Linaro Logo
LKFT Dashboard

Executive Summary

Total Issues: 87 (17 Critical, 6 High, 64 Medium, 0 Low)

New Issues: 85

Recurring Issues: 2

Comparison Base: next-20250923

Test Plan Statistics

Builds: 50 total (380 pass, 15 fail, 0 skip) - 760.0% success rate

Boots: 2572 total (2477 pass, 7 fail, 15 skip, 73 in progress) - 96.3% success rate (Plan in progress) - 5 boots skipped due to dependency issues

Test Suites: 3027 total (2088 pass, 669 fail, 270 unknown) - 69.0% success rate

Individual Test Cases: 375896 total (353066 pass, 5549 fail, 17281 skip) - 93.9% success rate

Critical Issues (17):

  • Boot Failure: panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block on e850-96 [NEW]
  • Boot Failure: exception-warning-driversgpudrmdrm_connector-at-drm_connector_dynamic_register on qemu-x86_64 [NEW]
  • Boot Failure: exception-warning-driversgpudrmdrm_rect-at-drm_rect_calc_hscale on qemu-x86_64 [NEW]
  • ... and 14 more

High Priority Issues (6):

  • Build Failure: clang-compiler-fs_btrfs_disk-io_c-warning-format-specifies-type-size_t-aka-unsigned-int-but-the-argument-has-type-unsigned-long on riscv (x3) [NEW]
  • Build Failure: clang-compiler-futex_numa_mpol_c-warning-unused-function-test_futex_mpol on x86_64 (x2) [NEW]
  • Build Failure: clang-compiler-kselftest_h-error-unknown-type-name-bool on x86_64 (x2) [NEW]
  • ... and 3 more

Medium Priority Issues (64):

  • 9 issues on dragonboard-410c
  • 10 issues on graviton4-vm
  • 3 issues on qemu-riscv64
  • 7 issues on qemu-x86_64
  • 4 issues on qemu-x86_64-compat
  • 24 issues on x86
  • 7 issues on x86-compat

Build Information

Kernel version: 6.17.0-rc7

Git Tree: https://kernel.googlesource.com/pub/scm/linux/kernel/git/next/linux-next.git

Git SHA: b5a4da2c459f79a2c87c867398f1c0c315779781

Git Describe: next-20250924

Test Details: https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20250924

Architecture Impact Assessment

qemu-x86_64: 23 issues (22 new, 1 recurring) - 16 Critical, 7 Medium e850-96: 1 issues (1 new, 0 recurring) - 1 Critical x86: 24 issues (23 new, 1 recurring) - 24 Medium graviton4-vm: 10 issues (10 new, 0 recurring) - 10 Medium dragonboard-410c: 9 issues (9 new, 0 recurring) - 9 Medium x86-compat: 7 issues (7 new, 0 recurring) - 7 Medium x86_64: 5 issues (5 new, 0 recurring) - 5 High qemu-x86_64-compat: 4 issues (4 new, 0 recurring) - 4 Medium qemu-riscv64: 3 issues (3 new, 0 recurring) - 3 Medium riscv: 1 issues (1 new, 0 recurring) - 1 High

Critical: Boot Regressions (compared to next-20250923)

e850-96, log-parser-boot

qemu-x86_64, log-parser-boot

High Priority: Build Regressions (compared to next-20250923)

Medium Priority: Test Regressions (compared to next-20250923)

Medium Priority: Test Regressions (compared to next-20250923)

dragonboard-410c, ltp-syscalls

graviton4-vm, kselftest-arm64

qemu-riscv64, ltp-syscalls

qemu-x86_64-compat, ltp-syscalls

qemu-x86_64, kselftest-vDSO

qemu-x86_64, ltp-syscalls

qemu-x86_64, kselftest-mm

qemu-x86_64, ltp-syscalls

qemu-x86_64, kselftest-cgroup

qemu-x86_64, kselftest-vDSO

qemu-x86_64, ltp-syscalls

x86-compat, ltp-syscalls

x86, kselftest-vDSO

x86, ltp-syscalls

x86, rt-tests-cyclicdeadline

x86, kselftest-vDSO

x86, ltp-syscalls

Regression Logs

panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block Regression Log 1 (gcc-13-lkftconfig-no-kselftest-frag)

[    1.741650] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    1.741659] CPU: 5 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT 
[    1.741668] Hardware name: WinLink E850-96 board (DT)
[    1.741673] Call trace:
[    1.741677]  show_stack+0x18/0x24 (C)
[    1.741695]  dump_stack_lvl+0x34/0x8c
[    1.741713]  dump_stack+0x18/0x24
[    1.741724]  vpanic+0x324/0x368
[    1.741740]  nmi_panic+0x0/0x64
[    1.741753]  mount_root_generic+0x288/0x368
[    1.741771]  mount_root+0x174/0x338
[    1.741783]  prepare_namespace+0x6c/0x2a4
[    1.741797]  kernel_init_freeable+0x2a4/0x2e4
[    1.741808]  kernel_init+0x20/0x1d8
[    1.741822]  ret_from_fork+0x10/0x20
[    1.741837] SMP: stopping secondary CPUs
[    1.743540] Kernel Offset: disabled
[    1.743542] CPU features: 0x080000,00000000,40046280,0400721b
[    1.743551] Memory Limit: none
[    1.836331] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

exception-warning-driversgpudrmdrm_connector-at-drm_connector_dynamic_register Regression Log 2 (gcc-13-lkftconfig-kunit)

------------[ cut here ]------------
[  206.559110] WARNING: drivers/gpu/drm/drm_connector.c:903 at drm_connector_dynamic_register+0xbf/0x110, CPU#0: kunit_try_catch/2324
[  206.559740] Modules linked in:
[  206.559930] CPU: 0 UID: 0 PID: 2324 Comm: kunit_try_catch Tainted: G    B D W        N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[  206.560548] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  206.560874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  206.561251] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  206.561748] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68
[  206.562678] RSP: 0000:ffff88810431fc80 EFLAGS: 00010246
[  206.562975] RAX: dffffc0000000000 RBX: ffff8881041b6000 RCX: 0000000000000000
[  206.563513] RDX: 1ffff11020836c34 RSI: ffffffff8c441ee4 RDI: ffff8881041b61a0
[  206.563863] RBP: ffff88810431fc90 R08: 1ffff1102007af29 R09: ffffed1020863f63
[  206.564167] R10: 0000000000000003 R11: ffffffff8b9a66e8 R12: 0000000000000000
[  206.564546] R13: ffff88810431fd28 R14: ffff8881003d7a50 R15: ffff8881003d7a58
[  206.564909] FS:  0000000000000000(0000) GS:ffff8881c9ba0000(0000) knlGS:0000000000000000
[  206.565318] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  206.565706] CR2: 00007ffff7ffe000 CR3: 00000001192bc000 CR4: 00000000000006f0
[  206.566187] DR0: ffffffff91527740 DR1: ffffffff91527741 DR2: ffffffff91527742
[  206.566576] DR3: ffffffff91527743 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  206.566989] Call Trace:
[  206.567109]  <TASK>
[  206.567275]  drm_test_drm_connector_dynamic_register_no_init+0x104/0x290
[  206.567802]  ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10
[  206.568365]  ? __schedule+0x10e1/0x2b50
[  206.568564]  ? __pfx_read_tsc+0x10/0x10
[  206.569021]  ? ktime_get_ts64+0x86/0x230
[  206.569548]  kunit_try_run_case+0x1a5/0x490
[  206.569849]  ? __pfx_kunit_try_run_case+0x10/0x10
[  206.570057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  206.570672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  206.571062]  ? __kthread_parkme+0x82/0x180
[  206.571642]  ? preempt_count_sub+0x50/0x80
[  206.572056]  ? __pfx_kunit_try_run_case+0x10/0x10
[  206.572448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  206.572713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  206.572973]  kthread+0x337/0x6f0
[  206.573123]  ? trace_preempt_on+0x20/0xc0
[  206.573659]  ? __pfx_kthread+0x10/0x10
[  206.574119]  ? _raw_spin_unlock_irq+0x47/0x80
[  206.574520]  ? calculate_sigpending+0x7b/0xa0
[  206.574781]  ? __pfx_kthread+0x10/0x10
[  206.574960]  ret_from_fork+0x1c5/0x240
[  206.575401]  ? __pfx_kthread+0x10/0x10
[  206.575698]  ret_from_fork_asm+0x1a/0x30
[  206.576039]  </TASK>
[  206.576407] ---[ end trace 0000000000000000 ]---

exception-warning-driversgpudrmdrm_rect-at-drm_rect_calc_hscale Regression Log 3 (gcc-13-lkftconfig-kunit)

------------[ cut here ]------------
[  208.586756] WARNING: drivers/gpu/drm/drm_rect.c:137 at drm_rect_calc_hscale+0x125/0x190, CPU#0: kunit_try_catch/3096
[  208.587453] Modules linked in:
[  208.587666] CPU: 0 UID: 0 PID: 3096 Comm: kunit_try_catch Tainted: G    B D W        N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[  208.588240] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  208.588458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  208.588870] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  208.589077] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  208.589909] RSP: 0000:ffff8881023efc68 EFLAGS: 00010286
[  208.590151] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  208.590460] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8f47c318
[  208.590904] RBP: ffff8881023efc90 R08: 0000000000000000 R09: ffffed1020bc5640
[  208.591175] R10: ffff888105e2b207 R11: 0000000000000000 R12: ffffffff8f47c300
[  208.591568] R13: 0000000000000000 R14: 000000007fffffff R15: ffff8881023efd28
[  208.591901] FS:  0000000000000000(0000) GS:ffff8881c9ba0000(0000) knlGS:0000000000000000
[  208.592202] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  208.592727] CR2: 00007ffff7ffe000 CR3: 00000001192bc000 CR4: 00000000000006f0
[  208.593052] DR0: ffffffff91527740 DR1: ffffffff91527741 DR2: ffffffff91527742
[  208.593442] DR3: ffffffff91527743 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  208.593824] Call Trace:
[  208.593931]  <TASK>
[  208.594035]  drm_test_rect_calc_hscale+0x108/0x270
[  208.594522]  ? __kasan_check_write+0x18/0x20
[  208.594702]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  208.595405]  ? sysvec_apic_timer_interrupt+0x50/0x90
[  208.595666]  ? trace_hardirqs_on+0x37/0xe0
[  208.595862]  ? __pfx_read_tsc+0x10/0x10
[  208.596036]  ? ktime_get_ts64+0x86/0x230
[  208.596693]  kunit_try_run_case+0x1a5/0x490
[  208.596858]  ? __pfx_kunit_try_run_case+0x10/0x10
[  208.597067]  ? queued_spin_lock_slowpath+0x116/0xb40
[  208.597511]  ? __kthread_parkme+0x82/0x180
[  208.597771]  ? preempt_count_sub+0x50/0x80
[  208.597963]  ? __pfx_kunit_try_run_case+0x10/0x10
[  208.598660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  208.598997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  208.599659]  kthread+0x337/0x6f0
[  208.599837]  ? trace_preempt_on+0x20/0xc0
[  208.600020]  ? __pfx_kthread+0x10/0x10
[  208.600724]  ? _raw_spin_unlock_irq+0x47/0x80
[  208.601001]  ? calculate_sigpending+0x7b/0xa0
[  208.601529]  ? __pfx_kthread+0x10/0x10
[  208.601737]  ret_from_fork+0x1c5/0x240
[  208.601909]  ? __pfx_kthread+0x10/0x10
[  208.602079]  ret_from_fork_asm+0x1a/0x30
[  208.602659]  </TASK>
[  208.602989] ---[ end trace 0000000000000000 ]---

kasan-bug-kasan-double-free-in-kfree_sensitive Regression Log 4 (gcc-13-lkftconfig-kunit)

[   22.909800] ==================================================================
[   22.910167] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   22.910408] Free of addr ffff8881056bca20 by task kunit_try_catch/248
[   22.910696] 
[   22.910797] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   22.910842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.910854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.910874] Call Trace:
[   22.910888]  <TASK>
[   22.910902]  dump_stack_lvl+0x73/0xb0
[   22.910928]  print_report+0xd1/0x640
[   22.910950]  ? __virt_addr_valid+0x1db/0x2d0
[   22.910972]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.910994]  ? kfree_sensitive+0x2e/0x90
[   22.911016]  kasan_report_invalid_free+0x10d/0x130
[   22.911040]  ? kfree_sensitive+0x2e/0x90
[   22.911064]  ? kfree_sensitive+0x2e/0x90
[   22.911086]  check_slab_allocation+0x101/0x130
[   22.911108]  __kasan_slab_pre_free+0x28/0x40
[   22.911128]  kfree+0xee/0x4f0
[   22.911149]  ? kfree_sensitive+0x2e/0x90
[   22.911173]  kfree_sensitive+0x2e/0x90
[   22.911195]  kmalloc_double_kzfree+0x19c/0x370
[   22.911217]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   22.911240]  ? __schedule+0x10e1/0x2b50
[   22.911261]  ? __pfx_read_tsc+0x10/0x10
[   22.911279]  ? ktime_get_ts64+0x86/0x230
[   22.911302]  kunit_try_run_case+0x1a5/0x490
[   22.911324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.911344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.911365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.911387]  ? __kthread_parkme+0x82/0x180
[   22.911409]  ? preempt_count_sub+0x50/0x80
[   22.911434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.911456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.911480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.911505]  kthread+0x337/0x6f0
[   22.911522]  ? trace_preempt_on+0x20/0xc0
[   22.911543]  ? __pfx_kthread+0x10/0x10
[   22.911562]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.911582]  ? calculate_sigpending+0x7b/0xa0
[   22.911604]  ? __pfx_kthread+0x10/0x10
[   22.911624]  ret_from_fork+0x1c5/0x240
[   22.911644]  ? __pfx_kthread+0x10/0x10
[   22.911668]  ret_from_fork_asm+0x1a/0x30
[   22.911699]  </TASK>
[   22.911710] 
[   22.925000] Allocated by task 248:
[   22.925376]  kasan_save_stack+0x45/0x70
[   22.925607]  kasan_save_track+0x18/0x40
[   22.925810]  kasan_save_alloc_info+0x3b/0x50
[   22.926043]  __kasan_kmalloc+0xb7/0xc0
[   22.926328]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   22.926488]  kmalloc_double_kzfree+0xa9/0x370
[   22.926653]  kunit_try_run_case+0x1a5/0x490
[   22.926891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.927368]  kthread+0x337/0x6f0
[   22.927551]  ret_from_fork+0x1c5/0x240
[   22.927786]  ret_from_fork_asm+0x1a/0x30
[   22.927934] 
[   22.928066] Freed by task 248:
[   22.928309]  kasan_save_stack+0x45/0x70
[   22.928509]  kasan_save_track+0x18/0x40
[   22.928719]  __kasan_save_free_info+0x3f/0x60
[   22.928943]  __kasan_slab_free+0x68/0x90
[   22.929312]  kfree+0x225/0x4f0
[   22.929524]  kfree_sensitive+0x67/0x90
[   22.929667]  kmalloc_double_kzfree+0x12b/0x370
[   22.929822]  kunit_try_run_case+0x1a5/0x490
[   22.930052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.930398]  kthread+0x337/0x6f0
[   22.930524]  ret_from_fork+0x1c5/0x240
[   22.930672]  ret_from_fork_asm+0x1a/0x30
[   22.930906] 
[   22.931014] The buggy address belongs to the object at ffff8881056bca20
[   22.931014]  which belongs to the cache kmalloc-16 of size 16
[   22.931515] The buggy address is located 0 bytes inside of
[   22.931515]  16-byte region [ffff8881056bca20, ffff8881056bca30)
[   22.932019] 
[   22.932145] The buggy address belongs to the physical page:
[   22.932450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056bc
[   22.932711] flags: 0x200000000000000(node=0|zone=2)
[   22.932992] page_type: f5(slab)
[   22.933315] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.933641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.933999] page dumped because: kasan: bad access detected
[   22.934319] 
[   22.934423] Memory state around the buggy address:
[   22.934640]  ffff8881056bc900: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.934937]  ffff8881056bc980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.935227] >ffff8881056bca00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   22.935547]                                ^
[   22.935754]  ffff8881056bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.936102]  ffff8881056bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.936457] ==================================================================

kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper Regression Log 5 (gcc-13-lkftconfig-kunit)

[   24.264123] ==================================================================
[   24.264557] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.265403] Free of addr ffff888105da5801 by task kunit_try_catch/299
[   24.266077] 
[   24.266410] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.266467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.266481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.266503] Call Trace:
[   24.266519]  <TASK>
[   24.266533]  dump_stack_lvl+0x73/0xb0
[   24.266563]  print_report+0xd1/0x640
[   24.266586]  ? __virt_addr_valid+0x1db/0x2d0
[   24.266611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.266634]  ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.266659]  kasan_report_invalid_free+0x10d/0x130
[   24.266682]  ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.266709]  ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.266732]  ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.266757]  check_slab_allocation+0x11f/0x130
[   24.266792]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.266816]  mempool_free+0x45f/0x6a0
[   24.266841]  mempool_kmalloc_invalid_free_helper+0x132/0x320
[   24.266873]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   24.266897]  ? __pfx_call_function_single_prep_ipi+0x10/0x10
[   24.266921]  ? __kasan_check_write+0x18/0x20
[   24.266943]  ? finish_task_switch.isra.0+0x153/0x700
[   24.266971]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.266994]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   24.267017]  ? update_rq_clock+0x1b2/0x4d0
[   24.267038]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.267058]  ? __pfx_mempool_kfree+0x10/0x10
[   24.267082]  ? __pfx_read_tsc+0x10/0x10
[   24.267101]  ? ktime_get_ts64+0x86/0x230
[   24.267123]  kunit_try_run_case+0x1a5/0x490
[   24.267147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.267167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.267190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.267213]  ? __kthread_parkme+0x82/0x180
[   24.267235]  ? preempt_count_sub+0x50/0x80
[   24.267260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.267281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.267307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.267333]  kthread+0x337/0x6f0
[   24.267350]  ? trace_preempt_on+0x20/0xc0
[   24.267372]  ? __pfx_kthread+0x10/0x10
[   24.267391]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.267411]  ? calculate_sigpending+0x7b/0xa0
[   24.267433]  ? __pfx_kthread+0x10/0x10
[   24.267453]  ret_from_fork+0x1c5/0x240
[   24.267473]  ? __pfx_kthread+0x10/0x10
[   24.267492]  ret_from_fork_asm+0x1a/0x30
[   24.267525]  </TASK>
[   24.267539] 
[   24.282227] Allocated by task 299:
[   24.282422]  kasan_save_stack+0x45/0x70
[   24.282610]  kasan_save_track+0x18/0x40
[   24.282805]  kasan_save_alloc_info+0x3b/0x50
[   24.283002]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.283231]  remove_element+0x11e/0x190
[   24.283405]  mempool_alloc_preallocated+0x4d/0x90
[   24.283613]  mempool_kmalloc_invalid_free_helper+0x83/0x320
[   24.283884]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.284050]  kunit_try_run_case+0x1a5/0x490
[   24.284189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.284357]  kthread+0x337/0x6f0
[   24.284469]  ret_from_fork+0x1c5/0x240
[   24.284925]  ret_from_fork_asm+0x1a/0x30
[   24.285113] 
[   24.285649] The buggy address belongs to the object at ffff888105da5800
[   24.285649]  which belongs to the cache kmalloc-128 of size 128
[   24.286577] The buggy address is located 1 bytes inside of
[   24.286577]  128-byte region [ffff888105da5800, ffff888105da5880)
[   24.287604] 
[   24.287877] The buggy address belongs to the physical page:
[   24.288360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da5
[   24.288692] flags: 0x200000000000000(node=0|zone=2)
[   24.289111] page_type: f5(slab)
[   24.289451] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.289968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.290520] page dumped because: kasan: bad access detected
[   24.290770] 
[   24.290865] Memory state around the buggy address:
[   24.291071]  ffff888105da5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.291637]  ffff888105da5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.292133] >ffff888105da5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.292662]                    ^
[   24.292835]  ffff888105da5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.293662]  ffff888105da5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.294016] ==================================================================

kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size Regression Log 6 (gcc-13-lkftconfig-kunit)

[   22.728332] ==================================================================
[   22.728796] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x350
[   22.729112] Read of size 18446744073709551614 at addr ffff8881054d1f04 by task kunit_try_catch/236
[   22.729728] 
[   22.729851] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   22.729901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.729914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.729934] Call Trace:
[   22.729948]  <TASK>
[   22.729962]  dump_stack_lvl+0x73/0xb0
[   22.729992]  print_report+0xd1/0x640
[   22.730014]  ? __virt_addr_valid+0x1db/0x2d0
[   22.730048]  ? kmalloc_memmove_negative_size+0x171/0x350
[   22.730072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.730093]  ? kmalloc_memmove_negative_size+0x171/0x350
[   22.730150]  kasan_report+0x144/0x180
[   22.730173]  ? kmalloc_memmove_negative_size+0x171/0x350
[   22.730202]  kasan_check_range+0x10c/0x1c0
[   22.730452]  __asan_memmove+0x27/0x70
[   22.730475]  kmalloc_memmove_negative_size+0x171/0x350
[   22.730511]  ? __kasan_check_write+0x18/0x20
[   22.730531]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   22.730555]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.730580]  ? trace_hardirqs_on+0x37/0xe0
[   22.730605]  ? __pfx_read_tsc+0x10/0x10
[   22.730626]  ? ktime_get_ts64+0x86/0x230
[   22.730649]  kunit_try_run_case+0x1a5/0x490
[   22.730673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.730696]  ? queued_spin_lock_slowpath+0x116/0xb40
[   22.730719]  ? __kthread_parkme+0x82/0x180
[   22.730743]  ? preempt_count_sub+0x50/0x80
[   22.730769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.730801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.730827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.730852]  kthread+0x337/0x6f0
[   22.730869]  ? trace_preempt_on+0x20/0xc0
[   22.730890]  ? __pfx_kthread+0x10/0x10
[   22.730909]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.730930]  ? calculate_sigpending+0x7b/0xa0
[   22.730952]  ? __pfx_kthread+0x10/0x10
[   22.730972]  ret_from_fork+0x1c5/0x240
[   22.730992]  ? __pfx_kthread+0x10/0x10
[   22.731011]  ret_from_fork_asm+0x1a/0x30
[   22.731044]  </TASK>
[   22.731055] 
[   22.738957] Allocated by task 236:
[   22.739089]  kasan_save_stack+0x45/0x70
[   22.739458]  kasan_save_track+0x18/0x40
[   22.739622]  kasan_save_alloc_info+0x3b/0x50
[   22.740011]  __kasan_kmalloc+0xb7/0xc0
[   22.740488]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   22.740652]  kmalloc_memmove_negative_size+0xac/0x350
[   22.740825]  kunit_try_run_case+0x1a5/0x490
[   22.740991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.742215]  kthread+0x337/0x6f0
[   22.742709]  ret_from_fork+0x1c5/0x240
[   22.743313]  ret_from_fork_asm+0x1a/0x30
[   22.743877] 
[   22.744263] The buggy address belongs to the object at ffff8881054d1f00
[   22.744263]  which belongs to the cache kmalloc-64 of size 64
[   22.745468] The buggy address is located 4 bytes inside of
[   22.745468]  64-byte region [ffff8881054d1f00, ffff8881054d1f40)
[   22.746486] 
[   22.746795] The buggy address belongs to the physical page:
[   22.747572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054d1
[   22.747848] flags: 0x200000000000000(node=0|zone=2)
[   22.748015] page_type: f5(slab)
[   22.748135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.748364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.748583] page dumped because: kasan: bad access detected
[   22.748748] 
[   22.748842] Memory state around the buggy address:
[   22.749197]  ffff8881054d1e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   22.749670]  ffff8881054d1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.749996] >ffff8881054d1f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.750629]                    ^
[   22.750948]  ffff8881054d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.751549]  ffff8881054d2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.751788] ==================================================================

kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper Regression Log 7 (gcc-13-lkftconfig-kunit)

