Hay
Date
June 5, 2025, 7:08 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure Automatically assigned
[   25.087213] ==================================================================
[   25.087324] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   25.087507] Read of size 1 at addr fff00000c4657200 by task kunit_try_catch/164
[   25.087643] 
[   25.087718] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.088033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.088153] Hardware name: linux,dummy-virt (DT)
[   25.088314] Call trace:
[   25.088391]  show_stack+0x20/0x38 (C)
[   25.088539]  dump_stack_lvl+0x8c/0xd0
[   25.088754]  print_report+0x118/0x608
[   25.088966]  kasan_report+0xdc/0x128
[   25.089100]  __asan_report_load1_noabort+0x20/0x30
[   25.089295]  krealloc_uaf+0x4c8/0x520
[   25.089439]  kunit_try_run_case+0x170/0x3f0
[   25.089605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.089691]  kthread+0x328/0x630
[   25.089744]  ret_from_fork+0x10/0x20
[   25.089803] 
[   25.089825] Allocated by task 164:
[   25.089860]  kasan_save_stack+0x3c/0x68
[   25.089911]  kasan_save_track+0x20/0x40
[   25.089957]  kasan_save_alloc_info+0x40/0x58
[   25.090006]  __kasan_kmalloc+0xd4/0xd8
[   25.090051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.090101]  krealloc_uaf+0xc8/0x520
[   25.090145]  kunit_try_run_case+0x170/0x3f0
[   25.090192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.090246]  kthread+0x328/0x630
[   25.090284]  ret_from_fork+0x10/0x20
[   25.090351] 
[   25.090400] Freed by task 164:
[   25.090466]  kasan_save_stack+0x3c/0x68
[   25.090630]  kasan_save_track+0x20/0x40
[   25.090765]  kasan_save_free_info+0x4c/0x78
[   25.090866]  __kasan_slab_free+0x6c/0x98
[   25.091584]  kfree+0x214/0x3c8
[   25.092106]  krealloc_uaf+0x12c/0x520
[   25.092220]  kunit_try_run_case+0x170/0x3f0
[   25.092584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.092699]  kthread+0x328/0x630
[   25.093025]  ret_from_fork+0x10/0x20
[   25.093436] 
[   25.093487] The buggy address belongs to the object at fff00000c4657200
[   25.093487]  which belongs to the cache kmalloc-256 of size 256
[   25.093628] The buggy address is located 0 bytes inside of
[   25.093628]  freed 256-byte region [fff00000c4657200, fff00000c4657300)
[   25.094403] 
[   25.094540] The buggy address belongs to the physical page:
[   25.094886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104656
[   25.095013] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.095545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.096199] page_type: f5(slab)
[   25.096471] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.096596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.096723] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.096845] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.097610] head: 0bfffe0000000001 ffffc1ffc3119581 00000000ffffffff 00000000ffffffff
[   25.097955] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.098233] page dumped because: kasan: bad access detected
[   25.098696] 
[   25.098930] Memory state around the buggy address:
[   25.099068]  fff00000c4657100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099513]  fff00000c4657180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099991] >fff00000c4657200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.100088]                    ^
[   25.100372]  fff00000c4657280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.100761]  fff00000c4657300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.101119] ==================================================================
[   25.065627] ==================================================================
[   25.067799] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.067971] Read of size 1 at addr fff00000c4657200 by task kunit_try_catch/164
[   25.068105] 
[   25.068189] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.068412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.068481] Hardware name: linux,dummy-virt (DT)
[   25.068563] Call trace:
[   25.068614]  show_stack+0x20/0x38 (C)
[   25.068817]  dump_stack_lvl+0x8c/0xd0
[   25.068938]  print_report+0x118/0x608
[   25.069041]  kasan_report+0xdc/0x128
[   25.069147]  __kasan_check_byte+0x54/0x70
[   25.069261]  krealloc_noprof+0x44/0x360
[   25.069411]  krealloc_uaf+0x180/0x520
[   25.069517]  kunit_try_run_case+0x170/0x3f0
[   25.069626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.069750]  kthread+0x328/0x630
[   25.069852]  ret_from_fork+0x10/0x20
[   25.069958] 
[   25.069999] Allocated by task 164:
[   25.070067]  kasan_save_stack+0x3c/0x68
[   25.070754]  kasan_save_track+0x20/0x40
[   25.070897]  kasan_save_alloc_info+0x40/0x58
[   25.071077]  __kasan_kmalloc+0xd4/0xd8
[   25.071709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.071818]  krealloc_uaf+0xc8/0x520
[   25.071911]  kunit_try_run_case+0x170/0x3f0
[   25.072211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.072497]  kthread+0x328/0x630
[   25.073001]  ret_from_fork+0x10/0x20
[   25.073446] 
[   25.073714] Freed by task 164:
[   25.073805]  kasan_save_stack+0x3c/0x68
[   25.073907]  kasan_save_track+0x20/0x40
[   25.074000]  kasan_save_free_info+0x4c/0x78
[   25.074094]  __kasan_slab_free+0x6c/0x98
[   25.074183]  kfree+0x214/0x3c8
[   25.075227]  krealloc_uaf+0x12c/0x520
[   25.075363]  kunit_try_run_case+0x170/0x3f0
[   25.075921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.076010]  kthread+0x328/0x630
[   25.076083]  ret_from_fork+0x10/0x20
[   25.076189] 
[   25.076232] The buggy address belongs to the object at fff00000c4657200
[   25.076232]  which belongs to the cache kmalloc-256 of size 256
[   25.078227] The buggy address is located 0 bytes inside of
[   25.078227]  freed 256-byte region [fff00000c4657200, fff00000c4657300)
[   25.078322] 
[   25.078391] The buggy address belongs to the physical page:
[   25.078476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104656
[   25.078894] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.079045] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.079204] page_type: f5(slab)
[   25.079310] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.079658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.079855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   25.079991] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.080174] head: 0bfffe0000000001 ffffc1ffc3119581 00000000ffffffff 00000000ffffffff
[   25.080309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.080449] page dumped because: kasan: bad access detected
[   25.080788] 
[   25.080898] Memory state around the buggy address:
[   25.081349]  fff00000c4657100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.081793]  fff00000c4657180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.082029] >fff00000c4657200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.082154]                    ^
[   25.082282]  fff00000c4657280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.082582]  fff00000c4657300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.083112] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   29.301007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   29.450041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   29.322516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   29.401499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   29.348917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   29.702067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure Automatically assigned
[   29.126559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   29.180774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   29.065525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure Automatically assigned
[  116.535261] Internal error: Oops: 0000000096000005 [#1]  SMP
[  116.551236] Modules linked in:
[  116.552792] CPU: 1 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[  116.554696] Tainted: [B]=BAD_PAGE, [N]=TEST
[  116.555354] Hardware name: linux,dummy-virt (DT)
[  116.556689] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  116.557511] pc : kunit_test_null_dereference+0x70/0x170
[  116.558070] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  116.558658] sp : ffff800081ff7d30
[  116.559184] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000
[  116.560282] x26: 1ffe0000194239a1 x25: 0000000000000000 x24: 0000000000000004
[  116.561222] x23: fff00000ca11cd0c x22: ffff9ca723a56d58 x21: fff00000c3e59508
[  116.562162] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 000000000e09a452
[  116.563096] x17: 0000000000000001 x16: fff00000da466d28 x15: 000000006cfaaf5c
[  116.564030] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: fffd80001981762c
[  116.564991] x11: 1ffe00001981762b x10: fffd80001981762b x9 : ffff9ca723a4e1c0
[  116.565975] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  116.566883] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  116.567797] x2 : dfff800000000000 x1 : fff00000cc0ba880 x0 : ffff800080087990
[  116.568781] Call trace:
[  116.569171]  kunit_test_null_dereference+0x70/0x170 (P)
[  116.569790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  116.570474]  kthread+0x328/0x630
[  116.571001]  ret_from_fork+0x10/0x20
[  116.571925] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  116.572944] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure Automatically assigned
[   59.697452] ==================================================================
[   59.697538] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   59.697538] 
[   59.697644] Use-after-free read at 0x00000000979c8cc7 (in kfence-#188):
[   59.697711]  test_krealloc+0x51c/0x830
[   59.697769]  kunit_try_run_case+0x170/0x3f0
[   59.697830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.697888]  kthread+0x328/0x630
[   59.697939]  ret_from_fork+0x10/0x20
[   59.697994] 
[   59.698025] kfence-#188: 0x00000000979c8cc7-0x00000000f3e5840a, size=32, cache=kmalloc-32
[   59.698025] 
[   59.698093] allocated by task 337 on cpu 0 at 59.696520s (0.001568s ago):
[   59.698176]  test_alloc+0x29c/0x628
[   59.698230]  test_krealloc+0xc0/0x830
[   59.698281]  kunit_try_run_case+0x170/0x3f0
[   59.698352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.698414]  kthread+0x328/0x630
[   59.698458]  ret_from_fork+0x10/0x20
[   59.698508] 
[   59.698539] freed by task 337 on cpu 0 at 59.696893s (0.001641s ago):
[   59.698617]  krealloc_noprof+0x148/0x360
[   59.698668]  test_krealloc+0x1dc/0x830
[   59.698720]  kunit_try_run_case+0x170/0x3f0
[   59.698770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.698826]  kthread+0x328/0x630
[   59.698872]  ret_from_fork+0x10/0x20
[   59.698922] 
[   59.698976] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   59.699078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.699115] Hardware name: linux,dummy-virt (DT)
[   59.699160] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure Automatically assigned
[   59.504223] ==================================================================
[   59.504304] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   59.504304] 
[   59.504428] Use-after-free read at 0x000000002de2bbcc (in kfence-#186):
[   59.504493]  test_memcache_typesafe_by_rcu+0x280/0x560
[   59.504557]  kunit_try_run_case+0x170/0x3f0
[   59.504616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.504671]  kthread+0x328/0x630
[   59.504722]  ret_from_fork+0x10/0x20
[   59.504771] 
[   59.504801] kfence-#186: 0x000000002de2bbcc-0x00000000d91db6d0, size=32, cache=test
[   59.504801] 
[   59.504866] allocated by task 335 on cpu 1 at 59.489154s (0.015708s ago):
[   59.504949]  test_alloc+0x230/0x628
[   59.505003]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   59.505057]  kunit_try_run_case+0x170/0x3f0
[   59.505110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.505167]  kthread+0x328/0x630
[   59.505213]  ret_from_fork+0x10/0x20
[   59.505262] 
[   59.505290] freed by task 335 on cpu 1 at 59.489314s (0.015971s ago):
[   59.505390]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   59.505448]  kunit_try_run_case+0x170/0x3f0
[   59.505501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.505557]  kthread+0x328/0x630
[   59.505603]  ret_from_fork+0x10/0x20
[   59.505652] 
[   59.505705] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   59.505803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.505840] Hardware name: linux,dummy-virt (DT)
[   59.505885] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure Automatically assigned
[   38.295425] ==================================================================
[   38.295679] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   38.295679] 
[   38.295908] Invalid read at 0x00000000340a32c7:
[   38.296908]  test_invalid_access+0xdc/0x1f0
[   38.297059]  kunit_try_run_case+0x170/0x3f0
[   38.297771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.297903]  kthread+0x328/0x630
[   38.298018]  ret_from_fork+0x10/0x20
[   38.298149] 
[   38.298265] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   38.300298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.300410] Hardware name: linux,dummy-virt (DT)
[   38.301637] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure Automatically assigned
[   38.060788] ==================================================================
[   38.060882] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.060882] 
[   38.060958] Corrupted memory at 0x00000000882550f7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#182):
[   38.061368]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.061437]  kunit_try_run_case+0x170/0x3f0
[   38.061493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.061550]  kthread+0x328/0x630
[   38.061597]  ret_from_fork+0x10/0x20
[   38.061648] 
[   38.061679] kfence-#182: 0x0000000041de3c5d-0x00000000916ddcc8, size=73, cache=kmalloc-96
[   38.061679] 
[   38.061748] allocated by task 325 on cpu 0 at 38.060454s (0.001289s ago):
[   38.061823]  test_alloc+0x29c/0x628
[   38.061876]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   38.061932]  kunit_try_run_case+0x170/0x3f0
[   38.061982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.062038]  kthread+0x328/0x630
[   38.062083]  ret_from_fork+0x10/0x20
[   38.062133] 
[   38.062164] freed by task 325 on cpu 0 at 38.060674s (0.001485s ago):
[   38.062246]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   38.062300]  kunit_try_run_case+0x170/0x3f0
[   38.062374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.062435]  kthread+0x328/0x630
[   38.062480]  ret_from_fork+0x10/0x20
[   38.062535] 
[   38.062585] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   38.062689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.062727] Hardware name: linux,dummy-virt (DT)
[   38.062772] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure Automatically assigned
[   37.958869] ==================================================================
[   37.959004] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   37.959004] 
[   37.959186] Out-of-bounds read at 0x00000000753a0683 (105B right of kfence-#181):
[   37.959263]  test_kmalloc_aligned_oob_read+0x238/0x468
[   37.959357]  kunit_try_run_case+0x170/0x3f0
[   37.959428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.959487]  kthread+0x328/0x630
[   37.959536]  ret_from_fork+0x10/0x20
[   37.959589] 
[   37.959619] kfence-#181: 0x000000002aeef090-0x0000000054bde486, size=73, cache=kmalloc-96
[   37.959619] 
[   37.959686] allocated by task 323 on cpu 0 at 37.958444s (0.001238s ago):
[   37.959771]  test_alloc+0x29c/0x628
[   37.959865]  test_kmalloc_aligned_oob_read+0x100/0x468
[   37.959992]  kunit_try_run_case+0x170/0x3f0
[   37.960109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.960229]  kthread+0x328/0x630
[   37.960342]  ret_from_fork+0x10/0x20
[   37.960447] 
[   37.960544] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   37.960739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.960822] Hardware name: linux,dummy-virt (DT)
[   37.960872] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure Automatically assigned
[   34.318199] ==================================================================
[   34.318382] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   34.318382] 
[   34.318939] Corrupted memory at 0x0000000089028fa8 [ ! ] (in kfence-#146):
[   34.319531]  test_corruption+0x1d8/0x378
[   34.319644]  kunit_try_run_case+0x170/0x3f0
[   34.319749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320083]  kthread+0x328/0x630
[   34.320406]  ret_from_fork+0x10/0x20
[   34.320523] 
[   34.320592] kfence-#146: 0x00000000c12ea180-0x000000004f79a524, size=32, cache=test
[   34.320592] 
[   34.320738] allocated by task 313 on cpu 0 at 34.317760s (0.002968s ago):
[   34.321030]  test_alloc+0x230/0x628
[   34.321149]  test_corruption+0x198/0x378
[   34.321536]  kunit_try_run_case+0x170/0x3f0
[   34.321650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.321770]  kthread+0x328/0x630
[   34.321885]  ret_from_fork+0x10/0x20
[   34.322105] 
[   34.322174] freed by task 313 on cpu 0 at 34.318025s (0.004139s ago):
[   34.322734]  test_corruption+0x1d8/0x378
[   34.323008]  kunit_try_run_case+0x170/0x3f0
[   34.323145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.323270]  kthread+0x328/0x630
[   34.323435]  ret_from_fork+0x10/0x20
[   34.323834] 
[   34.324093] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   34.324372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.324586] Hardware name: linux,dummy-virt (DT)
[   34.324903] ==================================================================
[   33.902887] ==================================================================
[   33.903027] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   33.903027] 
[   33.903164] Corrupted memory at 0x000000009159547a [ ! . . . . . . . . . . . . . . . ] (in kfence-#142):
[   33.903961]  test_corruption+0x120/0x378
[   33.904552]  kunit_try_run_case+0x170/0x3f0
[   33.904979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.905164]  kthread+0x328/0x630
[   33.906960]  ret_from_fork+0x10/0x20
[   33.907095] 
[   33.907161] kfence-#142: 0x00000000ed7a644e-0x00000000d777a3ac, size=32, cache=test
[   33.907161] 
[   33.907299] allocated by task 313 on cpu 0 at 33.901109s (0.006182s ago):
[   33.907484]  test_alloc+0x230/0x628
[   33.907577]  test_corruption+0xdc/0x378
[   33.907671]  kunit_try_run_case+0x170/0x3f0
[   33.907767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.907932]  kthread+0x328/0x630
[   33.908068]  ret_from_fork+0x10/0x20
[   33.908160] 
[   33.908214] freed by task 313 on cpu 0 at 33.902722s (0.005485s ago):
[   33.908380]  test_corruption+0x120/0x378
[   33.909142]  kunit_try_run_case+0x170/0x3f0
[   33.909263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.909416]  kthread+0x328/0x630
[   33.909507]  ret_from_fork+0x10/0x20
[   33.909629] 
[   33.909828] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.910175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.910364] Hardware name: linux,dummy-virt (DT)
[   33.910453] ==================================================================
[   33.481027] ==================================================================
[   33.481163] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   33.481163] 
[   33.481344] Corrupted memory at 0x00000000035e21f0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138):
[   33.484069]  test_corruption+0x278/0x378
[   33.484222]  kunit_try_run_case+0x170/0x3f0
[   33.484594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.484751]  kthread+0x328/0x630
[   33.484878]  ret_from_fork+0x10/0x20
[   33.485074] 
[   33.485136] kfence-#138: 0x00000000ad8f681c-0x000000006b352bfd, size=32, cache=kmalloc-32
[   33.485136] 
[   33.485414] allocated by task 311 on cpu 0 at 33.479898s (0.005504s ago):
[   33.485587]  test_alloc+0x29c/0x628
[   33.485695]  test_corruption+0xdc/0x378
[   33.486024]  kunit_try_run_case+0x170/0x3f0
[   33.486175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.486450]  kthread+0x328/0x630
[   33.486673]  ret_from_fork+0x10/0x20
[   33.486784] 
[   33.486934] freed by task 311 on cpu 0 at 33.480633s (0.006291s ago):
[   33.487087]  test_corruption+0x278/0x378
[   33.487186]  kunit_try_run_case+0x170/0x3f0
[   33.487284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.487412]  kthread+0x328/0x630
[   33.487504]  ret_from_fork+0x10/0x20
[   33.487600] 
[   33.487696] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.488175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.488263] Hardware name: linux,dummy-virt (DT)
[   33.488381] ==================================================================
[   33.794872] ==================================================================
[   33.795012] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   33.795012] 
[   33.795135] Corrupted memory at 0x00000000138b3509 [ ! ] (in kfence-#141):
[   33.799850]  test_corruption+0x284/0x378
[   33.800069]  kunit_try_run_case+0x170/0x3f0
[   33.800219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.800625]  kthread+0x328/0x630
[   33.801360]  ret_from_fork+0x10/0x20
[   33.801467] 
[   33.801525] kfence-#141: 0x000000006be5454f-0x00000000631527fb, size=32, cache=kmalloc-32
[   33.801525] 
[   33.803018] allocated by task 311 on cpu 0 at 33.794427s (0.008565s ago):
[   33.803187]  test_alloc+0x29c/0x628
[   33.803495]  test_corruption+0x198/0x378
[   33.803625]  kunit_try_run_case+0x170/0x3f0
[   33.803953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.804070]  kthread+0x328/0x630
[   33.804198]  ret_from_fork+0x10/0x20
[   33.804457] 
[   33.804516] freed by task 311 on cpu 0 at 33.794581s (0.009927s ago):
[   33.804676]  test_corruption+0x284/0x378
[   33.804777]  kunit_try_run_case+0x170/0x3f0
[   33.804925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.805098]  kthread+0x328/0x630
[   33.805366]  ret_from_fork+0x10/0x20
[   33.805480] 
[   33.805687] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.806112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.806204] Hardware name: linux,dummy-virt (DT)
[   33.806378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure Automatically assigned
[   33.270921] ==================================================================
[   33.271028] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   33.271028] 
[   33.271407] Invalid free of 0x0000000021cca9fa (in kfence-#136):
[   33.271609]  test_invalid_addr_free+0x1ac/0x238
[   33.271734]  kunit_try_run_case+0x170/0x3f0
[   33.271878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.272137]  kthread+0x328/0x630
[   33.272437]  ret_from_fork+0x10/0x20
[   33.272644] 
[   33.272678] kfence-#136: 0x000000004133f8ef-0x000000002c1a6a2c, size=32, cache=kmalloc-32
[   33.272678] 
[   33.272748] allocated by task 307 on cpu 0 at 33.270714s (0.002029s ago):
[   33.272826]  test_alloc+0x29c/0x628
[   33.272880]  test_invalid_addr_free+0xd4/0x238
[   33.272934]  kunit_try_run_case+0x170/0x3f0
[   33.272986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.273041]  kthread+0x328/0x630
[   33.273085]  ret_from_fork+0x10/0x20
[   33.273134] 
[   33.273183] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.273293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.273354] Hardware name: linux,dummy-virt (DT)
[   33.273405] ==================================================================
[   33.378030] ==================================================================
[   33.378195] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   33.378195] 
[   33.378384] Invalid free of 0x000000005e11359b (in kfence-#137):
[   33.378587]  test_invalid_addr_free+0xec/0x238
[   33.378827]  kunit_try_run_case+0x170/0x3f0
[   33.378953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.379151]  kthread+0x328/0x630
[   33.379291]  ret_from_fork+0x10/0x20
[   33.379452] 
[   33.379514] kfence-#137: 0x0000000043216fe3-0x000000006890fd88, size=32, cache=test
[   33.379514] 
[   33.379802] allocated by task 309 on cpu 0 at 33.377581s (0.002212s ago):
[   33.380077]  test_alloc+0x230/0x628
[   33.380197]  test_invalid_addr_free+0xd4/0x238
[   33.380316]  kunit_try_run_case+0x170/0x3f0
[   33.380563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.380694]  kthread+0x328/0x630
[   33.380837]  ret_from_fork+0x10/0x20
[   33.381030] 
[   33.381146] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.381367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.381442] Hardware name: linux,dummy-virt (DT)
[   33.381579] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure Automatically assigned
[   33.063612] ==================================================================
[   33.063798] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   33.063798] 
[   33.064425] Invalid free of 0x00000000c915c51c (in kfence-#134):
[   33.064664]  test_double_free+0x1bc/0x238
[   33.064802]  kunit_try_run_case+0x170/0x3f0
[   33.065220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.065902]  kthread+0x328/0x630
[   33.066282]  ret_from_fork+0x10/0x20
[   33.066436] 
[   33.066528] kfence-#134: 0x00000000c915c51c-0x000000008d8deb11, size=32, cache=kmalloc-32
[   33.066528] 
[   33.066764] allocated by task 303 on cpu 0 at 33.063035s (0.003718s ago):
[   33.067211]  test_alloc+0x29c/0x628
[   33.067319]  test_double_free+0xd4/0x238
[   33.067445]  kunit_try_run_case+0x170/0x3f0
[   33.067554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.067666]  kthread+0x328/0x630
[   33.067757]  ret_from_fork+0x10/0x20
[   33.067865] 
[   33.067935] freed by task 303 on cpu 0 at 33.063199s (0.004727s ago):
[   33.068463]  test_double_free+0x1ac/0x238
[   33.068588]  kunit_try_run_case+0x170/0x3f0
[   33.068783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.068913]  kthread+0x328/0x630
[   33.069662]  ret_from_fork+0x10/0x20
[   33.070214] 
[   33.070319] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.070555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.070687] Hardware name: linux,dummy-virt (DT)
[   33.070776] ==================================================================
[   33.165517] ==================================================================
[   33.165860] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   33.165860] 
[   33.166583] Invalid free of 0x0000000048f6cd5e (in kfence-#135):
[   33.167474]  test_double_free+0x100/0x238
[   33.167620]  kunit_try_run_case+0x170/0x3f0
[   33.167751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.167918]  kthread+0x328/0x630
[   33.168191]  ret_from_fork+0x10/0x20
[   33.168522] 
[   33.168585] kfence-#135: 0x0000000048f6cd5e-0x000000007bb004a5, size=32, cache=test
[   33.168585] 
[   33.168721] allocated by task 305 on cpu 0 at 33.164834s (0.003878s ago):
[   33.168988]  test_alloc+0x230/0x628
[   33.169293]  test_double_free+0xd4/0x238
[   33.169420]  kunit_try_run_case+0x170/0x3f0
[   33.169567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.169680]  kthread+0x328/0x630
[   33.169815]  ret_from_fork+0x10/0x20
[   33.169915] 
[   33.169974] freed by task 305 on cpu 0 at 33.164930s (0.005036s ago):
[   33.170249]  test_double_free+0xf0/0x238
[   33.170653]  kunit_try_run_case+0x170/0x3f0
[   33.170772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.170994]  kthread+0x328/0x630
[   33.171200]  ret_from_fork+0x10/0x20
[   33.171711] 
[   33.171871] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   33.172169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.172259] Hardware name: linux,dummy-virt (DT)
[   33.172416] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure Automatically assigned
[   32.733498] ==================================================================
[   32.733994] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.733994] 
[   32.734182] Use-after-free read at 0x000000005d6a7440 (in kfence-#131):
[   32.734342]  test_use_after_free_read+0x114/0x248
[   32.734482]  kunit_try_run_case+0x170/0x3f0
[   32.734985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.735108]  kthread+0x328/0x630
[   32.735204]  ret_from_fork+0x10/0x20
[   32.735300] 
[   32.735377] kfence-#131: 0x000000005d6a7440-0x000000007ec29a65, size=32, cache=test
[   32.735377] 
[   32.735501] allocated by task 297 on cpu 0 at 32.732831s (0.002662s ago):
[   32.735669]  test_alloc+0x230/0x628
[   32.736139]  test_use_after_free_read+0xd0/0x248
[   32.736520]  kunit_try_run_case+0x170/0x3f0
[   32.736912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.737054]  kthread+0x328/0x630
[   32.737193]  ret_from_fork+0x10/0x20
[   32.737340] 
[   32.737401] freed by task 297 on cpu 0 at 32.733097s (0.004295s ago):
[   32.738106]  test_use_after_free_read+0xf0/0x248
[   32.738270]  kunit_try_run_case+0x170/0x3f0
[   32.738397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.739235]  kthread+0x328/0x630
[   32.739561]  ret_from_fork+0x10/0x20
[   32.739862] 
[   32.740153] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   32.740406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.740605] Hardware name: linux,dummy-virt (DT)
[   32.740907] ==================================================================
[   32.633190] ==================================================================
[   32.634065] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   32.634065] 
[   32.634867] Use-after-free read at 0x00000000fac58b55 (in kfence-#130):
[   32.635780]  test_use_after_free_read+0x114/0x248
[   32.636375]  kunit_try_run_case+0x170/0x3f0
[   32.636563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.636793]  kthread+0x328/0x630
[   32.636892]  ret_from_fork+0x10/0x20
[   32.638139] 
[   32.638248] kfence-#130: 0x00000000fac58b55-0x00000000d57c698d, size=32, cache=kmalloc-32
[   32.638248] 
[   32.638599] allocated by task 295 on cpu 0 at 32.630227s (0.008315s ago):
[   32.639146]  test_alloc+0x29c/0x628
[   32.640102]  test_use_after_free_read+0xd0/0x248
[   32.640608]  kunit_try_run_case+0x170/0x3f0
[   32.640734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.641760]  kthread+0x328/0x630
[   32.641908]  ret_from_fork+0x10/0x20
[   32.642026] 
[   32.642269] freed by task 295 on cpu 0 at 32.630809s (0.011315s ago):
[   32.644400]  test_use_after_free_read+0x1c0/0x248
[   32.644527]  kunit_try_run_case+0x170/0x3f0
[   32.644663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.644814]  kthread+0x328/0x630
[   32.644912]  ret_from_fork+0x10/0x20
[   32.645266] 
[   32.645428] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   32.645984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.646191] Hardware name: linux,dummy-virt (DT)
[   32.646404] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure Automatically assigned
[   32.517732] ==================================================================
[   32.517880] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   32.517880] 
[   32.518053] Out-of-bounds write at 0x00000000128ca38b (1B left of kfence-#129):
[   32.518186]  test_out_of_bounds_write+0x100/0x240
[   32.518295]  kunit_try_run_case+0x170/0x3f0
[   32.520374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520547]  kthread+0x328/0x630
[   32.520628]  ret_from_fork+0x10/0x20
[   32.520683] 
[   32.520718] kfence-#129: 0x00000000a56eb345-0x00000000e95609df, size=32, cache=test
[   32.520718] 
[   32.520932] allocated by task 293 on cpu 0 at 32.516551s (0.004362s ago):
[   32.521135]  test_alloc+0x230/0x628
[   32.521404]  test_out_of_bounds_write+0xc8/0x240
[   32.521688]  kunit_try_run_case+0x170/0x3f0
[   32.521899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.522431]  kthread+0x328/0x630
[   32.522538]  ret_from_fork+0x10/0x20
[   32.523025] 
[   32.523146] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   32.523585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.523921] Hardware name: linux,dummy-virt (DT)
[   32.523967] ==================================================================
[   31.864583] ==================================================================
[   31.865650] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   31.865650] 
[   31.866615] Out-of-bounds write at 0x0000000077669080 (1B left of kfence-#123):
[   31.866854]  test_out_of_bounds_write+0x100/0x240
[   31.867705]  kunit_try_run_case+0x170/0x3f0
[   31.867829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.868695]  kthread+0x328/0x630
[   31.869153]  ret_from_fork+0x10/0x20
[   31.869274] 
[   31.869773] kfence-#123: 0x000000004091c0c8-0x0000000099a37d7e, size=32, cache=kmalloc-32
[   31.869773] 
[   31.869905] allocated by task 291 on cpu 0 at 31.862834s (0.007062s ago):
[   31.870826]  test_alloc+0x29c/0x628
[   31.870987]  test_out_of_bounds_write+0xc8/0x240
[   31.871598]  kunit_try_run_case+0x170/0x3f0
[   31.871823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.872482]  kthread+0x328/0x630
[   31.872801]  ret_from_fork+0x10/0x20
[   31.873256] 
[   31.873715] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   31.873911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.873984] Hardware name: linux,dummy-virt (DT)
[   31.875011] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure Automatically assigned
[   30.904204] ==================================================================
[   30.904458] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   30.904458] 
[   30.904774] Out-of-bounds read at 0x00000000efc9bfca (1B left of kfence-#114):
[   30.905875]  test_out_of_bounds_read+0x114/0x3e0
[   30.906007]  kunit_try_run_case+0x170/0x3f0
[   30.906166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.906347]  kthread+0x328/0x630
[   30.906454]  ret_from_fork+0x10/0x20
[   30.906861] 
[   30.907567] kfence-#114: 0x00000000bc441aae-0x00000000cb44580c, size=32, cache=kmalloc-32
[   30.907567] 
[   30.908038] allocated by task 287 on cpu 0 at 30.900881s (0.007047s ago):
[   30.909369]  test_alloc+0x29c/0x628
[   30.909542]  test_out_of_bounds_read+0xdc/0x3e0
[   30.909748]  kunit_try_run_case+0x170/0x3f0
[   30.909936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.910102]  kthread+0x328/0x630
[   30.910355]  ret_from_fork+0x10/0x20
[   30.910610] 
[   30.910928] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.911127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.911198] Hardware name: linux,dummy-virt (DT)
[   30.911298] ==================================================================
[   31.645319] ==================================================================
[   31.645651] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   31.645651] 
[   31.646149] Out-of-bounds read at 0x00000000a587696e (1B left of kfence-#121):
[   31.646360]  test_out_of_bounds_read+0x114/0x3e0
[   31.646565]  kunit_try_run_case+0x170/0x3f0
[   31.646719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.647016]  kthread+0x328/0x630
[   31.647194]  ret_from_fork+0x10/0x20
[   31.647400] 
[   31.647498] kfence-#121: 0x0000000063f8f0cd-0x00000000d3811c1a, size=32, cache=test
[   31.647498] 
[   31.647632] allocated by task 289 on cpu 0 at 31.644810s (0.002813s ago):
[   31.647989]  test_alloc+0x230/0x628
[   31.648114]  test_out_of_bounds_read+0xdc/0x3e0
[   31.648315]  kunit_try_run_case+0x170/0x3f0
[   31.648520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.648853]  kthread+0x328/0x630
[   31.648973]  ret_from_fork+0x10/0x20
[   31.649094] 
[   31.649268] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   31.649498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.649593] Hardware name: linux,dummy-virt (DT)
[   31.649781] ==================================================================
[   31.754769] ==================================================================
[   31.754910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   31.754910] 
[   31.755075] Out-of-bounds read at 0x000000006248890a (32B right of kfence-#122):
[   31.755163]  test_out_of_bounds_read+0x1c8/0x3e0
[   31.755226]  kunit_try_run_case+0x170/0x3f0
[   31.755284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.755380]  kthread+0x328/0x630
[   31.755477]  ret_from_fork+0x10/0x20
[   31.755573] 
[   31.755632] kfence-#122: 0x0000000079baa0be-0x00000000a2142328, size=32, cache=test
[   31.755632] 
[   31.755751] allocated by task 289 on cpu 0 at 31.754625s (0.001118s ago):
[   31.755956]  test_alloc+0x230/0x628
[   31.756064]  test_out_of_bounds_read+0x198/0x3e0
[   31.756178]  kunit_try_run_case+0x170/0x3f0
[   31.756285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.756416]  kthread+0x328/0x630
[   31.757799]  ret_from_fork+0x10/0x20
[   31.757940] 
[   31.758034] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   31.759241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.759316] Hardware name: linux,dummy-virt (DT)
[   31.759518] ==================================================================
[   31.117883] ==================================================================
[   31.118030] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   31.118030] 
[   31.118224] Out-of-bounds read at 0x00000000ab33e70c (32B right of kfence-#116):
[   31.118910]  test_out_of_bounds_read+0x1c8/0x3e0
[   31.119398]  kunit_try_run_case+0x170/0x3f0
[   31.119516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.120165]  kthread+0x328/0x630
[   31.120269]  ret_from_fork+0x10/0x20
[   31.120454] 
[   31.120518] kfence-#116: 0x000000000eb20a0a-0x0000000042a23c91, size=32, cache=kmalloc-32
[   31.120518] 
[   31.120827] allocated by task 287 on cpu 0 at 31.117268s (0.003550s ago):
[   31.121106]  test_alloc+0x29c/0x628
[   31.121214]  test_out_of_bounds_read+0x198/0x3e0
[   31.121400]  kunit_try_run_case+0x170/0x3f0
[   31.121516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.121678]  kthread+0x328/0x630
[   31.121781]  ret_from_fork+0x10/0x20
[   31.121879] 
[   31.121969] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   31.122607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.122741] Hardware name: linux,dummy-virt (DT)
[   31.122826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure Automatically assigned
[   30.664587] ==================================================================
[   30.665524] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.667176] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.667312] 
[   30.669060] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.669854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.670360] Hardware name: linux,dummy-virt (DT)
[   30.670474] Call trace:
[   30.670548]  show_stack+0x20/0x38 (C)
[   30.670685]  dump_stack_lvl+0x8c/0xd0
[   30.670827]  print_report+0x118/0x608
[   30.670961]  kasan_report+0xdc/0x128
[   30.671093]  kasan_check_range+0x100/0x1a8
[   30.671216]  __kasan_check_write+0x20/0x30
[   30.671354]  strncpy_from_user+0x3c/0x2a0
[   30.671474]  copy_user_test_oob+0x5c0/0xec8
[   30.671598]  kunit_try_run_case+0x170/0x3f0
[   30.671733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.671884]  kthread+0x328/0x630
[   30.672001]  ret_from_fork+0x10/0x20
[   30.680541] 
[   30.680581] Allocated by task 285:
[   30.680626]  kasan_save_stack+0x3c/0x68
[   30.680749]  kasan_save_track+0x20/0x40
[   30.680871]  kasan_save_alloc_info+0x40/0x58
[   30.680989]  __kasan_kmalloc+0xd4/0xd8
[   30.681048]  __kmalloc_noprof+0x198/0x4c8
[   30.681099]  kunit_kmalloc_array+0x34/0x88
[   30.681153]  copy_user_test_oob+0xac/0xec8
[   30.681203]  kunit_try_run_case+0x170/0x3f0
[   30.681253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681322]  kthread+0x328/0x630
[   30.681501]  ret_from_fork+0x10/0x20
[   30.681618] 
[   30.681678] The buggy address belongs to the object at fff00000c7719c00
[   30.681678]  which belongs to the cache kmalloc-128 of size 128
[   30.681847] The buggy address is located 0 bytes inside of
[   30.681847]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.682015] 
[   30.682091] The buggy address belongs to the physical page:
[   30.682177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.682310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.682508] page_type: f5(slab)
[   30.682610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.682739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.682867] page dumped because: kasan: bad access detected
[   30.683003] 
[   30.683053] Memory state around the buggy address:
[   30.683149]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.683409]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.683542] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.683698]                                                                 ^
[   30.683864]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.684016]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.684174] ==================================================================
[   30.688189] ==================================================================
[   30.688345] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.688484] Write of size 1 at addr fff00000c7719c78 by task kunit_try_catch/285
[   30.688730] 
[   30.688909] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.689132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.689255] Hardware name: linux,dummy-virt (DT)
[   30.689386] Call trace:
[   30.689498]  show_stack+0x20/0x38 (C)
[   30.689645]  dump_stack_lvl+0x8c/0xd0
[   30.689779]  print_report+0x118/0x608
[   30.690028]  kasan_report+0xdc/0x128
[   30.690250]  __asan_report_store1_noabort+0x20/0x30
[   30.690548]  strncpy_from_user+0x270/0x2a0
[   30.690679]  copy_user_test_oob+0x5c0/0xec8
[   30.690869]  kunit_try_run_case+0x170/0x3f0
[   30.691022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.691374]  kthread+0x328/0x630
[   30.691495]  ret_from_fork+0x10/0x20
[   30.691648] 
[   30.691763] Allocated by task 285:
[   30.691975]  kasan_save_stack+0x3c/0x68
[   30.692160]  kasan_save_track+0x20/0x40
[   30.692364]  kasan_save_alloc_info+0x40/0x58
[   30.692492]  __kasan_kmalloc+0xd4/0xd8
[   30.692626]  __kmalloc_noprof+0x198/0x4c8
[   30.692758]  kunit_kmalloc_array+0x34/0x88
[   30.693008]  copy_user_test_oob+0xac/0xec8
[   30.693188]  kunit_try_run_case+0x170/0x3f0
[   30.693527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.693726]  kthread+0x328/0x630
[   30.693812]  ret_from_fork+0x10/0x20
[   30.693904] 
[   30.693992] The buggy address belongs to the object at fff00000c7719c00
[   30.693992]  which belongs to the cache kmalloc-128 of size 128
[   30.694270] The buggy address is located 0 bytes to the right of
[   30.694270]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.694460] 
[   30.694532] The buggy address belongs to the physical page:
[   30.694626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.694815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.694956] page_type: f5(slab)
[   30.695075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.695219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.695457] page dumped because: kasan: bad access detected
[   30.695636] 
[   30.695699] Memory state around the buggy address:
[   30.696218]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.696407]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.696860] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.696974]                                                                 ^
[   30.697121]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.697241]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.697387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure Automatically assigned
[   30.590183] ==================================================================
[   30.590467] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   30.590615] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.590752] 
[   30.590859] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.591282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.591388] Hardware name: linux,dummy-virt (DT)
[   30.591506] Call trace:
[   30.591658]  show_stack+0x20/0x38 (C)
[   30.591926]  dump_stack_lvl+0x8c/0xd0
[   30.592032]  print_report+0x118/0x608
[   30.592147]  kasan_report+0xdc/0x128
[   30.592215]  kasan_check_range+0x100/0x1a8
[   30.592277]  __kasan_check_read+0x20/0x30
[   30.592362]  copy_user_test_oob+0x728/0xec8
[   30.592432]  kunit_try_run_case+0x170/0x3f0
[   30.592495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.592567]  kthread+0x328/0x630
[   30.592623]  ret_from_fork+0x10/0x20
[   30.592685] 
[   30.592711] Allocated by task 285:
[   30.592748]  kasan_save_stack+0x3c/0x68
[   30.592800]  kasan_save_track+0x20/0x40
[   30.592851]  kasan_save_alloc_info+0x40/0x58
[   30.592905]  __kasan_kmalloc+0xd4/0xd8
[   30.592951]  __kmalloc_noprof+0x198/0x4c8
[   30.593002]  kunit_kmalloc_array+0x34/0x88
[   30.593051]  copy_user_test_oob+0xac/0xec8
[   30.593100]  kunit_try_run_case+0x170/0x3f0
[   30.593150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.593207]  kthread+0x328/0x630
[   30.593248]  ret_from_fork+0x10/0x20
[   30.593307] 
[   30.593370] The buggy address belongs to the object at fff00000c7719c00
[   30.593370]  which belongs to the cache kmalloc-128 of size 128
[   30.593577] The buggy address is located 0 bytes inside of
[   30.593577]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.593744] 
[   30.593801] The buggy address belongs to the physical page:
[   30.594324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.594515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.594743] page_type: f5(slab)
[   30.594861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.594994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.596186] page dumped because: kasan: bad access detected
[   30.596285] 
[   30.596358] Memory state around the buggy address:
[   30.596643]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.597512]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.597966] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.598891]                                                                 ^
[   30.599357]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.600276]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.600691] ==================================================================
[   30.628528] ==================================================================
[   30.628635] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   30.628740] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.628867] 
[   30.628952] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.629161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.629236] Hardware name: linux,dummy-virt (DT)
[   30.629525] Call trace:
[   30.629595]  show_stack+0x20/0x38 (C)
[   30.629914]  dump_stack_lvl+0x8c/0xd0
[   30.630041]  print_report+0x118/0x608
[   30.630156]  kasan_report+0xdc/0x128
[   30.630300]  kasan_check_range+0x100/0x1a8
[   30.630464]  __kasan_check_read+0x20/0x30
[   30.630605]  copy_user_test_oob+0x3c8/0xec8
[   30.630752]  kunit_try_run_case+0x170/0x3f0
[   30.630892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.631052]  kthread+0x328/0x630
[   30.631186]  ret_from_fork+0x10/0x20
[   30.631323] 
[   30.631403] Allocated by task 285:
[   30.631487]  kasan_save_stack+0x3c/0x68
[   30.631590]  kasan_save_track+0x20/0x40
[   30.631706]  kasan_save_alloc_info+0x40/0x58
[   30.631907]  __kasan_kmalloc+0xd4/0xd8
[   30.632107]  __kmalloc_noprof+0x198/0x4c8
[   30.632268]  kunit_kmalloc_array+0x34/0x88
[   30.632415]  copy_user_test_oob+0xac/0xec8
[   30.632541]  kunit_try_run_case+0x170/0x3f0
[   30.632662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.632797]  kthread+0x328/0x630
[   30.632995]  ret_from_fork+0x10/0x20
[   30.633201] 
[   30.633258] The buggy address belongs to the object at fff00000c7719c00
[   30.633258]  which belongs to the cache kmalloc-128 of size 128
[   30.633442] The buggy address is located 0 bytes inside of
[   30.633442]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.633621] 
[   30.633789] The buggy address belongs to the physical page:
[   30.633929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.634095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.634254] page_type: f5(slab)
