Hay
Date
June 18, 2025, 6:43 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   23.739581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   23.765516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   23.473155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   23.482137] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   23.503001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   54.627419] ==================================================================
[   54.627537] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   54.627537] 
[   54.627647] Use-after-free read at 0x00000000bf2479c0 (in kfence-#185):
[   54.627705]  test_krealloc+0x51c/0x830
[   54.627756]  kunit_try_run_case+0x170/0x3f0
[   54.627803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.627849]  kthread+0x328/0x630
[   54.627888]  ret_from_fork+0x10/0x20
[   54.627932] 
[   54.627958] kfence-#185: 0x00000000bf2479c0-0x000000006d64db30, size=32, cache=kmalloc-32
[   54.627958] 
[   54.628031] allocated by task 347 on cpu 0 at 54.626679s (0.001335s ago):
[   54.628116]  test_alloc+0x29c/0x628
[   54.628162]  test_krealloc+0xc0/0x830
[   54.628204]  kunit_try_run_case+0x170/0x3f0
[   54.628248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.628298]  kthread+0x328/0x630
[   54.628348]  ret_from_fork+0x10/0x20
[   54.628395] 
[   54.628423] freed by task 347 on cpu 0 at 54.626957s (0.001462s ago):
[   54.628493]  krealloc_noprof+0x148/0x360
[   54.628547]  test_krealloc+0x1dc/0x830
[   54.628593]  kunit_try_run_case+0x170/0x3f0
[   54.628639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.628688]  kthread+0x328/0x630
[   54.628727]  ret_from_fork+0x10/0x20
[   54.628769] 
[   54.628819] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   54.628915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.628950] Hardware name: linux,dummy-virt (DT)
[   54.628990] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   54.552690] ==================================================================
[   54.552819] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   54.552819] 
[   54.552939] Use-after-free read at 0x00000000893680a9 (in kfence-#184):
[   54.553004]  test_memcache_typesafe_by_rcu+0x280/0x560
[   54.553090]  kunit_try_run_case+0x170/0x3f0
[   54.553144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.553196]  kthread+0x328/0x630
[   54.553244]  ret_from_fork+0x10/0x20
[   54.553294] 
[   54.553324] kfence-#184: 0x00000000893680a9-0x00000000a3f335d4, size=32, cache=test
[   54.553324] 
[   54.553396] allocated by task 345 on cpu 0 at 54.530749s (0.022641s ago):
[   54.553479]  test_alloc+0x230/0x628
[   54.553528]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   54.553575]  kunit_try_run_case+0x170/0x3f0
[   54.553617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.553666]  kthread+0x328/0x630
[   54.553704]  ret_from_fork+0x10/0x20
[   54.553746] 
[   54.553774] freed by task 345 on cpu 0 at 54.530895s (0.022875s ago):
[   54.553839]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   54.553885]  kunit_try_run_case+0x170/0x3f0
[   54.553928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.553975]  kthread+0x328/0x630
[   54.554024]  ret_from_fork+0x10/0x20
[   54.554071] 
[   54.554152] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   54.554248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.554285] Hardware name: linux,dummy-virt (DT)
[   54.554325] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   33.120048] ==================================================================
[   33.120238] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   33.120238] 
[   33.120383] Invalid read at 0x000000006744ba8a:
[   33.120484]  test_invalid_access+0xdc/0x1f0
[   33.120588]  kunit_try_run_case+0x170/0x3f0
[   33.120672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.120730]  kthread+0x328/0x630
[   33.120781]  ret_from_fork+0x10/0x20
[   33.120951] 
[   33.121112] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   33.121234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.121571] Hardware name: linux,dummy-virt (DT)
[   33.121724] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   32.891482] ==================================================================
[   32.891617] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.891617] 
[   32.891699] Corrupted memory at 0x000000006cc145f8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#180):
[   32.892059]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.892118]  kunit_try_run_case+0x170/0x3f0
[   32.892167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.892215]  kthread+0x328/0x630
[   32.892260]  ret_from_fork+0x10/0x20
[   32.892303] 
[   32.892331] kfence-#180: 0x00000000aa429175-0x00000000a243a04d, size=73, cache=kmalloc-96
[   32.892331] 
[   32.892397] allocated by task 335 on cpu 1 at 32.890774s (0.001619s ago):
[   32.892471]  test_alloc+0x29c/0x628
[   32.892520]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   32.892594]  kunit_try_run_case+0x170/0x3f0
[   32.892642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.892691]  kthread+0x328/0x630
[   32.892732]  ret_from_fork+0x10/0x20
[   32.892775] 
[   32.892801] freed by task 335 on cpu 1 at 32.890958s (0.001838s ago):
[   32.892870]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.892920]  kunit_try_run_case+0x170/0x3f0
[   32.892963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.893008]  kthread+0x328/0x630
[   32.893224]  ret_from_fork+0x10/0x20
[   32.893269] 
[   32.893321] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   32.893413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.893448] Hardware name: linux,dummy-virt (DT)
[   32.893484] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   32.787074] ==================================================================
[   32.787192] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   32.787192] 
[   32.787317] Out-of-bounds read at 0x000000006ee3efa1 (105B right of kfence-#179):
[   32.787387]  test_kmalloc_aligned_oob_read+0x238/0x468
[   32.787446]  kunit_try_run_case+0x170/0x3f0
[   32.787495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.787541]  kthread+0x328/0x630
[   32.787581]  ret_from_fork+0x10/0x20
[   32.787624] 
[   32.787651] kfence-#179: 0x000000001eabcc01-0x000000009cba9f8d, size=73, cache=kmalloc-96
[   32.787651] 
[   32.787707] allocated by task 333 on cpu 1 at 32.786774s (0.000928s ago):
[   32.787786]  test_alloc+0x29c/0x628
[   32.787831]  test_kmalloc_aligned_oob_read+0x100/0x468
[   32.787876]  kunit_try_run_case+0x170/0x3f0
[   32.787917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.787962]  kthread+0x328/0x630
[   32.787998]  ret_from_fork+0x10/0x20
[   32.788059] 
[   32.788114] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   32.788208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.788242] Hardware name: linux,dummy-virt (DT)
[   32.788278] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   27.587138] ==================================================================
[   27.587317] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   27.587317] 
[   27.587463] Corrupted memory at 0x0000000032dfd060 [ ! ] (in kfence-#129):
[   27.587622]  test_corruption+0x1d8/0x378
[   27.587687]  kunit_try_run_case+0x170/0x3f0
[   27.587740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.587803]  kthread+0x328/0x630
[   27.587857]  ret_from_fork+0x10/0x20
[   27.587902] 
[   27.587942] kfence-#129: 0x000000009ad0e9d3-0x00000000a2a14000, size=32, cache=test
[   27.587942] 
[   27.588045] allocated by task 323 on cpu 1 at 27.586880s (0.001157s ago):
[   27.588144]  test_alloc+0x230/0x628
[   27.588193]  test_corruption+0x198/0x378
[   27.588240]  kunit_try_run_case+0x170/0x3f0
[   27.588286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.588334]  kthread+0x328/0x630
[   27.588377]  ret_from_fork+0x10/0x20
[   27.588422] 
[   27.588448] freed by task 323 on cpu 1 at 27.586980s (0.001464s ago):
[   27.588520]  test_corruption+0x1d8/0x378
[   27.588586]  kunit_try_run_case+0x170/0x3f0
[   27.588631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.588680]  kthread+0x328/0x630
[   27.588719]  ret_from_fork+0x10/0x20
[   27.588762] 
[   27.588811] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.588904] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.588940] Hardware name: linux,dummy-virt (DT)
[   27.588976] ==================================================================
[   27.275292] ==================================================================
[   27.275438] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   27.275438] 
[   27.275517] Corrupted memory at 0x00000000e26a5453 [ ! . . . . . . . . . . . . . . . ] (in kfence-#126):
[   27.275964]  test_corruption+0x278/0x378
[   27.276036]  kunit_try_run_case+0x170/0x3f0
[   27.276092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.276139]  kthread+0x328/0x630
[   27.276180]  ret_from_fork+0x10/0x20
[   27.276219] 
[   27.276245] kfence-#126: 0x00000000dfd7219b-0x000000001d9d6907, size=32, cache=kmalloc-32
[   27.276245] 
[   27.276305] allocated by task 321 on cpu 1 at 27.274826s (0.001474s ago):
[   27.276369]  test_alloc+0x29c/0x628
[   27.276413]  test_corruption+0xdc/0x378
[   27.276453]  kunit_try_run_case+0x170/0x3f0
[   27.276494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.276559]  kthread+0x328/0x630
[   27.276603]  ret_from_fork+0x10/0x20
[   27.276648] 
[   27.276676] freed by task 321 on cpu 1 at 27.274984s (0.001688s ago):
[   27.276744]  test_corruption+0x278/0x378
[   27.276790]  kunit_try_run_case+0x170/0x3f0
[   27.276832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.276879]  kthread+0x328/0x630
[   27.276916]  ret_from_fork+0x10/0x20
[   27.276961] 
[   27.277012] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.277126] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.277163] Hardware name: linux,dummy-virt (DT)
[   27.277200] ==================================================================
[   27.483038] ==================================================================
[   27.483160] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   27.483160] 
[   27.483240] Corrupted memory at 0x000000000af60ac5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#128):
[   27.483573]  test_corruption+0x120/0x378
[   27.483624]  kunit_try_run_case+0x170/0x3f0
[   27.483667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.483713]  kthread+0x328/0x630
[   27.483751]  ret_from_fork+0x10/0x20
[   27.483792] 
[   27.483819] kfence-#128: 0x00000000af4b653b-0x00000000334fb788, size=32, cache=test
[   27.483819] 
[   27.483878] allocated by task 323 on cpu 1 at 27.482764s (0.001110s ago):
[   27.483942]  test_alloc+0x230/0x628
[   27.483986]  test_corruption+0xdc/0x378
[   27.484040]  kunit_try_run_case+0x170/0x3f0
[   27.484088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.484134]  kthread+0x328/0x630
[   27.484172]  ret_from_fork+0x10/0x20
[   27.484215] 
[   27.484241] freed by task 323 on cpu 1 at 27.482869s (0.001367s ago):
[   27.484308]  test_corruption+0x120/0x378
[   27.484351]  kunit_try_run_case+0x170/0x3f0
[   27.484394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.484441]  kthread+0x328/0x630
[   27.484478]  ret_from_fork+0x10/0x20
[   27.484521] 
[   27.484585] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.484682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.484715] Hardware name: linux,dummy-virt (DT)
[   27.484750] ==================================================================
[   27.379376] ==================================================================
[   27.379499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   27.379499] 
[   27.379568] Corrupted memory at 0x00000000a04eec4f [ ! ] (in kfence-#127):
[   27.379709]  test_corruption+0x284/0x378
[   27.379757]  kunit_try_run_case+0x170/0x3f0
[   27.379801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.379844]  kthread+0x328/0x630
[   27.379886]  ret_from_fork+0x10/0x20
[   27.379924] 
[   27.379949] kfence-#127: 0x00000000400c312c-0x000000009511f299, size=32, cache=kmalloc-32
[   27.379949] 
[   27.380008] allocated by task 321 on cpu 1 at 27.378923s (0.001080s ago):
[   27.380100]  test_alloc+0x29c/0x628
[   27.380147]  test_corruption+0x198/0x378
[   27.380189]  kunit_try_run_case+0x170/0x3f0
[   27.380231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.380275]  kthread+0x328/0x630
[   27.380312]  ret_from_fork+0x10/0x20
[   27.380354] 
[   27.380380] freed by task 321 on cpu 1 at 27.379105s (0.001270s ago):
[   27.380447]  test_corruption+0x284/0x378
[   27.380492]  kunit_try_run_case+0x170/0x3f0
[   27.380546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.380596]  kthread+0x328/0x630
[   27.380637]  ret_from_fork+0x10/0x20
[   27.380681] 
[   27.380731] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.380826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.380862] Hardware name: linux,dummy-virt (DT)
[   27.380900] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   27.171155] ==================================================================
[   27.171331] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   27.171331] 
[   27.171446] Invalid free of 0x000000009175ca9d (in kfence-#125):
[   27.171515]  test_invalid_addr_free+0xec/0x238
[   27.171569]  kunit_try_run_case+0x170/0x3f0
[   27.171613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.171658]  kthread+0x328/0x630
[   27.171696]  ret_from_fork+0x10/0x20
[   27.171738] 
[   27.171764] kfence-#125: 0x000000005d93cbea-0x00000000413512fd, size=32, cache=test
[   27.171764] 
[   27.171824] allocated by task 319 on cpu 0 at 27.170932s (0.000887s ago):
[   27.171891]  test_alloc+0x230/0x628
[   27.171936]  test_invalid_addr_free+0xd4/0x238
[   27.171980]  kunit_try_run_case+0x170/0x3f0
[   27.172043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.172095]  kthread+0x328/0x630
[   27.172133]  ret_from_fork+0x10/0x20
[   27.172174] 
[   27.172228] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.172319] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.172353] Hardware name: linux,dummy-virt (DT)
[   27.172390] ==================================================================
[   27.066969] ==================================================================
[   27.067106] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   27.067106] 
[   27.067184] Invalid free of 0x00000000ce2b9955 (in kfence-#124):
[   27.067247]  test_invalid_addr_free+0x1ac/0x238
[   27.067302]  kunit_try_run_case+0x170/0x3f0
[   27.067352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.067401]  kthread+0x328/0x630
[   27.067443]  ret_from_fork+0x10/0x20
[   27.067486] 
[   27.067513] kfence-#124: 0x00000000c2c2a5e2-0x00000000fad8ab2a, size=32, cache=kmalloc-32
[   27.067513] 
[   27.067577] allocated by task 317 on cpu 0 at 27.066791s (0.000781s ago):
[   27.067650]  test_alloc+0x29c/0x628
[   27.067697]  test_invalid_addr_free+0xd4/0x238
[   27.067744]  kunit_try_run_case+0x170/0x3f0
[   27.067785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.067833]  kthread+0x328/0x630
[   27.067873]  ret_from_fork+0x10/0x20
[   27.067917] 
[   27.067973] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   27.068103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.068142] Hardware name: linux,dummy-virt (DT)
[   27.068184] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   26.859326] ==================================================================
[   26.859474] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   26.859474] 
[   26.859554] Invalid free of 0x0000000070a93324 (in kfence-#122):
[   26.859664]  test_double_free+0x1bc/0x238
[   26.859718]  kunit_try_run_case+0x170/0x3f0
[   26.859766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.859810]  kthread+0x328/0x630
[   26.859851]  ret_from_fork+0x10/0x20
[   26.859891] 
[   26.859917] kfence-#122: 0x0000000070a93324-0x00000000a7880c6d, size=32, cache=kmalloc-32
[   26.859917] 
[   26.859977] allocated by task 313 on cpu 1 at 26.858813s (0.001160s ago):
[   26.860065]  test_alloc+0x29c/0x628
[   26.860111]  test_double_free+0xd4/0x238
[   26.860151]  kunit_try_run_case+0x170/0x3f0
[   26.860193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.860237]  kthread+0x328/0x630
[   26.860272]  ret_from_fork+0x10/0x20
[   26.860311] 
[   26.860336] freed by task 313 on cpu 1 at 26.858935s (0.001396s ago):
[   26.860403]  test_double_free+0x1ac/0x238
[   26.860445]  kunit_try_run_case+0x170/0x3f0
[   26.860487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.860541]  kthread+0x328/0x630
[   26.860584]  ret_from_fork+0x10/0x20
[   26.860624] 
[   26.860678] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   26.860776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.860810] Hardware name: linux,dummy-virt (DT)
[   26.860850] ==================================================================
[   26.963297] ==================================================================
[   26.963414] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   26.963414] 
[   26.963487] Invalid free of 0x00000000648091d1 (in kfence-#123):
[   26.963545]  test_double_free+0x100/0x238
[   26.963594]  kunit_try_run_case+0x170/0x3f0
[   26.963638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.963682]  kthread+0x328/0x630
[   26.963721]  ret_from_fork+0x10/0x20
[   26.963760] 
[   26.963789] kfence-#123: 0x00000000648091d1-0x000000003da281d6, size=32, cache=test
[   26.963789] 
[   26.963846] allocated by task 315 on cpu 1 at 26.963047s (0.000795s ago):
[   26.963915]  test_alloc+0x230/0x628
[   26.963960]  test_double_free+0xd4/0x238
[   26.964005]  kunit_try_run_case+0x170/0x3f0
[   26.964072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.964118]  kthread+0x328/0x630
[   26.964155]  ret_from_fork+0x10/0x20
[   26.964198] 
[   26.964224] freed by task 315 on cpu 1 at 26.963121s (0.001099s ago):
[   26.964296]  test_double_free+0xf0/0x238
[   26.964344]  kunit_try_run_case+0x170/0x3f0
[   26.964389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.964436]  kthread+0x328/0x630
[   26.964475]  ret_from_fork+0x10/0x20
[   26.964519] 
[   26.964580] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   26.964678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.964714] Hardware name: linux,dummy-virt (DT)
[   26.964751] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   26.445336] ==================================================================
[   26.445631] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.445631] 
[   26.445906] Use-after-free read at 0x00000000c0889b1e (in kfence-#118):
[   26.446111]  test_use_after_free_read+0x114/0x248
[   26.446231]  kunit_try_run_case+0x170/0x3f0
[   26.446511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.447059]  kthread+0x328/0x630
[   26.447186]  ret_from_fork+0x10/0x20
[   26.447277] 
[   26.447337] kfence-#118: 0x00000000c0889b1e-0x00000000c38675c2, size=32, cache=kmalloc-32
[   26.447337] 
[   26.447523] allocated by task 305 on cpu 0 at 26.444078s (0.003422s ago):
[   26.447778]  test_alloc+0x29c/0x628
[   26.448087]  test_use_after_free_read+0xd0/0x248
[   26.448655]  kunit_try_run_case+0x170/0x3f0
[   26.449122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.449350]  kthread+0x328/0x630
[   26.449552]  ret_from_fork+0x10/0x20
[   26.449972] 
[   26.450472] freed by task 305 on cpu 0 at 26.444202s (0.005953s ago):
[   26.450778]  test_use_after_free_read+0x1c0/0x248
[   26.450929]  kunit_try_run_case+0x170/0x3f0
[   26.451056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.451142]  kthread+0x328/0x630
[   26.451258]  ret_from_fork+0x10/0x20
[   26.451414] 
[   26.451569] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   26.451778] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.451861] Hardware name: linux,dummy-virt (DT)
[   26.451978] ==================================================================
[   26.547141] ==================================================================
[   26.547294] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.547294] 
[   26.547401] Use-after-free read at 0x00000000460ab3d8 (in kfence-#119):
[   26.547460]  test_use_after_free_read+0x114/0x248
[   26.547511]  kunit_try_run_case+0x170/0x3f0
[   26.547555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.547599]  kthread+0x328/0x630
[   26.547635]  ret_from_fork+0x10/0x20
[   26.547674] 
[   26.547701] kfence-#119: 0x00000000460ab3d8-0x000000005d08bfd4, size=32, cache=test
[   26.547701] 
[   26.547756] allocated by task 307 on cpu 0 at 26.546819s (0.000933s ago):
[   26.547830]  test_alloc+0x230/0x628
[   26.547872]  test_use_after_free_read+0xd0/0x248
[   26.547915]  kunit_try_run_case+0x170/0x3f0
[   26.547954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.547998]  kthread+0x328/0x630
[   26.548060]  ret_from_fork+0x10/0x20
[   26.548101] 
[   26.548127] freed by task 307 on cpu 0 at 26.546926s (0.001197s ago):
[   26.548241]  test_use_after_free_read+0xf0/0x248
[   26.548289]  kunit_try_run_case+0x170/0x3f0
[   26.548330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.548376]  kthread+0x328/0x630
[   26.548416]  ret_from_fork+0x10/0x20
[   26.548459] 
[   26.548510] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   26.548620] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.548659] Hardware name: linux,dummy-virt (DT)
[   26.548694] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   26.341806] ==================================================================
[   26.341966] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.341966] 
[   26.342241] Out-of-bounds write at 0x00000000b6b30645 (1B left of kfence-#117):
[   26.342359]  test_out_of_bounds_write+0x100/0x240
[   26.342745]  kunit_try_run_case+0x170/0x3f0
[   26.342838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.342919]  kthread+0x328/0x630
[   26.343030]  ret_from_fork+0x10/0x20
[   26.343112] 
[   26.343371] kfence-#117: 0x0000000019c7b1c4-0x0000000028c6c457, size=32, cache=test
[   26.343371] 
[   26.343513] allocated by task 303 on cpu 0 at 26.341345s (0.002160s ago):
[   26.343672]  test_alloc+0x230/0x628
[   26.343757]  test_out_of_bounds_write+0xc8/0x240
[   26.343855]  kunit_try_run_case+0x170/0x3f0
[   26.343948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.344067]  kthread+0x328/0x630
[   26.344148]  ret_from_fork+0x10/0x20
[   26.344490] 
[   26.344826] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   26.345089] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.345198] Hardware name: linux,dummy-virt (DT)
[   26.345304] ==================================================================
[   25.924137] ==================================================================
[   25.924386] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   25.924386] 
[   25.924619] Out-of-bounds write at 0x000000004c01fd49 (1B left of kfence-#113):
[   25.924811]  test_out_of_bounds_write+0x100/0x240
[   25.924965]  kunit_try_run_case+0x170/0x3f0
[   25.925294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.925420]  kthread+0x328/0x630
[   25.926183]  ret_from_fork+0x10/0x20
[   25.926307] 
[   25.926367] kfence-#113: 0x00000000c3b8976a-0x00000000a8d69b67, size=32, cache=kmalloc-32
[   25.926367] 
[   25.926657] allocated by task 301 on cpu 0 at 25.923697s (0.002951s ago):
[   25.927069]  test_alloc+0x29c/0x628
[   25.927148]  test_out_of_bounds_write+0xc8/0x240
[   25.927230]  kunit_try_run_case+0x170/0x3f0
[   25.927425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.927560]  kthread+0x328/0x630
[   25.927674]  ret_from_fork+0x10/0x20
[   25.927886] 
[   25.928353] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   25.928795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.929058] Hardware name: linux,dummy-virt (DT)
[   25.929139] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   24.876812] ==================================================================
[   24.876908] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   24.876908] 
[   24.877742] Out-of-bounds read at 0x000000006bcaba83 (32B right of kfence-#103):
[   24.877986]  test_out_of_bounds_read+0x1c8/0x3e0
[   24.878128]  kunit_try_run_case+0x170/0x3f0
[   24.878197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.878348]  kthread+0x328/0x630
[   24.878391]  ret_from_fork+0x10/0x20
[   24.878623] 
[   24.878677] kfence-#103: 0x0000000064c0b209-0x00000000d5ae9473, size=32, cache=kmalloc-32
[   24.878677] 
[   24.878751] allocated by task 297 on cpu 0 at 24.876501s (0.002245s ago):
[   24.878837]  test_alloc+0x29c/0x628
[   24.878883]  test_out_of_bounds_read+0x198/0x3e0
[   24.878927]  kunit_try_run_case+0x170/0x3f0
[   24.878966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.879010]  kthread+0x328/0x630
[   24.879060]  ret_from_fork+0x10/0x20
[   24.879207] 
[   24.879268] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.879374] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.879615] Hardware name: linux,dummy-virt (DT)
[   24.879701] ==================================================================
[   24.669476] ==================================================================
[   24.669675] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   24.669675] 
[   24.669835] Out-of-bounds read at 0x00000000e5f78e1a (1B left of kfence-#101):
[   24.670501]  test_out_of_bounds_read+0x114/0x3e0
[   24.670664]  kunit_try_run_case+0x170/0x3f0
[   24.670720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.670818]  kthread+0x328/0x630
[   24.670857]  ret_from_fork+0x10/0x20
[   24.670918] 
[   24.671250] kfence-#101: 0x00000000f3bf45a1-0x0000000002bed2e6, size=32, cache=kmalloc-32
[   24.671250] 
[   24.671508] allocated by task 297 on cpu 0 at 24.667491s (0.003952s ago):
[   24.672047]  test_alloc+0x29c/0x628
[   24.672121]  test_out_of_bounds_read+0xdc/0x3e0
[   24.672516]  kunit_try_run_case+0x170/0x3f0
[   24.672709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.672763]  kthread+0x328/0x630
[   24.673095]  ret_from_fork+0x10/0x20
[   24.673292] 
[   24.673423] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.673526] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.673563] Hardware name: linux,dummy-virt (DT)
[   24.673621] ==================================================================
[   25.608234] ==================================================================
[   25.608448] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   25.608448] 
[   25.608693] Out-of-bounds read at 0x00000000672096f6 (1B left of kfence-#110):
[   25.608878]  test_out_of_bounds_read+0x114/0x3e0
[   25.609004]  kunit_try_run_case+0x170/0x3f0
[   25.609171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.609313]  kthread+0x328/0x630
[   25.609768]  ret_from_fork+0x10/0x20
[   25.609854] 
[   25.609884] kfence-#110: 0x00000000b1202df7-0x0000000004b72a34, size=32, cache=test
[   25.609884] 
[   25.609944] allocated by task 299 on cpu 0 at 25.607989s (0.001951s ago):
[   25.610177]  test_alloc+0x230/0x628
[   25.610326]  test_out_of_bounds_read+0xdc/0x3e0
[   25.610606]  kunit_try_run_case+0x170/0x3f0
[   25.610771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.610881]  kthread+0x328/0x630
[   25.611128]  ret_from_fork+0x10/0x20
[   25.611256] 
[   25.611371] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   25.611579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.611656] Hardware name: linux,dummy-virt (DT)
[   25.611739] ==================================================================
[   25.711491] ==================================================================
[   25.711665] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   25.711665] 
[   25.711831] Out-of-bounds read at 0x00000000aff40815 (32B right of kfence-#111):
[   25.711978]  test_out_of_bounds_read+0x1c8/0x3e0
[   25.712093]  kunit_try_run_case+0x170/0x3f0
[   25.712177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.712287]  kthread+0x328/0x630
[   25.712364]  ret_from_fork+0x10/0x20
[   25.712447] 
[   25.712495] kfence-#111: 0x000000003ed9b202-0x000000000fe4ae00, size=32, cache=test
[   25.712495] 
[   25.712634] allocated by task 299 on cpu 0 at 25.711346s (0.001269s ago):
[   25.712830]  test_alloc+0x230/0x628
[   25.712932]  test_out_of_bounds_read+0x198/0x3e0
[   25.713050]  kunit_try_run_case+0x170/0x3f0
[   25.713160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.713264]  kthread+0x328/0x630
[   25.713357]  ret_from_fork+0x10/0x20
[   25.713459] 
[   25.713562] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   25.713786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.713901] Hardware name: linux,dummy-virt (DT)
[   25.713995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   24.565063] ==================================================================
[   24.565145] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   24.565227] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.565289] 
[   24.565328] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.565432] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.565469] Hardware name: linux,dummy-virt (DT)
[   24.565507] Call trace:
[   24.565538]  show_stack+0x20/0x38 (C)
[   24.565599]  dump_stack_lvl+0x8c/0xd0
[   24.565657]  print_report+0x118/0x608
[   24.565713]  kasan_report+0xdc/0x128
[   24.565769]  kasan_check_range+0x100/0x1a8
[   24.565826]  __kasan_check_write+0x20/0x30
[   24.565884]  strncpy_from_user+0x3c/0x2a0
[   24.565942]  copy_user_test_oob+0x5c0/0xec8
[   24.565996]  kunit_try_run_case+0x170/0x3f0
[   24.567635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.567733]  kthread+0x328/0x630
[   24.567790]  ret_from_fork+0x10/0x20
[   24.567880] 
[   24.567908] Allocated by task 295:
[   24.567945]  kasan_save_stack+0x3c/0x68
[   24.567998]  kasan_save_track+0x20/0x40
[   24.568060]  kasan_save_alloc_info+0x40/0x58
[   24.568108]  __kasan_kmalloc+0xd4/0xd8
[   24.568153]  __kmalloc_noprof+0x198/0x4c8
[   24.568231]  kunit_kmalloc_array+0x34/0x88
[   24.568317]  copy_user_test_oob+0xac/0xec8
[   24.568368]  kunit_try_run_case+0x170/0x3f0
[   24.568471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.568526]  kthread+0x328/0x630
[   24.568584]  ret_from_fork+0x10/0x20
[   24.568630] 
[   24.568656] The buggy address belongs to the object at fff00000c641b000
[   24.568656]  which belongs to the cache kmalloc-128 of size 128
[   24.568726] The buggy address is located 0 bytes inside of
[   24.568726]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.568801] 
[   24.568826] The buggy address belongs to the physical page:
[   24.568903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.569011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.569083] page_type: f5(slab)
[   24.569165] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.569229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.569278] page dumped because: kasan: bad access detected
[   24.569317] 
[   24.569340] Memory state around the buggy address:
[   24.569377]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.569427]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.569478] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.569521]                                                                 ^
[   24.569567]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.569616]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.569660] ==================================================================
[   24.570103] ==================================================================
[   24.570179] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   24.570250] Write of size 1 at addr fff00000c641b078 by task kunit_try_catch/295
[   24.570346] 
[   24.570400] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.570503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.570541] Hardware name: linux,dummy-virt (DT)
[   24.570580] Call trace:
[   24.570609]  show_stack+0x20/0x38 (C)
[   24.570666]  dump_stack_lvl+0x8c/0xd0
[   24.570721]  print_report+0x118/0x608
[   24.570775]  kasan_report+0xdc/0x128
[   24.570832]  __asan_report_store1_noabort+0x20/0x30
[   24.570913]  strncpy_from_user+0x270/0x2a0
[   24.570987]  copy_user_test_oob+0x5c0/0xec8
[   24.571093]  kunit_try_run_case+0x170/0x3f0
[   24.571209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.571278]  kthread+0x328/0x630
[   24.571330]  ret_from_fork+0x10/0x20
[   24.571399] 
[   24.571427] Allocated by task 295:
[   24.571464]  kasan_save_stack+0x3c/0x68
[   24.571563]  kasan_save_track+0x20/0x40
[   24.571630]  kasan_save_alloc_info+0x40/0x58
[   24.571681]  __kasan_kmalloc+0xd4/0xd8
[   24.571726]  __kmalloc_noprof+0x198/0x4c8
[   24.571771]  kunit_kmalloc_array+0x34/0x88
[   24.571817]  copy_user_test_oob+0xac/0xec8
[   24.571861]  kunit_try_run_case+0x170/0x3f0
[   24.571906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.571958]  kthread+0x328/0x630
[   24.572015]  ret_from_fork+0x10/0x20
[   24.572126] 
[   24.572180] The buggy address belongs to the object at fff00000c641b000
[   24.572180]  which belongs to the cache kmalloc-128 of size 128
[   24.572274] The buggy address is located 0 bytes to the right of
[   24.572274]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.572387] 
[   24.572414] The buggy address belongs to the physical page:
[   24.572451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.572547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.572620] page_type: f5(slab)
[   24.572682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.572770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.572864] page dumped because: kasan: bad access detected
[   24.572940] 
[   24.572963] Memory state around the buggy address:
[   24.573002]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.573065]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.573138] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.573182]                                                                 ^
[   24.573229]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.573279]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.573323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   24.548974] ==================================================================
[   24.549038] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   24.549097] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.549151] 
[   24.549185] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.549375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.549450] Hardware name: linux,dummy-virt (DT)
[   24.549518] Call trace:
[   24.549570]  show_stack+0x20/0x38 (C)
[   24.549681]  dump_stack_lvl+0x8c/0xd0
[   24.549794]  print_report+0x118/0x608
[   24.549864]  kasan_report+0xdc/0x128
[   24.549913]  kasan_check_range+0x100/0x1a8
[   24.549965]  __kasan_check_write+0x20/0x30
[   24.550013]  copy_user_test_oob+0x434/0xec8
[   24.550121]  kunit_try_run_case+0x170/0x3f0
[   24.550190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.550249]  kthread+0x328/0x630
[   24.550293]  ret_from_fork+0x10/0x20
[   24.550346] 
[   24.550377] Allocated by task 295:
[   24.550415]  kasan_save_stack+0x3c/0x68
[   24.550477]  kasan_save_track+0x20/0x40
[   24.550522]  kasan_save_alloc_info+0x40/0x58
[   24.550580]  __kasan_kmalloc+0xd4/0xd8
[   24.550661]  __kmalloc_noprof+0x198/0x4c8
[   24.550705]  kunit_kmalloc_array+0x34/0x88
[   24.550813]  copy_user_test_oob+0xac/0xec8
[   24.550997]  kunit_try_run_case+0x170/0x3f0
[   24.551080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.551138]  kthread+0x328/0x630
[   24.551217]  ret_from_fork+0x10/0x20
[   24.551354] 
[   24.551399] The buggy address belongs to the object at fff00000c641b000
[   24.551399]  which belongs to the cache kmalloc-128 of size 128
[   24.551650] The buggy address is located 0 bytes inside of
[   24.551650]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.551761] 
[   24.551787] The buggy address belongs to the physical page:
[   24.551836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.551894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.551948] page_type: f5(slab)
[   24.551992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.552077] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.552186] page dumped because: kasan: bad access detected
[   24.552244] 
[   24.552267] Memory state around the buggy address:
[   24.552493]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.552587]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.552843] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.552997]                                                                 ^
[   24.553293]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.553352]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.553400] ==================================================================
[   24.511252] ==================================================================
[   24.511439] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   24.511540] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.511597] 
[   24.511648] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.511776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.511816] Hardware name: linux,dummy-virt (DT)
[   24.511854] Call trace:
[   24.511885]  show_stack+0x20/0x38 (C)
[   24.511944]  dump_stack_lvl+0x8c/0xd0
[   24.512033]  print_report+0x118/0x608
[   24.512090]  kasan_report+0xdc/0x128
[   24.512229]  kasan_check_range+0x100/0x1a8
[   24.512371]  __kasan_check_write+0x20/0x30
[   24.512433]  copy_user_test_oob+0x234/0xec8
[   24.512488]  kunit_try_run_case+0x170/0x3f0
[   24.512561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.512625]  kthread+0x328/0x630
[   24.512678]  ret_from_fork+0x10/0x20
[   24.512746] 
[   24.512769] Allocated by task 295:
[   24.512805]  kasan_save_stack+0x3c/0x68
[   24.512855]  kasan_save_track+0x20/0x40
[   24.512898]  kasan_save_alloc_info+0x40/0x58
[   24.512941]  __kasan_kmalloc+0xd4/0xd8
[   24.512980]  __kmalloc_noprof+0x198/0x4c8
[   24.514524]  kunit_kmalloc_array+0x34/0x88
[   24.515430]  copy_user_test_oob+0xac/0xec8
[   24.515929]  kunit_try_run_case+0x170/0x3f0
[   24.515988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.516559]  kthread+0x328/0x630
[   24.516635]  ret_from_fork+0x10/0x20
[   24.516820] 
[   24.516849] The buggy address belongs to the object at fff00000c641b000
[   24.516849]  which belongs to the cache kmalloc-128 of size 128
[   24.517253] The buggy address is located 0 bytes inside of
[   24.517253]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.517328] 
[   24.517358] The buggy address belongs to the physical page:
[   24.518109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.518196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.518365] page_type: f5(slab)
[   24.518476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.518534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.518580] page dumped because: kasan: bad access detected
[   24.518621] 
[   24.518645] Memory state around the buggy address:
[   24.518683]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.518732]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.518780] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.519008]                                                                 ^
[   24.519142]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.519264]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.519310] ==================================================================
[   24.555964] ==================================================================
[   24.556054] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   24.556576] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.556810] 
[   24.556964] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.557198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.557236] Hardware name: linux,dummy-virt (DT)
[   24.557275] Call trace:
[   24.557304]  show_stack+0x20/0x38 (C)
[   24.557477]  dump_stack_lvl+0x8c/0xd0
[   24.557711]  print_report+0x118/0x608
[   24.557781]  kasan_report+0xdc/0x128
[   24.557992]  kasan_check_range+0x100/0x1a8
[   24.558234]  __kasan_check_read+0x20/0x30
[   24.558337]  copy_user_test_oob+0x4a0/0xec8
[   24.558395]  kunit_try_run_case+0x170/0x3f0
[   24.558448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.558506]  kthread+0x328/0x630
[   24.558797]  ret_from_fork+0x10/0x20
[   24.558925] 
[   24.558961] Allocated by task 295:
[   24.559309]  kasan_save_stack+0x3c/0x68
[   24.559460]  kasan_save_track+0x20/0x40
[   24.559513]  kasan_save_alloc_info+0x40/0x58
[   24.559563]  __kasan_kmalloc+0xd4/0xd8
[   24.559607]  __kmalloc_noprof+0x198/0x4c8
[   24.559652]  kunit_kmalloc_array+0x34/0x88
[   24.559696]  copy_user_test_oob+0xac/0xec8
[   24.560214]  kunit_try_run_case+0x170/0x3f0
[   24.560353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.560468]  kthread+0x328/0x630
[   24.560627]  ret_from_fork+0x10/0x20
[   24.560821] 
[   24.561049] The buggy address belongs to the object at fff00000c641b000
[   24.561049]  which belongs to the cache kmalloc-128 of size 128
[   24.561135] The buggy address is located 0 bytes inside of
[   24.561135]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.561221] 
[   24.561250] The buggy address belongs to the physical page:
[   24.561288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.561349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.561692] page_type: f5(slab)
[   24.561807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.562138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.562217] page dumped because: kasan: bad access detected
[   24.562349] 
[   24.562379] Memory state around the buggy address:
[   24.562430]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.562485]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.562769] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.562835]                                                                 ^
[   24.562909]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.563082]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.563328] ==================================================================
[   24.527745] ==================================================================
[   24.527934] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   24.528030] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.528178] 
[   24.528281] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.528749] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.528879] Hardware name: linux,dummy-virt (DT)
[   24.528937] Call trace:
[   24.528985]  show_stack+0x20/0x38 (C)
[   24.529083]  dump_stack_lvl+0x8c/0xd0
[   24.529141]  print_report+0x118/0x608
[   24.529199]  kasan_report+0xdc/0x128
[   24.529252]  kasan_check_range+0x100/0x1a8
[   24.529309]  __kasan_check_read+0x20/0x30
[   24.529363]  copy_user_test_oob+0x728/0xec8
[   24.529419]  kunit_try_run_case+0x170/0x3f0
[   24.529474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.529932]  kthread+0x328/0x630
[   24.530068]  ret_from_fork+0x10/0x20
[   24.530163] 
[   24.530189] Allocated by task 295:
[   24.530346]  kasan_save_stack+0x3c/0x68
[   24.530629]  kasan_save_track+0x20/0x40
[   24.530723]  kasan_save_alloc_info+0x40/0x58
[   24.530946]  __kasan_kmalloc+0xd4/0xd8
[   24.531006]  __kmalloc_noprof+0x198/0x4c8
[   24.531065]  kunit_kmalloc_array+0x34/0x88
[   24.531110]  copy_user_test_oob+0xac/0xec8
[   24.531153]  kunit_try_run_case+0x170/0x3f0
[   24.531195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.531242]  kthread+0x328/0x630
[   24.531278]  ret_from_fork+0x10/0x20
[   24.531316] 
[   24.531345] The buggy address belongs to the object at fff00000c641b000
[   24.531345]  which belongs to the cache kmalloc-128 of size 128
[   24.531940] The buggy address is located 0 bytes inside of
[   24.531940]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.532066] 
[   24.532328] The buggy address belongs to the physical page:
[   24.532423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.532755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.532930] page_type: f5(slab)
[   24.533036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.533138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.533200] page dumped because: kasan: bad access detected
[   24.533363] 
[   24.533472] Memory state around the buggy address:
[   24.533616]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.533708]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.533855] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.534171]                                                                 ^
[   24.534254]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.534308]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.534361] ==================================================================
[   24.545473] ==================================================================
[   24.545543] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   24.545606] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.545666] 
[   24.545704] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.545892] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.545926] Hardware name: linux,dummy-virt (DT)
[   24.545992] Call trace:
[   24.546092]  show_stack+0x20/0x38 (C)
[   24.546215]  dump_stack_lvl+0x8c/0xd0
[   24.546275]  print_report+0x118/0x608
[   24.546328]  kasan_report+0xdc/0x128
[   24.546377]  kasan_check_range+0x100/0x1a8
[   24.546456]  __kasan_check_read+0x20/0x30
[   24.546504]  copy_user_test_oob+0x3c8/0xec8
[   24.546569]  kunit_try_run_case+0x170/0x3f0
[   24.546636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.546694]  kthread+0x328/0x630
[   24.546738]  ret_from_fork+0x10/0x20
[   24.546804] 
[   24.546859] Allocated by task 295:
[   24.546894]  kasan_save_stack+0x3c/0x68
[   24.546943]  kasan_save_track+0x20/0x40
[   24.546985]  kasan_save_alloc_info+0x40/0x58
[   24.547048]  __kasan_kmalloc+0xd4/0xd8
[   24.547133]  __kmalloc_noprof+0x198/0x4c8
[   24.547202]  kunit_kmalloc_array+0x34/0x88
[   24.547258]  copy_user_test_oob+0xac/0xec8
[   24.547345]  kunit_try_run_case+0x170/0x3f0
[   24.547477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.547532]  kthread+0x328/0x630
[   24.547569]  ret_from_fork+0x10/0x20
[   24.547607] 
[   24.547633] The buggy address belongs to the object at fff00000c641b000
[   24.547633]  which belongs to the cache kmalloc-128 of size 128
[   24.547695] The buggy address is located 0 bytes inside of
[   24.547695]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.547760] 
[   24.547801] The buggy address belongs to the physical page:
[   24.547836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.547903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.547970] page_type: f5(slab)
[   24.548030] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.548153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.548203] page dumped because: kasan: bad access detected
[   24.548242] 
[   24.548265] Memory state around the buggy address:
[   24.548302]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.548352]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.548400] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.548444]                                                                 ^
[   24.548490]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.548553]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.548601] ==================================================================
[   24.540303] ==================================================================
[   24.540466] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   24.540750] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295
[   24.540884] 
[   24.541087] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.541361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.541430] Hardware name: linux,dummy-virt (DT)
[   24.541598] Call trace:
[   24.541671]  show_stack+0x20/0x38 (C)
[   24.541935]  dump_stack_lvl+0x8c/0xd0
[   24.542169]  print_report+0x118/0x608
[   24.542270]  kasan_report+0xdc/0x128
[   24.542361]  kasan_check_range+0x100/0x1a8
[   24.542444]  __kasan_check_write+0x20/0x30
[   24.542497]  copy_user_test_oob+0x35c/0xec8
[   24.542548]  kunit_try_run_case+0x170/0x3f0
[   24.542633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.542714]  kthread+0x328/0x630
[   24.542761]  ret_from_fork+0x10/0x20
[   24.542815] 
[   24.542840] Allocated by task 295:
[   24.542872]  kasan_save_stack+0x3c/0x68
[   24.542945]  kasan_save_track+0x20/0x40
[   24.542993]  kasan_save_alloc_info+0x40/0x58
[   24.543048]  __kasan_kmalloc+0xd4/0xd8
[   24.543090]  __kmalloc_noprof+0x198/0x4c8
[   24.543133]  kunit_kmalloc_array+0x34/0x88
[   24.543188]  copy_user_test_oob+0xac/0xec8
[   24.543240]  kunit_try_run_case+0x170/0x3f0
[   24.543307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.543400]  kthread+0x328/0x630
[   24.543490]  ret_from_fork+0x10/0x20
[   24.543535] 
[   24.543559] The buggy address belongs to the object at fff00000c641b000
[   24.543559]  which belongs to the cache kmalloc-128 of size 128
[   24.543624] The buggy address is located 0 bytes inside of
[   24.543624]  allocated 120-byte region [fff00000c641b000, fff00000c641b078)
[   24.543692] 
[   24.543717] The buggy address belongs to the physical page:
[   24.543768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b
[   24.543901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.543968] page_type: f5(slab)
[   24.544064] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.544164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.544218] page dumped because: kasan: bad access detected
[   24.544299] 
[   24.544325] Memory state around the buggy address:
[   24.544363]  fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.544412]  fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.544461] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.544505]                                                                 ^
[   24.544564]  fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.544617]  fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.544663] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   24.459544] ==================================================================
[   24.459637] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   24.460178] Write of size 8 at addr fff00000c7791f78 by task kunit_try_catch/291
[   24.460272] 
[   24.460593] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.460718] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.460758] Hardware name: linux,dummy-virt (DT)
[   24.461033] Call trace:
[   24.461081]  show_stack+0x20/0x38 (C)
[   24.461170]  dump_stack_lvl+0x8c/0xd0
[   24.461594]  print_report+0x118/0x608
[   24.461850]  kasan_report+0xdc/0x128
[   24.462080]  kasan_check_range+0x100/0x1a8
[   24.462305]  __kasan_check_write+0x20/0x30
[   24.462398]  copy_to_kernel_nofault+0x8c/0x250
[   24.462523]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   24.462612]  kunit_try_run_case+0x170/0x3f0
[   24.463031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.463224]  kthread+0x328/0x630
[   24.463287]  ret_from_fork+0x10/0x20
[   24.463413] 
[   24.463461] Allocated by task 291:
[   24.463502]  kasan_save_stack+0x3c/0x68
[   24.463584]  kasan_save_track+0x20/0x40
[   24.463797]  kasan_save_alloc_info+0x40/0x58
[   24.463896]  __kasan_kmalloc+0xd4/0xd8
[   24.463960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.464321]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.464399]  kunit_try_run_case+0x170/0x3f0
[   24.464451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.464503]  kthread+0x328/0x630
[   24.464686]  ret_from_fork+0x10/0x20
[   24.464749] 
[   24.464821] The buggy address belongs to the object at fff00000c7791f00