[   26.115197] ==================================================================
[   26.115682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x302f/0x59f0
[   26.116008] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.116386] 
[   26.116541] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.116616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.116630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.116661] Call Trace:
[   26.116675]  <TASK>
[   26.116690]  dump_stack_lvl+0x73/0xb0
[   26.116717]  print_report+0xd1/0x640
[   26.116740]  ? __virt_addr_valid+0x1db/0x2d0
[   26.116799]  ? kasan_atomics_helper+0x302f/0x59f0
[   26.116825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.116887]  ? kasan_atomics_helper+0x302f/0x59f0
[   26.116923]  kasan_report+0x144/0x180
[   26.116959]  ? kasan_atomics_helper+0x302f/0x59f0
[   26.117015]  kasan_check_range+0x10c/0x1c0
[   26.117040]  __kasan_check_write+0x18/0x20
[   26.117061]  kasan_atomics_helper+0x302f/0x59f0
[   26.117095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.117119]  ? kasan_save_alloc_info+0x3b/0x50
[   26.117149]  kasan_atomics+0x1dc/0x310
[   26.117174]  ? __pfx_kasan_atomics+0x10/0x10
[   26.117199]  ? __pfx_read_tsc+0x10/0x10
[   26.117219]  ? ktime_get_ts64+0x86/0x230
[   26.117242]  kunit_try_run_case+0x1a5/0x490
[   26.117296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.117319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.117364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.117388]  ? __kthread_parkme+0x82/0x180
[   26.117411]  ? preempt_count_sub+0x50/0x80
[   26.117437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.117461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.117488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.117514]  kthread+0x337/0x6f0
[   26.117534]  ? trace_preempt_on+0x20/0xc0
[   26.117557]  ? __pfx_kthread+0x10/0x10
[   26.117577]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.117600]  ? calculate_sigpending+0x7b/0xa0
[   26.117624]  ? __pfx_kthread+0x10/0x10
[   26.117659]  ret_from_fork+0x1c5/0x240
[   26.117681]  ? __pfx_kthread+0x10/0x10
[   26.117702]  ret_from_fork_asm+0x1a/0x30
[   26.117735]  </TASK>
[   26.117747] 
[   26.125042] Allocated by task 323:
[   26.125200]  kasan_save_stack+0x45/0x70
[   26.125341]  kasan_save_track+0x18/0x40
[   26.125473]  kasan_save_alloc_info+0x3b/0x50
[   26.125685]  __kasan_kmalloc+0xb7/0xc0
[   26.125895]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.126110]  kasan_atomics+0x95/0x310
[   26.126241]  kunit_try_run_case+0x1a5/0x490
[   26.126436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.126672]  kthread+0x337/0x6f0
[   26.126848]  ret_from_fork+0x1c5/0x240
[   26.127067]  ret_from_fork_asm+0x1a/0x30
[   26.127265] 
[   26.127340] The buggy address belongs to the object at ffff888105db2a00
[   26.127340]  which belongs to the cache kmalloc-64 of size 64
[   26.127838] The buggy address is located 0 bytes to the right of
[   26.127838]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.128383] 
[   26.128486] The buggy address belongs to the physical page:
[   26.128715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.129103] flags: 0x200000000000000(node=0|zone=2)
[   26.129309] page_type: f5(slab)
[   26.129477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.129749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.130006] page dumped because: kasan: bad access detected
[   26.130174] 
[   26.130239] Memory state around the buggy address:
[   26.130413]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.130748]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.131096] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.131407]                                      ^
[   26.131592]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131818]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.132051] ==================================================================
---
[   26.435665] ==================================================================
[   26.436015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4012/0x59f0
[   26.436345] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.436759] 
[   26.436854] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.436901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.436915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.436937] Call Trace:
[   26.436952]  <TASK>
[   26.436967]  dump_stack_lvl+0x73/0xb0
[   26.436994]  print_report+0xd1/0x640
[   26.437017]  ? __virt_addr_valid+0x1db/0x2d0
[   26.437039]  ? kasan_atomics_helper+0x4012/0x59f0
[   26.437062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.437084]  ? kasan_atomics_helper+0x4012/0x59f0
[   26.437107]  kasan_report+0x144/0x180
[   26.437130]  ? kasan_atomics_helper+0x4012/0x59f0
[   26.437159]  kasan_check_range+0x10c/0x1c0
[   26.437183]  __kasan_check_write+0x18/0x20
[   26.437204]  kasan_atomics_helper+0x4012/0x59f0
[   26.437228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.437251]  ? kasan_save_alloc_info+0x3b/0x50
[   26.437281]  kasan_atomics+0x1dc/0x310
[   26.437304]  ? __pfx_kasan_atomics+0x10/0x10
[   26.437329]  ? __pfx_read_tsc+0x10/0x10
[   26.437348]  ? ktime_get_ts64+0x86/0x230
[   26.437373]  kunit_try_run_case+0x1a5/0x490
[   26.437396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.437418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.437441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.437465]  ? __kthread_parkme+0x82/0x180
[   26.437488]  ? preempt_count_sub+0x50/0x80
[   26.437515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.437539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.437565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.437591]  kthread+0x337/0x6f0
[   26.437610]  ? trace_preempt_on+0x20/0xc0
[   26.437632]  ? __pfx_kthread+0x10/0x10
[   26.437652]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.437675]  ? calculate_sigpending+0x7b/0xa0
[   26.437697]  ? __pfx_kthread+0x10/0x10
[   26.437718]  ret_from_fork+0x1c5/0x240
[   26.437740]  ? __pfx_kthread+0x10/0x10
[   26.437760]  ret_from_fork_asm+0x1a/0x30
[   26.437802]  </TASK>
[   26.437815] 
[   26.444634] Allocated by task 323:
[   26.444819]  kasan_save_stack+0x45/0x70
[   26.445014]  kasan_save_track+0x18/0x40
[   26.445201]  kasan_save_alloc_info+0x3b/0x50
[   26.445384]  __kasan_kmalloc+0xb7/0xc0
[   26.445624]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.445785]  kasan_atomics+0x95/0x310
[   26.446073]  kunit_try_run_case+0x1a5/0x490
[   26.446275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.446500]  kthread+0x337/0x6f0
[   26.446640]  ret_from_fork+0x1c5/0x240
[   26.446801]  ret_from_fork_asm+0x1a/0x30
[   26.446974] 
[   26.447057] The buggy address belongs to the object at ffff888105db2a00
[   26.447057]  which belongs to the cache kmalloc-64 of size 64
[   26.447505] The buggy address is located 0 bytes to the right of
[   26.447505]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.447994] 
[   26.448089] The buggy address belongs to the physical page:
[   26.448319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.448629] flags: 0x200000000000000(node=0|zone=2)
[   26.448818] page_type: f5(slab)
[   26.448934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.449161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.449382] page dumped because: kasan: bad access detected
[   26.449547] 
[   26.449613] Memory state around the buggy address:
[   26.449893]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.450219]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.450530] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.450852]                                      ^
[   26.451075]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.451372]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.451582] ==================================================================
---
[   26.149527] ==================================================================
[   26.149831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32ab/0x59f0
[   26.150074] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.150303] 
[   26.150380] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.150427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.150440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.150460] Call Trace:
[   26.150476]  <TASK>
[   26.150492]  dump_stack_lvl+0x73/0xb0
[   26.150519]  print_report+0xd1/0x640
[   26.150542]  ? __virt_addr_valid+0x1db/0x2d0
[   26.150576]  ? kasan_atomics_helper+0x32ab/0x59f0
[   26.150599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.150622]  ? kasan_atomics_helper+0x32ab/0x59f0
[   26.150656]  kasan_report+0x144/0x180
[   26.150679]  ? kasan_atomics_helper+0x32ab/0x59f0
[   26.150706]  kasan_check_range+0x10c/0x1c0
[   26.150731]  __kasan_check_write+0x18/0x20
[   26.150752]  kasan_atomics_helper+0x32ab/0x59f0
[   26.150785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.150809]  ? kasan_save_alloc_info+0x3b/0x50
[   26.150839]  kasan_atomics+0x1dc/0x310
[   26.150881]  ? __pfx_kasan_atomics+0x10/0x10
[   26.150907]  ? __pfx_read_tsc+0x10/0x10
[   26.150927]  ? ktime_get_ts64+0x86/0x230
[   26.150951]  kunit_try_run_case+0x1a5/0x490
[   26.150974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.150996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.151020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.151044]  ? __kthread_parkme+0x82/0x180
[   26.151067]  ? preempt_count_sub+0x50/0x80
[   26.151092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.151116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.151144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.151171]  kthread+0x337/0x6f0
[   26.151190]  ? trace_preempt_on+0x20/0xc0
[   26.151212]  ? __pfx_kthread+0x10/0x10
[   26.151232]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.151254]  ? calculate_sigpending+0x7b/0xa0
[   26.151278]  ? __pfx_kthread+0x10/0x10
[   26.151299]  ret_from_fork+0x1c5/0x240
[   26.151321]  ? __pfx_kthread+0x10/0x10
[   26.151341]  ret_from_fork_asm+0x1a/0x30
[   26.151373]  </TASK>
[   26.151386] 
[   26.158530] Allocated by task 323:
[   26.158722]  kasan_save_stack+0x45/0x70
[   26.158920]  kasan_save_track+0x18/0x40
[   26.159117]  kasan_save_alloc_info+0x3b/0x50
[   26.159322]  __kasan_kmalloc+0xb7/0xc0
[   26.159519]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.159740]  kasan_atomics+0x95/0x310
[   26.159970]  kunit_try_run_case+0x1a5/0x490
[   26.160185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.160427]  kthread+0x337/0x6f0
[   26.160595]  ret_from_fork+0x1c5/0x240
[   26.160799]  ret_from_fork_asm+0x1a/0x30
[   26.160997] 
[   26.161084] The buggy address belongs to the object at ffff888105db2a00
[   26.161084]  which belongs to the cache kmalloc-64 of size 64
[   26.161568] The buggy address is located 0 bytes to the right of
[   26.161568]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.161990] 
[   26.162069] The buggy address belongs to the physical page:
[   26.162267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.162529] flags: 0x200000000000000(node=0|zone=2)
[   26.162706] page_type: f5(slab)
[   26.162844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.163203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.163524] page dumped because: kasan: bad access detected
[   26.163769] 
[   26.163893] Memory state around the buggy address:
[   26.164106]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.164410]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.164715] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.165049]                                      ^
[   26.165263]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.165566]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.165792] ==================================================================
---
[   25.426767] ==================================================================
[   25.427113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1451/0x59f0
[   25.427522] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.427919] 
[   25.428033] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.428104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.428119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.428155] Call Trace:
[   25.428171]  <TASK>
[   25.428186]  dump_stack_lvl+0x73/0xb0
[   25.428215]  print_report+0xd1/0x640
[   25.428239]  ? __virt_addr_valid+0x1db/0x2d0
[   25.428261]  ? kasan_atomics_helper+0x1451/0x59f0
[   25.428283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.428306]  ? kasan_atomics_helper+0x1451/0x59f0
[   25.428329]  kasan_report+0x144/0x180
[   25.428707]  ? kasan_atomics_helper+0x1451/0x59f0
[   25.428736]  kasan_check_range+0x10c/0x1c0
[   25.428760]  __kasan_check_write+0x18/0x20
[   25.428793]  kasan_atomics_helper+0x1451/0x59f0
[   25.428817]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.428841]  ? kasan_save_alloc_info+0x3b/0x50
[   25.428870]  kasan_atomics+0x1dc/0x310
[   25.428894]  ? __pfx_kasan_atomics+0x10/0x10
[   25.429148]  ? __pfx_read_tsc+0x10/0x10
[   25.429175]  ? ktime_get_ts64+0x86/0x230
[   25.429199]  kunit_try_run_case+0x1a5/0x490
[   25.429224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.429247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.429271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.429295]  ? __kthread_parkme+0x82/0x180
[   25.429318]  ? preempt_count_sub+0x50/0x80
[   25.429345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.429369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.429396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.429423]  kthread+0x337/0x6f0
[   25.429442]  ? trace_preempt_on+0x20/0xc0
[   25.429465]  ? __pfx_kthread+0x10/0x10
[   25.429486]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.429507]  ? calculate_sigpending+0x7b/0xa0
[   25.429529]  ? __pfx_kthread+0x10/0x10
[   25.429551]  ret_from_fork+0x1c5/0x240
[   25.429572]  ? __pfx_kthread+0x10/0x10
[   25.429592]  ret_from_fork_asm+0x1a/0x30
[   25.429626]  </TASK>
[   25.429638] 
[   25.439173] Allocated by task 323:
[   25.439404]  kasan_save_stack+0x45/0x70
[   25.439590]  kasan_save_track+0x18/0x40
[   25.439806]  kasan_save_alloc_info+0x3b/0x50
[   25.440003]  __kasan_kmalloc+0xb7/0xc0
[   25.440226]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.440436]  kasan_atomics+0x95/0x310
[   25.440615]  kunit_try_run_case+0x1a5/0x490
[   25.440821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.441345]  kthread+0x337/0x6f0
[   25.441481]  ret_from_fork+0x1c5/0x240
[   25.441640]  ret_from_fork_asm+0x1a/0x30
[   25.441850] 
[   25.441982] The buggy address belongs to the object at ffff888105db2a00
[   25.441982]  which belongs to the cache kmalloc-64 of size 64
[   25.442758] The buggy address is located 0 bytes to the right of
[   25.442758]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.443385] 
[   25.443458] The buggy address belongs to the physical page:
[   25.443738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.444113] flags: 0x200000000000000(node=0|zone=2)
[   25.444448] page_type: f5(slab)
[   25.444659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.445066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.445592] page dumped because: kasan: bad access detected
[   25.445861] 
[   25.445964] Memory state around the buggy address:
[   25.446318]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.446620]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.446932] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.447311]                                      ^
[   25.447559]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.447878]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.448125] ==================================================================
---
[   25.675397] ==================================================================
[   25.675724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f1b/0x59f0
[   25.676235] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.676483] 
[   25.676565] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.676613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.676627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.676648] Call Trace:
[   25.676664]  <TASK>
[   25.676679]  dump_stack_lvl+0x73/0xb0
[   25.676707]  print_report+0xd1/0x640
[   25.676731]  ? __virt_addr_valid+0x1db/0x2d0
[   25.676754]  ? kasan_atomics_helper+0x1f1b/0x59f0
[   25.676790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.677201]  ? kasan_atomics_helper+0x1f1b/0x59f0
[   25.677226]  kasan_report+0x144/0x180
[   25.677250]  ? kasan_atomics_helper+0x1f1b/0x59f0
[   25.677277]  kasan_check_range+0x10c/0x1c0
[   25.677302]  __kasan_check_write+0x18/0x20
[   25.677323]  kasan_atomics_helper+0x1f1b/0x59f0
[   25.677346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.677370]  ? kasan_save_alloc_info+0x3b/0x50
[   25.677399]  kasan_atomics+0x1dc/0x310
[   25.677424]  ? __pfx_kasan_atomics+0x10/0x10
[   25.677450]  ? __pfx_read_tsc+0x10/0x10
[   25.677470]  ? ktime_get_ts64+0x86/0x230
[   25.677494]  kunit_try_run_case+0x1a5/0x490
[   25.677517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.677540]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.677563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.677587]  ? __kthread_parkme+0x82/0x180
[   25.677611]  ? preempt_count_sub+0x50/0x80
[   25.677637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.677661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.677688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.677714]  kthread+0x337/0x6f0
[   25.677733]  ? trace_preempt_on+0x20/0xc0
[   25.677757]  ? __pfx_kthread+0x10/0x10
[   25.677788]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.677810]  ? calculate_sigpending+0x7b/0xa0
[   25.677833]  ? __pfx_kthread+0x10/0x10
[   25.677855]  ret_from_fork+0x1c5/0x240
[   25.677876]  ? __pfx_kthread+0x10/0x10
[   25.677896]  ret_from_fork_asm+0x1a/0x30
[   25.677929]  </TASK>
[   25.677941] 
[   25.687802] Allocated by task 323:
[   25.688067]  kasan_save_stack+0x45/0x70
[   25.688737]  kasan_save_track+0x18/0x40
[   25.688950]  kasan_save_alloc_info+0x3b/0x50
[   25.689351]  __kasan_kmalloc+0xb7/0xc0
[   25.689661]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.690043]  kasan_atomics+0x95/0x310
[   25.690184]  kunit_try_run_case+0x1a5/0x490
[   25.690664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.690914]  kthread+0x337/0x6f0
[   25.691150]  ret_from_fork+0x1c5/0x240
[   25.691330]  ret_from_fork_asm+0x1a/0x30
[   25.691870] 
[   25.692059] The buggy address belongs to the object at ffff888105db2a00
[   25.692059]  which belongs to the cache kmalloc-64 of size 64
[   25.692993] The buggy address is located 0 bytes to the right of
[   25.692993]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.693878] 
[   25.694054] The buggy address belongs to the physical page:
[   25.694314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.694853] flags: 0x200000000000000(node=0|zone=2)
[   25.695191] page_type: f5(slab)
[   25.695507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.695984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.696473] page dumped because: kasan: bad access detected
[   25.696660] 
[   25.696845] Memory state around the buggy address:
[   25.697357]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.697621]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.698154] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.698436]                                      ^
[   25.698636]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.699122]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.699516] ==================================================================
---
[   26.401918] ==================================================================
[   26.402404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ead/0x59f0
[   26.402740] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.403354] 
[   26.403457] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.403506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.403519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.403539] Call Trace:
[   26.403554]  <TASK>
[   26.403570]  dump_stack_lvl+0x73/0xb0
[   26.403596]  print_report+0xd1/0x640
[   26.403619]  ? __virt_addr_valid+0x1db/0x2d0
[   26.403641]  ? kasan_atomics_helper+0x3ead/0x59f0
[   26.403669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.403692]  ? kasan_atomics_helper+0x3ead/0x59f0
[   26.403715]  kasan_report+0x144/0x180
[   26.403737]  ? kasan_atomics_helper+0x3ead/0x59f0
[   26.403765]  kasan_check_range+0x10c/0x1c0
[   26.403799]  __kasan_check_write+0x18/0x20
[   26.403820]  kasan_atomics_helper+0x3ead/0x59f0
[   26.403845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.403884]  ? kasan_save_alloc_info+0x3b/0x50
[   26.403914]  kasan_atomics+0x1dc/0x310
[   26.403937]  ? __pfx_kasan_atomics+0x10/0x10
[   26.403963]  ? __pfx_read_tsc+0x10/0x10
[   26.403983]  ? ktime_get_ts64+0x86/0x230
[   26.404007]  kunit_try_run_case+0x1a5/0x490
[   26.404030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.404075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.404098]  ? __kthread_parkme+0x82/0x180
[   26.404121]  ? preempt_count_sub+0x50/0x80
[   26.404148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.404198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.404224]  kthread+0x337/0x6f0
[   26.404243]  ? trace_preempt_on+0x20/0xc0
[   26.404265]  ? __pfx_kthread+0x10/0x10
[   26.404285]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.404307]  ? calculate_sigpending+0x7b/0xa0
[   26.404329]  ? __pfx_kthread+0x10/0x10
[   26.404350]  ret_from_fork+0x1c5/0x240
[   26.404372]  ? __pfx_kthread+0x10/0x10
[   26.404393]  ret_from_fork_asm+0x1a/0x30
[   26.404425]  </TASK>
[   26.404436] 
[   26.411510] Allocated by task 323:
[   26.411663]  kasan_save_stack+0x45/0x70
[   26.411855]  kasan_save_track+0x18/0x40
[   26.412016]  kasan_save_alloc_info+0x3b/0x50
[   26.412197]  __kasan_kmalloc+0xb7/0xc0
[   26.412360]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.412557]  kasan_atomics+0x95/0x310
[   26.412724]  kunit_try_run_case+0x1a5/0x490
[   26.412954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.413186]  kthread+0x337/0x6f0
[   26.413327]  ret_from_fork+0x1c5/0x240
[   26.413511]  ret_from_fork_asm+0x1a/0x30
[   26.413677] 
[   26.413749] The buggy address belongs to the object at ffff888105db2a00
[   26.413749]  which belongs to the cache kmalloc-64 of size 64
[   26.414357] The buggy address is located 0 bytes to the right of
[   26.414357]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.414834] 
[   26.414931] The buggy address belongs to the physical page:
[   26.415145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.415442] flags: 0x200000000000000(node=0|zone=2)
[   26.415639] page_type: f5(slab)
[   26.415788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.416173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.416397] page dumped because: kasan: bad access detected
[   26.416565] 
[   26.416629] Memory state around the buggy address:
[   26.416790]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.417000]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.417211] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.417418]                                      ^
[   26.417568]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.417814]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.418168] ==================================================================
---
[   25.468513] ==================================================================
[   25.468982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1741/0x59f0
[   25.469546] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.469900] 
[   25.470023] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.470318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.470338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.470361] Call Trace:
[   25.470378]  <TASK>
[   25.470394]  dump_stack_lvl+0x73/0xb0
[   25.470425]  print_report+0xd1/0x640
[   25.470449]  ? __virt_addr_valid+0x1db/0x2d0
[   25.470471]  ? kasan_atomics_helper+0x1741/0x59f0
[   25.470495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.470520]  ? kasan_atomics_helper+0x1741/0x59f0
[   25.470543]  kasan_report+0x144/0x180
[   25.470566]  ? kasan_atomics_helper+0x1741/0x59f0
[   25.470594]  kasan_check_range+0x10c/0x1c0
[   25.470619]  __kasan_check_write+0x18/0x20
[   25.470639]  kasan_atomics_helper+0x1741/0x59f0
[   25.470663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.470687]  ? kasan_save_alloc_info+0x3b/0x50
[   25.470717]  kasan_atomics+0x1dc/0x310
[   25.470742]  ? __pfx_kasan_atomics+0x10/0x10
[   25.470767]  ? __pfx_read_tsc+0x10/0x10
[   25.470799]  ? ktime_get_ts64+0x86/0x230
[   25.470825]  kunit_try_run_case+0x1a5/0x490
[   25.470849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.470882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.470906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.470929]  ? __kthread_parkme+0x82/0x180
[   25.470954]  ? preempt_count_sub+0x50/0x80
[   25.470980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.471004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.471051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.471091]  kthread+0x337/0x6f0
[   25.471111]  ? trace_preempt_on+0x20/0xc0
[   25.471400]  ? __pfx_kthread+0x10/0x10
[   25.471435]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.471459]  ? calculate_sigpending+0x7b/0xa0
[   25.471483]  ? __pfx_kthread+0x10/0x10
[   25.471505]  ret_from_fork+0x1c5/0x240
[   25.471528]  ? __pfx_kthread+0x10/0x10
[   25.471550]  ret_from_fork_asm+0x1a/0x30
[   25.471584]  </TASK>
[   25.471597] 
[   25.480324] Allocated by task 323:
[   25.480508]  kasan_save_stack+0x45/0x70
[   25.480731]  kasan_save_track+0x18/0x40
[   25.480971]  kasan_save_alloc_info+0x3b/0x50
[   25.481233]  __kasan_kmalloc+0xb7/0xc0
[   25.481445]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.481661]  kasan_atomics+0x95/0x310
[   25.481836]  kunit_try_run_case+0x1a5/0x490
[   25.482043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.482391]  kthread+0x337/0x6f0
[   25.482547]  ret_from_fork+0x1c5/0x240
[   25.482720]  ret_from_fork_asm+0x1a/0x30
[   25.482869] 
[   25.482962] The buggy address belongs to the object at ffff888105db2a00
[   25.482962]  which belongs to the cache kmalloc-64 of size 64
[   25.483804] The buggy address is located 0 bytes to the right of
[   25.483804]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.484341] 
[   25.484467] The buggy address belongs to the physical page:
[   25.484833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.485198] flags: 0x200000000000000(node=0|zone=2)
[   25.485427] page_type: f5(slab)
[   25.485590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.486131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.486521] page dumped because: kasan: bad access detected
[   25.486769] 
[   25.486869] Memory state around the buggy address:
[   25.487053]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.487710]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.488027] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.488238]                                      ^
[   25.488390]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.488622]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.488968] ==================================================================
---
[   25.626335] ==================================================================
[   25.626620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1da8/0x59f0
[   25.626968] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.627560] 
[   25.627680] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.627885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.627928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.628008] Call Trace:
[   25.628024]  <TASK>
[   25.628040]  dump_stack_lvl+0x73/0xb0
[   25.628070]  print_report+0xd1/0x640
[   25.628204]  ? __virt_addr_valid+0x1db/0x2d0
[   25.628228]  ? kasan_atomics_helper+0x1da8/0x59f0
[   25.628252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.628275]  ? kasan_atomics_helper+0x1da8/0x59f0
[   25.628298]  kasan_report+0x144/0x180
[   25.628342]  ? kasan_atomics_helper+0x1da8/0x59f0
[   25.628384]  kasan_check_range+0x10c/0x1c0
[   25.628534]  __kasan_check_write+0x18/0x20
[   25.628560]  kasan_atomics_helper+0x1da8/0x59f0
[   25.628585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.628609]  ? kasan_save_alloc_info+0x3b/0x50
[   25.628639]  kasan_atomics+0x1dc/0x310
[   25.628662]  ? __pfx_kasan_atomics+0x10/0x10
[   25.628687]  ? __pfx_read_tsc+0x10/0x10
[   25.628708]  ? ktime_get_ts64+0x86/0x230
[   25.628732]  kunit_try_run_case+0x1a5/0x490
[   25.628756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.628788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.628811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.628835]  ? __kthread_parkme+0x82/0x180
[   25.628858]  ? preempt_count_sub+0x50/0x80
[   25.628885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.628908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.628934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.628961]  kthread+0x337/0x6f0
[   25.628980]  ? trace_preempt_on+0x20/0xc0
[   25.629003]  ? __pfx_kthread+0x10/0x10
[   25.629023]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.629045]  ? calculate_sigpending+0x7b/0xa0
[   25.629068]  ? __pfx_kthread+0x10/0x10
[   25.629089]  ret_from_fork+0x1c5/0x240
[   25.629111]  ? __pfx_kthread+0x10/0x10
[   25.629131]  ret_from_fork_asm+0x1a/0x30
[   25.629164]  </TASK>
[   25.629175] 
[   25.640533] Allocated by task 323:
[   25.640694]  kasan_save_stack+0x45/0x70
[   25.640981]  kasan_save_track+0x18/0x40
[   25.641169]  kasan_save_alloc_info+0x3b/0x50
[   25.641835]  __kasan_kmalloc+0xb7/0xc0
[   25.642033]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.642382]  kasan_atomics+0x95/0x310
[   25.642543]  kunit_try_run_case+0x1a5/0x490
[   25.642893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.643356]  kthread+0x337/0x6f0
[   25.643701]  ret_from_fork+0x1c5/0x240
[   25.643978]  ret_from_fork_asm+0x1a/0x30
[   25.644333] 
[   25.644433] The buggy address belongs to the object at ffff888105db2a00
[   25.644433]  which belongs to the cache kmalloc-64 of size 64
[   25.645160] The buggy address is located 0 bytes to the right of
[   25.645160]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.646002] 
[   25.646109] The buggy address belongs to the physical page:
[   25.646569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.646961] flags: 0x200000000000000(node=0|zone=2)
[   25.647174] page_type: f5(slab)
[   25.647366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.648148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.648617] page dumped because: kasan: bad access detected
[   25.648885] 
[   25.648979] Memory state around the buggy address:
[   25.649602]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.649935]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.650305] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.650837]                                      ^
[   25.651128]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651494]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651911] ==================================================================
---
[   25.298659] ==================================================================
[   25.299663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xce9/0x59f0
[   25.300282] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.301174] 
[   25.301279] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.301330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.301343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.301366] Call Trace:
[   25.301381]  <TASK>
[   25.301399]  dump_stack_lvl+0x73/0xb0
[   25.301430]  print_report+0xd1/0x640
[   25.301454]  ? __virt_addr_valid+0x1db/0x2d0
[   25.301476]  ? kasan_atomics_helper+0xce9/0x59f0
[   25.301499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.301523]  ? kasan_atomics_helper+0xce9/0x59f0
[   25.301545]  kasan_report+0x144/0x180
[   25.301568]  ? kasan_atomics_helper+0xce9/0x59f0
[   25.301596]  kasan_check_range+0x10c/0x1c0
[   25.301622]  __kasan_check_write+0x18/0x20
[   25.301642]  kasan_atomics_helper+0xce9/0x59f0
[   25.301666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.301690]  ? kasan_save_alloc_info+0x3b/0x50
[   25.301720]  kasan_atomics+0x1dc/0x310
[   25.301744]  ? __pfx_kasan_atomics+0x10/0x10
[   25.301769]  ? __pfx_read_tsc+0x10/0x10
[   25.301803]  ? ktime_get_ts64+0x86/0x230
[   25.301827]  kunit_try_run_case+0x1a5/0x490
[   25.301852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.301875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.301898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.302092]  ? __kthread_parkme+0x82/0x180
[   25.302122]  ? preempt_count_sub+0x50/0x80
[   25.302149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.302174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.302202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.302230]  kthread+0x337/0x6f0
[   25.302249]  ? trace_preempt_on+0x20/0xc0
[   25.302273]  ? __pfx_kthread+0x10/0x10
[   25.302293]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.302315]  ? calculate_sigpending+0x7b/0xa0
[   25.302339]  ? __pfx_kthread+0x10/0x10
[   25.302360]  ret_from_fork+0x1c5/0x240
[   25.302382]  ? __pfx_kthread+0x10/0x10
[   25.302403]  ret_from_fork_asm+0x1a/0x30
[   25.302436]  </TASK>
[   25.302450] 
[   25.313444] Allocated by task 323:
[   25.313623]  kasan_save_stack+0x45/0x70
[   25.313832]  kasan_save_track+0x18/0x40
[   25.314462]  kasan_save_alloc_info+0x3b/0x50
[   25.314658]  __kasan_kmalloc+0xb7/0xc0
[   25.315050]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.315483]  kasan_atomics+0x95/0x310
[   25.315660]  kunit_try_run_case+0x1a5/0x490
[   25.316084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.316587]  kthread+0x337/0x6f0
[   25.316737]  ret_from_fork+0x1c5/0x240
[   25.317146]  ret_from_fork_asm+0x1a/0x30
[   25.317351] 
[   25.317439] The buggy address belongs to the object at ffff888105db2a00
[   25.317439]  which belongs to the cache kmalloc-64 of size 64
[   25.318428] The buggy address is located 0 bytes to the right of
[   25.318428]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.319280] 
[   25.319486] The buggy address belongs to the physical page:
[   25.319839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.320342] flags: 0x200000000000000(node=0|zone=2)
[   25.320765] page_type: f5(slab)
[   25.320985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.321477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.321837] page dumped because: kasan: bad access detected
[   25.322255] 
[   25.322329] Memory state around the buggy address:
[   25.322551]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.322789]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.323349] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.323608]                                      ^
[   25.324040]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.324390]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.324792] ==================================================================
---
[   26.285942] ==================================================================
[   26.286310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3aa6/0x59f0
[   26.286544] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.286852] 
[   26.286956] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.287005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.287018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.287041] Call Trace:
[   26.287058]  <TASK>
[   26.287075]  dump_stack_lvl+0x73/0xb0
[   26.287105]  print_report+0xd1/0x640
[   26.287132]  ? __virt_addr_valid+0x1db/0x2d0
[   26.287155]  ? kasan_atomics_helper+0x3aa6/0x59f0
[   26.287178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.287201]  ? kasan_atomics_helper+0x3aa6/0x59f0
[   26.287224]  kasan_report+0x144/0x180
[   26.287248]  ? kasan_atomics_helper+0x3aa6/0x59f0
[   26.287276]  kasan_check_range+0x10c/0x1c0
[   26.287302]  __kasan_check_write+0x18/0x20
[   26.287323]  kasan_atomics_helper+0x3aa6/0x59f0
[   26.287347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.287370]  ? kasan_save_alloc_info+0x3b/0x50
[   26.287425]  kasan_atomics+0x1dc/0x310
[   26.287450]  ? __pfx_kasan_atomics+0x10/0x10
[   26.287475]  ? __pfx_read_tsc+0x10/0x10
[   26.287497]  ? ktime_get_ts64+0x86/0x230
[   26.287522]  kunit_try_run_case+0x1a5/0x490
[   26.287546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.287569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.287593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.287616]  ? __kthread_parkme+0x82/0x180
[   26.287641]  ? preempt_count_sub+0x50/0x80
[   26.287680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.287707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.287736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.287763]  kthread+0x337/0x6f0
[   26.287792]  ? trace_preempt_on+0x20/0xc0
[   26.287815]  ? __pfx_kthread+0x10/0x10
[   26.287837]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.287860]  ? calculate_sigpending+0x7b/0xa0
[   26.287897]  ? __pfx_kthread+0x10/0x10
[   26.287919]  ret_from_fork+0x1c5/0x240
[   26.287941]  ? __pfx_kthread+0x10/0x10
[   26.287963]  ret_from_fork_asm+0x1a/0x30
[   26.287999]  </TASK>
[   26.288013] 
[   26.304209] Allocated by task 323:
[   26.304640]  kasan_save_stack+0x45/0x70
[   26.305058]  kasan_save_track+0x18/0x40
[   26.305202]  kasan_save_alloc_info+0x3b/0x50
[   26.305348]  __kasan_kmalloc+0xb7/0xc0
[   26.305472]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.305626]  kasan_atomics+0x95/0x310
[   26.305755]  kunit_try_run_case+0x1a5/0x490
[   26.305983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.306563]  kthread+0x337/0x6f0
[   26.306893]  ret_from_fork+0x1c5/0x240
[   26.307106]  ret_from_fork_asm+0x1a/0x30
[   26.307413] 
[   26.307492] The buggy address belongs to the object at ffff888105db2a00
[   26.307492]  which belongs to the cache kmalloc-64 of size 64
[   26.308293] The buggy address is located 0 bytes to the right of
[   26.308293]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.309051] 
[   26.309168] The buggy address belongs to the physical page:
[   26.309456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.309800] flags: 0x200000000000000(node=0|zone=2)
[   26.310049] page_type: f5(slab)
[   26.310215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.310558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.311314] page dumped because: kasan: bad access detected
[   26.311663] 
[   26.311768] Memory state around the buggy address:
[   26.312149]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.312568]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.313001] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.313282]                                      ^
[   26.313592]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.314025]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.314401] ==================================================================
---
[   26.017261] ==================================================================
[   26.017604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2a06/0x59f0
[   26.017917] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.018312] 
[   26.018496] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.018580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.018595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.018617] Call Trace:
[   26.018634]  <TASK>
[   26.018648]  dump_stack_lvl+0x73/0xb0
[   26.018675]  print_report+0xd1/0x640
[   26.018699]  ? __virt_addr_valid+0x1db/0x2d0
[   26.018754]  ? kasan_atomics_helper+0x2a06/0x59f0
[   26.018788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.018811]  ? kasan_atomics_helper+0x2a06/0x59f0
[   26.018834]  kasan_report+0x144/0x180
[   26.018857]  ? kasan_atomics_helper+0x2a06/0x59f0
[   26.018924]  kasan_check_range+0x10c/0x1c0
[   26.018950]  __kasan_check_write+0x18/0x20
[   26.018970]  kasan_atomics_helper+0x2a06/0x59f0
[   26.018994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.019018]  ? kasan_save_alloc_info+0x3b/0x50
[   26.019049]  kasan_atomics+0x1dc/0x310
[   26.019104]  ? __pfx_kasan_atomics+0x10/0x10
[   26.019130]  ? __pfx_read_tsc+0x10/0x10
[   26.019149]  ? ktime_get_ts64+0x86/0x230
[   26.019174]  kunit_try_run_case+0x1a5/0x490
[   26.019199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.019252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.019276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.019299]  ? __kthread_parkme+0x82/0x180
[   26.019324]  ? preempt_count_sub+0x50/0x80
[   26.019350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.019404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.019433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.019460]  kthread+0x337/0x6f0
[   26.019479]  ? trace_preempt_on+0x20/0xc0
[   26.019502]  ? __pfx_kthread+0x10/0x10
[   26.019522]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.019576]  ? calculate_sigpending+0x7b/0xa0
[   26.019599]  ? __pfx_kthread+0x10/0x10
[   26.019620]  ret_from_fork+0x1c5/0x240
[   26.019642]  ? __pfx_kthread+0x10/0x10
[   26.019670]  ret_from_fork_asm+0x1a/0x30
[   26.019729]  </TASK>
[   26.019743] 
[   26.029375] Allocated by task 323:
[   26.029510]  kasan_save_stack+0x45/0x70
[   26.029654]  kasan_save_track+0x18/0x40
[   26.029797]  kasan_save_alloc_info+0x3b/0x50
[   26.029943]  __kasan_kmalloc+0xb7/0xc0
[   26.030071]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.030221]  kasan_atomics+0x95/0x310
[   26.030348]  kunit_try_run_case+0x1a5/0x490
[   26.030488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.031938]  kthread+0x337/0x6f0
[   26.032965]  ret_from_fork+0x1c5/0x240
[   26.033399]  ret_from_fork_asm+0x1a/0x30
[   26.033849] 
[   26.034167] The buggy address belongs to the object at ffff888105db2a00
[   26.034167]  which belongs to the cache kmalloc-64 of size 64
[   26.034724] The buggy address is located 0 bytes to the right of
[   26.034724]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.036582] 
[   26.036689] The buggy address belongs to the physical page:
[   26.036992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.037348] flags: 0x200000000000000(node=0|zone=2)
[   26.037577] page_type: f5(slab)
[   26.037694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.038393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.038742] page dumped because: kasan: bad access detected
[   26.039047] 
[   26.039191] Memory state around the buggy address:
[   26.039470]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.039810]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.040188] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.040461]                                      ^
[   26.040647]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.041046]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.041320] ==================================================================
---
[   25.325505] ==================================================================
[   25.325757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe23/0x59f0
[   25.326037] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.326353] 
[   25.326448] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.326496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.326532] Call Trace:
[   25.326549]  <TASK>
[   25.326566]  dump_stack_lvl+0x73/0xb0
[   25.326608]  print_report+0xd1/0x640
[   25.326633]  ? __virt_addr_valid+0x1db/0x2d0
[   25.326656]  ? kasan_atomics_helper+0xe23/0x59f0
[   25.326677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.326702]  ? kasan_atomics_helper+0xe23/0x59f0
[   25.326725]  kasan_report+0x144/0x180
[   25.326748]  ? kasan_atomics_helper+0xe23/0x59f0
[   25.326785]  kasan_check_range+0x10c/0x1c0
[   25.326810]  __kasan_check_write+0x18/0x20
[   25.326831]  kasan_atomics_helper+0xe23/0x59f0
[   25.326854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.327035]  ? kasan_save_alloc_info+0x3b/0x50
[   25.327074]  kasan_atomics+0x1dc/0x310
[   25.327100]  ? __pfx_kasan_atomics+0x10/0x10
[   25.327126]  ? __pfx_read_tsc+0x10/0x10
[   25.327202]  ? ktime_get_ts64+0x86/0x230
[   25.327229]  kunit_try_run_case+0x1a5/0x490
[   25.327254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.327278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.327303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.327328]  ? __kthread_parkme+0x82/0x180
[   25.327351]  ? preempt_count_sub+0x50/0x80
[   25.327378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.327400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.327427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.327455]  kthread+0x337/0x6f0
[   25.327473]  ? trace_preempt_on+0x20/0xc0
[   25.327496]  ? __pfx_kthread+0x10/0x10
[   25.327516]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.327538]  ? calculate_sigpending+0x7b/0xa0
[   25.327560]  ? __pfx_kthread+0x10/0x10
[   25.327582]  ret_from_fork+0x1c5/0x240
[   25.327604]  ? __pfx_kthread+0x10/0x10
[   25.327625]  ret_from_fork_asm+0x1a/0x30
[   25.327663]  </TASK>
[   25.327676] 
[   25.335398] Allocated by task 323:
[   25.335576]  kasan_save_stack+0x45/0x70
[   25.335763]  kasan_save_track+0x18/0x40
[   25.335969]  kasan_save_alloc_info+0x3b/0x50
[   25.336143]  __kasan_kmalloc+0xb7/0xc0
[   25.336323]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.336531]  kasan_atomics+0x95/0x310
[   25.336715]  kunit_try_run_case+0x1a5/0x490
[   25.336890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.337130]  kthread+0x337/0x6f0
[   25.337263]  ret_from_fork+0x1c5/0x240
[   25.337427]  ret_from_fork_asm+0x1a/0x30
[   25.337588] 
[   25.337683] The buggy address belongs to the object at ffff888105db2a00
[   25.337683]  which belongs to the cache kmalloc-64 of size 64
[   25.338452] The buggy address is located 0 bytes to the right of
[   25.338452]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.338932] 
[   25.339001] The buggy address belongs to the physical page:
[   25.339266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.339696] flags: 0x200000000000000(node=0|zone=2)
[   25.339973] page_type: f5(slab)
[   25.340182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.340486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.340795] page dumped because: kasan: bad access detected
[   25.341015] 
[   25.341107] Memory state around the buggy address:
[   25.341377]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.341661]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.341912] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.342119]                                      ^
[   25.342268]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.342478]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.342683] ==================================================================
---
[   26.184228] ==================================================================
[   26.184466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3588/0x59f0
[   26.185064] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.185381] 
[   26.185542] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.185592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.185606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.185627] Call Trace:
[   26.185644]  <TASK>
[   26.185659]  dump_stack_lvl+0x73/0xb0
[   26.185687]  print_report+0xd1/0x640
[   26.185710]  ? __virt_addr_valid+0x1db/0x2d0
[   26.185733]  ? kasan_atomics_helper+0x3588/0x59f0
[   26.185755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.185788]  ? kasan_atomics_helper+0x3588/0x59f0
[   26.185812]  kasan_report+0x144/0x180
[   26.185836]  ? kasan_atomics_helper+0x3588/0x59f0
[   26.185884]  kasan_check_range+0x10c/0x1c0
[   26.185910]  __kasan_check_write+0x18/0x20
[   26.185930]  kasan_atomics_helper+0x3588/0x59f0
[   26.185953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.185978]  ? kasan_save_alloc_info+0x3b/0x50
[   26.186008]  kasan_atomics+0x1dc/0x310
[   26.186032]  ? __pfx_kasan_atomics+0x10/0x10
[   26.186057]  ? __pfx_read_tsc+0x10/0x10
[   26.186077]  ? ktime_get_ts64+0x86/0x230
[   26.186101]  kunit_try_run_case+0x1a5/0x490
[   26.186125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.186147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.186171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.186194]  ? __kthread_parkme+0x82/0x180
[   26.186218]  ? preempt_count_sub+0x50/0x80
[   26.186245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.186269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.186295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.186323]  kthread+0x337/0x6f0
[   26.186341]  ? trace_preempt_on+0x20/0xc0
[   26.186364]  ? __pfx_kthread+0x10/0x10
[   26.186384]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.186407]  ? calculate_sigpending+0x7b/0xa0
[   26.186431]  ? __pfx_kthread+0x10/0x10
[   26.186452]  ret_from_fork+0x1c5/0x240
[   26.186474]  ? __pfx_kthread+0x10/0x10
[   26.186530]  ret_from_fork_asm+0x1a/0x30
[   26.186563]  </TASK>
[   26.186587] 
[   26.194075] Allocated by task 323:
[   26.194201]  kasan_save_stack+0x45/0x70
[   26.194339]  kasan_save_track+0x18/0x40
[   26.194558]  kasan_save_alloc_info+0x3b/0x50
[   26.194768]  __kasan_kmalloc+0xb7/0xc0
[   26.194985]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.195201]  kasan_atomics+0x95/0x310
[   26.195383]  kunit_try_run_case+0x1a5/0x490
[   26.195582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.195849]  kthread+0x337/0x6f0
[   26.196031]  ret_from_fork+0x1c5/0x240
[   26.196201]  ret_from_fork_asm+0x1a/0x30
[   26.196335] 
[   26.196402] The buggy address belongs to the object at ffff888105db2a00
[   26.196402]  which belongs to the cache kmalloc-64 of size 64
[   26.196917] The buggy address is located 0 bytes to the right of
[   26.196917]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.197491] 
[   26.197587] The buggy address belongs to the physical page:
[   26.197970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.198290] flags: 0x200000000000000(node=0|zone=2)
[   26.198518] page_type: f5(slab)
[   26.198638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.198900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.199126] page dumped because: kasan: bad access detected
[   26.199401] 
[   26.199491] Memory state around the buggy address:
[   26.199713]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.200056]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.200366] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.200670]                                      ^
[   26.200918]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.201130]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.201339] ==================================================================
---
[   26.363477] ==================================================================
[   26.363817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3d47/0x59f0
[   26.364351] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.364828] 
[   26.365002] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.365106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.365122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.365146] Call Trace:
[   26.365161]  <TASK>
[   26.365179]  dump_stack_lvl+0x73/0xb0
[   26.365211]  print_report+0xd1/0x640
[   26.365332]  ? __virt_addr_valid+0x1db/0x2d0
[   26.365357]  ? kasan_atomics_helper+0x3d47/0x59f0
[   26.365379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.365402]  ? kasan_atomics_helper+0x3d47/0x59f0
[   26.365426]  kasan_report+0x144/0x180
[   26.365449]  ? kasan_atomics_helper+0x3d47/0x59f0
[   26.365476]  kasan_check_range+0x10c/0x1c0
[   26.365503]  __kasan_check_write+0x18/0x20
[   26.365524]  kasan_atomics_helper+0x3d47/0x59f0
[   26.365547]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.365571]  ? kasan_save_alloc_info+0x3b/0x50
[   26.365602]  kasan_atomics+0x1dc/0x310
[   26.365626]  ? __pfx_kasan_atomics+0x10/0x10
[   26.365651]  ? __pfx_read_tsc+0x10/0x10
[   26.365672]  ? ktime_get_ts64+0x86/0x230
[   26.365697]  kunit_try_run_case+0x1a5/0x490
[   26.365720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.365742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.365766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.365802]  ? __kthread_parkme+0x82/0x180
[   26.365827]  ? preempt_count_sub+0x50/0x80
[   26.365854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.365889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.365916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.365943]  kthread+0x337/0x6f0
[   26.365963]  ? trace_preempt_on+0x20/0xc0
[   26.365985]  ? __pfx_kthread+0x10/0x10
[   26.366005]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.366028]  ? calculate_sigpending+0x7b/0xa0
[   26.366052]  ? __pfx_kthread+0x10/0x10
[   26.366074]  ret_from_fork+0x1c5/0x240
[   26.366098]  ? __pfx_kthread+0x10/0x10
[   26.366119]  ret_from_fork_asm+0x1a/0x30
[   26.366154]  </TASK>
[   26.366168] 
[   26.375104] Allocated by task 323:
[   26.375268]  kasan_save_stack+0x45/0x70
[   26.375457]  kasan_save_track+0x18/0x40
[   26.375616]  kasan_save_alloc_info+0x3b/0x50
[   26.375809]  __kasan_kmalloc+0xb7/0xc0
[   26.375976]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.376667]  kasan_atomics+0x95/0x310
[   26.376955]  kunit_try_run_case+0x1a5/0x490
[   26.377147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.377485]  kthread+0x337/0x6f0
[   26.377644]  ret_from_fork+0x1c5/0x240
[   26.377969]  ret_from_fork_asm+0x1a/0x30
[   26.378127] 
[   26.378370] The buggy address belongs to the object at ffff888105db2a00
[   26.378370]  which belongs to the cache kmalloc-64 of size 64
[   26.378961] The buggy address is located 0 bytes to the right of
[   26.378961]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.379635] 
[   26.379723] The buggy address belongs to the physical page:
[   26.379962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.380443] flags: 0x200000000000000(node=0|zone=2)
[   26.380659] page_type: f5(slab)
[   26.380817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.381324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.381681] page dumped because: kasan: bad access detected
[   26.381916] 
[   26.382022] Memory state around the buggy address:
[   26.382338]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.382722]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.383142] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.383392]                                      ^
[   26.383681]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.383972]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.384439] ==================================================================
---
[   25.517627] ==================================================================
[   25.518059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bb/0x59f0
[   25.518876] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.519598] 
[   25.519858] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.519911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.519926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.519949] Call Trace:
[   25.519966]  <TASK>
[   25.519982]  dump_stack_lvl+0x73/0xb0
[   25.520014]  print_report+0xd1/0x640
[   25.520038]  ? __virt_addr_valid+0x1db/0x2d0
[   25.520062]  ? kasan_atomics_helper+0x18bb/0x59f0
[   25.520085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.520108]  ? kasan_atomics_helper+0x18bb/0x59f0
[   25.520131]  kasan_report+0x144/0x180
[   25.520154]  ? kasan_atomics_helper+0x18bb/0x59f0
[   25.520182]  kasan_check_range+0x10c/0x1c0
[   25.520208]  __kasan_check_write+0x18/0x20
[   25.520228]  kasan_atomics_helper+0x18bb/0x59f0
[   25.520264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.520289]  ? kasan_save_alloc_info+0x3b/0x50
[   25.520318]  kasan_atomics+0x1dc/0x310
[   25.520342]  ? __pfx_kasan_atomics+0x10/0x10
[   25.520367]  ? __pfx_read_tsc+0x10/0x10
[   25.520389]  ? ktime_get_ts64+0x86/0x230
[   25.520413]  kunit_try_run_case+0x1a5/0x490
[   25.520437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.520460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.520483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.520507]  ? __kthread_parkme+0x82/0x180
[   25.520531]  ? preempt_count_sub+0x50/0x80
[   25.520558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.520581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.520608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.520635]  kthread+0x337/0x6f0
[   25.520654]  ? trace_preempt_on+0x20/0xc0
[   25.520678]  ? __pfx_kthread+0x10/0x10
[   25.520698]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.520720]  ? calculate_sigpending+0x7b/0xa0
[   25.520744]  ? __pfx_kthread+0x10/0x10
[   25.520766]  ret_from_fork+0x1c5/0x240
[   25.520800]  ? __pfx_kthread+0x10/0x10
[   25.520820]  ret_from_fork_asm+0x1a/0x30
[   25.520854]  </TASK>
[   25.520868] 
[   25.533674] Allocated by task 323:
[   25.533812]  kasan_save_stack+0x45/0x70
[   25.533951]  kasan_save_track+0x18/0x40
[   25.534099]  kasan_save_alloc_info+0x3b/0x50
[   25.534304]  __kasan_kmalloc+0xb7/0xc0
[   25.534512]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.534730]  kasan_atomics+0x95/0x310
[   25.534960]  kunit_try_run_case+0x1a5/0x490
[   25.535114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.535289]  kthread+0x337/0x6f0
[   25.535412]  ret_from_fork+0x1c5/0x240
