Hay
Date
June 16, 2025, 7:07 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   22.528546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   22.377488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[   97.747713] Internal error: Oops: 0000000096000005 [#1]  SMP
[   97.753391] Modules linked in:
[   97.753971] CPU: 0 UID: 0 PID: 541 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   97.754630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   97.755097] Hardware name: linux,dummy-virt (DT)
[   97.755722] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   97.756315] pc : kunit_test_null_dereference+0x70/0x170
[   97.756719] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.757067] sp : ffff800080ed7d30
[   97.757283] x29: ffff800080ed7d90 x28: 0000000000000000 x27: 0000000000000000
[   97.757954] x26: 1ffe000018c7f821 x25: 0000000000000000 x24: 0000000000000004
[   97.758540] x23: fff00000c63fc10c x22: ffffb10106a2b828 x21: fff00000c1101b88
[   97.758990] x20: 1ffff000101dafa6 x19: ffff800080087990 x18: 000000008348d21b
[   97.759379] x17: 0000000000000001 x16: fff00000da444d28 x15: 00000000d770d2d6
[   97.760053] x14: 00000000c7a1232c x13: 1ffe000018dc1e64 x12: fffd8000195ef11c
[   97.760539] x11: 1ffe0000195ef11b x10: fffd8000195ef11b x9 : ffffb10106a22c90
[   97.761127] x8 : ffff800080ed7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   97.761669] x5 : ffff7000101dafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   97.762052] x2 : dfff800000000000 x1 : fff00000caf78000 x0 : ffff800080087990
[   97.762468] Call trace:
[   97.762779]  kunit_test_null_dereference+0x70/0x170 (P)
[   97.763168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.763476]  kthread+0x328/0x630
[   97.763789]  ret_from_fork+0x10/0x20
[   97.764402] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   97.765054] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   51.538405] ==================================================================
[   51.538512] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.538512] 
[   51.538631] Use-after-free read at 0x00000000ed7f8f25 (in kfence-#189):
[   51.538694]  test_krealloc+0x51c/0x830
[   51.538746]  kunit_try_run_case+0x170/0x3f0
[   51.538799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.538871]  kthread+0x328/0x630
[   51.538923]  ret_from_fork+0x10/0x20
[   51.538968] 
[   51.538998] kfence-#189: 0x00000000ed7f8f25-0x00000000f0939269, size=32, cache=kmalloc-32
[   51.538998] 
[   51.539063] allocated by task 346 on cpu 1 at 51.537503s (0.001556s ago):
[   51.539142]  test_alloc+0x29c/0x628
[   51.539191]  test_krealloc+0xc0/0x830
[   51.539235]  kunit_try_run_case+0x170/0x3f0
[   51.539280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.539327]  kthread+0x328/0x630
[   51.539367]  ret_from_fork+0x10/0x20
[   51.539411] 
[   51.539438] freed by task 346 on cpu 1 at 51.537913s (0.001521s ago):
[   51.539504]  krealloc_noprof+0x148/0x360
[   51.539549]  test_krealloc+0x1dc/0x830
[   51.539590]  kunit_try_run_case+0x170/0x3f0
[   51.539634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.539677]  kthread+0x328/0x630
[   51.539720]  ret_from_fork+0x10/0x20
[   51.539761] 
[   51.539822] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   51.539924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.539959] Hardware name: linux,dummy-virt (DT)
[   51.540000] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   51.366067] ==================================================================
[   51.366202] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.366202] 
[   51.366341] Use-after-free read at 0x0000000091b6c3f4 (in kfence-#187):
[   51.366416]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.366486]  kunit_try_run_case+0x170/0x3f0
[   51.366543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.366597]  kthread+0x328/0x630
[   51.366650]  ret_from_fork+0x10/0x20
[   51.366702] 
[   51.366734] kfence-#187: 0x0000000091b6c3f4-0x000000006f750a5b, size=32, cache=test
[   51.366734] 
[   51.366803] allocated by task 344 on cpu 0 at 51.329966s (0.036832s ago):
[   51.366912]  test_alloc+0x230/0x628
[   51.366969]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.367026]  kunit_try_run_case+0x170/0x3f0
[   51.367077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.367133]  kthread+0x328/0x630
[   51.367179]  ret_from_fork+0x10/0x20
[   51.367232] 
[   51.367267] freed by task 344 on cpu 0 at 51.330151s (0.037111s ago):
[   51.367339]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.367393]  kunit_try_run_case+0x170/0x3f0
[   51.367443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.367497]  kthread+0x328/0x630
[   51.367541]  ret_from_fork+0x10/0x20
[   51.367591] 
[   51.367676] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   51.367788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.367829] Hardware name: linux,dummy-virt (DT)
[   51.367887] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   30.555439] ==================================================================
[   30.555681] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   30.555681] 
[   30.555886] Invalid read at 0x00000000eba4baa3:
[   30.556119]  test_invalid_access+0xdc/0x1f0
[   30.556301]  kunit_try_run_case+0x170/0x3f0
[   30.556536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.556764]  kthread+0x328/0x630
[   30.557853]  ret_from_fork+0x10/0x20
[   30.558024] 
[   30.558146] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   30.558351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.558722] Hardware name: linux,dummy-virt (DT)
[   30.558832] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   30.321821] ==================================================================
[   30.321976] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   30.321976] 
[   30.322067] Corrupted memory at 0x00000000793a76a8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#183):
[   30.322453]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   30.322523]  kunit_try_run_case+0x170/0x3f0
[   30.322582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.322637]  kthread+0x328/0x630
[   30.322688]  ret_from_fork+0x10/0x20
[   30.322737] 
[   30.322772] kfence-#183: 0x00000000b0e9ffe2-0x00000000c44fc44d, size=73, cache=kmalloc-96
[   30.322772] 
[   30.322849] allocated by task 334 on cpu 1 at 30.321503s (0.001340s ago):
[   30.322937]  test_alloc+0x29c/0x628
[   30.322991]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   30.323049]  kunit_try_run_case+0x170/0x3f0
[   30.323101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.323165]  kthread+0x328/0x630
[   30.323215]  ret_from_fork+0x10/0x20
[   30.323263] 
[   30.323293] freed by task 334 on cpu 1 at 30.321690s (0.001598s ago):
[   30.323368]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   30.323421]  kunit_try_run_case+0x170/0x3f0
[   30.323470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.323522]  kthread+0x328/0x630
[   30.323566]  ret_from_fork+0x10/0x20
[   30.323615] 
[   30.323678] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   30.323778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.323816] Hardware name: linux,dummy-virt (DT)
[   30.323870] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   29.905659] ==================================================================
[   29.905751] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   29.905751] 
[   29.905904] Out-of-bounds read at 0x00000000bafd51cc (105B right of kfence-#179):
[   29.905986]  test_kmalloc_aligned_oob_read+0x238/0x468
[   29.906050]  kunit_try_run_case+0x170/0x3f0
[   29.906112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.906164]  kthread+0x328/0x630
[   29.906208]  ret_from_fork+0x10/0x20
[   29.906254] 
[   29.906284] kfence-#179: 0x00000000a0484d4e-0x00000000635fb133, size=73, cache=kmalloc-96
[   29.906284] 
[   29.906345] allocated by task 332 on cpu 1 at 29.905402s (0.000938s ago):
[   29.906427]  test_alloc+0x29c/0x628
[   29.906476]  test_kmalloc_aligned_oob_read+0x100/0x468
[   29.906525]  kunit_try_run_case+0x170/0x3f0
[   29.906569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.906618]  kthread+0x328/0x630
[   29.906659]  ret_from_fork+0x10/0x20
[   29.906706] 
[   29.906770] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   29.906874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.906912] Hardware name: linux,dummy-virt (DT)
[   29.906957] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   25.120046] ==================================================================
[   25.120644] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   25.120644] 
[   25.121014] Corrupted memory at 0x00000000a4fe785a [ ! . . . . . . . . . . . . . . . ] (in kfence-#133):
[   25.125846]  test_corruption+0x278/0x378
[   25.126543]  kunit_try_run_case+0x170/0x3f0
[   25.126797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.127063]  kthread+0x328/0x630
[   25.127340]  ret_from_fork+0x10/0x20
[   25.127522] 
[   25.127624] kfence-#133: 0x00000000e2e82a65-0x0000000082c132e6, size=32, cache=kmalloc-32
[   25.127624] 
[   25.127979] allocated by task 320 on cpu 0 at 25.118628s (0.009255s ago):
[   25.128386]  test_alloc+0x29c/0x628
[   25.128476]  test_corruption+0xdc/0x378
[   25.128590]  kunit_try_run_case+0x170/0x3f0
[   25.128733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.128926]  kthread+0x328/0x630
[   25.129187]  ret_from_fork+0x10/0x20
[   25.129297] 
[   25.129355] freed by task 320 on cpu 0 at 25.119185s (0.010162s ago):
[   25.129481]  test_corruption+0x278/0x378
[   25.129598]  kunit_try_run_case+0x170/0x3f0
[   25.129708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.129862]  kthread+0x328/0x630
[   25.130010]  ret_from_fork+0x10/0x20
[   25.130241] 
[   25.130488] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   25.130981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.131221] Hardware name: linux,dummy-virt (DT)
[   25.131615] ==================================================================
[   25.432348] ==================================================================
[   25.432499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   25.432499] 
[   25.432621] Corrupted memory at 0x000000000bb77e1a [ ! ] (in kfence-#136):
[   25.432923]  test_corruption+0x284/0x378
[   25.433025]  kunit_try_run_case+0x170/0x3f0
[   25.433157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.433523]  kthread+0x328/0x630
[   25.433628]  ret_from_fork+0x10/0x20
[   25.433827] 
[   25.433959] kfence-#136: 0x000000005ee313ab-0x000000005f295828, size=32, cache=kmalloc-32
[   25.433959] 
[   25.434204] allocated by task 320 on cpu 0 at 25.431862s (0.002332s ago):
[   25.434359]  test_alloc+0x29c/0x628
[   25.434465]  test_corruption+0x198/0x378
[   25.434564]  kunit_try_run_case+0x170/0x3f0
[   25.434656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.436919]  kthread+0x328/0x630
[   25.436976]  ret_from_fork+0x10/0x20
[   25.437055] 
[   25.437101] freed by task 320 on cpu 0 at 25.432056s (0.005038s ago):
[   25.437242]  test_corruption+0x284/0x378
[   25.437362]  kunit_try_run_case+0x170/0x3f0
[   25.437552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.437664]  kthread+0x328/0x630
[   25.438001]  ret_from_fork+0x10/0x20
[   25.438160] 
[   25.438284] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   25.438582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.438662] Hardware name: linux,dummy-virt (DT)
[   25.439033] ==================================================================
[   25.534484] ==================================================================
[   25.534643] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   25.534643] 
[   25.534781] Corrupted memory at 0x000000004e128d29 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137):
[   25.536126]  test_corruption+0x120/0x378
[   25.536260]  kunit_try_run_case+0x170/0x3f0
[   25.536367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.536468]  kthread+0x328/0x630
[   25.536563]  ret_from_fork+0x10/0x20
[   25.536657] 
[   25.536714] kfence-#137: 0x000000002c88ec3f-0x000000005a3e904c, size=32, cache=test
[   25.536714] 
[   25.537155] allocated by task 322 on cpu 0 at 25.534210s (0.002935s ago):
[   25.537776]  test_alloc+0x230/0x628
[   25.538110]  test_corruption+0xdc/0x378
[   25.538441]  kunit_try_run_case+0x170/0x3f0
[   25.538552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.538668]  kthread+0x328/0x630
[   25.538967]  ret_from_fork+0x10/0x20
[   25.539242] 
[   25.539575] freed by task 322 on cpu 0 at 25.534325s (0.005233s ago):
[   25.539808]  test_corruption+0x120/0x378
[   25.539961]  kunit_try_run_case+0x170/0x3f0
[   25.540230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.540356]  kthread+0x328/0x630
[   25.540453]  ret_from_fork+0x10/0x20
[   25.540855] 
[   25.541003] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   25.541406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.541644] Hardware name: linux,dummy-virt (DT)
[   25.541957] ==================================================================
[   25.744457] ==================================================================
[   25.744776] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   25.744776] 
[   25.744959] Corrupted memory at 0x000000002a9df148 [ ! ] (in kfence-#139):
[   25.745283]  test_corruption+0x1d8/0x378
[   25.745374]  kunit_try_run_case+0x170/0x3f0
[   25.745459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.745558]  kthread+0x328/0x630
[   25.745659]  ret_from_fork+0x10/0x20
[   25.745771] 
[   25.745848] kfence-#139: 0x000000008ca0d44e-0x0000000071aa7347, size=32, cache=test
[   25.745848] 
[   25.745989] allocated by task 322 on cpu 0 at 25.743492s (0.002488s ago):
[   25.746134]  test_alloc+0x230/0x628
[   25.746228]  test_corruption+0x198/0x378
[   25.746326]  kunit_try_run_case+0x170/0x3f0
[   25.746422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.746528]  kthread+0x328/0x630
[   25.746613]  ret_from_fork+0x10/0x20
[   25.746701] 
[   25.746759] freed by task 322 on cpu 0 at 25.744009s (0.002743s ago):
[   25.747434]  test_corruption+0x1d8/0x378
[   25.747608]  kunit_try_run_case+0x170/0x3f0
[   25.748121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.748388]  kthread+0x328/0x630
[   25.748825]  ret_from_fork+0x10/0x20
[   25.749012] 
[   25.749289] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   25.749682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.749756] Hardware name: linux,dummy-virt (DT)
[   25.750044] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   24.806500] ==================================================================
[   24.806661] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   24.806661] 
[   24.806790] Invalid free of 0x00000000ff7f821c (in kfence-#130):
[   24.806925]  test_invalid_addr_free+0x1ac/0x238
[   24.807041]  kunit_try_run_case+0x170/0x3f0
[   24.807146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.807248]  kthread+0x328/0x630
[   24.807344]  ret_from_fork+0x10/0x20
[   24.807443] 
[   24.807501] kfence-#130: 0x00000000fcb5e0b5-0x0000000032fcb08b, size=32, cache=kmalloc-32
[   24.807501] 
[   24.807632] allocated by task 316 on cpu 0 at 24.806228s (0.001396s ago):
[   24.807780]  test_alloc+0x29c/0x628
[   24.807889]  test_invalid_addr_free+0xd4/0x238
[   24.807986]  kunit_try_run_case+0x170/0x3f0
[   24.808132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.808241]  kthread+0x328/0x630
[   24.808364]  ret_from_fork+0x10/0x20
[   24.808493] 
[   24.808635] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.808908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.809002] Hardware name: linux,dummy-virt (DT)
[   24.809109] ==================================================================
[   24.910906] ==================================================================
[   24.911081] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   24.911081] 
[   24.911224] Invalid free of 0x00000000a52bb7a3 (in kfence-#131):
[   24.911353]  test_invalid_addr_free+0xec/0x238
[   24.911477]  kunit_try_run_case+0x170/0x3f0
[   24.911592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.911704]  kthread+0x328/0x630
[   24.911813]  ret_from_fork+0x10/0x20
[   24.911930] 
[   24.911993] kfence-#131: 0x00000000923591cf-0x0000000038e5d8b4, size=32, cache=test
[   24.911993] 
[   24.912140] allocated by task 318 on cpu 0 at 24.910581s (0.001549s ago):
[   24.912708]  test_alloc+0x230/0x628
[   24.913030]  test_invalid_addr_free+0xd4/0x238
[   24.913231]  kunit_try_run_case+0x170/0x3f0
[   24.913326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.913709]  kthread+0x328/0x630
[   24.913972]  ret_from_fork+0x10/0x20
[   24.914737] 
[   24.915128] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.915549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.916323] Hardware name: linux,dummy-virt (DT)
[   24.916686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   22.730525] ==================================================================
[   22.730604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   22.730684] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.730753] 
[   22.730804] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.731236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.731444] Hardware name: linux,dummy-virt (DT)
[   22.731660] Call trace:
[   22.731697]  show_stack+0x20/0x38 (C)
[   22.731865]  dump_stack_lvl+0x8c/0xd0
[   22.732114]  print_report+0x118/0x608
[   22.732295]  kasan_report+0xdc/0x128
[   22.732371]  kasan_check_range+0x100/0x1a8
[   22.732437]  __kasan_check_write+0x20/0x30
[   22.732496]  kasan_atomics_helper+0xe44/0x4858
[   22.732552]  kasan_atomics+0x198/0x2e0
[   22.732605]  kunit_try_run_case+0x170/0x3f0
[   22.732659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.732719]  kthread+0x328/0x630
[   22.732768]  ret_from_fork+0x10/0x20
[   22.733248] 
[   22.733281] Allocated by task 274:
[   22.733320]  kasan_save_stack+0x3c/0x68
[   22.733506]  kasan_save_track+0x20/0x40
[   22.733561]  kasan_save_alloc_info+0x40/0x58
[   22.733769]  __kasan_kmalloc+0xd4/0xd8
[   22.733843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.733905]  kasan_atomics+0xb8/0x2e0
[   22.733955]  kunit_try_run_case+0x170/0x3f0
[   22.734005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.734214]  kthread+0x328/0x630
[   22.734436]  ret_from_fork+0x10/0x20
[   22.734503] 
[   22.734534] The buggy address belongs to the object at fff00000c63bc080
[   22.734534]  which belongs to the cache kmalloc-64 of size 64
[   22.734617] The buggy address is located 0 bytes to the right of
[   22.734617]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.734702] 
[   22.734732] The buggy address belongs to the physical page:
[   22.734773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.734849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.734916] page_type: f5(slab)
[   22.734968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.735384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.735451] page dumped because: kasan: bad access detected
[   22.735618] 
[   22.735648] Memory state around the buggy address:
[   22.735693]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.735985]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.736118] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.736195]                                      ^
[   22.736460]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.736573]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.736625] ==================================================================
[   22.780148] ==================================================================
[   22.780233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.780417] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.780546] 
[   22.780593] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.780913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.781039] Hardware name: linux,dummy-virt (DT)
[   22.781081] Call trace:
[   22.781114]  show_stack+0x20/0x38 (C)
[   22.781172]  dump_stack_lvl+0x8c/0xd0
[   22.781333]  print_report+0x118/0x608
[   22.781436]  kasan_report+0xdc/0x128
[   22.781505]  kasan_check_range+0x100/0x1a8
[   22.781561]  __kasan_check_write+0x20/0x30
[   22.781612]  kasan_atomics_helper+0x1190/0x4858
[   22.781715]  kasan_atomics+0x198/0x2e0
[   22.781807]  kunit_try_run_case+0x170/0x3f0
[   22.781887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.781951]  kthread+0x328/0x630
[   22.782181]  ret_from_fork+0x10/0x20
[   22.782259] 
[   22.782295] Allocated by task 274:
[   22.782333]  kasan_save_stack+0x3c/0x68
[   22.782385]  kasan_save_track+0x20/0x40
[   22.782431]  kasan_save_alloc_info+0x40/0x58
[   22.782548]  __kasan_kmalloc+0xd4/0xd8
[   22.782760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.782966]  kasan_atomics+0xb8/0x2e0
[   22.783029]  kunit_try_run_case+0x170/0x3f0
[   22.783521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.783671]  kthread+0x328/0x630
[   22.783785]  ret_from_fork+0x10/0x20
[   22.783858] 
[   22.783888] The buggy address belongs to the object at fff00000c63bc080
[   22.783888]  which belongs to the cache kmalloc-64 of size 64
[   22.783958] The buggy address is located 0 bytes to the right of
[   22.783958]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.784031] 
[   22.784059] The buggy address belongs to the physical page:
[   22.784100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.784505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.784753] page_type: f5(slab)
[   22.784904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.784967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.785093] page dumped because: kasan: bad access detected
[   22.785287] 
[   22.785424] Memory state around the buggy address:
[   22.785624]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.785849]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.786087] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.786168]                                      ^
[   22.786215]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.786285]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.786425] ==================================================================
[   22.744842] ==================================================================
[   22.744896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   22.744957] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.745016] 
[   22.745061] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.745241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745277] Hardware name: linux,dummy-virt (DT)
[   22.745316] Call trace:
[   22.745373]  show_stack+0x20/0x38 (C)
[   22.745490]  dump_stack_lvl+0x8c/0xd0
[   22.745545]  print_report+0x118/0x608
[   22.745601]  kasan_report+0xdc/0x128
[   22.745656]  kasan_check_range+0x100/0x1a8
[   22.745717]  __kasan_check_write+0x20/0x30
[   22.745774]  kasan_atomics_helper+0xf20/0x4858
[   22.745856]  kasan_atomics+0x198/0x2e0
[   22.745920]  kunit_try_run_case+0x170/0x3f0
[   22.745981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.746047]  kthread+0x328/0x630
[   22.746102]  ret_from_fork+0x10/0x20
[   22.746190] 
[   22.746217] Allocated by task 274:
[   22.746264]  kasan_save_stack+0x3c/0x68
[   22.746320]  kasan_save_track+0x20/0x40
[   22.746371]  kasan_save_alloc_info+0x40/0x58
[   22.746420]  __kasan_kmalloc+0xd4/0xd8
[   22.746468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.746520]  kasan_atomics+0xb8/0x2e0
[   22.746565]  kunit_try_run_case+0x170/0x3f0
[   22.746615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.746669]  kthread+0x328/0x630
[   22.746710]  ret_from_fork+0x10/0x20
[   22.746758] 
[   22.746788] The buggy address belongs to the object at fff00000c63bc080
[   22.746788]  which belongs to the cache kmalloc-64 of size 64
[   22.746884] The buggy address is located 0 bytes to the right of
[   22.746884]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.746960] 
[   22.746989] The buggy address belongs to the physical page:
[   22.747086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.747162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.747361] page_type: f5(slab)
[   22.747417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.747483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.747736] page dumped because: kasan: bad access detected
[   22.747821] 
[   22.747922] Memory state around the buggy address:
[   22.747977]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748040]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.748386] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.748456]                                      ^
[   22.748508]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748577]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748766] ==================================================================
[   22.794459] ==================================================================
[   22.794561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.794907] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.795046] 
[   22.795127] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.795312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.795373] Hardware name: linux,dummy-virt (DT)
[   22.795450] Call trace:
[   22.795480]  show_stack+0x20/0x38 (C)
[   22.795540]  dump_stack_lvl+0x8c/0xd0
[   22.795592]  print_report+0x118/0x608
[   22.795647]  kasan_report+0xdc/0x128
[   22.795701]  kasan_check_range+0x100/0x1a8
[   22.795754]  __kasan_check_write+0x20/0x30
[   22.795806]  kasan_atomics_helper+0x126c/0x4858
[   22.795876]  kasan_atomics+0x198/0x2e0
[   22.795930]  kunit_try_run_case+0x170/0x3f0
[   22.795986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.796047]  kthread+0x328/0x630
[   22.796107]  ret_from_fork+0x10/0x20
[   22.796204] 
[   22.796260] Allocated by task 274:
[   22.796297]  kasan_save_stack+0x3c/0x68
[   22.796347]  kasan_save_track+0x20/0x40
[   22.796393]  kasan_save_alloc_info+0x40/0x58
[   22.796438]  __kasan_kmalloc+0xd4/0xd8
[   22.796482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.796528]  kasan_atomics+0xb8/0x2e0
[   22.796571]  kunit_try_run_case+0x170/0x3f0
[   22.796616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.796666]  kthread+0x328/0x630
[   22.796706]  ret_from_fork+0x10/0x20
[   22.796749] 
[   22.796777] The buggy address belongs to the object at fff00000c63bc080
[   22.796777]  which belongs to the cache kmalloc-64 of size 64
[   22.796852] The buggy address is located 0 bytes to the right of
[   22.796852]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.796928] 
[   22.796954] The buggy address belongs to the physical page:
[   22.796993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.797053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.797153] page_type: f5(slab)
[   22.797391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.797655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.797949] page dumped because: kasan: bad access detected
[   22.798075] 
[   22.798191] Memory state around the buggy address:
[   22.798300]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798359]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.798643] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.798731]                                      ^
[   22.798775]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798889]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798954] ==================================================================
[   22.764417] ==================================================================
[   22.764497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.764571] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.765029] 
[   22.765151] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.765340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.765461] Hardware name: linux,dummy-virt (DT)
[   22.765509] Call trace:
[   22.765677]  show_stack+0x20/0x38 (C)
[   22.765758]  dump_stack_lvl+0x8c/0xd0
[   22.765900]  print_report+0x118/0x608
[   22.765969]  kasan_report+0xdc/0x128
[   22.766031]  kasan_check_range+0x100/0x1a8
[   22.766093]  __kasan_check_write+0x20/0x30
[   22.766150]  kasan_atomics_helper+0x1058/0x4858
[   22.766210]  kasan_atomics+0x198/0x2e0
[   22.766269]  kunit_try_run_case+0x170/0x3f0
[   22.766329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.766394]  kthread+0x328/0x630
[   22.766445]  ret_from_fork+0x10/0x20
[   22.766506] 
[   22.766535] Allocated by task 274:
[   22.766576]  kasan_save_stack+0x3c/0x68
[   22.766634]  kasan_save_track+0x20/0x40
[   22.766684]  kasan_save_alloc_info+0x40/0x58
[   22.766731]  __kasan_kmalloc+0xd4/0xd8
[   22.766779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.766831]  kasan_atomics+0xb8/0x2e0
[   22.766911]  kunit_try_run_case+0x170/0x3f0
[   22.766963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.767020]  kthread+0x328/0x630
[   22.767086]  ret_from_fork+0x10/0x20
[   22.767174] 
[   22.767237] The buggy address belongs to the object at fff00000c63bc080
[   22.767237]  which belongs to the cache kmalloc-64 of size 64
[   22.767309] The buggy address is located 0 bytes to the right of
[   22.767309]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.767382] 
[   22.767410] The buggy address belongs to the physical page:
[   22.767449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.767507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.767561] page_type: f5(slab)
[   22.767610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.767692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.767797] page dumped because: kasan: bad access detected
[   22.767856] 
[   22.767887] Memory state around the buggy address:
[   22.767932]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.767998]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.768093] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.768199]                                      ^
[   22.768259]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.768357]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.768419] ==================================================================
[   22.849915] ==================================================================
[   22.849992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.850068] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.850134] 
[   22.850183] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.850292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.850332] Hardware name: linux,dummy-virt (DT)
[   22.850374] Call trace:
[   22.850408]  show_stack+0x20/0x38 (C)
[   22.850471]  dump_stack_lvl+0x8c/0xd0
[   22.850531]  print_report+0x118/0x608
[   22.850592]  kasan_report+0xdc/0x128
[   22.850650]  __asan_report_load8_noabort+0x20/0x30
[   22.850712]  kasan_atomics_helper+0x3db0/0x4858
[   22.850775]  kasan_atomics+0x198/0x2e0
[   22.850833]  kunit_try_run_case+0x170/0x3f0
[   22.851622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.852191]  kthread+0x328/0x630
[   22.852307]  ret_from_fork+0x10/0x20
[   22.852630] 
[   22.852906] Allocated by task 274:
[   22.852961]  kasan_save_stack+0x3c/0x68
[   22.853020]  kasan_save_track+0x20/0x40
[   22.853163]  kasan_save_alloc_info+0x40/0x58
[   22.853213]  __kasan_kmalloc+0xd4/0xd8
[   22.853261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.853349]  kasan_atomics+0xb8/0x2e0
[   22.853449]  kunit_try_run_case+0x170/0x3f0
[   22.853695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.853815]  kthread+0x328/0x630
[   22.853910]  ret_from_fork+0x10/0x20
[   22.853965] 
[   22.853996] The buggy address belongs to the object at fff00000c63bc080
[   22.853996]  which belongs to the cache kmalloc-64 of size 64
[   22.854074] The buggy address is located 0 bytes to the right of
[   22.854074]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.854165] 
[   22.854195] The buggy address belongs to the physical page:
[   22.854240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.854309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.854370] page_type: f5(slab)
[   22.854426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.854490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.854546] page dumped because: kasan: bad access detected
[   22.854590] 
[   22.854617] Memory state around the buggy address:
[   22.854661]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.854729]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.854803] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.854870]                                      ^
[   22.854936]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.855000]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.855052] ==================================================================
[   22.758637] ==================================================================
[   22.758715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.758785] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.758859] 
[   22.758903] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.759003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.759035] Hardware name: linux,dummy-virt (DT)
[   22.759075] Call trace:
[   22.759106]  show_stack+0x20/0x38 (C)
[   22.759164]  dump_stack_lvl+0x8c/0xd0
[   22.759216]  print_report+0x118/0x608
[   22.759270]  kasan_report+0xdc/0x128
[   22.759322]  kasan_check_range+0x100/0x1a8
[   22.759379]  __kasan_check_write+0x20/0x30
[   22.759430]  kasan_atomics_helper+0xff0/0x4858
[   22.759485]  kasan_atomics+0x198/0x2e0
[   22.759537]  kunit_try_run_case+0x170/0x3f0
[   22.759592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.759650]  kthread+0x328/0x630
[   22.759698]  ret_from_fork+0x10/0x20
[   22.759751] 
[   22.759778] Allocated by task 274:
[   22.759821]  kasan_save_stack+0x3c/0x68
[   22.760586]  kasan_save_track+0x20/0x40
[   22.760697]  kasan_save_alloc_info+0x40/0x58
[   22.760745]  __kasan_kmalloc+0xd4/0xd8
[   22.760790]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.761129]  kasan_atomics+0xb8/0x2e0
[   22.761206]  kunit_try_run_case+0x170/0x3f0
[   22.761445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.761535]  kthread+0x328/0x630
[   22.761585]  ret_from_fork+0x10/0x20
[   22.761632] 
[   22.761681] The buggy address belongs to the object at fff00000c63bc080
[   22.761681]  which belongs to the cache kmalloc-64 of size 64
[   22.761753] The buggy address is located 0 bytes to the right of
[   22.761753]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.761846] 
[   22.761881] The buggy address belongs to the physical page:
[   22.761926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.761993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.762259] page_type: f5(slab)
[   22.762518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.762598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.762659] page dumped because: kasan: bad access detected
[   22.762848] 
[   22.763078] Memory state around the buggy address:
[   22.763129]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763188]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763290] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.763345]                                      ^
[   22.763397]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763615]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763716] ==================================================================
[   22.749918] ==================================================================
[   22.749998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   22.750074] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.750164] 
[   22.750211] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.750530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.750582] Hardware name: linux,dummy-virt (DT)
[   22.750622] Call trace:
[   22.750692]  show_stack+0x20/0x38 (C)
[   22.750811]  dump_stack_lvl+0x8c/0xd0
[   22.751231]  print_report+0x118/0x608
[   22.751294]  kasan_report+0xdc/0x128
[   22.751557]  kasan_check_range+0x100/0x1a8
[   22.751648]  __kasan_check_write+0x20/0x30
[   22.751711]  kasan_atomics_helper+0xf88/0x4858
[   22.751769]  kasan_atomics+0x198/0x2e0
[   22.751823]  kunit_try_run_case+0x170/0x3f0
[   22.751894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.751955]  kthread+0x328/0x630
[   22.752006]  ret_from_fork+0x10/0x20
[   22.752064] 
[   22.752090] Allocated by task 274:
[   22.752128]  kasan_save_stack+0x3c/0x68
[   22.752181]  kasan_save_track+0x20/0x40
[   22.752228]  kasan_save_alloc_info+0x40/0x58
[   22.752273]  __kasan_kmalloc+0xd4/0xd8
[   22.752318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.752364]  kasan_atomics+0xb8/0x2e0
[   22.752408]  kunit_try_run_case+0x170/0x3f0
[   22.752455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.752504]  kthread+0x328/0x630
[   22.752544]  ret_from_fork+0x10/0x20
[   22.752587] 
[   22.752613] The buggy address belongs to the object at fff00000c63bc080
[   22.752613]  which belongs to the cache kmalloc-64 of size 64
[   22.754224] The buggy address is located 0 bytes to the right of
[   22.754224]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.754924] 
[   22.754967] The buggy address belongs to the physical page:
[   22.755429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.755515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.756009] page_type: f5(slab)
[   22.756168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.756545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.756603] page dumped because: kasan: bad access detected
[   22.756645] 
[   22.756674] Memory state around the buggy address:
[   22.756715]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756769]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.756822] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.756886]                                      ^
[   22.756932]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756985]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.757032] ==================================================================
[   22.787416] ==================================================================
[   22.787489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.787558] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.787618] 
[   22.787659] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.787761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.787796] Hardware name: linux,dummy-virt (DT)
[   22.787845] Call trace:
[   22.787878]  show_stack+0x20/0x38 (C)
[   22.787938]  dump_stack_lvl+0x8c/0xd0
[   22.787990]  print_report+0x118/0x608
[   22.788045]  kasan_report+0xdc/0x128
[   22.788100]  kasan_check_range+0x100/0x1a8
[   22.788154]  __kasan_check_write+0x20/0x30
[   22.788206]  kasan_atomics_helper+0x11f8/0x4858
[   22.788263]  kasan_atomics+0x198/0x2e0
[   22.788313]  kunit_try_run_case+0x170/0x3f0
[   22.788368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.789130]  kthread+0x328/0x630
[   22.789376]  ret_from_fork+0x10/0x20
[   22.789476] 
[   22.789660] Allocated by task 274:
[   22.789749]  kasan_save_stack+0x3c/0x68
[   22.790000]  kasan_save_track+0x20/0x40
[   22.790299]  kasan_save_alloc_info+0x40/0x58
[   22.790553]  __kasan_kmalloc+0xd4/0xd8
[   22.790897]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.790951]  kasan_atomics+0xb8/0x2e0
[   22.790997]  kunit_try_run_case+0x170/0x3f0
[   22.791707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.791764]  kthread+0x328/0x630
[   22.792024]  ret_from_fork+0x10/0x20
[   22.792075] 
[   22.792104] The buggy address belongs to the object at fff00000c63bc080
[   22.792104]  which belongs to the cache kmalloc-64 of size 64
[   22.792171] The buggy address is located 0 bytes to the right of
[   22.792171]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.792243] 
[   22.792268] The buggy address belongs to the physical page:
[   22.792315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.792416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.792469] page_type: f5(slab)
[   22.792517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.792609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.792703] page dumped because: kasan: bad access detected
[   22.792770] 
[   22.792795] Memory state around the buggy address:
[   22.792842]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.792901]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.792952] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.792996]                                      ^
[   22.793035]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793089]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793133] ==================================================================
[   22.843941] ==================================================================
[   22.844019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.844093] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.844158] 
[   22.844206] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.844312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.844349] Hardware name: linux,dummy-virt (DT)
[   22.844389] Call trace:
[   22.844423]  show_stack+0x20/0x38 (C)
[   22.844483]  dump_stack_lvl+0x8c/0xd0
[   22.844540]  print_report+0x118/0x608
[   22.844598]  kasan_report+0xdc/0x128
[   22.844649]  kasan_check_range+0x100/0x1a8
[   22.844704]  __kasan_check_write+0x20/0x30
[   22.844757]  kasan_atomics_helper+0x15b4/0x4858
[   22.844832]  kasan_atomics+0x198/0x2e0
[   22.844902]  kunit_try_run_case+0x170/0x3f0
[   22.844958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.845021]  kthread+0x328/0x630
[   22.845069]  ret_from_fork+0x10/0x20
[   22.845126] 
[   22.845154] Allocated by task 274:
[   22.845189]  kasan_save_stack+0x3c/0x68
[   22.845242]  kasan_save_track+0x20/0x40
[   22.845290]  kasan_save_alloc_info+0x40/0x58
[   22.845335]  __kasan_kmalloc+0xd4/0xd8
[   22.845380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.845428]  kasan_atomics+0xb8/0x2e0
[   22.845474]  kunit_try_run_case+0x170/0x3f0
[   22.845522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.845577]  kthread+0x328/0x630
[   22.845619]  ret_from_fork+0x10/0x20
[   22.845666] 
[   22.845693] The buggy address belongs to the object at fff00000c63bc080
[   22.845693]  which belongs to the cache kmalloc-64 of size 64
[   22.845764] The buggy address is located 0 bytes to the right of
[   22.845764]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.846556] 
[   22.846610] The buggy address belongs to the physical page:
[   22.846668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.846952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.847200] page_type: f5(slab)
[   22.847256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.847324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.847377] page dumped because: kasan: bad access detected
[   22.847548] 
[   22.847597] Memory state around the buggy address:
[   22.847646]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.847977]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.848226] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.848283]                                      ^
[   22.848642]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.848898]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.848982] ==================================================================
[   22.894814] ==================================================================
[   22.894882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.894993] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.895097] 
[   22.895177] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.895347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.895407] Hardware name: linux,dummy-virt (DT)
[   22.895457] Call trace:
[   22.895487]  show_stack+0x20/0x38 (C)
[   22.895541]  dump_stack_lvl+0x8c/0xd0
[   22.895595]  print_report+0x118/0x608
[   22.895646]  kasan_report+0xdc/0x128
[   22.895697]  kasan_check_range+0x100/0x1a8
[   22.895750]  __kasan_check_write+0x20/0x30
[   22.895802]  kasan_atomics_helper+0x17ec/0x4858
[   22.895865]  kasan_atomics+0x198/0x2e0
[   22.895918]  kunit_try_run_case+0x170/0x3f0
[   22.895971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.896102]  kthread+0x328/0x630
[   22.896161]  ret_from_fork+0x10/0x20
[   22.896217] 
[   22.896244] Allocated by task 274:
[   22.896279]  kasan_save_stack+0x3c/0x68
[   22.896328]  kasan_save_track+0x20/0x40
[   22.896374]  kasan_save_alloc_info+0x40/0x58
[   22.896416]  __kasan_kmalloc+0xd4/0xd8
[   22.896474]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.896553]  kasan_atomics+0xb8/0x2e0
[   22.896653]  kunit_try_run_case+0x170/0x3f0
[   22.896784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.897028]  kthread+0x328/0x630
[   22.897070]  ret_from_fork+0x10/0x20
[   22.897113] 
[   22.897141] The buggy address belongs to the object at fff00000c63bc080
[   22.897141]  which belongs to the cache kmalloc-64 of size 64
[   22.897439] The buggy address is located 0 bytes to the right of
[   22.897439]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.897844] 
[   22.897893] The buggy address belongs to the physical page:
[   22.897940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.898006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.898068] page_type: f5(slab)
[   22.898467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.898636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.898798] page dumped because: kasan: bad access detected
[   22.898856] 
[   22.898895] Memory state around the buggy address:
[   22.899091]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899364]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.899508] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.899561]                                      ^
[   22.899607]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899815]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899876] ==================================================================
[   22.875210] ==================================================================
[   22.875270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.875338] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.875415] 
[   22.875488] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.875663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.875724] Hardware name: linux,dummy-virt (DT)
[   22.875777] Call trace:
[   22.875808]  show_stack+0x20/0x38 (C)
[   22.875887]  dump_stack_lvl+0x8c/0xd0
[   22.876000]  print_report+0x118/0x608
[   22.876052]  kasan_report+0xdc/0x128
[   22.876105]  __asan_report_load8_noabort+0x20/0x30
[   22.876159]  kasan_atomics_helper+0x3e10/0x4858
[   22.876211]  kasan_atomics+0x198/0x2e0
[   22.876264]  kunit_try_run_case+0x170/0x3f0
[   22.876318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.876385]  kthread+0x328/0x630
[   22.876476]  ret_from_fork+0x10/0x20
[   22.876563] 
[   22.876589] Allocated by task 274:
[   22.876625]  kasan_save_stack+0x3c/0x68
[   22.876718]  kasan_save_track+0x20/0x40
[   22.876850]  kasan_save_alloc_info+0x40/0x58
[   22.877130]  __kasan_kmalloc+0xd4/0xd8
[   22.877380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.877441]  kasan_atomics+0xb8/0x2e0
[   22.877484]  kunit_try_run_case+0x170/0x3f0
[   22.877528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.877578]  kthread+0x328/0x630
[   22.877941]  ret_from_fork+0x10/0x20
[   22.878002] 
[   22.878420] The buggy address belongs to the object at fff00000c63bc080
[   22.878420]  which belongs to the cache kmalloc-64 of size 64
[   22.878548] The buggy address is located 0 bytes to the right of
[   22.878548]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.878644] 
[   22.878676] The buggy address belongs to the physical page:
[   22.878715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.878775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.878832] page_type: f5(slab)
