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.437328] >fff00000c65b5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.437377]                                   ^
[   18.437409]  fff00000c65b5e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   18.437470]  fff00000c65b5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.437510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   18.418172] ==================================================================
[   18.418254] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   18.418315] Write of size 33 at addr fff00000c65b5c80 by task kunit_try_catch/186
[   18.418380] 
[   18.418442] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.418531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.418557] Hardware name: linux,dummy-virt (DT)
[   18.418589] Call trace:
[   18.418620]  show_stack+0x20/0x38 (C)
[   18.418671]  dump_stack_lvl+0x8c/0xd0
[   18.418720]  print_report+0x118/0x608
[   18.418768]  kasan_report+0xdc/0x128
[   18.418812]  kasan_check_range+0x100/0x1a8
[   18.418861]  __asan_memset+0x34/0x78
[   18.418987]  kmalloc_uaf_memset+0x170/0x310
[   18.419078]  kunit_try_run_case+0x170/0x3f0
[   18.419156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.419211]  kthread+0x328/0x630
[   18.419273]  ret_from_fork+0x10/0x20
[   18.419329] 
[   18.419374] Allocated by task 186:
[   18.419404]  kasan_save_stack+0x3c/0x68
[   18.419483]  kasan_save_track+0x20/0x40
[   18.419524]  kasan_save_alloc_info+0x40/0x58
[   18.419592]  __kasan_kmalloc+0xd4/0xd8
[   18.419631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.419671]  kmalloc_uaf_memset+0xb8/0x310
[   18.419706]  kunit_try_run_case+0x170/0x3f0
[   18.419795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.419939]  kthread+0x328/0x630
[   18.420026]  ret_from_fork+0x10/0x20
[   18.420138] 
[   18.420200] Freed by task 186:
[   18.420247]  kasan_save_stack+0x3c/0x68
[   18.420285]  kasan_save_track+0x20/0x40
[   18.420320]  kasan_save_free_info+0x4c/0x78
[   18.420382]  __kasan_slab_free+0x6c/0x98
[   18.420433]  kfree+0x214/0x3c8
[   18.420465]  kmalloc_uaf_memset+0x11c/0x310
[   18.420502]  kunit_try_run_case+0x170/0x3f0
[   18.420619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.420662]  kthread+0x328/0x630
[   18.420746]  ret_from_fork+0x10/0x20
[   18.420805] 
[   18.420893] The buggy address belongs to the object at fff00000c65b5c80
[   18.420893]  which belongs to the cache kmalloc-64 of size 64
[   18.420978] The buggy address is located 0 bytes inside of
[   18.420978]  freed 64-byte region [fff00000c65b5c80, fff00000c65b5cc0)
[   18.421106] 
[   18.421170] The buggy address belongs to the physical page:
[   18.421221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5
[   18.421327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.421400] page_type: f5(slab)
[   18.421451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.421541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.421802] page dumped because: kasan: bad access detected
[   18.421873] 
[   18.421945] Memory state around the buggy address:
[   18.422030]  fff00000c65b5b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422131]  fff00000c65b5c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422184] >fff00000c65b5c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422230]                    ^
[   18.422533]  fff00000c65b5d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.422635]  fff00000c65b5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.422742] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   18.406266] ==================================================================
[   18.406337] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   18.406395] Read of size 1 at addr fff00000c4473bc8 by task kunit_try_catch/184
[   18.406460] 
[   18.406510] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.406598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.406625] Hardware name: linux,dummy-virt (DT)
[   18.406655] Call trace:
[   18.406676]  show_stack+0x20/0x38 (C)
[   18.406725]  dump_stack_lvl+0x8c/0xd0
[   18.406849]  print_report+0x118/0x608
[   18.406905]  kasan_report+0xdc/0x128
[   18.406978]  __asan_report_load1_noabort+0x20/0x30
[   18.407066]  kmalloc_uaf+0x300/0x338
[   18.407111]  kunit_try_run_case+0x170/0x3f0
[   18.407177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.407239]  kthread+0x328/0x630
[   18.407283]  ret_from_fork+0x10/0x20
[   18.407330] 
[   18.407347] Allocated by task 184:
[   18.407394]  kasan_save_stack+0x3c/0x68
[   18.407444]  kasan_save_track+0x20/0x40
[   18.407659]  kasan_save_alloc_info+0x40/0x58
[   18.407728]  __kasan_kmalloc+0xd4/0xd8
[   18.407812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.407921]  kmalloc_uaf+0xb8/0x338
[   18.407976]  kunit_try_run_case+0x170/0x3f0
[   18.408014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.408058]  kthread+0x328/0x630
[   18.408113]  ret_from_fork+0x10/0x20
[   18.408151] 
[   18.408172] Freed by task 184:
[   18.408198]  kasan_save_stack+0x3c/0x68
[   18.408234]  kasan_save_track+0x20/0x40
[   18.408537]  kasan_save_free_info+0x4c/0x78
[   18.408607]  __kasan_slab_free+0x6c/0x98
[   18.408733]  kfree+0x214/0x3c8
[   18.408802]  kmalloc_uaf+0x11c/0x338
[   18.408865]  kunit_try_run_case+0x170/0x3f0
[   18.408928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.408991]  kthread+0x328/0x630
[   18.409300]  ret_from_fork+0x10/0x20
[   18.409399] 
[   18.409514] The buggy address belongs to the object at fff00000c4473bc0
[   18.409514]  which belongs to the cache kmalloc-16 of size 16
[   18.409644] The buggy address is located 8 bytes inside of
[   18.409644]  freed 16-byte region [fff00000c4473bc0, fff00000c4473bd0)
[   18.409714] 
[   18.409735] The buggy address belongs to the physical page:
[   18.409767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.409817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.409867] page_type: f5(slab)
[   18.409907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.410065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.410134] page dumped because: kasan: bad access detected
[   18.410176] 
[   18.410218] Memory state around the buggy address:
[   18.410331]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.410469]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.410513] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   18.410551]                                               ^
[   18.410586]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.410629]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.410667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   18.394341] ==================================================================
[   18.394401] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.394473] Read of size 64 at addr fff00000c65b5984 by task kunit_try_catch/182
[   18.394521] 
[   18.394553] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.394795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.394853] Hardware name: linux,dummy-virt (DT)
[   18.394891] Call trace:
[   18.394913]  show_stack+0x20/0x38 (C)
[   18.394964]  dump_stack_lvl+0x8c/0xd0
[   18.395017]  print_report+0x118/0x608
[   18.395065]  kasan_report+0xdc/0x128
[   18.395110]  kasan_check_range+0x100/0x1a8
[   18.395157]  __asan_memmove+0x3c/0x98
[   18.395201]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.395252]  kunit_try_run_case+0x170/0x3f0
[   18.395453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.395545]  kthread+0x328/0x630
[   18.395614]  ret_from_fork+0x10/0x20
[   18.395761] 
[   18.395799] Allocated by task 182:
[   18.395826]  kasan_save_stack+0x3c/0x68
[   18.395868]  kasan_save_track+0x20/0x40
[   18.395905]  kasan_save_alloc_info+0x40/0x58
[   18.395942]  __kasan_kmalloc+0xd4/0xd8
[   18.395979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.396045]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   18.396088]  kunit_try_run_case+0x170/0x3f0
[   18.396128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.396171]  kthread+0x328/0x630
[   18.396204]  ret_from_fork+0x10/0x20
[   18.396238] 
[   18.396257] The buggy address belongs to the object at fff00000c65b5980
[   18.396257]  which belongs to the cache kmalloc-64 of size 64
[   18.396409] The buggy address is located 4 bytes inside of
[   18.396409]  allocated 64-byte region [fff00000c65b5980, fff00000c65b59c0)
[   18.396537] 
[   18.396590] The buggy address belongs to the physical page:
[   18.396704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5
[   18.396805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.396950] page_type: f5(slab)
[   18.397040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.397156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.397259] page dumped because: kasan: bad access detected
[   18.397312] 
[   18.397332] Memory state around the buggy address:
[   18.397583]  fff00000c65b5880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.397669]  fff00000c65b5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.397798] >fff00000c65b5980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.397932]                                            ^
[   18.398018]  fff00000c65b5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.398089]  fff00000c65b5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.398168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   18.383567] ==================================================================
[   18.383788] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   18.383846] Read of size 18446744073709551614 at addr fff00000c65b5784 by task kunit_try_catch/180
[   18.383952] 
[   18.383985] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.384070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.384095] Hardware name: linux,dummy-virt (DT)
[   18.384125] Call trace:
[   18.384147]  show_stack+0x20/0x38 (C)
[   18.384335]  dump_stack_lvl+0x8c/0xd0
[   18.384400]  print_report+0x118/0x608
[   18.385352]  kasan_report+0xdc/0x128
[   18.385413]  kasan_check_range+0x100/0x1a8
[   18.385475]  __asan_memmove+0x3c/0x98
[   18.385523]  kmalloc_memmove_negative_size+0x154/0x2e0
[   18.385589]  kunit_try_run_case+0x170/0x3f0
[   18.385644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.385729]  kthread+0x328/0x630
[   18.385775]  ret_from_fork+0x10/0x20
[   18.385825] 
[   18.385844] Allocated by task 180:
[   18.385872]  kasan_save_stack+0x3c/0x68
[   18.385927]  kasan_save_track+0x20/0x40
[   18.385966]  kasan_save_alloc_info+0x40/0x58
[   18.386001]  __kasan_kmalloc+0xd4/0xd8
[   18.386038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.386085]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   18.386125]  kunit_try_run_case+0x170/0x3f0
[   18.386169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.386213]  kthread+0x328/0x630
[   18.386257]  ret_from_fork+0x10/0x20
[   18.386294] 
[   18.386313] The buggy address belongs to the object at fff00000c65b5780
[   18.386313]  which belongs to the cache kmalloc-64 of size 64
[   18.386371] The buggy address is located 4 bytes inside of
[   18.386371]  64-byte region [fff00000c65b5780, fff00000c65b57c0)
[   18.386827] 
[   18.386909] The buggy address belongs to the physical page:
[   18.386984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5
[   18.387046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.387298] page_type: f5(slab)
[   18.387344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.387468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.387560] page dumped because: kasan: bad access detected
[   18.387644] 
[   18.387682] Memory state around the buggy address:
[   18.387735]  fff00000c65b5680: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   18.387834]  fff00000c65b5700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.387877] >fff00000c65b5780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.387963]                    ^
[   18.388073]  fff00000c65b5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.388182]  fff00000c65b5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.388275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   18.374121] ==================================================================
[   18.374196] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   18.374250] Write of size 16 at addr fff00000c65b1469 by task kunit_try_catch/178
[   18.374349] 
[   18.374388] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.374495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.374536] Hardware name: linux,dummy-virt (DT)
[   18.374566] Call trace:
[   18.374588]  show_stack+0x20/0x38 (C)
[   18.374666]  dump_stack_lvl+0x8c/0xd0
[   18.374817]  print_report+0x118/0x608
[   18.374952]  kasan_report+0xdc/0x128
[   18.375022]  kasan_check_range+0x100/0x1a8
[   18.375088]  __asan_memset+0x34/0x78
[   18.375130]  kmalloc_oob_memset_16+0x150/0x2f8
[   18.375176]  kunit_try_run_case+0x170/0x3f0
[   18.375244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.375316]  kthread+0x328/0x630
[   18.375392]  ret_from_fork+0x10/0x20
[   18.375457] 
[   18.375475] Allocated by task 178:
[   18.375503]  kasan_save_stack+0x3c/0x68
[   18.375542]  kasan_save_track+0x20/0x40
[   18.375580]  kasan_save_alloc_info+0x40/0x58
[   18.375615]  __kasan_kmalloc+0xd4/0xd8
[   18.375894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.376031]  kmalloc_oob_memset_16+0xb0/0x2f8
[   18.376102]  kunit_try_run_case+0x170/0x3f0
[   18.376216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.376259]  kthread+0x328/0x630
[   18.376325]  ret_from_fork+0x10/0x20
[   18.376570] 
[   18.376662] The buggy address belongs to the object at fff00000c65b1400