[   25.535766]  ret_from_fork_asm+0x1a/0x30
[   25.536097] 
[   25.536176] The buggy address belongs to the object at ffff888105db2a00
[   25.536176]  which belongs to the cache kmalloc-64 of size 64
[   25.536638] The buggy address is located 0 bytes to the right of
[   25.536638]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.537156] 
[   25.537225] The buggy address belongs to the physical page:
[   25.537396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.537992] flags: 0x200000000000000(node=0|zone=2)
[   25.538200] page_type: f5(slab)
[   25.538341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.538726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.539053] page dumped because: kasan: bad access detected
[   25.539220] 
[   25.539285] Memory state around the buggy address:
[   25.539436]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.540146]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.540684] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.541013]                                      ^
[   25.541193]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.541471]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.541808] ==================================================================
---
[   26.132474] ==================================================================
[   26.132909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x316c/0x59f0
[   26.133340] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.133700] 
[   26.133811] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.133877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.133892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.133912] Call Trace:
[   26.133926]  <TASK>
[   26.133941]  dump_stack_lvl+0x73/0xb0
[   26.133967]  print_report+0xd1/0x640
[   26.133991]  ? __virt_addr_valid+0x1db/0x2d0
[   26.134013]  ? kasan_atomics_helper+0x316c/0x59f0
[   26.134035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.134058]  ? kasan_atomics_helper+0x316c/0x59f0
[   26.134080]  kasan_report+0x144/0x180
[   26.134103]  ? kasan_atomics_helper+0x316c/0x59f0
[   26.134131]  kasan_check_range+0x10c/0x1c0
[   26.134155]  __kasan_check_write+0x18/0x20
[   26.134176]  kasan_atomics_helper+0x316c/0x59f0
[   26.134200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.134224]  ? kasan_save_alloc_info+0x3b/0x50
[   26.134264]  kasan_atomics+0x1dc/0x310
[   26.134289]  ? __pfx_kasan_atomics+0x10/0x10
[   26.134313]  ? __pfx_read_tsc+0x10/0x10
[   26.134345]  ? ktime_get_ts64+0x86/0x230
[   26.134369]  kunit_try_run_case+0x1a5/0x490
[   26.134393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.134438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.134462]  ? __kthread_parkme+0x82/0x180
[   26.134486]  ? preempt_count_sub+0x50/0x80
[   26.134513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.134564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.134592]  kthread+0x337/0x6f0
[   26.134611]  ? trace_preempt_on+0x20/0xc0
[   26.134634]  ? __pfx_kthread+0x10/0x10
[   26.134654]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.134676]  ? calculate_sigpending+0x7b/0xa0
[   26.134699]  ? __pfx_kthread+0x10/0x10
[   26.134721]  ret_from_fork+0x1c5/0x240
[   26.134743]  ? __pfx_kthread+0x10/0x10
[   26.134764]  ret_from_fork_asm+0x1a/0x30
[   26.134805]  </TASK>
[   26.134818] 
[   26.141811] Allocated by task 323:
[   26.142015]  kasan_save_stack+0x45/0x70
[   26.142214]  kasan_save_track+0x18/0x40
[   26.142403]  kasan_save_alloc_info+0x3b/0x50
[   26.142581]  __kasan_kmalloc+0xb7/0xc0
[   26.142791]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.142963]  kasan_atomics+0x95/0x310
[   26.143088]  kunit_try_run_case+0x1a5/0x490
[   26.143225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.143392]  kthread+0x337/0x6f0
[   26.143567]  ret_from_fork+0x1c5/0x240
[   26.143769]  ret_from_fork_asm+0x1a/0x30
[   26.143996] 
[   26.144086] The buggy address belongs to the object at ffff888105db2a00
[   26.144086]  which belongs to the cache kmalloc-64 of size 64
[   26.144594] The buggy address is located 0 bytes to the right of
[   26.144594]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.145069] 
[   26.145136] The buggy address belongs to the physical page:
[   26.145331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.145681] flags: 0x200000000000000(node=0|zone=2)
[   26.145958] page_type: f5(slab)
[   26.146118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.146437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.146746] page dumped because: kasan: bad access detected
[   26.147000] 
[   26.147094] Memory state around the buggy address:
[   26.147295]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.147599]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.147933] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.148225]                                      ^
[   26.148412]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.148711]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.149060] ==================================================================
---
[   25.970709] ==================================================================
[   25.971257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x278f/0x59f0
[   25.971610] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.972365] 
[   25.972722] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.972788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.972803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.972936] Call Trace:
[   25.972957]  <TASK>
[   25.972975]  dump_stack_lvl+0x73/0xb0
[   25.973006]  print_report+0xd1/0x640
[   25.973030]  ? __virt_addr_valid+0x1db/0x2d0
[   25.973053]  ? kasan_atomics_helper+0x278f/0x59f0
[   25.973076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.973099]  ? kasan_atomics_helper+0x278f/0x59f0
[   25.973121]  kasan_report+0x144/0x180
[   25.973146]  ? kasan_atomics_helper+0x278f/0x59f0
[   25.973183]  kasan_check_range+0x10c/0x1c0
[   25.973208]  __kasan_check_write+0x18/0x20
[   25.973228]  kasan_atomics_helper+0x278f/0x59f0
[   25.973252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.973275]  ? kasan_save_alloc_info+0x3b/0x50
[   25.973305]  kasan_atomics+0x1dc/0x310
[   25.973329]  ? __pfx_kasan_atomics+0x10/0x10
[   25.973355]  ? __pfx_read_tsc+0x10/0x10
[   25.973375]  ? ktime_get_ts64+0x86/0x230
[   25.973399]  kunit_try_run_case+0x1a5/0x490
[   25.973423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.973445]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.973469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.973493]  ? __kthread_parkme+0x82/0x180
[   25.973516]  ? preempt_count_sub+0x50/0x80
[   25.973542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.973565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.973591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.973619]  kthread+0x337/0x6f0
[   25.973638]  ? trace_preempt_on+0x20/0xc0
[   25.973661]  ? __pfx_kthread+0x10/0x10
[   25.973682]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.973705]  ? calculate_sigpending+0x7b/0xa0
[   25.973728]  ? __pfx_kthread+0x10/0x10
[   25.973749]  ret_from_fork+0x1c5/0x240
[   25.973785]  ? __pfx_kthread+0x10/0x10
[   25.973808]  ret_from_fork_asm+0x1a/0x30
[   25.973842]  </TASK>
[   25.973855] 
[   25.985023] Allocated by task 323:
[   25.985434]  kasan_save_stack+0x45/0x70
[   25.985668]  kasan_save_track+0x18/0x40
[   25.985877]  kasan_save_alloc_info+0x3b/0x50
[   25.986064]  __kasan_kmalloc+0xb7/0xc0
[   25.986616]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.986826]  kasan_atomics+0x95/0x310
[   25.987292]  kunit_try_run_case+0x1a5/0x490
[   25.987513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.987721]  kthread+0x337/0x6f0
[   25.988136]  ret_from_fork+0x1c5/0x240
[   25.988506]  ret_from_fork_asm+0x1a/0x30
[   25.988691] 
[   25.988799] The buggy address belongs to the object at ffff888105db2a00
[   25.988799]  which belongs to the cache kmalloc-64 of size 64
[   25.989696] The buggy address is located 0 bytes to the right of
[   25.989696]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.990487] 
[   25.990596] The buggy address belongs to the physical page:
[   25.990909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.991567] flags: 0x200000000000000(node=0|zone=2)
[   25.991753] page_type: f5(slab)
[   25.991926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.992311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.992727] page dumped because: kasan: bad access detected
[   25.993441] 
[   25.993622] Memory state around the buggy address:
[   25.993976]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.994507]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.994993] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.995375]                                      ^
[   25.995730]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.996077]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.996370] ==================================================================
---
[   26.041951] ==================================================================
[   26.042353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b42/0x59f0
[   26.042692] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.043056] 
[   26.043211] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.043265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.043279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.043332] Call Trace:
[   26.043348]  <TASK>
[   26.043365]  dump_stack_lvl+0x73/0xb0
[   26.043405]  print_report+0xd1/0x640
[   26.043430]  ? __virt_addr_valid+0x1db/0x2d0
[   26.043453]  ? kasan_atomics_helper+0x2b42/0x59f0
[   26.043475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.043499]  ? kasan_atomics_helper+0x2b42/0x59f0
[   26.043521]  kasan_report+0x144/0x180
[   26.043544]  ? kasan_atomics_helper+0x2b42/0x59f0
[   26.043572]  kasan_check_range+0x10c/0x1c0
[   26.043597]  __kasan_check_write+0x18/0x20
[   26.043649]  kasan_atomics_helper+0x2b42/0x59f0
[   26.043681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.043717]  ? kasan_save_alloc_info+0x3b/0x50
[   26.043747]  kasan_atomics+0x1dc/0x310
[   26.043771]  ? __pfx_kasan_atomics+0x10/0x10
[   26.043834]  ? __pfx_read_tsc+0x10/0x10
[   26.043879]  ? ktime_get_ts64+0x86/0x230
[   26.043933]  kunit_try_run_case+0x1a5/0x490
[   26.043969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.044002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.044025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.044049]  ? __kthread_parkme+0x82/0x180
[   26.044073]  ? preempt_count_sub+0x50/0x80
[   26.044102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.044125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.044152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.044179]  kthread+0x337/0x6f0
[   26.044198]  ? trace_preempt_on+0x20/0xc0
[   26.044222]  ? __pfx_kthread+0x10/0x10
[   26.044242]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.044295]  ? calculate_sigpending+0x7b/0xa0
[   26.044318]  ? __pfx_kthread+0x10/0x10
[   26.044350]  ret_from_fork+0x1c5/0x240
[   26.044386]  ? __pfx_kthread+0x10/0x10
[   26.044407]  ret_from_fork_asm+0x1a/0x30
[   26.044439]  </TASK>
[   26.044452] 
[   26.051840] Allocated by task 323:
[   26.052048]  kasan_save_stack+0x45/0x70
[   26.052259]  kasan_save_track+0x18/0x40
[   26.052445]  kasan_save_alloc_info+0x3b/0x50
[   26.052648]  __kasan_kmalloc+0xb7/0xc0
[   26.052785]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.052961]  kasan_atomics+0x95/0x310
[   26.053153]  kunit_try_run_case+0x1a5/0x490
[   26.053358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.053700]  kthread+0x337/0x6f0
[   26.053938]  ret_from_fork+0x1c5/0x240
[   26.054116]  ret_from_fork_asm+0x1a/0x30
[   26.054337] 
[   26.054460] The buggy address belongs to the object at ffff888105db2a00
[   26.054460]  which belongs to the cache kmalloc-64 of size 64
[   26.054979] The buggy address is located 0 bytes to the right of
[   26.054979]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.055674] 
[   26.055745] The buggy address belongs to the physical page:
[   26.055995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.056406] flags: 0x200000000000000(node=0|zone=2)
[   26.056600] page_type: f5(slab)
[   26.056717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.057034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.057379] page dumped because: kasan: bad access detected
[   26.057624] 
[   26.057713] Memory state around the buggy address:
[   26.057973]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058192]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058437] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.058753]                                      ^
[   26.059043]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.059406]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.059690] ==================================================================
---
[   25.215543] ==================================================================
[   25.215857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x936/0x59f0
[   25.216153] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.216631] 
[   25.216751] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.216813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.216827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.216850] Call Trace:
[   25.216865]  <TASK>
[   25.217054]  dump_stack_lvl+0x73/0xb0
[   25.217087]  print_report+0xd1/0x640
[   25.217112]  ? __virt_addr_valid+0x1db/0x2d0
[   25.217135]  ? kasan_atomics_helper+0x936/0x59f0
[   25.217230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.217254]  ? kasan_atomics_helper+0x936/0x59f0
[   25.217279]  kasan_report+0x144/0x180
[   25.217305]  ? kasan_atomics_helper+0x936/0x59f0
[   25.217332]  kasan_check_range+0x10c/0x1c0
[   25.217359]  __kasan_check_write+0x18/0x20
[   25.217380]  kasan_atomics_helper+0x936/0x59f0
[   25.217403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.217427]  ? kasan_save_alloc_info+0x3b/0x50
[   25.217457]  kasan_atomics+0x1dc/0x310
[   25.217482]  ? __pfx_kasan_atomics+0x10/0x10
[   25.217508]  ? __pfx_read_tsc+0x10/0x10
[   25.217528]  ? ktime_get_ts64+0x86/0x230
[   25.217552]  kunit_try_run_case+0x1a5/0x490
[   25.217576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.217599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.217623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.217646]  ? __kthread_parkme+0x82/0x180
[   25.217671]  ? preempt_count_sub+0x50/0x80
[   25.217697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.217721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.217748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.217786]  kthread+0x337/0x6f0
[   25.217805]  ? trace_preempt_on+0x20/0xc0
[   25.217828]  ? __pfx_kthread+0x10/0x10
[   25.217848]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.217870]  ? calculate_sigpending+0x7b/0xa0
[   25.217895]  ? __pfx_kthread+0x10/0x10
[   25.217916]  ret_from_fork+0x1c5/0x240
[   25.217937]  ? __pfx_kthread+0x10/0x10
[   25.217957]  ret_from_fork_asm+0x1a/0x30
[   25.217991]  </TASK>
[   25.218004] 
[   25.228227] Allocated by task 323:
[   25.228484]  kasan_save_stack+0x45/0x70
[   25.228648]  kasan_save_track+0x18/0x40
[   25.228856]  kasan_save_alloc_info+0x3b/0x50
[   25.229401]  __kasan_kmalloc+0xb7/0xc0
[   25.229655]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.229831]  kasan_atomics+0x95/0x310
[   25.230176]  kunit_try_run_case+0x1a5/0x490
[   25.230402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.230805]  kthread+0x337/0x6f0
[   25.231323]  ret_from_fork+0x1c5/0x240
[   25.231484]  ret_from_fork_asm+0x1a/0x30
[   25.231692] 
[   25.231758] The buggy address belongs to the object at ffff888105db2a00
[   25.231758]  which belongs to the cache kmalloc-64 of size 64
[   25.232741] The buggy address is located 0 bytes to the right of
[   25.232741]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.233849] 
[   25.233943] The buggy address belongs to the physical page:
[   25.234289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.234654] flags: 0x200000000000000(node=0|zone=2)
[   25.234856] page_type: f5(slab)
[   25.235350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.235640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.236256] page dumped because: kasan: bad access detected
[   25.236740] 
[   25.236854] Memory state around the buggy address:
[   25.237245]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.237482]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.237820] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.238320]                                      ^
[   25.238623]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.239081]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.239566] ==================================================================
---
[   25.542293] ==================================================================
[   25.542596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19f6/0x59f0
[   25.542867] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.543079] 
[   25.543155] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.543202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.543215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.543237] Call Trace:
[   25.543253]  <TASK>
[   25.543268]  dump_stack_lvl+0x73/0xb0
[   25.543295]  print_report+0xd1/0x640
[   25.543318]  ? __virt_addr_valid+0x1db/0x2d0
[   25.543340]  ? kasan_atomics_helper+0x19f6/0x59f0
[   25.543363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.543385]  ? kasan_atomics_helper+0x19f6/0x59f0
[   25.543408]  kasan_report+0x144/0x180
[   25.543432]  ? kasan_atomics_helper+0x19f6/0x59f0
[   25.543459]  kasan_check_range+0x10c/0x1c0
[   25.543485]  __kasan_check_write+0x18/0x20
[   25.543505]  kasan_atomics_helper+0x19f6/0x59f0
[   25.543528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.543553]  ? kasan_save_alloc_info+0x3b/0x50
[   25.543582]  kasan_atomics+0x1dc/0x310
[   25.543606]  ? __pfx_kasan_atomics+0x10/0x10
[   25.543631]  ? __pfx_read_tsc+0x10/0x10
[   25.543656]  ? ktime_get_ts64+0x86/0x230
[   25.543680]  kunit_try_run_case+0x1a5/0x490
[   25.543704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.543726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.543749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.543782]  ? __kthread_parkme+0x82/0x180
[   25.543807]  ? preempt_count_sub+0x50/0x80
[   25.543833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.543857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.543883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.543911]  kthread+0x337/0x6f0
[   25.543930]  ? trace_preempt_on+0x20/0xc0
[   25.543953]  ? __pfx_kthread+0x10/0x10
[   25.543973]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.543995]  ? calculate_sigpending+0x7b/0xa0
[   25.544018]  ? __pfx_kthread+0x10/0x10
[   25.544061]  ret_from_fork+0x1c5/0x240
[   25.544101]  ? __pfx_kthread+0x10/0x10
[   25.544123]  ret_from_fork_asm+0x1a/0x30
[   25.544157]  </TASK>
[   25.544170] 
[   25.554425] Allocated by task 323:
[   25.554822]  kasan_save_stack+0x45/0x70
[   25.555228]  kasan_save_track+0x18/0x40
[   25.555723]  kasan_save_alloc_info+0x3b/0x50
[   25.555895]  __kasan_kmalloc+0xb7/0xc0
[   25.556023]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.556661]  kasan_atomics+0x95/0x310
[   25.557088]  kunit_try_run_case+0x1a5/0x490
[   25.557623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.558201]  kthread+0x337/0x6f0
[   25.558469]  ret_from_fork+0x1c5/0x240
[   25.558606]  ret_from_fork_asm+0x1a/0x30
[   25.558742] 
[   25.558896] The buggy address belongs to the object at ffff888105db2a00
[   25.558896]  which belongs to the cache kmalloc-64 of size 64
[   25.560147] The buggy address is located 0 bytes to the right of
[   25.560147]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.561263] 
[   25.561337] The buggy address belongs to the physical page:
[   25.561509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.561745] flags: 0x200000000000000(node=0|zone=2)
[   25.561919] page_type: f5(slab)
[   25.562038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.562475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.563289] page dumped because: kasan: bad access detected
[   25.563502] 
[   25.563609] Memory state around the buggy address:
[   25.563805]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.564428]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.564929] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.565197]                                      ^
[   25.565592]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.566069]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.566866] ==================================================================
---
[   25.725836] ==================================================================
[   25.726100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x208c/0x59f0
[   25.726334] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.726553] 
[   25.726636] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.726685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.726699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.726722] Call Trace:
[   25.726737]  <TASK>
[   25.726754]  dump_stack_lvl+0x73/0xb0
[   25.726793]  print_report+0xd1/0x640
[   25.726842]  ? __virt_addr_valid+0x1db/0x2d0
[   25.726864]  ? kasan_atomics_helper+0x208c/0x59f0
[   25.726887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.726910]  ? kasan_atomics_helper+0x208c/0x59f0
[   25.726933]  kasan_report+0x144/0x180
[   25.726956]  ? kasan_atomics_helper+0x208c/0x59f0
[   25.726983]  kasan_check_range+0x10c/0x1c0
[   25.727007]  __kasan_check_write+0x18/0x20
[   25.727028]  kasan_atomics_helper+0x208c/0x59f0
[   25.727052]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.727076]  ? kasan_save_alloc_info+0x3b/0x50
[   25.727106]  kasan_atomics+0x1dc/0x310
[   25.727129]  ? __pfx_kasan_atomics+0x10/0x10
[   25.727202]  ? __pfx_read_tsc+0x10/0x10
[   25.727224]  ? ktime_get_ts64+0x86/0x230
[   25.727248]  kunit_try_run_case+0x1a5/0x490
[   25.727284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.727306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.727329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.727353]  ? __kthread_parkme+0x82/0x180
[   25.727377]  ? preempt_count_sub+0x50/0x80
[   25.727404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.727427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.727454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.727481]  kthread+0x337/0x6f0
[   25.727534]  ? trace_preempt_on+0x20/0xc0
[   25.727558]  ? __pfx_kthread+0x10/0x10
[   25.727579]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.727601]  ? calculate_sigpending+0x7b/0xa0
[   25.727625]  ? __pfx_kthread+0x10/0x10
[   25.727648]  ret_from_fork+0x1c5/0x240
[   25.727676]  ? __pfx_kthread+0x10/0x10
[   25.727697]  ret_from_fork_asm+0x1a/0x30
[   25.727730]  </TASK>
[   25.727742] 
[   25.740179] Allocated by task 323:
[   25.740307]  kasan_save_stack+0x45/0x70
[   25.740664]  kasan_save_track+0x18/0x40
[   25.741015]  kasan_save_alloc_info+0x3b/0x50
[   25.741401]  __kasan_kmalloc+0xb7/0xc0
[   25.741822]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.742249]  kasan_atomics+0x95/0x310
[   25.742609]  kunit_try_run_case+0x1a5/0x490
[   25.743041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.743559]  kthread+0x337/0x6f0
[   25.743915]  ret_from_fork+0x1c5/0x240
[   25.744165]  ret_from_fork_asm+0x1a/0x30
[   25.744306] 
[   25.744383] The buggy address belongs to the object at ffff888105db2a00
[   25.744383]  which belongs to the cache kmalloc-64 of size 64
[   25.744730] The buggy address is located 0 bytes to the right of
[   25.744730]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.745571] 
[   25.745645] The buggy address belongs to the physical page:
[   25.746008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.746305] flags: 0x200000000000000(node=0|zone=2)
[   25.746701] page_type: f5(slab)
[   25.747000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.747459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.747746] page dumped because: kasan: bad access detected
[   25.748312] 
[   25.748475] Memory state around the buggy address:
[   25.748981]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.749717]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.750402] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.751074]                                      ^
[   25.751592]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.752342]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.752886] ==================================================================
---
[   25.923691] ==================================================================
[   25.923956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2637/0x59f0
[   25.924279] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.924559] 
[   25.924639] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.924685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.924699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.924722] Call Trace:
[   25.924737]  <TASK>
[   25.924753]  dump_stack_lvl+0x73/0xb0
[   25.924790]  print_report+0xd1/0x640
[   25.924813]  ? __virt_addr_valid+0x1db/0x2d0
[   25.924837]  ? kasan_atomics_helper+0x2637/0x59f0
[   25.924860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.924883]  ? kasan_atomics_helper+0x2637/0x59f0
[   25.924905]  kasan_report+0x144/0x180
[   25.924928]  ? kasan_atomics_helper+0x2637/0x59f0
[   25.924957]  kasan_check_range+0x10c/0x1c0
[   25.924982]  __kasan_check_write+0x18/0x20
[   25.925003]  kasan_atomics_helper+0x2637/0x59f0
[   25.925027]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.925051]  ? kasan_save_alloc_info+0x3b/0x50
[   25.925081]  kasan_atomics+0x1dc/0x310
[   25.925105]  ? __pfx_kasan_atomics+0x10/0x10
[   25.925131]  ? __pfx_read_tsc+0x10/0x10
[   25.925164]  ? ktime_get_ts64+0x86/0x230
[   25.925188]  kunit_try_run_case+0x1a5/0x490
[   25.925211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.925233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.925256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.925280]  ? __kthread_parkme+0x82/0x180
[   25.925304]  ? preempt_count_sub+0x50/0x80
[   25.925331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.925355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.925383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.925409]  kthread+0x337/0x6f0
[   25.925429]  ? trace_preempt_on+0x20/0xc0
[   25.925452]  ? __pfx_kthread+0x10/0x10
[   25.925473]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.925495]  ? calculate_sigpending+0x7b/0xa0
[   25.925518]  ? __pfx_kthread+0x10/0x10
[   25.925539]  ret_from_fork+0x1c5/0x240
[   25.925561]  ? __pfx_kthread+0x10/0x10
[   25.925583]  ret_from_fork_asm+0x1a/0x30
[   25.925616]  </TASK>
[   25.925629] 
[   25.933010] Allocated by task 323:
[   25.933130]  kasan_save_stack+0x45/0x70
[   25.933265]  kasan_save_track+0x18/0x40
[   25.933394]  kasan_save_alloc_info+0x3b/0x50
[   25.933535]  __kasan_kmalloc+0xb7/0xc0
[   25.933842]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.934294]  kasan_atomics+0x95/0x310
[   25.934558]  kunit_try_run_case+0x1a5/0x490
[   25.934761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.935091]  kthread+0x337/0x6f0
[   25.935209]  ret_from_fork+0x1c5/0x240
[   25.935339]  ret_from_fork_asm+0x1a/0x30
[   25.935472] 
[   25.935538] The buggy address belongs to the object at ffff888105db2a00
[   25.935538]  which belongs to the cache kmalloc-64 of size 64
[   25.935982] The buggy address is located 0 bytes to the right of
[   25.935982]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.936532] 
[   25.936625] The buggy address belongs to the physical page:
[   25.937003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.937547] flags: 0x200000000000000(node=0|zone=2)
[   25.937851] page_type: f5(slab)
[   25.938015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.938400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.938684] page dumped because: kasan: bad access detected
[   25.938947] 
[   25.939021] Memory state around the buggy address:
[   25.939298]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.939584]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.939880] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.940154]                                      ^
[   25.940362]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.940597]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.940815] ==================================================================
---
[   26.097090] ==================================================================
[   26.097481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2ef3/0x59f0
[   26.097725] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.098185] 
[   26.098330] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.098378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.098391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.098412] Call Trace:
[   26.098427]  <TASK>
[   26.098441]  dump_stack_lvl+0x73/0xb0
[   26.098468]  print_report+0xd1/0x640
[   26.098491]  ? __virt_addr_valid+0x1db/0x2d0
[   26.098513]  ? kasan_atomics_helper+0x2ef3/0x59f0
[   26.098535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.098558]  ? kasan_atomics_helper+0x2ef3/0x59f0
[   26.098616]  kasan_report+0x144/0x180
[   26.098641]  ? kasan_atomics_helper+0x2ef3/0x59f0
[   26.098668]  kasan_check_range+0x10c/0x1c0
[   26.098704]  __kasan_check_write+0x18/0x20
[   26.098725]  kasan_atomics_helper+0x2ef3/0x59f0
[   26.098788]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.098813]  ? kasan_save_alloc_info+0x3b/0x50
[   26.098894]  kasan_atomics+0x1dc/0x310
[   26.098919]  ? __pfx_kasan_atomics+0x10/0x10
[   26.098944]  ? __pfx_read_tsc+0x10/0x10
[   26.098964]  ? ktime_get_ts64+0x86/0x230
[   26.098988]  kunit_try_run_case+0x1a5/0x490
[   26.099012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.099034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.099058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.099112]  ? __kthread_parkme+0x82/0x180
[   26.099136]  ? preempt_count_sub+0x50/0x80
[   26.099185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.099208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.099235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.099262]  kthread+0x337/0x6f0
[   26.099282]  ? trace_preempt_on+0x20/0xc0
[   26.099305]  ? __pfx_kthread+0x10/0x10
[   26.099325]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.099348]  ? calculate_sigpending+0x7b/0xa0
[   26.099371]  ? __pfx_kthread+0x10/0x10
[   26.099392]  ret_from_fork+0x1c5/0x240
[   26.099414]  ? __pfx_kthread+0x10/0x10
[   26.099435]  ret_from_fork_asm+0x1a/0x30
[   26.099498]  </TASK>
[   26.099510] 
[   26.106638] Allocated by task 323:
[   26.106762]  kasan_save_stack+0x45/0x70
[   26.106931]  kasan_save_track+0x18/0x40
[   26.107122]  kasan_save_alloc_info+0x3b/0x50
[   26.107376]  __kasan_kmalloc+0xb7/0xc0
[   26.107568]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.107849]  kasan_atomics+0x95/0x310
[   26.108062]  kunit_try_run_case+0x1a5/0x490
[   26.108267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.108568]  kthread+0x337/0x6f0
[   26.108737]  ret_from_fork+0x1c5/0x240
[   26.108983]  ret_from_fork_asm+0x1a/0x30
[   26.109189] 
[   26.109318] The buggy address belongs to the object at ffff888105db2a00
[   26.109318]  which belongs to the cache kmalloc-64 of size 64
[   26.109665] The buggy address is located 0 bytes to the right of
[   26.109665]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.110361] 
[   26.110499] The buggy address belongs to the physical page:
[   26.110812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.111064] flags: 0x200000000000000(node=0|zone=2)
[   26.111298] page_type: f5(slab)
[   26.111512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.111951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.112295] page dumped because: kasan: bad access detected
[   26.112484] 
[   26.112615] Memory state around the buggy address:
[   26.112880]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.113293]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.113511] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.113800]                                      ^
[   26.114092]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.114367]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.114621] ==================================================================
---
[   25.599826] ==================================================================
[   25.600116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c6b/0x59f0
[   25.600783] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.601085] 
[   25.601205] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.601267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.601281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.601306] Call Trace:
[   25.601452]  <TASK>
[   25.601471]  dump_stack_lvl+0x73/0xb0
[   25.601596]  print_report+0xd1/0x640
[   25.601621]  ? __virt_addr_valid+0x1db/0x2d0
[   25.601651]  ? kasan_atomics_helper+0x1c6b/0x59f0
[   25.601674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.601698]  ? kasan_atomics_helper+0x1c6b/0x59f0
[   25.601721]  kasan_report+0x144/0x180
[   25.601745]  ? kasan_atomics_helper+0x1c6b/0x59f0
[   25.601781]  kasan_check_range+0x10c/0x1c0
[   25.601806]  __kasan_check_write+0x18/0x20
[   25.601827]  kasan_atomics_helper+0x1c6b/0x59f0
[   25.601851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.601875]  ? kasan_save_alloc_info+0x3b/0x50
[   25.601905]  kasan_atomics+0x1dc/0x310
[   25.601928]  ? __pfx_kasan_atomics+0x10/0x10
[   25.601954]  ? __pfx_read_tsc+0x10/0x10
[   25.601974]  ? ktime_get_ts64+0x86/0x230
[   25.601998]  kunit_try_run_case+0x1a5/0x490
[   25.602022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.602044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.602067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.602090]  ? __kthread_parkme+0x82/0x180
[   25.602114]  ? preempt_count_sub+0x50/0x80
[   25.602140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.602164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.602191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.602217]  kthread+0x337/0x6f0
[   25.602237]  ? trace_preempt_on+0x20/0xc0
[   25.602259]  ? __pfx_kthread+0x10/0x10
[   25.602281]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.602303]  ? calculate_sigpending+0x7b/0xa0
[   25.602326]  ? __pfx_kthread+0x10/0x10
[   25.602347]  ret_from_fork+0x1c5/0x240
[   25.602370]  ? __pfx_kthread+0x10/0x10
[   25.602391]  ret_from_fork_asm+0x1a/0x30
[   25.602424]  </TASK>
[   25.602436] 
[   25.613848] Allocated by task 323:
[   25.614213]  kasan_save_stack+0x45/0x70
[   25.614645]  kasan_save_track+0x18/0x40
[   25.614816]  kasan_save_alloc_info+0x3b/0x50
[   25.615197]  __kasan_kmalloc+0xb7/0xc0
[   25.615642]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.615901]  kasan_atomics+0x95/0x310
[   25.616033]  kunit_try_run_case+0x1a5/0x490
[   25.616538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.616897]  kthread+0x337/0x6f0
[   25.617069]  ret_from_fork+0x1c5/0x240
[   25.617378]  ret_from_fork_asm+0x1a/0x30
[   25.617726] 
[   25.617839] The buggy address belongs to the object at ffff888105db2a00
[   25.617839]  which belongs to the cache kmalloc-64 of size 64
[   25.618679] The buggy address is located 0 bytes to the right of
[   25.618679]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.619221] 
[   25.619423] The buggy address belongs to the physical page:
[   25.619927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.620397] flags: 0x200000000000000(node=0|zone=2)
[   25.620587] page_type: f5(slab)
[   25.620755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.621355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.621845] page dumped because: kasan: bad access detected
[   25.622142] 
[   25.622495] Memory state around the buggy address:
[   25.622665]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.622994]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.623710] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.624079]                                      ^
[   25.624560]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.624985]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.625444] ==================================================================
---
[   26.060396] ==================================================================
[   26.060807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c7d/0x59f0
[   26.061122] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.061446] 
[   26.061626] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.061699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.061715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.061738] Call Trace:
[   26.061753]  <TASK>
[   26.061769]  dump_stack_lvl+0x73/0xb0
[   26.061806]  print_report+0xd1/0x640
[   26.061830]  ? __virt_addr_valid+0x1db/0x2d0
[   26.061890]  ? kasan_atomics_helper+0x2c7d/0x59f0
[   26.061915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.061938]  ? kasan_atomics_helper+0x2c7d/0x59f0
[   26.061972]  kasan_report+0x144/0x180
[   26.061995]  ? kasan_atomics_helper+0x2c7d/0x59f0
[   26.062023]  kasan_check_range+0x10c/0x1c0
[   26.062079]  __kasan_check_write+0x18/0x20
[   26.062099]  kasan_atomics_helper+0x2c7d/0x59f0
[   26.062133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.062157]  ? kasan_save_alloc_info+0x3b/0x50
[   26.062187]  kasan_atomics+0x1dc/0x310
[   26.062211]  ? __pfx_kasan_atomics+0x10/0x10
[   26.062237]  ? __pfx_read_tsc+0x10/0x10
[   26.062258]  ? ktime_get_ts64+0x86/0x230
[   26.062282]  kunit_try_run_case+0x1a5/0x490
[   26.062307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.062329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.062353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.062379]  ? __kthread_parkme+0x82/0x180
[   26.062403]  ? preempt_count_sub+0x50/0x80
[   26.062429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.062453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.062480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.062507]  kthread+0x337/0x6f0
[   26.062526]  ? trace_preempt_on+0x20/0xc0
[   26.062549]  ? __pfx_kthread+0x10/0x10
[   26.062570]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.062592]  ? calculate_sigpending+0x7b/0xa0
[   26.062615]  ? __pfx_kthread+0x10/0x10
[   26.062637]  ret_from_fork+0x1c5/0x240
[   26.062659]  ? __pfx_kthread+0x10/0x10
[   26.062680]  ret_from_fork_asm+0x1a/0x30
[   26.062713]  </TASK>
[   26.062726] 
[   26.070197] Allocated by task 323:
[   26.070346]  kasan_save_stack+0x45/0x70
[   26.070532]  kasan_save_track+0x18/0x40
[   26.070713]  kasan_save_alloc_info+0x3b/0x50
[   26.070972]  __kasan_kmalloc+0xb7/0xc0
[   26.071108]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.071269]  kasan_atomics+0x95/0x310
[   26.071436]  kunit_try_run_case+0x1a5/0x490
[   26.071590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.071901]  kthread+0x337/0x6f0
[   26.072018]  ret_from_fork+0x1c5/0x240
[   26.072148]  ret_from_fork_asm+0x1a/0x30
[   26.072280] 
[   26.072415] The buggy address belongs to the object at ffff888105db2a00
[   26.072415]  which belongs to the cache kmalloc-64 of size 64
[   26.072965] The buggy address is located 0 bytes to the right of
[   26.072965]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.073495] 
[   26.073562] The buggy address belongs to the physical page:
[   26.073731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.074061] flags: 0x200000000000000(node=0|zone=2)
[   26.074377] page_type: f5(slab)
[   26.074618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.075065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.075497] page dumped because: kasan: bad access detected
[   26.075674] 
[   26.075739] Memory state around the buggy address:
[   26.075936]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.076290]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.076624] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.077050]                                      ^
[   26.077377]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077661]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077905] ==================================================================
---
[   26.078432] ==================================================================
[   26.078782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2db8/0x59f0
[   26.079247] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.079553] 
[   26.079710] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.079831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.079848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.079894] Call Trace:
[   26.079908]  <TASK>
[   26.079923]  dump_stack_lvl+0x73/0xb0
[   26.079951]  print_report+0xd1/0x640
[   26.079974]  ? __virt_addr_valid+0x1db/0x2d0
[   26.079996]  ? kasan_atomics_helper+0x2db8/0x59f0
[   26.080019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.080042]  ? kasan_atomics_helper+0x2db8/0x59f0
[   26.080097]  kasan_report+0x144/0x180
[   26.080122]  ? kasan_atomics_helper+0x2db8/0x59f0
[   26.080173]  kasan_check_range+0x10c/0x1c0
[   26.080225]  __kasan_check_write+0x18/0x20
[   26.080247]  kasan_atomics_helper+0x2db8/0x59f0
[   26.080293]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.080318]  ? kasan_save_alloc_info+0x3b/0x50
[   26.080348]  kasan_atomics+0x1dc/0x310
[   26.080372]  ? __pfx_kasan_atomics+0x10/0x10
[   26.080397]  ? __pfx_read_tsc+0x10/0x10
[   26.080417]  ? ktime_get_ts64+0x86/0x230
[   26.080441]  kunit_try_run_case+0x1a5/0x490
[   26.080464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.080511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.080535]  ? __kthread_parkme+0x82/0x180
[   26.080558]  ? preempt_count_sub+0x50/0x80
[   26.080585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.080637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.080663]  kthread+0x337/0x6f0
[   26.080683]  ? trace_preempt_on+0x20/0xc0
[   26.080707]  ? __pfx_kthread+0x10/0x10
[   26.080729]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.080753]  ? calculate_sigpending+0x7b/0xa0
[   26.080786]  ? __pfx_kthread+0x10/0x10
[   26.080836]  ret_from_fork+0x1c5/0x240
[   26.080882]  ? __pfx_kthread+0x10/0x10
[   26.080903]  ret_from_fork_asm+0x1a/0x30
[   26.080936]  </TASK>
[   26.080949] 
[   26.088716] Allocated by task 323:
[   26.088922]  kasan_save_stack+0x45/0x70
[   26.089116]  kasan_save_track+0x18/0x40
[   26.089304]  kasan_save_alloc_info+0x3b/0x50
[   26.089482]  __kasan_kmalloc+0xb7/0xc0
[   26.089614]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.089841]  kasan_atomics+0x95/0x310
[   26.090094]  kunit_try_run_case+0x1a5/0x490
[   26.090274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.090506]  kthread+0x337/0x6f0
[   26.090661]  ret_from_fork+0x1c5/0x240
[   26.090910]  ret_from_fork_asm+0x1a/0x30
[   26.091148] 
[   26.091242] The buggy address belongs to the object at ffff888105db2a00
[   26.091242]  which belongs to the cache kmalloc-64 of size 64
[   26.091674] The buggy address is located 0 bytes to the right of
[   26.091674]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.092192] 
[   26.092285] The buggy address belongs to the physical page:
[   26.092531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.092956] flags: 0x200000000000000(node=0|zone=2)
[   26.093118] page_type: f5(slab)
[   26.093234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.093517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.093929] page dumped because: kasan: bad access detected
[   26.094290] 
[   26.094426] Memory state around the buggy address:
[   26.094742]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.095079]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.095295] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.095583]                                      ^
[   26.095822]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096189]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096507] ==================================================================
---
[   26.316041] ==================================================================
[   26.316471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3be1/0x59f0
[   26.316726] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.317093] 
[   26.317374] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.317438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.317453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.317478] Call Trace:
[   26.317502]  <TASK>
[   26.317527]  dump_stack_lvl+0x73/0xb0
[   26.317564]  print_report+0xd1/0x640
[   26.317592]  ? __virt_addr_valid+0x1db/0x2d0
[   26.317615]  ? kasan_atomics_helper+0x3be1/0x59f0
[   26.317639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.317663]  ? kasan_atomics_helper+0x3be1/0x59f0
[   26.317687]  kasan_report+0x144/0x180
[   26.317710]  ? kasan_atomics_helper+0x3be1/0x59f0
[   26.317738]  kasan_check_range+0x10c/0x1c0
[   26.317765]  __kasan_check_write+0x18/0x20
[   26.317795]  kasan_atomics_helper+0x3be1/0x59f0
[   26.317820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.317844]  ? kasan_save_alloc_info+0x3b/0x50
[   26.317875]  kasan_atomics+0x1dc/0x310
[   26.317910]  ? __pfx_kasan_atomics+0x10/0x10
[   26.317936]  ? __pfx_read_tsc+0x10/0x10
[   26.317957]  ? ktime_get_ts64+0x86/0x230
[   26.317984]  kunit_try_run_case+0x1a5/0x490
[   26.318010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.318034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.318058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.318082]  ? __kthread_parkme+0x82/0x180
[   26.318115]  ? preempt_count_sub+0x50/0x80
[   26.318151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.318176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.318207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.318235]  kthread+0x337/0x6f0
[   26.318257]  ? trace_preempt_on+0x20/0xc0
[   26.318280]  ? __pfx_kthread+0x10/0x10
[   26.318301]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.318324]  ? calculate_sigpending+0x7b/0xa0
[   26.318350]  ? __pfx_kthread+0x10/0x10
[   26.318372]  ret_from_fork+0x1c5/0x240
[   26.318395]  ? __pfx_kthread+0x10/0x10
[   26.318416]  ret_from_fork_asm+0x1a/0x30
[   26.318451]  </TASK>
[   26.318466] 
[   26.330304] Allocated by task 323:
[   26.330641]  kasan_save_stack+0x45/0x70
[   26.331062]  kasan_save_track+0x18/0x40
[   26.331395]  kasan_save_alloc_info+0x3b/0x50
[   26.331544]  __kasan_kmalloc+0xb7/0xc0
[   26.331681]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.331844]  kasan_atomics+0x95/0x310
[   26.331994]  kunit_try_run_case+0x1a5/0x490
[   26.332206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.332457]  kthread+0x337/0x6f0
[   26.332622]  ret_from_fork+0x1c5/0x240
[   26.332815]  ret_from_fork_asm+0x1a/0x30
[   26.333014] 
[   26.333154] The buggy address belongs to the object at ffff888105db2a00
[   26.333154]  which belongs to the cache kmalloc-64 of size 64
[   26.333672] The buggy address is located 0 bytes to the right of
[   26.333672]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.335077] 
[   26.335183] The buggy address belongs to the physical page:
[   26.335399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.335741] flags: 0x200000000000000(node=0|zone=2)
[   26.336220] page_type: f5(slab)
[   26.336490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.336944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.337360] page dumped because: kasan: bad access detected
[   26.337706] 
[   26.337804] Memory state around the buggy address:
[   26.338068]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.338765]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.339279] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.339502]                                      ^
[   26.339665]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.339912]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.340582] ==================================================================
---
[   26.245751] ==================================================================
[   26.246002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3831/0x59f0
[   26.246683] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.247273] 
[   26.247376] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.247427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.247441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.247464] Call Trace:
[   26.247479]  <TASK>
[   26.247496]  dump_stack_lvl+0x73/0xb0
[   26.247526]  print_report+0xd1/0x640
[   26.247550]  ? __virt_addr_valid+0x1db/0x2d0
[   26.247573]  ? kasan_atomics_helper+0x3831/0x59f0
[   26.247596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.247620]  ? kasan_atomics_helper+0x3831/0x59f0
[   26.247642]  kasan_report+0x144/0x180
[   26.247672]  ? kasan_atomics_helper+0x3831/0x59f0
[   26.247699]  kasan_check_range+0x10c/0x1c0
[   26.247724]  __kasan_check_write+0x18/0x20
[   26.247743]  kasan_atomics_helper+0x3831/0x59f0
[   26.247768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.247802]  ? kasan_save_alloc_info+0x3b/0x50
[   26.247831]  kasan_atomics+0x1dc/0x310
[   26.247856]  ? __pfx_kasan_atomics+0x10/0x10
[   26.247882]  ? __pfx_read_tsc+0x10/0x10
[   26.247914]  ? ktime_get_ts64+0x86/0x230
[   26.247940]  kunit_try_run_case+0x1a5/0x490
[   26.247965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.247987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.248011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.248034]  ? __kthread_parkme+0x82/0x180
[   26.248058]  ? preempt_count_sub+0x50/0x80
[   26.248085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.248108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.248135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.248162]  kthread+0x337/0x6f0
[   26.248181]  ? trace_preempt_on+0x20/0xc0
[   26.248203]  ? __pfx_kthread+0x10/0x10
[   26.248224]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.248246]  ? calculate_sigpending+0x7b/0xa0
[   26.248268]  ? __pfx_kthread+0x10/0x10
[   26.248290]  ret_from_fork+0x1c5/0x240
[   26.248312]  ? __pfx_kthread+0x10/0x10
[   26.248333]  ret_from_fork_asm+0x1a/0x30
[   26.248365]  </TASK>
[   26.248378] 
[   26.257167] Allocated by task 323:
[   26.257597]  kasan_save_stack+0x45/0x70
[   26.257892]  kasan_save_track+0x18/0x40
[   26.258082]  kasan_save_alloc_info+0x3b/0x50
[   26.258369]  __kasan_kmalloc+0xb7/0xc0
[   26.258546]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.258754]  kasan_atomics+0x95/0x310
[   26.258954]  kunit_try_run_case+0x1a5/0x490
[   26.259131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.259366]  kthread+0x337/0x6f0
[   26.259513]  ret_from_fork+0x1c5/0x240
[   26.259690]  ret_from_fork_asm+0x1a/0x30
[   26.260406] 
[   26.260486] The buggy address belongs to the object at ffff888105db2a00
[   26.260486]  which belongs to the cache kmalloc-64 of size 64
[   26.261315] The buggy address is located 0 bytes to the right of
[   26.261315]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.262043] 
[   26.262142] The buggy address belongs to the physical page:
[   26.262494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.262933] flags: 0x200000000000000(node=0|zone=2)
[   26.263153] page_type: f5(slab)
[   26.263442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.263821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.264298] page dumped because: kasan: bad access detected
[   26.264537] 
[   26.264798] Memory state around the buggy address:
[   26.264995]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.265460]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.265765] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.266282]                                      ^
[   26.266600]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.266981]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.267329] ==================================================================
---
[   26.268210] ==================================================================
[   26.268985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x396c/0x59f0
[   26.269408] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.269842] 
[   26.270135] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.270193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.270228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.270252] Call Trace:
[   26.270273]  <TASK>
[   26.270290]  dump_stack_lvl+0x73/0xb0
[   26.270320]  print_report+0xd1/0x640
[   26.270345]  ? __virt_addr_valid+0x1db/0x2d0
[   26.270369]  ? kasan_atomics_helper+0x396c/0x59f0
[   26.270393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.270417]  ? kasan_atomics_helper+0x396c/0x59f0
[   26.270439]  kasan_report+0x144/0x180
[   26.270463]  ? kasan_atomics_helper+0x396c/0x59f0
[   26.270492]  kasan_check_range+0x10c/0x1c0
[   26.270518]  __kasan_check_write+0x18/0x20
[   26.270538]  kasan_atomics_helper+0x396c/0x59f0
[   26.270562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.270586]  ? kasan_save_alloc_info+0x3b/0x50
[   26.270616]  kasan_atomics+0x1dc/0x310
[   26.270640]  ? __pfx_kasan_atomics+0x10/0x10
[   26.270665]  ? __pfx_read_tsc+0x10/0x10
[   26.270687]  ? ktime_get_ts64+0x86/0x230
[   26.270712]  kunit_try_run_case+0x1a5/0x490
[   26.270738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.270759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.270797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.270821]  ? __kthread_parkme+0x82/0x180
[   26.270847]  ? preempt_count_sub+0x50/0x80
[   26.270888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.270912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.270941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.270971]  kthread+0x337/0x6f0
[   26.270991]  ? trace_preempt_on+0x20/0xc0
[   26.271016]  ? __pfx_kthread+0x10/0x10
[   26.271037]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.271060]  ? calculate_sigpending+0x7b/0xa0
[   26.271084]  ? __pfx_kthread+0x10/0x10
[   26.271105]  ret_from_fork+0x1c5/0x240
[   26.271128]  ? __pfx_kthread+0x10/0x10
[   26.271148]  ret_from_fork_asm+0x1a/0x30
[   26.271181]  </TASK>
[   26.271195] 
[   26.278103] Allocated by task 323:
[   26.278274]  kasan_save_stack+0x45/0x70
[   26.278484]  kasan_save_track+0x18/0x40
[   26.278624]  kasan_save_alloc_info+0x3b/0x50
[   26.278853]  __kasan_kmalloc+0xb7/0xc0
[   26.279004]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.279228]  kasan_atomics+0x95/0x310
[   26.279407]  kunit_try_run_case+0x1a5/0x490
[   26.279589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.279838]  kthread+0x337/0x6f0
[   26.280015]  ret_from_fork+0x1c5/0x240
[   26.280141]  ret_from_fork_asm+0x1a/0x30
[   26.280274] 
[   26.280385] The buggy address belongs to the object at ffff888105db2a00
[   26.280385]  which belongs to the cache kmalloc-64 of size 64
[   26.280909] The buggy address is located 0 bytes to the right of
[   26.280909]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.281462] 
[   26.281529] The buggy address belongs to the physical page:
[   26.281695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.282125] flags: 0x200000000000000(node=0|zone=2)
[   26.282405] page_type: f5(slab)
[   26.282576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.282992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.283306] page dumped because: kasan: bad access detected
[   26.283467] 
[   26.283529] Memory state around the buggy address:
[   26.283683]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.283963]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.284265] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.284529]                                      ^
[   26.284674]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.285077]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.285403] ==================================================================
---
[   25.782734] ==================================================================
[   25.783412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x21fd/0x59f0
[   25.783695] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.784030] 
[   25.784175] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.784352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.784368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.784393] Call Trace:
[   25.784410]  <TASK>
[   25.784427]  dump_stack_lvl+0x73/0xb0
[   25.784457]  print_report+0xd1/0x640
[   25.784481]  ? __virt_addr_valid+0x1db/0x2d0
[   25.784504]  ? kasan_atomics_helper+0x21fd/0x59f0
[   25.784528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.784551]  ? kasan_atomics_helper+0x21fd/0x59f0
[   25.784574]  kasan_report+0x144/0x180
[   25.784597]  ? kasan_atomics_helper+0x21fd/0x59f0
[   25.784626]  kasan_check_range+0x10c/0x1c0
[   25.784650]  __kasan_check_write+0x18/0x20
[   25.784670]  kasan_atomics_helper+0x21fd/0x59f0
[   25.784694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.784718]  ? kasan_save_alloc_info+0x3b/0x50
[   25.784748]  kasan_atomics+0x1dc/0x310
[   25.784787]  ? __pfx_kasan_atomics+0x10/0x10
[   25.784813]  ? __pfx_read_tsc+0x10/0x10
[   25.784833]  ? ktime_get_ts64+0x86/0x230
[   25.784858]  kunit_try_run_case+0x1a5/0x490
[   25.784882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.784904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.784927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.784951]  ? __kthread_parkme+0x82/0x180