[   24.464821]  which belongs to the cache kmalloc-128 of size 128
[   24.464906] The buggy address is located 0 bytes to the right of
[   24.464906]  allocated 120-byte region [fff00000c7791f00, fff00000c7791f78)
[   24.464982] 
[   24.465010] The buggy address belongs to the physical page:
[   24.465066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   24.465135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.465201] page_type: f5(slab)
[   24.465255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.465324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.465375] page dumped because: kasan: bad access detected
[   24.465427] 
[   24.465469] Memory state around the buggy address:
[   24.465516]  fff00000c7791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.465581]  fff00000c7791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.465639] >fff00000c7791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.465685]                                                                 ^
[   24.465736]  fff00000c7791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.465787]  fff00000c7792000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.465835] ==================================================================
[   24.445786] ==================================================================
[   24.445906] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   24.445999] Read of size 8 at addr fff00000c7791f78 by task kunit_try_catch/291
[   24.446827] 
[   24.446930] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.447059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.447495] Hardware name: linux,dummy-virt (DT)
[   24.447761] Call trace:
[   24.448056]  show_stack+0x20/0x38 (C)
[   24.448143]  dump_stack_lvl+0x8c/0xd0
[   24.448211]  print_report+0x118/0x608
[   24.448602]  kasan_report+0xdc/0x128
[   24.448682]  __asan_report_load8_noabort+0x20/0x30
[   24.449057]  copy_to_kernel_nofault+0x204/0x250
[   24.449260]  copy_to_kernel_nofault_oob+0x158/0x418
[   24.449331]  kunit_try_run_case+0x170/0x3f0
[   24.449862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.449984]  kthread+0x328/0x630
[   24.450213]  ret_from_fork+0x10/0x20
[   24.450430] 
[   24.450685] Allocated by task 291:
[   24.450735]  kasan_save_stack+0x3c/0x68
[   24.451040]  kasan_save_track+0x20/0x40
[   24.451102]  kasan_save_alloc_info+0x40/0x58
[   24.451151]  __kasan_kmalloc+0xd4/0xd8
[   24.451458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.451790]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.451855]  kunit_try_run_case+0x170/0x3f0
[   24.452074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.452234]  kthread+0x328/0x630
[   24.452664]  ret_from_fork+0x10/0x20
[   24.452894] 
[   24.452976] The buggy address belongs to the object at fff00000c7791f00
[   24.452976]  which belongs to the cache kmalloc-128 of size 128
[   24.453231] The buggy address is located 0 bytes to the right of
[   24.453231]  allocated 120-byte region [fff00000c7791f00, fff00000c7791f78)
[   24.453423] 
[   24.453459] The buggy address belongs to the physical page:
[   24.453885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   24.453982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.454431] page_type: f5(slab)
[   24.454576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.454646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.454716] page dumped because: kasan: bad access detected
[   24.455126] 
[   24.455162] Memory state around the buggy address:
[   24.455214]  fff00000c7791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.455508]  fff00000c7791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.455565] >fff00000c7791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.455612]                                                                 ^
[   24.455676]  fff00000c7791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.455726]  fff00000c7792000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.455772] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   24.368207] ==================================================================
[   24.368578] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   24.369098] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/279
[   24.369187] 
[   24.369236] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.369339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.369374] Hardware name: linux,dummy-virt (DT)
[   24.369625] Call trace:
[   24.369670]  show_stack+0x20/0x38 (C)
[   24.370043]  dump_stack_lvl+0x8c/0xd0
[   24.370223]  print_report+0x310/0x608
[   24.370520]  kasan_report+0xdc/0x128
[   24.370854]  __asan_report_load1_noabort+0x20/0x30
[   24.370977]  vmalloc_oob+0x51c/0x5d0
[   24.371042]  kunit_try_run_case+0x170/0x3f0
[   24.371419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.371804]  kthread+0x328/0x630
[   24.372071]  ret_from_fork+0x10/0x20
[   24.372194] 
[   24.372256] The buggy address belongs to the virtual mapping at
[   24.372256]  [ffff8000800fe000, ffff800080100000) created by:
[   24.372256]  vmalloc_oob+0x98/0x5d0
[   24.372608] 
[   24.372652] The buggy address belongs to the physical page:
[   24.372697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   24.372911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.373317] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.373390] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.373719] page dumped because: kasan: bad access detected
[   24.373776] 
[   24.373836] Memory state around the buggy address:
[   24.373884]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.374099]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.374296] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   24.374348]                                                                 ^
[   24.374400]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.374450]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.374747] ==================================================================
[   24.361115] ==================================================================
[   24.361218] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   24.361305] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/279
[   24.361366] 
[   24.361415] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.361520] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.361556] Hardware name: linux,dummy-virt (DT)
[   24.361596] Call trace:
[   24.361628]  show_stack+0x20/0x38 (C)
[   24.361690]  dump_stack_lvl+0x8c/0xd0
[   24.361748]  print_report+0x310/0x608
[   24.361803]  kasan_report+0xdc/0x128
[   24.361854]  __asan_report_load1_noabort+0x20/0x30
[   24.361915]  vmalloc_oob+0x578/0x5d0
[   24.361968]  kunit_try_run_case+0x170/0x3f0
[   24.362462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.363537]  kthread+0x328/0x630
[   24.364509]  ret_from_fork+0x10/0x20
[   24.364686] 
[   24.364765] The buggy address belongs to the virtual mapping at
[   24.364765]  [ffff8000800fe000, ffff800080100000) created by:
[   24.364765]  vmalloc_oob+0x98/0x5d0
[   24.364859] 
[   24.364888] The buggy address belongs to the physical page:
[   24.364960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794
[   24.365040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.365393] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.365563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.365621] page dumped because: kasan: bad access detected
[   24.365910] 
[   24.365973] Memory state around the buggy address:
[   24.366040]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.366097]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.366151] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   24.366212]                                                              ^
[   24.366258]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.366304]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.366345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   24.047078] ==================================================================
[   24.047210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   24.047326] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.047429] 
[   24.047513] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.047743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.048188] Hardware name: linux,dummy-virt (DT)
[   24.048287] Call trace:
[   24.048345]  show_stack+0x20/0x38 (C)
[   24.048481]  dump_stack_lvl+0x8c/0xd0
[   24.048621]  print_report+0x118/0x608
[   24.048743]  kasan_report+0xdc/0x128
[   24.048861]  kasan_check_range+0x100/0x1a8
[   24.048989]  __kasan_check_write+0x20/0x30
[   24.049122]  kasan_atomics_helper+0xeb8/0x4858
[   24.049246]  kasan_atomics+0x198/0x2e0
[   24.049360]  kunit_try_run_case+0x170/0x3f0
[   24.049487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.049622]  kthread+0x328/0x630
[   24.049731]  ret_from_fork+0x10/0x20
[   24.049853] 
[   24.049903] Allocated by task 275:
[   24.049978]  kasan_save_stack+0x3c/0x68
[   24.050606]  kasan_save_track+0x20/0x40
[   24.050734]  kasan_save_alloc_info+0x40/0x58
[   24.050846]  __kasan_kmalloc+0xd4/0xd8
[   24.050941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.051162]  kasan_atomics+0xb8/0x2e0
[   24.051336]  kunit_try_run_case+0x170/0x3f0
[   24.051450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.052044]  kthread+0x328/0x630
[   24.052385]  ret_from_fork+0x10/0x20
[   24.052514] 
[   24.052580] The buggy address belongs to the object at fff00000c63eb100
[   24.052580]  which belongs to the cache kmalloc-64 of size 64
[   24.052724] The buggy address is located 0 bytes to the right of
[   24.052724]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.053047] 
[   24.053120] The buggy address belongs to the physical page:
[   24.053540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.053820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.053962] page_type: f5(slab)
[   24.054103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.054252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.054406] page dumped because: kasan: bad access detected
[   24.054490] 
[   24.054542] Memory state around the buggy address:
[   24.054614]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.054736]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.054848] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.054944]                                      ^
[   24.055041]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.055369]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.055497] ==================================================================
[   23.838043] ==================================================================
[   23.838646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   23.839188] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.839307] 
[   23.839714] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.840356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.840484] Hardware name: linux,dummy-virt (DT)
[   23.840666] Call trace:
[   23.840736]  show_stack+0x20/0x38 (C)
[   23.840941]  dump_stack_lvl+0x8c/0xd0
[   23.841072]  print_report+0x118/0x608
[   23.841189]  kasan_report+0xdc/0x128
[   23.841358]  kasan_check_range+0x100/0x1a8
[   23.841471]  __kasan_check_write+0x20/0x30
[   23.841582]  kasan_atomics_helper+0xa04/0x4858
[   23.841698]  kasan_atomics+0x198/0x2e0
[   23.841816]  kunit_try_run_case+0x170/0x3f0
[   23.841967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.842163]  kthread+0x328/0x630
[   23.842257]  ret_from_fork+0x10/0x20
[   23.842413] 
[   23.842454] Allocated by task 275:
[   23.842535]  kasan_save_stack+0x3c/0x68
[   23.842634]  kasan_save_track+0x20/0x40
[   23.842718]  kasan_save_alloc_info+0x40/0x58
[   23.842846]  __kasan_kmalloc+0xd4/0xd8
[   23.842941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.843047]  kasan_atomics+0xb8/0x2e0
[   23.843174]  kunit_try_run_case+0x170/0x3f0
[   23.843257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.843385]  kthread+0x328/0x630
[   23.843559]  ret_from_fork+0x10/0x20
[   23.843668] 
[   23.843730] The buggy address belongs to the object at fff00000c63eb100
[   23.843730]  which belongs to the cache kmalloc-64 of size 64
[   23.843864] The buggy address is located 0 bytes to the right of
[   23.843864]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.844028] 
[   23.844100] The buggy address belongs to the physical page:
[   23.844255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.844365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.844472] page_type: f5(slab)
[   23.844600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.844767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.844890] page dumped because: kasan: bad access detected
[   23.844965] 
[   23.845032] Memory state around the buggy address:
[   23.845132]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.845236]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.845340] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.845430]                                      ^
[   23.845507]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845611]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845706] ==================================================================
[   24.089663] ==================================================================
[   24.089796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   24.089927] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.090062] 
[   24.090909] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.091649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.091889] Hardware name: linux,dummy-virt (DT)
[   24.092321] Call trace:
[   24.092407]  show_stack+0x20/0x38 (C)
[   24.093157]  dump_stack_lvl+0x8c/0xd0
[   24.093583]  print_report+0x118/0x608
[   24.093712]  kasan_report+0xdc/0x128
[   24.093822]  kasan_check_range+0x100/0x1a8
[   24.094567]  __kasan_check_write+0x20/0x30
[   24.094804]  kasan_atomics_helper+0x1058/0x4858
[   24.095294]  kasan_atomics+0x198/0x2e0
[   24.095494]  kunit_try_run_case+0x170/0x3f0
[   24.095670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.095998]  kthread+0x328/0x630
[   24.096346]  ret_from_fork+0x10/0x20
[   24.096475] 
[   24.096538] Allocated by task 275:
[   24.096618]  kasan_save_stack+0x3c/0x68
[   24.096731]  kasan_save_track+0x20/0x40
[   24.097481]  kasan_save_alloc_info+0x40/0x58
[   24.097932]  __kasan_kmalloc+0xd4/0xd8
[   24.098330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.098482]  kasan_atomics+0xb8/0x2e0
[   24.098570]  kunit_try_run_case+0x170/0x3f0
[   24.099030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.099227]  kthread+0x328/0x630
[   24.099320]  ret_from_fork+0x10/0x20
[   24.099755] 
[   24.099808] The buggy address belongs to the object at fff00000c63eb100
[   24.099808]  which belongs to the cache kmalloc-64 of size 64
[   24.100592] The buggy address is located 0 bytes to the right of
[   24.100592]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.100813] 
[   24.100876] The buggy address belongs to the physical page:
[   24.101295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.101492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.101722] page_type: f5(slab)
[   24.101974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.102639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.103143] page dumped because: kasan: bad access detected
[   24.103316] 
[   24.103671] Memory state around the buggy address:
[   24.103790]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.103902]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.104006] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.104698]                                      ^
[   24.104923]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.105289]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.105867] ==================================================================
[   24.067121] ==================================================================
[   24.067252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   24.067439] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.067782] 
[   24.067904] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.068146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.068349] Hardware name: linux,dummy-virt (DT)
[   24.068550] Call trace:
[   24.068652]  show_stack+0x20/0x38 (C)
[   24.069201]  dump_stack_lvl+0x8c/0xd0
[   24.069383]  print_report+0x118/0x608
[   24.069507]  kasan_report+0xdc/0x128
[   24.069617]  kasan_check_range+0x100/0x1a8
[   24.069732]  __kasan_check_write+0x20/0x30
[   24.069839]  kasan_atomics_helper+0xf88/0x4858
[   24.070171]  kasan_atomics+0x198/0x2e0
[   24.070428]  kunit_try_run_case+0x170/0x3f0
[   24.070560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.070696]  kthread+0x328/0x630
[   24.070795]  ret_from_fork+0x10/0x20
[   24.070921] 
[   24.070966] Allocated by task 275:
[   24.071066]  kasan_save_stack+0x3c/0x68
[   24.071163]  kasan_save_track+0x20/0x40
[   24.071257]  kasan_save_alloc_info+0x40/0x58
[   24.071360]  __kasan_kmalloc+0xd4/0xd8
[   24.071456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.071603]  kasan_atomics+0xb8/0x2e0
[   24.071704]  kunit_try_run_case+0x170/0x3f0
[   24.071837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.071987]  kthread+0x328/0x630
[   24.072113]  ret_from_fork+0x10/0x20
[   24.072240] 
[   24.072294] The buggy address belongs to the object at fff00000c63eb100
[   24.072294]  which belongs to the cache kmalloc-64 of size 64
[   24.072439] The buggy address is located 0 bytes to the right of
[   24.072439]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.072628] 
[   24.072709] The buggy address belongs to the physical page:
[   24.072821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.072962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.073077] page_type: f5(slab)
[   24.073171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.073295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.073433] page dumped because: kasan: bad access detected
[   24.073519] 
[   24.073562] Memory state around the buggy address:
[   24.073644]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.073758]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.073870] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.073988]                                      ^
[   24.074125]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.074183]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.074230] ==================================================================
[   23.824818] ==================================================================
[   23.824953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   23.825108] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.825243] 
[   23.825353] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.825570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.825631] Hardware name: linux,dummy-virt (DT)
[   23.825700] Call trace:
[   23.825753]  show_stack+0x20/0x38 (C)
[   23.825844]  dump_stack_lvl+0x8c/0xd0
[   23.825940]  print_report+0x118/0x608
[   23.826052]  kasan_report+0xdc/0x128
[   23.826242]  kasan_check_range+0x100/0x1a8
[   23.826440]  __kasan_check_write+0x20/0x30
[   23.826552]  kasan_atomics_helper+0x934/0x4858
[   23.826676]  kasan_atomics+0x198/0x2e0
[   23.826782]  kunit_try_run_case+0x170/0x3f0
[   23.826879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.826981]  kthread+0x328/0x630
[   23.827112]  ret_from_fork+0x10/0x20
[   23.827219] 
[   23.827258] Allocated by task 275:
[   23.827318]  kasan_save_stack+0x3c/0x68
[   23.827414]  kasan_save_track+0x20/0x40
[   23.827490]  kasan_save_alloc_info+0x40/0x58
[   23.827554]  __kasan_kmalloc+0xd4/0xd8
[   23.827621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.827691]  kasan_atomics+0xb8/0x2e0
[   23.827752]  kunit_try_run_case+0x170/0x3f0
[   23.827822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.828459] The buggy address is located 0 bytes to the right of
[   23.828459]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.828636] 
[   23.828717] The buggy address belongs to the physical page:
[   23.828842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.828987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.829118] page_type: f5(slab)
[   23.829210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.829346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.829441] page dumped because: kasan: bad access detected
[   23.829601] 
[   23.829653] Memory state around the buggy address:
[   23.829737]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.829844]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.829952] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.830099]                                      ^
[   23.830176]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.830295]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.830415] ==================================================================
[   24.240386] ==================================================================
[   24.240856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   24.240933] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.240992] 
[   24.241049] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.241154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.241190] Hardware name: linux,dummy-virt (DT)
[   24.241229] Call trace:
[   24.241261]  show_stack+0x20/0x38 (C)
[   24.241321]  dump_stack_lvl+0x8c/0xd0
[   24.241378]  print_report+0x118/0x608
[   24.241433]  kasan_report+0xdc/0x128
[   24.241487]  kasan_check_range+0x100/0x1a8
[   24.241543]  __kasan_check_write+0x20/0x30
[   24.241594]  kasan_atomics_helper+0x1644/0x4858
[   24.241650]  kasan_atomics+0x198/0x2e0
[   24.241702]  kunit_try_run_case+0x170/0x3f0
[   24.241756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.241816]  kthread+0x328/0x630
[   24.241865]  ret_from_fork+0x10/0x20
[   24.241921] 
[   24.241947] Allocated by task 275:
[   24.241982]  kasan_save_stack+0x3c/0x68
[   24.244610]  kasan_save_track+0x20/0x40
[   24.244762]  kasan_save_alloc_info+0x40/0x58
[   24.245046]  __kasan_kmalloc+0xd4/0xd8
[   24.245277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.245373]  kasan_atomics+0xb8/0x2e0
[   24.245419]  kunit_try_run_case+0x170/0x3f0
[   24.245509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.245916]  kthread+0x328/0x630
[   24.246063]  ret_from_fork+0x10/0x20
[   24.247008] 
[   24.247055] The buggy address belongs to the object at fff00000c63eb100
[   24.247055]  which belongs to the cache kmalloc-64 of size 64
[   24.247312] The buggy address is located 0 bytes to the right of
[   24.247312]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.247561] 
[   24.247759] The buggy address belongs to the physical page:
[   24.248321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.248772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.249373] page_type: f5(slab)
[   24.249672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.250130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.250190] page dumped because: kasan: bad access detected
[   24.250712] 
[   24.251050] Memory state around the buggy address:
[   24.251144]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.251200]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.251248] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.251290]                                      ^
[   24.251329]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.252212]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.252838] ==================================================================
[   23.871287] ==================================================================
[   23.871639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   23.871773] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.872109] 
[   23.872208] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.872912] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.873003] Hardware name: linux,dummy-virt (DT)
[   23.873103] Call trace:
[   23.873165]  show_stack+0x20/0x38 (C)
[   23.873686]  dump_stack_lvl+0x8c/0xd0
[   23.874189]  print_report+0x118/0x608
[   23.874363]  kasan_report+0xdc/0x128
[   23.874553]  __asan_report_load4_noabort+0x20/0x30
[   23.875116]  kasan_atomics_helper+0x3dcc/0x4858
[   23.875328]  kasan_atomics+0x198/0x2e0
[   23.875485]  kunit_try_run_case+0x170/0x3f0
[   23.875691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.875835]  kthread+0x328/0x630
[   23.875950]  ret_from_fork+0x10/0x20
[   23.876809] 
[   23.876917] Allocated by task 275:
[   23.877050]  kasan_save_stack+0x3c/0x68
[   23.877165]  kasan_save_track+0x20/0x40
[   23.877259]  kasan_save_alloc_info+0x40/0x58
[   23.877363]  __kasan_kmalloc+0xd4/0xd8
[   23.878000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.878347]  kasan_atomics+0xb8/0x2e0
[   23.878470]  kunit_try_run_case+0x170/0x3f0
[   23.878824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878961]  kthread+0x328/0x630
[   23.879071]  ret_from_fork+0x10/0x20
[   23.879521] 
[   23.879696] The buggy address belongs to the object at fff00000c63eb100
[   23.879696]  which belongs to the cache kmalloc-64 of size 64
[   23.880257] The buggy address is located 0 bytes to the right of
[   23.880257]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.880635] 
[   23.880730] The buggy address belongs to the physical page:
[   23.880823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.880969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.881118] page_type: f5(slab)
[   23.881854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.882060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.882386] page dumped because: kasan: bad access detected
[   23.882478] 
[   23.882710] Memory state around the buggy address:
[   23.882801]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.883388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.883547] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.883727]                                      ^
[   23.883814]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.884359]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.884485] ==================================================================
[   24.178660] ==================================================================
[   24.178865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   24.179009] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.179137] 
[   24.179254] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.179459] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.179531] Hardware name: linux,dummy-virt (DT)
[   24.179598] Call trace:
[   24.179643]  show_stack+0x20/0x38 (C)
[   24.179745]  dump_stack_lvl+0x8c/0xd0
[   24.179855]  print_report+0x118/0x608
[   24.179972]  kasan_report+0xdc/0x128
[   24.180111]  __asan_report_load8_noabort+0x20/0x30
[   24.180275]  kasan_atomics_helper+0x3f04/0x4858
[   24.180437]  kasan_atomics+0x198/0x2e0
[   24.180569]  kunit_try_run_case+0x170/0x3f0
[   24.180694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.180831]  kthread+0x328/0x630
[   24.180943]  ret_from_fork+0x10/0x20
[   24.181077] 
[   24.181127] Allocated by task 275:
[   24.181201]  kasan_save_stack+0x3c/0x68
[   24.181303]  kasan_save_track+0x20/0x40
[   24.181399]  kasan_save_alloc_info+0x40/0x58
[   24.181498]  __kasan_kmalloc+0xd4/0xd8
[   24.181589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.181686]  kasan_atomics+0xb8/0x2e0
[   24.181774]  kunit_try_run_case+0x170/0x3f0
[   24.181867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181975]  kthread+0x328/0x630
[   24.182089]  ret_from_fork+0x10/0x20
[   24.182181] 
[   24.182269] The buggy address belongs to the object at fff00000c63eb100
[   24.182269]  which belongs to the cache kmalloc-64 of size 64
[   24.182410] The buggy address is located 0 bytes to the right of
[   24.182410]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.182583] 
[   24.182653] The buggy address belongs to the physical page:
[   24.182751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.182894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.183057] page_type: f5(slab)
[   24.183152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.183282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.183386] page dumped because: kasan: bad access detected
[   24.183465] 
[   24.183511] Memory state around the buggy address:
[   24.183587]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.183694]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.183798] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.183903]                                      ^
[   24.184027]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184128]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184247] ==================================================================
[   23.788348] ==================================================================
[   23.788718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   23.788873] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.789501] Hardware name: linux,dummy-virt (DT)
[   23.790327]  dump_stack_lvl+0x8c/0xd0
[   23.790444]  print_report+0x118/0x608
[   23.790544]  kasan_report+0xdc/0x128
[   23.790982]  kasan_atomics_helper+0x760/0x4858
[   23.791114]  kasan_atomics+0x198/0x2e0
[   23.791331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.791468]  kthread+0x328/0x630
[   23.792015] 
[   23.792079] Allocated by task 275:
[   23.792427]  kasan_save_alloc_info+0x40/0x58
[   23.792821]  kunit_try_run_case+0x170/0x3f0
[   23.792921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.793417] The buggy address is located 0 bytes to the right of
[   23.793417]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.794585] page_type: f5(slab)
[   23.794894]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.795222] ==================================================================
[   23.885736] ==================================================================
[   23.885885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   23.886501] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.886649] 
[   23.886722] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.886950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.887263] Hardware name: linux,dummy-virt (DT)
[   23.887504] Call trace:
[   23.887649]  show_stack+0x20/0x38 (C)
[   23.888201]  dump_stack_lvl+0x8c/0xd0
[   23.888578]  print_report+0x118/0x608
[   23.889117]  kasan_report+0xdc/0x128
[   23.889333]  kasan_check_range+0x100/0x1a8
[   23.889468]  __kasan_check_write+0x20/0x30
[   23.889784]  kasan_atomics_helper+0xb70/0x4858
[   23.890198]  kasan_atomics+0x198/0x2e0
[   23.890489]  kunit_try_run_case+0x170/0x3f0
[   23.890627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.890756]  kthread+0x328/0x630
[   23.890861]  ret_from_fork+0x10/0x20
[   23.891357] 
[   23.891441] Allocated by task 275:
[   23.891866]  kasan_save_stack+0x3c/0x68
[   23.892003]  kasan_save_track+0x20/0x40
[   23.892114]  kasan_save_alloc_info+0x40/0x58
[   23.892468]  __kasan_kmalloc+0xd4/0xd8
[   23.892670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.892789]  kasan_atomics+0xb8/0x2e0
[   23.893141]  kunit_try_run_case+0x170/0x3f0
[   23.893284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.893642]  kthread+0x328/0x630
[   23.894183]  ret_from_fork+0x10/0x20
[   23.894321] 
[   23.894375] The buggy address belongs to the object at fff00000c63eb100
[   23.894375]  which belongs to the cache kmalloc-64 of size 64
[   23.894504] The buggy address is located 0 bytes to the right of
[   23.894504]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.894656] 
[   23.894714] The buggy address belongs to the physical page:
[   23.894810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.894940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.896038] page_type: f5(slab)
[   23.896590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.897224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.897339] page dumped because: kasan: bad access detected
[   23.897429] 
[   23.897844] Memory state around the buggy address:
[   23.897946]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.901544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   23.908518]  ret_from_fork+0x10/0x20
[   23.911463] page_type: f5(slab)
[   23.912377] 
[   23.912576]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912733]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.913074] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.913417]                                      ^
[   23.913868]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.916069] 
[   23.916704] Hardware name: linux,dummy-virt (DT)
[   23.918877]  __kasan_check_write+0x20/0x30
[   23.920551]  kthread+0x328/0x630
[   23.922769]  kasan_atomics+0xb8/0x2e0
[   23.924860] 
[   23.926836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.927618]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.927934] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.928271]                                      ^
[   23.928923] ==================================================================
[   24.279157] ==================================================================
[   24.279226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   24.279294] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.279353] 
[   24.279396] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.279498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.279536] Hardware name: linux,dummy-virt (DT)
[   24.279575] Call trace:
[   24.279604]  show_stack+0x20/0x38 (C)
[   24.279665]  dump_stack_lvl+0x8c/0xd0
[   24.279722]  print_report+0x118/0x608
[   24.279777]  kasan_report+0xdc/0x128
[   24.279832]  __asan_report_load8_noabort+0x20/0x30
[   24.279895]  kasan_atomics_helper+0x3e10/0x4858
[   24.279951]  kasan_atomics+0x198/0x2e0
[   24.280005]  kunit_try_run_case+0x170/0x3f0
[   24.280079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.280141]  kthread+0x328/0x630
[   24.280191]  ret_from_fork+0x10/0x20
[   24.283218] 
[   24.283572] Allocated by task 275:
[   24.283622]  kasan_save_stack+0x3c/0x68
[   24.284440]  kasan_save_track+0x20/0x40
[   24.284947]  kasan_save_alloc_info+0x40/0x58
[   24.285221]  __kasan_kmalloc+0xd4/0xd8
[   24.285992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.286215]  kasan_atomics+0xb8/0x2e0
[   24.286374]  kunit_try_run_case+0x170/0x3f0
[   24.286474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.286522]  kthread+0x328/0x630
[   24.286559]  ret_from_fork+0x10/0x20
[   24.286597] 
[   24.286624] The buggy address belongs to the object at fff00000c63eb100
[   24.286624]  which belongs to the cache kmalloc-64 of size 64
[   24.287848] The buggy address is located 0 bytes to the right of
[   24.287848]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.287937] 
[   24.287965] The buggy address belongs to the physical page:
[   24.288654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.288750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.288824] page_type: f5(slab)
[   24.288876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.289659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.289889] page dumped because: kasan: bad access detected
[   24.290484] 
[   24.290604] Memory state around the buggy address:
[   24.290657]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.290713]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.290763] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.290807]                                      ^
[   24.290846]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290892]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290933] ==================================================================
[   24.292574] ==================================================================
[   24.293327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   24.294093] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.294247] 
[   24.294444] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.294840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.294876] Hardware name: linux,dummy-virt (DT)
[   24.294914] Call trace:
[   24.294944]  show_stack+0x20/0x38 (C)
[   24.295009]  dump_stack_lvl+0x8c/0xd0
[   24.295081]  print_report+0x118/0x608
[   24.296428]  kasan_report+0xdc/0x128
[   24.296696]  kasan_check_range+0x100/0x1a8
[   24.296762]  __kasan_check_write+0x20/0x30
[   24.296818]  kasan_atomics_helper+0x175c/0x4858
[   24.296875]  kasan_atomics+0x198/0x2e0
[   24.298262]  kunit_try_run_case+0x170/0x3f0
[   24.298323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.298382]  kthread+0x328/0x630
[   24.299231]  ret_from_fork+0x10/0x20
[   24.299316] 
[   24.299345] Allocated by task 275:
[   24.299714]  kasan_save_stack+0x3c/0x68
[   24.299907]  kasan_save_track+0x20/0x40
[   24.300113]  kasan_save_alloc_info+0x40/0x58
[   24.300307]  __kasan_kmalloc+0xd4/0xd8
[   24.300520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.300587]  kasan_atomics+0xb8/0x2e0
[   24.300634]  kunit_try_run_case+0x170/0x3f0
[   24.301491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.301625]  kthread+0x328/0x630
[   24.301770]  ret_from_fork+0x10/0x20
[   24.302166] 
[   24.302199] The buggy address belongs to the object at fff00000c63eb100
[   24.302199]  which belongs to the cache kmalloc-64 of size 64
[   24.302269] The buggy address is located 0 bytes to the right of
[   24.302269]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.302659] 
[   24.302760] The buggy address belongs to the physical page:
[   24.303043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.303567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.303755] page_type: f5(slab)
[   24.303811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.303871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.303917] page dumped because: kasan: bad access detected
[   24.303956] 
[   24.303978] Memory state around the buggy address:
[   24.304029]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.304089]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.304140] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.304186]                                      ^
[   24.304228]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.304278]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.304379] ==================================================================
[   24.109346] ==================================================================
[   24.110059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   24.111013] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.111322] 
[   24.111635] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.112758] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.112843] Hardware name: linux,dummy-virt (DT)
[   24.113423] Call trace:
[   24.113622]  show_stack+0x20/0x38 (C)
[   24.114244]  dump_stack_lvl+0x8c/0xd0
[   24.114699]  print_report+0x118/0x608
[   24.114992]  kasan_report+0xdc/0x128
[   24.115638]  kasan_check_range+0x100/0x1a8
[   24.116001]  __kasan_check_write+0x20/0x30
[   24.116970]  kasan_atomics_helper+0x10c0/0x4858
[   24.117561]  kasan_atomics+0x198/0x2e0
[   24.117724]  kunit_try_run_case+0x170/0x3f0
[   24.117889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.118089]  kthread+0x328/0x630
[   24.118190]  ret_from_fork+0x10/0x20
[   24.118420] 
[   24.118593] Allocated by task 275:
[   24.118733]  kasan_save_stack+0x3c/0x68
[   24.118842]  kasan_save_track+0x20/0x40
[   24.118927]  kasan_save_alloc_info+0x40/0x58
[   24.119008]  __kasan_kmalloc+0xd4/0xd8
[   24.119289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.119388]  kasan_atomics+0xb8/0x2e0
[   24.119476]  kunit_try_run_case+0x170/0x3f0
[   24.119832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120003]  kthread+0x328/0x630
[   24.120099]  ret_from_fork+0x10/0x20
[   24.120407] 
[   24.120502] The buggy address belongs to the object at fff00000c63eb100
[   24.120502]  which belongs to the cache kmalloc-64 of size 64
[   24.120702] The buggy address is located 0 bytes to the right of
[   24.120702]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.120901] 
[   24.120976] The buggy address belongs to the physical page:
[   24.121078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.121229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.121518] page_type: f5(slab)
[   24.121629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.121757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.121861] page dumped because: kasan: bad access detected
[   24.121952] 
[   24.122029] Memory state around the buggy address:
[   24.122146]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.122295]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.122437] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.122570]                                      ^
[   24.122683]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.122823]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.122925] ==================================================================
[   24.254313] ==================================================================
[   24.254514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   24.255301] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.255488] 
[   24.255582] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.256039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.256189] Hardware name: linux,dummy-virt (DT)
[   24.256324] Call trace:
[   24.256447]  show_stack+0x20/0x38 (C)
[   24.256555]  dump_stack_lvl+0x8c/0xd0
[   24.256944]  print_report+0x118/0x608
[   24.257008]  kasan_report+0xdc/0x128
[   24.257082]  __asan_report_load8_noabort+0x20/0x30
[   24.257261]  kasan_atomics_helper+0x3df4/0x4858
[   24.257331]  kasan_atomics+0x198/0x2e0
[   24.257434]  kunit_try_run_case+0x170/0x3f0
[   24.257494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257557]  kthread+0x328/0x630
[   24.257606]  ret_from_fork+0x10/0x20
[   24.257665] 
[   24.257924] Allocated by task 275:
[   24.258114]  kasan_save_stack+0x3c/0x68
[   24.258319]  kasan_save_track+0x20/0x40
[   24.258371]  kasan_save_alloc_info+0x40/0x58
[   24.258814]  __kasan_kmalloc+0xd4/0xd8
[   24.258865]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.259318]  kasan_atomics+0xb8/0x2e0
[   24.259816]  kunit_try_run_case+0x170/0x3f0
[   24.259878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.259931]  kthread+0x328/0x630
[   24.259969]  ret_from_fork+0x10/0x20
[   24.260662] 
[   24.260981] The buggy address belongs to the object at fff00000c63eb100
[   24.260981]  which belongs to the cache kmalloc-64 of size 64
[   24.261440] The buggy address is located 0 bytes to the right of
[   24.261440]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.261815] 
[   24.262011] The buggy address belongs to the physical page:
[   24.262167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.262256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.262318] page_type: f5(slab)
[   24.262366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.262426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.262473] page dumped because: kasan: bad access detected
[   24.262511] 
[   24.262534] Memory state around the buggy address:
[   24.262574]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.262625]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.262675] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.264697]                                      ^
[   24.264898]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.264955]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.265003] ==================================================================
[   23.962843] ==================================================================
[   23.963652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   23.963821] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.963957] 
[   23.964068] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.964293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.964378] Hardware name: linux,dummy-virt (DT)
[   23.964466] Call trace:
[   23.964541]  show_stack+0x20/0x38 (C)
[   23.964680]  dump_stack_lvl+0x8c/0xd0
[   23.964811]  print_report+0x118/0x608
[   23.964940]  kasan_report+0xdc/0x128
[   23.965079]  __asan_report_load4_noabort+0x20/0x30
[   23.967145]  kasan_atomics_helper+0x3dd8/0x4858
[   23.967408]  kasan_atomics+0x198/0x2e0
[   23.967986]  kunit_try_run_case+0x170/0x3f0
[   23.968217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.968786]  kthread+0x328/0x630
[   23.968931]  ret_from_fork+0x10/0x20
[   23.969070] 
[   23.969326] Allocated by task 275:
[   23.969452]  kasan_save_stack+0x3c/0x68
[   23.970082]  kasan_save_track+0x20/0x40
[   23.970203]  kasan_save_alloc_info+0x40/0x58
[   23.970680]  __kasan_kmalloc+0xd4/0xd8
[   23.970800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.970907]  kasan_atomics+0xb8/0x2e0
[   23.971512]  kunit_try_run_case+0x170/0x3f0
[   23.971871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.972224]  kthread+0x328/0x630
[   23.972373]  ret_from_fork+0x10/0x20
[   23.972465] 
[   23.972514] The buggy address belongs to the object at fff00000c63eb100
[   23.972514]  which belongs to the cache kmalloc-64 of size 64
[   23.972939] The buggy address is located 0 bytes to the right of
[   23.972939]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.973588] 
[   23.973676] The buggy address belongs to the physical page:
[   23.974049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.974300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.974434] page_type: f5(slab)
[   23.974529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.974910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.975476] page dumped because: kasan: bad access detected
[   23.975573] 
[   23.975678] Memory state around the buggy address:
[   23.975780]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976462]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976607] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.976716]                                      ^
[   23.977048]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.977568]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978070] ==================================================================
[   24.199140] ==================================================================
[   24.199309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   24.199479] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.199648] 
[   24.199756] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.200069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.200185] Hardware name: linux,dummy-virt (DT)
[   24.200293] Call trace:
[   24.200359]  show_stack+0x20/0x38 (C)
[   24.200462]  dump_stack_lvl+0x8c/0xd0
[   24.200566]  print_report+0x118/0x608
[   24.200655]  kasan_report+0xdc/0x128
[   24.200739]  kasan_check_range+0x100/0x1a8
[   24.200855]  __kasan_check_write+0x20/0x30
[   24.200979]  kasan_atomics_helper+0x14e4/0x4858
[   24.201107]  kasan_atomics+0x198/0x2e0
[   24.201213]  kunit_try_run_case+0x170/0x3f0
[   24.201376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.201507]  kthread+0x328/0x630
[   24.201602]  ret_from_fork+0x10/0x20
[   24.201738] 
[   24.201792] Allocated by task 275:
[   24.201890]  kasan_save_stack+0x3c/0x68
[   24.201993]  kasan_save_track+0x20/0x40
[   24.202111]  kasan_save_alloc_info+0x40/0x58
[   24.202266]  __kasan_kmalloc+0xd4/0xd8
[   24.203422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.204111]  kasan_atomics+0xb8/0x2e0
[   24.204218]  kunit_try_run_case+0x170/0x3f0
[   24.204855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.205383]  kthread+0x328/0x630
[   24.205467]  ret_from_fork+0x10/0x20
[   24.205738] 
[   24.205907] The buggy address belongs to the object at fff00000c63eb100
[   24.205907]  which belongs to the cache kmalloc-64 of size 64
[   24.206336] The buggy address is located 0 bytes to the right of
[   24.206336]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.206491] 
[   24.206545] The buggy address belongs to the physical page:
[   24.206652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.206829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.206964] page_type: f5(slab)
[   24.207064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.207187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.207288] page dumped because: kasan: bad access detected
[   24.207369] 
[   24.207436] Memory state around the buggy address:
[   24.207518]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.207630]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.207741] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.207819]                                      ^
[   24.208471]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208641]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208766] ==================================================================
[   24.171968] ==================================================================
[   24.172138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   24.172289] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.172414] 
[   24.172503] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.172734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.172801] Hardware name: linux,dummy-virt (DT)
[   24.172869] Call trace:
[   24.172927]  show_stack+0x20/0x38 (C)
[   24.173058]  dump_stack_lvl+0x8c/0xd0
[   24.173182]  print_report+0x118/0x608
[   24.173309]  kasan_report+0xdc/0x128
[   24.173429]  kasan_check_range+0x100/0x1a8
[   24.173555]  __kasan_check_write+0x20/0x30
[   24.173675]  kasan_atomics_helper+0x1384/0x4858
[   24.173800]  kasan_atomics+0x198/0x2e0
[   24.173919]  kunit_try_run_case+0x170/0x3f0
[   24.174061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.174210]  kthread+0x328/0x630
[   24.174367]  ret_from_fork+0x10/0x20
[   24.174494] 
[   24.174576] Allocated by task 275:
[   24.174671]  kasan_save_stack+0x3c/0x68
[   24.174811]  kasan_save_track+0x20/0x40
[   24.174943]  kasan_save_alloc_info+0x40/0x58
[   24.175099]  __kasan_kmalloc+0xd4/0xd8
[   24.175236]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.175370]  kasan_atomics+0xb8/0x2e0
[   24.175496]  kunit_try_run_case+0x170/0x3f0
[   24.175621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.175733]  kthread+0x328/0x630
[   24.175812]  ret_from_fork+0x10/0x20
[   24.175897] 
[   24.175942] The buggy address belongs to the object at fff00000c63eb100
[   24.175942]  which belongs to the cache kmalloc-64 of size 64
[   24.176079] The buggy address is located 0 bytes to the right of
[   24.176079]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.176243] 
[   24.176296] The buggy address belongs to the physical page:
[   24.176381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.176539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.176725] page_type: f5(slab)
[   24.176823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.177005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.177115] page dumped because: kasan: bad access detected
[   24.177217] 
[   24.177267] Memory state around the buggy address:
[   24.177373]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.177491]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.177589] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.177683]                                      ^
[   24.177776]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.177896]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.177992] ==================================================================
[   24.317777] ==================================================================