[   30.634384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.634533] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.634656] page dumped because: kasan: bad access detected
[   30.634747] 
[   30.634802] Memory state around the buggy address:
[   30.634895]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.635010]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.635181] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.635419]                                                                 ^
[   30.635729]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.635853]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.635973] ==================================================================
[   30.636409] ==================================================================
[   30.636516] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   30.636621] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.636758] 
[   30.636830] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.637039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.637114] Hardware name: linux,dummy-virt (DT)
[   30.637191] Call trace:
[   30.637253]  show_stack+0x20/0x38 (C)
[   30.637406]  dump_stack_lvl+0x8c/0xd0
[   30.637533]  print_report+0x118/0x608
[   30.637646]  kasan_report+0xdc/0x128
[   30.637758]  kasan_check_range+0x100/0x1a8
[   30.637879]  __kasan_check_write+0x20/0x30
[   30.637996]  copy_user_test_oob+0x434/0xec8
[   30.638115]  kunit_try_run_case+0x170/0x3f0
[   30.638231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.639869]  kthread+0x328/0x630
[   30.640008]  ret_from_fork+0x10/0x20
[   30.640154] 
[   30.640205] Allocated by task 285:
[   30.640297]  kasan_save_stack+0x3c/0x68
[   30.640435]  kasan_save_track+0x20/0x40
[   30.640606]  kasan_save_alloc_info+0x40/0x58
[   30.640748]  __kasan_kmalloc+0xd4/0xd8
[   30.641235]  __kmalloc_noprof+0x198/0x4c8
[   30.641392]  kunit_kmalloc_array+0x34/0x88
[   30.641512]  copy_user_test_oob+0xac/0xec8
[   30.641612]  kunit_try_run_case+0x170/0x3f0
[   30.641715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641857]  kthread+0x328/0x630
[   30.642026]  ret_from_fork+0x10/0x20
[   30.642299] 
[   30.642370] The buggy address belongs to the object at fff00000c7719c00
[   30.642370]  which belongs to the cache kmalloc-128 of size 128
[   30.642518] The buggy address is located 0 bytes inside of
[   30.642518]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.642673] 
[   30.642724] The buggy address belongs to the physical page:
[   30.642834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.643157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.643279] page_type: f5(slab)
[   30.643402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.643545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.644139] page dumped because: kasan: bad access detected
[   30.644248] 
[   30.644309] Memory state around the buggy address:
[   30.644426]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.644560]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.644689] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.644852]                                                                 ^
[   30.644999]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.645247]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.645417] ==================================================================
[   30.559926] ==================================================================
[   30.560211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   30.560421] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.560560] 
[   30.560660] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.562267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.562413] Hardware name: linux,dummy-virt (DT)
[   30.562853] Call trace:
[   30.563263]  show_stack+0x20/0x38 (C)
[   30.563823]  dump_stack_lvl+0x8c/0xd0
[   30.564250]  print_report+0x118/0x608
[   30.564495]  kasan_report+0xdc/0x128
[   30.564631]  kasan_check_range+0x100/0x1a8
[   30.565152]  __kasan_check_write+0x20/0x30
[   30.565861]  copy_user_test_oob+0x234/0xec8
[   30.566098]  kunit_try_run_case+0x170/0x3f0
[   30.566429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.566570]  kthread+0x328/0x630
[   30.566695]  ret_from_fork+0x10/0x20
[   30.567082] 
[   30.567247] Allocated by task 285:
[   30.567449]  kasan_save_stack+0x3c/0x68
[   30.567658]  kasan_save_track+0x20/0x40
[   30.567754]  kasan_save_alloc_info+0x40/0x58
[   30.567866]  __kasan_kmalloc+0xd4/0xd8
[   30.567976]  __kmalloc_noprof+0x198/0x4c8
[   30.568142]  kunit_kmalloc_array+0x34/0x88
[   30.568354]  copy_user_test_oob+0xac/0xec8
[   30.568471]  kunit_try_run_case+0x170/0x3f0
[   30.568584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.568966]  kthread+0x328/0x630
[   30.569162]  ret_from_fork+0x10/0x20
[   30.569269] 
[   30.569350] The buggy address belongs to the object at fff00000c7719c00
[   30.569350]  which belongs to the cache kmalloc-128 of size 128
[   30.569506] The buggy address is located 0 bytes inside of
[   30.569506]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.569677] 
[   30.569797] The buggy address belongs to the physical page:
[   30.570062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.570220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.570461] page_type: f5(slab)
[   30.570576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.570717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.570832] page dumped because: kasan: bad access detected
[   30.570977] 
[   30.571077] Memory state around the buggy address:
[   30.571172]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.571393]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.571577] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.571684]                                                                 ^
[   30.571956]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572021]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572124] ==================================================================
[   30.616657] ==================================================================
[   30.616781] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   30.616898] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.617023] 
[   30.617298] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.617541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.617877] Hardware name: linux,dummy-virt (DT)
[   30.618107] Call trace:
[   30.618267]  show_stack+0x20/0x38 (C)
[   30.618413]  dump_stack_lvl+0x8c/0xd0
[   30.618531]  print_report+0x118/0x608
[   30.618655]  kasan_report+0xdc/0x128
[   30.618798]  kasan_check_range+0x100/0x1a8
[   30.618929]  __kasan_check_write+0x20/0x30
[   30.619045]  copy_user_test_oob+0x35c/0xec8
[   30.619167]  kunit_try_run_case+0x170/0x3f0
[   30.619287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.619439]  kthread+0x328/0x630
[   30.619551]  ret_from_fork+0x10/0x20
[   30.619674] 
[   30.619726] Allocated by task 285:
[   30.619805]  kasan_save_stack+0x3c/0x68
[   30.619984]  kasan_save_track+0x20/0x40
[   30.620107]  kasan_save_alloc_info+0x40/0x58
[   30.620774]  __kasan_kmalloc+0xd4/0xd8
[   30.621255]  __kmalloc_noprof+0x198/0x4c8
[   30.621795]  kunit_kmalloc_array+0x34/0x88
[   30.622111]  copy_user_test_oob+0xac/0xec8
[   30.622359]  kunit_try_run_case+0x170/0x3f0
[   30.622489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.622653]  kthread+0x328/0x630
[   30.622754]  ret_from_fork+0x10/0x20
[   30.622924] 
[   30.623038] The buggy address belongs to the object at fff00000c7719c00
[   30.623038]  which belongs to the cache kmalloc-128 of size 128
[   30.623188] The buggy address is located 0 bytes inside of
[   30.623188]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.623363] 
[   30.623418] The buggy address belongs to the physical page:
[   30.623499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.623659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.623882] page_type: f5(slab)
[   30.623977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.624303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.624438] page dumped because: kasan: bad access detected
[   30.624533] 
[   30.624593] Memory state around the buggy address:
[   30.624690]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.624824]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.624955] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.625133]                                                                 ^
[   30.627204]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.627355]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.627475] ==================================================================
[   30.646251] ==================================================================
[   30.646418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   30.646576] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285
[   30.646793] 
[   30.646996] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.647568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.647786] Hardware name: linux,dummy-virt (DT)
[   30.648146] Call trace:
[   30.648249]  show_stack+0x20/0x38 (C)
[   30.648393]  dump_stack_lvl+0x8c/0xd0
[   30.648511]  print_report+0x118/0x608
[   30.648628]  kasan_report+0xdc/0x128
[   30.648740]  kasan_check_range+0x100/0x1a8
[   30.648863]  __kasan_check_read+0x20/0x30
[   30.648979]  copy_user_test_oob+0x4a0/0xec8
[   30.649099]  kunit_try_run_case+0x170/0x3f0
[   30.649224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.649388]  kthread+0x328/0x630
[   30.649496]  ret_from_fork+0x10/0x20
[   30.649614] 
[   30.649662] Allocated by task 285:
[   30.649733]  kasan_save_stack+0x3c/0x68
[   30.649828]  kasan_save_track+0x20/0x40
[   30.649925]  kasan_save_alloc_info+0x40/0x58
[   30.650026]  __kasan_kmalloc+0xd4/0xd8
[   30.650675]  __kmalloc_noprof+0x198/0x4c8
[   30.651095]  kunit_kmalloc_array+0x34/0x88
[   30.655387]  copy_user_test_oob+0xac/0xec8
[   30.655740]  kunit_try_run_case+0x170/0x3f0
[   30.656139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.657386]  kthread+0x328/0x630
[   30.657488]  ret_from_fork+0x10/0x20
[   30.657580] 
[   30.657637] The buggy address belongs to the object at fff00000c7719c00
[   30.657637]  which belongs to the cache kmalloc-128 of size 128
[   30.657838] The buggy address is located 0 bytes inside of
[   30.657838]  allocated 120-byte region [fff00000c7719c00, fff00000c7719c78)
[   30.658072] 
[   30.658136] The buggy address belongs to the physical page:
[   30.658236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.658777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.658994] page_type: f5(slab)
[   30.659113] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.659312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.659789] page dumped because: kasan: bad access detected
[   30.659937] 
[   30.660039] Memory state around the buggy address:
[   30.660241]  fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.661192]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.661764] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.661878]                                                                 ^
[   30.661993]  fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.662114]  fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.662222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure Automatically assigned
[   30.462993] ==================================================================
[   30.463102] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   30.463214] Write of size 8 at addr fff00000c7719b78 by task kunit_try_catch/281
[   30.466387] 
[   30.466447] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.466645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.466684] Hardware name: linux,dummy-virt (DT)
[   30.466728] Call trace:
[   30.466758]  show_stack+0x20/0x38 (C)
[   30.466822]  dump_stack_lvl+0x8c/0xd0
[   30.466885]  print_report+0x118/0x608
[   30.466944]  kasan_report+0xdc/0x128
[   30.467004]  kasan_check_range+0x100/0x1a8
[   30.467066]  __kasan_check_write+0x20/0x30
[   30.467127]  copy_to_kernel_nofault+0x8c/0x250
[   30.467188]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   30.467252]  kunit_try_run_case+0x170/0x3f0
[   30.467313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.467627]  kthread+0x328/0x630
[   30.467774]  ret_from_fork+0x10/0x20
[   30.468088] 
[   30.468448] Allocated by task 281:
[   30.468898]  kasan_save_stack+0x3c/0x68
[   30.469009]  kasan_save_track+0x20/0x40
[   30.470193]  kasan_save_alloc_info+0x40/0x58
[   30.470481]  __kasan_kmalloc+0xd4/0xd8
[   30.470587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.470706]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.472138]  kunit_try_run_case+0x170/0x3f0
[   30.472254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.472403]  kthread+0x328/0x630
[   30.473786]  ret_from_fork+0x10/0x20
[   30.474054] 
[   30.474161] The buggy address belongs to the object at fff00000c7719b00
[   30.474161]  which belongs to the cache kmalloc-128 of size 128
[   30.474877] The buggy address is located 0 bytes to the right of
[   30.474877]  allocated 120-byte region [fff00000c7719b00, fff00000c7719b78)
[   30.475274] 
[   30.475366] The buggy address belongs to the physical page:
[   30.475451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.476087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.476281] page_type: f5(slab)
[   30.476477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.476652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.476781] page dumped because: kasan: bad access detected
[   30.476921] 
[   30.476984] Memory state around the buggy address:
[   30.477075]  fff00000c7719a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.477189]  fff00000c7719a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.477324] >fff00000c7719b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.477556]                                                                 ^
[   30.477668]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.477778]  fff00000c7719c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.477877] ==================================================================
[   30.446045] ==================================================================
[   30.446301] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   30.446569] Read of size 8 at addr fff00000c7719b78 by task kunit_try_catch/281
[   30.446793] 
[   30.446938] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.447245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.447390] Hardware name: linux,dummy-virt (DT)
[   30.447481] Call trace:
[   30.447552]  show_stack+0x20/0x38 (C)
[   30.447689]  dump_stack_lvl+0x8c/0xd0
[   30.448008]  print_report+0x118/0x608
[   30.448130]  kasan_report+0xdc/0x128
[   30.448197]  __asan_report_load8_noabort+0x20/0x30
[   30.448259]  copy_to_kernel_nofault+0x204/0x250
[   30.448344]  copy_to_kernel_nofault_oob+0x158/0x418
[   30.448501]  kunit_try_run_case+0x170/0x3f0
[   30.449745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.449905]  kthread+0x328/0x630
[   30.450040]  ret_from_fork+0x10/0x20
[   30.450174] 
[   30.450298] Allocated by task 281:
[   30.450516]  kasan_save_stack+0x3c/0x68
[   30.450844]  kasan_save_track+0x20/0x40
[   30.451196]  kasan_save_alloc_info+0x40/0x58
[   30.451322]  __kasan_kmalloc+0xd4/0xd8
[   30.451441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.451541]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.451643]  kunit_try_run_case+0x170/0x3f0
[   30.451741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.451848]  kthread+0x328/0x630
[   30.451952]  ret_from_fork+0x10/0x20
[   30.452050] 
[   30.452104] The buggy address belongs to the object at fff00000c7719b00
[   30.452104]  which belongs to the cache kmalloc-128 of size 128
[   30.452249] The buggy address is located 0 bytes to the right of
[   30.452249]  allocated 120-byte region [fff00000c7719b00, fff00000c7719b78)
[   30.453458] 
[   30.453821] The buggy address belongs to the physical page:
[   30.454589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   30.455568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.456139] page_type: f5(slab)
[   30.456592] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.456732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.457092] page dumped because: kasan: bad access detected
[   30.457454] 
[   30.457509] Memory state around the buggy address:
[   30.458002]  fff00000c7719a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.458320]  fff00000c7719a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.458458] >fff00000c7719b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.458563]                                                                 ^
[   30.458669]  fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.458883]  fff00000c7719c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.459524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure Automatically assigned
[   30.345099] ==================================================================
[   30.345384] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   30.345597] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   30.345723] 
[   30.345793] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.345995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.346068] Hardware name: linux,dummy-virt (DT)
[   30.346625] Call trace:
[   30.346709]  show_stack+0x20/0x38 (C)
[   30.346855]  dump_stack_lvl+0x8c/0xd0
[   30.346991]  print_report+0x310/0x608
[   30.347114]  kasan_report+0xdc/0x128
[   30.347229]  __asan_report_load1_noabort+0x20/0x30
[   30.347385]  vmalloc_oob+0x51c/0x5d0
[   30.347777]  kunit_try_run_case+0x170/0x3f0
[   30.348183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.348350]  kthread+0x328/0x630
[   30.348506]  ret_from_fork+0x10/0x20
[   30.348701] 
[   30.348814] The buggy address belongs to the virtual mapping at
[   30.348814]  [ffff8000800fe000, ffff800080100000) created by:
[   30.348814]  vmalloc_oob+0x98/0x5d0
[   30.349113] 
[   30.349270] The buggy address belongs to the physical page:
[   30.349480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107723
[   30.349617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.350015] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.350172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.350381] page dumped because: kasan: bad access detected
[   30.350552] 
[   30.350675] Memory state around the buggy address:
[   30.350778]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.350902]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.351031] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.351316]                                                                 ^
[   30.351459]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.351666]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.351778] ==================================================================
[   30.331253] ==================================================================
[   30.331459] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   30.331600] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   30.331742] 
[   30.331850] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.332166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.332286] Hardware name: linux,dummy-virt (DT)
[   30.332449] Call trace:
[   30.332547]  show_stack+0x20/0x38 (C)
[   30.332698]  dump_stack_lvl+0x8c/0xd0
[   30.332836]  print_report+0x310/0x608
[   30.333077]  kasan_report+0xdc/0x128
[   30.333211]  __asan_report_load1_noabort+0x20/0x30
[   30.333410]  vmalloc_oob+0x578/0x5d0
[   30.333602]  kunit_try_run_case+0x170/0x3f0
[   30.333783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.334017]  kthread+0x328/0x630
[   30.334386]  ret_from_fork+0x10/0x20
[   30.335045] 
[   30.335339] The buggy address belongs to the virtual mapping at
[   30.335339]  [ffff8000800fe000, ffff800080100000) created by:
[   30.335339]  vmalloc_oob+0x98/0x5d0
[   30.335530] 
[   30.335588] The buggy address belongs to the physical page:
[   30.336519] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107723
[   30.337142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.337720] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.337906] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.338177] page dumped because: kasan: bad access detected
[   30.338454] 
[   30.339025] Memory state around the buggy address:
[   30.339115]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.339234]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.340292] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.340430]                                                              ^
[   30.341224]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.341718]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.341826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure Automatically assigned
[   29.967624] ==================================================================
[   29.967741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.968068] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.968392] 
[   29.968630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.968868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.968940] Hardware name: linux,dummy-virt (DT)
[   29.969025] Call trace:
[   29.969270]  show_stack+0x20/0x38 (C)
[   29.969736]  dump_stack_lvl+0x8c/0xd0
[   29.970371]  print_report+0x118/0x608
[   29.970895]  kasan_report+0xdc/0x128
[   29.971023]  kasan_check_range+0x100/0x1a8
[   29.971409]  __kasan_check_write+0x20/0x30
[   29.971692]  kasan_atomics_helper+0x10c0/0x4858
[   29.972317]  kasan_atomics+0x198/0x2e0
[   29.972935]  kunit_try_run_case+0x170/0x3f0
[   29.973115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973252]  kthread+0x328/0x630
[   29.973391]  ret_from_fork+0x10/0x20
[   29.973516] 
[   29.973759] Allocated by task 265:
[   29.974508]  kasan_save_stack+0x3c/0x68
[   29.974703]  kasan_save_track+0x20/0x40
[   29.974913]  kasan_save_alloc_info+0x40/0x58
[   29.975081]  __kasan_kmalloc+0xd4/0xd8
[   29.975203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.975497]  kasan_atomics+0xb8/0x2e0
[   29.975612]  kunit_try_run_case+0x170/0x3f0
[   29.975937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.976122]  kthread+0x328/0x630
[   29.976258]  ret_from_fork+0x10/0x20
[   29.976394] 
[   29.976453] The buggy address belongs to the object at fff00000c770a480
[   29.976453]  which belongs to the cache kmalloc-64 of size 64
[   29.976624] The buggy address is located 0 bytes to the right of
[   29.976624]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.976880] 
[   29.976977] The buggy address belongs to the physical page:
[   29.977063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.977195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.977356] page_type: f5(slab)
[   29.977472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.977666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.977982] page dumped because: kasan: bad access detected
[   29.978120] 
[   29.978174] Memory state around the buggy address:
[   29.978256]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.978390]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.978508] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.978605]                                      ^
[   29.978883]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979042]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979160] ==================================================================
[   30.035564] ==================================================================
[   30.035678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   30.035804] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.036707] 
[   30.036823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.037654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.037764] Hardware name: linux,dummy-virt (DT)
[   30.038017] Call trace:
[   30.038189]  show_stack+0x20/0x38 (C)
[   30.038989]  dump_stack_lvl+0x8c/0xd0
[   30.039381]  print_report+0x118/0x608
[   30.039756]  kasan_report+0xdc/0x128
[   30.040381]  kasan_check_range+0x100/0x1a8
[   30.040756]  __kasan_check_write+0x20/0x30
[   30.041296]  kasan_atomics_helper+0x126c/0x4858
[   30.041503]  kasan_atomics+0x198/0x2e0
[   30.041630]  kunit_try_run_case+0x170/0x3f0
[   30.042254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.043034]  kthread+0x328/0x630
[   30.043457]  ret_from_fork+0x10/0x20
[   30.043747] 
[   30.044167] Allocated by task 265:
[   30.044256]  kasan_save_stack+0x3c/0x68
[   30.044457]  kasan_save_track+0x20/0x40
[   30.045227]  kasan_save_alloc_info+0x40/0x58
[   30.045387]  __kasan_kmalloc+0xd4/0xd8
[   30.045773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.045881]  kasan_atomics+0xb8/0x2e0
[   30.046761]  kunit_try_run_case+0x170/0x3f0
[   30.046906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047022]  kthread+0x328/0x630
[   30.047074]  ret_from_fork+0x10/0x20
[   30.047126] 
[   30.047153] The buggy address belongs to the object at fff00000c770a480
[   30.047153]  which belongs to the cache kmalloc-64 of size 64
[   30.047230] The buggy address is located 0 bytes to the right of
[   30.047230]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.047314] 
[   30.047402] The buggy address belongs to the physical page:
[   30.047609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.047743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.047921] page_type: f5(slab)
[   30.048106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.048244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.048384] page dumped because: kasan: bad access detected
[   30.048471] 
[   30.048519] Memory state around the buggy address:
[   30.048640]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.048993]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.049574] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.049846]                                      ^
[   30.049943]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050566]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050940] ==================================================================
[   29.518953] ==================================================================
[   29.519063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   29.519172] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.519758] 
[   29.520734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.521094] Hardware name: linux,dummy-virt (DT)
[   29.521247] Call trace:
[   29.521862]  show_stack+0x20/0x38 (C)
[   29.522034]  dump_stack_lvl+0x8c/0xd0
[   29.522504]  print_report+0x118/0x608
[   29.522667]  kasan_report+0xdc/0x128
[   29.523456]  __kasan_check_write+0x20/0x30
[   29.526492]  kthread+0x328/0x630
[   29.527268] 
[   29.527802]  __kasan_kmalloc+0xd4/0xd8
[   29.527976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.529084]  ret_from_fork+0x10/0x20
[   29.529204] 
[   29.529686] The buggy address is located 0 bytes to the right of
[   29.529686]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.529991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.530883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.531037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.531144] page dumped because: kasan: bad access detected
[   29.531257] 
[   29.531319] Memory state around the buggy address:
[   29.531602]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.531857] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.532672]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.538462]  kasan_report+0xdc/0x128
[   29.540869]  kthread+0x328/0x630
[   29.542528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.544317] 
[   29.546679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.546820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.546926] page dumped because: kasan: bad access detected
[   29.547008] 
[   29.547080] Memory state around the buggy address:
[   29.547161]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.547274]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.547419] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.547525]                                      ^
[   29.547612]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.547719]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.548041] ==================================================================
[   30.005300] ==================================================================
[   30.005426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   30.005546] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.005676] 
[   30.005739] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.006128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.006243] Hardware name: linux,dummy-virt (DT)
[   30.006356] Call trace:
[   30.006467]  show_stack+0x20/0x38 (C)
[   30.006914]  dump_stack_lvl+0x8c/0xd0
[   30.007108]  print_report+0x118/0x608
[   30.007226]  kasan_report+0xdc/0x128
[   30.007360]  kasan_check_range+0x100/0x1a8
[   30.007490]  __kasan_check_write+0x20/0x30
[   30.007610]  kasan_atomics_helper+0x11f8/0x4858
[   30.007728]  kasan_atomics+0x198/0x2e0
[   30.007859]  kunit_try_run_case+0x170/0x3f0
[   30.009660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.011533]  kthread+0x328/0x630
[   30.012360]  ret_from_fork+0x10/0x20
[   30.013111] 
[   30.013166] Allocated by task 265:
[   30.013765]  kasan_save_stack+0x3c/0x68
[   30.014010]  kasan_save_track+0x20/0x40
[   30.014678]  kasan_save_alloc_info+0x40/0x58
[   30.014797]  __kasan_kmalloc+0xd4/0xd8
[   30.015627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.016075]  kasan_atomics+0xb8/0x2e0
[   30.016175]  kunit_try_run_case+0x170/0x3f0
[   30.016275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.018427]  kthread+0x328/0x630
[   30.018968]  ret_from_fork+0x10/0x20
[   30.019558] 
[   30.019616] The buggy address belongs to the object at fff00000c770a480
[   30.019616]  which belongs to the cache kmalloc-64 of size 64
[   30.020267] The buggy address is located 0 bytes to the right of
[   30.020267]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.021636] 
[   30.021783] The buggy address belongs to the physical page:
[   30.021867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.021997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.022116] page_type: f5(slab)
[   30.022209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.024544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.025534] page dumped because: kasan: bad access detected
[   30.025725] 
[   30.025777] Memory state around the buggy address:
[   30.026617]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027438]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.028219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.028435]                                      ^
[   30.028920]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030125]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030400] ==================================================================
[   30.255580] ==================================================================
[   30.257271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.257889] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.258465] 
[   30.258541] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.259166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.259238] Hardware name: linux,dummy-virt (DT)
[   30.259321] Call trace:
[   30.259400]  show_stack+0x20/0x38 (C)
[   30.260864]  dump_stack_lvl+0x8c/0xd0
[   30.261855]  print_report+0x118/0x608
[   30.262002]  kasan_report+0xdc/0x128
[   30.262122]  __asan_report_load8_noabort+0x20/0x30
[   30.262251]  kasan_atomics_helper+0x3e20/0x4858
[   30.264588]  kasan_atomics+0x198/0x2e0
[   30.264928]  kunit_try_run_case+0x170/0x3f0
[   30.265520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.266469]  kthread+0x328/0x630
[   30.266586]  ret_from_fork+0x10/0x20
[   30.267766] 
[   30.267994] Allocated by task 265:
[   30.268080]  kasan_save_stack+0x3c/0x68
[   30.268188]  kasan_save_track+0x20/0x40
[   30.268286]  kasan_save_alloc_info+0x40/0x58
[   30.269541]  __kasan_kmalloc+0xd4/0xd8
[   30.269652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.270851]  kasan_atomics+0xb8/0x2e0
[   30.271403]  kunit_try_run_case+0x170/0x3f0
[   30.272726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.273205]  kthread+0x328/0x630
[   30.273534]  ret_from_fork+0x10/0x20
[   30.274292] 
[   30.274369] The buggy address belongs to the object at fff00000c770a480
[   30.274369]  which belongs to the cache kmalloc-64 of size 64
[   30.274780] The buggy address is located 0 bytes to the right of
[   30.274780]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.276119] 
[   30.276502] The buggy address belongs to the physical page:
[   30.276921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.277724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.277867] page_type: f5(slab)
[   30.278844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.279631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.280212] page dumped because: kasan: bad access detected
[   30.280302] 
[   30.280375] Memory state around the buggy address:
[   30.281582]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.282658]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.283397] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.284089]                                      ^
[   30.284908]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.285072]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.285175] ==================================================================
[   29.928772] ==================================================================
[   29.928883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.929018] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.929146] 
[   29.929220] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.929456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.929525] Hardware name: linux,dummy-virt (DT)
[   29.929604] Call trace:
[   29.929657]  show_stack+0x20/0x38 (C)
[   29.929776]  dump_stack_lvl+0x8c/0xd0
[   29.929889]  print_report+0x118/0x608
[   29.930006]  kasan_report+0xdc/0x128
[   29.930118]  kasan_check_range+0x100/0x1a8
[   29.930238]  __kasan_check_write+0x20/0x30
[   29.932295]  kasan_atomics_helper+0xf88/0x4858
[   29.932555]  kasan_atomics+0x198/0x2e0
[   29.932691]  kunit_try_run_case+0x170/0x3f0
[   29.932835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.933479]  kthread+0x328/0x630
[   29.933633]  ret_from_fork+0x10/0x20
[   29.934278] 
[   29.934640] Allocated by task 265:
[   29.934954]  kasan_save_stack+0x3c/0x68
[   29.935083]  kasan_save_track+0x20/0x40
[   29.935504]  kasan_save_alloc_info+0x40/0x58
[   29.935908]  __kasan_kmalloc+0xd4/0xd8
[   29.936434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.937079]  kasan_atomics+0xb8/0x2e0
[   29.937211]  kunit_try_run_case+0x170/0x3f0
[   29.937363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.937599]  kthread+0x328/0x630
[   29.938076]  ret_from_fork+0x10/0x20
[   29.938436] 
[   29.938828] The buggy address belongs to the object at fff00000c770a480
[   29.938828]  which belongs to the cache kmalloc-64 of size 64
[   29.939025] The buggy address is located 0 bytes to the right of
[   29.939025]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.939979] 
[   29.940048] The buggy address belongs to the physical page:
[   29.940141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.940661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.940938] page_type: f5(slab)
[   29.941039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.941261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.941898] page dumped because: kasan: bad access detected
[   29.942009] 
[   29.942063] Memory state around the buggy address:
[   29.942129]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.942193]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.942250] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.942300]                                      ^
[   29.942751]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.943031]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.943224] ==================================================================
[   29.731680] ==================================================================
[   29.731744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.731808] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.733223]  kthread+0x328/0x630
[   29.740746] 
[   29.740810] The buggy address belongs to the physical page:
[   29.741079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.742353]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.747385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.748203]  dump_stack_lvl+0x8c/0xd0
[   29.755143] The buggy address belongs to the physical page:
[   29.755511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.755787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.755959] page_type: f5(slab)
[   29.756299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.756566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.756676] page dumped because: kasan: bad access detected
[   29.756758] 
[   29.756810] Memory state around the buggy address:
[   29.757137]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757674]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.758206] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.758533]                                      ^
[   29.758677]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.758909]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.759018] ==================================================================
[   29.979803] ==================================================================
[   29.979906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.980147] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.980380] 
[   29.980610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.981083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.981250] Hardware name: linux,dummy-virt (DT)
[   29.981477] Call trace:
[   29.981588]  show_stack+0x20/0x38 (C)
[   29.981758]  dump_stack_lvl+0x8c/0xd0
[   29.981893]  print_report+0x118/0x608
[   29.982023]  kasan_report+0xdc/0x128
[   29.982248]  kasan_check_range+0x100/0x1a8
[   29.982424]  __kasan_check_write+0x20/0x30
[   29.982544]  kasan_atomics_helper+0x1128/0x4858
[   29.983926]  kasan_atomics+0x198/0x2e0
[   29.984440]  kunit_try_run_case+0x170/0x3f0
[   29.984638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.984884]  kthread+0x328/0x630
[   29.985073]  ret_from_fork+0x10/0x20
[   29.985319] 
[   29.985422] Allocated by task 265:
[   29.985757]  kasan_save_stack+0x3c/0x68
[   29.985908]  kasan_save_track+0x20/0x40
[   29.986015]  kasan_save_alloc_info+0x40/0x58
[   29.986165]  __kasan_kmalloc+0xd4/0xd8
[   29.987937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.988425]  kasan_atomics+0xb8/0x2e0
[   29.989363]  kunit_try_run_case+0x170/0x3f0
[   29.989624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.989929]  kthread+0x328/0x630
[   29.990022]  ret_from_fork+0x10/0x20
[   29.990283] 
[   29.990490] The buggy address belongs to the object at fff00000c770a480
[   29.990490]  which belongs to the cache kmalloc-64 of size 64
[   29.991302] The buggy address is located 0 bytes to the right of
[   29.991302]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.991761] 
[   29.992198] The buggy address belongs to the physical page:
[   29.992293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.992506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.992681] page_type: f5(slab)
[   29.992798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.993084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.993193] page dumped because: kasan: bad access detected
[   29.993316] 
[   29.993447] Memory state around the buggy address:
[   29.993526]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.993717]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.993962] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.994140]                                      ^
[   29.994277]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.994843]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995368] ==================================================================
[   29.717808] ==================================================================
[   29.718000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.718119] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.719064] Hardware name: linux,dummy-virt (DT)
[   29.722364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.727282] The buggy address is located 0 bytes to the right of
[   29.727282]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.728211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.730593]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.730697] ==================================================================
[   29.549485] ==================================================================
[   29.549593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.549873] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.550012] 
[   29.550081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.550382] Hardware name: linux,dummy-virt (DT)
[   29.551313]  __asan_report_load4_noabort+0x20/0x30
[   29.554707] 
[   29.557094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.558635] 
[   29.558841] The buggy address is located 0 bytes to the right of
[   29.558841]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.560558] page_type: f5(slab)
[   29.561757]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.565879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   29.572364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.572509]  kthread+0x328/0x630
[   29.572627]  ret_from_fork+0x10/0x20
[   29.573964] 
[   29.574216] Allocated by task 265:
[   29.574298]  kasan_save_stack+0x3c/0x68
[   29.575018]  kasan_save_track+0x20/0x40
[   29.575404]  kasan_save_alloc_info+0x40/0x58
[   29.576001]  __kasan_kmalloc+0xd4/0xd8
[   29.576119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.576667]  kasan_atomics+0xb8/0x2e0
[   29.576812]  kunit_try_run_case+0x170/0x3f0
[   29.577223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.577767]  kthread+0x328/0x630
[   29.577910]  ret_from_fork+0x10/0x20
[   29.578013] 
[   29.578770] The buggy address belongs to the object at fff00000c770a480
[   29.578770]  which belongs to the cache kmalloc-64 of size 64
[   29.579245] The buggy address is located 0 bytes to the right of
[   29.579245]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.579705] 
[   29.579762] The buggy address belongs to the physical page:
[   29.580451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.581058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.581191] page_type: f5(slab)
[   29.581298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.581448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.581557] page dumped because: kasan: bad access detected
[   29.581640] 
[   29.581687] Memory state around the buggy address:
[   29.582380]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.582612]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.582819] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.583902]                                      ^
[   29.584313]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584457]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585261] ==================================================================
[   29.630227] ==================================================================
[   29.630361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.630482] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.630610] 
[   29.630681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.632609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.633964] Hardware name: linux,dummy-virt (DT)
[   29.634054] Call trace:
[   29.635011]  show_stack+0x20/0x38 (C)
[   29.635216]  dump_stack_lvl+0x8c/0xd0
[   29.635457]  print_report+0x118/0x608
[   29.636368]  kasan_report+0xdc/0x128
[   29.636642]  kasan_check_range+0x100/0x1a8
[   29.636782]  __kasan_check_write+0x20/0x30
[   29.637702]  kasan_atomics_helper+0xa6c/0x4858
[   29.638559]  kasan_atomics+0x198/0x2e0
[   29.638972]  kunit_try_run_case+0x170/0x3f0
[   29.639431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.640626]  kthread+0x328/0x630
[   29.641037]  ret_from_fork+0x10/0x20
[   29.642016] 
[   29.642136] Allocated by task 265:
[   29.642221]  kasan_save_stack+0x3c/0x68
[   29.643293]  kasan_save_track+0x20/0x40
[   29.643571]  kasan_save_alloc_info+0x40/0x58
[   29.644515]  __kasan_kmalloc+0xd4/0xd8
[   29.644994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.645111]  kasan_atomics+0xb8/0x2e0
[   29.645603]  kunit_try_run_case+0x170/0x3f0
[   29.645970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.646094]  kthread+0x328/0x630
[   29.647404]  ret_from_fork+0x10/0x20
[   29.647927] 
[   29.648104] The buggy address belongs to the object at fff00000c770a480
[   29.648104]  which belongs to the cache kmalloc-64 of size 64
[   29.648485] The buggy address is located 0 bytes to the right of
[   29.648485]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.648658] 
[   29.649421] The buggy address belongs to the physical page:
[   29.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.650871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.651436] page_type: f5(slab)
[   29.651577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.651707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.651814] page dumped because: kasan: bad access detected
[   29.652877] 
[   29.652989] Memory state around the buggy address:
[   29.653506]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.654272]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.654408] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.654512]                                      ^
[   29.655847]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656016]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656809] ==================================================================
[   29.885390] ==================================================================
[   29.885493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.886886] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.887312] 
[   29.887434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.887668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.887953] Hardware name: linux,dummy-virt (DT)
[   29.888940] Call trace:
[   29.889029]  show_stack+0x20/0x38 (C)
[   29.889157]  dump_stack_lvl+0x8c/0xd0
[   29.889427]  print_report+0x118/0x608
[   29.889567]  kasan_report+0xdc/0x128
[   29.889797]  kasan_check_range+0x100/0x1a8
[   29.889968]  __kasan_check_write+0x20/0x30
[   29.890160]  kasan_atomics_helper+0xeb8/0x4858
[   29.890443]  kasan_atomics+0x198/0x2e0
[   29.890627]  kunit_try_run_case+0x170/0x3f0
[   29.890955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.891102]  kthread+0x328/0x630
[   29.891668]  ret_from_fork+0x10/0x20
[   29.892078] 
[   29.892135] Allocated by task 265:
[   29.892236]  kasan_save_stack+0x3c/0x68
[   29.892369]  kasan_save_track+0x20/0x40
[   29.892473]  kasan_save_alloc_info+0x40/0x58
[   29.893749]  __kasan_kmalloc+0xd4/0xd8
[   29.894823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.894976]  kasan_atomics+0xb8/0x2e0
[   29.895662]  kunit_try_run_case+0x170/0x3f0
[   29.896129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.896257]  kthread+0x328/0x630
[   29.896375]  ret_from_fork+0x10/0x20
[   29.896482] 
[   29.896538] The buggy address belongs to the object at fff00000c770a480
[   29.896538]  which belongs to the cache kmalloc-64 of size 64
[   29.896687] The buggy address is located 0 bytes to the right of
[   29.896687]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.896847] 
