Hay
Date
June 19, 2025, 12:07 p.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.643167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   33.667021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   33.856163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   33.961888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   33.825100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   33.554140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   62.770983] ==================================================================
[   62.771103] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   62.771103] 
[   62.771220] Use-after-free read at 0x000000004809c4a0 (in kfence-#175):
[   62.771282]  test_krealloc+0x51c/0x830
[   62.771337]  kunit_try_run_case+0x170/0x3f0
[   62.771387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.771438]  kthread+0x328/0x630
[   62.771481]  ret_from_fork+0x10/0x20
[   62.771525] 
[   62.771553] kfence-#175: 0x000000004809c4a0-0x00000000edeffef3, size=32, cache=kmalloc-32
[   62.771553] 
[   62.771616] allocated by task 348 on cpu 0 at 62.770095s (0.001516s ago):
[   62.771696]  test_alloc+0x29c/0x628
[   62.771742]  test_krealloc+0xc0/0x830
[   62.771788]  kunit_try_run_case+0x170/0x3f0
[   62.771832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.771893]  kthread+0x328/0x630
[   62.771937]  ret_from_fork+0x10/0x20
[   62.771980] 
[   62.772009] freed by task 348 on cpu 0 at 62.770451s (0.001554s ago):
[   62.772078]  krealloc_noprof+0x148/0x360
[   62.772122]  test_krealloc+0x1dc/0x830
[   62.772166]  kunit_try_run_case+0x170/0x3f0
[   62.772209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.772256]  kthread+0x328/0x630
[   62.772294]  ret_from_fork+0x10/0x20
[   62.772338] 
[   62.772390] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   62.772480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.772515] Hardware name: linux,dummy-virt (DT)
[   62.772557] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   62.682689] ==================================================================
[   62.682817] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   62.682817] 
[   62.682984] Use-after-free read at 0x000000001abb479d (in kfence-#174):
[   62.683052]  test_memcache_typesafe_by_rcu+0x280/0x560
[   62.683113]  kunit_try_run_case+0x170/0x3f0
[   62.683166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.683217]  kthread+0x328/0x630
[   62.683261]  ret_from_fork+0x10/0x20
[   62.683310] 
[   62.683338] kfence-#174: 0x000000001abb479d-0x00000000ebc2782c, size=32, cache=test
[   62.683338] 
[   62.683400] allocated by task 346 on cpu 0 at 62.672776s (0.010619s ago):
[   62.683485]  test_alloc+0x230/0x628
[   62.683532]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   62.683581]  kunit_try_run_case+0x170/0x3f0
[   62.683627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.683676]  kthread+0x328/0x630
[   62.683715]  ret_from_fork+0x10/0x20
[   62.683759] 
[   62.683787] freed by task 346 on cpu 0 at 62.673019s (0.010763s ago):
[   62.683851]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   62.683923]  kunit_try_run_case+0x170/0x3f0
[   62.683969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.684015]  kthread+0x328/0x630
[   62.684053]  ret_from_fork+0x10/0x20
[   62.684097] 
[   62.684148] CPU: 0 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   62.684240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.684273] Hardware name: linux,dummy-virt (DT)
[   62.684310] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   41.472937] ==================================================================
[   41.473191] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   41.473191] 
[   41.473423] Invalid read at 0x00000000c8d6a22c:
[   41.473740]  test_invalid_access+0xdc/0x1f0
[   41.474915]  kunit_try_run_case+0x170/0x3f0
[   41.475073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.475341]  kthread+0x328/0x630
[   41.475604]  ret_from_fork+0x10/0x20
[   41.475861] 
[   41.476458] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   41.476695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.477214] Hardware name: linux,dummy-virt (DT)
[   41.479717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   36.105156] ==================================================================
[   36.105398] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   36.105398] 
[   36.105625] Out-of-bounds write at 0x000000005d071ed7 (1B left of kfence-#121):
[   36.105845]  test_out_of_bounds_write+0x100/0x240
[   36.106185]  kunit_try_run_case+0x170/0x3f0
[   36.106306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.106527]  kthread+0x328/0x630
[   36.106628]  ret_from_fork+0x10/0x20
[   36.106918] 
[   36.107000] kfence-#121: 0x0000000059a1dc5c-0x00000000266452cf, size=32, cache=test
[   36.107000] 
[   36.107183] allocated by task 304 on cpu 0 at 36.104776s (0.002396s ago):
[   36.107442]  test_alloc+0x230/0x628
[   36.107657]  test_out_of_bounds_write+0xc8/0x240
[   36.107763]  kunit_try_run_case+0x170/0x3f0
[   36.108144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108276]  kthread+0x328/0x630
[   36.108460]  ret_from_fork+0x10/0x20
[   36.108591] 
[   36.108721] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.108929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.109037] Hardware name: linux,dummy-virt (DT)
[   36.109152] ==================================================================
[   35.998601] ==================================================================
[   35.998758] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   35.998758] 
[   35.998970] Out-of-bounds write at 0x000000006559e837 (1B left of kfence-#120):
[   35.999097]  test_out_of_bounds_write+0x100/0x240
[   35.999196]  kunit_try_run_case+0x170/0x3f0
[   35.999302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.999404]  kthread+0x328/0x630
[   35.999483]  ret_from_fork+0x10/0x20
[   35.999576] 
[   35.999627] kfence-#120: 0x00000000b2c772c6-0x000000001537b9c5, size=32, cache=kmalloc-32
[   35.999627] 
[   35.999749] allocated by task 302 on cpu 0 at 35.998327s (0.001413s ago):
[   36.000648]  test_alloc+0x29c/0x628
[   36.000772]  test_out_of_bounds_write+0xc8/0x240
[   36.000881]  kunit_try_run_case+0x170/0x3f0
[   36.001014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.001138]  kthread+0x328/0x630
[   36.001260]  ret_from_fork+0x10/0x20
[   36.001359] 
[   36.001508] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.001691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.001771] Hardware name: linux,dummy-virt (DT)
[   36.001903] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   41.238731] ==================================================================
[   41.238909] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.238909] 
[   41.239004] Corrupted memory at 0x000000006d31bfa8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#170):
[   41.239358]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.239417]  kunit_try_run_case+0x170/0x3f0
[   41.239469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.239519]  kthread+0x328/0x630
[   41.239562]  ret_from_fork+0x10/0x20
[   41.239606] 
[   41.239637] kfence-#170: 0x00000000e81df24f-0x00000000dfa042b9, size=73, cache=kmalloc-96
[   41.239637] 
[   41.239702] allocated by task 336 on cpu 1 at 41.238285s (0.001411s ago):
[   41.239778]  test_alloc+0x29c/0x628
[   41.239828]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   41.239886]  kunit_try_run_case+0x170/0x3f0
[   41.239938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.239987]  kthread+0x328/0x630
[   41.240028]  ret_from_fork+0x10/0x20
[   41.240073] 
[   41.240101] freed by task 336 on cpu 1 at 41.238546s (0.001551s ago):
[   41.240174]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   41.240225]  kunit_try_run_case+0x170/0x3f0
[   41.240270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.240318]  kthread+0x328/0x630
[   41.240357]  ret_from_fork+0x10/0x20
[   41.240402] 
[   41.240460] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   41.240556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.240591] Hardware name: linux,dummy-virt (DT)
[   41.240632] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   41.134619] ==================================================================
[   41.134741] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   41.134741] 
[   41.134864] Out-of-bounds read at 0x0000000097471e0b (105B right of kfence-#169):
[   41.134979]  test_kmalloc_aligned_oob_read+0x238/0x468
[   41.135043]  kunit_try_run_case+0x170/0x3f0
[   41.135095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.135145]  kthread+0x328/0x630
[   41.135190]  ret_from_fork+0x10/0x20
[   41.135236] 
[   41.135265] kfence-#169: 0x0000000061126404-0x00000000f549304d, size=73, cache=kmalloc-96
[   41.135265] 
[   41.135324] allocated by task 334 on cpu 0 at 41.134264s (0.001056s ago):
[   41.135409]  test_alloc+0x29c/0x628
[   41.135456]  test_kmalloc_aligned_oob_read+0x100/0x468
[   41.135506]  kunit_try_run_case+0x170/0x3f0
[   41.135549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.135597]  kthread+0x328/0x630
[   41.135636]  ret_from_fork+0x10/0x20
[   41.135680] 
[   41.135733] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   41.135832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.135867] Hardware name: linux,dummy-virt (DT)
[   41.135922] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   37.270832] ==================================================================
[   37.271012] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   37.271012] 
[   37.271170] Corrupted memory at 0x00000000aa7106d1 [ ! ] (in kfence-#132):
[   37.271551]  test_corruption+0x284/0x378
[   37.271712]  kunit_try_run_case+0x170/0x3f0
[   37.271855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.271964]  kthread+0x328/0x630
[   37.272056]  ret_from_fork+0x10/0x20
[   37.272141] 
[   37.272190] kfence-#132: 0x00000000d169010f-0x00000000b3668f8f, size=32, cache=kmalloc-32
[   37.272190] 
[   37.272317] allocated by task 322 on cpu 0 at 37.270328s (0.001980s ago):
[   37.272495]  test_alloc+0x29c/0x628
[   37.272626]  test_corruption+0x198/0x378
[   37.272752]  kunit_try_run_case+0x170/0x3f0
[   37.272887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.273001]  kthread+0x328/0x630
[   37.273085]  ret_from_fork+0x10/0x20
[   37.273174] 
[   37.273227] freed by task 322 on cpu 0 at 37.270503s (0.002716s ago):
[   37.273368]  test_corruption+0x284/0x378
[   37.273510]  kunit_try_run_case+0x170/0x3f0
[   37.273619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.273743]  kthread+0x328/0x630
[   37.273882]  ret_from_fork+0x10/0x20
[   37.273981] 
[   37.274076] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   37.274283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.274386] Hardware name: linux,dummy-virt (DT)
[   37.274508] ==================================================================
[   37.480855] ==================================================================
[   37.481035] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   37.481035] 
[   37.481170] Corrupted memory at 0x000000002b2033b3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134):
[   37.483458]  test_corruption+0x120/0x378
[   37.484222]  kunit_try_run_case+0x170/0x3f0
[   37.484484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.484604]  kthread+0x328/0x630
[   37.485042]  ret_from_fork+0x10/0x20
[   37.485246] 
[   37.485308] kfence-#134: 0x00000000352b5138-0x00000000de195ed9, size=32, cache=test
[   37.485308] 
[   37.485984] allocated by task 324 on cpu 0 at 37.479723s (0.006241s ago):
[   37.486170]  test_alloc+0x230/0x628
[   37.486257]  test_corruption+0xdc/0x378
[   37.486352]  kunit_try_run_case+0x170/0x3f0
[   37.486781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.487217]  kthread+0x328/0x630
[   37.487341]  ret_from_fork+0x10/0x20
[   37.487444] 
[   37.487502] freed by task 324 on cpu 0 at 37.480513s (0.006980s ago):
[   37.487661]  test_corruption+0x120/0x378
[   37.487757]  kunit_try_run_case+0x170/0x3f0
[   37.487855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.487970]  kthread+0x328/0x630
[   37.488064]  ret_from_fork+0x10/0x20
[   37.490085] 
[   37.490340] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   37.490780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.490998] Hardware name: linux,dummy-virt (DT)
[   37.491385] ==================================================================
[   37.587295] ==================================================================
[   37.587485] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   37.587485] 
[   37.587653] Corrupted memory at 0x000000000b9ed6b8 [ ! ] (in kfence-#135):
[   37.588028]  test_corruption+0x1d8/0x378
[   37.588162]  kunit_try_run_case+0x170/0x3f0
[   37.588287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.588401]  kthread+0x328/0x630
[   37.588487]  ret_from_fork+0x10/0x20
[   37.588581] 
[   37.588638] kfence-#135: 0x0000000018132f0e-0x00000000113ff915, size=32, cache=test
[   37.588638] 
[   37.588771] allocated by task 324 on cpu 0 at 37.586891s (0.001871s ago):
[   37.588920]  test_alloc+0x230/0x628
[   37.589014]  test_corruption+0x198/0x378
[   37.589135]  kunit_try_run_case+0x170/0x3f0
[   37.589257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.589557]  kthread+0x328/0x630
[   37.589800]  ret_from_fork+0x10/0x20
[   37.590064] 
[   37.590288] freed by task 324 on cpu 0 at 37.587053s (0.003202s ago):
[   37.591099]  test_corruption+0x1d8/0x378
[   37.591312]  kunit_try_run_case+0x170/0x3f0
[   37.591436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.591639]  kthread+0x328/0x630
[   37.591847]  ret_from_fork+0x10/0x20
[   37.592014] 
[   37.592114] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   37.592370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.592438] Hardware name: linux,dummy-virt (DT)
[   37.592540] ==================================================================
[   37.060089] ==================================================================
[   37.060510] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   37.060510] 
[   37.060822] Corrupted memory at 0x00000000dc47881c [ ! . . . . . . . . . . . . . . . ] (in kfence-#130):
[   37.064163]  test_corruption+0x278/0x378
[   37.064387]  kunit_try_run_case+0x170/0x3f0
[   37.064506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.064642]  kthread+0x328/0x630
[   37.064744]  ret_from_fork+0x10/0x20
[   37.064848] 
[   37.064917] kfence-#130: 0x00000000cfc820e6-0x00000000620de20f, size=32, cache=kmalloc-32
[   37.064917] 
[   37.065057] allocated by task 322 on cpu 0 at 37.058739s (0.006308s ago):
[   37.065301]  test_alloc+0x29c/0x628
[   37.065406]  test_corruption+0xdc/0x378
[   37.065541]  kunit_try_run_case+0x170/0x3f0
[   37.065657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.065762]  kthread+0x328/0x630
[   37.066193]  ret_from_fork+0x10/0x20
[   37.066341] 
[   37.066404] freed by task 322 on cpu 0 at 37.059051s (0.007344s ago):
[   37.066844]  test_corruption+0x278/0x378
[   37.066961]  kunit_try_run_case+0x170/0x3f0
[   37.067046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.067507]  kthread+0x328/0x630
[   37.067632]  ret_from_fork+0x10/0x20
[   37.067733] 
[   37.067841] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   37.068062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.068235] Hardware name: linux,dummy-virt (DT)
[   37.068481] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   36.849999] ==================================================================
[   36.850138] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   36.850138] 
[   36.850222] Invalid free of 0x0000000025b40100 (in kfence-#128):
[   36.850285]  test_invalid_addr_free+0x1ac/0x238
[   36.850342]  kunit_try_run_case+0x170/0x3f0
[   36.850394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.850444]  kthread+0x328/0x630
[   36.850485]  ret_from_fork+0x10/0x20
[   36.850531] 
[   36.850561] kfence-#128: 0x00000000d9de2c88-0x00000000a382a022, size=32, cache=kmalloc-32
[   36.850561] 
[   36.850626] allocated by task 318 on cpu 0 at 36.849057s (0.001564s ago):
[   36.850704]  test_alloc+0x29c/0x628
[   36.850753]  test_invalid_addr_free+0xd4/0x238
[   36.850800]  kunit_try_run_case+0x170/0x3f0
[   36.850846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.850929]  kthread+0x328/0x630
[   36.851128]  ret_from_fork+0x10/0x20
[   36.851355] 
[   36.851559] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.852220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.852307] Hardware name: linux,dummy-virt (DT)
[   36.852529] ==================================================================
[   36.955084] ==================================================================
[   36.955262] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   36.955262] 
[   36.955407] Invalid free of 0x00000000e447479e (in kfence-#129):
[   36.955519]  test_invalid_addr_free+0xec/0x238
[   36.955622]  kunit_try_run_case+0x170/0x3f0
[   36.955716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.955838]  kthread+0x328/0x630
[   36.955969]  ret_from_fork+0x10/0x20
[   36.956065] 
[   36.956147] kfence-#129: 0x00000000ae368274-0x0000000058e1a2a4, size=32, cache=test
[   36.956147] 
[   36.956283] allocated by task 320 on cpu 0 at 36.954861s (0.001409s ago):
[   36.956511]  test_alloc+0x230/0x628
[   36.956649]  test_invalid_addr_free+0xd4/0x238
[   36.956760]  kunit_try_run_case+0x170/0x3f0
[   36.956861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.956981]  kthread+0x328/0x630
[   36.957067]  ret_from_fork+0x10/0x20
[   36.957158] 
[   36.957258] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.957470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.957543] Hardware name: linux,dummy-virt (DT)
[   36.957624] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   36.639286] ==================================================================
[   36.639728] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   36.639728] 
[   36.640124] Invalid free of 0x00000000011d1998 (in kfence-#126):
[   36.640610]  test_double_free+0x1bc/0x238
[   36.641011]  kunit_try_run_case+0x170/0x3f0
[   36.641346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.641632]  kthread+0x328/0x630
[   36.641849]  ret_from_fork+0x10/0x20
[   36.642189] 
[   36.642372] kfence-#126: 0x00000000011d1998-0x00000000bab18df0, size=32, cache=kmalloc-32
[   36.642372] 
[   36.642522] allocated by task 314 on cpu 0 at 36.638567s (0.003946s ago):
[   36.642770]  test_alloc+0x29c/0x628
[   36.643228]  test_double_free+0xd4/0x238
[   36.643434]  kunit_try_run_case+0x170/0x3f0
[   36.643658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.643805]  kthread+0x328/0x630
[   36.644122]  ret_from_fork+0x10/0x20
[   36.644703] 
[   36.644788] freed by task 314 on cpu 0 at 36.638710s (0.006069s ago):
[   36.645202]  test_double_free+0x1ac/0x238
[   36.645499]  kunit_try_run_case+0x170/0x3f0
[   36.645929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.646381]  kthread+0x328/0x630
[   36.646518]  ret_from_fork+0x10/0x20
[   36.646639] 
[   36.646790] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.647018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.647096] Hardware name: linux,dummy-virt (DT)
[   36.647380] ==================================================================
[   36.739821] ==================================================================
[   36.739990] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   36.739990] 
[   36.740105] Invalid free of 0x000000004a2d8db0 (in kfence-#127):
[   36.740222]  test_double_free+0x100/0x238
[   36.740334]  kunit_try_run_case+0x170/0x3f0
[   36.740432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.740530]  kthread+0x328/0x630
[   36.740618]  ret_from_fork+0x10/0x20
[   36.740709] 
[   36.740764] kfence-#127: 0x000000004a2d8db0-0x000000001fc6f906, size=32, cache=test
[   36.740764] 
[   36.740900] allocated by task 316 on cpu 0 at 36.739454s (0.001438s ago):
[   36.741029]  test_alloc+0x230/0x628
[   36.741150]  test_double_free+0xd4/0x238
[   36.741650]  kunit_try_run_case+0x170/0x3f0
[   36.741768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.741859]  kthread+0x328/0x630
[   36.741954]  ret_from_fork+0x10/0x20
[   36.742137] 
[   36.742226] freed by task 316 on cpu 0 at 36.739568s (0.002644s ago):
[   36.742414]  test_double_free+0xf0/0x238
[   36.742515]  kunit_try_run_case+0x170/0x3f0
[   36.742604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.742750]  kthread+0x328/0x630
[   36.742842]  ret_from_fork+0x10/0x20
[   36.742969] 
[   36.743082] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.743295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.743364] Hardware name: linux,dummy-virt (DT)
[   36.743666] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   36.316587] ==================================================================
[   36.316758] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.316758] 
[   36.316869] Use-after-free read at 0x0000000084d5b522 (in kfence-#123):
[   36.317003]  test_use_after_free_read+0x114/0x248
[   36.317138]  kunit_try_run_case+0x170/0x3f0
[   36.317275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.317445]  kthread+0x328/0x630
[   36.317730]  ret_from_fork+0x10/0x20
[   36.317847] 
[   36.318034] kfence-#123: 0x0000000084d5b522-0x0000000052d2ee76, size=32, cache=test
[   36.318034] 
[   36.318218] allocated by task 308 on cpu 0 at 36.316022s (0.002187s ago):
[   36.318358]  test_alloc+0x230/0x628
[   36.318446]  test_use_after_free_read+0xd0/0x248
[   36.318519]  kunit_try_run_case+0x170/0x3f0
[   36.318592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.318695]  kthread+0x328/0x630
[   36.319805]  ret_from_fork+0x10/0x20
[   36.320372] 
[   36.320471] freed by task 308 on cpu 0 at 36.316140s (0.004309s ago):
[   36.321127]  test_use_after_free_read+0xf0/0x248
[   36.321443]  kunit_try_run_case+0x170/0x3f0
[   36.321644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.321802]  kthread+0x328/0x630
[   36.322088]  ret_from_fork+0x10/0x20
[   36.322236] 
[   36.322345] CPU: 0 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.322970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.323089] Hardware name: linux,dummy-virt (DT)
[   36.323176] ==================================================================
[   36.209865] ==================================================================
[   36.210089] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   36.210089] 
[   36.210290] Use-after-free read at 0x00000000b080261e (in kfence-#122):
[   36.210412]  test_use_after_free_read+0x114/0x248
[   36.210527]  kunit_try_run_case+0x170/0x3f0
[   36.210631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.210737]  kthread+0x328/0x630
[   36.210832]  ret_from_fork+0x10/0x20
[   36.210936] 
[   36.211013] kfence-#122: 0x00000000b080261e-0x0000000098823f00, size=32, cache=kmalloc-32
[   36.211013] 
[   36.211149] allocated by task 306 on cpu 0 at 36.208427s (0.002713s ago):
[   36.211313]  test_alloc+0x29c/0x628
[   36.211396]  test_use_after_free_read+0xd0/0x248
[   36.211482]  kunit_try_run_case+0x170/0x3f0
[   36.211570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.212001]  kthread+0x328/0x630
[   36.212134]  ret_from_fork+0x10/0x20
[   36.212448] 
[   36.213219] freed by task 306 on cpu 0 at 36.208724s (0.003999s ago):
[   36.213680]  test_use_after_free_read+0x1c0/0x248
[   36.214144]  kunit_try_run_case+0x170/0x3f0
[   36.214544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.214773]  kthread+0x328/0x630
[   36.215145]  ret_from_fork+0x10/0x20
[   36.215349] 
[   36.215531] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   36.215809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.215972] Hardware name: linux,dummy-virt (DT)
[   36.216059] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   35.892063] ==================================================================
[   35.892461] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.892461] 
[   35.892760] Out-of-bounds read at 0x00000000cb9bedfd (32B right of kfence-#119):
[   35.892998]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.893331]  kunit_try_run_case+0x170/0x3f0
[   35.893505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.893641]  kthread+0x328/0x630
[   35.893739]  ret_from_fork+0x10/0x20
[   35.893930] 
[   35.894040] kfence-#119: 0x000000000eee47b3-0x00000000acd631fc, size=32, cache=test
[   35.894040] 
[   35.894506] allocated by task 300 on cpu 0 at 35.891812s (0.002684s ago):
[   35.894775]  test_alloc+0x230/0x628
[   35.895007]  test_out_of_bounds_read+0x198/0x3e0
[   35.895190]  kunit_try_run_case+0x170/0x3f0
[   35.895301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.895621]  kthread+0x328/0x630
[   35.895938]  ret_from_fork+0x10/0x20
[   35.896037] 
[   35.896119] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   35.896351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.896461] Hardware name: linux,dummy-virt (DT)
[   35.896543] ==================================================================
[   35.463380] ==================================================================
[   35.463600] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.463600] 
[   35.463837] Out-of-bounds read at 0x000000009f9ca9c8 (1B left of kfence-#115):
[   35.464016]  test_out_of_bounds_read+0x114/0x3e0
[   35.464140]  kunit_try_run_case+0x170/0x3f0
[   35.464227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.464374]  kthread+0x328/0x630
[   35.464462]  ret_from_fork+0x10/0x20
[   35.464553] 
[   35.464607] kfence-#115: 0x00000000347c406d-0x0000000000af7a2c, size=32, cache=test
[   35.464607] 
[   35.464749] allocated by task 300 on cpu 0 at 35.462998s (0.001736s ago):
[   35.465075]  test_alloc+0x230/0x628
[   35.465206]  test_out_of_bounds_read+0xdc/0x3e0
[   35.465320]  kunit_try_run_case+0x170/0x3f0
[   35.465442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.465564]  kthread+0x328/0x630
[   35.465645]  ret_from_fork+0x10/0x20
[   35.465732] 
[   35.465885] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   35.466071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.466276] Hardware name: linux,dummy-virt (DT)
[   35.466361] ==================================================================
[   35.042333] ==================================================================
[   35.042812] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   35.042812] 
[   35.043150] Out-of-bounds read at 0x000000004d1db9fe (1B left of kfence-#111):
[   35.044231]  test_out_of_bounds_read+0x114/0x3e0
[   35.044407]  kunit_try_run_case+0x170/0x3f0
[   35.044511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.044612]  kthread+0x328/0x630
[   35.044701]  ret_from_fork+0x10/0x20
[   35.045122] 
[   35.045598] kfence-#111: 0x000000008188b941-0x00000000d950d2cd, size=32, cache=kmalloc-32
[   35.045598] 
[   35.045998] allocated by task 298 on cpu 0 at 35.039137s (0.006674s ago):