[   24.317851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   24.317921] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.317979] 
[   24.318033] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.320181] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.320238] Hardware name: linux,dummy-virt (DT)
[   24.320280] Call trace:
[   24.320314]  show_stack+0x20/0x38 (C)
[   24.320382]  dump_stack_lvl+0x8c/0xd0
[   24.320445]  print_report+0x118/0x608
[   24.320503]  kasan_report+0xdc/0x128
[   24.320572]  kasan_check_range+0x100/0x1a8
[   24.320634]  __kasan_check_write+0x20/0x30
[   24.321522]  kasan_atomics_helper+0x17ec/0x4858
[   24.321989]  kasan_atomics+0x198/0x2e0
[   24.322860]  kunit_try_run_case+0x170/0x3f0
[   24.322972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.323052]  kthread+0x328/0x630
[   24.323109]  ret_from_fork+0x10/0x20
[   24.323169] 
[   24.324074] Allocated by task 275:
[   24.324140]  kasan_save_stack+0x3c/0x68
[   24.324202]  kasan_save_track+0x20/0x40
[   24.324248]  kasan_save_alloc_info+0x40/0x58
[   24.324297]  __kasan_kmalloc+0xd4/0xd8
[   24.324340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.324385]  kasan_atomics+0xb8/0x2e0
[   24.325693]  kunit_try_run_case+0x170/0x3f0
[   24.326075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.326502]  kthread+0x328/0x630
[   24.326633]  ret_from_fork+0x10/0x20
[   24.326694] 
[   24.327153] The buggy address belongs to the object at fff00000c63eb100
[   24.327153]  which belongs to the cache kmalloc-64 of size 64
[   24.327512] The buggy address is located 0 bytes to the right of
[   24.327512]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.327656] 
[   24.327685] The buggy address belongs to the physical page:
[   24.327721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.327779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.327834] page_type: f5(slab)
[   24.327881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.329181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.329256] page dumped because: kasan: bad access detected
[   24.329299] 
[   24.329323] Memory state around the buggy address:
[   24.329365]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.330388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.330513] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.330563]                                      ^
[   24.330605]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.330953]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.331216] ==================================================================
[   24.267062] ==================================================================
[   24.267139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   24.267211] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.268554] 
[   24.268761] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.269057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.269098] Hardware name: linux,dummy-virt (DT)
[   24.269137] Call trace:
[   24.269168]  show_stack+0x20/0x38 (C)
[   24.269236]  dump_stack_lvl+0x8c/0xd0
[   24.269295]  print_report+0x118/0x608
[   24.269350]  kasan_report+0xdc/0x128
[   24.269404]  kasan_check_range+0x100/0x1a8
[   24.269461]  __kasan_check_write+0x20/0x30
[   24.269514]  kasan_atomics_helper+0x16d0/0x4858
[   24.269570]  kasan_atomics+0x198/0x2e0
[   24.269620]  kunit_try_run_case+0x170/0x3f0
[   24.269677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.269735]  kthread+0x328/0x630
[   24.269783]  ret_from_fork+0x10/0x20
[   24.269840] 
[   24.269865] Allocated by task 275:
[   24.269900]  kasan_save_stack+0x3c/0x68
[   24.269950]  kasan_save_track+0x20/0x40
[   24.270008]  kasan_save_alloc_info+0x40/0x58
[   24.273391]  __kasan_kmalloc+0xd4/0xd8
[   24.273496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.273556]  kasan_atomics+0xb8/0x2e0
[   24.274063]  kunit_try_run_case+0x170/0x3f0
[   24.274366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274455]  kthread+0x328/0x630
[   24.274495]  ret_from_fork+0x10/0x20
[   24.274539] 
[   24.274569] The buggy address belongs to the object at fff00000c63eb100
[   24.274569]  which belongs to the cache kmalloc-64 of size 64
[   24.275237] The buggy address is located 0 bytes to the right of
[   24.275237]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.275359] 
[   24.275387] The buggy address belongs to the physical page:
[   24.275425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.275483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.275540] page_type: f5(slab)
[   24.275587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.275645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.275692] page dumped because: kasan: bad access detected
[   24.275730] 
[   24.275752] Memory state around the buggy address:
[   24.277153]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.277374]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.277670] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.277918]                                      ^
[   24.277966]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278026]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278538] ==================================================================
[   24.307182] ==================================================================
[   24.307259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   24.307328] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.307383] 
[   24.307428] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.307525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.307557] Hardware name: linux,dummy-virt (DT)
[   24.307595] Call trace:
[   24.307622]  show_stack+0x20/0x38 (C)
[   24.307680]  dump_stack_lvl+0x8c/0xd0
[   24.307734]  print_report+0x118/0x608
[   24.307786]  kasan_report+0xdc/0x128
[   24.307837]  __asan_report_load8_noabort+0x20/0x30
[   24.307893]  kasan_atomics_helper+0x3e20/0x4858
[   24.307946]  kasan_atomics+0x198/0x2e0
[   24.307999]  kunit_try_run_case+0x170/0x3f0
[   24.308074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.308137]  kthread+0x328/0x630
[   24.308187]  ret_from_fork+0x10/0x20
[   24.308244] 
[   24.308267] Allocated by task 275:
[   24.308302]  kasan_save_stack+0x3c/0x68
[   24.308353]  kasan_save_track+0x20/0x40
[   24.308398]  kasan_save_alloc_info+0x40/0x58
[   24.308446]  __kasan_kmalloc+0xd4/0xd8
[   24.308489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.308544]  kasan_atomics+0xb8/0x2e0
[   24.308593]  kunit_try_run_case+0x170/0x3f0
[   24.308637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.308688]  kthread+0x328/0x630
[   24.308726]  ret_from_fork+0x10/0x20
[   24.308768] 
[   24.308793] The buggy address belongs to the object at fff00000c63eb100
[   24.308793]  which belongs to the cache kmalloc-64 of size 64
[   24.308862] The buggy address is located 0 bytes to the right of
[   24.308862]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.308933] 
[   24.308958] The buggy address belongs to the physical page:
[   24.308992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.314004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.314432] page_type: f5(slab)
[   24.314746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.314807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.314855] page dumped because: kasan: bad access detected
[   24.314893] 
[   24.314914] Memory state around the buggy address:
[   24.314952]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.315001]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.315068] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.315967]                                      ^
[   24.316094]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316254]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316300] ==================================================================
[   23.750966] ==================================================================
[   23.751104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   23.751479] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.752313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.753591]  dump_stack_lvl+0x8c/0xd0
[   23.754703]  kasan_atomics+0x198/0x2e0
[   23.756292] 
[   23.756495]  kasan_save_track+0x20/0x40
[   23.756911]  kasan_atomics+0xb8/0x2e0
[   23.757114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.757313]  ret_from_fork+0x10/0x20
[   23.759077] The buggy address is located 0 bytes to the right of
[   23.759077]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.762695]                                      ^
[   23.762869]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.763176]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.765377] ==================================================================
[   24.134955] ==================================================================
[   24.135074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   24.135187] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.135308] 
[   24.135436] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.135691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.135802] Hardware name: linux,dummy-virt (DT)
[   24.136005] Call trace:
[   24.136262]  show_stack+0x20/0x38 (C)
[   24.136626]  dump_stack_lvl+0x8c/0xd0
[   24.136793]  print_report+0x118/0x608
[   24.136946]  kasan_report+0xdc/0x128
[   24.137112]  kasan_check_range+0x100/0x1a8
[   24.137278]  __kasan_check_write+0x20/0x30
[   24.137394]  kasan_atomics_helper+0x1190/0x4858
[   24.137513]  kasan_atomics+0x198/0x2e0
[   24.137728]  kunit_try_run_case+0x170/0x3f0
[   24.138007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.138314]  kthread+0x328/0x630
[   24.138430]  ret_from_fork+0x10/0x20
[   24.138545] 
[   24.138595] Allocated by task 275:
[   24.138670]  kasan_save_stack+0x3c/0x68
[   24.138779]  kasan_save_track+0x20/0x40
[   24.138874]  kasan_save_alloc_info+0x40/0x58
[   24.138962]  __kasan_kmalloc+0xd4/0xd8
[   24.139051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.139142]  kasan_atomics+0xb8/0x2e0
[   24.139226]  kunit_try_run_case+0x170/0x3f0
[   24.139318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.139431]  kthread+0x328/0x630
[   24.139512]  ret_from_fork+0x10/0x20
[   24.139599] 
[   24.139654] The buggy address belongs to the object at fff00000c63eb100
[   24.139654]  which belongs to the cache kmalloc-64 of size 64
[   24.139793] The buggy address is located 0 bytes to the right of
[   24.139793]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.139952] 
[   24.140011] The buggy address belongs to the physical page:
[   24.140360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.140959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.141146] page_type: f5(slab)
[   24.141256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.141675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.141818] page dumped because: kasan: bad access detected
[   24.141904] 
[   24.141952] Memory state around the buggy address:
[   24.142046]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.142156]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.142267] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.142369]                                      ^
[   24.142452]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.142546]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.142646] ==================================================================
[   23.992947] ==================================================================
[   23.993064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   23.993185] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.993300] 
[   23.993382] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.993590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.993665] Hardware name: linux,dummy-virt (DT)
[   23.993743] Call trace:
[   23.993797]  show_stack+0x20/0x38 (C)
[   23.993912]  dump_stack_lvl+0x8c/0xd0
[   23.994027]  print_report+0x118/0x608
[   23.994172]  kasan_report+0xdc/0x128
[   23.994276]  __asan_report_load4_noabort+0x20/0x30
[   23.994722]  kasan_atomics_helper+0x3e04/0x4858
[   23.994878]  kasan_atomics+0x198/0x2e0
[   23.994980]  kunit_try_run_case+0x170/0x3f0
[   23.995104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.995238]  kthread+0x328/0x630
[   23.995373]  ret_from_fork+0x10/0x20
[   23.995515] 
[   23.995577] Allocated by task 275:
[   23.995681]  kasan_save_stack+0x3c/0x68
[   23.995787]  kasan_save_track+0x20/0x40
[   23.995910]  kasan_save_alloc_info+0x40/0x58
[   23.996047]  __kasan_kmalloc+0xd4/0xd8
[   23.996135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.996239]  kasan_atomics+0xb8/0x2e0
[   23.996327]  kunit_try_run_case+0x170/0x3f0
[   23.996417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.996576]  kthread+0x328/0x630
[   23.996708]  ret_from_fork+0x10/0x20
[   23.996826] 
[   23.996897] The buggy address belongs to the object at fff00000c63eb100
[   23.996897]  which belongs to the cache kmalloc-64 of size 64
[   23.997106] The buggy address is located 0 bytes to the right of
[   23.997106]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.997531] 
[   23.997632] The buggy address belongs to the physical page:
[   23.997958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.998148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.998300] page_type: f5(slab)
[   23.998399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.998537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.998680] page dumped because: kasan: bad access detected
[   23.998782] 
[   23.998826] Memory state around the buggy address:
[   23.998919]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.999037]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.999148] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.999254]                                      ^
[   23.999349]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.999435]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.999534] ==================================================================
[   24.028947] ==================================================================
[   24.029136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   24.029260] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.029609] 
[   24.029838] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.030600] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.030977] Hardware name: linux,dummy-virt (DT)
[   24.031342] Call trace:
[   24.031537]  show_stack+0x20/0x38 (C)
[   24.031892]  dump_stack_lvl+0x8c/0xd0
[   24.032418]  print_report+0x118/0x608
[   24.032827]  kasan_report+0xdc/0x128
[   24.033290]  __asan_report_store8_noabort+0x20/0x30
[   24.033684]  kasan_atomics_helper+0x3e5c/0x4858
[   24.034268]  kasan_atomics+0x198/0x2e0
[   24.034567]  kunit_try_run_case+0x170/0x3f0
[   24.034784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.035416]  kthread+0x328/0x630
[   24.035603]  ret_from_fork+0x10/0x20
[   24.036250] 
[   24.036409] Allocated by task 275:
[   24.036706]  kasan_save_stack+0x3c/0x68
[   24.037216]  kasan_save_track+0x20/0x40
[   24.037511]  kasan_save_alloc_info+0x40/0x58
[   24.038084]  __kasan_kmalloc+0xd4/0xd8
[   24.038415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.038850]  kasan_atomics+0xb8/0x2e0
[   24.039056]  kunit_try_run_case+0x170/0x3f0
[   24.039169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.039279]  kthread+0x328/0x630
[   24.039364]  ret_from_fork+0x10/0x20
[   24.039461] 
[   24.040231] The buggy address belongs to the object at fff00000c63eb100
[   24.040231]  which belongs to the cache kmalloc-64 of size 64
[   24.041318] The buggy address is located 0 bytes to the right of
[   24.041318]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.041710] 
[   24.041783] The buggy address belongs to the physical page:
[   24.041955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.042296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.042437] page_type: f5(slab)
[   24.042842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.043298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.043813] page dumped because: kasan: bad access detected
[   24.043921] 
[   24.044095] Memory state around the buggy address:
[   24.044194]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.044789]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.044922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.045110]                                      ^
[   24.045237]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045349]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045677] ==================================================================
[   24.056578] ==================================================================
[   24.056701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   24.056819] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.056945] 
[   24.057040] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.057269] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.057348] Hardware name: linux,dummy-virt (DT)
[   24.057436] Call trace:
[   24.057496]  show_stack+0x20/0x38 (C)
[   24.057620]  dump_stack_lvl+0x8c/0xd0
[   24.057742]  print_report+0x118/0x608
[   24.057864]  kasan_report+0xdc/0x128
[   24.057977]  kasan_check_range+0x100/0x1a8
[   24.059587]  __kasan_check_write+0x20/0x30
[   24.059800]  kasan_atomics_helper+0xf20/0x4858
[   24.060137]  kasan_atomics+0x198/0x2e0
[   24.060341]  kunit_try_run_case+0x170/0x3f0
[   24.060474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.060626]  kthread+0x328/0x630
[   24.060736]  ret_from_fork+0x10/0x20
[   24.060915] 
[   24.061007] Allocated by task 275:
[   24.061166]  kasan_save_stack+0x3c/0x68
[   24.061550]  kasan_save_track+0x20/0x40
[   24.061678]  kasan_save_alloc_info+0x40/0x58
[   24.061879]  __kasan_kmalloc+0xd4/0xd8
[   24.062172]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.062296]  kasan_atomics+0xb8/0x2e0
[   24.062433]  kunit_try_run_case+0x170/0x3f0
[   24.062774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.062927]  kthread+0x328/0x630
[   24.063075]  ret_from_fork+0x10/0x20
[   24.063201] 
[   24.063288] The buggy address belongs to the object at fff00000c63eb100
[   24.063288]  which belongs to the cache kmalloc-64 of size 64
[   24.063638] The buggy address is located 0 bytes to the right of
[   24.063638]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.063828] 
[   24.063882] The buggy address belongs to the physical page:
[   24.063924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.063990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.064099] page_type: f5(slab)
[   24.064200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.064368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.064622] page dumped because: kasan: bad access detected
[   24.064713] 
[   24.064775] Memory state around the buggy address:
[   24.064864]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.065278]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.065420] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.065567]                                      ^
[   24.065651]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.065751]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.066146] ==================================================================
[   23.858731] ==================================================================
[   23.859107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   23.859488] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.859624] 
[   23.859706] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.859915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.859997] Hardware name: linux,dummy-virt (DT)
[   23.860089] Call trace:
[   23.860150]  show_stack+0x20/0x38 (C)
[   23.860272]  dump_stack_lvl+0x8c/0xd0
[   23.860398]  print_report+0x118/0x608
[   23.860520]  kasan_report+0xdc/0x128
[   23.860660]  kasan_check_range+0x100/0x1a8
[   23.860788]  __kasan_check_write+0x20/0x30
[   23.860908]  kasan_atomics_helper+0xad4/0x4858
[   23.862793]  kasan_atomics+0x198/0x2e0
[   23.863764]  kunit_try_run_case+0x170/0x3f0
[   23.863996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.864164]  kthread+0x328/0x630
[   23.864269]  ret_from_fork+0x10/0x20
[   23.864407] 
[   23.864456] Allocated by task 275:
[   23.864524]  kasan_save_stack+0x3c/0x68
[   23.864644]  kasan_save_track+0x20/0x40
[   23.864747]  kasan_save_alloc_info+0x40/0x58
[   23.864874]  __kasan_kmalloc+0xd4/0xd8
[   23.864988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.865111]  kasan_atomics+0xb8/0x2e0
[   23.865223]  kunit_try_run_case+0x170/0x3f0
[   23.865328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.865441]  kthread+0x328/0x630
[   23.865525]  ret_from_fork+0x10/0x20
[   23.865618] 
[   23.865682] The buggy address belongs to the object at fff00000c63eb100
[   23.865682]  which belongs to the cache kmalloc-64 of size 64
[   23.865824] The buggy address is located 0 bytes to the right of
[   23.865824]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.865974] 
[   23.866222] The buggy address belongs to the physical page:
[   23.866478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.867099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.867532] page_type: f5(slab)
[   23.867636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.868071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.868364] page dumped because: kasan: bad access detected
[   23.868606] 
[   23.868668] Memory state around the buggy address:
[   23.868761]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.869196]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.869380] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.869475]                                      ^
[   23.869933]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.870102]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.870376] ==================================================================
[   24.165101] ==================================================================
[   24.165218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   24.165339] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.165464] 
[   24.165556] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.165783] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.165861] Hardware name: linux,dummy-virt (DT)
[   24.165943] Call trace:
[   24.166006]  show_stack+0x20/0x38 (C)
[   24.166139]  dump_stack_lvl+0x8c/0xd0
[   24.166251]  print_report+0x118/0x608
[   24.166414]  kasan_report+0xdc/0x128
[   24.166545]  kasan_check_range+0x100/0x1a8
[   24.166676]  __kasan_check_write+0x20/0x30
[   24.166805]  kasan_atomics_helper+0x12d8/0x4858
[   24.166961]  kasan_atomics+0x198/0x2e0
[   24.167175]  kunit_try_run_case+0x170/0x3f0
[   24.167307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.167459]  kthread+0x328/0x630
[   24.167560]  ret_from_fork+0x10/0x20
[   24.167709] 
[   24.167776] Allocated by task 275:
[   24.167848]  kasan_save_stack+0x3c/0x68
[   24.167933]  kasan_save_track+0x20/0x40
[   24.168036]  kasan_save_alloc_info+0x40/0x58
[   24.168127]  __kasan_kmalloc+0xd4/0xd8
[   24.168212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.168365]  kasan_atomics+0xb8/0x2e0
[   24.168491]  kunit_try_run_case+0x170/0x3f0
[   24.168603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.168723]  kthread+0x328/0x630
[   24.168844]  ret_from_fork+0x10/0x20
[   24.168929] 
[   24.168984] The buggy address belongs to the object at fff00000c63eb100
[   24.168984]  which belongs to the cache kmalloc-64 of size 64
[   24.169168] The buggy address is located 0 bytes to the right of
[   24.169168]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.169377] 
[   24.169452] The buggy address belongs to the physical page:
[   24.169554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.169728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.169894] page_type: f5(slab)
[   24.169988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.170112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.170259] page dumped because: kasan: bad access detected
[   24.170342] 
[   24.170406] Memory state around the buggy address:
[   24.170497]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.170618]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.170729] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.170862]                                      ^
[   24.171010]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171151]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171277] ==================================================================
[   24.143422] ==================================================================
[   24.143551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   24.143668] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.143791] 
[   24.143877] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.144094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.144177] Hardware name: linux,dummy-virt (DT)
[   24.144262] Call trace:
[   24.144325]  show_stack+0x20/0x38 (C)
[   24.144449]  dump_stack_lvl+0x8c/0xd0
[   24.144585]  print_report+0x118/0x608
[   24.144715]  kasan_report+0xdc/0x128
[   24.144835]  kasan_check_range+0x100/0x1a8
[   24.144961]  __kasan_check_write+0x20/0x30
[   24.145089]  kasan_atomics_helper+0x11f8/0x4858
[   24.145206]  kasan_atomics+0x198/0x2e0
[   24.145333]  kunit_try_run_case+0x170/0x3f0
[   24.145460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.145993]  kthread+0x328/0x630
[   24.146490]  ret_from_fork+0x10/0x20
[   24.146804] 
[   24.146879] Allocated by task 275:
[   24.146955]  kasan_save_stack+0x3c/0x68
[   24.147071]  kasan_save_track+0x20/0x40
[   24.147169]  kasan_save_alloc_info+0x40/0x58
[   24.147501]  __kasan_kmalloc+0xd4/0xd8
[   24.147603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.147725]  kasan_atomics+0xb8/0x2e0
[   24.147923]  kunit_try_run_case+0x170/0x3f0
[   24.148103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.148273]  kthread+0x328/0x630
[   24.148400]  ret_from_fork+0x10/0x20
[   24.148537] 
[   24.148631] The buggy address belongs to the object at fff00000c63eb100
[   24.148631]  which belongs to the cache kmalloc-64 of size 64
[   24.148841] The buggy address is located 0 bytes to the right of
[   24.148841]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.149014] 
[   24.149093] The buggy address belongs to the physical page:
[   24.149212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.149344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.149476] page_type: f5(slab)
[   24.149592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.149725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.149875] page dumped because: kasan: bad access detected
[   24.149960] 
[   24.150069] Memory state around the buggy address:
[   24.150146]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.151248]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.151405] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.151587]                                      ^
[   24.151661]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151748]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151838] ==================================================================
[   24.184783] ==================================================================
[   24.184894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   24.185011] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.185150] 
[   24.185236] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.185461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.185540] Hardware name: linux,dummy-virt (DT)
[   24.185620] Call trace:
[   24.185680]  show_stack+0x20/0x38 (C)
[   24.185804]  dump_stack_lvl+0x8c/0xd0
[   24.185926]  print_report+0x118/0x608
[   24.186063]  kasan_report+0xdc/0x128
[   24.186169]  kasan_check_range+0x100/0x1a8
[   24.186369]  __kasan_check_write+0x20/0x30
[   24.186500]  kasan_atomics_helper+0x1414/0x4858
[   24.186631]  kasan_atomics+0x198/0x2e0
[   24.186737]  kunit_try_run_case+0x170/0x3f0
[   24.186870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.186989]  kthread+0x328/0x630
[   24.187193]  ret_from_fork+0x10/0x20
[   24.187335] 
[   24.187381] Allocated by task 275:
[   24.187440]  kasan_save_stack+0x3c/0x68
[   24.187558]  kasan_save_track+0x20/0x40
[   24.187655]  kasan_save_alloc_info+0x40/0x58
[   24.187752]  __kasan_kmalloc+0xd4/0xd8
[   24.187866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.187967]  kasan_atomics+0xb8/0x2e0
[   24.188062]  kunit_try_run_case+0x170/0x3f0
[   24.188163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.188279]  kthread+0x328/0x630
[   24.188384]  ret_from_fork+0x10/0x20
[   24.188489] 
[   24.188553] The buggy address belongs to the object at fff00000c63eb100
[   24.188553]  which belongs to the cache kmalloc-64 of size 64
[   24.188723] The buggy address is located 0 bytes to the right of
[   24.188723]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.188922] 
[   24.188978] The buggy address belongs to the physical page:
[   24.189067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.189201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.189325] page_type: f5(slab)
[   24.189416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.189541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.189652] page dumped because: kasan: bad access detected
[   24.189741] 
[   24.189789] Memory state around the buggy address:
[   24.189873]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.189987]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.190126] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.190224]                                      ^
[   24.190347]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190472]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190575] ==================================================================
[   23.978982] ==================================================================
[   23.979185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   23.979336] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.979470] 
[   23.979854] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.980559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.981012] Hardware name: linux,dummy-virt (DT)
[   23.981136] Call trace:
[   23.981222]  show_stack+0x20/0x38 (C)
[   23.981362]  dump_stack_lvl+0x8c/0xd0
[   23.981493]  print_report+0x118/0x608
[   23.982405]  kasan_report+0xdc/0x128
[   23.982686]  kasan_check_range+0x100/0x1a8
[   23.983232]  __kasan_check_write+0x20/0x30
[   23.983399]  kasan_atomics_helper+0xd3c/0x4858
[   23.983856]  kasan_atomics+0x198/0x2e0
[   23.984229]  kunit_try_run_case+0x170/0x3f0
[   23.984380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.985075]  kthread+0x328/0x630
[   23.985446]  ret_from_fork+0x10/0x20
[   23.985589] 
[   23.985637] Allocated by task 275:
[   23.986141]  kasan_save_stack+0x3c/0x68
[   23.986298]  kasan_save_track+0x20/0x40
[   23.986398]  kasan_save_alloc_info+0x40/0x58
[   23.986491]  __kasan_kmalloc+0xd4/0xd8
[   23.986569]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.986647]  kasan_atomics+0xb8/0x2e0
[   23.986724]  kunit_try_run_case+0x170/0x3f0
[   23.987579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.987729]  kthread+0x328/0x630
[   23.987813]  ret_from_fork+0x10/0x20
[   23.988159] 
[   23.988216] The buggy address belongs to the object at fff00000c63eb100
[   23.988216]  which belongs to the cache kmalloc-64 of size 64
[   23.988805] The buggy address is located 0 bytes to the right of
[   23.988805]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.989306] 
[   23.989438] The buggy address belongs to the physical page:
[   23.989524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.989745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.989865] page_type: f5(slab)
[   23.990665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.990833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.991026] page dumped because: kasan: bad access detected
[   23.991154] 
[   23.991215] Memory state around the buggy address:
[   23.991293]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.991388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.991481] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.991569]                                      ^
[   23.992268]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992383]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992436] ==================================================================
[   24.020936] ==================================================================
[   24.021292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   24.021431] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.021564] 
[   24.021652] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.021870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.021955] Hardware name: linux,dummy-virt (DT)
[   24.022054] Call trace:
[   24.022393]  show_stack+0x20/0x38 (C)
[   24.022567]  dump_stack_lvl+0x8c/0xd0
[   24.022698]  print_report+0x118/0x608
[   24.022824]  kasan_report+0xdc/0x128
[   24.022952]  kasan_check_range+0x100/0x1a8
[   24.023075]  __kasan_check_write+0x20/0x30
[   24.023178]  kasan_atomics_helper+0xe44/0x4858
[   24.023297]  kasan_atomics+0x198/0x2e0
[   24.023406]  kunit_try_run_case+0x170/0x3f0
[   24.023524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.023654]  kthread+0x328/0x630
[   24.023756]  ret_from_fork+0x10/0x20
[   24.023873] 
[   24.023928] Allocated by task 275:
[   24.023999]  kasan_save_stack+0x3c/0x68
[   24.024115]  kasan_save_track+0x20/0x40
[   24.024216]  kasan_save_alloc_info+0x40/0x58
[   24.024322]  __kasan_kmalloc+0xd4/0xd8
[   24.024419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.024524]  kasan_atomics+0xb8/0x2e0
[   24.024632]  kunit_try_run_case+0x170/0x3f0
[   24.024730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.024840]  kthread+0x328/0x630
[   24.024922]  ret_from_fork+0x10/0x20
[   24.025010] 
[   24.025070] The buggy address belongs to the object at fff00000c63eb100
[   24.025070]  which belongs to the cache kmalloc-64 of size 64
[   24.025208] The buggy address is located 0 bytes to the right of
[   24.025208]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.026143] 
[   24.026233] The buggy address belongs to the physical page:
[   24.026312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.026432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.026776] page_type: f5(slab)
[   24.026878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.026994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.027103] page dumped because: kasan: bad access detected
[   24.027376] 
[   24.027424] Memory state around the buggy address:
[   24.027503]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.027606]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.027714] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.027811]                                      ^
[   24.027895]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.028004]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.028107] ==================================================================
[   23.818953] ==================================================================
[   23.819120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   23.819252] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.819393] 
[   23.819495] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.819673] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.819738] Hardware name: linux,dummy-virt (DT)
[   23.819799] Call trace:
[   23.819845]  show_stack+0x20/0x38 (C)
[   23.819953]  dump_stack_lvl+0x8c/0xd0
[   23.820072]  print_report+0x118/0x608
[   23.820215]  kasan_report+0xdc/0x128
[   23.820344]  __asan_report_load4_noabort+0x20/0x30
[   23.820485]  kasan_atomics_helper+0x42d8/0x4858
[   23.820644]  kasan_atomics+0x198/0x2e0
[   23.820777]  kunit_try_run_case+0x170/0x3f0
[   23.820886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.820998]  kthread+0x328/0x630
[   23.821108]  ret_from_fork+0x10/0x20
[   23.821220] 
[   23.821283] Allocated by task 275:
[   23.821362]  kasan_save_stack+0x3c/0x68
[   23.821485]  kasan_save_track+0x20/0x40
[   23.821579]  kasan_save_alloc_info+0x40/0x58
[   23.821668]  __kasan_kmalloc+0xd4/0xd8
[   23.821760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.821850]  kasan_atomics+0xb8/0x2e0
[   23.821926]  kunit_try_run_case+0x170/0x3f0
[   23.822025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.822141]  kthread+0x328/0x630
[   23.822219]  ret_from_fork+0x10/0x20
[   23.822303] 
[   23.822350] The buggy address belongs to the object at fff00000c63eb100
[   23.822350]  which belongs to the cache kmalloc-64 of size 64
[   23.822490] The buggy address is located 0 bytes to the right of
[   23.822490]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.822672] 
[   23.822728] The buggy address belongs to the physical page:
[   23.822796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.822914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.823015] page_type: f5(slab)
[   23.823114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.823244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.823388] page dumped because: kasan: bad access detected
[   23.823544] 
[   23.823593] Memory state around the buggy address:
[   23.823690]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.823833]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.823922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.824000]                                      ^
[   23.824106]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824202]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824280] ==================================================================
[   23.796407] ==================================================================
[   23.796537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   23.797208] Call trace:
[   23.798582]  kasan_atomics_helper+0x7cc/0x4858
[   23.799304] Allocated by task 275:
[   23.800593]  kthread+0x328/0x630
[   23.801384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.801505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.801834] page_type: f5(slab)
[   23.801924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.802135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.802235] page dumped because: kasan: bad access detected
[   23.802324] 
[   23.802370] Memory state around the buggy address:
[   23.802501]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.802944] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.803594]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.803998] ==================================================================
[   23.846438] ==================================================================
[   23.846560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   23.846773] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.846955] 
[   23.847050] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.847277] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.847351] Hardware name: linux,dummy-virt (DT)
[   23.847425] Call trace:
[   23.847476]  show_stack+0x20/0x38 (C)
[   23.847567]  dump_stack_lvl+0x8c/0xd0
[   23.847662]  print_report+0x118/0x608
[   23.847764]  kasan_report+0xdc/0x128
[   23.847875]  kasan_check_range+0x100/0x1a8
[   23.848455]  __kasan_check_write+0x20/0x30
[   23.848982]  kasan_atomics_helper+0xa6c/0x4858
[   23.849475]  kasan_atomics+0x198/0x2e0
[   23.849618]  kunit_try_run_case+0x170/0x3f0
[   23.849739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.849992]  kthread+0x328/0x630
[   23.851002]  ret_from_fork+0x10/0x20
[   23.851183] 
[   23.851238] Allocated by task 275:
[   23.851381]  kasan_save_stack+0x3c/0x68
[   23.851482]  kasan_save_track+0x20/0x40
[   23.851576]  kasan_save_alloc_info+0x40/0x58
[   23.851664]  __kasan_kmalloc+0xd4/0xd8
[   23.851750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.852295]  kasan_atomics+0xb8/0x2e0
[   23.852397]  kunit_try_run_case+0x170/0x3f0
[   23.852897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.853014]  kthread+0x328/0x630
[   23.853104]  ret_from_fork+0x10/0x20
[   23.853500] 
[   23.853553] The buggy address belongs to the object at fff00000c63eb100
[   23.853553]  which belongs to the cache kmalloc-64 of size 64
[   23.854108] The buggy address is located 0 bytes to the right of
[   23.854108]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.854275] 
[   23.854326] The buggy address belongs to the physical page:
[   23.854399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.854505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.854603] page_type: f5(slab)
[   23.854685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.855251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.855499] page dumped because: kasan: bad access detected
[   23.855928] 
[   23.855985] Memory state around the buggy address:
[   23.856184]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.856385]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.856631] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.856740]                                      ^
[   23.856829]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.856939]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.857443] ==================================================================
[   24.191205] ==================================================================
[   24.191319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   24.191432] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.191548] 
[   24.191624] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.191835] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.191907] Hardware name: linux,dummy-virt (DT)
[   24.191984] Call trace:
[   24.192053]  show_stack+0x20/0x38 (C)
[   24.192175]  dump_stack_lvl+0x8c/0xd0
[   24.192306]  print_report+0x118/0x608
[   24.192472]  kasan_report+0xdc/0x128
[   24.192654]  kasan_check_range+0x100/0x1a8
[   24.192820]  __kasan_check_write+0x20/0x30
[   24.192960]  kasan_atomics_helper+0x147c/0x4858
[   24.193082]  kasan_atomics+0x198/0x2e0
[   24.193192]  kunit_try_run_case+0x170/0x3f0
[   24.193356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193520]  kthread+0x328/0x630
[   24.193661]  ret_from_fork+0x10/0x20
[   24.193781] 
[   24.193831] Allocated by task 275:
[   24.193906]  kasan_save_stack+0x3c/0x68
[   24.194063]  kasan_save_track+0x20/0x40
[   24.194166]  kasan_save_alloc_info+0x40/0x58
[   24.194279]  __kasan_kmalloc+0xd4/0xd8
[   24.194386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.194498]  kasan_atomics+0xb8/0x2e0
[   24.194594]  kunit_try_run_case+0x170/0x3f0
[   24.194798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.195094]  kthread+0x328/0x630
[   24.195409]  ret_from_fork+0x10/0x20
[   24.195588] 
[   24.195687] The buggy address belongs to the object at fff00000c63eb100
[   24.195687]  which belongs to the cache kmalloc-64 of size 64
[   24.195836] The buggy address is located 0 bytes to the right of
[   24.195836]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.195997] 
[   24.196058] The buggy address belongs to the physical page:
[   24.196133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.196557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.196709] page_type: f5(slab)
[   24.197104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.197519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.197672] page dumped because: kasan: bad access detected
[   24.197771] 
[   24.197922] Memory state around the buggy address:
[   24.198093]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198197]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198276] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.198320]                                      ^
[   24.198360]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.198433]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.198518] ==================================================================
[   24.220781] ==================================================================
[   24.220937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   24.221044] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.221126] 
[   24.221388] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.221500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.221537] Hardware name: linux,dummy-virt (DT)
[   24.221578] Call trace:
[   24.221609]  show_stack+0x20/0x38 (C)
[   24.222120]  dump_stack_lvl+0x8c/0xd0
[   24.222207]  print_report+0x118/0x608
[   24.222288]  kasan_report+0xdc/0x128
[   24.222418]  kasan_check_range+0x100/0x1a8
[   24.222480]  __kasan_check_write+0x20/0x30
[   24.222536]  kasan_atomics_helper+0x15b4/0x4858
[   24.223253]  kasan_atomics+0x198/0x2e0
[   24.224034]  kunit_try_run_case+0x170/0x3f0
[   24.224149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.224218]  kthread+0x328/0x630
[   24.224269]  ret_from_fork+0x10/0x20
[   24.224333] 
[   24.224358] Allocated by task 275:
[   24.224396]  kasan_save_stack+0x3c/0x68
[   24.224451]  kasan_save_track+0x20/0x40
[   24.224498]  kasan_save_alloc_info+0x40/0x58
[   24.224571]  __kasan_kmalloc+0xd4/0xd8
[   24.224621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.224669]  kasan_atomics+0xb8/0x2e0
[   24.225689]  kunit_try_run_case+0x170/0x3f0
[   24.226052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.226171]  kthread+0x328/0x630
[   24.226345]  ret_from_fork+0x10/0x20
[   24.226434] 
[   24.226465] The buggy address belongs to the object at fff00000c63eb100
[   24.226465]  which belongs to the cache kmalloc-64 of size 64
[   24.226692] The buggy address is located 0 bytes to the right of
[   24.226692]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.226777] 
[   24.226930] The buggy address belongs to the physical page:
[   24.227001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.227800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.227964] page_type: f5(slab)
[   24.228016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.228389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.228721] page dumped because: kasan: bad access detected
[   24.228776] 
[   24.228801] Memory state around the buggy address:
[   24.228995]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.229177]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.229230] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.229453]                                      ^
[   24.229504]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.229655]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.229705] ==================================================================
[   24.125068] ==================================================================
[   24.125229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   24.125373] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.125482] 
[   24.125570] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.125743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.125807] Hardware name: linux,dummy-virt (DT)
[   24.125882] Call trace:
[   24.125940]  show_stack+0x20/0x38 (C)
[   24.126468]  dump_stack_lvl+0x8c/0xd0
[   24.126834]  print_report+0x118/0x608
[   24.127225]  kasan_report+0xdc/0x128
[   24.127530]  kasan_check_range+0x100/0x1a8
[   24.127677]  __kasan_check_write+0x20/0x30
[   24.127782]  kasan_atomics_helper+0x1128/0x4858
[   24.127913]  kasan_atomics+0x198/0x2e0
[   24.128043]  kunit_try_run_case+0x170/0x3f0
[   24.128172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.128306]  kthread+0x328/0x630
[   24.128409]  ret_from_fork+0x10/0x20
[   24.128542] 
[   24.128599] Allocated by task 275:
[   24.128675]  kasan_save_stack+0x3c/0x68
[   24.128774]  kasan_save_track+0x20/0x40
[   24.128867]  kasan_save_alloc_info+0x40/0x58
[   24.129783]  __kasan_kmalloc+0xd4/0xd8
[   24.129910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.130012]  kasan_atomics+0xb8/0x2e0
[   24.130108]  kunit_try_run_case+0x170/0x3f0
[   24.130207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.130322]  kthread+0x328/0x630
[   24.130405]  ret_from_fork+0x10/0x20
[   24.130498] 
[   24.130557] The buggy address belongs to the object at fff00000c63eb100
[   24.130557]  which belongs to the cache kmalloc-64 of size 64
[   24.131196] The buggy address is located 0 bytes to the right of
[   24.131196]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.131368] 
[   24.131424] The buggy address belongs to the physical page:
[   24.131626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.131750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.132042] page_type: f5(slab)
[   24.132154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.132290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.132399] page dumped because: kasan: bad access detected
[   24.132487] 
[   24.132572] Memory state around the buggy address:
[   24.132708]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.132825]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.132928] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.133034]                                      ^
[   24.133124]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133252]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133390] ==================================================================
[   24.230936] ==================================================================
[   24.231084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   24.231223] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.231290] 
[   24.231372] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.231513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.231566] Hardware name: linux,dummy-virt (DT)
[   24.231639] Call trace:
[   24.231676]  show_stack+0x20/0x38 (C)
[   24.231737]  dump_stack_lvl+0x8c/0xd0
[   24.231795]  print_report+0x118/0x608
[   24.231849]  kasan_report+0xdc/0x128
[   24.231903]  __asan_report_load8_noabort+0x20/0x30
[   24.231962]  kasan_atomics_helper+0x3db0/0x4858
[   24.232030]  kasan_atomics+0x198/0x2e0
[   24.232089]  kunit_try_run_case+0x170/0x3f0
[   24.232145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.232205]  kthread+0x328/0x630
[   24.232255]  ret_from_fork+0x10/0x20
[   24.232727] 
[   24.232913] Allocated by task 275:
[   24.233080]  kasan_save_stack+0x3c/0x68
[   24.233155]  kasan_save_track+0x20/0x40
[   24.233235]  kasan_save_alloc_info+0x40/0x58
[   24.233446]  __kasan_kmalloc+0xd4/0xd8
[   24.233635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.233845]  kasan_atomics+0xb8/0x2e0
[   24.234064]  kunit_try_run_case+0x170/0x3f0
[   24.234568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.234628]  kthread+0x328/0x630
[   24.234668]  ret_from_fork+0x10/0x20
[   24.234709] 
[   24.234736] The buggy address belongs to the object at fff00000c63eb100
[   24.234736]  which belongs to the cache kmalloc-64 of size 64
[   24.234801] The buggy address is located 0 bytes to the right of
[   24.234801]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.235476] 
[   24.235550] The buggy address belongs to the physical page:
[   24.235599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.235664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.235721] page_type: f5(slab)
[   24.235768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.235825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.235872] page dumped because: kasan: bad access detected
[   24.236228] 
[   24.236471] Memory state around the buggy address:
[   24.236523]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236591]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236721] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.236820]                                      ^