[   29.897722] The buggy address belongs to the physical page:
[   29.897982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.898359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.898965] page_type: f5(slab)
[   29.899418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.900026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.900131] page dumped because: kasan: bad access detected
[   29.900922] 
[   29.901356] Memory state around the buggy address:
[   29.901460]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.901590]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.901716] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.902611]                                      ^
[   29.902866]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.903589]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.903856] ==================================================================
[   30.198510] ==================================================================
[   30.198624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.198801] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.199167] 
[   30.199248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.199474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.199544] Hardware name: linux,dummy-virt (DT)
[   30.199650] Call trace:
[   30.199729]  show_stack+0x20/0x38 (C)
[   30.199931]  dump_stack_lvl+0x8c/0xd0
[   30.200362]  print_report+0x118/0x608
[   30.200523]  kasan_report+0xdc/0x128
[   30.200654]  __asan_report_load8_noabort+0x20/0x30
[   30.200791]  kasan_atomics_helper+0x3df4/0x4858
[   30.200942]  kasan_atomics+0x198/0x2e0
[   30.201238]  kunit_try_run_case+0x170/0x3f0
[   30.201532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.201733]  kthread+0x328/0x630
[   30.201882]  ret_from_fork+0x10/0x20
[   30.202165] 
[   30.202316] Allocated by task 265:
[   30.202444]  kasan_save_stack+0x3c/0x68
[   30.202717]  kasan_save_track+0x20/0x40
[   30.202833]  kasan_save_alloc_info+0x40/0x58
[   30.202968]  __kasan_kmalloc+0xd4/0xd8
[   30.203264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.203403]  kasan_atomics+0xb8/0x2e0
[   30.203797]  kunit_try_run_case+0x170/0x3f0
[   30.203933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.204072]  kthread+0x328/0x630
[   30.204174]  ret_from_fork+0x10/0x20
[   30.205034] 
[   30.205405] The buggy address belongs to the object at fff00000c770a480
[   30.205405]  which belongs to the cache kmalloc-64 of size 64
[   30.205833] The buggy address is located 0 bytes to the right of
[   30.205833]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.206486] 
[   30.206601] The buggy address belongs to the physical page:
[   30.206699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.207396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.207565] page_type: f5(slab)
[   30.207668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.207797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.207909] page dumped because: kasan: bad access detected
[   30.208015] 
[   30.208081] Memory state around the buggy address:
[   30.208359]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.208868]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.208991] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.209674]                                      ^
[   30.209994]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210522]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210703] ==================================================================
[   29.588949] ==================================================================
[   29.589052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.589159] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.589300] 
[   29.589429] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.589662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.589742] Hardware name: linux,dummy-virt (DT)
[   29.589821] Call trace:
[   29.589876]  show_stack+0x20/0x38 (C)
[   29.589994]  dump_stack_lvl+0x8c/0xd0
[   29.590116]  print_report+0x118/0x608
[   29.590241]  kasan_report+0xdc/0x128
[   29.590784]  kasan_check_range+0x100/0x1a8
[   29.590916]  __kasan_check_write+0x20/0x30
[   29.591028]  kasan_atomics_helper+0x99c/0x4858
[   29.591147]  kasan_atomics+0x198/0x2e0
[   29.591254]  kunit_try_run_case+0x170/0x3f0
[   29.592032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.592418]  kthread+0x328/0x630
[   29.592540]  ret_from_fork+0x10/0x20
[   29.592660] 
[   29.592712] Allocated by task 265:
[   29.592781]  kasan_save_stack+0x3c/0x68
[   29.592890]  kasan_save_track+0x20/0x40
[   29.592993]  kasan_save_alloc_info+0x40/0x58
[   29.593091]  __kasan_kmalloc+0xd4/0xd8
[   29.593177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.593289]  kasan_atomics+0xb8/0x2e0
[   29.594416]  kunit_try_run_case+0x170/0x3f0
[   29.594537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.594662]  kthread+0x328/0x630
[   29.594745]  ret_from_fork+0x10/0x20
[   29.594836] 
[   29.594897] The buggy address belongs to the object at fff00000c770a480
[   29.594897]  which belongs to the cache kmalloc-64 of size 64
[   29.596591] The buggy address is located 0 bytes to the right of
[   29.596591]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.597070] 
[   29.597128] The buggy address belongs to the physical page:
[   29.597206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.597373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.597655] page_type: f5(slab)
[   29.597772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.597903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.598012] page dumped because: kasan: bad access detected
[   29.598103] 
[   29.598159] Memory state around the buggy address:
[   29.598246]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598383]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598495] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.598595]                                      ^
[   29.598677]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.598788]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.598886] ==================================================================
[   29.873306] ==================================================================
[   29.873478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.873596] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.873722] 
[   29.873806] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.874220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.874393] Hardware name: linux,dummy-virt (DT)
[   29.874490] Call trace:
[   29.874548]  show_stack+0x20/0x38 (C)
[   29.874776]  dump_stack_lvl+0x8c/0xd0
[   29.875137]  print_report+0x118/0x608
[   29.875399]  kasan_report+0xdc/0x128
[   29.875527]  __asan_report_store8_noabort+0x20/0x30
[   29.875670]  kasan_atomics_helper+0x3e5c/0x4858
[   29.875806]  kasan_atomics+0x198/0x2e0
[   29.876060]  kunit_try_run_case+0x170/0x3f0
[   29.876406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.876673]  kthread+0x328/0x630
[   29.876795]  ret_from_fork+0x10/0x20
[   29.876945] 
[   29.877010] Allocated by task 265:
[   29.877350]  kasan_save_stack+0x3c/0x68
[   29.877644]  kasan_save_track+0x20/0x40
[   29.877753]  kasan_save_alloc_info+0x40/0x58
[   29.878145]  __kasan_kmalloc+0xd4/0xd8
[   29.878257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.878385]  kasan_atomics+0xb8/0x2e0
[   29.878589]  kunit_try_run_case+0x170/0x3f0
[   29.878707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.878845]  kthread+0x328/0x630
[   29.879033]  ret_from_fork+0x10/0x20
[   29.879221] 
[   29.879792] The buggy address belongs to the object at fff00000c770a480
[   29.879792]  which belongs to the cache kmalloc-64 of size 64
[   29.880013] The buggy address is located 0 bytes to the right of
[   29.880013]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.880186] 
[   29.880250] The buggy address belongs to the physical page:
[   29.880349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.880482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.880643] page_type: f5(slab)
[   29.880738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.881009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.881148] page dumped because: kasan: bad access detected
[   29.881367] 
[   29.882201] Memory state around the buggy address:
[   29.882929]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.883101]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.883230] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.883364]                                      ^
[   29.883624]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884225]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884507] ==================================================================
[   29.906919] ==================================================================
[   29.907024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.907135] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.907258] 
[   29.907324] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.907968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.908525] Hardware name: linux,dummy-virt (DT)
[   29.908726] Call trace:
[   29.909749]  show_stack+0x20/0x38 (C)
[   29.910888]  dump_stack_lvl+0x8c/0xd0
[   29.911387]  print_report+0x118/0x608
[   29.911516]  kasan_report+0xdc/0x128
[   29.912437]  kasan_check_range+0x100/0x1a8
[   29.913205]  __kasan_check_write+0x20/0x30
[   29.913986]  kasan_atomics_helper+0xf20/0x4858
[   29.914136]  kasan_atomics+0x198/0x2e0
[   29.914257]  kunit_try_run_case+0x170/0x3f0
[   29.914407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.914553]  kthread+0x328/0x630
[   29.914672]  ret_from_fork+0x10/0x20
[   29.915897] 
[   29.916046] Allocated by task 265:
[   29.916142]  kasan_save_stack+0x3c/0x68
[   29.916263]  kasan_save_track+0x20/0x40
[   29.917068]  kasan_save_alloc_info+0x40/0x58
[   29.917266]  __kasan_kmalloc+0xd4/0xd8
[   29.917645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.918121]  kasan_atomics+0xb8/0x2e0
[   29.918768]  kunit_try_run_case+0x170/0x3f0
[   29.918883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.919790]  kthread+0x328/0x630
[   29.919882]  ret_from_fork+0x10/0x20
[   29.919935] 
[   29.919962] The buggy address belongs to the object at fff00000c770a480
[   29.919962]  which belongs to the cache kmalloc-64 of size 64
[   29.920141] The buggy address is located 0 bytes to the right of
[   29.920141]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.920515] 
[   29.920600] The buggy address belongs to the physical page:
[   29.920954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.921431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.921893] page_type: f5(slab)
[   29.922538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.922676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.923354] page dumped because: kasan: bad access detected
[   29.923460] 
[   29.923509] Memory state around the buggy address:
[   29.924612]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.924825]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.924937] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.925035]                                      ^
[   29.925126]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.926756]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.927432] ==================================================================
[   30.052058] ==================================================================
[   30.052171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   30.052420] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.053102] 
[   30.053307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.053545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.053616] Hardware name: linux,dummy-virt (DT)
[   30.054136] Call trace:
[   30.054265]  show_stack+0x20/0x38 (C)
[   30.054416]  dump_stack_lvl+0x8c/0xd0
[   30.054670]  print_report+0x118/0x608
[   30.054820]  kasan_report+0xdc/0x128
[   30.054953]  kasan_check_range+0x100/0x1a8
[   30.055377]  __kasan_check_write+0x20/0x30
[   30.055541]  kasan_atomics_helper+0x12d8/0x4858
[   30.055790]  kasan_atomics+0x198/0x2e0
[   30.055953]  kunit_try_run_case+0x170/0x3f0
[   30.056095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.056299]  kthread+0x328/0x630
[   30.056431]  ret_from_fork+0x10/0x20
[   30.056626] 
[   30.056841] Allocated by task 265:
[   30.056917]  kasan_save_stack+0x3c/0x68
[   30.057024]  kasan_save_track+0x20/0x40
[   30.057120]  kasan_save_alloc_info+0x40/0x58
[   30.057246]  __kasan_kmalloc+0xd4/0xd8
[   30.057404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.057606]  kasan_atomics+0xb8/0x2e0
[   30.057898]  kunit_try_run_case+0x170/0x3f0
[   30.058008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.058123]  kthread+0x328/0x630
[   30.058219]  ret_from_fork+0x10/0x20
[   30.058478] 
[   30.058536] The buggy address belongs to the object at fff00000c770a480
[   30.058536]  which belongs to the cache kmalloc-64 of size 64
[   30.058715] The buggy address is located 0 bytes to the right of
[   30.058715]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.058970] 
[   30.059133] The buggy address belongs to the physical page:
[   30.059362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.059505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.059626] page_type: f5(slab)
[   30.059740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.059957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.060081] page dumped because: kasan: bad access detected
[   30.060175] 
[   30.060221] Memory state around the buggy address:
[   30.060300]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.060445]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.060570] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.060736]                                      ^
[   30.060834]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.060980]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061124] ==================================================================
[   30.125234] ==================================================================
[   30.125434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.125550] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.125668] 
[   30.125744] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.125952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.126028] Hardware name: linux,dummy-virt (DT)
[   30.126107] Call trace:
[   30.126165]  show_stack+0x20/0x38 (C)
[   30.126300]  dump_stack_lvl+0x8c/0xd0
[   30.126447]  print_report+0x118/0x608
[   30.126702]  kasan_report+0xdc/0x128
[   30.127535]  kasan_check_range+0x100/0x1a8
[   30.127660]  __kasan_check_write+0x20/0x30
[   30.127768]  kasan_atomics_helper+0x14e4/0x4858
[   30.127979]  kasan_atomics+0x198/0x2e0
[   30.128158]  kunit_try_run_case+0x170/0x3f0
[   30.128277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.128442]  kthread+0x328/0x630
[   30.128549]  ret_from_fork+0x10/0x20
[   30.128661] 
[   30.128722] Allocated by task 265:
[   30.128813]  kasan_save_stack+0x3c/0x68
[   30.129011]  kasan_save_track+0x20/0x40
[   30.130307]  kasan_save_alloc_info+0x40/0x58
[   30.130502]  __kasan_kmalloc+0xd4/0xd8
[   30.130689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.130825]  kasan_atomics+0xb8/0x2e0
[   30.130936]  kunit_try_run_case+0x170/0x3f0
[   30.131053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.131180]  kthread+0x328/0x630
[   30.131281]  ret_from_fork+0x10/0x20
[   30.131413] 
[   30.131468] The buggy address belongs to the object at fff00000c770a480
[   30.131468]  which belongs to the cache kmalloc-64 of size 64
[   30.131614] The buggy address is located 0 bytes to the right of
[   30.131614]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.131774] 
[   30.131825] The buggy address belongs to the physical page:
[   30.131907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.132039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.132166] page_type: f5(slab)
[   30.132269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.133035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.133183] page dumped because: kasan: bad access detected
[   30.133261] 
[   30.133316] Memory state around the buggy address:
[   30.133512]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134464]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134666] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.134784]                                      ^
[   30.134877]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.134986]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135083] ==================================================================
[   29.830139] ==================================================================
[   29.830243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.830374] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.830505] 
[   29.830572] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.830771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.831384] Hardware name: linux,dummy-virt (DT)
[   29.831801] Call trace:
[   29.832456]  show_stack+0x20/0x38 (C)
[   29.833366]  dump_stack_lvl+0x8c/0xd0
[   29.833834]  print_report+0x118/0x608
[   29.834085]  kasan_report+0xdc/0x128
[   29.834817]  __asan_report_load8_noabort+0x20/0x30
[   29.834976]  kasan_atomics_helper+0x3f58/0x4858
[   29.835432]  kasan_atomics+0x198/0x2e0
[   29.835656]  kunit_try_run_case+0x170/0x3f0
[   29.835810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.835978]  kthread+0x328/0x630
[   29.836467]  ret_from_fork+0x10/0x20
[   29.837171] 
[   29.837446] Allocated by task 265:
[   29.837538]  kasan_save_stack+0x3c/0x68
[   29.837674]  kasan_save_track+0x20/0x40
[   29.837776]  kasan_save_alloc_info+0x40/0x58
[   29.838297]  __kasan_kmalloc+0xd4/0xd8
[   29.838420]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.839213]  kasan_atomics+0xb8/0x2e0
[   29.839322]  kunit_try_run_case+0x170/0x3f0
[   29.839459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.839581]  kthread+0x328/0x630
[   29.839675]  ret_from_fork+0x10/0x20
[   29.840841] 
[   29.840933] The buggy address belongs to the object at fff00000c770a480
[   29.840933]  which belongs to the cache kmalloc-64 of size 64
[   29.841196] The buggy address is located 0 bytes to the right of
[   29.841196]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.841504] 
[   29.841788] The buggy address belongs to the physical page:
[   29.842566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.842959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.843638] page_type: f5(slab)
[   29.843933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.844080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.844193] page dumped because: kasan: bad access detected
[   29.845042] 
[   29.845097] Memory state around the buggy address:
[   29.845179]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.846305]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.846450] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.846904]                                      ^
[   29.847351]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.847701]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.847808] ==================================================================
[   30.076939] ==================================================================
[   30.077130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.077252] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.077409] 
[   30.077484] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.078122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.078263] Hardware name: linux,dummy-virt (DT)
[   30.078513] Call trace:
[   30.078731]  show_stack+0x20/0x38 (C)
[   30.078864]  dump_stack_lvl+0x8c/0xd0
[   30.078989]  print_report+0x118/0x608
[   30.079105]  kasan_report+0xdc/0x128
[   30.079223]  __asan_report_load8_noabort+0x20/0x30
[   30.079364]  kasan_atomics_helper+0x3f04/0x4858
[   30.079489]  kasan_atomics+0x198/0x2e0
[   30.079620]  kunit_try_run_case+0x170/0x3f0
[   30.079922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.080225]  kthread+0x328/0x630
[   30.080437]  ret_from_fork+0x10/0x20
[   30.080588] 
[   30.080647] Allocated by task 265:
[   30.080830]  kasan_save_stack+0x3c/0x68
[   30.081152]  kasan_save_track+0x20/0x40
[   30.081273]  kasan_save_alloc_info+0x40/0x58
[   30.081445]  __kasan_kmalloc+0xd4/0xd8
[   30.081761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.081872]  kasan_atomics+0xb8/0x2e0
[   30.082028]  kunit_try_run_case+0x170/0x3f0
[   30.082155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.082376]  kthread+0x328/0x630
[   30.082485]  ret_from_fork+0x10/0x20
[   30.082594] 
[   30.082644] The buggy address belongs to the object at fff00000c770a480
[   30.082644]  which belongs to the cache kmalloc-64 of size 64
[   30.082831] The buggy address is located 0 bytes to the right of
[   30.082831]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.083048] 
[   30.083221] The buggy address belongs to the physical page:
[   30.083784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.084189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.084320] page_type: f5(slab)
[   30.084443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.084570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.084679] page dumped because: kasan: bad access detected
[   30.086253] 
[   30.086696] Memory state around the buggy address:
[   30.087449]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.088298]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.088448] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.088987]                                      ^
[   30.089425]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.089639]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.089742] ==================================================================
[   30.211853] ==================================================================
[   30.211961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.212075] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.212146] 
[   30.212187] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.212442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.212609] Hardware name: linux,dummy-virt (DT)
[   30.212951] Call trace:
[   30.213011]  show_stack+0x20/0x38 (C)
[   30.213880]  dump_stack_lvl+0x8c/0xd0
[   30.214846]  print_report+0x118/0x608
[   30.215789]  kasan_report+0xdc/0x128
[   30.216320]  kasan_check_range+0x100/0x1a8
[   30.217039]  __kasan_check_write+0x20/0x30
[   30.217513]  kasan_atomics_helper+0x16d0/0x4858
[   30.218234]  kasan_atomics+0x198/0x2e0
[   30.218374]  kunit_try_run_case+0x170/0x3f0
[   30.218505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.219898]  kthread+0x328/0x630
[   30.220037]  ret_from_fork+0x10/0x20
[   30.220183] 
[   30.220247] Allocated by task 265:
[   30.220350]  kasan_save_stack+0x3c/0x68
[   30.220469]  kasan_save_track+0x20/0x40
[   30.220591]  kasan_save_alloc_info+0x40/0x58
[   30.220717]  __kasan_kmalloc+0xd4/0xd8
[   30.220833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.220958]  kasan_atomics+0xb8/0x2e0
[   30.221072]  kunit_try_run_case+0x170/0x3f0
[   30.221191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221349]  kthread+0x328/0x630
[   30.221457]  ret_from_fork+0x10/0x20
[   30.221573] 
[   30.221630] The buggy address belongs to the object at fff00000c770a480
[   30.221630]  which belongs to the cache kmalloc-64 of size 64
[   30.221776] The buggy address is located 0 bytes to the right of
[   30.221776]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.221938] 
[   30.221996] The buggy address belongs to the physical page:
[   30.222072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.222203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.222318] page_type: f5(slab)
[   30.222506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.222655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.222778] page dumped because: kasan: bad access detected
[   30.222897] 
[   30.222957] Memory state around the buggy address:
[   30.223068]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.223904]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.224033] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.224193]                                      ^
[   30.224290]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224428]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224538] ==================================================================
[   30.290850] ==================================================================
[   30.290959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.292260] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.292695] 
[   30.292775] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.292993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.295585] Hardware name: linux,dummy-virt (DT)
[   30.295845] Call trace:
[   30.295912]  show_stack+0x20/0x38 (C)
[   30.296039]  dump_stack_lvl+0x8c/0xd0
[   30.296175]  print_report+0x118/0x608
[   30.297362]  kasan_report+0xdc/0x128
[   30.297504]  kasan_check_range+0x100/0x1a8
[   30.297575]  __kasan_check_write+0x20/0x30
[   30.297651]  kasan_atomics_helper+0x17ec/0x4858
[   30.297758]  kasan_atomics+0x198/0x2e0
[   30.297819]  kunit_try_run_case+0x170/0x3f0
[   30.297888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.297959]  kthread+0x328/0x630
[   30.298012]  ret_from_fork+0x10/0x20
[   30.298074] 
[   30.298099] Allocated by task 265:
[   30.298136]  kasan_save_stack+0x3c/0x68
[   30.298191]  kasan_save_track+0x20/0x40
[   30.298241]  kasan_save_alloc_info+0x40/0x58
[   30.298292]  __kasan_kmalloc+0xd4/0xd8
[   30.298413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.298758]  kasan_atomics+0xb8/0x2e0
[   30.298954]  kunit_try_run_case+0x170/0x3f0
[   30.299188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.299555]  kthread+0x328/0x630
[   30.299663]  ret_from_fork+0x10/0x20
[   30.299782] 
[   30.299983] The buggy address belongs to the object at fff00000c770a480
[   30.299983]  which belongs to the cache kmalloc-64 of size 64
[   30.300618] The buggy address is located 0 bytes to the right of
[   30.300618]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.301135] 
[   30.301486] The buggy address belongs to the physical page:
[   30.301613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.301770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.301911] page_type: f5(slab)
[   30.302117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.303064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.303180] page dumped because: kasan: bad access detected
[   30.303598] 
[   30.303806] Memory state around the buggy address:
[   30.303959]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.304596]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.304977] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.305082]                                      ^
[   30.305545]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305660]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305757] ==================================================================
[   30.182658] ==================================================================
[   30.182764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.182883] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.183007] 
[   30.183073] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.183276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.183360] Hardware name: linux,dummy-virt (DT)
[   30.184053] Call trace:
[   30.184185]  show_stack+0x20/0x38 (C)
[   30.184419]  dump_stack_lvl+0x8c/0xd0
[   30.184763]  print_report+0x118/0x608
[   30.184888]  kasan_report+0xdc/0x128
[   30.185004]  kasan_check_range+0x100/0x1a8
[   30.185531]  __kasan_check_write+0x20/0x30
[   30.185874]  kasan_atomics_helper+0x1644/0x4858
[   30.186292]  kasan_atomics+0x198/0x2e0
[   30.186524]  kunit_try_run_case+0x170/0x3f0
[   30.187054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.187202]  kthread+0x328/0x630
[   30.187313]  ret_from_fork+0x10/0x20
[   30.187572] 
[   30.187663] Allocated by task 265:
[   30.187736]  kasan_save_stack+0x3c/0x68
[   30.188836]  kasan_save_track+0x20/0x40
[   30.189060]  kasan_save_alloc_info+0x40/0x58
[   30.189349]  __kasan_kmalloc+0xd4/0xd8
[   30.190105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.190226]  kasan_atomics+0xb8/0x2e0
[   30.190854]  kunit_try_run_case+0x170/0x3f0
[   30.190971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191382]  kthread+0x328/0x630
[   30.191937]  ret_from_fork+0x10/0x20
[   30.192230] 
[   30.192295] The buggy address belongs to the object at fff00000c770a480
[   30.192295]  which belongs to the cache kmalloc-64 of size 64
[   30.192757] The buggy address is located 0 bytes to the right of
[   30.192757]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.193077] 
[   30.193174] The buggy address belongs to the physical page:
[   30.193348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.193500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.193889] page_type: f5(slab)
[   30.194171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.194314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.194659] page dumped because: kasan: bad access detected
[   30.195087] 
[   30.195151] Memory state around the buggy address:
[   30.195232]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.195735]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.195975] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.196360]                                      ^
[   30.196467]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.196581]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.196691] ==================================================================
[   30.165435] ==================================================================
[   30.165831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.165970] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.166576] 
[   30.166662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.166976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.167057] Hardware name: linux,dummy-virt (DT)
[   30.167141] Call trace:
[   30.167195]  show_stack+0x20/0x38 (C)
[   30.167318]  dump_stack_lvl+0x8c/0xd0
[   30.167467]  print_report+0x118/0x608
[   30.168478]  kasan_report+0xdc/0x128
[   30.168777]  __asan_report_load8_noabort+0x20/0x30
[   30.169043]  kasan_atomics_helper+0x3db0/0x4858
[   30.169400]  kasan_atomics+0x198/0x2e0
[   30.169551]  kunit_try_run_case+0x170/0x3f0
[   30.169691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170216]  kthread+0x328/0x630
[   30.170366]  ret_from_fork+0x10/0x20
[   30.171133] 
[   30.171263] Allocated by task 265:
[   30.171359]  kasan_save_stack+0x3c/0x68
[   30.171488]  kasan_save_track+0x20/0x40
[   30.171606]  kasan_save_alloc_info+0x40/0x58
[   30.171739]  __kasan_kmalloc+0xd4/0xd8
[   30.172013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.172415]  kasan_atomics+0xb8/0x2e0
[   30.172533]  kunit_try_run_case+0x170/0x3f0
[   30.172875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.173436]  kthread+0x328/0x630
[   30.173564]  ret_from_fork+0x10/0x20
[   30.173953] 
[   30.174310] The buggy address belongs to the object at fff00000c770a480
[   30.174310]  which belongs to the cache kmalloc-64 of size 64
[   30.174680] The buggy address is located 0 bytes to the right of
[   30.174680]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.174852] 
[   30.175705] The buggy address belongs to the physical page:
[   30.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.176957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.177677] page_type: f5(slab)
[   30.178463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.179127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.179375] page dumped because: kasan: bad access detected
[   30.180096] 
[   30.180155] Memory state around the buggy address:
[   30.180553]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.181083]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.181260] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.181395]                                      ^
[   30.181480]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181666]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181971] ==================================================================
[   30.137118] ==================================================================
[   30.137227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.137367] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.137492] 
[   30.137562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.137769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.137840] Hardware name: linux,dummy-virt (DT)
[   30.137917] Call trace:
[   30.137969]  show_stack+0x20/0x38 (C)
[   30.138082]  dump_stack_lvl+0x8c/0xd0
[   30.138199]  print_report+0x118/0x608
[   30.138321]  kasan_report+0xdc/0x128
[   30.138474]  kasan_check_range+0x100/0x1a8
[   30.138593]  __kasan_check_write+0x20/0x30
[   30.138708]  kasan_atomics_helper+0x154c/0x4858
[   30.138857]  kasan_atomics+0x198/0x2e0
[   30.138992]  kunit_try_run_case+0x170/0x3f0
[   30.139125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.139257]  kthread+0x328/0x630
[   30.139766]  ret_from_fork+0x10/0x20
[   30.140464] 
[   30.140609] Allocated by task 265:
[   30.140703]  kasan_save_stack+0x3c/0x68
[   30.140812]  kasan_save_track+0x20/0x40
[   30.140909]  kasan_save_alloc_info+0x40/0x58
[   30.141680]  __kasan_kmalloc+0xd4/0xd8
[   30.141791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.141897]  kasan_atomics+0xb8/0x2e0
[   30.141997]  kunit_try_run_case+0x170/0x3f0
[   30.142780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.143011]  kthread+0x328/0x630
[   30.143291]  ret_from_fork+0x10/0x20
[   30.143418] 
[   30.143748] The buggy address belongs to the object at fff00000c770a480
[   30.143748]  which belongs to the cache kmalloc-64 of size 64
[   30.144040] The buggy address is located 0 bytes to the right of
[   30.144040]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.144853] 
[   30.145158] The buggy address belongs to the physical page:
[   30.145349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.145740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.145954] page_type: f5(slab)
[   30.146053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.146287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.146861] page dumped because: kasan: bad access detected
[   30.147215] 
[   30.147307] Memory state around the buggy address:
[   30.147452]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.148125]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.148312] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.148489]                                      ^
[   30.148587]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.148720]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.148822] ==================================================================
[   29.788929] ==================================================================
[   29.789043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.789802] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.790848] 
[   29.791040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.791546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791634] Hardware name: linux,dummy-virt (DT)
[   29.791884] Call trace:
[   29.791944]  show_stack+0x20/0x38 (C)
[   29.792298]  dump_stack_lvl+0x8c/0xd0
[   29.792520]  print_report+0x118/0x608
[   29.792647]  kasan_report+0xdc/0x128
[   29.792811]  kasan_check_range+0x100/0x1a8
[   29.793105]  __kasan_check_write+0x20/0x30
[   29.793484]  kasan_atomics_helper+0xd3c/0x4858
[   29.793627]  kasan_atomics+0x198/0x2e0
[   29.793958]  kunit_try_run_case+0x170/0x3f0
[   29.794086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794842]  kthread+0x328/0x630
[   29.794976]  ret_from_fork+0x10/0x20
[   29.795099] 
[   29.795163] Allocated by task 265:
[   29.795253]  kasan_save_stack+0x3c/0x68
[   29.795415]  kasan_save_track+0x20/0x40
[   29.795665]  kasan_save_alloc_info+0x40/0x58
[   29.795761]  __kasan_kmalloc+0xd4/0xd8
[   29.796355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.796484]  kasan_atomics+0xb8/0x2e0
[   29.796750]  kunit_try_run_case+0x170/0x3f0
[   29.796871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.796994]  kthread+0x328/0x630
[   29.797097]  ret_from_fork+0x10/0x20
[   29.797194] 
[   29.797245] The buggy address belongs to the object at fff00000c770a480
[   29.797245]  which belongs to the cache kmalloc-64 of size 64
[   29.799913] The buggy address is located 0 bytes to the right of
[   29.799913]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.800135] 
[   29.800257] The buggy address belongs to the physical page:
[   29.800364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.800494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.800617] page_type: f5(slab)
[   29.800711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.800840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.800942] page dumped because: kasan: bad access detected
[   29.801081] 
[   29.801175] Memory state around the buggy address:
[   29.801263]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801457]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801575] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.801673]                                      ^
[   29.801759]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801866]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801963] ==================================================================
[   30.150550] ==================================================================
[   30.151283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.151668] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.152203] 
[   30.152547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.153394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.153706] Hardware name: linux,dummy-virt (DT)
[   30.154072] Call trace:
[   30.154193]  show_stack+0x20/0x38 (C)
[   30.154582]  dump_stack_lvl+0x8c/0xd0
[   30.154714]  print_report+0x118/0x608
[   30.155510]  kasan_report+0xdc/0x128
[   30.155744]  kasan_check_range+0x100/0x1a8
[   30.155887]  __kasan_check_write+0x20/0x30
[   30.156007]  kasan_atomics_helper+0x15b4/0x4858
[   30.156134]  kasan_atomics+0x198/0x2e0
[   30.156246]  kunit_try_run_case+0x170/0x3f0
[   30.156389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.156548]  kthread+0x328/0x630
[   30.157324]  ret_from_fork+0x10/0x20
[   30.158771] 
[   30.158836] Allocated by task 265:
[   30.158943]  kasan_save_stack+0x3c/0x68
[   30.159058]  kasan_save_track+0x20/0x40
[   30.159223]  kasan_save_alloc_info+0x40/0x58
[   30.159514]  __kasan_kmalloc+0xd4/0xd8
[   30.159657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.159794]  kasan_atomics+0xb8/0x2e0
[   30.159970]  kunit_try_run_case+0x170/0x3f0
[   30.160111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.160235]  kthread+0x328/0x630
[   30.160364]  ret_from_fork+0x10/0x20
[   30.160482] 
[   30.160544] The buggy address belongs to the object at fff00000c770a480
[   30.160544]  which belongs to the cache kmalloc-64 of size 64
[   30.160811] The buggy address is located 0 bytes to the right of
[   30.160811]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.160999] 
[   30.161063] The buggy address belongs to the physical page:
[   30.161154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.161307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.161488] page_type: f5(slab)
[   30.161592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.161714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.161819] page dumped because: kasan: bad access detected
[   30.161895] 
[   30.161994] Memory state around the buggy address:
[   30.162083]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.162196]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.162374] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.162932]                                      ^
[   30.163058]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.163174]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.163272] ==================================================================
[   29.603599] ==================================================================
[   29.603720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.603832] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.603951] 
[   29.604022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.604288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.609294]  ret_from_fork+0x10/0x20
[   29.614357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614959]  kthread+0x328/0x630
[   29.615058]  ret_from_fork+0x10/0x20
[   29.615155] 
[   29.615838] The buggy address belongs to the object at fff00000c770a480
[   29.615838]  which belongs to the cache kmalloc-64 of size 64
[   29.616206] The buggy address is located 0 bytes to the right of
[   29.616206]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.616473] 
[   29.616535] The buggy address belongs to the physical page:
[   29.616618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.618603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.618787] page_type: f5(slab)
[   29.618881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.620115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.620965] page dumped because: kasan: bad access detected
[   29.621103] 
[   29.621153] Memory state around the buggy address:
[   29.621234]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.622306]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.622520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.623244]                                      ^
[   29.623411]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.623911]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624156] ==================================================================
[   29.849046] ==================================================================
[   29.849150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.850287] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.850449] 
[   29.851242] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.852063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.852776] Hardware name: linux,dummy-virt (DT)
[   29.852921] Call trace:
[   29.852984]  show_stack+0x20/0x38 (C)
[   29.853117]  dump_stack_lvl+0x8c/0xd0
[   29.853238]  print_report+0x118/0x608
[   29.853388]  kasan_report+0xdc/0x128
[   29.853512]  kasan_check_range+0x100/0x1a8
[   29.853630]  __kasan_check_write+0x20/0x30
[   29.856402]  kasan_atomics_helper+0xe44/0x4858
[   29.856545]  kasan_atomics+0x198/0x2e0
[   29.858130]  kunit_try_run_case+0x170/0x3f0
[   29.858401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.858553]  kthread+0x328/0x630
[   29.858676]  ret_from_fork+0x10/0x20
[   29.858802] 
[   29.858851] Allocated by task 265:
[   29.858928]  kasan_save_stack+0x3c/0x68
[   29.859062]  kasan_save_track+0x20/0x40
[   29.859168]  kasan_save_alloc_info+0x40/0x58
[   29.859302]  __kasan_kmalloc+0xd4/0xd8
[   29.859426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.859537]  kasan_atomics+0xb8/0x2e0
[   29.860066]  kunit_try_run_case+0x170/0x3f0
[   29.860742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.862856]  kthread+0x328/0x630
[   29.862970]  ret_from_fork+0x10/0x20
[   29.863081] 
[   29.863140] The buggy address belongs to the object at fff00000c770a480
[   29.863140]  which belongs to the cache kmalloc-64 of size 64
[   29.863299] The buggy address is located 0 bytes to the right of
[   29.863299]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.863558] 
[   29.865397] The buggy address belongs to the physical page:
[   29.865485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.865629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.865811] page_type: f5(slab)
[   29.865907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.866045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.866145] page dumped because: kasan: bad access detected
[   29.866229] 
[   29.866276] Memory state around the buggy address:
[   29.867410]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.867540]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.869305] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.870028]                                      ^
[   29.870168]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.872738]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.872861] ==================================================================
[   30.091306] ==================================================================
[   30.091895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.092650] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.093032] 
[   30.093152] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.094175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.094303] Hardware name: linux,dummy-virt (DT)
[   30.094484] Call trace:
[   30.094541]  show_stack+0x20/0x38 (C)
[   30.094663]  dump_stack_lvl+0x8c/0xd0
[   30.094783]  print_report+0x118/0x608
[   30.094908]  kasan_report+0xdc/0x128
[   30.095023]  kasan_check_range+0x100/0x1a8
[   30.095146]  __kasan_check_write+0x20/0x30
[   30.095263]  kasan_atomics_helper+0x1414/0x4858
[   30.096531]  kasan_atomics+0x198/0x2e0
[   30.096879]  kunit_try_run_case+0x170/0x3f0
[   30.097229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.097404]  kthread+0x328/0x630
[   30.098219]  ret_from_fork+0x10/0x20
[   30.098982] 
[   30.099268] Allocated by task 265:
[   30.099887]  kasan_save_stack+0x3c/0x68
[   30.100015]  kasan_save_track+0x20/0x40
[   30.100231]  kasan_save_alloc_info+0x40/0x58
[   30.100815]  __kasan_kmalloc+0xd4/0xd8
[   30.101185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.101433]  kasan_atomics+0xb8/0x2e0
[   30.101535]  kunit_try_run_case+0x170/0x3f0
[   30.101948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.102096]  kthread+0x328/0x630
[   30.102190]  ret_from_fork+0x10/0x20
[   30.102792] 
[   30.102863] The buggy address belongs to the object at fff00000c770a480
[   30.102863]  which belongs to the cache kmalloc-64 of size 64
[   30.103570] The buggy address is located 0 bytes to the right of
[   30.103570]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.104501] 
[   30.104653] The buggy address belongs to the physical page:
[   30.104829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.105221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.106024] page_type: f5(slab)
[   30.106134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.106805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.106934] page dumped because: kasan: bad access detected
[   30.107782] 
[   30.108019] Memory state around the buggy address:
[   30.108247]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.108449]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.108561] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.108657]                                      ^
[   30.110823]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110893]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110945] ==================================================================
[   29.944511] ==================================================================
[   29.944616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.944725] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.944849] 
[   29.944927] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.946064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.946601] Hardware name: linux,dummy-virt (DT)
[   29.946872] Call trace:
[   29.946967]  show_stack+0x20/0x38 (C)
[   29.947305]  dump_stack_lvl+0x8c/0xd0
[   29.948013]  print_report+0x118/0x608
[   29.948180]  kasan_report+0xdc/0x128
[   29.948345]  kasan_check_range+0x100/0x1a8
[   29.949041]  __kasan_check_write+0x20/0x30