[   35.046810]  test_alloc+0x29c/0x628
[   35.046973]  test_out_of_bounds_read+0xdc/0x3e0
[   35.047082]  kunit_try_run_case+0x170/0x3f0
[   35.047187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.047329]  kthread+0x328/0x630
[   35.047431]  ret_from_fork+0x10/0x20
[   35.047630] 
[   35.047814] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   35.048017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.049123] Hardware name: linux,dummy-virt (DT)
[   35.049317] ==================================================================
[   35.254233] ==================================================================
[   35.254966] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   35.254966] 
[   35.256225] Out-of-bounds read at 0x000000001eae5947 (32B right of kfence-#113):
[   35.257190]  test_out_of_bounds_read+0x1c8/0x3e0
[   35.257392]  kunit_try_run_case+0x170/0x3f0
[   35.257490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.257601]  kthread+0x328/0x630
[   35.259057]  ret_from_fork+0x10/0x20
[   35.259384] 
[   35.259751] kfence-#113: 0x00000000cfc064f4-0x0000000045832332, size=32, cache=kmalloc-32
[   35.259751] 
[   35.260058] allocated by task 298 on cpu 0 at 35.252546s (0.007502s ago):
[   35.260729]  test_alloc+0x29c/0x628
[   35.260894]  test_out_of_bounds_read+0x198/0x3e0
[   35.260994]  kunit_try_run_case+0x170/0x3f0
[   35.261988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262470]  kthread+0x328/0x630
[   35.262836]  ret_from_fork+0x10/0x20
[   35.263296] 
[   35.263619] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   35.263845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.263937] Hardware name: linux,dummy-virt (DT)
[   35.264019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   34.788186] ==================================================================
[   34.788321] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   34.789499] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.789741] 
[   34.790361] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.790791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.790982] Hardware name: linux,dummy-virt (DT)
[   34.791097] Call trace:
[   34.791233]  show_stack+0x20/0x38 (C)
[   34.791621]  dump_stack_lvl+0x8c/0xd0
[   34.792011]  print_report+0x118/0x608
[   34.792178]  kasan_report+0xdc/0x128
[   34.792492]  kasan_check_range+0x100/0x1a8
[   34.792626]  __kasan_check_write+0x20/0x30
[   34.793161]  strncpy_from_user+0x3c/0x2a0
[   34.793523]  copy_user_test_oob+0x5c0/0xec8
[   34.793714]  kunit_try_run_case+0x170/0x3f0
[   34.794150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.794290]  kthread+0x328/0x630
[   34.794382]  ret_from_fork+0x10/0x20
[   34.794499] 
[   34.794547] Allocated by task 296:
[   34.794621]  kasan_save_stack+0x3c/0x68
[   34.794734]  kasan_save_track+0x20/0x40
[   34.795935]  kasan_save_alloc_info+0x40/0x58
[   34.796083]  __kasan_kmalloc+0xd4/0xd8
[   34.796186]  __kmalloc_noprof+0x198/0x4c8
[   34.796282]  kunit_kmalloc_array+0x34/0x88
[   34.796378]  copy_user_test_oob+0xac/0xec8
[   34.796481]  kunit_try_run_case+0x170/0x3f0
[   34.796583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.797335]  kthread+0x328/0x630
[   34.797990]  ret_from_fork+0x10/0x20
[   34.798416] 
[   34.798480] The buggy address belongs to the object at fff00000c7741400
[   34.798480]  which belongs to the cache kmalloc-128 of size 128
[   34.798642] The buggy address is located 0 bytes inside of
[   34.798642]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.798775] 
[   34.798818] The buggy address belongs to the physical page:
[   34.799841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.800378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.800599] page_type: f5(slab)
[   34.800734] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.800893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.801011] page dumped because: kasan: bad access detected
[   34.801098] 
[   34.801891] Memory state around the buggy address:
[   34.802369]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.802682]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.803039] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.803176]                                                                 ^
[   34.803485]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.803671]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.803833] ==================================================================
[   34.807008] ==================================================================
[   34.807139] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   34.807551] Write of size 1 at addr fff00000c7741478 by task kunit_try_catch/296
[   34.808005] 
[   34.808166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.808819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.808918] Hardware name: linux,dummy-virt (DT)
[   34.809010] Call trace:
[   34.809072]  show_stack+0x20/0x38 (C)
[   34.809213]  dump_stack_lvl+0x8c/0xd0
[   34.809728]  print_report+0x118/0x608
[   34.809911]  kasan_report+0xdc/0x128
[   34.810036]  __asan_report_store1_noabort+0x20/0x30
[   34.810915]  strncpy_from_user+0x270/0x2a0
[   34.811153]  copy_user_test_oob+0x5c0/0xec8
[   34.811350]  kunit_try_run_case+0x170/0x3f0
[   34.811800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.812088]  kthread+0x328/0x630
[   34.812208]  ret_from_fork+0x10/0x20
[   34.812762] 
[   34.812888] Allocated by task 296:
[   34.813054]  kasan_save_stack+0x3c/0x68
[   34.813369]  kasan_save_track+0x20/0x40
[   34.813532]  kasan_save_alloc_info+0x40/0x58
[   34.813808]  __kasan_kmalloc+0xd4/0xd8
[   34.814437]  __kmalloc_noprof+0x198/0x4c8
[   34.814743]  kunit_kmalloc_array+0x34/0x88
[   34.814849]  copy_user_test_oob+0xac/0xec8
[   34.814961]  kunit_try_run_case+0x170/0x3f0
[   34.815293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.815829]  kthread+0x328/0x630
[   34.815942]  ret_from_fork+0x10/0x20
[   34.816057] 
[   34.816114] The buggy address belongs to the object at fff00000c7741400
[   34.816114]  which belongs to the cache kmalloc-128 of size 128
[   34.816723] The buggy address is located 0 bytes to the right of
[   34.816723]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.817497] 
[   34.817996] The buggy address belongs to the physical page:
[   34.818356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.818850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.819051] page_type: f5(slab)
[   34.819156] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.819292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.819404] page dumped because: kasan: bad access detected
[   34.819493] 
[   34.819543] Memory state around the buggy address:
[   34.821425]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.821896]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.822428] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.822908]                                                                 ^
[   34.823033]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.823145]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.823585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   34.677989] ==================================================================
[   34.678208] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   34.678396] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.678532] 
[   34.678624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.678822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.678910] Hardware name: linux,dummy-virt (DT)
[   34.679012] Call trace:
[   34.679093]  show_stack+0x20/0x38 (C)
[   34.679229]  dump_stack_lvl+0x8c/0xd0
[   34.679356]  print_report+0x118/0x608
[   34.679478]  kasan_report+0xdc/0x128
[   34.679596]  kasan_check_range+0x100/0x1a8
[   34.679723]  __kasan_check_write+0x20/0x30
[   34.679844]  copy_user_test_oob+0x234/0xec8
[   34.679976]  kunit_try_run_case+0x170/0x3f0
[   34.680197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.680333]  kthread+0x328/0x630
[   34.680446]  ret_from_fork+0x10/0x20
[   34.680595] 
[   34.680675] Allocated by task 296:
[   34.680760]  kasan_save_stack+0x3c/0x68
[   34.680913]  kasan_save_track+0x20/0x40
[   34.681006]  kasan_save_alloc_info+0x40/0x58
[   34.681180]  __kasan_kmalloc+0xd4/0xd8
[   34.681271]  __kmalloc_noprof+0x198/0x4c8
[   34.681370]  kunit_kmalloc_array+0x34/0x88
[   34.681513]  copy_user_test_oob+0xac/0xec8
[   34.681635]  kunit_try_run_case+0x170/0x3f0
[   34.681750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.681902]  kthread+0x328/0x630
[   34.681982]  ret_from_fork+0x10/0x20
[   34.682071] 
[   34.682128] The buggy address belongs to the object at fff00000c7741400
[   34.682128]  which belongs to the cache kmalloc-128 of size 128
[   34.682298] The buggy address is located 0 bytes inside of
[   34.682298]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.683190] 
[   34.683513] The buggy address belongs to the physical page:
[   34.683673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.683832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.684234] page_type: f5(slab)
[   34.684348] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.684482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.684599] page dumped because: kasan: bad access detected
[   34.684687] 
[   34.684738] Memory state around the buggy address:
[   34.684861]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.684992]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.685110] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.685230]                                                                 ^
[   34.685386]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.685485]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.685578] ==================================================================
[   34.753175] ==================================================================
[   34.753695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   34.753847] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.753966] 
[   34.754057] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.754281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.754357] Hardware name: linux,dummy-virt (DT)
[   34.754438] Call trace:
[   34.755130]  show_stack+0x20/0x38 (C)
[   34.755347]  dump_stack_lvl+0x8c/0xd0
[   34.755700]  print_report+0x118/0x608
[   34.756490]  kasan_report+0xdc/0x128
[   34.756750]  kasan_check_range+0x100/0x1a8
[   34.757108]  __kasan_check_write+0x20/0x30
[   34.757394]  copy_user_test_oob+0x434/0xec8
[   34.758251]  kunit_try_run_case+0x170/0x3f0
[   34.758454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.758766]  kthread+0x328/0x630
[   34.758933]  ret_from_fork+0x10/0x20
[   34.759624] 
[   34.759787] Allocated by task 296:
[   34.759937]  kasan_save_stack+0x3c/0x68
[   34.760057]  kasan_save_track+0x20/0x40
[   34.760630]  kasan_save_alloc_info+0x40/0x58
[   34.761133]  __kasan_kmalloc+0xd4/0xd8
[   34.761567]  __kmalloc_noprof+0x198/0x4c8
[   34.762044]  kunit_kmalloc_array+0x34/0x88
[   34.762345]  copy_user_test_oob+0xac/0xec8
[   34.762684]  kunit_try_run_case+0x170/0x3f0
[   34.763046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.763165]  kthread+0x328/0x630
[   34.763252]  ret_from_fork+0x10/0x20
[   34.763350] 
[   34.764573] The buggy address belongs to the object at fff00000c7741400
[   34.764573]  which belongs to the cache kmalloc-128 of size 128
[   34.765002] The buggy address is located 0 bytes inside of
[   34.765002]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.765355] 
[   34.766381] The buggy address belongs to the physical page:
[   34.766487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.766632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.767071] page_type: f5(slab)
[   34.767439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.767617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.767730] page dumped because: kasan: bad access detected
[   34.767825] 
[   34.767896] Memory state around the buggy address:
[   34.768076]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.768404]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.768669] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.768924]                                                                 ^
[   34.769153]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.769914]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.770054] ==================================================================
[   34.740620] ==================================================================
[   34.740760] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   34.740918] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.741054] 
[   34.741149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.741381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.742439] Hardware name: linux,dummy-virt (DT)
[   34.742615] Call trace:
[   34.742722]  show_stack+0x20/0x38 (C)
[   34.743126]  dump_stack_lvl+0x8c/0xd0
[   34.743504]  print_report+0x118/0x608
[   34.744004]  kasan_report+0xdc/0x128
[   34.744257]  kasan_check_range+0x100/0x1a8
[   34.744507]  __kasan_check_read+0x20/0x30
[   34.744943]  copy_user_test_oob+0x3c8/0xec8
[   34.745081]  kunit_try_run_case+0x170/0x3f0
[   34.745289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.745488]  kthread+0x328/0x630
[   34.745652]  ret_from_fork+0x10/0x20
[   34.745840] 
[   34.745934] Allocated by task 296:
[   34.746023]  kasan_save_stack+0x3c/0x68
[   34.746134]  kasan_save_track+0x20/0x40
[   34.746237]  kasan_save_alloc_info+0x40/0x58
[   34.746344]  __kasan_kmalloc+0xd4/0xd8
[   34.746489]  __kmalloc_noprof+0x198/0x4c8
[   34.746632]  kunit_kmalloc_array+0x34/0x88
[   34.746718]  copy_user_test_oob+0xac/0xec8
[   34.746795]  kunit_try_run_case+0x170/0x3f0
[   34.746909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.747035]  kthread+0x328/0x630
[   34.747155]  ret_from_fork+0x10/0x20
[   34.747289] 
[   34.747354] The buggy address belongs to the object at fff00000c7741400
[   34.747354]  which belongs to the cache kmalloc-128 of size 128
[   34.747521] The buggy address is located 0 bytes inside of
[   34.747521]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.747674] 
[   34.747733] The buggy address belongs to the physical page:
[   34.747815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.748024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.748203] page_type: f5(slab)
[   34.748332] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.748478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.748619] page dumped because: kasan: bad access detected
[   34.748723] 
[   34.748775] Memory state around the buggy address:
[   34.748896]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.749124]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.749305] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.749440]                                                                 ^
[   34.749640]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.749760]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.750392] ==================================================================
[   34.728497] ==================================================================
[   34.728674] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   34.728840] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.728990] 
[   34.729082] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.729535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.729912] Hardware name: linux,dummy-virt (DT)
[   34.730006] Call trace:
[   34.730092]  show_stack+0x20/0x38 (C)
[   34.730229]  dump_stack_lvl+0x8c/0xd0
[   34.730386]  print_report+0x118/0x608
[   34.730511]  kasan_report+0xdc/0x128
[   34.730648]  kasan_check_range+0x100/0x1a8
[   34.730816]  __kasan_check_write+0x20/0x30
[   34.731056]  copy_user_test_oob+0x35c/0xec8
[   34.731183]  kunit_try_run_case+0x170/0x3f0
[   34.731301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.731424]  kthread+0x328/0x630
[   34.731537]  ret_from_fork+0x10/0x20
[   34.731674] 
[   34.731729] Allocated by task 296:
[   34.731818]  kasan_save_stack+0x3c/0x68
[   34.731974]  kasan_save_track+0x20/0x40
[   34.732074]  kasan_save_alloc_info+0x40/0x58
[   34.732228]  __kasan_kmalloc+0xd4/0xd8
[   34.732364]  __kmalloc_noprof+0x198/0x4c8
[   34.732897]  kunit_kmalloc_array+0x34/0x88
[   34.733032]  copy_user_test_oob+0xac/0xec8
[   34.733138]  kunit_try_run_case+0x170/0x3f0
[   34.733331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.733587]  kthread+0x328/0x630
[   34.733712]  ret_from_fork+0x10/0x20
[   34.733810] 
[   34.734052] The buggy address belongs to the object at fff00000c7741400
[   34.734052]  which belongs to the cache kmalloc-128 of size 128
[   34.734233] The buggy address is located 0 bytes inside of
[   34.734233]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.734401] 
[   34.734494] The buggy address belongs to the physical page:
[   34.734589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.734795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.735048] page_type: f5(slab)
[   34.735269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.735598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.735709] page dumped because: kasan: bad access detected
[   34.736549] 
[   34.736620] Memory state around the buggy address:
[   34.736808]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.736941]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.737062] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.737163]                                                                 ^
[   34.737274]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.737383]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.738500] ==================================================================
[   34.772185] ==================================================================
[   34.772408] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   34.772773] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.773000] 
[   34.773158] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.773645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.773728] Hardware name: linux,dummy-virt (DT)
[   34.773813] Call trace:
[   34.773885]  show_stack+0x20/0x38 (C)
[   34.774111]  dump_stack_lvl+0x8c/0xd0
[   34.774327]  print_report+0x118/0x608
[   34.774656]  kasan_report+0xdc/0x128
[   34.774797]  kasan_check_range+0x100/0x1a8
[   34.774929]  __kasan_check_read+0x20/0x30
[   34.775067]  copy_user_test_oob+0x4a0/0xec8
[   34.775670]  kunit_try_run_case+0x170/0x3f0
[   34.775897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.776258]  kthread+0x328/0x630
[   34.776369]  ret_from_fork+0x10/0x20
[   34.776851] 
[   34.776927] Allocated by task 296:
[   34.777509]  kasan_save_stack+0x3c/0x68
[   34.777650]  kasan_save_track+0x20/0x40
[   34.777754]  kasan_save_alloc_info+0x40/0x58
[   34.777854]  __kasan_kmalloc+0xd4/0xd8
[   34.777946]  __kmalloc_noprof+0x198/0x4c8
[   34.778021]  kunit_kmalloc_array+0x34/0x88
[   34.778518]  copy_user_test_oob+0xac/0xec8
[   34.778927]  kunit_try_run_case+0x170/0x3f0
[   34.779064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.779775]  kthread+0x328/0x630
[   34.780304]  ret_from_fork+0x10/0x20
[   34.780627] 
[   34.780700] The buggy address belongs to the object at fff00000c7741400
[   34.780700]  which belongs to the cache kmalloc-128 of size 128
[   34.780930] The buggy address is located 0 bytes inside of
[   34.780930]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.781095] 
[   34.781798] The buggy address belongs to the physical page:
[   34.781947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.782393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.782779] page_type: f5(slab)
[   34.782993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.783146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.783462] page dumped because: kasan: bad access detected
[   34.783570] 
[   34.783632] Memory state around the buggy address:
[   34.784283]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.784645]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.784757] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.784863]                                                                 ^
[   34.784988]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.785735]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.785938] ==================================================================
[   34.697097] ==================================================================
[   34.697613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   34.698696] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296
[   34.699584] 
[   34.699735] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.700796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.701159] Hardware name: linux,dummy-virt (DT)
[   34.701394] Call trace:
[   34.701662]  show_stack+0x20/0x38 (C)
[   34.702078]  dump_stack_lvl+0x8c/0xd0
[   34.702642]  print_report+0x118/0x608
[   34.702746]  kasan_report+0xdc/0x128
[   34.703273]  kasan_check_range+0x100/0x1a8
[   34.703521]  __kasan_check_read+0x20/0x30
[   34.703708]  copy_user_test_oob+0x728/0xec8
[   34.703866]  kunit_try_run_case+0x170/0x3f0
[   34.704060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.704191]  kthread+0x328/0x630
[   34.704302]  ret_from_fork+0x10/0x20
[   34.704447] 
[   34.704517] Allocated by task 296:
[   34.704625]  kasan_save_stack+0x3c/0x68
[   34.704755]  kasan_save_track+0x20/0x40
[   34.704868]  kasan_save_alloc_info+0x40/0x58
[   34.705030]  __kasan_kmalloc+0xd4/0xd8
[   34.705163]  __kmalloc_noprof+0x198/0x4c8
[   34.705296]  kunit_kmalloc_array+0x34/0x88
[   34.705440]  copy_user_test_oob+0xac/0xec8
[   34.705533]  kunit_try_run_case+0x170/0x3f0
[   34.705624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.705738]  kthread+0x328/0x630
[   34.706018]  ret_from_fork+0x10/0x20
[   34.706118] 
[   34.706167] The buggy address belongs to the object at fff00000c7741400
[   34.706167]  which belongs to the cache kmalloc-128 of size 128
[   34.706316] The buggy address is located 0 bytes inside of
[   34.706316]  allocated 120-byte region [fff00000c7741400, fff00000c7741478)
[   34.706485] 
[   34.706556] The buggy address belongs to the physical page:
[   34.706687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.706845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.707148] page_type: f5(slab)
[   34.707275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.707615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.707745] page dumped because: kasan: bad access detected
[   34.707885] 
[   34.707953] Memory state around the buggy address:
[   34.708116]  fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.708401]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.708530] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.708640]                                                                 ^
[   34.708748]  fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.708853]  fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.708968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   34.569415] ==================================================================
[   34.569617] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   34.569799] Read of size 8 at addr fff00000c7741378 by task kunit_try_catch/292
[   34.569995] 
[   34.570110] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.570362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.570429] Hardware name: linux,dummy-virt (DT)
[   34.570504] Call trace:
[   34.570567]  show_stack+0x20/0x38 (C)
[   34.570674]  dump_stack_lvl+0x8c/0xd0
[   34.570841]  print_report+0x118/0x608
[   34.570978]  kasan_report+0xdc/0x128
[   34.571096]  __asan_report_load8_noabort+0x20/0x30
[   34.571214]  copy_to_kernel_nofault+0x204/0x250
[   34.571365]  copy_to_kernel_nofault_oob+0x158/0x418
[   34.571518]  kunit_try_run_case+0x170/0x3f0
[   34.571710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.571915]  kthread+0x328/0x630
[   34.572079]  ret_from_fork+0x10/0x20
[   34.572202] 
[   34.572262] Allocated by task 292:
[   34.572342]  kasan_save_stack+0x3c/0x68
[   34.572454]  kasan_save_track+0x20/0x40
[   34.572550]  kasan_save_alloc_info+0x40/0x58
[   34.572655]  __kasan_kmalloc+0xd4/0xd8
[   34.572762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.572901]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.573020]  kunit_try_run_case+0x170/0x3f0
[   34.573160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.573320]  kthread+0x328/0x630
[   34.573433]  ret_from_fork+0x10/0x20
[   34.573553] 
[   34.573609] The buggy address belongs to the object at fff00000c7741300
[   34.573609]  which belongs to the cache kmalloc-128 of size 128
[   34.573744] The buggy address is located 0 bytes to the right of
[   34.573744]  allocated 120-byte region [fff00000c7741300, fff00000c7741378)
[   34.573987] 
[   34.574046] The buggy address belongs to the physical page:
[   34.574124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.574269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.574432] page_type: f5(slab)
[   34.574541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.574701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.574825] page dumped because: kasan: bad access detected
[   34.575038] 
[   34.575097] Memory state around the buggy address:
[   34.575184]  fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.575295]  fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575389] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.575469]                                                                 ^
[   34.575561]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575645]  fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.575739] ==================================================================
[   34.579489] ==================================================================
[   34.580024] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   34.580313] Write of size 8 at addr fff00000c7741378 by task kunit_try_catch/292
[   34.580582] 
[   34.580861] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.581349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.581552] Hardware name: linux,dummy-virt (DT)
[   34.581758] Call trace:
[   34.582098]  show_stack+0x20/0x38 (C)
[   34.582259]  dump_stack_lvl+0x8c/0xd0
[   34.582381]  print_report+0x118/0x608
[   34.582681]  kasan_report+0xdc/0x128
[   34.583071]  kasan_check_range+0x100/0x1a8
[   34.583278]  __kasan_check_write+0x20/0x30
[   34.583396]  copy_to_kernel_nofault+0x8c/0x250
[   34.583747]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   34.584108]  kunit_try_run_case+0x170/0x3f0
[   34.584283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.584518]  kthread+0x328/0x630
[   34.584763]  ret_from_fork+0x10/0x20
[   34.585056] 
[   34.585349] Allocated by task 292:
[   34.585457]  kasan_save_stack+0x3c/0x68
[   34.585629]  kasan_save_track+0x20/0x40