[   24.236935]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.237042]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.237091] ==================================================================
[   24.011859] ==================================================================
[   24.012004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   24.012172] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.012282] 
[   24.012363] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.012627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.012733] Hardware name: linux,dummy-virt (DT)
[   24.012821] Call trace:
[   24.012892]  show_stack+0x20/0x38 (C)
[   24.013078]  dump_stack_lvl+0x8c/0xd0
[   24.013233]  print_report+0x118/0x608
[   24.013391]  kasan_report+0xdc/0x128
[   24.013542]  __asan_report_load8_noabort+0x20/0x30
[   24.013708]  kasan_atomics_helper+0x3f58/0x4858
[   24.013870]  kasan_atomics+0x198/0x2e0
[   24.013979]  kunit_try_run_case+0x170/0x3f0
[   24.014164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.014314]  kthread+0x328/0x630
[   24.014414]  ret_from_fork+0x10/0x20
[   24.014528] 
[   24.014581] Allocated by task 275:
[   24.014657]  kasan_save_stack+0x3c/0x68
[   24.014785]  kasan_save_track+0x20/0x40
[   24.014898]  kasan_save_alloc_info+0x40/0x58
[   24.015004]  __kasan_kmalloc+0xd4/0xd8
[   24.015110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.015211]  kasan_atomics+0xb8/0x2e0
[   24.015281]  kunit_try_run_case+0x170/0x3f0
[   24.015370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.015470]  kthread+0x328/0x630
[   24.015527]  ret_from_fork+0x10/0x20
[   24.015602] 
[   24.015658] The buggy address belongs to the object at fff00000c63eb100
[   24.015658]  which belongs to the cache kmalloc-64 of size 64
[   24.015805] The buggy address is located 0 bytes to the right of
[   24.015805]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.015972] 
[   24.016059] The buggy address belongs to the physical page:
[   24.016149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.016288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.016882] page_type: f5(slab)
[   24.017052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.017232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.017339] page dumped because: kasan: bad access detected
[   24.017432] 
[   24.017848] Memory state around the buggy address:
[   24.017951]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.018420]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.018595] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.018749]                                      ^
[   24.019256]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019403]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019576] ==================================================================
[   24.209305] ==================================================================
[   24.209667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   24.209814] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.209999] 
[   24.210130] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.210372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.210450] Hardware name: linux,dummy-virt (DT)
[   24.210525] Call trace:
[   24.210573]  show_stack+0x20/0x38 (C)
[   24.210669]  dump_stack_lvl+0x8c/0xd0
[   24.210777]  print_report+0x118/0x608
[   24.210880]  kasan_report+0xdc/0x128
[   24.210994]  kasan_check_range+0x100/0x1a8
[   24.211126]  __kasan_check_write+0x20/0x30
[   24.211239]  kasan_atomics_helper+0x154c/0x4858
[   24.211357]  kasan_atomics+0x198/0x2e0
[   24.211542]  kunit_try_run_case+0x170/0x3f0
[   24.211659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.211792]  kthread+0x328/0x630
[   24.211893]  ret_from_fork+0x10/0x20
[   24.212011] 
[   24.212486] Allocated by task 275:
[   24.212701]  kasan_save_stack+0x3c/0x68
[   24.212961]  kasan_save_track+0x20/0x40
[   24.213306]  kasan_save_alloc_info+0x40/0x58
[   24.213440]  __kasan_kmalloc+0xd4/0xd8
[   24.213582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.213689]  kasan_atomics+0xb8/0x2e0
[   24.214010]  kunit_try_run_case+0x170/0x3f0
[   24.214177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.214333]  kthread+0x328/0x630
[   24.214450]  ret_from_fork+0x10/0x20
[   24.214779] 
[   24.214841] The buggy address belongs to the object at fff00000c63eb100
[   24.214841]  which belongs to the cache kmalloc-64 of size 64
[   24.214992] The buggy address is located 0 bytes to the right of
[   24.214992]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.215171] 
[   24.215225] The buggy address belongs to the physical page:
[   24.215401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.215537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.216071] page_type: f5(slab)
[   24.216182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.216634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.216751] page dumped because: kasan: bad access detected
[   24.217258] 
[   24.217328] Memory state around the buggy address:
[   24.217422]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.217531]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.217644] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.217744]                                      ^
[   24.218444]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.218580]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.218683] ==================================================================
[   24.000101] ==================================================================
[   24.000211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   24.000332] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.000453] 
[   24.000539] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.000834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.000931] Hardware name: linux,dummy-virt (DT)
[   24.001040] Call trace:
[   24.001379]  show_stack+0x20/0x38 (C)
[   24.001686]  dump_stack_lvl+0x8c/0xd0
[   24.001815]  print_report+0x118/0x608
[   24.001935]  kasan_report+0xdc/0x128
[   24.002807]  kasan_check_range+0x100/0x1a8
[   24.002973]  __kasan_check_read+0x20/0x30
[   24.003088]  kasan_atomics_helper+0xdd4/0x4858
[   24.003204]  kasan_atomics+0x198/0x2e0
[   24.003537]  kunit_try_run_case+0x170/0x3f0
[   24.004152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.004293]  kthread+0x328/0x630
[   24.004701]  ret_from_fork+0x10/0x20
[   24.004998] 
[   24.005360] Allocated by task 275:
[   24.005725]  kasan_save_stack+0x3c/0x68
[   24.005847]  kasan_save_track+0x20/0x40
[   24.005949]  kasan_save_alloc_info+0x40/0x58
[   24.006053]  __kasan_kmalloc+0xd4/0xd8
[   24.006131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.006219]  kasan_atomics+0xb8/0x2e0
[   24.006307]  kunit_try_run_case+0x170/0x3f0
[   24.006944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.007432]  kthread+0x328/0x630
[   24.007532]  ret_from_fork+0x10/0x20
[   24.007805] 
[   24.007878] The buggy address belongs to the object at fff00000c63eb100
[   24.007878]  which belongs to the cache kmalloc-64 of size 64
[   24.008170] The buggy address is located 0 bytes to the right of
[   24.008170]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.008316] 
[   24.008398] The buggy address belongs to the physical page:
[   24.008475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.008643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.008832] page_type: f5(slab)
[   24.008954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.009096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.009204] page dumped because: kasan: bad access detected
[   24.009286] 
[   24.009338] Memory state around the buggy address:
[   24.009420]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.009573]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.009683] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.009782]                                      ^
[   24.009907]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.010049]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.010156] ==================================================================
[   24.153442] ==================================================================
[   24.153869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   24.154205] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.154521] 
[   24.154625] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.154855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.154931] Hardware name: linux,dummy-virt (DT)
[   24.155009] Call trace:
[   24.155592]  show_stack+0x20/0x38 (C)
[   24.155750]  dump_stack_lvl+0x8c/0xd0
[   24.155965]  print_report+0x118/0x608
[   24.156196]  kasan_report+0xdc/0x128
[   24.156602]  kasan_check_range+0x100/0x1a8
[   24.156810]  __kasan_check_write+0x20/0x30
[   24.157129]  kasan_atomics_helper+0x126c/0x4858
[   24.157322]  kasan_atomics+0x198/0x2e0
[   24.157439]  kunit_try_run_case+0x170/0x3f0
[   24.157631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.157781]  kthread+0x328/0x630
[   24.158154]  ret_from_fork+0x10/0x20
[   24.158302] 
[   24.158434] Allocated by task 275:
[   24.158616]  kasan_save_stack+0x3c/0x68
[   24.158726]  kasan_save_track+0x20/0x40
[   24.158817]  kasan_save_alloc_info+0x40/0x58
[   24.158908]  __kasan_kmalloc+0xd4/0xd8
[   24.158998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.159109]  kasan_atomics+0xb8/0x2e0
[   24.159202]  kunit_try_run_case+0x170/0x3f0
[   24.159693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159872]  kthread+0x328/0x630
[   24.159994]  ret_from_fork+0x10/0x20
[   24.160213] 
[   24.160362] The buggy address belongs to the object at fff00000c63eb100
[   24.160362]  which belongs to the cache kmalloc-64 of size 64
[   24.160716] The buggy address is located 0 bytes to the right of
[   24.160716]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.161096] 
[   24.161193] The buggy address belongs to the physical page:
[   24.161426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.161789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.161936] page_type: f5(slab)
[   24.162053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.162185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.162291] page dumped because: kasan: bad access detected
[   24.162623] 
[   24.162711] Memory state around the buggy address:
[   24.162871]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163344]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163588] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.163786]                                      ^
[   24.163965]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.164251]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.164359] ==================================================================
[   23.626665] ==================================================================
[   23.627928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   23.628861] Call trace:
[   23.629883]  kunit_try_run_case+0x170/0x3f0
[   23.631092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.631822] The buggy address is located 0 bytes to the right of
[   23.631822]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.633149]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.634572] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.637084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.641488]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.645318]  dump_stack_lvl+0x8c/0xd0
[   23.646687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.650676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.657106]  kasan_check_range+0x100/0x1a8
[   23.659364]  kasan_save_stack+0x3c/0x68
[   23.661668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.667037] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.673179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.676375] page dumped because: kasan: bad access detected
[   23.680830] 
[   23.681663]  dump_stack_lvl+0x8c/0xd0
[   23.684392]  kasan_save_stack+0x3c/0x68
[   23.687127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.691013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   23.692715]  kasan_atomics_helper+0x414/0x4858
[   23.694106]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.694374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.694624] 
[   23.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.698604]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.702283]  kasan_report+0xdc/0x128
[   23.703501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.704463]  __kasan_kmalloc+0xd4/0xd8
[   23.705685] 
[   23.706408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.707028] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.711308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   23.712789]  dump_stack_lvl+0x8c/0xd0
[   23.713667]  kunit_try_run_case+0x170/0x3f0
[   23.713781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.713910]  kthread+0x328/0x630
[   23.714767]  kasan_save_track+0x20/0x40
[   23.716473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.716843]  kthread+0x328/0x630
[   23.717486]  ret_from_fork+0x10/0x20
[   23.718777] 
[   23.721371] page_type: f5(slab)
[   23.722569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.724608]                                      ^
[   23.729094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   23.729760] Hardware name: linux,dummy-virt (DT)
[   23.733683]  kasan_atomics+0x198/0x2e0
[   23.735065]  kasan_save_track+0x20/0x40
[   23.735414]  kasan_atomics+0xb8/0x2e0
[   23.736240] 
[   23.736292] The buggy address belongs to the physical page:
[   23.736783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.737530]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.739450] ==================================================================
[   24.074641] ==================================================================
[   24.074736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   24.074831] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.074925] 
[   24.074989] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.075220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.075334] Hardware name: linux,dummy-virt (DT)
[   24.075426] Call trace:
[   24.075560]  show_stack+0x20/0x38 (C)
[   24.076886]  dump_stack_lvl+0x8c/0xd0
[   24.077129]  print_report+0x118/0x608
[   24.077698]  kasan_report+0xdc/0x128
[   24.078257]  kasan_check_range+0x100/0x1a8
[   24.078873]  __kasan_check_write+0x20/0x30
[   24.079007]  kasan_atomics_helper+0xff0/0x4858
[   24.079123]  kasan_atomics+0x198/0x2e0
[   24.079220]  kunit_try_run_case+0x170/0x3f0
[   24.079331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.079585]  kthread+0x328/0x630
[   24.079783]  ret_from_fork+0x10/0x20
[   24.080994] 
[   24.081087] Allocated by task 275:
[   24.081174]  kasan_save_stack+0x3c/0x68
[   24.081286]  kasan_save_track+0x20/0x40
[   24.081380]  kasan_save_alloc_info+0x40/0x58
[   24.081488]  __kasan_kmalloc+0xd4/0xd8
[   24.082315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.082444]  kasan_atomics+0xb8/0x2e0
[   24.082523]  kunit_try_run_case+0x170/0x3f0
[   24.082601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.082694]  kthread+0x328/0x630
[   24.082771]  ret_from_fork+0x10/0x20
[   24.083397] 
[   24.083499] The buggy address belongs to the object at fff00000c63eb100
[   24.083499]  which belongs to the cache kmalloc-64 of size 64
[   24.083882] The buggy address is located 0 bytes to the right of
[   24.083882]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.084069] 
[   24.084148] The buggy address belongs to the physical page:
[   24.084272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.084416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.084550] page_type: f5(slab)
[   24.084648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.084781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.084892] page dumped because: kasan: bad access detected
[   24.084981] 
[   24.085043] Memory state around the buggy address:
[   24.085436]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.085567]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.086116] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.086491]                                      ^
[   24.086608]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087502]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087716] ==================================================================
[   23.831681] ==================================================================
[   23.831803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   23.831917] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.832050] 
[   23.832138] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.832417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.832490] Hardware name: linux,dummy-virt (DT)
[   23.832617] Call trace:
[   23.832706]  show_stack+0x20/0x38 (C)
[   23.832820]  dump_stack_lvl+0x8c/0xd0
[   23.832933]  print_report+0x118/0x608
[   23.833041]  kasan_report+0xdc/0x128
[   23.833142]  kasan_check_range+0x100/0x1a8
[   23.833253]  __kasan_check_write+0x20/0x30
[   23.833359]  kasan_atomics_helper+0x99c/0x4858
[   23.833472]  kasan_atomics+0x198/0x2e0
[   23.833578]  kunit_try_run_case+0x170/0x3f0
[   23.833685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833803]  kthread+0x328/0x630
[   23.833904]  ret_from_fork+0x10/0x20
[   23.834012] 
[   23.834078] Allocated by task 275:
[   23.834146]  kasan_save_stack+0x3c/0x68
[   23.834235]  kasan_save_track+0x20/0x40
[   23.834319]  kasan_save_alloc_info+0x40/0x58
[   23.834407]  __kasan_kmalloc+0xd4/0xd8
[   23.834494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.834584]  kasan_atomics+0xb8/0x2e0
[   23.834662]  kunit_try_run_case+0x170/0x3f0
[   23.834746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834842]  kthread+0x328/0x630
[   23.834925]  ret_from_fork+0x10/0x20
[   23.835006] 
[   23.835129] The buggy address belongs to the object at fff00000c63eb100
[   23.835129]  which belongs to the cache kmalloc-64 of size 64
[   23.835300] The buggy address is located 0 bytes to the right of
[   23.835300]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.835467] 
[   23.835520] The buggy address belongs to the physical page:
[   23.835596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.835726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.835850] page_type: f5(slab)
[   23.835947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.836092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.836216] page dumped because: kasan: bad access detected
[   23.836314] 
[   23.836381] Memory state around the buggy address:
[   23.836504]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.836627]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.836722] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.836834]                                      ^
[   23.836915]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.837071]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.837164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   23.538072] ==================================================================
[   23.539966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.540563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.540722] Call trace:
[   23.541145]  kasan_report+0xdc/0x128
[   23.541389]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.541752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.542386]  kasan_save_track+0x20/0x40
[   23.542727]  kasan_bitops_generic+0xa0/0x1c8
[   23.543056]  kthread+0x328/0x630
[   23.543438] The buggy address is located 8 bytes inside of
[   23.543438]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.544198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.544550]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.545054]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.547906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   23.550447] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.551177] 
[   23.551427] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.551644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.552224] Hardware name: linux,dummy-virt (DT)
[   23.552614] Call trace:
[   23.553174]  show_stack+0x20/0x38 (C)
[   23.553868]  dump_stack_lvl+0x8c/0xd0
[   23.554264]  print_report+0x118/0x608
[   23.554548]  __asan_report_load8_noabort+0x20/0x30
[   23.554772]  kasan_bitops_generic+0x11c/0x1c8
[   23.554881]  kunit_try_run_case+0x170/0x3f0
[   23.554999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.560288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.565127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.603839] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   23.361257] ==================================================================
[   23.361688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.362430] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.362603] 
[   23.362698] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.362899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.362965] Hardware name: linux,dummy-virt (DT)
[   23.363055] Call trace:
[   23.363112]  show_stack+0x20/0x38 (C)
[   23.363513]  dump_stack_lvl+0x8c/0xd0
[   23.364329]  print_report+0x118/0x608
[   23.364881]  kasan_report+0xdc/0x128
[   23.365109]  kasan_check_range+0x100/0x1a8
[   23.365447]  __kasan_check_write+0x20/0x30
[   23.365950]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.366637]  kasan_bitops_generic+0x110/0x1c8
[   23.366995]  kunit_try_run_case+0x170/0x3f0
[   23.367174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.367714]  kthread+0x328/0x630
[   23.368215]  ret_from_fork+0x10/0x20
[   23.368371] 
[   23.368739] Allocated by task 271:
[   23.368889]  kasan_save_stack+0x3c/0x68
[   23.369714]  kasan_save_track+0x20/0x40
[   23.369985]  kasan_save_alloc_info+0x40/0x58
[   23.370486]  __kasan_kmalloc+0xd4/0xd8
[   23.370884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.371237]  kasan_bitops_generic+0xa0/0x1c8
[   23.371361]  kunit_try_run_case+0x170/0x3f0
[   23.371905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.372467]  kthread+0x328/0x630
[   23.372659]  ret_from_fork+0x10/0x20
[   23.372976] 
[   23.373199] The buggy address belongs to the object at fff00000c60581a0
[   23.373199]  which belongs to the cache kmalloc-16 of size 16
[   23.373750] The buggy address is located 8 bytes inside of
[   23.373750]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.374000] 
[   23.375110] The buggy address belongs to the physical page:
[   23.375217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.375333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.375397] page_type: f5(slab)
[   23.375452] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.375512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.375560] page dumped because: kasan: bad access detected
[   23.375598] 
[   23.375621] Memory state around the buggy address:
[   23.375664]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.375716]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.375764] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.375808]                                   ^
[   23.375848]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375896]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375940] ==================================================================
[   23.377153] ==================================================================
[   23.377279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.377414] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.377544] 
[   23.377631] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.377856] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.377935] Hardware name: linux,dummy-virt (DT)
[   23.378028] Call trace:
[   23.378082]  show_stack+0x20/0x38 (C)
[   23.378191]  dump_stack_lvl+0x8c/0xd0
[   23.378316]  print_report+0x118/0x608
[   23.378474]  kasan_report+0xdc/0x128
[   23.378623]  __asan_report_load8_noabort+0x20/0x30
[   23.378875]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.379249]  kasan_bitops_generic+0x110/0x1c8
[   23.379545]  kunit_try_run_case+0x170/0x3f0
[   23.379701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.379861]  kthread+0x328/0x630
[   23.379990]  ret_from_fork+0x10/0x20
[   23.380157] 
[   23.380217] Allocated by task 271:
[   23.380294]  kasan_save_stack+0x3c/0x68
[   23.380382]  kasan_save_track+0x20/0x40
[   23.380473]  kasan_save_alloc_info+0x40/0x58
[   23.380786]  __kasan_kmalloc+0xd4/0xd8
[   23.380883]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.380992]  kasan_bitops_generic+0xa0/0x1c8
[   23.381110]  kunit_try_run_case+0x170/0x3f0
[   23.381205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.381324]  kthread+0x328/0x630
[   23.381427]  ret_from_fork+0x10/0x20
[   23.381559] 
[   23.381638] The buggy address belongs to the object at fff00000c60581a0
[   23.381638]  which belongs to the cache kmalloc-16 of size 16
[   23.381826] The buggy address is located 8 bytes inside of
[   23.381826]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.382039] 
[   23.382095] The buggy address belongs to the physical page:
[   23.382180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.382320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.382454] page_type: f5(slab)
[   23.382551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.382682] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.382788] page dumped because: kasan: bad access detected
[   23.382873] 
[   23.382932] Memory state around the buggy address:
[   23.383075]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.383184]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.383299] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.383958]                                   ^
[   23.384121]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.384246]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.384366] ==================================================================
[   23.386913] ==================================================================
[   23.387058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.387179] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.387308] 
[   23.387397] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.387633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.387716] Hardware name: linux,dummy-virt (DT)
[   23.387802] Call trace:
[   23.387863]  show_stack+0x20/0x38 (C)
[   23.387987]  dump_stack_lvl+0x8c/0xd0
[   23.388159]  print_report+0x118/0x608
[   23.388271]  kasan_report+0xdc/0x128
[   23.388396]  kasan_check_range+0x100/0x1a8
[   23.388751]  __kasan_check_write+0x20/0x30
[   23.389194]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.389554]  kasan_bitops_generic+0x110/0x1c8
[   23.389676]  kunit_try_run_case+0x170/0x3f0
[   23.389943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.390136]  kthread+0x328/0x630
[   23.390246]  ret_from_fork+0x10/0x20
[   23.390702] 
[   23.390758] Allocated by task 271:
[   23.390836]  kasan_save_stack+0x3c/0x68
[   23.390945]  kasan_save_track+0x20/0x40
[   23.391058]  kasan_save_alloc_info+0x40/0x58
[   23.391165]  __kasan_kmalloc+0xd4/0xd8
[   23.391244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.391360]  kasan_bitops_generic+0xa0/0x1c8
[   23.391460]  kunit_try_run_case+0x170/0x3f0
[   23.391858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392067]  kthread+0x328/0x630
[   23.392164]  ret_from_fork+0x10/0x20
[   23.392302] 
[   23.392355] The buggy address belongs to the object at fff00000c60581a0
[   23.392355]  which belongs to the cache kmalloc-16 of size 16
[   23.392555] The buggy address is located 8 bytes inside of
[   23.392555]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.392760] 
[   23.392838] The buggy address belongs to the physical page:
[   23.392956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   23.393151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.393276] page_type: f5(slab)
[   23.393431] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   23.393584] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.393736] page dumped because: kasan: bad access detected
[   23.393837] 
[   23.393884] Memory state around the buggy address:
[   23.393966]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   23.394131]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.394234] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.394331]                                   ^
[   23.394517]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394623]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.394721] ==================================================================
[   23.397371] ==================================================================
[   23.397505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.397633] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.397762] 
[   23.397849] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.398120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.398199] Hardware name: linux,dummy-virt (DT)
[   23.398339]  show_stack+0x20/0x38 (C)
[   23.399678]  kasan_bitops_generic+0x110/0x1c8
[   23.400594] Allocated by task 271:
[   23.400985]  __kasan_kmalloc+0xd4/0xd8
[   23.401415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.401966] The buggy address is located 8 bytes inside of
[   23.401966]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.402743] page_type: f5(slab)
[   23.403313] page dumped because: kasan: bad access detected
[   23.404303] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.407214] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271
[   23.408227]  dump_stack_lvl+0x8c/0xd0
[   23.408466]  kasan_report+0xdc/0x128
[   23.409003]  kasan_bitops_generic+0x110/0x1c8
[   23.409542]  ret_from_fork+0x10/0x20
[   23.410401]  __kasan_kmalloc+0xd4/0xd8
[   23.410838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.411200] 
[   23.411434] The buggy address is located 8 bytes inside of
[   23.411434]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.412314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.413057] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.414207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.414857] Call trace:
[   23.414916]  show_stack+0x20/0x38 (C)
[   23.415990]  kunit_try_run_case+0x170/0x3f0
[   23.416309]  kthread+0x328/0x630
[   23.417272]  kasan_save_stack+0x3c/0x68
[   23.417943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.418362]  kthread+0x328/0x630
[   23.418705]  ret_from_fork+0x10/0x20
[   23.419015] The buggy address is located 8 bytes inside of
[   23.419015]  allocated 9-byte region [fff00000c60581a0, fff00000c60581a9)
[   23.420717] 
[   23.420763] Memory state around the buggy address:
[   23.421183] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.424272] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   23.324721] ==================================================================
[   23.324843] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   23.324977] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269
[   23.325109] 
[   23.325195] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.325487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.325566] Hardware name: linux,dummy-virt (DT)
[   23.325641] Call trace:
[   23.325703]  show_stack+0x20/0x38 (C)
[   23.325841]  dump_stack_lvl+0x8c/0xd0
[   23.325963]  print_report+0x118/0x608
[   23.326138]  kasan_report+0xdc/0x128
[   23.326278]  __asan_report_load1_noabort+0x20/0x30
[   23.326421]  strnlen+0x80/0x88
[   23.326573]  kasan_strings+0x478/0xb00
[   23.326729]  kunit_try_run_case+0x170/0x3f0
[   23.326889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.327083]  kthread+0x328/0x630
[   23.327187]  ret_from_fork+0x10/0x20
[   23.327308] 
[   23.327352] Allocated by task 269:
[   23.327420]  kasan_save_stack+0x3c/0x68
[   23.327525]  kasan_save_track+0x20/0x40
[   23.327623]  kasan_save_alloc_info+0x40/0x58
[   23.327720]  __kasan_kmalloc+0xd4/0xd8
[   23.327798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.327890]  kasan_strings+0xc8/0xb00
[   23.328032]  kunit_try_run_case+0x170/0x3f0
[   23.328208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.328361]  kthread+0x328/0x630
[   23.328452]  ret_from_fork+0x10/0x20
[   23.328553] 
[   23.328607] Freed by task 269:
[   23.328678]  kasan_save_stack+0x3c/0x68
[   23.328784]  kasan_save_track+0x20/0x40
[   23.328914]  kasan_save_free_info+0x4c/0x78
[   23.329029]  __kasan_slab_free+0x6c/0x98
[   23.329134]  kfree+0x214/0x3c8
[   23.329223]  kasan_strings+0x24c/0xb00
[   23.329314]  kunit_try_run_case+0x170/0x3f0
[   23.329422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.329537]  kthread+0x328/0x630
[   23.329626]  ret_from_fork+0x10/0x20
[   23.329722] 
[   23.329782] The buggy address belongs to the object at fff00000c605c800
[   23.329782]  which belongs to the cache kmalloc-32 of size 32
[   23.329921] The buggy address is located 16 bytes inside of
[   23.329921]  freed 32-byte region [fff00000c605c800, fff00000c605c820)
[   23.330100] 
[   23.330151] The buggy address belongs to the physical page:
[   23.330222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c
[   23.330353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.330472] page_type: f5(slab)
[   23.330574] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.330707] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.330814] page dumped because: kasan: bad access detected
[   23.330894] 
[   23.330935] Memory state around the buggy address:
[   23.331002]  fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.331098]  fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.331221] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.331343]                          ^
[   23.331427]  fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.331610]  fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.331770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   23.319362] ==================================================================
[   23.319439] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   23.319508] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269
[   23.319566] 
[   23.319611] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.319711] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.319748] Hardware name: linux,dummy-virt (DT)
[   23.319787] Call trace:
[   23.319818]  show_stack+0x20/0x38 (C)
[   23.319879]  dump_stack_lvl+0x8c/0xd0
[   23.319934]  print_report+0x118/0x608
[   23.319989]  kasan_report+0xdc/0x128
[   23.320074]  __asan_report_load1_noabort+0x20/0x30
[   23.320137]  strlen+0xa8/0xb0
[   23.320187]  kasan_strings+0x418/0xb00
[   23.320239]  kunit_try_run_case+0x170/0x3f0
[   23.320294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.320354]  kthread+0x328/0x630
[   23.320404]  ret_from_fork+0x10/0x20
[   23.320462] 
[   23.320485] Allocated by task 269:
[   23.320520]  kasan_save_stack+0x3c/0x68
[   23.320592]  kasan_save_track+0x20/0x40
[   23.320637]  kasan_save_alloc_info+0x40/0x58
[   23.320686]  __kasan_kmalloc+0xd4/0xd8
[   23.320727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.320772]  kasan_strings+0xc8/0xb00
[   23.320812]  kunit_try_run_case+0x170/0x3f0
[   23.320855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.320905]  kthread+0x328/0x630
[   23.320942]  ret_from_fork+0x10/0x20
[   23.320986] 
[   23.321009] Freed by task 269:
[   23.321100]  kasan_save_stack+0x3c/0x68
[   23.321173]  kasan_save_track+0x20/0x40
[   23.321250]  kasan_save_free_info+0x4c/0x78
[   23.321341]  __kasan_slab_free+0x6c/0x98
[   23.321457]  kfree+0x214/0x3c8
[   23.321567]  kasan_strings+0x24c/0xb00
[   23.321663]  kunit_try_run_case+0x170/0x3f0
[   23.321779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.321917]  kthread+0x328/0x630
[   23.322002]  ret_from_fork+0x10/0x20
[   23.322172] 
[   23.322229] The buggy address belongs to the object at fff00000c605c800
[   23.322229]  which belongs to the cache kmalloc-32 of size 32
[   23.322374] The buggy address is located 16 bytes inside of
[   23.322374]  freed 32-byte region [fff00000c605c800, fff00000c605c820)
[   23.322506] 
[   23.322551] The buggy address belongs to the physical page:
[   23.322624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c
[   23.322757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.322884] page_type: f5(slab)
[   23.322979] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.323121] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.323261] page dumped because: kasan: bad access detected
[   23.323340] 
[   23.323384] Memory state around the buggy address:
[   23.323471]  fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.323605]  fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.323723] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.323808]                          ^
[   23.323891]  fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.323996]  fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.324145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   23.309308] ==================================================================
[   23.309439] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   23.309867] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269
[   23.310047] 
[   23.310253] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.310458] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.310533] Hardware name: linux,dummy-virt (DT)
[   23.310616] Call trace:
[   23.310705]  show_stack+0x20/0x38 (C)
[   23.310829]  dump_stack_lvl+0x8c/0xd0
[   23.311251]  print_report+0x118/0x608
[   23.311408]  kasan_report+0xdc/0x128
[   23.311563]  __asan_report_load1_noabort+0x20/0x30
[   23.311683]  kasan_strings+0x95c/0xb00
[   23.311945]  kunit_try_run_case+0x170/0x3f0
[   23.312123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.312287]  kthread+0x328/0x630
[   23.312408]  ret_from_fork+0x10/0x20
[   23.312547] 
[   23.312605] Allocated by task 269:
[   23.312680]  kasan_save_stack+0x3c/0x68
[   23.312803]  kasan_save_track+0x20/0x40
[   23.312933]  kasan_save_alloc_info+0x40/0x58
[   23.313079]  __kasan_kmalloc+0xd4/0xd8
[   23.313177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.313317]  kasan_strings+0xc8/0xb00
[   23.313442]  kunit_try_run_case+0x170/0x3f0
[   23.313562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.313668]  kthread+0x328/0x630
[   23.313747]  ret_from_fork+0x10/0x20
[   23.313843] 
[   23.313893] Freed by task 269:
[   23.313960]  kasan_save_stack+0x3c/0x68
[   23.314096]  kasan_save_track+0x20/0x40
[   23.314195]  kasan_save_free_info+0x4c/0x78
[   23.314303]  __kasan_slab_free+0x6c/0x98
[   23.314554]  kfree+0x214/0x3c8
[   23.314786]  kasan_strings+0x24c/0xb00
[   23.314871]  kunit_try_run_case+0x170/0x3f0
[   23.314958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.315077]  kthread+0x328/0x630
[   23.315163]  ret_from_fork+0x10/0x20
[   23.315263] 
[   23.315321] The buggy address belongs to the object at fff00000c605c800
[   23.315321]  which belongs to the cache kmalloc-32 of size 32
[   23.316121] The buggy address is located 16 bytes inside of
[   23.316121]  freed 32-byte region [fff00000c605c800, fff00000c605c820)
[   23.316299] 
[   23.316359] The buggy address belongs to the physical page:
[   23.316449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c
[   23.316649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.316827] page_type: f5(slab)
[   23.316922] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.317102] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.317207] page dumped because: kasan: bad access detected
[   23.317293] 
[   23.317349] Memory state around the buggy address:
[   23.317450]  fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.317578]  fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.317757] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.317860]                          ^
[   23.317940]  fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.318052]  fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.318176] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   23.292904] ==================================================================
[   23.293066] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   23.293215] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269
[   23.293345] 
[   23.293441] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.293686] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.293769] Hardware name: linux,dummy-virt (DT)
[   23.293858] Call trace:
[   23.293921]  show_stack+0x20/0x38 (C)
[   23.294544]  dump_stack_lvl+0x8c/0xd0
[   23.295205]  print_report+0x118/0x608
[   23.295612]  kasan_report+0xdc/0x128
[   23.295745]  __asan_report_load1_noabort+0x20/0x30
[   23.295868]  strcmp+0xc0/0xc8
[   23.296113]  kasan_strings+0x340/0xb00
[   23.296401]  kunit_try_run_case+0x170/0x3f0
[   23.296697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.297099]  kthread+0x328/0x630
[   23.297437]  ret_from_fork+0x10/0x20
[   23.297564] 
[   23.297705] Allocated by task 269:
[   23.297946]  kasan_save_stack+0x3c/0x68
[   23.298197]  kasan_save_track+0x20/0x40
[   23.298347]  kasan_save_alloc_info+0x40/0x58
[   23.298451]  __kasan_kmalloc+0xd4/0xd8
[   23.298551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.298673]  kasan_strings+0xc8/0xb00
[   23.299112]  kunit_try_run_case+0x170/0x3f0
[   23.299373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.299658]  kthread+0x328/0x630
[   23.299855]  ret_from_fork+0x10/0x20
[   23.299985] 
[   23.300298] Freed by task 269:
[   23.300425]  kasan_save_stack+0x3c/0x68
[   23.300695]  kasan_save_track+0x20/0x40
[   23.301060]  kasan_save_free_info+0x4c/0x78
[   23.301229]  __kasan_slab_free+0x6c/0x98
[   23.301333]  kfree+0x214/0x3c8
[   23.301895]  kasan_strings+0x24c/0xb00
[   23.302106]  kunit_try_run_case+0x170/0x3f0
[   23.302210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.302319]  kthread+0x328/0x630
[   23.302417]  ret_from_fork+0x10/0x20
[   23.302522] 
[   23.302588] The buggy address belongs to the object at fff00000c605c800
[   23.302588]  which belongs to the cache kmalloc-32 of size 32
[   23.302755] The buggy address is located 16 bytes inside of
[   23.302755]  freed 32-byte region [fff00000c605c800, fff00000c605c820)
[   23.303300] 
[   23.303464] The buggy address belongs to the physical page:
[   23.303658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c
[   23.303913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.304251] page_type: f5(slab)
[   23.304451] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.304761] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.304892] page dumped because: kasan: bad access detected
[   23.304989] 
[   23.305052] Memory state around the buggy address:
[   23.305147]  fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.305267]  fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.305392] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.305504]                          ^
[   23.305585]  fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.305709]  fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.305822] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   23.251836] ==================================================================
[   23.252878] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   23.253565] Read of size 1 at addr fff00000c605c658 by task kunit_try_catch/267
[   23.253719] 
[   23.253967] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.254478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.254557] Hardware name: linux,dummy-virt (DT)
[   23.254631] Call trace:
[   23.254687]  show_stack+0x20/0x38 (C)
[   23.254814]  dump_stack_lvl+0x8c/0xd0
[   23.254912]  print_report+0x118/0x608
[   23.255029]  kasan_report+0xdc/0x128
[   23.255141]  __asan_report_load1_noabort+0x20/0x30
[   23.255697]  memcmp+0x198/0x1d8
[   23.256117]  kasan_memcmp+0x16c/0x300
[   23.256390]  kunit_try_run_case+0x170/0x3f0
[   23.257865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.258076]  kthread+0x328/0x630
[   23.258194]  ret_from_fork+0x10/0x20
[   23.258326] 
[   23.258385] Allocated by task 267:
[   23.258469]  kasan_save_stack+0x3c/0x68
[   23.258584]  kasan_save_track+0x20/0x40
[   23.258774]  kasan_save_alloc_info+0x40/0x58
[   23.258976]  __kasan_kmalloc+0xd4/0xd8
[   23.259328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.259556]  kasan_memcmp+0xbc/0x300
[   23.259768]  kunit_try_run_case+0x170/0x3f0
[   23.259967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.260566]  kthread+0x328/0x630
[   23.260989]  ret_from_fork+0x10/0x20
[   23.261097] 
[   23.261149] The buggy address belongs to the object at fff00000c605c640
[   23.261149]  which belongs to the cache kmalloc-32 of size 32
[   23.261313] The buggy address is located 0 bytes to the right of
[   23.261313]  allocated 24-byte region [fff00000c605c640, fff00000c605c658)
[   23.261552] 
[   23.261614] The buggy address belongs to the physical page:
[   23.261772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c
[   23.262014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.262427] page_type: f5(slab)
[   23.262587] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.262789] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.262925] page dumped because: kasan: bad access detected
[   23.263187] 
[   23.263379] Memory state around the buggy address:
[   23.263517]  fff00000c605c500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.263737]  fff00000c605c580: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   23.263970] >fff00000c605c600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.264095]                                                     ^
[   23.264199]  fff00000c605c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.264370]  fff00000c605c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.264630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   23.181084] ==================================================================
[   23.181436] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   23.181959] Read of size 1 at addr ffff8000809c7b4a by task kunit_try_catch/263
[   23.182231] 
[   23.182345] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.182554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.182640] Hardware name: linux,dummy-virt (DT)
[   23.182731] Call trace:
[   23.182794]  show_stack+0x20/0x38 (C)
[   23.183412]  dump_stack_lvl+0x8c/0xd0
[   23.183644]  print_report+0x310/0x608
[   23.184028]  kasan_report+0xdc/0x128
[   23.184314]  __asan_report_load1_noabort+0x20/0x30
[   23.184760]  kasan_alloca_oob_right+0x2dc/0x340
[   23.185033]  kunit_try_run_case+0x170/0x3f0
[   23.185303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.185496]  kthread+0x328/0x630
[   23.185893]  ret_from_fork+0x10/0x20
[   23.186564] 
[   23.186640] The buggy address belongs to stack of task kunit_try_catch/263
[   23.186821] 
[   23.187047] The buggy address belongs to the virtual mapping at
[   23.187047]  [ffff8000809c0000, ffff8000809c9000) created by:
[   23.187047]  kernel_clone+0x150/0x7a8
[   23.187273] 
[   23.187337] The buggy address belongs to the physical page:
[   23.187895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781
[   23.188143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.188511] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.188680] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.188794] page dumped because: kasan: bad access detected
[   23.188882] 
[   23.189295] Memory state around the buggy address:
[   23.189498]  ffff8000809c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.189739]  ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.190141] >ffff8000809c7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   23.190366]                                               ^
[   23.190550]  ffff8000809c7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   23.190743]  ffff8000809c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.190853] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   23.148219] ==================================================================
[   23.148423] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   23.148583] Read of size 1 at addr ffff8000809c7b5f by task kunit_try_catch/261
[   23.148804] 
[   23.148907] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.150095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.150223] Hardware name: linux,dummy-virt (DT)
[   23.151153] Call trace:
[   23.151212]  show_stack+0x20/0x38 (C)
[   23.151341]  dump_stack_lvl+0x8c/0xd0
[   23.151441]  print_report+0x310/0x608
[   23.151552]  kasan_report+0xdc/0x128
[   23.151692]  __asan_report_load1_noabort+0x20/0x30
[   23.151966]  kasan_alloca_oob_left+0x2b8/0x310
[   23.152108]  kunit_try_run_case+0x170/0x3f0
[   23.152238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.152376]  kthread+0x328/0x630
[   23.152486]  ret_from_fork+0x10/0x20
[   23.152632] 
[   23.152690] The buggy address belongs to stack of task kunit_try_catch/261
[   23.152864] 
[   23.152934] The buggy address belongs to the virtual mapping at
[   23.152934]  [ffff8000809c0000, ffff8000809c9000) created by:
[   23.152934]  kernel_clone+0x150/0x7a8
[   23.153995] 
[   23.154124] The buggy address belongs to the physical page:
[   23.154216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781
[   23.154289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.154439] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.155115] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.155256] page dumped because: kasan: bad access detected
[   23.155787] 
[   23.156140] Memory state around the buggy address:
[   23.156587]  ffff8000809c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.156965]  ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.157197] >ffff8000809c7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   23.157346]                                                     ^
[   23.157978]  ffff8000809c7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   23.158261]  ffff8000809c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.158362] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   23.121008] ==================================================================
[   23.121228] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   23.121375] Read of size 1 at addr ffff8000809c7c2a by task kunit_try_catch/259
[   23.121491] 
[   23.121579] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.121797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.122300] Hardware name: linux,dummy-virt (DT)
[   23.122481] Call trace:
[   23.122533]  show_stack+0x20/0x38 (C)
[   23.122666]  dump_stack_lvl+0x8c/0xd0
[   23.122807]  print_report+0x310/0x608
[   23.122924]  kasan_report+0xdc/0x128
[   23.123099]  __asan_report_load1_noabort+0x20/0x30
[   23.123227]  kasan_stack_oob+0x238/0x270
[   23.123344]  kunit_try_run_case+0x170/0x3f0
[   23.123459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.123599]  kthread+0x328/0x630
[   23.123702]  ret_from_fork+0x10/0x20
[   23.123817] 
[   23.124046] The buggy address belongs to stack of task kunit_try_catch/259
[   23.124411]  and is located at offset 138 in frame:
[   23.124721]  kasan_stack_oob+0x0/0x270
[   23.125004] 
[   23.125328] This frame has 4 objects:
[   23.125657]  [48, 49) '__assertion'
[   23.125764]  [64, 72) 'array'
[   23.125839]  [96, 112) '__assertion'
[   23.125979]  [128, 138) 'stack_array'
[   23.126147] 
[   23.126229] The buggy address belongs to the virtual mapping at
[   23.126229]  [ffff8000809c0000, ffff8000809c9000) created by:
[   23.126229]  kernel_clone+0x150/0x7a8
[   23.126642] 
[   23.126713] The buggy address belongs to the physical page:
[   23.126799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781
[   23.126924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.127122] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.127242] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.127343] page dumped because: kasan: bad access detected
[   23.127422] 
[   23.127729] Memory state around the buggy address:
[   23.127895]  ffff8000809c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.128066]  ffff8000809c7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   23.128195] >ffff8000809c7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   23.128321]                                   ^
[   23.128414]  ffff8000809c7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   23.128593]  ffff8000809c7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.128712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   23.077172] ==================================================================
[   23.077361] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   23.078165] Read of size 1 at addr ffffacab7ce6f64d by task kunit_try_catch/255
[   23.078478] 
[   23.078958] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.079354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.079557] Hardware name: linux,dummy-virt (DT)
[   23.079744] Call trace:
[   23.079843]  show_stack+0x20/0x38 (C)
[   23.080096]  dump_stack_lvl+0x8c/0xd0
[   23.080412]  print_report+0x310/0x608
[   23.080793]  kasan_report+0xdc/0x128
[   23.081031]  __asan_report_load1_noabort+0x20/0x30
[   23.081429]  kasan_global_oob_right+0x230/0x270
[   23.081684]  kunit_try_run_case+0x170/0x3f0
[   23.081858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.082177]  kthread+0x328/0x630
[   23.082491]  ret_from_fork+0x10/0x20
[   23.082639] 
[   23.082758] The buggy address belongs to the variable:
[   23.082834]  global_array+0xd/0x40
[   23.083187] 
[   23.083535] The buggy address belongs to the virtual mapping at
[   23.083535]  [ffffacab7b030000, ffffacab7cf21000) created by:
[   23.083535]  paging_init+0x66c/0x7d0
[   23.083753] 
[   23.084045] The buggy address belongs to the physical page:
[   23.084144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c6f
[   23.084675] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   23.085346] raw: 03fffe0000002000 ffffc1ffc01f1bc8 ffffc1ffc01f1bc8 0000000000000000
[   23.085605] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.085823] page dumped because: kasan: bad access detected
[   23.086016] 
[   23.086159] Memory state around the buggy address:
[   23.086230]  ffffacab7ce6f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.086604]  ffffacab7ce6f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.086859] >ffffacab7ce6f600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   23.087078]                                               ^
[   23.087258]  ffffacab7ce6f680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   23.087389]  ffffacab7ce6f700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   23.087493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   23.045856] ==================================================================
[   23.046044] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.046213] Free of addr fff00000c77c4001 by task kunit_try_catch/253
[   23.046305] 
[   23.046535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.046910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.046994] Hardware name: linux,dummy-virt (DT)
[   23.047080] Call trace:
[   23.047128]  show_stack+0x20/0x38 (C)
[   23.047247]  dump_stack_lvl+0x8c/0xd0
[   23.047361]  print_report+0x118/0x608
[   23.047529]  kasan_report_invalid_free+0xc0/0xe8
[   23.047696]  __kasan_mempool_poison_object+0xfc/0x150
[   23.047823]  mempool_free+0x28c/0x328
[   23.047971]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.048109]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   23.048231]  kunit_try_run_case+0x170/0x3f0
[   23.048362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.048913]  kthread+0x328/0x630
[   23.049031]  ret_from_fork+0x10/0x20
[   23.049152] 
[   23.049207] The buggy address belongs to the physical page:
[   23.049286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   23.049689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.049807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.049943] page_type: f8(unknown)
[   23.050055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.050172] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.050275] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.050377] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.050486] head: 0bfffe0000000002 ffffc1ffc31df101 00000000ffffffff 00000000ffffffff
[   23.050608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.050709] page dumped because: kasan: bad access detected
[   23.050791] 
[   23.050837] Memory state around the buggy address:
[   23.050918]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.051035]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.051147] >fff00000c77c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.051241]                    ^
[   23.051311]  fff00000c77c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.051418]  fff00000c77c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.051518] ==================================================================
[   23.018295] ==================================================================
[   23.018571] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.018778] Free of addr fff00000c7791b01 by task kunit_try_catch/251
[   23.018883] 
[   23.018975] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.019210] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.019291] Hardware name: linux,dummy-virt (DT)
[   23.019372] Call trace:
[   23.019426]  show_stack+0x20/0x38 (C)
[   23.019587]  dump_stack_lvl+0x8c/0xd0
[   23.019795]  print_report+0x118/0x608
[   23.019928]  kasan_report_invalid_free+0xc0/0xe8
[   23.020083]  check_slab_allocation+0xfc/0x108
[   23.020274]  __kasan_mempool_poison_object+0x78/0x150
[   23.020445]  mempool_free+0x28c/0x328
[   23.020569]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.020702]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.020827]  kunit_try_run_case+0x170/0x3f0
[   23.020954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.021095]  kthread+0x328/0x630
[   23.021261]  ret_from_fork+0x10/0x20
[   23.021433] 
[   23.021495] Allocated by task 251:
[   23.021591]  kasan_save_stack+0x3c/0x68
[   23.021741]  kasan_save_track+0x20/0x40
[   23.021885]  kasan_save_alloc_info+0x40/0x58
[   23.022025]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.022145]  remove_element+0x130/0x1f8
[   23.022232]  mempool_alloc_preallocated+0x58/0xc0
[   23.022319]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   23.022428]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.022528]  kunit_try_run_case+0x170/0x3f0
[   23.022683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.022798]  kthread+0x328/0x630
[   23.022890]  ret_from_fork+0x10/0x20
[   23.023039] 
[   23.023125] The buggy address belongs to the object at fff00000c7791b00
[   23.023125]  which belongs to the cache kmalloc-128 of size 128
[   23.023304] The buggy address is located 1 bytes inside of
[   23.023304]  128-byte region [fff00000c7791b00, fff00000c7791b80)
[   23.023456] 
[   23.023506] The buggy address belongs to the physical page:
[   23.023590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   23.023714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.023840] page_type: f5(slab)
[   23.023936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.024071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.024253] page dumped because: kasan: bad access detected
[   23.024366] 
[   23.024417] Memory state around the buggy address:
[   23.024554]  fff00000c7791a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.024676]  fff00000c7791a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.024804] >fff00000c7791b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.025352]                    ^
[   23.025452]  fff00000c7791b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.025583]  fff00000c7791c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.025691] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   22.884947] ==================================================================
[   22.885108] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.885258] Free of addr fff00000c7791700 by task kunit_try_catch/245
[   22.885365] 
[   22.885452] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.885665] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.885741] Hardware name: linux,dummy-virt (DT)
[   22.885815] Call trace:
[   22.885866]  show_stack+0x20/0x38 (C)
[   22.885983]  dump_stack_lvl+0x8c/0xd0
[   22.886116]  print_report+0x118/0x608
[   22.886233]  kasan_report_invalid_free+0xc0/0xe8
[   22.887185]  check_slab_allocation+0xd4/0x108
[   22.887963]  __kasan_mempool_poison_object+0x78/0x150
[   22.888283]  mempool_free+0x28c/0x328
[   22.888572]  mempool_double_free_helper+0x150/0x2e8
[   22.888991]  mempool_kmalloc_double_free+0xc0/0x118
[   22.889582]  kunit_try_run_case+0x170/0x3f0
[   22.889731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890156]  kthread+0x328/0x630
[   22.890396]  ret_from_fork+0x10/0x20
[   22.890625] 
[   22.890767] Allocated by task 245:
[   22.890912]  kasan_save_stack+0x3c/0x68
[   22.891405]  kasan_save_track+0x20/0x40
[   22.891827]  kasan_save_alloc_info+0x40/0x58
[   22.892246]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.892425]  remove_element+0x130/0x1f8
[   22.892819]  mempool_alloc_preallocated+0x58/0xc0
[   22.893103]  mempool_double_free_helper+0x94/0x2e8
[   22.893746]  mempool_kmalloc_double_free+0xc0/0x118
[   22.893874]  kunit_try_run_case+0x170/0x3f0
[   22.893970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.894959]  kthread+0x328/0x630
[   22.895326]  ret_from_fork+0x10/0x20
[   22.895512] 
[   22.895657] Freed by task 245:
[   22.895807]  kasan_save_stack+0x3c/0x68
[   22.895905]  kasan_save_track+0x20/0x40
[   22.896321]  kasan_save_free_info+0x4c/0x78
[   22.896949]  __kasan_mempool_poison_object+0xc0/0x150
[   22.897231]  mempool_free+0x28c/0x328
[   22.897418]  mempool_double_free_helper+0x100/0x2e8
[   22.897715]  mempool_kmalloc_double_free+0xc0/0x118
[   22.898111]  kunit_try_run_case+0x170/0x3f0
[   22.898210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.898751]  kthread+0x328/0x630
[   22.899262]  ret_from_fork+0x10/0x20
[   22.899581] 
[   22.899633] The buggy address belongs to the object at fff00000c7791700
[   22.899633]  which belongs to the cache kmalloc-128 of size 128
[   22.899783] The buggy address is located 0 bytes inside of
[   22.899783]  128-byte region [fff00000c7791700, fff00000c7791780)
[   22.899931] 
[   22.899979] The buggy address belongs to the physical page:
[   22.900914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   22.901513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.902054] page_type: f5(slab)
[   22.902568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.903108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.903204] page dumped because: kasan: bad access detected
[   22.903908] 
[   22.904219] Memory state around the buggy address:
[   22.904314]  fff00000c7791600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.905110]  fff00000c7791680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.905235] >fff00000c7791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.905330]                    ^
[   22.905399]  fff00000c7791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.906197]  fff00000c7791800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.906866] ==================================================================
[   22.951273] ==================================================================
[   22.951454] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.951596] Free of addr fff00000c77c4000 by task kunit_try_catch/247
[   22.951688] 
[   22.951762] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.951939] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.951999] Hardware name: linux,dummy-virt (DT)
[   22.952136] Call trace:
[   22.952196]  show_stack+0x20/0x38 (C)
[   22.952334]  dump_stack_lvl+0x8c/0xd0
[   22.952452]  print_report+0x118/0x608
[   22.952580]  kasan_report_invalid_free+0xc0/0xe8
[   22.952828]  __kasan_mempool_poison_object+0x14c/0x150
[   22.953480]  mempool_free+0x28c/0x328
[   22.953652]  mempool_double_free_helper+0x150/0x2e8
[   22.953862]  mempool_kmalloc_large_double_free+0xc0/0x118
[   22.954083]  kunit_try_run_case+0x170/0x3f0
[   22.954243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.954356]  kthread+0x328/0x630
[   22.954482]  ret_from_fork+0x10/0x20
[   22.954600] 
[   22.954648] The buggy address belongs to the physical page:
[   22.955167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   22.955544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.955678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.956769] page_type: f8(unknown)
[   22.956925] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.957082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.957225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.958363] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.958656] head: 0bfffe0000000002 ffffc1ffc31df101 00000000ffffffff 00000000ffffffff
[   22.959373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.959492] page dumped because: kasan: bad access detected
[   22.959624] 
[   22.959669] Memory state around the buggy address:
[   22.960578]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960724]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960837] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960937]                    ^
[   22.961011]  fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.961789]  fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.962040] ==================================================================
[   22.988250] ==================================================================
[   22.988435] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.988603] Free of addr fff00000c77c4000 by task kunit_try_catch/249
[   22.988717] 
[   22.988814] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.989552] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.989884] Hardware name: linux,dummy-virt (DT)
[   22.990088] Call trace:
[   22.990181]  show_stack+0x20/0x38 (C)
[   22.990531]  dump_stack_lvl+0x8c/0xd0
[   22.990905]  print_report+0x118/0x608
[   22.991285]  kasan_report_invalid_free+0xc0/0xe8
[   22.991658]  __kasan_mempool_poison_pages+0xe0/0xe8
[   22.991843]  mempool_free+0x24c/0x328
[   22.991962]  mempool_double_free_helper+0x150/0x2e8
[   22.992196]  mempool_page_alloc_double_free+0xbc/0x118
[   22.992347]  kunit_try_run_case+0x170/0x3f0
[   22.992459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.992593]  kthread+0x328/0x630
[   22.992696]  ret_from_fork+0x10/0x20
[   22.992815] 
[   22.992869] The buggy address belongs to the physical page:
[   22.992953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   22.993114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.993289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.994553] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.994820] page dumped because: kasan: bad access detected
[   22.995009] 
[   22.995102] Memory state around the buggy address:
[   22.995204]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995320]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995417] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995509]                    ^
[   22.995586]  fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.996171]  fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.996580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   22.765085] ==================================================================
[   22.765285] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   22.765453] Read of size 1 at addr fff00000c77c0000 by task kunit_try_catch/239
[   22.765564] 
[   22.765655] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.765862] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.765921] Hardware name: linux,dummy-virt (DT)
[   22.766032] Call trace:
[   22.766244]  show_stack+0x20/0x38 (C)
[   22.766439]  dump_stack_lvl+0x8c/0xd0
[   22.766614]  print_report+0x118/0x608
[   22.767211]  kasan_report+0xdc/0x128
[   22.767464]  __asan_report_load1_noabort+0x20/0x30
[   22.768066]  mempool_uaf_helper+0x314/0x340
[   22.768246]  mempool_kmalloc_large_uaf+0xc4/0x120
[   22.768801]  kunit_try_run_case+0x170/0x3f0
[   22.769377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.769646]  kthread+0x328/0x630
[   22.770235]  ret_from_fork+0x10/0x20
[   22.770391] 
[   22.770442] The buggy address belongs to the physical page:
[   22.770505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c0
[   22.770624] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.771204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.772146] page_type: f8(unknown)
[   22.772293] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.772682] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.772819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.772944] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.773073] head: 0bfffe0000000002 ffffc1ffc31df001 00000000ffffffff 00000000ffffffff
[   22.773196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.773299] page dumped because: kasan: bad access detected
[   22.773378] 
[   22.773422] Memory state around the buggy address:
[   22.773711]  fff00000c77bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.773907]  fff00000c77bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.774121] >fff00000c77c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.774302]                    ^
[   22.774391]  fff00000c77c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.774839]  fff00000c77c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.774968] ==================================================================
[   22.852584] ==================================================================
[   22.852788] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   22.852945] Read of size 1 at addr fff00000c77c4000 by task kunit_try_catch/243
[   22.853062] 
[   22.853145] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.853755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.853853] Hardware name: linux,dummy-virt (DT)
[   22.854135] Call trace:
[   22.854192]  show_stack+0x20/0x38 (C)
[   22.854317]  dump_stack_lvl+0x8c/0xd0
[   22.855222]  print_report+0x118/0x608
[   22.855324]  kasan_report+0xdc/0x128
[   22.855713]  __asan_report_load1_noabort+0x20/0x30
[   22.856013]  mempool_uaf_helper+0x314/0x340
[   22.856271]  mempool_page_alloc_uaf+0xc0/0x118
[   22.856372]  kunit_try_run_case+0x170/0x3f0
[   22.856489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.856995]  kthread+0x328/0x630
[   22.857435]  ret_from_fork+0x10/0x20
[   22.857952] 
[   22.858053] The buggy address belongs to the physical page:
[   22.858537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   22.858647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.858795] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.858984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.859121] page dumped because: kasan: bad access detected
[   22.859492] 
[   22.859543] Memory state around the buggy address:
[   22.859631]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.859748]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.859878] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.860039]                    ^
[   22.860137]  fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.860239]  fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.860330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   22.807180] ==================================================================
[   22.807434] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   22.807605] Read of size 1 at addr fff00000c6063240 by task kunit_try_catch/241
[   22.807719] 
[   22.807846] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.808233] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.808304] Hardware name: linux,dummy-virt (DT)
[   22.808375] Call trace:
[   22.808424]  show_stack+0x20/0x38 (C)
[   22.808548]  dump_stack_lvl+0x8c/0xd0
[   22.808667]  print_report+0x118/0x608
[   22.808779]  kasan_report+0xdc/0x128
[   22.808887]  __asan_report_load1_noabort+0x20/0x30
[   22.809001]  mempool_uaf_helper+0x314/0x340
[   22.809128]  mempool_slab_uaf+0xc0/0x118
[   22.809230]  kunit_try_run_case+0x170/0x3f0
[   22.809342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.809463]  kthread+0x328/0x630
[   22.809559]  ret_from_fork+0x10/0x20
[   22.809670] 
[   22.809716] Allocated by task 241:
[   22.809777]  kasan_save_stack+0x3c/0x68
[   22.809872]  kasan_save_track+0x20/0x40
[   22.809955]  kasan_save_alloc_info+0x40/0x58
[   22.811268]  __kasan_mempool_unpoison_object+0xbc/0x180
[   22.811501]  remove_element+0x16c/0x1f8
[   22.811988]  mempool_alloc_preallocated+0x58/0xc0
[   22.812186]  mempool_uaf_helper+0xa4/0x340
[   22.812718]  mempool_slab_uaf+0xc0/0x118
[   22.812835]  kunit_try_run_case+0x170/0x3f0
[   22.812971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.813123]  kthread+0x328/0x630
[   22.813212]  ret_from_fork+0x10/0x20
[   22.813610] 
[   22.813656] Freed by task 241:
[   22.813722]  kasan_save_stack+0x3c/0x68
[   22.813806]  kasan_save_track+0x20/0x40
[   22.813885]  kasan_save_free_info+0x4c/0x78
[   22.813963]  __kasan_mempool_poison_object+0xc0/0x150
[   22.814068]  mempool_free+0x28c/0x328
[   22.814144]  mempool_uaf_helper+0x104/0x340
[   22.814224]  mempool_slab_uaf+0xc0/0x118
[   22.814813]  kunit_try_run_case+0x170/0x3f0
[   22.814918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.815305]  kthread+0x328/0x630
[   22.815440]  ret_from_fork+0x10/0x20
[   22.815734] 
[   22.815797] The buggy address belongs to the object at fff00000c6063240
[   22.815797]  which belongs to the cache test_cache of size 123
[   22.816153] The buggy address is located 0 bytes inside of
[   22.816153]  freed 123-byte region [fff00000c6063240, fff00000c60632bb)
[   22.816501] 
[   22.816560] The buggy address belongs to the physical page:
[   22.816899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106063
[   22.817034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.817369] page_type: f5(slab)
[   22.817473] raw: 0bfffe0000000000 fff00000c7790280 dead000000000122 0000000000000000
[   22.817602] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   22.818012] page dumped because: kasan: bad access detected
[   22.818309] 
[   22.818350] Memory state around the buggy address:
[   22.818651]  fff00000c6063100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.819032]  fff00000c6063180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.819158] >fff00000c6063200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   22.819242]                                            ^
[   22.819607]  fff00000c6063280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.819758]  fff00000c6063300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.819856] ==================================================================
[   22.733432] ==================================================================
[   22.733630] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   22.733782] Read of size 1 at addr fff00000c7791300 by task kunit_try_catch/237
[   22.733894] 
[   22.733974] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.734272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.734379] Hardware name: linux,dummy-virt (DT)
[   22.734471] Call trace:
[   22.734554]  show_stack+0x20/0x38 (C)
[   22.734688]  dump_stack_lvl+0x8c/0xd0
[   22.734778]  print_report+0x118/0x608
[   22.735072]  kasan_report+0xdc/0x128
[   22.735183]  __asan_report_load1_noabort+0x20/0x30
[   22.735352]  mempool_uaf_helper+0x314/0x340
[   22.735500]  mempool_kmalloc_uaf+0xc4/0x120
[   22.735645]  kunit_try_run_case+0x170/0x3f0
[   22.735767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.735892]  kthread+0x328/0x630
[   22.736032]  ret_from_fork+0x10/0x20
[   22.736137] 
[   22.736179] Allocated by task 237:
[   22.736240]  kasan_save_stack+0x3c/0x68
[   22.736361]  kasan_save_track+0x20/0x40
[   22.736443]  kasan_save_alloc_info+0x40/0x58
[   22.736546]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.736697]  remove_element+0x130/0x1f8
[   22.736789]  mempool_alloc_preallocated+0x58/0xc0
[   22.736876]  mempool_uaf_helper+0xa4/0x340
[   22.736954]  mempool_kmalloc_uaf+0xc4/0x120
[   22.737087]  kunit_try_run_case+0x170/0x3f0
[   22.737227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.737347]  kthread+0x328/0x630
[   22.737425]  ret_from_fork+0x10/0x20
[   22.737504] 
[   22.737547] Freed by task 237:
[   22.737610]  kasan_save_stack+0x3c/0x68
[   22.737705]  kasan_save_track+0x20/0x40
[   22.737819]  kasan_save_free_info+0x4c/0x78
[   22.737904]  __kasan_mempool_poison_object+0xc0/0x150
[   22.738027]  mempool_free+0x28c/0x328
[   22.738112]  mempool_uaf_helper+0x104/0x340
[   22.738187]  mempool_kmalloc_uaf+0xc4/0x120
[   22.738321]  kunit_try_run_case+0x170/0x3f0
[   22.738413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.738504]  kthread+0x328/0x630
[   22.738573]  ret_from_fork+0x10/0x20
[   22.738654] 
[   22.738723] The buggy address belongs to the object at fff00000c7791300
[   22.738723]  which belongs to the cache kmalloc-128 of size 128
[   22.738891] The buggy address is located 0 bytes inside of
[   22.738891]  freed 128-byte region [fff00000c7791300, fff00000c7791380)
[   22.739106] 
[   22.739170] The buggy address belongs to the physical page:
[   22.739242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   22.739360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.739457] page_type: f5(slab)
[   22.739562] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.739671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.739753] page dumped because: kasan: bad access detected
[   22.739819] 
[   22.739853] Memory state around the buggy address:
[   22.740266]  fff00000c7791200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.740410]  fff00000c7791280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740834] >fff00000c7791300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.741011]                    ^
[   22.741135]  fff00000c7791380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.741375]  fff00000c7791400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.741476] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   22.637190] ==================================================================
[   22.637308] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   22.637401] Read of size 1 at addr fff00000c6423f73 by task kunit_try_catch/231
[   22.637456] 
[   22.637505] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.637606] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.637638] Hardware name: linux,dummy-virt (DT)
[   22.637674] Call trace:
[   22.637702]  show_stack+0x20/0x38 (C)
[   22.637759]  dump_stack_lvl+0x8c/0xd0
[   22.637813]  print_report+0x118/0x608
[   22.637863]  kasan_report+0xdc/0x128
[   22.637912]  __asan_report_load1_noabort+0x20/0x30
[   22.637966]  mempool_oob_right_helper+0x2ac/0x2f0
[   22.638027]  mempool_kmalloc_oob_right+0xc4/0x120
[   22.638157]  kunit_try_run_case+0x170/0x3f0
[   22.638262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.638365]  kthread+0x328/0x630
[   22.638456]  ret_from_fork+0x10/0x20
[   22.638525] 
[   22.638547] Allocated by task 231:
[   22.638579]  kasan_save_stack+0x3c/0x68
[   22.638626]  kasan_save_track+0x20/0x40
[   22.638667]  kasan_save_alloc_info+0x40/0x58
[   22.638707]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.638752]  remove_element+0x130/0x1f8
[   22.638791]  mempool_alloc_preallocated+0x58/0xc0
[   22.638828]  mempool_oob_right_helper+0x98/0x2f0
[   22.638866]  mempool_kmalloc_oob_right+0xc4/0x120
[   22.638904]  kunit_try_run_case+0x170/0x3f0
[   22.638941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.638983]  kthread+0x328/0x630
[   22.639014]  ret_from_fork+0x10/0x20
[   22.639076] 
[   22.639098] The buggy address belongs to the object at fff00000c6423f00
[   22.639098]  which belongs to the cache kmalloc-128 of size 128
[   22.639158] The buggy address is located 0 bytes to the right of
[   22.639158]  allocated 115-byte region [fff00000c6423f00, fff00000c6423f73)
[   22.639218] 
[   22.639241] The buggy address belongs to the physical page:
[   22.639275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   22.639328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.639383] page_type: f5(slab)
[   22.639430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.639481] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   22.639522] page dumped because: kasan: bad access detected
[   22.639554] 
[   22.639573] Memory state around the buggy address:
[   22.639607]  fff00000c6423e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.639651]  fff00000c6423e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.639693] >fff00000c6423f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.639731]                                                              ^
[   22.639770]  fff00000c6423f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.639810]  fff00000c6424000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.639848] ==================================================================
[   22.694754] ==================================================================
[   22.695001] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   22.695211] Read of size 1 at addr fff00000c63f02bb by task kunit_try_catch/235
[   22.695366] 
[   22.695481] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.695734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.695816] Hardware name: linux,dummy-virt (DT)
[   22.695914] Call trace:
[   22.695990]  show_stack+0x20/0x38 (C)
[   22.696101]  dump_stack_lvl+0x8c/0xd0
[   22.696200]  print_report+0x118/0x608
[   22.696367]  kasan_report+0xdc/0x128
[   22.696512]  __asan_report_load1_noabort+0x20/0x30
[   22.696691]  mempool_oob_right_helper+0x2ac/0x2f0
[   22.696851]  mempool_slab_oob_right+0xc0/0x118
[   22.697003]  kunit_try_run_case+0x170/0x3f0
[   22.697124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.697296]  kthread+0x328/0x630
[   22.697432]  ret_from_fork+0x10/0x20
[   22.697583] 
[   22.697647] Allocated by task 235:
[   22.697737]  kasan_save_stack+0x3c/0x68
[   22.697833]  kasan_save_track+0x20/0x40
[   22.697952]  kasan_save_alloc_info+0x40/0x58
[   22.698471]  __kasan_mempool_unpoison_object+0xbc/0x180
[   22.698679]  remove_element+0x16c/0x1f8
[   22.698767]  mempool_alloc_preallocated+0x58/0xc0
[   22.698885]  mempool_oob_right_helper+0x98/0x2f0
[   22.699005]  mempool_slab_oob_right+0xc0/0x118
[   22.699145]  kunit_try_run_case+0x170/0x3f0
[   22.699225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.699303]  kthread+0x328/0x630
[   22.699358]  ret_from_fork+0x10/0x20
[   22.699430] 
[   22.699472] The buggy address belongs to the object at fff00000c63f0240
[   22.699472]  which belongs to the cache test_cache of size 123
[   22.699602] The buggy address is located 0 bytes to the right of
[   22.699602]  allocated 123-byte region [fff00000c63f0240, fff00000c63f02bb)
[   22.699743] 
[   22.699794] The buggy address belongs to the physical page:
[   22.699893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0
[   22.700048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.700146] page_type: f5(slab)
[   22.700231] raw: 0bfffe0000000000 fff00000c7790140 dead000000000122 0000000000000000
[   22.700341] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   22.700441] page dumped because: kasan: bad access detected
[   22.700511] 
[   22.700567] Memory state around the buggy address:
[   22.700655]  fff00000c63f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.701472]  fff00000c63f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   22.701618] >fff00000c63f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   22.701745]                                         ^
[   22.701857]  fff00000c63f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.701988]  fff00000c63f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.702099] ==================================================================
[   22.664004] ==================================================================
[   22.664197] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   22.664345] Read of size 1 at addr fff00000c77be001 by task kunit_try_catch/233
[   22.664794] 
[   22.664911] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.665141] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.665213] Hardware name: linux,dummy-virt (DT)
[   22.665283] Call trace:
[   22.665335]  show_stack+0x20/0x38 (C)
[   22.665607]  dump_stack_lvl+0x8c/0xd0
[   22.665941]  print_report+0x118/0x608
[   22.666063]  kasan_report+0xdc/0x128
[   22.666172]  __asan_report_load1_noabort+0x20/0x30
[   22.666284]  mempool_oob_right_helper+0x2ac/0x2f0
[   22.666373]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   22.666468]  kunit_try_run_case+0x170/0x3f0
[   22.666804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.666938]  kthread+0x328/0x630
[   22.667050]  ret_from_fork+0x10/0x20
[   22.667717] 
[   22.667790] The buggy address belongs to the physical page:
[   22.667946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bc
[   22.668090] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.668534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.668776] page_type: f8(unknown)
[   22.669108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.669239] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.669368] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.669542] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.669728] head: 0bfffe0000000002 ffffc1ffc31def01 00000000ffffffff 00000000ffffffff
[   22.669892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.669988] page dumped because: kasan: bad access detected
[   22.670262] 
[   22.670375] Memory state around the buggy address:
[   22.670473]  fff00000c77bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.670573]  fff00000c77bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.670664] >fff00000c77be000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.671103]                    ^
[   22.671190]  fff00000c77be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.671297]  fff00000c77be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.671420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   22.071988] ==================================================================
[   22.072128] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   22.072239] Read of size 1 at addr fff00000c0cc5dc0 by task kunit_try_catch/225
[   22.072300] 
[   22.072353] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.072461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.072497] Hardware name: linux,dummy-virt (DT)
[   22.072544] Call trace:
[   22.072578]  show_stack+0x20/0x38 (C)
[   22.072643]  dump_stack_lvl+0x8c/0xd0
[   22.072704]  print_report+0x118/0x608
[   22.072760]  kasan_report+0xdc/0x128
[   22.072813]  __kasan_check_byte+0x54/0x70
[   22.072869]  kmem_cache_destroy+0x34/0x218
[   22.072925]  kmem_cache_double_destroy+0x174/0x300
[   22.072981]  kunit_try_run_case+0x170/0x3f0
[   22.073054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.073118]  kthread+0x328/0x630
[   22.073168]  ret_from_fork+0x10/0x20
[   22.073226] 
[   22.073249] Allocated by task 225:
[   22.073284]  kasan_save_stack+0x3c/0x68
[   22.073336]  kasan_save_track+0x20/0x40
[   22.073378]  kasan_save_alloc_info+0x40/0x58
[   22.073425]  __kasan_slab_alloc+0xa8/0xb0
[   22.073467]  kmem_cache_alloc_noprof+0x10c/0x398
[   22.073513]  __kmem_cache_create_args+0x178/0x280
[   22.073556]  kmem_cache_double_destroy+0xc0/0x300
[   22.073600]  kunit_try_run_case+0x170/0x3f0
[   22.073639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.073684]  kthread+0x328/0x630
[   22.073720]  ret_from_fork+0x10/0x20
[   22.073760] 
[   22.073780] Freed by task 225:
[   22.073811]  kasan_save_stack+0x3c/0x68
[   22.073851]  kasan_save_track+0x20/0x40
[   22.073891]  kasan_save_free_info+0x4c/0x78
[   22.073932]  __kasan_slab_free+0x6c/0x98
[   22.073973]  kmem_cache_free+0x260/0x468
[   22.074012]  slab_kmem_cache_release+0x38/0x50
[   22.074069]  kmem_cache_release+0x1c/0x30
[   22.074134]  kobject_put+0x17c/0x420
[   22.074178]  sysfs_slab_release+0x1c/0x30
[   22.074222]  kmem_cache_destroy+0x118/0x218
[   22.074263]  kmem_cache_double_destroy+0x128/0x300
[   22.074308]  kunit_try_run_case+0x170/0x3f0
[   22.074349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.074397]  kthread+0x328/0x630
[   22.074434]  ret_from_fork+0x10/0x20
[   22.074473] 
[   22.074496] The buggy address belongs to the object at fff00000c0cc5dc0
[   22.074496]  which belongs to the cache kmem_cache of size 208
[   22.074559] The buggy address is located 0 bytes inside of
[   22.074559]  freed 208-byte region [fff00000c0cc5dc0, fff00000c0cc5e90)
[   22.074628] 
[   22.074654] The buggy address belongs to the physical page:
[   22.074693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cc5
[   22.074756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.074818] page_type: f5(slab)
[   22.074873] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122
[   22.074929] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   22.074974] page dumped because: kasan: bad access detected
[   22.075010] 
[   22.075048] Memory state around the buggy address:
[   22.075092]  fff00000c0cc5c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.075141]  fff00000c0cc5d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   22.075189] >fff00000c0cc5d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   22.075229]                                            ^
[   22.075268]  fff00000c0cc5e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.075311]  fff00000c0cc5e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.075353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   21.970942] ==================================================================
[   21.971127] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   21.971234] Read of size 1 at addr fff00000c7700000 by task kunit_try_catch/223
[   21.971291] 
[   21.971342] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.971439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.971471] Hardware name: linux,dummy-virt (DT)
[   21.971510] Call trace:
[   21.971538]  show_stack+0x20/0x38 (C)
[   21.971601]  dump_stack_lvl+0x8c/0xd0
[   21.971660]  print_report+0x118/0x608
[   21.971713]  kasan_report+0xdc/0x128
[   21.971763]  __asan_report_load1_noabort+0x20/0x30
[   21.971817]  kmem_cache_rcu_uaf+0x388/0x468
[   21.971867]  kunit_try_run_case+0x170/0x3f0
[   21.971923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.971982]  kthread+0x328/0x630
[   21.972046]  ret_from_fork+0x10/0x20
[   21.972108] 
[   21.972130] Allocated by task 223:
[   21.972165]  kasan_save_stack+0x3c/0x68
[   21.972215]  kasan_save_track+0x20/0x40
[   21.972256]  kasan_save_alloc_info+0x40/0x58
[   21.972300]  __kasan_slab_alloc+0xa8/0xb0
[   21.972341]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.972387]  kmem_cache_rcu_uaf+0x12c/0x468
[   21.972430]  kunit_try_run_case+0x170/0x3f0
[   21.972470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.972517]  kthread+0x328/0x630
[   21.972574]  ret_from_fork+0x10/0x20
[   21.972615] 
[   21.972640] Freed by task 0:
[   21.972672]  kasan_save_stack+0x3c/0x68
[   21.972715]  kasan_save_track+0x20/0x40
[   21.972756]  kasan_save_free_info+0x4c/0x78
[   21.972799]  __kasan_slab_free+0x6c/0x98
[   21.972839]  slab_free_after_rcu_debug+0xd4/0x2f8
[   21.972883]  rcu_core+0x9f4/0x1e20
[   21.972925]  rcu_core_si+0x18/0x30
[   21.972962]  handle_softirqs+0x374/0xb28
[   21.973006]  __do_softirq+0x1c/0x28
[   21.973060] 
[   21.973083] Last potentially related work creation:
[   21.973113]  kasan_save_stack+0x3c/0x68
[   21.973156]  kasan_record_aux_stack+0xb4/0xc8
[   21.973202]  kmem_cache_free+0x120/0x468
[   21.973242]  kmem_cache_rcu_uaf+0x16c/0x468
[   21.973284]  kunit_try_run_case+0x170/0x3f0
[   21.973325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.973372]  kthread+0x328/0x630
[   21.973406]  ret_from_fork+0x10/0x20
[   21.973446] 
[   21.973466] The buggy address belongs to the object at fff00000c7700000
[   21.973466]  which belongs to the cache test_cache of size 200
[   21.973531] The buggy address is located 0 bytes inside of
[   21.973531]  freed 200-byte region [fff00000c7700000, fff00000c77000c8)
[   21.973597] 
[   21.973621] The buggy address belongs to the physical page:
[   21.973660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700
[   21.973720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.973776] page_type: f5(slab)
[   21.973822] raw: 0bfffe0000000000 fff00000c0cc5c80 dead000000000122 0000000000000000
[   21.973875] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   21.973915] page dumped because: kasan: bad access detected
[   21.973947] 
[   21.973964] Memory state around the buggy address:
[   21.973999]  fff00000c76fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.974055]  fff00000c76fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.974100] >fff00000c7700000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.974173]                    ^
[   21.974206]  fff00000c7700080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   21.974249]  fff00000c7700100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.974287] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   21.890959] ==================================================================
[   21.891117] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   21.891208] Free of addr fff00000c7784001 by task kunit_try_catch/221
[   21.891255] 
[   21.891421] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.891556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.891658] Hardware name: linux,dummy-virt (DT)
[   21.891734] Call trace:
[   21.891766]  show_stack+0x20/0x38 (C)
[   21.891830]  dump_stack_lvl+0x8c/0xd0
[   21.891888]  print_report+0x118/0x608
[   21.891945]  kasan_report_invalid_free+0xc0/0xe8
[   21.892011]  check_slab_allocation+0xfc/0x108
[   21.892086]  __kasan_slab_pre_free+0x2c/0x48
[   21.892142]  kmem_cache_free+0xf0/0x468
[   21.892196]  kmem_cache_invalid_free+0x184/0x3c8
[   21.892251]  kunit_try_run_case+0x170/0x3f0
[   21.892345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.892460]  kthread+0x328/0x630
[   21.892576]  ret_from_fork+0x10/0x20
[   21.892643] 
[   21.892666] Allocated by task 221:
[   21.892747]  kasan_save_stack+0x3c/0x68
[   21.892837]  kasan_save_track+0x20/0x40
[   21.892878]  kasan_save_alloc_info+0x40/0x58
[   21.892921]  __kasan_slab_alloc+0xa8/0xb0
[   21.892961]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.893002]  kmem_cache_invalid_free+0x12c/0x3c8
[   21.893077]  kunit_try_run_case+0x170/0x3f0
[   21.893163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.893312]  kthread+0x328/0x630
[   21.893502]  ret_from_fork+0x10/0x20
[   21.893705] 
[   21.893787] The buggy address belongs to the object at fff00000c7784000
[   21.893787]  which belongs to the cache test_cache of size 200
[   21.894211] The buggy address is located 1 bytes inside of
[   21.894211]  200-byte region [fff00000c7784000, fff00000c77840c8)
[   21.894361] 
[   21.894388] The buggy address belongs to the physical page:
[   21.894422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107784
[   21.894478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.894532] page_type: f5(slab)
[   21.894577] raw: 0bfffe0000000000 fff00000c5beddc0 dead000000000122 0000000000000000
[   21.894628] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   21.895524] page dumped because: kasan: bad access detected
[   21.895592] 
[   21.895698] Memory state around the buggy address:
[   21.895900]  fff00000c7783f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.895951]  fff00000c7783f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.895995] >fff00000c7784000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.896046]                    ^
[   21.896080]  fff00000c7784080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   21.896124]  fff00000c7784100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.896164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   21.860426] ==================================================================
[   21.860540] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   21.860631] Free of addr fff00000c770e000 by task kunit_try_catch/219
[   21.860684] 
[   21.860729] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.860833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.860868] Hardware name: linux,dummy-virt (DT)
[   21.860905] Call trace:
[   21.860933]  show_stack+0x20/0x38 (C)
[   21.860994]  dump_stack_lvl+0x8c/0xd0
[   21.861068]  print_report+0x118/0x608
[   21.861124]  kasan_report_invalid_free+0xc0/0xe8
[   21.861181]  check_slab_allocation+0xd4/0x108
[   21.861236]  __kasan_slab_pre_free+0x2c/0x48
[   21.861291]  kmem_cache_free+0xf0/0x468
[   21.861345]  kmem_cache_double_free+0x190/0x3c8
[   21.861399]  kunit_try_run_case+0x170/0x3f0
[   21.861453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.861510]  kthread+0x328/0x630
[   21.861558]  ret_from_fork+0x10/0x20
[   21.861615] 
[   21.861636] Allocated by task 219:
[   21.861670]  kasan_save_stack+0x3c/0x68
[   21.861717]  kasan_save_track+0x20/0x40
[   21.861757]  kasan_save_alloc_info+0x40/0x58
[   21.861801]  __kasan_slab_alloc+0xa8/0xb0
[   21.861841]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.861881]  kmem_cache_double_free+0x12c/0x3c8
[   21.861924]  kunit_try_run_case+0x170/0x3f0
[   21.861962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.862007]  kthread+0x328/0x630
[   21.862055]  ret_from_fork+0x10/0x20
[   21.862097] 
[   21.862118] Freed by task 219:
[   21.862148]  kasan_save_stack+0x3c/0x68
[   21.862189]  kasan_save_track+0x20/0x40
[   21.862228]  kasan_save_free_info+0x4c/0x78
[   21.862271]  __kasan_slab_free+0x6c/0x98
[   21.862310]  kmem_cache_free+0x260/0x468
[   21.862348]  kmem_cache_double_free+0x140/0x3c8
[   21.862389]  kunit_try_run_case+0x170/0x3f0
[   21.862429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.862503]  kthread+0x328/0x630
[   21.862541]  ret_from_fork+0x10/0x20
[   21.862580] 
[   21.862603] The buggy address belongs to the object at fff00000c770e000
[   21.862603]  which belongs to the cache test_cache of size 200
[   21.862667] The buggy address is located 0 bytes inside of
[   21.862667]  200-byte region [fff00000c770e000, fff00000c770e0c8)
[   21.862730] 
[   21.862753] The buggy address belongs to the physical page:
[   21.862789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770e
[   21.862849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.862908] page_type: f5(slab)
[   21.862958] raw: 0bfffe0000000000 fff00000c5bedc80 dead000000000122 0000000000000000
[   21.863012] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   21.863077] page dumped because: kasan: bad access detected
[   21.863113] 
[   21.863132] Memory state around the buggy address:
[   21.863170]  fff00000c770df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.863218]  fff00000c770df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.863265] >fff00000c770e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.863306]                    ^
[   21.863335]  fff00000c770e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   21.863381]  fff00000c770e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.863424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   21.724750] ==================================================================
[   21.724897] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   21.724984] Read of size 1 at addr fff00000c770c0c8 by task kunit_try_catch/217
[   21.725064] 
[   21.725114] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.725214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.725246] Hardware name: linux,dummy-virt (DT)
[   21.725281] Call trace:
[   21.725306]  show_stack+0x20/0x38 (C)
[   21.725365]  dump_stack_lvl+0x8c/0xd0
[   21.725419]  print_report+0x118/0x608
[   21.725469]  kasan_report+0xdc/0x128
[   21.725516]  __asan_report_load1_noabort+0x20/0x30
[   21.725570]  kmem_cache_oob+0x344/0x430
[   21.725617]  kunit_try_run_case+0x170/0x3f0
[   21.725666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.725721]  kthread+0x328/0x630
[   21.725767]  ret_from_fork+0x10/0x20
[   21.725818] 
[   21.725837] Allocated by task 217:
[   21.725868]  kasan_save_stack+0x3c/0x68
[   21.725913]  kasan_save_track+0x20/0x40
[   21.725954]  kasan_save_alloc_info+0x40/0x58
[   21.725993]  __kasan_slab_alloc+0xa8/0xb0
[   21.726044]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.726090]  kmem_cache_oob+0x12c/0x430
[   21.726126]  kunit_try_run_case+0x170/0x3f0
[   21.726164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.726205]  kthread+0x328/0x630
[   21.726238]  ret_from_fork+0x10/0x20
[   21.726273] 
[   21.726294] The buggy address belongs to the object at fff00000c770c000
[   21.726294]  which belongs to the cache test_cache of size 200
[   21.726353] The buggy address is located 0 bytes to the right of
[   21.726353]  allocated 200-byte region [fff00000c770c000, fff00000c770c0c8)
[   21.726416] 
[   21.726439] The buggy address belongs to the physical page:
[   21.726470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   21.726528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.726582] page_type: f5(slab)
[   21.726628] raw: 0bfffe0000000000 fff00000c5bedb40 dead000000000122 0000000000000000
[   21.726680] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   21.726722] page dumped because: kasan: bad access detected
[   21.726755] 
[   21.726772] Memory state around the buggy address:
[   21.726807]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.726853]  fff00000c770c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.726897] >fff00000c770c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   21.726936]                                               ^
[   21.726972]  fff00000c770c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.727016]  fff00000c770c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.727476] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   21.685965] ==================================================================
[   21.686102] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   21.686259] Read of size 8 at addr fff00000c7707100 by task kunit_try_catch/210
[   21.686316] 
[   21.686567] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.686713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.686844] Hardware name: linux,dummy-virt (DT)
[   21.687000] Call trace:
[   21.687084]  show_stack+0x20/0x38 (C)
[   21.687359]  dump_stack_lvl+0x8c/0xd0
[   21.687602]  print_report+0x118/0x608
[   21.687670]  kasan_report+0xdc/0x128
[   21.687771]  __asan_report_load8_noabort+0x20/0x30
[   21.688086]  workqueue_uaf+0x480/0x4a8
[   21.688341]  kunit_try_run_case+0x170/0x3f0
[   21.688560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.688755]  kthread+0x328/0x630
[   21.689145]  ret_from_fork+0x10/0x20
[   21.689280] 
[   21.689463] Allocated by task 210:
[   21.689597]  kasan_save_stack+0x3c/0x68
[   21.689740]  kasan_save_track+0x20/0x40