[   29.949173]  kasan_atomics_helper+0xff0/0x4858
[   29.949632]  kasan_atomics+0x198/0x2e0
[   29.950316]  kunit_try_run_case+0x170/0x3f0
[   29.950758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.950905]  kthread+0x328/0x630
[   29.951577]  ret_from_fork+0x10/0x20
[   29.951743] 
[   29.951801] Allocated by task 265:
[   29.952322]  kasan_save_stack+0x3c/0x68
[   29.952827]  kasan_save_track+0x20/0x40
[   29.952977]  kasan_save_alloc_info+0x40/0x58
[   29.953259]  __kasan_kmalloc+0xd4/0xd8
[   29.953589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.953913]  kasan_atomics+0xb8/0x2e0
[   29.954398]  kunit_try_run_case+0x170/0x3f0
[   29.954531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.954996]  kthread+0x328/0x630
[   29.955091]  ret_from_fork+0x10/0x20
[   29.955186] 
[   29.955733] The buggy address belongs to the object at fff00000c770a480
[   29.955733]  which belongs to the cache kmalloc-64 of size 64
[   29.956280] The buggy address is located 0 bytes to the right of
[   29.956280]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.956790] 
[   29.956892] The buggy address belongs to the physical page:
[   29.956985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.957119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.957238] page_type: f5(slab)
[   29.957356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.957619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.957880] page dumped because: kasan: bad access detected
[   29.958047] 
[   29.958098] Memory state around the buggy address:
[   29.958244]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.958406]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.958520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.958618]                                      ^
[   29.958704]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.958816]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.958978] ==================================================================
[   29.761942] ==================================================================
[   29.762047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.762164] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.762287] 
[   29.762603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.763137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.763418] Hardware name: linux,dummy-virt (DT)
[   29.764314] Call trace:
[   29.764962]  show_stack+0x20/0x38 (C)
[   29.765919]  dump_stack_lvl+0x8c/0xd0
[   29.766419]  print_report+0x118/0x608
[   29.767422]  kasan_report+0xdc/0x128
[   29.767947]  __asan_report_load4_noabort+0x20/0x30
[   29.768223]  kasan_atomics_helper+0x3dd8/0x4858
[   29.768845]  kasan_atomics+0x198/0x2e0
[   29.769411]  kunit_try_run_case+0x170/0x3f0
[   29.770395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.770675]  kthread+0x328/0x630
[   29.770798]  ret_from_fork+0x10/0x20
[   29.771769] 
[   29.772049] Allocated by task 265:
[   29.772221]  kasan_save_stack+0x3c/0x68
[   29.772931]  kasan_save_track+0x20/0x40
[   29.773063]  kasan_save_alloc_info+0x40/0x58
[   29.773742]  __kasan_kmalloc+0xd4/0xd8
[   29.773850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.774772]  kasan_atomics+0xb8/0x2e0
[   29.775196]  kunit_try_run_case+0x170/0x3f0
[   29.775763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776181]  kthread+0x328/0x630
[   29.776737]  ret_from_fork+0x10/0x20
[   29.776846] 
[   29.777105] The buggy address belongs to the object at fff00000c770a480
[   29.777105]  which belongs to the cache kmalloc-64 of size 64
[   29.777738] The buggy address is located 0 bytes to the right of
[   29.777738]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.777946] 
[   29.778807] The buggy address belongs to the physical page:
[   29.779036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.779425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.780247] page_type: f5(slab)
[   29.780477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.780608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.781622] page dumped because: kasan: bad access detected
[   29.782030] 
[   29.782364] Memory state around the buggy address:
[   29.782623]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782745]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782861] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.783942]                                      ^
[   29.784423]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784613]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784737] ==================================================================
[   30.112460] ==================================================================
[   30.112575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.112703] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.113053] 
[   30.113217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.113457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.113554] Hardware name: linux,dummy-virt (DT)
[   30.113793] Call trace:
[   30.113888]  show_stack+0x20/0x38 (C)
[   30.114006]  dump_stack_lvl+0x8c/0xd0
[   30.114126]  print_report+0x118/0x608
[   30.114238]  kasan_report+0xdc/0x128
[   30.114694]  kasan_check_range+0x100/0x1a8
[   30.115495]  __kasan_check_write+0x20/0x30
[   30.115875]  kasan_atomics_helper+0x147c/0x4858
[   30.116033]  kasan_atomics+0x198/0x2e0
[   30.116223]  kunit_try_run_case+0x170/0x3f0
[   30.116721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.117172]  kthread+0x328/0x630
[   30.117323]  ret_from_fork+0x10/0x20
[   30.117475] 
[   30.117845] Allocated by task 265:
[   30.117934]  kasan_save_stack+0x3c/0x68
[   30.118042]  kasan_save_track+0x20/0x40
[   30.118160]  kasan_save_alloc_info+0x40/0x58
[   30.118288]  __kasan_kmalloc+0xd4/0xd8
[   30.118428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.118543]  kasan_atomics+0xb8/0x2e0
[   30.119367]  kunit_try_run_case+0x170/0x3f0
[   30.119514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.119863]  kthread+0x328/0x630
[   30.119987]  ret_from_fork+0x10/0x20
[   30.120199] 
[   30.120292] The buggy address belongs to the object at fff00000c770a480
[   30.120292]  which belongs to the cache kmalloc-64 of size 64
[   30.120616] The buggy address is located 0 bytes to the right of
[   30.120616]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.121222] 
[   30.121290] The buggy address belongs to the physical page:
[   30.121389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.121520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.122143] page_type: f5(slab)
[   30.123122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.123274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.123413] page dumped because: kasan: bad access detected
[   30.123499] 
[   30.123553] Memory state around the buggy address:
[   30.123642]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.123756]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.123970] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.124071]                                      ^
[   30.124155]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.124264]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.124383] ==================================================================
[   30.225505] ==================================================================
[   30.225631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.225815] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.225945] 
[   30.226015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.226211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.226282] Hardware name: linux,dummy-virt (DT)
[   30.226385] Call trace:
[   30.226555]  show_stack+0x20/0x38 (C)
[   30.226677]  dump_stack_lvl+0x8c/0xd0
[   30.226956]  print_report+0x118/0x608
[   30.227317]  kasan_report+0xdc/0x128
[   30.227602]  __asan_report_load8_noabort+0x20/0x30
[   30.227760]  kasan_atomics_helper+0x3e10/0x4858
[   30.227904]  kasan_atomics+0x198/0x2e0
[   30.228048]  kunit_try_run_case+0x170/0x3f0
[   30.228300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.228484]  kthread+0x328/0x630
[   30.228798]  ret_from_fork+0x10/0x20
[   30.229164] 
[   30.229248] Allocated by task 265:
[   30.229419]  kasan_save_stack+0x3c/0x68
[   30.229523]  kasan_save_track+0x20/0x40
[   30.229630]  kasan_save_alloc_info+0x40/0x58
[   30.229738]  __kasan_kmalloc+0xd4/0xd8
[   30.229839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.229941]  kasan_atomics+0xb8/0x2e0
[   30.230036]  kunit_try_run_case+0x170/0x3f0
[   30.230145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.230401]  kthread+0x328/0x630
[   30.230542]  ret_from_fork+0x10/0x20
[   30.230691] 
[   30.230756] The buggy address belongs to the object at fff00000c770a480
[   30.230756]  which belongs to the cache kmalloc-64 of size 64
[   30.230915] The buggy address is located 0 bytes to the right of
[   30.230915]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.231179] 
[   30.231246] The buggy address belongs to the physical page:
[   30.231425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.231663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.231812] page_type: f5(slab)
[   30.231923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.232107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.232232] page dumped because: kasan: bad access detected
[   30.232321] 
[   30.232385] Memory state around the buggy address:
[   30.232465]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.232645]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.232780] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.233113]                                      ^
[   30.233234]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.233436]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.233553] ==================================================================
[   30.234145] ==================================================================
[   30.234248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.234376] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.234502] 
[   30.234568] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.234771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.234853] Hardware name: linux,dummy-virt (DT)
[   30.234952] Call trace:
[   30.235054]  show_stack+0x20/0x38 (C)
[   30.235194]  dump_stack_lvl+0x8c/0xd0
[   30.235344]  print_report+0x118/0x608
[   30.235642]  kasan_report+0xdc/0x128
[   30.235865]  kasan_check_range+0x100/0x1a8
[   30.236130]  __kasan_check_write+0x20/0x30
[   30.236353]  kasan_atomics_helper+0x175c/0x4858
[   30.236545]  kasan_atomics+0x198/0x2e0
[   30.236685]  kunit_try_run_case+0x170/0x3f0
[   30.236866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.237024]  kthread+0x328/0x630
[   30.237203]  ret_from_fork+0x10/0x20
[   30.237356] 
[   30.237407] Allocated by task 265:
[   30.237611]  kasan_save_stack+0x3c/0x68
[   30.237990]  kasan_save_track+0x20/0x40
[   30.238348]  kasan_save_alloc_info+0x40/0x58
[   30.238694]  __kasan_kmalloc+0xd4/0xd8
[   30.239594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.239833]  kasan_atomics+0xb8/0x2e0
[   30.239935]  kunit_try_run_case+0x170/0x3f0
[   30.241578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.241713]  kthread+0x328/0x630
[   30.241811]  ret_from_fork+0x10/0x20
[   30.241920] 
[   30.241976] The buggy address belongs to the object at fff00000c770a480
[   30.241976]  which belongs to the cache kmalloc-64 of size 64
[   30.244171] The buggy address is located 0 bytes to the right of
[   30.244171]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.244811] 
[   30.244868] The buggy address belongs to the physical page:
[   30.244959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.245790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.246414] page_type: f5(slab)
[   30.246635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.246790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.247176] page dumped because: kasan: bad access detected
[   30.247421] 
[   30.247483] Memory state around the buggy address:
[   30.247586]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.248605]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.248736] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.248912]                                      ^
[   30.249212]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.249555]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.249679] ==================================================================
[   29.802345] ==================================================================
[   29.802456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.802585] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.802725] 
[   29.802914] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.803237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.803363] Hardware name: linux,dummy-virt (DT)
[   29.803438] Call trace:
[   29.803573]  show_stack+0x20/0x38 (C)
[   29.804213]  dump_stack_lvl+0x8c/0xd0
[   29.804378]  print_report+0x118/0x608
[   29.804511]  kasan_report+0xdc/0x128
[   29.804705]  __asan_report_load4_noabort+0x20/0x30
[   29.804838]  kasan_atomics_helper+0x3e04/0x4858
[   29.804974]  kasan_atomics+0x198/0x2e0
[   29.805324]  kunit_try_run_case+0x170/0x3f0
[   29.805661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.805898]  kthread+0x328/0x630
[   29.806029]  ret_from_fork+0x10/0x20
[   29.806362] 
[   29.806411] Allocated by task 265:
[   29.806483]  kasan_save_stack+0x3c/0x68
[   29.806675]  kasan_save_track+0x20/0x40
[   29.807007]  kasan_save_alloc_info+0x40/0x58
[   29.807154]  __kasan_kmalloc+0xd4/0xd8
[   29.807256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.807397]  kasan_atomics+0xb8/0x2e0
[   29.807508]  kunit_try_run_case+0x170/0x3f0
[   29.807650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.807894]  kthread+0x328/0x630
[   29.808054]  ret_from_fork+0x10/0x20
[   29.808273] 
[   29.808360] The buggy address belongs to the object at fff00000c770a480
[   29.808360]  which belongs to the cache kmalloc-64 of size 64
[   29.808547] The buggy address is located 0 bytes to the right of
[   29.808547]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.808718] 
[   29.808773] The buggy address belongs to the physical page:
[   29.808862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.809105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.809248] page_type: f5(slab)
[   29.809387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.809515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.809644] page dumped because: kasan: bad access detected
[   29.809819] 
[   29.809864] Memory state around the buggy address:
[   29.809986]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810110]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.810322]                                      ^
[   29.810453]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810909]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.811017] ==================================================================
[   30.061751] ==================================================================
[   30.061830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.061897] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.062007] 
[   30.062130] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.062379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.062447] Hardware name: linux,dummy-virt (DT)
[   30.062525] Call trace:
[   30.062579]  show_stack+0x20/0x38 (C)
[   30.062693]  dump_stack_lvl+0x8c/0xd0
[   30.062812]  print_report+0x118/0x608
[   30.062930]  kasan_report+0xdc/0x128
[   30.063043]  kasan_check_range+0x100/0x1a8
[   30.063165]  __kasan_check_write+0x20/0x30
[   30.063279]  kasan_atomics_helper+0x1384/0x4858
[   30.064120]  kasan_atomics+0x198/0x2e0
[   30.064487]  kunit_try_run_case+0x170/0x3f0
[   30.064649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.064827]  kthread+0x328/0x630
[   30.065138]  ret_from_fork+0x10/0x20
[   30.065496] 
[   30.065576] Allocated by task 265:
[   30.065652]  kasan_save_stack+0x3c/0x68
[   30.065831]  kasan_save_track+0x20/0x40
[   30.065985]  kasan_save_alloc_info+0x40/0x58
[   30.066319]  __kasan_kmalloc+0xd4/0xd8
[   30.067270]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.067420]  kasan_atomics+0xb8/0x2e0
[   30.067767]  kunit_try_run_case+0x170/0x3f0
[   30.068343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.069051]  kthread+0x328/0x630
[   30.069470]  ret_from_fork+0x10/0x20
[   30.069717] 
[   30.069887] The buggy address belongs to the object at fff00000c770a480
[   30.069887]  which belongs to the cache kmalloc-64 of size 64
[   30.070036] The buggy address is located 0 bytes to the right of
[   30.070036]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.070200] 
[   30.070960] The buggy address belongs to the physical page:
[   30.071377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.071851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.072079] page_type: f5(slab)
[   30.072287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.072748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.073353] page dumped because: kasan: bad access detected
[   30.073442] 
[   30.073959] Memory state around the buggy address:
[   30.074057]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.074625]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.074978] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.075085]                                      ^
[   30.075175]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.075287]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.075405] ==================================================================
[   29.662141] ==================================================================
[   29.662252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.663236] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.664683] 
[   29.664774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.664997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.665743] Hardware name: linux,dummy-virt (DT)
[   29.665834] Call trace:
[   29.666436]  show_stack+0x20/0x38 (C)
[   29.666577]  dump_stack_lvl+0x8c/0xd0
[   29.667445]  kasan_atomics_helper+0xad4/0x4858
[   29.669120]  ret_from_fork+0x10/0x20
[   29.670043]  kasan_save_alloc_info+0x40/0x58
[   29.670814]  kasan_atomics+0xb8/0x2e0
[   29.672071] The buggy address belongs to the object at fff00000c770a480
[   29.672071]  which belongs to the cache kmalloc-64 of size 64
[   29.672255] The buggy address is located 0 bytes to the right of
[   29.672255]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.672451] 
[   29.672612] The buggy address belongs to the physical page:
[   29.672938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.673152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.673583] page_type: f5(slab)
[   29.673697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.673771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.673825] page dumped because: kasan: bad access detected
[   29.673915] 
[   29.673946] Memory state around the buggy address:
[   29.674104] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.674303] ==================================================================
[   29.959463] ==================================================================
[   29.959577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.959709] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.959852] 
[   29.959934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.960167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.960247] Hardware name: linux,dummy-virt (DT)
[   29.960342] Call trace:
[   29.960468]  show_stack+0x20/0x38 (C)
[   29.960596]  dump_stack_lvl+0x8c/0xd0
[   29.960716]  print_report+0x118/0x608
[   29.960840]  kasan_report+0xdc/0x128
[   29.960974]  kasan_check_range+0x100/0x1a8
[   29.961197]  __kasan_check_write+0x20/0x30
[   29.961364]  kasan_atomics_helper+0x1058/0x4858
[   29.961510]  kasan_atomics+0x198/0x2e0
[   29.961667]  kunit_try_run_case+0x170/0x3f0
[   29.961834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.961980]  kthread+0x328/0x630
[   29.962271]  ret_from_fork+0x10/0x20
[   29.962416] 
[   29.962467] Allocated by task 265:
[   29.962552]  kasan_save_stack+0x3c/0x68
[   29.962860]  kasan_save_track+0x20/0x40
[   29.962974]  kasan_save_alloc_info+0x40/0x58
[   29.963098]  __kasan_kmalloc+0xd4/0xd8
[   29.963312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.963466]  kasan_atomics+0xb8/0x2e0
[   29.963584]  kunit_try_run_case+0x170/0x3f0
[   29.963706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.963869]  kthread+0x328/0x630
[   29.963976]  ret_from_fork+0x10/0x20
[   29.964107] 
[   29.964233] The buggy address belongs to the object at fff00000c770a480
[   29.964233]  which belongs to the cache kmalloc-64 of size 64
[   29.964504] The buggy address is located 0 bytes to the right of
[   29.964504]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.964740] 
[   29.964804] The buggy address belongs to the physical page:
[   29.964895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.965047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.965174] page_type: f5(slab)
[   29.965324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.965525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.965825] page dumped because: kasan: bad access detected
[   29.965912] 
[   29.965966] Memory state around the buggy address:
[   29.966052]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.966177]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.966313] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.966475]                                      ^
[   29.966569]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.966677]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.966875] ==================================================================
[   29.813045] ==================================================================
[   29.813148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.813268] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.813423] 
[   29.813492] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.813693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.813763] Hardware name: linux,dummy-virt (DT)
[   29.813836] Call trace:
[   29.813894]  show_stack+0x20/0x38 (C)
[   29.814008]  dump_stack_lvl+0x8c/0xd0
[   29.814260]  print_report+0x118/0x608
[   29.814402]  kasan_report+0xdc/0x128
[   29.814523]  kasan_check_range+0x100/0x1a8
[   29.814652]  __kasan_check_read+0x20/0x30
[   29.814783]  kasan_atomics_helper+0xdd4/0x4858
[   29.814913]  kasan_atomics+0x198/0x2e0
[   29.815029]  kunit_try_run_case+0x170/0x3f0
[   29.815148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.816454]  kthread+0x328/0x630
[   29.816777]  ret_from_fork+0x10/0x20
[   29.817068] 
[   29.817128] Allocated by task 265:
[   29.817236]  kasan_save_stack+0x3c/0x68
[   29.817368]  kasan_save_track+0x20/0x40
[   29.817591]  kasan_save_alloc_info+0x40/0x58
[   29.817756]  __kasan_kmalloc+0xd4/0xd8
[   29.818079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.818193]  kasan_atomics+0xb8/0x2e0
[   29.818947]  kunit_try_run_case+0x170/0x3f0
[   29.819809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.820041]  kthread+0x328/0x630
[   29.820582]  ret_from_fork+0x10/0x20
[   29.820719] 
[   29.820777] The buggy address belongs to the object at fff00000c770a480
[   29.820777]  which belongs to the cache kmalloc-64 of size 64
[   29.820930] The buggy address is located 0 bytes to the right of
[   29.820930]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.821996] 
[   29.822159] The buggy address belongs to the physical page:
[   29.822759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.823240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823403] page_type: f5(slab)
[   29.824206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.824589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.825220] page dumped because: kasan: bad access detected
[   29.825944] 
[   29.826006] Memory state around the buggy address:
[   29.826385]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.827186]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.827433] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.827548]                                      ^
[   29.827648]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.827777]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.829119] ==================================================================
[   29.996546] ==================================================================
[   29.996653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.996776] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.996904] 
[   29.996976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.997181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.997259] Hardware name: linux,dummy-virt (DT)
[   29.997368] Call trace:
[   29.997428]  show_stack+0x20/0x38 (C)
[   29.997547]  dump_stack_lvl+0x8c/0xd0
[   29.997666]  print_report+0x118/0x608
[   29.997777]  kasan_report+0xdc/0x128
[   29.997893]  kasan_check_range+0x100/0x1a8
[   29.998367]  __kasan_check_write+0x20/0x30
[   29.998852]  kasan_atomics_helper+0x1190/0x4858
[   29.999125]  kasan_atomics+0x198/0x2e0
[   29.999283]  kunit_try_run_case+0x170/0x3f0
[   29.999701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.000017]  kthread+0x328/0x630
[   30.000142]  ret_from_fork+0x10/0x20
[   30.000290] 
[   30.000376] Allocated by task 265:
[   30.000859]  kasan_save_stack+0x3c/0x68
[   30.001211]  kasan_save_track+0x20/0x40
[   30.001374]  kasan_save_alloc_info+0x40/0x58
[   30.001514]  __kasan_kmalloc+0xd4/0xd8
[   30.001741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.001858]  kasan_atomics+0xb8/0x2e0
[   30.001963]  kunit_try_run_case+0x170/0x3f0
[   30.002145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.002728]  kthread+0x328/0x630
[   30.002902]  ret_from_fork+0x10/0x20
[   30.003483] 
[   30.003620] The buggy address belongs to the object at fff00000c770a480
[   30.003620]  which belongs to the cache kmalloc-64 of size 64
[   30.003974] The buggy address is located 0 bytes to the right of
[   30.003974]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.004124] 
[   30.004155] The buggy address belongs to the physical page:
[   30.004197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.004277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.004395] page_type: f5(slab)
[   30.004447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.004513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.004567] page dumped because: kasan: bad access detected
[   30.004609] 
[   30.004633] Memory state around the buggy address:
[   30.004672]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.004728]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.004784] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.004834]                                      ^
[   30.004874]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.004930]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.004981] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure Automatically assigned
[   28.888685] ==================================================================
[   28.888825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.888956] Write of size 8 at addr fff00000c3fa5928 by task kunit_try_catch/261
[   28.889089] 
[   28.889168] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.890479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.890585] Hardware name: linux,dummy-virt (DT)
[   28.890681] Call trace:
[   28.891070]  show_stack+0x20/0x38 (C)
[   28.891910]  dump_stack_lvl+0x8c/0xd0
[   28.892319]  print_report+0x118/0x608
[   28.892684]  kasan_report+0xdc/0x128
[   28.893040]  kasan_check_range+0x100/0x1a8
[   28.893658]  __kasan_check_write+0x20/0x30
[   28.893829]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.894023]  kasan_bitops_generic+0x110/0x1c8
[   28.894156]  kunit_try_run_case+0x170/0x3f0
[   28.894636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.895373]  kthread+0x328/0x630
[   28.895570]  ret_from_fork+0x10/0x20
[   28.895851] 
[   28.896196] Allocated by task 261:
[   28.896290]  kasan_save_stack+0x3c/0x68
[   28.896439]  kasan_save_track+0x20/0x40
[   28.896790]  kasan_save_alloc_info+0x40/0x58
[   28.897315]  __kasan_kmalloc+0xd4/0xd8
[   28.897435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.897779]  kasan_bitops_generic+0xa0/0x1c8
[   28.898159]  kunit_try_run_case+0x170/0x3f0
[   28.898927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.899129]  kthread+0x328/0x630
[   28.899222]  ret_from_fork+0x10/0x20
[   28.899749] 
[   28.899946] The buggy address belongs to the object at fff00000c3fa5920
[   28.899946]  which belongs to the cache kmalloc-16 of size 16
[   28.900385] The buggy address is located 8 bytes inside of
[   28.900385]  allocated 9-byte region [fff00000c3fa5920, fff00000c3fa5929)
[   28.900553] 
[   28.900607] The buggy address belongs to the physical page:
[   28.900690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   28.901454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.902055] page_type: f5(slab)
[   28.902160] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.903424]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.904655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure Automatically assigned
[   28.846851] ==================================================================
[   28.847680] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   28.848204] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259
[   28.848365] 
[   28.848439] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.849179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.849318] Hardware name: linux,dummy-virt (DT)
[   28.849430] Call trace:
[   28.849587]  show_stack+0x20/0x38 (C)
[   28.849939]  dump_stack_lvl+0x8c/0xd0
[   28.850076]  print_report+0x118/0x608
[   28.850364]  kasan_report+0xdc/0x128
[   28.850501]  __asan_report_load1_noabort+0x20/0x30
[   28.850647]  strnlen+0x80/0x88
[   28.850775]  kasan_strings+0x478/0xb00
[   28.850916]  kunit_try_run_case+0x170/0x3f0
[   28.851764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.852088]  kthread+0x328/0x630
[   28.852175]  ret_from_fork+0x10/0x20
[   28.852270] 
[   28.852297] Allocated by task 259:
[   28.852363]  kasan_save_stack+0x3c/0x68
[   28.852473]  kasan_save_track+0x20/0x40
[   28.852822]  kasan_save_alloc_info+0x40/0x58
[   28.853139]  __kasan_kmalloc+0xd4/0xd8
[   28.853247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.853407]  kasan_strings+0xc8/0xb00
[   28.853685]  kunit_try_run_case+0x170/0x3f0
[   28.853812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.853973]  kthread+0x328/0x630
[   28.854208]  ret_from_fork+0x10/0x20
[   28.854706] 
[   28.854772] Freed by task 259:
[   28.854855]  kasan_save_stack+0x3c/0x68
[   28.855520]  kasan_save_track+0x20/0x40
[   28.855825]  kasan_save_free_info+0x4c/0x78
[   28.855958]  __kasan_slab_free+0x6c/0x98
[   28.856284]  kfree+0x214/0x3c8
[   28.856414]  kasan_strings+0x24c/0xb00
[   28.856526]  kunit_try_run_case+0x170/0x3f0
[   28.856643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.856775]  kthread+0x328/0x630
[   28.857562]  ret_from_fork+0x10/0x20
[   28.857766] 
[   28.857842] The buggy address belongs to the object at fff00000c770c040
[   28.857842]  which belongs to the cache kmalloc-32 of size 32
[   28.858133] The buggy address is located 16 bytes inside of
[   28.858133]  freed 32-byte region [fff00000c770c040, fff00000c770c060)
[   28.858302] 
[   28.858662] The buggy address belongs to the physical page:
[   28.858755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   28.858892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.859053] page_type: f5(slab)
[   28.859256] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.859492] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.859609] page dumped because: kasan: bad access detected
[   28.859818] 
[   28.859882] Memory state around the buggy address:
[   28.860010]  fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.860341]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.860475] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.860837]                                                  ^
[   28.860945]  fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.861297]  fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.861488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure Automatically assigned
[   28.819443] ==================================================================
[   28.819553] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   28.819662] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259
[   28.819791] 
[   28.819862] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.820066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.820138] Hardware name: linux,dummy-virt (DT)
[   28.825352] Call trace:
[   28.825706]  show_stack+0x20/0x38 (C)
[   28.825836]  dump_stack_lvl+0x8c/0xd0
[   28.826857]  print_report+0x118/0x608
[   28.827536]  kasan_report+0xdc/0x128
[   28.827671]  __asan_report_load1_noabort+0x20/0x30
[   28.827800]  strlen+0xa8/0xb0
[   28.827920]  kasan_strings+0x418/0xb00
[   28.828039]  kunit_try_run_case+0x170/0x3f0
[   28.829770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.829936]  kthread+0x328/0x630
[   28.830891]  ret_from_fork+0x10/0x20
[   28.831473] 
[   28.831779] Allocated by task 259:
[   28.831978]  kasan_save_stack+0x3c/0x68
[   28.832214]  kasan_save_track+0x20/0x40
[   28.832623]  kasan_save_alloc_info+0x40/0x58
[   28.833157]  __kasan_kmalloc+0xd4/0xd8
[   28.833263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.833758]  kasan_strings+0xc8/0xb00
[   28.834492]  kunit_try_run_case+0x170/0x3f0
[   28.834604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.834719]  kthread+0x328/0x630
[   28.835258]  ret_from_fork+0x10/0x20
[   28.835885] 
[   28.836147] Freed by task 259:
[   28.836434]  kasan_save_stack+0x3c/0x68
[   28.836546]  kasan_save_track+0x20/0x40
[   28.836652]  kasan_save_free_info+0x4c/0x78
[   28.836768]  __kasan_slab_free+0x6c/0x98
[   28.837513]  kfree+0x214/0x3c8
[   28.838818]  kasan_strings+0x24c/0xb00
[   28.839015]  kunit_try_run_case+0x170/0x3f0
[   28.839478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.839598]  kthread+0x328/0x630
[   28.839686]  ret_from_fork+0x10/0x20
[   28.840059] 
[   28.840391] The buggy address belongs to the object at fff00000c770c040
[   28.840391]  which belongs to the cache kmalloc-32 of size 32
[   28.841202] The buggy address is located 16 bytes inside of
[   28.841202]  freed 32-byte region [fff00000c770c040, fff00000c770c060)
[   28.841493] 
[   28.841550] The buggy address belongs to the physical page:
[   28.841632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   28.842300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.842583] page_type: f5(slab)
[   28.842680] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.842811] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.842918] page dumped because: kasan: bad access detected
[   28.842999] 
[   28.843888] Memory state around the buggy address:
[   28.844535]  fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.844745]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.844872] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.844984]                                                  ^
[   28.845173]  fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.845413]  fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.845579] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure Automatically assigned
[   28.792131] ==================================================================
[   28.792250] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   28.795872] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259
[   28.796032] 
[   28.796107] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.796354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.796436] Hardware name: linux,dummy-virt (DT)
[   28.796515] Call trace:
[   28.796569]  show_stack+0x20/0x38 (C)
[   28.796699]  dump_stack_lvl+0x8c/0xd0
[   28.796813]  print_report+0x118/0x608
[   28.796924]  kasan_report+0xdc/0x128
[   28.797038]  __asan_report_load1_noabort+0x20/0x30
[   28.797156]  kasan_strings+0x95c/0xb00
[   28.797271]  kunit_try_run_case+0x170/0x3f0
[   28.799885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.800047]  kthread+0x328/0x630
[   28.800164]  ret_from_fork+0x10/0x20
[   28.801189] 
[   28.801288] Allocated by task 259:
[   28.801388]  kasan_save_stack+0x3c/0x68
[   28.801501]  kasan_save_track+0x20/0x40
[   28.802772]  kasan_save_alloc_info+0x40/0x58
[   28.803193]  __kasan_kmalloc+0xd4/0xd8
[   28.803446]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.803999]  kasan_strings+0xc8/0xb00
[   28.804545]  kunit_try_run_case+0x170/0x3f0
[   28.804955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.805423]  kthread+0x328/0x630
[   28.805529]  ret_from_fork+0x10/0x20
[   28.805633] 
[   28.806304] Freed by task 259:
[   28.806435]  kasan_save_stack+0x3c/0x68
[   28.806781]  kasan_save_track+0x20/0x40
[   28.807314]  kasan_save_free_info+0x4c/0x78
[   28.807575]  __kasan_slab_free+0x6c/0x98
[   28.807681]  kfree+0x214/0x3c8
[   28.807769]  kasan_strings+0x24c/0xb00
[   28.807874]  kunit_try_run_case+0x170/0x3f0
[   28.808490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.809593]  kthread+0x328/0x630
[   28.809703]  ret_from_fork+0x10/0x20
[   28.810569] 
[   28.811635] The buggy address belongs to the object at fff00000c770c040
[   28.811635]  which belongs to the cache kmalloc-32 of size 32
[   28.811816] The buggy address is located 16 bytes inside of
[   28.811816]  freed 32-byte region [fff00000c770c040, fff00000c770c060)
[   28.812576] 
[   28.812725] The buggy address belongs to the physical page:
[   28.812807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   28.812936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.813981] page_type: f5(slab)
[   28.814340] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.814666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.814779] page dumped because: kasan: bad access detected
[   28.816053] 
[   28.816128] Memory state around the buggy address:
[   28.816238]  fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.816437]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.816602] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.816815]                                                  ^
[   28.816915]  fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.817087]  fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.817219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure Automatically assigned
[   28.774571] ==================================================================
[   28.774700] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   28.774819] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259
[   28.774949] 
[   28.775028] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.775866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.776034] Hardware name: linux,dummy-virt (DT)
[   28.776107] Call trace:
[   28.776141]  show_stack+0x20/0x38 (C)
[   28.776218]  dump_stack_lvl+0x8c/0xd0
[   28.776358]  print_report+0x118/0x608
[   28.776695]  kasan_report+0xdc/0x128
[   28.776821]  __asan_report_load1_noabort+0x20/0x30
[   28.776971]  strcmp+0xc0/0xc8
[   28.777124]  kasan_strings+0x340/0xb00
[   28.777504]  kunit_try_run_case+0x170/0x3f0
[   28.777646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.778154]  kthread+0x328/0x630
[   28.778295]  ret_from_fork+0x10/0x20
[   28.779178] 
[   28.779268] Allocated by task 259:
[   28.779594]  kasan_save_stack+0x3c/0x68
[   28.779927]  kasan_save_track+0x20/0x40
[   28.780068]  kasan_save_alloc_info+0x40/0x58
[   28.780187]  __kasan_kmalloc+0xd4/0xd8
[   28.780785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.780896]  kasan_strings+0xc8/0xb00
[   28.780959]  kunit_try_run_case+0x170/0x3f0
[   28.781011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.781111]  kthread+0x328/0x630
[   28.781221]  ret_from_fork+0x10/0x20
[   28.781355] 
[   28.781468] Freed by task 259:
[   28.781645]  kasan_save_stack+0x3c/0x68
[   28.781752]  kasan_save_track+0x20/0x40
[   28.781855]  kasan_save_free_info+0x4c/0x78
[   28.782278]  __kasan_slab_free+0x6c/0x98
[   28.782463]  kfree+0x214/0x3c8
[   28.782581]  kasan_strings+0x24c/0xb00
[   28.782765]  kunit_try_run_case+0x170/0x3f0
[   28.782885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.783005]  kthread+0x328/0x630
[   28.783117]  ret_from_fork+0x10/0x20
[   28.783217] 
[   28.783272] The buggy address belongs to the object at fff00000c770c040
[   28.783272]  which belongs to the cache kmalloc-32 of size 32
[   28.783461] The buggy address is located 16 bytes inside of
[   28.783461]  freed 32-byte region [fff00000c770c040, fff00000c770c060)
[   28.783652] 
[   28.783705] The buggy address belongs to the physical page:
[   28.783790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   28.783950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.784278] page_type: f5(slab)
[   28.785115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.785255] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.787544] page dumped because: kasan: bad access detected
[   28.790505] 
[   28.790567] Memory state around the buggy address:
[   28.790649]  fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790762]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790886] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.790989]                                                  ^
[   28.791085]  fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.791196]  fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.791297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure Automatically assigned
[   28.725063] ==================================================================
[   28.725141] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   28.725213] Read of size 1 at addr fff00000c7710e98 by task kunit_try_catch/257
[   28.725290] 
[   28.725354] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.725467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.725505] Hardware name: linux,dummy-virt (DT)
[   28.725549] Call trace:
[   28.725578]  show_stack+0x20/0x38 (C)
[   28.725649]  dump_stack_lvl+0x8c/0xd0
[   28.725713]  print_report+0x118/0x608
[   28.725777]  kasan_report+0xdc/0x128
[   28.725839]  __asan_report_load1_noabort+0x20/0x30
[   28.725901]  memcmp+0x198/0x1d8
[   28.725957]  kasan_memcmp+0x16c/0x300
[   28.726016]  kunit_try_run_case+0x170/0x3f0
[   28.726079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.726148]  kthread+0x328/0x630
[   28.726202]  ret_from_fork+0x10/0x20
[   28.726266] 
[   28.726291] Allocated by task 257:
[   28.726368]  kasan_save_stack+0x3c/0x68
[   28.726483]  kasan_save_track+0x20/0x40
[   28.726762]  kasan_save_alloc_info+0x40/0x58
[   28.727039]  __kasan_kmalloc+0xd4/0xd8
[   28.727591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.727803]  kasan_memcmp+0xbc/0x300
[   28.727920]  kunit_try_run_case+0x170/0x3f0
[   28.728021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.728260]  kthread+0x328/0x630
[   28.728693]  ret_from_fork+0x10/0x20
[   28.729481] 
[   28.729640] The buggy address belongs to the object at fff00000c7710e80
[   28.729640]  which belongs to the cache kmalloc-32 of size 32
[   28.729797] The buggy address is located 0 bytes to the right of
[   28.729797]  allocated 24-byte region [fff00000c7710e80, fff00000c7710e98)
[   28.729964] 
[   28.730943] The buggy address belongs to the physical page:
[   28.731030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710
[   28.732292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.732958] page_type: f5(slab)
[   28.733085] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.733230] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   28.733454] page dumped because: kasan: bad access detected
[   28.733563] 
[   28.733622] Memory state around the buggy address:
[   28.733807]  fff00000c7710d80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   28.733922]  fff00000c7710e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.734032] >fff00000c7710e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.734136]                             ^
[   28.734266]  fff00000c7710f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.734599]  fff00000c7710f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.734739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure Automatically assigned
[   28.677972] ==================================================================
[   28.678101] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   28.678219] Read of size 1 at addr ffff800080aa7b4a by task kunit_try_catch/253
[   28.678374] 
[   28.678487] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.678999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.679081] Hardware name: linux,dummy-virt (DT)
[   28.679166] Call trace:
[   28.679274]  show_stack+0x20/0x38 (C)
[   28.679471]  dump_stack_lvl+0x8c/0xd0
[   28.679612]  print_report+0x310/0x608
[   28.679757]  kasan_report+0xdc/0x128
[   28.680030]  __asan_report_load1_noabort+0x20/0x30
[   28.680213]  kasan_alloca_oob_right+0x2dc/0x340
[   28.680372]  kunit_try_run_case+0x170/0x3f0
[   28.680541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.680760]  kthread+0x328/0x630
[   28.680894]  ret_from_fork+0x10/0x20
[   28.681262] 
[   28.681355] The buggy address belongs to stack of task kunit_try_catch/253
[   28.681539] 
[   28.681792] The buggy address belongs to the virtual mapping at
[   28.681792]  [ffff800080aa0000, ffff800080aa9000) created by:
[   28.681792]  kernel_clone+0x150/0x7a8
[   28.682090] 
[   28.682168] The buggy address belongs to the physical page:
[   28.682356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763
[   28.682658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.682819] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.683194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.683445] page dumped because: kasan: bad access detected
[   28.683572] 
[   28.683689] Memory state around the buggy address:
[   28.683901]  ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.684228]  ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.684369] >ffff800080aa7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   28.684477]                                               ^
[   28.684635]  ffff800080aa7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.684759]  ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.684876] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure Automatically assigned
[   28.651270] ==================================================================
[   28.651471] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   28.651601] Read of size 1 at addr ffff800080aa7b5f by task kunit_try_catch/251
[   28.651726] 
[   28.651804] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.652026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.652097] Hardware name: linux,dummy-virt (DT)
[   28.652175] Call trace:
[   28.652233]  show_stack+0x20/0x38 (C)
[   28.652373]  dump_stack_lvl+0x8c/0xd0
[   28.652503]  print_report+0x310/0x608
[   28.652626]  kasan_report+0xdc/0x128
[   28.652742]  __asan_report_load1_noabort+0x20/0x30
[   28.652865]  kasan_alloca_oob_left+0x2b8/0x310
[   28.652991]  kunit_try_run_case+0x170/0x3f0
[   28.653116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.653299]  kthread+0x328/0x630
[   28.653443]  ret_from_fork+0x10/0x20
[   28.653594] 
[   28.653657] The buggy address belongs to stack of task kunit_try_catch/251
[   28.654406] 
[   28.654931] The buggy address belongs to the virtual mapping at
[   28.654931]  [ffff800080aa0000, ffff800080aa9000) created by:
[   28.654931]  kernel_clone+0x150/0x7a8
[   28.655497] 
[   28.655568] The buggy address belongs to the physical page:
[   28.655658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763