[   18.376662]  which belongs to the cache kmalloc-128 of size 128
[   18.376769] The buggy address is located 105 bytes inside of
[   18.376769]  allocated 120-byte region [fff00000c65b1400, fff00000c65b1478)
[   18.376900] 
[   18.376956] The buggy address belongs to the physical page:
[   18.376988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.377219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.377334] page_type: f5(slab)
[   18.377471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.377558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.377825] page dumped because: kasan: bad access detected
[   18.377862] 
[   18.377880] Memory state around the buggy address:
[   18.377965]  fff00000c65b1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.378048]  fff00000c65b1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378119] >fff00000c65b1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.378198]                                                                 ^
[   18.378291]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378349]  fff00000c65b1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure Automatically assigned
[   18.365000] ==================================================================
[   18.365076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   18.365128] Write of size 8 at addr fff00000c65b1371 by task kunit_try_catch/176
[   18.365240] 
[   18.365299] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.365407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.365492] Hardware name: linux,dummy-virt (DT)
[   18.365527] Call trace:
[   18.365567]  show_stack+0x20/0x38 (C)
[   18.365633]  dump_stack_lvl+0x8c/0xd0
[   18.365685]  print_report+0x118/0x608
[   18.365731]  kasan_report+0xdc/0x128
[   18.365775]  kasan_check_range+0x100/0x1a8
[   18.365822]  __asan_memset+0x34/0x78
[   18.365863]  kmalloc_oob_memset_8+0x150/0x2f8
[   18.366181]  kunit_try_run_case+0x170/0x3f0
[   18.366254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.366323]  kthread+0x328/0x630
[   18.366396]  ret_from_fork+0x10/0x20
[   18.366513] 
[   18.366552] Allocated by task 176:
[   18.366600]  kasan_save_stack+0x3c/0x68
[   18.366646]  kasan_save_track+0x20/0x40
[   18.366747]  kasan_save_alloc_info+0x40/0x58
[   18.366783]  __kasan_kmalloc+0xd4/0xd8
[   18.366819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.366856]  kmalloc_oob_memset_8+0xb0/0x2f8
[   18.366911]  kunit_try_run_case+0x170/0x3f0
[   18.366988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.367030]  kthread+0x328/0x630
[   18.367061]  ret_from_fork+0x10/0x20
[   18.367115] 
[   18.367151] The buggy address belongs to the object at fff00000c65b1300
[   18.367151]  which belongs to the cache kmalloc-128 of size 128
[   18.367299] The buggy address is located 113 bytes inside of
[   18.367299]  allocated 120-byte region [fff00000c65b1300, fff00000c65b1378)
[   18.367746] 
[   18.367780] The buggy address belongs to the physical page:
[   18.367840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.368066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.368145] page_type: f5(slab)
[   18.368186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.368244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.368283] page dumped because: kasan: bad access detected
[   18.368334] 
[   18.368362] Memory state around the buggy address:
[   18.368402]  fff00000c65b1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.368454]  fff00000c65b1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.368495] >fff00000c65b1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.368540]                                                                 ^
[   18.368607]  fff00000c65b1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.368656]  fff00000c65b1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.368694] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   18.357356] ==================================================================
[   18.357446] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.357519] Write of size 4 at addr fff00000c65b1275 by task kunit_try_catch/174
[   18.357585] 
[   18.357618] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.357720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.357746] Hardware name: linux,dummy-virt (DT)
[   18.357796] Call trace:
[   18.357846]  show_stack+0x20/0x38 (C)
[   18.357894]  dump_stack_lvl+0x8c/0xd0
[   18.357941]  print_report+0x118/0x608
[   18.357987]  kasan_report+0xdc/0x128
[   18.358032]  kasan_check_range+0x100/0x1a8
[   18.358079]  __asan_memset+0x34/0x78
[   18.358121]  kmalloc_oob_memset_4+0x150/0x300
[   18.358248]  kunit_try_run_case+0x170/0x3f0
[   18.358301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.358364]  kthread+0x328/0x630
[   18.358407]  ret_from_fork+0x10/0x20
[   18.358468] 
[   18.358485] Allocated by task 174:
[   18.358512]  kasan_save_stack+0x3c/0x68
[   18.358551]  kasan_save_track+0x20/0x40
[   18.358667]  kasan_save_alloc_info+0x40/0x58
[   18.358702]  __kasan_kmalloc+0xd4/0xd8
[   18.358738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.358816]  kmalloc_oob_memset_4+0xb0/0x300
[   18.358876]  kunit_try_run_case+0x170/0x3f0
[   18.358914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.358993]  kthread+0x328/0x630
[   18.359025]  ret_from_fork+0x10/0x20
[   18.359060] 
[   18.359080] The buggy address belongs to the object at fff00000c65b1200
[   18.359080]  which belongs to the cache kmalloc-128 of size 128
[   18.359134] The buggy address is located 117 bytes inside of
[   18.359134]  allocated 120-byte region [fff00000c65b1200, fff00000c65b1278)
[   18.359194] 
[   18.359213] The buggy address belongs to the physical page:
[   18.359242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.359290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.359338] page_type: f5(slab)
[   18.359523] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.359618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.359717] page dumped because: kasan: bad access detected
[   18.359787] 
[   18.359870] Memory state around the buggy address:
[   18.359963]  fff00000c65b1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.360020]  fff00000c65b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.360113] >fff00000c65b1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.360232]                                                                 ^
[   18.360300]  fff00000c65b1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.360357]  fff00000c65b1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.360393] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   18.346930] ==================================================================
[   18.347017] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   18.347071] Write of size 2 at addr fff00000c65b1177 by task kunit_try_catch/172
[   18.347339] 
[   18.347472] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.347601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.347651] Hardware name: linux,dummy-virt (DT)
[   18.347743] Call trace:
[   18.347812]  show_stack+0x20/0x38 (C)
[   18.347932]  dump_stack_lvl+0x8c/0xd0
[   18.348045]  print_report+0x118/0x608
[   18.348159]  kasan_report+0xdc/0x128
[   18.348260]  kasan_check_range+0x100/0x1a8
[   18.348309]  __asan_memset+0x34/0x78
[   18.348377]  kmalloc_oob_memset_2+0x150/0x2f8
[   18.348434]  kunit_try_run_case+0x170/0x3f0
[   18.348685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.348780]  kthread+0x328/0x630
[   18.348900]  ret_from_fork+0x10/0x20
[   18.348968] 
[   18.348998] Allocated by task 172:
[   18.349263]  kasan_save_stack+0x3c/0x68
[   18.349360]  kasan_save_track+0x20/0x40
[   18.349462]  kasan_save_alloc_info+0x40/0x58
[   18.349585]  __kasan_kmalloc+0xd4/0xd8
[   18.349656]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.349758]  kmalloc_oob_memset_2+0xb0/0x2f8
[   18.349868]  kunit_try_run_case+0x170/0x3f0
[   18.349985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.350084]  kthread+0x328/0x630
[   18.350221]  ret_from_fork+0x10/0x20
[   18.350312] 
[   18.350415] The buggy address belongs to the object at fff00000c65b1100
[   18.350415]  which belongs to the cache kmalloc-128 of size 128
[   18.350522] The buggy address is located 119 bytes inside of
[   18.350522]  allocated 120-byte region [fff00000c65b1100, fff00000c65b1178)
[   18.350867] 
[   18.350930] The buggy address belongs to the physical page:
[   18.350992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.351043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.351125] page_type: f5(slab)
[   18.351250] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.351341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.351500] page dumped because: kasan: bad access detected
[   18.351634] 
[   18.351728] Memory state around the buggy address:
[   18.351771]  fff00000c65b1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.351839]  fff00000c65b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.351880] >fff00000c65b1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.351935]                                                                 ^
[   18.351974]  fff00000c65b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.352014]  fff00000c65b1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.352050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   18.339095] ==================================================================
[   18.339152] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   18.339205] Write of size 128 at addr fff00000c65b1000 by task kunit_try_catch/170
[   18.339254] 
[   18.339287] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.339542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.339622] Hardware name: linux,dummy-virt (DT)
[   18.339726] Call trace:
[   18.339777]  show_stack+0x20/0x38 (C)
[   18.339904]  dump_stack_lvl+0x8c/0xd0
[   18.339968]  print_report+0x118/0x608
[   18.340016]  kasan_report+0xdc/0x128
[   18.340061]  kasan_check_range+0x100/0x1a8
[   18.340109]  __asan_memset+0x34/0x78
[   18.340150]  kmalloc_oob_in_memset+0x144/0x2d0
[   18.340221]  kunit_try_run_case+0x170/0x3f0
[   18.340270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.340323]  kthread+0x328/0x630
[   18.340368]  ret_from_fork+0x10/0x20
[   18.340534] 
[   18.340597] Allocated by task 170:
[   18.340707]  kasan_save_stack+0x3c/0x68
[   18.340778]  kasan_save_track+0x20/0x40
[   18.340823]  kasan_save_alloc_info+0x40/0x58
[   18.340859]  __kasan_kmalloc+0xd4/0xd8
[   18.340895]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.340934]  kmalloc_oob_in_memset+0xb0/0x2d0
[   18.340970]  kunit_try_run_case+0x170/0x3f0
[   18.341008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.341050]  kthread+0x328/0x630
[   18.341083]  ret_from_fork+0x10/0x20
[   18.341133] 
[   18.341154] The buggy address belongs to the object at fff00000c65b1000
[   18.341154]  which belongs to the cache kmalloc-128 of size 128
[   18.341216] The buggy address is located 0 bytes inside of
[   18.341216]  allocated 120-byte region [fff00000c65b1000, fff00000c65b1078)
[   18.341284] 
[   18.341303] The buggy address belongs to the physical page:
[   18.341334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.341382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.341450] page_type: f5(slab)
[   18.341487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.341545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.341583] page dumped because: kasan: bad access detected
[   18.341615] 
[   18.341645] Memory state around the buggy address:
[   18.341685]  fff00000c65b0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.341725]  fff00000c65b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.341767] >fff00000c65b1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.341803]                                                                 ^
[   18.341843]  fff00000c65b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.341891]  fff00000c65b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.341929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   18.329333] ==================================================================
[   18.329522] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   18.329623] Read of size 16 at addr fff00000c4473ba0 by task kunit_try_catch/168
[   18.329679] 
[   18.329736] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.329837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.329864] Hardware name: linux,dummy-virt (DT)
[   18.329903] Call trace:
[   18.329942]  show_stack+0x20/0x38 (C)
[   18.330009]  dump_stack_lvl+0x8c/0xd0
[   18.330057]  print_report+0x118/0x608
[   18.330103]  kasan_report+0xdc/0x128
[   18.330148]  __asan_report_load16_noabort+0x20/0x30
[   18.330195]  kmalloc_uaf_16+0x3bc/0x438
[   18.330238]  kunit_try_run_case+0x170/0x3f0
[   18.330285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.330336]  kthread+0x328/0x630
[   18.330379]  ret_from_fork+0x10/0x20
[   18.330507] 
[   18.330548] Allocated by task 168:
[   18.330597]  kasan_save_stack+0x3c/0x68
[   18.330656]  kasan_save_track+0x20/0x40
[   18.330693]  kasan_save_alloc_info+0x40/0x58
[   18.330727]  __kasan_kmalloc+0xd4/0xd8
[   18.330767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.330970]  kmalloc_uaf_16+0x140/0x438
[   18.331032]  kunit_try_run_case+0x170/0x3f0
[   18.331080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.331150]  kthread+0x328/0x630
[   18.331190]  ret_from_fork+0x10/0x20
[   18.331247] 
[   18.331266] Freed by task 168:
[   18.331292]  kasan_save_stack+0x3c/0x68