[   21.689792]  kasan_save_alloc_info+0x40/0x58
[   21.690114]  __kasan_kmalloc+0xd4/0xd8
[   21.690216]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.690314]  workqueue_uaf+0x13c/0x4a8
[   21.690552]  kunit_try_run_case+0x170/0x3f0
[   21.690610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.690660]  kthread+0x328/0x630
[   21.690753]  ret_from_fork+0x10/0x20
[   21.690807] 
[   21.690833] Freed by task 11:
[   21.690901]  kasan_save_stack+0x3c/0x68
[   21.690954]  kasan_save_track+0x20/0x40
[   21.691037]  kasan_save_free_info+0x4c/0x78
[   21.691258]  __kasan_slab_free+0x6c/0x98
[   21.691324]  kfree+0x214/0x3c8
[   21.691360]  workqueue_uaf_work+0x18/0x30
[   21.691404]  process_one_work+0x530/0xf98
[   21.691443]  worker_thread+0x618/0xf38
[   21.691483]  kthread+0x328/0x630
[   21.691514]  ret_from_fork+0x10/0x20
[   21.691552] 
[   21.692108] Last potentially related work creation:
[   21.692151]  kasan_save_stack+0x3c/0x68
[   21.692206]  kasan_record_aux_stack+0xb4/0xc8
[   21.692261]  __queue_work+0x65c/0xfe0
[   21.692304]  queue_work_on+0xbc/0xf8
[   21.692340]  workqueue_uaf+0x210/0x4a8
[   21.692381]  kunit_try_run_case+0x170/0x3f0
[   21.692422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.692470]  kthread+0x328/0x630
[   21.692507]  ret_from_fork+0x10/0x20
[   21.692557] 
[   21.692582] The buggy address belongs to the object at fff00000c7707100
[   21.692582]  which belongs to the cache kmalloc-32 of size 32
[   21.694252] The buggy address is located 0 bytes inside of
[   21.694252]  freed 32-byte region [fff00000c7707100, fff00000c7707120)
[   21.694362] 
[   21.694542] The buggy address belongs to the physical page:
[   21.694582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107707
[   21.694794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.694860] page_type: f5(slab)
[   21.694914] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.695149] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.695342] page dumped because: kasan: bad access detected
[   21.695561] 
[   21.695597] Memory state around the buggy address:
[   21.695640]  fff00000c7707000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   21.695693]  fff00000c7707080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   21.695761] >fff00000c7707100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.695806]                    ^
[   21.695839]  fff00000c7707180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.695888]  fff00000c7707200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.695933] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   21.658876] ==================================================================
[   21.659533] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   21.659630] Read of size 4 at addr fff00000c63e1f00 by task swapper/0/0
[   21.659680] 
[   21.659725] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.659822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.659852] Hardware name: linux,dummy-virt (DT)
[   21.659885] Call trace:
[   21.659921]  show_stack+0x20/0x38 (C)
[   21.660264]  dump_stack_lvl+0x8c/0xd0
[   21.660347]  print_report+0x118/0x608
[   21.660994]  kasan_report+0xdc/0x128
[   21.661092]  __asan_report_load4_noabort+0x20/0x30
[   21.661149]  rcu_uaf_reclaim+0x64/0x70
[   21.661202]  rcu_core+0x9f4/0x1e20
[   21.661255]  rcu_core_si+0x18/0x30
[   21.661302]  handle_softirqs+0x374/0xb28
[   21.661353]  __do_softirq+0x1c/0x28
[   21.661403]  ____do_softirq+0x18/0x30
[   21.661463]  call_on_irq_stack+0x24/0x30
[   21.661513]  do_softirq_own_stack+0x24/0x38
[   21.661568]  __irq_exit_rcu+0x1fc/0x318
[   21.661620]  irq_exit_rcu+0x1c/0x80
[   21.661664]  el1_interrupt+0x38/0x58
[   21.661717]  el1h_64_irq_handler+0x18/0x28
[   21.661766]  el1h_64_irq+0x6c/0x70
[   21.661897]  arch_local_irq_enable+0x4/0x8 (P)
[   21.661952]  do_idle+0x384/0x4e8
[   21.661996]  cpu_startup_entry+0x68/0x80
[   21.662680]  rest_init+0x160/0x188
[   21.662772]  start_kernel+0x30c/0x3d0
[   21.662836]  __primary_switched+0x8c/0xa0
[   21.662894] 
[   21.662915] Allocated by task 208:
[   21.662948]  kasan_save_stack+0x3c/0x68
[   21.662996]  kasan_save_track+0x20/0x40
[   21.663058]  kasan_save_alloc_info+0x40/0x58
[   21.663103]  __kasan_kmalloc+0xd4/0xd8
[   21.663141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.663184]  rcu_uaf+0xb0/0x2d8
[   21.663218]  kunit_try_run_case+0x170/0x3f0
[   21.663258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.663300]  kthread+0x328/0x630
[   21.663336]  ret_from_fork+0x10/0x20
[   21.663372] 
[   21.663394] Freed by task 0:
[   21.663435]  kasan_save_stack+0x3c/0x68
[   21.663497]  kasan_save_track+0x20/0x40
[   21.663538]  kasan_save_free_info+0x4c/0x78
[   21.663619]  __kasan_slab_free+0x6c/0x98
[   21.663693]  kfree+0x214/0x3c8
[   21.663737]  rcu_uaf_reclaim+0x28/0x70
[   21.663810]  rcu_core+0x9f4/0x1e20
[   21.663897]  rcu_core_si+0x18/0x30
[   21.663938]  handle_softirqs+0x374/0xb28
[   21.663976]  __do_softirq+0x1c/0x28
[   21.664012] 
[   21.664054] Last potentially related work creation:
[   21.664084]  kasan_save_stack+0x3c/0x68
[   21.664126]  kasan_record_aux_stack+0xb4/0xc8
[   21.664168]  __call_rcu_common.constprop.0+0x74/0x8c8
[   21.664212]  call_rcu+0x18/0x30
[   21.664261]  rcu_uaf+0x14c/0x2d8
[   21.664304]  kunit_try_run_case+0x170/0x3f0
[   21.664346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.664394]  kthread+0x328/0x630
[   21.664429]  ret_from_fork+0x10/0x20
[   21.664468] 
[   21.664490] The buggy address belongs to the object at fff00000c63e1f00
[   21.664490]  which belongs to the cache kmalloc-32 of size 32
[   21.664586] The buggy address is located 0 bytes inside of
[   21.664586]  freed 32-byte region [fff00000c63e1f00, fff00000c63e1f20)
[   21.664669] 
[   21.664695] The buggy address belongs to the physical page:
[   21.664815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e1
[   21.665125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.665411] page_type: f5(slab)
[   21.665579] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   21.665674] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.665839] page dumped because: kasan: bad access detected
[   21.665882] 
[   21.665904] Memory state around the buggy address:
[   21.666125]  fff00000c63e1e00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   21.666273]  fff00000c63e1e80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   21.666345] >fff00000c63e1f00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666384]                    ^
[   21.666416]  fff00000c63e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666461]  fff00000c63e2000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   21.666722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   21.400177] ==================================================================
[   21.400310] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   21.400425] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206
[   21.400562] 
[   21.400652] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.400875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.400953] Hardware name: linux,dummy-virt (DT)
[   21.401043] Call trace:
[   21.401098]  show_stack+0x20/0x38 (C)
[   21.401218]  dump_stack_lvl+0x8c/0xd0
[   21.401335]  print_report+0x118/0x608
[   21.401456]  kasan_report+0xdc/0x128
[   21.401576]  __asan_report_load1_noabort+0x20/0x30
[   21.401704]  ksize_uaf+0x598/0x5f8
[   21.401811]  kunit_try_run_case+0x170/0x3f0
[   21.401934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.403206]  kthread+0x328/0x630
[   21.403348]  ret_from_fork+0x10/0x20
[   21.403450] 
[   21.403485] Allocated by task 206:
[   21.403535]  kasan_save_stack+0x3c/0x68
[   21.403604]  kasan_save_track+0x20/0x40
[   21.403677]  kasan_save_alloc_info+0x40/0x58
[   21.404267]  __kasan_kmalloc+0xd4/0xd8
[   21.404491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.404920]  ksize_uaf+0xb8/0x5f8
[   21.405089]  kunit_try_run_case+0x170/0x3f0
[   21.405362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.405541]  kthread+0x328/0x630
[   21.405624]  ret_from_fork+0x10/0x20
[   21.405875] 
[   21.405940] Freed by task 206:
[   21.406164]  kasan_save_stack+0x3c/0x68
[   21.406254]  kasan_save_track+0x20/0x40
[   21.406351]  kasan_save_free_info+0x4c/0x78
[   21.407312]  __kasan_slab_free+0x6c/0x98
[   21.407407]  kfree+0x214/0x3c8
[   21.407871]  ksize_uaf+0x11c/0x5f8
[   21.408014]  kunit_try_run_case+0x170/0x3f0
[   21.408154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.408560]  kthread+0x328/0x630
[   21.408682]  ret_from_fork+0x10/0x20
[   21.408809] 
[   21.408966] The buggy address belongs to the object at fff00000c6423c00
[   21.408966]  which belongs to the cache kmalloc-128 of size 128
[   21.409442] The buggy address is located 0 bytes inside of
[   21.409442]  freed 128-byte region [fff00000c6423c00, fff00000c6423c80)
[   21.409721] 
[   21.409963] The buggy address belongs to the physical page:
[   21.410164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.410454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.410682] page_type: f5(slab)
[   21.410771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.411202] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.411312] page dumped because: kasan: bad access detected
[   21.411386] 
[   21.411440] Memory state around the buggy address:
[   21.411546]  fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.411674]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.411766] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.411881]                    ^
[   21.411968]  fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.412115]  fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.412238] ==================================================================
[   21.413491] ==================================================================
[   21.413648] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   21.413756] Read of size 1 at addr fff00000c6423c78 by task kunit_try_catch/206
[   21.413868] 
[   21.413943] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.414161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.414231] Hardware name: linux,dummy-virt (DT)
[   21.414303] Call trace:
[   21.414352]  show_stack+0x20/0x38 (C)
[   21.414457]  dump_stack_lvl+0x8c/0xd0
[   21.414564]  print_report+0x118/0x608
[   21.414672]  kasan_report+0xdc/0x128
[   21.414770]  __asan_report_load1_noabort+0x20/0x30
[   21.414887]  ksize_uaf+0x544/0x5f8
[   21.414986]  kunit_try_run_case+0x170/0x3f0
[   21.415104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.415222]  kthread+0x328/0x630
[   21.415318]  ret_from_fork+0x10/0x20
[   21.415427] 
[   21.415472] Allocated by task 206:
[   21.415536]  kasan_save_stack+0x3c/0x68
[   21.415624]  kasan_save_track+0x20/0x40
[   21.415739]  kasan_save_alloc_info+0x40/0x58
[   21.415825]  __kasan_kmalloc+0xd4/0xd8
[   21.415934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.416055]  ksize_uaf+0xb8/0x5f8
[   21.416151]  kunit_try_run_case+0x170/0x3f0
[   21.416245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.416332]  kthread+0x328/0x630
[   21.416404]  ret_from_fork+0x10/0x20
[   21.416497] 
[   21.416564] Freed by task 206:
[   21.416634]  kasan_save_stack+0x3c/0x68
[   21.416738]  kasan_save_track+0x20/0x40
[   21.416849]  kasan_save_free_info+0x4c/0x78
[   21.417111]  __kasan_slab_free+0x6c/0x98
[   21.417234]  kfree+0x214/0x3c8
[   21.417302]  ksize_uaf+0x11c/0x5f8
[   21.417361]  kunit_try_run_case+0x170/0x3f0
[   21.417457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.417542]  kthread+0x328/0x630
[   21.417636]  ret_from_fork+0x10/0x20
[   21.417709] 
[   21.417765] The buggy address belongs to the object at fff00000c6423c00
[   21.417765]  which belongs to the cache kmalloc-128 of size 128
[   21.417908] The buggy address is located 120 bytes inside of
[   21.417908]  freed 128-byte region [fff00000c6423c00, fff00000c6423c80)
[   21.418092] 
[   21.418135] The buggy address belongs to the physical page:
[   21.418217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.418340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.418448] page_type: f5(slab)
[   21.418550] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.418641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.418723] page dumped because: kasan: bad access detected
[   21.418798] 
[   21.418839] Memory state around the buggy address:
[   21.418900]  fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.419010]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.419109] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.419227]                                                                 ^
[   21.419358]  fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.419487]  fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.419611] ==================================================================
[   21.387913] ==================================================================
[   21.388079] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   21.388208] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206
[   21.388321] 
[   21.388404] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.388627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.388703] Hardware name: linux,dummy-virt (DT)
[   21.388782] Call trace:
[   21.388834]  show_stack+0x20/0x38 (C)
[   21.388948]  dump_stack_lvl+0x8c/0xd0
[   21.390851]  print_report+0x118/0x608
[   21.391151]  kasan_report+0xdc/0x128
[   21.391496]  __kasan_check_byte+0x54/0x70
[   21.391617]  ksize+0x30/0x88
[   21.391716]  ksize_uaf+0x168/0x5f8
[   21.391811]  kunit_try_run_case+0x170/0x3f0
[   21.391925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.392055]  kthread+0x328/0x630
[   21.392157]  ret_from_fork+0x10/0x20
[   21.392265] 
[   21.392311] Allocated by task 206:
[   21.392373]  kasan_save_stack+0x3c/0x68
[   21.392468]  kasan_save_track+0x20/0x40
[   21.392561]  kasan_save_alloc_info+0x40/0x58
[   21.392666]  __kasan_kmalloc+0xd4/0xd8
[   21.392781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.392886]  ksize_uaf+0xb8/0x5f8
[   21.392994]  kunit_try_run_case+0x170/0x3f0
[   21.393090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.393181]  kthread+0x328/0x630
[   21.394082]  ret_from_fork+0x10/0x20
[   21.394203] 
[   21.394283] Freed by task 206:
[   21.394392]  kasan_save_stack+0x3c/0x68
[   21.394480]  kasan_save_track+0x20/0x40
[   21.394559]  kasan_save_free_info+0x4c/0x78
[   21.394671]  __kasan_slab_free+0x6c/0x98
[   21.394760]  kfree+0x214/0x3c8
[   21.394843]  ksize_uaf+0x11c/0x5f8
[   21.394909]  kunit_try_run_case+0x170/0x3f0
[   21.394982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.395078]  kthread+0x328/0x630
[   21.395152]  ret_from_fork+0x10/0x20
[   21.395230] 
[   21.395272] The buggy address belongs to the object at fff00000c6423c00
[   21.395272]  which belongs to the cache kmalloc-128 of size 128
[   21.395788] The buggy address is located 0 bytes inside of
[   21.395788]  freed 128-byte region [fff00000c6423c00, fff00000c6423c80)
[   21.396282] 
[   21.396393] The buggy address belongs to the physical page:
[   21.396484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.396642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.396782] page_type: f5(slab)
[   21.396870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.397244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.397389] page dumped because: kasan: bad access detected
[   21.397517] 
[   21.397556] Memory state around the buggy address:
[   21.397645]  fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.397920]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.398016] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.398188]                    ^
[   21.398286]  fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.398380]  fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.398468] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   21.352553] ==================================================================
[   21.352810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   21.353210] Read of size 1 at addr fff00000c6423b78 by task kunit_try_catch/204
[   21.353457] 
[   21.353678] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.354178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.354226] Hardware name: linux,dummy-virt (DT)
[   21.354302] Call trace:
[   21.354384]  show_stack+0x20/0x38 (C)
[   21.354552]  dump_stack_lvl+0x8c/0xd0
[   21.354684]  print_report+0x118/0x608
[   21.354810]  kasan_report+0xdc/0x128
[   21.354925]  __asan_report_load1_noabort+0x20/0x30
[   21.355209]  ksize_unpoisons_memory+0x618/0x740
[   21.355336]  kunit_try_run_case+0x170/0x3f0
[   21.355438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.355550]  kthread+0x328/0x630
[   21.355670]  ret_from_fork+0x10/0x20
[   21.355792] 
[   21.355832] Allocated by task 204:
[   21.355896]  kasan_save_stack+0x3c/0x68
[   21.356000]  kasan_save_track+0x20/0x40
[   21.356106]  kasan_save_alloc_info+0x40/0x58
[   21.356200]  __kasan_kmalloc+0xd4/0xd8
[   21.356295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.356396]  ksize_unpoisons_memory+0xc0/0x740
[   21.356493]  kunit_try_run_case+0x170/0x3f0
[   21.356597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.356730]  kthread+0x328/0x630
[   21.356813]  ret_from_fork+0x10/0x20
[   21.356914] 
[   21.356986] The buggy address belongs to the object at fff00000c6423b00
[   21.356986]  which belongs to the cache kmalloc-128 of size 128
[   21.357138] The buggy address is located 5 bytes to the right of
[   21.357138]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.357301] 
[   21.357356] The buggy address belongs to the physical page:
[   21.357867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.358141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.358259] page_type: f5(slab)
[   21.358342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.358458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.358562] page dumped because: kasan: bad access detected
[   21.358637] 
[   21.358679] Memory state around the buggy address:
[   21.358753]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.358854]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358957] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.359528]                                                                 ^
[   21.359834]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.360109]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.360337] ==================================================================
[   21.339912] ==================================================================
[   21.340100] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   21.340246] Read of size 1 at addr fff00000c6423b73 by task kunit_try_catch/204
[   21.340364] 
[   21.340450] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.340692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.340777] Hardware name: linux,dummy-virt (DT)
[   21.340853] Call trace:
[   21.340908]  show_stack+0x20/0x38 (C)
[   21.341671]  dump_stack_lvl+0x8c/0xd0
[   21.342116]  print_report+0x118/0x608
[   21.342381]  kasan_report+0xdc/0x128
[   21.342612]  __asan_report_load1_noabort+0x20/0x30
[   21.342820]  ksize_unpoisons_memory+0x628/0x740
[   21.343161]  kunit_try_run_case+0x170/0x3f0
[   21.343349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.343476]  kthread+0x328/0x630
[   21.343609]  ret_from_fork+0x10/0x20
[   21.343742] 
[   21.343833] Allocated by task 204:
[   21.343940]  kasan_save_stack+0x3c/0x68
[   21.344295]  kasan_save_track+0x20/0x40
[   21.344433]  kasan_save_alloc_info+0x40/0x58
[   21.344549]  __kasan_kmalloc+0xd4/0xd8
[   21.344638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.344804]  ksize_unpoisons_memory+0xc0/0x740
[   21.345016]  kunit_try_run_case+0x170/0x3f0
[   21.345412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.345610]  kthread+0x328/0x630
[   21.345733]  ret_from_fork+0x10/0x20
[   21.346042] 
[   21.346124] The buggy address belongs to the object at fff00000c6423b00
[   21.346124]  which belongs to the cache kmalloc-128 of size 128
[   21.346305] The buggy address is located 0 bytes to the right of
[   21.346305]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.346725] 
[   21.346777] The buggy address belongs to the physical page:
[   21.346852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.347004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.347124] page_type: f5(slab)
[   21.347340] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.347711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.347892] page dumped because: kasan: bad access detected
[   21.347962] 
[   21.348003] Memory state around the buggy address:
[   21.348085]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.348281]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.348469] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.348758]                                                              ^
[   21.348861]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349035]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349260] ==================================================================
[   21.362704] ==================================================================
[   21.362810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   21.363136] Read of size 1 at addr fff00000c6423b7f by task kunit_try_catch/204
[   21.363361] 
[   21.363439] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.363651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.363718] Hardware name: linux,dummy-virt (DT)
[   21.363843] Call trace:
[   21.363906]  show_stack+0x20/0x38 (C)
[   21.364102]  dump_stack_lvl+0x8c/0xd0
[   21.364245]  print_report+0x118/0x608
[   21.364378]  kasan_report+0xdc/0x128
[   21.364515]  __asan_report_load1_noabort+0x20/0x30
[   21.364659]  ksize_unpoisons_memory+0x690/0x740
[   21.364784]  kunit_try_run_case+0x170/0x3f0
[   21.364893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.365353]  kthread+0x328/0x630
[   21.365523]  ret_from_fork+0x10/0x20
[   21.365659] 
[   21.365696] Allocated by task 204:
[   21.365771]  kasan_save_stack+0x3c/0x68
[   21.365857]  kasan_save_track+0x20/0x40
[   21.365957]  kasan_save_alloc_info+0x40/0x58
[   21.366120]  __kasan_kmalloc+0xd4/0xd8
[   21.366201]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.366348]  ksize_unpoisons_memory+0xc0/0x740
[   21.366482]  kunit_try_run_case+0x170/0x3f0
[   21.366565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.366661]  kthread+0x328/0x630
[   21.366734]  ret_from_fork+0x10/0x20
[   21.366828] 
[   21.366889] The buggy address belongs to the object at fff00000c6423b00
[   21.366889]  which belongs to the cache kmalloc-128 of size 128
[   21.367057] The buggy address is located 12 bytes to the right of
[   21.367057]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.367230] 
[   21.367295] The buggy address belongs to the physical page:
[   21.367404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.367582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.367715] page_type: f5(slab)
[   21.367829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.368000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.368155] page dumped because: kasan: bad access detected
[   21.368237] 
[   21.368272] Memory state around the buggy address:
[   21.368335]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.368452]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368560] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.368659]                                                                 ^
[   21.368751]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368850]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   21.303968] ==================================================================
[   21.304178] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   21.304314] Free of addr fff00000c6058180 by task kunit_try_catch/202
[   21.304408] 
[   21.304487] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.304726] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.304802] Hardware name: linux,dummy-virt (DT)
[   21.304886] Call trace:
[   21.305149]  show_stack+0x20/0x38 (C)
[   21.305279]  dump_stack_lvl+0x8c/0xd0
[   21.305734]  print_report+0x118/0x608
[   21.305867]  kasan_report_invalid_free+0xc0/0xe8
[   21.306013]  check_slab_allocation+0xd4/0x108
[   21.306250]  __kasan_slab_pre_free+0x2c/0x48
[   21.306399]  kfree+0xe8/0x3c8
[   21.306602]  kfree_sensitive+0x3c/0xb0
[   21.306918]  kmalloc_double_kzfree+0x168/0x308
[   21.307060]  kunit_try_run_case+0x170/0x3f0
[   21.307176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.307420]  kthread+0x328/0x630
[   21.307632]  ret_from_fork+0x10/0x20
[   21.307972] 
[   21.308031] Allocated by task 202:
[   21.308171]  kasan_save_stack+0x3c/0x68
[   21.308381]  kasan_save_track+0x20/0x40
[   21.308748]  kasan_save_alloc_info+0x40/0x58
[   21.308915]  __kasan_kmalloc+0xd4/0xd8
[   21.309003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.309172]  kmalloc_double_kzfree+0xb8/0x308
[   21.309271]  kunit_try_run_case+0x170/0x3f0
[   21.309370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.309476]  kthread+0x328/0x630
[   21.309561]  ret_from_fork+0x10/0x20
[   21.309647] 
[   21.309700] Freed by task 202:
[   21.309767]  kasan_save_stack+0x3c/0x68
[   21.309862]  kasan_save_track+0x20/0x40
[   21.310150]  kasan_save_free_info+0x4c/0x78
[   21.310323]  __kasan_slab_free+0x6c/0x98
[   21.310579]  kfree+0x214/0x3c8
[   21.310726]  kfree_sensitive+0x80/0xb0
[   21.310986]  kmalloc_double_kzfree+0x11c/0x308
[   21.311348]  kunit_try_run_case+0x170/0x3f0
[   21.311454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.311583]  kthread+0x328/0x630
[   21.311660]  ret_from_fork+0x10/0x20
[   21.311895] 
[   21.311979] The buggy address belongs to the object at fff00000c6058180
[   21.311979]  which belongs to the cache kmalloc-16 of size 16
[   21.312160] The buggy address is located 0 bytes inside of
[   21.312160]  16-byte region [fff00000c6058180, fff00000c6058190)
[   21.312316] 
[   21.312375] The buggy address belongs to the physical page:
[   21.312454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   21.312604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.313065] page_type: f5(slab)
[   21.313172] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.313697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.313813] page dumped because: kasan: bad access detected
[   21.314136] 
[   21.314212] Memory state around the buggy address:
[   21.314460]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   21.314738]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.314912] >fff00000c6058180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314996]                    ^
[   21.315298]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.315468]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.315623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   21.282169] ==================================================================
[   21.282342] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   21.282485] Read of size 1 at addr fff00000c6058180 by task kunit_try_catch/202
[   21.282977] 
[   21.283205] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.283466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.283536] Hardware name: linux,dummy-virt (DT)
[   21.283606] Call trace:
[   21.283703]  show_stack+0x20/0x38 (C)
[   21.283977]  dump_stack_lvl+0x8c/0xd0
[   21.284296]  print_report+0x118/0x608
[   21.284577]  kasan_report+0xdc/0x128
[   21.284716]  __kasan_check_byte+0x54/0x70
[   21.285181]  kfree_sensitive+0x30/0xb0
[   21.285311]  kmalloc_double_kzfree+0x168/0x308
[   21.285555]  kunit_try_run_case+0x170/0x3f0
[   21.285917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.286053]  kthread+0x328/0x630
[   21.286248]  ret_from_fork+0x10/0x20
[   21.286517] 
[   21.286562] Allocated by task 202:
[   21.286631]  kasan_save_stack+0x3c/0x68
[   21.286924]  kasan_save_track+0x20/0x40
[   21.287195]  kasan_save_alloc_info+0x40/0x58
[   21.287432]  __kasan_kmalloc+0xd4/0xd8
[   21.287555]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.287646]  kmalloc_double_kzfree+0xb8/0x308
[   21.287741]  kunit_try_run_case+0x170/0x3f0
[   21.287838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.287948]  kthread+0x328/0x630
[   21.288042]  ret_from_fork+0x10/0x20
[   21.288139] 
[   21.288187] Freed by task 202:
[   21.288259]  kasan_save_stack+0x3c/0x68
[   21.288357]  kasan_save_track+0x20/0x40
[   21.288875]  kasan_save_free_info+0x4c/0x78
[   21.289146]  __kasan_slab_free+0x6c/0x98
[   21.289244]  kfree+0x214/0x3c8
[   21.289372]  kfree_sensitive+0x80/0xb0
[   21.289840]  kmalloc_double_kzfree+0x11c/0x308
[   21.289962]  kunit_try_run_case+0x170/0x3f0
[   21.290115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.290248]  kthread+0x328/0x630
[   21.290409]  ret_from_fork+0x10/0x20
[   21.290500] 
[   21.290544] The buggy address belongs to the object at fff00000c6058180
[   21.290544]  which belongs to the cache kmalloc-16 of size 16
[   21.290660] The buggy address is located 0 bytes inside of
[   21.290660]  freed 16-byte region [fff00000c6058180, fff00000c6058190)
[   21.290805] 
[   21.290853] The buggy address belongs to the physical page:
[   21.290956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   21.291403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.291605] page_type: f5(slab)
[   21.291742] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.292146] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.292272] page dumped because: kasan: bad access detected
[   21.292439] 
[   21.292507] Memory state around the buggy address:
[   21.292718]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   21.293044]  fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.293167] >fff00000c6058180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.293926]                    ^
[   21.294202]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.294322]  fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.294758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   21.225430] ==================================================================
[   21.225614] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   21.225766] Read of size 1 at addr fff00000c0b94228 by task kunit_try_catch/198
[   21.225893] 
[   21.226879] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.227698] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.227793] Hardware name: linux,dummy-virt (DT)
[   21.227939] Call trace:
[   21.227996]  show_stack+0x20/0x38 (C)
[   21.228379]  dump_stack_lvl+0x8c/0xd0
[   21.229468]  print_report+0x118/0x608
[   21.230053]  kasan_report+0xdc/0x128
[   21.230472]  __asan_report_load1_noabort+0x20/0x30
[   21.230911]  kmalloc_uaf2+0x3f4/0x468
[   21.231107]  kunit_try_run_case+0x170/0x3f0
[   21.231438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.231712]  kthread+0x328/0x630
[   21.231872]  ret_from_fork+0x10/0x20
[   21.232003] 
[   21.232058] Allocated by task 198:
[   21.232134]  kasan_save_stack+0x3c/0x68
[   21.232505]  kasan_save_track+0x20/0x40
[   21.232854]  kasan_save_alloc_info+0x40/0x58
[   21.233505]  __kasan_kmalloc+0xd4/0xd8
[   21.234001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.234250]  kmalloc_uaf2+0xc4/0x468
[   21.234388]  kunit_try_run_case+0x170/0x3f0
[   21.235094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.235267]  kthread+0x328/0x630
[   21.235516]  ret_from_fork+0x10/0x20
[   21.235613] 
[   21.235656] Freed by task 198:
[   21.235721]  kasan_save_stack+0x3c/0x68
[   21.235807]  kasan_save_track+0x20/0x40
[   21.236748]  kasan_save_free_info+0x4c/0x78
[   21.237123]  __kasan_slab_free+0x6c/0x98
[   21.237740]  kfree+0x214/0x3c8
[   21.237959]  kmalloc_uaf2+0x134/0x468
[   21.238310]  kunit_try_run_case+0x170/0x3f0
[   21.238420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.238726]  kthread+0x328/0x630
[   21.238961]  ret_from_fork+0x10/0x20
[   21.239459] 
[   21.239572] The buggy address belongs to the object at fff00000c0b94200
[   21.239572]  which belongs to the cache kmalloc-64 of size 64
[   21.239919] The buggy address is located 40 bytes inside of
[   21.239919]  freed 64-byte region [fff00000c0b94200, fff00000c0b94240)
[   21.240366] 
[   21.240571] The buggy address belongs to the physical page:
[   21.240657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b94
[   21.241537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.242053] page_type: f5(slab)
[   21.242163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.242269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.242330] page dumped because: kasan: bad access detected
[   21.242363] 
[   21.242381] Memory state around the buggy address:
[   21.242420]  fff00000c0b94100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.242465]  fff00000c0b94180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.242509] >fff00000c0b94200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.242547]                                   ^
[   21.242581]  fff00000c0b94280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   21.242624]  fff00000c0b94300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.242663] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   21.180379] ==================================================================
[   21.180737] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   21.180901] Write of size 33 at addr fff00000c0b94080 by task kunit_try_catch/196
[   21.181047] 
[   21.181762] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.182067] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.182786] Hardware name: linux,dummy-virt (DT)
[   21.182948] Call trace:
[   21.183081]  show_stack+0x20/0x38 (C)
[   21.183236]  dump_stack_lvl+0x8c/0xd0
[   21.183778]  print_report+0x118/0x608
[   21.184262]  kasan_report+0xdc/0x128
[   21.184573]  kasan_check_range+0x100/0x1a8
[   21.184751]  __asan_memset+0x34/0x78
[   21.185273]  kmalloc_uaf_memset+0x170/0x310
[   21.185488]  kunit_try_run_case+0x170/0x3f0
[   21.185616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185952]  kthread+0x328/0x630
[   21.186407]  ret_from_fork+0x10/0x20
[   21.186546] 
[   21.186593] Allocated by task 196:
[   21.186667]  kasan_save_stack+0x3c/0x68
[   21.186777]  kasan_save_track+0x20/0x40
[   21.186871]  kasan_save_alloc_info+0x40/0x58
[   21.187250]  __kasan_kmalloc+0xd4/0xd8
[   21.187959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.188522]  kmalloc_uaf_memset+0xb8/0x310
[   21.188726]  kunit_try_run_case+0x170/0x3f0
[   21.188843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.188970]  kthread+0x328/0x630
[   21.189537]  ret_from_fork+0x10/0x20
[   21.189704] 
[   21.189762] Freed by task 196:
[   21.189898]  kasan_save_stack+0x3c/0x68
[   21.190000]  kasan_save_track+0x20/0x40
[   21.190158]  kasan_save_free_info+0x4c/0x78
[   21.190341]  __kasan_slab_free+0x6c/0x98
[   21.190442]  kfree+0x214/0x3c8
[   21.190512]  kmalloc_uaf_memset+0x11c/0x310
[   21.190590]  kunit_try_run_case+0x170/0x3f0
[   21.190672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191235]  kthread+0x328/0x630
[   21.191340]  ret_from_fork+0x10/0x20
[   21.191598] 
[   21.191652] The buggy address belongs to the object at fff00000c0b94080
[   21.191652]  which belongs to the cache kmalloc-64 of size 64
[   21.192215] The buggy address is located 0 bytes inside of
[   21.192215]  freed 64-byte region [fff00000c0b94080, fff00000c0b940c0)
[   21.192625] 
[   21.192712] The buggy address belongs to the physical page:
[   21.192952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b94
[   21.193204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.193428] page_type: f5(slab)
[   21.193542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.194085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.194264] page dumped because: kasan: bad access detected
[   21.194359] 
[   21.194477] Memory state around the buggy address:
[   21.194562]  fff00000c0b93f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.194966]  fff00000c0b94000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.195109] >fff00000c0b94080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.195424]                    ^
[   21.195502]  fff00000c0b94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195711]  fff00000c0b94180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   21.159769] ==================================================================
[   21.160036] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   21.160217] Read of size 1 at addr fff00000c6058168 by task kunit_try_catch/194
[   21.160367] 
[   21.160496] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.160827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.160908] Hardware name: linux,dummy-virt (DT)
[   21.160997] Call trace:
[   21.161064]  show_stack+0x20/0x38 (C)
[   21.161181]  dump_stack_lvl+0x8c/0xd0
[   21.161294]  print_report+0x118/0x608
[   21.161419]  kasan_report+0xdc/0x128
[   21.161541]  __asan_report_load1_noabort+0x20/0x30
[   21.161650]  kmalloc_uaf+0x300/0x338
[   21.161752]  kunit_try_run_case+0x170/0x3f0
[   21.161866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.162006]  kthread+0x328/0x630
[   21.162180]  ret_from_fork+0x10/0x20
[   21.162319] 
[   21.162389] Allocated by task 194:
[   21.162526]  kasan_save_stack+0x3c/0x68
[   21.162667]  kasan_save_track+0x20/0x40
[   21.162794]  kasan_save_alloc_info+0x40/0x58
[   21.162893]  __kasan_kmalloc+0xd4/0xd8
[   21.162966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.163055]  kmalloc_uaf+0xb8/0x338
[   21.163153]  kunit_try_run_case+0x170/0x3f0
[   21.163240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.163328]  kthread+0x328/0x630
[   21.163397]  ret_from_fork+0x10/0x20
[   21.163484] 
[   21.163528] Freed by task 194:
[   21.163590]  kasan_save_stack+0x3c/0x68
[   21.163677]  kasan_save_track+0x20/0x40
[   21.163782]  kasan_save_free_info+0x4c/0x78
[   21.163886]  __kasan_slab_free+0x6c/0x98
[   21.163989]  kfree+0x214/0x3c8
[   21.164129]  kmalloc_uaf+0x11c/0x338
[   21.164220]  kunit_try_run_case+0x170/0x3f0
[   21.164315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.164415]  kthread+0x328/0x630
[   21.164497]  ret_from_fork+0x10/0x20
[   21.164595] 
[   21.164651] The buggy address belongs to the object at fff00000c6058160
[   21.164651]  which belongs to the cache kmalloc-16 of size 16
[   21.164785] The buggy address is located 8 bytes inside of
[   21.164785]  freed 16-byte region [fff00000c6058160, fff00000c6058170)
[   21.164919] 
[   21.164972] The buggy address belongs to the physical page:
[   21.165089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   21.165290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.165457] page_type: f5(slab)
[   21.165549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.165714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.165861] page dumped because: kasan: bad access detected
[   21.165973] 
[   21.166029] Memory state around the buggy address:
[   21.166142]  fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   21.166240]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   21.166330] >fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.166413]                                                           ^
[   21.166502]  fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166644]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   21.140978] ==================================================================
[   21.141174] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.141311] Read of size 64 at addr fff00000c7705d84 by task kunit_try_catch/192
[   21.141415] 
[   21.141534] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.141746] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.141822] Hardware name: linux,dummy-virt (DT)
[   21.141901] Call trace:
[   21.141965]  show_stack+0x20/0x38 (C)
[   21.142138]  dump_stack_lvl+0x8c/0xd0
[   21.142240]  print_report+0x118/0x608
[   21.142334]  kasan_report+0xdc/0x128
[   21.142426]  kasan_check_range+0x100/0x1a8
[   21.142551]  __asan_memmove+0x3c/0x98
[   21.142657]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.142839]  kunit_try_run_case+0x170/0x3f0
[   21.142967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.143096]  kthread+0x328/0x630
[   21.143180]  ret_from_fork+0x10/0x20
[   21.143282] 
[   21.143328] Allocated by task 192:
[   21.143390]  kasan_save_stack+0x3c/0x68
[   21.143495]  kasan_save_track+0x20/0x40
[   21.143611]  kasan_save_alloc_info+0x40/0x58
[   21.143746]  __kasan_kmalloc+0xd4/0xd8
[   21.143824]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.143898]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   21.144011]  kunit_try_run_case+0x170/0x3f0
[   21.144154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.144252]  kthread+0x328/0x630
[   21.144331]  ret_from_fork+0x10/0x20
[   21.144426] 
[   21.144490] The buggy address belongs to the object at fff00000c7705d80
[   21.144490]  which belongs to the cache kmalloc-64 of size 64
[   21.144700] The buggy address is located 4 bytes inside of
[   21.144700]  allocated 64-byte region [fff00000c7705d80, fff00000c7705dc0)
[   21.144993] 
[   21.145053] The buggy address belongs to the physical page:
[   21.145143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107705
[   21.145298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.145443] page_type: f5(slab)
[   21.145540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.145672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.145819] page dumped because: kasan: bad access detected
[   21.145900] 
[   21.145942] Memory state around the buggy address:
[   21.146722]  fff00000c7705c80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.146865]  fff00000c7705d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.146966] >fff00000c7705d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.147069]                                            ^
[   21.147161]  fff00000c7705e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.147256]  fff00000c7705e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.147347] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   20.474363] ==================================================================
[   20.474603] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   20.474796] Read of size 18446744073709551614 at addr fff00000ffe9c004 by task kunit_try_catch/190
[   20.475421] 
[   20.475542] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.475750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.475819] Hardware name: linux,dummy-virt (DT)
[   20.475894] Call trace:
[   20.475947]  show_stack+0x20/0x38 (C)
[   20.476069]  dump_stack_lvl+0x8c/0xd0
[   20.476173]  print_report+0x118/0x608
[   20.476267]  kasan_report+0xdc/0x128
[   20.476400]  kasan_check_range+0x100/0x1a8
[   20.476543]  __asan_memmove+0x3c/0x98
[   20.476694]  kmalloc_memmove_negative_size+0x154/0x2e0
[   20.476815]  kunit_try_run_case+0x170/0x3f0
[   20.476919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.477054]  kthread+0x328/0x630
[   20.477160]  ret_from_fork+0x10/0x20
[   20.477308] 
[   20.477399] Allocated by task 2846403498:
[   20.477907] ------------[ cut here ]------------
[   20.478034] pool index 44973 out of bounds (214) for stack id adacafae
[   20.480984] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190
[   21.007519] Modules linked in:
[   21.009094] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.009981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.010343] Hardware name: linux,dummy-virt (DT)
[   21.010954] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.011609] pc : depot_fetch_stack+0x6c/0x90
[   21.011974] lr : depot_fetch_stack+0x6c/0x90
[   21.012457] sp : ffff8000809a7a20
[   21.012855] x29: ffff8000809a7a20 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.013811] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.014478] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.015130] x20: fff00000ffe9c004 x19: ffff8000809a7b30 x18: 0000000069a4f0ae
[   21.015757] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007
[   21.016456] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010134ea1
[   21.017249] x11: 1ffff00010134ea0 x10: ffff700010134ea0 x9 : ffffacab756eba6c
[   21.017973] x8 : ffff8000809a7507 x7 : 0000000000000001 x6 : ffff700010134ea0
[   21.018609] x5 : ffff8000809a7500 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.019251] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.019946] Call trace:
[   21.020283]  depot_fetch_stack+0x6c/0x90 (P)
[   21.020687]  stack_depot_print+0x24/0x60
[   21.021120]  print_report+0x5e4/0x608
[   21.021503]  kasan_report+0xdc/0x128
[   21.021847]  kasan_check_range+0x100/0x1a8
[   21.022306]  __asan_memmove+0x3c/0x98
[   21.022683]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.023187]  kunit_try_run_case+0x170/0x3f0
[   21.023537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.024045]  kthread+0x328/0x630
[   21.024401]  ret_from_fork+0x10/0x20
[   21.024974] ---[ end trace 0000000000000000 ]---
[   21.025902] ------------[ cut here ]------------
[   21.025975] corrupt handle or use after stack_depot_put()
[   21.026097] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190
[   21.027202] Modules linked in:
[   21.027672] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.028479] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.028924] Hardware name: linux,dummy-virt (DT)
[   21.029295] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.029822] pc : stack_depot_print+0x54/0x60
[   21.030307] lr : stack_depot_print+0x54/0x60
[   21.030654] sp : ffff8000809a7a30
[   21.030960] x29: ffff8000809a7a30 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.031606] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.032279] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.033057] x20: fff00000ffe9c004 x19: ffff8000809a7b30 x18: 0000000069a4f0ae
[   21.033723] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   21.034463] x14: ffff700010134f26 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5
[   21.035149] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c
[   21.035756] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4
[   21.036511] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.037288] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.038070] Call trace:
[   21.038301]  stack_depot_print+0x54/0x60 (P)
[   21.038725]  print_report+0x5e4/0x608
[   21.039164]  kasan_report+0xdc/0x128
[   21.039550]  kasan_check_range+0x100/0x1a8
[   21.039929]  __asan_memmove+0x3c/0x98
[   21.040355]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.040827]  kunit_try_run_case+0x170/0x3f0
[   21.041272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.041733]  kthread+0x328/0x630
[   21.042141]  ret_from_fork+0x10/0x20
[   21.042502] ---[ end trace 0000000000000000 ]---
[   21.042971] 
[   21.043053] Last potentially related work creation:
[   21.043142] ------------[ cut here ]------------
[   21.043198] pool index 43945 out of bounds (214) for stack id a9a8abaa
[   21.043410] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190
[   21.044947] Modules linked in:
[   21.045425] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.046040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.046431] Hardware name: linux,dummy-virt (DT)
[   21.046871] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.047439] pc : depot_fetch_stack+0x6c/0x90
[   21.047885] lr : depot_fetch_stack+0x6c/0x90
[   21.048354] sp : ffff8000809a7a00
[   21.048639] x29: ffff8000809a7a00 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.049424] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.050160] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.050759] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae
[   21.051504] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007
[   21.052231] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75956f8b17c5
[   21.052935] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c
[   21.053608] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4
[   21.054185] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.054779] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.055394] Call trace:
[   21.055715]  depot_fetch_stack+0x6c/0x90 (P)
[   21.056248]  stack_depot_print+0x24/0x60
[   21.056748]  kasan_print_aux_stacks+0x50/0x98
[   21.057188]  print_report+0x348/0x608
[   21.057585]  kasan_report+0xdc/0x128
[   21.058055]  kasan_check_range+0x100/0x1a8
[   21.058427]  __asan_memmove+0x3c/0x98
[   21.058886]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.059390]  kunit_try_run_case+0x170/0x3f0
[   21.059802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.060336]  kthread+0x328/0x630
[   21.060690]  ret_from_fork+0x10/0x20
[   21.061158] ---[ end trace 0000000000000000 ]---
[   21.061556] ------------[ cut here ]------------
[   21.061629] corrupt handle or use after stack_depot_put()
[   21.061785] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190
[   21.063173] Modules linked in:
[   21.063657] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.064510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.065053] Hardware name: linux,dummy-virt (DT)
[   21.065485] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.066149] pc : stack_depot_print+0x54/0x60
[   21.066517] lr : stack_depot_print+0x54/0x60
[   21.066988] sp : ffff8000809a7a10
[   21.067321] x29: ffff8000809a7a10 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.068157] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.068815] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.069386] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae
[   21.070205] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   21.070947] x14: ffff700010134f22 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5
[   21.071670] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c
[   21.072331] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4
[   21.072987] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.073633] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.074436] Call trace:
[   21.074645]  stack_depot_print+0x54/0x60 (P)
[   21.075195]  kasan_print_aux_stacks+0x50/0x98
[   21.075689]  print_report+0x348/0x608
[   21.076194]  kasan_report+0xdc/0x128
[   21.076671]  kasan_check_range+0x100/0x1a8
[   21.077214]  __asan_memmove+0x3c/0x98
[   21.077722]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.078207]  kunit_try_run_case+0x170/0x3f0
[   21.078702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.079246]  kthread+0x328/0x630
[   21.079540]  ret_from_fork+0x10/0x20
[   21.080062] ---[ end trace 0000000000000000 ]---
[   21.080675] 
[   21.080760] Second to last potentially related work creation:
[   21.080842] ------------[ cut here ]------------
[   21.080926] pool index 44973 out of bounds (214) for stack id adacafae
[   21.081156] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190
[   21.083031] Modules linked in:
[   21.083550] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.084319] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.084843] Hardware name: linux,dummy-virt (DT)
[   21.085158] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.085852] pc : depot_fetch_stack+0x6c/0x90
[   21.086279] lr : depot_fetch_stack+0x6c/0x90
[   21.086683] sp : ffff8000809a7a00
[   21.087027] x29: ffff8000809a7a00 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.087717] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.088389] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.089232] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae
[   21.089912] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007