[   22.878893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.878952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.879423] page dumped because: kasan: bad access detected
[   22.879479] 
[   22.879907] Memory state around the buggy address:
[   22.879996]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.880057]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.880308] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.880703]                                      ^
[   22.880761]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.880859]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.881033] ==================================================================
[   22.698185] ==================================================================
[   22.698262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   22.698344] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.698413] 
[   22.698463] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.698575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.698614] Hardware name: linux,dummy-virt (DT)
[   22.698658] Call trace:
[   22.698691]  show_stack+0x20/0x38 (C)
[   22.698757]  dump_stack_lvl+0x8c/0xd0
[   22.698817]  print_report+0x118/0x608
[   22.700508]  kasan_report+0xdc/0x128
[   22.701056]  __asan_report_load4_noabort+0x20/0x30
[   22.701565]  kasan_atomics_helper+0x3e04/0x4858
[   22.701910]  kasan_atomics+0x198/0x2e0
[   22.702497]  kunit_try_run_case+0x170/0x3f0
[   22.702597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.702673]  kthread+0x328/0x630
[   22.702729]  ret_from_fork+0x10/0x20
[   22.702794] 
[   22.702823] Allocated by task 274:
[   22.702882]  kasan_save_stack+0x3c/0x68
[   22.704295]  kasan_save_track+0x20/0x40
[   22.704368]  kasan_save_alloc_info+0x40/0x58
[   22.704418]  __kasan_kmalloc+0xd4/0xd8
[   22.704466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.704517]  kasan_atomics+0xb8/0x2e0
[   22.704561]  kunit_try_run_case+0x170/0x3f0
[   22.704604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.704654]  kthread+0x328/0x630
[   22.704695]  ret_from_fork+0x10/0x20
[   22.704736] 
[   22.704766] The buggy address belongs to the object at fff00000c63bc080
[   22.704766]  which belongs to the cache kmalloc-64 of size 64
[   22.706393] The buggy address is located 0 bytes to the right of
[   22.706393]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.707073] 
[   22.707193] The buggy address belongs to the physical page:
[   22.707281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.707470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.707545] page_type: f5(slab)
[   22.707605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.707674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.707724] page dumped because: kasan: bad access detected
[   22.707762] 
[   22.707790] Memory state around the buggy address:
[   22.707828]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.707897]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.707950] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.707998]                                      ^
[   22.709560]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710004]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710067] ==================================================================
[   22.579748] ==================================================================
[   22.579822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.580216] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.580293] 
[   22.580566] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.580691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.580943] Hardware name: linux,dummy-virt (DT)
[   22.581007] Call trace:
[   22.581039]  show_stack+0x20/0x38 (C)
[   22.581144]  dump_stack_lvl+0x8c/0xd0
[   22.581241]  print_report+0x118/0x608
[   22.581401]  kasan_report+0xdc/0x128
[   22.581623]  __asan_report_load4_noabort+0x20/0x30
[   22.581693]  kasan_atomics_helper+0x42d8/0x4858
[   22.581767]  kasan_atomics+0x198/0x2e0
[   22.582024]  kunit_try_run_case+0x170/0x3f0
[   22.582095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.582207]  kthread+0x328/0x630
[   22.582263]  ret_from_fork+0x10/0x20
[   22.582362] 
[   22.582396] Allocated by task 274:
[   22.582436]  kasan_save_stack+0x3c/0x68
[   22.582494]  kasan_save_track+0x20/0x40
[   22.582545]  kasan_save_alloc_info+0x40/0x58
[   22.583879]  ret_from_fork+0x10/0x20
[   22.584227] 
[   22.584370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.585165] Memory state around the buggy address:
[   22.585949]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.587807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.588950]  __kasan_check_write+0x20/0x30
[   22.590333]  kasan_save_stack+0x3c/0x68
[   22.590683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.590736]  kasan_atomics+0xb8/0x2e0
[   22.590784]  kunit_try_run_case+0x170/0x3f0
[   22.590847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.590911]  kthread+0x328/0x630
[   22.590956]  ret_from_fork+0x10/0x20
[   22.591028] 
[   22.591058] The buggy address belongs to the object at fff00000c63bc080
[   22.591058]  which belongs to the cache kmalloc-64 of size 64
[   22.591149] The buggy address is located 0 bytes to the right of
[   22.591149]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.591234] 
[   22.591275] The buggy address belongs to the physical page:
[   22.591324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.591391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.591461] page_type: f5(slab)
[   22.591529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.591594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.591647] page dumped because: kasan: bad access detected
[   22.591691] 
[   22.591725] Memory state around the buggy address:
[   22.591774]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.591830]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.591925] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.591974]                                      ^
[   22.592019]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.592458]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.592535] ==================================================================
[   22.741423] ==================================================================
[   22.741481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   22.741548] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.741609] 
[   22.741652] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.741759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.741795] Hardware name: linux,dummy-virt (DT)
[   22.741860] Call trace:
[   22.741896]  show_stack+0x20/0x38 (C)
[   22.741959]  dump_stack_lvl+0x8c/0xd0
[   22.742021]  print_report+0x118/0x608
[   22.742081]  kasan_report+0xdc/0x128
[   22.742140]  kasan_check_range+0x100/0x1a8
[   22.742201]  __kasan_check_write+0x20/0x30
[   22.742260]  kasan_atomics_helper+0xeb8/0x4858
[   22.742320]  kasan_atomics+0x198/0x2e0
[   22.742375]  kunit_try_run_case+0x170/0x3f0
[   22.742434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.742498]  kthread+0x328/0x630
[   22.742547]  ret_from_fork+0x10/0x20
[   22.742608] 
[   22.742635] Allocated by task 274:
[   22.742674]  kasan_save_stack+0x3c/0x68
[   22.742730]  kasan_save_track+0x20/0x40
[   22.742781]  kasan_save_alloc_info+0x40/0x58
[   22.742832]  __kasan_kmalloc+0xd4/0xd8
[   22.742928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.742982]  kasan_atomics+0xb8/0x2e0
[   22.743243]  kunit_try_run_case+0x170/0x3f0
[   22.743304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.743361]  kthread+0x328/0x630
[   22.743405]  ret_from_fork+0x10/0x20
[   22.743452] 
[   22.743480] The buggy address belongs to the object at fff00000c63bc080
[   22.743480]  which belongs to the cache kmalloc-64 of size 64
[   22.743552] The buggy address is located 0 bytes to the right of
[   22.743552]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.743629] 
[   22.743657] The buggy address belongs to the physical page:
[   22.743751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.743821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.743896] page_type: f5(slab)
[   22.743948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.744050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.744144] page dumped because: kasan: bad access detected
[   22.744219] 
[   22.744275] Memory state around the buggy address:
[   22.744342]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744451]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.744507] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.744557]                                      ^
[   22.744600]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744657]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744706] ==================================================================
[   22.737776] ==================================================================
[   22.737881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   22.737964] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.738033] 
[   22.738082] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.738189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.738229] Hardware name: linux,dummy-virt (DT)
[   22.738274] Call trace:
[   22.738307]  show_stack+0x20/0x38 (C)
[   22.738373]  dump_stack_lvl+0x8c/0xd0
[   22.738435]  print_report+0x118/0x608
[   22.738496]  kasan_report+0xdc/0x128
[   22.738563]  __asan_report_store8_noabort+0x20/0x30
[   22.738678]  kasan_atomics_helper+0x3e5c/0x4858
[   22.738786]  kasan_atomics+0x198/0x2e0
[   22.738919]  kunit_try_run_case+0x170/0x3f0
[   22.738983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.739049]  kthread+0x328/0x630
[   22.739104]  ret_from_fork+0x10/0x20
[   22.739167] 
[   22.739194] Allocated by task 274:
[   22.739237]  kasan_save_stack+0x3c/0x68
[   22.739292]  kasan_save_track+0x20/0x40
[   22.739339]  kasan_save_alloc_info+0x40/0x58
[   22.739384]  __kasan_kmalloc+0xd4/0xd8
[   22.739436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.739520]  kasan_atomics+0xb8/0x2e0
[   22.739564]  kunit_try_run_case+0x170/0x3f0
[   22.739610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.739701]  kthread+0x328/0x630
[   22.739777]  ret_from_fork+0x10/0x20
[   22.739859] 
[   22.739887] The buggy address belongs to the object at fff00000c63bc080
[   22.739887]  which belongs to the cache kmalloc-64 of size 64
[   22.739955] The buggy address is located 0 bytes to the right of
[   22.739955]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.740026] 
[   22.740052] The buggy address belongs to the physical page:
[   22.740092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.740153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.740213] page_type: f5(slab)
[   22.740311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.740377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.740427] page dumped because: kasan: bad access detected
[   22.740467] 
[   22.740490] Memory state around the buggy address:
[   22.740532]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740597]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740675] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.740722]                                      ^
[   22.740765]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740871]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740922] ==================================================================
[   22.594200] ==================================================================
[   22.594283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.594358] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.594422] 
[   22.594467] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.594574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.594609] Hardware name: linux,dummy-virt (DT)
[   22.594651] Call trace:
[   22.594685]  show_stack+0x20/0x38 (C)
[   22.594747]  dump_stack_lvl+0x8c/0xd0
[   22.594805]  print_report+0x118/0x608
[   22.594882]  kasan_report+0xdc/0x128
[   22.596118]  kasan_check_range+0x100/0x1a8
[   22.596230]  __kasan_check_write+0x20/0x30
[   22.596511]  kasan_atomics_helper+0x99c/0x4858
[   22.596611]  kasan_atomics+0x198/0x2e0
[   22.596677]  kunit_try_run_case+0x170/0x3f0
[   22.596955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.597057]  kthread+0x328/0x630
[   22.597144]  ret_from_fork+0x10/0x20
[   22.597211] 
[   22.597455] Allocated by task 274:
[   22.597519]  kasan_save_stack+0x3c/0x68
[   22.597589]  kasan_save_track+0x20/0x40
[   22.597652]  kasan_save_alloc_info+0x40/0x58
[   22.597699]  __kasan_kmalloc+0xd4/0xd8
[   22.597754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.597803]  kasan_atomics+0xb8/0x2e0
[   22.598106]  kunit_try_run_case+0x170/0x3f0
[   22.598208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.598481]  kthread+0x328/0x630
[   22.598539]  ret_from_fork+0x10/0x20
[   22.598846] 
[   22.598975] The buggy address belongs to the object at fff00000c63bc080
[   22.598975]  which belongs to the cache kmalloc-64 of size 64
[   22.599072] The buggy address is located 0 bytes to the right of
[   22.599072]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.599146] 
[   22.599305] The buggy address belongs to the physical page:
[   22.599502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.600441]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.600802]                                      ^
[   22.601134]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.603470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.604628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.606851] The buggy address is located 0 bytes to the right of
[   22.606851]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.607000] 
[   22.607032] The buggy address belongs to the physical page:
[   22.607614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.608137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.608276] page_type: f5(slab)
[   22.608441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.608523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.608576] page dumped because: kasan: bad access detected
[   22.608617] 
[   22.608642] Memory state around the buggy address:
[   22.608945]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609139]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.609223] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.609275]                                      ^
[   22.609469]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609530]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609582] ==================================================================
[   22.723352] ==================================================================
[   22.723429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   22.723499] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.723561] 
[   22.723613] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.723712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.723747] Hardware name: linux,dummy-virt (DT)
[   22.723787] Call trace:
[   22.723818]  show_stack+0x20/0x38 (C)
[   22.723898]  dump_stack_lvl+0x8c/0xd0
[   22.723957]  print_report+0x118/0x608
[   22.724013]  kasan_report+0xdc/0x128
[   22.724070]  __asan_report_load8_noabort+0x20/0x30
[   22.724595]  kasan_atomics_helper+0x3f58/0x4858
[   22.724939]  kasan_atomics+0x198/0x2e0
[   22.725016]  kunit_try_run_case+0x170/0x3f0
[   22.725122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.725337]  kthread+0x328/0x630
[   22.725406]  ret_from_fork+0x10/0x20
[   22.725659] 
[   22.725695] Allocated by task 274:
[   22.725743]  kasan_save_stack+0x3c/0x68
[   22.725822]  kasan_save_track+0x20/0x40
[   22.725892]  kasan_save_alloc_info+0x40/0x58
[   22.725944]  __kasan_kmalloc+0xd4/0xd8
[   22.726104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.726207]  kasan_atomics+0xb8/0x2e0
[   22.726475]  kunit_try_run_case+0x170/0x3f0
[   22.726616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.726715]  kthread+0x328/0x630
[   22.726762]  ret_from_fork+0x10/0x20
[   22.726808] 
[   22.726889] The buggy address belongs to the object at fff00000c63bc080
[   22.726889]  which belongs to the cache kmalloc-64 of size 64
[   22.726967] The buggy address is located 0 bytes to the right of
[   22.726967]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.727047] 
[   22.727080] The buggy address belongs to the physical page:
[   22.727225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.727520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.727587] page_type: f5(slab)
[   22.727689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.727815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.727922] page dumped because: kasan: bad access detected
[   22.727998] 
[   22.728044] Memory state around the buggy address:
[   22.728089]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728147]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.728204] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.728254]                                      ^
[   22.728554]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728633]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728753] ==================================================================
[   22.863314] ==================================================================
[   22.863384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.863454] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.863515] 
[   22.863561] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.863661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.863695] Hardware name: linux,dummy-virt (DT)
[   22.863736] Call trace:
[   22.863766]  show_stack+0x20/0x38 (C)
[   22.863826]  dump_stack_lvl+0x8c/0xd0
[   22.864954]  print_report+0x118/0x608
[   22.865087]  kasan_report+0xdc/0x128
[   22.865149]  __asan_report_load8_noabort+0x20/0x30
[   22.865205]  kasan_atomics_helper+0x3df4/0x4858
[   22.865274]  kasan_atomics+0x198/0x2e0
[   22.865353]  kunit_try_run_case+0x170/0x3f0
[   22.865425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.865519]  kthread+0x328/0x630
[   22.865592]  ret_from_fork+0x10/0x20
[   22.865654] 
[   22.865749] Allocated by task 274:
[   22.865792]  kasan_save_stack+0x3c/0x68
[   22.865872]  kasan_save_track+0x20/0x40
[   22.865936]  kasan_save_alloc_info+0x40/0x58
[   22.866002]  __kasan_kmalloc+0xd4/0xd8
[   22.866059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.866194]  kasan_atomics+0xb8/0x2e0
[   22.866248]  kunit_try_run_case+0x170/0x3f0
[   22.866298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.866354]  kthread+0x328/0x630
[   22.866398]  ret_from_fork+0x10/0x20
[   22.866444] 
[   22.866473] The buggy address belongs to the object at fff00000c63bc080
[   22.866473]  which belongs to the cache kmalloc-64 of size 64
[   22.867426] The buggy address is located 0 bytes to the right of
[   22.867426]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.867542] 
[   22.867722] The buggy address belongs to the physical page:
[   22.867886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.868008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.868221] page_type: f5(slab)
[   22.868341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.868819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.868887] page dumped because: kasan: bad access detected
[   22.869014] 
[   22.869111] Memory state around the buggy address:
[   22.869326]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869386]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.869439] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.869485]                                      ^
[   22.869527]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869599]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869644] ==================================================================
[   22.822688] ==================================================================
[   22.822978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.823060] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.823320] 
[   22.823580] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.823979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.824022] Hardware name: linux,dummy-virt (DT)
[   22.824068] Call trace:
[   22.824254]  show_stack+0x20/0x38 (C)
[   22.824343]  dump_stack_lvl+0x8c/0xd0
[   22.824492]  print_report+0x118/0x608
[   22.824549]  kasan_report+0xdc/0x128
[   22.824798]  kasan_check_range+0x100/0x1a8
[   22.824969]  __kasan_check_write+0x20/0x30
[   22.825030]  kasan_atomics_helper+0x147c/0x4858
[   22.825376]  kasan_atomics+0x198/0x2e0
[   22.825469]  kunit_try_run_case+0x170/0x3f0
[   22.825530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.825639]  kthread+0x328/0x630
[   22.825709]  ret_from_fork+0x10/0x20
[   22.825771] 
[   22.825801] Allocated by task 274:
[   22.825862]  kasan_save_stack+0x3c/0x68
[   22.825929]  kasan_save_track+0x20/0x40
[   22.825982]  kasan_save_alloc_info+0x40/0x58
[   22.826032]  __kasan_kmalloc+0xd4/0xd8
[   22.826083]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.826175]  kasan_atomics+0xb8/0x2e0
[   22.826251]  kunit_try_run_case+0x170/0x3f0
[   22.826317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826374]  kthread+0x328/0x630
[   22.826417]  ret_from_fork+0x10/0x20
[   22.826463] 
[   22.827985] The buggy address belongs to the object at fff00000c63bc080
[   22.827985]  which belongs to the cache kmalloc-64 of size 64
[   22.828175] The buggy address is located 0 bytes to the right of
[   22.828175]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.828539] 
[   22.828873] The buggy address belongs to the physical page:
[   22.829018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.829098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.829356] page_type: f5(slab)
[   22.829513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.829596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.829653] page dumped because: kasan: bad access detected
[   22.829698] 
[   22.829725] Memory state around the buggy address:
[   22.829769]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.829899]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.830294] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.830442]                                      ^
[   22.830497]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830631]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830696] ==================================================================
[   22.679674] ==================================================================
[   22.679744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   22.681588] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.682492] 
[   22.682787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.683415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.683592] Hardware name: linux,dummy-virt (DT)
[   22.683866] Call trace:
[   22.684172]  show_stack+0x20/0x38 (C)
[   22.684311]  dump_stack_lvl+0x8c/0xd0
[   22.684374]  print_report+0x118/0x608
[   22.685318]  kasan_report+0xdc/0x128
[   22.685574]  kasan_check_range+0x100/0x1a8
[   22.685646]  __kasan_check_write+0x20/0x30
[   22.685707]  kasan_atomics_helper+0xd3c/0x4858
[   22.685770]  kasan_atomics+0x198/0x2e0
[   22.686892]  kunit_try_run_case+0x170/0x3f0
[   22.687058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.687130]  kthread+0x328/0x630
[   22.687187]  ret_from_fork+0x10/0x20
[   22.687248] 
[   22.687279] Allocated by task 274:
[   22.688413]  kasan_save_stack+0x3c/0x68
[   22.688494]  kasan_save_track+0x20/0x40
[   22.688549]  kasan_save_alloc_info+0x40/0x58
[   22.689245]  __kasan_kmalloc+0xd4/0xd8
[   22.689333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.689400]  kasan_atomics+0xb8/0x2e0
[   22.690063]  kunit_try_run_case+0x170/0x3f0
[   22.690268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.690329]  kthread+0x328/0x630
[   22.690377]  ret_from_fork+0x10/0x20
[   22.690426] 
[   22.691134] The buggy address belongs to the object at fff00000c63bc080
[   22.691134]  which belongs to the cache kmalloc-64 of size 64
[   22.691382] The buggy address is located 0 bytes to the right of
[   22.691382]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.691950] 
[   22.692347] The buggy address belongs to the physical page:
[   22.692455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.692661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.692973] page_type: f5(slab)
[   22.693236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.693511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.693705] page dumped because: kasan: bad access detected
[   22.693991] 
[   22.694149] Memory state around the buggy address:
[   22.694235]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694303]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.694689] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.695212]                                      ^
[   22.695324]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695386]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695445] ==================================================================
[   22.711958] ==================================================================
[   22.712042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   22.712116] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.712182] 
[   22.712231] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.712342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.712381] Hardware name: linux,dummy-virt (DT)
[   22.712424] Call trace:
[   22.712458]  show_stack+0x20/0x38 (C)
[   22.712523]  dump_stack_lvl+0x8c/0xd0
[   22.712585]  print_report+0x118/0x608
[   22.712642]  kasan_report+0xdc/0x128
[   22.712700]  kasan_check_range+0x100/0x1a8
[   22.712762]  __kasan_check_read+0x20/0x30
[   22.712818]  kasan_atomics_helper+0xdd4/0x4858
[   22.714746]  kasan_atomics+0x198/0x2e0
[   22.714822]  kunit_try_run_case+0x170/0x3f0
[   22.715494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.715974]  kthread+0x328/0x630
[   22.716286]  ret_from_fork+0x10/0x20
[   22.716915] 
[   22.717231] Allocated by task 274:
[   22.717711]  kasan_save_stack+0x3c/0x68
[   22.718574]  kasan_save_track+0x20/0x40
[   22.718789]  kasan_save_alloc_info+0x40/0x58
[   22.719273]  __kasan_kmalloc+0xd4/0xd8
[   22.719363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.719455]  kasan_atomics+0xb8/0x2e0
[   22.719698]  kunit_try_run_case+0x170/0x3f0
[   22.719916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.719972]  kthread+0x328/0x630
[   22.720135]  ret_from_fork+0x10/0x20
[   22.720267] 
[   22.720341] The buggy address belongs to the object at fff00000c63bc080
[   22.720341]  which belongs to the cache kmalloc-64 of size 64
[   22.720414] The buggy address is located 0 bytes to the right of
[   22.720414]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.720485] 
[   22.720513] The buggy address belongs to the physical page:
[   22.720555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.720616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.720675] page_type: f5(slab)
[   22.720726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.720938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.721004] page dumped because: kasan: bad access detected
[   22.721046] 
[   22.721178] Memory state around the buggy address:
[   22.721257]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.721416]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.721473] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.721663]                                      ^
[   22.721718]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.721932]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.722006] ==================================================================
[   22.807589] ==================================================================
[   22.807664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.807735] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.807982] 
[   22.808058] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.808186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.808224] Hardware name: linux,dummy-virt (DT)
[   22.808268] Call trace:
[   22.808301]  show_stack+0x20/0x38 (C)
[   22.808374]  dump_stack_lvl+0x8c/0xd0
[   22.808432]  print_report+0x118/0x608
[   22.808491]  kasan_report+0xdc/0x128
[   22.808547]  kasan_check_range+0x100/0x1a8
[   22.808606]  __kasan_check_write+0x20/0x30
[   22.808663]  kasan_atomics_helper+0x1384/0x4858
[   22.808722]  kasan_atomics+0x198/0x2e0
[   22.808782]  kunit_try_run_case+0x170/0x3f0
[   22.808858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.808925]  kthread+0x328/0x630
[   22.808973]  ret_from_fork+0x10/0x20
[   22.809032] 
[   22.809061] Allocated by task 274:
[   22.809096]  kasan_save_stack+0x3c/0x68
[   22.809150]  kasan_save_track+0x20/0x40
[   22.809197]  kasan_save_alloc_info+0x40/0x58
[   22.809241]  __kasan_kmalloc+0xd4/0xd8
[   22.809286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.809333]  kasan_atomics+0xb8/0x2e0
[   22.809379]  kunit_try_run_case+0x170/0x3f0
[   22.809426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.809477]  kthread+0x328/0x630
[   22.809520]  ret_from_fork+0x10/0x20
[   22.809565] 
[   22.809591] The buggy address belongs to the object at fff00000c63bc080
[   22.809591]  which belongs to the cache kmalloc-64 of size 64
[   22.809660] The buggy address is located 0 bytes to the right of
[   22.809660]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.809739] 
[   22.809767] The buggy address belongs to the physical page:
[   22.810324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.810407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.810591] page_type: f5(slab)
[   22.810657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.810981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.811048] page dumped because: kasan: bad access detected
[   22.811092] 
[   22.811262] Memory state around the buggy address:
[   22.811313]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811370]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811423] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.811512]                                      ^
[   22.811567]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811618]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811663] ==================================================================
[   22.817251] ==================================================================
[   22.817457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.817528] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.817609] 
[   22.817654] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.817751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.817782] Hardware name: linux,dummy-virt (DT)
[   22.817844] Call trace:
[   22.817881]  show_stack+0x20/0x38 (C)
[   22.818175]  dump_stack_lvl+0x8c/0xd0
[   22.818255]  print_report+0x118/0x608
[   22.818317]  kasan_report+0xdc/0x128
[   22.818752]  kasan_check_range+0x100/0x1a8
[   22.818865]  __kasan_check_write+0x20/0x30
[   22.818936]  kasan_atomics_helper+0x1414/0x4858
[   22.818998]  kasan_atomics+0x198/0x2e0
[   22.819050]  kunit_try_run_case+0x170/0x3f0
[   22.819106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819165]  kthread+0x328/0x630
[   22.819214]  ret_from_fork+0x10/0x20
[   22.819270] 
[   22.819298] Allocated by task 274:
[   22.819333]  kasan_save_stack+0x3c/0x68
[   22.819384]  kasan_save_track+0x20/0x40
[   22.819430]  kasan_save_alloc_info+0x40/0x58
[   22.819474]  __kasan_kmalloc+0xd4/0xd8
[   22.819517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.819562]  kasan_atomics+0xb8/0x2e0
[   22.819604]  kunit_try_run_case+0x170/0x3f0
[   22.819650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819701]  kthread+0x328/0x630
[   22.819740]  ret_from_fork+0x10/0x20
[   22.819783] 
[   22.819808] The buggy address belongs to the object at fff00000c63bc080
[   22.819808]  which belongs to the cache kmalloc-64 of size 64
[   22.819886] The buggy address is located 0 bytes to the right of
[   22.819886]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.819960] 
[   22.819986] The buggy address belongs to the physical page:
[   22.820026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.820083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.820138] page_type: f5(slab)
[   22.820185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.820247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.820295] page dumped because: kasan: bad access detected
[   22.820334] 
[   22.820358] Memory state around the buggy address:
[   22.820398]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820450]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.820500] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.820545]                                      ^
[   22.820588]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820640]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820686] ==================================================================
[   22.870856] ==================================================================
[   22.870983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.871065] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.871130] 
[   22.871175] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.871276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.871311] Hardware name: linux,dummy-virt (DT)
[   22.871349] Call trace:
[   22.871382]  show_stack+0x20/0x38 (C)
[   22.871440]  dump_stack_lvl+0x8c/0xd0
[   22.871495]  print_report+0x118/0x608
[   22.871549]  kasan_report+0xdc/0x128
[   22.871603]  kasan_check_range+0x100/0x1a8
[   22.871660]  __kasan_check_write+0x20/0x30
[   22.871711]  kasan_atomics_helper+0x16d0/0x4858
[   22.871768]  kasan_atomics+0x198/0x2e0
[   22.871824]  kunit_try_run_case+0x170/0x3f0
[   22.871943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.872211]  kthread+0x328/0x630
[   22.872296]  ret_from_fork+0x10/0x20
[   22.872358] 
[   22.872386] Allocated by task 274:
[   22.872423]  kasan_save_stack+0x3c/0x68
[   22.872475]  kasan_save_track+0x20/0x40
[   22.872521]  kasan_save_alloc_info+0x40/0x58
[   22.872564]  __kasan_kmalloc+0xd4/0xd8
[   22.872607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.872653]  kasan_atomics+0xb8/0x2e0
[   22.872695]  kunit_try_run_case+0x170/0x3f0
[   22.872738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.872788]  kthread+0x328/0x630
[   22.872825]  ret_from_fork+0x10/0x20
[   22.872887] 
[   22.872913] The buggy address belongs to the object at fff00000c63bc080
[   22.872913]  which belongs to the cache kmalloc-64 of size 64
[   22.872978] The buggy address is located 0 bytes to the right of
[   22.872978]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.873047] 
[   22.873075] The buggy address belongs to the physical page:
[   22.873112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.873171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.873226] page_type: f5(slab)
[   22.873270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.873327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.873375] page dumped because: kasan: bad access detected
[   22.873413] 
[   22.873436] Memory state around the buggy address:
[   22.873474]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.873523]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.873692] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.873884]                                      ^
[   22.873946]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.874004]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.874604] ==================================================================
[   22.836736] ==================================================================
[   22.836866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.836952] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.837017] 
[   22.837063] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.837981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.838023] Hardware name: linux,dummy-virt (DT)
[   22.838066] Call trace:
[   22.838102]  show_stack+0x20/0x38 (C)
[   22.838168]  dump_stack_lvl+0x8c/0xd0
[   22.838229]  print_report+0x118/0x608
[   22.838290]  kasan_report+0xdc/0x128
[   22.838348]  kasan_check_range+0x100/0x1a8
[   22.838409]  __kasan_check_write+0x20/0x30
[   22.838468]  kasan_atomics_helper+0x154c/0x4858
[   22.838530]  kasan_atomics+0x198/0x2e0
[   22.838590]  kunit_try_run_case+0x170/0x3f0
[   22.838652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.838720]  kthread+0x328/0x630
[   22.838773]  ret_from_fork+0x10/0x20
[   22.838852] 
[   22.838889] Allocated by task 274:
[   22.838930]  kasan_save_stack+0x3c/0x68
[   22.838990]  kasan_save_track+0x20/0x40
[   22.839043]  kasan_save_alloc_info+0x40/0x58
[   22.839162]  __kasan_kmalloc+0xd4/0xd8
[   22.839477]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.839590]  kasan_atomics+0xb8/0x2e0
[   22.839645]  kunit_try_run_case+0x170/0x3f0
[   22.839700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.839758]  kthread+0x328/0x630
[   22.839805]  ret_from_fork+0x10/0x20
[   22.839868] 
[   22.839900] The buggy address belongs to the object at fff00000c63bc080
[   22.839900]  which belongs to the cache kmalloc-64 of size 64
[   22.839976] The buggy address is located 0 bytes to the right of
[   22.839976]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.840969] 
[   22.841013] The buggy address belongs to the physical page:
[   22.841063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.841142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.841514] page_type: f5(slab)
[   22.841613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.841877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.841977] page dumped because: kasan: bad access detected
[   22.842035] 
[   22.842067] Memory state around the buggy address:
[   22.842151]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842333]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.842454] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.842506]                                      ^
[   22.842738]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842816]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842883] ==================================================================
[   22.888082] ==================================================================
[   22.888206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.888334] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.888394] 
[   22.888435] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.888532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.888564] Hardware name: linux,dummy-virt (DT)
[   22.888603] Call trace:
[   22.888631]  show_stack+0x20/0x38 (C)
[   22.888692]  dump_stack_lvl+0x8c/0xd0
[   22.888742]  print_report+0x118/0x608
[   22.888817]  kasan_report+0xdc/0x128
[   22.888884]  __asan_report_load8_noabort+0x20/0x30
[   22.888941]  kasan_atomics_helper+0x3e20/0x4858
[   22.889227]  kasan_atomics+0x198/0x2e0
[   22.889342]  kunit_try_run_case+0x170/0x3f0
[   22.889414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.889607]  kthread+0x328/0x630
[   22.889690]  ret_from_fork+0x10/0x20
[   22.889799] 
[   22.889891] Allocated by task 274:
[   22.889938]  kasan_save_stack+0x3c/0x68
[   22.889995]  kasan_save_track+0x20/0x40
[   22.890043]  kasan_save_alloc_info+0x40/0x58
[   22.890088]  __kasan_kmalloc+0xd4/0xd8
[   22.890142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.890189]  kasan_atomics+0xb8/0x2e0
[   22.890460]  kunit_try_run_case+0x170/0x3f0
[   22.890517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890568]  kthread+0x328/0x630
[   22.890655]  ret_from_fork+0x10/0x20
[   22.890743] 
[   22.890772] The buggy address belongs to the object at fff00000c63bc080
[   22.890772]  which belongs to the cache kmalloc-64 of size 64
[   22.890860] The buggy address is located 0 bytes to the right of
[   22.890860]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.890999] 
[   22.891036] The buggy address belongs to the physical page:
[   22.891073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.891348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.891593] page_type: f5(slab)
[   22.891642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.892169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.892439] page dumped because: kasan: bad access detected
[   22.892489] 
[   22.892961] Memory state around the buggy address:
[   22.893175]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.893334]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.893739] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.893948]                                      ^
[   22.894002]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.894058]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.894109] ==================================================================
[   22.611167] ==================================================================
[   22.611245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.611318] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.611381] 
[   22.611977] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.612312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.612381] Hardware name: linux,dummy-virt (DT)
[   22.612576] Call trace:
[   22.612617]  show_stack+0x20/0x38 (C)
[   22.612686]  dump_stack_lvl+0x8c/0xd0
[   22.612746]  print_report+0x118/0x608
[   22.612814]  kasan_report+0xdc/0x128
[   22.612883]  kasan_check_range+0x100/0x1a8
[   22.613213]  __kasan_check_write+0x20/0x30
[   22.613557]  kasan_atomics_helper+0xa6c/0x4858
[   22.613633]  kasan_atomics+0x198/0x2e0
[   22.613757]  kunit_try_run_case+0x170/0x3f0
[   22.613879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.614018]  kthread+0x328/0x630
[   22.614080]  ret_from_fork+0x10/0x20
[   22.614427] 
[   22.614460] Allocated by task 274:
[   22.614511]  kasan_save_stack+0x3c/0x68
[   22.614624]  kasan_save_track+0x20/0x40
[   22.614712]  kasan_save_alloc_info+0x40/0x58
[   22.614767]  __kasan_kmalloc+0xd4/0xd8
[   22.614979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.615194]  kasan_atomics+0xb8/0x2e0
[   22.615253]  kunit_try_run_case+0x170/0x3f0
[   22.615377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.615442]  kthread+0x328/0x630
[   22.615769]  ret_from_fork+0x10/0x20
[   22.615862] 
[   22.615905] The buggy address belongs to the object at fff00000c63bc080
[   22.615905]  which belongs to the cache kmalloc-64 of size 64
[   22.615977] The buggy address is located 0 bytes to the right of
[   22.615977]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.616597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.616661] page_type: f5(slab)
[   22.616726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.616970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.617180] page dumped because: kasan: bad access detected
[   22.617236] 
[   22.618230]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.620681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.623978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.624337] page_type: f5(slab)
[   22.624426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.624489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.624540] page dumped because: kasan: bad access detected
[   22.624593] 
[   22.624643] Memory state around the buggy address:
[   22.624687]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.624741]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.625246]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.626359] 
[   22.626510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.627720]  __asan_report_load4_noabort+0x20/0x30
[   22.628989]  __kasan_kmalloc+0xd4/0xd8
[   22.629580] 
[   22.629764] page_type: f5(slab)
[   22.629858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.630256] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.631602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   22.632621] Call trace:
[   22.634498]  kthread+0x328/0x630
[   22.636171] The buggy address belongs to the object at fff00000c63bc080
[   22.636171]  which belongs to the cache kmalloc-64 of size 64
[   22.637790]                                      ^
[   22.639848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.641000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.641973]  kthread+0x328/0x630
[   22.642552] page_type: f5(slab)
[   22.642608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.642926]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.643119]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.643756] 
[   22.644006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.644388]  kasan_report+0xdc/0x128
[   22.644960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645925]  ret_from_fork+0x10/0x20
[   22.646393] page_type: f5(slab)
[   22.646439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.646499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.646801]                                      ^
[   22.647669] ==================================================================
[   22.881792] ==================================================================
[   22.882008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.882217] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.882327] 
[   22.882540] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.882691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.882767] Hardware name: linux,dummy-virt (DT)
[   22.882915] Call trace:
[   22.882949]  show_stack+0x20/0x38 (C)
[   22.883010]  dump_stack_lvl+0x8c/0xd0
[   22.883142]  print_report+0x118/0x608
[   22.883411]  kasan_report+0xdc/0x128
[   22.883555]  kasan_check_range+0x100/0x1a8
[   22.883638]  __kasan_check_write+0x20/0x30
[   22.883807]  kasan_atomics_helper+0x175c/0x4858
[   22.883880]  kasan_atomics+0x198/0x2e0
[   22.883994]  kunit_try_run_case+0x170/0x3f0
[   22.884154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.884265]  kthread+0x328/0x630
[   22.884313]  ret_from_fork+0x10/0x20
[   22.884369] 
[   22.884396] Allocated by task 274:
[   22.884432]  kasan_save_stack+0x3c/0x68
[   22.884483]  kasan_save_track+0x20/0x40
[   22.884528]  kasan_save_alloc_info+0x40/0x58
[   22.884571]  __kasan_kmalloc+0xd4/0xd8
[   22.884612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.884658]  kasan_atomics+0xb8/0x2e0
[   22.884698]  kunit_try_run_case+0x170/0x3f0
[   22.884983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.885050]  kthread+0x328/0x630
[   22.885091]  ret_from_fork+0x10/0x20
[   22.885182] 
[   22.885209] The buggy address belongs to the object at fff00000c63bc080
[   22.885209]  which belongs to the cache kmalloc-64 of size 64
[   22.885275] The buggy address is located 0 bytes to the right of
[   22.885275]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.885346] 
[   22.885374] The buggy address belongs to the physical page:
[   22.885411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.885470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.885592] page_type: f5(slab)
[   22.885645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.885861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.886161] page dumped because: kasan: bad access detected
[   22.886220] 
[   22.886557] Memory state around the buggy address:
[   22.886625]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.886683]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.886737] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.886860]                                      ^
[   22.887059]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.887225]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.887278] ==================================================================
[   22.666756] ==================================================================
[   22.666847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   22.666928] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.666995] 