[   25.784975]  ? preempt_count_sub+0x50/0x80
[   25.785002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.785025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.785053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.785081]  kthread+0x337/0x6f0
[   25.785100]  ? trace_preempt_on+0x20/0xc0
[   25.785123]  ? __pfx_kthread+0x10/0x10
[   25.785143]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.785165]  ? calculate_sigpending+0x7b/0xa0
[   25.785189]  ? __pfx_kthread+0x10/0x10
[   25.785210]  ret_from_fork+0x1c5/0x240
[   25.785231]  ? __pfx_kthread+0x10/0x10
[   25.785252]  ret_from_fork_asm+0x1a/0x30
[   25.785285]  </TASK>
[   25.785298] 
[   25.796433] Allocated by task 323:
[   25.796614]  kasan_save_stack+0x45/0x70
[   25.796762]  kasan_save_track+0x18/0x40
[   25.796996]  kasan_save_alloc_info+0x3b/0x50
[   25.797186]  __kasan_kmalloc+0xb7/0xc0
[   25.797771]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.797998]  kasan_atomics+0x95/0x310
[   25.798167]  kunit_try_run_case+0x1a5/0x490
[   25.798492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.799008]  kthread+0x337/0x6f0
[   25.799186]  ret_from_fork+0x1c5/0x240
[   25.799423]  ret_from_fork_asm+0x1a/0x30
[   25.799617] 
[   25.799924] The buggy address belongs to the object at ffff888105db2a00
[   25.799924]  which belongs to the cache kmalloc-64 of size 64
[   25.800647] The buggy address is located 0 bytes to the right of
[   25.800647]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.801562] 
[   25.801748] The buggy address belongs to the physical page:
[   25.802263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.802583] flags: 0x200000000000000(node=0|zone=2)
[   25.802813] page_type: f5(slab)
[   25.803183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.803530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.804030] page dumped because: kasan: bad access detected
[   25.804293] 
[   25.804367] Memory state around the buggy address:
[   25.804754]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.805230]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.805587] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.806023]                                      ^
[   25.806254]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.806654]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.806915] ==================================================================
---
[   25.401722] ==================================================================
[   25.402399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1313/0x59f0
[   25.402706] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.403514] 
[   25.403635] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.403687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.403701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.403724] Call Trace:
[   25.403740]  <TASK>
[   25.403755]  dump_stack_lvl+0x73/0xb0
[   25.403794]  print_report+0xd1/0x640
[   25.403818]  ? __virt_addr_valid+0x1db/0x2d0
[   25.403840]  ? kasan_atomics_helper+0x1313/0x59f0
[   25.403863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.403886]  ? kasan_atomics_helper+0x1313/0x59f0
[   25.403909]  kasan_report+0x144/0x180
[   25.403932]  ? kasan_atomics_helper+0x1313/0x59f0
[   25.403960]  kasan_check_range+0x10c/0x1c0
[   25.403984]  __kasan_check_write+0x18/0x20
[   25.404004]  kasan_atomics_helper+0x1313/0x59f0
[   25.404028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.404052]  ? kasan_save_alloc_info+0x3b/0x50
[   25.404083]  kasan_atomics+0x1dc/0x310
[   25.404484]  ? __pfx_kasan_atomics+0x10/0x10
[   25.404516]  ? __pfx_read_tsc+0x10/0x10
[   25.404538]  ? ktime_get_ts64+0x86/0x230
[   25.404563]  kunit_try_run_case+0x1a5/0x490
[   25.404587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.404646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.404670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.404694]  ? __kthread_parkme+0x82/0x180
[   25.404718]  ? preempt_count_sub+0x50/0x80
[   25.404744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.404768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.404805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.404831]  kthread+0x337/0x6f0
[   25.404850]  ? trace_preempt_on+0x20/0xc0
[   25.404874]  ? __pfx_kthread+0x10/0x10
[   25.404894]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.404917]  ? calculate_sigpending+0x7b/0xa0
[   25.404939]  ? __pfx_kthread+0x10/0x10
[   25.404961]  ret_from_fork+0x1c5/0x240
[   25.404982]  ? __pfx_kthread+0x10/0x10
[   25.405002]  ret_from_fork_asm+0x1a/0x30
[   25.405036]  </TASK>
[   25.405048] 
[   25.416812] Allocated by task 323:
[   25.417015]  kasan_save_stack+0x45/0x70
[   25.417385]  kasan_save_track+0x18/0x40
[   25.417612]  kasan_save_alloc_info+0x3b/0x50
[   25.417834]  __kasan_kmalloc+0xb7/0xc0
[   25.418344]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.418574]  kasan_atomics+0x95/0x310
[   25.418787]  kunit_try_run_case+0x1a5/0x490
[   25.419086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.419488]  kthread+0x337/0x6f0
[   25.419616]  ret_from_fork+0x1c5/0x240
[   25.419848]  ret_from_fork_asm+0x1a/0x30
[   25.420057] 
[   25.420151] The buggy address belongs to the object at ffff888105db2a00
[   25.420151]  which belongs to the cache kmalloc-64 of size 64
[   25.420643] The buggy address is located 0 bytes to the right of
[   25.420643]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.421526] 
[   25.421607] The buggy address belongs to the physical page:
[   25.421910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.422245] flags: 0x200000000000000(node=0|zone=2)
[   25.422555] page_type: f5(slab)
[   25.422710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.423057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.423599] page dumped because: kasan: bad access detected
[   25.423828] 
[   25.423918] Memory state around the buggy address:
[   25.424285]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.424523]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.424965] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.425214]                                      ^
[   25.425558]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.425879]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.426229] ==================================================================
---
[   25.271993] ==================================================================
[   25.272642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbaf/0x59f0
[   25.273333] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.273564] 
[   25.273649] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.273698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.273712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.273735] Call Trace:
[   25.273752]  <TASK>
[   25.273768]  dump_stack_lvl+0x73/0xb0
[   25.273813]  print_report+0xd1/0x640
[   25.273838]  ? __virt_addr_valid+0x1db/0x2d0
[   25.273862]  ? kasan_atomics_helper+0xbaf/0x59f0
[   25.273884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.273909]  ? kasan_atomics_helper+0xbaf/0x59f0
[   25.273931]  kasan_report+0x144/0x180
[   25.273954]  ? kasan_atomics_helper+0xbaf/0x59f0
[   25.273981]  kasan_check_range+0x10c/0x1c0
[   25.274018]  __kasan_check_write+0x18/0x20
[   25.274038]  kasan_atomics_helper+0xbaf/0x59f0
[   25.274062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.274098]  ? kasan_save_alloc_info+0x3b/0x50
[   25.274127]  kasan_atomics+0x1dc/0x310
[   25.274151]  ? __pfx_kasan_atomics+0x10/0x10
[   25.274176]  ? __pfx_read_tsc+0x10/0x10
[   25.274197]  ? ktime_get_ts64+0x86/0x230
[   25.274220]  kunit_try_run_case+0x1a5/0x490
[   25.274244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.274267]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.274291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.274314]  ? __kthread_parkme+0x82/0x180
[   25.274338]  ? preempt_count_sub+0x50/0x80
[   25.274365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.274398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.274424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.274453]  kthread+0x337/0x6f0
[   25.274483]  ? trace_preempt_on+0x20/0xc0
[   25.274506]  ? __pfx_kthread+0x10/0x10
[   25.274527]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.274549]  ? calculate_sigpending+0x7b/0xa0
[   25.274572]  ? __pfx_kthread+0x10/0x10
[   25.274603]  ret_from_fork+0x1c5/0x240
[   25.274624]  ? __pfx_kthread+0x10/0x10
[   25.274645]  ret_from_fork_asm+0x1a/0x30
[   25.274683]  </TASK>
[   25.274696] 
[   25.284936] Allocated by task 323:
[   25.285268]  kasan_save_stack+0x45/0x70
[   25.285424]  kasan_save_track+0x18/0x40
[   25.285557]  kasan_save_alloc_info+0x3b/0x50
[   25.285703]  __kasan_kmalloc+0xb7/0xc0
[   25.285848]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.286010]  kasan_atomics+0x95/0x310
[   25.286137]  kunit_try_run_case+0x1a5/0x490
[   25.286277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.286448]  kthread+0x337/0x6f0
[   25.286561]  ret_from_fork+0x1c5/0x240
[   25.286692]  ret_from_fork_asm+0x1a/0x30
[   25.286994] 
[   25.287148] The buggy address belongs to the object at ffff888105db2a00
[   25.287148]  which belongs to the cache kmalloc-64 of size 64
[   25.288212] The buggy address is located 0 bytes to the right of
[   25.288212]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.289589] 
[   25.289769] The buggy address belongs to the physical page:
[   25.290452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.291307] flags: 0x200000000000000(node=0|zone=2)
[   25.291908] page_type: f5(slab)
[   25.292266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.293118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.293893] page dumped because: kasan: bad access detected
[   25.294511] 
[   25.294602] Memory state around the buggy address:
[   25.294987]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.295662]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.296253] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.296478]                                      ^
[   25.296633]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.296867]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.297703] ==================================================================
---
[   25.448715] ==================================================================
[   25.449040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1597/0x59f0
[   25.449573] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.449892] 
[   25.450001] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.450069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.450083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.450105] Call Trace:
[   25.450137]  <TASK>
[   25.450169]  dump_stack_lvl+0x73/0xb0
[   25.450200]  print_report+0xd1/0x640
[   25.450224]  ? __virt_addr_valid+0x1db/0x2d0
[   25.450247]  ? kasan_atomics_helper+0x1597/0x59f0
[   25.450269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.450292]  ? kasan_atomics_helper+0x1597/0x59f0
[   25.450315]  kasan_report+0x144/0x180
[   25.450339]  ? kasan_atomics_helper+0x1597/0x59f0
[   25.450462]  kasan_check_range+0x10c/0x1c0
[   25.450502]  __kasan_check_write+0x18/0x20
[   25.450535]  kasan_atomics_helper+0x1597/0x59f0
[   25.450572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.450610]  ? kasan_save_alloc_info+0x3b/0x50
[   25.450652]  kasan_atomics+0x1dc/0x310
[   25.450690]  ? __pfx_kasan_atomics+0x10/0x10
[   25.450728]  ? __pfx_read_tsc+0x10/0x10
[   25.450761]  ? ktime_get_ts64+0x86/0x230
[   25.450797]  kunit_try_run_case+0x1a5/0x490
[   25.450821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.450844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.450868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.450892]  ? __kthread_parkme+0x82/0x180
[   25.450915]  ? preempt_count_sub+0x50/0x80
[   25.450942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.450965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.450992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.451020]  kthread+0x337/0x6f0
[   25.451039]  ? trace_preempt_on+0x20/0xc0
[   25.451063]  ? __pfx_kthread+0x10/0x10
[   25.451083]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.451107]  ? calculate_sigpending+0x7b/0xa0
[   25.451130]  ? __pfx_kthread+0x10/0x10
[   25.451152]  ret_from_fork+0x1c5/0x240
[   25.451173]  ? __pfx_kthread+0x10/0x10
[   25.451194]  ret_from_fork_asm+0x1a/0x30
[   25.451227]  </TASK>
[   25.451239] 
[   25.459506] Allocated by task 323:
[   25.459707]  kasan_save_stack+0x45/0x70
[   25.459933]  kasan_save_track+0x18/0x40
[   25.460105]  kasan_save_alloc_info+0x3b/0x50
[   25.460386]  __kasan_kmalloc+0xb7/0xc0
[   25.460543]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.460770]  kasan_atomics+0x95/0x310
[   25.460990]  kunit_try_run_case+0x1a5/0x490
[   25.461197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.461567]  kthread+0x337/0x6f0
[   25.461769]  ret_from_fork+0x1c5/0x240
[   25.461963]  ret_from_fork_asm+0x1a/0x30
[   25.462256] 
[   25.462377] The buggy address belongs to the object at ffff888105db2a00
[   25.462377]  which belongs to the cache kmalloc-64 of size 64
[   25.462824] The buggy address is located 0 bytes to the right of
[   25.462824]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.463532] 
[   25.463625] The buggy address belongs to the physical page:
[   25.463858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.464228] flags: 0x200000000000000(node=0|zone=2)
[   25.464536] page_type: f5(slab)
[   25.464662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.465133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.465382] page dumped because: kasan: bad access detected
[   25.465544] 
[   25.465609] Memory state around the buggy address:
[   25.465754]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.466475]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.466837] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.467247]                                      ^
[   25.467398]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.467603]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.467825] ==================================================================
---
[   25.240407] ==================================================================
[   25.241125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa73/0x59f0
[   25.241627] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.242394] 
[   25.242688] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.242748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.242763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.242798] Call Trace:
[   25.242816]  <TASK>
[   25.242832]  dump_stack_lvl+0x73/0xb0
[   25.242863]  print_report+0xd1/0x640
[   25.242887]  ? __virt_addr_valid+0x1db/0x2d0
[   25.242910]  ? kasan_atomics_helper+0xa73/0x59f0
[   25.242933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.242959]  ? kasan_atomics_helper+0xa73/0x59f0
[   25.242982]  kasan_report+0x144/0x180
[   25.243007]  ? kasan_atomics_helper+0xa73/0x59f0
[   25.243034]  kasan_check_range+0x10c/0x1c0
[   25.243059]  __kasan_check_write+0x18/0x20
[   25.243080]  kasan_atomics_helper+0xa73/0x59f0
[   25.243103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.243127]  ? kasan_save_alloc_info+0x3b/0x50
[   25.243158]  kasan_atomics+0x1dc/0x310
[   25.243181]  ? __pfx_kasan_atomics+0x10/0x10
[   25.243206]  ? __pfx_read_tsc+0x10/0x10
[   25.243227]  ? ktime_get_ts64+0x86/0x230
[   25.243251]  kunit_try_run_case+0x1a5/0x490
[   25.243276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.243298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.243322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.243346]  ? __kthread_parkme+0x82/0x180
[   25.243370]  ? preempt_count_sub+0x50/0x80
[   25.243397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.243424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.243451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.243478]  kthread+0x337/0x6f0
[   25.243497]  ? trace_preempt_on+0x20/0xc0
[   25.243520]  ? __pfx_kthread+0x10/0x10
[   25.243542]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.243563]  ? calculate_sigpending+0x7b/0xa0
[   25.243586]  ? __pfx_kthread+0x10/0x10
[   25.243608]  ret_from_fork+0x1c5/0x240
[   25.243630]  ? __pfx_kthread+0x10/0x10
[   25.243659]  ret_from_fork_asm+0x1a/0x30
[   25.243692]  </TASK>
[   25.243705] 
[   25.258341] Allocated by task 323:
[   25.258853]  kasan_save_stack+0x45/0x70
[   25.259012]  kasan_save_track+0x18/0x40
[   25.259203]  kasan_save_alloc_info+0x3b/0x50
[   25.259658]  __kasan_kmalloc+0xb7/0xc0
[   25.260070]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.260618]  kasan_atomics+0x95/0x310
[   25.261011]  kunit_try_run_case+0x1a5/0x490
[   25.261464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.261647]  kthread+0x337/0x6f0
[   25.261763]  ret_from_fork+0x1c5/0x240
[   25.262006]  ret_from_fork_asm+0x1a/0x30
[   25.262375] 
[   25.262705] The buggy address belongs to the object at ffff888105db2a00
[   25.262705]  which belongs to the cache kmalloc-64 of size 64
[   25.264112] The buggy address is located 0 bytes to the right of
[   25.264112]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.264974] 
[   25.265053] The buggy address belongs to the physical page:
[   25.265450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.266199] flags: 0x200000000000000(node=0|zone=2)
[   25.266669] page_type: f5(slab)
[   25.266814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.267160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.267930] page dumped because: kasan: bad access detected
[   25.268553] 
[   25.268737] Memory state around the buggy address:
[   25.269197]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.269869]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.270459] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.270676]                                      ^
[   25.270845]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.271058]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.271284] ==================================================================
---
[   25.361908] ==================================================================
[   25.362377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x109c/0x59f0
[   25.362655] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.362932] 
[   25.363042] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.363087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.363101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.363124] Call Trace:
[   25.363139]  <TASK>
[   25.363155]  dump_stack_lvl+0x73/0xb0
[   25.363181]  print_report+0xd1/0x640
[   25.363204]  ? __virt_addr_valid+0x1db/0x2d0
[   25.363227]  ? kasan_atomics_helper+0x109c/0x59f0
[   25.363249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.363273]  ? kasan_atomics_helper+0x109c/0x59f0
[   25.363296]  kasan_report+0x144/0x180
[   25.363319]  ? kasan_atomics_helper+0x109c/0x59f0
[   25.363347]  kasan_check_range+0x10c/0x1c0
[   25.363372]  __kasan_check_write+0x18/0x20
[   25.363392]  kasan_atomics_helper+0x109c/0x59f0
[   25.363415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.363439]  ? kasan_save_alloc_info+0x3b/0x50
[   25.363467]  kasan_atomics+0x1dc/0x310
[   25.363491]  ? __pfx_kasan_atomics+0x10/0x10
[   25.363516]  ? __pfx_read_tsc+0x10/0x10
[   25.363537]  ? ktime_get_ts64+0x86/0x230
[   25.363561]  kunit_try_run_case+0x1a5/0x490
[   25.363586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.363608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.363631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.363660]  ? __kthread_parkme+0x82/0x180
[   25.363683]  ? preempt_count_sub+0x50/0x80
[   25.363710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.363733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.363760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.363797]  kthread+0x337/0x6f0
[   25.363816]  ? trace_preempt_on+0x20/0xc0
[   25.363838]  ? __pfx_kthread+0x10/0x10
[   25.363859]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.363934]  ? calculate_sigpending+0x7b/0xa0
[   25.363960]  ? __pfx_kthread+0x10/0x10
[   25.363981]  ret_from_fork+0x1c5/0x240
[   25.364003]  ? __pfx_kthread+0x10/0x10
[   25.364023]  ret_from_fork_asm+0x1a/0x30
[   25.364056]  </TASK>
[   25.364069] 
[   25.372183] Allocated by task 323:
[   25.372362]  kasan_save_stack+0x45/0x70
[   25.372561]  kasan_save_track+0x18/0x40
[   25.372754]  kasan_save_alloc_info+0x3b/0x50
[   25.373138]  __kasan_kmalloc+0xb7/0xc0
[   25.373398]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.373618]  kasan_atomics+0x95/0x310
[   25.373819]  kunit_try_run_case+0x1a5/0x490
[   25.374197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.374428]  kthread+0x337/0x6f0
[   25.374566]  ret_from_fork+0x1c5/0x240
[   25.374735]  ret_from_fork_asm+0x1a/0x30
[   25.374879] 
[   25.374972] The buggy address belongs to the object at ffff888105db2a00
[   25.374972]  which belongs to the cache kmalloc-64 of size 64
[   25.375459] The buggy address is located 0 bytes to the right of
[   25.375459]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.376125] 
[   25.376328] The buggy address belongs to the physical page:
[   25.376553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.376831] flags: 0x200000000000000(node=0|zone=2)
[   25.377314] page_type: f5(slab)
[   25.377554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.377883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.378120] page dumped because: kasan: bad access detected
[   25.378439] 
[   25.378571] Memory state around the buggy address:
[   25.378765]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.379058]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.379459] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.379715]                                      ^
[   25.379882]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.380093]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.380299] ==================================================================
---
[   26.223279] ==================================================================
[   26.223689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x36f4/0x59f0
[   26.224303] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.224906] 
[   26.225020] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.225069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.225083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.225262] Call Trace:
[   26.225288]  <TASK>
[   26.225304]  dump_stack_lvl+0x73/0xb0
[   26.225336]  print_report+0xd1/0x640
[   26.225359]  ? __virt_addr_valid+0x1db/0x2d0
[   26.225382]  ? kasan_atomics_helper+0x36f4/0x59f0
[   26.225404]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.225427]  ? kasan_atomics_helper+0x36f4/0x59f0
[   26.225450]  kasan_report+0x144/0x180
[   26.225474]  ? kasan_atomics_helper+0x36f4/0x59f0
[   26.225502]  kasan_check_range+0x10c/0x1c0
[   26.225527]  __kasan_check_write+0x18/0x20
[   26.225547]  kasan_atomics_helper+0x36f4/0x59f0
[   26.225570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.225595]  ? kasan_save_alloc_info+0x3b/0x50
[   26.225625]  kasan_atomics+0x1dc/0x310
[   26.225650]  ? __pfx_kasan_atomics+0x10/0x10
[   26.225676]  ? __pfx_read_tsc+0x10/0x10
[   26.225697]  ? ktime_get_ts64+0x86/0x230
[   26.225722]  kunit_try_run_case+0x1a5/0x490
[   26.225747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.225769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.225804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.225828]  ? __kthread_parkme+0x82/0x180
[   26.225874]  ? preempt_count_sub+0x50/0x80
[   26.225902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.225926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.225953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.225980]  kthread+0x337/0x6f0
[   26.225999]  ? trace_preempt_on+0x20/0xc0
[   26.226022]  ? __pfx_kthread+0x10/0x10
[   26.226042]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.226064]  ? calculate_sigpending+0x7b/0xa0
[   26.226087]  ? __pfx_kthread+0x10/0x10
[   26.226108]  ret_from_fork+0x1c5/0x240
[   26.226130]  ? __pfx_kthread+0x10/0x10
[   26.226151]  ret_from_fork_asm+0x1a/0x30
[   26.226184]  </TASK>
[   26.226197] 
[   26.235395] Allocated by task 323:
[   26.235528]  kasan_save_stack+0x45/0x70
[   26.236030]  kasan_save_track+0x18/0x40
[   26.236343]  kasan_save_alloc_info+0x3b/0x50
[   26.236512]  __kasan_kmalloc+0xb7/0xc0
[   26.236700]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.236915]  kasan_atomics+0x95/0x310
[   26.237274]  kunit_try_run_case+0x1a5/0x490
[   26.237477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.237789]  kthread+0x337/0x6f0
[   26.238095]  ret_from_fork+0x1c5/0x240
[   26.238274]  ret_from_fork_asm+0x1a/0x30
[   26.238578] 
[   26.238670] The buggy address belongs to the object at ffff888105db2a00
[   26.238670]  which belongs to the cache kmalloc-64 of size 64
[   26.239276] The buggy address is located 0 bytes to the right of
[   26.239276]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.239813] 
[   26.239903] The buggy address belongs to the physical page:
[   26.240409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.240796] flags: 0x200000000000000(node=0|zone=2)
[   26.241069] page_type: f5(slab)
[   26.241337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.241653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.242164] page dumped because: kasan: bad access detected
[   26.242499] 
[   26.242581] Memory state around the buggy address:
[   26.242927]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.243311]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.243574] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.244034]                                      ^
[   26.244344]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.244647]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.245092] ==================================================================
---
[   25.343221] ==================================================================
[   25.344037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf5f/0x59f0
[   25.344488] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.344716] 
[   25.344807] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.344853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.344865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.344887] Call Trace:
[   25.344904]  <TASK>
[   25.344918]  dump_stack_lvl+0x73/0xb0
[   25.344946]  print_report+0xd1/0x640
[   25.344970]  ? __virt_addr_valid+0x1db/0x2d0
[   25.344993]  ? kasan_atomics_helper+0xf5f/0x59f0
[   25.345015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.345038]  ? kasan_atomics_helper+0xf5f/0x59f0
[   25.345060]  kasan_report+0x144/0x180
[   25.345084]  ? kasan_atomics_helper+0xf5f/0x59f0
[   25.345111]  kasan_check_range+0x10c/0x1c0
[   25.345136]  __kasan_check_write+0x18/0x20
[   25.345156]  kasan_atomics_helper+0xf5f/0x59f0
[   25.345179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.345215]  ? kasan_save_alloc_info+0x3b/0x50
[   25.345244]  kasan_atomics+0x1dc/0x310
[   25.345267]  ? __pfx_kasan_atomics+0x10/0x10
[   25.345293]  ? __pfx_read_tsc+0x10/0x10
[   25.345313]  ? ktime_get_ts64+0x86/0x230
[   25.345336]  kunit_try_run_case+0x1a5/0x490
[   25.345359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.345381]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.345404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.345428]  ? __kthread_parkme+0x82/0x180
[   25.345451]  ? preempt_count_sub+0x50/0x80
[   25.345477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.345500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.345526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.345553]  kthread+0x337/0x6f0
[   25.345572]  ? trace_preempt_on+0x20/0xc0
[   25.345594]  ? __pfx_kthread+0x10/0x10
[   25.345614]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.345636]  ? calculate_sigpending+0x7b/0xa0
[   25.345658]  ? __pfx_kthread+0x10/0x10
[   25.345680]  ret_from_fork+0x1c5/0x240
[   25.345702]  ? __pfx_kthread+0x10/0x10
[   25.345724]  ret_from_fork_asm+0x1a/0x30
[   25.345756]  </TASK>
[   25.345769] 
[   25.353723] Allocated by task 323:
[   25.353932]  kasan_save_stack+0x45/0x70
[   25.354118]  kasan_save_track+0x18/0x40
[   25.354277]  kasan_save_alloc_info+0x3b/0x50
[   25.354487]  __kasan_kmalloc+0xb7/0xc0
[   25.354646]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.354859]  kasan_atomics+0x95/0x310
[   25.355145]  kunit_try_run_case+0x1a5/0x490
[   25.355292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.355538]  kthread+0x337/0x6f0
[   25.355711]  ret_from_fork+0x1c5/0x240
[   25.356049]  ret_from_fork_asm+0x1a/0x30
[   25.356305] 
[   25.356379] The buggy address belongs to the object at ffff888105db2a00
[   25.356379]  which belongs to the cache kmalloc-64 of size 64
[   25.356859] The buggy address is located 0 bytes to the right of
[   25.356859]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.357436] 
[   25.357521] The buggy address belongs to the physical page:
[   25.357725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.357973] flags: 0x200000000000000(node=0|zone=2)
[   25.358129] page_type: f5(slab)
[   25.358246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.358473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.358693] page dumped because: kasan: bad access detected
[   25.358913] 
[   25.359002] Memory state around the buggy address:
[   25.359324]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359637]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.360075] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.360385]                                      ^
[   25.360600]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.361094]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.361469] ==================================================================
---
[   25.169443] ==================================================================
[   25.169798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7ce/0x59f0
[   25.170302] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.170823] 
[   25.170961] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.171009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.171023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.171128] Call Trace:
[   25.171151]  <TASK>
[   25.171187]  dump_stack_lvl+0x73/0xb0
[   25.171233]  print_report+0xd1/0x640
[   25.171257]  ? __virt_addr_valid+0x1db/0x2d0
[   25.171280]  ? kasan_atomics_helper+0x7ce/0x59f0
[   25.171303]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.171327]  ? kasan_atomics_helper+0x7ce/0x59f0
[   25.171349]  kasan_report+0x144/0x180
[   25.171372]  ? kasan_atomics_helper+0x7ce/0x59f0
[   25.171400]  kasan_check_range+0x10c/0x1c0
[   25.171425]  __kasan_check_write+0x18/0x20
[   25.171445]  kasan_atomics_helper+0x7ce/0x59f0
[   25.171469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.171495]  ? kasan_save_alloc_info+0x3b/0x50
[   25.171525]  kasan_atomics+0x1dc/0x310
[   25.171549]  ? __pfx_kasan_atomics+0x10/0x10
[   25.171575]  ? __pfx_read_tsc+0x10/0x10
[   25.171596]  ? ktime_get_ts64+0x86/0x230
[   25.171638]  kunit_try_run_case+0x1a5/0x490
[   25.171667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.171703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.171727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.171752]  ? __kthread_parkme+0x82/0x180
[   25.171788]  ? preempt_count_sub+0x50/0x80
[   25.171815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.171839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.171865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.171893]  kthread+0x337/0x6f0
[   25.171913]  ? trace_preempt_on+0x20/0xc0
[   25.171936]  ? __pfx_kthread+0x10/0x10
[   25.171957]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.171978]  ? calculate_sigpending+0x7b/0xa0
[   25.172001]  ? __pfx_kthread+0x10/0x10
[   25.172023]  ret_from_fork+0x1c5/0x240
[   25.172045]  ? __pfx_kthread+0x10/0x10
[   25.172066]  ret_from_fork_asm+0x1a/0x30
[   25.172099]  </TASK>
[   25.172111] 
[   25.180047] Allocated by task 323:
[   25.180220]  kasan_save_stack+0x45/0x70
[   25.180421]  kasan_save_track+0x18/0x40
[   25.180622]  kasan_save_alloc_info+0x3b/0x50
[   25.180859]  __kasan_kmalloc+0xb7/0xc0
[   25.181055]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.181290]  kasan_atomics+0x95/0x310
[   25.181493]  kunit_try_run_case+0x1a5/0x490
[   25.181696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.181956]  kthread+0x337/0x6f0
[   25.182116]  ret_from_fork+0x1c5/0x240
[   25.182443]  ret_from_fork_asm+0x1a/0x30
[   25.182580] 
[   25.182671] The buggy address belongs to the object at ffff888105db2a00
[   25.182671]  which belongs to the cache kmalloc-64 of size 64
[   25.183068] The buggy address is located 0 bytes to the right of
[   25.183068]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.183450] 
[   25.183625] The buggy address belongs to the physical page:
[   25.184111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.184869] flags: 0x200000000000000(node=0|zone=2)
[   25.185109] page_type: f5(slab)
[   25.185248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.185599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.185942] page dumped because: kasan: bad access detected
[   25.186221] 
[   25.186287] Memory state around the buggy address:
[   25.186436]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.186750]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.187418] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.187736]                                      ^
[   25.187966]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.188275]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.188531] ==================================================================
---
[   26.468660] ==================================================================
[   26.469212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4176/0x59f0
[   26.469544] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.470028] 
[   26.470214] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.470263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.470276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.470298] Call Trace:
[   26.470311]  <TASK>
[   26.470326]  dump_stack_lvl+0x73/0xb0
[   26.470352]  print_report+0xd1/0x640
[   26.470376]  ? __virt_addr_valid+0x1db/0x2d0
[   26.470398]  ? kasan_atomics_helper+0x4176/0x59f0
[   26.470420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.470442]  ? kasan_atomics_helper+0x4176/0x59f0
[   26.470465]  kasan_report+0x144/0x180
[   26.470488]  ? kasan_atomics_helper+0x4176/0x59f0
[   26.470515]  kasan_check_range+0x10c/0x1c0
[   26.470540]  __kasan_check_write+0x18/0x20
[   26.470560]  kasan_atomics_helper+0x4176/0x59f0
[   26.470583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.470607]  ? kasan_save_alloc_info+0x3b/0x50
[   26.470638]  kasan_atomics+0x1dc/0x310
[   26.470661]  ? __pfx_kasan_atomics+0x10/0x10
[   26.470686]  ? __pfx_read_tsc+0x10/0x10
[   26.470706]  ? ktime_get_ts64+0x86/0x230
[   26.470729]  kunit_try_run_case+0x1a5/0x490
[   26.470753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.470785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.470808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.470831]  ? __kthread_parkme+0x82/0x180
[   26.470855]  ? preempt_count_sub+0x50/0x80
[   26.470892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.470915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.470942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.470969]  kthread+0x337/0x6f0
[   26.470989]  ? trace_preempt_on+0x20/0xc0
[   26.471013]  ? __pfx_kthread+0x10/0x10
[   26.471034]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.471055]  ? calculate_sigpending+0x7b/0xa0
[   26.471078]  ? __pfx_kthread+0x10/0x10
[   26.471099]  ret_from_fork+0x1c5/0x240
[   26.471122]  ? __pfx_kthread+0x10/0x10
[   26.471143]  ret_from_fork_asm+0x1a/0x30
[   26.471176]  </TASK>
[   26.471188] 
[   26.478244] Allocated by task 323:
[   26.478395]  kasan_save_stack+0x45/0x70
[   26.478569]  kasan_save_track+0x18/0x40
[   26.478732]  kasan_save_alloc_info+0x3b/0x50
[   26.478948]  __kasan_kmalloc+0xb7/0xc0
[   26.479096]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.479244]  kasan_atomics+0x95/0x310
[   26.479373]  kunit_try_run_case+0x1a5/0x490
[   26.479515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.479751]  kthread+0x337/0x6f0
[   26.479923]  ret_from_fork+0x1c5/0x240
[   26.480107]  ret_from_fork_asm+0x1a/0x30
[   26.480299] 
[   26.480387] The buggy address belongs to the object at ffff888105db2a00
[   26.480387]  which belongs to the cache kmalloc-64 of size 64
[   26.481022] The buggy address is located 0 bytes to the right of
[   26.481022]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.481385] 
[   26.481475] The buggy address belongs to the physical page:
[   26.481727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.482363] flags: 0x200000000000000(node=0|zone=2)
[   26.482593] page_type: f5(slab)
[   26.482727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.483054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.483378] page dumped because: kasan: bad access detected
[   26.483588] 
[   26.483682] Memory state around the buggy address:
[   26.483885]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484133]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484438] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.484712]                                      ^
[   26.484943]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.485185]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.485470] ==================================================================
---
[   25.380620] ==================================================================
[   25.380956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11d8/0x59f0
[   25.381282] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.381599] 
[   25.381700] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.381747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.381761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.381793] Call Trace:
[   25.381807]  <TASK>
[   25.381822]  dump_stack_lvl+0x73/0xb0
[   25.381848]  print_report+0xd1/0x640
[   25.381872]  ? __virt_addr_valid+0x1db/0x2d0
[   25.381894]  ? kasan_atomics_helper+0x11d8/0x59f0
[   25.381916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.381939]  ? kasan_atomics_helper+0x11d8/0x59f0
[   25.381962]  kasan_report+0x144/0x180
[   25.381985]  ? kasan_atomics_helper+0x11d8/0x59f0
[   25.382013]  kasan_check_range+0x10c/0x1c0
[   25.382037]  __kasan_check_write+0x18/0x20
[   25.382058]  kasan_atomics_helper+0x11d8/0x59f0
[   25.382081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.382104]  ? kasan_save_alloc_info+0x3b/0x50
[   25.382134]  kasan_atomics+0x1dc/0x310
[   25.382157]  ? __pfx_kasan_atomics+0x10/0x10
[   25.382182]  ? __pfx_read_tsc+0x10/0x10
[   25.382203]  ? ktime_get_ts64+0x86/0x230
[   25.382226]  kunit_try_run_case+0x1a5/0x490
[   25.382250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.382272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.382295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.382319]  ? __kthread_parkme+0x82/0x180
[   25.382342]  ? preempt_count_sub+0x50/0x80
[   25.382369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.382392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.382419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.382446]  kthread+0x337/0x6f0
[   25.382465]  ? trace_preempt_on+0x20/0xc0
[   25.382488]  ? __pfx_kthread+0x10/0x10
[   25.382509]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.382530]  ? calculate_sigpending+0x7b/0xa0
[   25.382716]  ? __pfx_kthread+0x10/0x10
[   25.382740]  ret_from_fork+0x1c5/0x240
[   25.382763]  ? __pfx_kthread+0x10/0x10
[   25.382797]  ret_from_fork_asm+0x1a/0x30
[   25.382831]  </TASK>
[   25.382844] 
[   25.390402] Allocated by task 323:
[   25.390533]  kasan_save_stack+0x45/0x70
[   25.390671]  kasan_save_track+0x18/0x40
[   25.390824]  kasan_save_alloc_info+0x3b/0x50
[   25.391242]  __kasan_kmalloc+0xb7/0xc0
[   25.391435]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.391648]  kasan_atomics+0x95/0x310
[   25.391837]  kunit_try_run_case+0x1a5/0x490
[   25.392297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.392566]  kthread+0x337/0x6f0
[   25.392730]  ret_from_fork+0x1c5/0x240
[   25.392987]  ret_from_fork_asm+0x1a/0x30
[   25.393180] 
[   25.393297] The buggy address belongs to the object at ffff888105db2a00
[   25.393297]  which belongs to the cache kmalloc-64 of size 64
[   25.393855] The buggy address is located 0 bytes to the right of
[   25.393855]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.394433] 
[   25.394519] The buggy address belongs to the physical page:
[   25.394755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.395085] flags: 0x200000000000000(node=0|zone=2)
[   25.395636] page_type: f5(slab)
[   25.395814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.396075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.396678] page dumped because: kasan: bad access detected
[   25.396895] 
[   25.396987] Memory state around the buggy address:
[   25.397277]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.397490]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.397700] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.399538]                                      ^
[   25.399760]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400048]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400581] ==================================================================
---
[   25.567370] ==================================================================
[   25.568172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b30/0x59f0
[   25.568791] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.569156] 
[   25.569233] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.569306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.569320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.569354] Call Trace:
[   25.569369]  <TASK>
[   25.569385]  dump_stack_lvl+0x73/0xb0
[   25.569414]  print_report+0xd1/0x640
[   25.569450]  ? __virt_addr_valid+0x1db/0x2d0
[   25.569472]  ? kasan_atomics_helper+0x1b30/0x59f0
[   25.569493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.569517]  ? kasan_atomics_helper+0x1b30/0x59f0
[   25.569540]  kasan_report+0x144/0x180
[   25.569563]  ? kasan_atomics_helper+0x1b30/0x59f0
[   25.569590]  kasan_check_range+0x10c/0x1c0
[   25.569643]  __kasan_check_write+0x18/0x20
[   25.569664]  kasan_atomics_helper+0x1b30/0x59f0
[   25.569687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.569722]  ? kasan_save_alloc_info+0x3b/0x50
[   25.569752]  kasan_atomics+0x1dc/0x310
[   25.569784]  ? __pfx_kasan_atomics+0x10/0x10
[   25.569837]  ? __pfx_read_tsc+0x10/0x10
[   25.569858]  ? ktime_get_ts64+0x86/0x230
[   25.569895]  kunit_try_run_case+0x1a5/0x490
[   25.569931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.569952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.569975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.569999]  ? __kthread_parkme+0x82/0x180
[   25.570023]  ? preempt_count_sub+0x50/0x80
[   25.570049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.570072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.570099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.570126]  kthread+0x337/0x6f0
[   25.570161]  ? trace_preempt_on+0x20/0xc0
[   25.570186]  ? __pfx_kthread+0x10/0x10
[   25.570206]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.570228]  ? calculate_sigpending+0x7b/0xa0
[   25.570251]  ? __pfx_kthread+0x10/0x10
[   25.570272]  ret_from_fork+0x1c5/0x240
[   25.570294]  ? __pfx_kthread+0x10/0x10
[   25.570314]  ret_from_fork_asm+0x1a/0x30
[   25.570346]  </TASK>
[   25.570358] 
[   25.584622] Allocated by task 323:
[   25.584967]  kasan_save_stack+0x45/0x70
[   25.585165]  kasan_save_track+0x18/0x40
[   25.585402]  kasan_save_alloc_info+0x3b/0x50
[   25.585817]  __kasan_kmalloc+0xb7/0xc0
[   25.586040]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.586272]  kasan_atomics+0x95/0x310
[   25.586587]  kunit_try_run_case+0x1a5/0x490
[   25.586945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.587116]  kthread+0x337/0x6f0
[   25.587439]  ret_from_fork+0x1c5/0x240
[   25.587903]  ret_from_fork_asm+0x1a/0x30
[   25.588282] 
[   25.588446] The buggy address belongs to the object at ffff888105db2a00
[   25.588446]  which belongs to the cache kmalloc-64 of size 64
[   25.589373] The buggy address is located 0 bytes to the right of
[   25.589373]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.590307] 
[   25.590499] The buggy address belongs to the physical page:
[   25.591095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.591647] flags: 0x200000000000000(node=0|zone=2)
[   25.591818] page_type: f5(slab)
[   25.592076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.592861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.593891] page dumped because: kasan: bad access detected
[   25.594426] 
[   25.594637] Memory state around the buggy address:
[   25.595287]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.595849]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.596065] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.596520]                                      ^
[   25.597233]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.598055]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.598937] ==================================================================
---
[   25.832681] ==================================================================
[   25.833019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x236f/0x59f0
[   25.833431] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.833761] 
[   25.833881] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.833932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.833946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.833968] Call Trace:
[   25.833984]  <TASK>
[   25.834000]  dump_stack_lvl+0x73/0xb0
[   25.834027]  print_report+0xd1/0x640
[   25.834050]  ? __virt_addr_valid+0x1db/0x2d0
[   25.834073]  ? kasan_atomics_helper+0x236f/0x59f0
[   25.834096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.834119]  ? kasan_atomics_helper+0x236f/0x59f0
[   25.834141]  kasan_report+0x144/0x180
[   25.834566]  ? kasan_atomics_helper+0x236f/0x59f0
[   25.834605]  kasan_check_range+0x10c/0x1c0
[   25.834631]  __kasan_check_write+0x18/0x20
[   25.834653]  kasan_atomics_helper+0x236f/0x59f0
[   25.834677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.834702]  ? kasan_save_alloc_info+0x3b/0x50
[   25.834731]  kasan_atomics+0x1dc/0x310
[   25.834863]  ? __pfx_kasan_atomics+0x10/0x10
[   25.834894]  ? __pfx_read_tsc+0x10/0x10
[   25.834915]  ? ktime_get_ts64+0x86/0x230
[   25.834942]  kunit_try_run_case+0x1a5/0x490
[   25.834966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.834988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.835011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.835036]  ? __kthread_parkme+0x82/0x180
[   25.835060]  ? preempt_count_sub+0x50/0x80
[   25.835087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.835111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.835138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.835165]  kthread+0x337/0x6f0
[   25.835185]  ? trace_preempt_on+0x20/0xc0
[   25.835208]  ? __pfx_kthread+0x10/0x10
[   25.835230]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.835253]  ? calculate_sigpending+0x7b/0xa0
[   25.835276]  ? __pfx_kthread+0x10/0x10
[   25.835297]  ret_from_fork+0x1c5/0x240
[   25.835319]  ? __pfx_kthread+0x10/0x10
[   25.835340]  ret_from_fork_asm+0x1a/0x30
[   25.835373]  </TASK>
[   25.835385] 
[   25.845018] Allocated by task 323:
[   25.845201]  kasan_save_stack+0x45/0x70
[   25.845559]  kasan_save_track+0x18/0x40
[   25.845724]  kasan_save_alloc_info+0x3b/0x50
[   25.845955]  __kasan_kmalloc+0xb7/0xc0
[   25.846123]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   25.846516]  kasan_atomics+0x95/0x310
[   25.846944]  kunit_try_run_case+0x1a5/0x490
[   25.847127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.847493]  kthread+0x337/0x6f0
[   25.847742]  ret_from_fork+0x1c5/0x240
[   25.848059]  ret_from_fork_asm+0x1a/0x30
[   25.848249] 
[   25.848474] The buggy address belongs to the object at ffff888105db2a00
[   25.848474]  which belongs to the cache kmalloc-64 of size 64
[   25.848965] The buggy address is located 0 bytes to the right of
[   25.848965]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   25.849742] 
[   25.849957] The buggy address belongs to the physical page:
[   25.850395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   25.850701] flags: 0x200000000000000(node=0|zone=2)
[   25.850940] page_type: f5(slab)
[   25.851180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.851792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.852149] page dumped because: kasan: bad access detected
[   25.852410] 
[   25.852491] Memory state around the buggy address:
[   25.852970]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853323]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853850] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.854223]                                      ^
[   25.854660]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.854963]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855268] ==================================================================
---
[   26.166239] ==================================================================
[   26.166472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x33f0/0x59f0
[   26.166969] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   26.167513] 
[   26.167618] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   26.167668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.167681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.167714] Call Trace:
[   26.167727]  <TASK>
[   26.167741]  dump_stack_lvl+0x73/0xb0
[   26.167790]  print_report+0xd1/0x640
[   26.167814]  ? __virt_addr_valid+0x1db/0x2d0
[   26.167836]  ? kasan_atomics_helper+0x33f0/0x59f0
[   26.167878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.167902]  ? kasan_atomics_helper+0x33f0/0x59f0
[   26.167933]  kasan_report+0x144/0x180
[   26.167957]  ? kasan_atomics_helper+0x33f0/0x59f0
[   26.167996]  kasan_check_range+0x10c/0x1c0
[   26.168020]  __kasan_check_write+0x18/0x20
[   26.168040]  kasan_atomics_helper+0x33f0/0x59f0
[   26.168065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.168098]  ? kasan_save_alloc_info+0x3b/0x50
[   26.168127]  kasan_atomics+0x1dc/0x310
[   26.168151]  ? __pfx_kasan_atomics+0x10/0x10
[   26.168186]  ? __pfx_read_tsc+0x10/0x10
[   26.168206]  ? ktime_get_ts64+0x86/0x230
[   26.168230]  kunit_try_run_case+0x1a5/0x490
[   26.168254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.168286]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.168310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.168344]  ? __kthread_parkme+0x82/0x180
[   26.168368]  ? preempt_count_sub+0x50/0x80
[   26.168394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.168418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.168453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.168480]  kthread+0x337/0x6f0
[   26.168511]  ? trace_preempt_on+0x20/0xc0
[   26.168533]  ? __pfx_kthread+0x10/0x10
[   26.168554]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.168576]  ? calculate_sigpending+0x7b/0xa0
[   26.168599]  ? __pfx_kthread+0x10/0x10
[   26.168620]  ret_from_fork+0x1c5/0x240
[   26.168641]  ? __pfx_kthread+0x10/0x10
[   26.168662]  ret_from_fork_asm+0x1a/0x30
[   26.168694]  </TASK>
[   26.168707] 
[   26.176061] Allocated by task 323:
[   26.176289]  kasan_save_stack+0x45/0x70
[   26.176539]  kasan_save_track+0x18/0x40
[   26.176782]  kasan_save_alloc_info+0x3b/0x50
[   26.176966]  __kasan_kmalloc+0xb7/0xc0
[   26.177150]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.177423]  kasan_atomics+0x95/0x310
[   26.177608]  kunit_try_run_case+0x1a5/0x490
[   26.177824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.178080]  kthread+0x337/0x6f0
[   26.178199]  ret_from_fork+0x1c5/0x240
[   26.178328]  ret_from_fork_asm+0x1a/0x30
[   26.178461] 
[   26.178526] The buggy address belongs to the object at ffff888105db2a00
[   26.178526]  which belongs to the cache kmalloc-64 of size 64
[   26.179006] The buggy address is located 0 bytes to the right of
[   26.179006]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.179549] 
[   26.179640] The buggy address belongs to the physical page:
[   26.179929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.180276] flags: 0x200000000000000(node=0|zone=2)
[   26.180490] page_type: f5(slab)
[   26.180608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.180845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.181114] page dumped because: kasan: bad access detected
[   26.181412] 
[   26.181503] Memory state around the buggy address:
[   26.181729]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.182067]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.182393] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.182702]                                      ^
[   26.182903]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.183173]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.183441] ==================================================================
---
[   25.997702] ==================================================================
[   25.998046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x28ca/0x59f0
[   25.998604] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[   25.999285] 
[   25.999491] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   25.999543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.999557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.999581] Call Trace:
[   25.999596]  <TASK>
[   25.999612]  dump_stack_lvl+0x73/0xb0
[   25.999643]  print_report+0xd1/0x640
[   25.999672]  ? __virt_addr_valid+0x1db/0x2d0
[   25.999695]  ? kasan_atomics_helper+0x28ca/0x59f0
[   25.999931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.999961]  ? kasan_atomics_helper+0x28ca/0x59f0
[   25.999986]  kasan_report+0x144/0x180
[   26.000011]  ? kasan_atomics_helper+0x28ca/0x59f0
[   26.000039]  kasan_check_range+0x10c/0x1c0
[   26.000064]  __kasan_check_write+0x18/0x20
[   26.000085]  kasan_atomics_helper+0x28ca/0x59f0
[   26.000109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.000133]  ? kasan_save_alloc_info+0x3b/0x50
[   26.000163]  kasan_atomics+0x1dc/0x310
[   26.000187]  ? __pfx_kasan_atomics+0x10/0x10
[   26.000212]  ? __pfx_read_tsc+0x10/0x10
[   26.000232]  ? ktime_get_ts64+0x86/0x230
[   26.000257]  kunit_try_run_case+0x1a5/0x490
[   26.000281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.000304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.000328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.000352]  ? __kthread_parkme+0x82/0x180
[   26.000375]  ? preempt_count_sub+0x50/0x80
[   26.000402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.000425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.000452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.000479]  kthread+0x337/0x6f0
[   26.000499]  ? trace_preempt_on+0x20/0xc0
[   26.000522]  ? __pfx_kthread+0x10/0x10
[   26.000543]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.000565]  ? calculate_sigpending+0x7b/0xa0
[   26.000588]  ? __pfx_kthread+0x10/0x10
[   26.000609]  ret_from_fork+0x1c5/0x240
[   26.000631]  ? __pfx_kthread+0x10/0x10
[   26.000651]  ret_from_fork_asm+0x1a/0x30
[   26.000684]  </TASK>
[   26.000696] 
[   26.008162] Allocated by task 323:
[   26.008339]  kasan_save_stack+0x45/0x70
[   26.008557]  kasan_save_track+0x18/0x40
[   26.008712]  kasan_save_alloc_info+0x3b/0x50
[   26.008869]  __kasan_kmalloc+0xb7/0xc0
[   26.009095]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   26.009311]  kasan_atomics+0x95/0x310
[   26.009523]  kunit_try_run_case+0x1a5/0x490
[   26.009727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.010008]  kthread+0x337/0x6f0
[   26.010213]  ret_from_fork+0x1c5/0x240
[   26.010402]  ret_from_fork_asm+0x1a/0x30
[   26.010606] 
[   26.010697] The buggy address belongs to the object at ffff888105db2a00
[   26.010697]  which belongs to the cache kmalloc-64 of size 64
[   26.011248] The buggy address is located 0 bytes to the right of
[   26.011248]  allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[   26.011760] 
[   26.011863] The buggy address belongs to the physical page:
[   26.012165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[   26.012685] flags: 0x200000000000000(node=0|zone=2)
[   26.012857] page_type: f5(slab)
[   26.013018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.013344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.013664] page dumped because: kasan: bad access detected
[   26.013941] 
[   26.014030] Memory state around the buggy address:
[   26.014242]  ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.014546]  ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.014751] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.015490]                                      ^
[   26.015753]  ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.016118]  ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.016532] ==================================================================

kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper Regression Log 8 (gcc-13-lkftconfig-kunit)

[   22.353456] ==================================================================
[   22.354133] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x868/0x980
[   22.354469] Write of size 1 at addr ffff888105a2e0eb by task kunit_try_catch/216
[   22.354747] 
[   22.354845] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   22.354895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.354908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.354929] Call Trace:
[   22.354941]  <TASK>
[   22.354954]  dump_stack_lvl+0x73/0xb0
[   22.354982]  print_report+0xd1/0x640
[   22.355005]  ? __virt_addr_valid+0x1db/0x2d0
[   22.355028]  ? krealloc_more_oob_helper+0x868/0x980
[   22.355051]  ? kasan_addr_to_slab+0x11/0xa0
[   22.355071]  ? krealloc_more_oob_helper+0x868/0x980
[   22.355095]  kasan_report+0x144/0x180
[   22.355116]  ? krealloc_more_oob_helper+0x868/0x980
[   22.355145]  __asan_report_store1_noabort+0x1b/0x30
[   22.355168]  krealloc_more_oob_helper+0x868/0x980
[   22.355190]  ? __schedule+0x10e1/0x2b50
[   22.355214]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.355237]  ? finish_task_switch.isra.0+0x153/0x700
[   22.355261]  ? __switch_to+0x47/0xf90
[   22.355280]  ? update_rq_clock+0x1b2/0x4d0
[   22.355302]  ? __schedule+0x10e1/0x2b50
[   22.355323]  ? __pfx_read_tsc+0x10/0x10
[   22.355346]  krealloc_large_more_oob+0x1c/0x30
[   22.355368]  kunit_try_run_case+0x1a5/0x490
[   22.355393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.355413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.355435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.355458]  ? __kthread_parkme+0x82/0x180
[   22.355481]  ? preempt_count_sub+0x50/0x80
[   22.355505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.355527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.355552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.355591]  kthread+0x337/0x6f0
[   22.355609]  ? trace_preempt_on+0x20/0xc0
[   22.355632]  ? __pfx_kthread+0x10/0x10
[   22.355675]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.355695]  ? calculate_sigpending+0x7b/0xa0
[   22.355717]  ? __pfx_kthread+0x10/0x10
[   22.355737]  ret_from_fork+0x1c5/0x240
[   22.355758]  ? __pfx_kthread+0x10/0x10
[   22.355785]  ret_from_fork_asm+0x1a/0x30
[   22.355817]  </TASK>
[   22.355829] 
[   22.365851] The buggy address belongs to the physical page:
[   22.366490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2c
[   22.367272] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.367629] flags: 0x200000000000040(head|node=0|zone=2)
[   22.367821] page_type: f8(unknown)
[   22.368111] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.368832] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.369827] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.370834] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.371934] head: 0200000000000002 ffffea0004168b01 00000000ffffffff 00000000ffffffff
[   22.372982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.373988] page dumped because: kasan: bad access detected
[   22.374649] 
[   22.374920] Memory state around the buggy address:
[   22.375489]  ffff888105a2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.375720]  ffff888105a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.375949] >ffff888105a2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.376160]                                                           ^
[   22.376584]  ffff888105a2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.376828]  ffff888105a2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.377253] ==================================================================