[   21.090622] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75956f8b17c5
[   21.091322] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c
[   21.092068] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4
[   21.092920] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.093617] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.094309] Call trace:
[   21.094576]  depot_fetch_stack+0x6c/0x90 (P)
[   21.095081]  stack_depot_print+0x24/0x60
[   21.095524]  kasan_print_aux_stacks+0x78/0x98
[   21.095887]  print_report+0x348/0x608
[   21.096188]  kasan_report+0xdc/0x128
[   21.096713]  kasan_check_range+0x100/0x1a8
[   21.097193]  __asan_memmove+0x3c/0x98
[   21.097628]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.098139]  kunit_try_run_case+0x170/0x3f0
[   21.098489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.099084]  kthread+0x328/0x630
[   21.099455]  ret_from_fork+0x10/0x20
[   21.099833] ---[ end trace 0000000000000000 ]---
[   21.100271] ------------[ cut here ]------------
[   21.100345] corrupt handle or use after stack_depot_put()
[   21.100507] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190
[   21.102007] Modules linked in:
[   21.102523] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.103214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.103515] Hardware name: linux,dummy-virt (DT)
[   21.103975] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   21.104523] pc : stack_depot_print+0x54/0x60
[   21.105033] lr : stack_depot_print+0x54/0x60
[   21.105461] sp : ffff8000809a7a10
[   21.105812] x29: ffff8000809a7a10 x28: ffffacab7ce6f000 x27: 1ffff00010010f60
[   21.106409] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc
[   21.107217] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8
[   21.107980] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae
[   21.108606] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   21.109219] x14: ffff700010134f22 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5
[   21.109968] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c
[   21.110578] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4
[   21.111304] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000
[   21.111681] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0
[   21.112449] Call trace:
[   21.112732]  stack_depot_print+0x54/0x60 (P)
[   21.113242]  kasan_print_aux_stacks+0x78/0x98
[   21.113701]  print_report+0x348/0x608
[   21.114155]  kasan_report+0xdc/0x128
[   21.114491]  kasan_check_range+0x100/0x1a8
[   21.114906]  __asan_memmove+0x3c/0x98
[   21.115376]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.115823]  kunit_try_run_case+0x170/0x3f0
[   21.116255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.116735]  kthread+0x328/0x630
[   21.117101]  ret_from_fork+0x10/0x20
[   21.117497] ---[ end trace 0000000000000000 ]---
[   21.117945] 
[   21.118045] The buggy address belongs to the object at fff00000ffe9c000
[   21.118045]  which belongs to the cache kmalloc-64 of size 64
[   21.118169] The buggy address is located 4 bytes inside of
[   21.118169]  64-byte region [fff00000ffe9c000, fff00000ffe9c040)
[   21.118294] 
[   21.118355] The buggy address belongs to the physical page:
[   21.118423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe9c
[   21.118543] memcg:fff00000d9d64169
[   21.118598] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff)
[   21.118713] page_type: f5(slab)
[   21.118786] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ffa708 0000000000000000
[   21.118838] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d64169
[   21.118880] page dumped because: kasan: bad access detected
[   21.118913] 
[   21.118931] Memory state around the buggy address:
[   21.118968]  fff00000ffe9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.119011]  fff00000ffe9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.119083] >fff00000ffe9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.119122]                    ^
[   21.119153]  fff00000ffe9c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.119196]  fff00000ffe9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.119235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   20.440824] ==================================================================
[   20.440960] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   20.441154] Write of size 16 at addr fff00000c6423a69 by task kunit_try_catch/188
[   20.441288] 
[   20.441547] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.442336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.442395] Hardware name: linux,dummy-virt (DT)
[   20.442467] Call trace:
[   20.443068]  show_stack+0x20/0x38 (C)
[   20.443246]  dump_stack_lvl+0x8c/0xd0
[   20.443590]  print_report+0x118/0x608
[   20.443746]  kasan_report+0xdc/0x128
[   20.443887]  kasan_check_range+0x100/0x1a8
[   20.444050]  __asan_memset+0x34/0x78
[   20.444192]  kmalloc_oob_memset_16+0x150/0x2f8
[   20.444343]  kunit_try_run_case+0x170/0x3f0
[   20.444468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.444636]  kthread+0x328/0x630
[   20.444776]  ret_from_fork+0x10/0x20
[   20.444934] 
[   20.444996] Allocated by task 188:
[   20.445067]  kasan_save_stack+0x3c/0x68
[   20.445153]  kasan_save_track+0x20/0x40
[   20.445789]  kasan_save_alloc_info+0x40/0x58
[   20.446025]  __kasan_kmalloc+0xd4/0xd8
[   20.446297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.446384]  kmalloc_oob_memset_16+0xb0/0x2f8
[   20.446501]  kunit_try_run_case+0x170/0x3f0
[   20.446698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.446805]  kthread+0x328/0x630
[   20.446872]  ret_from_fork+0x10/0x20
[   20.446947] 
[   20.446993] The buggy address belongs to the object at fff00000c6423a00
[   20.446993]  which belongs to the cache kmalloc-128 of size 128
[   20.447133] The buggy address is located 105 bytes inside of
[   20.447133]  allocated 120-byte region [fff00000c6423a00, fff00000c6423a78)
[   20.447269] 
[   20.447313] The buggy address belongs to the physical page:
[   20.447379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   20.447494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.447600] page_type: f5(slab)
[   20.447685] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.447794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.447890] page dumped because: kasan: bad access detected
[   20.447955] 
[   20.447993] Memory state around the buggy address:
[   20.448151]  fff00000c6423900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.448248]  fff00000c6423980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.448707] >fff00000c6423a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.448872]                                                                 ^
[   20.448993]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.449137]  fff00000c6423b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.449218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   20.417506] ==================================================================
[   20.417739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   20.418026] Write of size 8 at addr fff00000c6423971 by task kunit_try_catch/186
[   20.418317] 
[   20.418411] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.418648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.418724] Hardware name: linux,dummy-virt (DT)
[   20.418778] Call trace:
[   20.418818]  show_stack+0x20/0x38 (C)
[   20.418924]  dump_stack_lvl+0x8c/0xd0
[   20.419113]  print_report+0x118/0x608
[   20.419321]  kasan_report+0xdc/0x128
[   20.419520]  kasan_check_range+0x100/0x1a8
[   20.419778]  __asan_memset+0x34/0x78
[   20.420063]  kmalloc_oob_memset_8+0x150/0x2f8
[   20.420237]  kunit_try_run_case+0x170/0x3f0
[   20.420595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.420851]  kthread+0x328/0x630
[   20.421114]  ret_from_fork+0x10/0x20
[   20.421226] 
[   20.421276] Allocated by task 186:
[   20.421621]  kasan_save_stack+0x3c/0x68
[   20.421720]  kasan_save_track+0x20/0x40
[   20.421951]  kasan_save_alloc_info+0x40/0x58
[   20.422118]  __kasan_kmalloc+0xd4/0xd8
[   20.422194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.422275]  kmalloc_oob_memset_8+0xb0/0x2f8
[   20.422358]  kunit_try_run_case+0x170/0x3f0
[   20.422552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.422771]  kthread+0x328/0x630
[   20.422947]  ret_from_fork+0x10/0x20
[   20.423055] 
[   20.423277] The buggy address belongs to the object at fff00000c6423900
[   20.423277]  which belongs to the cache kmalloc-128 of size 128
[   20.423412] The buggy address is located 113 bytes inside of
[   20.423412]  allocated 120-byte region [fff00000c6423900, fff00000c6423978)
[   20.423536] 
[   20.423579] The buggy address belongs to the physical page:
[   20.423764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   20.424002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.424254] page_type: f5(slab)
[   20.424402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.424767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.424861] page dumped because: kasan: bad access detected
[   20.424931] 
[   20.424972] Memory state around the buggy address:
[   20.425054]  fff00000c6423800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.425152]  fff00000c6423880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.425288] >fff00000c6423900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.425362]                                                                 ^
[   20.425569]  fff00000c6423980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.425891]  fff00000c6423a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.425974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   20.386992] ==================================================================
[   20.387257] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   20.387620] Write of size 4 at addr fff00000c6423875 by task kunit_try_catch/184
[   20.387694] 
[   20.387768] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.388045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.388128] Hardware name: linux,dummy-virt (DT)
[   20.388227] Call trace:
[   20.388279]  show_stack+0x20/0x38 (C)
[   20.388379]  dump_stack_lvl+0x8c/0xd0
[   20.388467]  print_report+0x118/0x608
[   20.388566]  kasan_report+0xdc/0x128
[   20.388664]  kasan_check_range+0x100/0x1a8
[   20.388771]  __asan_memset+0x34/0x78
[   20.388893]  kmalloc_oob_memset_4+0x150/0x300
[   20.389002]  kunit_try_run_case+0x170/0x3f0
[   20.389123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.389239]  kthread+0x328/0x630
[   20.389752]  ret_from_fork+0x10/0x20
[   20.390155] 
[   20.390203] Allocated by task 184:
[   20.390433]  kasan_save_stack+0x3c/0x68
[   20.390537]  kasan_save_track+0x20/0x40
[   20.390624]  kasan_save_alloc_info+0x40/0x58
[   20.390703]  __kasan_kmalloc+0xd4/0xd8
[   20.390853]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.391045]  kmalloc_oob_memset_4+0xb0/0x300
[   20.391145]  kunit_try_run_case+0x170/0x3f0
[   20.391505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.391598]  kthread+0x328/0x630
[   20.391672]  ret_from_fork+0x10/0x20
[   20.391830] 
[   20.391900] The buggy address belongs to the object at fff00000c6423800
[   20.391900]  which belongs to the cache kmalloc-128 of size 128
[   20.392095] The buggy address is located 117 bytes inside of
[   20.392095]  allocated 120-byte region [fff00000c6423800, fff00000c6423878)
[   20.392591] 
[   20.392692] The buggy address belongs to the physical page:
[   20.392761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   20.393119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.393346] page_type: f5(slab)
[   20.393445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.393765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.393957] page dumped because: kasan: bad access detected
[   20.394032] 
[   20.394068] Memory state around the buggy address:
[   20.394276]  fff00000c6423700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.394388]  fff00000c6423780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.394489] >fff00000c6423800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.394578]                                                                 ^
[   20.394761]  fff00000c6423880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.394931]  fff00000c6423900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.395101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   20.356906] ==================================================================
[   20.357064] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   20.357192] Write of size 2 at addr fff00000c6423777 by task kunit_try_catch/182
[   20.357303] 
[   20.357383] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.357568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.357624] Hardware name: linux,dummy-virt (DT)
[   20.357694] Call trace:
[   20.357746]  show_stack+0x20/0x38 (C)
[   20.357855]  dump_stack_lvl+0x8c/0xd0
[   20.357966]  print_report+0x118/0x608
[   20.358751]  kasan_report+0xdc/0x128
[   20.358971]  kasan_check_range+0x100/0x1a8
[   20.359083]  __asan_memset+0x34/0x78
[   20.359498]  kmalloc_oob_memset_2+0x150/0x2f8
[   20.359584]  kunit_try_run_case+0x170/0x3f0
[   20.359680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.359878]  kthread+0x328/0x630
[   20.360112]  ret_from_fork+0x10/0x20
[   20.360458] 
[   20.360507] Allocated by task 182:
[   20.360682]  kasan_save_stack+0x3c/0x68
[   20.360801]  kasan_save_track+0x20/0x40
[   20.361428]  kasan_save_alloc_info+0x40/0x58
[   20.361615]  __kasan_kmalloc+0xd4/0xd8
[   20.361791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.361901]  kmalloc_oob_memset_2+0xb0/0x2f8
[   20.362246]  kunit_try_run_case+0x170/0x3f0
[   20.362431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.362522]  kthread+0x328/0x630
[   20.362592]  ret_from_fork+0x10/0x20
[   20.362723] 
[   20.362800] The buggy address belongs to the object at fff00000c6423700
[   20.362800]  which belongs to the cache kmalloc-128 of size 128
[   20.363063] The buggy address is located 119 bytes inside of
[   20.363063]  allocated 120-byte region [fff00000c6423700, fff00000c6423778)
[   20.363453] 
[   20.363503] The buggy address belongs to the physical page:
[   20.363765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   20.364229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.364541] page_type: f5(slab)
[   20.364900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.365054] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.365151] page dumped because: kasan: bad access detected
[   20.365220] 
[   20.365261] Memory state around the buggy address:
[   20.365332]  fff00000c6423600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.365425]  fff00000c6423680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.365523] >fff00000c6423700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.365607]                                                                 ^
[   20.365695]  fff00000c6423780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.365787]  fff00000c6423800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.365870] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   20.330169] ==================================================================
[   20.330406] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   20.330674] Write of size 128 at addr fff00000c6423600 by task kunit_try_catch/180
[   20.330910] 
[   20.331063] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.331238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.331294] Hardware name: linux,dummy-virt (DT)
[   20.331361] Call trace:
[   20.331870]  show_stack+0x20/0x38 (C)
[   20.332056]  dump_stack_lvl+0x8c/0xd0
[   20.332305]  print_report+0x118/0x608
[   20.332484]  kasan_report+0xdc/0x128
[   20.332698]  kasan_check_range+0x100/0x1a8
[   20.332922]  __asan_memset+0x34/0x78
[   20.333093]  kmalloc_oob_in_memset+0x144/0x2d0
[   20.333282]  kunit_try_run_case+0x170/0x3f0
[   20.333471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.333907]  kthread+0x328/0x630
[   20.334000]  ret_from_fork+0x10/0x20
[   20.334124] 
[   20.334162] Allocated by task 180:
[   20.334218]  kasan_save_stack+0x3c/0x68
[   20.334547]  kasan_save_track+0x20/0x40
[   20.334675]  kasan_save_alloc_info+0x40/0x58
[   20.334749]  __kasan_kmalloc+0xd4/0xd8
[   20.334884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.335075]  kmalloc_oob_in_memset+0xb0/0x2d0
[   20.335253]  kunit_try_run_case+0x170/0x3f0
[   20.335687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.335926]  kthread+0x328/0x630
[   20.336007]  ret_from_fork+0x10/0x20
[   20.336314] 
[   20.336457] The buggy address belongs to the object at fff00000c6423600
[   20.336457]  which belongs to the cache kmalloc-128 of size 128
[   20.336627] The buggy address is located 0 bytes inside of
[   20.336627]  allocated 120-byte region [fff00000c6423600, fff00000c6423678)
[   20.337009] 
[   20.337085] The buggy address belongs to the physical page:
[   20.337157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   20.337307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.337413] page_type: f5(slab)
[   20.337498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.337606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.337693] page dumped because: kasan: bad access detected
[   20.337763] 
[   20.337800] Memory state around the buggy address:
[   20.337867]  fff00000c6423500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.337962]  fff00000c6423580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.338168] >fff00000c6423600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.338395]                                                                 ^
[   20.338472]  fff00000c6423680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.338544]  fff00000c6423700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.338612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   20.308888] ==================================================================
[   20.309050] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   20.309194] Read of size 16 at addr fff00000c6058140 by task kunit_try_catch/178
[   20.309320] 
[   20.309404] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.309602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.309661] Hardware name: linux,dummy-virt (DT)
[   20.309731] Call trace:
[   20.309781]  show_stack+0x20/0x38 (C)
[   20.309893]  dump_stack_lvl+0x8c/0xd0
[   20.310002]  print_report+0x118/0x608
[   20.310110]  kasan_report+0xdc/0x128
[   20.310201]  __asan_report_load16_noabort+0x20/0x30
[   20.310314]  kmalloc_uaf_16+0x3bc/0x438
[   20.310419]  kunit_try_run_case+0x170/0x3f0
[   20.310543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.310645]  kthread+0x328/0x630
[   20.310735]  ret_from_fork+0x10/0x20
[   20.310844] 
[   20.310877] Allocated by task 178:
[   20.310939]  kasan_save_stack+0x3c/0x68
[   20.311043]  kasan_save_track+0x20/0x40
[   20.311138]  kasan_save_alloc_info+0x40/0x58
[   20.311261]  __kasan_kmalloc+0xd4/0xd8
[   20.311328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.311448]  kmalloc_uaf_16+0x140/0x438
[   20.311555]  kunit_try_run_case+0x170/0x3f0
[   20.311667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.311789]  kthread+0x328/0x630
[   20.311887]  ret_from_fork+0x10/0x20
[   20.311990] 
[   20.312046] Freed by task 178:
[   20.312098]  kasan_save_stack+0x3c/0x68
[   20.312165]  kasan_save_track+0x20/0x40
[   20.312226]  kasan_save_free_info+0x4c/0x78
[   20.312303]  __kasan_slab_free+0x6c/0x98
[   20.312399]  kfree+0x214/0x3c8
[   20.312503]  kmalloc_uaf_16+0x190/0x438
[   20.312631]  kunit_try_run_case+0x170/0x3f0
[   20.312757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.312889]  kthread+0x328/0x630
[   20.312970]  ret_from_fork+0x10/0x20
[   20.313096] 
[   20.313159] The buggy address belongs to the object at fff00000c6058140
[   20.313159]  which belongs to the cache kmalloc-16 of size 16
[   20.313340] The buggy address is located 0 bytes inside of
[   20.313340]  freed 16-byte region [fff00000c6058140, fff00000c6058150)
[   20.313501] 
[   20.313559] The buggy address belongs to the physical page:
[   20.313658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   20.313828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.313943] page_type: f5(slab)
[   20.314322] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.314448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.314530] page dumped because: kasan: bad access detected
[   20.314594] 
[   20.314635] Memory state around the buggy address:
[   20.314708]  fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   20.314815]  fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   20.314950] >fff00000c6058100: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   20.315076]                                            ^
[   20.315188]  fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.315269]  fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.315337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   20.283460] ==================================================================
[   20.283621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   20.283752] Write of size 16 at addr fff00000c60580e0 by task kunit_try_catch/176
[   20.283869] 
[   20.283948] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.284162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.284227] Hardware name: linux,dummy-virt (DT)
[   20.284299] Call trace:
[   20.284352]  show_stack+0x20/0x38 (C)
[   20.284473]  dump_stack_lvl+0x8c/0xd0
[   20.284605]  print_report+0x118/0x608
[   20.284721]  kasan_report+0xdc/0x128
[   20.284830]  __asan_report_store16_noabort+0x20/0x30
[   20.284944]  kmalloc_oob_16+0x3a0/0x3f8
[   20.285091]  kunit_try_run_case+0x170/0x3f0
[   20.285201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.285347]  kthread+0x328/0x630
[   20.285446]  ret_from_fork+0x10/0x20
[   20.285609] 
[   20.285668] Allocated by task 176:
[   20.285754]  kasan_save_stack+0x3c/0x68
[   20.285877]  kasan_save_track+0x20/0x40
[   20.285986]  kasan_save_alloc_info+0x40/0x58
[   20.286128]  __kasan_kmalloc+0xd4/0xd8
[   20.286203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.286292]  kmalloc_oob_16+0xb4/0x3f8
[   20.286369]  kunit_try_run_case+0x170/0x3f0
[   20.286450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.287127]  kthread+0x328/0x630
[   20.287242]  ret_from_fork+0x10/0x20
[   20.287316] 
[   20.287365] The buggy address belongs to the object at fff00000c60580e0
[   20.287365]  which belongs to the cache kmalloc-16 of size 16
[   20.287487] The buggy address is located 0 bytes inside of
[   20.287487]  allocated 13-byte region [fff00000c60580e0, fff00000c60580ed)
[   20.287665] 
[   20.287706] The buggy address belongs to the physical page:
[   20.288089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   20.288221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.288626] page_type: f5(slab)
[   20.288782] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.288896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.288982] page dumped because: kasan: bad access detected
[   20.289051] 
[   20.289086] Memory state around the buggy address:
[   20.289152]  fff00000c6057f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.289252]  fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   20.289348] >fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   20.289434]                                                           ^
[   20.289518]  fff00000c6058100: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.290171]  fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.290337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   20.249291] ==================================================================
[   20.249683] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   20.250178] Read of size 1 at addr fff00000c59a9000 by task kunit_try_catch/174
[   20.250599] 
[   20.250830] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.251174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.251239] Hardware name: linux,dummy-virt (DT)
[   20.251857] Call trace:
[   20.252039]  show_stack+0x20/0x38 (C)
[   20.252263]  dump_stack_lvl+0x8c/0xd0
[   20.252385]  print_report+0x118/0x608
[   20.252639]  kasan_report+0xdc/0x128
[   20.253164]  __asan_report_load1_noabort+0x20/0x30
[   20.253371]  krealloc_uaf+0x4c8/0x520
[   20.253494]  kunit_try_run_case+0x170/0x3f0
[   20.253606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.253719]  kthread+0x328/0x630
[   20.253814]  ret_from_fork+0x10/0x20
[   20.253928] 
[   20.253968] Allocated by task 174:
[   20.254381]  kasan_save_stack+0x3c/0x68
[   20.254604]  kasan_save_track+0x20/0x40
[   20.254713]  kasan_save_alloc_info+0x40/0x58
[   20.254990]  __kasan_kmalloc+0xd4/0xd8
[   20.255306]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.255406]  krealloc_uaf+0xc8/0x520
[   20.255485]  kunit_try_run_case+0x170/0x3f0
[   20.255566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.255660]  kthread+0x328/0x630
[   20.255732]  ret_from_fork+0x10/0x20
[   20.255809] 
[   20.255851] Freed by task 174:
[   20.255910]  kasan_save_stack+0x3c/0x68
[   20.255995]  kasan_save_track+0x20/0x40
[   20.256096]  kasan_save_free_info+0x4c/0x78
[   20.256972]  __kasan_slab_free+0x6c/0x98
[   20.257871]  kfree+0x214/0x3c8
[   20.258614]  krealloc_uaf+0x12c/0x520
[   20.258731]  kunit_try_run_case+0x170/0x3f0
[   20.258922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259034]  kthread+0x328/0x630
[   20.259137]  ret_from_fork+0x10/0x20
[   20.259221] 
[   20.259266] The buggy address belongs to the object at fff00000c59a9000
[   20.259266]  which belongs to the cache kmalloc-256 of size 256
[   20.259478] The buggy address is located 0 bytes inside of
[   20.259478]  freed 256-byte region [fff00000c59a9000, fff00000c59a9100)
[   20.260217] 
[   20.260288] The buggy address belongs to the physical page:
[   20.260368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.260744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.260886] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.261276] page_type: f5(slab)
[   20.261384] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.261535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.262008] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.262139] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.262478] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.262778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.263092] page dumped because: kasan: bad access detected
[   20.263163] 
[   20.263211] Memory state around the buggy address:
[   20.263288]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263392]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263490] >fff00000c59a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.263574]                    ^
[   20.263799]  fff00000c59a9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.264063]  fff00000c59a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.264251] ==================================================================
[   20.232221] ==================================================================
[   20.232407] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   20.232546] Read of size 1 at addr fff00000c59a9000 by task kunit_try_catch/174
[   20.232667] 
[   20.232751] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.233007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.233077] Hardware name: linux,dummy-virt (DT)
[   20.233191] Call trace:
[   20.233274]  show_stack+0x20/0x38 (C)
[   20.233467]  dump_stack_lvl+0x8c/0xd0
[   20.233573]  print_report+0x118/0x608
[   20.233910]  kasan_report+0xdc/0x128
[   20.234448]  __kasan_check_byte+0x54/0x70
[   20.234943]  krealloc_noprof+0x44/0x360
[   20.235510]  krealloc_uaf+0x180/0x520
[   20.235624]  kunit_try_run_case+0x170/0x3f0
[   20.235883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.236662]  kthread+0x328/0x630
[   20.236961]  ret_from_fork+0x10/0x20
[   20.237093] 
[   20.237601] Allocated by task 174:
[   20.237899]  kasan_save_stack+0x3c/0x68
[   20.238035]  kasan_save_track+0x20/0x40
[   20.238201]  kasan_save_alloc_info+0x40/0x58
[   20.238314]  __kasan_kmalloc+0xd4/0xd8
[   20.238508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.238596]  krealloc_uaf+0xc8/0x520
[   20.238677]  kunit_try_run_case+0x170/0x3f0
[   20.239068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.239180]  kthread+0x328/0x630
[   20.239380]  ret_from_fork+0x10/0x20
[   20.239914] 
[   20.240025] Freed by task 174:
[   20.240119]  kasan_save_stack+0x3c/0x68
[   20.240217]  kasan_save_track+0x20/0x40
[   20.240302]  kasan_save_free_info+0x4c/0x78
[   20.240388]  __kasan_slab_free+0x6c/0x98
[   20.241002]  kfree+0x214/0x3c8
[   20.241121]  krealloc_uaf+0x12c/0x520
[   20.241206]  kunit_try_run_case+0x170/0x3f0
[   20.241291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.241387]  kthread+0x328/0x630
[   20.241458]  ret_from_fork+0x10/0x20
[   20.242283] 
[   20.242381] The buggy address belongs to the object at fff00000c59a9000
[   20.242381]  which belongs to the cache kmalloc-256 of size 256
[   20.242854] The buggy address is located 0 bytes inside of
[   20.242854]  freed 256-byte region [fff00000c59a9000, fff00000c59a9100)
[   20.243032] 
[   20.243097] The buggy address belongs to the physical page:
[   20.243232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.243618] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.243978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.244149] page_type: f5(slab)
[   20.244241] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.244342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.244455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.245210] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.245749] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.245970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.246289] page dumped because: kasan: bad access detected
[   20.246470] 
[   20.246537] Memory state around the buggy address:
[   20.246636]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.246730]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.247016] >fff00000c59a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.247118]                    ^
[   20.247216]  fff00000c59a9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.247755]  fff00000c59a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.248000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   19.995477] ==================================================================
[   19.995613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.995722] Write of size 1 at addr fff00000c59a8ec9 by task kunit_try_catch/168
[   19.995961] 
[   19.996080] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.996316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.996377] Hardware name: linux,dummy-virt (DT)
[   19.996468] Call trace:
[   19.996524]  show_stack+0x20/0x38 (C)
[   19.996650]  dump_stack_lvl+0x8c/0xd0
[   19.996751]  print_report+0x118/0x608
[   19.996851]  kasan_report+0xdc/0x128
[   19.997075]  __asan_report_store1_noabort+0x20/0x30
[   19.997193]  krealloc_less_oob_helper+0xa48/0xc50
[   19.997301]  krealloc_less_oob+0x20/0x38
[   19.997394]  kunit_try_run_case+0x170/0x3f0
[   19.997496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.997610]  kthread+0x328/0x630
[   19.997701]  ret_from_fork+0x10/0x20
[   19.997809] 
[   19.997847] Allocated by task 168:
[   19.997907]  kasan_save_stack+0x3c/0x68
[   19.998028]  kasan_save_track+0x20/0x40
[   19.998096]  kasan_save_alloc_info+0x40/0x58
[   19.998164]  __kasan_krealloc+0x118/0x178
[   19.998236]  krealloc_noprof+0x128/0x360
[   19.998330]  krealloc_less_oob_helper+0x168/0xc50
[   19.998407]  krealloc_less_oob+0x20/0x38
[   19.998482]  kunit_try_run_case+0x170/0x3f0
[   19.998653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.998783]  kthread+0x328/0x630
[   19.998877]  ret_from_fork+0x10/0x20
[   19.998944] 
[   19.998986] The buggy address belongs to the object at fff00000c59a8e00
[   19.998986]  which belongs to the cache kmalloc-256 of size 256
[   19.999137] The buggy address is located 0 bytes to the right of
[   19.999137]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   19.999303] 
[   19.999349] The buggy address belongs to the physical page:
[   19.999419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.999556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.999645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.999764] page_type: f5(slab)
[   19.999911] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.000209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.000301] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.000386] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.000479] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.000591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.000692] page dumped because: kasan: bad access detected
[   20.000802] 
[   20.000843] Memory state around the buggy address:
[   20.000935]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001041]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.001137] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.001219]                                               ^
[   20.001289]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001381]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.001464] ==================================================================
[   20.003742] ==================================================================
[   20.003856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.004478] Write of size 1 at addr fff00000c59a8ed0 by task kunit_try_catch/168
[   20.004609] 
[   20.004699] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.004892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.004955] Hardware name: linux,dummy-virt (DT)
[   20.005030] Call trace:
[   20.005076]  show_stack+0x20/0x38 (C)
[   20.005186]  dump_stack_lvl+0x8c/0xd0
[   20.005291]  print_report+0x118/0x608
[   20.005394]  kasan_report+0xdc/0x128
[   20.005495]  __asan_report_store1_noabort+0x20/0x30
[   20.005612]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.005724]  krealloc_less_oob+0x20/0x38
[   20.005829]  kunit_try_run_case+0x170/0x3f0
[   20.005936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.006950]  kthread+0x328/0x630
[   20.007334]  ret_from_fork+0x10/0x20
[   20.008124] 
[   20.008209] Allocated by task 168:
[   20.008382]  kasan_save_stack+0x3c/0x68
[   20.008570]  kasan_save_track+0x20/0x40
[   20.008959]  kasan_save_alloc_info+0x40/0x58
[   20.009284]  __kasan_krealloc+0x118/0x178
[   20.009414]  krealloc_noprof+0x128/0x360
[   20.009506]  krealloc_less_oob_helper+0x168/0xc50
[   20.009585]  krealloc_less_oob+0x20/0x38
[   20.009656]  kunit_try_run_case+0x170/0x3f0
[   20.010417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.010582]  kthread+0x328/0x630
[   20.010658]  ret_from_fork+0x10/0x20
[   20.010897] 
[   20.011036] The buggy address belongs to the object at fff00000c59a8e00
[   20.011036]  which belongs to the cache kmalloc-256 of size 256
[   20.011163] The buggy address is located 7 bytes to the right of
[   20.011163]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.011295] 
[   20.011338] The buggy address belongs to the physical page:
[   20.011706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.011904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.012131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.012738] page_type: f5(slab)
[   20.012845] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.013044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.013404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.013566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.014029] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.014152] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.014382] page dumped because: kasan: bad access detected
[   20.014669] 
[   20.014709] Memory state around the buggy address:
[   20.014782]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.014875]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.014956] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.015026]                                                  ^
[   20.015459]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.015787]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.016005] ==================================================================
[   20.050232] ==================================================================
[   20.050777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.051205] Write of size 1 at addr fff00000c59a8eea by task kunit_try_catch/168
[   20.051325] 
[   20.051404] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.052114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.052239] Hardware name: linux,dummy-virt (DT)
[   20.052377] Call trace:
[   20.052442]  show_stack+0x20/0x38 (C)
[   20.052636]  dump_stack_lvl+0x8c/0xd0
[   20.052754]  print_report+0x118/0x608
[   20.053177]  kasan_report+0xdc/0x128
[   20.053940]  __asan_report_store1_noabort+0x20/0x30
[   20.054346]  krealloc_less_oob_helper+0xae4/0xc50
[   20.054475]  krealloc_less_oob+0x20/0x38
[   20.054591]  kunit_try_run_case+0x170/0x3f0
[   20.054697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.054874]  kthread+0x328/0x630
[   20.054962]  ret_from_fork+0x10/0x20
[   20.055665] 
[   20.055709] Allocated by task 168:
[   20.055782]  kasan_save_stack+0x3c/0x68
[   20.055874]  kasan_save_track+0x20/0x40
[   20.055954]  kasan_save_alloc_info+0x40/0x58
[   20.056110]  __kasan_krealloc+0x118/0x178
[   20.056211]  krealloc_noprof+0x128/0x360
[   20.056823]  krealloc_less_oob_helper+0x168/0xc50
[   20.056927]  krealloc_less_oob+0x20/0x38
[   20.057184]  kunit_try_run_case+0x170/0x3f0
[   20.057276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.057582]  kthread+0x328/0x630
[   20.057731]  ret_from_fork+0x10/0x20
[   20.058397] 
[   20.058463] The buggy address belongs to the object at fff00000c59a8e00
[   20.058463]  which belongs to the cache kmalloc-256 of size 256
[   20.058716] The buggy address is located 33 bytes to the right of
[   20.058716]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.058950] 
[   20.059258] The buggy address belongs to the physical page:
[   20.059352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.059454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.059555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.059956] page_type: f5(slab)
[   20.060144] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.060389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.060515] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.060635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.060761] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.060897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.060999] page dumped because: kasan: bad access detected
[   20.061086] 
[   20.061146] Memory state around the buggy address:
[   20.061224]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061327]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.061429] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.061517]                                                           ^
[   20.061610]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061714]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061804] ==================================================================
[   20.186371] ==================================================================
[   20.186427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.186485] Write of size 1 at addr fff00000c76d20d0 by task kunit_try_catch/172
[   20.186532] 
[   20.186567] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.186646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.186671] Hardware name: linux,dummy-virt (DT)
[   20.186700] Call trace:
[   20.186721]  show_stack+0x20/0x38 (C)
[   20.186770]  dump_stack_lvl+0x8c/0xd0
[   20.186815]  print_report+0x118/0x608
[   20.186860]  kasan_report+0xdc/0x128
[   20.186902]  __asan_report_store1_noabort+0x20/0x30
[   20.186951]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.186996]  krealloc_large_less_oob+0x20/0x38
[   20.187106]  kunit_try_run_case+0x170/0x3f0
[   20.187324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.187520]  kthread+0x328/0x630
[   20.187678]  ret_from_fork+0x10/0x20
[   20.187874] 
[   20.187959] The buggy address belongs to the physical page:
[   20.188080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.188202] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.188301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.188402] page_type: f8(unknown)
[   20.188474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.188570] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.188677] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.188789] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.188897] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.189005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.189428] page dumped because: kasan: bad access detected
[   20.189535] 
[   20.189578] Memory state around the buggy address:
[   20.189691]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.189877]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.190076] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.190186]                                                  ^
[   20.190278]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.190363]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.190440] ==================================================================
[   20.180440] ==================================================================
[   20.180608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.180807] Write of size 1 at addr fff00000c76d20c9 by task kunit_try_catch/172
[   20.180961] 
[   20.181090] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.181356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.181409] Hardware name: linux,dummy-virt (DT)
[   20.181474] Call trace:
[   20.181544]  show_stack+0x20/0x38 (C)
[   20.181688]  dump_stack_lvl+0x8c/0xd0
[   20.181825]  print_report+0x118/0x608
[   20.181957]  kasan_report+0xdc/0x128
[   20.182132]  __asan_report_store1_noabort+0x20/0x30
[   20.182242]  krealloc_less_oob_helper+0xa48/0xc50
[   20.182617]  krealloc_large_less_oob+0x20/0x38
[   20.182979]  kunit_try_run_case+0x170/0x3f0
[   20.183119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.183223]  kthread+0x328/0x630
[   20.183311]  ret_from_fork+0x10/0x20
[   20.183407] 
[   20.183445] The buggy address belongs to the physical page:
[   20.183535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.183644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.183745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.183852] page_type: f8(unknown)
[   20.183937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.184072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.184232] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.184339] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.184449] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.184574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.184686] page dumped because: kasan: bad access detected
[   20.184785] 
[   20.184833] Memory state around the buggy address:
[   20.184900]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.184998]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.185091] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.185163]                                               ^
[   20.185225]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.185307]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.185383] ==================================================================
[   20.021042] ==================================================================
[   20.021160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.021696] Write of size 1 at addr fff00000c59a8eda by task kunit_try_catch/168
[   20.021830] 
[   20.022100] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.022795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.022926] Hardware name: linux,dummy-virt (DT)
[   20.023047] Call trace:
[   20.023177]  show_stack+0x20/0x38 (C)
[   20.023379]  dump_stack_lvl+0x8c/0xd0
[   20.023492]  print_report+0x118/0x608
[   20.023660]  kasan_report+0xdc/0x128
[   20.024059]  __asan_report_store1_noabort+0x20/0x30
[   20.024510]  krealloc_less_oob_helper+0xa80/0xc50
[   20.024713]  krealloc_less_oob+0x20/0x38
[   20.025091]  kunit_try_run_case+0x170/0x3f0
[   20.025445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.025576]  kthread+0x328/0x630
[   20.025673]  ret_from_fork+0x10/0x20
[   20.025778] 
[   20.025815] Allocated by task 168:
[   20.025874]  kasan_save_stack+0x3c/0x68
[   20.027436]  kasan_save_track+0x20/0x40
[   20.028426]  kasan_save_alloc_info+0x40/0x58
[   20.028808]  __kasan_krealloc+0x118/0x178
[   20.029546]  krealloc_noprof+0x128/0x360
[   20.030104]  krealloc_less_oob_helper+0x168/0xc50
[   20.030453]  krealloc_less_oob+0x20/0x38
[   20.030529]  kunit_try_run_case+0x170/0x3f0
[   20.031324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.031700]  kthread+0x328/0x630
[   20.031776]  ret_from_fork+0x10/0x20
[   20.031853] 
[   20.031896] The buggy address belongs to the object at fff00000c59a8e00
[   20.031896]  which belongs to the cache kmalloc-256 of size 256
[   20.032815] The buggy address is located 17 bytes to the right of
[   20.032815]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.033485] 
[   20.033880] The buggy address belongs to the physical page:
[   20.034206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.034314] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.034809] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.034954] page_type: f5(slab)
[   20.035048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.035166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.036517] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.036850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.037670] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.038168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.038434] page dumped because: kasan: bad access detected
[   20.038505] 
[   20.038773] Memory state around the buggy address:
[   20.038864]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039043]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.039188] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.039273]                                                     ^
[   20.039608]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039942]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.040197] ==================================================================
[   20.199909] ==================================================================
[   20.200008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   20.200128] Write of size 1 at addr fff00000c76d20ea by task kunit_try_catch/172
[   20.200240] 
[   20.200665] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.200930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.201083] Hardware name: linux,dummy-virt (DT)
[   20.201195] Call trace:
[   20.201456]  show_stack+0x20/0x38 (C)
[   20.201628]  dump_stack_lvl+0x8c/0xd0
[   20.201844]  print_report+0x118/0x608
[   20.202058]  kasan_report+0xdc/0x128
[   20.202222]  __asan_report_store1_noabort+0x20/0x30
[   20.202432]  krealloc_less_oob_helper+0xae4/0xc50
[   20.202613]  krealloc_large_less_oob+0x20/0x38
[   20.202710]  kunit_try_run_case+0x170/0x3f0
[   20.202793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.202887]  kthread+0x328/0x630
[   20.203255]  ret_from_fork+0x10/0x20
[   20.203367] 
[   20.203504] The buggy address belongs to the physical page:
[   20.203578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.203822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.203997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.204115] page_type: f8(unknown)
[   20.204198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.204306] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.204413] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.204518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.204649] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.204761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.204846] page dumped because: kasan: bad access detected
[   20.205255] 
[   20.205304] Memory state around the buggy address:
[   20.205821]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.206119]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.206216] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.206303]                                                           ^
[   20.206439]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.206583]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.206747] ==================================================================
[   20.207406] ==================================================================
[   20.207506] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.207603] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/172
[   20.207706] 
[   20.207762] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.207935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.207992] Hardware name: linux,dummy-virt (DT)
[   20.208067] Call trace:
[   20.208113]  show_stack+0x20/0x38 (C)
[   20.208220]  dump_stack_lvl+0x8c/0xd0
[   20.208322]  print_report+0x118/0x608
[   20.208425]  kasan_report+0xdc/0x128
[   20.208536]  __asan_report_store1_noabort+0x20/0x30
[   20.208660]  krealloc_less_oob_helper+0xa58/0xc50
[   20.208776]  krealloc_large_less_oob+0x20/0x38
[   20.208879]  kunit_try_run_case+0x170/0x3f0
[   20.208980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.210810]  kthread+0x328/0x630
[   20.210908]  ret_from_fork+0x10/0x20
[   20.211008] 
[   20.211059] The buggy address belongs to the physical page:
[   20.211120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.211235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.211334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.211865] page_type: f8(unknown)
[   20.212087] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.212744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.213135] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.213264] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.213445] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.213551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.213634] page dumped because: kasan: bad access detected
[   20.213696] 
[   20.213732] Memory state around the buggy address:
[   20.213983]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.214150]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.214264] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.214350]                                                           ^
[   20.214434]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.214525]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.214605] ==================================================================
[   20.064277] ==================================================================
[   20.064396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   20.064515] Write of size 1 at addr fff00000c59a8eeb by task kunit_try_catch/168
[   20.065629] 
[   20.065817] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.066695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066943] Hardware name: linux,dummy-virt (DT)
[   20.067136] Call trace:
[   20.067245]  show_stack+0x20/0x38 (C)
[   20.067612]  dump_stack_lvl+0x8c/0xd0