[   34.585859]  kasan_save_alloc_info+0x40/0x58
[   34.586043]  __kasan_kmalloc+0xd4/0xd8
[   34.586228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.586462]  copy_to_kernel_nofault_oob+0xc8/0x418
[   34.586555]  kunit_try_run_case+0x170/0x3f0
[   34.586649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586747]  kthread+0x328/0x630
[   34.587230]  ret_from_fork+0x10/0x20
[   34.587334] 
[   34.587451] The buggy address belongs to the object at fff00000c7741300
[   34.587451]  which belongs to the cache kmalloc-128 of size 128
[   34.587599] The buggy address is located 0 bytes to the right of
[   34.587599]  allocated 120-byte region [fff00000c7741300, fff00000c7741378)
[   34.587776] 
[   34.587836] The buggy address belongs to the physical page:
[   34.588279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741
[   34.588651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.589092] page_type: f5(slab)
[   34.589238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.589538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.589764] page dumped because: kasan: bad access detected
[   34.589944] 
[   34.590073] Memory state around the buggy address:
[   34.590265]  fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.590459]  fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.590555] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.590930]                                                                 ^
[   34.591162]  fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591319]  fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.591431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   34.453053] ==================================================================
[   34.453234] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   34.453444] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/280
[   34.453561] 
[   34.453679] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.453896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.453984] Hardware name: linux,dummy-virt (DT)
[   34.454106] Call trace:
[   34.454175]  show_stack+0x20/0x38 (C)
[   34.454410]  dump_stack_lvl+0x8c/0xd0
[   34.454577]  print_report+0x310/0x608
[   34.454729]  kasan_report+0xdc/0x128
[   34.454862]  __asan_report_load1_noabort+0x20/0x30
[   34.455017]  vmalloc_oob+0x51c/0x5d0
[   34.455116]  kunit_try_run_case+0x170/0x3f0
[   34.455217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.455378]  kthread+0x328/0x630
[   34.455505]  ret_from_fork+0x10/0x20
[   34.455624] 
[   34.455692] The buggy address belongs to the virtual mapping at
[   34.455692]  [ffff8000800fe000, ffff800080100000) created by:
[   34.455692]  vmalloc_oob+0x98/0x5d0
[   34.455837] 
[   34.455890] The buggy address belongs to the physical page:
[   34.455963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a0
[   34.456100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.456301] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.456473] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.456590] page dumped because: kasan: bad access detected
[   34.456674] 
[   34.456733] Memory state around the buggy address:
[   34.456818]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.456942]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.457058] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.457174]                                                                 ^
[   34.457279]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.457438]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.457542] ==================================================================
[   34.440605] ==================================================================
[   34.440824] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   34.442388] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/280
[   34.442503] 
[   34.442587] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.443980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.444386] Hardware name: linux,dummy-virt (DT)
[   34.444567] Call trace:
[   34.444746]  show_stack+0x20/0x38 (C)
[   34.445095]  dump_stack_lvl+0x8c/0xd0
[   34.445242]  print_report+0x310/0x608
[   34.445377]  kasan_report+0xdc/0x128
[   34.446397]  __asan_report_load1_noabort+0x20/0x30
[   34.446514]  vmalloc_oob+0x578/0x5d0
[   34.446828]  kunit_try_run_case+0x170/0x3f0
[   34.447557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.448206]  kthread+0x328/0x630
[   34.448814]  ret_from_fork+0x10/0x20
[   34.449416] 
[   34.449560] The buggy address belongs to the virtual mapping at
[   34.449560]  [ffff8000800fe000, ffff800080100000) created by:
[   34.449560]  vmalloc_oob+0x98/0x5d0
[   34.449851] 
[   34.449961] The buggy address belongs to the physical page:
[   34.450085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a0
[   34.450266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.450441] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.450571] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.450663] page dumped because: kasan: bad access detected
[   34.450732] 
[   34.450799] Memory state around the buggy address:
[   34.450888]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.451006]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.451124] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   34.451252]                                                              ^
[   34.451353]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.451474]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   34.451578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   33.865115] ==================================================================
[   33.865362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.866005] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.866141] 
[   33.866233] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.866464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.866881] Hardware name: linux,dummy-virt (DT)
[   33.867114] Call trace:
[   33.867217]  show_stack+0x20/0x38 (C)
[   33.867433]  dump_stack_lvl+0x8c/0xd0
[   33.867910]  print_report+0x118/0x608
[   33.868346]  kasan_report+0xdc/0x128
[   33.868614]  __asan_report_load4_noabort+0x20/0x30
[   33.869216]  kasan_atomics_helper+0x42d8/0x4858
[   33.869454]  kasan_atomics+0x198/0x2e0
[   33.869587]  kunit_try_run_case+0x170/0x3f0
[   33.869712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.869854]  kthread+0x328/0x630
[   33.869977]  ret_from_fork+0x10/0x20
[   33.870092] 
[   33.870143] Allocated by task 276:
[   33.870223]  kasan_save_stack+0x3c/0x68
[   33.870330]  kasan_save_track+0x20/0x40
[   33.870429]  kasan_save_alloc_info+0x40/0x58
[   33.870529]  __kasan_kmalloc+0xd4/0xd8
[   33.870625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.870724]  kasan_atomics+0xb8/0x2e0
[   33.870841]  kunit_try_run_case+0x170/0x3f0
[   33.870934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.871049]  kthread+0x328/0x630
[   33.871118]  ret_from_fork+0x10/0x20
[   33.871205] 
[   33.871259] The buggy address belongs to the object at fff00000c76a3180
[   33.871259]  which belongs to the cache kmalloc-64 of size 64
[   33.871390] The buggy address is located 0 bytes to the right of
[   33.871390]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.871563] 
[   33.871637] The buggy address belongs to the physical page:
[   33.871715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.871867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.871999] page_type: f5(slab)
[   33.872136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.872312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.872468] page dumped because: kasan: bad access detected
[   33.872565] 
[   33.872612] Memory state around the buggy address:
[   33.872698]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.872861]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.873029] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.873164]                                      ^
[   33.873257]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.873368]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.873494] ==================================================================
[   33.880405] ==================================================================
[   33.880520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.880647] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.880790] 
[   33.880893] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.881154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.881334] Hardware name: linux,dummy-virt (DT)
[   33.881437] Call trace:
[   33.881518]  show_stack+0x20/0x38 (C)
[   33.881698]  dump_stack_lvl+0x8c/0xd0
[   33.881812]  print_report+0x118/0x608
[   33.881942]  kasan_report+0xdc/0x128
[   33.882061]  kasan_check_range+0x100/0x1a8
[   33.882187]  __kasan_check_write+0x20/0x30
[   33.882289]  kasan_atomics_helper+0x99c/0x4858
[   33.882403]  kasan_atomics+0x198/0x2e0
[   33.882516]  kunit_try_run_case+0x170/0x3f0
[   33.882653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.882806]  kthread+0x328/0x630
[   33.882918]  ret_from_fork+0x10/0x20
[   33.883098] 
[   33.883153] Allocated by task 276:
[   33.883232]  kasan_save_stack+0x3c/0x68
[   33.883342]  kasan_save_track+0x20/0x40
[   33.883443]  kasan_save_alloc_info+0x40/0x58
[   33.883548]  __kasan_kmalloc+0xd4/0xd8
[   33.883646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.883755]  kasan_atomics+0xb8/0x2e0
[   33.883854]  kunit_try_run_case+0x170/0x3f0
[   33.884023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.884136]  kthread+0x328/0x630
[   33.884234]  ret_from_fork+0x10/0x20
[   33.884325] 
[   33.884371] The buggy address belongs to the object at fff00000c76a3180
[   33.884371]  which belongs to the cache kmalloc-64 of size 64
[   33.884526] The buggy address is located 0 bytes to the right of
[   33.884526]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.884799] 
[   33.884860] The buggy address belongs to the physical page:
[   33.884949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.885087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.885225] page_type: f5(slab)
[   33.885351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.885532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.885746] page dumped because: kasan: bad access detected
[   33.885849] 
[   33.885903] Memory state around the buggy address:
[   33.885981]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.886098]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.886218] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.886317]                                      ^
[   33.886392]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.886483]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.886566] ==================================================================
[   34.090155] ==================================================================
[   34.090547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   34.090866] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.091072] 
[   34.091201] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.091387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.091453] Hardware name: linux,dummy-virt (DT)
[   34.091531] Call trace:
[   34.091589]  show_stack+0x20/0x38 (C)
[   34.091763]  dump_stack_lvl+0x8c/0xd0
[   34.091983]  print_report+0x118/0x608
[   34.092097]  kasan_report+0xdc/0x128
[   34.092445]  kasan_check_range+0x100/0x1a8
[   34.092571]  __kasan_check_write+0x20/0x30
[   34.093027]  kasan_atomics_helper+0xf88/0x4858
[   34.093259]  kasan_atomics+0x198/0x2e0
[   34.093403]  kunit_try_run_case+0x170/0x3f0
[   34.093522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.093759]  kthread+0x328/0x630
[   34.093856]  ret_from_fork+0x10/0x20
[   34.093977] 
[   34.094017] Allocated by task 276:
[   34.094074]  kasan_save_stack+0x3c/0x68
[   34.094161]  kasan_save_track+0x20/0x40
[   34.094259]  kasan_save_alloc_info+0x40/0x58
[   34.094523]  __kasan_kmalloc+0xd4/0xd8
[   34.094643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.094773]  kasan_atomics+0xb8/0x2e0
[   34.094914]  kunit_try_run_case+0x170/0x3f0
[   34.095025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.095131]  kthread+0x328/0x630
[   34.095502]  ret_from_fork+0x10/0x20
[   34.095616] 
[   34.095672] The buggy address belongs to the object at fff00000c76a3180
[   34.095672]  which belongs to the cache kmalloc-64 of size 64
[   34.095839] The buggy address is located 0 bytes to the right of
[   34.095839]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.096022] 
[   34.096083] The buggy address belongs to the physical page:
[   34.096165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.096318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.096504] page_type: f5(slab)
[   34.096603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.096735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.096847] page dumped because: kasan: bad access detected
[   34.097319] 
[   34.097514] Memory state around the buggy address:
[   34.097666]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.097882]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.098267] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.098388]                                      ^
[   34.098529]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.098644]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.098730] ==================================================================
[   34.124567] ==================================================================
[   34.124696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   34.125252] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.125423] 
[   34.125515] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.125744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.125807] Hardware name: linux,dummy-virt (DT)
[   34.125898] Call trace:
[   34.125957]  show_stack+0x20/0x38 (C)
[   34.126085]  dump_stack_lvl+0x8c/0xd0
[   34.126213]  print_report+0x118/0x608
[   34.126331]  kasan_report+0xdc/0x128
[   34.126446]  kasan_check_range+0x100/0x1a8
[   34.126570]  __kasan_check_write+0x20/0x30
[   34.126694]  kasan_atomics_helper+0x10c0/0x4858
[   34.126823]  kasan_atomics+0x198/0x2e0
[   34.128949]  kunit_try_run_case+0x170/0x3f0
[   34.129528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129710]  kthread+0x328/0x630
[   34.129816]  ret_from_fork+0x10/0x20
[   34.129941] 
[   34.130047] Allocated by task 276:
[   34.130146]  kasan_save_stack+0x3c/0x68
[   34.130275]  kasan_save_track+0x20/0x40
[   34.130381]  kasan_save_alloc_info+0x40/0x58
[   34.130491]  __kasan_kmalloc+0xd4/0xd8
[   34.131575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.131776]  kasan_atomics+0xb8/0x2e0
[   34.131931]  kunit_try_run_case+0x170/0x3f0
[   34.132204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.132416]  kthread+0x328/0x630
[   34.132503]  ret_from_fork+0x10/0x20
[   34.133496] 
[   34.133692] The buggy address belongs to the object at fff00000c76a3180
[   34.133692]  which belongs to the cache kmalloc-64 of size 64
[   34.134326] The buggy address is located 0 bytes to the right of
[   34.134326]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.135354] 
[   34.135578] The buggy address belongs to the physical page:
[   34.136268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.136922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.137620] page_type: f5(slab)
[   34.138208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.138752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.139017] page dumped because: kasan: bad access detected
[   34.139589] 
[   34.139658] Memory state around the buggy address:
[   34.139888]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.140181]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.140429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.140533]                                      ^
[   34.140624]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.140736]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.140840] ==================================================================
[   34.099467] ==================================================================
[   34.099665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   34.099788] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.099924] 
[   34.100012] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.100230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.100303] Hardware name: linux,dummy-virt (DT)
[   34.100385] Call trace:
[   34.100439]  show_stack+0x20/0x38 (C)
[   34.100556]  dump_stack_lvl+0x8c/0xd0
[   34.100683]  print_report+0x118/0x608
[   34.101335]  kasan_report+0xdc/0x128
[   34.101582]  kasan_check_range+0x100/0x1a8
[   34.102026]  __kasan_check_write+0x20/0x30
[   34.102373]  kasan_atomics_helper+0xff0/0x4858
[   34.102584]  kasan_atomics+0x198/0x2e0
[   34.102844]  kunit_try_run_case+0x170/0x3f0
[   34.103168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.103592]  kthread+0x328/0x630
[   34.103827]  ret_from_fork+0x10/0x20
[   34.104334] 
[   34.104397] Allocated by task 276:
[   34.104483]  kasan_save_stack+0x3c/0x68
[   34.104599]  kasan_save_track+0x20/0x40
[   34.104760]  kasan_save_alloc_info+0x40/0x58
[   34.104870]  __kasan_kmalloc+0xd4/0xd8
[   34.104982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.105084]  kasan_atomics+0xb8/0x2e0
[   34.105179]  kunit_try_run_case+0x170/0x3f0
[   34.105291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.105421]  kthread+0x328/0x630
[   34.105724]  ret_from_fork+0x10/0x20
[   34.106024] 
[   34.106074] The buggy address belongs to the object at fff00000c76a3180
[   34.106074]  which belongs to the cache kmalloc-64 of size 64
[   34.106194] The buggy address is located 0 bytes to the right of
[   34.106194]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.106349] 
[   34.106401] The buggy address belongs to the physical page:
[   34.106479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.106612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.106742] page_type: f5(slab)
[   34.106838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.107000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.107112] page dumped because: kasan: bad access detected
[   34.107200] 
[   34.107916] Memory state around the buggy address:
[   34.108361]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.108762]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.109162] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.109475]                                      ^
[   34.109726]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110059]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110486] ==================================================================
[   33.917169] ==================================================================
[   33.917329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.918017] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.918397] 
[   33.918654] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.918884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.919709] Hardware name: linux,dummy-virt (DT)
[   33.919829] Call trace:
[   33.919903]  show_stack+0x20/0x38 (C)
[   33.920038]  dump_stack_lvl+0x8c/0xd0
[   33.920678]  print_report+0x118/0x608
[   33.921113]  kasan_report+0xdc/0x128
[   33.921527]  kasan_check_range+0x100/0x1a8
[   33.921908]  __kasan_check_write+0x20/0x30
[   33.922117]  kasan_atomics_helper+0xad4/0x4858
[   33.922253]  kasan_atomics+0x198/0x2e0
[   33.922355]  kunit_try_run_case+0x170/0x3f0
[   33.923036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.923563]  kthread+0x328/0x630
[   33.924023]  ret_from_fork+0x10/0x20
[   33.924231] 
[   33.924297] Allocated by task 276:
[   33.924450]  kasan_save_stack+0x3c/0x68
[   33.924586]  kasan_save_track+0x20/0x40
[   33.924697]  kasan_save_alloc_info+0x40/0x58
[   33.924795]  __kasan_kmalloc+0xd4/0xd8
[   33.925490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.925628]  kasan_atomics+0xb8/0x2e0
[   33.925708]  kunit_try_run_case+0x170/0x3f0
[   33.925802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.925920]  kthread+0x328/0x630
[   33.926900]  ret_from_fork+0x10/0x20
[   33.927054] 
[   33.927117] The buggy address belongs to the object at fff00000c76a3180
[   33.927117]  which belongs to the cache kmalloc-64 of size 64
[   33.927357] The buggy address is located 0 bytes to the right of
[   33.927357]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.928005] 
[   33.928076] The buggy address belongs to the physical page:
[   33.928236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.928381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.928510] page_type: f5(slab)
[   33.928621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.928758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.928895] page dumped because: kasan: bad access detected
[   33.929300] 
[   33.929360] Memory state around the buggy address:
[   33.929513]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.930266]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.930409] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.930523]                                      ^
[   33.930618]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.931345]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.931464] ==================================================================
[   34.011028] ==================================================================
[   34.011174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   34.011305] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.011436] 
[   34.011524] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.011719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.011778] Hardware name: linux,dummy-virt (DT)
[   34.011853] Call trace:
[   34.011925]  show_stack+0x20/0x38 (C)
[   34.012388]  dump_stack_lvl+0x8c/0xd0
[   34.012528]  print_report+0x118/0x608
[   34.012651]  kasan_report+0xdc/0x128
[   34.012764]  __asan_report_load4_noabort+0x20/0x30
[   34.012956]  kasan_atomics_helper+0x3e04/0x4858
[   34.013146]  kasan_atomics+0x198/0x2e0
[   34.013318]  kunit_try_run_case+0x170/0x3f0
[   34.013502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.013635]  kthread+0x328/0x630
[   34.013754]  ret_from_fork+0x10/0x20
[   34.013868] 
[   34.013925] Allocated by task 276:
[   34.014006]  kasan_save_stack+0x3c/0x68
[   34.014103]  kasan_save_track+0x20/0x40
[   34.014194]  kasan_save_alloc_info+0x40/0x58
[   34.014284]  __kasan_kmalloc+0xd4/0xd8
[   34.014370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.014471]  kasan_atomics+0xb8/0x2e0
[   34.015015]  kunit_try_run_case+0x170/0x3f0
[   34.015173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.015347]  kthread+0x328/0x630
[   34.015439]  ret_from_fork+0x10/0x20
[   34.015535] 
[   34.015593] The buggy address belongs to the object at fff00000c76a3180
[   34.015593]  which belongs to the cache kmalloc-64 of size 64
[   34.015746] The buggy address is located 0 bytes to the right of
[   34.015746]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.015930] 
[   34.015987] The buggy address belongs to the physical page:
[   34.016085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.016267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.016420] page_type: f5(slab)
[   34.016564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.016752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.016903] page dumped because: kasan: bad access detected
[   34.016978] 
[   34.017022] Memory state around the buggy address:
[   34.017104]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017227]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017582] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.017846]                                      ^
[   34.017947]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018058]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018332] ==================================================================
[   34.312117] ==================================================================
[   34.312798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.313089] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.313242] 
[   34.313759] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.314159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.314234] Hardware name: linux,dummy-virt (DT)
[   34.314342] Call trace:
[   34.314414]  show_stack+0x20/0x38 (C)
[   34.314685]  dump_stack_lvl+0x8c/0xd0
[   34.314821]  print_report+0x118/0x608
[   34.314963]  kasan_report+0xdc/0x128
[   34.315549]  kasan_check_range+0x100/0x1a8
[   34.315701]  __kasan_check_write+0x20/0x30
[   34.315809]  kasan_atomics_helper+0x16d0/0x4858
[   34.316416]  kasan_atomics+0x198/0x2e0
[   34.316563]  kunit_try_run_case+0x170/0x3f0
[   34.317324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.317643]  kthread+0x328/0x630
[   34.317774]  ret_from_fork+0x10/0x20
[   34.318259] 
[   34.318365] Allocated by task 276:
[   34.318742]  kasan_save_stack+0x3c/0x68
[   34.318867]  kasan_save_track+0x20/0x40
[   34.318994]  kasan_save_alloc_info+0x40/0x58
[   34.319496]  __kasan_kmalloc+0xd4/0xd8
[   34.319622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.320246]  kasan_atomics+0xb8/0x2e0
[   34.320422]  kunit_try_run_case+0x170/0x3f0
[   34.320523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320633]  kthread+0x328/0x630
[   34.320725]  ret_from_fork+0x10/0x20
[   34.321379] 
[   34.321728] The buggy address belongs to the object at fff00000c76a3180
[   34.321728]  which belongs to the cache kmalloc-64 of size 64
[   34.322192] The buggy address is located 0 bytes to the right of
[   34.322192]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.322642] 
[   34.322710] The buggy address belongs to the physical page:
[   34.323071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.323259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.323395] page_type: f5(slab)
[   34.324049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.324200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.324661] page dumped because: kasan: bad access detected
[   34.324769] 
[   34.325097] Memory state around the buggy address:
[   34.325192]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.325668]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.325797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.325917]                                      ^
[   34.326560]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.326678]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.327099] ==================================================================
[   34.174303] ==================================================================
[   34.174484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.174610] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.174738] 
[   34.174826] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.175356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.175475] Hardware name: linux,dummy-virt (DT)