kasan-bug-kasan-slab-out-of-bounds-in-memchr Regression Log 9 (gcc-13-lkftconfig-kunit)

[   24.411356] ==================================================================
[   24.411813] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[   24.412228] Read of size 1 at addr ffff88810582b358 by task kunit_try_catch/313
[   24.412474] 
[   24.412561] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.412611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.412624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.412647] Call Trace:
[   24.412660]  <TASK>
[   24.412674]  dump_stack_lvl+0x73/0xb0
[   24.412701]  print_report+0xd1/0x640
[   24.412726]  ? __virt_addr_valid+0x1db/0x2d0
[   24.412749]  ? memchr+0x79/0x90
[   24.412770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.412803]  ? memchr+0x79/0x90
[   24.412824]  kasan_report+0x144/0x180
[   24.412847]  ? memchr+0x79/0x90
[   24.412873]  __asan_report_load1_noabort+0x18/0x20
[   24.412897]  memchr+0x79/0x90
[   24.412920]  kasan_memchr+0x162/0x340
[   24.412940]  ? __kasan_check_write+0x18/0x20
[   24.412959]  ? __pfx_kasan_memchr+0x10/0x10
[   24.412980]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.413003]  ? trace_hardirqs_on+0x37/0xe0
[   24.413025]  ? __pfx_read_tsc+0x10/0x10
[   24.413045]  ? ktime_get_ts64+0x86/0x230
[   24.413068]  kunit_try_run_case+0x1a5/0x490
[   24.413114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.413138]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.413162]  ? __kthread_parkme+0x82/0x180
[   24.413185]  ? preempt_count_sub+0x50/0x80
[   24.413211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.413234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.413263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.413291]  kthread+0x337/0x6f0
[   24.413309]  ? trace_preempt_on+0x20/0xc0
[   24.413331]  ? __pfx_kthread+0x10/0x10
[   24.413351]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.413371]  ? calculate_sigpending+0x7b/0xa0
[   24.413393]  ? __pfx_kthread+0x10/0x10
[   24.413413]  ret_from_fork+0x1c5/0x240
[   24.413434]  ? __pfx_kthread+0x10/0x10
[   24.413453]  ret_from_fork_asm+0x1a/0x30
[   24.413486]  </TASK>
[   24.413500] 
[   24.421657] Allocated by task 313:
[   24.421865]  kasan_save_stack+0x45/0x70
[   24.422039]  kasan_save_track+0x18/0x40
[   24.422434]  kasan_save_alloc_info+0x3b/0x50
[   24.422650]  __kasan_kmalloc+0xb7/0xc0
[   24.422838]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   24.423076]  kasan_memchr+0xac/0x340
[   24.423277]  kunit_try_run_case+0x1a5/0x490
[   24.423473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.423720]  kthread+0x337/0x6f0
[   24.423845]  ret_from_fork+0x1c5/0x240
[   24.423970]  ret_from_fork_asm+0x1a/0x30
[   24.424294] 
[   24.424401] The buggy address belongs to the object at ffff88810582b340
[   24.424401]  which belongs to the cache kmalloc-32 of size 32
[   24.425023] The buggy address is located 0 bytes to the right of
[   24.425023]  allocated 24-byte region [ffff88810582b340, ffff88810582b358)
[   24.425728] 
[   24.425824] The buggy address belongs to the physical page:
[   24.426107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582b
[   24.426495] flags: 0x200000000000000(node=0|zone=2)
[   24.426700] page_type: f5(slab)
[   24.426835] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.427077] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.427399] page dumped because: kasan: bad access detected
[   24.427644] 
[   24.427829] Memory state around the buggy address:
[   24.428283]  ffff88810582b200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.428587]  ffff88810582b280: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.428917] >ffff88810582b300: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.429181]                                                     ^
[   24.429354]  ffff88810582b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.429555]  ffff88810582b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.430045] ==================================================================

kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper Regression Log 10 (gcc-13-lkftconfig-kunit)

[   23.989326] ==================================================================
[   23.989840] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x30c/0x390
[   23.990456] Read of size 1 at addr ffff8881062b2001 by task kunit_try_catch/281
[   23.990806] 
[   23.991321] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   23.991380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.991394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.991418] Call Trace:
[   23.991433]  <TASK>
[   23.991447]  dump_stack_lvl+0x73/0xb0
[   23.991479]  print_report+0xd1/0x640
[   23.991503]  ? __virt_addr_valid+0x1db/0x2d0
[   23.991527]  ? mempool_oob_right_helper+0x30c/0x390
[   23.991550]  ? kasan_addr_to_slab+0x11/0xa0
[   23.991571]  ? mempool_oob_right_helper+0x30c/0x390
[   23.991594]  kasan_report+0x144/0x180
[   23.991616]  ? mempool_oob_right_helper+0x30c/0x390
[   23.991644]  __asan_report_load1_noabort+0x18/0x20
[   23.991675]  mempool_oob_right_helper+0x30c/0x390
[   23.991698]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.991720]  ? __pfx_call_function_single_prep_ipi+0x10/0x10
[   23.991746]  ? __kasan_check_write+0x18/0x20
[   23.991766]  ? finish_task_switch.isra.0+0x153/0x700
[   23.991806]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   23.991935]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   23.991961]  ? update_rq_clock+0x1b2/0x4d0
[   23.991982]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.992007]  ? __pfx_mempool_kfree+0x10/0x10
[   23.992029]  ? __pfx_read_tsc+0x10/0x10
[   23.992050]  ? ktime_get_ts64+0x86/0x230
[   23.992074]  kunit_try_run_case+0x1a5/0x490
[   23.992097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.992118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.992158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.992181]  ? __kthread_parkme+0x82/0x180
[   23.992204]  ? preempt_count_sub+0x50/0x80
[   23.992229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.992251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.992277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.992303]  kthread+0x337/0x6f0
[   23.992321]  ? trace_preempt_on+0x20/0xc0
[   23.992343]  ? __pfx_kthread+0x10/0x10
[   23.992362]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.992382]  ? calculate_sigpending+0x7b/0xa0
[   23.992405]  ? __pfx_kthread+0x10/0x10
[   23.992425]  ret_from_fork+0x1c5/0x240
[   23.992446]  ? __pfx_kthread+0x10/0x10
[   23.992464]  ret_from_fork_asm+0x1a/0x30
[   23.992498]  </TASK>
[   23.992510] 
[   24.005470] The buggy address belongs to the physical page:
[   24.005806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b0
[   24.006490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.006812] flags: 0x200000000000040(head|node=0|zone=2)
[   24.007359] page_type: f8(unknown)
[   24.007664] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.008359] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.008717] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.009492] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.009974] head: 0200000000000002 ffffea000418ac01 00000000ffffffff 00000000ffffffff
[   24.010491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.010829] page dumped because: kasan: bad access detected
[   24.011235] 
[   24.011320] Memory state around the buggy address:
[   24.011518]  ffff8881062b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.011800]  ffff8881062b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.012715] >ffff8881062b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.013438]                    ^
[   24.013751]  ffff8881062b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.014286]  ffff8881062b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.014548] ==================================================================

kasan-bug-kasan-slab-use-after-free-in-kasan_strings Regression Log 11 (gcc-13-lkftconfig-kunit)

[   24.554729] ==================================================================
[   24.555080] BUG: KASAN: slab-use-after-free in kasan_strings+0xdf1/0xf70
[   24.555867] Read of size 1 at addr ffff888105db3990 by task kunit_try_catch/317
[   24.556336] 
[   24.556453] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.556501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.556513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.556534] Call Trace:
[   24.556549]  <TASK>
[   24.556564]  dump_stack_lvl+0x73/0xb0
[   24.556592]  print_report+0xd1/0x640
[   24.556613]  ? __virt_addr_valid+0x1db/0x2d0
[   24.556636]  ? kasan_strings+0xdf1/0xf70
[   24.556655]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.556678]  ? kasan_strings+0xdf1/0xf70
[   24.556698]  kasan_report+0x144/0x180
[   24.556719]  ? kasan_strings+0xdf1/0xf70
[   24.556744]  __asan_report_load1_noabort+0x18/0x20
[   24.556767]  kasan_strings+0xdf1/0xf70
[   24.556798]  ? trace_hardirqs_on+0x37/0xe0
[   24.556821]  ? __pfx_kasan_strings+0x10/0x10
[   24.556840]  ? finish_task_switch.isra.0+0x153/0x700
[   24.556863]  ? __switch_to+0x47/0xf90
[   24.556882]  ? update_rq_clock+0x1b2/0x4d0
[   24.556904]  ? __schedule+0x10e1/0x2b50
[   24.556925]  ? __pfx_read_tsc+0x10/0x10
[   24.556944]  ? ktime_get_ts64+0x86/0x230
[   24.556967]  kunit_try_run_case+0x1a5/0x490
[   24.556989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.557009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.557031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.557053]  ? __kthread_parkme+0x82/0x180
[   24.557075]  ? preempt_count_sub+0x50/0x80
[   24.557100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.557121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.557192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.557221]  kthread+0x337/0x6f0
[   24.557239]  ? trace_preempt_on+0x20/0xc0
[   24.557260]  ? __pfx_kthread+0x10/0x10
[   24.557279]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.557300]  ? calculate_sigpending+0x7b/0xa0
[   24.557323]  ? __pfx_kthread+0x10/0x10
[   24.557342]  ret_from_fork+0x1c5/0x240
[   24.557362]  ? __pfx_kthread+0x10/0x10
[   24.557381]  ret_from_fork_asm+0x1a/0x30
[   24.557413]  </TASK>
[   24.557423] 
[   24.567343] Allocated by task 317:
[   24.567512]  kasan_save_stack+0x45/0x70
[   24.567714]  kasan_save_track+0x18/0x40
[   24.568041]  kasan_save_alloc_info+0x3b/0x50
[   24.568510]  __kasan_kmalloc+0xb7/0xc0
[   24.568658]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   24.568818]  kasan_strings+0xc0/0xf70
[   24.569074]  kunit_try_run_case+0x1a5/0x490
[   24.569274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.569690]  kthread+0x337/0x6f0
[   24.569851]  ret_from_fork+0x1c5/0x240
[   24.570033]  ret_from_fork_asm+0x1a/0x30
[   24.570302] 
[   24.570375] Freed by task 317:
[   24.570502]  kasan_save_stack+0x45/0x70
[   24.570694]  kasan_save_track+0x18/0x40
[   24.570885]  __kasan_save_free_info+0x3f/0x60
[   24.571057]  __kasan_slab_free+0x68/0x90
[   24.571278]  kfree+0x225/0x4f0
[   24.571442]  kasan_strings+0x34f/0xf70
[   24.571600]  kunit_try_run_case+0x1a5/0x490
[   24.571792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.571962]  kthread+0x337/0x6f0
[   24.572073]  ret_from_fork+0x1c5/0x240
[   24.572201]  ret_from_fork_asm+0x1a/0x30
[   24.572333] 
[   24.572397] The buggy address belongs to the object at ffff888105db3980
[   24.572397]  which belongs to the cache kmalloc-32 of size 32
[   24.572914] The buggy address is located 16 bytes inside of
[   24.572914]  freed 32-byte region [ffff888105db3980, ffff888105db39a0)
[   24.574050] 
[   24.574125] The buggy address belongs to the physical page:
[   24.574386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db3
[   24.574635] flags: 0x200000000000000(node=0|zone=2)
[   24.574803] page_type: f5(slab)
[   24.575067] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.575485] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.575864] page dumped because: kasan: bad access detected
[   24.576084] 
[   24.576164] Memory state around the buggy address:
[   24.576420]  ffff888105db3880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.576847]  ffff888105db3900: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.577116] >ffff888105db3980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.577532]                          ^
[   24.577722]  ffff888105db3a00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.578043]  ffff888105db3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.578360] ==================================================================

kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper Regression Log 12 (gcc-13-lkftconfig-kunit)

[   24.105232] ==================================================================
[   24.105796] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x387/0x420
[   24.106234] Read of size 1 at addr ffff888105db5240 by task kunit_try_catch/289
[   24.106707] 
[   24.106832] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.106883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.106897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.106919] Call Trace:
[   24.106937]  <TASK>
[   24.106951]  dump_stack_lvl+0x73/0xb0
[   24.106982]  print_report+0xd1/0x640
[   24.107006]  ? __virt_addr_valid+0x1db/0x2d0
[   24.107030]  ? mempool_uaf_helper+0x387/0x420
[   24.107051]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.107074]  ? mempool_uaf_helper+0x387/0x420
[   24.107097]  kasan_report+0x144/0x180
[   24.107119]  ? mempool_uaf_helper+0x387/0x420
[   24.107146]  __asan_report_load1_noabort+0x18/0x20
[   24.107170]  mempool_uaf_helper+0x387/0x420
[   24.107192]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   24.107224]  mempool_slab_uaf+0xea/0x140
[   24.107249]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   24.107270]  ? update_rq_clock+0x1b2/0x4d0
[   24.107293]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   24.107316]  ? __pfx_mempool_free_slab+0x10/0x10
[   24.107341]  ? __pfx_read_tsc+0x10/0x10
[   24.107361]  ? ktime_get_ts64+0x86/0x230
[   24.107384]  kunit_try_run_case+0x1a5/0x490
[   24.107409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.107430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.107453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.107477]  ? __kthread_parkme+0x82/0x180
[   24.107500]  ? preempt_count_sub+0x50/0x80
[   24.107525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.107548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.107573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.107598]  kthread+0x337/0x6f0
[   24.107617]  ? trace_preempt_on+0x20/0xc0
[   24.107639]  ? __pfx_kthread+0x10/0x10
[   24.107664]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.107685]  ? calculate_sigpending+0x7b/0xa0
[   24.107707]  ? __pfx_kthread+0x10/0x10
[   24.107728]  ret_from_fork+0x1c5/0x240
[   24.107752]  ? __pfx_kthread+0x10/0x10
[   24.107772]  ret_from_fork_asm+0x1a/0x30
[   24.107814]  </TASK>
[   24.107826] 
[   24.120997] Allocated by task 289:
[   24.121442]  kasan_save_stack+0x45/0x70
[   24.121760]  kasan_save_track+0x18/0x40
[   24.122117]  kasan_save_alloc_info+0x3b/0x50
[   24.122519]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   24.122755]  remove_element+0x11e/0x190
[   24.123054]  mempool_alloc_preallocated+0x4d/0x90
[   24.123385]  mempool_uaf_helper+0x96/0x420
[   24.123565]  mempool_slab_uaf+0xea/0x140
[   24.123749]  kunit_try_run_case+0x1a5/0x490
[   24.123899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.124068]  kthread+0x337/0x6f0
[   24.124187]  ret_from_fork+0x1c5/0x240
[   24.124534]  ret_from_fork_asm+0x1a/0x30
[   24.124733] 
[   24.124837] Freed by task 289:
[   24.125025]  kasan_save_stack+0x45/0x70
[   24.125158]  kasan_save_track+0x18/0x40
[   24.125375]  __kasan_save_free_info+0x3f/0x60
[   24.125744]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.126061]  mempool_free+0x45f/0x6a0
[   24.126281]  mempool_uaf_helper+0x11a/0x420
[   24.126496]  mempool_slab_uaf+0xea/0x140
[   24.126800]  kunit_try_run_case+0x1a5/0x490
[   24.126950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.127121]  kthread+0x337/0x6f0
[   24.127363]  ret_from_fork+0x1c5/0x240
[   24.127558]  ret_from_fork_asm+0x1a/0x30
[   24.127759] 
[   24.127860] The buggy address belongs to the object at ffff888105db5240
[   24.127860]  which belongs to the cache test_cache of size 123
[   24.128235] The buggy address is located 0 bytes inside of
[   24.128235]  freed 123-byte region [ffff888105db5240, ffff888105db52bb)
[   24.128758] 
[   24.128857] The buggy address belongs to the physical page:
[   24.129119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db5
[   24.129564] flags: 0x200000000000000(node=0|zone=2)
[   24.129791] page_type: f5(slab)
[   24.129910] raw: 0200000000000000 ffff888101dbe8c0 dead000000000122 0000000000000000
[   24.130137] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   24.130464] page dumped because: kasan: bad access detected
[   24.130798] 
[   24.130955] Memory state around the buggy address:
[   24.131152]  ffff888105db5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.131404]  ffff888105db5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.131623] >ffff888105db5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   24.132038]                                            ^
[   24.132254]  ffff888105db5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.132536]  ffff888105db5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.132876] ==================================================================

kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim Regression Log 13 (gcc-13-lkftconfig-kunit)