[   18.331341]  kasan_save_track+0x20/0x40
[   18.331386]  kasan_save_free_info+0x4c/0x78
[   18.331420]  __kasan_slab_free+0x6c/0x98
[   18.331466]  kfree+0x214/0x3c8
[   18.331498]  kmalloc_uaf_16+0x190/0x438
[   18.331531]  kunit_try_run_case+0x170/0x3f0
[   18.331567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.331630]  kthread+0x328/0x630
[   18.331668]  ret_from_fork+0x10/0x20
[   18.331764] 
[   18.331853] The buggy address belongs to the object at fff00000c4473ba0
[   18.331853]  which belongs to the cache kmalloc-16 of size 16
[   18.331975] The buggy address is located 0 bytes inside of
[   18.331975]  freed 16-byte region [fff00000c4473ba0, fff00000c4473bb0)
[   18.332095] 
[   18.332123] The buggy address belongs to the physical page:
[   18.332194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.332288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.332337] page_type: f5(slab)
[   18.332375] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.332434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.332473] page dumped because: kasan: bad access detected
[   18.332502] 
[   18.332541] Memory state around the buggy address:
[   18.332574]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.332615]  fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.332802] >fff00000c4473b80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   18.332848]                                ^
[   18.332904]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.332961]  fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   18.319382] ==================================================================
[   18.319551] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   18.319642] Write of size 16 at addr fff00000c4473b40 by task kunit_try_catch/166
[   18.319702] 
[   18.319735] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.319831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.319894] Hardware name: linux,dummy-virt (DT)
[   18.319934] Call trace:
[   18.319957]  show_stack+0x20/0x38 (C)
[   18.320006]  dump_stack_lvl+0x8c/0xd0
[   18.320073]  print_report+0x118/0x608
[   18.320121]  kasan_report+0xdc/0x128
[   18.320167]  __asan_report_store16_noabort+0x20/0x30
[   18.320224]  kmalloc_oob_16+0x3a0/0x3f8
[   18.320283]  kunit_try_run_case+0x170/0x3f0
[   18.320330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.320401]  kthread+0x328/0x630
[   18.320468]  ret_from_fork+0x10/0x20
[   18.320526] 
[   18.320549] Allocated by task 166:
[   18.320577]  kasan_save_stack+0x3c/0x68
[   18.320630]  kasan_save_track+0x20/0x40
[   18.320667]  kasan_save_alloc_info+0x40/0x58
[   18.320701]  __kasan_kmalloc+0xd4/0xd8
[   18.320751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.320789]  kmalloc_oob_16+0xb4/0x3f8
[   18.320828]  kunit_try_run_case+0x170/0x3f0
[   18.320866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.320907]  kthread+0x328/0x630
[   18.320947]  ret_from_fork+0x10/0x20
[   18.320980] 
[   18.320999] The buggy address belongs to the object at fff00000c4473b40
[   18.320999]  which belongs to the cache kmalloc-16 of size 16
[   18.321063] The buggy address is located 0 bytes inside of
[   18.321063]  allocated 13-byte region [fff00000c4473b40, fff00000c4473b4d)
[   18.321122] 
[   18.321141] The buggy address belongs to the physical page:
[   18.321188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.321247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.321310] page_type: f5(slab)
[   18.321357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.321413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.322008] page dumped because: kasan: bad access detected
[   18.322114] 
[   18.322155] Memory state around the buggy address:
[   18.322266]  fff00000c4473a00: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   18.322339]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.322400] >fff00000c4473b00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   18.322488]                                               ^
[   18.322543]  fff00000c4473b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.322634]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.322704] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   18.309173] ==================================================================
[   18.309476] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   18.309558] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164
[   18.309645] 
[   18.309694] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.309778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.309840] Hardware name: linux,dummy-virt (DT)
[   18.309888] Call trace:
[   18.309910]  show_stack+0x20/0x38 (C)
[   18.309964]  dump_stack_lvl+0x8c/0xd0
[   18.310031]  print_report+0x118/0x608
[   18.310103]  kasan_report+0xdc/0x128
[   18.310167]  __asan_report_load1_noabort+0x20/0x30
[   18.310234]  krealloc_uaf+0x4c8/0x520
[   18.310280]  kunit_try_run_case+0x170/0x3f0
[   18.310355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.310409]  kthread+0x328/0x630
[   18.310465]  ret_from_fork+0x10/0x20
[   18.310530] 
[   18.310736] Allocated by task 164:
[   18.310771]  kasan_save_stack+0x3c/0x68
[   18.310813]  kasan_save_track+0x20/0x40
[   18.310849]  kasan_save_alloc_info+0x40/0x58
[   18.310885]  __kasan_kmalloc+0xd4/0xd8
[   18.310937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.310977]  krealloc_uaf+0xc8/0x520
[   18.311027]  kunit_try_run_case+0x170/0x3f0
[   18.311095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.311139]  kthread+0x328/0x630
[   18.311199]  ret_from_fork+0x10/0x20
[   18.311254] 
[   18.311272] Freed by task 164:
[   18.311298]  kasan_save_stack+0x3c/0x68
[   18.311334]  kasan_save_track+0x20/0x40
[   18.311501]  kasan_save_free_info+0x4c/0x78
[   18.311560]  __kasan_slab_free+0x6c/0x98
[   18.311597]  kfree+0x214/0x3c8
[   18.311629]  krealloc_uaf+0x12c/0x520
[   18.311683]  kunit_try_run_case+0x170/0x3f0
[   18.311720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.311762]  kthread+0x328/0x630
[   18.311794]  ret_from_fork+0x10/0x20
[   18.311828] 
[   18.311847] The buggy address belongs to the object at fff00000c1828a00
[   18.311847]  which belongs to the cache kmalloc-256 of size 256
[   18.311995] The buggy address is located 0 bytes inside of
[   18.311995]  freed 256-byte region [fff00000c1828a00, fff00000c1828b00)
[   18.312114] 
[   18.312183] The buggy address belongs to the physical page:
[   18.312248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.312346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.312494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.312592] page_type: f5(slab)
[   18.312666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.312749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.312855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.312941] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.313011] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.313071] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.313376] page dumped because: kasan: bad access detected
[   18.313482] 
[   18.313598] Memory state around the buggy address:
[   18.313667]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.313740]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.313862] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.313970]                    ^
[   18.314066]  fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.314123]  fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.314231] ==================================================================
[   18.302606] ==================================================================
[   18.302683] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   18.302747] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164
[   18.302798] 
[   18.302839] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.303017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.303060] Hardware name: linux,dummy-virt (DT)
[   18.303090] Call trace:
[   18.303112]  show_stack+0x20/0x38 (C)
[   18.303177]  dump_stack_lvl+0x8c/0xd0
[   18.303225]  print_report+0x118/0x608
[   18.303271]  kasan_report+0xdc/0x128
[   18.303328]  __kasan_check_byte+0x54/0x70
[   18.303436]  krealloc_noprof+0x44/0x360
[   18.303485]  krealloc_uaf+0x180/0x520
[   18.303728]  kunit_try_run_case+0x170/0x3f0
[   18.303794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.303869]  kthread+0x328/0x630
[   18.303916]  ret_from_fork+0x10/0x20
[   18.303965] 
[   18.303984] Allocated by task 164:
[   18.304012]  kasan_save_stack+0x3c/0x68
[   18.304053]  kasan_save_track+0x20/0x40
[   18.304090]  kasan_save_alloc_info+0x40/0x58
[   18.304126]  __kasan_kmalloc+0xd4/0xd8
[   18.304268]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.304340]  krealloc_uaf+0xc8/0x520
[   18.304389]  kunit_try_run_case+0x170/0x3f0
[   18.304496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304575]  kthread+0x328/0x630
[   18.304694]  ret_from_fork+0x10/0x20
[   18.304786] 
[   18.304860] Freed by task 164:
[   18.304943]  kasan_save_stack+0x3c/0x68
[   18.305000]  kasan_save_track+0x20/0x40
[   18.305037]  kasan_save_free_info+0x4c/0x78
[   18.305299]  __kasan_slab_free+0x6c/0x98
[   18.305376]  kfree+0x214/0x3c8
[   18.305456]  krealloc_uaf+0x12c/0x520
[   18.305568]  kunit_try_run_case+0x170/0x3f0
[   18.305651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.305765]  kthread+0x328/0x630
[   18.305810]  ret_from_fork+0x10/0x20
[   18.305845] 
[   18.305877] The buggy address belongs to the object at fff00000c1828a00
[   18.305877]  which belongs to the cache kmalloc-256 of size 256
[   18.306266] The buggy address is located 0 bytes inside of
[   18.306266]  freed 256-byte region [fff00000c1828a00, fff00000c1828b00)
[   18.306365] 
[   18.306405] The buggy address belongs to the physical page:
[   18.306450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.306511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.306555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.306624] page_type: f5(slab)
[   18.306663] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.306712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.306761] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.306808] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.306863] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.306911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.306949] page dumped because: kasan: bad access detected
[   18.306980] 
[   18.306997] Memory state around the buggy address:
[   18.307045]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.307087]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.307128] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.307165]                    ^
[   18.307201]  fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.307244]  fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.307291] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   18.229614] ==================================================================
[   18.229674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.229941] Write of size 1 at addr fff00000c18288ea by task kunit_try_catch/158
[   18.230039] 
[   18.230094] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.230205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.230235] Hardware name: linux,dummy-virt (DT)
[   18.230381] Call trace:
[   18.230437]  show_stack+0x20/0x38 (C)
[   18.230578]  dump_stack_lvl+0x8c/0xd0
[   18.230634]  print_report+0x118/0x608
[   18.230763]  kasan_report+0xdc/0x128
[   18.230816]  __asan_report_store1_noabort+0x20/0x30
[   18.230863]  krealloc_less_oob_helper+0xae4/0xc50
[   18.231144]  krealloc_less_oob+0x20/0x38
[   18.231230]  kunit_try_run_case+0x170/0x3f0
[   18.231319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.231470]  kthread+0x328/0x630
[   18.231515]  ret_from_fork+0x10/0x20
[   18.231826] 
[   18.231892] Allocated by task 158:
[   18.231977]  kasan_save_stack+0x3c/0x68
[   18.232107]  kasan_save_track+0x20/0x40
[   18.232185]  kasan_save_alloc_info+0x40/0x58
[   18.232362]  __kasan_krealloc+0x118/0x178
[   18.232542]  krealloc_noprof+0x128/0x360
[   18.232607]  krealloc_less_oob_helper+0x168/0xc50
[   18.232728]  krealloc_less_oob+0x20/0x38
[   18.232776]  kunit_try_run_case+0x170/0x3f0
[   18.233048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233144]  kthread+0x328/0x630
[   18.233477]  ret_from_fork+0x10/0x20
[   18.233555] 
[   18.233594] The buggy address belongs to the object at fff00000c1828800
[   18.233594]  which belongs to the cache kmalloc-256 of size 256
[   18.233818] The buggy address is located 33 bytes to the right of
[   18.233818]  allocated 201-byte region [fff00000c1828800, fff00000c18288c9)
[   18.234012] 
[   18.234091] The buggy address belongs to the physical page:
[   18.234169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.234221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.234525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.234619] page_type: f5(slab)
[   18.234709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.234761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.235097] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.235182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.235296] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.235405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.235458] page dumped because: kasan: bad access detected
[   18.235489] 
[   18.235863] Memory state around the buggy address:
[   18.236220]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236302]  fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.236405] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.236492]                                                           ^