[   28.655815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.656060] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.656210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.656348] page dumped because: kasan: bad access detected
[   28.656436] 
[   28.656530] Memory state around the buggy address:
[   28.656625]  ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.656844]  ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.657056] >ffff800080aa7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   28.657170]                                                     ^
[   28.657550]  ffff800080aa7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.658156]  ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.658369] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure Automatically assigned
[   28.617106] ==================================================================
[   28.617264] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   28.617419] Read of size 1 at addr ffff800080aa7c2a by task kunit_try_catch/249
[   28.617565] 
[   28.617646] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.618166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.618297] Hardware name: linux,dummy-virt (DT)
[   28.618442] Call trace:
[   28.618503]  show_stack+0x20/0x38 (C)
[   28.618686]  dump_stack_lvl+0x8c/0xd0
[   28.618820]  print_report+0x310/0x608
[   28.619031]  kasan_report+0xdc/0x128
[   28.619462]  __asan_report_load1_noabort+0x20/0x30
[   28.619618]  kasan_stack_oob+0x238/0x270
[   28.620369]  kunit_try_run_case+0x170/0x3f0
[   28.620598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.620744]  kthread+0x328/0x630
[   28.621023]  ret_from_fork+0x10/0x20
[   28.621177] 
[   28.621310] The buggy address belongs to stack of task kunit_try_catch/249
[   28.621937]  and is located at offset 138 in frame:
[   28.622130]  kasan_stack_oob+0x0/0x270
[   28.622639] 
[   28.622722] This frame has 4 objects:
[   28.622971]  [48, 49) '__assertion'
[   28.623101]  [64, 72) 'array'
[   28.623192]  [96, 112) '__assertion'
[   28.623383]  [128, 138) 'stack_array'
[   28.623518] 
[   28.623599] The buggy address belongs to the virtual mapping at
[   28.623599]  [ffff800080aa0000, ffff800080aa9000) created by:
[   28.623599]  kernel_clone+0x150/0x7a8
[   28.623805] 
[   28.623880] The buggy address belongs to the physical page:
[   28.623975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763
[   28.624127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.624811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.624952] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.625589] page dumped because: kasan: bad access detected
[   28.625743] 
[   28.625806] Memory state around the buggy address:
[   28.625997]  ffff800080aa7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.626215]  ffff800080aa7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   28.626348] >ffff800080aa7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   28.626474]                                   ^
[   28.626617]  ffff800080aa7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   28.626742]  ffff800080aa7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.627044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure Automatically assigned
[   28.585636] ==================================================================
[   28.585769] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   28.585882] Read of size 1 at addr ffff9ca72a3b558d by task kunit_try_catch/245
[   28.586003] 
[   28.586078] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.586276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.586385] Hardware name: linux,dummy-virt (DT)
[   28.586481] Call trace:
[   28.587089]  show_stack+0x20/0x38 (C)
[   28.587533]  dump_stack_lvl+0x8c/0xd0
[   28.587706]  print_report+0x310/0x608
[   28.588023]  kasan_report+0xdc/0x128
[   28.588547]  __asan_report_load1_noabort+0x20/0x30
[   28.588807]  kasan_global_oob_right+0x230/0x270
[   28.588973]  kunit_try_run_case+0x170/0x3f0
[   28.589117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.589268]  kthread+0x328/0x630
[   28.589417]  ret_from_fork+0x10/0x20
[   28.589947] 
[   28.590083] The buggy address belongs to the variable:
[   28.590234]  global_array+0xd/0x40
[   28.590579] 
[   28.590834] The buggy address belongs to the virtual mapping at
[   28.590834]  [ffff9ca728550000, ffff9ca72a471000) created by:
[   28.590834]  paging_init+0x66c/0x7d0
[   28.591049] 
[   28.591311] The buggy address belongs to the physical page:
[   28.591415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db5
[   28.591542] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   28.591802] raw: 03fffe0000002000 ffffc1ffc01f6d48 ffffc1ffc01f6d48 0000000000000000
[   28.592405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.592614] page dumped because: kasan: bad access detected
[   28.592702] 
[   28.592755] Memory state around the buggy address:
[   28.592844]  ffff9ca72a3b5480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.592966]  ffff9ca72a3b5500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   28.593079] >ffff9ca72a3b5580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   28.593179]                       ^
[   28.593256]  ffff9ca72a3b5600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   28.593588]  ffff9ca72a3b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.593709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure Automatically assigned
[   28.527052] ==================================================================
[   28.527189] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.527322] Free of addr fff00000c7719701 by task kunit_try_catch/241
[   28.527476] 
[   28.527583] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.528165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.528240] Hardware name: linux,dummy-virt (DT)
[   28.528323] Call trace:
[   28.529307]  show_stack+0x20/0x38 (C)
[   28.529473]  dump_stack_lvl+0x8c/0xd0
[   28.531134]  print_report+0x118/0x608
[   28.531285]  kasan_report_invalid_free+0xc0/0xe8
[   28.532593]  check_slab_allocation+0xfc/0x108
[   28.532756]  __kasan_mempool_poison_object+0x78/0x150
[   28.532889]  mempool_free+0x28c/0x328
[   28.533006]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.533138]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.533258]  kunit_try_run_case+0x170/0x3f0
[   28.533476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.533616]  kthread+0x328/0x630
[   28.533712]  ret_from_fork+0x10/0x20
[   28.533823] 
[   28.533869] Allocated by task 241:
[   28.534048]  kasan_save_stack+0x3c/0x68
[   28.535889]  kasan_save_track+0x20/0x40
[   28.536210]  kasan_save_alloc_info+0x40/0x58
[   28.536409]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.536527]  remove_element+0x130/0x1f8
[   28.537464]  mempool_alloc_preallocated+0x58/0xc0
[   28.537587]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   28.537707]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.537914]  kunit_try_run_case+0x170/0x3f0
[   28.538476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.538840]  kthread+0x328/0x630
[   28.539132]  ret_from_fork+0x10/0x20
[   28.539229] 
[   28.539663] The buggy address belongs to the object at fff00000c7719700
[   28.539663]  which belongs to the cache kmalloc-128 of size 128
[   28.540062] The buggy address is located 1 bytes inside of
[   28.540062]  128-byte region [fff00000c7719700, fff00000c7719780)
[   28.540758] 
[   28.540877] The buggy address belongs to the physical page:
[   28.540954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   28.541569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.541684] page_type: f5(slab)
[   28.541735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.541820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.541904] page dumped because: kasan: bad access detected
[   28.541944] 
[   28.541968] Memory state around the buggy address:
[   28.542009]  fff00000c7719600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.542065]  fff00000c7719680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.542119] >fff00000c7719700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.542166]                    ^
[   28.542200]  fff00000c7719780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.542254]  fff00000c7719800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.542302] ==================================================================
[   28.558459] ==================================================================
[   28.558573] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.558689] Free of addr fff00000c78b0001 by task kunit_try_catch/243
[   28.558808] 
[   28.558892] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.560000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.560109] Hardware name: linux,dummy-virt (DT)
[   28.560197] Call trace:
[   28.560257]  show_stack+0x20/0x38 (C)
[   28.560403]  dump_stack_lvl+0x8c/0xd0
[   28.560535]  print_report+0x118/0x608
[   28.560848]  kasan_report_invalid_free+0xc0/0xe8
[   28.561001]  __kasan_mempool_poison_object+0xfc/0x150
[   28.561194]  mempool_free+0x28c/0x328
[   28.561488]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.561683]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   28.562305]  kunit_try_run_case+0x170/0x3f0
[   28.562506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.563040]  kthread+0x328/0x630
[   28.563595]  ret_from_fork+0x10/0x20
[   28.564139] 
[   28.564202] The buggy address belongs to the physical page:
[   28.564278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   28.564433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.564553] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.564731] page_type: f8(unknown)
[   28.565007] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.565376] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.566159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.566316] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.566632] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   28.566773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.566876] page dumped because: kasan: bad access detected
[   28.566948] 
[   28.566993] Memory state around the buggy address:
[   28.567147]  fff00000c78aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.567422]  fff00000c78aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.567555] >fff00000c78b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.567823]                    ^
[   28.567899]  fff00000c78b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.568034]  fff00000c78b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.568146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure Automatically assigned
[   28.482719] ==================================================================
[   28.482831] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.483149] Free of addr fff00000c787c000 by task kunit_try_catch/239
[   28.483275] 
[   28.483361] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.483662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.483739] Hardware name: linux,dummy-virt (DT)
[   28.483821] Call trace:
[   28.483903]  show_stack+0x20/0x38 (C)
[   28.484034]  dump_stack_lvl+0x8c/0xd0
[   28.484160]  print_report+0x118/0x608
[   28.484514]  kasan_report_invalid_free+0xc0/0xe8
[   28.484734]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.484901]  mempool_free+0x24c/0x328
[   28.485020]  mempool_double_free_helper+0x150/0x2e8
[   28.485160]  mempool_page_alloc_double_free+0xbc/0x118
[   28.485396]  kunit_try_run_case+0x170/0x3f0
[   28.485567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.485830]  kthread+0x328/0x630
[   28.485978]  ret_from_fork+0x10/0x20
[   28.486098] 
[   28.486204] The buggy address belongs to the physical page:
[   28.486438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c
[   28.486751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.486956] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.487081] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.487180] page dumped because: kasan: bad access detected
[   28.487305] 
[   28.487451] Memory state around the buggy address:
[   28.487609]  fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.487718]  fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.488219] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.488622]                    ^
[   28.488730]  fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.488849]  fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.489599] ==================================================================
[   28.431548] ==================================================================
[   28.431665] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.431773] Free of addr fff00000c7719300 by task kunit_try_catch/235
[   28.431879] 
[   28.431947] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.432470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.432596] Hardware name: linux,dummy-virt (DT)
[   28.432687] Call trace:
[   28.432746]  show_stack+0x20/0x38 (C)
[   28.432880]  dump_stack_lvl+0x8c/0xd0
[   28.433010]  print_report+0x118/0x608
[   28.433665]  kasan_report_invalid_free+0xc0/0xe8
[   28.434261]  check_slab_allocation+0xd4/0x108
[   28.434596]  __kasan_mempool_poison_object+0x78/0x150
[   28.434751]  mempool_free+0x28c/0x328
[   28.435088]  mempool_double_free_helper+0x150/0x2e8
[   28.435257]  mempool_kmalloc_double_free+0xc0/0x118
[   28.435425]  kunit_try_run_case+0x170/0x3f0
[   28.435594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.435999]  kthread+0x328/0x630
[   28.436127]  ret_from_fork+0x10/0x20
[   28.436532] 
[   28.436617] Allocated by task 235:
[   28.436844]  kasan_save_stack+0x3c/0x68
[   28.436980]  kasan_save_track+0x20/0x40
[   28.437169]  kasan_save_alloc_info+0x40/0x58
[   28.437372]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.437805]  remove_element+0x130/0x1f8
[   28.437923]  mempool_alloc_preallocated+0x58/0xc0
[   28.438053]  mempool_double_free_helper+0x94/0x2e8
[   28.438223]  mempool_kmalloc_double_free+0xc0/0x118
[   28.438352]  kunit_try_run_case+0x170/0x3f0
[   28.438824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.439012]  kthread+0x328/0x630
[   28.439104]  ret_from_fork+0x10/0x20
[   28.439226] 
[   28.439304] Freed by task 235:
[   28.439399]  kasan_save_stack+0x3c/0x68
[   28.439514]  kasan_save_track+0x20/0x40
[   28.440014]  kasan_save_free_info+0x4c/0x78
[   28.440223]  __kasan_mempool_poison_object+0xc0/0x150
[   28.440638]  mempool_free+0x28c/0x328
[   28.440746]  mempool_double_free_helper+0x100/0x2e8
[   28.440891]  mempool_kmalloc_double_free+0xc0/0x118
[   28.441431]  kunit_try_run_case+0x170/0x3f0
[   28.441660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.441775]  kthread+0x328/0x630
[   28.441857]  ret_from_fork+0x10/0x20
[   28.441978] 
[   28.442122] The buggy address belongs to the object at fff00000c7719300
[   28.442122]  which belongs to the cache kmalloc-128 of size 128
[   28.442502] The buggy address is located 0 bytes inside of
[   28.442502]  128-byte region [fff00000c7719300, fff00000c7719380)
[   28.442652] 
[   28.442709] The buggy address belongs to the physical page:
[   28.442916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719
[   28.443043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.443186] page_type: f5(slab)
[   28.443281] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.443433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.443588] page dumped because: kasan: bad access detected
[   28.443711] 
[   28.443779] Memory state around the buggy address:
[   28.444083]  fff00000c7719200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.444658]  fff00000c7719280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445078] >fff00000c7719300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.445185]                    ^
[   28.445265]  fff00000c7719380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445408]  fff00000c7719400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.445509] ==================================================================
[   28.466040] ==================================================================
[   28.466215] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.466432] Free of addr fff00000c787c000 by task kunit_try_catch/237
[   28.466615] 
[   28.466696] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.466992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.467073] Hardware name: linux,dummy-virt (DT)
[   28.467159] Call trace:
[   28.467249]  show_stack+0x20/0x38 (C)
[   28.467475]  dump_stack_lvl+0x8c/0xd0
[   28.467599]  print_report+0x118/0x608
[   28.467725]  kasan_report_invalid_free+0xc0/0xe8
[   28.467868]  __kasan_mempool_poison_object+0x14c/0x150
[   28.468026]  mempool_free+0x28c/0x328
[   28.468159]  mempool_double_free_helper+0x150/0x2e8
[   28.468388]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.468575]  kunit_try_run_case+0x170/0x3f0
[   28.468789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.468934]  kthread+0x328/0x630
[   28.469098]  ret_from_fork+0x10/0x20
[   28.469225] 
[   28.469277] The buggy address belongs to the physical page:
[   28.469405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c
[   28.469575] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.469696] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.469927] page_type: f8(unknown)
[   28.470089] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.470347] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.470536] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.470660] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.470783] head: 0bfffe0000000002 ffffc1ffc31e1f01 00000000ffffffff 00000000ffffffff
[   28.471001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.471113] page dumped because: kasan: bad access detected
[   28.471350] 
[   28.471399] Memory state around the buggy address:
[   28.471488]  fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.471689]  fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.471841] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.471942]                    ^
[   28.472020]  fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.472198]  fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.472300] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   28.410442] ==================================================================
[   28.410682] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.410929] Read of size 1 at addr fff00000c787c000 by task kunit_try_catch/233
[   28.411061] 
[   28.411253] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.411640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.411712] Hardware name: linux,dummy-virt (DT)
[   28.411787] Call trace:
[   28.411846]  show_stack+0x20/0x38 (C)
[   28.411972]  dump_stack_lvl+0x8c/0xd0
[   28.412518]  print_report+0x118/0x608
[   28.412701]  kasan_report+0xdc/0x128
[   28.412959]  __asan_report_load1_noabort+0x20/0x30
[   28.413369]  mempool_uaf_helper+0x314/0x340
[   28.413502]  mempool_page_alloc_uaf+0xc0/0x118
[   28.413643]  kunit_try_run_case+0x170/0x3f0
[   28.413794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.413947]  kthread+0x328/0x630
[   28.414952]  ret_from_fork+0x10/0x20
[   28.415137] 
[   28.415283] The buggy address belongs to the physical page:
[   28.415384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c
[   28.415514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.415783] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.416207] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.416324] page dumped because: kasan: bad access detected
[   28.416425] 
[   28.416482] Memory state around the buggy address:
[   28.416875]  fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.417191]  fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.417317] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.417429]                    ^
[   28.417496]  fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.417649]  fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.417815] ==================================================================
[   28.303509] ==================================================================
[   28.303631] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   28.303737] Read of size 1 at addr fff00000c7878000 by task kunit_try_catch/229
[   28.303878] 
[   28.303965] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.305025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.305102] Hardware name: linux,dummy-virt (DT)
[   28.305182] Call trace:
[   28.305237]  show_stack+0x20/0x38 (C)
[   28.305563]  dump_stack_lvl+0x8c/0xd0
[   28.305700]  print_report+0x118/0x608
[   28.306171]  kasan_report+0xdc/0x128
[   28.307149]  __asan_report_load1_noabort+0x20/0x30
[   28.307522]  mempool_uaf_helper+0x314/0x340
[   28.307646]  mempool_kmalloc_large_uaf+0xc4/0x120
[   28.308642]  kunit_try_run_case+0x170/0x3f0
[   28.309043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.309214]  kthread+0x328/0x630
[   28.309463]  ret_from_fork+0x10/0x20
[   28.309647] 
[   28.309699] The buggy address belongs to the physical page:
[   28.310071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878
[   28.310572] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.310692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.310976] page_type: f8(unknown)
[   28.311142] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.312029] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.312200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.312343] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.312470] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff
[   28.312597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.312703] page dumped because: kasan: bad access detected
[   28.312795] 
[   28.312929] Memory state around the buggy address:
[   28.313110]  fff00000c7877f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.313265]  fff00000c7877f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.313568] >fff00000c7878000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.313673]                    ^
[   28.313743]  fff00000c7878080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.313847]  fff00000c7878100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.313942] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure Automatically assigned
[   28.278617] ==================================================================
[   28.278755] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.278955] Read of size 1 at addr fff00000c6419f00 by task kunit_try_catch/227
[   28.279100] 
[   28.279237] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.279544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.279629] Hardware name: linux,dummy-virt (DT)
[   28.279774] Call trace:
[   28.279902]  show_stack+0x20/0x38 (C)
[   28.280176]  dump_stack_lvl+0x8c/0xd0
[   28.280517]  print_report+0x118/0x608
[   28.280783]  kasan_report+0xdc/0x128
[   28.280953]  __asan_report_load1_noabort+0x20/0x30
[   28.281025]  mempool_uaf_helper+0x314/0x340
[   28.281140]  mempool_kmalloc_uaf+0xc4/0x120
[   28.281221]  kunit_try_run_case+0x170/0x3f0
[   28.281309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.281451]  kthread+0x328/0x630
[   28.281512]  ret_from_fork+0x10/0x20
[   28.281574] 
[   28.281597] Allocated by task 227:
[   28.281634]  kasan_save_stack+0x3c/0x68
[   28.281687]  kasan_save_track+0x20/0x40
[   28.281735]  kasan_save_alloc_info+0x40/0x58
[   28.281786]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.281841]  remove_element+0x130/0x1f8
[   28.281893]  mempool_alloc_preallocated+0x58/0xc0
[   28.281940]  mempool_uaf_helper+0xa4/0x340
[   28.281986]  mempool_kmalloc_uaf+0xc4/0x120
[   28.282033]  kunit_try_run_case+0x170/0x3f0
[   28.282079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.282132]  kthread+0x328/0x630
[   28.282175]  ret_from_fork+0x10/0x20
[   28.282218] 
[   28.282243] Freed by task 227:
[   28.282275]  kasan_save_stack+0x3c/0x68
[   28.282322]  kasan_save_track+0x20/0x40
[   28.282591]  kasan_save_free_info+0x4c/0x78
[   28.282773]  __kasan_mempool_poison_object+0xc0/0x150
[   28.282880]  mempool_free+0x28c/0x328
[   28.282976]  mempool_uaf_helper+0x104/0x340
[   28.283259]  mempool_kmalloc_uaf+0xc4/0x120
[   28.284263]  kunit_try_run_case+0x170/0x3f0
[   28.284874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.285449]  kthread+0x328/0x630
[   28.285672]  ret_from_fork+0x10/0x20
[   28.285795] 
[   28.285909] The buggy address belongs to the object at fff00000c6419f00
[   28.285909]  which belongs to the cache kmalloc-128 of size 128
[   28.286095] The buggy address is located 0 bytes inside of
[   28.286095]  freed 128-byte region [fff00000c6419f00, fff00000c6419f80)
[   28.286250] 
[   28.286308] The buggy address belongs to the physical page:
[   28.286426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   28.286632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.286777] page_type: f5(slab)
[   28.287322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.287813] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   28.287928] page dumped because: kasan: bad access detected
[   28.288019] 
[   28.288072] Memory state around the buggy address:
[   28.288497]  fff00000c6419e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.288857]  fff00000c6419e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.289044] >fff00000c6419f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.289210]                    ^
[   28.289310]  fff00000c6419f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.289671]  fff00000c641a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.289781] ==================================================================
[   28.345596] ==================================================================
[   28.345730] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   28.345862] Read of size 1 at addr fff00000c7715180 by task kunit_try_catch/231
[   28.346201] 
[   28.346717] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.347416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.347514] Hardware name: linux,dummy-virt (DT)
[   28.347650] Call trace:
[   28.347731]  show_stack+0x20/0x38 (C)
[   28.347887]  dump_stack_lvl+0x8c/0xd0
[   28.348110]  print_report+0x118/0x608
[   28.348245]  kasan_report+0xdc/0x128
[   28.348399]  __asan_report_load1_noabort+0x20/0x30
[   28.348676]  mempool_uaf_helper+0x314/0x340
[   28.348831]  mempool_slab_uaf+0xc0/0x118
[   28.349134]  kunit_try_run_case+0x170/0x3f0
[   28.349316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.349523]  kthread+0x328/0x630
[   28.349756]  ret_from_fork+0x10/0x20
[   28.349901] 
[   28.350016] Allocated by task 231:
[   28.350166]  kasan_save_stack+0x3c/0x68
[   28.350398]  kasan_save_track+0x20/0x40
[   28.350509]  kasan_save_alloc_info+0x40/0x58
[   28.350614]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.350720]  remove_element+0x16c/0x1f8
[   28.350827]  mempool_alloc_preallocated+0x58/0xc0
[   28.351025]  mempool_uaf_helper+0xa4/0x340
[   28.351235]  mempool_slab_uaf+0xc0/0x118
[   28.351433]  kunit_try_run_case+0x170/0x3f0
[   28.351539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.351659]  kthread+0x328/0x630
[   28.351764]  ret_from_fork+0x10/0x20
[   28.351879] 
[   28.351933] Freed by task 231:
[   28.352105]  kasan_save_stack+0x3c/0x68
[   28.352223]  kasan_save_track+0x20/0x40
[   28.352519]  kasan_save_free_info+0x4c/0x78
[   28.352771]  __kasan_mempool_poison_object+0xc0/0x150
[   28.352894]  mempool_free+0x28c/0x328
[   28.352993]  mempool_uaf_helper+0x104/0x340
[   28.353101]  mempool_slab_uaf+0xc0/0x118
[   28.353203]  kunit_try_run_case+0x170/0x3f0
[   28.353313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.353460]  kthread+0x328/0x630
[   28.353565]  ret_from_fork+0x10/0x20
[   28.353717] 
[   28.353772] The buggy address belongs to the object at fff00000c7715180
[   28.353772]  which belongs to the cache test_cache of size 123
[   28.354070] The buggy address is located 0 bytes inside of
[   28.354070]  freed 123-byte region [fff00000c7715180, fff00000c77151fb)
[   28.354251] 
[   28.354355] The buggy address belongs to the physical page:
[   28.354437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107715
[   28.354580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.354809] page_type: f5(slab)
[   28.354958] raw: 0bfffe0000000000 fff00000c772c280 dead000000000122 0000000000000000
[   28.355230] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.355435] page dumped because: kasan: bad access detected
[   28.355532] 
[   28.355580] Memory state around the buggy address:
[   28.356353]  fff00000c7715080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   28.356955]  fff00000c7715100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.357525] >fff00000c7715180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.357822]                    ^
[   28.357901]  fff00000c7715200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.358005]  fff00000c7715280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.358100] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure Automatically assigned
[   28.151818] ==================================================================
[   28.151965] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.152428] Read of size 1 at addr fff00000c787a001 by task kunit_try_catch/223
[   28.152696] 
[   28.152809] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.153024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.153372] Hardware name: linux,dummy-virt (DT)
[   28.153489] Call trace:
[   28.153548]  show_stack+0x20/0x38 (C)
[   28.153800]  dump_stack_lvl+0x8c/0xd0
[   28.154004]  print_report+0x118/0x608
[   28.154175]  kasan_report+0xdc/0x128
[   28.154354]  __asan_report_load1_noabort+0x20/0x30
[   28.154665]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.155252]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   28.155982]  kunit_try_run_case+0x170/0x3f0
[   28.156450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.156596]  kthread+0x328/0x630
[   28.156718]  ret_from_fork+0x10/0x20
[   28.157371] 
[   28.157439] The buggy address belongs to the physical page:
[   28.157649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878
[   28.158132] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.158398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.158612] page_type: f8(unknown)
[   28.158719] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.159053] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.159388] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.159581] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   28.159707] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff
[   28.160015] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.160128] page dumped because: kasan: bad access detected
[   28.160227] 
[   28.160788] Memory state around the buggy address:
[   28.160921]  fff00000c7879f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.161082]  fff00000c7879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.161194] >fff00000c787a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.161347]                    ^
[   28.161544]  fff00000c787a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.161730]  fff00000c787a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.162178] ==================================================================
[   28.189967] ==================================================================
[   28.190118] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.190247] Read of size 1 at addr fff00000c77262bb by task kunit_try_catch/225
[   28.190410] 
[   28.190491] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.190708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.190780] Hardware name: linux,dummy-virt (DT)
[   28.190916] Call trace:
[   28.190992]  show_stack+0x20/0x38 (C)
[   28.191216]  dump_stack_lvl+0x8c/0xd0
[   28.191377]  print_report+0x118/0x608
[   28.191513]  kasan_report+0xdc/0x128
[   28.191894]  __asan_report_load1_noabort+0x20/0x30
[   28.192033]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.192197]  mempool_slab_oob_right+0xc0/0x118
[   28.192526]  kunit_try_run_case+0x170/0x3f0
[   28.192916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.193186]  kthread+0x328/0x630
[   28.193473]  ret_from_fork+0x10/0x20
[   28.193905] 
[   28.193956] Allocated by task 225:
[   28.194028]  kasan_save_stack+0x3c/0x68
[   28.194870]  kasan_save_track+0x20/0x40
[   28.195078]  kasan_save_alloc_info+0x40/0x58
[   28.195537]  __kasan_mempool_unpoison_object+0xbc/0x180
[   28.195994]  remove_element+0x16c/0x1f8
[   28.196480]  mempool_alloc_preallocated+0x58/0xc0
[   28.196600]  mempool_oob_right_helper+0x98/0x2f0
[   28.197075]  mempool_slab_oob_right+0xc0/0x118
[   28.197576]  kunit_try_run_case+0x170/0x3f0
[   28.197687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.197800]  kthread+0x328/0x630
[   28.198855]  ret_from_fork+0x10/0x20
[   28.198989] 
[   28.199037] The buggy address belongs to the object at fff00000c7726240
[   28.199037]  which belongs to the cache test_cache of size 123
[   28.199994] The buggy address is located 0 bytes to the right of
[   28.199994]  allocated 123-byte region [fff00000c7726240, fff00000c77262bb)
[   28.200517] 
[   28.200573] The buggy address belongs to the physical page:
[   28.200904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107726
[   28.201453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.201751] page_type: f5(slab)
[   28.201850] raw: 0bfffe0000000000 fff00000c772c140 dead000000000122 0000000000000000
[   28.201977] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.202078] page dumped because: kasan: bad access detected
[   28.203302] 
[   28.203545] Memory state around the buggy address:
[   28.203957]  fff00000c7726180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.204142]  fff00000c7726200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   28.204739] >fff00000c7726280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   28.204876]                                         ^
[   28.205260]  fff00000c7726300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.205460]  fff00000c7726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.206268] ==================================================================
[   28.087069] ==================================================================
[   28.089039] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   28.089416] Read of size 1 at addr fff00000c6419b73 by task kunit_try_catch/221
[   28.090830] 
[   28.091342] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.092400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.092841] Hardware name: linux,dummy-virt (DT)
[   28.093031] Call trace:
[   28.093089]  show_stack+0x20/0x38 (C)
[   28.094546]  dump_stack_lvl+0x8c/0xd0
[   28.094713]  print_report+0x118/0x608
[   28.094834]  kasan_report+0xdc/0x128
[   28.096245]  __asan_report_load1_noabort+0x20/0x30
[   28.096506]  mempool_oob_right_helper+0x2ac/0x2f0
[   28.096627]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.096749]  kunit_try_run_case+0x170/0x3f0
[   28.096877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.097009]  kthread+0x328/0x630
[   28.097118]  ret_from_fork+0x10/0x20
[   28.099490] 
[   28.099682] Allocated by task 221:
[   28.100546]  kasan_save_stack+0x3c/0x68
[   28.100674]  kasan_save_track+0x20/0x40
[   28.100764]  kasan_save_alloc_info+0x40/0x58
[   28.101875]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.102560]  remove_element+0x130/0x1f8
[   28.102775]  mempool_alloc_preallocated+0x58/0xc0
[   28.103867]  mempool_oob_right_helper+0x98/0x2f0
[   28.103987]  mempool_kmalloc_oob_right+0xc4/0x120
[   28.104100]  kunit_try_run_case+0x170/0x3f0
[   28.104198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.105786]  kthread+0x328/0x630
[   28.105938]  ret_from_fork+0x10/0x20
[   28.106031] 
[   28.106881] The buggy address belongs to the object at fff00000c6419b00
[   28.106881]  which belongs to the cache kmalloc-128 of size 128
[   28.107384] The buggy address is located 0 bytes to the right of
[   28.107384]  allocated 115-byte region [fff00000c6419b00, fff00000c6419b73)
[   28.108079] 
[   28.108723] The buggy address belongs to the physical page:
[   28.109014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   28.109632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.109763] page_type: f5(slab)
[   28.109860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.111277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.111406] page dumped because: kasan: bad access detected
[   28.111489] 
[   28.111531] Memory state around the buggy address:
[   28.111609]  fff00000c6419a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.113037]  fff00000c6419a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.113477] >fff00000c6419b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.114704]                                                              ^
[   28.115253]  fff00000c6419b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.115388]  fff00000c6419c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.115489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure Automatically assigned
[   27.359117] ==================================================================
[   27.359264] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   27.360505] Read of size 1 at addr fff00000c11a6dc0 by task kunit_try_catch/215
[   27.360719] 
[   27.360815] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   27.361461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.361542] Hardware name: linux,dummy-virt (DT)
[   27.362174] Call trace:
[   27.362592]  show_stack+0x20/0x38 (C)
[   27.362800]  dump_stack_lvl+0x8c/0xd0
[   27.363147]  print_report+0x118/0x608
[   27.363527]  kasan_report+0xdc/0x128
[   27.363646]  __kasan_check_byte+0x54/0x70
[   27.364048]  kmem_cache_destroy+0x34/0x218
[   27.364403]  kmem_cache_double_destroy+0x174/0x300
[   27.364864]  kunit_try_run_case+0x170/0x3f0
[   27.365021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.365399]  kthread+0x328/0x630
[   27.365827]  ret_from_fork+0x10/0x20
[   27.366438] 
[   27.366506] Allocated by task 215:
[   27.366611]  kasan_save_stack+0x3c/0x68
[   27.366864]  kasan_save_track+0x20/0x40
[   27.367049]  kasan_save_alloc_info+0x40/0x58
[   27.367238]  __kasan_slab_alloc+0xa8/0xb0
[   27.367536]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.367859]  __kmem_cache_create_args+0x178/0x280
[   27.368361]  kmem_cache_double_destroy+0xc0/0x300
[   27.368487]  kunit_try_run_case+0x170/0x3f0
[   27.368901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.369055]  kthread+0x328/0x630
[   27.369149]  ret_from_fork+0x10/0x20
[   27.369393] 
[   27.369830] Freed by task 215:
[   27.369917]  kasan_save_stack+0x3c/0x68
[   27.370046]  kasan_save_track+0x20/0x40
[   27.370181]  kasan_save_free_info+0x4c/0x78
[   27.370626]  __kasan_slab_free+0x6c/0x98
[   27.370930]  kmem_cache_free+0x260/0x468
[   27.371055]  slab_kmem_cache_release+0x38/0x50
[   27.372098]  kmem_cache_release+0x1c/0x30
[   27.372846]  kobject_put+0x17c/0x420
[   27.372979]  sysfs_slab_release+0x1c/0x30
[   27.373118]  kmem_cache_destroy+0x118/0x218
[   27.373454]  kmem_cache_double_destroy+0x128/0x300
[   27.373564]  kunit_try_run_case+0x170/0x3f0
[   27.373878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.374223]  kthread+0x328/0x630
[   27.374740]  ret_from_fork+0x10/0x20
[   27.374842] 
[   27.374889] The buggy address belongs to the object at fff00000c11a6dc0
[   27.374889]  which belongs to the cache kmem_cache of size 208
[   27.375031] The buggy address is located 0 bytes inside of
[   27.375031]  freed 208-byte region [fff00000c11a6dc0, fff00000c11a6e90)
[   27.375182] 
[   27.375233] The buggy address belongs to the physical page:
[   27.375924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1011a6
[   27.376276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.377121] page_type: f5(slab)
[   27.377324] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   27.377752] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   27.378263] page dumped because: kasan: bad access detected
[   27.378409] 
[   27.378525] Memory state around the buggy address:
[   27.379028]  fff00000c11a6c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.379184]  fff00000c11a6d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   27.379343] >fff00000c11a6d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.379655]                                            ^
[   27.380119]  fff00000c11a6e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.380315]  fff00000c11a6e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.380443] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure Automatically assigned
[   26.963944] ==================================================================
[   26.964263] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   26.964780] Read of size 1 at addr fff00000c7760000 by task kunit_try_catch/213
[   26.964950] 
[   26.965048] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   26.965402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.965589] Hardware name: linux,dummy-virt (DT)
[   26.965675] Call trace:
[   26.965831]  show_stack+0x20/0x38 (C)
[   26.966342]  dump_stack_lvl+0x8c/0xd0
[   26.966479]  print_report+0x118/0x608
[   26.966594]  kasan_report+0xdc/0x128
[   26.966981]  __asan_report_load1_noabort+0x20/0x30
[   26.967224]  kmem_cache_rcu_uaf+0x388/0x468
[   26.967740]  kunit_try_run_case+0x170/0x3f0
[   26.968155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.968370]  kthread+0x328/0x630
[   26.968531]  ret_from_fork+0x10/0x20
[   26.968892] 
[   26.969024] Allocated by task 213:
[   26.969140]  kasan_save_stack+0x3c/0x68
[   26.969322]  kasan_save_track+0x20/0x40
[   26.969510]  kasan_save_alloc_info+0x40/0x58
[   26.969788]  __kasan_slab_alloc+0xa8/0xb0
[   26.969890]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.969999]  kmem_cache_rcu_uaf+0x12c/0x468
[   26.970089]  kunit_try_run_case+0x170/0x3f0
[   26.970184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.970296]  kthread+0x328/0x630
[   26.971252]  ret_from_fork+0x10/0x20
[   26.971385] 
[   26.971548] Freed by task 0:
[   26.971640]  kasan_save_stack+0x3c/0x68
[   26.971935]  kasan_save_track+0x20/0x40
[   26.972214]  kasan_save_free_info+0x4c/0x78
[   26.972316]  __kasan_slab_free+0x6c/0x98
[   26.972436]  slab_free_after_rcu_debug+0xd4/0x2f8
[   26.972606]  rcu_core+0x9f4/0x1e20
[   26.972744]  rcu_core_si+0x18/0x30
[   26.972986]  handle_softirqs+0x374/0xb28
[   26.973125]  __do_softirq+0x1c/0x28
[   26.973220] 
[   26.973270] Last potentially related work creation:
[   26.973438]  kasan_save_stack+0x3c/0x68
[   26.973586]  kasan_record_aux_stack+0xb4/0xc8
[   26.973680]  kmem_cache_free+0x120/0x468
[   26.973807]  kmem_cache_rcu_uaf+0x16c/0x468
[   26.974071]  kunit_try_run_case+0x170/0x3f0
[   26.974352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.974471]  kthread+0x328/0x630
[   26.974573]  ret_from_fork+0x10/0x20
[   26.974675] 
[   26.974733] The buggy address belongs to the object at fff00000c7760000
[   26.974733]  which belongs to the cache test_cache of size 200
[   26.975630] The buggy address is located 0 bytes inside of
[   26.975630]  freed 200-byte region [fff00000c7760000, fff00000c77600c8)
[   26.975734] 
[   26.975761] The buggy address belongs to the physical page:
[   26.975818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760
[   26.975940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.976009] page_type: f5(slab)
[   26.976061] raw: 0bfffe0000000000 fff00000c11a6c80 dead000000000122 0000000000000000
[   26.976124] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.976177] page dumped because: kasan: bad access detected
[   26.976217] 
[   26.976237] Memory state around the buggy address:
[   26.976279]  fff00000c775ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.976370]  fff00000c775ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.976657] >fff00000c7760000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.976770]                    ^
[   26.976851]  fff00000c7760080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   26.977247]  fff00000c7760100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.977494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure Automatically assigned
[   26.350565] ==================================================================
[   26.350701] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   26.350842] Free of addr fff00000c7761001 by task kunit_try_catch/211
[   26.350946] 
[   26.351023] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   26.353585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.354120] Hardware name: linux,dummy-virt (DT)
[   26.354240] Call trace:
[   26.354313]  show_stack+0x20/0x38 (C)
[   26.354467]  dump_stack_lvl+0x8c/0xd0
[   26.355156]  print_report+0x118/0x608
[   26.355917]  kasan_report_invalid_free+0xc0/0xe8
[   26.356214]  check_slab_allocation+0xfc/0x108
[   26.356489]  __kasan_slab_pre_free+0x2c/0x48
[   26.356664]  kmem_cache_free+0xf0/0x468
[   26.356904]  kmem_cache_invalid_free+0x184/0x3c8
[   26.357173]  kunit_try_run_case+0x170/0x3f0
[   26.357553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.357940]  kthread+0x328/0x630
[   26.358093]  ret_from_fork+0x10/0x20
[   26.358235] 
[   26.358430] Allocated by task 211:
[   26.358516]  kasan_save_stack+0x3c/0x68
[   26.358745]  kasan_save_track+0x20/0x40
[   26.358875]  kasan_save_alloc_info+0x40/0x58
[   26.359102]  __kasan_slab_alloc+0xa8/0xb0
[   26.359229]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.359370]  kmem_cache_invalid_free+0x12c/0x3c8
[   26.359671]  kunit_try_run_case+0x170/0x3f0
[   26.359787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.359928]  kthread+0x328/0x630
[   26.360655]  ret_from_fork+0x10/0x20
[   26.360796] 
[   26.360847] The buggy address belongs to the object at fff00000c7761000
[   26.360847]  which belongs to the cache test_cache of size 200
[   26.360995] The buggy address is located 1 bytes inside of
[   26.360995]  200-byte region [fff00000c7761000, fff00000c77610c8)
[   26.361370] 
[   26.362115] The buggy address belongs to the physical page:
[   26.362222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107761
[   26.362427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.362667] page_type: f5(slab)
[   26.362984] raw: 0bfffe0000000000 fff00000ffeb0f00 dead000000000122 0000000000000000
[   26.363131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.363324] page dumped because: kasan: bad access detected
[   26.363464] 
[   26.363541] Memory state around the buggy address:
[   26.363640]  fff00000c7760f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.363757]  fff00000c7760f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.363866] >fff00000c7761000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.364116]                    ^
[   26.364193]  fff00000c7761080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.364297]  fff00000c7761100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.364640] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure Automatically assigned
[   26.295413] ==================================================================
[   26.295727] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   26.295922] Free of addr fff00000c7798000 by task kunit_try_catch/209
[   26.296036] 
[   26.296127] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   26.296427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.296692] Hardware name: linux,dummy-virt (DT)
[   26.296790] Call trace:
[   26.296873]  show_stack+0x20/0x38 (C)
[   26.297101]  dump_stack_lvl+0x8c/0xd0
[   26.297421]  print_report+0x118/0x608
[   26.297558]  kasan_report_invalid_free+0xc0/0xe8
[   26.297689]  check_slab_allocation+0xd4/0x108
[   26.297811]  __kasan_slab_pre_free+0x2c/0x48