[   22.667042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.667149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.667188] Hardware name: linux,dummy-virt (DT)
[   22.667232] Call trace:
[   22.667265]  show_stack+0x20/0x38 (C)
[   22.667327]  dump_stack_lvl+0x8c/0xd0
[   22.667388]  print_report+0x118/0x608
[   22.667448]  kasan_report+0xdc/0x128
[   22.667508]  __asan_report_load4_noabort+0x20/0x30
[   22.667566]  kasan_atomics_helper+0x3dd8/0x4858
[   22.667625]  kasan_atomics+0x198/0x2e0
[   22.667677]  kunit_try_run_case+0x170/0x3f0
[   22.667735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.670692]  kthread+0x328/0x630
[   22.671646]  ret_from_fork+0x10/0x20
[   22.672493] 
[   22.672573] Allocated by task 274:
[   22.673092]  kasan_save_stack+0x3c/0x68
[   22.673282]  kasan_save_track+0x20/0x40
[   22.673413]  kasan_save_alloc_info+0x40/0x58
[   22.673462]  __kasan_kmalloc+0xd4/0xd8
[   22.673507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.673554]  kasan_atomics+0xb8/0x2e0
[   22.674341]  kunit_try_run_case+0x170/0x3f0
[   22.674612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.674682]  kthread+0x328/0x630
[   22.675112]  ret_from_fork+0x10/0x20
[   22.675244] 
[   22.675275] The buggy address belongs to the object at fff00000c63bc080
[   22.675275]  which belongs to the cache kmalloc-64 of size 64
[   22.675345] The buggy address is located 0 bytes to the right of
[   22.675345]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.675422] 
[   22.675450] The buggy address belongs to the physical page:
[   22.675488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.675558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.675617] page_type: f5(slab)
[   22.675666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.675727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.675776] page dumped because: kasan: bad access detected
[   22.675817] 
[   22.677058] Memory state around the buggy address:
[   22.677486]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.677669]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.678042] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.678498]                                      ^
[   22.678871]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.678939]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.678993] ==================================================================
[   22.774812] ==================================================================
[   22.774901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.774971] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.775033] 
[   22.775230] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.775377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.775418] Hardware name: linux,dummy-virt (DT)
[   22.775459] Call trace:
[   22.775491]  show_stack+0x20/0x38 (C)
[   22.775557]  dump_stack_lvl+0x8c/0xd0
[   22.775612]  print_report+0x118/0x608
[   22.775669]  kasan_report+0xdc/0x128
[   22.775722]  kasan_check_range+0x100/0x1a8
[   22.775780]  __kasan_check_write+0x20/0x30
[   22.775831]  kasan_atomics_helper+0x1128/0x4858
[   22.775901]  kasan_atomics+0x198/0x2e0
[   22.775956]  kunit_try_run_case+0x170/0x3f0
[   22.776012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.776074]  kthread+0x328/0x630
[   22.776122]  ret_from_fork+0x10/0x20
[   22.776181] 
[   22.776209] Allocated by task 274:
[   22.776247]  kasan_save_stack+0x3c/0x68
[   22.776300]  kasan_save_track+0x20/0x40
[   22.776345]  kasan_save_alloc_info+0x40/0x58
[   22.776391]  __kasan_kmalloc+0xd4/0xd8
[   22.776437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.776484]  kasan_atomics+0xb8/0x2e0
[   22.776527]  kunit_try_run_case+0x170/0x3f0
[   22.776572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.776624]  kthread+0x328/0x630
[   22.776664]  ret_from_fork+0x10/0x20
[   22.776706] 
[   22.776731] The buggy address belongs to the object at fff00000c63bc080
[   22.776731]  which belongs to the cache kmalloc-64 of size 64
[   22.776796] The buggy address is located 0 bytes to the right of
[   22.776796]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.777511] 
[   22.777599] The buggy address belongs to the physical page:
[   22.777644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.777709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.777764] page_type: f5(slab)
[   22.777823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.777903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.777961] page dumped because: kasan: bad access detected
[   22.778004] 
[   22.778032] Memory state around the buggy address:
[   22.778074]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778204]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.778433] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.778488]                                      ^
[   22.778826]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778899]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.779091] ==================================================================
[   22.769697] ==================================================================
[   22.769772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.769901] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.769967] 
[   22.770010] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.770107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.770139] Hardware name: linux,dummy-virt (DT)
[   22.770177] Call trace:
[   22.770206]  show_stack+0x20/0x38 (C)
[   22.770260]  dump_stack_lvl+0x8c/0xd0
[   22.770317]  print_report+0x118/0x608
[   22.770368]  kasan_report+0xdc/0x128
[   22.770417]  kasan_check_range+0x100/0x1a8
[   22.770471]  __kasan_check_write+0x20/0x30
[   22.770522]  kasan_atomics_helper+0x10c0/0x4858
[   22.770577]  kasan_atomics+0x198/0x2e0
[   22.770627]  kunit_try_run_case+0x170/0x3f0
[   22.770682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.770740]  kthread+0x328/0x630
[   22.770788]  ret_from_fork+0x10/0x20
[   22.770852] 
[   22.770879] Allocated by task 274:
[   22.770914]  kasan_save_stack+0x3c/0x68
[   22.770966]  kasan_save_track+0x20/0x40
[   22.771013]  kasan_save_alloc_info+0x40/0x58
[   22.771056]  __kasan_kmalloc+0xd4/0xd8
[   22.771097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.771144]  kasan_atomics+0xb8/0x2e0
[   22.771186]  kunit_try_run_case+0x170/0x3f0
[   22.771450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.771719]  kthread+0x328/0x630
[   22.772145]  ret_from_fork+0x10/0x20
[   22.772202] 
[   22.772229] The buggy address belongs to the object at fff00000c63bc080
[   22.772229]  which belongs to the cache kmalloc-64 of size 64
[   22.772304] The buggy address is located 0 bytes to the right of
[   22.772304]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.772511] 
[   22.772539] The buggy address belongs to the physical page:
[   22.772578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.772644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.772703] page_type: f5(slab)
[   22.772747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.772983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.773190] page dumped because: kasan: bad access detected
[   22.773311] 
[   22.773339] Memory state around the buggy address:
[   22.773384]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773437]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.773486] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.773534]                                      ^
[   22.773576]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773626]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773858] ==================================================================
[   22.799628] ==================================================================
[   22.799772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.799856] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.799919] 
[   22.799961] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.800162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.800198] Hardware name: linux,dummy-virt (DT)
[   22.800241] Call trace:
[   22.800270]  show_stack+0x20/0x38 (C)
[   22.800328]  dump_stack_lvl+0x8c/0xd0
[   22.800461]  print_report+0x118/0x608
[   22.800528]  kasan_report+0xdc/0x128
[   22.800583]  kasan_check_range+0x100/0x1a8
[   22.800636]  __kasan_check_write+0x20/0x30
[   22.800688]  kasan_atomics_helper+0x12d8/0x4858
[   22.800744]  kasan_atomics+0x198/0x2e0
[   22.801313]  kunit_try_run_case+0x170/0x3f0
[   22.801407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.801472]  kthread+0x328/0x630
[   22.801522]  ret_from_fork+0x10/0x20
[   22.801746] 
[   22.801779] Allocated by task 274:
[   22.801849]  kasan_save_stack+0x3c/0x68
[   22.802356]  kasan_save_track+0x20/0x40
[   22.802606]  kasan_save_alloc_info+0x40/0x58
[   22.802693]  __kasan_kmalloc+0xd4/0xd8
[   22.802899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.802961]  kasan_atomics+0xb8/0x2e0
[   22.803009]  kunit_try_run_case+0x170/0x3f0
[   22.803058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.803387]  kthread+0x328/0x630
[   22.803802]  ret_from_fork+0x10/0x20
[   22.803903] 
[   22.804031] The buggy address belongs to the object at fff00000c63bc080
[   22.804031]  which belongs to the cache kmalloc-64 of size 64
[   22.804327] The buggy address is located 0 bytes to the right of
[   22.804327]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.804598] 
[   22.804632] The buggy address belongs to the physical page:
[   22.804681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.804742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.805005] page_type: f5(slab)
[   22.805091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.805162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.805381] page dumped because: kasan: bad access detected
[   22.805429] 
[   22.805465] Memory state around the buggy address:
[   22.805702]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.805786]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.806121] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.806299]                                      ^
[   22.806368]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806620]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806692] ==================================================================
[   22.832226] ==================================================================
[   22.832317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.832434] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.832540] 
[   22.832594] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.832860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.832944] Hardware name: linux,dummy-virt (DT)
[   22.832985] Call trace:
[   22.833020]  show_stack+0x20/0x38 (C)
[   22.833086]  dump_stack_lvl+0x8c/0xd0
[   22.833147]  print_report+0x118/0x608
[   22.833206]  kasan_report+0xdc/0x128
[   22.833262]  kasan_check_range+0x100/0x1a8
[   22.833336]  __kasan_check_write+0x20/0x30
[   22.833403]  kasan_atomics_helper+0x14e4/0x4858
[   22.833511]  kasan_atomics+0x198/0x2e0
[   22.833611]  kunit_try_run_case+0x170/0x3f0
[   22.833670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.833735]  kthread+0x328/0x630
[   22.833787]  ret_from_fork+0x10/0x20
[   22.833875] 
[   22.833908] Allocated by task 274:
[   22.833947]  kasan_save_stack+0x3c/0x68
[   22.834006]  kasan_save_track+0x20/0x40
[   22.834057]  kasan_save_alloc_info+0x40/0x58
[   22.834115]  __kasan_kmalloc+0xd4/0xd8
[   22.834197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.834248]  kasan_atomics+0xb8/0x2e0
[   22.834295]  kunit_try_run_case+0x170/0x3f0
[   22.834344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.834409]  kthread+0x328/0x630
[   22.834476]  ret_from_fork+0x10/0x20
[   22.834523] 
[   22.834551] The buggy address belongs to the object at fff00000c63bc080
[   22.834551]  which belongs to the cache kmalloc-64 of size 64
[   22.834692] The buggy address is located 0 bytes to the right of
[   22.834692]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.834823] 
[   22.834866] The buggy address belongs to the physical page:
[   22.834912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.834976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.835038] page_type: f5(slab)
[   22.835089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.835154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.835206] page dumped because: kasan: bad access detected
[   22.835516] 
[   22.835577] Memory state around the buggy address:
[   22.835817]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.835893]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835953] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.836004]                                      ^
[   22.836052]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836108]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836157] ==================================================================
[   22.855638] ==================================================================
[   22.855706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.855776] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.856081] 
[   22.856138] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.856252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.856288] Hardware name: linux,dummy-virt (DT)
[   22.856331] Call trace:
[   22.856362]  show_stack+0x20/0x38 (C)
[   22.856656]  dump_stack_lvl+0x8c/0xd0
[   22.856734]  print_report+0x118/0x608
[   22.857036]  kasan_report+0xdc/0x128
[   22.857129]  kasan_check_range+0x100/0x1a8
[   22.857204]  __kasan_check_write+0x20/0x30
[   22.857262]  kasan_atomics_helper+0x1644/0x4858
[   22.857321]  kasan_atomics+0x198/0x2e0
[   22.857375]  kunit_try_run_case+0x170/0x3f0
[   22.857433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.857494]  kthread+0x328/0x630
[   22.857544]  ret_from_fork+0x10/0x20
[   22.857601] 
[   22.857630] Allocated by task 274:
[   22.858075]  kasan_save_stack+0x3c/0x68
[   22.858341]  kasan_save_track+0x20/0x40
[   22.858973]  kasan_save_alloc_info+0x40/0x58
[   22.859354]  __kasan_kmalloc+0xd4/0xd8
[   22.859777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.859968]  kasan_atomics+0xb8/0x2e0
[   22.860026]  kunit_try_run_case+0x170/0x3f0
[   22.860586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.860667]  kthread+0x328/0x630
[   22.860711]  ret_from_fork+0x10/0x20
[   22.860756] 
[   22.861040] The buggy address belongs to the object at fff00000c63bc080
[   22.861040]  which belongs to the cache kmalloc-64 of size 64
[   22.861213] The buggy address is located 0 bytes to the right of
[   22.861213]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.861526] 
[   22.861565] The buggy address belongs to the physical page:
[   22.861607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.861701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.861775] page_type: f5(slab)
[   22.861937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.862016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.862253] page dumped because: kasan: bad access detected
[   22.862299] 
[   22.862326] Memory state around the buggy address:
[   22.862378]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862436]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.862489] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.862537]                                      ^
[   22.862578]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862632]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862679] ==================================================================
[   22.812132] ==================================================================
[   22.812229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.812319] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.812398] 
[   22.812478] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.812607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.812643] Hardware name: linux,dummy-virt (DT)
[   22.812681] Call trace:
[   22.812712]  show_stack+0x20/0x38 (C)
[   22.812769]  dump_stack_lvl+0x8c/0xd0
[   22.812823]  print_report+0x118/0x608
[   22.812894]  kasan_report+0xdc/0x128
[   22.812951]  __asan_report_load8_noabort+0x20/0x30
[   22.813009]  kasan_atomics_helper+0x3f04/0x4858
[   22.813066]  kasan_atomics+0x198/0x2e0
[   22.813117]  kunit_try_run_case+0x170/0x3f0
[   22.813174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.813238]  kthread+0x328/0x630
[   22.813290]  ret_from_fork+0x10/0x20
[   22.813357] 
[   22.813412] Allocated by task 274:
[   22.813477]  kasan_save_stack+0x3c/0x68
[   22.813566]  kasan_save_track+0x20/0x40
[   22.813653]  kasan_save_alloc_info+0x40/0x58
[   22.813736]  __kasan_kmalloc+0xd4/0xd8
[   22.813822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.813945]  kasan_atomics+0xb8/0x2e0
[   22.814176]  kunit_try_run_case+0x170/0x3f0
[   22.814455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.814529]  kthread+0x328/0x630
[   22.814574]  ret_from_fork+0x10/0x20
[   22.814633] 
[   22.814680] The buggy address belongs to the object at fff00000c63bc080
[   22.814680]  which belongs to the cache kmalloc-64 of size 64
[   22.814757] The buggy address is located 0 bytes to the right of
[   22.814757]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.814922] 
[   22.814956] The buggy address belongs to the physical page:
[   22.815018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.815139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.815198] page_type: f5(slab)
[   22.815251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.815311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.815444] page dumped because: kasan: bad access detected
[   22.815491] 
[   22.815526] Memory state around the buggy address:
[   22.815602]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815661]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.815715] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.815774]                                      ^
[   22.815856]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815914]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   22.356518] ==================================================================
[   22.357911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.358556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.358597] Hardware name: linux,dummy-virt (DT)
[   22.358641] Call trace:
[   22.358674]  show_stack+0x20/0x38 (C)
[   22.358742]  dump_stack_lvl+0x8c/0xd0
[   22.359424]  __kasan_check_write+0x20/0x30
[   22.360558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.360631]  kthread+0x328/0x630
[   22.360688]  ret_from_fork+0x10/0x20
[   22.360753] 
[   22.361071] Allocated by task 270:
[   22.361141]  kasan_save_stack+0x3c/0x68
[   22.361213]  kasan_save_track+0x20/0x40
[   22.361514]  kasan_bitops_generic+0xa0/0x1c8
[   22.361981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.362085]  kthread+0x328/0x630
[   22.362544] 
[   22.362925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.362992] page_type: f5(slab)
[   22.363049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.363219] 
[   22.364034]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.364145] ==================================================================
[   22.303351] ==================================================================
[   22.303594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.303844] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270
[   22.304132] 
[   22.304352] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.304615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.304654] Hardware name: linux,dummy-virt (DT)
[   22.304965] Call trace:
[   22.305029]  show_stack+0x20/0x38 (C)
[   22.305106]  dump_stack_lvl+0x8c/0xd0
[   22.305168]  print_report+0x118/0x608
[   22.305224]  kasan_report+0xdc/0x128
[   22.305413]  kasan_check_range+0x100/0x1a8
[   22.305618]  __kasan_check_write+0x20/0x30
[   22.305733]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.305847]  kasan_bitops_generic+0x110/0x1c8
[   22.305913]  kunit_try_run_case+0x170/0x3f0
[   22.306030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.306123]  kthread+0x328/0x630
[   22.306645]  ret_from_fork+0x10/0x20
[   22.306850] 
[   22.306887] Allocated by task 270:
[   22.306931]  kasan_save_stack+0x3c/0x68
[   22.307050]  kasan_save_track+0x20/0x40
[   22.307105]  kasan_save_alloc_info+0x40/0x58
[   22.307540]  __kasan_kmalloc+0xd4/0xd8
[   22.307623]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.307745]  kasan_bitops_generic+0xa0/0x1c8
[   22.308074]  kunit_try_run_case+0x170/0x3f0
[   22.308161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.308347]  kthread+0x328/0x630
[   22.308392]  ret_from_fork+0x10/0x20
[   22.308656] 
[   22.308740] The buggy address belongs to the object at fff00000c63971e0
[   22.308740]  which belongs to the cache kmalloc-16 of size 16
[   22.308818] The buggy address is located 8 bytes inside of
[   22.308818]  allocated 9-byte region [fff00000c63971e0, fff00000c63971e9)
[   22.308900] 
[   22.308929] The buggy address belongs to the physical page:
[   22.309040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   22.309114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.309301] page_type: f5(slab)
[   22.309357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.309614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.309848] page dumped because: kasan: bad access detected
[   22.309899] 
[   22.309986] Memory state around the buggy address:
[   22.310145]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   22.310209]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.310278] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   22.310332]                                                           ^
[   22.310385]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.310437]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.310485] ==================================================================
[   22.325783] ==================================================================
[   22.325886] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.325969] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270
[   22.326037] 
[   22.326086] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.326197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.326237] Hardware name: linux,dummy-virt (DT)
[   22.326279] Call trace:
[   22.326314]  show_stack+0x20/0x38 (C)
[   22.326413]  dump_stack_lvl+0x8c/0xd0
[   22.326531]  print_report+0x118/0x608
[   22.326613]  kasan_report+0xdc/0x128
[   22.326776]  __asan_report_load8_noabort+0x20/0x30
[   22.326913]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.326988]  kasan_bitops_generic+0x110/0x1c8
[   22.327056]  kunit_try_run_case+0x170/0x3f0
[   22.327118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.327188]  kthread+0x328/0x630
[   22.327243]  ret_from_fork+0x10/0x20
[   22.327309] 
[   22.327372] Allocated by task 270:
[   22.327429]  kasan_save_stack+0x3c/0x68
[   22.327492]  kasan_save_track+0x20/0x40
[   22.327545]  kasan_save_alloc_info+0x40/0x58
[   22.327595]  __kasan_kmalloc+0xd4/0xd8
[   22.327644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.327696]  kasan_bitops_generic+0xa0/0x1c8
[   22.327745]  kunit_try_run_case+0x170/0x3f0
[   22.327796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.327863]  kthread+0x328/0x630
[   22.327910]  ret_from_fork+0x10/0x20
[   22.327958] 
[   22.327987] The buggy address belongs to the object at fff00000c63971e0
[   22.327987]  which belongs to the cache kmalloc-16 of size 16
[   22.328060] The buggy address is located 8 bytes inside of
[   22.328060]  allocated 9-byte region [fff00000c63971e0, fff00000c63971e9)
[   22.328136] 
[   22.328164] The buggy address belongs to the physical page:
[   22.328205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   22.328272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.328336] page_type: f5(slab)
[   22.328390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.329428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.329625] page dumped because: kasan: bad access detected
[   22.329690] 
[   22.329719] Memory state around the buggy address:
[   22.329782]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   22.329876]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.330034] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   22.330218]                                                           ^
[   22.331331] ==================================================================
[   22.318263] ==================================================================
[   22.318550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   22.318649] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270
[   22.318896] 
[   22.319008] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.319314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.319491] Hardware name: linux,dummy-virt (DT)
[   22.319549] Call trace:
[   22.319685]  show_stack+0x20/0x38 (C)
[   22.319758]  dump_stack_lvl+0x8c/0xd0
[   22.319825]  print_report+0x118/0x608
[   22.319899]  kasan_report+0xdc/0x128
[   22.319959]  kasan_check_range+0x100/0x1a8
[   22.320020]  __kasan_check_write+0x20/0x30
[   22.320076]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   22.320141]  kasan_bitops_generic+0x110/0x1c8
[   22.320202]  kunit_try_run_case+0x170/0x3f0
[   22.320260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.320325]  kthread+0x328/0x630
[   22.320379]  ret_from_fork+0x10/0x20
[   22.320439] 
[   22.320471] Allocated by task 270:
[   22.320512]  kasan_save_stack+0x3c/0x68
[   22.320569]  kasan_save_track+0x20/0x40
[   22.320621]  kasan_save_alloc_info+0x40/0x58
[   22.320671]  __kasan_kmalloc+0xd4/0xd8
[   22.320720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.320771]  kasan_bitops_generic+0xa0/0x1c8
[   22.321188]  kunit_try_run_case+0x170/0x3f0
[   22.321248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.321437]  kthread+0x328/0x630
[   22.321491]  ret_from_fork+0x10/0x20
[   22.321682] 
[   22.321722] The buggy address belongs to the object at fff00000c63971e0
[   22.321722]  which belongs to the cache kmalloc-16 of size 16
[   22.321805] The buggy address is located 8 bytes inside of
[   22.321805]  allocated 9-byte region [fff00000c63971e0, fff00000c63971e9)
[   22.321928] 
[   22.321978] The buggy address belongs to the physical page:
[   22.322025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   22.322550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.322653] page_type: f5(slab)
[   22.322723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.323056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.323401] page dumped because: kasan: bad access detected
[   22.323500] 
[   22.323531] Memory state around the buggy address:
[   22.323584]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   22.323658]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.323717] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   22.323771]                                                           ^
[   22.324206]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324298]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324413] ==================================================================
[   22.313776] ==================================================================
[   22.313879] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   22.313966] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270
[   22.314032] 
[   22.314083] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.314195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.314230] Hardware name: linux,dummy-virt (DT)
[   22.314273] Call trace:
[   22.314305]  show_stack+0x20/0x38 (C)
[   22.314370]  dump_stack_lvl+0x8c/0xd0
[   22.314431]  print_report+0x118/0x608
[   22.314489]  kasan_report+0xdc/0x128
[   22.314549]  __asan_report_load8_noabort+0x20/0x30
[   22.314610]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   22.314673]  kasan_bitops_generic+0x110/0x1c8
[   22.314734]  kunit_try_run_case+0x170/0x3f0
[   22.314795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.314873]  kthread+0x328/0x630
[   22.314931]  ret_from_fork+0x10/0x20
[   22.314994] 
[   22.315023] Allocated by task 270:
[   22.315063]  kasan_save_stack+0x3c/0x68
[   22.315118]  kasan_save_track+0x20/0x40
[   22.315168]  kasan_save_alloc_info+0x40/0x58
[   22.315216]  __kasan_kmalloc+0xd4/0xd8
[   22.315265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.315316]  kasan_bitops_generic+0xa0/0x1c8
[   22.315366]  kunit_try_run_case+0x170/0x3f0
[   22.315414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.315467]  kthread+0x328/0x630
[   22.315510]  ret_from_fork+0x10/0x20
[   22.315557] 
[   22.315584] The buggy address belongs to the object at fff00000c63971e0
[   22.315584]  which belongs to the cache kmalloc-16 of size 16
[   22.315657] The buggy address is located 8 bytes inside of
[   22.315657]  allocated 9-byte region [fff00000c63971e0, fff00000c63971e9)
[   22.315730] 
[   22.315758] The buggy address belongs to the physical page:
[   22.315802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   22.316302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.316376] page_type: f5(slab)
[   22.316477] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.316627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.316679] page dumped because: kasan: bad access detected
[   22.316872] 
[   22.316919] Memory state around the buggy address:
[   22.316974]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   22.317169]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.317294] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   22.317376]                                                           ^
[   22.317449]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.317511]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.317563] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   24.704599] ==================================================================
[   24.704823] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   24.704823] 
[   24.705050] Invalid free of 0x000000001ebf7f92 (in kfence-#129):
[   24.705158]  test_double_free+0x100/0x238
[   24.705256]  kunit_try_run_case+0x170/0x3f0
[   24.705350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.705456]  kthread+0x328/0x630
[   24.705551]  ret_from_fork+0x10/0x20
[   24.705649] 
[   24.705730] kfence-#129: 0x000000001ebf7f92-0x000000008e97aa79, size=32, cache=test
[   24.705730] 
[   24.705900] allocated by task 314 on cpu 0 at 24.703849s (0.002043s ago):
[   24.706098]  test_alloc+0x230/0x628
[   24.706235]  test_double_free+0xd4/0x238
[   24.706337]  kunit_try_run_case+0x170/0x3f0
[   24.706467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.706585]  kthread+0x328/0x630
[   24.706687]  ret_from_fork+0x10/0x20
[   24.706820] 
[   24.707162] freed by task 314 on cpu 0 at 24.704241s (0.002909s ago):
[   24.707452]  test_double_free+0xf0/0x238
[   24.707860]  kunit_try_run_case+0x170/0x3f0
[   24.708061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.708176]  kthread+0x328/0x630
[   24.708341]  ret_from_fork+0x10/0x20
[   24.708460] 
[   24.708645] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.708885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.708929] Hardware name: linux,dummy-virt (DT)
[   24.708973] ==================================================================
[   24.604831] ==================================================================
[   24.605164] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   24.605164] 
[   24.605335] Invalid free of 0x00000000695655a6 (in kfence-#128):
[   24.605470]  test_double_free+0x1bc/0x238
[   24.606163]  kunit_try_run_case+0x170/0x3f0
[   24.606442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.606657]  kthread+0x328/0x630
[   24.606824]  ret_from_fork+0x10/0x20
[   24.607428] 
[   24.607514] kfence-#128: 0x00000000695655a6-0x00000000207fc1e4, size=32, cache=kmalloc-32
[   24.607514] 
[   24.607855] allocated by task 312 on cpu 0 at 24.600437s (0.007315s ago):
[   24.608288]  test_alloc+0x29c/0x628
[   24.609689]  test_double_free+0xd4/0x238
[   24.609996]  kunit_try_run_case+0x170/0x3f0
[   24.610158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.610276]  kthread+0x328/0x630
[   24.610950]  ret_from_fork+0x10/0x20
[   24.611444] 
[   24.611523] freed by task 312 on cpu 0 at 24.603058s (0.008455s ago):
[   24.611815]  test_double_free+0x1ac/0x238
[   24.612336]  kunit_try_run_case+0x170/0x3f0
[   24.612467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.612580]  kthread+0x328/0x630
[   24.612855]  ret_from_fork+0x10/0x20
[   24.613355] 
[   24.613544] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.613902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.614313] Hardware name: linux,dummy-virt (DT)
[   24.614500] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   24.286530] ==================================================================
[   24.286685] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   24.286685] 
[   24.286881] Use-after-free read at 0x0000000094f13ee0 (in kfence-#125):
[   24.287003]  test_use_after_free_read+0x114/0x248
[   24.287113]  kunit_try_run_case+0x170/0x3f0
[   24.287217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.287325]  kthread+0x328/0x630
[   24.287421]  ret_from_fork+0x10/0x20
[   24.287511] 
[   24.287570] kfence-#125: 0x0000000094f13ee0-0x00000000c80bc3a1, size=32, cache=test
[   24.287570] 
[   24.287693] allocated by task 306 on cpu 0 at 24.285970s (0.001715s ago):
[   24.287852]  test_alloc+0x230/0x628
[   24.287956]  test_use_after_free_read+0xd0/0x248
[   24.288055]  kunit_try_run_case+0x170/0x3f0
[   24.288154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.288265]  kthread+0x328/0x630
[   24.288352]  ret_from_fork+0x10/0x20
[   24.288435] 
[   24.288751] freed by task 306 on cpu 0 at 24.286316s (0.002425s ago):
[   24.289247]  test_use_after_free_read+0xf0/0x248
[   24.289515]  kunit_try_run_case+0x170/0x3f0
[   24.289604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.289734]  kthread+0x328/0x630
[   24.289831]  ret_from_fork+0x10/0x20
[   24.290131] 
[   24.290261] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.290479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.290561] Hardware name: linux,dummy-virt (DT)
[   24.290657] ==================================================================
[   24.183967] ==================================================================
[   24.184365] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   24.184365] 
[   24.184574] Use-after-free read at 0x0000000003ad17ab (in kfence-#124):
[   24.184691]  test_use_after_free_read+0x114/0x248
[   24.185379]  kunit_try_run_case+0x170/0x3f0
[   24.185917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.186124]  kthread+0x328/0x630
[   24.186287]  ret_from_fork+0x10/0x20
[   24.186407] 
[   24.186474] kfence-#124: 0x0000000003ad17ab-0x00000000e7a88a39, size=32, cache=kmalloc-32
[   24.186474] 
[   24.186963] allocated by task 304 on cpu 0 at 24.182958s (0.003992s ago):
[   24.187212]  test_alloc+0x29c/0x628
[   24.187365]  test_use_after_free_read+0xd0/0x248
[   24.187666]  kunit_try_run_case+0x170/0x3f0
[   24.187941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.188242]  kthread+0x328/0x630
[   24.188501]  ret_from_fork+0x10/0x20
[   24.188628] 
[   24.189524] freed by task 304 on cpu 0 at 24.183096s (0.005649s ago):
[   24.189876]  test_use_after_free_read+0x1c0/0x248
[   24.190218]  kunit_try_run_case+0x170/0x3f0
[   24.190347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.190472]  kthread+0x328/0x630
[   24.190753]  ret_from_fork+0x10/0x20
[   24.191093] 
[   24.191203] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.191396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.191466] Hardware name: linux,dummy-virt (DT)
[   24.191550] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   23.974920] ==================================================================
[   23.975097] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   23.975097] 
[   23.975299] Out-of-bounds write at 0x000000006695e6cc (1B left of kfence-#122):
[   23.975438]  test_out_of_bounds_write+0x100/0x240
[   23.975557]  kunit_try_run_case+0x170/0x3f0
[   23.975665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.975775]  kthread+0x328/0x630
[   23.976457]  ret_from_fork+0x10/0x20
[   23.976870] 
[   23.976985] kfence-#122: 0x00000000cf10b9d1-0x00000000d129ebab, size=32, cache=kmalloc-32
[   23.976985] 
[   23.977121] allocated by task 300 on cpu 0 at 23.974619s (0.002494s ago):
[   23.977263]  test_alloc+0x29c/0x628
[   23.977350]  test_out_of_bounds_write+0xc8/0x240
[   23.977451]  kunit_try_run_case+0x170/0x3f0
[   23.977548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.977655]  kthread+0x328/0x630
[   23.977748]  ret_from_fork+0x10/0x20
[   23.977890] 
[   23.978003] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.978485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.978738] Hardware name: linux,dummy-virt (DT)
[   23.978863] ==================================================================
[   24.078253] ==================================================================
[   24.078416] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   24.078416] 
[   24.078609] Out-of-bounds write at 0x00000000c391947e (1B left of kfence-#123):
[   24.078744]  test_out_of_bounds_write+0x100/0x240
[   24.078871]  kunit_try_run_case+0x170/0x3f0
[   24.078971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.079079]  kthread+0x328/0x630
[   24.079540]  ret_from_fork+0x10/0x20
[   24.079701] 
[   24.079787] kfence-#123: 0x000000006be936b0-0x0000000055171e5f, size=32, cache=test
[   24.079787] 
[   24.079941] allocated by task 302 on cpu 0 at 24.078071s (0.001862s ago):
[   24.080097]  test_alloc+0x230/0x628
[   24.080471]  test_out_of_bounds_write+0xc8/0x240
[   24.080572]  kunit_try_run_case+0x170/0x3f0
[   24.080681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.080854]  kthread+0x328/0x630
[   24.080940]  ret_from_fork+0x10/0x20
[   24.081271] 
[   24.081404] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   24.081583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.081691] Hardware name: linux,dummy-virt (DT)
[   24.081790] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   23.456819] ==================================================================
[   23.457284] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   23.457284] 
[   23.457708] Out-of-bounds read at 0x00000000f1f2ce27 (1B left of kfence-#117):
[   23.458079]  test_out_of_bounds_read+0x114/0x3e0
[   23.458260]  kunit_try_run_case+0x170/0x3f0
[   23.458486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.458713]  kthread+0x328/0x630
[   23.459311]  ret_from_fork+0x10/0x20
[   23.459486] 
[   23.459570] kfence-#117: 0x00000000d9689ed3-0x000000003981d47a, size=32, cache=test
[   23.459570] 
[   23.459729] allocated by task 298 on cpu 0 at 23.456401s (0.003317s ago):
[   23.460047]  test_alloc+0x230/0x628
[   23.460151]  test_out_of_bounds_read+0xdc/0x3e0
[   23.460248]  kunit_try_run_case+0x170/0x3f0
[   23.460490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.461179]  kthread+0x328/0x630
[   23.461879]  ret_from_fork+0x10/0x20
[   23.462032] 
[   23.462144] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.462354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.462433] Hardware name: linux,dummy-virt (DT)
[   23.462516] ==================================================================
[   23.662709] ==================================================================
[   23.662896] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   23.662896] 
[   23.663087] Out-of-bounds read at 0x000000007367968e (32B right of kfence-#119):
[   23.663223]  test_out_of_bounds_read+0x1c8/0x3e0
[   23.663337]  kunit_try_run_case+0x170/0x3f0
[   23.663439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.664226]  kthread+0x328/0x630
[   23.664465]  ret_from_fork+0x10/0x20
[   23.664621] 
[   23.664684] kfence-#119: 0x000000008d825099-0x00000000f5b2b1ac, size=32, cache=test
[   23.664684] 
[   23.664901] allocated by task 298 on cpu 0 at 23.662356s (0.002529s ago):
[   23.665118]  test_alloc+0x230/0x628
[   23.665255]  test_out_of_bounds_read+0x198/0x3e0
[   23.665377]  kunit_try_run_case+0x170/0x3f0
[   23.665482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.665595]  kthread+0x328/0x630
[   23.665690]  ret_from_fork+0x10/0x20
[   23.665794] 
[   23.666137] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.666425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.666553] Hardware name: linux,dummy-virt (DT)
[   23.666648] ==================================================================
[   23.246764] ==================================================================
[   23.247234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   23.247234] 
[   23.247669] Out-of-bounds read at 0x0000000061e957e1 (32B right of kfence-#115):
[   23.247867]  test_out_of_bounds_read+0x1c8/0x3e0
[   23.248000]  kunit_try_run_case+0x170/0x3f0
[   23.248094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.248230]  kthread+0x328/0x630
[   23.248349]  ret_from_fork+0x10/0x20
[   23.248477] 
[   23.248553] kfence-#115: 0x00000000ee79e16a-0x0000000086056930, size=32, cache=kmalloc-32
[   23.248553] 
[   23.248712] allocated by task 296 on cpu 0 at 23.246059s (0.002645s ago):
[   23.248900]  test_alloc+0x29c/0x628
[   23.249249]  test_out_of_bounds_read+0x198/0x3e0
[   23.249364]  kunit_try_run_case+0x170/0x3f0
[   23.249448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.249548]  kthread+0x328/0x630
[   23.249888]  ret_from_fork+0x10/0x20
[   23.250056] 
[   23.250169] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.250372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.250449] Hardware name: linux,dummy-virt (DT)
[   23.250529] ==================================================================
[   23.146145] ==================================================================
[   23.146413] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   23.146413] 
[   23.146874] Out-of-bounds read at 0x00000000dfc949be (1B left of kfence-#114):
[   23.147611]  test_out_of_bounds_read+0x114/0x3e0
[   23.147787]  kunit_try_run_case+0x170/0x3f0
[   23.147956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.148065]  kthread+0x328/0x630
[   23.148157]  ret_from_fork+0x10/0x20
[   23.148256] 
[   23.148597] kfence-#114: 0x00000000a9522aec-0x00000000e68fb61e, size=32, cache=kmalloc-32
[   23.148597] 
[   23.149233] allocated by task 296 on cpu 0 at 23.143628s (0.005498s ago):
[   23.150355]  test_alloc+0x29c/0x628
[   23.150723]  test_out_of_bounds_read+0xdc/0x3e0
[   23.150882]  kunit_try_run_case+0x170/0x3f0
[   23.151153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.151481]  kthread+0x328/0x630
[   23.151574]  ret_from_fork+0x10/0x20
[   23.152093] 
[   23.152423] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.152742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.153031] Hardware name: linux,dummy-virt (DT)
[   23.153288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   23.046942] ==================================================================
[   23.047021] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   23.047100] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.047166] 
[   23.047210] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.047318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.047358] Hardware name: linux,dummy-virt (DT)
[   23.047398] Call trace:
[   23.047429]  show_stack+0x20/0x38 (C)
[   23.047493]  dump_stack_lvl+0x8c/0xd0
[   23.047550]  print_report+0x118/0x608
[   23.047605]  kasan_report+0xdc/0x128
[   23.047657]  kasan_check_range+0x100/0x1a8
[   23.047709]  __kasan_check_write+0x20/0x30
[   23.047761]  strncpy_from_user+0x3c/0x2a0
[   23.047814]  copy_user_test_oob+0x5c0/0xec8
[   23.048502]  kunit_try_run_case+0x170/0x3f0
[   23.048645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.048999]  kthread+0x328/0x630
[   23.049060]  ret_from_fork+0x10/0x20
[   23.049273] 
[   23.049303] Allocated by task 294:
[   23.049339]  kasan_save_stack+0x3c/0x68
[   23.049542]  kasan_save_track+0x20/0x40
[   23.049604]  kasan_save_alloc_info+0x40/0x58
[   23.049869]  __kasan_kmalloc+0xd4/0xd8
[   23.049924]  __kmalloc_noprof+0x198/0x4c8
[   23.050297]  kunit_kmalloc_array+0x34/0x88
[   23.050479]  copy_user_test_oob+0xac/0xec8
[   23.050758]  kunit_try_run_case+0x170/0x3f0
[   23.050910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.050975]  kthread+0x328/0x630
[   23.051018]  ret_from_fork+0x10/0x20
[   23.051075] 
[   23.051101] The buggy address belongs to the object at fff00000c6587700
[   23.051101]  which belongs to the cache kmalloc-128 of size 128
[   23.051171] The buggy address is located 0 bytes inside of
[   23.051171]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.051241] 
[   23.051269] The buggy address belongs to the physical page:
[   23.051308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.051369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.051427] page_type: f5(slab)
[   23.051738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.051829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.051968] page dumped because: kasan: bad access detected
[   23.052109] 
[   23.052149] Memory state around the buggy address:
[   23.052216]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.052380]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.052459] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.052663]                                                                 ^
[   23.052859]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.053017]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.053066] ==================================================================
[   23.054527] ==================================================================
[   23.054993] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   23.055075] Write of size 1 at addr fff00000c6587778 by task kunit_try_catch/294
[   23.055275] 
[   23.055364] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.055602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.055812] Hardware name: linux,dummy-virt (DT)
[   23.055999] Call trace:
[   23.056038]  show_stack+0x20/0x38 (C)
[   23.056103]  dump_stack_lvl+0x8c/0xd0
[   23.056156]  print_report+0x118/0x608
[   23.056211]  kasan_report+0xdc/0x128
[   23.056262]  __asan_report_store1_noabort+0x20/0x30
[   23.056317]  strncpy_from_user+0x270/0x2a0
[   23.056370]  copy_user_test_oob+0x5c0/0xec8
[   23.056424]  kunit_try_run_case+0x170/0x3f0
[   23.056478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.056535]  kthread+0x328/0x630
[   23.056584]  ret_from_fork+0x10/0x20
[   23.056637] 
[   23.056663] Allocated by task 294:
[   23.056701]  kasan_save_stack+0x3c/0x68
[   23.056751]  kasan_save_track+0x20/0x40
[   23.056795]  kasan_save_alloc_info+0x40/0x58
[   23.056891]  __kasan_kmalloc+0xd4/0xd8
[   23.056940]  __kmalloc_noprof+0x198/0x4c8
[   23.057000]  kunit_kmalloc_array+0x34/0x88
[   23.057085]  copy_user_test_oob+0xac/0xec8
[   23.057130]  kunit_try_run_case+0x170/0x3f0
[   23.057189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.057244]  kthread+0x328/0x630
[   23.057281]  ret_from_fork+0x10/0x20
[   23.057324] 
[   23.057349] The buggy address belongs to the object at fff00000c6587700
[   23.057349]  which belongs to the cache kmalloc-128 of size 128
[   23.057416] The buggy address is located 0 bytes to the right of
[   23.057416]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.057484] 
[   23.057511] The buggy address belongs to the physical page:
[   23.057551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.057615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.057705] page_type: f5(slab)