[   18.236617]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236669]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236725] ==================================================================
[   18.290061] ==================================================================
[   18.290106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.290155] Write of size 1 at addr fff00000c647e0ea by task kunit_try_catch/162
[   18.290205] 
[   18.290269] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.290353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.290385] Hardware name: linux,dummy-virt (DT)
[   18.290417] Call trace:
[   18.290789]  show_stack+0x20/0x38 (C)
[   18.290880]  dump_stack_lvl+0x8c/0xd0
[   18.290968]  print_report+0x118/0x608
[   18.291036]  kasan_report+0xdc/0x128
[   18.291083]  __asan_report_store1_noabort+0x20/0x30
[   18.291131]  krealloc_less_oob_helper+0xae4/0xc50
[   18.291181]  krealloc_large_less_oob+0x20/0x38
[   18.291228]  kunit_try_run_case+0x170/0x3f0
[   18.291276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.291846]  kthread+0x328/0x630
[   18.291957]  ret_from_fork+0x10/0x20
[   18.292100] 
[   18.292150] The buggy address belongs to the physical page:
[   18.292209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c
[   18.292299] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.292399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.292465] page_type: f8(unknown)
[   18.292503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.292553] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.292603] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.292991] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.293061] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff
[   18.293134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.293213] page dumped because: kasan: bad access detected
[   18.293279] 
[   18.293343] Memory state around the buggy address:
[   18.293442]  fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.293523]  fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.293627] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.293719]                                                           ^
[   18.293801]  fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.293869]  fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.293907] ==================================================================
[   18.214003] ==================================================================
[   18.214051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.214282] Write of size 1 at addr fff00000c18288d0 by task kunit_try_catch/158
[   18.214366] 
[   18.214506] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.214677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.214725] Hardware name: linux,dummy-virt (DT)
[   18.214773] Call trace:
[   18.214913]  show_stack+0x20/0x38 (C)
[   18.214967]  dump_stack_lvl+0x8c/0xd0
[   18.215045]  print_report+0x118/0x608
[   18.215093]  kasan_report+0xdc/0x128
[   18.215138]  __asan_report_store1_noabort+0x20/0x30
[   18.215314]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.215413]  krealloc_less_oob+0x20/0x38
[   18.215582]  kunit_try_run_case+0x170/0x3f0
[   18.215736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.215846]  kthread+0x328/0x630
[   18.215939]  ret_from_fork+0x10/0x20
[   18.216067] 
[   18.216115] Allocated by task 158:
[   18.216143]  kasan_save_stack+0x3c/0x68
[   18.216230]  kasan_save_track+0x20/0x40
[   18.216480]  kasan_save_alloc_info+0x40/0x58
[   18.216744]  __kasan_krealloc+0x118/0x178
[   18.216896]  krealloc_noprof+0x128/0x360
[   18.217061]  krealloc_less_oob_helper+0x168/0xc50
[   18.217151]  krealloc_less_oob+0x20/0x38
[   18.217213]  kunit_try_run_case+0x170/0x3f0
[   18.217251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.217572]  kthread+0x328/0x630
[   18.217711]  ret_from_fork+0x10/0x20
[   18.217803] 
[   18.217858] The buggy address belongs to the object at fff00000c1828800
[   18.217858]  which belongs to the cache kmalloc-256 of size 256
[   18.218025] The buggy address is located 7 bytes to the right of
[   18.218025]  allocated 201-byte region [fff00000c1828800, fff00000c18288c9)
[   18.218416] 
[   18.218472] The buggy address belongs to the physical page:
[   18.218537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.218670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.218760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.218916] page_type: f5(slab)
[   18.218984] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.219111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.219160] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.219239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.219468] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.219641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.219714] page dumped because: kasan: bad access detected
[   18.219771] 
[   18.219858] Memory state around the buggy address:
[   18.219918]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.219981]  fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.220093] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.220137]                                                  ^
[   18.220173]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.220477]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.220592] ==================================================================
[   18.209022] ==================================================================
[   18.209084] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.209378] Write of size 1 at addr fff00000c18288c9 by task kunit_try_catch/158
[   18.209526] 
[   18.209612] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.209779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.209807] Hardware name: linux,dummy-virt (DT)
[   18.209855] Call trace:
[   18.209884]  show_stack+0x20/0x38 (C)
[   18.209981]  dump_stack_lvl+0x8c/0xd0
[   18.210031]  print_report+0x118/0x608
[   18.210228]  kasan_report+0xdc/0x128
[   18.210308]  __asan_report_store1_noabort+0x20/0x30
[   18.210452]  krealloc_less_oob_helper+0xa48/0xc50
[   18.210505]  krealloc_less_oob+0x20/0x38
[   18.210550]  kunit_try_run_case+0x170/0x3f0
[   18.210645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.210709]  kthread+0x328/0x630
[   18.210756]  ret_from_fork+0x10/0x20
[   18.210806] 
[   18.210824] Allocated by task 158:
[   18.210852]  kasan_save_stack+0x3c/0x68
[   18.210902]  kasan_save_track+0x20/0x40
[   18.210938]  kasan_save_alloc_info+0x40/0x58
[   18.210977]  __kasan_krealloc+0x118/0x178
[   18.211014]  krealloc_noprof+0x128/0x360
[   18.211059]  krealloc_less_oob_helper+0x168/0xc50
[   18.211097]  krealloc_less_oob+0x20/0x38
[   18.211132]  kunit_try_run_case+0x170/0x3f0
[   18.211183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.211225]  kthread+0x328/0x630
[   18.211264]  ret_from_fork+0x10/0x20
[   18.211298] 
[   18.211322] The buggy address belongs to the object at fff00000c1828800
[   18.211322]  which belongs to the cache kmalloc-256 of size 256
[   18.211828] The buggy address is located 0 bytes to the right of
[   18.211828]  allocated 201-byte region [fff00000c1828800, fff00000c18288c9)
[   18.211898] 
[   18.211952] The buggy address belongs to the physical page:
[   18.211984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.212212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.212327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.212384] page_type: f5(slab)
[   18.212482] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.212543] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.212602] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.212656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.212714] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.212767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.212805] page dumped because: kasan: bad access detected
[   18.212858] 
[   18.212876] Memory state around the buggy address:
[   18.212920]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.212962]  fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.213003] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.213054]                                               ^
[   18.213102]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.213158]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.213194] ==================================================================
[   18.221721] ==================================================================
[   18.222122] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.222177] Write of size 1 at addr fff00000c18288da by task kunit_try_catch/158
[   18.222227] 
[   18.222256] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.222336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.222371] Hardware name: linux,dummy-virt (DT)
[   18.222401] Call trace:
[   18.222438]  show_stack+0x20/0x38 (C)
[   18.222497]  dump_stack_lvl+0x8c/0xd0
[   18.222554]  print_report+0x118/0x608
[   18.222600]  kasan_report+0xdc/0x128
[   18.222654]  __asan_report_store1_noabort+0x20/0x30
[   18.222703]  krealloc_less_oob_helper+0xa80/0xc50
[   18.222751]  krealloc_less_oob+0x20/0x38
[   18.222805]  kunit_try_run_case+0x170/0x3f0
[   18.222852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222913]  kthread+0x328/0x630
[   18.222954]  ret_from_fork+0x10/0x20
[   18.223001] 
[   18.223019] Allocated by task 158:
[   18.223052]  kasan_save_stack+0x3c/0x68
[   18.223101]  kasan_save_track+0x20/0x40
[   18.223137]  kasan_save_alloc_info+0x40/0x58
[   18.223181]  __kasan_krealloc+0x118/0x178
[   18.223217]  krealloc_noprof+0x128/0x360
[   18.223262]  krealloc_less_oob_helper+0x168/0xc50
[   18.223300]  krealloc_less_oob+0x20/0x38
[   18.223343]  kunit_try_run_case+0x170/0x3f0
[   18.223413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.223596]  kthread+0x328/0x630
[   18.224472]  ret_from_fork+0x10/0x20
[   18.224924] 
[   18.224959] The buggy address belongs to the object at fff00000c1828800
[   18.224959]  which belongs to the cache kmalloc-256 of size 256
[   18.225233] The buggy address is located 17 bytes to the right of
[   18.225233]  allocated 201-byte region [fff00000c1828800, fff00000c18288c9)
[   18.225330] 
[   18.225360] The buggy address belongs to the physical page:
[   18.225402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.225519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.225565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.225656] page_type: f5(slab)
[   18.225913] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.226003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.226174] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.226224] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.226556] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.226739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.226908] page dumped because: kasan: bad access detected
[   18.227053] 
[   18.227126] Memory state around the buggy address:
[   18.227176]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.227525]  fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.227688] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.227743]                                                     ^
[   18.227780]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228124]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228213] ==================================================================
[   18.280341] ==================================================================
[   18.280385] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.280453] Write of size 1 at addr fff00000c647e0d0 by task kunit_try_catch/162
[   18.280586] 
[   18.280667] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.280833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.280862] Hardware name: linux,dummy-virt (DT)
[   18.280911] Call trace:
[   18.281067]  show_stack+0x20/0x38 (C)
[   18.281121]  dump_stack_lvl+0x8c/0xd0
[   18.281170]  print_report+0x118/0x608
[   18.281348]  kasan_report+0xdc/0x128
[   18.281406]  __asan_report_store1_noabort+0x20/0x30
[   18.281690]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.282017]  krealloc_large_less_oob+0x20/0x38
[   18.282075]  kunit_try_run_case+0x170/0x3f0
[   18.282151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.282255]  kthread+0x328/0x630
[   18.282298]  ret_from_fork+0x10/0x20
[   18.282346] 
[   18.282717] The buggy address belongs to the physical page:
[   18.282761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c
[   18.282814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.282860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.282915] page_type: f8(unknown)
[   18.282972] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.283052] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.283117] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.283355] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.283756] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff
[   18.283886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.283998] page dumped because: kasan: bad access detected
[   18.284070] 
[   18.284181] Memory state around the buggy address:
[   18.284270]  fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.284583]  fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.284688] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.284848]                                                  ^