[   26.297962]  kmem_cache_free+0xf0/0x468
[   26.298166]  kmem_cache_double_free+0x190/0x3c8
[   26.298469]  kunit_try_run_case+0x170/0x3f0
[   26.298807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.298942]  kthread+0x328/0x630
[   26.299090]  ret_from_fork+0x10/0x20
[   26.299432] 
[   26.299487] Allocated by task 209:
[   26.299579]  kasan_save_stack+0x3c/0x68
[   26.299691]  kasan_save_track+0x20/0x40
[   26.299910]  kasan_save_alloc_info+0x40/0x58
[   26.300035]  __kasan_slab_alloc+0xa8/0xb0
[   26.300147]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.300264]  kmem_cache_double_free+0x12c/0x3c8
[   26.300527]  kunit_try_run_case+0x170/0x3f0
[   26.300636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.300802]  kthread+0x328/0x630
[   26.301032]  ret_from_fork+0x10/0x20
[   26.301131] 
[   26.301227] Freed by task 209:
[   26.301415]  kasan_save_stack+0x3c/0x68
[   26.301530]  kasan_save_track+0x20/0x40
[   26.301833]  kasan_save_free_info+0x4c/0x78
[   26.301948]  __kasan_slab_free+0x6c/0x98
[   26.302183]  kmem_cache_free+0x260/0x468
[   26.302277]  kmem_cache_double_free+0x140/0x3c8
[   26.302402]  kunit_try_run_case+0x170/0x3f0
[   26.302520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.302696]  kthread+0x328/0x630
[   26.302801]  ret_from_fork+0x10/0x20
[   26.302940] 
[   26.302993] The buggy address belongs to the object at fff00000c7798000
[   26.302993]  which belongs to the cache test_cache of size 200
[   26.303153] The buggy address is located 0 bytes inside of
[   26.303153]  200-byte region [fff00000c7798000, fff00000c77980c8)
[   26.303314] 
[   26.303445] The buggy address belongs to the physical page:
[   26.303533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107798
[   26.303674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.303801] page_type: f5(slab)
[   26.304000] raw: 0bfffe0000000000 fff00000c11a6b40 dead000000000122 0000000000000000
[   26.304140] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.304290] page dumped because: kasan: bad access detected
[   26.304405] 
[   26.304461] Memory state around the buggy address:
[   26.304548]  fff00000c7797f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.304713]  fff00000c7797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.304997] >fff00000c7798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.305115]                    ^
[   26.305265]  fff00000c7798080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   26.305478]  fff00000c7798100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure Automatically assigned
[   26.001872] ==================================================================
[   26.004151] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   26.004398] Read of size 1 at addr fff00000c77970c8 by task kunit_try_catch/207
[   26.004664] 
[   26.004787] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   26.005222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.005357] Hardware name: linux,dummy-virt (DT)
[   26.005655] Call trace:
[   26.005717]  show_stack+0x20/0x38 (C)
[   26.005919]  dump_stack_lvl+0x8c/0xd0
[   26.006161]  print_report+0x118/0x608
[   26.006291]  kasan_report+0xdc/0x128
[   26.006847]  __asan_report_load1_noabort+0x20/0x30
[   26.007005]  kmem_cache_oob+0x344/0x430
[   26.007298]  kunit_try_run_case+0x170/0x3f0
[   26.007747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.007959]  kthread+0x328/0x630
[   26.008180]  ret_from_fork+0x10/0x20
[   26.008346] 
[   26.008398] Allocated by task 207:
[   26.008470]  kasan_save_stack+0x3c/0x68
[   26.009197]  kasan_save_track+0x20/0x40
[   26.009341]  kasan_save_alloc_info+0x40/0x58
[   26.009698]  __kasan_slab_alloc+0xa8/0xb0
[   26.009895]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.010057]  kmem_cache_oob+0x12c/0x430
[   26.010304]  kunit_try_run_case+0x170/0x3f0
[   26.010433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.011058]  kthread+0x328/0x630
[   26.011769]  ret_from_fork+0x10/0x20
[   26.011935] 
[   26.011983] The buggy address belongs to the object at fff00000c7797000
[   26.011983]  which belongs to the cache test_cache of size 200
[   26.012187] The buggy address is located 0 bytes to the right of
[   26.012187]  allocated 200-byte region [fff00000c7797000, fff00000c77970c8)
[   26.013480] 
[   26.013538] The buggy address belongs to the physical page:
[   26.014001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107797
[   26.014209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.014992] page_type: f5(slab)
[   26.015436] raw: 0bfffe0000000000 fff00000c11a6a00 dead000000000122 0000000000000000
[   26.016094] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.016703] page dumped because: kasan: bad access detected
[   26.016789] 
[   26.017038] Memory state around the buggy address:
[   26.017139]  fff00000c7796f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.017964]  fff00000c7797000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.018575] >fff00000c7797080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.018704]                                               ^
[   26.019197]  fff00000c7797100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.019312]  fff00000c7797180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.020167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure Automatically assigned
[   25.910567] ==================================================================
[   25.910855] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   25.911115] Read of size 8 at addr fff00000c7739440 by task kunit_try_catch/200
[   25.911378] 
[   25.911619] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.912106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.912197] Hardware name: linux,dummy-virt (DT)
[   25.912290] Call trace:
[   25.912377]  show_stack+0x20/0x38 (C)
[   25.912497]  dump_stack_lvl+0x8c/0xd0
[   25.912563]  print_report+0x118/0x608
[   25.912623]  kasan_report+0xdc/0x128
[   25.912680]  __asan_report_load8_noabort+0x20/0x30
[   25.912741]  workqueue_uaf+0x480/0x4a8
[   25.912799]  kunit_try_run_case+0x170/0x3f0
[   25.912862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.912928]  kthread+0x328/0x630
[   25.912982]  ret_from_fork+0x10/0x20
[   25.913039] 
[   25.913064] Allocated by task 200:
[   25.913097]  kasan_save_stack+0x3c/0x68
[   25.913151]  kasan_save_track+0x20/0x40
[   25.913198]  kasan_save_alloc_info+0x40/0x58
[   25.913249]  __kasan_kmalloc+0xd4/0xd8
[   25.913311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.913520]  workqueue_uaf+0x13c/0x4a8
[   25.913729]  kunit_try_run_case+0x170/0x3f0
[   25.913881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.914090]  kthread+0x328/0x630
[   25.914357]  ret_from_fork+0x10/0x20
[   25.914464] 
[   25.914516] Freed by task 9:
[   25.914585]  kasan_save_stack+0x3c/0x68
[   25.914687]  kasan_save_track+0x20/0x40
[   25.914819]  kasan_save_free_info+0x4c/0x78
[   25.915064]  __kasan_slab_free+0x6c/0x98
[   25.915198]  kfree+0x214/0x3c8
[   25.915288]  workqueue_uaf_work+0x18/0x30
[   25.915407]  process_one_work+0x530/0xf98
[   25.915561]  worker_thread+0x618/0xf38
[   25.916015]  kthread+0x328/0x630
[   25.916198]  ret_from_fork+0x10/0x20
[   25.916374] 
[   25.916469] Last potentially related work creation:
[   25.916647]  kasan_save_stack+0x3c/0x68
[   25.916782]  kasan_record_aux_stack+0xb4/0xc8
[   25.916952]  __queue_work+0x65c/0x1008
[   25.917068]  queue_work_on+0xbc/0xf8
[   25.917164]  workqueue_uaf+0x210/0x4a8
[   25.919374]  kunit_try_run_case+0x170/0x3f0
[   25.919493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.919616]  kthread+0x328/0x630
[   25.919728]  ret_from_fork+0x10/0x20
[   25.919833] 
[   25.919883] The buggy address belongs to the object at fff00000c7739440
[   25.919883]  which belongs to the cache kmalloc-32 of size 32
[   25.920028] The buggy address is located 0 bytes inside of
[   25.920028]  freed 32-byte region [fff00000c7739440, fff00000c7739460)
[   25.920172] 
[   25.920225] The buggy address belongs to the physical page:
[   25.920301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107739
[   25.920445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.920565] page_type: f5(slab)
[   25.920657] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.920781] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.920887] page dumped because: kasan: bad access detected
[   25.920998] 
[   25.921057] Memory state around the buggy address:
[   25.921154]  fff00000c7739300: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   25.921289]  fff00000c7739380: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   25.921429] >fff00000c7739400: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.921538]                                            ^
[   25.921639]  fff00000c7739480: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.921832]  fff00000c7739500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.921940] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure Automatically assigned
[   25.837653] ==================================================================
[   25.837895] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   25.838034] Read of size 4 at addr fff00000c7739240 by task swapper/0/0
[   25.838145] 
[   25.840294] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.840460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.840497] Hardware name: linux,dummy-virt (DT)
[   25.840586] Call trace:
[   25.840625]  show_stack+0x20/0x38 (C)
[   25.840692]  dump_stack_lvl+0x8c/0xd0
[   25.840752]  print_report+0x118/0x608
[   25.840812]  kasan_report+0xdc/0x128
[   25.840869]  __asan_report_load4_noabort+0x20/0x30
[   25.840928]  rcu_uaf_reclaim+0x64/0x70
[   25.840982]  rcu_core+0x9f4/0x1e20
[   25.841044]  rcu_core_si+0x18/0x30
[   25.841097]  handle_softirqs+0x374/0xb28
[   25.841157]  __do_softirq+0x1c/0x28
[   25.841209]  ____do_softirq+0x18/0x30
[   25.841265]  call_on_irq_stack+0x24/0x30
[   25.841409]  do_softirq_own_stack+0x24/0x38
[   25.841542]  __irq_exit_rcu+0x1fc/0x318
[   25.841688]  irq_exit_rcu+0x1c/0x80
[   25.842215]  el1_interrupt+0x38/0x58
[   25.842442]  el1h_64_irq_handler+0x18/0x28
[   25.842724]  el1h_64_irq+0x6c/0x70
[   25.843233]  arch_local_irq_enable+0x4/0x8 (P)
[   25.843451]  do_idle+0x384/0x4e8
[   25.843985]  cpu_startup_entry+0x64/0x80
[   25.844209]  rest_init+0x160/0x188
[   25.844498]  start_kernel+0x30c/0x3d0
[   25.844646]  __primary_switched+0x8c/0xa0
[   25.844932] 
[   25.845006] Allocated by task 198:
[   25.845136]  kasan_save_stack+0x3c/0x68
[   25.845287]  kasan_save_track+0x20/0x40
[   25.845518]  kasan_save_alloc_info+0x40/0x58
[   25.845668]  __kasan_kmalloc+0xd4/0xd8
[   25.845788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.845966]  rcu_uaf+0xb0/0x2d8
[   25.846069]  kunit_try_run_case+0x170/0x3f0
[   25.846178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.846459]  kthread+0x328/0x630
[   25.846569]  ret_from_fork+0x10/0x20
[   25.846663] 
[   25.847357] Freed by task 0:
[   25.847727]  kasan_save_stack+0x3c/0x68
[   25.847906]  kasan_save_track+0x20/0x40
[   25.848124]  kasan_save_free_info+0x4c/0x78
[   25.848280]  __kasan_slab_free+0x6c/0x98
[   25.848550]  kfree+0x214/0x3c8
[   25.848696]  rcu_uaf_reclaim+0x28/0x70
[   25.848970]  rcu_core+0x9f4/0x1e20
[   25.849090]  rcu_core_si+0x18/0x30
[   25.849193]  handle_softirqs+0x374/0xb28
[   25.849368]  __do_softirq+0x1c/0x28
[   25.849478] 
[   25.849549] Last potentially related work creation:
[   25.849637]  kasan_save_stack+0x3c/0x68
[   25.849888]  kasan_record_aux_stack+0xb4/0xc8
[   25.850008]  __call_rcu_common.constprop.0+0x70/0x8b0
[   25.850343]  call_rcu+0x18/0x30
[   25.850825]  rcu_uaf+0x14c/0x2d8
[   25.850918]  kunit_try_run_case+0x170/0x3f0
[   25.851018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.851127]  kthread+0x328/0x630
[   25.851823]  ret_from_fork+0x10/0x20
[   25.851975] 
[   25.852436] The buggy address belongs to the object at fff00000c7739240
[   25.852436]  which belongs to the cache kmalloc-32 of size 32
[   25.852924] The buggy address is located 0 bytes inside of
[   25.852924]  freed 32-byte region [fff00000c7739240, fff00000c7739260)
[   25.853501] 
[   25.853744] The buggy address belongs to the physical page:
[   25.853824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107739
[   25.854423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.854575] page_type: f5(slab)
[   25.854843] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.854972] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.855103] page dumped because: kasan: bad access detected
[   25.855320] 
[   25.855479] Memory state around the buggy address:
[   25.855677]  fff00000c7739100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.855800]  fff00000c7739180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   25.855974] >fff00000c7739200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.856472]                                            ^
[   25.856894]  fff00000c7739280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.857394]  fff00000c7739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.857500] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure Automatically assigned
[   25.585970] ==================================================================
[   25.586091] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   25.586199] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196
[   25.586315] 
[   25.586403] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.588031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.588115] Hardware name: linux,dummy-virt (DT)
[   25.588201] Call trace:
[   25.588258]  show_stack+0x20/0x38 (C)
[   25.588419]  dump_stack_lvl+0x8c/0xd0
[   25.588550]  print_report+0x118/0x608
[   25.588672]  kasan_report+0xdc/0x128
[   25.588796]  __kasan_check_byte+0x54/0x70
[   25.588917]  ksize+0x30/0x88
[   25.589021]  ksize_uaf+0x168/0x5f8
[   25.589124]  kunit_try_run_case+0x170/0x3f0
[   25.589238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.589405]  kthread+0x328/0x630
[   25.589697]  ret_from_fork+0x10/0x20
[   25.590018] 
[   25.591202] Allocated by task 196:
[   25.591283]  kasan_save_stack+0x3c/0x68
[   25.595237]  kasan_save_track+0x20/0x40
[   25.595384]  kasan_save_alloc_info+0x40/0x58
[   25.595603]  __kasan_kmalloc+0xd4/0xd8
[   25.595733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.597372]  ksize_uaf+0xb8/0x5f8
[   25.597524]  kunit_try_run_case+0x170/0x3f0
[   25.597638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.597760]  kthread+0x328/0x630
[   25.597889]  ret_from_fork+0x10/0x20
[   25.598478] 
[   25.598534] Freed by task 196:
[   25.598630]  kasan_save_stack+0x3c/0x68
[   25.598738]  kasan_save_track+0x20/0x40
[   25.598846]  kasan_save_free_info+0x4c/0x78
[   25.598953]  __kasan_slab_free+0x6c/0x98
[   25.599060]  kfree+0x214/0x3c8
[   25.599144]  ksize_uaf+0x11c/0x5f8
[   25.599240]  kunit_try_run_case+0x170/0x3f0
[   25.599367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.599480]  kthread+0x328/0x630
[   25.599567]  ret_from_fork+0x10/0x20
[   25.599668] 
[   25.599718] The buggy address belongs to the object at fff00000c6419800
[   25.599718]  which belongs to the cache kmalloc-128 of size 128
[   25.599883] The buggy address is located 0 bytes inside of
[   25.599883]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.600042] 
[   25.600309] The buggy address belongs to the physical page:
[   25.600409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.601731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.601970] page_type: f5(slab)
[   25.602071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.602212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.602325] page dumped because: kasan: bad access detected
[   25.602428] 
[   25.602491] Memory state around the buggy address:
[   25.602573]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.602679]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.602789] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.603758]                    ^
[   25.603988]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604117]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604228] ==================================================================
[   25.607539] ==================================================================
[   25.607651] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   25.607756] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196
[   25.608014] 
[   25.608124] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.608363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.608563] Hardware name: linux,dummy-virt (DT)
[   25.608675] Call trace:
[   25.608822]  show_stack+0x20/0x38 (C)
[   25.609154]  dump_stack_lvl+0x8c/0xd0
[   25.609410]  print_report+0x118/0x608
[   25.609617]  kasan_report+0xdc/0x128
[   25.609765]  __asan_report_load1_noabort+0x20/0x30
[   25.610049]  ksize_uaf+0x598/0x5f8
[   25.610235]  kunit_try_run_case+0x170/0x3f0
[   25.610395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.610553]  kthread+0x328/0x630
[   25.610774]  ret_from_fork+0x10/0x20
[   25.610967] 
[   25.611430] Allocated by task 196:
[   25.611765]  kasan_save_stack+0x3c/0x68
[   25.612350]  kasan_save_track+0x20/0x40
[   25.612723]  kasan_save_alloc_info+0x40/0x58
[   25.613237]  __kasan_kmalloc+0xd4/0xd8
[   25.613669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.613844]  ksize_uaf+0xb8/0x5f8
[   25.613931]  kunit_try_run_case+0x170/0x3f0
[   25.614034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.614142]  kthread+0x328/0x630
[   25.614220]  ret_from_fork+0x10/0x20
[   25.615879] 
[   25.616325] Freed by task 196:
[   25.616574]  kasan_save_stack+0x3c/0x68
[   25.616672]  kasan_save_track+0x20/0x40
[   25.616768]  kasan_save_free_info+0x4c/0x78
[   25.616879]  __kasan_slab_free+0x6c/0x98
[   25.616978]  kfree+0x214/0x3c8
[   25.618537]  ksize_uaf+0x11c/0x5f8
[   25.618638]  kunit_try_run_case+0x170/0x3f0
[   25.619290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.619554]  kthread+0x328/0x630
[   25.619765]  ret_from_fork+0x10/0x20
[   25.620190] 
[   25.620403] The buggy address belongs to the object at fff00000c6419800
[   25.620403]  which belongs to the cache kmalloc-128 of size 128
[   25.620666] The buggy address is located 0 bytes inside of
[   25.620666]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.620834] 
[   25.621466] The buggy address belongs to the physical page:
[   25.622167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.622562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.622821] page_type: f5(slab)
[   25.623635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.623798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.624666] page dumped because: kasan: bad access detected
[   25.624762] 
[   25.624832] Memory state around the buggy address:
[   25.624907]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.625278]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.625517] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.625639]                    ^
[   25.626032]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.626138]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.626238] ==================================================================
[   25.631790] ==================================================================
[   25.632512] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   25.633629] Read of size 1 at addr fff00000c6419878 by task kunit_try_catch/196
[   25.633735] 
[   25.633803] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.633912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.633947] Hardware name: linux,dummy-virt (DT)
[   25.633987] Call trace:
[   25.634017]  show_stack+0x20/0x38 (C)
[   25.634080]  dump_stack_lvl+0x8c/0xd0
[   25.634138]  print_report+0x118/0x608
[   25.634197]  kasan_report+0xdc/0x128
[   25.634252]  __asan_report_load1_noabort+0x20/0x30
[   25.634311]  ksize_uaf+0x544/0x5f8
[   25.634621]  kunit_try_run_case+0x170/0x3f0
[   25.634766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.634934]  kthread+0x328/0x630
[   25.635249]  ret_from_fork+0x10/0x20
[   25.635907] 
[   25.636010] Allocated by task 196:
[   25.636436]  kasan_save_stack+0x3c/0x68
[   25.636836]  kasan_save_track+0x20/0x40
[   25.636948]  kasan_save_alloc_info+0x40/0x58
[   25.637051]  __kasan_kmalloc+0xd4/0xd8
[   25.637179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.637323]  ksize_uaf+0xb8/0x5f8
[   25.637577]  kunit_try_run_case+0x170/0x3f0
[   25.637681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.637828]  kthread+0x328/0x630
[   25.637988]  ret_from_fork+0x10/0x20
[   25.638092] 
[   25.638253] Freed by task 196:
[   25.638323]  kasan_save_stack+0x3c/0x68
[   25.638440]  kasan_save_track+0x20/0x40
[   25.638537]  kasan_save_free_info+0x4c/0x78
[   25.638647]  __kasan_slab_free+0x6c/0x98
[   25.638886]  kfree+0x214/0x3c8
[   25.639033]  ksize_uaf+0x11c/0x5f8
[   25.639118]  kunit_try_run_case+0x170/0x3f0
[   25.639221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.639585]  kthread+0x328/0x630
[   25.639695]  ret_from_fork+0x10/0x20
[   25.640123] 
[   25.640419] The buggy address belongs to the object at fff00000c6419800
[   25.640419]  which belongs to the cache kmalloc-128 of size 128
[   25.640726] The buggy address is located 120 bytes inside of
[   25.640726]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.640898] 
[   25.640950] The buggy address belongs to the physical page:
[   25.641033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.641161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.641683] page_type: f5(slab)
[   25.641885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.642107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.642219] page dumped because: kasan: bad access detected
[   25.642467] 
[   25.642547] Memory state around the buggy address:
[   25.642866]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.642984]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643264] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.643425]                                                                 ^
[   25.643538]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643646]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure Automatically assigned
[   25.538275] ==================================================================
[   25.538433] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.538569] Read of size 1 at addr fff00000c6419773 by task kunit_try_catch/194
[   25.538709] 
[   25.538880] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.539776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.539852] Hardware name: linux,dummy-virt (DT)
[   25.539946] Call trace:
[   25.540026]  show_stack+0x20/0x38 (C)
[   25.540164]  dump_stack_lvl+0x8c/0xd0
[   25.540552]  print_report+0x118/0x608
[   25.540896]  kasan_report+0xdc/0x128
[   25.541019]  __asan_report_load1_noabort+0x20/0x30
[   25.541140]  ksize_unpoisons_memory+0x628/0x740
[   25.541268]  kunit_try_run_case+0x170/0x3f0
[   25.541428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.541567]  kthread+0x328/0x630
[   25.541681]  ret_from_fork+0x10/0x20
[   25.541798] 
[   25.541843] Allocated by task 194:
[   25.541930]  kasan_save_stack+0x3c/0x68
[   25.542050]  kasan_save_track+0x20/0x40
[   25.542169]  kasan_save_alloc_info+0x40/0x58
[   25.542497]  __kasan_kmalloc+0xd4/0xd8
[   25.542951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.543190]  ksize_unpoisons_memory+0xc0/0x740
[   25.543304]  kunit_try_run_case+0x170/0x3f0
[   25.543427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.543561]  kthread+0x328/0x630
[   25.543664]  ret_from_fork+0x10/0x20
[   25.544007] 
[   25.544278] The buggy address belongs to the object at fff00000c6419700
[   25.544278]  which belongs to the cache kmalloc-128 of size 128
[   25.544437] The buggy address is located 0 bytes to the right of
[   25.544437]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.545061] 
[   25.545197] The buggy address belongs to the physical page:
[   25.545271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.545447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.545560] page_type: f5(slab)
[   25.545651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.545776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.545871] page dumped because: kasan: bad access detected
[   25.545945] 
[   25.546012] Memory state around the buggy address:
[   25.546088]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.546194]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546301] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.546415]                                                              ^
[   25.546509]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546615]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546732] ==================================================================
[   25.558931] ==================================================================
[   25.559143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.559349] Read of size 1 at addr fff00000c641977f by task kunit_try_catch/194
[   25.559476] 
[   25.559541] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.559737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.559804] Hardware name: linux,dummy-virt (DT)
[   25.560361] Call trace:
[   25.560450]  show_stack+0x20/0x38 (C)
[   25.560577]  dump_stack_lvl+0x8c/0xd0
[   25.560804]  print_report+0x118/0x608
[   25.561065]  kasan_report+0xdc/0x128
[   25.561350]  __asan_report_load1_noabort+0x20/0x30
[   25.561937]  ksize_unpoisons_memory+0x690/0x740
[   25.562088]  kunit_try_run_case+0x170/0x3f0
[   25.562210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.562360]  kthread+0x328/0x630
[   25.562549]  ret_from_fork+0x10/0x20
[   25.563269] 
[   25.563423] Allocated by task 194:
[   25.563847]  kasan_save_stack+0x3c/0x68
[   25.563959]  kasan_save_track+0x20/0x40
[   25.564083]  kasan_save_alloc_info+0x40/0x58
[   25.564616]  __kasan_kmalloc+0xd4/0xd8
[   25.564959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.565076]  ksize_unpoisons_memory+0xc0/0x740
[   25.565175]  kunit_try_run_case+0x170/0x3f0
[   25.565858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.566113]  kthread+0x328/0x630
[   25.566552]  ret_from_fork+0x10/0x20
[   25.566926] 
[   25.567417] The buggy address belongs to the object at fff00000c6419700
[   25.567417]  which belongs to the cache kmalloc-128 of size 128
[   25.567600] The buggy address is located 12 bytes to the right of
[   25.567600]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.568378] 
[   25.568442] The buggy address belongs to the physical page:
[   25.568483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.568549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.568666] page_type: f5(slab)
[   25.568715] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.568781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.568832] page dumped because: kasan: bad access detected
[   25.568872] 
[   25.568893] Memory state around the buggy address:
[   25.568932]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.568991]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569047] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.569095]                                                                 ^
[   25.569145]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569203]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569254] ==================================================================
[   25.548566] ==================================================================
[   25.548688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.548881] Read of size 1 at addr fff00000c6419778 by task kunit_try_catch/194
[   25.549433] 
[   25.549650] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.550179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.550440] Hardware name: linux,dummy-virt (DT)
[   25.550544] Call trace:
[   25.550596]  show_stack+0x20/0x38 (C)
[   25.550714]  dump_stack_lvl+0x8c/0xd0
[   25.551193]  print_report+0x118/0x608
[   25.551592]  kasan_report+0xdc/0x128
[   25.551729]  __asan_report_load1_noabort+0x20/0x30
[   25.551918]  ksize_unpoisons_memory+0x618/0x740
[   25.551998]  kunit_try_run_case+0x170/0x3f0
[   25.552059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.552182]  kthread+0x328/0x630
[   25.552240]  ret_from_fork+0x10/0x20
[   25.552301] 
[   25.552323] Allocated by task 194:
[   25.552469]  kasan_save_stack+0x3c/0x68
[   25.552631]  kasan_save_track+0x20/0x40
[   25.552831]  kasan_save_alloc_info+0x40/0x58
[   25.552944]  __kasan_kmalloc+0xd4/0xd8
[   25.553043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.553216]  ksize_unpoisons_memory+0xc0/0x740
[   25.553449]  kunit_try_run_case+0x170/0x3f0
[   25.553581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.553883]  kthread+0x328/0x630
[   25.554103]  ret_from_fork+0x10/0x20
[   25.554194] 
[   25.554293] The buggy address belongs to the object at fff00000c6419700
[   25.554293]  which belongs to the cache kmalloc-128 of size 128
[   25.555046] The buggy address is located 5 bytes to the right of
[   25.555046]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.555223] 
[   25.555278] The buggy address belongs to the physical page:
[   25.555377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.555687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.555828] page_type: f5(slab)
[   25.555966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.556090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.556242] page dumped because: kasan: bad access detected
[   25.556348] 
[   25.556424] Memory state around the buggy address:
[   25.556549]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.556864]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556977] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.557125]                                                                 ^
[   25.557383]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557539]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure Automatically assigned
[   25.495124] ==================================================================
[   25.495258] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   25.495389] Free of addr fff00000c3fa5900 by task kunit_try_catch/192
[   25.495488] 
[   25.495551] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.495751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.495814] Hardware name: linux,dummy-virt (DT)
[   25.495896] Call trace:
[   25.495945]  show_stack+0x20/0x38 (C)
[   25.496058]  dump_stack_lvl+0x8c/0xd0
[   25.496168]  print_report+0x118/0x608
[   25.496280]  kasan_report_invalid_free+0xc0/0xe8
[   25.496781]  check_slab_allocation+0xd4/0x108
[   25.496976]  __kasan_slab_pre_free+0x2c/0x48
[   25.497116]  kfree+0xe8/0x3c8
[   25.497633]  kfree_sensitive+0x3c/0xb0
[   25.497762]  kmalloc_double_kzfree+0x168/0x308
[   25.497895]  kunit_try_run_case+0x170/0x3f0
[   25.498085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.498318]  kthread+0x328/0x630
[   25.498484]  ret_from_fork+0x10/0x20
[   25.498775] 
[   25.498824] Allocated by task 192:
[   25.498895]  kasan_save_stack+0x3c/0x68
[   25.498997]  kasan_save_track+0x20/0x40
[   25.499160]  kasan_save_alloc_info+0x40/0x58
[   25.499274]  __kasan_kmalloc+0xd4/0xd8
[   25.499554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.499682]  kmalloc_double_kzfree+0xb8/0x308
[   25.499800]  kunit_try_run_case+0x170/0x3f0
[   25.500070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.500187]  kthread+0x328/0x630
[   25.500419]  ret_from_fork+0x10/0x20
[   25.500533] 
[   25.500984] Freed by task 192:
[   25.501068]  kasan_save_stack+0x3c/0x68
[   25.501174]  kasan_save_track+0x20/0x40
[   25.501272]  kasan_save_free_info+0x4c/0x78
[   25.501425]  __kasan_slab_free+0x6c/0x98
[   25.501619]  kfree+0x214/0x3c8
[   25.501761]  kfree_sensitive+0x80/0xb0
[   25.501873]  kmalloc_double_kzfree+0x11c/0x308
[   25.502136]  kunit_try_run_case+0x170/0x3f0
[   25.502237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.502369]  kthread+0x328/0x630
[   25.502465]  ret_from_fork+0x10/0x20
[   25.502689] 
[   25.502736] The buggy address belongs to the object at fff00000c3fa5900
[   25.502736]  which belongs to the cache kmalloc-16 of size 16
[   25.502874] The buggy address is located 0 bytes inside of
[   25.502874]  16-byte region [fff00000c3fa5900, fff00000c3fa5910)
[   25.503050] 
[   25.503178] The buggy address belongs to the physical page:
[   25.503357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   25.503484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.503617] page_type: f5(slab)
[   25.503717] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.504123] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.504247] page dumped because: kasan: bad access detected
[   25.504350] 
[   25.504393] Memory state around the buggy address:
[   25.504571]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.504683]  fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.504870] >fff00000c3fa5900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.505169]                    ^
[   25.505255]  fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.505498]  fff00000c3fa5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.505639] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure Automatically assigned
[   25.478902] ==================================================================
[   25.479018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   25.479128] Read of size 1 at addr fff00000c3fa5900 by task kunit_try_catch/192
[   25.479244] 
[   25.479312] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.480827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.481038] Hardware name: linux,dummy-virt (DT)
[   25.481265] Call trace:
[   25.481466]  show_stack+0x20/0x38 (C)
[   25.481626]  dump_stack_lvl+0x8c/0xd0
[   25.481784]  print_report+0x118/0x608
[   25.481955]  kasan_report+0xdc/0x128
[   25.482242]  __kasan_check_byte+0x54/0x70
[   25.482441]  kfree_sensitive+0x30/0xb0
[   25.482776]  kmalloc_double_kzfree+0x168/0x308
[   25.482933]  kunit_try_run_case+0x170/0x3f0
[   25.483076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.483395]  kthread+0x328/0x630
[   25.483560]  ret_from_fork+0x10/0x20
[   25.483737] 
[   25.483783] Allocated by task 192:
[   25.483904]  kasan_save_stack+0x3c/0x68
[   25.484020]  kasan_save_track+0x20/0x40
[   25.484240]  kasan_save_alloc_info+0x40/0x58
[   25.484416]  __kasan_kmalloc+0xd4/0xd8
[   25.484522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.484628]  kmalloc_double_kzfree+0xb8/0x308
[   25.484787]  kunit_try_run_case+0x170/0x3f0
[   25.484944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.485070]  kthread+0x328/0x630
[   25.485155]  ret_from_fork+0x10/0x20
[   25.485274] 
[   25.485423] Freed by task 192:
[   25.485495]  kasan_save_stack+0x3c/0x68
[   25.485615]  kasan_save_track+0x20/0x40
[   25.485807]  kasan_save_free_info+0x4c/0x78
[   25.485982]  __kasan_slab_free+0x6c/0x98
[   25.486102]  kfree+0x214/0x3c8
[   25.486285]  kfree_sensitive+0x80/0xb0
[   25.486482]  kmalloc_double_kzfree+0x11c/0x308
[   25.486618]  kunit_try_run_case+0x170/0x3f0
[   25.486778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.486986]  kthread+0x328/0x630
[   25.487116]  ret_from_fork+0x10/0x20
[   25.487212] 
[   25.487260] The buggy address belongs to the object at fff00000c3fa5900
[   25.487260]  which belongs to the cache kmalloc-16 of size 16
[   25.487416] The buggy address is located 0 bytes inside of
[   25.487416]  freed 16-byte region [fff00000c3fa5900, fff00000c3fa5910)
[   25.487566] 
[   25.487636] The buggy address belongs to the physical page:
[   25.487720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   25.487928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.488059] page_type: f5(slab)
[   25.488279] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.488495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.488710] page dumped because: kasan: bad access detected
[   25.488832] 
[   25.488923] Memory state around the buggy address:
[   25.489017]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.489216]  fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.489577] >fff00000c3fa5900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.489684]                    ^
[   25.489759]  fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.490300]  fff00000c3fa5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.490446] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure Automatically assigned
[   25.442221] ==================================================================
[   25.442357] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   25.442465] Read of size 1 at addr fff00000c776e3a8 by task kunit_try_catch/188
[   25.442588] 
[   25.442667] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.442897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.442974] Hardware name: linux,dummy-virt (DT)
[   25.443066] Call trace:
[   25.443125]  show_stack+0x20/0x38 (C)
[   25.443702]  dump_stack_lvl+0x8c/0xd0
[   25.443905]  print_report+0x118/0x608
[   25.444052]  kasan_report+0xdc/0x128
[   25.444179]  __asan_report_load1_noabort+0x20/0x30
[   25.444322]  kmalloc_uaf2+0x3f4/0x468
[   25.444669]  kunit_try_run_case+0x170/0x3f0
[   25.446374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.446458]  kthread+0x328/0x630
[   25.446519]  ret_from_fork+0x10/0x20
[   25.446624] 
[   25.446650] Allocated by task 188:
[   25.446688]  kasan_save_stack+0x3c/0x68
[   25.446738]  kasan_save_track+0x20/0x40
[   25.446785]  kasan_save_alloc_info+0x40/0x58
[   25.446835]  __kasan_kmalloc+0xd4/0xd8
[   25.446882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.446933]  kmalloc_uaf2+0xc4/0x468
[   25.446975]  kunit_try_run_case+0x170/0x3f0
[   25.447024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.447079]  kthread+0x328/0x630
[   25.447118]  ret_from_fork+0x10/0x20
[   25.447162] 
[   25.447185] Freed by task 188:
[   25.447217]  kasan_save_stack+0x3c/0x68
[   25.447265]  kasan_save_track+0x20/0x40
[   25.447310]  kasan_save_free_info+0x4c/0x78
[   25.447764]  __kasan_slab_free+0x6c/0x98
[   25.447876]  kfree+0x214/0x3c8
[   25.447971]  kmalloc_uaf2+0x134/0x468
[   25.448070]  kunit_try_run_case+0x170/0x3f0
[   25.448173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.448305]  kthread+0x328/0x630
[   25.448426]  ret_from_fork+0x10/0x20
[   25.448874] 
[   25.449033] The buggy address belongs to the object at fff00000c776e380
[   25.449033]  which belongs to the cache kmalloc-64 of size 64
[   25.449207] The buggy address is located 40 bytes inside of
[   25.449207]  freed 64-byte region [fff00000c776e380, fff00000c776e3c0)
[   25.449381] 
[   25.449464] The buggy address belongs to the physical page:
[   25.449576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776e
[   25.449909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.450092] page_type: f5(slab)
[   25.450189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.450313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.450440] page dumped because: kasan: bad access detected
[   25.450530] 
[   25.450583] Memory state around the buggy address:
[   25.451182]  fff00000c776e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.451491]  fff00000c776e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.451614] >fff00000c776e380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.451717]                                   ^
[   25.451819]  fff00000c776e400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   25.452128]  fff00000c776e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.452412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure Automatically assigned
[   25.410777] ==================================================================
[   25.411040] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   25.411190] Write of size 33 at addr fff00000c776e200 by task kunit_try_catch/186
[   25.411430] 
[   25.411558] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.411788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.411941] Hardware name: linux,dummy-virt (DT)
[   25.412034] Call trace:
[   25.412131]  show_stack+0x20/0x38 (C)
[   25.412254]  dump_stack_lvl+0x8c/0xd0
[   25.412387]  print_report+0x118/0x608
[   25.412505]  kasan_report+0xdc/0x128
[   25.412622]  kasan_check_range+0x100/0x1a8
[   25.413078]  __asan_memset+0x34/0x78
[   25.413287]  kmalloc_uaf_memset+0x170/0x310
[   25.413849]  kunit_try_run_case+0x170/0x3f0
[   25.413984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.414116]  kthread+0x328/0x630
[   25.414223]  ret_from_fork+0x10/0x20
[   25.414434] 
[   25.414549] Allocated by task 186:
[   25.414623]  kasan_save_stack+0x3c/0x68
[   25.414727]  kasan_save_track+0x20/0x40
[   25.414988]  kasan_save_alloc_info+0x40/0x58
[   25.415245]  __kasan_kmalloc+0xd4/0xd8
[   25.415357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.415467]  kmalloc_uaf_memset+0xb8/0x310
[   25.415937]  kunit_try_run_case+0x170/0x3f0
[   25.416129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.416347]  kthread+0x328/0x630
[   25.416850]  ret_from_fork+0x10/0x20
[   25.417314] 
[   25.417381] Freed by task 186:
[   25.417485]  kasan_save_stack+0x3c/0x68
[   25.419889]  kasan_save_track+0x20/0x40
[   25.420000]  kasan_save_free_info+0x4c/0x78
[   25.420102]  __kasan_slab_free+0x6c/0x98
[   25.420202]  kfree+0x214/0x3c8
[   25.420946]  kmalloc_uaf_memset+0x11c/0x310
[   25.421213]  kunit_try_run_case+0x170/0x3f0
[   25.421344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.421469]  kthread+0x328/0x630
[   25.421707]  ret_from_fork+0x10/0x20
[   25.421800] 
[   25.421884] The buggy address belongs to the object at fff00000c776e200
[   25.421884]  which belongs to the cache kmalloc-64 of size 64
[   25.422274] The buggy address is located 0 bytes inside of
[   25.422274]  freed 64-byte region [fff00000c776e200, fff00000c776e240)
[   25.422684] 
[   25.422738] The buggy address belongs to the physical page:
[   25.422809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776e
[   25.422932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.423080] page_type: f5(slab)
[   25.423874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.424389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.424523] page dumped because: kasan: bad access detected
[   25.424602] 
[   25.424655] Memory state around the buggy address:
[   25.424741]  fff00000c776e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.425021]  fff00000c776e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.425201] >fff00000c776e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.425786]                    ^
[   25.425932]  fff00000c776e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.426078]  fff00000c776e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.426209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure Automatically assigned
[   25.388556] ==================================================================
[   25.388635] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   25.388697] Read of size 1 at addr fff00000c3fa58e8 by task kunit_try_catch/184
[   25.388759] 
[   25.388799] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.388902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.388936] Hardware name: linux,dummy-virt (DT)
[   25.388976] Call trace:
[   25.389003]  show_stack+0x20/0x38 (C)
[   25.389063]  dump_stack_lvl+0x8c/0xd0
[   25.389125]  print_report+0x118/0x608
[   25.389184]  kasan_report+0xdc/0x128
[   25.389242]  __asan_report_load1_noabort+0x20/0x30
[   25.389316]  kmalloc_uaf+0x300/0x338
[   25.389401]  kunit_try_run_case+0x170/0x3f0
[   25.389461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.389531]  kthread+0x328/0x630
[   25.389582]  ret_from_fork+0x10/0x20
[   25.389639] 
[   25.389662] Allocated by task 184:
[   25.389697]  kasan_save_stack+0x3c/0x68
[   25.389749]  kasan_save_track+0x20/0x40
[   25.389799]  kasan_save_alloc_info+0x40/0x58
[   25.389848]  __kasan_kmalloc+0xd4/0xd8
[   25.389896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.389943]  kmalloc_uaf+0xb8/0x338
[   25.389987]  kunit_try_run_case+0x170/0x3f0
[   25.390034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.390090]  kthread+0x328/0x630
[   25.390131]  ret_from_fork+0x10/0x20
[   25.390177] 
[   25.390201] Freed by task 184:
[   25.390233]  kasan_save_stack+0x3c/0x68
[   25.390282]  kasan_save_track+0x20/0x40
[   25.390506]  kasan_save_free_info+0x4c/0x78
[   25.390630]  __kasan_slab_free+0x6c/0x98
[   25.390909]  kfree+0x214/0x3c8
[   25.391157]  kmalloc_uaf+0x11c/0x338
[   25.391288]  kunit_try_run_case+0x170/0x3f0
[   25.391402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.391513]  kthread+0x328/0x630
[   25.391591]  ret_from_fork+0x10/0x20
[   25.391689] 
[   25.391810] The buggy address belongs to the object at fff00000c3fa58e0
[   25.391810]  which belongs to the cache kmalloc-16 of size 16
[   25.392020] The buggy address is located 8 bytes inside of
[   25.392020]  freed 16-byte region [fff00000c3fa58e0, fff00000c3fa58f0)
[   25.392267] 
[   25.392376] The buggy address belongs to the physical page:
[   25.392470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   25.392631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.392843] page_type: f5(slab)
[   25.393083] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.393782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.393994] page dumped because: kasan: bad access detected
[   25.394384] 
[   25.394506] Memory state around the buggy address:
[   25.394586]  fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   25.394850]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.395490] >fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.395906]                                                           ^
[   25.396101]  fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.396240]  fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.396490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure Automatically assigned
[   25.365427] ==================================================================
[   25.365548] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.365660] Read of size 64 at addr fff00000c7781f04 by task kunit_try_catch/182
[   25.365780] 
[   25.365849] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.366049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.366113] Hardware name: linux,dummy-virt (DT)
[   25.366187] Call trace:
[   25.366236]  show_stack+0x20/0x38 (C)
[   25.366449]  dump_stack_lvl+0x8c/0xd0
[   25.366588]  print_report+0x118/0x608
[   25.366733]  kasan_report+0xdc/0x128
[   25.366868]  kasan_check_range+0x100/0x1a8
[   25.367013]  __asan_memmove+0x3c/0x98
[   25.367142]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.367291]  kunit_try_run_case+0x170/0x3f0
[   25.367454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.367772]  kthread+0x328/0x630
[   25.367940]  ret_from_fork+0x10/0x20
[   25.368077] 
[   25.368137] Allocated by task 182:
[   25.368216]  kasan_save_stack+0x3c/0x68
[   25.368346]  kasan_save_track+0x20/0x40
[   25.368453]  kasan_save_alloc_info+0x40/0x58
[   25.368569]  __kasan_kmalloc+0xd4/0xd8
[   25.368764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.369085]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   25.369226]  kunit_try_run_case+0x170/0x3f0
[   25.369473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.369671]  kthread+0x328/0x630
[   25.369931]  ret_from_fork+0x10/0x20
[   25.370066] 
[   25.370112] The buggy address belongs to the object at fff00000c7781f00
[   25.370112]  which belongs to the cache kmalloc-64 of size 64
[   25.370253] The buggy address is located 4 bytes inside of
[   25.370253]  allocated 64-byte region [fff00000c7781f00, fff00000c7781f40)
[   25.370567] 
[   25.370629] The buggy address belongs to the physical page:
[   25.370717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781
[   25.370858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.371877] page_type: f5(slab)