[   34.175560] Call trace:
[   34.175626]  show_stack+0x20/0x38 (C)
[   34.175794]  dump_stack_lvl+0x8c/0xd0
[   34.175966]  print_report+0x118/0x608
[   34.176109]  kasan_report+0xdc/0x128
[   34.176226]  kasan_check_range+0x100/0x1a8
[   34.176356]  __kasan_check_write+0x20/0x30
[   34.176503]  kasan_atomics_helper+0x126c/0x4858
[   34.176615]  kasan_atomics+0x198/0x2e0
[   34.176723]  kunit_try_run_case+0x170/0x3f0
[   34.176840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.177018]  kthread+0x328/0x630
[   34.177136]  ret_from_fork+0x10/0x20
[   34.177265] 
[   34.177333] Allocated by task 276:
[   34.177463]  kasan_save_stack+0x3c/0x68
[   34.177595]  kasan_save_track+0x20/0x40
[   34.177693]  kasan_save_alloc_info+0x40/0x58
[   34.177799]  __kasan_kmalloc+0xd4/0xd8
[   34.177905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.178010]  kasan_atomics+0xb8/0x2e0
[   34.178100]  kunit_try_run_case+0x170/0x3f0
[   34.178192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.178284]  kthread+0x328/0x630
[   34.178353]  ret_from_fork+0x10/0x20
[   34.178443] 
[   34.178498] The buggy address belongs to the object at fff00000c76a3180
[   34.178498]  which belongs to the cache kmalloc-64 of size 64
[   34.178675] The buggy address is located 0 bytes to the right of
[   34.178675]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.178847] 
[   34.178913] The buggy address belongs to the physical page:
[   34.179010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.179151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.180016] page_type: f5(slab)
[   34.180138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.180266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.180507] page dumped because: kasan: bad access detected
[   34.180790] 
[   34.180991] Memory state around the buggy address:
[   34.181245]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.181507]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.181733] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.182083]                                      ^
[   34.182308]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.182584]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.182772] ==================================================================
[   34.255805] ==================================================================
[   34.255933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.256058] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.256181] 
[   34.256268] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.256496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.256564] Hardware name: linux,dummy-virt (DT)
[   34.257037] Call trace:
[   34.257227]  show_stack+0x20/0x38 (C)
[   34.257479]  dump_stack_lvl+0x8c/0xd0
[   34.257706]  print_report+0x118/0x608
[   34.257888]  kasan_report+0xdc/0x128
[   34.258008]  kasan_check_range+0x100/0x1a8
[   34.258114]  __kasan_check_write+0x20/0x30
[   34.258215]  kasan_atomics_helper+0x154c/0x4858
[   34.258337]  kasan_atomics+0x198/0x2e0
[   34.258456]  kunit_try_run_case+0x170/0x3f0
[   34.259020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.259319]  kthread+0x328/0x630
[   34.259942]  ret_from_fork+0x10/0x20
[   34.260106] 
[   34.260171] Allocated by task 276:
[   34.260498]  kasan_save_stack+0x3c/0x68
[   34.260627]  kasan_save_track+0x20/0x40
[   34.260730]  kasan_save_alloc_info+0x40/0x58
[   34.260834]  __kasan_kmalloc+0xd4/0xd8
[   34.260933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.261026]  kasan_atomics+0xb8/0x2e0
[   34.261120]  kunit_try_run_case+0x170/0x3f0
[   34.261264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.261381]  kthread+0x328/0x630
[   34.262011]  ret_from_fork+0x10/0x20
[   34.262397] 
[   34.262483] The buggy address belongs to the object at fff00000c76a3180
[   34.262483]  which belongs to the cache kmalloc-64 of size 64
[   34.262786] The buggy address is located 0 bytes to the right of
[   34.262786]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.263097] 
[   34.263414] The buggy address belongs to the physical page:
[   34.263513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.263717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.264123] page_type: f5(slab)
[   34.264247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.264384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.264572] page dumped because: kasan: bad access detected
[   34.264915] 
[   34.265136] Memory state around the buggy address:
[   34.265269]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.265499]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.265641] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.266135]                                      ^
[   34.266379]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.266495]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.266901] ==================================================================
[   34.328678] ==================================================================
[   34.328816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.328967] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.329105] 
[   34.329197] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.329414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.329503] Hardware name: linux,dummy-virt (DT)
[   34.329586] Call trace:
[   34.330266]  show_stack+0x20/0x38 (C)
[   34.330460]  dump_stack_lvl+0x8c/0xd0
[   34.331028]  print_report+0x118/0x608
[   34.331471]  kasan_report+0xdc/0x128
[   34.331620]  __asan_report_load8_noabort+0x20/0x30
[   34.331754]  kasan_atomics_helper+0x3e10/0x4858
[   34.331895]  kasan_atomics+0x198/0x2e0
[   34.332020]  kunit_try_run_case+0x170/0x3f0
[   34.333275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.333962]  kthread+0x328/0x630
[   34.334094]  ret_from_fork+0x10/0x20
[   34.334193] 
[   34.334232] Allocated by task 276:
[   34.334303]  kasan_save_stack+0x3c/0x68
[   34.335444]  kasan_save_track+0x20/0x40
[   34.335585]  kasan_save_alloc_info+0x40/0x58
[   34.335695]  __kasan_kmalloc+0xd4/0xd8
[   34.336067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.336684]  kasan_atomics+0xb8/0x2e0
[   34.336798]  kunit_try_run_case+0x170/0x3f0
[   34.336909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.337245]  kthread+0x328/0x630
[   34.337762]  ret_from_fork+0x10/0x20
[   34.337917] 
[   34.337978] The buggy address belongs to the object at fff00000c76a3180
[   34.337978]  which belongs to the cache kmalloc-64 of size 64
[   34.338243] The buggy address is located 0 bytes to the right of
[   34.338243]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.338386] 
[   34.338430] The buggy address belongs to the physical page:
[   34.338722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.338893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.339046] page_type: f5(slab)
[   34.339720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.339866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.340333] page dumped because: kasan: bad access detected
[   34.340448] 
[   34.340676] Memory state around the buggy address:
[   34.341072]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341352]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341809] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.342040]                                      ^
[   34.342152]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342274]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342426] ==================================================================
[   34.183599] ==================================================================
[   34.183859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.184216] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.184571] 
[   34.184741] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.185171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.185238] Hardware name: linux,dummy-virt (DT)
[   34.185316] Call trace:
[   34.185371]  show_stack+0x20/0x38 (C)
[   34.185905]  dump_stack_lvl+0x8c/0xd0
[   34.186418]  print_report+0x118/0x608
[   34.186789]  kasan_report+0xdc/0x128
[   34.187092]  kasan_check_range+0x100/0x1a8
[   34.187413]  __kasan_check_write+0x20/0x30
[   34.187554]  kasan_atomics_helper+0x12d8/0x4858
[   34.187894]  kasan_atomics+0x198/0x2e0
[   34.188134]  kunit_try_run_case+0x170/0x3f0
[   34.188535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.188956]  kthread+0x328/0x630
[   34.189218]  ret_from_fork+0x10/0x20
[   34.189535] 
[   34.189593] Allocated by task 276:
[   34.189678]  kasan_save_stack+0x3c/0x68
[   34.189796]  kasan_save_track+0x20/0x40
[   34.190133]  kasan_save_alloc_info+0x40/0x58
[   34.190387]  __kasan_kmalloc+0xd4/0xd8
[   34.190721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.190868]  kasan_atomics+0xb8/0x2e0
[   34.190980]  kunit_try_run_case+0x170/0x3f0
[   34.191248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.191735]  kthread+0x328/0x630
[   34.191848]  ret_from_fork+0x10/0x20
[   34.191955] 
[   34.192262] The buggy address belongs to the object at fff00000c76a3180
[   34.192262]  which belongs to the cache kmalloc-64 of size 64
[   34.192615] The buggy address is located 0 bytes to the right of
[   34.192615]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.193176] 
[   34.193367] The buggy address belongs to the physical page:
[   34.193586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.193731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.193851] page_type: f5(slab)
[   34.194268] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.194659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.194908] page dumped because: kasan: bad access detected
[   34.195017] 
[   34.195070] Memory state around the buggy address:
[   34.195159]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.195274]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.195387] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.195490]                                      ^
[   34.195579]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.195970]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.196253] ==================================================================
[   34.296984] ==================================================================
[   34.297098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.297208] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.297330] 
[   34.297422] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.297668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.297739] Hardware name: linux,dummy-virt (DT)
[   34.297815] Call trace:
[   34.297936]  show_stack+0x20/0x38 (C)
[   34.298161]  dump_stack_lvl+0x8c/0xd0
[   34.298289]  print_report+0x118/0x608
[   34.298403]  kasan_report+0xdc/0x128
[   34.298531]  __asan_report_load8_noabort+0x20/0x30
[   34.298667]  kasan_atomics_helper+0x3df4/0x4858
[   34.298792]  kasan_atomics+0x198/0x2e0
[   34.298958]  kunit_try_run_case+0x170/0x3f0
[   34.299086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.299240]  kthread+0x328/0x630
[   34.299483]  ret_from_fork+0x10/0x20
[   34.299631] 
[   34.299684] Allocated by task 276:
[   34.299764]  kasan_save_stack+0x3c/0x68
[   34.299859]  kasan_save_track+0x20/0x40
[   34.299954]  kasan_save_alloc_info+0x40/0x58
[   34.300106]  __kasan_kmalloc+0xd4/0xd8
[   34.300206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.300950]  kasan_atomics+0xb8/0x2e0
[   34.301323]  kunit_try_run_case+0x170/0x3f0
[   34.302103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.302385]  kthread+0x328/0x630
[   34.302906]  ret_from_fork+0x10/0x20
[   34.303113] 
[   34.303296] The buggy address belongs to the object at fff00000c76a3180
[   34.303296]  which belongs to the cache kmalloc-64 of size 64
[   34.303988] The buggy address is located 0 bytes to the right of
[   34.303988]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.304765] 
[   34.304963] The buggy address belongs to the physical page:
[   34.305227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.305463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.305580] page_type: f5(slab)
[   34.306497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.306845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.306983] page dumped because: kasan: bad access detected
[   34.307071] 
[   34.307125] Memory state around the buggy address:
[   34.307612]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.307749]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.308001] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.308237]                                      ^
[   34.308321]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.308443]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.308861] ==================================================================
[   34.281039] ==================================================================
[   34.281164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.281292] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.281427] 
[   34.281516] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.281745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.281818] Hardware name: linux,dummy-virt (DT)
[   34.282425] Call trace:
[   34.282493]  show_stack+0x20/0x38 (C)
[   34.282618]  dump_stack_lvl+0x8c/0xd0
[   34.282744]  print_report+0x118/0x608
[   34.283264]  kasan_report+0xdc/0x128
[   34.283545]  __asan_report_load8_noabort+0x20/0x30
[   34.283701]  kasan_atomics_helper+0x3db0/0x4858
[   34.283822]  kasan_atomics+0x198/0x2e0
[   34.284127]  kunit_try_run_case+0x170/0x3f0
[   34.284276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.284413]  kthread+0x328/0x630
[   34.284513]  ret_from_fork+0x10/0x20
[   34.284658] 
[   34.284751] Allocated by task 276:
[   34.284829]  kasan_save_stack+0x3c/0x68
[   34.284965]  kasan_save_track+0x20/0x40
[   34.285068]  kasan_save_alloc_info+0x40/0x58
[   34.285176]  __kasan_kmalloc+0xd4/0xd8
[   34.285274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.285379]  kasan_atomics+0xb8/0x2e0
[   34.285501]  kunit_try_run_case+0x170/0x3f0
[   34.285595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.285925]  kthread+0x328/0x630
[   34.286016]  ret_from_fork+0x10/0x20
[   34.286111] 
[   34.286344] The buggy address belongs to the object at fff00000c76a3180
[   34.286344]  which belongs to the cache kmalloc-64 of size 64
[   34.286504] The buggy address is located 0 bytes to the right of
[   34.286504]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.286657] 
[   34.286711] The buggy address belongs to the physical page:
[   34.286838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.287069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.287221] page_type: f5(slab)
[   34.287368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.287552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.287682] page dumped because: kasan: bad access detected
[   34.287769] 
[   34.287838] Memory state around the buggy address:
[   34.287969]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.288092]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.288209] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.288314]                                      ^
[   34.288441]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288591]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288694] ==================================================================
[   34.345109] ==================================================================
[   34.345315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.345485] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.345613] 
[   34.345698] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.345912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.345987] Hardware name: linux,dummy-virt (DT)
[   34.346075] Call trace:
[   34.346898]  show_stack+0x20/0x38 (C)
[   34.347260]  dump_stack_lvl+0x8c/0xd0
[   34.347409]  print_report+0x118/0x608
[   34.347525]  kasan_report+0xdc/0x128
[   34.348085]  kasan_check_range+0x100/0x1a8
[   34.348451]  __kasan_check_write+0x20/0x30
[   34.348751]  kasan_atomics_helper+0x175c/0x4858
[   34.348934]  kasan_atomics+0x198/0x2e0
[   34.349433]  kunit_try_run_case+0x170/0x3f0
[   34.349617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.349778]  kthread+0x328/0x630
[   34.349909]  ret_from_fork+0x10/0x20
[   34.350757] 
[   34.350841] Allocated by task 276:
[   34.350957]  kasan_save_stack+0x3c/0x68
[   34.351145]  kasan_save_track+0x20/0x40
[   34.351478]  kasan_save_alloc_info+0x40/0x58
[   34.351755]  __kasan_kmalloc+0xd4/0xd8
[   34.351858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.351973]  kasan_atomics+0xb8/0x2e0
[   34.352071]  kunit_try_run_case+0x170/0x3f0
[   34.352175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.352288]  kthread+0x328/0x630
[   34.352997]  ret_from_fork+0x10/0x20
[   34.353134] 
[   34.353570] The buggy address belongs to the object at fff00000c76a3180
[   34.353570]  which belongs to the cache kmalloc-64 of size 64
[   34.353983] The buggy address is located 0 bytes to the right of
[   34.353983]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.354174] 
[   34.354739] The buggy address belongs to the physical page:
[   34.354846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.355009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.355498] page_type: f5(slab)
[   34.355957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.356136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.356401] page dumped because: kasan: bad access detected
[   34.356707] 
[   34.356772] Memory state around the buggy address:
[   34.357097]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.357228]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.357345] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.357455]                                      ^
[   34.357551]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.357666]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.357772] ==================================================================
[   34.080313] ==================================================================
[   34.080445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   34.080650] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.080776] 
[   34.081203] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.081851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.081946] Hardware name: linux,dummy-virt (DT)
[   34.082451] Call trace:
[   34.082545]  show_stack+0x20/0x38 (C)
[   34.082685]  dump_stack_lvl+0x8c/0xd0
[   34.082810]  print_report+0x118/0x608
[   34.082953]  kasan_report+0xdc/0x128
[   34.083081]  kasan_check_range+0x100/0x1a8
[   34.083206]  __kasan_check_write+0x20/0x30
[   34.083322]  kasan_atomics_helper+0xf20/0x4858
[   34.083451]  kasan_atomics+0x198/0x2e0
[   34.083572]  kunit_try_run_case+0x170/0x3f0
[   34.083698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.083846]  kthread+0x328/0x630
[   34.083965]  ret_from_fork+0x10/0x20
[   34.084375] 
[   34.084537] Allocated by task 276:
[   34.084646]  kasan_save_stack+0x3c/0x68
[   34.084754]  kasan_save_track+0x20/0x40
[   34.084853]  kasan_save_alloc_info+0x40/0x58
[   34.084974]  __kasan_kmalloc+0xd4/0xd8
[   34.085073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.085178]  kasan_atomics+0xb8/0x2e0
[   34.085278]  kunit_try_run_case+0x170/0x3f0
[   34.085412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.085563]  kthread+0x328/0x630
[   34.085685]  ret_from_fork+0x10/0x20
[   34.085803] 
[   34.085859] The buggy address belongs to the object at fff00000c76a3180
[   34.085859]  which belongs to the cache kmalloc-64 of size 64
[   34.086009] The buggy address is located 0 bytes to the right of
[   34.086009]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.086174] 
[   34.086236] The buggy address belongs to the physical page:
[   34.086327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.086458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.086571] page_type: f5(slab)
[   34.087077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.087592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.087842] page dumped because: kasan: bad access detected
[   34.088070] 
[   34.088118] Memory state around the buggy address:
[   34.088308]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088531]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088678] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.088800]                                      ^
[   34.089181]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089300]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089578] ==================================================================
[   34.221415] ==================================================================
[   34.222052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.222445] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.222682] 
[   34.223006] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.223538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.223702] Hardware name: linux,dummy-virt (DT)
[   34.223803] Call trace:
[   34.223867]  show_stack+0x20/0x38 (C)
[   34.224013]  dump_stack_lvl+0x8c/0xd0
[   34.224139]  print_report+0x118/0x608
[   34.224259]  kasan_report+0xdc/0x128
[   34.225025]  kasan_check_range+0x100/0x1a8
[   34.225308]  __kasan_check_write+0x20/0x30
[   34.225617]  kasan_atomics_helper+0x1414/0x4858
[   34.225789]  kasan_atomics+0x198/0x2e0
[   34.226041]  kunit_try_run_case+0x170/0x3f0
[   34.226311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.226769]  kthread+0x328/0x630
[   34.226897]  ret_from_fork+0x10/0x20
[   34.227139] 
[   34.227309] Allocated by task 276:
[   34.227408]  kasan_save_stack+0x3c/0x68
[   34.227728]  kasan_save_track+0x20/0x40
[   34.228100]  kasan_save_alloc_info+0x40/0x58
[   34.228226]  __kasan_kmalloc+0xd4/0xd8
[   34.228331]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.228430]  kasan_atomics+0xb8/0x2e0
[   34.228524]  kunit_try_run_case+0x170/0x3f0
[   34.228628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228741]  kthread+0x328/0x630
[   34.228825]  ret_from_fork+0x10/0x20
[   34.228931] 
[   34.228990] The buggy address belongs to the object at fff00000c76a3180
[   34.228990]  which belongs to the cache kmalloc-64 of size 64
[   34.229511] The buggy address is located 0 bytes to the right of
[   34.229511]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.229856] 
[   34.230112] The buggy address belongs to the physical page:
[   34.230512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.230675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.231043] page_type: f5(slab)
[   34.231145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.231400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.231711] page dumped because: kasan: bad access detected
[   34.232020] 
[   34.232077] Memory state around the buggy address:
[   34.232163]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.232674]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.233091] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.233438]                                      ^
[   34.233628]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.233837]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.233938] ==================================================================
[   34.040018] ==================================================================
[   34.040139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   34.040262] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.040395] 
[   34.040488] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.040719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.042297] Hardware name: linux,dummy-virt (DT)
[   34.042408] Call trace:
[   34.042474]  show_stack+0x20/0x38 (C)
[   34.042953]  dump_stack_lvl+0x8c/0xd0
[   34.043570]  print_report+0x118/0x608
[   34.043842]  kasan_report+0xdc/0x128
[   34.043987]  kasan_check_range+0x100/0x1a8
[   34.044110]  __kasan_check_write+0x20/0x30
[   34.044814]  kasan_atomics_helper+0xe44/0x4858
[   34.045251]  kasan_atomics+0x198/0x2e0
[   34.045384]  kunit_try_run_case+0x170/0x3f0
[   34.045999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.046581]  kthread+0x328/0x630
[   34.047053]  ret_from_fork+0x10/0x20
[   34.047221] 
[   34.047444] Allocated by task 276:
[   34.047532]  kasan_save_stack+0x3c/0x68
[   34.048105]  kasan_save_track+0x20/0x40
[   34.048218]  kasan_save_alloc_info+0x40/0x58
[   34.048330]  __kasan_kmalloc+0xd4/0xd8
[   34.048428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.048541]  kasan_atomics+0xb8/0x2e0
[   34.048640]  kunit_try_run_case+0x170/0x3f0
[   34.049814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.050214]  kthread+0x328/0x630
[   34.050556]  ret_from_fork+0x10/0x20
[   34.050887] 
[   34.050964] The buggy address belongs to the object at fff00000c76a3180
[   34.050964]  which belongs to the cache kmalloc-64 of size 64
[   34.051374] The buggy address is located 0 bytes to the right of
[   34.051374]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.051564] 
[   34.051614] The buggy address belongs to the physical page:
[   34.051686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.051809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.051952] page_type: f5(slab)
[   34.052056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.053158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.053438] page dumped because: kasan: bad access detected
[   34.053530] 
[   34.053574] Memory state around the buggy address:
[   34.054054]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.054366]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.054497] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.055086]                                      ^
[   34.055193]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055306]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055668] ==================================================================
[   34.210732] ==================================================================
[   34.210865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.211002] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.211107] 
[   34.211190] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.211412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.211484] Hardware name: linux,dummy-virt (DT)
[   34.211571] Call trace:
[   34.211630]  show_stack+0x20/0x38 (C)
[   34.211758]  dump_stack_lvl+0x8c/0xd0
[   34.211889]  print_report+0x118/0x608
[   34.212021]  kasan_report+0xdc/0x128
[   34.212138]  __asan_report_load8_noabort+0x20/0x30
[   34.212261]  kasan_atomics_helper+0x3f04/0x4858
[   34.212387]  kasan_atomics+0x198/0x2e0
[   34.212510]  kunit_try_run_case+0x170/0x3f0
[   34.212640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.212783]  kthread+0x328/0x630
[   34.213548]  ret_from_fork+0x10/0x20
[   34.213843] 
[   34.213910] Allocated by task 276:
[   34.213998]  kasan_save_stack+0x3c/0x68