[   18.284950]  fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.285116]  fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.285196] ==================================================================
[   18.294162] ==================================================================
[   18.294209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.294257] Write of size 1 at addr fff00000c647e0eb by task kunit_try_catch/162
[   18.294326] 
[   18.294375] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.294498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.294526] Hardware name: linux,dummy-virt (DT)
[   18.294566] Call trace:
[   18.294606]  show_stack+0x20/0x38 (C)
[   18.294795]  dump_stack_lvl+0x8c/0xd0
[   18.294856]  print_report+0x118/0x608
[   18.295104]  kasan_report+0xdc/0x128
[   18.295161]  __asan_report_store1_noabort+0x20/0x30
[   18.295210]  krealloc_less_oob_helper+0xa58/0xc50
[   18.295403]  krealloc_large_less_oob+0x20/0x38
[   18.295549]  kunit_try_run_case+0x170/0x3f0
[   18.295649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.295742]  kthread+0x328/0x630
[   18.295877]  ret_from_fork+0x10/0x20
[   18.296001] 
[   18.296072] The buggy address belongs to the physical page:
[   18.296113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c
[   18.296206] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.296308] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.296399] page_type: f8(unknown)
[   18.296481] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.296542] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.296591] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.296640] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.296690] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff
[   18.296738] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.296778] page dumped because: kasan: bad access detected
[   18.296808] 
[   18.296831] Memory state around the buggy address:
[   18.296861]  fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.296903]  fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.297161] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.297240]                                                           ^
[   18.297299]  fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.297340]  fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.297380] ==================================================================
[   18.237987] ==================================================================
[   18.238245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.238544] Write of size 1 at addr fff00000c18288eb by task kunit_try_catch/158
[   18.238652] 
[   18.238724] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.238809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.238834] Hardware name: linux,dummy-virt (DT)
[   18.239121] Call trace:
[   18.239154]  show_stack+0x20/0x38 (C)
[   18.239214]  dump_stack_lvl+0x8c/0xd0
[   18.239262]  print_report+0x118/0x608
[   18.239308]  kasan_report+0xdc/0x128
[   18.239360]  __asan_report_store1_noabort+0x20/0x30
[   18.239406]  krealloc_less_oob_helper+0xa58/0xc50
[   18.239802]  krealloc_less_oob+0x20/0x38
[   18.240018]  kunit_try_run_case+0x170/0x3f0
[   18.240191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.240355]  kthread+0x328/0x630
[   18.240414]  ret_from_fork+0x10/0x20
[   18.240616] 
[   18.240688] Allocated by task 158:
[   18.240870]  kasan_save_stack+0x3c/0x68
[   18.241279]  kasan_save_track+0x20/0x40
[   18.241405]  kasan_save_alloc_info+0x40/0x58
[   18.241601]  __kasan_krealloc+0x118/0x178
[   18.241667]  krealloc_noprof+0x128/0x360
[   18.241705]  krealloc_less_oob_helper+0x168/0xc50
[   18.242077]  krealloc_less_oob+0x20/0x38
[   18.242195]  kunit_try_run_case+0x170/0x3f0
[   18.242350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.242448]  kthread+0x328/0x630
[   18.242496]  ret_from_fork+0x10/0x20
[   18.242557] 
[   18.242576] The buggy address belongs to the object at fff00000c1828800
[   18.242576]  which belongs to the cache kmalloc-256 of size 256
[   18.242643] The buggy address is located 34 bytes to the right of
[   18.242643]  allocated 201-byte region [fff00000c1828800, fff00000c18288c9)
[   18.242706] 
[   18.242740] The buggy address belongs to the physical page:
[   18.242783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.242842] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.242887] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.242949] page_type: f5(slab)
[   18.242987] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.243035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.243098] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.243155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.243202] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.243248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.243298] page dumped because: kasan: bad access detected
[   18.243337] 
[   18.243630] Memory state around the buggy address:
[   18.244007]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.244064]  fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.244114] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.244291]                                                           ^
[   18.244447]  fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.244499]  fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.244537] ==================================================================
[   18.274744] ==================================================================
[   18.274841] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.274904] Write of size 1 at addr fff00000c647e0c9 by task kunit_try_catch/162
[   18.274954] 
[   18.275212] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.275510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.275580] Hardware name: linux,dummy-virt (DT)
[   18.275696] Call trace:
[   18.275764]  show_stack+0x20/0x38 (C)
[   18.275897]  dump_stack_lvl+0x8c/0xd0
[   18.275951]  print_report+0x118/0x608
[   18.276122]  kasan_report+0xdc/0x128
[   18.276352]  __asan_report_store1_noabort+0x20/0x30
[   18.276491]  krealloc_less_oob_helper+0xa48/0xc50
[   18.276582]  krealloc_large_less_oob+0x20/0x38
[   18.276726]  kunit_try_run_case+0x170/0x3f0
[   18.276878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276995]  kthread+0x328/0x630
[   18.277134]  ret_from_fork+0x10/0x20
[   18.277186] 
[   18.277377] The buggy address belongs to the physical page:
[   18.277639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c
[   18.277728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.277844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.277931] page_type: f8(unknown)
[   18.278098] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.278213] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.278510] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.278633] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.278731] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff
[   18.278870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.278950] page dumped because: kasan: bad access detected
[   18.279060] 
[   18.279131] Memory state around the buggy address:
[   18.279221]  fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.279666]  fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.279710] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.279754]                                               ^
[   18.279790]  fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.279831]  fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.279869] ==================================================================
[   18.286186] ==================================================================
[   18.286235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.286315] Write of size 1 at addr fff00000c647e0da by task kunit_try_catch/162
[   18.286366] 
[   18.286415] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.286589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.286624] Hardware name: linux,dummy-virt (DT)
[   18.286665] Call trace:
[   18.286703]  show_stack+0x20/0x38 (C)
[   18.286763]  dump_stack_lvl+0x8c/0xd0
[   18.286957]  print_report+0x118/0x608
[   18.287035]  kasan_report+0xdc/0x128
[   18.287100]  __asan_report_store1_noabort+0x20/0x30
[   18.287168]  krealloc_less_oob_helper+0xa80/0xc50
[   18.287236]  krealloc_large_less_oob+0x20/0x38
[   18.287305]  kunit_try_run_case+0x170/0x3f0
[   18.287371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.287465]  kthread+0x328/0x630
[   18.287546]  ret_from_fork+0x10/0x20
[   18.287702] 
[   18.287724] The buggy address belongs to the physical page:
[   18.287756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c
[   18.287816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.287862] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.288063] page_type: f8(unknown)
[   18.288270] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.288375] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.288489] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.288632] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.288681] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff
[   18.288753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.288956] page dumped because: kasan: bad access detected
[   18.289057] 
[   18.289223] Memory state around the buggy address:
[   18.289331]  fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.289386]  fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.289459] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.289506]                                                     ^
[   18.289543]  fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.289594]  fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.289631] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   18.186963] ==================================================================
[   18.187056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   18.187242] Write of size 1 at addr fff00000c18286eb by task kunit_try_catch/156
[   18.187295] 
[   18.187344] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.187515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.187587] Hardware name: linux,dummy-virt (DT)
[   18.187634] Call trace:
[   18.187666]  show_stack+0x20/0x38 (C)
[   18.187716]  dump_stack_lvl+0x8c/0xd0
[   18.187799]  print_report+0x118/0x608
[   18.187846]  kasan_report+0xdc/0x128
[   18.187891]  __asan_report_store1_noabort+0x20/0x30
[   18.187944]  krealloc_more_oob_helper+0x60c/0x678
[   18.187992]  krealloc_more_oob+0x20/0x38
[   18.188048]  kunit_try_run_case+0x170/0x3f0
[   18.188105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.188163]  kthread+0x328/0x630
[   18.188216]  ret_from_fork+0x10/0x20
[   18.188279] 
[   18.188311] Allocated by task 156:
[   18.188339]  kasan_save_stack+0x3c/0x68
[   18.188379]  kasan_save_track+0x20/0x40
[   18.188415]  kasan_save_alloc_info+0x40/0x58
[   18.188471]  __kasan_krealloc+0x118/0x178
[   18.188508]  krealloc_noprof+0x128/0x360
[   18.188560]  krealloc_more_oob_helper+0x168/0x678
[   18.188608]  krealloc_more_oob+0x20/0x38
[   18.188652]  kunit_try_run_case+0x170/0x3f0
[   18.188688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.188744]  kthread+0x328/0x630
[   18.188789]  ret_from_fork+0x10/0x20
[   18.188843] 
[   18.188874] The buggy address belongs to the object at fff00000c1828600
[   18.188874]  which belongs to the cache kmalloc-256 of size 256
[   18.188957] The buggy address is located 0 bytes to the right of
[   18.188957]  allocated 235-byte region [fff00000c1828600, fff00000c18286eb)
[   18.189033] 
[   18.189053] The buggy address belongs to the physical page:
[   18.189085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.189136] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.189182] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.189235] page_type: f5(slab)
[   18.189273] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.189330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.189388] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.190011] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.190084] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.190199] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.190437] page dumped because: kasan: bad access detected
[   18.190535] 
[   18.190555] Memory state around the buggy address:
[   18.190587]  fff00000c1828580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.190669]  fff00000c1828600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.190952] >fff00000c1828680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.191018]                                                           ^
[   18.191068]  fff00000c1828700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.191164]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.191224] ==================================================================
[   18.192542] ==================================================================
[   18.192684] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   18.192738] Write of size 1 at addr fff00000c18286f0 by task kunit_try_catch/156
[   18.192881] 
[   18.192929] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.193060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.193107] Hardware name: linux,dummy-virt (DT)
[   18.193137] Call trace:
[   18.193157]  show_stack+0x20/0x38 (C)
[   18.193492]  dump_stack_lvl+0x8c/0xd0
[   18.193549]  print_report+0x118/0x608
[   18.193595]  kasan_report+0xdc/0x128
[   18.193702]  __asan_report_store1_noabort+0x20/0x30
[   18.193755]  krealloc_more_oob_helper+0x5c0/0x678