[   23.057784] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.057898] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.057955] page dumped because: kasan: bad access detected
[   23.057999] 
[   23.058027] Memory state around the buggy address:
[   23.058066]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.058120]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.058170] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.058216]                                                                 ^
[   23.058264]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.058371]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.058431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   23.010499] ==================================================================
[   23.010577] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   23.010657] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.010718] 
[   23.010765] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.010901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.010938] Hardware name: linux,dummy-virt (DT)
[   23.010979] Call trace:
[   23.011156]  show_stack+0x20/0x38 (C)
[   23.011249]  dump_stack_lvl+0x8c/0xd0
[   23.011307]  print_report+0x118/0x608
[   23.011361]  kasan_report+0xdc/0x128
[   23.011415]  kasan_check_range+0x100/0x1a8
[   23.011500]  __kasan_check_read+0x20/0x30
[   23.011574]  copy_user_test_oob+0x728/0xec8
[   23.011631]  kunit_try_run_case+0x170/0x3f0
[   23.011690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.011805]  kthread+0x328/0x630
[   23.011932]  ret_from_fork+0x10/0x20
[   23.011997] 
[   23.012022] Allocated by task 294:
[   23.012061]  kasan_save_stack+0x3c/0x68
[   23.012111]  kasan_save_track+0x20/0x40
[   23.012159]  kasan_save_alloc_info+0x40/0x58
[   23.012201]  __kasan_kmalloc+0xd4/0xd8
[   23.012246]  __kmalloc_noprof+0x198/0x4c8
[   23.012290]  kunit_kmalloc_array+0x34/0x88
[   23.012335]  copy_user_test_oob+0xac/0xec8
[   23.012379]  kunit_try_run_case+0x170/0x3f0
[   23.012423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.012475]  kthread+0x328/0x630
[   23.012515]  ret_from_fork+0x10/0x20
[   23.012559] 
[   23.012584] The buggy address belongs to the object at fff00000c6587700
[   23.012584]  which belongs to the cache kmalloc-128 of size 128
[   23.012653] The buggy address is located 0 bytes inside of
[   23.012653]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.012724] 
[   23.012753] The buggy address belongs to the physical page:
[   23.012794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.012870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.012959] page_type: f5(slab)
[   23.013009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.013112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.013172] page dumped because: kasan: bad access detected
[   23.013218] 
[   23.013245] Memory state around the buggy address:
[   23.013306]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.013365]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.013422] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.013472]                                                                 ^
[   23.013522]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.013576]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.013641] ==================================================================
[   22.999532] ==================================================================
[   22.999649] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   22.999754] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   22.999822] 
[   23.000225] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.000534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.000573] Hardware name: linux,dummy-virt (DT)
[   23.000980] Call trace:
[   23.001103]  show_stack+0x20/0x38 (C)
[   23.001312]  dump_stack_lvl+0x8c/0xd0
[   23.001405]  print_report+0x118/0x608
[   23.001557]  kasan_report+0xdc/0x128
[   23.001633]  kasan_check_range+0x100/0x1a8
[   23.001695]  __kasan_check_write+0x20/0x30
[   23.001814]  copy_user_test_oob+0x234/0xec8
[   23.001887]  kunit_try_run_case+0x170/0x3f0
[   23.001954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.002020]  kthread+0x328/0x630
[   23.002074]  ret_from_fork+0x10/0x20
[   23.002142] 
[   23.002170] Allocated by task 294:
[   23.002209]  kasan_save_stack+0x3c/0x68
[   23.002278]  kasan_save_track+0x20/0x40
[   23.002328]  kasan_save_alloc_info+0x40/0x58
[   23.002557]  __kasan_kmalloc+0xd4/0xd8
[   23.002642]  __kmalloc_noprof+0x198/0x4c8
[   23.002693]  kunit_kmalloc_array+0x34/0x88
[   23.002740]  copy_user_test_oob+0xac/0xec8
[   23.002788]  kunit_try_run_case+0x170/0x3f0
[   23.002849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.002906]  kthread+0x328/0x630
[   23.003167]  ret_from_fork+0x10/0x20
[   23.003297] 
[   23.003334] The buggy address belongs to the object at fff00000c6587700
[   23.003334]  which belongs to the cache kmalloc-128 of size 128
[   23.003449] The buggy address is located 0 bytes inside of
[   23.003449]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.003523] 
[   23.003553] The buggy address belongs to the physical page:
[   23.003597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.003668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.003731] page_type: f5(slab)
[   23.003787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.003863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.003915] page dumped because: kasan: bad access detected
[   23.003954] 
[   23.003980] Memory state around the buggy address:
[   23.004034]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.004089]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.004316] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.004485]                                                                 ^
[   23.004638]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.004701]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.004778] ==================================================================
[   23.031851] ==================================================================
[   23.031906] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   23.031965] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.032023] 
[   23.032064] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.032163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.032197] Hardware name: linux,dummy-virt (DT)
[   23.032238] Call trace:
[   23.032267]  show_stack+0x20/0x38 (C)
[   23.032325]  dump_stack_lvl+0x8c/0xd0
[   23.032376]  print_report+0x118/0x608
[   23.032429]  kasan_report+0xdc/0x128
[   23.032481]  kasan_check_range+0x100/0x1a8
[   23.033050]  __kasan_check_write+0x20/0x30
[   23.033136]  copy_user_test_oob+0x434/0xec8
[   23.033544]  kunit_try_run_case+0x170/0x3f0
[   23.033623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.033886]  kthread+0x328/0x630
[   23.033989]  ret_from_fork+0x10/0x20
[   23.034057] 
[   23.034188] Allocated by task 294:
[   23.034307]  kasan_save_stack+0x3c/0x68
[   23.034368]  kasan_save_track+0x20/0x40
[   23.034417]  kasan_save_alloc_info+0x40/0x58
[   23.034465]  __kasan_kmalloc+0xd4/0xd8
[   23.034514]  __kmalloc_noprof+0x198/0x4c8
[   23.034692]  kunit_kmalloc_array+0x34/0x88
[   23.034749]  copy_user_test_oob+0xac/0xec8
[   23.034822]  kunit_try_run_case+0x170/0x3f0
[   23.034938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.035059]  kthread+0x328/0x630
[   23.035153]  ret_from_fork+0x10/0x20
[   23.035212] 
[   23.035503] The buggy address belongs to the object at fff00000c6587700
[   23.035503]  which belongs to the cache kmalloc-128 of size 128
[   23.035587] The buggy address is located 0 bytes inside of
[   23.035587]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.035667] 
[   23.035695] The buggy address belongs to the physical page:
[   23.035736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.035796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.035867] page_type: f5(slab)
[   23.035917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.035979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.036039] page dumped because: kasan: bad access detected
[   23.036120] 
[   23.036167] Memory state around the buggy address:
[   23.036366]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.036477]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.036697] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.037227]                                                                 ^
[   23.037302]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037359]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037405] ==================================================================
[   23.019962] ==================================================================
[   23.020148] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   23.020416] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.020588] 
[   23.020770] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.021023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.021065] Hardware name: linux,dummy-virt (DT)
[   23.021247] Call trace:
[   23.021285]  show_stack+0x20/0x38 (C)
[   23.021406]  dump_stack_lvl+0x8c/0xd0
[   23.021479]  print_report+0x118/0x608
[   23.021600]  kasan_report+0xdc/0x128
[   23.021667]  kasan_check_range+0x100/0x1a8
[   23.021862]  __kasan_check_write+0x20/0x30
[   23.021925]  copy_user_test_oob+0x35c/0xec8
[   23.022003]  kunit_try_run_case+0x170/0x3f0
[   23.022243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.022447]  kthread+0x328/0x630
[   23.022530]  ret_from_fork+0x10/0x20
[   23.022593] 
[   23.022625] Allocated by task 294:
[   23.022880]  kasan_save_stack+0x3c/0x68
[   23.022981]  kasan_save_track+0x20/0x40
[   23.023156]  kasan_save_alloc_info+0x40/0x58
[   23.023210]  __kasan_kmalloc+0xd4/0xd8
[   23.023416]  __kmalloc_noprof+0x198/0x4c8
[   23.023525]  kunit_kmalloc_array+0x34/0x88
[   23.023651]  copy_user_test_oob+0xac/0xec8
[   23.023710]  kunit_try_run_case+0x170/0x3f0
[   23.023759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.023815]  kthread+0x328/0x630
[   23.023866]  ret_from_fork+0x10/0x20
[   23.024265] 
[   23.024301] The buggy address belongs to the object at fff00000c6587700
[   23.024301]  which belongs to the cache kmalloc-128 of size 128
[   23.024534] The buggy address is located 0 bytes inside of
[   23.024534]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.024701] 
[   23.025067] The buggy address belongs to the physical page:
[   23.025133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.025370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.025510] page_type: f5(slab)
[   23.025582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.025788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.025911] page dumped because: kasan: bad access detected
[   23.026017] 
[   23.026112] Memory state around the buggy address:
[   23.026280]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.026375]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.026433] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.026481]                                                                 ^
[   23.026537]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.026592]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.026643] ==================================================================
[   23.038976] ==================================================================
[   23.039053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   23.039122] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.039185] 
[   23.039229] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.039334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.039368] Hardware name: linux,dummy-virt (DT)
[   23.039409] Call trace:
[   23.039439]  show_stack+0x20/0x38 (C)
[   23.039499]  dump_stack_lvl+0x8c/0xd0
[   23.039882]  print_report+0x118/0x608
[   23.039961]  kasan_report+0xdc/0x128
[   23.040160]  kasan_check_range+0x100/0x1a8
[   23.040223]  __kasan_check_read+0x20/0x30
[   23.040511]  copy_user_test_oob+0x4a0/0xec8
[   23.040739]  kunit_try_run_case+0x170/0x3f0
[   23.040996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.041110]  kthread+0x328/0x630
[   23.041313]  ret_from_fork+0x10/0x20
[   23.041474] 
[   23.041511] Allocated by task 294:
[   23.041568]  kasan_save_stack+0x3c/0x68
[   23.041702]  kasan_save_track+0x20/0x40
[   23.041752]  kasan_save_alloc_info+0x40/0x58
[   23.041872]  __kasan_kmalloc+0xd4/0xd8
[   23.042236]  __kmalloc_noprof+0x198/0x4c8
[   23.042310]  kunit_kmalloc_array+0x34/0x88
[   23.042566]  copy_user_test_oob+0xac/0xec8
[   23.042669]  kunit_try_run_case+0x170/0x3f0
[   23.042820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.042897]  kthread+0x328/0x630
[   23.042941]  ret_from_fork+0x10/0x20
[   23.042988] 
[   23.043259] The buggy address belongs to the object at fff00000c6587700
[   23.043259]  which belongs to the cache kmalloc-128 of size 128
[   23.043699] The buggy address is located 0 bytes inside of
[   23.043699]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.043879] 
[   23.043913] The buggy address belongs to the physical page:
[   23.043955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.044115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.044230] page_type: f5(slab)
[   23.044304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.044364] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.044414] page dumped because: kasan: bad access detected
[   23.044595] 
[   23.044634] Memory state around the buggy address:
[   23.044865]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.045008]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.045066] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.045115]                                                                 ^
[   23.045276]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.045496]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.045548] ==================================================================
[   23.027250] ==================================================================
[   23.027323] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   23.027395] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294
[   23.027461] 
[   23.027505] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   23.027611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.027647] Hardware name: linux,dummy-virt (DT)
[   23.027685] Call trace:
[   23.027717]  show_stack+0x20/0x38 (C)
[   23.027775]  dump_stack_lvl+0x8c/0xd0
[   23.027829]  print_report+0x118/0x608
[   23.028593]  kasan_report+0xdc/0x128
[   23.028802]  kasan_check_range+0x100/0x1a8
[   23.028888]  __kasan_check_read+0x20/0x30
[   23.029019]  copy_user_test_oob+0x3c8/0xec8
[   23.029088]  kunit_try_run_case+0x170/0x3f0
[   23.029156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.029218]  kthread+0x328/0x630
[   23.029269]  ret_from_fork+0x10/0x20
[   23.029584] 
[   23.029631] Allocated by task 294:
[   23.029711]  kasan_save_stack+0x3c/0x68
[   23.029778]  kasan_save_track+0x20/0x40
[   23.029852]  kasan_save_alloc_info+0x40/0x58
[   23.029909]  __kasan_kmalloc+0xd4/0xd8
[   23.029956]  __kmalloc_noprof+0x198/0x4c8
[   23.030020]  kunit_kmalloc_array+0x34/0x88
[   23.030109]  copy_user_test_oob+0xac/0xec8
[   23.030197]  kunit_try_run_case+0x170/0x3f0
[   23.030288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.030345]  kthread+0x328/0x630
[   23.030389]  ret_from_fork+0x10/0x20
[   23.030439] 
[   23.030469] The buggy address belongs to the object at fff00000c6587700
[   23.030469]  which belongs to the cache kmalloc-128 of size 128
[   23.030553] The buggy address is located 0 bytes inside of
[   23.030553]  allocated 120-byte region [fff00000c6587700, fff00000c6587778)
[   23.030692] 
[   23.030749] The buggy address belongs to the physical page:
[   23.030847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   23.030916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.030978] page_type: f5(slab)
[   23.031033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.031096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.031148] page dumped because: kasan: bad access detected
[   23.031187] 
[   23.031213] Memory state around the buggy address:
[   23.031254]  fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.031313]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.031369] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.031419]                                                                 ^
[   23.031470]  fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.031518]  fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.031565] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   22.959638] ==================================================================
[   22.959727] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   22.959871] Read of size 8 at addr fff00000c6587678 by task kunit_try_catch/290
[   22.959936] 
[   22.960207] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.960415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.960449] Hardware name: linux,dummy-virt (DT)
[   22.960492] Call trace:
[   22.960525]  show_stack+0x20/0x38 (C)
[   22.960724]  dump_stack_lvl+0x8c/0xd0
[   22.960852]  print_report+0x118/0x608
[   22.961002]  kasan_report+0xdc/0x128
[   22.961100]  __asan_report_load8_noabort+0x20/0x30
[   22.961156]  copy_to_kernel_nofault+0x204/0x250
[   22.961210]  copy_to_kernel_nofault_oob+0x158/0x418
[   22.961267]  kunit_try_run_case+0x170/0x3f0
[   22.961320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.961376]  kthread+0x328/0x630
[   22.961422]  ret_from_fork+0x10/0x20
[   22.961480] 
[   22.961536] Allocated by task 290:
[   22.961574]  kasan_save_stack+0x3c/0x68
[   22.961626]  kasan_save_track+0x20/0x40
[   22.961669]  kasan_save_alloc_info+0x40/0x58
[   22.961995]  __kasan_kmalloc+0xd4/0xd8
[   22.962082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.962176]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.962247]  kunit_try_run_case+0x170/0x3f0
[   22.962319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.962370]  kthread+0x328/0x630
[   22.962408]  ret_from_fork+0x10/0x20
[   22.962454] 
[   22.962481] The buggy address belongs to the object at fff00000c6587600
[   22.962481]  which belongs to the cache kmalloc-128 of size 128
[   22.962550] The buggy address is located 0 bytes to the right of
[   22.962550]  allocated 120-byte region [fff00000c6587600, fff00000c6587678)
[   22.962623] 
[   22.962652] The buggy address belongs to the physical page:
[   22.962696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   22.962760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.962817] page_type: f5(slab)
[   22.962881] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.962942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.963013] page dumped because: kasan: bad access detected
[   22.963083] 
[   22.963130] Memory state around the buggy address:
[   22.963218]  fff00000c6587500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.963277]  fff00000c6587580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.963328] >fff00000c6587600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.963374]                                                                 ^
[   22.963452]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.963548]  fff00000c6587700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.963596] ==================================================================
[   22.964802] ==================================================================
[   22.965018] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   22.965111] Write of size 8 at addr fff00000c6587678 by task kunit_try_catch/290
[   22.965173] 
[   22.965215] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.965316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.965359] Hardware name: linux,dummy-virt (DT)
[   22.965400] Call trace:
[   22.965582]  show_stack+0x20/0x38 (C)
[   22.965718]  dump_stack_lvl+0x8c/0xd0
[   22.965877]  print_report+0x118/0x608
[   22.966041]  kasan_report+0xdc/0x128
[   22.966109]  kasan_check_range+0x100/0x1a8
[   22.966171]  __kasan_check_write+0x20/0x30
[   22.966224]  copy_to_kernel_nofault+0x8c/0x250
[   22.967174]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   22.967272]  kunit_try_run_case+0x170/0x3f0
[   22.967343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.967411]  kthread+0x328/0x630
[   22.967465]  ret_from_fork+0x10/0x20
[   22.968090] 
[   22.968472] Allocated by task 290:
[   22.968813]  kasan_save_stack+0x3c/0x68
[   22.968891]  kasan_save_track+0x20/0x40
[   22.968940]  kasan_save_alloc_info+0x40/0x58
[   22.968987]  __kasan_kmalloc+0xd4/0xd8
[   22.969037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.969147]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.969252]  kunit_try_run_case+0x170/0x3f0
[   22.969335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.969405]  kthread+0x328/0x630
[   22.969497]  ret_from_fork+0x10/0x20
[   22.969562] 
[   22.969765] The buggy address belongs to the object at fff00000c6587600
[   22.969765]  which belongs to the cache kmalloc-128 of size 128
[   22.969868] The buggy address is located 0 bytes to the right of
[   22.969868]  allocated 120-byte region [fff00000c6587600, fff00000c6587678)
[   22.969957] 
[   22.969989] The buggy address belongs to the physical page:
[   22.970036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   22.970107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.970172] page_type: f5(slab)
[   22.970230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.970298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.970358] page dumped because: kasan: bad access detected
[   22.970404] 
[   22.970431] Memory state around the buggy address:
[   22.970476]  fff00000c6587500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.970536]  fff00000c6587580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.970593] >fff00000c6587600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.970645]                                                                 ^
[   22.970739]  fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.970799]  fff00000c6587700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.970855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   22.919849] ==================================================================
[   22.919921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   22.919991] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/278
[   22.920051] 
[   22.920093] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.920197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.920232] Hardware name: linux,dummy-virt (DT)
[   22.920271] Call trace:
[   22.920301]  show_stack+0x20/0x38 (C)
[   22.920359]  dump_stack_lvl+0x8c/0xd0
[   22.920413]  print_report+0x310/0x608
[   22.920467]  kasan_report+0xdc/0x128
[   22.920519]  __asan_report_load1_noabort+0x20/0x30
[   22.920574]  vmalloc_oob+0x51c/0x5d0
[   22.920625]  kunit_try_run_case+0x170/0x3f0
[   22.920678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.920737]  kthread+0x328/0x630
[   22.921432]  ret_from_fork+0x10/0x20
[   22.921563] 
[   22.921600] The buggy address belongs to the virtual mapping at
[   22.921600]  [ffff8000800fe000, ffff800080100000) created by:
[   22.921600]  vmalloc_oob+0x98/0x5d0
[   22.921781] 
[   22.921982] The buggy address belongs to the physical page:
[   22.922034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bd
[   22.922150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.922259] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.922384] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.922549] page dumped because: kasan: bad access detected
[   22.922593] 
[   22.922861] Memory state around the buggy address:
[   22.923109]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.923265]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.923322] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.923556]                                                                 ^
[   22.923741]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.923801]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.924001] ==================================================================
[   22.914647] ==================================================================
[   22.914748] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   22.914828] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/278
[   22.914915] 
[   22.914966] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.915073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.915111] Hardware name: linux,dummy-virt (DT)
[   22.915153] Call trace:
[   22.915189]  show_stack+0x20/0x38 (C)
[   22.915251]  dump_stack_lvl+0x8c/0xd0
[   22.915315]  print_report+0x310/0x608
[   22.915373]  kasan_report+0xdc/0x128
[   22.915428]  __asan_report_load1_noabort+0x20/0x30
[   22.915488]  vmalloc_oob+0x578/0x5d0
[   22.915543]  kunit_try_run_case+0x170/0x3f0
[   22.915602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.915668]  kthread+0x328/0x630
[   22.915719]  ret_from_fork+0x10/0x20
[   22.915781] 
[   22.915821] The buggy address belongs to the virtual mapping at
[   22.915821]  [ffff8000800fe000, ffff800080100000) created by:
[   22.915821]  vmalloc_oob+0x98/0x5d0
[   22.917123] 
[   22.917157] The buggy address belongs to the physical page:
[   22.917199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bd
[   22.917308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.917391] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.917454] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.917506] page dumped because: kasan: bad access detected
[   22.917581] 
[   22.917649] Memory state around the buggy address:
[   22.917699]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.917916]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.918089] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.918227]                                                              ^
[   22.918283]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.918675]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.918896] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   22.289762] ==================================================================
[   22.289887] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   22.290005] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268
[   22.290077] 
[   22.290134] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.290244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.290280] Hardware name: linux,dummy-virt (DT)
[   22.290325] Call trace:
[   22.290359]  show_stack+0x20/0x38 (C)
[   22.290426]  dump_stack_lvl+0x8c/0xd0
[   22.290483]  print_report+0x118/0x608
[   22.290543]  kasan_report+0xdc/0x128
[   22.290611]  __asan_report_load1_noabort+0x20/0x30
[   22.290680]  strnlen+0x80/0x88
[   22.290736]  kasan_strings+0x478/0xb00
[   22.290795]  kunit_try_run_case+0x170/0x3f0
[   22.290866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.290935]  kthread+0x328/0x630
[   22.290986]  ret_from_fork+0x10/0x20
[   22.291044] 
[   22.291073] Allocated by task 268:
[   22.291109]  kasan_save_stack+0x3c/0x68
[   22.291162]  kasan_save_track+0x20/0x40
[   22.291218]  kasan_save_alloc_info+0x40/0x58
[   22.291282]  __kasan_kmalloc+0xd4/0xd8
[   22.291332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.291383]  kasan_strings+0xc8/0xb00
[   22.291425]  kunit_try_run_case+0x170/0x3f0
[   22.291469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.291520]  kthread+0x328/0x630
[   22.291562]  ret_from_fork+0x10/0x20
[   22.291606] 
[   22.291633] Freed by task 268:
[   22.291669]  kasan_save_stack+0x3c/0x68
[   22.291715]  kasan_save_track+0x20/0x40
[   22.291771]  kasan_save_free_info+0x4c/0x78
[   22.291824]  __kasan_slab_free+0x6c/0x98
[   22.291883]  kfree+0x214/0x3c8
[   22.291926]  kasan_strings+0x24c/0xb00
[   22.291969]  kunit_try_run_case+0x170/0x3f0
[   22.292012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.292060]  kthread+0x328/0x630
[   22.292097]  ret_from_fork+0x10/0x20
[   22.292139] 
[   22.292164] The buggy address belongs to the object at fff00000c63fb300
[   22.292164]  which belongs to the cache kmalloc-32 of size 32
[   22.292230] The buggy address is located 16 bytes inside of
[   22.292230]  freed 32-byte region [fff00000c63fb300, fff00000c63fb320)
[   22.292297] 
[   22.292322] The buggy address belongs to the physical page:
[   22.292361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   22.292424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.292481] page_type: f5(slab)
[   22.292528] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.292586] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.292633] page dumped because: kasan: bad access detected
[   22.292669] 
[   22.292692] Memory state around the buggy address:
[   22.292732]  fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.292815]  fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.292879] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.292928]                          ^
[   22.292965]  fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.293075]  fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.293129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   22.271344] ==================================================================
[   22.271425] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   22.271507] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268
[   22.271572] 
[   22.271628] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.271738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.271774] Hardware name: linux,dummy-virt (DT)
[   22.271815] Call trace:
[   22.273229]  show_stack+0x20/0x38 (C)
[   22.273904]  dump_stack_lvl+0x8c/0xd0
[   22.274378]  print_report+0x118/0x608
[   22.274548]  kasan_report+0xdc/0x128
[   22.275198]  __asan_report_load1_noabort+0x20/0x30
[   22.275267]  strlen+0xa8/0xb0
[   22.275323]  kasan_strings+0x418/0xb00
[   22.275380]  kunit_try_run_case+0x170/0x3f0
[   22.275436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.275499]  kthread+0x328/0x630
[   22.275550]  ret_from_fork+0x10/0x20
[   22.276787] 
[   22.276831] Allocated by task 268:
[   22.277288]  kasan_save_stack+0x3c/0x68
[   22.277401]  kasan_save_track+0x20/0x40
[   22.277454]  kasan_save_alloc_info+0x40/0x58
[   22.277497]  __kasan_kmalloc+0xd4/0xd8
[   22.278140]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.278210]  kasan_strings+0xc8/0xb00
[   22.278262]  kunit_try_run_case+0x170/0x3f0
[   22.278314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.278367]  kthread+0x328/0x630
[   22.278411]  ret_from_fork+0x10/0x20
[   22.278461] 
[   22.278490] Freed by task 268:
[   22.278527]  kasan_save_stack+0x3c/0x68
[   22.278573]  kasan_save_track+0x20/0x40
[   22.278625]  kasan_save_free_info+0x4c/0x78
[   22.278667]  __kasan_slab_free+0x6c/0x98
[   22.278712]  kfree+0x214/0x3c8
[   22.279606]  kasan_strings+0x24c/0xb00
[   22.280204]  kunit_try_run_case+0x170/0x3f0
[   22.280898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.281237]  kthread+0x328/0x630
[   22.281294]  ret_from_fork+0x10/0x20
[   22.282063] 
[   22.282169] The buggy address belongs to the object at fff00000c63fb300
[   22.282169]  which belongs to the cache kmalloc-32 of size 32
[   22.282252] The buggy address is located 16 bytes inside of
[   22.282252]  freed 32-byte region [fff00000c63fb300, fff00000c63fb320)
[   22.282329] 
[   22.282359] The buggy address belongs to the physical page:
[   22.282404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   22.282475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.282540] page_type: f5(slab)
[   22.284622] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.284739] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.284796] page dumped because: kasan: bad access detected
[   22.284850] 
[   22.285685] Memory state around the buggy address:
[   22.286011]  fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.286447]  fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.286624] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.286760]                          ^
[   22.286804]  fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.286874]  fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.286925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   22.250763] ==================================================================
[   22.250860] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   22.250941] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268
[   22.251008] 
[   22.251062] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.251176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.251214] Hardware name: linux,dummy-virt (DT)
[   22.251261] Call trace:
[   22.251296]  show_stack+0x20/0x38 (C)
[   22.251361]  dump_stack_lvl+0x8c/0xd0
[   22.251422]  print_report+0x118/0x608
[   22.251483]  kasan_report+0xdc/0x128
[   22.252953]  __asan_report_load1_noabort+0x20/0x30
[   22.253813]  kasan_strings+0x95c/0xb00
[   22.254336]  kunit_try_run_case+0x170/0x3f0
[   22.254766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.255451]  kthread+0x328/0x630
[   22.255561]  ret_from_fork+0x10/0x20
[   22.255631] 
[   22.255664] Allocated by task 268:
[   22.255704]  kasan_save_stack+0x3c/0x68
[   22.255762]  kasan_save_track+0x20/0x40
[   22.255811]  kasan_save_alloc_info+0x40/0x58
[   22.255873]  __kasan_kmalloc+0xd4/0xd8
[   22.255923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.258010]  kasan_strings+0xc8/0xb00
[   22.258555]  kunit_try_run_case+0x170/0x3f0
[   22.258932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.259334]  kthread+0x328/0x630
[   22.259477]  ret_from_fork+0x10/0x20
[   22.259532] 
[   22.259562] Freed by task 268:
[   22.259601]  kasan_save_stack+0x3c/0x68
[   22.259653]  kasan_save_track+0x20/0x40
[   22.259700]  kasan_save_free_info+0x4c/0x78
[   22.260604]  __kasan_slab_free+0x6c/0x98
[   22.260658]  kfree+0x214/0x3c8
[   22.261440]  kasan_strings+0x24c/0xb00
[   22.261846]  kunit_try_run_case+0x170/0x3f0
[   22.261923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.261995]  kthread+0x328/0x630
[   22.262493]  ret_from_fork+0x10/0x20
[   22.262987] 
[   22.263090] The buggy address belongs to the object at fff00000c63fb300
[   22.263090]  which belongs to the cache kmalloc-32 of size 32
[   22.263168] The buggy address is located 16 bytes inside of
[   22.263168]  freed 32-byte region [fff00000c63fb300, fff00000c63fb320)
[   22.263670] 
[   22.263932] The buggy address belongs to the physical page:
[   22.264673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   22.265129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.265465] page_type: f5(slab)
[   22.265543] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.265623] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.265682] page dumped because: kasan: bad access detected
[   22.266174] 
[   22.266344] Memory state around the buggy address:
[   22.266693]  fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.266760]  fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.266820] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.266889]                          ^
[   22.266934]  fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.266993]  fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.267044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   22.239131] ==================================================================
[   22.239214] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   22.239459] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268
[   22.239552] 
[   22.239646] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.239768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.239806] Hardware name: linux,dummy-virt (DT)
[   22.239861] Call trace:
[   22.239910]  show_stack+0x20/0x38 (C)
[   22.239995]  dump_stack_lvl+0x8c/0xd0
[   22.240064]  print_report+0x118/0x608
[   22.240123]  kasan_report+0xdc/0x128
[   22.240179]  __asan_report_load1_noabort+0x20/0x30
[   22.240239]  strcmp+0xc0/0xc8
[   22.240293]  kasan_strings+0x340/0xb00
[   22.240347]  kunit_try_run_case+0x170/0x3f0
[   22.240411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.240475]  kthread+0x328/0x630
[   22.240528]  ret_from_fork+0x10/0x20
[   22.240590] 
[   22.240620] Allocated by task 268:
[   22.240660]  kasan_save_stack+0x3c/0x68
[   22.240716]  kasan_save_track+0x20/0x40
[   22.240768]  kasan_save_alloc_info+0x40/0x58
[   22.240814]  __kasan_kmalloc+0xd4/0xd8
[   22.241111]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.241174]  kasan_strings+0xc8/0xb00
[   22.241447]  kunit_try_run_case+0x170/0x3f0
[   22.241676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.241745]  kthread+0x328/0x630
[   22.241806]  ret_from_fork+0x10/0x20
[   22.241882] 
[   22.241912] Freed by task 268:
[   22.241955]  kasan_save_stack+0x3c/0x68
[   22.242006]  kasan_save_track+0x20/0x40
[   22.242058]  kasan_save_free_info+0x4c/0x78
[   22.242104]  __kasan_slab_free+0x6c/0x98
[   22.242157]  kfree+0x214/0x3c8
[   22.242201]  kasan_strings+0x24c/0xb00
[   22.242248]  kunit_try_run_case+0x170/0x3f0
[   22.243488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.243932]  kthread+0x328/0x630
[   22.244462]  ret_from_fork+0x10/0x20
[   22.244748] 
[   22.244783] The buggy address belongs to the object at fff00000c63fb300
[   22.244783]  which belongs to the cache kmalloc-32 of size 32
[   22.244875] The buggy address is located 16 bytes inside of
[   22.244875]  freed 32-byte region [fff00000c63fb300, fff00000c63fb320)
[   22.244954] 
[   22.244988] The buggy address belongs to the physical page:
[   22.246044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   22.246376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.246451] page_type: f5(slab)
[   22.247185] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.247784] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.248176] page dumped because: kasan: bad access detected
[   22.248368] 
[   22.248663] Memory state around the buggy address:
[   22.248935]  fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.249004]  fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.249064] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.249168]                          ^
[   22.249457]  fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.249643]  fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.249974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   22.215674] ==================================================================
[   22.216170] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   22.216293] Read of size 1 at addr fff00000c63fb198 by task kunit_try_catch/266
[   22.216614] 
[   22.216686] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.217070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.217128] Hardware name: linux,dummy-virt (DT)
[   22.217302] Call trace:
[   22.217345]  show_stack+0x20/0x38 (C)
[   22.217457]  dump_stack_lvl+0x8c/0xd0
[   22.217678]  print_report+0x118/0x608
[   22.217941]  kasan_report+0xdc/0x128
[   22.218134]  __asan_report_load1_noabort+0x20/0x30
[   22.218215]  memcmp+0x198/0x1d8
[   22.218276]  kasan_memcmp+0x16c/0x300
[   22.218384]  kunit_try_run_case+0x170/0x3f0
[   22.218468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.218714]  kthread+0x328/0x630
[   22.218798]  ret_from_fork+0x10/0x20
[   22.219204] 
[   22.219241] Allocated by task 266:
[   22.219427]  kasan_save_stack+0x3c/0x68
[   22.219498]  kasan_save_track+0x20/0x40
[   22.219711]  kasan_save_alloc_info+0x40/0x58
[   22.219896]  __kasan_kmalloc+0xd4/0xd8
[   22.219959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.220018]  kasan_memcmp+0xbc/0x300
[   22.220063]  kunit_try_run_case+0x170/0x3f0
[   22.220108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220160]  kthread+0x328/0x630
[   22.220199]  ret_from_fork+0x10/0x20
[   22.220266] 
[   22.220299] The buggy address belongs to the object at fff00000c63fb180
[   22.220299]  which belongs to the cache kmalloc-32 of size 32
[   22.220392] The buggy address is located 0 bytes to the right of
[   22.220392]  allocated 24-byte region [fff00000c63fb180, fff00000c63fb198)
[   22.220476] 
[   22.220508] The buggy address belongs to the physical page:
[   22.220554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   22.220624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.220693] page_type: f5(slab)
[   22.220750] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.221085] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.221481] page dumped because: kasan: bad access detected
[   22.221556] 
[   22.221586] Memory state around the buggy address:
[   22.221873]  fff00000c63fb080: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   22.222013]  fff00000c63fb100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.222082] >fff00000c63fb180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.222157]                             ^
[   22.222373]  fff00000c63fb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.222620]  fff00000c63fb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.222844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   22.179242] ==================================================================
[   22.179330] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   22.179415] Read of size 1 at addr ffff800080a47b4a by task kunit_try_catch/262
[   22.179482] 
[   22.179538] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.179651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.179687] Hardware name: linux,dummy-virt (DT)
[   22.179732] Call trace:
[   22.179767]  show_stack+0x20/0x38 (C)
[   22.179833]  dump_stack_lvl+0x8c/0xd0
[   22.179947]  print_report+0x310/0x608
[   22.180006]  kasan_report+0xdc/0x128
[   22.180062]  __asan_report_load1_noabort+0x20/0x30
[   22.180120]  kasan_alloca_oob_right+0x2dc/0x340
[   22.180181]  kunit_try_run_case+0x170/0x3f0
[   22.180240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.180302]  kthread+0x328/0x630
[   22.180351]  ret_from_fork+0x10/0x20
[   22.180413] 
[   22.180445] The buggy address belongs to stack of task kunit_try_catch/262
[   22.180508] 
[   22.180541] The buggy address belongs to the virtual mapping at
[   22.180541]  [ffff800080a40000, ffff800080a49000) created by:
[   22.180541]  kernel_clone+0x150/0x7a8
[   22.180631] 
[   22.180660] The buggy address belongs to the physical page:
[   22.180702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   22.180766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.182179] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.182526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.182619] page dumped because: kasan: bad access detected
[   22.182780] 
[   22.183131] Memory state around the buggy address:
[   22.183206]  ffff800080a47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.183268]  ffff800080a47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.183347] >ffff800080a47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   22.183397]                                               ^
[   22.183447]  ffff800080a47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   22.183742]  ffff800080a47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   22.183806] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   22.158747] ==================================================================
[   22.159553] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   22.159688] Read of size 1 at addr ffff800080a47b5f by task kunit_try_catch/260
[   22.159763] 
[   22.159950] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.160407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.160564] Hardware name: linux,dummy-virt (DT)
[   22.160748] Call trace:
[   22.160817]  show_stack+0x20/0x38 (C)
[   22.160949]  dump_stack_lvl+0x8c/0xd0
[   22.161050]  print_report+0x310/0x608
[   22.161110]  kasan_report+0xdc/0x128
[   22.161172]  __asan_report_load1_noabort+0x20/0x30
[   22.161229]  kasan_alloca_oob_left+0x2b8/0x310
[   22.161285]  kunit_try_run_case+0x170/0x3f0
[   22.161460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.161921]  kthread+0x328/0x630
[   22.161991]  ret_from_fork+0x10/0x20
[   22.162114] 
[   22.162150] The buggy address belongs to stack of task kunit_try_catch/260
[   22.162409] 
[   22.162630] The buggy address belongs to the virtual mapping at
[   22.162630]  [ffff800080a40000, ffff800080a49000) created by:
[   22.162630]  kernel_clone+0x150/0x7a8
[   22.162743] 
[   22.162906] The buggy address belongs to the physical page:
[   22.163124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   22.163352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.163555] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.163884] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.164016] page dumped because: kasan: bad access detected
[   22.164066] 
[   22.164093] Memory state around the buggy address:
[   22.164253]  ffff800080a47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.164328]  ffff800080a47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.164388] >ffff800080a47b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   22.164447]                                                     ^
[   22.164499]  ffff800080a47b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   22.164553]  ffff800080a47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   22.164602] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   22.134412] ==================================================================
[   22.134541] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   22.134636] Read of size 1 at addr ffff800080ab7c2a by task kunit_try_catch/258
[   22.134703] 
[   22.134769] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.134904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.134945] Hardware name: linux,dummy-virt (DT)
[   22.134992] Call trace:
[   22.135028]  show_stack+0x20/0x38 (C)
[   22.135098]  dump_stack_lvl+0x8c/0xd0
[   22.135160]  print_report+0x310/0x608
[   22.135221]  kasan_report+0xdc/0x128
[   22.136169]  __asan_report_load1_noabort+0x20/0x30
[   22.136336]  kasan_stack_oob+0x238/0x270
[   22.136396]  kunit_try_run_case+0x170/0x3f0
[   22.136515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.136711]  kthread+0x328/0x630
[   22.136953]  ret_from_fork+0x10/0x20
[   22.137163] 
[   22.137451] The buggy address belongs to stack of task kunit_try_catch/258
[   22.137733]  and is located at offset 138 in frame:
[   22.138119]  kasan_stack_oob+0x0/0x270
[   22.138646] 
[   22.138747] This frame has 4 objects:
[   22.139198]  [48, 49) '__assertion'
[   22.139519]  [64, 72) 'array'
[   22.139760]  [96, 112) '__assertion'
[   22.139970]  [128, 138) 'stack_array'
[   22.140138] 
[   22.140311] The buggy address belongs to the virtual mapping at
[   22.140311]  [ffff800080ab0000, ffff800080ab9000) created by:
[   22.140311]  kernel_clone+0x150/0x7a8
[   22.140441] 
[   22.140684] The buggy address belongs to the physical page:
[   22.140738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   22.140941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.141046] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.141267] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.141511] page dumped because: kasan: bad access detected
[   22.141562] 
[   22.141592] Memory state around the buggy address:
[   22.141642]  ffff800080ab7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.141703]  ffff800080ab7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   22.141759] >ffff800080ab7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   22.141824]                                   ^
[   22.141891]  ffff800080ab7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   22.141949]  ffff800080ab7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   22.142023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   22.099541] ==================================================================