[   20.067809]  print_report+0x118/0x608
[   20.067945]  kasan_report+0xdc/0x128
[   20.068338]  __asan_report_store1_noabort+0x20/0x30
[   20.069031]  krealloc_less_oob_helper+0xa58/0xc50
[   20.069227]  krealloc_less_oob+0x20/0x38
[   20.069445]  kunit_try_run_case+0x170/0x3f0
[   20.069566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.069938]  kthread+0x328/0x630
[   20.070116]  ret_from_fork+0x10/0x20
[   20.070505] 
[   20.070563] Allocated by task 168:
[   20.070871]  kasan_save_stack+0x3c/0x68
[   20.070976]  kasan_save_track+0x20/0x40
[   20.071344]  kasan_save_alloc_info+0x40/0x58
[   20.071744]  __kasan_krealloc+0x118/0x178
[   20.071867]  krealloc_noprof+0x128/0x360
[   20.071961]  krealloc_less_oob_helper+0x168/0xc50
[   20.072263]  krealloc_less_oob+0x20/0x38
[   20.072368]  kunit_try_run_case+0x170/0x3f0
[   20.072580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.073226]  kthread+0x328/0x630
[   20.073327]  ret_from_fork+0x10/0x20
[   20.073505] 
[   20.073563] The buggy address belongs to the object at fff00000c59a8e00
[   20.073563]  which belongs to the cache kmalloc-256 of size 256
[   20.073717] The buggy address is located 34 bytes to the right of
[   20.073717]  allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9)
[   20.073866] 
[   20.073913] The buggy address belongs to the physical page:
[   20.073989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   20.074409] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.074891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.075411] page_type: f5(slab)
[   20.075500] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.075672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.075809] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.076694] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.077447] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   20.077578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.077678] page dumped because: kasan: bad access detected
[   20.077766] 
[   20.077807] Memory state around the buggy address:
[   20.077885]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.078261]  fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.078760] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.078864]                                                           ^
[   20.078946]  fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.079038]  fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.079109] ==================================================================
[   20.191917] ==================================================================
[   20.192056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   20.192426] Write of size 1 at addr fff00000c76d20da by task kunit_try_catch/172
[   20.192634] 
[   20.192738] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.193182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.193249] Hardware name: linux,dummy-virt (DT)
[   20.193369] Call trace:
[   20.193470]  show_stack+0x20/0x38 (C)
[   20.193772]  dump_stack_lvl+0x8c/0xd0
[   20.193914]  print_report+0x118/0x608
[   20.194141]  kasan_report+0xdc/0x128
[   20.194275]  __asan_report_store1_noabort+0x20/0x30
[   20.194454]  krealloc_less_oob_helper+0xa80/0xc50
[   20.194540]  krealloc_large_less_oob+0x20/0x38
[   20.194625]  kunit_try_run_case+0x170/0x3f0
[   20.194718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.195055]  kthread+0x328/0x630
[   20.195258]  ret_from_fork+0x10/0x20
[   20.195483] 
[   20.195727] The buggy address belongs to the physical page:
[   20.195841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.196084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.196176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.196360] page_type: f8(unknown)
[   20.196441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.196880] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.197070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.197260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.197360] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.197621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.197710] page dumped because: kasan: bad access detected
[   20.197840] 
[   20.197899] Memory state around the buggy address:
[   20.198101]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.198232]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.198365] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.198434]                                                     ^
[   20.198498]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.198576]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.198652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.976273] ==================================================================
[   19.976563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.976696] Write of size 1 at addr fff00000c59a8cf0 by task kunit_try_catch/166
[   19.976809] 
[   19.976892] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.977101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.977165] Hardware name: linux,dummy-virt (DT)
[   19.977240] Call trace:
[   19.977292]  show_stack+0x20/0x38 (C)
[   19.977924]  dump_stack_lvl+0x8c/0xd0
[   19.978120]  print_report+0x118/0x608
[   19.978276]  kasan_report+0xdc/0x128
[   19.978384]  __asan_report_store1_noabort+0x20/0x30
[   19.978474]  krealloc_more_oob_helper+0x5c0/0x678
[   19.978557]  krealloc_more_oob+0x20/0x38
[   19.978643]  kunit_try_run_case+0x170/0x3f0
[   19.978720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.978820]  kthread+0x328/0x630
[   19.978903]  ret_from_fork+0x10/0x20
[   19.979073] 
[   19.979131] Allocated by task 166:
[   19.979214]  kasan_save_stack+0x3c/0x68
[   19.979336]  kasan_save_track+0x20/0x40
[   19.979417]  kasan_save_alloc_info+0x40/0x58
[   19.979532]  __kasan_krealloc+0x118/0x178
[   19.979638]  krealloc_noprof+0x128/0x360
[   19.979747]  krealloc_more_oob_helper+0x168/0x678
[   19.979855]  krealloc_more_oob+0x20/0x38
[   19.979945]  kunit_try_run_case+0x170/0x3f0
[   19.980030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.980111]  kthread+0x328/0x630
[   19.980178]  ret_from_fork+0x10/0x20
[   19.980253] 
[   19.980667] The buggy address belongs to the object at fff00000c59a8c00
[   19.980667]  which belongs to the cache kmalloc-256 of size 256
[   19.980812] The buggy address is located 5 bytes to the right of
[   19.980812]  allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb)
[   19.981167] 
[   19.981286] The buggy address belongs to the physical page:
[   19.981466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.981634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.981776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.981932] page_type: f5(slab)
[   19.982046] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.982164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.982276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.982385] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.982487] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   19.982573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.982643] page dumped because: kasan: bad access detected
[   19.982700] 
[   19.982733] Memory state around the buggy address:
[   19.982794]  fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.982892]  fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.982979] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.983424]                                                              ^
[   19.983549]  fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983647]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983723] ==================================================================
[   20.125761] ==================================================================
[   20.125927] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   20.128285] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/170
[   20.128597] 
[   20.128698] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.129584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.130124] Hardware name: linux,dummy-virt (DT)
[   20.130303] Call trace:
[   20.130355]  show_stack+0x20/0x38 (C)
[   20.130490]  dump_stack_lvl+0x8c/0xd0
[   20.130583]  print_report+0x118/0x608
[   20.130665]  kasan_report+0xdc/0x128
[   20.130748]  __asan_report_store1_noabort+0x20/0x30
[   20.130854]  krealloc_more_oob_helper+0x60c/0x678
[   20.132317]  krealloc_large_more_oob+0x20/0x38
[   20.132590]  kunit_try_run_case+0x170/0x3f0
[   20.132902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.133552]  kthread+0x328/0x630
[   20.134279]  ret_from_fork+0x10/0x20
[   20.134555] 
[   20.134815] The buggy address belongs to the physical page:
[   20.135100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.135506] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.135617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.135742] page_type: f8(unknown)
[   20.135828] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.136656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.136817] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.137638] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.138306] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.138598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.138814] page dumped because: kasan: bad access detected
[   20.138990] 
[   20.139120] Memory state around the buggy address:
[   20.139196]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.139292]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.139384] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.139458]                                                           ^
[   20.139544]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.140371]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.141707] ==================================================================
[   19.960643] ==================================================================
[   19.960983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.961154] Write of size 1 at addr fff00000c59a8ceb by task kunit_try_catch/166
[   19.961455] 
[   19.961616] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.961856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.961924] Hardware name: linux,dummy-virt (DT)
[   19.962001] Call trace:
[   19.962099]  show_stack+0x20/0x38 (C)
[   19.962218]  dump_stack_lvl+0x8c/0xd0
[   19.962328]  print_report+0x118/0x608
[   19.962422]  kasan_report+0xdc/0x128
[   19.962510]  __asan_report_store1_noabort+0x20/0x30
[   19.962648]  krealloc_more_oob_helper+0x60c/0x678
[   19.962788]  krealloc_more_oob+0x20/0x38
[   19.962931]  kunit_try_run_case+0x170/0x3f0
[   19.963433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.963584]  kthread+0x328/0x630
[   19.963694]  ret_from_fork+0x10/0x20
[   19.963888] 
[   19.963934] Allocated by task 166:
[   19.964126]  kasan_save_stack+0x3c/0x68
[   19.964502]  kasan_save_track+0x20/0x40
[   19.964633]  kasan_save_alloc_info+0x40/0x58
[   19.965216]  __kasan_krealloc+0x118/0x178
[   19.965746]  krealloc_noprof+0x128/0x360
[   19.965992]  krealloc_more_oob_helper+0x168/0x678
[   19.966110]  krealloc_more_oob+0x20/0x38
[   19.966195]  kunit_try_run_case+0x170/0x3f0
[   19.966265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.966820]  kthread+0x328/0x630
[   19.966998]  ret_from_fork+0x10/0x20
[   19.967113] 
[   19.967279] The buggy address belongs to the object at fff00000c59a8c00
[   19.967279]  which belongs to the cache kmalloc-256 of size 256
[   19.967490] The buggy address is located 0 bytes to the right of
[   19.967490]  allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb)
[   19.967638] 
[   19.967680] The buggy address belongs to the physical page:
[   19.968010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8
[   19.968325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.968446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.968593] page_type: f5(slab)
[   19.968695] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.968892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.969218] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.969539] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.969841] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff
[   19.970139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.970239] page dumped because: kasan: bad access detected
[   19.970560] 
[   19.970608] Memory state around the buggy address:
[   19.970696]  fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.970787]  fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.970875] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.971136]                                                           ^
[   19.971231]  fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.971356]  fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.971489] ==================================================================
[   20.143791] ==================================================================
[   20.143890] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   20.143997] Write of size 1 at addr fff00000c76d20f0 by task kunit_try_catch/170
[   20.145888] 
[   20.146299] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   20.146462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.146514] Hardware name: linux,dummy-virt (DT)
[   20.146576] Call trace:
[   20.146620]  show_stack+0x20/0x38 (C)
[   20.146734]  dump_stack_lvl+0x8c/0xd0
[   20.146836]  print_report+0x118/0x608
[   20.146937]  kasan_report+0xdc/0x128
[   20.148935]  __asan_report_store1_noabort+0x20/0x30
[   20.149405]  krealloc_more_oob_helper+0x5c0/0x678
[   20.150113]  krealloc_large_more_oob+0x20/0x38
[   20.150321]  kunit_try_run_case+0x170/0x3f0
[   20.150984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151367]  kthread+0x328/0x630
[   20.151891]  ret_from_fork+0x10/0x20
[   20.152617] 
[   20.152859] The buggy address belongs to the physical page:
[   20.152931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   20.153106] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.153824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.154284] page_type: f8(unknown)
[   20.154365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.155099] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.155399] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.155504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   20.155611] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff
[   20.155717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.155803] page dumped because: kasan: bad access detected
[   20.155870] 
[   20.155906] Memory state around the buggy address:
[   20.155975]  fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.157658]  fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.158482] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.158675]                                                              ^
[   20.158805]  fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.158896]  fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.158967] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.937780] ==================================================================
[   19.938083] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   19.938226] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/164
[   19.938325] 
[   19.938401] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.938589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.938647] Hardware name: linux,dummy-virt (DT)
[   19.938708] Call trace:
[   19.938749]  show_stack+0x20/0x38 (C)
[   19.938840]  dump_stack_lvl+0x8c/0xd0
[   19.938928]  print_report+0x118/0x608
[   19.939000]  kasan_report+0xdc/0x128
[   19.939088]  __asan_report_load1_noabort+0x20/0x30
[   19.939185]  page_alloc_uaf+0x328/0x350
[   19.939286]  kunit_try_run_case+0x170/0x3f0
[   19.939415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.939548]  kthread+0x328/0x630
[   19.939640]  ret_from_fork+0x10/0x20
[   19.939746] 
[   19.939791] The buggy address belongs to the physical page:
[   19.939856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   19.939969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.940077] page_type: f0(buddy)
[   19.940161] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   19.940267] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   19.940426] page dumped because: kasan: bad access detected
[   19.940811] 
[   19.940868] Memory state around the buggy address:
[   19.940971]  fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.941302]  fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.941422] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.941509]                    ^
[   19.941747]  fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.941847]  fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.941935] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   19.906824] ==================================================================
[   19.907117] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   19.907337] Free of addr fff00000c76cc001 by task kunit_try_catch/160
[   19.907463] 
[   19.907557] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.907772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.907824] Hardware name: linux,dummy-virt (DT)
[   19.907881] Call trace:
[   19.907928]  show_stack+0x20/0x38 (C)
[   19.908037]  dump_stack_lvl+0x8c/0xd0
[   19.908169]  print_report+0x118/0x608
[   19.908264]  kasan_report_invalid_free+0xc0/0xe8
[   19.908356]  __kasan_kfree_large+0x5c/0xa8
[   19.908447]  free_large_kmalloc+0x68/0x150
[   19.908551]  kfree+0x270/0x3c8
[   19.908649]  kmalloc_large_invalid_free+0x108/0x270
[   19.909052]  kunit_try_run_case+0x170/0x3f0
[   19.909176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.909474]  kthread+0x328/0x630
[   19.909585]  ret_from_fork+0x10/0x20
[   19.909712] 
[   19.909821] The buggy address belongs to the physical page:
[   19.909891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.910478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.910594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.910716] page_type: f8(unknown)
[   19.910807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.910909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   19.910995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.911088] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   19.911181] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff
[   19.911277] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.911367] page dumped because: kasan: bad access detected
[   19.911431] 
[   19.911466] Memory state around the buggy address:
[   19.911542]  fff00000c76cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.911632]  fff00000c76cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.911726] >fff00000c76cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.911808]                    ^
[   19.911874]  fff00000c76cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.911984]  fff00000c76cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.912107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.884903] ==================================================================
[   19.885084] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.885225] Read of size 1 at addr fff00000c76cc000 by task kunit_try_catch/158
[   19.885345] 
[   19.885430] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.885624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.885681] Hardware name: linux,dummy-virt (DT)
[   19.885750] Call trace:
[   19.885800]  show_stack+0x20/0x38 (C)
[   19.885906]  dump_stack_lvl+0x8c/0xd0
[   19.886011]  print_report+0x118/0x608
[   19.886334]  kasan_report+0xdc/0x128
[   19.886428]  __asan_report_load1_noabort+0x20/0x30
[   19.886531]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.887414]  kunit_try_run_case+0x170/0x3f0
[   19.887810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.887938]  kthread+0x328/0x630
[   19.888049]  ret_from_fork+0x10/0x20
[   19.888985] 
[   19.889071] The buggy address belongs to the physical page:
[   19.889219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.889623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.889781] raw: 0bfffe0000000000 ffffc1ffc31db408 fff00000da473c80 0000000000000000
[   19.889893] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.889982] page dumped because: kasan: bad access detected
[   19.890265] 
[   19.890466] Memory state around the buggy address:
[   19.890548]  fff00000c76cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.890654]  fff00000c76cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.890748] >fff00000c76cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.891335]                    ^
[   19.891472]  fff00000c76cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.891575]  fff00000c76cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.891661] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.861614] ==================================================================
[   19.862080] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.862520] Write of size 1 at addr fff00000c76ce00a by task kunit_try_catch/156
[   19.862692] 
[   19.862776] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.863144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.863208] Hardware name: linux,dummy-virt (DT)
[   19.863290] Call trace:
[   19.863351]  show_stack+0x20/0x38 (C)
[   19.863469]  dump_stack_lvl+0x8c/0xd0
[   19.863580]  print_report+0x118/0x608
[   19.863740]  kasan_report+0xdc/0x128
[   19.863958]  __asan_report_store1_noabort+0x20/0x30
[   19.864353]  kmalloc_large_oob_right+0x278/0x2b8
[   19.864515]  kunit_try_run_case+0x170/0x3f0
[   19.864714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.864992]  kthread+0x328/0x630
[   19.865115]  ret_from_fork+0x10/0x20
[   19.865500] 
[   19.865598] The buggy address belongs to the physical page:
[   19.865783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.865939] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.866049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.866196] page_type: f8(unknown)
[   19.866296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.866412] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   19.866511] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.866985] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   19.867168] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff
[   19.867380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.867565] page dumped because: kasan: bad access detected
[   19.867790] 
[   19.867860] Memory state around the buggy address:
[   19.867953]  fff00000c76cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.868172]  fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.868562] >fff00000c76ce000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.868718]                       ^
[   19.868798]  fff00000c76ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.868892]  fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.868978] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   19.820998] ==================================================================
[   19.821438] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   19.821809] Write of size 1 at addr fff00000c64a5f00 by task kunit_try_catch/154
[   19.821961] 
[   19.822055] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.822468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.822532] Hardware name: linux,dummy-virt (DT)
[   19.822606] Call trace:
[   19.822658]  show_stack+0x20/0x38 (C)
[   19.822857]  dump_stack_lvl+0x8c/0xd0
[   19.823054]  print_report+0x118/0x608
[   19.823386]  kasan_report+0xdc/0x128
[   19.823567]  __asan_report_store1_noabort+0x20/0x30
[   19.823670]  kmalloc_big_oob_right+0x2a4/0x2f0
[   19.823806]  kunit_try_run_case+0x170/0x3f0
[   19.824034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.824216]  kthread+0x328/0x630
[   19.824315]  ret_from_fork+0x10/0x20
[   19.824955] 
[   19.825061] Allocated by task 154:
[   19.825241]  kasan_save_stack+0x3c/0x68
[   19.825343]  kasan_save_track+0x20/0x40
[   19.825426]  kasan_save_alloc_info+0x40/0x58
[   19.825511]  __kasan_kmalloc+0xd4/0xd8
[   19.825587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.825675]  kmalloc_big_oob_right+0xb8/0x2f0
[   19.826121]  kunit_try_run_case+0x170/0x3f0
[   19.826440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.826562]  kthread+0x328/0x630
[   19.826800]  ret_from_fork+0x10/0x20
[   19.826935] 
[   19.826984] The buggy address belongs to the object at fff00000c64a4000
[   19.826984]  which belongs to the cache kmalloc-8k of size 8192
[   19.827117] The buggy address is located 0 bytes to the right of
[   19.827117]  allocated 7936-byte region [fff00000c64a4000, fff00000c64a5f00)
[   19.827288] 
[   19.827337] The buggy address belongs to the physical page:
[   19.827414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a0
[   19.827600] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.827790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.827910] page_type: f5(slab)
[   19.828333] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   19.828451] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.828849] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   19.829048] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.829191] head: 0bfffe0000000003 ffffc1ffc3192801 00000000ffffffff 00000000ffffffff
[   19.830049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.830243] page dumped because: kasan: bad access detected
[   19.830320] 
[   19.830361] Memory state around the buggy address:
[   19.830437]  fff00000c64a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.830531]  fff00000c64a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.830618] >fff00000c64a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.830686]                    ^
[   19.830737]  fff00000c64a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.830820]  fff00000c64a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831675] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   19.781730] ==================================================================
[   19.781871] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   19.782047] Write of size 1 at addr fff00000c6423578 by task kunit_try_catch/152
[   19.782180] 
[   19.782257] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.782979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.783044] Hardware name: linux,dummy-virt (DT)
[   19.783104] Call trace:
[   19.783171]  show_stack+0x20/0x38 (C)
[   19.783285]  dump_stack_lvl+0x8c/0xd0
[   19.783381]  print_report+0x118/0x608
[   19.783878]  kasan_report+0xdc/0x128
[   19.784149]  __asan_report_store1_noabort+0x20/0x30
[   19.784514]  kmalloc_track_caller_oob_right+0x418/0x488
[   19.784664]  kunit_try_run_case+0x170/0x3f0
[   19.784781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.784908]  kthread+0x328/0x630
[   19.785011]  ret_from_fork+0x10/0x20
[   19.785136] 
[   19.785178] Allocated by task 152:
[   19.785241]  kasan_save_stack+0x3c/0x68
[   19.785334]  kasan_save_track+0x20/0x40
[   19.786110]  kasan_save_alloc_info+0x40/0x58
[   19.786220]  __kasan_kmalloc+0xd4/0xd8
[   19.786301]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.786387]  kmalloc_track_caller_oob_right+0x184/0x488
[   19.786457]  kunit_try_run_case+0x170/0x3f0
[   19.786538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.786658]  kthread+0x328/0x630
[   19.786728]  ret_from_fork+0x10/0x20
[   19.786799] 
[   19.786834] The buggy address belongs to the object at fff00000c6423500
[   19.786834]  which belongs to the cache kmalloc-128 of size 128
[   19.786956] The buggy address is located 0 bytes to the right of
[   19.786956]  allocated 120-byte region [fff00000c6423500, fff00000c6423578)
[   19.787412] 
[   19.787472] The buggy address belongs to the physical page:
[   19.787646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   19.787955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.788386] page_type: f5(slab)
[   19.788481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.789407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.789939] page dumped because: kasan: bad access detected
[   19.790102] 
[   19.790166] Memory state around the buggy address:
[   19.790369]  fff00000c6423400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.790459]  fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.790543] >fff00000c6423500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.790618]                                                                 ^
[   19.791220]  fff00000c6423580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791694]  fff00000c6423600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791946] ==================================================================
[   19.769151] ==================================================================
[   19.769326] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   19.769464] Write of size 1 at addr fff00000c6423478 by task kunit_try_catch/152
[   19.769577] 
[   19.769656] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.769849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.769911] Hardware name: linux,dummy-virt (DT)
[   19.769982] Call trace:
[   19.771070]  show_stack+0x20/0x38 (C)
[   19.771714]  dump_stack_lvl+0x8c/0xd0
[   19.771876]  print_report+0x118/0x608
[   19.772012]  kasan_report+0xdc/0x128
[   19.772125]  __asan_report_store1_noabort+0x20/0x30
[   19.772536]  kmalloc_track_caller_oob_right+0x40c/0x488
[   19.772805]  kunit_try_run_case+0x170/0x3f0
[   19.773163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.773449]  kthread+0x328/0x630
[   19.773750]  ret_from_fork+0x10/0x20
[   19.774011] 
[   19.774138] Allocated by task 152:
[   19.774214]  kasan_save_stack+0x3c/0x68
[   19.774600]  kasan_save_track+0x20/0x40
[   19.774679]  kasan_save_alloc_info+0x40/0x58
[   19.774762]  __kasan_kmalloc+0xd4/0xd8
[   19.774891]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.775135]  kmalloc_track_caller_oob_right+0xa8/0x488
[   19.775326]  kunit_try_run_case+0x170/0x3f0
[   19.775737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.775949]  kthread+0x328/0x630
[   19.776138]  ret_from_fork+0x10/0x20
[   19.776253] 
[   19.776301] The buggy address belongs to the object at fff00000c6423400
[   19.776301]  which belongs to the cache kmalloc-128 of size 128
[   19.776433] The buggy address is located 0 bytes to the right of
[   19.776433]  allocated 120-byte region [fff00000c6423400, fff00000c6423478)
[   19.776599] 
[   19.777053] The buggy address belongs to the physical page:
[   19.777136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   19.777389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.777678] page_type: f5(slab)
[   19.777794] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.778110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.778327] page dumped because: kasan: bad access detected
[   19.778459] 
[   19.778520] Memory state around the buggy address:
[   19.778774]  fff00000c6423300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.778879]  fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779065] >fff00000c6423400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.779204]                                                                 ^
[   19.779325]  fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779433]  fff00000c6423500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   19.741621] ==================================================================
[   19.741808] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   19.741954] Read of size 1 at addr fff00000c7503000 by task kunit_try_catch/150
[   19.742089] 
[   19.742377] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.742972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.743065] Hardware name: linux,dummy-virt (DT)
[   19.743130] Call trace:
[   19.743174]  show_stack+0x20/0x38 (C)
[   19.743675]  dump_stack_lvl+0x8c/0xd0
[   19.743919]  print_report+0x118/0x608
[   19.744048]  kasan_report+0xdc/0x128
[   19.744149]  __asan_report_load1_noabort+0x20/0x30
[   19.744268]  kmalloc_node_oob_right+0x2f4/0x330
[   19.744381]  kunit_try_run_case+0x170/0x3f0
[   19.744493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.744634]  kthread+0x328/0x630
[   19.744748]  ret_from_fork+0x10/0x20
[   19.744863] 
[   19.744906] Allocated by task 150:
[   19.744971]  kasan_save_stack+0x3c/0x68
[   19.745073]  kasan_save_track+0x20/0x40
[   19.745157]  kasan_save_alloc_info+0x40/0x58
[   19.745250]  __kasan_kmalloc+0xd4/0xd8
[   19.745328]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   19.745423]  kmalloc_node_oob_right+0xbc/0x330
[   19.745510]  kunit_try_run_case+0x170/0x3f0
[   19.745599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.745691]  kthread+0x328/0x630
[   19.745772]  ret_from_fork+0x10/0x20
[   19.746089] 
[   19.746135] The buggy address belongs to the object at fff00000c7502000
[   19.746135]  which belongs to the cache kmalloc-4k of size 4096
[   19.746267] The buggy address is located 0 bytes to the right of
[   19.746267]  allocated 4096-byte region [fff00000c7502000, fff00000c7503000)
[   19.746888] 
[   19.746978] The buggy address belongs to the physical page:
[   19.747156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107500
[   19.747569] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.747684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.747832] page_type: f5(slab)
[   19.747926] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   19.748105] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.748287] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   19.748442] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.748612] head: 0bfffe0000000003 ffffc1ffc31d4001 00000000ffffffff 00000000ffffffff
[   19.748714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.748812] page dumped because: kasan: bad access detected
[   19.748914] 
[   19.748954] Memory state around the buggy address:
[   19.749033]  fff00000c7502f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.749130]  fff00000c7502f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.749240] >fff00000c7503000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749325]                    ^
[   19.749383]  fff00000c7503080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749472]  fff00000c7503100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.705248] ==================================================================
[   19.705385] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.705572] Read of size 1 at addr fff00000c60580bf by task kunit_try_catch/148
[   19.705673] 
[   19.705742] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.705951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.706035] Hardware name: linux,dummy-virt (DT)
[   19.706131] Call trace:
[   19.706203]  show_stack+0x20/0x38 (C)
[   19.706337]  dump_stack_lvl+0x8c/0xd0
[   19.706479]  print_report+0x118/0x608
[   19.706613]  kasan_report+0xdc/0x128
[   19.706755]  __asan_report_load1_noabort+0x20/0x30
[   19.707079]  kmalloc_oob_left+0x2ec/0x320
[   19.707202]  kunit_try_run_case+0x170/0x3f0
[   19.707304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.707419]  kthread+0x328/0x630
[   19.707856]  ret_from_fork+0x10/0x20
[   19.707978] 
[   19.708026] Allocated by task 9:
[   19.708090]  kasan_save_stack+0x3c/0x68
[   19.708171]  kasan_save_track+0x20/0x40
[   19.708253]  kasan_save_alloc_info+0x40/0x58
[   19.708337]  __kasan_kmalloc+0xd4/0xd8
[   19.708412]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.708505]  kvasprintf+0xe0/0x180
[   19.708596]  __kthread_create_on_node+0x16c/0x350
[   19.708682]  kthread_create_on_node+0xe4/0x130
[   19.708760]  create_worker+0x380/0x6b8
[   19.709485]  worker_thread+0x808/0xf38
[   19.709593]  kthread+0x328/0x630
[   19.709664]  ret_from_fork+0x10/0x20
[   19.709736] 
[   19.709776] The buggy address belongs to the object at fff00000c60580a0
[   19.709776]  which belongs to the cache kmalloc-16 of size 16
[   19.710110] The buggy address is located 19 bytes to the right of
[   19.710110]  allocated 12-byte region [fff00000c60580a0, fff00000c60580ac)
[   19.710514] 
[   19.710559] The buggy address belongs to the physical page:
[   19.710620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058
[   19.710715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.710816] page_type: f5(slab)
[   19.710894] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.711863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.712044] page dumped because: kasan: bad access detected
[   19.712317] 
[   19.712652] Memory state around the buggy address:
[   19.712752]  fff00000c6057f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712850]  fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.712985] >fff00000c6058080: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc
[   19.713105]                                         ^
[   19.713179]  fff00000c6058100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.713299]  fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.713397] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   19.682120] ==================================================================
[   19.682220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.682324] Read of size 1 at addr fff00000c6423380 by task kunit_try_catch/146
[   19.682437] 
[   19.682632] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.682873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.682943] Hardware name: linux,dummy-virt (DT)
[   19.683072] Call trace:
[   19.683116]  show_stack+0x20/0x38 (C)
[   19.683432]  dump_stack_lvl+0x8c/0xd0
[   19.683584]  print_report+0x118/0x608
[   19.683659]  kasan_report+0xdc/0x128
[   19.683747]  __asan_report_load1_noabort+0x20/0x30
[   19.683841]  kmalloc_oob_right+0x5d0/0x660
[   19.683927]  kunit_try_run_case+0x170/0x3f0
[   19.684032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.684182]  kthread+0x328/0x630
[   19.684330]  ret_from_fork+0x10/0x20
[   19.684486] 
[   19.684571] Allocated by task 146:
[   19.684647]  kasan_save_stack+0x3c/0x68
[   19.684741]  kasan_save_track+0x20/0x40
[   19.684821]  kasan_save_alloc_info+0x40/0x58
[   19.684913]  __kasan_kmalloc+0xd4/0xd8
[   19.685000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.685103]  kmalloc_oob_right+0xb0/0x660
[   19.685185]  kunit_try_run_case+0x170/0x3f0
[   19.685280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.685413]  kthread+0x328/0x630
[   19.685494]  ret_from_fork+0x10/0x20
[   19.685576] 
[   19.685642] The buggy address belongs to the object at fff00000c6423300
[   19.685642]  which belongs to the cache kmalloc-128 of size 128
[   19.685801] The buggy address is located 13 bytes to the right of
[   19.685801]  allocated 115-byte region [fff00000c6423300, fff00000c6423373)
[   19.686006] 
[   19.686341] The buggy address belongs to the physical page:
[   19.686594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   19.686870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.686988] page_type: f5(slab)
[   19.687095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.687259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.687377] page dumped because: kasan: bad access detected
[   19.687446] 
[   19.687482] Memory state around the buggy address:
[   19.688038]  fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688157]  fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.688252] >fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688348]                    ^
[   19.688417]  fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688597]  fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688695] ==================================================================
[   19.662873] ==================================================================
[   19.663439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   19.664547] Write of size 1 at addr fff00000c6423373 by task kunit_try_catch/146
[   19.664686] 
[   19.665756] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.665932] Tainted: [N]=TEST
[   19.665972] Hardware name: linux,dummy-virt (DT)
[   19.666405] Call trace:
[   19.666687]  show_stack+0x20/0x38 (C)
[   19.666869]  dump_stack_lvl+0x8c/0xd0
[   19.666942]  print_report+0x118/0x608
[   19.666997]  kasan_report+0xdc/0x128
[   19.667079]  __asan_report_store1_noabort+0x20/0x30
[   19.667138]  kmalloc_oob_right+0x5a4/0x660
[   19.667189]  kunit_try_run_case+0x170/0x3f0
[   19.667246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667303]  kthread+0x328/0x630
[   19.667351]  ret_from_fork+0x10/0x20
[   19.667546] 
[   19.667595] Allocated by task 146:
[   19.667737]  kasan_save_stack+0x3c/0x68
[   19.667818]  kasan_save_track+0x20/0x40
[   19.667863]  kasan_save_alloc_info+0x40/0x58
[   19.667905]  __kasan_kmalloc+0xd4/0xd8
[   19.667944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.667986]  kmalloc_oob_right+0xb0/0x660
[   19.668037]  kunit_try_run_case+0x170/0x3f0
[   19.668081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.668125]  kthread+0x328/0x630
[   19.668159]  ret_from_fork+0x10/0x20
[   19.668224] 
[   19.668296] The buggy address belongs to the object at fff00000c6423300
[   19.668296]  which belongs to the cache kmalloc-128 of size 128
[   19.668406] The buggy address is located 0 bytes to the right of
[   19.668406]  allocated 115-byte region [fff00000c6423300, fff00000c6423373)
[   19.668477] 
[   19.668591] The buggy address belongs to the physical page:
[   19.668896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   19.669261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.669601] page_type: f5(slab)
[   19.669977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.670056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.670279] page dumped because: kasan: bad access detected
[   19.670364] 
[   19.670411] Memory state around the buggy address:
[   19.670839]  fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.670984]  fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671107] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.671242]                                                              ^
[   19.671412]  fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671464]  fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671547] ==================================================================
[   19.673133] ==================================================================
[   19.673229] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.673351] Write of size 1 at addr fff00000c6423378 by task kunit_try_catch/146
[   19.673464] 
[   19.673541] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   19.673746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.673796] Hardware name: linux,dummy-virt (DT)
[   19.673854] Call trace:
[   19.673898]  show_stack+0x20/0x38 (C)
[   19.673994]  dump_stack_lvl+0x8c/0xd0
[   19.674620]  print_report+0x118/0x608
[   19.674716]  kasan_report+0xdc/0x128
[   19.674813]  __asan_report_store1_noabort+0x20/0x30
[   19.675035]  kmalloc_oob_right+0x538/0x660
[   19.675136]  kunit_try_run_case+0x170/0x3f0
[   19.675245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675352]  kthread+0x328/0x630
[   19.675936]  ret_from_fork+0x10/0x20
[   19.676165] 
[   19.676220] Allocated by task 146:
[   19.676304]  kasan_save_stack+0x3c/0x68
[   19.676401]  kasan_save_track+0x20/0x40
[   19.676484]  kasan_save_alloc_info+0x40/0x58
[   19.676590]  __kasan_kmalloc+0xd4/0xd8
[   19.676680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.676770]  kmalloc_oob_right+0xb0/0x660
[   19.676852]  kunit_try_run_case+0x170/0x3f0
[   19.677296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.677640]  kthread+0x328/0x630
[   19.677938]  ret_from_fork+0x10/0x20
[   19.678104] 
[   19.678152] The buggy address belongs to the object at fff00000c6423300
[   19.678152]  which belongs to the cache kmalloc-128 of size 128
[   19.678482] The buggy address is located 5 bytes to the right of
[   19.678482]  allocated 115-byte region [fff00000c6423300, fff00000c6423373)
[   19.678616] 
[   19.678656] The buggy address belongs to the physical page:
[   19.678718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   19.678806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.678962] page_type: f5(slab)
[   19.679102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.679331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.679450] page dumped because: kasan: bad access detected
[   19.679522] 
[   19.679709] Memory state around the buggy address:
[   19.679934]  fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.680088]  fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.680334] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.680538]                                                                 ^
[   19.680662]  fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.680962]  fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.681178] ==================================================================
Failure - log-parser-boot - exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------
[  170.946991] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1562
[  170.948070] Modules linked in:
[  170.948300] CPU: 0 UID: 0 PID: 1562 Comm: test_ratelimit_ Tainted: G    B D W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[  170.948652] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  170.948833] Hardware name: linux,dummy-virt (DT)
[  170.948995] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  170.949229] pc : test_ratelimit_stress_child+0x160/0x1b8
[  170.949426] lr : test_ratelimit_stress_child+0x30/0x1b8
[  170.949607] sp : ffff800089847d90
[  170.949740] x29: ffff800089847d90 x28: 0000000000000000 x27: 0000000000000000
[  170.951570] x26: 1ffe000019524fa1 x25: 0000000000000000 x24: 0000000000000004
[  170.952562] x23: fff00000ca927d0c x22: fff00000cab58e28 x21: ffffacab76739eb0
[  170.952918] x20: fff00000ca927d00 x19: fff00000cab58e28 x18: 00000000d8753c66
[  170.953234] x17: 0000000000000001 x16: fff00000c5c5b03c x15: fff00000ff616b08
[  170.953526] x14: 0000000000018fff x13: 1ffe00001b4923cd x12: fffd80001b48de49
[  170.953814] x11: 1ffe00001b48de48 x10: fffd80001b48de48 x9 : ffffacab78d1774c
[  170.954114] x8 : ffff800089847ae8 x7 : 0000000000000001 x6 : ffff800089847c00
[  170.955541] x5 : 0000000000000001 x4 : ffffacab7b0443e0 x3 : 0000000000000000
[  170.956154] x2 : 1ffe00001956b1c9 x1 : 0000000000000000 x0 : 0000000000000000
[  170.956503] Call trace:
[  170.956646]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  170.956868]  kthread+0x328/0x630
[  170.957050]  ret_from_fork+0x10/0x20
[  170.957232] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  102.405903] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/666
[  102.407903] Modules linked in:
[  102.408179] CPU: 1 UID: 0 PID: 666 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[  102.408646] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  102.409072] Hardware name: linux,dummy-virt (DT)
[  102.409391] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  102.409609] pc : intlog10+0x38/0x48
[  102.409840] lr : intlog10_test+0xe4/0x200
[  102.410000] sp : ffff800082567c10
[  102.410538] x29: ffff800082567c90 x28: 0000000000000000 x27: 0000000000000000
[  102.410915] x26: 1ffe0000183c8821 x25: 0000000000000000 x24: ffff800082567ce0
[  102.411320] x23: ffff800082567d00 x22: 0000000000000000 x21: 1ffff000104acf82
[  102.411815] x20: ffffacab78fdba40 x19: ffff800080087990 x18: 00000000d1514d90
[  102.412240] x17: 00000000dbb46be5 x16: fff00000c5c5ac3c x15: fff00000ff616b08
[  102.412614] x14: 0000000000018fff x13: 1ffe00001b48dfcd x12: ffff75956f9c7381
[  102.413078] x11: 1ffff5956f9c7380 x10: ffff75956f9c7380 x9 : ffffacab7663cadc
[  102.413506] x8 : ffffacab7ce39c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  102.413932] x5 : ffff7000104acf82 x4 : 1ffff00010010f3a x3 : 1ffff5956f1fb748
[  102.414792] x2 : 1ffff5956f1fb748 x1 : 0000000000000003 x0 : 0000000000000000
[  102.415242] Call trace:
[  102.415395]  intlog10+0x38/0x48 (P)
[  102.415608]  kunit_try_run_case+0x170/0x3f0
[  102.415849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  102.416130]  kthread+0x328/0x630
[  102.416457]  ret_from_fork+0x10/0x20
[  102.416663] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  102.349046] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/648
[  102.351759] Modules linked in:
[  102.352075] CPU: 1 UID: 0 PID: 648 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[  102.352775] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  102.353054] Hardware name: linux,dummy-virt (DT)
[  102.353437] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  102.354054] pc : intlog2+0xd8/0xf8
[  102.354426] lr : intlog2_test+0xe4/0x200
[  102.354782] sp : ffff800082487c10
[  102.355063] x29: ffff800082487c90 x28: 0000000000000000 x27: 0000000000000000
[  102.356010] x26: 1ffe0000182455e1 x25: 0000000000000000 x24: ffff800082487ce0
[  102.356483] x23: ffff800082487d00 x22: 0000000000000000 x21: 1ffff00010490f82
[  102.356885] x20: ffffacab78fdb940 x19: ffff800080087990 x18: 00000000fedbdc9d
[  102.357307] x17: 00000000b01ff327 x16: fff00000c5c5ac3c x15: fff00000ff616b08
[  102.357701] x14: 0000000000018fff x13: 1ffe00001b48dfcd x12: ffff75956f9c7381
[  102.358133] x11: 1ffff5956f9c7380 x10: ffff75956f9c7380 x9 : ffffacab7663ccdc
[  102.358553] x8 : ffffacab7ce39c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  102.358937] x5 : ffff700010490f82 x4 : 1ffff00010010f3a x3 : 1ffff5956f1fb728
[  102.359458] x2 : 1ffff5956f1fb728 x1 : 0000000000000003 x0 : 0000000000000000
[  102.360066] Call trace:
[  102.360197]  intlog2+0xd8/0xf8 (P)
[  102.360378]  kunit_try_run_case+0x170/0x3f0
[  102.360560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  102.360759]  kthread+0x328/0x630
[  102.360917]  ret_from_fork+0x10/0x20
[  102.361111] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[  101.277977] Internal error: Oops: 0000000096000005 [#1]  SMP
[  101.283775] Modules linked in:
[  101.284319] CPU: 1 UID: 0 PID: 542 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[  101.285391] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[  101.285886] Hardware name: linux,dummy-virt (DT)
[  101.286341] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  101.286956] pc : kunit_test_null_dereference+0x70/0x170
[  101.287616] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.288501] sp : ffff800082187d30
[  101.288888] x29: ffff800082187d90 x28: 0000000000000000 x27: 0000000000000000
[  101.289472] x26: 1ffe000018c09be1 x25: 0000000000000000 x24: 0000000000000004
[  101.290542] x23: fff00000c604df0c x22: ffffacab7662a028 x21: fff00000c144ac08
[  101.291270] x20: 1ffff00010430fa6 x19: ffff800080087990 x18: 000000007de2dbec
[  101.291963] x17: 000000001854f68b x16: 0000000015f66f64 x15: 000000002a7cb8cf
[  101.292595] x14: 00000000f1f1f1f1 x13: 1ffe00001b492389 x12: fffd800018ebcdc4
[  101.293223] x11: 1ffe000018ebcdc3 x10: fffd800018ebcdc3 x9 : ffffacab76621490
[  101.293845] x8 : ffff800082187c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  101.294458] x5 : ffff700010430fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  101.295104] x2 : dfff800000000000 x1 : fff00000c75e6540 x0 : ffff800080087990
[  101.295756] Call trace:
[  101.295997]  kunit_test_null_dereference+0x70/0x170 (P)
[  101.296481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.296908]  kthread+0x328/0x630
[  101.297251]  ret_from_fork+0x10/0x20
[  101.298076] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  101.298945] ---[ end trace 0000000000000000 ]---