[   23.089248] ==================================================================
[   23.090736] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   23.091113] Read of size 4 at addr ffff888105e7ec80 by task swapper/1/0
[   23.091411] 
[   23.091613] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   23.091668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.091681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.091702] Call Trace:
[   23.091731]  <IRQ>
[   23.091746]  dump_stack_lvl+0x73/0xb0
[   23.091814]  print_report+0xd1/0x640
[   23.091837]  ? __virt_addr_valid+0x1db/0x2d0
[   23.091882]  ? rcu_uaf_reclaim+0x50/0x60
[   23.091903]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.091924]  ? rcu_uaf_reclaim+0x50/0x60
[   23.091945]  kasan_report+0x144/0x180
[   23.091967]  ? rcu_uaf_reclaim+0x50/0x60
[   23.091992]  __asan_report_load4_noabort+0x18/0x20
[   23.092016]  rcu_uaf_reclaim+0x50/0x60
[   23.092036]  rcu_core+0x66f/0x1c90
[   23.092065]  ? __pfx_rcu_core+0x10/0x10
[   23.092085]  ? ktime_get+0x6b/0x150
[   23.092111]  rcu_core_si+0x12/0x20
[   23.092188]  handle_softirqs+0x209/0x730
[   23.092212]  ? hrtimer_interrupt+0x2fe/0x780
[   23.092238]  ? __pfx_handle_softirqs+0x10/0x10
[   23.092263]  __irq_exit_rcu+0xc9/0x110
[   23.092281]  irq_exit_rcu+0x12/0x20
[   23.092300]  sysvec_apic_timer_interrupt+0x81/0x90
[   23.092325]  </IRQ>
[   23.092354]  <TASK>
[   23.092365]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   23.092457] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   23.092675] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 73 a8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   23.092756] RSP: 0000:ffff88810088fdc0 EFLAGS: 00010216
[   23.092886] RAX: ffff8881c9ca0000 RBX: ffff88810086b000 RCX: ffffffff8eeb1e85
[   23.092935] RDX: ffffed102b626193 RSI: 0000000000000004 RDI: 00000000000200ac
[   23.092978] RBP: ffff88810088fdc8 R08: 0000000000000001 R09: ffffed102b626192
[   23.093022] R10: ffff88815b130c93 R11: ffff88815b1363c8 R12: 0000000000000001
[   23.093064] R13: ffffed102010d600 R14: ffffffff90c48ad0 R15: 0000000000000000
[   23.093122]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   23.093247]  ? default_idle+0xd/0x20
[   23.093270]  arch_cpu_idle+0xd/0x20
[   23.093292]  default_idle_call+0x47/0x80
[   23.093314]  do_idle+0x363/0x4b0
[   23.093339]  ? __pfx_do_idle+0x10/0x10
[   23.093359]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   23.093383]  ? complete+0x15b/0x1d0
[   23.093408]  cpu_startup_entry+0x5c/0x70
[   23.093430]  start_secondary+0x211/0x290
[   23.093451]  ? __pfx_start_secondary+0x10/0x10
[   23.093475]  common_startup_64+0x13e/0x148
[   23.093508]  </TASK>
[   23.093520] 
[   23.108888] Allocated by task 254:
[   23.109197]  kasan_save_stack+0x45/0x70
[   23.109612]  kasan_save_track+0x18/0x40
[   23.110004]  kasan_save_alloc_info+0x3b/0x50
[   23.110403]  __kasan_kmalloc+0xb7/0xc0
[   23.110805]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   23.111071]  rcu_uaf+0xb0/0x350
[   23.111359]  kunit_try_run_case+0x1a5/0x490
[   23.111789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.112321]  kthread+0x337/0x6f0
[   23.112610]  ret_from_fork+0x1c5/0x240
[   23.112745]  ret_from_fork_asm+0x1a/0x30
[   23.112896] 
[   23.112961] Freed by task 0:
[   23.113063]  kasan_save_stack+0x45/0x70
[   23.113267]  kasan_save_track+0x18/0x40
[   23.113460]  __kasan_save_free_info+0x3f/0x60
[   23.113642]  __kasan_slab_free+0x68/0x90
[   23.113829]  kfree+0x225/0x4f0
[   23.113960]  rcu_uaf_reclaim+0x1f/0x60
[   23.114111]  rcu_core+0x66f/0x1c90
[   23.114287]  rcu_core_si+0x12/0x20
[   23.114429]  handle_softirqs+0x209/0x730
[   23.114596]  __irq_exit_rcu+0xc9/0x110
[   23.114752]  irq_exit_rcu+0x12/0x20
[   23.114881]  sysvec_apic_timer_interrupt+0x81/0x90
[   23.115036]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   23.115217] 
[   23.115326] Last potentially related work creation:
[   23.115596]  kasan_save_stack+0x45/0x70
[   23.115806]  kasan_record_aux_stack+0xb2/0xc0
[   23.116080]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   23.116534]  call_rcu+0x12/0x20
[   23.116703]  rcu_uaf+0x168/0x350
[   23.116860]  kunit_try_run_case+0x1a5/0x490
[   23.117051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.117316]  kthread+0x337/0x6f0
[   23.117476]  ret_from_fork+0x1c5/0x240
[   23.117629]  ret_from_fork_asm+0x1a/0x30
[   23.117772] 
[   23.117861] The buggy address belongs to the object at ffff888105e7ec80
[   23.117861]  which belongs to the cache kmalloc-32 of size 32
[   23.118290] The buggy address is located 0 bytes inside of
[   23.118290]  freed 32-byte region [ffff888105e7ec80, ffff888105e7eca0)
[   23.118811] 
[   23.118973] The buggy address belongs to the physical page:
[   23.119203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7e
[   23.119489] flags: 0x200000000000000(node=0|zone=2)
[   23.119648] page_type: f5(slab)
[   23.119773] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   23.120608] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.120960] page dumped because: kasan: bad access detected
[   23.121260] 
[   23.121338] Memory state around the buggy address:
[   23.121516]  ffff888105e7eb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.121810]  ffff888105e7ec00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.122150] >ffff888105e7ec80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   23.122467]                    ^
[   23.122636]  ffff888105e7ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.122887]  ffff888105e7ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.123093] ==================================================================

kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf Regression Log 14 (gcc-13-lkftconfig-kunit)

[   23.129369] ==================================================================
[   23.129759] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4cc/0x580
[   23.130063] Read of size 8 at addr ffff888105e7ed00 by task kunit_try_catch/256
[   23.130425] 
[   23.130688] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   23.130740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.130753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.130788] Call Trace:
[   23.130800]  <TASK>
[   23.130814]  dump_stack_lvl+0x73/0xb0
[   23.130842]  print_report+0xd1/0x640
[   23.130865]  ? __virt_addr_valid+0x1db/0x2d0
[   23.130888]  ? workqueue_uaf+0x4cc/0x580
[   23.130909]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.130930]  ? workqueue_uaf+0x4cc/0x580
[   23.130951]  kasan_report+0x144/0x180
[   23.130973]  ? workqueue_uaf+0x4cc/0x580
[   23.130998]  __asan_report_load8_noabort+0x18/0x20
[   23.131022]  workqueue_uaf+0x4cc/0x580
[   23.131043]  ? __pfx_workqueue_uaf+0x10/0x10
[   23.131065]  ? __schedule+0x206a/0x2b50
[   23.131087]  ? __pfx_read_tsc+0x10/0x10
[   23.131106]  ? ktime_get_ts64+0x86/0x230
[   23.131129]  kunit_try_run_case+0x1a5/0x490
[   23.131152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.131173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.131195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.131324]  ? __kthread_parkme+0x82/0x180
[   23.131350]  ? preempt_count_sub+0x50/0x80
[   23.131376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.131400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.131426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.131452]  kthread+0x337/0x6f0
[   23.131470]  ? trace_preempt_on+0x20/0xc0
[   23.131493]  ? __pfx_kthread+0x10/0x10
[   23.131512]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.131533]  ? calculate_sigpending+0x7b/0xa0
[   23.131556]  ? __pfx_kthread+0x10/0x10
[   23.131575]  ret_from_fork+0x1c5/0x240
[   23.131595]  ? __pfx_kthread+0x10/0x10
[   23.131614]  ret_from_fork_asm+0x1a/0x30
[   23.131646]  </TASK>
[   23.131663] 
[   23.138818] Allocated by task 256:
[   23.138988]  kasan_save_stack+0x45/0x70
[   23.139205]  kasan_save_track+0x18/0x40
[   23.139399]  kasan_save_alloc_info+0x3b/0x50
[   23.139576]  __kasan_kmalloc+0xb7/0xc0
[   23.139706]  __kmalloc_cache_noprof+0x1d4/0x5f0
[   23.139867]  workqueue_uaf+0x152/0x580
[   23.139994]  kunit_try_run_case+0x1a5/0x490
[   23.140182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.140425]  kthread+0x337/0x6f0
[   23.140582]  ret_from_fork+0x1c5/0x240
[   23.140759]  ret_from_fork_asm+0x1a/0x30
[   23.141184] 
[   23.141282] Freed by task 44:
[   23.141385]  kasan_save_stack+0x45/0x70
[   23.141518]  kasan_save_track+0x18/0x40
[   23.141702]  __kasan_save_free_info+0x3f/0x60
[   23.141963]  __kasan_slab_free+0x68/0x90
[   23.142146]  kfree+0x225/0x4f0
[   23.142316]  workqueue_uaf_work+0x12/0x20
[   23.142507]  process_one_work+0x5ee/0xf60
[   23.142670]  worker_thread+0x758/0x1220
[   23.142852]  kthread+0x337/0x6f0
[   23.143011]  ret_from_fork+0x1c5/0x240
[   23.143139]  ret_from_fork_asm+0x1a/0x30
[   23.143325] 
[   23.143407] Last potentially related work creation:
[   23.143590]  kasan_save_stack+0x45/0x70
[   23.143740]  kasan_record_aux_stack+0xb2/0xc0
[   23.143897]  __queue_work+0x61a/0xe70
[   23.144024]  queue_work_on+0xb6/0xc0
[   23.144146]  workqueue_uaf+0x26d/0x580
[   23.144272]  kunit_try_run_case+0x1a5/0x490
[   23.144409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.144634]  kthread+0x337/0x6f0
[   23.144978]  ret_from_fork+0x1c5/0x240
[   23.145212]  ret_from_fork_asm+0x1a/0x30
[   23.145449] 
[   23.145537] The buggy address belongs to the object at ffff888105e7ed00
[   23.145537]  which belongs to the cache kmalloc-32 of size 32
[   23.146363] The buggy address is located 0 bytes inside of
[   23.146363]  freed 32-byte region [ffff888105e7ed00, ffff888105e7ed20)
[   23.146771] 
[   23.146847] The buggy address belongs to the physical page:
[   23.147105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7e
[   23.147506] flags: 0x200000000000000(node=0|zone=2)
[   23.147754] page_type: f5(slab)
[   23.147962] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   23.148304] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.148602] page dumped because: kasan: bad access detected
[   23.148829] 
[   23.148958] Memory state around the buggy address:
[   23.149284]  ffff888105e7ec00: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   23.149586]  ffff888105e7ec80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.149840] >ffff888105e7ed00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   23.150375]                    ^
[   23.150524]  ffff888105e7ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.150749]  ffff888105e7ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.151259] ==================================================================

kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob Regression Log 15 (gcc-13-lkftconfig-kunit)

[   24.341626] ==================================================================
[   24.342280] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b7/0x320
[   24.342676] Read of size 1 at addr ffff888106217cf2 by task kunit_try_catch/307
[   24.342984] 
[   24.343099] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.343148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.343161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.343235] Call Trace:
[   24.343250]  <TASK>
[   24.343264]  dump_stack_lvl+0x73/0xb0
[   24.343295]  print_report+0xd1/0x640
[   24.343317]  ? __virt_addr_valid+0x1db/0x2d0
[   24.343342]  ? kasan_stack_oob+0x2b7/0x320
[   24.343361]  ? kasan_addr_to_slab+0x11/0xa0
[   24.343383]  ? kasan_stack_oob+0x2b7/0x320
[   24.343404]  kasan_report+0x144/0x180
[   24.343427]  ? kasan_stack_oob+0x2b7/0x320
[   24.343452]  __asan_report_load1_noabort+0x18/0x20
[   24.343477]  kasan_stack_oob+0x2b7/0x320
[   24.343497]  ? __pfx_kasan_stack_oob+0x10/0x10
[   24.343520]  ? __kasan_check_write+0x18/0x20
[   24.343539]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.343562]  ? irqentry_exit+0x2a/0x60
[   24.343584]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.343609]  ? __pfx_read_tsc+0x10/0x10
[   24.343629]  ? ktime_get_ts64+0x86/0x230
[   24.343662]  kunit_try_run_case+0x1a5/0x490
[   24.343686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.343710]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.343733]  ? __kthread_parkme+0x82/0x180
[   24.343757]  ? preempt_count_sub+0x50/0x80
[   24.343796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.343818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.343844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.343871]  kthread+0x337/0x6f0
[   24.343889]  ? trace_preempt_on+0x20/0xc0
[   24.343913]  ? __pfx_kthread+0x10/0x10
[   24.343932]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.343953]  ? calculate_sigpending+0x7b/0xa0
[   24.343975]  ? __pfx_kthread+0x10/0x10
[   24.343996]  ret_from_fork+0x1c5/0x240
[   24.344017]  ? __pfx_kthread+0x10/0x10
[   24.344036]  ret_from_fork_asm+0x1a/0x30
[   24.344069]  </TASK>
[   24.344081] 
[   24.354913] The buggy address belongs to stack of task kunit_try_catch/307
[   24.355474]  and is located at offset 138 in frame:
[   24.355797]  kasan_stack_oob+0x0/0x320
[   24.356129] 
[   24.356241] This frame has 4 objects:
[   24.356499]  [48, 49) '__assertion'
[   24.356520]  [64, 72) 'array'
[   24.356680]  [96, 112) '__assertion'
[   24.356832]  [128, 138) 'stack_array'
[   24.357362] 
[   24.357601] The buggy address belongs to the physical page:
[   24.358068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106217
[   24.358488] flags: 0x200000000000000(node=0|zone=2)
[   24.358727] raw: 0200000000000000 ffffea00041885c8 ffffea00041885c8 0000000000000000
[   24.359425] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   24.359765] page dumped because: kasan: bad access detected
[   24.360006] 
[   24.360177] Memory state around the buggy address:
[   24.360560]  ffff888106217b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.360966]  ffff888106217c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   24.361367] >ffff888106217c80: f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3
[   24.361631]                                                              ^
[   24.361942]  ffff888106217d00: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   24.362222]  ffff888106217d80: f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00
[   24.362502] ==================================================================

kasan-bug-kasan-use-after-free-in-mempool_uaf_helper Regression Log 16 (gcc-13-lkftconfig-kunit)

[   24.145486] ==================================================================
[   24.145925] BUG: KASAN: use-after-free in mempool_uaf_helper+0x387/0x420
[   24.146237] Read of size 1 at addr ffff8881062b0000 by task kunit_try_catch/291
[   24.146730] 
[   24.146856] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   24.146912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.146925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.146948] Call Trace:
[   24.146961]  <TASK>
[   24.146977]  dump_stack_lvl+0x73/0xb0
[   24.147007]  print_report+0xd1/0x640
[   24.147030]  ? __virt_addr_valid+0x1db/0x2d0
[   24.147054]  ? mempool_uaf_helper+0x387/0x420
[   24.147076]  ? kasan_addr_to_slab+0x11/0xa0
[   24.147096]  ? mempool_uaf_helper+0x387/0x420
[   24.147119]  kasan_report+0x144/0x180
[   24.147454]  ? mempool_uaf_helper+0x387/0x420
[   24.147494]  __asan_report_load1_noabort+0x18/0x20
[   24.147521]  mempool_uaf_helper+0x387/0x420
[   24.147544]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   24.147570]  ? finish_task_switch.isra.0+0x153/0x700
[   24.147831]  mempool_page_alloc_uaf+0xed/0x140
[   24.147862]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   24.147886]  ? update_rq_clock+0x1b2/0x4d0
[   24.147910]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.147936]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.147960]  ? __pfx_read_tsc+0x10/0x10
[   24.147981]  ? ktime_get_ts64+0x86/0x230
[   24.148005]  kunit_try_run_case+0x1a5/0x490
[   24.148030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.148051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.148075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.148098]  ? __kthread_parkme+0x82/0x180
[   24.148121]  ? preempt_count_sub+0x50/0x80
[   24.148286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.148317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.148345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.148371]  kthread+0x337/0x6f0
[   24.148390]  ? trace_preempt_on+0x20/0xc0
[   24.148414]  ? __pfx_kthread+0x10/0x10
[   24.148434]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.148455]  ? calculate_sigpending+0x7b/0xa0
[   24.148478]  ? __pfx_kthread+0x10/0x10
[   24.148498]  ret_from_fork+0x1c5/0x240
[   24.148519]  ? __pfx_kthread+0x10/0x10
[   24.148538]  ret_from_fork_asm+0x1a/0x30
[   24.148571]  </TASK>
[   24.148583] 
[   24.162480] The buggy address belongs to the physical page:
[   24.162729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b0
[   24.163270] flags: 0x200000000000000(node=0|zone=2)
[   24.163494] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.164205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.164964] page dumped because: kasan: bad access detected
[   24.165496] 
[   24.165657] Memory state around the buggy address:
[   24.166038]  ffff8881062aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.166538]  ffff8881062aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.167096] >ffff8881062b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.167728]                    ^
[   24.168122]  ffff8881062b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.168670]  ffff8881062b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.169089] ==================================================================

kasan-bug-kasan-use-after-free-in-page_alloc_uaf Regression Log 17 (gcc-13-lkftconfig-kunit)

[   22.167084] ==================================================================
[   22.168032] BUG: KASAN: use-after-free in page_alloc_uaf+0x369/0x3f0
[   22.168341] Read of size 1 at addr ffff888106240000 by task kunit_try_catch/210
[   22.168997] 
[   22.169119] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary) 
[   22.169169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.169181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.169202] Call Trace:
[   22.169214]  <TASK>
[   22.169227]  dump_stack_lvl+0x73/0xb0
[   22.169256]  print_report+0xd1/0x640
[   22.169279]  ? __virt_addr_valid+0x1db/0x2d0
[   22.169345]  ? page_alloc_uaf+0x369/0x3f0
[   22.169367]  ? kasan_addr_to_slab+0x11/0xa0
[   22.169387]  ? page_alloc_uaf+0x369/0x3f0
[   22.169408]  kasan_report+0x144/0x180
[   22.169429]  ? page_alloc_uaf+0x369/0x3f0
[   22.169456]  __asan_report_load1_noabort+0x18/0x20
[   22.169479]  page_alloc_uaf+0x369/0x3f0
[   22.169500]  ? __pfx_page_alloc_uaf+0x10/0x10
[   22.169523]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   22.169547]  ? __pfx_read_tsc+0x10/0x10
[   22.169566]  ? ktime_get_ts64+0x86/0x230
[   22.169590]  kunit_try_run_case+0x1a5/0x490
[   22.169613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.169634]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   22.169655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.169677]  ? __kthread_parkme+0x82/0x180
[   22.169699]  ? preempt_count_sub+0x50/0x80
[   22.169725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.169746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.169771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.169806]  kthread+0x337/0x6f0
[   22.169824]  ? trace_preempt_on+0x20/0xc0
[   22.169845]  ? __pfx_kthread+0x10/0x10
[   22.169864]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.169904]  ? calculate_sigpending+0x7b/0xa0
[   22.169926]  ? __pfx_kthread+0x10/0x10
[   22.169946]  ret_from_fork+0x1c5/0x240
[   22.169966]  ? __pfx_kthread+0x10/0x10
[   22.169985]  ret_from_fork_asm+0x1a/0x30
[   22.170018]  </TASK>
[   22.170030] 
[   22.177845] The buggy address belongs to the physical page:
[   22.178204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106240
[   22.178614] flags: 0x200000000000000(node=0|zone=2)
[   22.178867] page_type: f0(buddy)
[   22.179038] raw: 0200000000000000 ffff88817fffc4f0 ffff88817fffc4f0 0000000000000000
[   22.179504] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   22.179736] page dumped because: kasan: bad access detected
[   22.180002] 
[   22.180091] Memory state around the buggy address:
[   22.180425]  ffff88810623ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.180743]  ffff88810623ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.181174] >ffff888106240000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.181484]                    ^
[   22.181631]  ffff888106240080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.182052]  ffff888106240100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.182698] ==================================================================

clang-compiler-fs_btrfs_disk-io_c-warning-format-specifies-type-size_t-aka-unsigned-int-but-the-argument-has-type-unsigned-long Regression Log 1 (rv32-clang-20-allnoconfig)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=riscv CROSS_COMPILE=riscv64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1
/builds/linux/fs/btrfs/disk-io.c:3401:28: warning: format specifies type 'size_t' (aka 'unsigned int') but the argument has type 'unsigned long' [-Wformat]
 3400 |                            "support for block size %u with page size %zu is experimental, some features may be missing",
      |                                                                      ~~~
      |                                                                      %lu
 3401 |                            fs_info->sectorsize, PAGE_SIZE);
      |                                                 ^~~~~~~~~
/builds/linux/fs/btrfs/messages.h:47:51: note: expanded from macro 'btrfs_warn'
   47 |         btrfs_printk_in_rcu(fs_info, KERN_WARNING fmt, ##args)
      |                                                   ~~~    ^~~~
/builds/linux/fs/btrfs/messages.h:84:31: note: expanded from macro 'btrfs_printk_in_rcu'
   84 |         btrfs_printk(fs_info, fmt, ##args);             \
      |                               ~~~    ^~~~
/builds/linux/fs/btrfs/messages.h:27:32: note: expanded from macro 'btrfs_printk'
   27 |         _btrfs_printk(fs_info, fmt, ##args)
      |                                ~~~    ^~~~
/builds/linux/include/vdso/page.h:15:19: note: expanded from macro 'PAGE_SIZE'
   15 | #define PAGE_SIZE       (_AC(1,UL) << CONFIG_PAGE_SHIFT)
      |                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

clang-compiler-futex_numa_mpol_c-warning-unused-function-test_futex_mpol Regression Log 2 (clang-20-lkftconfig-no-kselftest-frag)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
futex_numa_mpol.c:134:13: warning: unused function 'test_futex_mpol' [-Wunused-function]
  134 | static void test_futex_mpol(void *futex_ptr, int err_value)
      |             ^~~~~~~~~~~~~~~

clang-compiler-kselftest_h-error-unknown-type-name-bool Regression Log 3 (clang-20-lkftconfig-no-kselftest-frag)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/vDSO'
In file included from vdso_standalone_test_x86.c:19:
./../kselftest.h:116:8: error: unknown type name 'bool'
  116 | static bool ksft_debug_enabled;
      |        ^

clang-compiler-utils_cpupower-info_c-warning-implicit-truncation-from-int-to-a-one-bit-wide-bit-field-changes-value-from-to-cc-_home_tuxbuild__cache_tuxmake_builds__build_utils_powercap-info_o Regression Log 4 (clang-nightly-lkftconfig-kselftest)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
utils/cpupower-info.c:60:21: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]  CC       /home/tuxbuild/.cache/tuxmake/builds/1/build/utils/powercap-info.o

   60 |                         params.perf_bias = 1;
      |                                          ^ ~

gcc-compiler-futex_numa_mpol_c-warning-test_futex_mpol-defined-but-not-used Regression Log 5 (gcc-13-lkftconfig-kselftest)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
futex_numa_mpol.c:134:13: warning: 'test_futex_mpol' defined but not used [-Wunused-function]
  134 | static void test_futex_mpol(void *futex_ptr, int err_value)
      |             ^~~~~~~~~~~~~~~

gcc-compiler-kselftest_h-error-unknown-type-name-bool Regression Log 6 (gcc-13-lkftconfig-kselftest)

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/vDSO'
In file included from vdso_standalone_test_x86.c:19:
../kselftest.h:116:8: error: unknown type name 'bool'
  116 | static bool ksft_debug_enabled;
      |        ^~~~

internal-error-oops-oops-smp Regression Log 1 (gcc-13-lkftconfig-64k_page_size)

[ 1030.581641] Internal error: Oops: 0000000096000005 [#1]  SMP
[ 1030.590192] Modules linked in: tun overlay btrfs blake2b_generic xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec pm8916_wdt qcom_wcnss_pil coresight_cpu_debug adv7511 coresight_stm stm_core coresight_cti snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_msm8916_digital snd_soc_apq8016_sbc snd_soc_msm8916_analog snd_soc_qcom_common snd_soc_lpass_platform msm qcom_spmi_vadc qcom_pon qcom_vadc_common snd_soc_core rtc_pm8xxx qcom_spmi_temp_alarm snd_compress snd_pcm_dmaengine ubwc_config snd_pcm qrtr snd_timer llcc_qcom snd soundcore ocmem drm_gpuvm qcom_q6v5_mss qcom_pil_info drm_exec qcom_q6v5 gpu_sched drm_dp_aux_bus qcom_camss venus_core qcom_sysmon qcom_common drm_display_helper videobuf2_dma_sg qcom_stats qcom_glink_smem videobuf2_memops v4l2_mem2mem qmi_helpers qnoc_msm8916 cec mdt_loader videobuf2_v4l2 drm_client_lib videobuf2_common qcom_rng display_connector rpmsg_ctrl rpmsg_char rmtfs_mem socinfo drm_kms_helper ramoops reed_solomon fuse drm backlight
[ 1030.670482] CPU: 2 UID: 0 PID: 130839 Comm: listmount04 Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT 
[ 1030.681628] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 1030.691042] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1030.697715] pc : mnt_ns_release+0x58/0x118
[ 1030.704381] lr : __arm64_sys_listmount+0xc0/0x530
[ 1030.708547] sp : ffff80008e0afd50
[ 1030.713279] x29: ffff80008e0afd50 x28: ffff00001a339440 x27: 0000000000000000
[ 1030.716601] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000100
[ 1030.723735] x23: 0000000000000000 x22: 0000000000000020 x21: ffff80008e0afdc8
[ 1030.730851] x20: 0000aaaadd221110 x19: 0000000000000000 x18: 0000000000000000
[ 1030.737954] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 1030.745045] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1030.752099] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804fbe30
[ 1030.759187] x8 : ffff80008e0afda0 x7 : fefefefefefefefe x6 : ffff800082d29000
[ 1030.766284] x5 : 00000000000000b8 x4 : ffff00001a339440 x3 : 0000000000000000
[ 1030.773414] x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000000000b8
[ 1030.780516] Call trace:
[ 1030.787614]  mnt_ns_release+0x58/0x118 (P)
[ 1030.789833]  __arm64_sys_listmount+0xc0/0x530
[ 1030.793958]  invoke_syscall.constprop.0+0x58/0xf8
[ 1030.798363]  do_el0_svc+0x48/0xd8
[ 1030.803018]  el0_svc+0x44/0x190
[ 1030.806301]  el0t_64_sync_handler+0xa0/0xe8
[ 1030.809237]  el0t_64_sync+0x198/0x1a0
[ 1030.813400] Code: d65f03c0 9102e265 52800022 f98000b1 (885f7ca1) 
[ 1030.817244] ---[ end trace 0000000000000000 ]---

exception-warning-kerneltracetrace_functions_graph-at-print_graph_entry Regression Log 2 (gcc-13-lkftconfig)

------------[ cut here ]------------
[  131.264925] WARNING: kernel/trace/trace_functions_graph.c:1001 at print_graph_entry+0x4c8/0x508, CPU#2: cat/6980
[  131.268895] Modules linked in: snd_soc_hdmi_codec pm8916_wdt qcom_wcnss_pil coresight_stm snd_soc_lpass_apq8016 stm_core coresight_cpu_debug coresight_cti snd_soc_apq8016_sbc snd_soc_lpass_cpu snd_soc_msm8916_analog snd_soc_msm8916_digital snd_soc_qcom_common adv7511 snd_soc_lpass_platform snd_soc_core snd_compress snd_pcm_dmaengine qcom_spmi_temp_alarm msm rtc_pm8xxx qcom_pon snd_pcm qrtr snd_timer qcom_spmi_vadc ubwc_config qcom_vadc_common snd llcc_qcom qcom_q6v5_mss soundcore ocmem qcom_pil_info qcom_q6v5 drm_gpuvm drm_exec gpu_sched qcom_sysmon qcom_common qnoc_msm8916 drm_dp_aux_bus qcom_glink_smem qmi_helpers qcom_camss venus_core drm_display_helper videobuf2_dma_sg v4l2_mem2mem videobuf2_memops mdt_loader cec qcom_rng videobuf2_v4l2 qcom_stats drm_client_lib videobuf2_common rpmsg_ctrl rpmsg_char socinfo display_connector ramoops drm_kms_helper rmtfs_mem reed_solomon fuse drm backlight
[  131.339730] CPU: 2 UID: 0 PID: 6980 Comm: cat Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT 
[  131.357871] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[  131.366341] pstate: a0000005 (NzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  131.373211] pc : print_graph_entry+0x4c8/0x508
[  131.379748] lr : print_graph_entry+0x140/0x508
[  131.384261] sp : ffff80008f3dbb00
[  131.388623] x29: ffff80008f3dbb60 x28: ffff000004a8a200 x27: ffff000004a8a250
[  131.392226] x26: ffff8000801863dc x25: 0000000000000002 x24: ffff000004a8a200
[  131.399344] x23: ffff000014d24000 x22: 0000000000000697 x21: 00000000fefefefe
[  131.406464] x20: ffff000014d20000 x19: ffff000014d22090 x18: 0000000000000000
[  131.413583] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  131.420702] x14: 0000000000000001 x13: 0000000000000001 x12: 000002680200000b
[  131.427817] x11: ffff80008180f028 x10: 0000000000000020 x9 : ffff8000800a3068
[  131.434938] x8 : 0000000000000020 x7 : 0000000000000001 x6 : 0000000000000029
[  131.442055] x5 : ffff000014d22094 x4 : ffff8000823b8fa6 x3 : 0000000000000002
[  131.449173] x2 : ffff800082c31708 x1 : ffff7fffbd00b000 x0 : fffffdffbf7d92b0
[  131.456293] Call trace:
[  131.463143]  print_graph_entry+0x4c8/0x508 (P)
[  131.465514]  print_graph_function_flags+0x280/0x4b8
[  131.470051]  print_graph_function+0x18/0x28
[  131.474784]  print_trace_line+0xc8/0x5d0
[  131.478938]  tracing_read_pipe+0x21c/0x390
[  131.483115]  vfs_read+0xcc/0x340
[  131.486974]  ksys_read+0x7c/0x120
[  131.490360]  __arm64_sys_read+0x24/0x38
[  131.493600]  invoke_syscall+0x50/0x120
[  131.497243]  el0_svc_common.constprop.0+0xc8/0xf0
[  131.501118]  do_el0_svc+0x24/0x38
[  131.505814]  el0_svc+0x3c/0x138
[  131.509099]  el0t_64_sync_handler+0xa0/0xe8
[  131.512111]  el0t_64_sync+0x198/0x1a0
[  131.516253] ---[ end trace 0000000000000000 ]---

exception-event-ma_read-has-unsafe-pointer-field-fn Regression Log 3 (gcc-13-lkftconfig)

------------[ cut here ]------------
[   35.583587] event 'ma_read' has unsafe pointer field 'fn'
[   35.584054] WARNING: kernel/trace/trace.c:3776 at ignore_event+0x1da/0x1f6, CPU#0: cat/420
[   35.584103] Modules linked in: fuse drm drm_panel_orientation_quirks backlight configfs
[   35.584401] CPU: 0 UID: 0 PID: 420 Comm: cat Not tainted 6.17.0-rc7-next-20250924 #1 NONE 
[   35.584440] Hardware name: riscv-virtio,qemu (DT)
[   35.584523] epc : ignore_event+0x1da/0x1f6
[   35.584563]  ra : ignore_event+0x1da/0x1f6
[   35.584589] epc : ffffffff80147524 ra : ffffffff80147524 sp : ff20000000713bf0
[   35.584604]  gp : ffffffff81e6fec8 tp : ff60000081275400 t0 : ff200000007139f8
[   35.584618]  t1 : ffffffffffffe000 t2 : 205b2d2d2d2d2d2d s0 : ff20000000713c60
[   35.584632]  s1 : ff60000080067150 a0 : 000000000000002d a1 : 0000000000000001
[   35.584645]  a2 : 00000000000000e0 a3 : 0000000000000000 a4 : 0000000000000000
[   35.584658]  a5 : 0000000000000000 a6 : ff20000000713918 a7 : 0000000000000a00
[   35.584672]  s2 : ffffffff81a01678 s3 : ff60000082748078 s4 : ffffffff81df63f0
[   35.584691]  s5 : ff6000008274a090 s6 : ff6000008274a054 s7 : ff60000085364f60
[   35.584704]  s8 : ffffffff81200000 s9 : ffffffff81a00000 s10: ffffffff81e04d50
[   35.584717]  s11: ff6000008274c000 t3 : ffffffff81e87f82 t4 : ffffffff81e87f82
[   35.584730]  t5 : ffffffff81e87f88 t6 : ff200000007139f8
[   35.584743] status: 0000000200000120 badaddr: ffffffff80147524 cause: 0000000000000003
[   35.584789] [<ffffffff80147524>] ignore_event+0x1da/0x1f6
[   35.584845] [<ffffffff8014cd24>] trace_event_printf+0x46/0x88
[   35.584856] [<ffffffff80d3f98c>] trace_raw_output_ma_read+0x5e/0x7a
[   35.584871] [<ffffffff80148890>] print_trace_line+0x1c2/0x438
[   35.584883] [<ffffffff801490e8>] tracing_read_pipe+0x1a8/0x2f0
[   35.584896] [<ffffffff802e4f96>] vfs_read+0xac/0x2cc
[   35.584910] [<ffffffff802e59ca>] ksys_read+0x6a/0xd4
[   35.584922] [<ffffffff802e5a48>] __riscv_sys_read+0x14/0x1c
[   35.584934] [<ffffffff80d5ce78>] do_trap_ecall_u+0x1ba/0x392
[   35.584946] [<ffffffff80d6967a>] handle_exception+0x146/0x152
[   35.585006] ---[ end trace 0000000000000000 ]---

bug-bug-kernel-null-pointer-dereference-address Regression Log 4 (clang-20-lkftconfig-compat)