[   34.214387]  kasan_save_track+0x20/0x40
[   34.214489]  kasan_save_alloc_info+0x40/0x58
[   34.214572]  __kasan_kmalloc+0xd4/0xd8
[   34.214643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.214738]  kasan_atomics+0xb8/0x2e0
[   34.214825]  kunit_try_run_case+0x170/0x3f0
[   34.215024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.215293]  kthread+0x328/0x630
[   34.215747]  ret_from_fork+0x10/0x20
[   34.216081] 
[   34.216213] The buggy address belongs to the object at fff00000c76a3180
[   34.216213]  which belongs to the cache kmalloc-64 of size 64
[   34.216426] The buggy address is located 0 bytes to the right of
[   34.216426]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.216998] 
[   34.217079] The buggy address belongs to the physical page:
[   34.217298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.217534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.217894] page_type: f5(slab)
[   34.217998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.218120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.218374] page dumped because: kasan: bad access detected
[   34.218568] 
[   34.218643] Memory state around the buggy address:
[   34.218758]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.218881]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.219008] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.219738]                                      ^
[   34.220044]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.220184]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.220294] ==================================================================
[   34.166336] ==================================================================
[   34.166465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.166643] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.166818] 
[   34.166975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.167273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.167344] Hardware name: linux,dummy-virt (DT)
[   34.167430] Call trace:
[   34.167515]  show_stack+0x20/0x38 (C)
[   34.167681]  dump_stack_lvl+0x8c/0xd0
[   34.167847]  print_report+0x118/0x608
[   34.167967]  kasan_report+0xdc/0x128
[   34.168081]  kasan_check_range+0x100/0x1a8
[   34.168250]  __kasan_check_write+0x20/0x30
[   34.168360]  kasan_atomics_helper+0x11f8/0x4858
[   34.168477]  kasan_atomics+0x198/0x2e0
[   34.168593]  kunit_try_run_case+0x170/0x3f0
[   34.168727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.168928]  kthread+0x328/0x630
[   34.169062]  ret_from_fork+0x10/0x20
[   34.169214] 
[   34.169283] Allocated by task 276:
[   34.169379]  kasan_save_stack+0x3c/0x68
[   34.169506]  kasan_save_track+0x20/0x40
[   34.169637]  kasan_save_alloc_info+0x40/0x58
[   34.169853]  __kasan_kmalloc+0xd4/0xd8
[   34.169993]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.170109]  kasan_atomics+0xb8/0x2e0
[   34.170198]  kunit_try_run_case+0x170/0x3f0
[   34.170284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.170372]  kthread+0x328/0x630
[   34.170450]  ret_from_fork+0x10/0x20
[   34.170545] 
[   34.170602] The buggy address belongs to the object at fff00000c76a3180
[   34.170602]  which belongs to the cache kmalloc-64 of size 64
[   34.171239] The buggy address is located 0 bytes to the right of
[   34.171239]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.172433] 
[   34.172508] The buggy address belongs to the physical page:
[   34.172591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.172675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.172736] page_type: f5(slab)
[   34.172788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.172845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.172947] page dumped because: kasan: bad access detected
[   34.173070] 
[   34.173120] Memory state around the buggy address:
[   34.173206]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.173322]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.173429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.173531]                                      ^
[   34.173613]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173706]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173793] ==================================================================
[   33.874083] ==================================================================
[   33.874211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.874375] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.874508] 
[   33.874589] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.874785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.875726]  kasan_atomics_helper+0x934/0x4858
[   33.877084]  __kasan_kmalloc+0xd4/0xd8
[   33.877179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.877280]  kasan_atomics+0xb8/0x2e0
[   33.877371]  kunit_try_run_case+0x170/0x3f0
[   33.877603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.877744]  kthread+0x328/0x630
[   33.877827]  ret_from_fork+0x10/0x20
[   33.877928] 
[   33.878012] The buggy address belongs to the object at fff00000c76a3180
[   33.878012]  which belongs to the cache kmalloc-64 of size 64
[   33.878162] The buggy address is located 0 bytes to the right of
[   33.878162]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.878346] 
[   33.878410] The buggy address belongs to the physical page:
[   33.878481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.878595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.878711] page_type: f5(slab)
[   33.878814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.878972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.879092] page dumped because: kasan: bad access detected
[   33.879168] 
[   33.879233] Memory state around the buggy address:
[   33.879321]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.879430]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.879548] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.879653]                                      ^
[   33.879744]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879859]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879974] ==================================================================
[   33.990765] ==================================================================
[   33.990987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.991125] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.991256] 
[   33.991338] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.991557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.991634] Hardware name: linux,dummy-virt (DT)
[   33.991724] Call trace:
[   33.991811]  show_stack+0x20/0x38 (C)
[   33.992075]  dump_stack_lvl+0x8c/0xd0
[   33.992323]  print_report+0x118/0x608
[   33.993098]  kasan_report+0xdc/0x128
[   33.993482]  __asan_report_load4_noabort+0x20/0x30
[   33.993742]  kasan_atomics_helper+0x3dd8/0x4858
[   33.993912]  kasan_atomics+0x198/0x2e0
[   33.994036]  kunit_try_run_case+0x170/0x3f0
[   33.994166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.994307]  kthread+0x328/0x630
[   33.994422]  ret_from_fork+0x10/0x20
[   33.994544] 
[   33.994586] Allocated by task 276:
[   33.994647]  kasan_save_stack+0x3c/0x68
[   33.995124]  kasan_save_track+0x20/0x40
[   33.995366]  kasan_save_alloc_info+0x40/0x58
[   33.995480]  __kasan_kmalloc+0xd4/0xd8
[   33.995665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.995948]  kasan_atomics+0xb8/0x2e0
[   33.996047]  kunit_try_run_case+0x170/0x3f0
[   33.996311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.996623]  kthread+0x328/0x630
[   33.996821]  ret_from_fork+0x10/0x20
[   33.997032] 
[   33.997105] The buggy address belongs to the object at fff00000c76a3180
[   33.997105]  which belongs to the cache kmalloc-64 of size 64
[   33.997376] The buggy address is located 0 bytes to the right of
[   33.997376]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.997563] 
[   33.997622] The buggy address belongs to the physical page:
[   33.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.997850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.997990] page_type: f5(slab)
[   33.998089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.998263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.998625] page dumped because: kasan: bad access detected
[   33.998758] 
[   33.998839] Memory state around the buggy address:
[   33.998986]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.999156]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.999321] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.999467]                                      ^
[   33.999967]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.000087]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.000193] ==================================================================
[   33.900918] ==================================================================
[   33.901055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.901839] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.902007] 
[   33.902097] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.902326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.902407] Hardware name: linux,dummy-virt (DT)
[   33.903390] Call trace:
[   33.903571]  show_stack+0x20/0x38 (C)
[   33.904160]  dump_stack_lvl+0x8c/0xd0
[   33.904518]  print_report+0x118/0x608
[   33.904881]  kasan_report+0xdc/0x128
[   33.905379]  kasan_check_range+0x100/0x1a8
[   33.905624]  __kasan_check_write+0x20/0x30
[   33.905859]  kasan_atomics_helper+0xa6c/0x4858
[   33.906188]  kasan_atomics+0x198/0x2e0
[   33.906426]  kunit_try_run_case+0x170/0x3f0
[   33.906822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.907209]  kthread+0x328/0x630
[   33.907648]  ret_from_fork+0x10/0x20
[   33.908036] 
[   33.908100] Allocated by task 276:
[   33.908471]  kasan_save_stack+0x3c/0x68
[   33.908593]  kasan_save_track+0x20/0x40
[   33.908932]  kasan_save_alloc_info+0x40/0x58
[   33.909055]  __kasan_kmalloc+0xd4/0xd8
[   33.909660]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.909848]  kasan_atomics+0xb8/0x2e0
[   33.909960]  kunit_try_run_case+0x170/0x3f0
[   33.910293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.910663]  kthread+0x328/0x630
[   33.910805]  ret_from_fork+0x10/0x20
[   33.911118] 
[   33.911443] The buggy address belongs to the object at fff00000c76a3180
[   33.911443]  which belongs to the cache kmalloc-64 of size 64
[   33.911811] The buggy address is located 0 bytes to the right of
[   33.911811]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.912384] 
[   33.912463] The buggy address belongs to the physical page:
[   33.912554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.913102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.913250] page_type: f5(slab)
[   33.913795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.914324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.914449] page dumped because: kasan: bad access detected
[   33.914606] 
[   33.914686] Memory state around the buggy address:
[   33.914882]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.915021]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.915200] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.915367]                                      ^
[   33.915465]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.915617]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.915806] ==================================================================
[   34.031573] ==================================================================
[   34.031637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   34.031745] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.031858] 
[   34.031962] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.032150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.032221] Hardware name: linux,dummy-virt (DT)
[   34.032304] Call trace:
[   34.032360]  show_stack+0x20/0x38 (C)
[   34.032493]  dump_stack_lvl+0x8c/0xd0
[   34.032617]  print_report+0x118/0x608
[   34.032738]  kasan_report+0xdc/0x128
[   34.032853]  __asan_report_load8_noabort+0x20/0x30
[   34.032999]  kasan_atomics_helper+0x3f58/0x4858
[   34.033129]  kasan_atomics+0x198/0x2e0
[   34.033248]  kunit_try_run_case+0x170/0x3f0
[   34.033379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.033517]  kthread+0x328/0x630
[   34.033631]  ret_from_fork+0x10/0x20
[   34.033757] 
[   34.033806] Allocated by task 276:
[   34.033889]  kasan_save_stack+0x3c/0x68
[   34.034295]  kasan_save_track+0x20/0x40
[   34.034395]  kasan_save_alloc_info+0x40/0x58
[   34.034490]  __kasan_kmalloc+0xd4/0xd8
[   34.034762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.034866]  kasan_atomics+0xb8/0x2e0
[   34.034989]  kunit_try_run_case+0x170/0x3f0
[   34.035081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.035184]  kthread+0x328/0x630
[   34.035258]  ret_from_fork+0x10/0x20
[   34.035332] 
[   34.035382] The buggy address belongs to the object at fff00000c76a3180
[   34.035382]  which belongs to the cache kmalloc-64 of size 64
[   34.035934] The buggy address is located 0 bytes to the right of
[   34.035934]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.036190] 
[   34.036251] The buggy address belongs to the physical page:
[   34.036492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.036962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.037800] page_type: f5(slab)
[   34.037924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.038078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.038508] page dumped because: kasan: bad access detected
[   34.038589] 
[   34.038644] Memory state around the buggy address:
[   34.038743]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.038857]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.038989] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.039077]                                      ^
[   34.039157]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.039250]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.039361] ==================================================================
[   34.057646] ==================================================================
[   34.058461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   34.058766] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.058982] 
[   34.059082] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.059602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.059824] Hardware name: linux,dummy-virt (DT)
[   34.060030] Call trace:
[   34.060244]  show_stack+0x20/0x38 (C)
[   34.060504]  dump_stack_lvl+0x8c/0xd0
[   34.060933]  print_report+0x118/0x608
[   34.061214]  kasan_report+0xdc/0x128
[   34.061382]  __asan_report_store8_noabort+0x20/0x30
[   34.061767]  kasan_atomics_helper+0x3e5c/0x4858
[   34.062092]  kasan_atomics+0x198/0x2e0
[   34.062168]  kunit_try_run_case+0x170/0x3f0
[   34.062228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.062293]  kthread+0x328/0x630
[   34.062346]  ret_from_fork+0x10/0x20
[   34.062407] 
[   34.062431] Allocated by task 276:
[   34.062470]  kasan_save_stack+0x3c/0x68
[   34.062525]  kasan_save_track+0x20/0x40
[   34.062571]  kasan_save_alloc_info+0x40/0x58
[   34.062618]  __kasan_kmalloc+0xd4/0xd8
[   34.062662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.062709]  kasan_atomics+0xb8/0x2e0
[   34.062751]  kunit_try_run_case+0x170/0x3f0
[   34.062794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.062845]  kthread+0x328/0x630
[   34.062914]  ret_from_fork+0x10/0x20
[   34.063543] 
[   34.063647] The buggy address belongs to the object at fff00000c76a3180
[   34.063647]  which belongs to the cache kmalloc-64 of size 64
[   34.064106] The buggy address is located 0 bytes to the right of
[   34.064106]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.064578] 
[   34.064686] The buggy address belongs to the physical page:
[   34.064904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.065034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.065553] page_type: f5(slab)
[   34.065841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.065992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.066105] page dumped because: kasan: bad access detected
[   34.066535] 
[   34.066593] Memory state around the buggy address:
[   34.066853]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067107]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067450] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.067773]                                      ^
[   34.068099]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068350]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068462] ==================================================================
[   34.289220] ==================================================================
[   34.289566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.289786] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.290081] 
[   34.290390] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.290646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.290718] Hardware name: linux,dummy-virt (DT)
[   34.290802] Call trace:
[   34.290892]  show_stack+0x20/0x38 (C)
[   34.291330]  dump_stack_lvl+0x8c/0xd0
[   34.291539]  print_report+0x118/0x608
[   34.291703]  kasan_report+0xdc/0x128
[   34.291895]  kasan_check_range+0x100/0x1a8
[   34.292015]  __kasan_check_write+0x20/0x30
[   34.292111]  kasan_atomics_helper+0x1644/0x4858
[   34.292254]  kasan_atomics+0x198/0x2e0
[   34.292385]  kunit_try_run_case+0x170/0x3f0
[   34.292524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.292644]  kthread+0x328/0x630
[   34.292751]  ret_from_fork+0x10/0x20
[   34.292894] 
[   34.292951] Allocated by task 276:
[   34.293034]  kasan_save_stack+0x3c/0x68
[   34.293133]  kasan_save_track+0x20/0x40
[   34.293251]  kasan_save_alloc_info+0x40/0x58
[   34.293386]  __kasan_kmalloc+0xd4/0xd8
[   34.293544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.293649]  kasan_atomics+0xb8/0x2e0
[   34.293732]  kunit_try_run_case+0x170/0x3f0
[   34.293832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.293984]  kthread+0x328/0x630
[   34.294078]  ret_from_fork+0x10/0x20
[   34.294208] 
[   34.294259] The buggy address belongs to the object at fff00000c76a3180
[   34.294259]  which belongs to the cache kmalloc-64 of size 64
[   34.294449] The buggy address is located 0 bytes to the right of
[   34.294449]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.294624] 
[   34.294708] The buggy address belongs to the physical page:
[   34.294784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.294937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.295072] page_type: f5(slab)
[   34.295161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.295305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.295412] page dumped because: kasan: bad access detected
[   34.295496] 
[   34.295547] Memory state around the buggy address:
[   34.295632]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.295750]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.295929] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.296084]                                      ^
[   34.296217]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.296381]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.296531] ==================================================================
[   33.886996] ==================================================================
[   33.887118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.887243] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.887380] 
[   33.887506] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.888392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.888568] Hardware name: linux,dummy-virt (DT)
[   33.888657] Call trace:
[   33.888712]  show_stack+0x20/0x38 (C)
[   33.888846]  dump_stack_lvl+0x8c/0xd0
[   33.888985]  print_report+0x118/0x608
[   33.889107]  kasan_report+0xdc/0x128
[   33.889227]  kasan_check_range+0x100/0x1a8
[   33.889355]  __kasan_check_write+0x20/0x30
[   33.889927]  kasan_atomics_helper+0xa04/0x4858
[   33.890620]  kasan_atomics+0x198/0x2e0
[   33.890795]  kunit_try_run_case+0x170/0x3f0
[   33.891207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.891593]  kthread+0x328/0x630
[   33.891724]  ret_from_fork+0x10/0x20
[   33.891976] 
[   33.892038] Allocated by task 276:
[   33.892242]  kasan_save_stack+0x3c/0x68
[   33.892793]  kasan_save_track+0x20/0x40
[   33.892946]  kasan_save_alloc_info+0x40/0x58
[   33.893158]  __kasan_kmalloc+0xd4/0xd8
[   33.893266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.893828]  kasan_atomics+0xb8/0x2e0
[   33.893954]  kunit_try_run_case+0x170/0x3f0
[   33.894367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894490]  kthread+0x328/0x630
[   33.894568]  ret_from_fork+0x10/0x20
[   33.894649] 
[   33.894706] The buggy address belongs to the object at fff00000c76a3180
[   33.894706]  which belongs to the cache kmalloc-64 of size 64
[   33.895725] The buggy address is located 0 bytes to the right of
[   33.895725]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.896013] 
[   33.896163] The buggy address belongs to the physical page:
[   33.896283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.896460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.896648] page_type: f5(slab)
[   33.896821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.897204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.897533] page dumped because: kasan: bad access detected
[   33.897630] 
[   33.897677] Memory state around the buggy address:
[   33.897751]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.897855]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.898434] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.899029]                                      ^
[   33.899155]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.899682]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.900164] ==================================================================
[   34.268958] ==================================================================
[   34.269092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.269224] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.269358] 
[   34.269462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.269694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.269765] Hardware name: linux,dummy-virt (DT)
[   34.269850] Call trace:
[   34.272628]  show_stack+0x20/0x38 (C)
[   34.272792]  dump_stack_lvl+0x8c/0xd0
[   34.273028]  print_report+0x118/0x608
[   34.273157]  kasan_report+0xdc/0x128
[   34.273365]  kasan_check_range+0x100/0x1a8
[   34.273655]  __kasan_check_write+0x20/0x30
[   34.273866]  kasan_atomics_helper+0x15b4/0x4858
[   34.274198]  kasan_atomics+0x198/0x2e0
[   34.274364]  kunit_try_run_case+0x170/0x3f0
[   34.274472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274587]  kthread+0x328/0x630
[   34.274674]  ret_from_fork+0x10/0x20
[   34.274798] 
[   34.275299] Allocated by task 276:
[   34.275382]  kasan_save_stack+0x3c/0x68
[   34.275486]  kasan_save_track+0x20/0x40
[   34.275570]  kasan_save_alloc_info+0x40/0x58
[   34.275668]  __kasan_kmalloc+0xd4/0xd8
[   34.275761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.276316]  kasan_atomics+0xb8/0x2e0
[   34.276436]  kunit_try_run_case+0x170/0x3f0
[   34.276538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.277129]  kthread+0x328/0x630
[   34.277754]  ret_from_fork+0x10/0x20
[   34.277868] 
[   34.277967] The buggy address belongs to the object at fff00000c76a3180
[   34.277967]  which belongs to the cache kmalloc-64 of size 64
[   34.278113] The buggy address is located 0 bytes to the right of
[   34.278113]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.278383] 
[   34.278713] The buggy address belongs to the physical page:
[   34.278843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.279084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.279222] page_type: f5(slab)
[   34.279326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.279453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.279582] page dumped because: kasan: bad access detected
[   34.279702] 
[   34.279783] Memory state around the buggy address:
[   34.279909]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.280014]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.280124] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.280228]                                      ^
[   34.280319]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.280426]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.280521] ==================================================================
[   34.021554] ==================================================================
[   34.021680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   34.022138] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.022327] 
[   34.022419] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.022635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.022709] Hardware name: linux,dummy-virt (DT)
[   34.022988] Call trace:
[   34.023059]  show_stack+0x20/0x38 (C)
[   34.023237]  dump_stack_lvl+0x8c/0xd0
[   34.023404]  print_report+0x118/0x608
[   34.023581]  kasan_report+0xdc/0x128
[   34.023754]  kasan_check_range+0x100/0x1a8
[   34.023955]  __kasan_check_read+0x20/0x30
[   34.024141]  kasan_atomics_helper+0xdd4/0x4858
[   34.024318]  kasan_atomics+0x198/0x2e0
[   34.024488]  kunit_try_run_case+0x170/0x3f0
[   34.024628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.024789]  kthread+0x328/0x630
[   34.024915]  ret_from_fork+0x10/0x20
[   34.025048] 
[   34.025125] Allocated by task 276:
[   34.025232]  kasan_save_stack+0x3c/0x68
[   34.025384]  kasan_save_track+0x20/0x40
[   34.025525]  kasan_save_alloc_info+0x40/0x58
[   34.025627]  __kasan_kmalloc+0xd4/0xd8
[   34.025723]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.025831]  kasan_atomics+0xb8/0x2e0
[   34.026384]  kunit_try_run_case+0x170/0x3f0
[   34.027197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.027359]  kthread+0x328/0x630
[   34.027451]  ret_from_fork+0x10/0x20
[   34.027548] 
[   34.027630] The buggy address belongs to the object at fff00000c76a3180
[   34.027630]  which belongs to the cache kmalloc-64 of size 64
[   34.027768] The buggy address is located 0 bytes to the right of
[   34.027768]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.028206] 
[   34.028301] The buggy address belongs to the physical page:
[   34.028425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.028582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.028723] page_type: f5(slab)
[   34.028886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.029027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.029134] page dumped because: kasan: bad access detected
[   34.029219] 
[   34.029268] Memory state around the buggy address:
[   34.029358]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.029509]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.029622] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.029732]                                      ^