[   18.193803]  krealloc_more_oob+0x20/0x38
[   18.193898]  kunit_try_run_case+0x170/0x3f0
[   18.193974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.194028]  kthread+0x328/0x630
[   18.194091]  ret_from_fork+0x10/0x20
[   18.194289] 
[   18.194351] Allocated by task 156:
[   18.194379]  kasan_save_stack+0x3c/0x68
[   18.194468]  kasan_save_track+0x20/0x40
[   18.194527]  kasan_save_alloc_info+0x40/0x58
[   18.194562]  __kasan_krealloc+0x118/0x178
[   18.194599]  krealloc_noprof+0x128/0x360
[   18.194741]  krealloc_more_oob_helper+0x168/0x678
[   18.194839]  krealloc_more_oob+0x20/0x38
[   18.194967]  kunit_try_run_case+0x170/0x3f0
[   18.195016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.195081]  kthread+0x328/0x630
[   18.195266]  ret_from_fork+0x10/0x20
[   18.195315] 
[   18.195334] The buggy address belongs to the object at fff00000c1828600
[   18.195334]  which belongs to the cache kmalloc-256 of size 256
[   18.195441] The buggy address is located 5 bytes to the right of
[   18.195441]  allocated 235-byte region [fff00000c1828600, fff00000c18286eb)
[   18.195595] 
[   18.195625] The buggy address belongs to the physical page:
[   18.195655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828
[   18.195867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.195942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.196004] page_type: f5(slab)
[   18.196074] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.196187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.196274] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.196374] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.196584] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff
[   18.196687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.196808] page dumped because: kasan: bad access detected
[   18.196893] 
[   18.197013] Memory state around the buggy address:
[   18.197046]  fff00000c1828580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197203]  fff00000c1828600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.197290] >fff00000c1828680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.197414]                                                              ^
[   18.197504]  fff00000c1828700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197614]  fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197685] ==================================================================
[   18.258903] ==================================================================
[   18.259035] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   18.259090] Write of size 1 at addr fff00000c647a0f0 by task kunit_try_catch/160
[   18.259934] 
[   18.260047] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.260229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.260295] Hardware name: linux,dummy-virt (DT)
[   18.260326] Call trace:
[   18.260348]  show_stack+0x20/0x38 (C)
[   18.260433]  dump_stack_lvl+0x8c/0xd0
[   18.260506]  print_report+0x118/0x608
[   18.260841]  kasan_report+0xdc/0x128
[   18.260995]  __asan_report_store1_noabort+0x20/0x30
[   18.261093]  krealloc_more_oob_helper+0x5c0/0x678
[   18.261528]  krealloc_large_more_oob+0x20/0x38
[   18.261620]  kunit_try_run_case+0x170/0x3f0
[   18.261914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.262032]  kthread+0x328/0x630
[   18.262112]  ret_from_fork+0x10/0x20
[   18.262200] 
[   18.262279] The buggy address belongs to the physical page:
[   18.262318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478
[   18.262391] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.262533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.262632] page_type: f8(unknown)
[   18.262914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.262997] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.263325] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.263499] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.263659] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff
[   18.263745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.263840] page dumped because: kasan: bad access detected
[   18.263920] 
[   18.263995] Memory state around the buggy address:
[   18.264096]  fff00000c6479f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.264211]  fff00000c647a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.264255] >fff00000c647a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.264310]                                                              ^
[   18.264358]  fff00000c647a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.264527]  fff00000c647a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.264721] ==================================================================
[   18.251224] ==================================================================
[   18.251278] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   18.251332] Write of size 1 at addr fff00000c647a0eb by task kunit_try_catch/160
[   18.251718] 
[   18.251754] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.252158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.252197] Hardware name: linux,dummy-virt (DT)
[   18.252228] Call trace:
[   18.252249]  show_stack+0x20/0x38 (C)
[   18.252674]  dump_stack_lvl+0x8c/0xd0
[   18.252794]  print_report+0x118/0x608
[   18.252898]  kasan_report+0xdc/0x128
[   18.253060]  __asan_report_store1_noabort+0x20/0x30
[   18.253338]  krealloc_more_oob_helper+0x60c/0x678
[   18.253411]  krealloc_large_more_oob+0x20/0x38
[   18.253623]  kunit_try_run_case+0x170/0x3f0
[   18.253749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.253937]  kthread+0x328/0x630
[   18.254028]  ret_from_fork+0x10/0x20
[   18.254154] 
[   18.254176] The buggy address belongs to the physical page:
[   18.254438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478
[   18.254621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.254687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.254781] page_type: f8(unknown)
[   18.254872] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.254959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.255209] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.255534] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.255617] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff
[   18.255873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.256064] page dumped because: kasan: bad access detected
[   18.256163] 
[   18.256205] Memory state around the buggy address:
[   18.256278]  fff00000c6479f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.256350]  fff00000c647a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.256517] >fff00000c647a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.256605]                                                           ^
[   18.256966]  fff00000c647a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.257118]  fff00000c647a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.257209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   18.176704] ==================================================================
[   18.176787] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   18.176923] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/154
[   18.176989] 
[   18.177060] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.177203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.177232] Hardware name: linux,dummy-virt (DT)
[   18.177264] Call trace:
[   18.177287]  show_stack+0x20/0x38 (C)
[   18.177338]  dump_stack_lvl+0x8c/0xd0
[   18.177386]  print_report+0x118/0x608
[   18.177446]  kasan_report+0xdc/0x128
[   18.177502]  __asan_report_load1_noabort+0x20/0x30
[   18.177549]  page_alloc_uaf+0x328/0x350
[   18.177594]  kunit_try_run_case+0x170/0x3f0
[   18.177642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.177695]  kthread+0x328/0x630
[   18.177740]  ret_from_fork+0x10/0x20
[   18.177798] 
[   18.177827] The buggy address belongs to the physical page:
[   18.177867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   18.177918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.177969] page_type: f0(buddy)
[   18.178018] raw: 0bfffe0000000000 fff00000ff616240 fff00000ff616240 0000000000000000
[   18.178067] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000
[   18.178107] page dumped because: kasan: bad access detected
[   18.178146] 
[   18.178164] Memory state around the buggy address:
[   18.178198]  fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.178239]  fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.178285] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.178324]                    ^
[   18.178362]  fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.178405]  fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.178463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   18.147492] ==================================================================
[   18.147601] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   18.147975] Free of addr fff00000c6478001 by task kunit_try_catch/150
[   18.148083] 
[   18.148128] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.148403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.148588] Hardware name: linux,dummy-virt (DT)
[   18.148669] Call trace:
[   18.148713]  show_stack+0x20/0x38 (C)
[   18.148776]  dump_stack_lvl+0x8c/0xd0
[   18.148852]  print_report+0x118/0x608
[   18.148918]  kasan_report_invalid_free+0xc0/0xe8
[   18.148967]  __kasan_kfree_large+0x5c/0xa8
[   18.149028]  free_large_kmalloc+0x64/0x190
[   18.149081]  kfree+0x270/0x3c8
[   18.149122]  kmalloc_large_invalid_free+0x108/0x270
[   18.149179]  kunit_try_run_case+0x170/0x3f0
[   18.149246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.149297]  kthread+0x328/0x630
[   18.149349]  ret_from_fork+0x10/0x20
[   18.149415] 
[   18.149446] The buggy address belongs to the physical page:
[   18.149818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478
[   18.149913] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.150057] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.150218] page_type: f8(unknown)
[   18.150402] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.150587] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.150679] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.150773] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.150821] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff
[   18.151017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.151225] page dumped because: kasan: bad access detected
[   18.151314] 
[   18.151445] Memory state around the buggy address:
[   18.151481]  fff00000c6477f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151542]  fff00000c6477f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151697] >fff00000c6478000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.151736]                    ^
[   18.151765]  fff00000c6478080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.151805]  fff00000c6478100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.151920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   18.136640] ==================================================================
[   18.136717] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   18.136775] Read of size 1 at addr fff00000c6474000 by task kunit_try_catch/148
[   18.136829] 
[   18.136863] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.136947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.136973] Hardware name: linux,dummy-virt (DT)
[   18.137002] Call trace:
[   18.137024]  show_stack+0x20/0x38 (C)
[   18.137071]  dump_stack_lvl+0x8c/0xd0
[   18.137118]  print_report+0x118/0x608
[   18.137163]  kasan_report+0xdc/0x128
[   18.137206]  __asan_report_load1_noabort+0x20/0x30
[   18.137252]  kmalloc_large_uaf+0x2cc/0x2f8
[   18.137296]  kunit_try_run_case+0x170/0x3f0
[   18.137342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.137393]  kthread+0x328/0x630
[   18.137448]  ret_from_fork+0x10/0x20
[   18.137495] 
[   18.137516] The buggy address belongs to the physical page:
[   18.137547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106474
[   18.137596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.137660] raw: 0bfffe0000000000 ffffc1ffc3191e08 fff00000da46ac40 0000000000000000
[   18.137707] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   18.137746] page dumped because: kasan: bad access detected
[   18.137775] 
[   18.137793] Memory state around the buggy address:
[   18.137824]  fff00000c6473f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.137864]  fff00000c6473f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.137904] >fff00000c6474000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.137941]                    ^
[   18.137970]  fff00000c6474080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.138010]  fff00000c6474100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.138046] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   18.116562] ==================================================================
[   18.116632] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   18.116685] Write of size 1 at addr fff00000c647600a by task kunit_try_catch/146
[   18.116734] 
[   18.116767] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.116982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117079] Hardware name: linux,dummy-virt (DT)
[   18.117159] Call trace:
[   18.117200]  show_stack+0x20/0x38 (C)
[   18.117289]  dump_stack_lvl+0x8c/0xd0
[   18.117443]  print_report+0x118/0x608
[   18.117513]  kasan_report+0xdc/0x128
[   18.117569]  __asan_report_store1_noabort+0x20/0x30
[   18.117638]  kmalloc_large_oob_right+0x278/0x2b8
[   18.117737]  kunit_try_run_case+0x170/0x3f0