[   22.099640] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   22.099730] Read of size 1 at addr ffffb1010d3b664d by task kunit_try_catch/254
[   22.099793] 
[   22.099873] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.099982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.100018] Hardware name: linux,dummy-virt (DT)
[   22.100059] Call trace:
[   22.100947]  show_stack+0x20/0x38 (C)
[   22.101159]  dump_stack_lvl+0x8c/0xd0
[   22.101222]  print_report+0x310/0x608
[   22.101499]  kasan_report+0xdc/0x128
[   22.101622]  __asan_report_load1_noabort+0x20/0x30
[   22.101700]  kasan_global_oob_right+0x230/0x270
[   22.102035]  kunit_try_run_case+0x170/0x3f0
[   22.102125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.102410]  kthread+0x328/0x630
[   22.102485]  ret_from_fork+0x10/0x20
[   22.102797] 
[   22.102920] The buggy address belongs to the variable:
[   22.102964]  global_array+0xd/0x40
[   22.103304] 
[   22.103484] The buggy address belongs to the virtual mapping at
[   22.103484]  [ffffb1010b550000, ffffb1010d471000) created by:
[   22.103484]  paging_init+0x66c/0x7d0
[   22.103925] 
[   22.104044] The buggy address belongs to the physical page:
[   22.104109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db6
[   22.104427] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   22.104761] raw: 03fffe0000002000 ffffc1ffc01f6d88 ffffc1ffc01f6d88 0000000000000000
[   22.104892] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.105027] page dumped because: kasan: bad access detected
[   22.105074] 
[   22.105097] Memory state around the buggy address:
[   22.105176]  ffffb1010d3b6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.105236]  ffffb1010d3b6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.105290] >ffffb1010d3b6600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   22.105338]                                               ^
[   22.105385]  ffffb1010d3b6680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   22.105672]  ffffb1010d3b6700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   22.105749] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   22.082851] ==================================================================
[   22.083005] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   22.083107] Free of addr fff00000c78d8001 by task kunit_try_catch/252
[   22.083468] 
[   22.083580] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.083699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.084001] Hardware name: linux,dummy-virt (DT)
[   22.084056] Call trace:
[   22.084309]  show_stack+0x20/0x38 (C)
[   22.084414]  dump_stack_lvl+0x8c/0xd0
[   22.084485]  print_report+0x118/0x608
[   22.084681]  kasan_report_invalid_free+0xc0/0xe8
[   22.084901]  __kasan_mempool_poison_object+0xfc/0x150
[   22.085021]  mempool_free+0x28c/0x328
[   22.085081]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   22.085142]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   22.085535]  kunit_try_run_case+0x170/0x3f0
[   22.085623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085739]  kthread+0x328/0x630
[   22.085833]  ret_from_fork+0x10/0x20
[   22.085974] 
[   22.086070] The buggy address belongs to the physical page:
[   22.086400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   22.086520] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.086587] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.086702] page_type: f8(unknown)
[   22.086779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.086874] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.087216] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.087518] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.087626] head: 0bfffe0000000002 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff
[   22.087757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.087915] page dumped because: kasan: bad access detected
[   22.087959] 
[   22.087990] Memory state around the buggy address:
[   22.088048]  fff00000c78d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088102]  fff00000c78d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088492] >fff00000c78d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.088618]                    ^
[   22.088664]  fff00000c78d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.088904]  fff00000c78d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.089081] ==================================================================
[   22.059622] ==================================================================
[   22.059718] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   22.059808] Free of addr fff00000c6587201 by task kunit_try_catch/250
[   22.060739] 
[   22.060996] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.061166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.061204] Hardware name: linux,dummy-virt (DT)
[   22.061244] Call trace:
[   22.061276]  show_stack+0x20/0x38 (C)
[   22.061352]  dump_stack_lvl+0x8c/0xd0
[   22.061441]  print_report+0x118/0x608
[   22.061502]  kasan_report_invalid_free+0xc0/0xe8
[   22.061561]  check_slab_allocation+0xfc/0x108
[   22.061703]  __kasan_mempool_poison_object+0x78/0x150
[   22.061767]  mempool_free+0x28c/0x328
[   22.061842]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   22.062052]  mempool_kmalloc_invalid_free+0xc0/0x118
[   22.062130]  kunit_try_run_case+0x170/0x3f0
[   22.062195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.062271]  kthread+0x328/0x630
[   22.062414]  ret_from_fork+0x10/0x20
[   22.062486] 
[   22.062511] Allocated by task 250:
[   22.062552]  kasan_save_stack+0x3c/0x68
[   22.062604]  kasan_save_track+0x20/0x40
[   22.062652]  kasan_save_alloc_info+0x40/0x58
[   22.062695]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.062747]  remove_element+0x130/0x1f8
[   22.062789]  mempool_alloc_preallocated+0x58/0xc0
[   22.062992]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   22.063176]  mempool_kmalloc_invalid_free+0xc0/0x118
[   22.063311]  kunit_try_run_case+0x170/0x3f0
[   22.063490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.063555]  kthread+0x328/0x630
[   22.063599]  ret_from_fork+0x10/0x20
[   22.063643] 
[   22.063671] The buggy address belongs to the object at fff00000c6587200
[   22.063671]  which belongs to the cache kmalloc-128 of size 128
[   22.063740] The buggy address is located 1 bytes inside of
[   22.063740]  128-byte region [fff00000c6587200, fff00000c6587280)
[   22.063810] 
[   22.064055] The buggy address belongs to the physical page:
[   22.064248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587
[   22.064324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.064725] page_type: f5(slab)
[   22.064922] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.065012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.065066] page dumped because: kasan: bad access detected
[   22.065113] 
[   22.065259] Memory state around the buggy address:
[   22.065492]  fff00000c6587100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.065656]  fff00000c6587180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.065910] >fff00000c6587200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.066077]                    ^
[   22.066125]  fff00000c6587280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.066187]  fff00000c6587300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.066236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   22.042101] ==================================================================
[   22.042192] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.042275] Free of addr fff00000c788c000 by task kunit_try_catch/248
[   22.042334] 
[   22.042393] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.042506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.042540] Hardware name: linux,dummy-virt (DT)
[   22.042583] Call trace:
[   22.042615]  show_stack+0x20/0x38 (C)
[   22.042682]  dump_stack_lvl+0x8c/0xd0
[   22.043208]  print_report+0x118/0x608
[   22.043341]  kasan_report_invalid_free+0xc0/0xe8
[   22.043503]  __kasan_mempool_poison_pages+0xe0/0xe8
[   22.043918]  mempool_free+0x24c/0x328
[   22.044141]  mempool_double_free_helper+0x150/0x2e8
[   22.044285]  mempool_page_alloc_double_free+0xbc/0x118
[   22.044347]  kunit_try_run_case+0x170/0x3f0
[   22.044685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.044872]  kthread+0x328/0x630
[   22.044936]  ret_from_fork+0x10/0x20
[   22.045126] 
[   22.045157] The buggy address belongs to the physical page:
[   22.045280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   22.045348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.045598] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.045777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.045999] page dumped because: kasan: bad access detected
[   22.046239] 
[   22.046277] Memory state around the buggy address:
[   22.046322]  fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.046801]  fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.046954] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.047012]                    ^
[   22.047382]  fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.047610]  fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.047766] ==================================================================
[   22.026527] ==================================================================
[   22.026650] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.026745] Free of addr fff00000c788c000 by task kunit_try_catch/246
[   22.026801] 
[   22.026872] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.029114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.029205] Hardware name: linux,dummy-virt (DT)
[   22.029249] Call trace:
[   22.029281]  show_stack+0x20/0x38 (C)
[   22.029462]  dump_stack_lvl+0x8c/0xd0
[   22.029529]  print_report+0x118/0x608
[   22.029602]  kasan_report_invalid_free+0xc0/0xe8
[   22.029907]  __kasan_mempool_poison_object+0x14c/0x150
[   22.030278]  mempool_free+0x28c/0x328
[   22.030350]  mempool_double_free_helper+0x150/0x2e8
[   22.030414]  mempool_kmalloc_large_double_free+0xc0/0x118
[   22.030579]  kunit_try_run_case+0x170/0x3f0
[   22.030718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030786]  kthread+0x328/0x630
[   22.030937]  ret_from_fork+0x10/0x20
[   22.031091] 
[   22.031161] The buggy address belongs to the physical page:
[   22.031215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   22.031501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.031692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.031780] page_type: f8(unknown)
[   22.031985] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.032201] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.032382] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.032474] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.032588] head: 0bfffe0000000002 ffffc1ffc31e2301 00000000ffffffff 00000000ffffffff
[   22.032744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.032858] page dumped because: kasan: bad access detected
[   22.032929] 
[   22.032953] Memory state around the buggy address:
[   22.033207]  fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.033381]  fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.033445] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.033495]                    ^
[   22.033535]  fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.033663]  fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.033887] ==================================================================
[   21.984565] ==================================================================
[   21.984686] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.984783] Free of addr fff00000c6408e00 by task kunit_try_catch/244
[   21.986966] 
[   21.987367] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.988272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.988689] Hardware name: linux,dummy-virt (DT)
[   21.988741] Call trace:
[   21.988776]  show_stack+0x20/0x38 (C)
[   21.988865]  dump_stack_lvl+0x8c/0xd0
[   21.988925]  print_report+0x118/0x608
[   21.988985]  kasan_report_invalid_free+0xc0/0xe8
[   21.989045]  check_slab_allocation+0xd4/0x108
[   21.989103]  __kasan_mempool_poison_object+0x78/0x150
[   21.989163]  mempool_free+0x28c/0x328
[   21.989221]  mempool_double_free_helper+0x150/0x2e8
[   21.989282]  mempool_kmalloc_double_free+0xc0/0x118
[   21.989341]  kunit_try_run_case+0x170/0x3f0
[   21.989401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.989465]  kthread+0x328/0x630
[   21.990889]  ret_from_fork+0x10/0x20
[   21.991112] 
[   21.991144] Allocated by task 244:
[   21.991368]  kasan_save_stack+0x3c/0x68
[   21.991779]  kasan_save_track+0x20/0x40
[   21.991830]  kasan_save_alloc_info+0x40/0x58
[   21.992300]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.992366]  remove_element+0x130/0x1f8
[   21.992615]  mempool_alloc_preallocated+0x58/0xc0
[   21.993027]  mempool_double_free_helper+0x94/0x2e8
[   21.993086]  mempool_kmalloc_double_free+0xc0/0x118
[   21.993135]  kunit_try_run_case+0x170/0x3f0
[   21.993433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.993504]  kthread+0x328/0x630
[   21.993547]  ret_from_fork+0x10/0x20
[   21.993677] 
[   21.993736] Freed by task 244:
[   21.993905]  kasan_save_stack+0x3c/0x68
[   21.993980]  kasan_save_track+0x20/0x40
[   21.994030]  kasan_save_free_info+0x4c/0x78
[   21.994263]  __kasan_mempool_poison_object+0xc0/0x150
[   21.994382]  mempool_free+0x28c/0x328
[   21.994428]  mempool_double_free_helper+0x100/0x2e8
[   21.995038]  mempool_kmalloc_double_free+0xc0/0x118
[   21.995106]  kunit_try_run_case+0x170/0x3f0
[   21.995154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.995207]  kthread+0x328/0x630
[   21.995641]  ret_from_fork+0x10/0x20
[   21.995898] 
[   21.996035] The buggy address belongs to the object at fff00000c6408e00
[   21.996035]  which belongs to the cache kmalloc-128 of size 128
[   21.996134] The buggy address is located 0 bytes inside of
[   21.996134]  128-byte region [fff00000c6408e00, fff00000c6408e80)
[   21.996203] 
[   21.996947] The buggy address belongs to the physical page:
[   21.997070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   21.997153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.997223] page_type: f5(slab)
[   21.997738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.997871] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.998343] page dumped because: kasan: bad access detected
[   21.998450] 
[   21.998537] Memory state around the buggy address:
[   21.998620]  fff00000c6408d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.998788]  fff00000c6408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.998967] >fff00000c6408e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.999019]                    ^
[   21.999059]  fff00000c6408e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.999112]  fff00000c6408f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.999162] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   21.907437] ==================================================================
[   21.907578] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.907703] Read of size 1 at addr fff00000c7888000 by task kunit_try_catch/238
[   21.907817] 
[   21.907882] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.907989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.908024] Hardware name: linux,dummy-virt (DT)
[   21.908063] Call trace:
[   21.908095]  show_stack+0x20/0x38 (C)
[   21.908156]  dump_stack_lvl+0x8c/0xd0
[   21.908213]  print_report+0x118/0x608
[   21.908269]  kasan_report+0xdc/0x128
[   21.908322]  __asan_report_load1_noabort+0x20/0x30
[   21.908380]  mempool_uaf_helper+0x314/0x340
[   21.908436]  mempool_kmalloc_large_uaf+0xc4/0x120
[   21.908548]  kunit_try_run_case+0x170/0x3f0
[   21.908677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.908752]  kthread+0x328/0x630
[   21.909486]  ret_from_fork+0x10/0x20
[   21.909569] 
[   21.909600] The buggy address belongs to the physical page:
[   21.909674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107888
[   21.909745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.909801] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.909891] page_type: f8(unknown)
[   21.909988] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.910051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.910547] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.910696] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.910907] head: 0bfffe0000000002 ffffc1ffc31e2201 00000000ffffffff 00000000ffffffff
[   21.910966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.911247] page dumped because: kasan: bad access detected
[   21.911327] 
[   21.911354] Memory state around the buggy address:
[   21.911817]  fff00000c7887f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.911891]  fff00000c7887f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.911945] >fff00000c7888000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.911989]                    ^
[   21.912026]  fff00000c7888080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.912607]  fff00000c7888100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.912852] ==================================================================
[   21.951757] ==================================================================
[   21.952061] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.952296] Read of size 1 at addr fff00000c788c000 by task kunit_try_catch/242
[   21.952597] 
[   21.952720] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.953260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.953360] Hardware name: linux,dummy-virt (DT)
[   21.953464] Call trace:
[   21.953516]  show_stack+0x20/0x38 (C)
[   21.953616]  dump_stack_lvl+0x8c/0xd0
[   21.953677]  print_report+0x118/0x608
[   21.953736]  kasan_report+0xdc/0x128
[   21.953792]  __asan_report_load1_noabort+0x20/0x30
[   21.953885]  mempool_uaf_helper+0x314/0x340
[   21.953946]  mempool_page_alloc_uaf+0xc0/0x118
[   21.954037]  kunit_try_run_case+0x170/0x3f0
[   21.954269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.954636]  kthread+0x328/0x630
[   21.954704]  ret_from_fork+0x10/0x20
[   21.954780] 
[   21.954817] The buggy address belongs to the physical page:
[   21.954874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   21.954946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.955037] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.955104] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.955859] page dumped because: kasan: bad access detected
[   21.956296] 
[   21.956622] Memory state around the buggy address:
[   21.956860]  fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.957109]  fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.957170] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.957221]                    ^
[   21.957263]  fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.957318]  fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.957368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   21.923457] ==================================================================
[   21.923552] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.923639] Read of size 1 at addr fff00000c6e15240 by task kunit_try_catch/240
[   21.923742] 
[   21.923803] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.923988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.924225] Hardware name: linux,dummy-virt (DT)
[   21.924275] Call trace:
[   21.924312]  show_stack+0x20/0x38 (C)
[   21.924379]  dump_stack_lvl+0x8c/0xd0
[   21.924437]  print_report+0x118/0x608
[   21.924778]  kasan_report+0xdc/0x128
[   21.925102]  __asan_report_load1_noabort+0x20/0x30
[   21.925183]  mempool_uaf_helper+0x314/0x340
[   21.925251]  mempool_slab_uaf+0xc0/0x118
[   21.925308]  kunit_try_run_case+0x170/0x3f0
[   21.925367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.925429]  kthread+0x328/0x630
[   21.925525]  ret_from_fork+0x10/0x20
[   21.925797] 
[   21.925938] Allocated by task 240:
[   21.926066]  kasan_save_stack+0x3c/0x68
[   21.926129]  kasan_save_track+0x20/0x40
[   21.926178]  kasan_save_alloc_info+0x40/0x58
[   21.926498]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.926610]  remove_element+0x16c/0x1f8
[   21.926660]  mempool_alloc_preallocated+0x58/0xc0
[   21.927159]  mempool_uaf_helper+0xa4/0x340
[   21.927280]  mempool_slab_uaf+0xc0/0x118
[   21.927343]  kunit_try_run_case+0x170/0x3f0
[   21.927393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927447]  kthread+0x328/0x630
[   21.927489]  ret_from_fork+0x10/0x20
[   21.927536] 
[   21.927563] Freed by task 240:
[   21.927598]  kasan_save_stack+0x3c/0x68
[   21.927644]  kasan_save_track+0x20/0x40
[   21.927691]  kasan_save_free_info+0x4c/0x78
[   21.927733]  __kasan_mempool_poison_object+0xc0/0x150
[   21.927781]  mempool_free+0x28c/0x328
[   21.928150]  mempool_uaf_helper+0x104/0x340
[   21.928243]  mempool_slab_uaf+0xc0/0x118
[   21.928350]  kunit_try_run_case+0x170/0x3f0
[   21.928528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.928755]  kthread+0x328/0x630
[   21.928885]  ret_from_fork+0x10/0x20
[   21.928947] 
[   21.928976] The buggy address belongs to the object at fff00000c6e15240
[   21.928976]  which belongs to the cache test_cache of size 123
[   21.929130] The buggy address is located 0 bytes inside of
[   21.929130]  freed 123-byte region [fff00000c6e15240, fff00000c6e152bb)
[   21.929207] 
[   21.929360] The buggy address belongs to the physical page:
[   21.929423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e15
[   21.929507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.929572] page_type: f5(slab)
[   21.929630] raw: 0bfffe0000000000 fff00000c6419280 dead000000000122 0000000000000000
[   21.929694] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.929747] page dumped because: kasan: bad access detected
[   21.929788] 
[   21.929908] Memory state around the buggy address:
[   21.930007]  fff00000c6e15100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.930180]  fff00000c6e15180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.930321] >fff00000c6e15200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   21.930374]                                            ^
[   21.930770]  fff00000c6e15280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.931047]  fff00000c6e15300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.931162] ==================================================================
[   21.896253] ==================================================================
[   21.896404] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.896566] Read of size 1 at addr fff00000c6408a00 by task kunit_try_catch/236
[   21.896626] 
[   21.896675] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.896809] Hardware name: linux,dummy-virt (DT)
[   21.896863] Call trace:
[   21.896896]  show_stack+0x20/0x38 (C)
[   21.896968]  dump_stack_lvl+0x8c/0xd0
[   21.897022]  print_report+0x118/0x608
[   21.897076]  kasan_report+0xdc/0x128
[   21.897126]  __asan_report_load1_noabort+0x20/0x30
[   21.897177]  mempool_uaf_helper+0x314/0x340
[   21.897226]  mempool_kmalloc_uaf+0xc4/0x120
[   21.897277]  kunit_try_run_case+0x170/0x3f0
[   21.897332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.897390]  kthread+0x328/0x630
[   21.897436]  ret_from_fork+0x10/0x20
[   21.897490] 
[   21.897512] Allocated by task 236:
[   21.897549]  kasan_save_stack+0x3c/0x68
[   21.897597]  kasan_save_track+0x20/0x40
[   21.897638]  kasan_save_alloc_info+0x40/0x58
[   21.897726]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.897827]  remove_element+0x130/0x1f8
[   21.897937]  mempool_alloc_preallocated+0x58/0xc0
[   21.897990]  mempool_uaf_helper+0xa4/0x340
[   21.898035]  mempool_kmalloc_uaf+0xc4/0x120
[   21.898448]  kunit_try_run_case+0x170/0x3f0
[   21.898502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.898585]  kthread+0x328/0x630
[   21.898634]  ret_from_fork+0x10/0x20
[   21.898685] 
[   21.898753] Freed by task 236:
[   21.898800]  kasan_save_stack+0x3c/0x68
[   21.898875]  kasan_save_track+0x20/0x40
[   21.898922]  kasan_save_free_info+0x4c/0x78
[   21.898970]  __kasan_mempool_poison_object+0xc0/0x150
[   21.899309]  mempool_free+0x28c/0x328
[   21.899375]  mempool_uaf_helper+0x104/0x340
[   21.899478]  mempool_kmalloc_uaf+0xc4/0x120
[   21.899521]  kunit_try_run_case+0x170/0x3f0
[   21.899565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.899613]  kthread+0x328/0x630
[   21.899649]  ret_from_fork+0x10/0x20
[   21.899691] 
[   21.899715] The buggy address belongs to the object at fff00000c6408a00
[   21.899715]  which belongs to the cache kmalloc-128 of size 128
[   21.899884] The buggy address is located 0 bytes inside of
[   21.899884]  freed 128-byte region [fff00000c6408a00, fff00000c6408a80)
[   21.900087] 
[   21.900116] The buggy address belongs to the physical page:
[   21.900159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   21.900229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.900288] page_type: f5(slab)
[   21.900338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.900396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.900918] page dumped because: kasan: bad access detected
[   21.900979] 
[   21.901175] Memory state around the buggy address:
[   21.901233]  fff00000c6408900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.901290]  fff00000c6408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.901338] >fff00000c6408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.901389]                    ^
[   21.901425]  fff00000c6408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.901471]  fff00000c6408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.901617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   21.858033] ==================================================================
[   21.858120] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.858205] Read of size 1 at addr fff00000c7886001 by task kunit_try_catch/232
[   21.858270] 
[   21.858319] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.858425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.858461] Hardware name: linux,dummy-virt (DT)
[   21.858499] Call trace:
[   21.858529]  show_stack+0x20/0x38 (C)
[   21.858591]  dump_stack_lvl+0x8c/0xd0
[   21.858646]  print_report+0x118/0x608
[   21.858735]  kasan_report+0xdc/0x128
[   21.858789]  __asan_report_load1_noabort+0x20/0x30
[   21.858860]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.858922]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.858982]  kunit_try_run_case+0x170/0x3f0
[   21.859040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859213]  kthread+0x328/0x630
[   21.859267]  ret_from_fork+0x10/0x20
[   21.859328] 
[   21.859359] The buggy address belongs to the physical page:
[   21.859405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   21.859470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.859521] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.859979] page_type: f8(unknown)
[   21.860152] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.860221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.860286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.860345] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.860404] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   21.860577] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.860629] page dumped because: kasan: bad access detected
[   21.860665] 
[   21.860695] Memory state around the buggy address:
[   21.860735]  fff00000c7885f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.860829]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.861058] >fff00000c7886000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861118]                    ^
[   21.861160]  fff00000c7886080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861210]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861254] ==================================================================
[   21.871790] ==================================================================
[   21.871895] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.871984] Read of size 1 at addr fff00000c63ff2bb by task kunit_try_catch/234
[   21.872042] 
[   21.872238] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.872483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.872663] Hardware name: linux,dummy-virt (DT)
[   21.872706] Call trace:
[   21.872737]  show_stack+0x20/0x38 (C)
[   21.872809]  dump_stack_lvl+0x8c/0xd0
[   21.872876]  print_report+0x118/0x608
[   21.872926]  kasan_report+0xdc/0x128
[   21.872973]  __asan_report_load1_noabort+0x20/0x30
[   21.873193]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.873342]  mempool_slab_oob_right+0xc0/0x118
[   21.873402]  kunit_try_run_case+0x170/0x3f0
[   21.873512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.873575]  kthread+0x328/0x630
[   21.873622]  ret_from_fork+0x10/0x20
[   21.873864] 
[   21.873908] Allocated by task 234:
[   21.873952]  kasan_save_stack+0x3c/0x68
[   21.874068]  kasan_save_track+0x20/0x40
[   21.874181]  kasan_save_alloc_info+0x40/0x58
[   21.874267]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.874338]  remove_element+0x16c/0x1f8
[   21.874382]  mempool_alloc_preallocated+0x58/0xc0
[   21.874424]  mempool_oob_right_helper+0x98/0x2f0
[   21.874469]  mempool_slab_oob_right+0xc0/0x118
[   21.874512]  kunit_try_run_case+0x170/0x3f0
[   21.874568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.874651]  kthread+0x328/0x630
[   21.874722]  ret_from_fork+0x10/0x20
[   21.874820] 
[   21.874949] The buggy address belongs to the object at fff00000c63ff240
[   21.874949]  which belongs to the cache test_cache of size 123
[   21.875550] The buggy address is located 0 bytes to the right of
[   21.875550]  allocated 123-byte region [fff00000c63ff240, fff00000c63ff2bb)
[   21.876099] 
[   21.876268] The buggy address belongs to the physical page:
[   21.876336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ff
[   21.876578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.876666] page_type: f5(slab)
[   21.876716] raw: 0bfffe0000000000 fff00000c6419140 dead000000000122 0000000000000000
[   21.876949] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.877146] page dumped because: kasan: bad access detected
[   21.877189] 
[   21.877212] Memory state around the buggy address:
[   21.877257]  fff00000c63ff180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.877310]  fff00000c63ff200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.877358] >fff00000c63ff280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.877402]                                         ^
[   21.877440]  fff00000c63ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.877488]  fff00000c63ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.877532] ==================================================================
[   21.847753] ==================================================================
[   21.847888] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.847993] Read of size 1 at addr fff00000c6408673 by task kunit_try_catch/230
[   21.848059] 
[   21.848128] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.848230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.848262] Hardware name: linux,dummy-virt (DT)
[   21.848302] Call trace:
[   21.848335]  show_stack+0x20/0x38 (C)
[   21.848397]  dump_stack_lvl+0x8c/0xd0
[   21.848451]  print_report+0x118/0x608
[   21.848507]  kasan_report+0xdc/0x128
[   21.848556]  __asan_report_load1_noabort+0x20/0x30
[   21.848613]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.848667]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.848720]  kunit_try_run_case+0x170/0x3f0
[   21.848777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.848861]  kthread+0x328/0x630
[   21.848911]  ret_from_fork+0x10/0x20
[   21.848969] 
[   21.849022] Allocated by task 230:
[   21.849064]  kasan_save_stack+0x3c/0x68
[   21.849122]  kasan_save_track+0x20/0x40
[   21.849173]  kasan_save_alloc_info+0x40/0x58
[   21.849213]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.849260]  remove_element+0x130/0x1f8
[   21.849303]  mempool_alloc_preallocated+0x58/0xc0
[   21.849347]  mempool_oob_right_helper+0x98/0x2f0
[   21.849388]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.849430]  kunit_try_run_case+0x170/0x3f0
[   21.849472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.849518]  kthread+0x328/0x630
[   21.849553]  ret_from_fork+0x10/0x20
[   21.849595] 
[   21.849628] The buggy address belongs to the object at fff00000c6408600
[   21.849628]  which belongs to the cache kmalloc-128 of size 128
[   21.849697] The buggy address is located 0 bytes to the right of
[   21.849697]  allocated 115-byte region [fff00000c6408600, fff00000c6408673)
[   21.849768] 
[   21.849798] The buggy address belongs to the physical page:
[   21.849875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   21.849948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.850016] page_type: f5(slab)
[   21.850071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.850134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.850189] page dumped because: kasan: bad access detected
[   21.850230] 
[   21.850271] Memory state around the buggy address:
[   21.850318]  fff00000c6408500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.850376]  fff00000c6408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.850432] >fff00000c6408600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.850482]                                                              ^
[   21.850533]  fff00000c6408680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.850588]  fff00000c6408700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.850640] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   21.272228] ==================================================================
[   21.272348] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   21.272447] Read of size 1 at addr fff00000c10ddc80 by task kunit_try_catch/224
[   21.272508] 
[   21.272572] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.272681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.272718] Hardware name: linux,dummy-virt (DT)
[   21.272761] Call trace:
[   21.272802]  show_stack+0x20/0x38 (C)
[   21.272910]  dump_stack_lvl+0x8c/0xd0
[   21.272966]  print_report+0x118/0x608
[   21.273022]  kasan_report+0xdc/0x128
[   21.273074]  __kasan_check_byte+0x54/0x70
[   21.273132]  kmem_cache_destroy+0x34/0x218
[   21.273188]  kmem_cache_double_destroy+0x174/0x300
[   21.273247]  kunit_try_run_case+0x170/0x3f0
[   21.273305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.273367]  kthread+0x328/0x630
[   21.273420]  ret_from_fork+0x10/0x20
[   21.273480] 
[   21.273506] Allocated by task 224:
[   21.273548]  kasan_save_stack+0x3c/0x68
[   21.273606]  kasan_save_track+0x20/0x40
[   21.273654]  kasan_save_alloc_info+0x40/0x58
[   21.273700]  __kasan_slab_alloc+0xa8/0xb0
[   21.273747]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.273800]  __kmem_cache_create_args+0x178/0x280
[   21.273873]  kmem_cache_double_destroy+0xc0/0x300
[   21.273927]  kunit_try_run_case+0x170/0x3f0
[   21.273973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.274022]  kthread+0x328/0x630
[   21.274063]  ret_from_fork+0x10/0x20
[   21.274105] 
[   21.274130] Freed by task 224:
[   21.274165]  kasan_save_stack+0x3c/0x68
[   21.274210]  kasan_save_track+0x20/0x40
[   21.274256]  kasan_save_free_info+0x4c/0x78
[   21.274300]  __kasan_slab_free+0x6c/0x98
[   21.274346]  kmem_cache_free+0x260/0x468
[   21.274389]  slab_kmem_cache_release+0x38/0x50
[   21.274436]  kmem_cache_release+0x1c/0x30
[   21.274479]  kobject_put+0x17c/0x420
[   21.274527]  sysfs_slab_release+0x1c/0x30
[   21.274571]  kmem_cache_destroy+0x118/0x218
[   21.274614]  kmem_cache_double_destroy+0x128/0x300
[   21.274662]  kunit_try_run_case+0x170/0x3f0
[   21.274708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.274761]  kthread+0x328/0x630
[   21.274801]  ret_from_fork+0x10/0x20
[   21.274856] 
[   21.274883] The buggy address belongs to the object at fff00000c10ddc80
[   21.274883]  which belongs to the cache kmem_cache of size 208
[   21.274955] The buggy address is located 0 bytes inside of
[   21.274955]  freed 208-byte region [fff00000c10ddc80, fff00000c10ddd50)
[   21.275026] 
[   21.275056] The buggy address belongs to the physical page:
[   21.275100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010dd
[   21.275168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.275233] page_type: f5(slab)
[   21.275289] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   21.275352] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   21.275407] page dumped because: kasan: bad access detected
[   21.275447] 
[   21.275470] Memory state around the buggy address:
[   21.275513]  fff00000c10ddb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.275569]  fff00000c10ddc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275622] >fff00000c10ddc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.275665]                    ^
[   21.275697]  fff00000c10ddd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   21.275743]  fff00000c10ddd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.275788] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   21.022067] ==================================================================
[   21.022369] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   21.022555] Read of size 1 at addr fff00000c7736000 by task kunit_try_catch/222
[   21.022667] 
[   21.022767] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.022986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.023105] Hardware name: linux,dummy-virt (DT)
[   21.023257] Call trace:
[   21.023391]  show_stack+0x20/0x38 (C)
[   21.023577]  dump_stack_lvl+0x8c/0xd0
[   21.023735]  print_report+0x118/0x608
[   21.023946]  kasan_report+0xdc/0x128
[   21.024133]  __asan_report_load1_noabort+0x20/0x30
[   21.024332]  kmem_cache_rcu_uaf+0x388/0x468
[   21.024549]  kunit_try_run_case+0x170/0x3f0
[   21.024727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.024931]  kthread+0x328/0x630
[   21.025035]  ret_from_fork+0x10/0x20
[   21.025219] 
[   21.025306] Allocated by task 222:
[   21.025385]  kasan_save_stack+0x3c/0x68
[   21.025499]  kasan_save_track+0x20/0x40
[   21.026017]  kasan_save_alloc_info+0x40/0x58
[   21.026112]  __kasan_slab_alloc+0xa8/0xb0
[   21.026219]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.026328]  kmem_cache_rcu_uaf+0x12c/0x468
[   21.026430]  kunit_try_run_case+0x170/0x3f0
[   21.026534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.026648]  kthread+0x328/0x630
[   21.026953]  ret_from_fork+0x10/0x20
[   21.027063] 
[   21.027092] Freed by task 0:
[   21.027135]  kasan_save_stack+0x3c/0x68
[   21.027183]  kasan_save_track+0x20/0x40
[   21.027229]  kasan_save_free_info+0x4c/0x78
[   21.027271]  __kasan_slab_free+0x6c/0x98
[   21.027318]  slab_free_after_rcu_debug+0xd4/0x2f8
[   21.027365]  rcu_core+0x9f4/0x1e20
[   21.027408]  rcu_core_si+0x18/0x30
[   21.027446]  handle_softirqs+0x374/0xb28
[   21.027487]  __do_softirq+0x1c/0x28
[   21.027527] 
[   21.027549] Last potentially related work creation:
[   21.027581]  kasan_save_stack+0x3c/0x68
[   21.027626]  kasan_record_aux_stack+0xb4/0xc8
[   21.027667]  kmem_cache_free+0x120/0x468
[   21.027710]  kmem_cache_rcu_uaf+0x16c/0x468
[   21.027749]  kunit_try_run_case+0x170/0x3f0
[   21.027792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.027863]  kthread+0x328/0x630
[   21.027929]  ret_from_fork+0x10/0x20
[   21.028003] 
[   21.028044] The buggy address belongs to the object at fff00000c7736000
[   21.028044]  which belongs to the cache test_cache of size 200
[   21.028218] The buggy address is located 0 bytes inside of
[   21.028218]  freed 200-byte region [fff00000c7736000, fff00000c77360c8)
[   21.028470] 
[   21.028524] The buggy address belongs to the physical page:
[   21.028698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107736
[   21.028848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.029224] page_type: f5(slab)
[   21.029341] raw: 0bfffe0000000000 fff00000c10ddb40 dead000000000122 0000000000000000
[   21.029562] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   21.029695] page dumped because: kasan: bad access detected
[   21.029898] 
[   21.029951] Memory state around the buggy address:
[   21.030144]  fff00000c7735f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.030334]  fff00000c7735f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.030564] >fff00000c7736000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.030674]                    ^
[   21.031051]  fff00000c7736080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   21.031320]  fff00000c7736100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.031524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   20.359476] ==================================================================
[   20.359573] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   20.359663] Free of addr fff00000c6e21001 by task kunit_try_catch/220
[   20.359713] 
[   20.359776] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   20.360416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.360490] Hardware name: linux,dummy-virt (DT)
[   20.360577] Call trace:
[   20.360683]  show_stack+0x20/0x38 (C)
[   20.360936]  dump_stack_lvl+0x8c/0xd0
[   20.361021]  print_report+0x118/0x608
[   20.361091]  kasan_report_invalid_free+0xc0/0xe8
[   20.361447]  check_slab_allocation+0xfc/0x108
[   20.361538]  __kasan_slab_pre_free+0x2c/0x48
[   20.361598]  kmem_cache_free+0xf0/0x468
[   20.362132]  kmem_cache_invalid_free+0x184/0x3c8
[   20.362226]  kunit_try_run_case+0x170/0x3f0
[   20.362354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.362452]  kthread+0x328/0x630
[   20.362511]  ret_from_fork+0x10/0x20
[   20.362870] 
[   20.362910] Allocated by task 220:
[   20.363166]  kasan_save_stack+0x3c/0x68
[   20.363439]  kasan_save_track+0x20/0x40
[   20.363688]  kasan_save_alloc_info+0x40/0x58
[   20.363962]  __kasan_slab_alloc+0xa8/0xb0
[   20.364025]  kmem_cache_alloc_noprof+0x10c/0x398
[   20.364101]  kmem_cache_invalid_free+0x12c/0x3c8
[   20.364149]  kunit_try_run_case+0x170/0x3f0
[   20.364772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.365185]  kthread+0x328/0x630
[   20.365477]  ret_from_fork+0x10/0x20
[   20.365525] 
[   20.365551] The buggy address belongs to the object at fff00000c6e21000
[   20.365551]  which belongs to the cache test_cache of size 200
[   20.365726] The buggy address is located 1 bytes inside of
[   20.365726]  200-byte region [fff00000c6e21000, fff00000c6e210c8)
[   20.366098] 
[   20.366495] The buggy address belongs to the physical page:
[   20.366903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e21
[   20.367000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.367067] page_type: f5(slab)
[   20.367121] raw: 0bfffe0000000000 fff00000c10dda00 dead000000000122 0000000000000000
[   20.367183] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.367233] page dumped because: kasan: bad access detected
[   20.367270] 
[   20.367294] Memory state around the buggy address:
[   20.367333]  fff00000c6e20f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.367388]  fff00000c6e20f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.367439] >fff00000c6e21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.367484]                    ^
[   20.367517]  fff00000c6e21080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.369339]  fff00000c6e21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.369414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   20.327083] ==================================================================
[   20.327264] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   20.327423] Free of addr fff00000c6e23000 by task kunit_try_catch/218
[   20.327511] 
[   20.327591] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   20.327735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.327796] Hardware name: linux,dummy-virt (DT)
[   20.327886] Call trace:
[   20.327923]  show_stack+0x20/0x38 (C)
[   20.327986]  dump_stack_lvl+0x8c/0xd0
[   20.328044]  print_report+0x118/0x608
[   20.328097]  kasan_report_invalid_free+0xc0/0xe8
[   20.328154]  check_slab_allocation+0xd4/0x108
[   20.328207]  __kasan_slab_pre_free+0x2c/0x48
[   20.328262]  kmem_cache_free+0xf0/0x468
[   20.328315]  kmem_cache_double_free+0x190/0x3c8
[   20.328370]  kunit_try_run_case+0x170/0x3f0
[   20.328428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.328483]  kthread+0x328/0x630
[   20.328534]  ret_from_fork+0x10/0x20
[   20.328591] 
[   20.328616] Allocated by task 218:
[   20.328651]  kasan_save_stack+0x3c/0x68
[   20.328700]  kasan_save_track+0x20/0x40
[   20.328742]  kasan_save_alloc_info+0x40/0x58
[   20.328825]  __kasan_slab_alloc+0xa8/0xb0
[   20.328885]  kmem_cache_alloc_noprof+0x10c/0x398
[   20.328928]  kmem_cache_double_free+0x12c/0x3c8
[   20.328971]  kunit_try_run_case+0x170/0x3f0
[   20.329010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.329354]  kthread+0x328/0x630
[   20.329669]  ret_from_fork+0x10/0x20
[   20.329752] 
[   20.329801] Freed by task 218:
[   20.329857]  kasan_save_stack+0x3c/0x68
[   20.329911]  kasan_save_track+0x20/0x40
[   20.329971]  kasan_save_free_info+0x4c/0x78
[   20.330043]  __kasan_slab_free+0x6c/0x98
[   20.330085]  kmem_cache_free+0x260/0x468
[   20.330162]  kmem_cache_double_free+0x140/0x3c8
[   20.330207]  kunit_try_run_case+0x170/0x3f0
[   20.330252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.330301]  kthread+0x328/0x630
[   20.330339]  ret_from_fork+0x10/0x20
[   20.330380] 
[   20.330403] The buggy address belongs to the object at fff00000c6e23000
[   20.330403]  which belongs to the cache test_cache of size 200
[   20.330490] The buggy address is located 0 bytes inside of
[   20.330490]  200-byte region [fff00000c6e23000, fff00000c6e230c8)
[   20.330559] 
[   20.330585] The buggy address belongs to the physical page:
[   20.330632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e23
[   20.330722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.330809] page_type: f5(slab)
[   20.330922] raw: 0bfffe0000000000 fff00000c5c86dc0 dead000000000122 0000000000000000
[   20.331104] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.331365] page dumped because: kasan: bad access detected
[   20.331408] 
[   20.331432] Memory state around the buggy address:
[   20.331654]  fff00000c6e22f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.331914]  fff00000c6e22f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.332070] >fff00000c6e23000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.332268]                    ^
[   20.332395]  fff00000c6e23080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.332615]  fff00000c6e23100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.332671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   20.079320] ==================================================================
[   20.080031] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   20.080363] Read of size 1 at addr fff00000c6e280c8 by task kunit_try_catch/216
[   20.080490] 
[   20.080786] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   20.081445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.081506] Hardware name: linux,dummy-virt (DT)
[   20.081946] Call trace:
[   20.082004]  show_stack+0x20/0x38 (C)
[   20.082090]  dump_stack_lvl+0x8c/0xd0
[   20.082151]  print_report+0x118/0x608
[   20.082246]  kasan_report+0xdc/0x128
[   20.082383]  __asan_report_load1_noabort+0x20/0x30
[   20.082569]  kmem_cache_oob+0x344/0x430
[   20.082702]  kunit_try_run_case+0x170/0x3f0
[   20.082849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.082970]  kthread+0x328/0x630
[   20.083121]  ret_from_fork+0x10/0x20
[   20.083245] 
[   20.083301] Allocated by task 216:
[   20.083387]  kasan_save_stack+0x3c/0x68
[   20.083469]  kasan_save_track+0x20/0x40
[   20.083555]  kasan_save_alloc_info+0x40/0x58
[   20.083646]  __kasan_slab_alloc+0xa8/0xb0
[   20.083733]  kmem_cache_alloc_noprof+0x10c/0x398
[   20.083826]  kmem_cache_oob+0x12c/0x430
[   20.083916]  kunit_try_run_case+0x170/0x3f0
[   20.084005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.084103]  kthread+0x328/0x630
[   20.084198]  ret_from_fork+0x10/0x20
[   20.084286] 
[   20.084335] The buggy address belongs to the object at fff00000c6e28000
[   20.084335]  which belongs to the cache test_cache of size 200
[   20.084475] The buggy address is located 0 bytes to the right of
[   20.084475]  allocated 200-byte region [fff00000c6e28000, fff00000c6e280c8)
[   20.084621] 
[   20.084669] The buggy address belongs to the physical page:
[   20.084741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e28
[   20.084893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.085007] page_type: f5(slab)
[   20.085106] raw: 0bfffe0000000000 fff00000c5c86c80 dead000000000122 0000000000000000
[   20.085226] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.085336] page dumped because: kasan: bad access detected
[   20.085404] 
[   20.085448] Memory state around the buggy address:
[   20.085536]  fff00000c6e27f80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   20.085687]  fff00000c6e28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.085936] >fff00000c6e28080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.086046]                                               ^
[   20.086147]  fff00000c6e28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.086256]  fff00000c6e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.086440] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   19.986527] ==================================================================
[   19.986675] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   19.986857] Read of size 8 at addr fff00000c6406ac0 by task kunit_try_catch/209
[   19.987009] 
[   19.987122] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.987340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.987406] Hardware name: linux,dummy-virt (DT)
[   19.987482] Call trace:
[   19.987610]  show_stack+0x20/0x38 (C)
[   19.987821]  dump_stack_lvl+0x8c/0xd0
[   19.988013]  print_report+0x118/0x608
[   19.988128]  kasan_report+0xdc/0x128
[   19.988239]  __asan_report_load8_noabort+0x20/0x30
[   19.988710]  workqueue_uaf+0x480/0x4a8
[   19.988864]  kunit_try_run_case+0x170/0x3f0
[   19.988974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.989117]  kthread+0x328/0x630
[   19.989208]  ret_from_fork+0x10/0x20
[   19.989543] 
[   19.989615] Allocated by task 209:
[   19.989701]  kasan_save_stack+0x3c/0x68
[   19.989787]  kasan_save_track+0x20/0x40
[   19.989920]  kasan_save_alloc_info+0x40/0x58
[   19.990009]  __kasan_kmalloc+0xd4/0xd8
[   19.990126]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.990253]  workqueue_uaf+0x13c/0x4a8
[   19.990344]  kunit_try_run_case+0x170/0x3f0
[   19.990448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.990580]  kthread+0x328/0x630
[   19.990657]  ret_from_fork+0x10/0x20
[   19.990777] 
[   19.990849] Freed by task 76:
[   19.990939]  kasan_save_stack+0x3c/0x68
[   19.991060]  kasan_save_track+0x20/0x40
[   19.991176]  kasan_save_free_info+0x4c/0x78
[   19.991268]  __kasan_slab_free+0x6c/0x98
[   19.991359]  kfree+0x214/0x3c8
[   19.991435]  workqueue_uaf_work+0x18/0x30
[   19.991521]  process_one_work+0x530/0xf98
[   19.991612]  worker_thread+0x618/0xf38
[   19.991694]  kthread+0x328/0x630
[   19.991773]  ret_from_fork+0x10/0x20
[   19.991866] 
[   19.991910] Last potentially related work creation:
[   19.991963]  kasan_save_stack+0x3c/0x68
[   19.992316]  kasan_record_aux_stack+0xb4/0xc8
[   19.992500]  __queue_work+0x65c/0xfe0
[   19.992587]  queue_work_on+0xbc/0xf8
[   19.992668]  workqueue_uaf+0x210/0x4a8
[   19.992751]  kunit_try_run_case+0x170/0x3f0
[   19.993996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.994117]  kthread+0x328/0x630
[   19.994202]  ret_from_fork+0x10/0x20
[   19.994382] 
[   19.994444] The buggy address belongs to the object at fff00000c6406ac0
[   19.994444]  which belongs to the cache kmalloc-32 of size 32
[   19.994599] The buggy address is located 0 bytes inside of
[   19.994599]  freed 32-byte region [fff00000c6406ac0, fff00000c6406ae0)
[   19.994789] 
[   19.994860] The buggy address belongs to the physical page:
[   19.994964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106406
[   19.995103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.995227] page_type: f5(slab)
[   19.995337] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.995473] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.995583] page dumped because: kasan: bad access detected
[   19.995667] 
[   19.995712] Memory state around the buggy address:
[   19.996408]  fff00000c6406980: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.996989]  fff00000c6406a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.997200] >fff00000c6406a80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   19.997456]                                            ^
[   19.997576]  fff00000c6406b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.997990]  fff00000c6406b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.998167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   19.942490] ==================================================================
[   19.942753] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   19.942920] Read of size 4 at addr fff00000c6406880 by task swapper/0/0
[   19.943034] 
[   19.943128] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.944818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.945259] Hardware name: linux,dummy-virt (DT)
[   19.945344] Call trace:
[   19.945394]  show_stack+0x20/0x38 (C)
[   19.945514]  dump_stack_lvl+0x8c/0xd0
[   19.945614]  print_report+0x118/0x608
[   19.946937]  kasan_report+0xdc/0x128
[   19.947568]  __asan_report_load4_noabort+0x20/0x30
[   19.947993]  rcu_uaf_reclaim+0x64/0x70
[   19.948226]  rcu_core+0x9f4/0x1e20
[   19.948372]  rcu_core_si+0x18/0x30
[   19.948849]  handle_softirqs+0x374/0xb28
[   19.949330]  __do_softirq+0x1c/0x28
[   19.949549]  ____do_softirq+0x18/0x30
[   19.949658]  call_on_irq_stack+0x24/0x30
[   19.949805]  do_softirq_own_stack+0x24/0x38
[   19.950242]  __irq_exit_rcu+0x1fc/0x318
[   19.950761]  irq_exit_rcu+0x1c/0x80
[   19.951065]  el1_interrupt+0x38/0x58
[   19.951603]  el1h_64_irq_handler+0x18/0x28
[   19.951722]  el1h_64_irq+0x6c/0x70
[   19.952748]  finish_task_switch.isra.0+0x120/0x5e8 (P)
[   19.953554]  __schedule+0xab4/0x2840
[   19.953691]  schedule_idle+0x60/0xa8
[   19.953922]  do_idle+0x2c4/0x4e8
[   19.954168]  cpu_startup_entry+0x64/0x80
[   19.954713]  rest_init+0x160/0x188
[   19.955146]  start_kernel+0x30c/0x3d0
[   19.955297]  __primary_switched+0x8c/0xa0
[   19.955431] 
[   19.955856] Allocated by task 207:
[   19.956227]  kasan_save_stack+0x3c/0x68
[   19.956471]  kasan_save_track+0x20/0x40
[   19.956684]  kasan_save_alloc_info+0x40/0x58
[   19.957041]  __kasan_kmalloc+0xd4/0xd8
[   19.957263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.957359]  rcu_uaf+0xb0/0x2d8
[   19.957442]  kunit_try_run_case+0x170/0x3f0
[   19.957538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957720]  kthread+0x328/0x630
[   19.957856]  ret_from_fork+0x10/0x20
[   19.957989] 
[   19.958060] Freed by task 0:
[   19.958140]  kasan_save_stack+0x3c/0x68
[   19.958233]  kasan_save_track+0x20/0x40
[   19.958332]  kasan_save_free_info+0x4c/0x78
[   19.958466]  __kasan_slab_free+0x6c/0x98
[   19.958555]  kfree+0x214/0x3c8
[   19.958688]  rcu_uaf_reclaim+0x28/0x70
[   19.958792]  rcu_core+0x9f4/0x1e20
[   19.958924]  rcu_core_si+0x18/0x30
[   19.959004]  handle_softirqs+0x374/0xb28
[   19.959085]  __do_softirq+0x1c/0x28
[   19.959170] 
[   19.959244] Last potentially related work creation:
[   19.959318]  kasan_save_stack+0x3c/0x68
[   19.959411]  kasan_record_aux_stack+0xb4/0xc8
[   19.959496]  __call_rcu_common.constprop.0+0x74/0x8c8
[   19.959593]  call_rcu+0x18/0x30
[   19.959671]  rcu_uaf+0x14c/0x2d8
[   19.959750]  kunit_try_run_case+0x170/0x3f0
[   19.959843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.959936]  kthread+0x328/0x630
[   19.960006]  ret_from_fork+0x10/0x20
[   19.960376] 
[   19.960455] The buggy address belongs to the object at fff00000c6406880
[   19.960455]  which belongs to the cache kmalloc-32 of size 32
[   19.960674] The buggy address is located 0 bytes inside of
[   19.960674]  freed 32-byte region [fff00000c6406880, fff00000c64068a0)
[   19.960890] 
[   19.960942] The buggy address belongs to the physical page:
[   19.961024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106406
[   19.961395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.961632] page_type: f5(slab)
[   19.961727] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.961869] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.962017] page dumped because: kasan: bad access detected
[   19.962093] 
[   19.962142] Memory state around the buggy address:
[   19.962222]  fff00000c6406780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.962591]  fff00000c6406800: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.962722] >fff00000c6406880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.962820]                    ^
[   19.962901]  fff00000c6406900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.963181]  fff00000c6406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.963395] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   19.686003] ==================================================================
[   19.686164] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.686285] Read of size 1 at addr fff00000c6408378 by task kunit_try_catch/205
[   19.686403] 
[   19.686472] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.686661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.686733] Hardware name: linux,dummy-virt (DT)
[   19.686806] Call trace:
[   19.686865]  show_stack+0x20/0x38 (C)
[   19.686977]  dump_stack_lvl+0x8c/0xd0
[   19.687088]  print_report+0x118/0x608
[   19.687250]  kasan_report+0xdc/0x128
[   19.687377]  __asan_report_load1_noabort+0x20/0x30
[   19.687501]  ksize_uaf+0x544/0x5f8
[   19.687635]  kunit_try_run_case+0x170/0x3f0
[   19.687780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.687920]  kthread+0x328/0x630
[   19.688011]  ret_from_fork+0x10/0x20
[   19.688107] 
[   19.688147] Allocated by task 205:
[   19.688212]  kasan_save_stack+0x3c/0x68
[   19.688326]  kasan_save_track+0x20/0x40
[   19.688574]  kasan_save_alloc_info+0x40/0x58
[   19.688695]  __kasan_kmalloc+0xd4/0xd8
[   19.688931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.689052]  ksize_uaf+0xb8/0x5f8
[   19.689122]  kunit_try_run_case+0x170/0x3f0
[   19.689198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.689287]  kthread+0x328/0x630
[   19.689359]  ret_from_fork+0x10/0x20
[   19.689447] 
[   19.689525] Freed by task 205:
[   19.689588]  kasan_save_stack+0x3c/0x68
[   19.689675]  kasan_save_track+0x20/0x40
[   19.689751]  kasan_save_free_info+0x4c/0x78
[   19.689850]  __kasan_slab_free+0x6c/0x98
[   19.689939]  kfree+0x214/0x3c8
[   19.690037]  ksize_uaf+0x11c/0x5f8
[   19.690169]  kunit_try_run_case+0x170/0x3f0
[   19.690269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.690445]  kthread+0x328/0x630
[   19.690555]  ret_from_fork+0x10/0x20
[   19.690665] 
[   19.690718] The buggy address belongs to the object at fff00000c6408300
[   19.690718]  which belongs to the cache kmalloc-128 of size 128
[   19.690876] The buggy address is located 120 bytes inside of
[   19.690876]  freed 128-byte region [fff00000c6408300, fff00000c6408380)
[   19.691037] 
[   19.691088] The buggy address belongs to the physical page:
[   19.691157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.691308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.691451] page_type: f5(slab)
[   19.691567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.691724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.691825] page dumped because: kasan: bad access detected
[   19.691914] 
[   19.691956] Memory state around the buggy address:
[   19.692034]  fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.692139]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692239] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.692339]                                                                 ^
[   19.692465]  fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692578]  fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692695] ==================================================================
[   19.663212] ==================================================================
[   19.663574] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.663913] Read of size 1 at addr fff00000c6408300 by task kunit_try_catch/205
[   19.664063] 
[   19.664135] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.664328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.664387] Hardware name: linux,dummy-virt (DT)
[   19.664487] Call trace:
[   19.664710]  show_stack+0x20/0x38 (C)
[   19.664989]  dump_stack_lvl+0x8c/0xd0
[   19.665109]  print_report+0x118/0x608
[   19.665267]  kasan_report+0xdc/0x128
[   19.665361]  __kasan_check_byte+0x54/0x70
[   19.665466]  ksize+0x30/0x88
[   19.665696]  ksize_uaf+0x168/0x5f8
[   19.665798]  kunit_try_run_case+0x170/0x3f0
[   19.665976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.666187]  kthread+0x328/0x630
[   19.666245]  ret_from_fork+0x10/0x20
[   19.666314] 
[   19.666357] Allocated by task 205:
[   19.666446]  kasan_save_stack+0x3c/0x68
[   19.666592]  kasan_save_track+0x20/0x40
[   19.666719]  kasan_save_alloc_info+0x40/0x58
[   19.666862]  __kasan_kmalloc+0xd4/0xd8
[   19.666957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.667049]  ksize_uaf+0xb8/0x5f8
[   19.667144]  kunit_try_run_case+0x170/0x3f0
[   19.667265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667404]  kthread+0x328/0x630
[   19.667481]  ret_from_fork+0x10/0x20
[   19.667570] 
[   19.667620] Freed by task 205:
[   19.667678]  kasan_save_stack+0x3c/0x68
[   19.667790]  kasan_save_track+0x20/0x40
[   19.667922]  kasan_save_free_info+0x4c/0x78
[   19.668042]  __kasan_slab_free+0x6c/0x98
[   19.668158]  kfree+0x214/0x3c8
[   19.668253]  ksize_uaf+0x11c/0x5f8
[   19.668355]  kunit_try_run_case+0x170/0x3f0
[   19.668470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.668595]  kthread+0x328/0x630
[   19.668672]  ret_from_fork+0x10/0x20
[   19.668801] 
[   19.668857] The buggy address belongs to the object at fff00000c6408300
[   19.668857]  which belongs to the cache kmalloc-128 of size 128
[   19.668992] The buggy address is located 0 bytes inside of
[   19.668992]  freed 128-byte region [fff00000c6408300, fff00000c6408380)
[   19.669128] 
[   19.669192] The buggy address belongs to the physical page:
[   19.669599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.669732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.669855] page_type: f5(slab)
[   19.669942] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.670085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.670200] page dumped because: kasan: bad access detected
[   19.670278] 
[   19.670379] Memory state around the buggy address:
[   19.670465]  fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.670752]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670878] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.671502]                    ^
[   19.671671]  fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.672032]  fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.672151] ==================================================================
[   19.674290] ==================================================================
[   19.674406] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.674518] Read of size 1 at addr fff00000c6408300 by task kunit_try_catch/205
[   19.674635] 
[   19.674706] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.674926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.674999] Hardware name: linux,dummy-virt (DT)
[   19.675072] Call trace:
[   19.675127]  show_stack+0x20/0x38 (C)
[   19.675234]  dump_stack_lvl+0x8c/0xd0
[   19.675345]  print_report+0x118/0x608
[   19.675454]  kasan_report+0xdc/0x128
[   19.675564]  __asan_report_load1_noabort+0x20/0x30
[   19.675677]  ksize_uaf+0x598/0x5f8
[   19.675774]  kunit_try_run_case+0x170/0x3f0
[   19.676788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.677114]  kthread+0x328/0x630
[   19.677214]  ret_from_fork+0x10/0x20
[   19.677314] 
[   19.677517] Allocated by task 205:
[   19.677797]  kasan_save_stack+0x3c/0x68
[   19.677923]  kasan_save_track+0x20/0x40
[   19.678110]  kasan_save_alloc_info+0x40/0x58
[   19.678463]  __kasan_kmalloc+0xd4/0xd8
[   19.678640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.678867]  ksize_uaf+0xb8/0x5f8
[   19.679020]  kunit_try_run_case+0x170/0x3f0
[   19.679172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.679571]  kthread+0x328/0x630
[   19.679654]  ret_from_fork+0x10/0x20
[   19.679891] 
[   19.679977] Freed by task 205:
[   19.680050]  kasan_save_stack+0x3c/0x68
[   19.680147]  kasan_save_track+0x20/0x40
[   19.680589]  kasan_save_free_info+0x4c/0x78
[   19.680736]  __kasan_slab_free+0x6c/0x98
[   19.680826]  kfree+0x214/0x3c8
[   19.680908]  ksize_uaf+0x11c/0x5f8
[   19.680992]  kunit_try_run_case+0x170/0x3f0
[   19.681548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.681737]  kthread+0x328/0x630
[   19.681826]  ret_from_fork+0x10/0x20
[   19.682011] 
[   19.682115] The buggy address belongs to the object at fff00000c6408300
[   19.682115]  which belongs to the cache kmalloc-128 of size 128
[   19.682349] The buggy address is located 0 bytes inside of
[   19.682349]  freed 128-byte region [fff00000c6408300, fff00000c6408380)
[   19.682505] 
[   19.682601] The buggy address belongs to the physical page:
[   19.682679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.682808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.682940] page_type: f5(slab)
[   19.683045] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.683177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.683280] page dumped because: kasan: bad access detected
[   19.683360] 
[   19.683403] Memory state around the buggy address:
[   19.683475]  fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.683590]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683700] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.683798]                    ^
[   19.684162]  fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.684502]  fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.684610] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   19.631701] ==================================================================
[   19.631815] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.631945] Read of size 1 at addr fff00000c6408278 by task kunit_try_catch/203
[   19.632063] 
[   19.632141] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.632430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.632514] Hardware name: linux,dummy-virt (DT)
[   19.632592] Call trace:
[   19.632644]  show_stack+0x20/0x38 (C)
[   19.632761]  dump_stack_lvl+0x8c/0xd0
[   19.633970]  print_report+0x118/0x608
[   19.634221]  kasan_report+0xdc/0x128
[   19.634457]  __asan_report_load1_noabort+0x20/0x30
[   19.634693]  ksize_unpoisons_memory+0x618/0x740
[   19.635121]  kunit_try_run_case+0x170/0x3f0
[   19.635303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.635661]  kthread+0x328/0x630
[   19.635799]  ret_from_fork+0x10/0x20
[   19.635978] 
[   19.636049] Allocated by task 203:
[   19.636127]  kasan_save_stack+0x3c/0x68
[   19.636226]  kasan_save_track+0x20/0x40
[   19.636321]  kasan_save_alloc_info+0x40/0x58
[   19.636428]  __kasan_kmalloc+0xd4/0xd8
[   19.636556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.636663]  ksize_unpoisons_memory+0xc0/0x740
[   19.636832]  kunit_try_run_case+0x170/0x3f0
[   19.636933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637045]  kthread+0x328/0x630
[   19.637136]  ret_from_fork+0x10/0x20
[   19.637230] 
[   19.637392] The buggy address belongs to the object at fff00000c6408200
[   19.637392]  which belongs to the cache kmalloc-128 of size 128
[   19.637664] The buggy address is located 5 bytes to the right of
[   19.637664]  allocated 115-byte region [fff00000c6408200, fff00000c6408273)
[   19.637884] 
[   19.637942] The buggy address belongs to the physical page:
[   19.638056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.638183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.638316] page_type: f5(slab)
[   19.638547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.638698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.638768] page dumped because: kasan: bad access detected
[   19.638812] 
[   19.638856] Memory state around the buggy address:
[   19.638938]  fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.639097]  fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.639247] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.639456]                                                                 ^
[   19.639617]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.639764]  fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.639885] ==================================================================
[   19.623333] ==================================================================
[   19.623489] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.623626] Read of size 1 at addr fff00000c6408273 by task kunit_try_catch/203
[   19.623755] 
[   19.623864] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.624388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.624623] Hardware name: linux,dummy-virt (DT)
[   19.624826] Call trace:
[   19.624931]  show_stack+0x20/0x38 (C)
[   19.625096]  dump_stack_lvl+0x8c/0xd0
[   19.625254]  print_report+0x118/0x608
[   19.625377]  kasan_report+0xdc/0x128
[   19.625503]  __asan_report_load1_noabort+0x20/0x30
[   19.625656]  ksize_unpoisons_memory+0x628/0x740
[   19.625777]  kunit_try_run_case+0x170/0x3f0
[   19.626165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.626322]  kthread+0x328/0x630
[   19.626469]  ret_from_fork+0x10/0x20
[   19.626622] 
[   19.626683] Allocated by task 203:
[   19.626758]  kasan_save_stack+0x3c/0x68
[   19.626997]  kasan_save_track+0x20/0x40
[   19.627125]  kasan_save_alloc_info+0x40/0x58
[   19.627233]  __kasan_kmalloc+0xd4/0xd8
[   19.627328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.627430]  ksize_unpoisons_memory+0xc0/0x740
[   19.627559]  kunit_try_run_case+0x170/0x3f0
[   19.627680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.627813]  kthread+0x328/0x630
[   19.627923]  ret_from_fork+0x10/0x20
[   19.628004] 
[   19.628055] The buggy address belongs to the object at fff00000c6408200
[   19.628055]  which belongs to the cache kmalloc-128 of size 128
[   19.628253] The buggy address is located 0 bytes to the right of
[   19.628253]  allocated 115-byte region [fff00000c6408200, fff00000c6408273)
[   19.628425] 
[   19.628490] The buggy address belongs to the physical page:
[   19.628589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.628751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.628876] page_type: f5(slab)
[   19.628967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.629282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.629526] page dumped because: kasan: bad access detected
[   19.629612] 
[   19.629656] Memory state around the buggy address:
[   19.629740]  fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.630111]  fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630238] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.630372]                                                              ^
[   19.630517]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630645]  fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630750] ==================================================================
[   19.640794] ==================================================================
[   19.640918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.641044] Read of size 1 at addr fff00000c640827f by task kunit_try_catch/203
[   19.641175] 
[   19.641255] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.641461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.641536] Hardware name: linux,dummy-virt (DT)
[   19.641618] Call trace:
[   19.641677]  show_stack+0x20/0x38 (C)
[   19.641795]  dump_stack_lvl+0x8c/0xd0
[   19.642394]  print_report+0x118/0x608
[   19.642702]  kasan_report+0xdc/0x128
[   19.642844]  __asan_report_load1_noabort+0x20/0x30
[   19.642954]  ksize_unpoisons_memory+0x690/0x740
[   19.643494]  kunit_try_run_case+0x170/0x3f0
[   19.643831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.644132]  kthread+0x328/0x630
[   19.644334]  ret_from_fork+0x10/0x20
[   19.644584] 
[   19.644637] Allocated by task 203:
[   19.644826]  kasan_save_stack+0x3c/0x68
[   19.645174]  kasan_save_track+0x20/0x40
[   19.645418]  kasan_save_alloc_info+0x40/0x58
[   19.645537]  __kasan_kmalloc+0xd4/0xd8
[   19.645631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.645733]  ksize_unpoisons_memory+0xc0/0x740
[   19.646151]  kunit_try_run_case+0x170/0x3f0
[   19.646561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.646896]  kthread+0x328/0x630
[   19.647239]  ret_from_fork+0x10/0x20
[   19.647646] 
[   19.647765] The buggy address belongs to the object at fff00000c6408200
[   19.647765]  which belongs to the cache kmalloc-128 of size 128
[   19.648409] The buggy address is located 12 bytes to the right of
[   19.648409]  allocated 115-byte region [fff00000c6408200, fff00000c6408273)
[   19.648700] 
[   19.648771] The buggy address belongs to the physical page:
[   19.648854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.649027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.649780] page_type: f5(slab)
[   19.649923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.650052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.650140] page dumped because: kasan: bad access detected
[   19.650209] 
[   19.650248] Memory state around the buggy address:
[   19.650326]  fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.650440]  fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650602] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.650804]                                                                 ^
[   19.650967]  fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.651177]  fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.651381] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   19.598045] ==================================================================
[   19.598633] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   19.598798] Free of addr fff00000c63971c0 by task kunit_try_catch/201
[   19.598899] 
[   19.599150] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.599416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.599488] Hardware name: linux,dummy-virt (DT)
[   19.599592] Call trace:
[   19.599653]  show_stack+0x20/0x38 (C)
[   19.599799]  dump_stack_lvl+0x8c/0xd0
[   19.599918]  print_report+0x118/0x608
[   19.600024]  kasan_report_invalid_free+0xc0/0xe8
[   19.600136]  check_slab_allocation+0xd4/0x108
[   19.600291]  __kasan_slab_pre_free+0x2c/0x48
[   19.600547]  kfree+0xe8/0x3c8
[   19.600745]  kfree_sensitive+0x3c/0xb0
[   19.600884]  kmalloc_double_kzfree+0x168/0x308
[   19.601030]  kunit_try_run_case+0x170/0x3f0
[   19.601172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.601307]  kthread+0x328/0x630
[   19.601411]  ret_from_fork+0x10/0x20
[   19.601549] 
[   19.601592] Allocated by task 201:
[   19.601660]  kasan_save_stack+0x3c/0x68
[   19.601753]  kasan_save_track+0x20/0x40
[   19.601866]  kasan_save_alloc_info+0x40/0x58
[   19.602229]  __kasan_kmalloc+0xd4/0xd8
[   19.602354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.602462]  kmalloc_double_kzfree+0xb8/0x308
[   19.602559]  kunit_try_run_case+0x170/0x3f0
[   19.602658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.602767]  kthread+0x328/0x630
[   19.602870]  ret_from_fork+0x10/0x20
[   19.602969] 
[   19.603019] Freed by task 201:
[   19.603086]  kasan_save_stack+0x3c/0x68
[   19.603182]  kasan_save_track+0x20/0x40
[   19.603283]  kasan_save_free_info+0x4c/0x78
[   19.603376]  __kasan_slab_free+0x6c/0x98
[   19.603468]  kfree+0x214/0x3c8
[   19.603562]  kfree_sensitive+0x80/0xb0
[   19.603650]  kmalloc_double_kzfree+0x11c/0x308
[   19.604084]  kunit_try_run_case+0x170/0x3f0
[   19.604230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.604343]  kthread+0x328/0x630
[   19.604426]  ret_from_fork+0x10/0x20
[   19.604514] 
[   19.604565] The buggy address belongs to the object at fff00000c63971c0
[   19.604565]  which belongs to the cache kmalloc-16 of size 16
[   19.604710] The buggy address is located 0 bytes inside of
[   19.604710]  16-byte region [fff00000c63971c0, fff00000c63971d0)
[   19.605058] 
[   19.605121] The buggy address belongs to the physical page:
[   19.605206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   19.605339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.605446] page_type: f5(slab)
[   19.605527] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.605801] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.606163] page dumped because: kasan: bad access detected
[   19.606261] 
[   19.606341] Memory state around the buggy address:
[   19.606447]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.606590]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.606702] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   19.606797]                                            ^
[   19.606893]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.607014]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.607115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   19.577949] ==================================================================
[   19.578481] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   19.579163] Read of size 1 at addr fff00000c63971c0 by task kunit_try_catch/201
[   19.579551] 
[   19.579910] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.580135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.580197] Hardware name: linux,dummy-virt (DT)
[   19.580270] Call trace:
[   19.580323]  show_stack+0x20/0x38 (C)
[   19.580443]  dump_stack_lvl+0x8c/0xd0
[   19.580547]  print_report+0x118/0x608
[   19.580653]  kasan_report+0xdc/0x128
[   19.580752]  __kasan_check_byte+0x54/0x70
[   19.582446]  kfree_sensitive+0x30/0xb0
[   19.582710]  kmalloc_double_kzfree+0x168/0x308
[   19.583102]  kunit_try_run_case+0x170/0x3f0
[   19.583341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.584201]  kthread+0x328/0x630
[   19.584476]  ret_from_fork+0x10/0x20
[   19.584623] 
[   19.584730] Allocated by task 201:
[   19.584893]  kasan_save_stack+0x3c/0x68
[   19.585069]  kasan_save_track+0x20/0x40
[   19.585212]  kasan_save_alloc_info+0x40/0x58
[   19.585307]  __kasan_kmalloc+0xd4/0xd8
[   19.585577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.585688]  kmalloc_double_kzfree+0xb8/0x308
[   19.586253]  kunit_try_run_case+0x170/0x3f0
[   19.586399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.586749]  kthread+0x328/0x630
[   19.587141]  ret_from_fork+0x10/0x20
[   19.587278] 
[   19.587326] Freed by task 201:
[   19.587651]  kasan_save_stack+0x3c/0x68
[   19.587779]  kasan_save_track+0x20/0x40
[   19.587878]  kasan_save_free_info+0x4c/0x78
[   19.587972]  __kasan_slab_free+0x6c/0x98
[   19.588059]  kfree+0x214/0x3c8
[   19.588139]  kfree_sensitive+0x80/0xb0
[   19.588223]  kmalloc_double_kzfree+0x11c/0x308
[   19.588317]  kunit_try_run_case+0x170/0x3f0
[   19.588407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588515]  kthread+0x328/0x630
[   19.588594]  ret_from_fork+0x10/0x20
[   19.588675] 
[   19.588723] The buggy address belongs to the object at fff00000c63971c0
[   19.588723]  which belongs to the cache kmalloc-16 of size 16
[   19.589567] The buggy address is located 0 bytes inside of
[   19.589567]  freed 16-byte region [fff00000c63971c0, fff00000c63971d0)
[   19.589931] 
[   19.590008] The buggy address belongs to the physical page:
[   19.590166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   19.590533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.590814] page_type: f5(slab)
[   19.591907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.592124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.592517] page dumped because: kasan: bad access detected
[   19.592868] 
[   19.592932] Memory state around the buggy address:
[   19.593016]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.593110]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.593213] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   19.593779]                                            ^
[   19.593989]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.594583]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.594859] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   19.524850] ==================================================================
[   19.525067] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   19.525285] Read of size 1 at addr fff00000c640bfa8 by task kunit_try_catch/197
[   19.525461] 
[   19.525553] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.525755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.525825] Hardware name: linux,dummy-virt (DT)
[   19.525925] Call trace:
[   19.526359]  show_stack+0x20/0x38 (C)
[   19.526698]  dump_stack_lvl+0x8c/0xd0
[   19.526855]  print_report+0x118/0x608
[   19.527050]  kasan_report+0xdc/0x128
[   19.527279]  __asan_report_load1_noabort+0x20/0x30
[   19.527508]  kmalloc_uaf2+0x3f4/0x468
[   19.527724]  kunit_try_run_case+0x170/0x3f0
[   19.528165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.528437]  kthread+0x328/0x630
[   19.528586]  ret_from_fork+0x10/0x20
[   19.528716] 
[   19.528769] Allocated by task 197:
[   19.528853]  kasan_save_stack+0x3c/0x68
[   19.528962]  kasan_save_track+0x20/0x40
[   19.529063]  kasan_save_alloc_info+0x40/0x58
[   19.529169]  __kasan_kmalloc+0xd4/0xd8
[   19.529260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.529362]  kmalloc_uaf2+0xc4/0x468
[   19.529448]  kunit_try_run_case+0x170/0x3f0
[   19.529862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530076]  kthread+0x328/0x630
[   19.530175]  ret_from_fork+0x10/0x20
[   19.530266] 
[   19.530368] Freed by task 197:
[   19.530471]  kasan_save_stack+0x3c/0x68
[   19.530669]  kasan_save_track+0x20/0x40
[   19.531006]  kasan_save_free_info+0x4c/0x78
[   19.531190]  __kasan_slab_free+0x6c/0x98
[   19.531309]  kfree+0x214/0x3c8
[   19.531397]  kmalloc_uaf2+0x134/0x468
[   19.531493]  kunit_try_run_case+0x170/0x3f0
[   19.531591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.532192]  kthread+0x328/0x630
[   19.532415]  ret_from_fork+0x10/0x20
[   19.532748] 
[   19.532805] The buggy address belongs to the object at fff00000c640bf80
[   19.532805]  which belongs to the cache kmalloc-64 of size 64
[   19.533106] The buggy address is located 40 bytes inside of
[   19.533106]  freed 64-byte region [fff00000c640bf80, fff00000c640bfc0)
[   19.533384] 
[   19.533438] The buggy address belongs to the physical page:
[   19.533515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b
[   19.533642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.534160] page_type: f5(slab)
[   19.534382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.534842] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   19.535058] page dumped because: kasan: bad access detected
[   19.535199] 
[   19.535320] Memory state around the buggy address:
[   19.535413]  fff00000c640be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535547]  fff00000c640bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535665] >fff00000c640bf80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535773]                                   ^
[   19.535865]  fff00000c640c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535973]  fff00000c640c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.536075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   19.497241] ==================================================================
[   19.497402] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   19.497539] Write of size 33 at addr fff00000c640be00 by task kunit_try_catch/195
[   19.497668] 
[   19.497755] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.497979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.498055] Hardware name: linux,dummy-virt (DT)
[   19.498140] Call trace:
[   19.498202]  show_stack+0x20/0x38 (C)
[   19.498325]  dump_stack_lvl+0x8c/0xd0
[   19.498446]  print_report+0x118/0x608
[   19.498560]  kasan_report+0xdc/0x128
[   19.498682]  kasan_check_range+0x100/0x1a8
[   19.498883]  __asan_memset+0x34/0x78
[   19.498993]  kmalloc_uaf_memset+0x170/0x310
[   19.499096]  kunit_try_run_case+0x170/0x3f0
[   19.499209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.499327]  kthread+0x328/0x630
[   19.499434]  ret_from_fork+0x10/0x20
[   19.499548] 
[   19.499612] Allocated by task 195:
[   19.499704]  kasan_save_stack+0x3c/0x68
[   19.499798]  kasan_save_track+0x20/0x40
[   19.499940]  kasan_save_alloc_info+0x40/0x58
[   19.500065]  __kasan_kmalloc+0xd4/0xd8
[   19.500194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.500295]  kmalloc_uaf_memset+0xb8/0x310
[   19.500415]  kunit_try_run_case+0x170/0x3f0
[   19.500530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.500660]  kthread+0x328/0x630
[   19.500759]  ret_from_fork+0x10/0x20
[   19.500896] 
[   19.500939] Freed by task 195:
[   19.500997]  kasan_save_stack+0x3c/0x68
[   19.501074]  kasan_save_track+0x20/0x40
[   19.501155]  kasan_save_free_info+0x4c/0x78
[   19.501236]  __kasan_slab_free+0x6c/0x98
[   19.501356]  kfree+0x214/0x3c8
[   19.501451]  kmalloc_uaf_memset+0x11c/0x310
[   19.501552]  kunit_try_run_case+0x170/0x3f0
[   19.501658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501759]  kthread+0x328/0x630
[   19.501870]  ret_from_fork+0x10/0x20
[   19.501961] 
[   19.502010] The buggy address belongs to the object at fff00000c640be00
[   19.502010]  which belongs to the cache kmalloc-64 of size 64
[   19.502156] The buggy address is located 0 bytes inside of
[   19.502156]  freed 64-byte region [fff00000c640be00, fff00000c640be40)
[   19.502288] 
[   19.502370] The buggy address belongs to the physical page:
[   19.502425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b
[   19.502501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.502570] page_type: f5(slab)
[   19.502628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.502692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.502747] page dumped because: kasan: bad access detected
[   19.502785] 
[   19.502811] Memory state around the buggy address:
[   19.502887]  fff00000c640bd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.503001]  fff00000c640bd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.503161] >fff00000c640be00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.503347]                    ^
[   19.503426]  fff00000c640be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503544]  fff00000c640bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   19.463613] ==================================================================
[   19.463776] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   19.464881] Read of size 1 at addr fff00000c63971a8 by task kunit_try_catch/193
[   19.465134] 
[   19.465233] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.465468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.465540] Hardware name: linux,dummy-virt (DT)
[   19.465620] Call trace:
[   19.465674]  show_stack+0x20/0x38 (C)
[   19.465785]  dump_stack_lvl+0x8c/0xd0
[   19.465913]  print_report+0x118/0x608
[   19.466011]  kasan_report+0xdc/0x128
[   19.466113]  __asan_report_load1_noabort+0x20/0x30
[   19.466243]  kmalloc_uaf+0x300/0x338
[   19.466382]  kunit_try_run_case+0x170/0x3f0
[   19.466519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.466682]  kthread+0x328/0x630
[   19.466788]  ret_from_fork+0x10/0x20
[   19.466920] 
[   19.466979] Allocated by task 193:
[   19.467083]  kasan_save_stack+0x3c/0x68
[   19.467177]  kasan_save_track+0x20/0x40
[   19.467269]  kasan_save_alloc_info+0x40/0x58
[   19.467387]  __kasan_kmalloc+0xd4/0xd8
[   19.467471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.467569]  kmalloc_uaf+0xb8/0x338
[   19.467655]  kunit_try_run_case+0x170/0x3f0
[   19.467776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.467929]  kthread+0x328/0x630
[   19.468032]  ret_from_fork+0x10/0x20
[   19.468146] 
[   19.468210] Freed by task 193:
[   19.468308]  kasan_save_stack+0x3c/0x68
[   19.468425]  kasan_save_track+0x20/0x40
[   19.468530]  kasan_save_free_info+0x4c/0x78
[   19.468617]  __kasan_slab_free+0x6c/0x98
[   19.468740]  kfree+0x214/0x3c8
[   19.468820]  kmalloc_uaf+0x11c/0x338
[   19.468903]  kunit_try_run_case+0x170/0x3f0
[   19.469025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.469137]  kthread+0x328/0x630
[   19.469221]  ret_from_fork+0x10/0x20
[   19.469373] 
[   19.469470] The buggy address belongs to the object at fff00000c63971a0
[   19.469470]  which belongs to the cache kmalloc-16 of size 16
[   19.469682] The buggy address is located 8 bytes inside of
[   19.469682]  freed 16-byte region [fff00000c63971a0, fff00000c63971b0)
[   19.469848] 
[   19.469896] The buggy address belongs to the physical page:
[   19.470224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   19.470459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.470722] page_type: f5(slab)
[   19.470905] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.471126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.471276] page dumped because: kasan: bad access detected
[   19.471364] 
[   19.471413] Memory state around the buggy address:
[   19.471496]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.472193]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.472365] >fff00000c6397180: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   19.472672]                                   ^
[   19.472770]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.473193]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.473613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   19.437789] ==================================================================
[   19.438000] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.438382] Read of size 64 at addr fff00000c640bb04 by task kunit_try_catch/191
[   19.438500] 
[   19.438586] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.438818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.438906] Hardware name: linux,dummy-virt (DT)
[   19.439139] Call trace:
[   19.439208]  show_stack+0x20/0x38 (C)
[   19.439320]  dump_stack_lvl+0x8c/0xd0
[   19.439438]  print_report+0x118/0x608
[   19.439540]  kasan_report+0xdc/0x128
[   19.440019]  kasan_check_range+0x100/0x1a8
[   19.440334]  __asan_memmove+0x3c/0x98
[   19.440580]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.440794]  kunit_try_run_case+0x170/0x3f0
[   19.440961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441118]  kthread+0x328/0x630
[   19.441204]  ret_from_fork+0x10/0x20
[   19.441305] 
[   19.441347] Allocated by task 191:
[   19.441415]  kasan_save_stack+0x3c/0x68
[   19.441526]  kasan_save_track+0x20/0x40
[   19.441607]  kasan_save_alloc_info+0x40/0x58
[   19.442014]  __kasan_kmalloc+0xd4/0xd8
[   19.442144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.442243]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   19.442339]  kunit_try_run_case+0x170/0x3f0
[   19.442424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442524]  kthread+0x328/0x630
[   19.442597]  ret_from_fork+0x10/0x20
[   19.442675] 
[   19.442723] The buggy address belongs to the object at fff00000c640bb00
[   19.442723]  which belongs to the cache kmalloc-64 of size 64
[   19.442876] The buggy address is located 4 bytes inside of
[   19.442876]  allocated 64-byte region [fff00000c640bb00, fff00000c640bb40)
[   19.443041] 
[   19.443104] The buggy address belongs to the physical page:
[   19.443204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b
[   19.443372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443527] page_type: f5(slab)
[   19.443636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443899] page dumped because: kasan: bad access detected
[   19.443967] 
[   19.444012] Memory state around the buggy address:
[   19.444092]  fff00000c640ba00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.444548]  fff00000c640ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444669] >fff00000c640bb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.444846]                                            ^
[   19.444935]  fff00000c640bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444989]  fff00000c640bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445032] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   19.420134] ==================================================================
[   19.420344] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   19.420946] Read of size 18446744073709551614 at addr fff00000c640b904 by task kunit_try_catch/189
[   19.421440] 
[   19.421548] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.422331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.422414] Hardware name: linux,dummy-virt (DT)
[   19.422508] Call trace:
[   19.422567]  show_stack+0x20/0x38 (C)
[   19.422692]  dump_stack_lvl+0x8c/0xd0
[   19.422822]  print_report+0x118/0x608
[   19.422973]  kasan_report+0xdc/0x128
[   19.423109]  kasan_check_range+0x100/0x1a8
[   19.423259]  __asan_memmove+0x3c/0x98
[   19.423400]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.423515]  kunit_try_run_case+0x170/0x3f0
[   19.423657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.423816]  kthread+0x328/0x630
[   19.424090]  ret_from_fork+0x10/0x20
[   19.424211] 
[   19.424255] Allocated by task 189:
[   19.424332]  kasan_save_stack+0x3c/0x68
[   19.424442]  kasan_save_track+0x20/0x40
[   19.424539]  kasan_save_alloc_info+0x40/0x58
[   19.424625]  __kasan_kmalloc+0xd4/0xd8
[   19.424701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.424790]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   19.424906]  kunit_try_run_case+0x170/0x3f0
[   19.424997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.425103]  kthread+0x328/0x630
[   19.425182]  ret_from_fork+0x10/0x20
[   19.425280] 
[   19.425346] The buggy address belongs to the object at fff00000c640b900
[   19.425346]  which belongs to the cache kmalloc-64 of size 64
[   19.425548] The buggy address is located 4 bytes inside of
[   19.425548]  64-byte region [fff00000c640b900, fff00000c640b940)
[   19.425745] 
[   19.425825] The buggy address belongs to the physical page:
[   19.425910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b
[   19.426037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.426158] page_type: f5(slab)
[   19.426249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.426353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.426438] page dumped because: kasan: bad access detected
[   19.426507] 
[   19.426548] Memory state around the buggy address:
[   19.426667]  fff00000c640b800: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   19.426770]  fff00000c640b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.426882] >fff00000c640b900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.426984]                    ^
[   19.427070]  fff00000c640b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427220]  fff00000c640ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427331] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   19.372410] ==================================================================