[   34.030375]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030509]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030918] ==================================================================
[   34.142751] ==================================================================
[   34.143235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   34.143692] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.143827] 
[   34.143928] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.144151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.144227] Hardware name: linux,dummy-virt (DT)
[   34.144312] Call trace:
[   34.144368]  show_stack+0x20/0x38 (C)
[   34.144491]  dump_stack_lvl+0x8c/0xd0
[   34.144620]  print_report+0x118/0x608
[   34.144739]  kasan_report+0xdc/0x128
[   34.144859]  kasan_check_range+0x100/0x1a8
[   34.146185]  __kasan_check_write+0x20/0x30
[   34.146502]  kasan_atomics_helper+0x1128/0x4858
[   34.146721]  kasan_atomics+0x198/0x2e0
[   34.146868]  kunit_try_run_case+0x170/0x3f0
[   34.147013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.147239]  kthread+0x328/0x630
[   34.147421]  ret_from_fork+0x10/0x20
[   34.147617] 
[   34.147673] Allocated by task 276:
[   34.147767]  kasan_save_stack+0x3c/0x68
[   34.147889]  kasan_save_track+0x20/0x40
[   34.147992]  kasan_save_alloc_info+0x40/0x58
[   34.148092]  __kasan_kmalloc+0xd4/0xd8
[   34.148206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.148320]  kasan_atomics+0xb8/0x2e0
[   34.148416]  kunit_try_run_case+0x170/0x3f0
[   34.148512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.148628]  kthread+0x328/0x630
[   34.148715]  ret_from_fork+0x10/0x20
[   34.148842] 
[   34.149187] The buggy address belongs to the object at fff00000c76a3180
[   34.149187]  which belongs to the cache kmalloc-64 of size 64
[   34.149359] The buggy address is located 0 bytes to the right of
[   34.149359]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.149523] 
[   34.150421] The buggy address belongs to the physical page:
[   34.150554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.150694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.151052] page_type: f5(slab)
[   34.151160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.151308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.151433] page dumped because: kasan: bad access detected
[   34.151570] 
[   34.151659] Memory state around the buggy address:
[   34.151932]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.152079]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.152296] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.152497]                                      ^
[   34.152651]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152929]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.153040] ==================================================================
[   34.234833] ==================================================================
[   34.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.235555] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.236190] 
[   34.236356] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.236677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.236778] Hardware name: linux,dummy-virt (DT)
[   34.236913] Call trace:
[   34.237003]  show_stack+0x20/0x38 (C)
[   34.237190]  dump_stack_lvl+0x8c/0xd0
[   34.237342]  print_report+0x118/0x608
[   34.237512]  kasan_report+0xdc/0x128
[   34.237628]  kasan_check_range+0x100/0x1a8
[   34.237939]  __kasan_check_write+0x20/0x30
[   34.238294]  kasan_atomics_helper+0x147c/0x4858
[   34.238458]  kasan_atomics+0x198/0x2e0
[   34.238588]  kunit_try_run_case+0x170/0x3f0
[   34.238713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.239104]  kthread+0x328/0x630
[   34.239226]  ret_from_fork+0x10/0x20
[   34.239370] 
[   34.239449] Allocated by task 276:
[   34.239757]  kasan_save_stack+0x3c/0x68
[   34.239900]  kasan_save_track+0x20/0x40
[   34.240315]  kasan_save_alloc_info+0x40/0x58
[   34.240552]  __kasan_kmalloc+0xd4/0xd8
[   34.240699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.240848]  kasan_atomics+0xb8/0x2e0
[   34.240967]  kunit_try_run_case+0x170/0x3f0
[   34.241065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.241200]  kthread+0x328/0x630
[   34.241295]  ret_from_fork+0x10/0x20
[   34.241461] 
[   34.241515] The buggy address belongs to the object at fff00000c76a3180
[   34.241515]  which belongs to the cache kmalloc-64 of size 64
[   34.241670] The buggy address is located 0 bytes to the right of
[   34.241670]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.242186] 
[   34.242335] The buggy address belongs to the physical page:
[   34.242480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.242754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.243329] page_type: f5(slab)
[   34.243461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.243600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.243715] page dumped because: kasan: bad access detected
[   34.243799] 
[   34.243886] Memory state around the buggy address:
[   34.243967]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.244117]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.244231] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.244585]                                      ^
[   34.244727]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.244918]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.245029] ==================================================================
[   34.359109] ==================================================================
[   34.359243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.359768] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.359911] 
[   34.360003] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.360213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.360280] Hardware name: linux,dummy-virt (DT)
[   34.360359] Call trace:
[   34.360418]  show_stack+0x20/0x38 (C)
[   34.360540]  dump_stack_lvl+0x8c/0xd0
[   34.361315]  print_report+0x118/0x608
[   34.361579]  kasan_report+0xdc/0x128
[   34.361789]  __asan_report_load8_noabort+0x20/0x30
[   34.362184]  kasan_atomics_helper+0x3e20/0x4858
[   34.362429]  kasan_atomics+0x198/0x2e0
[   34.362554]  kunit_try_run_case+0x170/0x3f0
[   34.363324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.363639]  kthread+0x328/0x630
[   34.363779]  ret_from_fork+0x10/0x20
[   34.364004] 
[   34.364059] Allocated by task 276:
[   34.364227]  kasan_save_stack+0x3c/0x68
[   34.364576]  kasan_save_track+0x20/0x40
[   34.364928]  kasan_save_alloc_info+0x40/0x58
[   34.365043]  __kasan_kmalloc+0xd4/0xd8
[   34.365559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.365694]  kasan_atomics+0xb8/0x2e0
[   34.365778]  kunit_try_run_case+0x170/0x3f0
[   34.365861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.365977]  kthread+0x328/0x630
[   34.366522]  ret_from_fork+0x10/0x20
[   34.366651] 
[   34.367107] The buggy address belongs to the object at fff00000c76a3180
[   34.367107]  which belongs to the cache kmalloc-64 of size 64
[   34.367296] The buggy address is located 0 bytes to the right of
[   34.367296]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.368033] 
[   34.368103] The buggy address belongs to the physical page:
[   34.368204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.368348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.368808] page_type: f5(slab)
[   34.368952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.369694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.369825] page dumped because: kasan: bad access detected
[   34.369916] 
[   34.369969] Memory state around the buggy address:
[   34.370149]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.370269]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.370384] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.370509]                                      ^
[   34.370606]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370735]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370845] ==================================================================
[   34.070170] ==================================================================
[   34.070597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   34.070794] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.070959] 
[   34.071045] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.071253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.071363] Hardware name: linux,dummy-virt (DT)
[   34.071498] Call trace:
[   34.071566]  show_stack+0x20/0x38 (C)
[   34.071697]  dump_stack_lvl+0x8c/0xd0
[   34.071822]  print_report+0x118/0x608
[   34.071946]  kasan_report+0xdc/0x128
[   34.072063]  kasan_check_range+0x100/0x1a8
[   34.072188]  __kasan_check_write+0x20/0x30
[   34.072303]  kasan_atomics_helper+0xeb8/0x4858
[   34.072436]  kasan_atomics+0x198/0x2e0
[   34.072557]  kunit_try_run_case+0x170/0x3f0
[   34.072679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.072817]  kthread+0x328/0x630
[   34.072948]  ret_from_fork+0x10/0x20
[   34.073077] 
[   34.073134] Allocated by task 276:
[   34.073212]  kasan_save_stack+0x3c/0x68
[   34.073321]  kasan_save_track+0x20/0x40
[   34.073727]  kasan_save_alloc_info+0x40/0x58
[   34.074346]  __kasan_kmalloc+0xd4/0xd8
[   34.074732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.074833]  kasan_atomics+0xb8/0x2e0
[   34.074952]  kunit_try_run_case+0x170/0x3f0
[   34.075077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.075245]  kthread+0x328/0x630
[   34.075371]  ret_from_fork+0x10/0x20
[   34.075509] 
[   34.075809] The buggy address belongs to the object at fff00000c76a3180
[   34.075809]  which belongs to the cache kmalloc-64 of size 64
[   34.075970] The buggy address is located 0 bytes to the right of
[   34.075970]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.076312] 
[   34.076425] The buggy address belongs to the physical page:
[   34.076527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.076924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.077070] page_type: f5(slab)
[   34.077310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.077648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.077764] page dumped because: kasan: bad access detected
[   34.077945] 
[   34.078105] Memory state around the buggy address:
[   34.078323]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.078464]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.078560] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.078654]                                      ^
[   34.078745]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.079139]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.079354] ==================================================================
[   33.934809] ==================================================================
[   33.934967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.935110] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.936268] 
[   33.936367] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.937307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.937520] Hardware name: linux,dummy-virt (DT)
[   33.937608] Call trace:
[   33.937674]  show_stack+0x20/0x38 (C)
[   33.937809]  dump_stack_lvl+0x8c/0xd0
[   33.940009]  kasan_atomics+0x198/0x2e0
[   33.942336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.942889]  ret_from_fork+0x10/0x20
[   33.943670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.943858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.943986] page_type: f5(slab)
[   33.944208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.944797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.945011]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.948274]  kunit_try_run_case+0x170/0x3f0
[   33.950540] The buggy address belongs to the physical page:
[   33.950755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.950917] page_type: f5(slab)
[   33.951297] page dumped because: kasan: bad access detected
[   33.952049]                                      ^
[   33.952140]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.952318] ==================================================================
[   34.246294] ==================================================================
[   34.246420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.246547] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.246730] 
[   34.246819] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.247121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.247210] Hardware name: linux,dummy-virt (DT)
[   34.247287] Call trace:
[   34.247349]  show_stack+0x20/0x38 (C)
[   34.247770]  dump_stack_lvl+0x8c/0xd0
[   34.247957]  print_report+0x118/0x608
[   34.248090]  kasan_report+0xdc/0x128
[   34.248211]  kasan_check_range+0x100/0x1a8
[   34.248335]  __kasan_check_write+0x20/0x30
[   34.248449]  kasan_atomics_helper+0x14e4/0x4858
[   34.248589]  kasan_atomics+0x198/0x2e0
[   34.248710]  kunit_try_run_case+0x170/0x3f0
[   34.249088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.249247]  kthread+0x328/0x630
[   34.249453]  ret_from_fork+0x10/0x20
[   34.249578] 
[   34.249629] Allocated by task 276:
[   34.249998]  kasan_save_stack+0x3c/0x68
[   34.250165]  kasan_save_track+0x20/0x40
[   34.250307]  kasan_save_alloc_info+0x40/0x58
[   34.250413]  __kasan_kmalloc+0xd4/0xd8
[   34.250493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.250600]  kasan_atomics+0xb8/0x2e0
[   34.250691]  kunit_try_run_case+0x170/0x3f0
[   34.250993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.251120]  kthread+0x328/0x630
[   34.251233]  ret_from_fork+0x10/0x20
[   34.251465] 
[   34.251559] The buggy address belongs to the object at fff00000c76a3180
[   34.251559]  which belongs to the cache kmalloc-64 of size 64
[   34.251788] The buggy address is located 0 bytes to the right of
[   34.251788]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.252021] 
[   34.252086] The buggy address belongs to the physical page:
[   34.252172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.252307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.252443] page_type: f5(slab)
[   34.252551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.252744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.252902] page dumped because: kasan: bad access detected
[   34.252978] 
[   34.253032] Memory state around the buggy address:
[   34.253112]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.253239]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.253723] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.253906]                                      ^
[   34.254136]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254323]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254665] ==================================================================
[   34.375374] ==================================================================
[   34.375511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.375892] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.376132] 
[   34.376748] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.377005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.377257] Hardware name: linux,dummy-virt (DT)
[   34.377352] Call trace:
[   34.377587]  show_stack+0x20/0x38 (C)
[   34.377833]  dump_stack_lvl+0x8c/0xd0
[   34.378458]  print_report+0x118/0x608
[   34.378601]  kasan_report+0xdc/0x128
[   34.378994]  kasan_check_range+0x100/0x1a8
[   34.379297]  __kasan_check_write+0x20/0x30
[   34.379819]  kasan_atomics_helper+0x17ec/0x4858
[   34.380215]  kasan_atomics+0x198/0x2e0
[   34.380570]  kunit_try_run_case+0x170/0x3f0
[   34.381067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.381341]  kthread+0x328/0x630
[   34.381523]  ret_from_fork+0x10/0x20
[   34.381718] 
[   34.381788] Allocated by task 276:
[   34.381937]  kasan_save_stack+0x3c/0x68
[   34.382098]  kasan_save_track+0x20/0x40
[   34.382371]  kasan_save_alloc_info+0x40/0x58
[   34.382489]  __kasan_kmalloc+0xd4/0xd8
[   34.382633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.382741]  kasan_atomics+0xb8/0x2e0
[   34.382839]  kunit_try_run_case+0x170/0x3f0
[   34.383518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.383987]  kthread+0x328/0x630
[   34.384115]  ret_from_fork+0x10/0x20
[   34.384268] 
[   34.384341] The buggy address belongs to the object at fff00000c76a3180
[   34.384341]  which belongs to the cache kmalloc-64 of size 64
[   34.384898] The buggy address is located 0 bytes to the right of
[   34.384898]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.385063] 
[   34.385145] The buggy address belongs to the physical page:
[   34.385449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.386002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.386134] page_type: f5(slab)
[   34.386763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.386930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.387406] page dumped because: kasan: bad access detected
[   34.387500] 
[   34.387557] Memory state around the buggy address:
[   34.387870]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.388354]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.388946] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.389068]                                      ^
[   34.389178]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.389359]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.389703] ==================================================================
[   34.111973] ==================================================================
[   34.112127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   34.112364] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.112667] 
[   34.112949] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.113390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.113644] Hardware name: linux,dummy-virt (DT)
[   34.113747] Call trace:
[   34.113814]  show_stack+0x20/0x38 (C)
[   34.114235]  dump_stack_lvl+0x8c/0xd0
[   34.114687]  print_report+0x118/0x608
[   34.114926]  kasan_report+0xdc/0x128
[   34.115048]  kasan_check_range+0x100/0x1a8
[   34.115147]  __kasan_check_write+0x20/0x30
[   34.115521]  kasan_atomics_helper+0x1058/0x4858
[   34.116038]  kasan_atomics+0x198/0x2e0
[   34.116545]  kunit_try_run_case+0x170/0x3f0
[   34.116761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.117123]  kthread+0x328/0x630
[   34.117241]  ret_from_fork+0x10/0x20
[   34.117367] 
[   34.117417] Allocated by task 276:
[   34.117491]  kasan_save_stack+0x3c/0x68
[   34.117906]  kasan_save_track+0x20/0x40
[   34.118163]  kasan_save_alloc_info+0x40/0x58
[   34.118492]  __kasan_kmalloc+0xd4/0xd8
[   34.118841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.119093]  kasan_atomics+0xb8/0x2e0
[   34.119195]  kunit_try_run_case+0x170/0x3f0
[   34.119299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.119778]  kthread+0x328/0x630
[   34.120084]  ret_from_fork+0x10/0x20
[   34.120325] 
[   34.120494] The buggy address belongs to the object at fff00000c76a3180
[   34.120494]  which belongs to the cache kmalloc-64 of size 64
[   34.120913] The buggy address is located 0 bytes to the right of
[   34.120913]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.121243] 
[   34.121567] The buggy address belongs to the physical page:
[   34.121674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.121826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.121967] page_type: f5(slab)
[   34.122255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.122830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.123002] page dumped because: kasan: bad access detected
[   34.123099] 
[   34.123159] Memory state around the buggy address:
[   34.123251]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.123370]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.123486] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.123590]                                      ^
[   34.123678]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.123788]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.123901] ==================================================================
[   34.001243] ==================================================================
[   34.001372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   34.001544] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.001677] 
[   34.002121] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.002438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.002731] Hardware name: linux,dummy-virt (DT)
[   34.002953] Call trace:
[   34.003030]  show_stack+0x20/0x38 (C)
[   34.003163]  dump_stack_lvl+0x8c/0xd0
[   34.003515]  print_report+0x118/0x608
[   34.003937]  kasan_report+0xdc/0x128
[   34.004462]  kasan_check_range+0x100/0x1a8
[   34.004624]  __kasan_check_write+0x20/0x30
[   34.004744]  kasan_atomics_helper+0xd3c/0x4858
[   34.004889]  kasan_atomics+0x198/0x2e0
[   34.005081]  kunit_try_run_case+0x170/0x3f0
[   34.005270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.005451]  kthread+0x328/0x630
[   34.005556]  ret_from_fork+0x10/0x20
[   34.005682] 
[   34.005743] Allocated by task 276:
[   34.005927]  kasan_save_stack+0x3c/0x68
[   34.006305]  kasan_save_track+0x20/0x40
[   34.006507]  kasan_save_alloc_info+0x40/0x58
[   34.006608]  __kasan_kmalloc+0xd4/0xd8
[   34.006712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.006802]  kasan_atomics+0xb8/0x2e0
[   34.006909]  kunit_try_run_case+0x170/0x3f0
[   34.007252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007381]  kthread+0x328/0x630
[   34.007469]  ret_from_fork+0x10/0x20
[   34.007559] 
[   34.007617] The buggy address belongs to the object at fff00000c76a3180
[   34.007617]  which belongs to the cache kmalloc-64 of size 64
[   34.007773] The buggy address is located 0 bytes to the right of
[   34.007773]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.007955] 
[   34.008024] The buggy address belongs to the physical page:
[   34.008111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.008573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.008773] page_type: f5(slab)
[   34.008935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.009132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.009260] page dumped because: kasan: bad access detected
[   34.009347] 
[   34.009395] Memory state around the buggy address:
[   34.009505]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009615]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009961] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.010067]                                      ^
[   34.010160]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.010278]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.010379] ==================================================================
[   34.197379] ==================================================================
[   34.197851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.198185] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.198329] 
[   34.198411] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.198964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.199050] Hardware name: linux,dummy-virt (DT)
[   34.199304] Call trace:
[   34.199635]  show_stack+0x20/0x38 (C)
[   34.200031]  dump_stack_lvl+0x8c/0xd0
[   34.200275]  print_report+0x118/0x608
[   34.200472]  kasan_report+0xdc/0x128
[   34.200587]  kasan_check_range+0x100/0x1a8
[   34.201012]  __kasan_check_write+0x20/0x30
[   34.201791]  kasan_atomics_helper+0x1384/0x4858
[   34.201930]  kasan_atomics+0x198/0x2e0
[   34.202067]  kunit_try_run_case+0x170/0x3f0
[   34.202178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.202316]  kthread+0x328/0x630
[   34.202440]  ret_from_fork+0x10/0x20
[   34.202578] 
[   34.202633] Allocated by task 276:
[   34.202708]  kasan_save_stack+0x3c/0x68
[   34.203199]  kasan_save_track+0x20/0x40
[   34.203718]  kasan_save_alloc_info+0x40/0x58
[   34.203983]  __kasan_kmalloc+0xd4/0xd8
[   34.204087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.204184]  kasan_atomics+0xb8/0x2e0
[   34.204556]  kunit_try_run_case+0x170/0x3f0
[   34.204684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.204817]  kthread+0x328/0x630
[   34.204915]  ret_from_fork+0x10/0x20
[   34.205015] 
[   34.205285] The buggy address belongs to the object at fff00000c76a3180
[   34.205285]  which belongs to the cache kmalloc-64 of size 64
[   34.205672] The buggy address is located 0 bytes to the right of
[   34.205672]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.205837] 
[   34.205905] The buggy address belongs to the physical page:
[   34.205991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.206182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.206382] page_type: f5(slab)
[   34.206507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.207268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.207524] page dumped because: kasan: bad access detected
[   34.207720] 
[   34.207976] Memory state around the buggy address:
[   34.208165]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.208550]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.208838] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.208982]                                      ^
[   34.209159]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.209437]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.209531] ==================================================================
[   34.153900] ==================================================================
[   34.154021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.154199] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.154372] 
[   34.154502] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.154808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.155465] Hardware name: linux,dummy-virt (DT)
[   34.155671] Call trace:
[   34.155728]  show_stack+0x20/0x38 (C)
[   34.155842]  dump_stack_lvl+0x8c/0xd0
[   34.156007]  print_report+0x118/0x608
[   34.156345]  kasan_report+0xdc/0x128
[   34.156465]  kasan_check_range+0x100/0x1a8
[   34.156631]  __kasan_check_write+0x20/0x30
[   34.156852]  kasan_atomics_helper+0x1190/0x4858
[   34.157375]  kasan_atomics+0x198/0x2e0
[   34.157536]  kunit_try_run_case+0x170/0x3f0
[   34.157671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.157894]  kthread+0x328/0x630
[   34.158111]  ret_from_fork+0x10/0x20
[   34.158494] 
[   34.158598] Allocated by task 276:
[   34.158668]  kasan_save_stack+0x3c/0x68
[   34.158757]  kasan_save_track+0x20/0x40
[   34.159028]  kasan_save_alloc_info+0x40/0x58
[   34.159149]  __kasan_kmalloc+0xd4/0xd8
[   34.159403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.159623]  kasan_atomics+0xb8/0x2e0
[   34.159735]  kunit_try_run_case+0x170/0x3f0
[   34.160087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160373]  kthread+0x328/0x630
[   34.160462]  ret_from_fork+0x10/0x20
[   34.160552] 
[   34.160610] The buggy address belongs to the object at fff00000c76a3180
[   34.160610]  which belongs to the cache kmalloc-64 of size 64