[   25.372150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.372231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.372283] page dumped because: kasan: bad access detected
[   25.372323] 
[   25.372370] Memory state around the buggy address:
[   25.372413]  fff00000c7781e00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.372470]  fff00000c7781e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.372524] >fff00000c7781f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.372573]                                            ^
[   25.372616]  fff00000c7781f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.372670]  fff00000c7782000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   25.372717] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure Automatically assigned
[   25.334947] ==================================================================
[   25.335101] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   25.335216] Read of size 18446744073709551614 at addr fff00000c7781d04 by task kunit_try_catch/180
[   25.337120] 
[   25.337212] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.337428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.337465] Hardware name: linux,dummy-virt (DT)
[   25.337509] Call trace:
[   25.337537]  show_stack+0x20/0x38 (C)
[   25.337601]  dump_stack_lvl+0x8c/0xd0
[   25.337661]  print_report+0x118/0x608
[   25.337720]  kasan_report+0xdc/0x128
[   25.337776]  kasan_check_range+0x100/0x1a8
[   25.337835]  __asan_memmove+0x3c/0x98
[   25.337887]  kmalloc_memmove_negative_size+0x154/0x2e0
[   25.337948]  kunit_try_run_case+0x170/0x3f0
[   25.338009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.338298]  kthread+0x328/0x630
[   25.338412]  ret_from_fork+0x10/0x20
[   25.338612] 
[   25.338674] Allocated by task 180:
[   25.339033]  kasan_save_stack+0x3c/0x68
[   25.339472]  kasan_save_track+0x20/0x40
[   25.340291]  kasan_save_alloc_info+0x40/0x58
[   25.340461]  __kasan_kmalloc+0xd4/0xd8
[   25.340588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.340687]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   25.340822]  kunit_try_run_case+0x170/0x3f0
[   25.341306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.341483]  kthread+0x328/0x630
[   25.341611]  ret_from_fork+0x10/0x20
[   25.341884] 
[   25.341935] The buggy address belongs to the object at fff00000c7781d00
[   25.341935]  which belongs to the cache kmalloc-64 of size 64
[   25.342119] The buggy address is located 4 bytes inside of
[   25.342119]  64-byte region [fff00000c7781d00, fff00000c7781d40)
[   25.342304] 
[   25.343478] The buggy address belongs to the physical page:
[   25.343560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781
[   25.343706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.343822] page_type: f5(slab)
[   25.343930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.344070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.344179] page dumped because: kasan: bad access detected
[   25.344732] 
[   25.344797] Memory state around the buggy address:
[   25.345006]  fff00000c7781c00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   25.345190]  fff00000c7781c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.345323] >fff00000c7781d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.345455]                    ^
[   25.345738]  fff00000c7781d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.345931]  fff00000c7781e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.346431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure Automatically assigned
[   25.300721] ==================================================================
[   25.301050] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   25.301158] Write of size 16 at addr fff00000c6419669 by task kunit_try_catch/178
[   25.301408] 
[   25.301478] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.301672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.301735] Hardware name: linux,dummy-virt (DT)
[   25.301811] Call trace:
[   25.301860]  show_stack+0x20/0x38 (C)
[   25.301971]  dump_stack_lvl+0x8c/0xd0
[   25.302085]  print_report+0x118/0x608
[   25.302195]  kasan_report+0xdc/0x128
[   25.302301]  kasan_check_range+0x100/0x1a8
[   25.302458]  __asan_memset+0x34/0x78
[   25.302637]  kmalloc_oob_memset_16+0x150/0x2f8
[   25.303084]  kunit_try_run_case+0x170/0x3f0
[   25.303550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.303921]  kthread+0x328/0x630
[   25.304543]  ret_from_fork+0x10/0x20
[   25.304804] 
[   25.304855] Allocated by task 178:
[   25.305021]  kasan_save_stack+0x3c/0x68
[   25.305191]  kasan_save_track+0x20/0x40
[   25.305357]  kasan_save_alloc_info+0x40/0x58
[   25.305529]  __kasan_kmalloc+0xd4/0xd8
[   25.305758]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.305870]  kmalloc_oob_memset_16+0xb0/0x2f8
[   25.305975]  kunit_try_run_case+0x170/0x3f0
[   25.306296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.306436]  kthread+0x328/0x630
[   25.306522]  ret_from_fork+0x10/0x20
[   25.306627] 
[   25.306745] The buggy address belongs to the object at fff00000c6419600
[   25.306745]  which belongs to the cache kmalloc-128 of size 128
[   25.306984] The buggy address is located 105 bytes inside of
[   25.306984]  allocated 120-byte region [fff00000c6419600, fff00000c6419678)
[   25.307291] 
[   25.307363] The buggy address belongs to the physical page:
[   25.307545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.307725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.307838] page_type: f5(slab)
[   25.307933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.308053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.308146] page dumped because: kasan: bad access detected
[   25.308234] 
[   25.308291] Memory state around the buggy address:
[   25.308495]  fff00000c6419500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.308813]  fff00000c6419580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.309118] >fff00000c6419600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.309477]                                                                 ^
[   25.309639]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.309761]  fff00000c6419700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.309869] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure Automatically assigned
[   25.266572] ==================================================================
[   25.266688] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   25.266851] Write of size 8 at addr fff00000c6419571 by task kunit_try_catch/176
[   25.266977] 
[   25.267825] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.268069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.268218] Hardware name: linux,dummy-virt (DT)
[   25.268297] Call trace:
[   25.268588]  show_stack+0x20/0x38 (C)
[   25.268798]  dump_stack_lvl+0x8c/0xd0
[   25.269016]  print_report+0x118/0x608
[   25.269220]  kasan_report+0xdc/0x128
[   25.269609]  kasan_check_range+0x100/0x1a8
[   25.269909]  __asan_memset+0x34/0x78
[   25.270110]  kmalloc_oob_memset_8+0x150/0x2f8
[   25.270485]  kunit_try_run_case+0x170/0x3f0
[   25.270773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.270973]  kthread+0x328/0x630
[   25.271633]  ret_from_fork+0x10/0x20
[   25.271848] 
[   25.272322] Allocated by task 176:
[   25.272420]  kasan_save_stack+0x3c/0x68
[   25.272538]  kasan_save_track+0x20/0x40
[   25.272630]  kasan_save_alloc_info+0x40/0x58
[   25.273307]  __kasan_kmalloc+0xd4/0xd8
[   25.273431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.273529]  kmalloc_oob_memset_8+0xb0/0x2f8
[   25.274339]  kunit_try_run_case+0x170/0x3f0
[   25.274636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.275446]  kthread+0x328/0x630
[   25.275541]  ret_from_fork+0x10/0x20
[   25.275647] 
[   25.275701] The buggy address belongs to the object at fff00000c6419500
[   25.275701]  which belongs to the cache kmalloc-128 of size 128
[   25.276541] The buggy address is located 113 bytes inside of
[   25.276541]  allocated 120-byte region [fff00000c6419500, fff00000c6419578)
[   25.277127] 
[   25.277240] The buggy address belongs to the physical page:
[   25.277428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.277556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.277692] page_type: f5(slab)
[   25.277915] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.278064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.278173] page dumped because: kasan: bad access detected
[   25.278519] 
[   25.278601] Memory state around the buggy address:
[   25.278749]  fff00000c6419400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.278944]  fff00000c6419480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.279102] >fff00000c6419500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.279204]                                                                 ^
[   25.279473]  fff00000c6419580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.279579]  fff00000c6419600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.279668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure Automatically assigned
[   25.236037] ==================================================================
[   25.236480] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.236644] Write of size 4 at addr fff00000c6419475 by task kunit_try_catch/174
[   25.236848] 
[   25.238001] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.238280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.238428] Hardware name: linux,dummy-virt (DT)
[   25.238672] Call trace:
[   25.238732]  show_stack+0x20/0x38 (C)
[   25.238848]  dump_stack_lvl+0x8c/0xd0
[   25.238961]  print_report+0x118/0x608
[   25.239110]  kasan_report+0xdc/0x128
[   25.239382]  kasan_check_range+0x100/0x1a8
[   25.239519]  __asan_memset+0x34/0x78
[   25.239648]  kmalloc_oob_memset_4+0x150/0x300
[   25.239868]  kunit_try_run_case+0x170/0x3f0
[   25.240867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.241245]  kthread+0x328/0x630
[   25.243379]  ret_from_fork+0x10/0x20
[   25.243459] 
[   25.243483] Allocated by task 174:
[   25.243518]  kasan_save_stack+0x3c/0x68
[   25.243615]  kasan_save_track+0x20/0x40
[   25.243671]  kasan_save_alloc_info+0x40/0x58
[   25.243723]  __kasan_kmalloc+0xd4/0xd8
[   25.243769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.243821]  kmalloc_oob_memset_4+0xb0/0x300
[   25.243897]  kunit_try_run_case+0x170/0x3f0
[   25.243951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.244008]  kthread+0x328/0x630
[   25.244048]  ret_from_fork+0x10/0x20
[   25.244093] 
[   25.244118] The buggy address belongs to the object at fff00000c6419400
[   25.244118]  which belongs to the cache kmalloc-128 of size 128
[   25.244188] The buggy address is located 117 bytes inside of
[   25.244188]  allocated 120-byte region [fff00000c6419400, fff00000c6419478)
[   25.244263] 
[   25.244287] The buggy address belongs to the physical page:
[   25.244324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.244510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.245008] page_type: f5(slab)
[   25.245110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.245593] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.245700] page dumped because: kasan: bad access detected
[   25.245775] 
[   25.245817] Memory state around the buggy address:
[   25.245899]  fff00000c6419300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.246009]  fff00000c6419380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.246153] >fff00000c6419400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.246260]                                                                 ^
[   25.246576]  fff00000c6419480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.246745]  fff00000c6419500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.247002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure Automatically assigned
[   25.210269] ==================================================================
[   25.210432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   25.210557] Write of size 2 at addr fff00000c6419377 by task kunit_try_catch/172
[   25.210744] 
[   25.210826] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.211341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.211432] Hardware name: linux,dummy-virt (DT)
[   25.211739] Call trace:
[   25.211854]  show_stack+0x20/0x38 (C)
[   25.211974]  dump_stack_lvl+0x8c/0xd0
[   25.212099]  print_report+0x118/0x608
[   25.212383]  kasan_report+0xdc/0x128
[   25.212609]  kasan_check_range+0x100/0x1a8
[   25.212770]  __asan_memset+0x34/0x78
[   25.212885]  kmalloc_oob_memset_2+0x150/0x2f8
[   25.213016]  kunit_try_run_case+0x170/0x3f0
[   25.213230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.213473]  kthread+0x328/0x630
[   25.213598]  ret_from_fork+0x10/0x20
[   25.213788] 
[   25.213860] Allocated by task 172:
[   25.214144]  kasan_save_stack+0x3c/0x68
[   25.214271]  kasan_save_track+0x20/0x40
[   25.214442]  kasan_save_alloc_info+0x40/0x58
[   25.214543]  __kasan_kmalloc+0xd4/0xd8
[   25.214649]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.214813]  kmalloc_oob_memset_2+0xb0/0x2f8
[   25.214950]  kunit_try_run_case+0x170/0x3f0
[   25.215098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.215399]  kthread+0x328/0x630
[   25.215518]  ret_from_fork+0x10/0x20
[   25.215781] 
[   25.215906] The buggy address belongs to the object at fff00000c6419300
[   25.215906]  which belongs to the cache kmalloc-128 of size 128
[   25.216106] The buggy address is located 119 bytes inside of
[   25.216106]  allocated 120-byte region [fff00000c6419300, fff00000c6419378)
[   25.216275] 
[   25.216534] The buggy address belongs to the physical page:
[   25.216636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.216761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.216890] page_type: f5(slab)
[   25.217093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.217220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.217379] page dumped because: kasan: bad access detected
[   25.217481] 
[   25.217599] Memory state around the buggy address:
[   25.217871]  fff00000c6419200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.218121]  fff00000c6419280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.218364] >fff00000c6419300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.218490]                                                                 ^
[   25.218617]  fff00000c6419380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.218721]  fff00000c6419400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.218812] ==================================================================
<8>[  426.158368] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure Automatically assigned
[   25.181582] ==================================================================
[   25.181704] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   25.181816] Write of size 128 at addr fff00000c6419200 by task kunit_try_catch/170
[   25.181934] 
[   25.182004] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.182202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.182351] Hardware name: linux,dummy-virt (DT)
[   25.182450] Call trace:
[   25.182514]  show_stack+0x20/0x38 (C)
[   25.182652]  dump_stack_lvl+0x8c/0xd0
[   25.182881]  print_report+0x118/0x608
[   25.183046]  kasan_report+0xdc/0x128
[   25.183258]  kasan_check_range+0x100/0x1a8
[   25.183530]  __asan_memset+0x34/0x78
[   25.183784]  kmalloc_oob_in_memset+0x144/0x2d0
[   25.184152]  kunit_try_run_case+0x170/0x3f0
[   25.184314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.184474]  kthread+0x328/0x630
[   25.184589]  ret_from_fork+0x10/0x20
[   25.184764] 
[   25.184906] Allocated by task 170:
[   25.185103]  kasan_save_stack+0x3c/0x68
[   25.185421]  kasan_save_track+0x20/0x40
[   25.185657]  kasan_save_alloc_info+0x40/0x58
[   25.185758]  __kasan_kmalloc+0xd4/0xd8
[   25.185846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.185944]  kmalloc_oob_in_memset+0xb0/0x2d0
[   25.186075]  kunit_try_run_case+0x170/0x3f0
[   25.186206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.186419]  kthread+0x328/0x630
[   25.186522]  ret_from_fork+0x10/0x20
[   25.186627] 
[   25.187080] The buggy address belongs to the object at fff00000c6419200
[   25.187080]  which belongs to the cache kmalloc-128 of size 128
[   25.187259] The buggy address is located 0 bytes inside of
[   25.187259]  allocated 120-byte region [fff00000c6419200, fff00000c6419278)
[   25.187448] 
[   25.187506] The buggy address belongs to the physical page:
[   25.187633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.187834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.187951] page_type: f5(slab)
[   25.188043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.188282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.188410] page dumped because: kasan: bad access detected
[   25.188486] 
[   25.188799] Memory state around the buggy address:
[   25.188881]  fff00000c6419100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.189236]  fff00000c6419180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.189485] >fff00000c6419200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.189774]                                                                 ^
[   25.190131]  fff00000c6419280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.190347]  fff00000c6419300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.190442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure Automatically assigned
[   25.143763] ==================================================================
[   25.143898] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   25.144007] Read of size 16 at addr fff00000c3fa58c0 by task kunit_try_catch/168
[   25.144124] 
[   25.144190] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.144428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.144510] Hardware name: linux,dummy-virt (DT)
[   25.144649] Call trace:
[   25.145824]  show_stack+0x20/0x38 (C)
[   25.145967]  dump_stack_lvl+0x8c/0xd0
[   25.146105]  print_report+0x118/0x608
[   25.146275]  kasan_report+0xdc/0x128
[   25.146430]  __asan_report_load16_noabort+0x20/0x30
[   25.146769]  kmalloc_uaf_16+0x3bc/0x438
[   25.146876]  kunit_try_run_case+0x170/0x3f0
[   25.146937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.147054]  kthread+0x328/0x630
[   25.147175]  ret_from_fork+0x10/0x20
[   25.147565] 
[   25.147622] Allocated by task 168:
[   25.147740]  kasan_save_stack+0x3c/0x68
[   25.147991]  kasan_save_track+0x20/0x40
[   25.148100]  kasan_save_alloc_info+0x40/0x58
[   25.148280]  __kasan_kmalloc+0xd4/0xd8
[   25.148628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.148860]  kmalloc_uaf_16+0x140/0x438
[   25.148949]  kunit_try_run_case+0x170/0x3f0
[   25.149813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.150190]  kthread+0x328/0x630
[   25.150671]  ret_from_fork+0x10/0x20
[   25.150991] 
[   25.151052] Freed by task 168:
[   25.151892]  kasan_save_stack+0x3c/0x68
[   25.151954]  kasan_save_track+0x20/0x40
[   25.152027]  kasan_save_free_info+0x4c/0x78
[   25.152195]  __kasan_slab_free+0x6c/0x98
[   25.152311]  kfree+0x214/0x3c8
[   25.152419]  kmalloc_uaf_16+0x190/0x438
[   25.152516]  kunit_try_run_case+0x170/0x3f0
[   25.153342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.154079]  kthread+0x328/0x630
[   25.154414]  ret_from_fork+0x10/0x20
[   25.154547] 
[   25.154602] The buggy address belongs to the object at fff00000c3fa58c0
[   25.154602]  which belongs to the cache kmalloc-16 of size 16
[   25.155290] The buggy address is located 0 bytes inside of
[   25.155290]  freed 16-byte region [fff00000c3fa58c0, fff00000c3fa58d0)
[   25.156542] 
[   25.156603] The buggy address belongs to the physical page:
[   25.156752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   25.156928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.157299] page_type: f5(slab)
[   25.158271] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.158879] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.158985] page dumped because: kasan: bad access detected
[   25.159354] 
[   25.159423] Memory state around the buggy address:
[   25.159521]  fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   25.159988]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.160743] >fff00000c3fa5880: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   25.160979]                                            ^
[   25.161073]  fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.161722]  fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.161856] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure Automatically assigned
[   25.121370] ==================================================================
[   25.121519] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   25.121695] Write of size 16 at addr fff00000c3fa5860 by task kunit_try_catch/166
[   25.121828] 
[   25.121909] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.122107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.122187] Hardware name: linux,dummy-virt (DT)
[   25.122408] Call trace:
[   25.122609]  show_stack+0x20/0x38 (C)
[   25.122840]  dump_stack_lvl+0x8c/0xd0
[   25.122965]  print_report+0x118/0x608
[   25.123101]  kasan_report+0xdc/0x128
[   25.123285]  __asan_report_store16_noabort+0x20/0x30
[   25.123488]  kmalloc_oob_16+0x3a0/0x3f8
[   25.123611]  kunit_try_run_case+0x170/0x3f0
[   25.123738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.123886]  kthread+0x328/0x630
[   25.124176]  ret_from_fork+0x10/0x20
[   25.124394] 
[   25.124467] Allocated by task 166:
[   25.124577]  kasan_save_stack+0x3c/0x68
[   25.124697]  kasan_save_track+0x20/0x40
[   25.124878]  kasan_save_alloc_info+0x40/0x58
[   25.125042]  __kasan_kmalloc+0xd4/0xd8
[   25.125224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.125466]  kmalloc_oob_16+0xb4/0x3f8
[   25.125628]  kunit_try_run_case+0x170/0x3f0
[   25.125890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.126174]  kthread+0x328/0x630
[   25.126261]  ret_from_fork+0x10/0x20
[   25.126400] 
[   25.126538] The buggy address belongs to the object at fff00000c3fa5860
[   25.126538]  which belongs to the cache kmalloc-16 of size 16
[   25.126723] The buggy address is located 0 bytes inside of
[   25.126723]  allocated 13-byte region [fff00000c3fa5860, fff00000c3fa586d)
[   25.126966] 
[   25.127077] The buggy address belongs to the physical page:
[   25.127179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   25.127881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.128100] page_type: f5(slab)
[   25.128198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.129152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.129261] page dumped because: kasan: bad access detected
[   25.129360] 
[   25.129465] Memory state around the buggy address:
[   25.129559]  fff00000c3fa5700: 00 05 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   25.129645]  fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   25.129729] >fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   25.129782]                                                           ^
[   25.129831]  fff00000c3fa5880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.129883]  fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.129928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure Automatically assigned
[   24.866296] ==================================================================
[   24.866430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   24.866690] Write of size 1 at addr fff00000c19db6da by task kunit_try_catch/158
[   24.867039] 
[   24.867121] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.867349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.867435] Hardware name: linux,dummy-virt (DT)
[   24.867529] Call trace:
[   24.867589]  show_stack+0x20/0x38 (C)
[   24.867926]  dump_stack_lvl+0x8c/0xd0
[   24.868096]  print_report+0x118/0x608
[   24.868313]  kasan_report+0xdc/0x128
[   24.868612]  __asan_report_store1_noabort+0x20/0x30
[   24.868773]  krealloc_less_oob_helper+0xa80/0xc50
[   24.868914]  krealloc_less_oob+0x20/0x38
[   24.869098]  kunit_try_run_case+0x170/0x3f0
[   24.869234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.869502]  kthread+0x328/0x630
[   24.869842]  ret_from_fork+0x10/0x20
[   24.870109] 
[   24.870155] Allocated by task 158:
[   24.870263]  kasan_save_stack+0x3c/0x68
[   24.870434]  kasan_save_track+0x20/0x40
[   24.870530]  kasan_save_alloc_info+0x40/0x58
[   24.870632]  __kasan_krealloc+0x118/0x178
[   24.870757]  krealloc_noprof+0x128/0x360
[   24.870949]  krealloc_less_oob_helper+0x168/0xc50
[   24.871112]  krealloc_less_oob+0x20/0x38
[   24.871206]  kunit_try_run_case+0x170/0x3f0
[   24.871298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.871429]  kthread+0x328/0x630
[   24.871526]  ret_from_fork+0x10/0x20
[   24.871630] 
[   24.871684] The buggy address belongs to the object at fff00000c19db600
[   24.871684]  which belongs to the cache kmalloc-256 of size 256
[   24.871847] The buggy address is located 17 bytes to the right of
[   24.871847]  allocated 201-byte region [fff00000c19db600, fff00000c19db6c9)
[   24.872112] 
[   24.872240] The buggy address belongs to the physical page:
[   24.872324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.872479] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.872602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.872844] page_type: f5(slab)
[   24.873004] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.873222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.873449] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.873574] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.873785] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.874149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.874294] page dumped because: kasan: bad access detected
[   24.874388] 
[   24.874436] Memory state around the buggy address:
[   24.874544]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.874756]  fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.875034] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.875272]                                                     ^
[   24.875991]  fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.876054]  fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.876101] ==================================================================
[   24.877908] ==================================================================
[   24.878007] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   24.878117] Write of size 1 at addr fff00000c19db6ea by task kunit_try_catch/158
[   24.878232] 
[   24.878298] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.878525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.878589] Hardware name: linux,dummy-virt (DT)
[   24.878675] Call trace:
[   24.878814]  show_stack+0x20/0x38 (C)
[   24.879095]  dump_stack_lvl+0x8c/0xd0
[   24.879270]  print_report+0x118/0x608
[   24.880087]  kasan_report+0xdc/0x128
[   24.880282]  __asan_report_store1_noabort+0x20/0x30
[   24.880420]  krealloc_less_oob_helper+0xae4/0xc50
[   24.880487]  krealloc_less_oob+0x20/0x38
[   24.880550]  kunit_try_run_case+0x170/0x3f0
[   24.881913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.882021]  kthread+0x328/0x630
[   24.882121]  ret_from_fork+0x10/0x20
[   24.882185] 
[   24.882207] Allocated by task 158:
[   24.882241]  kasan_save_stack+0x3c/0x68
[   24.882291]  kasan_save_track+0x20/0x40
[   24.882370]  kasan_save_alloc_info+0x40/0x58
[   24.882651]  __kasan_krealloc+0x118/0x178
[   24.882773]  krealloc_noprof+0x128/0x360
[   24.882885]  krealloc_less_oob_helper+0x168/0xc50
[   24.883051]  krealloc_less_oob+0x20/0x38
[   24.883194]  kunit_try_run_case+0x170/0x3f0
[   24.883667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.883972]  kthread+0x328/0x630
[   24.884063]  ret_from_fork+0x10/0x20
[   24.885157] 
[   24.885208] The buggy address belongs to the object at fff00000c19db600
[   24.885208]  which belongs to the cache kmalloc-256 of size 256
[   24.885396] The buggy address is located 33 bytes to the right of
[   24.885396]  allocated 201-byte region [fff00000c19db600, fff00000c19db6c9)
[   24.885633] 
[   24.885690] The buggy address belongs to the physical page:
[   24.885844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.886012] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.886131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.886368] page_type: f5(slab)
[   24.886505] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.887047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.887223] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.887361] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.887483] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.888860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.889221] page dumped because: kasan: bad access detected
[   24.889312] 
[   24.889901] Memory state around the buggy address:
[   24.890201]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.890361]  fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.890880] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.891571]                                                           ^
[   24.891806]  fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.891949]  fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.892051] ==================================================================
[   24.962550] ==================================================================
[   24.962670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.962800] Write of size 1 at addr fff00000c64660c9 by task kunit_try_catch/162
[   24.962920] 
[   24.962998] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.963194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.963259] Hardware name: linux,dummy-virt (DT)
[   24.963458] Call trace:
[   24.963518]  show_stack+0x20/0x38 (C)
[   24.963644]  dump_stack_lvl+0x8c/0xd0
[   24.963772]  print_report+0x118/0x608
[   24.964988]  kasan_report+0xdc/0x128
[   24.966028]  __asan_report_store1_noabort+0x20/0x30
[   24.966440]  krealloc_less_oob_helper+0xa48/0xc50
[   24.966654]  krealloc_large_less_oob+0x20/0x38
[   24.966855]  kunit_try_run_case+0x170/0x3f0
[   24.966996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.967225]  kthread+0x328/0x630
[   24.967369]  ret_from_fork+0x10/0x20
[   24.967496] 
[   24.967548] The buggy address belongs to the physical page:
[   24.967634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   24.967862] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.967989] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.968142] page_type: f8(unknown)
[   24.968244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.968400] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.968818] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.969065] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.969311] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff
[   24.969521] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.969852] page dumped because: kasan: bad access detected
[   24.969970] 
[   24.970020] Memory state around the buggy address:
[   24.970092]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.970201]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.970433] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.970528]                                               ^
[   24.970647]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.970750]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.970890] ==================================================================
[   24.852732] ==================================================================
[   24.852843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.852964] Write of size 1 at addr fff00000c19db6d0 by task kunit_try_catch/158
[   24.853092] 
[   24.853162] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.853549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.853660] Hardware name: linux,dummy-virt (DT)
[   24.853772] Call trace:
[   24.853899]  show_stack+0x20/0x38 (C)
[   24.854037]  dump_stack_lvl+0x8c/0xd0
[   24.854346]  print_report+0x118/0x608
[   24.854482]  kasan_report+0xdc/0x128
[   24.854598]  __asan_report_store1_noabort+0x20/0x30
[   24.854747]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.854873]  krealloc_less_oob+0x20/0x38
[   24.854992]  kunit_try_run_case+0x170/0x3f0
[   24.855116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.855246]  kthread+0x328/0x630
[   24.855369]  ret_from_fork+0x10/0x20
[   24.855485] 
[   24.855528] Allocated by task 158:
[   24.855592]  kasan_save_stack+0x3c/0x68
[   24.855686]  kasan_save_track+0x20/0x40
[   24.855774]  kasan_save_alloc_info+0x40/0x58
[   24.856958]  __kasan_krealloc+0x118/0x178
[   24.857079]  krealloc_noprof+0x128/0x360
[   24.857297]  krealloc_less_oob_helper+0x168/0xc50
[   24.857572]  krealloc_less_oob+0x20/0x38
[   24.857666]  kunit_try_run_case+0x170/0x3f0
[   24.858673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.858792]  kthread+0x328/0x630
[   24.858874]  ret_from_fork+0x10/0x20
[   24.859700] 
[   24.859784] The buggy address belongs to the object at fff00000c19db600
[   24.859784]  which belongs to the cache kmalloc-256 of size 256
[   24.860097] The buggy address is located 7 bytes to the right of
[   24.860097]  allocated 201-byte region [fff00000c19db600, fff00000c19db6c9)
[   24.860274] 
[   24.860742] The buggy address belongs to the physical page:
[   24.860964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.861270] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.861413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.861535] page_type: f5(slab)
[   24.861619] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.861737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.861878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.862155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.862737] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.862867] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.862978] page dumped because: kasan: bad access detected
[   24.863237] 
[   24.863310] Memory state around the buggy address:
[   24.863413]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.863694]  fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.863975] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.864124]                                                  ^
[   24.864358]  fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864471]  fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864570] ==================================================================
[   24.986286] ==================================================================
[   24.986398] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   24.986503] Write of size 1 at addr fff00000c64660da by task kunit_try_catch/162
[   24.986650] 
[   24.986720] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.986914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.986978] Hardware name: linux,dummy-virt (DT)
[   24.987049] Call trace:
[   24.987096]  show_stack+0x20/0x38 (C)
[   24.987209]  dump_stack_lvl+0x8c/0xd0
[   24.987345]  print_report+0x118/0x608
[   24.987485]  kasan_report+0xdc/0x128
[   24.987619]  __asan_report_store1_noabort+0x20/0x30
[   24.987849]  krealloc_less_oob_helper+0xa80/0xc50
[   24.988002]  krealloc_large_less_oob+0x20/0x38
[   24.988143]  kunit_try_run_case+0x170/0x3f0
[   24.988315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.988505]  kthread+0x328/0x630
[   24.988619]  ret_from_fork+0x10/0x20
[   24.988743] 
[   24.988789] The buggy address belongs to the physical page:
[   24.988879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   24.989150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.989566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.989709] page_type: f8(unknown)
[   24.989801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.989920] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.990309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.991720] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.991937] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff
[   24.992134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.992684] page dumped because: kasan: bad access detected
[   24.992795] 
[   24.992941] Memory state around the buggy address:
[   24.993053]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.993287]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.993418] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.993926]                                                     ^
[   24.994074]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.994624]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.995105] ==================================================================
[   24.838742] ==================================================================
[   24.838856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.838965] Write of size 1 at addr fff00000c19db6c9 by task kunit_try_catch/158
[   24.839080] 
[   24.839145] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.839362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.839430] Hardware name: linux,dummy-virt (DT)
[   24.839507] Call trace:
[   24.839557]  show_stack+0x20/0x38 (C)
[   24.839670]  dump_stack_lvl+0x8c/0xd0
[   24.839797]  print_report+0x118/0x608
[   24.839996]  kasan_report+0xdc/0x128
[   24.840186]  __asan_report_store1_noabort+0x20/0x30
[   24.840347]  krealloc_less_oob_helper+0xa48/0xc50
[   24.840491]  krealloc_less_oob+0x20/0x38
[   24.841432]  kunit_try_run_case+0x170/0x3f0
[   24.841723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.841875]  kthread+0x328/0x630
[   24.842207]  ret_from_fork+0x10/0x20
[   24.842349] 
[   24.842396] Allocated by task 158:
[   24.842463]  kasan_save_stack+0x3c/0x68
[   24.842559]  kasan_save_track+0x20/0x40
[   24.842668]  kasan_save_alloc_info+0x40/0x58
[   24.842785]  __kasan_krealloc+0x118/0x178
[   24.843122]  krealloc_noprof+0x128/0x360
[   24.843508]  krealloc_less_oob_helper+0x168/0xc50
[   24.843806]  krealloc_less_oob+0x20/0x38
[   24.844009]  kunit_try_run_case+0x170/0x3f0
[   24.844569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.844688]  kthread+0x328/0x630
[   24.845039]  ret_from_fork+0x10/0x20
[   24.845146] 
[   24.845257] The buggy address belongs to the object at fff00000c19db600
[   24.845257]  which belongs to the cache kmalloc-256 of size 256
[   24.845463] The buggy address is located 0 bytes to the right of
[   24.845463]  allocated 201-byte region [fff00000c19db600, fff00000c19db6c9)
[   24.845638] 
[   24.845684] The buggy address belongs to the physical page:
[   24.845755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.846203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.846364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.846497] page_type: f5(slab)
[   24.846585] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.846703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.847722] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.848434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.848784] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.848995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.849102] page dumped because: kasan: bad access detected
[   24.849182] 
[   24.849239] Memory state around the buggy address:
[   24.849361]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.849507]  fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.849801] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.849898]                                               ^
[   24.850014]  fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.850131]  fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.850300] ==================================================================
[   24.972671] ==================================================================
[   24.972777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.972880] Write of size 1 at addr fff00000c64660d0 by task kunit_try_catch/162
[   24.972997] 
[   24.973058] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.973251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.973347] Hardware name: linux,dummy-virt (DT)
[   24.973426] Call trace:
[   24.975969]  show_stack+0x20/0x38 (C)
[   24.976633]  dump_stack_lvl+0x8c/0xd0
[   24.976758]  print_report+0x118/0x608
[   24.978105]  kasan_report+0xdc/0x128
[   24.978399]  __asan_report_store1_noabort+0x20/0x30
[   24.979302]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.980056]  krealloc_large_less_oob+0x20/0x38
[   24.980209]  kunit_try_run_case+0x170/0x3f0
[   24.980763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.981024]  kthread+0x328/0x630
[   24.981720]  ret_from_fork+0x10/0x20
[   24.981904] 
[   24.981962] The buggy address belongs to the physical page:
[   24.982135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   24.982267] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.982402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.982524] page_type: f8(unknown)
[   24.982613] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.982729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.982845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.982962] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.983083] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff
[   24.983226] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.983426] page dumped because: kasan: bad access detected
[   24.983509] 
[   24.983553] Memory state around the buggy address:
[   24.983629]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.983925]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.984074] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.984204]                                                  ^
[   24.984311]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.984452]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.984555] ==================================================================
[   24.893423] ==================================================================
[   24.893519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   24.893625] Write of size 1 at addr fff00000c19db6eb by task kunit_try_catch/158
[   24.893740] 
[   24.893804] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.894001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.894064] Hardware name: linux,dummy-virt (DT)
[   24.894137] Call trace:
[   24.894186]  show_stack+0x20/0x38 (C)
[   24.894295]  dump_stack_lvl+0x8c/0xd0
[   24.894449]  print_report+0x118/0x608
[   24.895288]  kasan_report+0xdc/0x128
[   24.895536]  __asan_report_store1_noabort+0x20/0x30
[   24.895781]  krealloc_less_oob_helper+0xa58/0xc50
[   24.895994]  krealloc_less_oob+0x20/0x38
[   24.896078]  kunit_try_run_case+0x170/0x3f0
[   24.896139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.896251]  kthread+0x328/0x630
[   24.896324]  ret_from_fork+0x10/0x20
[   24.896561] 
[   24.896753] Allocated by task 158:
[   24.896988]  kasan_save_stack+0x3c/0x68
[   24.897087]  kasan_save_track+0x20/0x40
[   24.897191]  kasan_save_alloc_info+0x40/0x58
[   24.897308]  __kasan_krealloc+0x118/0x178
[   24.897424]  krealloc_noprof+0x128/0x360
[   24.899170]  krealloc_less_oob_helper+0x168/0xc50
[   24.900042]  krealloc_less_oob+0x20/0x38
[   24.900165]  kunit_try_run_case+0x170/0x3f0
[   24.900316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.900450]  kthread+0x328/0x630
[   24.900532]  ret_from_fork+0x10/0x20
[   24.900698] 
[   24.900776] The buggy address belongs to the object at fff00000c19db600
[   24.900776]  which belongs to the cache kmalloc-256 of size 256
[   24.900915] The buggy address is located 34 bytes to the right of
[   24.900915]  allocated 201-byte region [fff00000c19db600, fff00000c19db6c9)
[   24.901068] 
[   24.901143] The buggy address belongs to the physical page:
[   24.901217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.901367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.901512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.901659] page_type: f5(slab)
[   24.901768] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.901887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.902003] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.902118] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.902239] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.903220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.903352] page dumped because: kasan: bad access detected
[   24.903689] 
[   24.903804] Memory state around the buggy address:
[   24.904309]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.904473]  fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.905077] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.905555]                                                           ^
[   24.906073]  fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.906224]  fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.906646] ==================================================================
[   25.003005] ==================================================================
[   25.003228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.003350] Write of size 1 at addr fff00000c64660ea by task kunit_try_catch/162
[   25.003472] 
[   25.003538] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.003728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.003790] Hardware name: linux,dummy-virt (DT)
[   25.003877] Call trace:
[   25.003927]  show_stack+0x20/0x38 (C)
[   25.004042]  dump_stack_lvl+0x8c/0xd0
[   25.004153]  print_report+0x118/0x608
[   25.004264]  kasan_report+0xdc/0x128
[   25.010235]  __asan_report_store1_noabort+0x20/0x30
[   25.010641]  krealloc_less_oob_helper+0xae4/0xc50
[   25.013160]  krealloc_large_less_oob+0x20/0x38
[   25.013298]  kunit_try_run_case+0x170/0x3f0
[   25.013445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.016934]  kthread+0x328/0x630
[   25.018151]  ret_from_fork+0x10/0x20
[   25.018280] 
[   25.018346] The buggy address belongs to the physical page:
[   25.018421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   25.018544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.018655] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.018781] page_type: f8(unknown)
[   25.018871] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.022446] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.022581] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.022720] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.022852] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff
[   25.022927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.022979] page dumped because: kasan: bad access detected
[   25.023019] 
[   25.023041] Memory state around the buggy address:
[   25.023079]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.023133]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.023184] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.023231]                                                           ^
[   25.023279]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.023358]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.023457] ==================================================================
[   25.024883] ==================================================================
[   25.025012] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.025213] Write of size 1 at addr fff00000c64660eb by task kunit_try_catch/162
[   25.025442] 
[   25.025663] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.026023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.026098] Hardware name: linux,dummy-virt (DT)
[   25.026313] Call trace:
[   25.026390]  show_stack+0x20/0x38 (C)
[   25.026663]  dump_stack_lvl+0x8c/0xd0
[   25.027000]  print_report+0x118/0x608
[   25.027502]  kasan_report+0xdc/0x128
[   25.027622]  __asan_report_store1_noabort+0x20/0x30
[   25.027745]  krealloc_less_oob_helper+0xa58/0xc50
[   25.027879]  krealloc_large_less_oob+0x20/0x38
[   25.027999]  kunit_try_run_case+0x170/0x3f0