[   19.372570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   19.372712] Write of size 16 at addr fff00000c6408169 by task kunit_try_catch/187
[   19.374532] 
[   19.374800] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.375683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.375912] Hardware name: linux,dummy-virt (DT)
[   19.376165] Call trace:
[   19.376292]  show_stack+0x20/0x38 (C)
[   19.376928]  dump_stack_lvl+0x8c/0xd0
[   19.377166]  print_report+0x118/0x608
[   19.377458]  kasan_report+0xdc/0x128
[   19.377584]  kasan_check_range+0x100/0x1a8
[   19.377689]  __asan_memset+0x34/0x78
[   19.377776]  kmalloc_oob_memset_16+0x150/0x2f8
[   19.377909]  kunit_try_run_case+0x170/0x3f0
[   19.378646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.379592]  kthread+0x328/0x630
[   19.380017]  ret_from_fork+0x10/0x20
[   19.380243] 
[   19.380491] Allocated by task 187:
[   19.380593]  kasan_save_stack+0x3c/0x68
[   19.381058]  kasan_save_track+0x20/0x40
[   19.381291]  kasan_save_alloc_info+0x40/0x58
[   19.381379]  __kasan_kmalloc+0xd4/0xd8
[   19.381460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.381536]  kmalloc_oob_memset_16+0xb0/0x2f8
[   19.381605]  kunit_try_run_case+0x170/0x3f0
[   19.381678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381768]  kthread+0x328/0x630
[   19.383290]  ret_from_fork+0x10/0x20
[   19.383827] 
[   19.384401] The buggy address belongs to the object at fff00000c6408100
[   19.384401]  which belongs to the cache kmalloc-128 of size 128
[   19.384585] The buggy address is located 105 bytes inside of
[   19.384585]  allocated 120-byte region [fff00000c6408100, fff00000c6408178)
[   19.385360] 
[   19.385419] The buggy address belongs to the physical page:
[   19.385499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.386566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.387172] page_type: f5(slab)
[   19.387282] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.387406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.387509] page dumped because: kasan: bad access detected
[   19.387585] 
[   19.387629] Memory state around the buggy address:
[   19.387706]  fff00000c6408000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.387809]  fff00000c6408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.387923] >fff00000c6408100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.388018]                                                                 ^
[   19.388117]  fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.388215]  fff00000c6408200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.388311] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   19.334362] ==================================================================
[   19.334543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   19.334700] Write of size 8 at addr fff00000c6408071 by task kunit_try_catch/185
[   19.334822] 
[   19.334926] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.335150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.335218] Hardware name: linux,dummy-virt (DT)
[   19.335296] Call trace:
[   19.335352]  show_stack+0x20/0x38 (C)
[   19.335467]  dump_stack_lvl+0x8c/0xd0
[   19.335572]  print_report+0x118/0x608
[   19.335675]  kasan_report+0xdc/0x128
[   19.335782]  kasan_check_range+0x100/0x1a8
[   19.335891]  __asan_memset+0x34/0x78
[   19.335985]  kmalloc_oob_memset_8+0x150/0x2f8
[   19.336080]  kunit_try_run_case+0x170/0x3f0
[   19.336173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.336304]  kthread+0x328/0x630
[   19.336403]  ret_from_fork+0x10/0x20
[   19.336519] 
[   19.336562] Allocated by task 185:
[   19.336628]  kasan_save_stack+0x3c/0x68
[   19.336729]  kasan_save_track+0x20/0x40
[   19.336880]  kasan_save_alloc_info+0x40/0x58
[   19.337008]  __kasan_kmalloc+0xd4/0xd8
[   19.337096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.337202]  kmalloc_oob_memset_8+0xb0/0x2f8
[   19.337327]  kunit_try_run_case+0x170/0x3f0
[   19.337433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.337522]  kthread+0x328/0x630
[   19.337592]  ret_from_fork+0x10/0x20
[   19.337675] 
[   19.337726] The buggy address belongs to the object at fff00000c6408000
[   19.337726]  which belongs to the cache kmalloc-128 of size 128
[   19.337879] The buggy address is located 113 bytes inside of
[   19.337879]  allocated 120-byte region [fff00000c6408000, fff00000c6408078)
[   19.338024] 
[   19.338068] The buggy address belongs to the physical page:
[   19.338174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   19.338359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.338546] page_type: f5(slab)
[   19.338705] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.338943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.339575] page dumped because: kasan: bad access detected
[   19.339784] 
[   19.339868] Memory state around the buggy address:
[   19.340475]  fff00000c6407f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.340589]  fff00000c6407f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.341142] >fff00000c6408000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.341789]                                                                 ^
[   19.342375]  fff00000c6408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342539]  fff00000c6408100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342665] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   19.301530] ==================================================================
[   19.301907] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   19.302098] Write of size 4 at addr fff00000c6399f75 by task kunit_try_catch/183
[   19.302254] 
[   19.302374] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.302600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.302686] Hardware name: linux,dummy-virt (DT)
[   19.302790] Call trace:
[   19.303056]  show_stack+0x20/0x38 (C)
[   19.303458]  dump_stack_lvl+0x8c/0xd0
[   19.303569]  print_report+0x118/0x608
[   19.304003]  kasan_report+0xdc/0x128
[   19.304109]  kasan_check_range+0x100/0x1a8
[   19.304219]  __asan_memset+0x34/0x78
[   19.304316]  kmalloc_oob_memset_4+0x150/0x300
[   19.304423]  kunit_try_run_case+0x170/0x3f0
[   19.304529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.304643]  kthread+0x328/0x630
[   19.304731]  ret_from_fork+0x10/0x20
[   19.304855] 
[   19.304901] Allocated by task 183:
[   19.305168]  kasan_save_stack+0x3c/0x68
[   19.305382]  kasan_save_track+0x20/0x40
[   19.305559]  kasan_save_alloc_info+0x40/0x58
[   19.305660]  __kasan_kmalloc+0xd4/0xd8
[   19.305756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.306581]  kmalloc_oob_memset_4+0xb0/0x300
[   19.306848]  kunit_try_run_case+0x170/0x3f0
[   19.307027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.307241]  kthread+0x328/0x630
[   19.307365]  ret_from_fork+0x10/0x20
[   19.307534] 
[   19.307584] The buggy address belongs to the object at fff00000c6399f00
[   19.307584]  which belongs to the cache kmalloc-128 of size 128
[   19.308034] The buggy address is located 117 bytes inside of
[   19.308034]  allocated 120-byte region [fff00000c6399f00, fff00000c6399f78)
[   19.308221] 
[   19.308280] The buggy address belongs to the physical page:
[   19.308358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   19.308579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.308844] page_type: f5(slab)
[   19.309065] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.309394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.309507] page dumped because: kasan: bad access detected
[   19.309600] 
[   19.309646] Memory state around the buggy address:
[   19.309730]  fff00000c6399e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.310897]  fff00000c6399e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.311021] >fff00000c6399f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.311124]                                                                 ^
[   19.311499]  fff00000c6399f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.311610]  fff00000c639a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.311830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   19.268115] ==================================================================
[   19.268256] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   19.268388] Write of size 2 at addr fff00000c6399e77 by task kunit_try_catch/181
[   19.269071] 
[   19.269613] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.270642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.270818] Hardware name: linux,dummy-virt (DT)
[   19.270981] Call trace:
[   19.271146]  show_stack+0x20/0x38 (C)
[   19.271375]  dump_stack_lvl+0x8c/0xd0
[   19.271495]  print_report+0x118/0x608
[   19.271622]  kasan_report+0xdc/0x128
[   19.271974]  kasan_check_range+0x100/0x1a8
[   19.272315]  __asan_memset+0x34/0x78
[   19.272428]  kmalloc_oob_memset_2+0x150/0x2f8
[   19.273233]  kunit_try_run_case+0x170/0x3f0
[   19.273353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.273469]  kthread+0x328/0x630
[   19.273568]  ret_from_fork+0x10/0x20
[   19.274183] 
[   19.274276] Allocated by task 181:
[   19.274362]  kasan_save_stack+0x3c/0x68
[   19.274469]  kasan_save_track+0x20/0x40
[   19.274558]  kasan_save_alloc_info+0x40/0x58
[   19.274641]  __kasan_kmalloc+0xd4/0xd8
[   19.274730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.274830]  kmalloc_oob_memset_2+0xb0/0x2f8
[   19.274933]  kunit_try_run_case+0x170/0x3f0
[   19.275028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.276768]  kthread+0x328/0x630
[   19.276889]  ret_from_fork+0x10/0x20
[   19.277967] 
[   19.278160] The buggy address belongs to the object at fff00000c6399e00
[   19.278160]  which belongs to the cache kmalloc-128 of size 128
[   19.278407] The buggy address is located 119 bytes inside of
[   19.278407]  allocated 120-byte region [fff00000c6399e00, fff00000c6399e78)
[   19.279101] 
[   19.279320] The buggy address belongs to the physical page:
[   19.279460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   19.279711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.279881] page_type: f5(slab)
[   19.280136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.280562] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.281009] page dumped because: kasan: bad access detected
[   19.281089] 
[   19.281132] Memory state around the buggy address:
[   19.281205]  fff00000c6399d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.281304]  fff00000c6399d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.281405] >fff00000c6399e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.281501]                                                                 ^
[   19.282927]  fff00000c6399e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.283158]  fff00000c6399f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.283566] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   19.238629] ==================================================================
[   19.238784] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   19.238926] Write of size 128 at addr fff00000c6399d00 by task kunit_try_catch/179
[   19.239049] 
[   19.239138] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.239347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.239412] Hardware name: linux,dummy-virt (DT)
[   19.239486] Call trace:
[   19.239541]  show_stack+0x20/0x38 (C)
[   19.239656]  dump_stack_lvl+0x8c/0xd0
[   19.239760]  print_report+0x118/0x608
[   19.239877]  kasan_report+0xdc/0x128
[   19.239976]  kasan_check_range+0x100/0x1a8
[   19.240391]  __asan_memset+0x34/0x78
[   19.240533]  kmalloc_oob_in_memset+0x144/0x2d0
[   19.240675]  kunit_try_run_case+0x170/0x3f0
[   19.240818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240939]  kthread+0x328/0x630
[   19.241041]  ret_from_fork+0x10/0x20
[   19.241153] 
[   19.241346] Allocated by task 179:
[   19.241485]  kasan_save_stack+0x3c/0x68
[   19.241967]  kasan_save_track+0x20/0x40
[   19.242057]  kasan_save_alloc_info+0x40/0x58
[   19.242139]  __kasan_kmalloc+0xd4/0xd8
[   19.242246]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.242334]  kmalloc_oob_in_memset+0xb0/0x2d0
[   19.242420]  kunit_try_run_case+0x170/0x3f0
[   19.242600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.242950]  kthread+0x328/0x630
[   19.243101]  ret_from_fork+0x10/0x20
[   19.243182] 
[   19.243229] The buggy address belongs to the object at fff00000c6399d00
[   19.243229]  which belongs to the cache kmalloc-128 of size 128
[   19.243413] The buggy address is located 0 bytes inside of
[   19.243413]  allocated 120-byte region [fff00000c6399d00, fff00000c6399d78)
[   19.243603] 
[   19.243905] The buggy address belongs to the physical page:
[   19.243987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   19.244267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.244971] page_type: f5(slab)
[   19.245088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.245206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.245305] page dumped because: kasan: bad access detected
[   19.245376] 
[   19.245419] Memory state around the buggy address:
[   19.246637]  fff00000c6399c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.246952]  fff00000c6399c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.247138] >fff00000c6399d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.247229]                                                                 ^
[   19.248106]  fff00000c6399d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.248446]  fff00000c6399e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.248648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   19.203449] ==================================================================
[   19.203592] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   19.203722] Read of size 16 at addr fff00000c6397180 by task kunit_try_catch/177
[   19.204349] 
[   19.204605] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.205548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.205628] Hardware name: linux,dummy-virt (DT)
[   19.205728] Call trace:
[   19.205790]  show_stack+0x20/0x38 (C)
[   19.205941]  dump_stack_lvl+0x8c/0xd0
[   19.206051]  print_report+0x118/0x608
[   19.206164]  kasan_report+0xdc/0x128
[   19.206438]  __asan_report_load16_noabort+0x20/0x30
[   19.206573]  kmalloc_uaf_16+0x3bc/0x438
[   19.206684]  kunit_try_run_case+0x170/0x3f0
[   19.206798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.206920]  kthread+0x328/0x630
[   19.207160]  ret_from_fork+0x10/0x20
[   19.207311] 
[   19.207359] Allocated by task 177:
[   19.207443]  kasan_save_stack+0x3c/0x68
[   19.207597]  kasan_save_track+0x20/0x40
[   19.207723]  kasan_save_alloc_info+0x40/0x58
[   19.208080]  __kasan_kmalloc+0xd4/0xd8
[   19.208277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.208395]  kmalloc_uaf_16+0x140/0x438
[   19.208486]  kunit_try_run_case+0x170/0x3f0
[   19.208577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208688]  kthread+0x328/0x630
[   19.208773]  ret_from_fork+0x10/0x20
[   19.208886] 
[   19.208937] Freed by task 177:
[   19.209006]  kasan_save_stack+0x3c/0x68
[   19.209101]  kasan_save_track+0x20/0x40
[   19.209194]  kasan_save_free_info+0x4c/0x78
[   19.209284]  __kasan_slab_free+0x6c/0x98
[   19.209375]  kfree+0x214/0x3c8
[   19.209455]  kmalloc_uaf_16+0x190/0x438
[   19.209539]  kunit_try_run_case+0x170/0x3f0
[   19.210313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210539]  kthread+0x328/0x630
[   19.210716]  ret_from_fork+0x10/0x20
[   19.210913] 
[   19.211158] The buggy address belongs to the object at fff00000c6397180
[   19.211158]  which belongs to the cache kmalloc-16 of size 16
[   19.211300] The buggy address is located 0 bytes inside of
[   19.211300]  freed 16-byte region [fff00000c6397180, fff00000c6397190)
[   19.211445] 
[   19.211494] The buggy address belongs to the physical page:
[   19.211563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   19.211705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.211873] page_type: f5(slab)
[   19.212004] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.212159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.212284] page dumped because: kasan: bad access detected
[   19.212379] 
[   19.212433] Memory state around the buggy address:
[   19.212525]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.212634]  fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   19.212769] >fff00000c6397180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212898]                    ^
[   19.212966]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.213081]  fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.213167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   19.177969] ==================================================================
[   19.178114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   19.178245] Write of size 16 at addr fff00000c6397120 by task kunit_try_catch/175
[   19.178780] 
[   19.178955] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.179211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.179298] Hardware name: linux,dummy-virt (DT)
[   19.179379] Call trace:
[   19.179432]  show_stack+0x20/0x38 (C)
[   19.179552]  dump_stack_lvl+0x8c/0xd0
[   19.179654]  print_report+0x118/0x608
[   19.179751]  kasan_report+0xdc/0x128
[   19.179866]  __asan_report_store16_noabort+0x20/0x30
[   19.179982]  kmalloc_oob_16+0x3a0/0x3f8
[   19.180085]  kunit_try_run_case+0x170/0x3f0
[   19.180193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.180310]  kthread+0x328/0x630
[   19.180406]  ret_from_fork+0x10/0x20
[   19.180515] 
[   19.180555] Allocated by task 175:
[   19.180617]  kasan_save_stack+0x3c/0x68
[   19.180704]  kasan_save_track+0x20/0x40
[   19.180827]  kasan_save_alloc_info+0x40/0x58
[   19.180912]  __kasan_kmalloc+0xd4/0xd8
[   19.181146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.181422]  kmalloc_oob_16+0xb4/0x3f8
[   19.181633]  kunit_try_run_case+0x170/0x3f0
[   19.181796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.181933]  kthread+0x328/0x630
[   19.182048]  ret_from_fork+0x10/0x20
[   19.182139] 
[   19.182196] The buggy address belongs to the object at fff00000c6397120
[   19.182196]  which belongs to the cache kmalloc-16 of size 16
[   19.182398] The buggy address is located 0 bytes inside of
[   19.182398]  allocated 13-byte region [fff00000c6397120, fff00000c639712d)
[   19.182540] 
[   19.182581] The buggy address belongs to the physical page:
[   19.182644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   19.182771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.183092] page_type: f5(slab)
[   19.183229] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.183396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.183529] page dumped because: kasan: bad access detected
[   19.183636] 
[   19.183679] Memory state around the buggy address:
[   19.183755]  fff00000c6397000: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   19.183889]  fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.184041] >fff00000c6397100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   19.184176]                                   ^
[   19.184284]  fff00000c6397180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184388]  fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   19.127877] ==================================================================
[   19.128135] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   19.128401] Read of size 1 at addr fff00000c604d400 by task kunit_try_catch/173
[   19.128553] 
[   19.128646] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.128929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.129006] Hardware name: linux,dummy-virt (DT)
[   19.129286] Call trace:
[   19.129444]  show_stack+0x20/0x38 (C)
[   19.129976]  dump_stack_lvl+0x8c/0xd0
[   19.130113]  print_report+0x118/0x608
[   19.130320]  kasan_report+0xdc/0x128
[   19.130644]  __kasan_check_byte+0x54/0x70
[   19.130862]  krealloc_noprof+0x44/0x360
[   19.131091]  krealloc_uaf+0x180/0x520
[   19.131375]  kunit_try_run_case+0x170/0x3f0
[   19.131590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.132173]  kthread+0x328/0x630
[   19.132483]  ret_from_fork+0x10/0x20
[   19.132612] 
[   19.132826] Allocated by task 173:
[   19.132944]  kasan_save_stack+0x3c/0x68
[   19.133063]  kasan_save_track+0x20/0x40
[   19.133167]  kasan_save_alloc_info+0x40/0x58
[   19.133587]  __kasan_kmalloc+0xd4/0xd8
[   19.133816]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.134361]  krealloc_uaf+0xc8/0x520
[   19.134467]  kunit_try_run_case+0x170/0x3f0
[   19.134601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.134745]  kthread+0x328/0x630
[   19.134830]  ret_from_fork+0x10/0x20
[   19.134937] 
[   19.135049] Freed by task 173:
[   19.135168]  kasan_save_stack+0x3c/0x68
[   19.135269]  kasan_save_track+0x20/0x40
[   19.135362]  kasan_save_free_info+0x4c/0x78
[   19.135449]  __kasan_slab_free+0x6c/0x98
[   19.135532]  kfree+0x214/0x3c8
[   19.135606]  krealloc_uaf+0x12c/0x520
[   19.135690]  kunit_try_run_case+0x170/0x3f0
[   19.135791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.135936]  kthread+0x328/0x630
[   19.136038]  ret_from_fork+0x10/0x20
[   19.136169] 
[   19.136223] The buggy address belongs to the object at fff00000c604d400
[   19.136223]  which belongs to the cache kmalloc-256 of size 256
[   19.136406] The buggy address is located 0 bytes inside of
[   19.136406]  freed 256-byte region [fff00000c604d400, fff00000c604d500)
[   19.136551] 
[   19.136599] The buggy address belongs to the physical page:
[   19.136682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   19.136856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.136961] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.137088] page_type: f5(slab)
[   19.137184] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.137312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.137781] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.137983] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138125] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   19.138284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.138406] page dumped because: kasan: bad access detected
[   19.138503] 
[   19.138546] Memory state around the buggy address:
[   19.138662]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.138784]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139217] >fff00000c604d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.139601]                    ^
[   19.139716]  fff00000c604d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.139828]  fff00000c604d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.140034] ==================================================================
[   19.146211] ==================================================================
[   19.146428] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   19.146565] Read of size 1 at addr fff00000c604d400 by task kunit_try_catch/173
[   19.146695] 
[   19.146789] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.147817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.148114] Hardware name: linux,dummy-virt (DT)
[   19.148303] Call trace:
[   19.148363]  show_stack+0x20/0x38 (C)
[   19.148928]  dump_stack_lvl+0x8c/0xd0
[   19.149130]  print_report+0x118/0x608
[   19.149402]  kasan_report+0xdc/0x128
[   19.149543]  __asan_report_load1_noabort+0x20/0x30
[   19.149657]  krealloc_uaf+0x4c8/0x520
[   19.149750]  kunit_try_run_case+0x170/0x3f0
[   19.149876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.150009]  kthread+0x328/0x630
[   19.150694]  ret_from_fork+0x10/0x20
[   19.151024] 
[   19.151073] Allocated by task 173:
[   19.151144]  kasan_save_stack+0x3c/0x68
[   19.151249]  kasan_save_track+0x20/0x40
[   19.151362]  kasan_save_alloc_info+0x40/0x58
[   19.151466]  __kasan_kmalloc+0xd4/0xd8
[   19.151558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.151656]  krealloc_uaf+0xc8/0x520
[   19.151748]  kunit_try_run_case+0x170/0x3f0
[   19.151870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151986]  kthread+0x328/0x630
[   19.152071]  ret_from_fork+0x10/0x20
[   19.152161] 
[   19.152210] Freed by task 173:
[   19.152316]  kasan_save_stack+0x3c/0x68
[   19.152416]  kasan_save_track+0x20/0x40
[   19.152501]  kasan_save_free_info+0x4c/0x78
[   19.152584]  __kasan_slab_free+0x6c/0x98
[   19.152668]  kfree+0x214/0x3c8
[   19.152770]  krealloc_uaf+0x12c/0x520
[   19.152861]  kunit_try_run_case+0x170/0x3f0
[   19.153468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.153851]  kthread+0x328/0x630
[   19.153940]  ret_from_fork+0x10/0x20
[   19.154852] 
[   19.155181] The buggy address belongs to the object at fff00000c604d400
[   19.155181]  which belongs to the cache kmalloc-256 of size 256
[   19.155343] The buggy address is located 0 bytes inside of
[   19.155343]  freed 256-byte region [fff00000c604d400, fff00000c604d500)
[   19.155500] 
[   19.156296] The buggy address belongs to the physical page:
[   19.157058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   19.157219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.157339] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.157471] page_type: f5(slab)
[   19.157564] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.157668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158071] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.158257] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.158734] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   19.159175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.159313] page dumped because: kasan: bad access detected
[   19.159475] 
[   19.159524] Memory state around the buggy address:
[   19.159869]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.160018]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.160154] >fff00000c604d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.160392]                    ^
[   19.160611]  fff00000c604d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.161219]  fff00000c604d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.161354] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   18.979617] ==================================================================
[   18.979732] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.979855] Write of size 1 at addr fff00000c604d2da by task kunit_try_catch/167
[   18.979974] 
[   18.980050] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.980249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.980313] Hardware name: linux,dummy-virt (DT)
[   18.980384] Call trace:
[   18.980432]  show_stack+0x20/0x38 (C)
[   18.980538]  dump_stack_lvl+0x8c/0xd0
[   18.980639]  print_report+0x118/0x608
[   18.980742]  kasan_report+0xdc/0x128
[   18.981624]  __asan_report_store1_noabort+0x20/0x30
[   18.981788]  krealloc_less_oob_helper+0xa80/0xc50
[   18.981947]  krealloc_less_oob+0x20/0x38
[   18.982370]  kunit_try_run_case+0x170/0x3f0
[   18.982530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.982718]  kthread+0x328/0x630
[   18.982873]  ret_from_fork+0x10/0x20
[   18.982991] 
[   18.983034] Allocated by task 167:
[   18.983097]  kasan_save_stack+0x3c/0x68
[   18.983184]  kasan_save_track+0x20/0x40
[   18.983267]  kasan_save_alloc_info+0x40/0x58
[   18.983352]  __kasan_krealloc+0x118/0x178
[   18.983437]  krealloc_noprof+0x128/0x360
[   18.983520]  krealloc_less_oob_helper+0x168/0xc50
[   18.983607]  krealloc_less_oob+0x20/0x38
[   18.983690]  kunit_try_run_case+0x170/0x3f0
[   18.983781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.983892]  kthread+0x328/0x630
[   18.983971]  ret_from_fork+0x10/0x20
[   18.984049] 
[   18.984094] The buggy address belongs to the object at fff00000c604d200
[   18.984094]  which belongs to the cache kmalloc-256 of size 256
[   18.984226] The buggy address is located 17 bytes to the right of
[   18.984226]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.984375] 
[   18.985262] The buggy address belongs to the physical page:
[   18.985405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.985541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.985638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.985785] page_type: f5(slab)
[   18.985895] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.986003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.986106] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.986195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.986308] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.986622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.986826] page dumped because: kasan: bad access detected
[   18.986989] 
[   18.987057] Memory state around the buggy address:
[   18.987134]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987243]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.987351] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.987447]                                                     ^
[   18.987536]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987642]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.987738] ==================================================================
[   19.070083] ==================================================================
[   19.070223] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.070361] Write of size 1 at addr fff00000c66160c9 by task kunit_try_catch/171
[   19.070479] 
[   19.070570] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.070786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.070855] Hardware name: linux,dummy-virt (DT)
[   19.070931] Call trace:
[   19.071121]  show_stack+0x20/0x38 (C)
[   19.071417]  dump_stack_lvl+0x8c/0xd0
[   19.071522]  print_report+0x118/0x608
[   19.071626]  kasan_report+0xdc/0x128
[   19.072157]  __asan_report_store1_noabort+0x20/0x30
[   19.072282]  krealloc_less_oob_helper+0xa48/0xc50
[   19.072400]  krealloc_large_less_oob+0x20/0x38
[   19.072511]  kunit_try_run_case+0x170/0x3f0
[   19.072625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.072744]  kthread+0x328/0x630
[   19.072854]  ret_from_fork+0x10/0x20
[   19.073159] 
[   19.073214] The buggy address belongs to the physical page:
[   19.073311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.073450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.073604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.073773] page_type: f8(unknown)
[   19.073931] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.074074] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.074220] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.074332] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.074455] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.074593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.074705] page dumped because: kasan: bad access detected
[   19.074775] 
[   19.074816] Memory state around the buggy address:
[   19.074902]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.075339]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.075488] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.075609]                                               ^
[   19.075724]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.075932]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.076046] ==================================================================
[   18.954285] ==================================================================
[   18.954881] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.955783] Write of size 1 at addr fff00000c604d2c9 by task kunit_try_catch/167
[   18.956075] 
[   18.956256] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.956480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.956860] Hardware name: linux,dummy-virt (DT)
[   18.957154] Call trace:
[   18.957246]  show_stack+0x20/0x38 (C)
[   18.957471]  dump_stack_lvl+0x8c/0xd0
[   18.957589]  print_report+0x118/0x608
[   18.958413]  kasan_report+0xdc/0x128
[   18.958546]  __asan_report_store1_noabort+0x20/0x30
[   18.958766]  krealloc_less_oob_helper+0xa48/0xc50
[   18.959119]  krealloc_less_oob+0x20/0x38
[   18.959251]  kunit_try_run_case+0x170/0x3f0
[   18.959370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.960033]  kthread+0x328/0x630
[   18.960158]  ret_from_fork+0x10/0x20
[   18.960276] 
[   18.960492] Allocated by task 167:
[   18.960654]  kasan_save_stack+0x3c/0x68
[   18.960747]  kasan_save_track+0x20/0x40
[   18.961314]  kasan_save_alloc_info+0x40/0x58
[   18.961433]  __kasan_krealloc+0x118/0x178
[   18.961527]  krealloc_noprof+0x128/0x360
[   18.961695]  krealloc_less_oob_helper+0x168/0xc50
[   18.962092]  krealloc_less_oob+0x20/0x38
[   18.962470]  kunit_try_run_case+0x170/0x3f0
[   18.962591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.962699]  kthread+0x328/0x630
[   18.962889]  ret_from_fork+0x10/0x20
[   18.963097] 
[   18.963179] The buggy address belongs to the object at fff00000c604d200
[   18.963179]  which belongs to the cache kmalloc-256 of size 256
[   18.963557] The buggy address is located 0 bytes to the right of
[   18.963557]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.963786] 
[   18.964078] The buggy address belongs to the physical page:
[   18.964444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.964731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.965343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.965499] page_type: f5(slab)
[   18.965601] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.966259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.966503] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.966852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.967275] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.967419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.967526] page dumped because: kasan: bad access detected
[   18.967712] 
[   18.967768] Memory state around the buggy address:
[   18.968064]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968186]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.968317] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.968412]                                               ^
[   18.968501]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968607]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.968704] ==================================================================
[   19.002525] ==================================================================
[   19.002592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.002658] Write of size 1 at addr fff00000c604d2eb by task kunit_try_catch/167
[   19.002713] 
[   19.002758] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.002882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.002915] Hardware name: linux,dummy-virt (DT)
[   19.002951] Call trace:
[   19.002978]  show_stack+0x20/0x38 (C)
[   19.003034]  dump_stack_lvl+0x8c/0xd0
[   19.003086]  print_report+0x118/0x608
[   19.003137]  kasan_report+0xdc/0x128
[   19.003187]  __asan_report_store1_noabort+0x20/0x30
[   19.003240]  krealloc_less_oob_helper+0xa58/0xc50
[   19.003292]  krealloc_less_oob+0x20/0x38
[   19.003342]  kunit_try_run_case+0x170/0x3f0
[   19.003393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.003449]  kthread+0x328/0x630
[   19.003495]  ret_from_fork+0x10/0x20
[   19.003548] 
[   19.003570] Allocated by task 167:
[   19.003603]  kasan_save_stack+0x3c/0x68
[   19.003650]  kasan_save_track+0x20/0x40
[   19.003692]  kasan_save_alloc_info+0x40/0x58
[   19.003731]  __kasan_krealloc+0x118/0x178
[   19.003772]  krealloc_noprof+0x128/0x360
[   19.003813]  krealloc_less_oob_helper+0x168/0xc50
[   19.003953]  krealloc_less_oob+0x20/0x38
[   19.004050]  kunit_try_run_case+0x170/0x3f0
[   19.004236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.004403]  kthread+0x328/0x630
[   19.004535]  ret_from_fork+0x10/0x20
[   19.004623] 
[   19.004671] The buggy address belongs to the object at fff00000c604d200
[   19.004671]  which belongs to the cache kmalloc-256 of size 256
[   19.004824] The buggy address is located 34 bytes to the right of
[   19.004824]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   19.005604] 
[   19.005695] The buggy address belongs to the physical page:
[   19.006215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   19.006665] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.006874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.007025] page_type: f5(slab)
[   19.007220] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.007347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.007467] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.007588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.007737] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   19.007923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.008070] page dumped because: kasan: bad access detected
[   19.008173] 
[   19.008240] Memory state around the buggy address:
[   19.008338]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.008462]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.008606] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.008734]                                                           ^
[   19.008876]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.008987]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.009074] ==================================================================
[   19.093962] ==================================================================
[   19.094403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.094553] Write of size 1 at addr fff00000c66160ea by task kunit_try_catch/171
[   19.094666] 
[   19.094946] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.095241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.095324] Hardware name: linux,dummy-virt (DT)
[   19.095472] Call trace:
[   19.095553]  show_stack+0x20/0x38 (C)
[   19.095700]  dump_stack_lvl+0x8c/0xd0
[   19.095805]  print_report+0x118/0x608
[   19.095928]  kasan_report+0xdc/0x128
[   19.096357]  __asan_report_store1_noabort+0x20/0x30
[   19.096514]  krealloc_less_oob_helper+0xae4/0xc50
[   19.096684]  krealloc_large_less_oob+0x20/0x38
[   19.096813]  kunit_try_run_case+0x170/0x3f0
[   19.096943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.097357]  kthread+0x328/0x630
[   19.097500]  ret_from_fork+0x10/0x20
[   19.097645] 
[   19.097700] The buggy address belongs to the physical page:
[   19.097798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.097942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.098219] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.098353] page_type: f8(unknown)
[   19.098723] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.098940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.099118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.099247] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.099414] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.099556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.099664] page dumped because: kasan: bad access detected
[   19.099746] 
[   19.099797] Memory state around the buggy address:
[   19.099893]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100128]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100246] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.100346]                                                           ^
[   19.100832]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.100994]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.101130] ==================================================================
[   19.101721] ==================================================================
[   19.101852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.102274] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/171
[   19.102448] 
[   19.102552] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.102797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.102891] Hardware name: linux,dummy-virt (DT)
[   19.103004] Call trace:
[   19.103078]  show_stack+0x20/0x38 (C)
[   19.103239]  dump_stack_lvl+0x8c/0xd0
[   19.103395]  print_report+0x118/0x608
[   19.103531]  kasan_report+0xdc/0x128
[   19.103651]  __asan_report_store1_noabort+0x20/0x30
[   19.103775]  krealloc_less_oob_helper+0xa58/0xc50
[   19.103903]  krealloc_large_less_oob+0x20/0x38
[   19.104349]  kunit_try_run_case+0x170/0x3f0
[   19.104662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104871]  kthread+0x328/0x630
[   19.105245]  ret_from_fork+0x10/0x20
[   19.105416] 
[   19.105458] The buggy address belongs to the physical page:
[   19.105516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.105626] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.105882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.106119] page_type: f8(unknown)
[   19.106329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.106708] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.107112] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.107356] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.107596] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.107896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.108065] page dumped because: kasan: bad access detected
[   19.108149] 
[   19.108252] Memory state around the buggy address:
[   19.108441]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.108658]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.109021] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.109138]                                                           ^
[   19.109270]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.109404]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.109505] ==================================================================
[   19.078088] ==================================================================
[   19.078206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.078330] Write of size 1 at addr fff00000c66160d0 by task kunit_try_catch/171
[   19.078454] 
[   19.078539] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.078752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.078820] Hardware name: linux,dummy-virt (DT)
[   19.078916] Call trace:
[   19.078972]  show_stack+0x20/0x38 (C)
[   19.079135]  dump_stack_lvl+0x8c/0xd0
[   19.079585]  print_report+0x118/0x608
[   19.079922]  kasan_report+0xdc/0x128
[   19.080070]  __asan_report_store1_noabort+0x20/0x30
[   19.080227]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.080343]  krealloc_large_less_oob+0x20/0x38
[   19.080451]  kunit_try_run_case+0x170/0x3f0
[   19.080567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.080691]  kthread+0x328/0x630
[   19.081097]  ret_from_fork+0x10/0x20
[   19.081460] 
[   19.081507] The buggy address belongs to the physical page:
[   19.081696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.081844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.081952] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.082058] page_type: f8(unknown)
[   19.082143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.082436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.082775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.082955] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.083073] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.083197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.083306] page dumped because: kasan: bad access detected
[   19.083410] 
[   19.083468] Memory state around the buggy address:
[   19.083569]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.083710]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.083873] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.083956]                                                  ^
[   19.084044]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.084458]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.084554] ==================================================================
[   18.990316] ==================================================================
[   18.990521] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.990646] Write of size 1 at addr fff00000c604d2ea by task kunit_try_catch/167
[   18.990755] 
[   18.990827] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.991054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.991119] Hardware name: linux,dummy-virt (DT)
[   18.991193] Call trace:
[   18.991247]  show_stack+0x20/0x38 (C)
[   18.991362]  dump_stack_lvl+0x8c/0xd0
[   18.991472]  print_report+0x118/0x608
[   18.991579]  kasan_report+0xdc/0x128
[   18.991685]  __asan_report_store1_noabort+0x20/0x30
[   18.991796]  krealloc_less_oob_helper+0xae4/0xc50
[   18.991921]  krealloc_less_oob+0x20/0x38
[   18.992027]  kunit_try_run_case+0x170/0x3f0
[   18.992139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.992263]  kthread+0x328/0x630
[   18.992360]  ret_from_fork+0x10/0x20
[   18.992468] 
[   18.992513] Allocated by task 167:
[   18.992578]  kasan_save_stack+0x3c/0x68
[   18.992671]  kasan_save_track+0x20/0x40
[   18.992758]  kasan_save_alloc_info+0x40/0x58
[   18.992885]  __kasan_krealloc+0x118/0x178
[   18.992969]  krealloc_noprof+0x128/0x360
[   18.993057]  krealloc_less_oob_helper+0x168/0xc50
[   18.993158]  krealloc_less_oob+0x20/0x38
[   18.993241]  kunit_try_run_case+0x170/0x3f0
[   18.993338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.993504]  kthread+0x328/0x630
[   18.994088]  ret_from_fork+0x10/0x20
[   18.994240] 
[   18.994293] The buggy address belongs to the object at fff00000c604d200
[   18.994293]  which belongs to the cache kmalloc-256 of size 256
[   18.994494] The buggy address is located 33 bytes to the right of
[   18.994494]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.995124] 
[   18.995373] The buggy address belongs to the physical page:
[   18.995461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.996132] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.996276] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.996415] page_type: f5(slab)
[   18.996582] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.997181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.997432] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.997634] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.997786] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.997947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.998517] page dumped because: kasan: bad access detected
[   18.998686] 
[   18.998739] Memory state around the buggy address:
[   18.999867]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.000063]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.000609] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.000813]                                                           ^
[   19.001006]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001193]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001393] ==================================================================
[   18.971450] ==================================================================
[   18.971558] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.971961] Write of size 1 at addr fff00000c604d2d0 by task kunit_try_catch/167
[   18.972119] 
[   18.972234] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.972443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.972528] Hardware name: linux,dummy-virt (DT)
[   18.972627] Call trace:
[   18.972697]  show_stack+0x20/0x38 (C)
[   18.972872]  dump_stack_lvl+0x8c/0xd0
[   18.972975]  print_report+0x118/0x608
[   18.973288]  kasan_report+0xdc/0x128
[   18.973429]  __asan_report_store1_noabort+0x20/0x30
[   18.973546]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.973787]  krealloc_less_oob+0x20/0x38
[   18.973918]  kunit_try_run_case+0x170/0x3f0
[   18.974033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974099]  kthread+0x328/0x630
[   18.974150]  ret_from_fork+0x10/0x20
[   18.974209] 
[   18.974233] Allocated by task 167:
[   18.974271]  kasan_save_stack+0x3c/0x68
[   18.974322]  kasan_save_track+0x20/0x40
[   18.974363]  kasan_save_alloc_info+0x40/0x58