[   34.161010] The buggy address is located 0 bytes to the right of
[   34.161010]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.161229] 
[   34.161381] The buggy address belongs to the physical page:
[   34.161698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.161943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.162088] page_type: f5(slab)
[   34.162189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.162293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.162609] page dumped because: kasan: bad access detected
[   34.162818] 
[   34.162905] Memory state around the buggy address:
[   34.163117]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.163514]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.163715] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.163822]                                      ^
[   34.163917]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.164020]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.164125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   33.371428] ==================================================================
[   33.371566] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   33.371693] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270
[   33.371823] 
[   33.371961] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.372162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.372230] Hardware name: linux,dummy-virt (DT)
[   33.372316] Call trace:
[   33.372414]  show_stack+0x20/0x38 (C)
[   33.372596]  dump_stack_lvl+0x8c/0xd0
[   33.372768]  print_report+0x118/0x608
[   33.372923]  kasan_report+0xdc/0x128
[   33.373046]  __asan_report_load1_noabort+0x20/0x30
[   33.373172]  strnlen+0x80/0x88
[   33.373277]  kasan_strings+0x478/0xb00
[   33.373396]  kunit_try_run_case+0x170/0x3f0
[   33.373585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.373906]  kthread+0x328/0x630
[   33.374025]  ret_from_fork+0x10/0x20
[   33.374151] 
[   33.374194] Allocated by task 270:
[   33.374258]  kasan_save_stack+0x3c/0x68
[   33.374383]  kasan_save_track+0x20/0x40
[   33.374454]  kasan_save_alloc_info+0x40/0x58
[   33.374538]  __kasan_kmalloc+0xd4/0xd8
[   33.374629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.374774]  kasan_strings+0xc8/0xb00
[   33.374932]  kunit_try_run_case+0x170/0x3f0
[   33.375095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.375772]  kthread+0x328/0x630
[   33.376131] Freed by task 270:
[   33.376528]  __kasan_slab_free+0x6c/0x98
[   33.377163]  ret_from_fork+0x10/0x20
[   33.377560] The buggy address is located 16 bytes inside of
[   33.377560]  freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0)
[   33.378028] page_type: f5(slab)
[   33.378077] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.378223] 
[   33.378385] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.387372]     not ok 62 kasan_strings
[   33.395957] Write of size 8 at addr fff00000c6135568 by task kunit_try_catch/272
[   33.397932]  print_report+0x118/0x608
[   33.399071]  kthread+0x328/0x630
[   33.399742] 
[   33.399796] Allocated by task 272:
[   33.399881]  kasan_save_stack+0x3c/0x68
[   33.399998]  kasan_save_track+0x20/0x40
[   33.400109]  kasan_save_alloc_info+0x40/0x58
[   33.400349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.401499] The buggy address belongs to the object at fff00000c6135560
[   33.401499]  which belongs to the cache kmalloc-16 of size 16
[   33.402456] The buggy address belongs to the physical page:
[   33.404255] raw: fff00000c6135540 000000008080007f 00000000f5000000 0000000000000000
[   33.405273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   33.358722] ==================================================================
[   33.358847] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   33.359001] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270
[   33.359151] 
[   33.359308] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.359589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.359680] Hardware name: linux,dummy-virt (DT)
[   33.359777] Call trace:
[   33.359841]  show_stack+0x20/0x38 (C)
[   33.359994]  dump_stack_lvl+0x8c/0xd0
[   33.360121]  print_report+0x118/0x608
[   33.360249]  kasan_report+0xdc/0x128
[   33.360371]  __asan_report_load1_noabort+0x20/0x30
[   33.360509]  strlen+0xa8/0xb0
[   33.360620]  kasan_strings+0x418/0xb00
[   33.360744]  kunit_try_run_case+0x170/0x3f0
[   33.360881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.361033]  kthread+0x328/0x630
[   33.361148]  ret_from_fork+0x10/0x20
[   33.361280] 
[   33.362002] Allocated by task 270:
[   33.362097]  kasan_save_stack+0x3c/0x68
[   33.362204]  kasan_save_track+0x20/0x40
[   33.362581]  kasan_save_alloc_info+0x40/0x58
[   33.362680]  __kasan_kmalloc+0xd4/0xd8
[   33.362755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.362847]  kasan_strings+0xc8/0xb00
[   33.363557]  kunit_try_run_case+0x170/0x3f0
[   33.363701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.363879]  kthread+0x328/0x630
[   33.363988]  ret_from_fork+0x10/0x20
[   33.364101] 
[   33.364177] Freed by task 270:
[   33.364301]  kasan_save_stack+0x3c/0x68
[   33.364469]  kasan_save_track+0x20/0x40
[   33.364577]  kasan_save_free_info+0x4c/0x78
[   33.364710]  __kasan_slab_free+0x6c/0x98
[   33.364897]  kfree+0x214/0x3c8
[   33.365036]  kasan_strings+0x24c/0xb00
[   33.365130]  kunit_try_run_case+0x170/0x3f0
[   33.365665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.365810]  kthread+0x328/0x630
[   33.365912]  ret_from_fork+0x10/0x20
[   33.365998] 
[   33.366042] The buggy address belongs to the object at fff00000c76d03c0
[   33.366042]  which belongs to the cache kmalloc-32 of size 32
[   33.366177] The buggy address is located 16 bytes inside of
[   33.366177]  freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0)
[   33.366709] 
[   33.366898] The buggy address belongs to the physical page:
[   33.367114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   33.367528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.367766] page_type: f5(slab)
[   33.368067] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.368358] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.368489] page dumped because: kasan: bad access detected
[   33.368581] 
[   33.368838] Memory state around the buggy address:
[   33.369323]  fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.369574]  fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.369688] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.369802]                                                  ^
[   33.369910]  fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.370024]  fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.370169] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   33.350506] ==================================================================
[   33.350641] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   33.350769] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270
[   33.350914] 
[   33.351025] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.351260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.351330] Hardware name: linux,dummy-virt (DT)
[   33.351414] Call trace:
[   33.351475]  show_stack+0x20/0x38 (C)
[   33.351601]  dump_stack_lvl+0x8c/0xd0
[   33.351724]  print_report+0x118/0x608
[   33.351842]  kasan_report+0xdc/0x128
[   33.352013]  __asan_report_load1_noabort+0x20/0x30
[   33.352193]  kasan_strings+0x95c/0xb00
[   33.352357]  kunit_try_run_case+0x170/0x3f0
[   33.352524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.352707]  kthread+0x328/0x630
[   33.352856]  ret_from_fork+0x10/0x20
[   33.353035] 
[   33.353103] Allocated by task 270:
[   33.353174]  kasan_save_stack+0x3c/0x68
[   33.353323]  kasan_save_track+0x20/0x40
[   33.353418]  kasan_save_alloc_info+0x40/0x58
[   33.353506]  __kasan_kmalloc+0xd4/0xd8
[   33.353593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.353742]  kasan_strings+0xc8/0xb00
[   33.353856]  kunit_try_run_case+0x170/0x3f0
[   33.353975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.354074]  kthread+0x328/0x630
[   33.354151]  ret_from_fork+0x10/0x20
[   33.354244] 
[   33.354294] Freed by task 270:
[   33.354373]  kasan_save_stack+0x3c/0x68
[   33.354480]  kasan_save_track+0x20/0x40
[   33.354597]  kasan_save_free_info+0x4c/0x78
[   33.354736]  __kasan_slab_free+0x6c/0x98
[   33.354829]  kfree+0x214/0x3c8
[   33.354977]  kasan_strings+0x24c/0xb00
[   33.355075]  kunit_try_run_case+0x170/0x3f0
[   33.355202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.355334]  kthread+0x328/0x630
[   33.355551]  ret_from_fork+0x10/0x20
[   33.355663] 
[   33.355724] The buggy address belongs to the object at fff00000c76d03c0
[   33.355724]  which belongs to the cache kmalloc-32 of size 32
[   33.355890] The buggy address is located 16 bytes inside of
[   33.355890]  freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0)
[   33.356035] 
[   33.356084] The buggy address belongs to the physical page:
[   33.356162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   33.356304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.356427] page_type: f5(slab)
[   33.356552] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.356679] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.356774] page dumped because: kasan: bad access detected
[   33.356905] 
[   33.356964] Memory state around the buggy address:
[   33.357053]  fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.357168]  fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.357283] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.357387]                                                  ^
[   33.357469]  fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.357561]  fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.357642] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   33.338866] ==================================================================
[   33.339131] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.339337] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270
[   33.339519] 
[   33.339661] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.339948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.340018] Hardware name: linux,dummy-virt (DT)
[   33.340145] Call trace:
[   33.340225]  show_stack+0x20/0x38 (C)
[   33.340588]  dump_stack_lvl+0x8c/0xd0
[   33.340728]  print_report+0x118/0x608
[   33.340858]  kasan_report+0xdc/0x128
[   33.340999]  __asan_report_load1_noabort+0x20/0x30
[   33.341133]  strcmp+0xc0/0xc8
[   33.341248]  kasan_strings+0x340/0xb00
[   33.341363]  kunit_try_run_case+0x170/0x3f0
[   33.341536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.341927]  kthread+0x328/0x630
[   33.342108]  ret_from_fork+0x10/0x20
[   33.342282] 
[   33.342366] Allocated by task 270:
[   33.342450]  kasan_save_stack+0x3c/0x68
[   33.342606]  kasan_save_track+0x20/0x40
[   33.342706]  kasan_save_alloc_info+0x40/0x58
[   33.342814]  __kasan_kmalloc+0xd4/0xd8
[   33.342924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.343034]  kasan_strings+0xc8/0xb00
[   33.343108]  kunit_try_run_case+0x170/0x3f0
[   33.343236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.343385]  kthread+0x328/0x630
[   33.343517]  ret_from_fork+0x10/0x20
[   33.343649] 
[   33.343708] Freed by task 270:
[   33.343813]  kasan_save_stack+0x3c/0x68
[   33.343935]  kasan_save_track+0x20/0x40
[   33.344024]  kasan_save_free_info+0x4c/0x78
[   33.344345]  __kasan_slab_free+0x6c/0x98
[   33.344532]  kfree+0x214/0x3c8
[   33.344628]  kasan_strings+0x24c/0xb00
[   33.344936]  kunit_try_run_case+0x170/0x3f0
[   33.345110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.345242]  kthread+0x328/0x630
[   33.345335]  ret_from_fork+0x10/0x20
[   33.345666] 
[   33.345726] The buggy address belongs to the object at fff00000c76d03c0
[   33.345726]  which belongs to the cache kmalloc-32 of size 32
[   33.345977] The buggy address is located 16 bytes inside of
[   33.345977]  freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0)
[   33.346153] 
[   33.346207] The buggy address belongs to the physical page:
[   33.346279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0
[   33.346407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.346539] page_type: f5(slab)
[   33.346935] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.347340] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.347478] page dumped because: kasan: bad access detected
[   33.347570] 
[   33.347689] Memory state around the buggy address:
[   33.347777]  fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.348169]  fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.348287] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.348394]                                                  ^
[   33.348610]  fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.348783]  fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.348917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   33.260174] ==================================================================
[   33.260363] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   33.260514] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/264
[   33.260643] 
[   33.260735] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.262748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.262853] Hardware name: linux,dummy-virt (DT)
[   33.262967] Call trace:
[   33.263034]  show_stack+0x20/0x38 (C)
[   33.263242]  dump_stack_lvl+0x8c/0xd0
[   33.263557]  print_report+0x310/0x608
[   33.263693]  kasan_report+0xdc/0x128
[   33.263821]  __asan_report_load1_noabort+0x20/0x30
[   33.263950]  kasan_alloca_oob_right+0x2dc/0x340
[   33.264088]  kunit_try_run_case+0x170/0x3f0
[   33.264220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.264500]  kthread+0x328/0x630
[   33.264618]  ret_from_fork+0x10/0x20
[   33.264746] 
[   33.264808] The buggy address belongs to stack of task kunit_try_catch/264
[   33.264954] 
[   33.265109] The buggy address belongs to the virtual mapping at
[   33.265109]  [ffff800080a10000, ffff800080a19000) created by:
[   33.265109]  kernel_clone+0x150/0x7a8
[   33.265475] 
[   33.265514] The buggy address belongs to the physical page:
[   33.265556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679
[   33.265649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.265819] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.265965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.266067] page dumped because: kasan: bad access detected
[   33.266139] 
[   33.266661] Memory state around the buggy address:
[   33.266782]  ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.266919]  ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.267041] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   33.267608]                                               ^
[   33.267764]  ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.268100]  ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.268382] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   33.240929] ==================================================================
[   33.241207] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.241409] Read of size 1 at addr ffff800080a17b5f by task kunit_try_catch/262
[   33.241595] 
[   33.241682] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.242148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.242234] Hardware name: linux,dummy-virt (DT)
[   33.242318] Call trace:
[   33.242380]  show_stack+0x20/0x38 (C)
[   33.242524]  dump_stack_lvl+0x8c/0xd0
[   33.242667]  print_report+0x310/0x608
[   33.242841]  kasan_report+0xdc/0x128
[   33.243040]  __asan_report_load1_noabort+0x20/0x30
[   33.243218]  kasan_alloca_oob_left+0x2b8/0x310
[   33.243357]  kunit_try_run_case+0x170/0x3f0
[   33.243500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.243677]  kthread+0x328/0x630
[   33.243786]  ret_from_fork+0x10/0x20
[   33.243927] 
[   33.243981] The buggy address belongs to stack of task kunit_try_catch/262
[   33.244171] 
[   33.244239] The buggy address belongs to the virtual mapping at
[   33.244239]  [ffff800080a10000, ffff800080a19000) created by:
[   33.244239]  kernel_clone+0x150/0x7a8
[   33.244446] 
[   33.244519] The buggy address belongs to the physical page:
[   33.244607] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679
[   33.244754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.244941] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.245069] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.245184] page dumped because: kasan: bad access detected
[   33.245273] 
[   33.245322] Memory state around the buggy address:
[   33.245411]  ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.245516]  ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.245620] >ffff800080a17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.245720]                                                     ^
[   33.245828]  ffff800080a17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   33.245958]  ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.246068] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.021077] ==================================================================
[   30.021361] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.021599] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/165
[   30.022218] 
[   30.022327] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.022548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.022606] Hardware name: linux,dummy-virt (DT)
[   30.022668] Call trace:
[   30.022714]  show_stack+0x20/0x38 (C)
[   30.022829]  dump_stack_lvl+0x8c/0xd0
[   30.022943]  print_report+0x118/0x608
[   30.023062]  kasan_report+0xdc/0x128
[   30.023174]  __asan_report_load1_noabort+0x20/0x30
[   30.023305]  page_alloc_uaf+0x328/0x350
[   30.023422]  kunit_try_run_case+0x170/0x3f0
[   30.023547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.024149]  kthread+0x328/0x630
[   30.024459]  ret_from_fork+0x10/0x20
[   30.024846] 
[   30.024937] The buggy address belongs to the physical page:
[   30.025171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720
[   30.025346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.025500] page_type: f0(buddy)
[   30.025598] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   30.025741] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.025844] page dumped because: kasan: bad access detected
[   30.025926] 
[   30.026004] Memory state around the buggy address:
[   30.026138]  fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.026249]  fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.026348] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.026431]                    ^
[   30.026489]  fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.026612]  fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.026728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   33.222513] ==================================================================
[   33.222711] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   33.222867] Read of size 1 at addr ffff800080a17c2a by task kunit_try_catch/260
[   33.223023] 
[   33.223116] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.223343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.223418] Hardware name: linux,dummy-virt (DT)
[   33.223520] Call trace:
[   33.223576]  show_stack+0x20/0x38 (C)
[   33.223728]  dump_stack_lvl+0x8c/0xd0
[   33.223859]  print_report+0x310/0x608
[   33.223987]  kasan_report+0xdc/0x128
[   33.224113]  __asan_report_load1_noabort+0x20/0x30
[   33.224315]  kasan_stack_oob+0x238/0x270
[   33.224446]  kunit_try_run_case+0x170/0x3f0
[   33.224568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.224697]  kthread+0x328/0x630
[   33.224814]  ret_from_fork+0x10/0x20
[   33.224961] 
[   33.225120] The buggy address belongs to stack of task kunit_try_catch/260
[   33.225358]  and is located at offset 138 in frame:
[   33.225454]  kasan_stack_oob+0x0/0x270
[   33.225758] 
[   33.225842] This frame has 4 objects:
[   33.226049]  [48, 49) '__assertion'
[   33.226149]  [64, 72) 'array'
[   33.226243]  [96, 112) '__assertion'
[   33.226346]  [128, 138) 'stack_array'
[   33.226443] 
[   33.226517] The buggy address belongs to the virtual mapping at
[   33.226517]  [ffff800080a10000, ffff800080a19000) created by:
[   33.226517]  kernel_clone+0x150/0x7a8
[   33.226699] 
[   33.226758] The buggy address belongs to the physical page:
[   33.226939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679
[   33.227133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.227298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.227433] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.227543] page dumped because: kasan: bad access detected
[   33.227629] 
[   33.227678] Memory state around the buggy address:
[   33.227764]  ffff800080a17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.227888]  ffff800080a17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   33.228005] >ffff800080a17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   33.228115]                                   ^
[   33.228196]  ffff800080a17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   33.228338]  ffff800080a17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   33.228444] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   33.190035] ==================================================================
[   33.190205] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.190349] Read of size 1 at addr ffffa8812967968d by task kunit_try_catch/256
[   33.190989] 
[   33.191601] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.191861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.191941] Hardware name: linux,dummy-virt (DT)
[   33.192022] Call trace:
[   33.192080]  show_stack+0x20/0x38 (C)
[   33.192694]  dump_stack_lvl+0x8c/0xd0
[   33.193284]  print_report+0x310/0x608
[   33.193675]  kasan_report+0xdc/0x128
[   33.193815]  __asan_report_load1_noabort+0x20/0x30
[   33.193957]  kasan_global_oob_right+0x230/0x270
[   33.194021]  kunit_try_run_case+0x170/0x3f0
[   33.194082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.194211]  kthread+0x328/0x630
[   33.194331]  ret_from_fork+0x10/0x20
[   33.194477] 
[   33.194587] The buggy address belongs to the variable:
[   33.194656]  global_array+0xd/0x40
[   33.194748] 
[   33.194907] The buggy address belongs to the virtual mapping at
[   33.194907]  [ffffa88127830000, ffffa88129731000) created by:
[   33.194907]  paging_init+0x66c/0x7d0
[   33.195097] 
[   33.195382] The buggy address belongs to the physical page:
[   33.195478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c79
[   33.195651] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.195910] raw: 03fffe0000002000 ffffc1ffc01f1e48 ffffc1ffc01f1e48 0000000000000000
[   33.196030] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.196137] page dumped because: kasan: bad access detected
[   33.196250] 
[   33.196290] Memory state around the buggy address:
[   33.196367]  ffffa88129679580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.196474]  ffffa88129679600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   33.196582] >ffffa88129679680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   33.196686]                       ^
[   33.196793]  ffffa88129679700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   33.196951]  ffffa88129679780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.197053] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.165859] ==================================================================
[   33.166045] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.166194] Free of addr fff00000c63f4001 by task kunit_try_catch/254
[   33.166295] 
[   33.166384] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.166612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.166679] Hardware name: linux,dummy-virt (DT)
[   33.166756] Call trace:
[   33.166809]  show_stack+0x20/0x38 (C)
[   33.167681]  dump_stack_lvl+0x8c/0xd0
[   33.167857]  print_report+0x118/0x608
[   33.168042]  kasan_report_invalid_free+0xc0/0xe8
[   33.168211]  __kasan_mempool_poison_object+0xfc/0x150
[   33.168396]  mempool_free+0x28c/0x328
[   33.168550]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.168735]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   33.168934]  kunit_try_run_case+0x170/0x3f0
[   33.169079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.169252]  kthread+0x328/0x630
[   33.169404]  ret_from_fork+0x10/0x20
[   33.169517] 
[   33.169570] The buggy address belongs to the physical page:
[   33.169654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   33.170118] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.170468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.170622] page_type: f8(unknown)
[   33.170736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.170913] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.171045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.171265] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.171374] head: 0bfffe0000000002 ffffc1ffc318fd01 00000000ffffffff 00000000ffffffff
[   33.171484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.171584] page dumped because: kasan: bad access detected
[   33.171901] 
[   33.171953] Memory state around the buggy address:
[   33.172042]  fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.172159]  fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.172266] >fff00000c63f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.172365]                    ^
[   33.172440]  fff00000c63f4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.172555]  fff00000c63f4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.172657] ==================================================================
[   33.138228] ==================================================================
[   33.138513] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.138727] Free of addr fff00000c649df01 by task kunit_try_catch/252
[   33.138891] 
[   33.139573] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.139793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.139868] Hardware name: linux,dummy-virt (DT)
[   33.139972] Call trace:
[   33.140030]  show_stack+0x20/0x38 (C)
[   33.140497]  dump_stack_lvl+0x8c/0xd0
[   33.140622]  print_report+0x118/0x608
[   33.141021]  kasan_report_invalid_free+0xc0/0xe8
[   33.141171]  check_slab_allocation+0xfc/0x108
[   33.141359]  __kasan_mempool_poison_object+0x78/0x150
[   33.141524]  mempool_free+0x28c/0x328
[   33.141639]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.142025]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.142088]  kunit_try_run_case+0x170/0x3f0
[   33.142145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142203]  kthread+0x328/0x630
[   33.142252]  ret_from_fork+0x10/0x20
[   33.142309] 
[   33.142330] Allocated by task 252:
[   33.142366]  kasan_save_stack+0x3c/0x68
[   33.142415]  kasan_save_track+0x20/0x40
[   33.142458]  kasan_save_alloc_info+0x40/0x58