[   18.117806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.117902]  kthread+0x328/0x630
[   18.118032]  ret_from_fork+0x10/0x20
[   18.118079] 
[   18.118138] The buggy address belongs to the physical page:
[   18.118356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106474
[   18.118570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.118640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.118800] page_type: f8(unknown)
[   18.118904] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.119024] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.119124] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.119263] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.119339] head: 0bfffe0000000002 ffffc1ffc3191d01 00000000ffffffff 00000000ffffffff
[   18.119770] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.119811] page dumped because: kasan: bad access detected
[   18.119841] 
[   18.119859] Memory state around the buggy address:
[   18.119890]  fff00000c6475f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.119931]  fff00000c6475f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.119974] >fff00000c6476000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.120009]                       ^
[   18.120037]  fff00000c6476080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.120077]  fff00000c6476100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.120113] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   18.108532] ==================================================================
[   18.108596] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   18.108648] Write of size 1 at addr fff00000c78d9f00 by task kunit_try_catch/144
[   18.108824] 
[   18.108863] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.108949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.108991] Hardware name: linux,dummy-virt (DT)
[   18.109040] Call trace:
[   18.109079]  show_stack+0x20/0x38 (C)
[   18.109150]  dump_stack_lvl+0x8c/0xd0
[   18.109227]  print_report+0x118/0x608
[   18.109323]  kasan_report+0xdc/0x128
[   18.109368]  __asan_report_store1_noabort+0x20/0x30
[   18.109414]  kmalloc_big_oob_right+0x2a4/0x2f0
[   18.109473]  kunit_try_run_case+0x170/0x3f0
[   18.109519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.109644]  kthread+0x328/0x630
[   18.109717]  ret_from_fork+0x10/0x20
[   18.109785] 
[   18.109804] Allocated by task 144:
[   18.109832]  kasan_save_stack+0x3c/0x68
[   18.109871]  kasan_save_track+0x20/0x40
[   18.109925]  kasan_save_alloc_info+0x40/0x58
[   18.109961]  __kasan_kmalloc+0xd4/0xd8
[   18.109996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.110034]  kmalloc_big_oob_right+0xb8/0x2f0
[   18.110077]  kunit_try_run_case+0x170/0x3f0
[   18.110134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.110180]  kthread+0x328/0x630
[   18.110487]  ret_from_fork+0x10/0x20
[   18.110532] 
[   18.110551] The buggy address belongs to the object at fff00000c78d8000
[   18.110551]  which belongs to the cache kmalloc-8k of size 8192
[   18.110606] The buggy address is located 0 bytes to the right of
[   18.110606]  allocated 7936-byte region [fff00000c78d8000, fff00000c78d9f00)
[   18.110683] 
[   18.110722] The buggy address belongs to the physical page:
[   18.110771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   18.110852] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.110897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.110950] page_type: f5(slab)
[   18.110987] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.111034] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.111082] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.111128] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.111210] head: 0bfffe0000000003 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff
[   18.111334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.111625] page dumped because: kasan: bad access detected
[   18.111661] 
[   18.111679] Memory state around the buggy address:
[   18.111730]  fff00000c78d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.111772]  fff00000c78d9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.111840] >fff00000c78d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.111943]                    ^
[   18.112036]  fff00000c78d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112094]  fff00000c78da000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112152] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   18.094655] ==================================================================
[   18.094715] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.094877] Write of size 1 at addr fff00000c446ee78 by task kunit_try_catch/142
[   18.094927] 
[   18.095037] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.095145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.095172] Hardware name: linux,dummy-virt (DT)
[   18.095225] Call trace:
[   18.095265]  show_stack+0x20/0x38 (C)
[   18.095342]  dump_stack_lvl+0x8c/0xd0
[   18.095503]  print_report+0x118/0x608
[   18.095562]  kasan_report+0xdc/0x128
[   18.095607]  __asan_report_store1_noabort+0x20/0x30
[   18.095673]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.095723]  kunit_try_run_case+0x170/0x3f0
[   18.095771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.095823]  kthread+0x328/0x630
[   18.095868]  ret_from_fork+0x10/0x20
[   18.096111] 
[   18.096177] Allocated by task 142:
[   18.096238]  kasan_save_stack+0x3c/0x68
[   18.096298]  kasan_save_track+0x20/0x40
[   18.096377]  kasan_save_alloc_info+0x40/0x58
[   18.096442]  __kasan_kmalloc+0xd4/0xd8
[   18.096506]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.096564]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.096615]  kunit_try_run_case+0x170/0x3f0
[   18.096653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.096694]  kthread+0x328/0x630
[   18.096764]  ret_from_fork+0x10/0x20
[   18.096982] 
[   18.097082] The buggy address belongs to the object at fff00000c446ee00
[   18.097082]  which belongs to the cache kmalloc-128 of size 128
[   18.097241] The buggy address is located 0 bytes to the right of
[   18.097241]  allocated 120-byte region [fff00000c446ee00, fff00000c446ee78)
[   18.097340] 
[   18.097388] The buggy address belongs to the physical page:
[   18.097491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e
[   18.097595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.097674] page_type: f5(slab)
[   18.097714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.097789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.097990] page dumped because: kasan: bad access detected
[   18.098061] 
[   18.098226] Memory state around the buggy address:
[   18.098318]  fff00000c446ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.098371]  fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.098451] >fff00000c446ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.098531]                                                                 ^
[   18.098624]  fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.098664]  fff00000c446ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.098838] ==================================================================
[   18.100443] ==================================================================
[   18.100539] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   18.100591] Write of size 1 at addr fff00000c446ef78 by task kunit_try_catch/142
[   18.100640] 
[   18.100668] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.100748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.100773] Hardware name: linux,dummy-virt (DT)
[   18.100832] Call trace:
[   18.100881]  show_stack+0x20/0x38 (C)
[   18.100956]  dump_stack_lvl+0x8c/0xd0
[   18.101012]  print_report+0x118/0x608
[   18.101068]  kasan_report+0xdc/0x128
[   18.101113]  __asan_report_store1_noabort+0x20/0x30
[   18.101159]  kmalloc_track_caller_oob_right+0x418/0x488
[   18.101209]  kunit_try_run_case+0x170/0x3f0
[   18.101255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.101373]  kthread+0x328/0x630
[   18.101522]  ret_from_fork+0x10/0x20
[   18.101587] 
[   18.101623] Allocated by task 142:
[   18.101650]  kasan_save_stack+0x3c/0x68
[   18.101708]  kasan_save_track+0x20/0x40
[   18.101765]  kasan_save_alloc_info+0x40/0x58
[   18.101829]  __kasan_kmalloc+0xd4/0xd8
[   18.101865]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.101915]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.101980]  kunit_try_run_case+0x170/0x3f0
[   18.102105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.102164]  kthread+0x328/0x630
[   18.102195]  ret_from_fork+0x10/0x20
[   18.102234] 
[   18.102253] The buggy address belongs to the object at fff00000c446ef00
[   18.102253]  which belongs to the cache kmalloc-128 of size 128
[   18.102307] The buggy address is located 0 bytes to the right of
[   18.102307]  allocated 120-byte region [fff00000c446ef00, fff00000c446ef78)
[   18.102368] 
[   18.102386] The buggy address belongs to the physical page:
[   18.102413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e
[   18.102473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.102655] page_type: f5(slab)
[   18.102815] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.102869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.102926] page dumped because: kasan: bad access detected
[   18.102956] 
[   18.103170] Memory state around the buggy address:
[   18.103222]  fff00000c446ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.103282]  fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.103340] >fff00000c446ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.103468]                                                                 ^
[   18.103545]  fff00000c446ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.103586]  fff00000c446f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.103645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   18.082069] ==================================================================
[   18.084446] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   18.084538] Read of size 1 at addr fff00000c668b000 by task kunit_try_catch/140
[   18.084590] 
[   18.084627] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.084713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.084738] Hardware name: linux,dummy-virt (DT)
[   18.084770] Call trace:
[   18.084793]  show_stack+0x20/0x38 (C)
[   18.084851]  dump_stack_lvl+0x8c/0xd0
[   18.084900]  print_report+0x118/0x608
[   18.084947]  kasan_report+0xdc/0x128
[   18.084992]  __asan_report_load1_noabort+0x20/0x30
[   18.085038]  kmalloc_node_oob_right+0x2f4/0x330
[   18.085086]  kunit_try_run_case+0x170/0x3f0
[   18.085134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.085186]  kthread+0x328/0x630
[   18.085229]  ret_from_fork+0x10/0x20
[   18.085277] 
[   18.085295] Allocated by task 140:
[   18.085323]  kasan_save_stack+0x3c/0x68
[   18.085363]  kasan_save_track+0x20/0x40
[   18.085399]  kasan_save_alloc_info+0x40/0x58
[   18.085446]  __kasan_kmalloc+0xd4/0xd8
[   18.085481]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   18.085522]  kmalloc_node_oob_right+0xbc/0x330
[   18.085559]  kunit_try_run_case+0x170/0x3f0
[   18.085595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.085637]  kthread+0x328/0x630
[   18.085667]  ret_from_fork+0x10/0x20
[   18.085702] 
[   18.085721] The buggy address belongs to the object at fff00000c668a000
[   18.085721]  which belongs to the cache kmalloc-4k of size 4096
[   18.085776] The buggy address is located 0 bytes to the right of
[   18.085776]  allocated 4096-byte region [fff00000c668a000, fff00000c668b000)
[   18.085838] 
[   18.085858] The buggy address belongs to the physical page:
[   18.085932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106688
[   18.086090] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.086136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.086202] page_type: f5(slab)
[   18.086242] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.086291] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.086345] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.086393] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.086452] head: 0bfffe0000000003 ffffc1ffc319a201 00000000ffffffff 00000000ffffffff
[   18.086500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.086543] page dumped because: kasan: bad access detected
[   18.086572] 
[   18.086590] Memory state around the buggy address:
[   18.086622]  fff00000c668af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.086663]  fff00000c668af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.086703] >fff00000c668b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.086739]                    ^
[   18.086766]  fff00000c668b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.086805]  fff00000c668b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.086842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure Automatically assigned
[   18.023188] ==================================================================
[   18.023290] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   18.026644] Read of size 1 at addr fff00000c4473b1f by task kunit_try_catch/138
[   18.026901] 
[   18.027571] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.028598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.028635] Hardware name: linux,dummy-virt (DT)
[   18.029016] Call trace:
[   18.029043]  show_stack+0x20/0x38 (C)
[   18.029099]  dump_stack_lvl+0x8c/0xd0
[   18.030075]  print_report+0x118/0x608
[   18.031243]  kasan_report+0xdc/0x128
[   18.031353]  __asan_report_load1_noabort+0x20/0x30