[   18.974403]  __kasan_krealloc+0x118/0x178
[   18.974444]  krealloc_noprof+0x128/0x360
[   18.974486]  krealloc_less_oob_helper+0x168/0xc50
[   18.974528]  krealloc_less_oob+0x20/0x38
[   18.974567]  kunit_try_run_case+0x170/0x3f0
[   18.974607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974652]  kthread+0x328/0x630
[   18.974687]  ret_from_fork+0x10/0x20
[   18.974726] 
[   18.974749] The buggy address belongs to the object at fff00000c604d200
[   18.974749]  which belongs to the cache kmalloc-256 of size 256
[   18.974811] The buggy address is located 7 bytes to the right of
[   18.974811]  allocated 201-byte region [fff00000c604d200, fff00000c604d2c9)
[   18.974945] 
[   18.974992] The buggy address belongs to the physical page:
[   18.975137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.975333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.975892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.976086] page_type: f5(slab)
[   18.976199] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.976310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.976475] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.976592] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.976710] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.976844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.976951] page dumped because: kasan: bad access detected
[   18.977026] 
[   18.977097] Memory state around the buggy address:
[   18.977160]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.977260]  fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.977358] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.977611]                                                  ^
[   18.977802]  fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.977935]  fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.978027] ==================================================================
[   19.086695] ==================================================================
[   19.086809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.086942] Write of size 1 at addr fff00000c66160da by task kunit_try_catch/171
[   19.087264] 
[   19.087383] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.087665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.087763] Hardware name: linux,dummy-virt (DT)
[   19.087866] Call trace:
[   19.087939]  show_stack+0x20/0x38 (C)
[   19.088080]  dump_stack_lvl+0x8c/0xd0
[   19.088217]  print_report+0x118/0x608
[   19.088335]  kasan_report+0xdc/0x128
[   19.088435]  __asan_report_store1_noabort+0x20/0x30
[   19.088923]  krealloc_less_oob_helper+0xa80/0xc50
[   19.089063]  krealloc_large_less_oob+0x20/0x38
[   19.089220]  kunit_try_run_case+0x170/0x3f0
[   19.089425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.089554]  kthread+0x328/0x630
[   19.089850]  ret_from_fork+0x10/0x20
[   19.090017] 
[   19.090071] The buggy address belongs to the physical page:
[   19.090152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.090285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.090401] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.090539] page_type: f8(unknown)
[   19.090671] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.090830] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.091006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.091168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.091310] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.091424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.091524] page dumped because: kasan: bad access detected
[   19.091597] 
[   19.091993] Memory state around the buggy address:
[   19.092114]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.092264]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.092384] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.092482]                                                     ^
[   19.092576]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.092682]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.092780] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.036486] ==================================================================
[   19.036618] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.036775] Write of size 1 at addr fff00000c66160f0 by task kunit_try_catch/169
[   19.036971] 
[   19.037067] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.037324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.037382] Hardware name: linux,dummy-virt (DT)
[   19.037452] Call trace:
[   19.037501]  show_stack+0x20/0x38 (C)
[   19.037600]  dump_stack_lvl+0x8c/0xd0
[   19.037706]  print_report+0x118/0x608
[   19.037802]  kasan_report+0xdc/0x128
[   19.037922]  __asan_report_store1_noabort+0x20/0x30
[   19.038049]  krealloc_more_oob_helper+0x5c0/0x678
[   19.038262]  krealloc_large_more_oob+0x20/0x38
[   19.038494]  kunit_try_run_case+0x170/0x3f0
[   19.038704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.039481]  kthread+0x328/0x630
[   19.040196]  ret_from_fork+0x10/0x20
[   19.040416] 
[   19.040465] The buggy address belongs to the physical page:
[   19.041088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.041703] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.041957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.042185] page_type: f8(unknown)
[   19.042713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.042829] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.042956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.043074] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.043200] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.043417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.044350] page dumped because: kasan: bad access detected
[   19.045688] 
[   19.046039] Memory state around the buggy address:
[   19.046133]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.046339]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.046656] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.047123]                                                              ^
[   19.047931]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.048417]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.048528] ==================================================================
[   19.027548] ==================================================================
[   19.027689] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.027821] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/169
[   19.028816] 
[   19.028917] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   19.029344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.029400] Hardware name: linux,dummy-virt (DT)
[   19.029444] Call trace:
[   19.029475]  show_stack+0x20/0x38 (C)
[   19.029638]  dump_stack_lvl+0x8c/0xd0
[   19.029916]  print_report+0x118/0x608
[   19.030136]  kasan_report+0xdc/0x128
[   19.030354]  __asan_report_store1_noabort+0x20/0x30
[   19.030582]  krealloc_more_oob_helper+0x60c/0x678
[   19.030722]  krealloc_large_more_oob+0x20/0x38
[   19.030854]  kunit_try_run_case+0x170/0x3f0
[   19.030977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.031090]  kthread+0x328/0x630
[   19.031176]  ret_from_fork+0x10/0x20
[   19.031492] 
[   19.031548] The buggy address belongs to the physical page:
[   19.031686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   19.031954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.032164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.032383] page_type: f8(unknown)
[   19.032744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.032940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.033143] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.033364] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.033665] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff
[   19.033845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.033950] page dumped because: kasan: bad access detected
[   19.034026] 
[   19.034088] Memory state around the buggy address:
[   19.034207]  fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.034364]  fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.034474] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.034571]                                                           ^
[   19.034674]  fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.034786]  fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.034898] ==================================================================
[   18.918450] ==================================================================
[   18.918567] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   18.918688] Write of size 1 at addr fff00000c604d0f0 by task kunit_try_catch/165
[   18.918814] 
[   18.918907] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.919120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.919191] Hardware name: linux,dummy-virt (DT)
[   18.919266] Call trace:
[   18.919324]  show_stack+0x20/0x38 (C)
[   18.919446]  dump_stack_lvl+0x8c/0xd0
[   18.919560]  print_report+0x118/0x608
[   18.919673]  kasan_report+0xdc/0x128
[   18.919785]  __asan_report_store1_noabort+0x20/0x30
[   18.920359]  krealloc_more_oob_helper+0x5c0/0x678
[   18.920547]  krealloc_more_oob+0x20/0x38
[   18.920711]  kunit_try_run_case+0x170/0x3f0
[   18.920931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.921353]  kthread+0x328/0x630
[   18.921463]  ret_from_fork+0x10/0x20
[   18.921703] 
[   18.921752] Allocated by task 165:
[   18.921903]  kasan_save_stack+0x3c/0x68
[   18.922132]  kasan_save_track+0x20/0x40
[   18.922333]  kasan_save_alloc_info+0x40/0x58
[   18.922649]  __kasan_krealloc+0x118/0x178
[   18.922743]  krealloc_noprof+0x128/0x360
[   18.922940]  krealloc_more_oob_helper+0x168/0x678
[   18.923237]  krealloc_more_oob+0x20/0x38
[   18.923418]  kunit_try_run_case+0x170/0x3f0
[   18.923623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.923847]  kthread+0x328/0x630
[   18.924143]  ret_from_fork+0x10/0x20
[   18.924239] 
[   18.924358] The buggy address belongs to the object at fff00000c604d000
[   18.924358]  which belongs to the cache kmalloc-256 of size 256
[   18.924623] The buggy address is located 5 bytes to the right of
[   18.924623]  allocated 235-byte region [fff00000c604d000, fff00000c604d0eb)
[   18.924806] 
[   18.924866] The buggy address belongs to the physical page:
[   18.924944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.925081] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.925198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.925332] page_type: f5(slab)
[   18.925429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.925541] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.925670] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.926353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.926535] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.926695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.926803] page dumped because: kasan: bad access detected
[   18.926894] 
[   18.926991] Memory state around the buggy address:
[   18.927092]  fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.927198]  fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.927293] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.927406]                                                              ^
[   18.927497]  fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.927581]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.927670] ==================================================================
[   18.904394] ==================================================================
[   18.904558] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   18.904953] Write of size 1 at addr fff00000c604d0eb by task kunit_try_catch/165
[   18.905354] 
[   18.905940] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.906323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.906520] Hardware name: linux,dummy-virt (DT)
[   18.906717] Call trace:
[   18.906968]  show_stack+0x20/0x38 (C)
[   18.907108]  dump_stack_lvl+0x8c/0xd0
[   18.907476]  print_report+0x118/0x608
[   18.908052]  kasan_report+0xdc/0x128
[   18.908358]  __asan_report_store1_noabort+0x20/0x30
[   18.908540]  krealloc_more_oob_helper+0x60c/0x678
[   18.908709]  krealloc_more_oob+0x20/0x38
[   18.908894]  kunit_try_run_case+0x170/0x3f0
[   18.909047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.909629]  kthread+0x328/0x630
[   18.909819]  ret_from_fork+0x10/0x20
[   18.910056] 
[   18.910111] Allocated by task 165:
[   18.910245]  kasan_save_stack+0x3c/0x68
[   18.910858]  kasan_save_track+0x20/0x40
[   18.911036]  kasan_save_alloc_info+0x40/0x58
[   18.911589]  __kasan_krealloc+0x118/0x178
[   18.912160]  krealloc_noprof+0x128/0x360
[   18.912310]  krealloc_more_oob_helper+0x168/0x678
[   18.912859]  krealloc_more_oob+0x20/0x38
[   18.912999]  kunit_try_run_case+0x170/0x3f0
[   18.913081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.913172]  kthread+0x328/0x630
[   18.913245]  ret_from_fork+0x10/0x20
[   18.913316] 
[   18.913360] The buggy address belongs to the object at fff00000c604d000
[   18.913360]  which belongs to the cache kmalloc-256 of size 256
[   18.913488] The buggy address is located 0 bytes to the right of
[   18.913488]  allocated 235-byte region [fff00000c604d000, fff00000c604d0eb)
[   18.913623] 
[   18.913665] The buggy address belongs to the physical page:
[   18.913740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c
[   18.913901] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.914052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.914217] page_type: f5(slab)
[   18.914336] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.914490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.914697] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.914818] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.914959] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff
[   18.915088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.915203] page dumped because: kasan: bad access detected
[   18.915277] 
[   18.915323] Memory state around the buggy address:
[   18.915396]  fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.915491]  fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.915597] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.915702]                                                           ^
[   18.915826]  fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.915942]  fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.916034] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   18.878476] ==================================================================
[   18.878631] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   18.878780] Read of size 1 at addr fff00000c7830000 by task kunit_try_catch/163
[   18.878906] 
[   18.878994] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.879166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.879223] Hardware name: linux,dummy-virt (DT)
[   18.879293] Call trace:
[   18.879342]  show_stack+0x20/0x38 (C)
[   18.879789]  dump_stack_lvl+0x8c/0xd0
[   18.879948]  print_report+0x118/0x608
[   18.880061]  kasan_report+0xdc/0x128
[   18.880198]  __asan_report_load1_noabort+0x20/0x30
[   18.880379]  page_alloc_uaf+0x328/0x350
[   18.880502]  kunit_try_run_case+0x170/0x3f0
[   18.880625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.880745]  kthread+0x328/0x630
[   18.880864]  ret_from_fork+0x10/0x20
[   18.880979] 
[   18.881029] The buggy address belongs to the physical page:
[   18.881104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830
[   18.881229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.881337] page_type: f0(buddy)
[   18.881434] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000
[   18.881558] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   18.881662] page dumped because: kasan: bad access detected
[   18.881744] 
[   18.882293] Memory state around the buggy address:
[   18.882424]  fff00000c782ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.882550]  fff00000c782ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.882795] >fff00000c7830000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.882916]                    ^
[   18.883019]  fff00000c7830080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.883195]  fff00000c7830100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.883297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   18.839702] ==================================================================
[   18.840143] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   18.840804] Free of addr fff00000c660c001 by task kunit_try_catch/159
[   18.841037] 
[   18.841138] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.841444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.841504] Hardware name: linux,dummy-virt (DT)
[   18.841781] Call trace:
[   18.841866]  show_stack+0x20/0x38 (C)
[   18.842007]  dump_stack_lvl+0x8c/0xd0
[   18.842131]  print_report+0x118/0x608
[   18.842246]  kasan_report_invalid_free+0xc0/0xe8
[   18.842646]  __kasan_kfree_large+0x5c/0xa8
[   18.842892]  free_large_kmalloc+0x64/0x190
[   18.843409]  kfree+0x270/0x3c8
[   18.843538]  kmalloc_large_invalid_free+0x108/0x270
[   18.843659]  kunit_try_run_case+0x170/0x3f0
[   18.843777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.843919]  kthread+0x328/0x630
[   18.844105]  ret_from_fork+0x10/0x20
[   18.844546] 
[   18.845578] The buggy address belongs to the physical page:
[   18.845701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   18.845860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.846354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.846688] page_type: f8(unknown)
[   18.847175] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.847384] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.847845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.848002] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.848114] head: 0bfffe0000000002 ffffc1ffc3198301 00000000ffffffff 00000000ffffffff
[   18.848746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.848983] page dumped because: kasan: bad access detected
[   18.849068] 
[   18.849152] Memory state around the buggy address:
[   18.849247]  fff00000c660bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.849508]  fff00000c660bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.849712] >fff00000c660c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.849825]                    ^
[   18.849918]  fff00000c660c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.850025]  fff00000c660c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.850587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   18.812517] ==================================================================
[   18.812845] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   18.813185] Read of size 1 at addr fff00000c660c000 by task kunit_try_catch/157
[   18.813322] 
[   18.813414] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.813706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.813806] Hardware name: linux,dummy-virt (DT)
[   18.814035] Call trace:
[   18.814193]  show_stack+0x20/0x38 (C)
[   18.814451]  dump_stack_lvl+0x8c/0xd0
[   18.814917]  print_report+0x118/0x608
[   18.815135]  kasan_report+0xdc/0x128
[   18.815254]  __asan_report_load1_noabort+0x20/0x30
[   18.815371]  kmalloc_large_uaf+0x2cc/0x2f8
[   18.815491]  kunit_try_run_case+0x170/0x3f0
[   18.815608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.815735]  kthread+0x328/0x630
[   18.815849]  ret_from_fork+0x10/0x20
[   18.815971] 
[   18.816027] The buggy address belongs to the physical page:
[   18.816110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   18.816242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.816402] raw: 0bfffe0000000000 ffffc1ffc3198408 fff00000da448c40 0000000000000000
[   18.816534] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   18.817169] page dumped because: kasan: bad access detected
[   18.817476] 
[   18.817557] Memory state around the buggy address:
[   18.817645]  fff00000c660bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817756]  fff00000c660bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818134] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.818249]                    ^
[   18.818432]  fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.818552]  fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.818783] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   18.797907] ==================================================================
[   18.798090] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   18.798229] Write of size 1 at addr fff00000c660e00a by task kunit_try_catch/155
[   18.798381] 
[   18.798471] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.798717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.798809] Hardware name: linux,dummy-virt (DT)
[   18.798924] Call trace:
[   18.798983]  show_stack+0x20/0x38 (C)
[   18.799097]  dump_stack_lvl+0x8c/0xd0
[   18.799221]  print_report+0x118/0x608
[   18.799333]  kasan_report+0xdc/0x128
[   18.799507]  __asan_report_store1_noabort+0x20/0x30
[   18.799613]  kmalloc_large_oob_right+0x278/0x2b8
[   18.799710]  kunit_try_run_case+0x170/0x3f0
[   18.799807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.799946]  kthread+0x328/0x630
[   18.800074]  ret_from_fork+0x10/0x20
[   18.800203] 
[   18.800305] The buggy address belongs to the physical page:
[   18.800409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   18.800545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.800641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.800766] page_type: f8(unknown)
[   18.800934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.801065] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.801186] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.801295] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.801425] head: 0bfffe0000000002 ffffc1ffc3198301 00000000ffffffff 00000000ffffffff
[   18.801549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.801650] page dumped because: kasan: bad access detected
[   18.801715] 
[   18.801752] Memory state around the buggy address:
[   18.801824]  fff00000c660df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.801931]  fff00000c660df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.802052] >fff00000c660e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.802179]                       ^
[   18.802275]  fff00000c660e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.802380]  fff00000c660e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.802473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   18.775910] ==================================================================
[   18.776051] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   18.776184] Write of size 1 at addr fff00000c65adf00 by task kunit_try_catch/153
[   18.776345] 
[   18.776455] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.776819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.776950] Hardware name: linux,dummy-virt (DT)
[   18.777031] Call trace:
[   18.777103]  show_stack+0x20/0x38 (C)
[   18.777253]  dump_stack_lvl+0x8c/0xd0
[   18.777397]  print_report+0x118/0x608
[   18.777539]  kasan_report+0xdc/0x128
[   18.777669]  __asan_report_store1_noabort+0x20/0x30
[   18.777772]  kmalloc_big_oob_right+0x2a4/0x2f0
[   18.777906]  kunit_try_run_case+0x170/0x3f0
[   18.778053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.778177]  kthread+0x328/0x630
[   18.778276]  ret_from_fork+0x10/0x20
[   18.778389] 
[   18.778439] Allocated by task 153:
[   18.778520]  kasan_save_stack+0x3c/0x68
[   18.778636]  kasan_save_track+0x20/0x40
[   18.778767]  kasan_save_alloc_info+0x40/0x58
[   18.778884]  __kasan_kmalloc+0xd4/0xd8
[   18.779075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.779248]  kmalloc_big_oob_right+0xb8/0x2f0
[   18.779364]  kunit_try_run_case+0x170/0x3f0
[   18.779457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.779570]  kthread+0x328/0x630
[   18.779654]  ret_from_fork+0x10/0x20
[   18.779747] 
[   18.779792] The buggy address belongs to the object at fff00000c65ac000
[   18.779792]  which belongs to the cache kmalloc-8k of size 8192
[   18.779921] The buggy address is located 0 bytes to the right of
[   18.779921]  allocated 7936-byte region [fff00000c65ac000, fff00000c65adf00)
[   18.780074] 
[   18.780120] The buggy address belongs to the physical page:
[   18.780195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   18.780301] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.780398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.780516] page_type: f5(slab)
[   18.780639] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.780817] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.780975] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   18.781117] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.781229] head: 0bfffe0000000003 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   18.781338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.781430] page dumped because: kasan: bad access detected
[   18.781496] 
[   18.781532] Memory state around the buggy address:
[   18.781594]  fff00000c65ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.781680]  fff00000c65ade80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.781773] >fff00000c65adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.781885]                    ^
[   18.781956]  fff00000c65adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.782073]  fff00000c65ae000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.782198] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   18.736091] ==================================================================
[   18.736228] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.736358] Write of size 1 at addr fff00000c6399b78 by task kunit_try_catch/151
[   18.736477] 
[   18.736565] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.736770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.737371] Hardware name: linux,dummy-virt (DT)
[   18.737518] Call trace:
[   18.737576]  show_stack+0x20/0x38 (C)
[   18.737779]  dump_stack_lvl+0x8c/0xd0
[   18.738089]  print_report+0x118/0x608
[   18.738486]  kasan_report+0xdc/0x128
[   18.738930]  __asan_report_store1_noabort+0x20/0x30
[   18.739440]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.739782]  kunit_try_run_case+0x170/0x3f0
[   18.739999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.740352]  kthread+0x328/0x630
[   18.740527]  ret_from_fork+0x10/0x20
[   18.740741] 
[   18.740788] Allocated by task 151:
[   18.740866]  kasan_save_stack+0x3c/0x68
[   18.741181]  kasan_save_track+0x20/0x40
[   18.741310]  kasan_save_alloc_info+0x40/0x58
[   18.741419]  __kasan_kmalloc+0xd4/0xd8
[   18.741513]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.741625]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.741728]  kunit_try_run_case+0x170/0x3f0
[   18.741822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.741931]  kthread+0x328/0x630
[   18.742004]  ret_from_fork+0x10/0x20
[   18.742087] 
[   18.742136] The buggy address belongs to the object at fff00000c6399b00
[   18.742136]  which belongs to the cache kmalloc-128 of size 128
[   18.742291] The buggy address is located 0 bytes to the right of
[   18.742291]  allocated 120-byte region [fff00000c6399b00, fff00000c6399b78)
[   18.743015] 
[   18.743098] The buggy address belongs to the physical page:
[   18.743248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.743514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.743710] page_type: f5(slab)
[   18.743888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.744021] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.744320] page dumped because: kasan: bad access detected
[   18.744415] 
[   18.744467] Memory state around the buggy address:
[   18.744553]  fff00000c6399a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.744672]  fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.744893] >fff00000c6399b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.745189]                                                                 ^
[   18.745364]  fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.745492]  fff00000c6399c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.745576] ==================================================================
[   18.750291] ==================================================================
[   18.750419] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   18.750973] Write of size 1 at addr fff00000c6399c78 by task kunit_try_catch/151
[   18.751224] 
[   18.751581] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.752113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.752261] Hardware name: linux,dummy-virt (DT)
[   18.752421] Call trace:
[   18.752534]  show_stack+0x20/0x38 (C)
[   18.752779]  dump_stack_lvl+0x8c/0xd0
[   18.752889]  print_report+0x118/0x608
[   18.753072]  kasan_report+0xdc/0x128
[   18.753250]  __asan_report_store1_noabort+0x20/0x30
[   18.753368]  kmalloc_track_caller_oob_right+0x418/0x488
[   18.753494]  kunit_try_run_case+0x170/0x3f0
[   18.753611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.753738]  kthread+0x328/0x630
[   18.753864]  ret_from_fork+0x10/0x20
[   18.753988] 
[   18.754036] Allocated by task 151:
[   18.754101]  kasan_save_stack+0x3c/0x68
[   18.754188]  kasan_save_track+0x20/0x40
[   18.754277]  kasan_save_alloc_info+0x40/0x58
[   18.754367]  __kasan_kmalloc+0xd4/0xd8
[   18.754458]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.754567]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.754702]  kunit_try_run_case+0x170/0x3f0
[   18.754795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.755227]  kthread+0x328/0x630
[   18.755344]  ret_from_fork+0x10/0x20
[   18.755461] 
[   18.755530] The buggy address belongs to the object at fff00000c6399c00
[   18.755530]  which belongs to the cache kmalloc-128 of size 128
[   18.755722] The buggy address is located 0 bytes to the right of
[   18.755722]  allocated 120-byte region [fff00000c6399c00, fff00000c6399c78)
[   18.755944] 
[   18.756012] The buggy address belongs to the physical page:
[   18.756117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.756299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.756453] page_type: f5(slab)
[   18.756562] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.756675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.756772] page dumped because: kasan: bad access detected
[   18.756896] 
[   18.757399] Memory state around the buggy address:
[   18.757494]  fff00000c6399b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.757597]  fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.757908] >fff00000c6399c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.758036]                                                                 ^
[   18.758141]  fff00000c6399c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758261]  fff00000c6399d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   18.715461] ==================================================================
[   18.715642] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   18.715791] Read of size 1 at addr fff00000c773b000 by task kunit_try_catch/149
[   18.715957] 
[   18.716040] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.716274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.716338] Hardware name: linux,dummy-virt (DT)
[   18.716408] Call trace:
[   18.716455]  show_stack+0x20/0x38 (C)
[   18.716560]  dump_stack_lvl+0x8c/0xd0
[   18.717010]  print_report+0x118/0x608
[   18.717129]  kasan_report+0xdc/0x128
[   18.717238]  __asan_report_load1_noabort+0x20/0x30
[   18.717361]  kmalloc_node_oob_right+0x2f4/0x330
[   18.717509]  kunit_try_run_case+0x170/0x3f0
[   18.717621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.717749]  kthread+0x328/0x630
[   18.717864]  ret_from_fork+0x10/0x20
[   18.717967] 
[   18.718034] Allocated by task 149:
[   18.718099]  kasan_save_stack+0x3c/0x68
[   18.718194]  kasan_save_track+0x20/0x40
[   18.718470]  kasan_save_alloc_info+0x40/0x58
[   18.718578]  __kasan_kmalloc+0xd4/0xd8
[   18.718698]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   18.718843]  kmalloc_node_oob_right+0xbc/0x330
[   18.718973]  kunit_try_run_case+0x170/0x3f0
[   18.719092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.719225]  kthread+0x328/0x630
[   18.719328]  ret_from_fork+0x10/0x20
[   18.719443] 
[   18.719505] The buggy address belongs to the object at fff00000c773a000
[   18.719505]  which belongs to the cache kmalloc-4k of size 4096
[   18.719698] The buggy address is located 0 bytes to the right of
[   18.719698]  allocated 4096-byte region [fff00000c773a000, fff00000c773b000)
[   18.719896] 
[   18.719946] The buggy address belongs to the physical page:
[   18.720167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738
[   18.720536] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.720808] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.720981] page_type: f5(slab)
[   18.721486] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.721944] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.722137] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   18.722277] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.722413] head: 0bfffe0000000003 ffffc1ffc31dce01 00000000ffffffff 00000000ffffffff
[   18.722547] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.722661] page dumped because: kasan: bad access detected
[   18.722732] 
[   18.722772] Memory state around the buggy address:
[   18.723888]  fff00000c773af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.724066]  fff00000c773af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.724188] >fff00000c773b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.724338]                    ^
[   18.724498]  fff00000c773b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.724652]  fff00000c773b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.724745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   18.690697] ==================================================================
[   18.690868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   18.691169] Read of size 1 at addr fff00000c63970ff by task kunit_try_catch/147
[   18.691346] 
[   18.691437] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.691637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.691694] Hardware name: linux,dummy-virt (DT)
[   18.691756] Call trace:
[   18.691805]  show_stack+0x20/0x38 (C)
[   18.691944]  dump_stack_lvl+0x8c/0xd0
[   18.692133]  print_report+0x118/0x608
[   18.692341]  kasan_report+0xdc/0x128
[   18.692459]  __asan_report_load1_noabort+0x20/0x30
[   18.692569]  kmalloc_oob_left+0x2ec/0x320
[   18.692673]  kunit_try_run_case+0x170/0x3f0
[   18.692777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.693168]  kthread+0x328/0x630
[   18.693409]  ret_from_fork+0x10/0x20
[   18.693879] 
[   18.693934] Allocated by task 11:
[   18.694021]  kasan_save_stack+0x3c/0x68
[   18.694130]  kasan_save_track+0x20/0x40
[   18.694205]  kasan_save_alloc_info+0x40/0x58
[   18.694352]  __kasan_kmalloc+0xd4/0xd8
[   18.694438]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.694604]  kvasprintf+0xe0/0x180
[   18.694794]  __kthread_create_on_node+0x16c/0x350
[   18.694996]  kthread_create_on_node+0xe4/0x130
[   18.695192]  create_worker+0x380/0x6b8
[   18.695373]  worker_thread+0x808/0xf38
[   18.695510]  kthread+0x328/0x630
[   18.695726]  ret_from_fork+0x10/0x20
[   18.696000] 
[   18.696134] The buggy address belongs to the object at fff00000c63970e0
[   18.696134]  which belongs to the cache kmalloc-16 of size 16
[   18.696283] The buggy address is located 19 bytes to the right of
[   18.696283]  allocated 12-byte region [fff00000c63970e0, fff00000c63970ec)
[   18.696648] 
[   18.696721] The buggy address belongs to the physical page:
[   18.697004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   18.697196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.697510] page_type: f5(slab)
[   18.697616] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.697822] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.698075] page dumped because: kasan: bad access detected
[   18.698171] 
[   18.698313] Memory state around the buggy address:
[   18.698426]  fff00000c6396f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.698589]  fff00000c6397000: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   18.699039] >fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.699163]                                                                 ^
[   18.699268]  fff00000c6397100: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.699516]  fff00000c6397180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.699728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.669627] ==================================================================
[   18.669747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.669892] Read of size 1 at addr fff00000c6399a80 by task kunit_try_catch/145
[   18.670024] 
[   18.670103] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.670322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.670394] Hardware name: linux,dummy-virt (DT)
[   18.670473] Call trace:
[   18.670528]  show_stack+0x20/0x38 (C)
[   18.670647]  dump_stack_lvl+0x8c/0xd0
[   18.670761]  print_report+0x118/0x608
[   18.670895]  kasan_report+0xdc/0x128
[   18.671010]  __asan_report_load1_noabort+0x20/0x30
[   18.671123]  kmalloc_oob_right+0x5d0/0x660
[   18.671231]  kunit_try_run_case+0x170/0x3f0
[   18.671343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.671484]  kthread+0x328/0x630
[   18.671581]  ret_from_fork+0x10/0x20
[   18.671685] 
[   18.671723] Allocated by task 145:
[   18.671781]  kasan_save_stack+0x3c/0x68
[   18.671882]  kasan_save_track+0x20/0x40
[   18.671969]  kasan_save_alloc_info+0x40/0x58
[   18.672052]  __kasan_kmalloc+0xd4/0xd8
[   18.672135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.672230]  kmalloc_oob_right+0xb0/0x660
[   18.672317]  kunit_try_run_case+0x170/0x3f0
[   18.672404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.672505]  kthread+0x328/0x630
[   18.672583]  ret_from_fork+0x10/0x20
[   18.672668] 
[   18.672713] The buggy address belongs to the object at fff00000c6399a00
[   18.672713]  which belongs to the cache kmalloc-128 of size 128
[   18.672858] The buggy address is located 13 bytes to the right of
[   18.672858]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.673066] 
[   18.673128] The buggy address belongs to the physical page:
[   18.673219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.673343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.673474] page_type: f5(slab)
[   18.673593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.673764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.673928] page dumped because: kasan: bad access detected
[   18.674038] 
[   18.674084] Memory state around the buggy address:
[   18.674163]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674311]  fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.674457] >fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674587]                    ^
[   18.674681]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674821]  fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674959] ==================================================================
[   18.650026] ==================================================================
[   18.650758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.652693] Write of size 1 at addr fff00000c6399a73 by task kunit_try_catch/145
[   18.652990] 
[   18.654493] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.654704] Tainted: [N]=TEST
[   18.654751] Hardware name: linux,dummy-virt (DT)
[   18.655069] Call trace:
[   18.655296]  show_stack+0x20/0x38 (C)
[   18.655478]  dump_stack_lvl+0x8c/0xd0
[   18.655555]  print_report+0x118/0x608
[   18.655616]  kasan_report+0xdc/0x128
[   18.655671]  __asan_report_store1_noabort+0x20/0x30
[   18.655729]  kmalloc_oob_right+0x5a4/0x660
[   18.655783]  kunit_try_run_case+0x170/0x3f0
[   18.655855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.655922]  kthread+0x328/0x630
[   18.655975]  ret_from_fork+0x10/0x20
[   18.656169] 
[   18.656221] Allocated by task 145:
[   18.656365]  kasan_save_stack+0x3c/0x68
[   18.656450]  kasan_save_track+0x20/0x40
[   18.656496]  kasan_save_alloc_info+0x40/0x58
[   18.656537]  __kasan_kmalloc+0xd4/0xd8
[   18.656578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.656623]  kmalloc_oob_right+0xb0/0x660
[   18.656663]  kunit_try_run_case+0x170/0x3f0
[   18.656703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656752]  kthread+0x328/0x630
[   18.656794]  ret_from_fork+0x10/0x20
[   18.656917] 
[   18.657060] The buggy address belongs to the object at fff00000c6399a00
[   18.657060]  which belongs to the cache kmalloc-128 of size 128
[   18.657253] The buggy address is located 0 bytes to the right of
[   18.657253]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.657336] 
[   18.657438] The buggy address belongs to the physical page:
[   18.657720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.658124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.658492] page_type: f5(slab)
[   18.658900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.658979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.659119] page dumped because: kasan: bad access detected
[   18.659172] 
[   18.659207] Memory state around the buggy address:
[   18.659490]  fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.659576]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659643] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.659707]                                                              ^
[   18.659802]  fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659865]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659942] ==================================================================
[   18.663631] ==================================================================
[   18.663717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.663826] Write of size 1 at addr fff00000c6399a78 by task kunit_try_catch/145
[   18.663944] 
[   18.664027] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.664246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.664314] Hardware name: linux,dummy-virt (DT)
[   18.664389] Call trace:
[   18.664442]  show_stack+0x20/0x38 (C)
[   18.664561]  dump_stack_lvl+0x8c/0xd0
[   18.664671]  print_report+0x118/0x608
[   18.664777]  kasan_report+0xdc/0x128
[   18.664916]  __asan_report_store1_noabort+0x20/0x30
[   18.665021]  kmalloc_oob_right+0x538/0x660
[   18.665113]  kunit_try_run_case+0x170/0x3f0
[   18.665220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.665335]  kthread+0x328/0x630
[   18.665434]  ret_from_fork+0x10/0x20
[   18.665545] 
[   18.665588] Allocated by task 145:
[   18.665656]  kasan_save_stack+0x3c/0x68
[   18.665755]  kasan_save_track+0x20/0x40
[   18.665895]  kasan_save_alloc_info+0x40/0x58
[   18.666022]  __kasan_kmalloc+0xd4/0xd8
[   18.666152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.666254]  kmalloc_oob_right+0xb0/0x660
[   18.666344]  kunit_try_run_case+0x170/0x3f0
[   18.666436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.666541]  kthread+0x328/0x630
[   18.666621]  ret_from_fork+0x10/0x20
[   18.666699] 
[   18.666743] The buggy address belongs to the object at fff00000c6399a00
[   18.666743]  which belongs to the cache kmalloc-128 of size 128
[   18.666881] The buggy address is located 5 bytes to the right of
[   18.666881]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.667027] 
[   18.667075] The buggy address belongs to the physical page:
[   18.667146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.667269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.667385] page_type: f5(slab)
[   18.667485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.667628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.667740] page dumped because: kasan: bad access detected
[   18.667816] 
[   18.667868] Memory state around the buggy address:
[   18.667935]  fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.668043]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668142] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.668240]                                                                 ^
[   18.668350]  fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668454]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668542] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[   98.820289] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/665
[   98.821054] Modules linked in:
[   98.821263] CPU: 1 UID: 0 PID: 665 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   98.822127] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   98.822444] Hardware name: linux,dummy-virt (DT)
[   98.822992] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   98.823410] pc : intlog10+0x38/0x48
[   98.823641] lr : intlog10_test+0xe4/0x200
[   98.823930] sp : ffff800082177c10
[   98.824146] x29: ffff800082177c90 x28: 0000000000000000 x27: 0000000000000000
[   98.824797] x26: 1ffe000019603101 x25: 0000000000000000 x24: ffff800082177ce0
[   98.825770] x23: ffff800082177d00 x22: 0000000000000000 x21: 1ffff0001042ef82
[   98.826424] x20: ffffb101094bb880 x19: ffff800080087990 x18: 0000000010b43607
[   98.826926] x17: 0000000095b199a2 x16: fff00000c593903c x15: fff00000ff616b08
[   98.827250] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff762021a70181
[   98.827776] x11: 1ffff62021a70180 x10: ffff762021a70180 x9 : ffffb10106a3e2d4
[   98.828166] x8 : ffffb1010d380c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   98.828608] x5 : ffff70001042ef82 x4 : 1ffff00010010f3a x3 : 1ffff62021297710
[   98.829137] x2 : 1ffff62021297710 x1 : 0000000000000003 x0 : 0000000000000000
[   98.829721] Call trace:
[   98.829925]  intlog10+0x38/0x48 (P)
[   98.830200]  kunit_try_run_case+0x170/0x3f0
[   98.830441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.830697]  kthread+0x328/0x630
[   98.830921]  ret_from_fork+0x10/0x20
[   98.831098] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[   98.758445] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/647
[   98.760382] Modules linked in:
[   98.762050] CPU: 1 UID: 0 PID: 647 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   98.763235] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   98.763682] Hardware name: linux,dummy-virt (DT)
[   98.764184] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   98.764833] pc : intlog2+0xd8/0xf8
[   98.765146] lr : intlog2_test+0xe4/0x200
[   98.765451] sp : ffff8000820b7c10
[   98.765827] x29: ffff8000820b7c90 x28: 0000000000000000 x27: 0000000000000000
[   98.766715] x26: 1ffe00001906dca1 x25: 0000000000000000 x24: ffff8000820b7ce0
[   98.767378] x23: ffff8000820b7d00 x22: 0000000000000000 x21: 1ffff00010416f82
[   98.768071] x20: ffffb101094bb780 x19: ffff800080087990 x18: 00000000bf4ccba6
[   98.768754] x17: 0000000037f69978 x16: 000000003b555c9f x15: 00000000b302b6ee
[   98.769481] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: ffff762021a70181
[   98.769894] x11: 1ffff62021a70180 x10: ffff762021a70180 x9 : ffffb10106a3e4d4
[   98.770411] x8 : ffffb1010d380c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   98.771264] x5 : ffff700010416f82 x4 : 1ffff00010010f3a x3 : 1ffff620212976f0
[   98.771956] x2 : 1ffff620212976f0 x1 : 0000000000000003 x0 : 0000000000000000
[   98.772615] Call trace:
[   98.773084]  intlog2+0xd8/0xf8 (P)
[   98.773425]  kunit_try_run_case+0x170/0x3f0
[   98.774608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.775248]  kthread+0x328/0x630
[   98.775636]  ret_from_fork+0x10/0x20
[   98.776198] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[  337.879413] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[  337.574205] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>