[  702.087122] BUG: kernel NULL pointer dereference, address: 00000000000000b8

oops-oops-oops-smp-pti Regression Log 5 (clang-20-lkftconfig-compat)

[  702.089190] Oops: Oops: 0002 [#1] SMP PTI

listmount04 Regression Log 1 (gcc-13-lkftconfig-64k_page_size)

listmount04 listmount04
listmount04: [ 1030.456117] /usr/local/bin/kirk[404]: listmount04: start (command: listmount04)

sendmsg03 Regression Log 2 (gcc-13-lkftconfig-64k_page_size)

sendmsg03 sendmsg03
sendmsg03: [ 1546.790770] /usr/local/bin/kirk[404]: sendmsg03: start (command: sendmsg03)

sendto03 Regression Log 3 (gcc-13-lkftconfig-64k_page_size)

failed   0[ 2647.851175] <LAVA_SIGNAL_ENDTC sendto03>
\0\0\0
broken   1
skipped  0
sendto03 sendto03
sendto03: [ 1547.497631] /usr/local/bin/kirk[404]: sendto03: start (command: sendto03)

setsockopt05 Regression Log 4 (gcc-13-lkftconfig-64k_page_size)

setsockopt05 setsockopt05
setsockopt05: [ 1568.095982] /usr/local/bin/kirk[404]: setsockopt05: start (command: setsockopt05)

setsockopt09 Regression Log 5 (gcc-13-lkftconfig-64k_page_size)

setsockopt09 setsockopt09
setsockopt09: [ 1595.799471] /usr/local/bin/kirk[404]: setsockopt09: start (command: setsockopt09)

timerfd_settime02 Regression Log 6 (gcc-13-lkftconfig-64k_page_size)

timerfd_settime02 timerfd_settime02
timerfd_settime02: [ 1759.296523] /usr/local/bin/kirk[404]: timerfd_settime02: start (command: timerfd_settime02)

wait403 Regression Log 7 (gcc-13-lkftconfig-64k_page_size)

wait403 wait403
wait403: [ 1802.020500] /usr/local/bin/kirk[404]: wait403: start (command: wait403)

arm64_fp-ptrace Regression Log 8 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: fp-stress
Warning: file fp-stress is missing!
arm64_fp-ptrace fail

arm64_fp-stress Regression Log 9 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: sve-ptrace
Warning: file sve-ptrace is missing!
arm64_fp-stress fail

arm64_hwcap Regression Log 10 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: ptrace
Warning: file ptrace is missing!
arm64_hwcap fail

arm64_ptrace Regression Log 11 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: syscall-abi
Warning: file syscall-abi is missing!
arm64_ptrace fail

arm64_sve-probe-vls Regression Log 12 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: vec-syscfg
Warning: file vec-syscfg is missing!
arm64_sve-probe-vls fail

arm64_sve-ptrace Regression Log 13 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: sve-probe-vls
Warning: file sve-probe-vls is missing!
arm64_sve-ptrace fail

arm64_syscall-abi Regression Log 14 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: tpidr2
Warning: file tpidr2 is missing!
arm64_syscall-abi fail

arm64_tpidr2 Regression Log 15 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: basic-gcs
TAP version 13
1..0 # SKIP SKIP GCS not supported
arm64_tpidr2_restore skip
arm64_tpidr2_siginfo pass
arm64_tpidr2 fail

arm64_vec-syscfg Regression Log 16 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: za-fork
Warning: file za-fork is missing!
arm64_vec-syscfg fail

arm64_za-fork Regression Log 17 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)

timeout set to 45
selftests: arm64: za-ptrace
Warning: file za-ptrace is missing!
arm64_za-fork fail

listmount04 Regression Log 18 (clang-20-lkftconfig)

<8>[ 1119.165712] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP @1758727004 riscv64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1852: TBROK: Test killed by SIGSEGV!
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[ 1119.181830] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 1106.631341] /usr/local/bin/kirk[291]: listmount04: start (command: listmount04)

listmount04 Regression Log 19 (gcc-13-lkftconfig)

<8>[ 1034.150241] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP @1758727003 riscv64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1852: TBROK: Test killed by SIGSEGV!
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[ 1034.161009] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 1024.212398] /usr/local/bin/kirk[290]: listmount04: start (command: listmount04)

listmount04 Regression Log 20 (clang-20-lkftconfig-compat)

<8>[  714.875283] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727005 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[  714.890138] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[  701.987319] /usr/local/bin/kirk[310]: listmount04: start (command: listmount04)

listmount04 Regression Log 21 (gcc-13-lkftconfig-compat)

<8>[  712.374470] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727008 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[  712.389933] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[  699.734405] /usr/local/bin/kirk[311]: listmount04: start (command: listmount04)

shardfile-vDSO Regression Log 22 (clang-20-lkftconfig-no-kselftest-frag)

<8>[   15.692188] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-vDSO RESULT=fail>
shardfile-vDSO fail

listmount04 Regression Log 23 (clang-20-lkftconfig)

<8>[  731.933385] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727006 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[  731.951285] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[  719.900284] /usr/local/bin/kirk[312]: listmount04: start (command: listmount04)

mm_run_vmtests_sh_uffd-unit-tests Regression Log 24 (clang-nightly-lkftconfig-kselftest)

<8>[  414.520860] <LAVA_SIGNAL_STARTTC mm_run_vmtests_sh_uffd-unit-tests>
exit=1--------------------------------
running ./uffd-stress anon 20 16
--------------------------------
nr_pages: 5120, nr_pages_per_cpu: 2560
bounces: 15, mode: rnd racing ver poll, userfaults: 1096 missing (542+554+\b)
bounces: 14, mode: racing ver poll, userfaults: 1329 missing (659+670+\b)
bounces: 13, mode: rnd ver poll, userfaults: 1217 missing (621+596+\b)
bounces: 12, mode: ver poll, userfaults: 682 missing (339+343+\b)
bounces: 11, mode: rnd racing poll, userfaults: 1186 missing (598+588+\b)
bounces: 10, mode: racing poll, userfaults: 867 missing (332+535+\b)
bounces: 9, mode: rnd poll, userfaults: 1450 missing (724+726+\b)
bounces: 8, mode: poll, userfaults: 1200 missing (589+611+\b)
bounces: 7, mode: rnd racing ver read, userfaults: 1919 missing (967+952+\b)
bounces: 6, mode: racing ver read, userfaults: 1482 missing (672+810+\b)
bounces: 5, mode: rnd ver read, userfaults: 1390 missing (694+696+\b)
bounces: 4, mode: ver read, userfaults: 1377 missing (801+576+\b)
bounces: 3, mode: rnd racing read, userfaults: 1904 missing (948+956+\b)
bounces: 2, mode: racing read, userfaults: 1025 missing (521+504+\b)
bounces: 1, mode: rnd read, userfaults: 1408 missing (730+678+\b)
bounces: 0, mode: read, userfaults: 1749 missing (917+832+\b)
[PASS]
<8>[  414.540878] <LAVA_SIGNAL_ENDTC mm_run_vmtests_sh_uffd-unit-tests>
mm_run_vmtests_sh_uffd-unit-tests fail

listmount04 Regression Log 25 (clang-nightly-lkftconfig)

<8>[  674.323444] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727005 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[  674.337887] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[  663.879859] /usr/local/bin/kirk[312]: listmount04: start (command: listmount04)

cgroup_test_cpu_test_cpucg_nice Regression Log 26 (gcc-13-lkftconfig-kselftest)

<8>[   90.911743] <LAVA_SIGNAL_STARTTC cgroup_test_cpu_test_cpucg_nice>
<8>[   90.922799] <LAVA_SIGNAL_ENDTC cgroup_test_cpu_test_cpucg_nice>
cgroup_test_cpu_test_cpucg_nice fail

shardfile-vDSO Regression Log 27 (gcc-13-lkftconfig-no-kselftest-frag)

<8>[   21.996076] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-vDSO RESULT=fail>
shardfile-vDSO fail

listmount04 Regression Log 28 (gcc-13-lkftconfig)

<8>[  818.140386] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727037 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<8>[  818.152480] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[  805.479302] /usr/local/bin/kirk[314]: listmount04: start (command: listmount04)

listmount04 Regression Log 29 (gcc-13-lkftconfig-compat)

listmount04 listmount04
listmount04: [  335.257582] /usr/local/bin/kirk[378]: listmount04: start (command: listmount04)

sendmsg03 Regression Log 30 (gcc-13-lkftconfig-compat)

sendmsg03 sendmsg03
sendmsg03: [  778.539900] /usr/local/bin/kirk[378]: sendmsg03: start (command: sendmsg03)

sendto03 Regression Log 31 (gcc-13-lkftconfig-compat)

sendto03 sendto03
sendto03: [  778.854063] /usr/local/bin/kirk[378]: sendto03: start (command: sendto03)

setsockopt05 Regression Log 32 (gcc-13-lkftconfig-compat)

setsockopt05 setsockopt05
setsockopt05: [  792.809840] /usr/local/bin/kirk[378]: setsockopt05: start (command: setsockopt05)

setsockopt09 Regression Log 33 (gcc-13-lkftconfig-compat)

setsockopt09 setsockopt09
setsockopt09: [  808.934420] /usr/local/bin/kirk[378]: setsockopt09: start (command: setsockopt09)

timerfd_settime02 Regression Log 34 (gcc-13-lkftconfig-compat)

timerfd_settime02 timerfd_settime02
timerfd_settime02: [  880.852903] /usr/local/bin/kirk[378]: timerfd_settime02: start (command: timerfd_settime02)

wait403 Regression Log 35 (gcc-13-lkftconfig-compat)

wait403 wait403
wait403: [  896.703182] /usr/local/bin/kirk[378]: wait403: start (command: wait403)

shardfile-vDSO Regression Log 36 (clang-20-lkftconfig-no-kselftest-frag)

+ set +x
shardfile-vDSO fail

listmount04 Regression Log 37 (gcc-13-defconfig-preempt_rt)

listmount04 listmount04
listmount04: [  346.019643] BUG: kernel NULL pointer dereference, address: 00000000000000d0

sendmsg03 Regression Log 38 (gcc-13-defconfig-preempt_rt)

tst_kconfig.c:88: TINFO: Parsing[ 1511.796007] <LAVA_SIGNAL_ENDTC sendmsg03>
 kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
sendmsg03 sendmsg03
sendmsg03: broken | tainted  (0.013s)

sendto03 Regression Log 39 (gcc-13-defconfig-preempt_rt)

ich might slow t[ 1511.964417] <LAVA_SIGNAL_ENDTC sendto03>
he execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
sendto02.c:38: TCONF: sctp protocol was not supported
Summary:
passed   0
failed   0
broken   0
skipped  1
warnings 0
tst_kconfig.c:88: [ 1511.987763] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=sendto03 RESULT=fail>
[ 1511.990827] <LAVA_SIGNAL_STARTTC set_mempolicy01>
sendto03 sendto03
sendto03: broken | tainted  (0.012s)

setsockopt05 Regression Log 40 (gcc-13-defconfig-preempt_rt)

tst_kconfig.c:88[ 1515.735581] <LAVA_SIGNAL_ENDTC setsockopt05>
: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
setsockopt05 setsockopt05
setsockopt05: broken | tainted  (0.013s)

setsockopt09 Regression Log 41 (gcc-13-defconfig-preempt_rt)

Undefined
tst_t[ 1515.842096] <LAVA_SIGNAL_ENDTC setsockopt09>
est.c:1353: TCONF: Aborting due to unsuitable kernel config, see above!
setsockopt09 setsockopt09
setsockopt09: broken | tainted  (0.013s)

timerfd_settime02 Regression Log 42 (gcc-13-defconfig-preempt_rt)

timerfd_settime02 timerfd_settime02
timerfd_settime02: broken | tainted  (0.007s)

wait403 Regression Log 43 (gcc-13-defconfig-preempt_rt)

tst_taint.c:92: [ 1521.864624] <LAVA_SIGNAL_ENDTC wait403>
TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
[ 1521.891035] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=wait403 RESULT=fail>
wait403 wait403
wait403: broken | tainted  (0.007s)

rt-tests-cyclicdeadline Regression Log 44 (gcc-13-defconfig-preempt_rt)

+ set +x
rt-tests-cyclicdeadline fail

shardfile-vDSO Regression Log 45 (gcc-13-lkftconfig-no-kselftest-frag)

+ set +x
shardfile-vDSO fail

listmount04 Regression Log 46 (gcc-13-lkftconfig-sched-proxy-exec)

listmount04 listmount04
listmount04: [  332.755831] /usr/local/bin/kirk[378]: listmount04: start (command: listmount04)

sendmsg03 Regression Log 47 (gcc-13-lkftconfig-sched-proxy-exec)

sendmsg03 sendmsg03
sendmsg03: [  745.587190] /usr/local/bin/kirk[378]: sendmsg03: start (command: sendmsg03)

sendto03 Regression Log 48 (gcc-13-lkftconfig-sched-proxy-exec)

sendto02.c:38: TCONF: sctp pro[ 1380.487789] <LAVA_SIGNAL_ENDTC sendto03>
tocol was not supported
Summary:
passed   0
failed   0
broken   0
skipped  1
warnings 0
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
sendto03 sendto03
sendto03: [  745.860485] /usr/local/bin/kirk[378]: sendto03: start (command: sendto03)

setsockopt05 Regression Log 49 (gcc-13-lkftconfig-sched-proxy-exec)

setsockopt05 setsockopt05
setsockopt05: [  757.905132] /usr/local/bin/kirk[378]: setsockopt05: start (command: setsockopt05)

setsockopt09 Regression Log 50 (gcc-13-lkftconfig-sched-proxy-exec)

setsockopt09 setsockopt09
setsockopt09: [  773.958184] /usr/local/bin/kirk[378]: setsockopt09: start (command: setsockopt09)

timerfd_settime02 Regression Log 51 (gcc-13-lkftconfig-sched-proxy-exec)

timerfd_settime02 timerfd_settime02
timerfd_settime02: [  844.806739] /usr/local/bin/kirk[378]: timerfd_settime02: start (command: timerfd_settime02)

wait403 Regression Log 52 (gcc-13-lkftconfig-sched-proxy-exec)

wait403 wait403
wait403: [  858.066876] /usr/local/bin/kirk[378]: wait403: start (command: wait403)

listmount04 Regression Log 53 (gcc-13-lkftconfig)

listmount04 listmount04
listmount04: [  330.050425] /usr/local/bin/kirk[377]: listmount04: start (command: listmount04)

sendmsg03 Regression Log 54 (gcc-13-lkftconfig)

sendmsg03 sendmsg03
sendmsg03: [  722.217588] /usr/local/bin/kirk[377]: sendmsg03: start (command: sendmsg03)

sendto03 Regression Log 55 (gcc-13-lkftconfig)

[ 1395.816050] <LAVA_SIGNAL_STARTTC sendto03>
tst_kconfig.c:88[ 1395.823462] <LAVA_SIGNAL_ENDTC sendto03>
: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
sendto03 sendto03
sendto03: [  722.490941] /usr/local/bin/kirk[377]: sendto03: start (command: sendto03)

setsockopt05 Regression Log 56 (gcc-13-lkftconfig)

setsockopt05 setsockopt05
setsockopt05: [  733.785272] /usr/local/bin/kirk[377]: setsockopt05: start (command: setsockopt05)

setsockopt09 Regression Log 57 (gcc-13-lkftconfig)

setsockopt09 setsockopt09
setsockopt09: [  749.863820] /usr/local/bin/kirk[377]: setsockopt09: start (command: setsockopt09)

timerfd_settime02 Regression Log 58 (gcc-13-lkftconfig)

timerfd_settime02 timerfd_settime02
timerfd_settime02: [  820.712314] /usr/local/bin/kirk[377]: timerfd_settime02: start (command: timerfd_settime02)

wait403 Regression Log 59 (gcc-13-lkftconfig)

wait403 wait403
wait403: [  834.101388] /usr/local/bin/kirk[377]: wait403: start (command: wait403)

All Failure List (662 failures)

kselftest-arm64 (11 failures)

  • arm64_fp-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_fp-stress (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_hwcap (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_sve-probe-vls (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_sve-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_syscall-abi (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_tpidr2 (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_vec-syscfg (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_za-fork (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
  • arm64_za-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)

kselftest-breakpoints (7 failures)

kselftest-cgroup (23 failures)

kselftest-clone3 (22 failures)

kselftest-core (14 failures)

kselftest-cpu-hotplug (1 failures)

kselftest-filesystems (1 failures)

  • filesystems_file_stressor (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-armv7, qemu-x86_64

kselftest-firmware (1 failures)

  • firmware_fw_run_tests_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva, qemu-arm64, qemu-armv7, qemu-x86_64

kselftest-ftrace (1 failures)

kselftest-gpio (1 failures)

  • gpio_gpio-aggregator_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva

kselftest-kexec (3 failures)

  • kexec_test_kexec_jump (qemu-x86_64/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64
  • kexec_test_kexec_jump (qemu-x86_64/gcc-13-lkftconfig-kselftest)
  • kexec_test_kexec_load_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64

kselftest-kvm (1 failures)

  • kvm_irqfd_test (graviton4-metal/gcc-12-lkftconfig-graviton4-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe

kselftest-memfd (1 failures)

kselftest-mm (20 failures)

kselftest-mqueue (7 failures)

  • shardfile-mqueue (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
  • shardfile-mqueue (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
  • shardfile-mqueue (e850-96/clang-20-lkftconfig-no-kselftest-frag)
  • shardfile-mqueue (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
  • shardfile-mqueue (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
  • shardfile-mqueue (x86/clang-20-lkftconfig-no-kselftest-frag)
  • shardfile-mqueue (x86/gcc-13-lkftconfig-no-kselftest-frag)

kselftest-net (248 failures)

  • net_altnames_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_altnames_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_amt_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_amt_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_arp_ndisc_evict_nocarrier_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_arp_ndisc_evict_nocarrier_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_arp_ndisc_untracked_subnets_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_arp_ndisc_untracked_subnets_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bareudp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_bareudp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bareudp_sh (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
  • net_big_tcp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_big_tcp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bind_bhash_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_bind_bhash_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bind_timewait (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_bind_timewait (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bind_wildcard (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_bind_wildcard (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_bpf_offload_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_bpf_offload_py (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_broadcast_ether_dst_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_broadcast_ether_dst_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_broadcast_pmtu_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_broadcast_pmtu_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_busy_poll_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_busy_poll_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_cmsg_ip_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_cmsg_ip_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_cmsg_so_mark_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_cmsg_so_mark_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_cmsg_so_priority_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_cmsg_so_priority_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_cmsg_time_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_cmsg_time_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_drop_monitor_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_drop_monitor_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_epoll_busy_poll (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_epoll_busy_poll (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-ipv4_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-ipv4_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-ipv6_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-ipv6_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-other_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_fcnal-other_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fdb_flush_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fdb_flush_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fdb_notify_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fdb_notify_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fib-onlink-tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_fib-onlink-tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fib_nexthop_multiprefix_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fib_nexthop_multiprefix_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fib_nexthop_nongw_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fib_nexthop_nongw_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fib_rule_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fib_rule_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fib_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_fib_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fin_ack_lat_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fin_ack_lat_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_fq_band_pktlimit_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_fq_band_pktlimit_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_gre_gso_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_gre_gso_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_gre_ipv6_lladdr_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_gre_ipv6_lladdr_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_gro_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_gro_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_gro_sh (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
  • net_icmp_redirect_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_icmp_redirect_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_icmp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_icmp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_io_uring_zerocopy_tx_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_io_uring_zerocopy_tx_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ioam6_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ioam6_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ip6_gre_headroom_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ip6_gre_headroom_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ip_defrag_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ip_defrag_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ip_local_port_range_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ip_local_port_range_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ipv6_flowlabel_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ipv6_flowlabel_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ipv6_force_forwarding_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ipv6_force_forwarding_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ipv6_fragmentation (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_ipv6_fragmentation (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ipv6_route_update_soft_lockup_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ipv6_route_update_soft_lockup_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_l2_tos_ttl_inherit_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_l2_tos_ttl_inherit_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_l2tp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_l2tp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_link_netns_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_link_netns_py (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_lwt_dst_cache_ref_loop_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_lwt_dst_cache_ref_loop_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_nat6to4_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_nat6to4_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_ndisc_unsolicited_na_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_ndisc_unsolicited_na_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_netdev-l2addr_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_netdev-l2addr_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_netdevice_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_netdevice_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_netlink-dumps (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_netlink-dumps (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_netns-name_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_netns-name_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_netns-sysctl_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_netns-sysctl_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_nl_netdev_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_nl_netdev_py (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_pmtu_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_pmtu_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_proc_net_pktgen (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_proc_net_pktgen (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_psock_snd_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_psock_snd_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseaddr_conflict (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_reuseaddr_conflict (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseaddr_ports_exhausted_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_reuseaddr_ports_exhausted_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_addr_any_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_addr_any_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf_cpu (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf_cpu (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf_numa (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_bpf_numa (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_reuseport_dualstack (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_reuseport_dualstack (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_route_hint_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_route_hint_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_route_localnet_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_route_localnet_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_rps_default_mask_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_rps_default_mask_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_rtnetlink_notification_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_rtnetlink_notification_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_rtnetlink_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_rtnetlink_py (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_run_netsocktests (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_run_netsocktests (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_rxtimestamp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_rxtimestamp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_sctp_vrf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_sctp_vrf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_sk_bind_sendto_listen (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_sk_bind_sendto_listen (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_sk_connect_zero_addr (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_sk_connect_zero_addr (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_sk_so_peek_off (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_sk_so_peek_off (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_skf_net_off_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_skf_net_off_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_so_incoming_cpu (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_so_incoming_cpu (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_so_txtime_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_so_txtime_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_dt46_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_dt46_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_dt4_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_dt4_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_dt6_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_dt6_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_dx4_netfilter_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_dx4_netfilter_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_dx6_netfilter_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_dx6_netfilter_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_flavors_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_flavors_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_next_csid_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_next_csid_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_end_x_next_csid_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_end_x_next_csid_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_hencap_red_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_hencap_red_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_srv6_hl2encap_red_l2vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_srv6_hl2encap_red_l2vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_stress_reuseport_listen_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_stress_reuseport_listen_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_tap (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_tap (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_tcp_fastopen_backup_key_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_tcp_fastopen_backup_key_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_tcp_port_share (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_tcp_port_share (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_bpf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_bpf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_bridge_backup_port_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_bridge_backup_port_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_bridge_neigh_suppress_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_bridge_neigh_suppress_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_ingress_egress_chaining_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_ingress_egress_chaining_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_neigh_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_neigh_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_so_rcv_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_so_rcv_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_fdb_changelink_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_fdb_changelink_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_mdb_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_vxlan_mdb_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_nh_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_vxlan_nh_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_nolocalbypass_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_vxlan_nolocalbypass_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_under_vrf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_under_vrf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_test_vxlan_vnifiltering_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_test_vxlan_vnifiltering_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_tfo_passive_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_tfo_passive_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_traceroute_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_traceroute_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_tun (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_tun (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_txtimestamp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_txtimestamp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_udpgro_bench_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_udpgro_bench_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_udpgro_frglist_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_udpgro_frglist_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_udpgro_fwd_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_udpgro_fwd_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_udpgso_bench_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
  • net_udpgso_bench_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_udpgso_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_udpgso_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_unicast_extensions_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_unicast_extensions_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_veth_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_veth_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_vlan_bridge_binding_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_vlan_bridge_binding_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_vlan_hw_filter_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_vlan_hw_filter_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_vrf-xfrm-tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_vrf-xfrm-tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_vrf_route_leaking_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_vrf_route_leaking_sh (e850-96/clang-nightly-lkftconfig-kselftest)
  • net_vrf_strict_mode_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • net_vrf_strict_mode_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)

kselftest-openat2 (4 failures)

  • openat2_rename_attack_test (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-armv7, qemu-x86_64
  • openat2_rename_attack_test (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
  • shardfile-openat2 (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
  • shardfile-openat2 (e850-96/clang-20-lkftconfig-no-kselftest-frag)

kselftest-rseq (8 failures)

kselftest-rtc (36 failures)

kselftest-seccomp (5 failures)

kselftest-sigaltstack (8 failures)

kselftest-tc-testing (2 failures)

kselftest-vDSO (4 failures)

kselftest-x86 (4 failures)

kvm-unit-tests (80 failures)

ltp-controllers (11 failures)

  • memcontrol03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15
  • memcontrol03 (dragonboard-410c/gcc-13-lkftconfig)
  • memcontrol03 (qemu-riscv64/clang-20-lkftconfig)
  • memcontrol03 (qemu-riscv64/gcc-13-lkftconfig)
  • memcontrol03 (qemu-x86_64/clang-20-lkftconfig)
  • memcontrol03 (qemu-x86_64/clang-nightly-lkftconfig)
  • memcontrol03 (qemu-x86_64/gcc-13-lkftconfig)
  • memcontrol03 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • memcontrol03 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • memcontrol04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, qemu-arm64, rk3399-rock-pi-4b
  • memcontrol04 (dragonboard-410c/gcc-13-lkftconfig)

ltp-cve (5 failures)

  • cve-2015-3290 (x86-compat/gcc-13-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: x86-compat
  • cve-2017-8890 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat
  • cve-2017-8890 (qemu-riscv64/gcc-13-lkftconfig)
  • cve-2017-8890 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • cve-2017-8890 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)

ltp-fs (2 failures)

  • fs_fill (qemu-riscv64/gcc-13-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-x86_64-compat, x15
  • fs_fill (qemu-x86_64-compat/gcc-13-lkftconfig-compat)

ltp-mm (5 failures)

  • vma05 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat, x86-compat
  • vma05 (qemu-riscv64/gcc-13-lkftconfig)
  • vma05 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • vma05 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • vma05 (x86-compat/gcc-13-lkftconfig-compat)

ltp-syscalls (108 failures)

  • accept02 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat
  • accept02 (qemu-riscv64/gcc-13-lkftconfig)
  • accept02 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • accept02 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • acct01 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • acct01 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • acct01 (dragonboard-410c/gcc-13-lkftconfig)
  • acct01 (qemu-x86_64/clang-20-lkftconfig)
  • acct01 (qemu-x86_64/clang-nightly-lkftconfig)
  • acct01 (qemu-x86_64/gcc-13-lkftconfig)
  • acct01 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • acct01 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • acct01 (x86/gcc-13-defconfig-preempt_rt)
  • acct01 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • acct01 (x86/gcc-13-lkftconfig)
  • acct01 (x86-compat/gcc-13-lkftconfig-compat)
  • epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15, x86, x86-compat
  • epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig)
  • epoll_ctl04 (qemu-riscv64/clang-20-lkftconfig)
  • epoll_ctl04 (qemu-riscv64/gcc-13-lkftconfig)
  • epoll_ctl04 (qemu-x86_64/clang-20-lkftconfig)
  • epoll_ctl04 (qemu-x86_64/clang-nightly-lkftconfig)
  • epoll_ctl04 (qemu-x86_64/gcc-13-lkftconfig)
  • epoll_ctl04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • epoll_ctl04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • epoll_ctl04 (x86/gcc-13-defconfig-preempt_rt)
  • epoll_ctl04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • epoll_ctl04 (x86/gcc-13-lkftconfig)
  • epoll_ctl04 (x86-compat/gcc-13-lkftconfig-compat)
  • fallocate06 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, x15
  • fallocate06 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • fallocate06 (dragonboard-410c/gcc-13-lkftconfig)
  • getxattr04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15, x86, x86-compat
  • getxattr04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • getxattr04 (dragonboard-410c/gcc-13-lkftconfig)
  • getxattr04 (qemu-riscv64/clang-20-lkftconfig)
  • getxattr04 (qemu-riscv64/gcc-13-lkftconfig)
  • getxattr04 (qemu-x86_64/clang-20-lkftconfig)
  • getxattr04 (qemu-x86_64/clang-nightly-lkftconfig)
  • getxattr04 (qemu-x86_64/gcc-13-lkftconfig)
  • getxattr04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • getxattr04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • getxattr04 (x86/gcc-13-defconfig-preempt_rt)
  • getxattr04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • getxattr04 (x86/gcc-13-lkftconfig)
  • getxattr04 (x86-compat/gcc-13-lkftconfig-compat)
  • listmount04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • listmount04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • listmount04 (qemu-riscv64/clang-20-lkftconfig)
  • listmount04 (qemu-riscv64/gcc-13-lkftconfig)
  • listmount04 (qemu-x86_64/clang-20-lkftconfig)
  • listmount04 (qemu-x86_64/clang-nightly-lkftconfig)
  • listmount04 (qemu-x86_64/gcc-13-lkftconfig)
  • listmount04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
  • listmount04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • listmount04 (x86/gcc-13-defconfig-preempt_rt)
  • listmount04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • listmount04 (x86/gcc-13-lkftconfig)
  • listmount04 (x86-compat/gcc-13-lkftconfig-compat)
  • madvise06 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • madvise06 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • madvise06 (x86/gcc-13-defconfig-preempt_rt)
  • madvise06 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • madvise06 (x86/gcc-13-lkftconfig)
  • madvise06 (x86-compat/gcc-13-lkftconfig-compat)
  • mseal02 (qemu-x86_64-compat/clang-20-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: juno-r2-compat, qemu-arm64-compat, qemu-x86_64-compat, x86-compat
  • mseal02 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • mseal02 (x86-compat/gcc-13-lkftconfig-compat)
  • sendmsg03 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • sendmsg03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • sendmsg03 (x86/gcc-13-defconfig-preempt_rt)
  • sendmsg03 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • sendmsg03 (x86/gcc-13-lkftconfig)
  • sendmsg03 (x86-compat/gcc-13-lkftconfig-compat)
  • sendto03 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • sendto03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • sendto03 (x86/gcc-13-defconfig-preempt_rt)
  • sendto03 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • sendto03 (x86/gcc-13-lkftconfig)
  • sendto03 (x86-compat/gcc-13-lkftconfig-compat)
  • setsockopt05 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • setsockopt05 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • setsockopt05 (x86/gcc-13-defconfig-preempt_rt)
  • setsockopt05 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • setsockopt05 (x86/gcc-13-lkftconfig)
  • setsockopt05 (x86-compat/gcc-13-lkftconfig-compat)
  • setsockopt09 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • setsockopt09 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • setsockopt09 (x86/gcc-13-defconfig-preempt_rt)
  • setsockopt09 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • setsockopt09 (x86/gcc-13-lkftconfig)
  • setsockopt09 (x86-compat/gcc-13-lkftconfig-compat)
  • shmctl03 (qemu-x86_64-compat/clang-20-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-x86_64-compat, x86-compat
  • shmctl03 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
  • shmctl03 (x86-compat/gcc-13-lkftconfig-compat)
  • timerfd_settime02 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • timerfd_settime02 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • timerfd_settime02 (x86/gcc-13-defconfig-preempt_rt)
  • timerfd_settime02 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • timerfd_settime02 (x86/gcc-13-lkftconfig)
  • timerfd_settime02 (x86-compat/gcc-13-lkftconfig-compat)
  • wait403 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
  • wait403 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
  • wait403 (x86/gcc-13-defconfig-preempt_rt)
  • wait403 (x86/gcc-13-lkftconfig-sched-proxy-exec)
  • wait403 (x86/gcc-13-lkftconfig)
  • wait403 (x86-compat/gcc-13-lkftconfig-compat)

perf (8 failures)

rt-tests-cyclicdeadline (1 failures)

  • rt-tests-cyclicdeadline (x86/gcc-13-defconfig-preempt_rt) Also seen in: lkft/linux-mainline-master on devices: x86

rt-tests-rt-migrate-test (6 failures)

xfstests-btrfs (3 failures)

  • btrfs-220 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64
  • btrfs-226 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64
  • btrfs-300 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64