[   25.028115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.028241]  kthread+0x328/0x630
[   25.028359]  ret_from_fork+0x10/0x20
[   25.028475] 
[   25.028520] The buggy address belongs to the physical page:
[   25.028589] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   25.028709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.028819] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.028935] page_type: f8(unknown)
[   25.029022] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.029139] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.029254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.031435] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.031881] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff
[   25.032195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.032719] page dumped because: kasan: bad access detected
[   25.032833] 
[   25.033137] Memory state around the buggy address:
[   25.033452]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.033618]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.033725] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.034319]                                                           ^
[   25.034653]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.035048]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.035368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure Automatically assigned
[   24.947072] ==================================================================
[   24.947177] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.947473] Write of size 1 at addr fff00000c77d60f0 by task kunit_try_catch/160
[   24.947646] 
[   24.947719] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.947915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.947990] Hardware name: linux,dummy-virt (DT)
[   24.948123] Call trace:
[   24.948232]  show_stack+0x20/0x38 (C)
[   24.948402]  dump_stack_lvl+0x8c/0xd0
[   24.948541]  print_report+0x118/0x608
[   24.948692]  kasan_report+0xdc/0x128
[   24.948902]  __asan_report_store1_noabort+0x20/0x30
[   24.949117]  krealloc_more_oob_helper+0x5c0/0x678
[   24.949350]  krealloc_large_more_oob+0x20/0x38
[   24.949550]  kunit_try_run_case+0x170/0x3f0
[   24.949675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.949808]  kthread+0x328/0x630
[   24.949910]  ret_from_fork+0x10/0x20
[   24.950028] 
[   24.950080] The buggy address belongs to the physical page:
[   24.950156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4
[   24.950281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.950433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.950622] page_type: f8(unknown)
[   24.950762] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.950937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.951284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.951542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.951664] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff
[   24.951957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.952062] page dumped because: kasan: bad access detected
[   24.952138] 
[   24.952185] Memory state around the buggy address:
[   24.952259]  fff00000c77d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.952381]  fff00000c77d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.952494] >fff00000c77d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.952753]                                                              ^
[   24.952852]  fff00000c77d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.952955]  fff00000c77d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.953080] ==================================================================
[   24.812431] ==================================================================
[   24.812528] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.812635] Write of size 1 at addr fff00000c19db4f0 by task kunit_try_catch/156
[   24.812757] 
[   24.812826] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.813018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.813080] Hardware name: linux,dummy-virt (DT)
[   24.813151] Call trace:
[   24.813198]  show_stack+0x20/0x38 (C)
[   24.813320]  dump_stack_lvl+0x8c/0xd0
[   24.813454]  print_report+0x118/0x608
[   24.813565]  kasan_report+0xdc/0x128
[   24.813691]  __asan_report_store1_noabort+0x20/0x30
[   24.813813]  krealloc_more_oob_helper+0x5c0/0x678
[   24.813937]  krealloc_more_oob+0x20/0x38
[   24.814048]  kunit_try_run_case+0x170/0x3f0
[   24.814159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.814284]  kthread+0x328/0x630
[   24.814410]  ret_from_fork+0x10/0x20
[   24.814544] 
[   24.814783] Allocated by task 156:
[   24.815135]  kasan_save_stack+0x3c/0x68
[   24.815255]  kasan_save_track+0x20/0x40
[   24.815448]  kasan_save_alloc_info+0x40/0x58
[   24.815853]  __kasan_krealloc+0x118/0x178
[   24.815973]  krealloc_noprof+0x128/0x360
[   24.816082]  krealloc_more_oob_helper+0x168/0x678
[   24.816198]  krealloc_more_oob+0x20/0x38
[   24.816402]  kunit_try_run_case+0x170/0x3f0
[   24.816677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.816935]  kthread+0x328/0x630
[   24.817070]  ret_from_fork+0x10/0x20
[   24.817349] 
[   24.817454] The buggy address belongs to the object at fff00000c19db400
[   24.817454]  which belongs to the cache kmalloc-256 of size 256
[   24.817637] The buggy address is located 5 bytes to the right of
[   24.817637]  allocated 235-byte region [fff00000c19db400, fff00000c19db4eb)
[   24.817800] 
[   24.817860] The buggy address belongs to the physical page:
[   24.818073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.818201] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.818320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.818525] page_type: f5(slab)
[   24.818634] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.818773] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.818984] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.819999] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.820231] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.820695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.820798] page dumped because: kasan: bad access detected
[   24.822020] 
[   24.822358] Memory state around the buggy address:
[   24.822455]  fff00000c19db380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.822561]  fff00000c19db400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.823874] >fff00000c19db480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.823994]                                                              ^
[   24.824092]  fff00000c19db500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.824150]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.824199] ==================================================================
[   24.797947] ==================================================================
[   24.798154] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.798420] Write of size 1 at addr fff00000c19db4eb by task kunit_try_catch/156
[   24.798683] 
[   24.798800] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.799122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.799198] Hardware name: linux,dummy-virt (DT)
[   24.799388] Call trace:
[   24.799532]  show_stack+0x20/0x38 (C)
[   24.799661]  dump_stack_lvl+0x8c/0xd0
[   24.799784]  print_report+0x118/0x608
[   24.800053]  kasan_report+0xdc/0x128
[   24.800202]  __asan_report_store1_noabort+0x20/0x30
[   24.800678]  krealloc_more_oob_helper+0x60c/0x678
[   24.800828]  krealloc_more_oob+0x20/0x38
[   24.800981]  kunit_try_run_case+0x170/0x3f0
[   24.801211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.801378]  kthread+0x328/0x630
[   24.801530]  ret_from_fork+0x10/0x20
[   24.801751] 
[   24.801845] Allocated by task 156:
[   24.801914]  kasan_save_stack+0x3c/0x68
[   24.802044]  kasan_save_track+0x20/0x40
[   24.802319]  kasan_save_alloc_info+0x40/0x58
[   24.802961]  __kasan_krealloc+0x118/0x178
[   24.803097]  krealloc_noprof+0x128/0x360
[   24.803204]  krealloc_more_oob_helper+0x168/0x678
[   24.803397]  krealloc_more_oob+0x20/0x38
[   24.803503]  kunit_try_run_case+0x170/0x3f0
[   24.803599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.803721]  kthread+0x328/0x630
[   24.804026]  ret_from_fork+0x10/0x20
[   24.804359] 
[   24.804535] The buggy address belongs to the object at fff00000c19db400
[   24.804535]  which belongs to the cache kmalloc-256 of size 256
[   24.804795] The buggy address is located 0 bytes to the right of
[   24.804795]  allocated 235-byte region [fff00000c19db400, fff00000c19db4eb)
[   24.805045] 
[   24.805115] The buggy address belongs to the physical page:
[   24.805197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da
[   24.805641] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.805928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.806320] page_type: f5(slab)
[   24.806429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.807627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.808087] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.808272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.808443] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff
[   24.808566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.808722] page dumped because: kasan: bad access detected
[   24.808888] 
[   24.808933] Memory state around the buggy address:
[   24.809068]  fff00000c19db380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.809398]  fff00000c19db400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.809583] >fff00000c19db480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   24.809708]                                                           ^
[   24.809978]  fff00000c19db500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.810084]  fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.810176] ==================================================================
[   24.935095] ==================================================================
[   24.935221] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.935372] Write of size 1 at addr fff00000c77d60eb by task kunit_try_catch/160
[   24.935872] 
[   24.936109] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.936365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.936439] Hardware name: linux,dummy-virt (DT)
[   24.936910] Call trace:
[   24.937165]  show_stack+0x20/0x38 (C)
[   24.937315]  dump_stack_lvl+0x8c/0xd0
[   24.937676]  print_report+0x118/0x608
[   24.937964]  kasan_report+0xdc/0x128
[   24.938131]  __asan_report_store1_noabort+0x20/0x30
[   24.938488]  krealloc_more_oob_helper+0x60c/0x678
[   24.938803]  krealloc_large_more_oob+0x20/0x38
[   24.938971]  kunit_try_run_case+0x170/0x3f0
[   24.939093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.939232]  kthread+0x328/0x630
[   24.939476]  ret_from_fork+0x10/0x20
[   24.940430] 
[   24.940502] The buggy address belongs to the physical page:
[   24.940581] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4
[   24.940715] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.940829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.940958] page_type: f8(unknown)
[   24.941075] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.941527] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.941761] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.942174] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.942324] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff
[   24.942472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.942694] page dumped because: kasan: bad access detected
[   24.942778] 
[   24.943250] Memory state around the buggy address:
[   24.943541]  fff00000c77d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.943747]  fff00000c77d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.943926] >fff00000c77d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.944291]                                                           ^
[   24.944461]  fff00000c77d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.944819]  fff00000c77d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.945479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure Automatically assigned
[   24.759347] ==================================================================
[   24.759470] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   24.759593] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/154
[   24.759728] 
[   24.759805] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.760049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.760125] Hardware name: linux,dummy-virt (DT)
[   24.760209] Call trace:
[   24.760268]  show_stack+0x20/0x38 (C)
[   24.760427]  dump_stack_lvl+0x8c/0xd0
[   24.760603]  print_report+0x118/0x608
[   24.761310]  kasan_report+0xdc/0x128
[   24.761468]  __asan_report_load1_noabort+0x20/0x30
[   24.761617]  page_alloc_uaf+0x328/0x350
[   24.761744]  kunit_try_run_case+0x170/0x3f0
[   24.761884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.762186]  kthread+0x328/0x630
[   24.762305]  ret_from_fork+0x10/0x20
[   24.762445] 
[   24.762516] The buggy address belongs to the physical page:
[   24.762600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   24.762737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.762868] page_type: f0(buddy)
[   24.763054] raw: 0bfffe0000000000 fff00000ff616310 fff00000ff616310 0000000000000000
[   24.763360] raw: 0000000000000000 000000000000000a 00000000f0000000 0000000000000000
[   24.763533] page dumped because: kasan: bad access detected
[   24.763659] 
[   24.763738] Memory state around the buggy address:
[   24.763816]  fff00000c77fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.763934]  fff00000c77fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764057] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.764161]                    ^
[   24.764238]  fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.764395]  fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.764490] ==================================================================
<8>[  425.801619] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure Automatically assigned
[   24.726440] ==================================================================
[   24.726607] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   24.726734] Free of addr fff00000c77d4001 by task kunit_try_catch/150
[   24.726840] 
[   24.726909] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.727316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.727422] Hardware name: linux,dummy-virt (DT)
[   24.727522] Call trace:
[   24.727554]  show_stack+0x20/0x38 (C)
[   24.727618]  dump_stack_lvl+0x8c/0xd0
[   24.727680]  print_report+0x118/0x608
[   24.727737]  kasan_report_invalid_free+0xc0/0xe8
[   24.727798]  __kasan_kfree_large+0x5c/0xa8
[   24.728080]  free_large_kmalloc+0x64/0x190
[   24.728224]  kfree+0x270/0x3c8
[   24.728850]  kmalloc_large_invalid_free+0x108/0x270
[   24.729085]  kunit_try_run_case+0x170/0x3f0
[   24.729223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.729383]  kthread+0x328/0x630
[   24.729488]  ret_from_fork+0x10/0x20
[   24.729600] 
[   24.729649] The buggy address belongs to the physical page:
[   24.731118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4
[   24.731890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.732271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.732432] page_type: f8(unknown)
[   24.732529] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.732706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.733287] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.733590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.733713] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff
[   24.733836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.734015] page dumped because: kasan: bad access detected
[   24.734113] 
[   24.734272] Memory state around the buggy address:
[   24.734372]  fff00000c77d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.734483]  fff00000c77d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.735407] >fff00000c77d4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.735596]                    ^
[   24.735693]  fff00000c77d4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.735897]  fff00000c77d4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.736012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure Automatically assigned
[   24.705752] ==================================================================
[   24.705880] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   24.705984] Read of size 1 at addr fff00000c77d0000 by task kunit_try_catch/148
[   24.706096] 
[   24.706161] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.706377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.706443] Hardware name: linux,dummy-virt (DT)
[   24.706518] Call trace:
[   24.706569]  show_stack+0x20/0x38 (C)
[   24.706681]  dump_stack_lvl+0x8c/0xd0
[   24.706793]  print_report+0x118/0x608
[   24.706901]  kasan_report+0xdc/0x128
[   24.707011]  __asan_report_load1_noabort+0x20/0x30
[   24.707144]  kmalloc_large_uaf+0x2cc/0x2f8
[   24.707362]  kunit_try_run_case+0x170/0x3f0
[   24.707866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.708022]  kthread+0x328/0x630
[   24.708143]  ret_from_fork+0x10/0x20
[   24.708273] 
[   24.708495] The buggy address belongs to the physical page:
[   24.708609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d0
[   24.708731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.708874] raw: 0bfffe0000000000 ffffc1ffc31df508 fff00000da46ac40 0000000000000000
[   24.709053] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   24.709369] page dumped because: kasan: bad access detected
[   24.709477] 
[   24.709522] Memory state around the buggy address:
[   24.709595]  fff00000c77cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.709720]  fff00000c77cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.709826] >fff00000c77d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.709996]                    ^
[   24.710115]  fff00000c77d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.710311]  fff00000c77d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.710427] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure Automatically assigned
[   24.682276] ==================================================================
[   24.682533] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   24.682652] Write of size 1 at addr fff00000c77d200a by task kunit_try_catch/146
[   24.682786] 
[   24.682863] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.683065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.683129] Hardware name: linux,dummy-virt (DT)
[   24.683200] Call trace:
[   24.683249]  show_stack+0x20/0x38 (C)
[   24.683382]  dump_stack_lvl+0x8c/0xd0
[   24.683503]  print_report+0x118/0x608
[   24.683611]  kasan_report+0xdc/0x128
[   24.683717]  __asan_report_store1_noabort+0x20/0x30
[   24.683954]  kmalloc_large_oob_right+0x278/0x2b8
[   24.684379]  kunit_try_run_case+0x170/0x3f0
[   24.684532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.684852]  kthread+0x328/0x630
[   24.684959]  ret_from_fork+0x10/0x20
[   24.685075] 
[   24.685145] The buggy address belongs to the physical page:
[   24.685265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d0
[   24.685502] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.685846] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.685998] page_type: f8(unknown)
[   24.686105] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.686240] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.686392] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.686577] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.686766] head: 0bfffe0000000002 ffffc1ffc31df401 00000000ffffffff 00000000ffffffff
[   24.686895] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.687013] page dumped because: kasan: bad access detected
[   24.687103] 
[   24.687870] Memory state around the buggy address:
[   24.688045]  fff00000c77d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.688271]  fff00000c77d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.688393] >fff00000c77d2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.688489]                       ^
[   24.688565]  fff00000c77d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.688670]  fff00000c77d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.688776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure Automatically assigned
[   24.657423] ==================================================================
[   24.657553] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   24.657674] Write of size 1 at addr fff00000c77e9f00 by task kunit_try_catch/144
[   24.657789] 
[   24.657862] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.658059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.658124] Hardware name: linux,dummy-virt (DT)
[   24.658211] Call trace:
[   24.658843]  show_stack+0x20/0x38 (C)
[   24.659321]  dump_stack_lvl+0x8c/0xd0
[   24.660011]  print_report+0x118/0x608
[   24.660246]  kasan_report+0xdc/0x128
[   24.660424]  __asan_report_store1_noabort+0x20/0x30
[   24.660552]  kmalloc_big_oob_right+0x2a4/0x2f0
[   24.660676]  kunit_try_run_case+0x170/0x3f0
[   24.660804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.660936]  kthread+0x328/0x630
[   24.661056]  ret_from_fork+0x10/0x20
[   24.661499] 
[   24.661603] Allocated by task 144:
[   24.661837]  kasan_save_stack+0x3c/0x68
[   24.661943]  kasan_save_track+0x20/0x40
[   24.662043]  kasan_save_alloc_info+0x40/0x58
[   24.662323]  __kasan_kmalloc+0xd4/0xd8
[   24.662480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.662644]  kmalloc_big_oob_right+0xb8/0x2f0
[   24.662838]  kunit_try_run_case+0x170/0x3f0
[   24.663054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.663167]  kthread+0x328/0x630
[   24.663248]  ret_from_fork+0x10/0x20
[   24.663354] 
[   24.663401] The buggy address belongs to the object at fff00000c77e8000
[   24.663401]  which belongs to the cache kmalloc-8k of size 8192
[   24.663955] The buggy address is located 0 bytes to the right of
[   24.663955]  allocated 7936-byte region [fff00000c77e8000, fff00000c77e9f00)
[   24.664306] 
[   24.664374] The buggy address belongs to the physical page:
[   24.664456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   24.664592] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.664709] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.664836] page_type: f5(slab)
[   24.665434] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   24.665624] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   24.665749] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   24.665866] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   24.665985] head: 0bfffe0000000003 ffffc1ffc31dfa01 00000000ffffffff 00000000ffffffff
[   24.666132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   24.666600] page dumped because: kasan: bad access detected
[   24.666726] 
[   24.666803] Memory state around the buggy address:
[   24.666882]  fff00000c77e9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.667029]  fff00000c77e9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.667203] >fff00000c77e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667503]                    ^
[   24.667759]  fff00000c77e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667963]  fff00000c77ea000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.668061] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure Automatically assigned
[   24.618366] ==================================================================
[   24.618582] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   24.618710] Write of size 1 at addr fff00000c703a578 by task kunit_try_catch/142
[   24.618992] 
[   24.619079] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.619647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.620113] Hardware name: linux,dummy-virt (DT)
[   24.620423] Call trace:
[   24.620486]  show_stack+0x20/0x38 (C)
[   24.620663]  dump_stack_lvl+0x8c/0xd0
[   24.620838]  print_report+0x118/0x608
[   24.620973]  kasan_report+0xdc/0x128
[   24.621088]  __asan_report_store1_noabort+0x20/0x30
[   24.621205]  kmalloc_track_caller_oob_right+0x418/0x488
[   24.621402]  kunit_try_run_case+0x170/0x3f0
[   24.621526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.621689]  kthread+0x328/0x630
[   24.621806]  ret_from_fork+0x10/0x20
[   24.621932] 
[   24.621979] Allocated by task 142:
[   24.622065]  kasan_save_stack+0x3c/0x68
[   24.622195]  kasan_save_track+0x20/0x40
[   24.622291]  kasan_save_alloc_info+0x40/0x58
[   24.622674]  __kasan_kmalloc+0xd4/0xd8
[   24.622844]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   24.623314]  kmalloc_track_caller_oob_right+0x184/0x488
[   24.623734]  kunit_try_run_case+0x170/0x3f0
[   24.623974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.624385]  kthread+0x328/0x630
[   24.624686]  ret_from_fork+0x10/0x20
[   24.625072] 
[   24.625144] The buggy address belongs to the object at fff00000c703a500
[   24.625144]  which belongs to the cache kmalloc-128 of size 128
[   24.625292] The buggy address is located 0 bytes to the right of
[   24.625292]  allocated 120-byte region [fff00000c703a500, fff00000c703a578)
[   24.626409] 
[   24.627290] The buggy address belongs to the physical page:
[   24.627405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.627788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.628134] page_type: f5(slab)
[   24.628508] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.628639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.629201] page dumped because: kasan: bad access detected
[   24.629365] 
[   24.629461] Memory state around the buggy address:
[   24.629539]  fff00000c703a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.629642]  fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.629744] >fff00000c703a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.629848]                                                                 ^
[   24.629981]  fff00000c703a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.630104]  fff00000c703a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.630204] ==================================================================
[   24.601930] ==================================================================
[   24.602243] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   24.602474] Write of size 1 at addr fff00000c703a478 by task kunit_try_catch/142
[   24.602696] 
[   24.602769] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.602972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.603153] Hardware name: linux,dummy-virt (DT)
[   24.603232] Call trace:
[   24.603282]  show_stack+0x20/0x38 (C)
[   24.603420]  dump_stack_lvl+0x8c/0xd0
[   24.603696]  print_report+0x118/0x608
[   24.603924]  kasan_report+0xdc/0x128
[   24.604591]  __asan_report_store1_noabort+0x20/0x30
[   24.604763]  kmalloc_track_caller_oob_right+0x40c/0x488
[   24.605022]  kunit_try_run_case+0x170/0x3f0
[   24.606039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.607257]  kthread+0x328/0x630
[   24.608168]  ret_from_fork+0x10/0x20
[   24.608504] 
[   24.608551] Allocated by task 142:
[   24.608662]  kasan_save_stack+0x3c/0x68
[   24.608767]  kasan_save_track+0x20/0x40
[   24.608862]  kasan_save_alloc_info+0x40/0x58
[   24.609147]  __kasan_kmalloc+0xd4/0xd8
[   24.609323]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   24.609453]  kmalloc_track_caller_oob_right+0xa8/0x488
[   24.609608]  kunit_try_run_case+0x170/0x3f0
[   24.609715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.609939]  kthread+0x328/0x630
[   24.610050]  ret_from_fork+0x10/0x20
[   24.610238] 
[   24.610293] The buggy address belongs to the object at fff00000c703a400
[   24.610293]  which belongs to the cache kmalloc-128 of size 128
[   24.610473] The buggy address is located 0 bytes to the right of
[   24.610473]  allocated 120-byte region [fff00000c703a400, fff00000c703a478)
[   24.610643] 
[   24.610699] The buggy address belongs to the physical page:
[   24.611268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.611416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.611534] page_type: f5(slab)
[   24.611767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.611951] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.612163] page dumped because: kasan: bad access detected
[   24.612243] 
[   24.612292] Memory state around the buggy address:
[   24.612388]  fff00000c703a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.612507]  fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.612786] >fff00000c703a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.612885]                                                                 ^
[   24.613239]  fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.613604]  fff00000c703a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.613872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure Automatically assigned
[   24.574184] ==================================================================
[   24.574313] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   24.574445] Read of size 1 at addr fff00000c6447000 by task kunit_try_catch/140
[   24.574560] 
[   24.574624] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.574817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.574900] Hardware name: linux,dummy-virt (DT)
[   24.574993] Call trace:
[   24.575209]  show_stack+0x20/0x38 (C)
[   24.575402]  dump_stack_lvl+0x8c/0xd0
[   24.575545]  print_report+0x118/0x608
[   24.575872]  kasan_report+0xdc/0x128
[   24.576073]  __asan_report_load1_noabort+0x20/0x30
[   24.576236]  kmalloc_node_oob_right+0x2f4/0x330
[   24.576384]  kunit_try_run_case+0x170/0x3f0
[   24.576513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.576680]  kthread+0x328/0x630
[   24.577180]  ret_from_fork+0x10/0x20
[   24.577517] 
[   24.577618] Allocated by task 140:
[   24.577705]  kasan_save_stack+0x3c/0x68
[   24.577806]  kasan_save_track+0x20/0x40
[   24.577904]  kasan_save_alloc_info+0x40/0x58
[   24.578006]  __kasan_kmalloc+0xd4/0xd8
[   24.578094]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   24.578205]  kmalloc_node_oob_right+0xbc/0x330
[   24.578321]  kunit_try_run_case+0x170/0x3f0
[   24.578787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.578968]  kthread+0x328/0x630
[   24.579133]  ret_from_fork+0x10/0x20
[   24.579878] 
[   24.579941] The buggy address belongs to the object at fff00000c6446000
[   24.579941]  which belongs to the cache kmalloc-4k of size 4096
[   24.580051] The buggy address is located 0 bytes to the right of
[   24.580051]  allocated 4096-byte region [fff00000c6446000, fff00000c6447000)
[   24.580134] 
[   24.580174] The buggy address belongs to the physical page:
[   24.580419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106440
[   24.580800] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.581148] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.581371] page_type: f5(slab)
[   24.581480] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   24.581627] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   24.581867] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   24.582083] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   24.582368] head: 0bfffe0000000003 ffffc1ffc3191001 00000000ffffffff 00000000ffffffff
[   24.582494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   24.582677] page dumped because: kasan: bad access detected
[   24.582813] 
[   24.582944] Memory state around the buggy address:
[   24.583104]  fff00000c6446f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.583255]  fff00000c6446f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.584033] >fff00000c6447000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.584577]                    ^
[   24.584858]  fff00000c6447080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.584978]  fff00000c6447100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.585402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure Automatically assigned
[   24.543686] ==================================================================
[   24.543810] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   24.543950] Read of size 1 at addr fff00000c5881b7f by task kunit_try_catch/138
[   24.544878] 
[   24.544974] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.546089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.546177] Hardware name: linux,dummy-virt (DT)
[   24.546264] Call trace:
[   24.546343]  show_stack+0x20/0x38 (C)
[   24.546978]  dump_stack_lvl+0x8c/0xd0
[   24.547143]  print_report+0x118/0x608
[   24.547648]  kasan_report+0xdc/0x128
[   24.547797]  __asan_report_load1_noabort+0x20/0x30
[   24.547969]  kmalloc_oob_left+0x2ec/0x320
[   24.548097]  kunit_try_run_case+0x170/0x3f0
[   24.548222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.548588]  kthread+0x328/0x630
[   24.548714]  ret_from_fork+0x10/0x20
[   24.548834] 
[   24.548876] Allocated by task 24:
[   24.548989]  kasan_save_stack+0x3c/0x68
[   24.549120]  kasan_save_track+0x20/0x40
[   24.549382]  kasan_save_alloc_info+0x40/0x58
[   24.549520]  __kasan_kmalloc+0xd4/0xd8
[   24.549648]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   24.549963]  kvasprintf+0xe0/0x180
[   24.550054]  __kthread_create_on_node+0x16c/0x350
[   24.550145]  kthread_create_on_node+0xe4/0x130
[   24.550234]  create_worker+0x380/0x6b8
[   24.550320]  worker_thread+0x808/0xf38
[   24.550442]  kthread+0x328/0x630
[   24.550540]  ret_from_fork+0x10/0x20
[   24.550648] 
[   24.550703] The buggy address belongs to the object at fff00000c5881b60
[   24.550703]  which belongs to the cache kmalloc-16 of size 16
[   24.550847] The buggy address is located 19 bytes to the right of
[   24.550847]  allocated 12-byte region [fff00000c5881b60, fff00000c5881b6c)
[   24.551001] 
[   24.551051] The buggy address belongs to the physical page:
[   24.551149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105881
[   24.551287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.551444] page_type: f5(slab)
[   24.551551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.551692] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.551800] page dumped because: kasan: bad access detected
[   24.551930] 
[   24.551983] Memory state around the buggy address:
[   24.552069]  fff00000c5881a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc
[   24.552238]  fff00000c5881a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   24.552376] >fff00000c5881b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   24.552475]                                                                 ^
[   24.552576]  fff00000c5881b80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.552678]  fff00000c5881c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.554347] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure Automatically assigned
[   24.497917] ==================================================================
[   24.498013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   24.498113] Read of size 1 at addr fff00000c703a380 by task kunit_try_catch/136
[   24.498230] 
[   24.498297] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.500228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.500296] Hardware name: linux,dummy-virt (DT)
[   24.500389] Call trace:
[   24.500440]  show_stack+0x20/0x38 (C)
[   24.500554]  dump_stack_lvl+0x8c/0xd0
[   24.500674]  print_report+0x118/0x608
[   24.501899]  kasan_report+0xdc/0x128
[   24.502434]  __asan_report_load1_noabort+0x20/0x30
[   24.502771]  kmalloc_oob_right+0x5d0/0x660
[   24.503802]  kunit_try_run_case+0x170/0x3f0
[   24.503978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.504175]  kthread+0x328/0x630
[   24.504310]  ret_from_fork+0x10/0x20
[   24.504887] 
[   24.505064] Allocated by task 136:
[   24.505344]  kasan_save_stack+0x3c/0x68
[   24.505491]  kasan_save_track+0x20/0x40
[   24.505903]  kasan_save_alloc_info+0x40/0x58
[   24.506044]  __kasan_kmalloc+0xd4/0xd8
[   24.506164]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.506877]  kmalloc_oob_right+0xb0/0x660
[   24.507150]  kunit_try_run_case+0x170/0x3f0
[   24.507880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.508166]  kthread+0x328/0x630
[   24.508475]  ret_from_fork+0x10/0x20
[   24.508741] 
[   24.508792] The buggy address belongs to the object at fff00000c703a300
[   24.508792]  which belongs to the cache kmalloc-128 of size 128
[   24.509449] The buggy address is located 13 bytes to the right of
[   24.509449]  allocated 115-byte region [fff00000c703a300, fff00000c703a373)
[   24.511362] 
[   24.511422] The buggy address belongs to the physical page:
[   24.511479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.511544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.511625] page_type: f5(slab)
[   24.511717] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.511879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.511986] page dumped because: kasan: bad access detected
[   24.512074] 
[   24.512125] Memory state around the buggy address:
[   24.512209]  fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.512442]  fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.512567] >fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.512866]                    ^
[   24.513030]  fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513145]  fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513237] ==================================================================
[   24.463457] ==================================================================
[   24.464031] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   24.465435] Write of size 1 at addr fff00000c703a373 by task kunit_try_catch/136
[   24.465575] 
[   24.466513] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250605 #1 PREEMPT 
[   24.466703] Tainted: [N]=TEST
[   24.466749] Hardware name: linux,dummy-virt (DT)
[   24.467022] Call trace:
[   24.467223]  show_stack+0x20/0x38 (C)
[   24.467421]  dump_stack_lvl+0x8c/0xd0
[   24.467515]  print_report+0x118/0x608
[   24.467581]  kasan_report+0xdc/0x128
[   24.467639]  __asan_report_store1_noabort+0x20/0x30
[   24.467697]  kmalloc_oob_right+0x5a4/0x660
[   24.467754]  kunit_try_run_case+0x170/0x3f0
[   24.467829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.467972]  kthread+0x328/0x630
[   24.468097]  ret_from_fork+0x10/0x20
[   24.468458] 
[   24.468695] Allocated by task 136:
[   24.469911]  kasan_save_stack+0x3c/0x68
[   24.470200]  kasan_save_track+0x20/0x40
[   24.470374]  kasan_save_alloc_info+0x40/0x58
[   24.470652]  __kasan_kmalloc+0xd4/0xd8
[   24.470888]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.471030]  kmalloc_oob_right+0xb0/0x660
[   24.471189]  kunit_try_run_case+0x170/0x3f0
[   24.471432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.472741]  kthread+0x328/0x630
[   24.472847]  ret_from_fork+0x10/0x20
[   24.473009] 
[   24.473135] The buggy address belongs to the object at fff00000c703a300
[   24.473135]  which belongs to the cache kmalloc-128 of size 128
[   24.473395] The buggy address is located 0 bytes to the right of
[   24.473395]  allocated 115-byte region [fff00000c703a300, fff00000c703a373)
[   24.473569] 
[   24.473765] The buggy address belongs to the physical page:
[   24.474161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.474755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.475659] page_type: f5(slab)
[   24.476661] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.476978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.477814] page dumped because: kasan: bad access detected
[   24.478273] 
[   24.478576] Memory state around the buggy address:
[   24.480137]  fff00000c703a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.480569]  fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.480716] >fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.480851]                                                              ^
[   24.481098]  fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.481207]  fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.481384] ==================================================================
[   24.483543] ==================================================================
[   24.483850] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   24.484137] Write of size 1 at addr fff00000c703a378 by task kunit_try_catch/136
[   24.484389] 
[   24.484512] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   24.484786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.484891] Hardware name: linux,dummy-virt (DT)
[   24.484973] Call trace:
[   24.485057]  show_stack+0x20/0x38 (C)
[   24.485236]  dump_stack_lvl+0x8c/0xd0
[   24.485617]  print_report+0x118/0x608
[   24.485738]  kasan_report+0xdc/0x128
[   24.485891]  __asan_report_store1_noabort+0x20/0x30
[   24.486231]  kmalloc_oob_right+0x538/0x660
[   24.486381]  kunit_try_run_case+0x170/0x3f0
[   24.486522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.486667]  kthread+0x328/0x630
[   24.486778]  ret_from_fork+0x10/0x20
[   24.487468] 
[   24.487713] Allocated by task 136:
[   24.487876]  kasan_save_stack+0x3c/0x68
[   24.488444]  kasan_save_track+0x20/0x40
[   24.488544]  kasan_save_alloc_info+0x40/0x58
[   24.488643]  __kasan_kmalloc+0xd4/0xd8
[   24.488793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.489053]  kmalloc_oob_right+0xb0/0x660
[   24.489440]  kunit_try_run_case+0x170/0x3f0
[   24.489543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.489651]  kthread+0x328/0x630
[   24.490167]  ret_from_fork+0x10/0x20
[   24.490388] 
[   24.490437] The buggy address belongs to the object at fff00000c703a300
[   24.490437]  which belongs to the cache kmalloc-128 of size 128
[   24.491027] The buggy address is located 5 bytes to the right of
[   24.491027]  allocated 115-byte region [fff00000c703a300, fff00000c703a373)
[   24.491574] 
[   24.491624] The buggy address belongs to the physical page:
[   24.491694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a
[   24.492220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.492376] page_type: f5(slab)
[   24.492482] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.492834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.492947] page dumped because: kasan: bad access detected
[   24.493029] 
[   24.493077] Memory state around the buggy address:
[   24.493153]  fff00000c703a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.494073]  fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.494248] >fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.494559]                                                                 ^
[   24.494675]  fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.495149]  fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.495354] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure Automatically assigned
------------[ cut here ]------------
[  117.977286] WARNING: CPU: 1 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  117.979276] Modules linked in:
[  117.979713] CPU: 1 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250605 #1 PREEMPT 
[  117.983055] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  117.984038] Hardware name: linux,dummy-virt (DT)
[  117.984813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  117.985685] pc : intlog10+0x38/0x48
[  117.986288] lr : intlog10_test+0xe4/0x200
[  117.986791] sp : ffff800082427c10
[  117.987183] x29: ffff800082427c90 x28: 0000000000000000 x27: 0000000000000000
[  117.988055] x26: 1ffe00001981fe81 x25: 0000000000000000 x24: ffff800082427ce0
[  117.989068] x23: ffff800082427d00 x22: 0000000000000000 x21: 1ffff00010484f82
[  117.989872] x20: ffff9ca7264d2f40 x19: ffff800080087990 x18: 0000000077c004c6
[  117.990842] x17: 000000007af72250 x16: fff00000c0975c3c x15: fff00000ff616b08
[  117.991783] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff7394e546ff79
[  117.992950] x11: 1ffff394e546ff78 x10: ffff7394e546ff78 x9 : ffff9ca723a6977c
[  117.993948] x8 : ffff9ca72a37fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  117.994923] x5 : ffff700010484f82 x4 : 1ffff00010010f3a x3 : 1ffff394e4c9a5e8
[  117.995942] x2 : 1ffff394e4c9a5e8 x1 : 0000000000000003 x0 : 0000000000000000
[  117.997153] Call trace:
[  117.997483]  intlog10+0x38/0x48 (P)
[  117.998041]  kunit_try_run_case+0x170/0x3f0
[  117.998911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.999704]  kthread+0x328/0x630
[  118.000449]  ret_from_fork+0x10/0x20
[  118.001277] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2 KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure Automatically assigned
------------[ cut here ]------------
[  117.883137] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  117.888310] Modules linked in:
[  117.889666] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-next-20250605 #1 PREEMPT 
[  117.890727] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  117.891240] Hardware name: linux,dummy-virt (DT)
[  117.892084] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  117.893017] pc : intlog2+0xd8/0xf8
[  117.893641] lr : intlog2_test+0xe4/0x200
[  117.894204] sp : ffff800082377c10
[  117.894651] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000
[  117.895661] x26: 1ffe00001985d4a1 x25: 0000000000000000 x24: ffff800082377ce0
[  117.896865] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82
[  117.897902] x20: ffff9ca7264d2e40 x19: ffff800080087990 x18: 000000006bc9d805
[  117.898883] x17: 0000000037e1f0aa x16: fff00000c0975c3c x15: fff00000ff616b08
[  117.899594] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff7394e546ff79
[  117.900705] x11: 1ffff394e546ff78 x10: ffff7394e546ff78 x9 : ffff9ca723a6997c
[  117.901866] x8 : ffff9ca72a37fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  117.903270] x5 : ffff70001046ef82 x4 : 1ffff00010010f3a x3 : 1ffff394e4c9a5c8
[  117.904751] x2 : 1ffff394e4c9a5c8 x1 : 0000000000000003 x0 : 0000000000000000
[  117.905769] Call trace:
[  117.906126]  intlog2+0xd8/0xf8 (P)
[  117.906604]  kunit_try_run_case+0x170/0x3f0
[  117.907081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.907693]  kthread+0x328/0x630
[  117.908209]  ret_from_fork+0x10/0x20
[  117.908869] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-spawned-test_ratelimit_stress_child
------------[ cut here ]------------
[  196.359385] Spawned test_ratelimit_stress_child 0
[  196.359424] WARNING: CPU: 0 PID: 1599 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8
[  196.361682] Modules linked in:
[  196.362133] CPU: 0 UID: 0 PID: 1599 Comm: test_ratelimit_ Tainted: G    B D W        N  6.15.0-next-20250605 #1 PREEMPT 
[  196.362979] Spawned test_ratelimit_stress_child 1
[  196.365703] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  196.366551] Hardware name: linux,dummy-virt (DT)
[  196.367309] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  196.367905] pc : test_ratelimit_stress_child+0x160/0x1b8
[  196.369580] lr : test_ratelimit_stress_child+0x30/0x1b8
[  196.371232] sp : ffff800089777d90
[  196.372168] x29: ffff800089777d90 x28: 0000000000000000 x27: 0000000000000000
[  196.373763] x26: 1ffe000019330041 x25: 0000000000000000 x24: 0000000000000004
[  196.375092] x23: fff00000c998020c x22: fff00000c9617980 x21: ffff9ca723b650f0
[  196.376741] x20: fff00000c9980200 x19: fff00000c9617980 x18: 0000000095da9fc2
[  196.377502] x17: 0000000000000001 x16: fff00000da444d28 x15: fff00000ff616b08
[  196.378166] x14: 00000000f1f1f1f1 x13: 1ffe00001b488989 x12: fffd80001b488849
[  196.379828] x11: 1ffe00001b488848 x10: fffd80001b488848 x9 : ffff9ca72620ee1c
[  196.381146] x8 : ffff800089777ae8 x7 : 0000000000000001 x6 : ffff800089777c00
[  196.382622] x5 : 0000000000000001 x4 : ffff9ca7285643e0 x3 : 0000000000000000
[  196.384725] x2 : 1ffe0000192c2f34 x1 : 0000000000000000 x0 : 0000000000000000
[  196.386681] Call trace:
[  196.387705]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  196.388822]  kthread+0x328/0x630
[  196.389285]  ret_from_fork+0x10/0x20
[  196.389778] ---[ end trace 0000000000000000 ]---