[   18.031936]  kmalloc_oob_left+0x2ec/0x320
[   18.032014]  kunit_try_run_case+0x170/0x3f0
[   18.032072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.032886]  kthread+0x328/0x630
[   18.033772]  ret_from_fork+0x10/0x20
[   18.033960] 
[   18.034325] Allocated by task 26:
[   18.034879]  kasan_save_stack+0x3c/0x68
[   18.035412]  kasan_save_track+0x20/0x40
[   18.035494]  kasan_save_alloc_info+0x40/0x58
[   18.035530]  __kasan_kmalloc+0xd4/0xd8
[   18.035565]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.036233]  kstrdup+0x54/0xc8
[   18.036594]  devtmpfs_work_loop+0x6f8/0xa58
[   18.037106]  devtmpfsd+0x50/0x58
[   18.037657]  kthread+0x328/0x630
[   18.038189]  ret_from_fork+0x10/0x20
[   18.038253] 
[   18.038324] Freed by task 26:
[   18.038673]  kasan_save_stack+0x3c/0x68
[   18.039254]  kasan_save_track+0x20/0x40
[   18.039482]  kasan_save_free_info+0x4c/0x78
[   18.039525]  __kasan_slab_free+0x6c/0x98
[   18.039561]  kfree+0x214/0x3c8
[   18.039594]  devtmpfs_work_loop+0x804/0xa58
[   18.039630]  devtmpfsd+0x50/0x58
[   18.039663]  kthread+0x328/0x630
[   18.040609]  ret_from_fork+0x10/0x20
[   18.041355] 
[   18.041523] The buggy address belongs to the object at fff00000c4473b00
[   18.041523]  which belongs to the cache kmalloc-16 of size 16
[   18.042334] The buggy address is located 15 bytes to the right of
[   18.042334]  allocated 16-byte region [fff00000c4473b00, fff00000c4473b10)
[   18.043010] 
[   18.043157] The buggy address belongs to the physical page:
[   18.043371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473
[   18.043438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.043492] page_type: f5(slab)
[   18.043534] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.044366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.044473] page dumped because: kasan: bad access detected
[   18.044642] 
[   18.045043] Memory state around the buggy address:
[   18.045394]  fff00000c4473a00: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   18.045751]  fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   18.046558] >fff00000c4473b00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   18.046838]                             ^
[   18.047007]  fff00000c4473b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047517]  fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047930] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   17.972932] ==================================================================
[   17.973297] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.974187] Write of size 1 at addr fff00000c446ed73 by task kunit_try_catch/136
[   17.974443] 
[   17.975330] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250603 #1 PREEMPT 
[   17.975779] Tainted: [N]=TEST
[   17.976216] Hardware name: linux,dummy-virt (DT)
[   17.978817] Call trace:
[   17.980101]  show_stack+0x20/0x38 (C)
[   17.980263]  dump_stack_lvl+0x8c/0xd0
[   17.980609]  print_report+0x118/0x608
[   17.980741]  kasan_report+0xdc/0x128
[   17.980789]  __asan_report_store1_noabort+0x20/0x30
[   17.980844]  kmalloc_oob_right+0x5a4/0x660
[   17.981080]  kunit_try_run_case+0x170/0x3f0
[   17.981205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.981331]  kthread+0x328/0x630
[   17.981408]  ret_from_fork+0x10/0x20
[   17.982020] 
[   17.982103] Allocated by task 136:
[   17.982264]  kasan_save_stack+0x3c/0x68
[   17.982604]  kasan_save_track+0x20/0x40
[   17.982679]  kasan_save_alloc_info+0x40/0x58
[   17.982770]  __kasan_kmalloc+0xd4/0xd8
[   17.982843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.982885]  kmalloc_oob_right+0xb0/0x660
[   17.983196]  kunit_try_run_case+0x170/0x3f0
[   17.983302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.983368]  kthread+0x328/0x630
[   17.983399]  ret_from_fork+0x10/0x20
[   17.983486] 
[   17.983577] The buggy address belongs to the object at fff00000c446ed00
[   17.983577]  which belongs to the cache kmalloc-128 of size 128
[   17.983869] The buggy address is located 0 bytes to the right of
[   17.983869]  allocated 115-byte region [fff00000c446ed00, fff00000c446ed73)
[   17.983999] 
[   17.984301] The buggy address belongs to the physical page:
[   17.984991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e
[   17.985757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.986577] page_type: f5(slab)
[   17.986989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.987059] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.987194] page dumped because: kasan: bad access detected
[   17.987238] 
[   17.987263] Memory state around the buggy address:
[   17.988172]  fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.988421]  fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.988519] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.988573]                                                              ^
[   17.988903]  fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.988968]  fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.989102] ==================================================================
[   17.995177] ==================================================================
[   17.995223] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.995270] Read of size 1 at addr fff00000c446ed80 by task kunit_try_catch/136
[   17.995317] 
[   17.995345] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   17.995450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995476] Hardware name: linux,dummy-virt (DT)
[   17.995531] Call trace:
[   17.995552]  show_stack+0x20/0x38 (C)
[   17.995600]  dump_stack_lvl+0x8c/0xd0
[   17.995833]  print_report+0x118/0x608
[   17.996014]  kasan_report+0xdc/0x128
[   17.996113]  __asan_report_load1_noabort+0x20/0x30
[   17.996172]  kmalloc_oob_right+0x5d0/0x660
[   17.996229]  kunit_try_run_case+0x170/0x3f0
[   17.996325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996688]  kthread+0x328/0x630
[   17.996845]  ret_from_fork+0x10/0x20
[   17.996994] 
[   17.997068] Allocated by task 136:
[   17.997142]  kasan_save_stack+0x3c/0x68
[   17.997210]  kasan_save_track+0x20/0x40
[   17.997283]  kasan_save_alloc_info+0x40/0x58
[   17.997318]  __kasan_kmalloc+0xd4/0xd8
[   17.997352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.997389]  kmalloc_oob_right+0xb0/0x660
[   17.997434]  kunit_try_run_case+0x170/0x3f0
[   17.997471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.997706]  kthread+0x328/0x630
[   17.997785]  ret_from_fork+0x10/0x20
[   17.997831] 
[   17.997903] The buggy address belongs to the object at fff00000c446ed00
[   17.997903]  which belongs to the cache kmalloc-128 of size 128
[   17.997979] The buggy address is located 13 bytes to the right of
[   17.997979]  allocated 115-byte region [fff00000c446ed00, fff00000c446ed73)
[   17.998092] 
[   17.998151] The buggy address belongs to the physical page:
[   17.998188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e
[   17.998274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.998451] page_type: f5(slab)
[   17.998509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.998566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.998604] page dumped because: kasan: bad access detected
[   17.998635] 
[   17.998707] Memory state around the buggy address:
[   17.998826]  fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.998962]  fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.999070] >fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999153]                    ^
[   17.999220]  fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999300]  fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999408] ==================================================================
[   17.990239] ==================================================================
[   17.990286] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.990439] Write of size 1 at addr fff00000c446ed78 by task kunit_try_catch/136
[   17.990552] 
[   17.990587] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   17.990698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.990753] Hardware name: linux,dummy-virt (DT)
[   17.990785] Call trace:
[   17.990807]  show_stack+0x20/0x38 (C)
[   17.990874]  dump_stack_lvl+0x8c/0xd0
[   17.991052]  print_report+0x118/0x608
[   17.991231]  kasan_report+0xdc/0x128
[   17.991295]  __asan_report_store1_noabort+0x20/0x30
[   17.991344]  kmalloc_oob_right+0x538/0x660
[   17.991441]  kunit_try_run_case+0x170/0x3f0
[   17.991488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.991662]  kthread+0x328/0x630
[   17.991706]  ret_from_fork+0x10/0x20
[   17.991954] 
[   17.992024] Allocated by task 136:
[   17.992096]  kasan_save_stack+0x3c/0x68
[   17.992151]  kasan_save_track+0x20/0x40
[   17.992269]  kasan_save_alloc_info+0x40/0x58
[   17.992328]  __kasan_kmalloc+0xd4/0xd8
[   17.992460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.992530]  kmalloc_oob_right+0xb0/0x660
[   17.992565]  kunit_try_run_case+0x170/0x3f0
[   17.992886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.992985]  kthread+0x328/0x630
[   17.993119]  ret_from_fork+0x10/0x20
[   17.993215] 
[   17.993235] The buggy address belongs to the object at fff00000c446ed00
[   17.993235]  which belongs to the cache kmalloc-128 of size 128
[   17.993682] The buggy address is located 5 bytes to the right of
[   17.993682]  allocated 115-byte region [fff00000c446ed00, fff00000c446ed73)
[   17.993836] 
[   17.993889] The buggy address belongs to the physical page:
[   17.993945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e
[   17.994010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.994057] page_type: f5(slab)
[   17.994325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.994394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.994446] page dumped because: kasan: bad access detected
[   17.994476] 
[   17.994516] Memory state around the buggy address:
[   17.994546]  fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.994587]  fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.994650] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.994695]                                                                 ^
[   17.994739]  fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.994787]  fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.994822] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure Automatically assigned
------------[ cut here ]------------
[   95.841316] WARNING: CPU: 0 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.842251] Modules linked in:
[   95.842522] CPU: 0 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250603 #1 PREEMPT 
[   95.844039] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.844513] Hardware name: linux,dummy-virt (DT)
[   95.844945] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.845293] pc : intlog10+0x38/0x48
[   95.845539] lr : intlog10_test+0xe4/0x200
[   95.845859] sp : ffff800082067c10
[   95.846035] x29: ffff800082067c90 x28: 0000000000000000 x27: 0000000000000000
[   95.846786] x26: 1ffe000019392021 x25: 0000000000000000 x24: ffff800082067ce0
[   95.847347] x23: ffff800082067d00 x22: 0000000000000000 x21: 1ffff0001040cf82
[   95.847946] x20: ffff9fc2fe2d30c0 x19: ffff800080087990 x18: 000000003bda6c21
[   95.848527] x17: 000000004d799a42 x16: fff00000c097543c x15: 00000000b425ba76
[   95.849115] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cdcd x12: ffff73f86042ff79
[   95.849685] x11: 1ffff3f86042ff78 x10: ffff73f86042ff78 x9 : ffff9fc2fb86ae7c
[   95.850247] x8 : ffff9fc30217fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.850819] x5 : ffff70001040cf82 x4 : 1ffff00010010f3a x3 : 1ffff3f85fc5a618
[   95.851596] x2 : 1ffff3f85fc5a618 x1 : 0000000000000003 x0 : 0000000000000000
[   95.852030] Call trace:
[   95.852392]  intlog10+0x38/0x48 (P)
[   95.852802]  kunit_try_run_case+0x170/0x3f0
[   95.853225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.853688]  kthread+0x328/0x630
[   95.854056]  ret_from_fork+0x10/0x20
[   95.854414] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure Automatically assigned
------------[ cut here ]------------
[   95.797136] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   95.799099] Modules linked in:
[   95.799408] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250603 #1 PREEMPT 
[   95.801262] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   95.801998] Hardware name: linux,dummy-virt (DT)
[   95.802669] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.803515] pc : intlog2+0xd8/0xf8
[   95.804085] lr : intlog2_test+0xe4/0x200
[   95.804701] sp : ffff800082237c10
[   95.805193] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000
[   95.806083] x26: 1ffe00001957d201 x25: 0000000000000000 x24: ffff800082237ce0
[   95.807001] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82
[   95.807893] x20: ffff9fc2fe2d2fc0 x19: ffff800080087990 x18: 00000000223fa386
[   95.808735] x17: 00000000ada6b054 x16: fff00000c097583c x15: 00000000f8463ac4
[   95.809100] x14: 00000000f1f1f1f1 x13: 1ffe00001b4889cd x12: ffff73f86042ff79
[   95.809459] x11: 1ffff3f86042ff78 x10: ffff73f86042ff78 x9 : ffff9fc2fb86b07c
[   95.809890] x8 : ffff9fc30217fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.810267] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff3f85fc5a5f8
[   95.810748] x2 : 1ffff3f85fc5a5f8 x1 : 0000000000000003 x0 : 0000000000000000
[   95.811189] Call trace:
[   95.811365]  intlog2+0xd8/0xf8 (P)
[   95.811619]  kunit_try_run_case+0x170/0x3f0
[   95.811851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.812149]  kthread+0x328/0x630
[   95.812350]  ret_from_fork+0x10/0x20
[   95.812673] ---[ end trace 0000000000000000 ]---