[   33.142503]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.142551]  remove_element+0x130/0x1f8
[   33.142589]  mempool_alloc_preallocated+0x58/0xc0
[   33.142632]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   33.142681]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.142724]  kunit_try_run_case+0x170/0x3f0
[   33.142765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142810]  kthread+0x328/0x630
[   33.142846]  ret_from_fork+0x10/0x20
[   33.142924] 
[   33.142990] The buggy address belongs to the object at fff00000c649df00
[   33.142990]  which belongs to the cache kmalloc-128 of size 128
[   33.143172] The buggy address is located 1 bytes inside of
[   33.143172]  128-byte region [fff00000c649df00, fff00000c649df80)
[   33.143391] 
[   33.143453] The buggy address belongs to the physical page:
[   33.143561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d
[   33.143721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.143920] page_type: f5(slab)
[   33.144043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.144175] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   33.144282] page dumped because: kasan: bad access detected
[   33.144366] 
[   33.144411] Memory state around the buggy address:
[   33.144522]  fff00000c649de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.144641]  fff00000c649de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.144802] >fff00000c649df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.145146]                    ^
[   33.145223]  fff00000c649df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.145333]  fff00000c649e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.145435] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.020704] ==================================================================
[   33.020817] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.020927] Free of addr fff00000c649db00 by task kunit_try_catch/246
[   33.020978] 
[   33.021029] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.021131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.021160] Hardware name: linux,dummy-virt (DT)
[   33.021199] Call trace:
[   33.021226]  show_stack+0x20/0x38 (C)
[   33.021288]  dump_stack_lvl+0x8c/0xd0
[   33.021345]  print_report+0x118/0x608
[   33.021402]  kasan_report_invalid_free+0xc0/0xe8
[   33.021458]  check_slab_allocation+0xd4/0x108
[   33.021513]  __kasan_mempool_poison_object+0x78/0x150
[   33.021570]  mempool_free+0x28c/0x328
[   33.021627]  mempool_double_free_helper+0x150/0x2e8
[   33.021681]  mempool_kmalloc_double_free+0xc0/0x118
[   33.021737]  kunit_try_run_case+0x170/0x3f0
[   33.021792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.021851]  kthread+0x328/0x630
[   33.024351]  ret_from_fork+0x10/0x20
[   33.024885] 
[   33.025073] Allocated by task 246:
[   33.026794]  kasan_save_stack+0x3c/0x68
[   33.032207]  kasan_save_track+0x20/0x40
[   33.032324]  kasan_save_alloc_info+0x40/0x58
[   33.032438]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.032529]  remove_element+0x130/0x1f8
[   33.032610]  mempool_alloc_preallocated+0x58/0xc0
[   33.032693]  mempool_double_free_helper+0x94/0x2e8
[   33.032779]  mempool_kmalloc_double_free+0xc0/0x118
[   33.032864]  kunit_try_run_case+0x170/0x3f0
[   33.033260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.033409]  kthread+0x328/0x630
[   33.033499]  ret_from_fork+0x10/0x20
[   33.033605] 
[   33.033901] Freed by task 246:
[   33.033979]  kasan_save_stack+0x3c/0x68
[   33.034085]  kasan_save_track+0x20/0x40
[   33.034176]  kasan_save_free_info+0x4c/0x78
[   33.034336]  __kasan_mempool_poison_object+0xc0/0x150
[   33.034500]  mempool_free+0x28c/0x328
[   33.034688]  mempool_double_free_helper+0x100/0x2e8
[   33.034799]  mempool_kmalloc_double_free+0xc0/0x118
[   33.034936]  kunit_try_run_case+0x170/0x3f0
[   33.035150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035326]  kthread+0x328/0x630
[   33.035416]  ret_from_fork+0x10/0x20
[   33.035587] 
[   33.035638] The buggy address belongs to the object at fff00000c649db00
[   33.035638]  which belongs to the cache kmalloc-128 of size 128
[   33.035787] The buggy address is located 0 bytes inside of
[   33.035787]  128-byte region [fff00000c649db00, fff00000c649db80)
[   33.035972] 
[   33.036022] The buggy address belongs to the physical page:
[   33.036095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d
[   33.036778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.036978] page_type: f5(slab)
[   33.037107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.037230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.037333] page dumped because: kasan: bad access detected
[   33.037457] 
[   33.037496] Memory state around the buggy address:
[   33.037572]  fff00000c649da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.038019]  fff00000c649da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.038255] >fff00000c649db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.038383]                    ^
[   33.038490]  fff00000c649db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.038642]  fff00000c649dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.038986] ==================================================================
[   33.089221] ==================================================================
[   33.089392] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.090478] Free of addr fff00000c63f4000 by task kunit_try_catch/250
[   33.090584] 
[   33.090741] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.091439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.091517] Hardware name: linux,dummy-virt (DT)
[   33.091595] Call trace:
[   33.091696]  show_stack+0x20/0x38 (C)
[   33.091981]  dump_stack_lvl+0x8c/0xd0
[   33.092214]  print_report+0x118/0x608
[   33.092709]  kasan_report_invalid_free+0xc0/0xe8
[   33.092984]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.093537]  mempool_free+0x24c/0x328
[   33.093930]  mempool_double_free_helper+0x150/0x2e8
[   33.094109]  mempool_page_alloc_double_free+0xbc/0x118
[   33.094222]  kunit_try_run_case+0x170/0x3f0
[   33.094331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.094450]  kthread+0x328/0x630
[   33.094541]  ret_from_fork+0x10/0x20
[   33.094657] 
[   33.094857] The buggy address belongs to the physical page:
[   33.095068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   33.095674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.095958] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.096518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.096761] page dumped because: kasan: bad access detected
[   33.097303] 
[   33.097361] Memory state around the buggy address:
[   33.097500]  fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097638]  fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097765] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097852]                    ^
[   33.097923]  fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.098008]  fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.098119] ==================================================================
[   33.062930] ==================================================================
[   33.063181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.063356] Free of addr fff00000c63f4000 by task kunit_try_catch/248
[   33.063462] 
[   33.063555] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.063775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.063843] Hardware name: linux,dummy-virt (DT)
[   33.063937] Call trace:
[   33.063995]  show_stack+0x20/0x38 (C)
[   33.064120]  dump_stack_lvl+0x8c/0xd0
[   33.064239]  print_report+0x118/0x608
[   33.064359]  kasan_report_invalid_free+0xc0/0xe8
[   33.064483]  __kasan_mempool_poison_object+0x14c/0x150
[   33.064616]  mempool_free+0x28c/0x328
[   33.064730]  mempool_double_free_helper+0x150/0x2e8
[   33.064857]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.066122]  kunit_try_run_case+0x170/0x3f0
[   33.066487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.066761]  kthread+0x328/0x630
[   33.067057]  ret_from_fork+0x10/0x20
[   33.067351] 
[   33.067405] The buggy address belongs to the physical page:
[   33.067719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   33.067948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.068211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.068459] page_type: f8(unknown)
[   33.068924] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.069455] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.069719] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.069961] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.070231] head: 0bfffe0000000002 ffffc1ffc318fd01 00000000ffffffff 00000000ffffffff
[   33.071282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.071352] page dumped because: kasan: bad access detected
[   33.071397] 
[   33.071421] Memory state around the buggy address:
[   33.071477]  fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071620]  fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071746] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071849]                    ^
[   33.071937]  fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.072038]  fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.072139] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.996569] ==================================================================
[   32.996763] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.997090] Read of size 1 at addr fff00000c63f0000 by task kunit_try_catch/244
[   32.997238] 
[   32.997336] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.997566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.997650] Hardware name: linux,dummy-virt (DT)
[   32.998066] Call trace:
[   32.998144]  show_stack+0x20/0x38 (C)
[   32.998307]  dump_stack_lvl+0x8c/0xd0
[   32.998415]  print_report+0x118/0x608
[   32.998511]  kasan_report+0xdc/0x128
[   32.998615]  __asan_report_load1_noabort+0x20/0x30
[   32.998738]  mempool_uaf_helper+0x314/0x340
[   32.998863]  mempool_page_alloc_uaf+0xc0/0x118
[   32.999415]  kunit_try_run_case+0x170/0x3f0
[   32.999705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.000296]  kthread+0x328/0x630
[   33.000439]  ret_from_fork+0x10/0x20
[   33.000828] 
[   33.000915] The buggy address belongs to the physical page:
[   33.001114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0
[   33.001260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.001634] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.001988] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.002429] page dumped because: kasan: bad access detected
[   33.002531] 
[   33.002582] Memory state around the buggy address:
[   33.002667]  fff00000c63eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.002985]  fff00000c63eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.003274] >fff00000c63f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.003558]                    ^
[   33.003669]  fff00000c63f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.003832]  fff00000c63f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.004250] ==================================================================
[   32.907008] ==================================================================
[   32.907117] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.907221] Read of size 1 at addr fff00000c63f0000 by task kunit_try_catch/240
[   32.907281] 
[   32.907346] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.907454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.907488] Hardware name: linux,dummy-virt (DT)
[   32.907528] Call trace:
[   32.907556]  show_stack+0x20/0x38 (C)
[   32.907617]  dump_stack_lvl+0x8c/0xd0
[   32.907675]  print_report+0x118/0x608
[   32.907732]  kasan_report+0xdc/0x128
[   32.907784]  __asan_report_load1_noabort+0x20/0x30
[   32.907843]  mempool_uaf_helper+0x314/0x340
[   32.909021]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.909478]  kunit_try_run_case+0x170/0x3f0
[   32.909919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.909995]  kthread+0x328/0x630
[   32.910045]  ret_from_fork+0x10/0x20
[   32.910267] 
[   32.910311] The buggy address belongs to the physical page:
[   32.910548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0
[   32.911079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.911168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.911245] page_type: f8(unknown)
[   32.911400] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.911472] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.911646] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.911767] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.912013] head: 0bfffe0000000002 ffffc1ffc318fc01 00000000ffffffff 00000000ffffffff
[   32.912101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.912343] page dumped because: kasan: bad access detected
[   32.912389] 
[   32.912420] Memory state around the buggy address:
[   32.912487]  fff00000c63eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.912592]  fff00000c63eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.912680] >fff00000c63f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.912727]                    ^
[   32.912776]  fff00000c63f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.912964]  fff00000c63f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.913181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.924118] ==================================================================
[   32.924398] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.924511] Read of size 1 at addr fff00000c7744240 by task kunit_try_catch/242
[   32.924777] 
[   32.924963] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.925076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.925107] Hardware name: linux,dummy-virt (DT)
[   32.925144] Call trace:
[   32.925173]  show_stack+0x20/0x38 (C)
[   32.925238]  dump_stack_lvl+0x8c/0xd0
[   32.925296]  print_report+0x118/0x608
[   32.925349]  kasan_report+0xdc/0x128
[   32.925401]  __asan_report_load1_noabort+0x20/0x30
[   32.926059]  mempool_uaf_helper+0x314/0x340
[   32.926545]  mempool_slab_uaf+0xc0/0x118
[   32.926607]  kunit_try_run_case+0x170/0x3f0
[   32.926665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.926726]  kthread+0x328/0x630
[   32.926844]  ret_from_fork+0x10/0x20
[   32.926923] 
[   32.926955] Allocated by task 242:
[   32.927024]  kasan_save_stack+0x3c/0x68
[   32.927130]  kasan_save_track+0x20/0x40
[   32.927179]  kasan_save_alloc_info+0x40/0x58
[   32.927233]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.927642]  remove_element+0x16c/0x1f8
[   32.927700]  mempool_alloc_preallocated+0x58/0xc0
[   32.927909]  mempool_uaf_helper+0xa4/0x340
[   32.928215]  mempool_slab_uaf+0xc0/0x118
[   32.928550]  kunit_try_run_case+0x170/0x3f0
[   32.928628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.928800]  kthread+0x328/0x630
[   32.929107]  ret_from_fork+0x10/0x20
[   32.929451] 
[   32.929548] Freed by task 242:
[   32.929589]  kasan_save_stack+0x3c/0x68
[   32.929705]  kasan_save_track+0x20/0x40
[   32.929751]  kasan_save_free_info+0x4c/0x78
[   32.929796]  __kasan_mempool_poison_object+0xc0/0x150
[   32.929847]  mempool_free+0x28c/0x328
[   32.929922]  mempool_uaf_helper+0x104/0x340
[   32.929970]  mempool_slab_uaf+0xc0/0x118
[   32.930013]  kunit_try_run_case+0x170/0x3f0
[   32.930073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.930134]  kthread+0x328/0x630
[   32.930172]  ret_from_fork+0x10/0x20
[   32.930215] 
[   32.930277] The buggy address belongs to the object at fff00000c7744240
[   32.930277]  which belongs to the cache test_cache of size 123
[   32.930350] The buggy address is located 0 bytes inside of
[   32.930350]  freed 123-byte region [fff00000c7744240, fff00000c77442bb)
[   32.930429] 
[   32.930460] The buggy address belongs to the physical page:
[   32.930495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107744
[   32.930564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.930626] page_type: f5(slab)
[   32.930678] raw: 0bfffe0000000000 fff00000c76a5280 dead000000000122 0000000000000000
[   32.930736] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.930784] page dumped because: kasan: bad access detected
[   32.930824] 
[   32.930847] Memory state around the buggy address:
[   32.930902]  fff00000c7744100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.930982]  fff00000c7744180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.931035] >fff00000c7744200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.931079]                                            ^
[   32.931122]  fff00000c7744280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.931202]  fff00000c7744300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.931314] ==================================================================
[   32.887328] ==================================================================
[   32.887434] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.887538] Read of size 1 at addr fff00000c649d700 by task kunit_try_catch/238
[   32.887598] 
[   32.887651] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.887758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.887792] Hardware name: linux,dummy-virt (DT)
[   32.887835] Call trace:
[   32.887864]  show_stack+0x20/0x38 (C)
[   32.887956]  dump_stack_lvl+0x8c/0xd0
[   32.888017]  print_report+0x118/0x608
[   32.888073]  kasan_report+0xdc/0x128
[   32.888125]  __asan_report_load1_noabort+0x20/0x30
[   32.888182]  mempool_uaf_helper+0x314/0x340
[   32.888330]  mempool_kmalloc_uaf+0xc4/0x120
[   32.888411]  kunit_try_run_case+0x170/0x3f0
[   32.888472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.888531]  kthread+0x328/0x630
[   32.888581]  ret_from_fork+0x10/0x20
[   32.888700] 
[   32.888751] Allocated by task 238:
[   32.888829]  kasan_save_stack+0x3c/0x68
[   32.888892]  kasan_save_track+0x20/0x40
[   32.888940]  kasan_save_alloc_info+0x40/0x58
[   32.888983]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.889030]  remove_element+0x130/0x1f8
[   32.889075]  mempool_alloc_preallocated+0x58/0xc0
[   32.889154]  mempool_uaf_helper+0xa4/0x340
[   32.889220]  mempool_kmalloc_uaf+0xc4/0x120
[   32.889294]  kunit_try_run_case+0x170/0x3f0
[   32.889363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.889409]  kthread+0x328/0x630
[   32.889516]  ret_from_fork+0x10/0x20
[   32.889620] 
[   32.889649] Freed by task 238:
[   32.889682]  kasan_save_stack+0x3c/0x68
[   32.889725]  kasan_save_track+0x20/0x40
[   32.889785]  kasan_save_free_info+0x4c/0x78
[   32.889868]  __kasan_mempool_poison_object+0xc0/0x150
[   32.889985]  mempool_free+0x28c/0x328
[   32.890039]  mempool_uaf_helper+0x104/0x340
[   32.890082]  mempool_kmalloc_uaf+0xc4/0x120
[   32.890122]  kunit_try_run_case+0x170/0x3f0
[   32.890174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.890359]  kthread+0x328/0x630
[   32.890401]  ret_from_fork+0x10/0x20
[   32.890440] 
[   32.890464] The buggy address belongs to the object at fff00000c649d700
[   32.890464]  which belongs to the cache kmalloc-128 of size 128
[   32.890534] The buggy address is located 0 bytes inside of
[   32.890534]  freed 128-byte region [fff00000c649d700, fff00000c649d780)
[   32.890601] 
[   32.890627] The buggy address belongs to the physical page:
[   32.890665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d
[   32.890726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.890787] page_type: f5(slab)
[   32.890838] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.891115] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.891169] page dumped because: kasan: bad access detected
[   32.891455] 
[   32.891490] Memory state around the buggy address:
[   32.891535]  fff00000c649d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.891869]  fff00000c649d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.891967] >fff00000c649d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.892013]                    ^
[   32.892237]  fff00000c649d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.892312]  fff00000c649d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.892561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.860922] ==================================================================
[   32.861025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.861121] Read of size 1 at addr fff00000c76d22bb by task kunit_try_catch/236
[   32.861182] 
[   32.861233] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.861341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.861372] Hardware name: linux,dummy-virt (DT)
[   32.861412] Call trace:
[   32.861439]  show_stack+0x20/0x38 (C)
[   32.861499]  dump_stack_lvl+0x8c/0xd0
[   32.861554]  print_report+0x118/0x608
[   32.861608]  kasan_report+0xdc/0x128
[   32.861660]  __asan_report_load1_noabort+0x20/0x30
[   32.861718]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.861770]  mempool_slab_oob_right+0xc0/0x118
[   32.861823]  kunit_try_run_case+0x170/0x3f0
[   32.861883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.862348]  kthread+0x328/0x630
[   32.862411]  ret_from_fork+0x10/0x20
[   32.862557] 
[   32.862617] Allocated by task 236:
[   32.862699]  kasan_save_stack+0x3c/0x68
[   32.862775]  kasan_save_track+0x20/0x40
[   32.862971]  kasan_save_alloc_info+0x40/0x58
[   32.863028]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.863078]  remove_element+0x16c/0x1f8
[   32.863127]  mempool_alloc_preallocated+0x58/0xc0
[   32.863171]  mempool_oob_right_helper+0x98/0x2f0
[   32.863215]  mempool_slab_oob_right+0xc0/0x118
[   32.863256]  kunit_try_run_case+0x170/0x3f0
[   32.863318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.863391]  kthread+0x328/0x630
[   32.863433]  ret_from_fork+0x10/0x20
[   32.863474] 
[   32.863508] The buggy address belongs to the object at fff00000c76d2240
[   32.863508]  which belongs to the cache test_cache of size 123
[   32.863711] The buggy address is located 0 bytes to the right of
[   32.863711]  allocated 123-byte region [fff00000c76d2240, fff00000c76d22bb)
[   32.863958] 
[   32.863998] The buggy address belongs to the physical page:
[   32.864037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d2
[   32.864100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.864161] page_type: f5(slab)
[   32.864211] raw: 0bfffe0000000000 fff00000c76a5140 dead000000000122 0000000000000000
[   32.864269] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.864315] page dumped because: kasan: bad access detected
[   32.864353] 
[   32.864375] Memory state around the buggy address:
[   32.864416]  fff00000c76d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.864465]  fff00000c76d2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.864514] >fff00000c76d2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.864557]                                         ^
[   32.864597]  fff00000c76d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.864644]  fff00000c76d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.865517] ==================================================================
[   32.830748] ==================================================================
[   32.830865] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.831027] Read of size 1 at addr fff00000c649d373 by task kunit_try_catch/232
[   32.831089] 
[   32.831146] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.831252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.831283] Hardware name: linux,dummy-virt (DT)
[   32.831324] Call trace:
[   32.831353]  show_stack+0x20/0x38 (C)
[   32.831418]  dump_stack_lvl+0x8c/0xd0
[   32.831477]  print_report+0x118/0x608
[   32.831530]  kasan_report+0xdc/0x128
[   32.831583]  __asan_report_load1_noabort+0x20/0x30
[   32.831641]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.831694]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.831751]  kunit_try_run_case+0x170/0x3f0
[   32.831809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.831868]  kthread+0x328/0x630
[   32.831934]  ret_from_fork+0x10/0x20
[   32.831993] 
[   32.832015] Allocated by task 232:
[   32.832048]  kasan_save_stack+0x3c/0x68
[   32.832100]  kasan_save_track+0x20/0x40
[   32.832142]  kasan_save_alloc_info+0x40/0x58
[   32.832189]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.832238]  remove_element+0x130/0x1f8
[   32.832280]  mempool_alloc_preallocated+0x58/0xc0
[   32.832324]  mempool_oob_right_helper+0x98/0x2f0
[   32.832367]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.832413]  kunit_try_run_case+0x170/0x3f0
[   32.832456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.832504]  kthread+0x328/0x630
[   32.832539]  ret_from_fork+0x10/0x20
[   32.832578] 
[   32.832604] The buggy address belongs to the object at fff00000c649d300
[   32.832604]  which belongs to the cache kmalloc-128 of size 128
[   32.832670] The buggy address is located 0 bytes to the right of
[   32.832670]  allocated 115-byte region [fff00000c649d300, fff00000c649d373)
[   32.832738] 
[   32.832766] The buggy address belongs to the physical page:
[   32.832807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d
[   32.832869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.832946] page_type: f5(slab)
[   32.832997] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.833056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.833103] page dumped because: kasan: bad access detected
[   32.833140] 
[   32.833159] Memory state around the buggy address:
[   32.833199]  fff00000c649d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.833248]  fff00000c649d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.833296] >fff00000c649d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.833339]                                                              ^
[   32.833385]  fff00000c649d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.833433]  fff00000c649d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.833506] ==================================================================
[   32.845160] ==================================================================
[   32.845910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.846029] Read of size 1 at addr fff00000c63ea001 by task kunit_try_catch/234
[   32.846093] 
[   32.846144] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.846263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.846295] Hardware name: linux,dummy-virt (DT)
[   32.846332] Call trace:
[   32.846360]  show_stack+0x20/0x38 (C)
[   32.846423]  dump_stack_lvl+0x8c/0xd0
[   32.846479]  print_report+0x118/0x608
[   32.846532]  kasan_report+0xdc/0x128
[   32.846585]  __asan_report_load1_noabort+0x20/0x30
[   32.846643]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.846697]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.846754]  kunit_try_run_case+0x170/0x3f0
[   32.846836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.846933]  kthread+0x328/0x630
[   32.847054]  ret_from_fork+0x10/0x20
[   32.847410] 
[   32.847505] The buggy address belongs to the physical page:
[   32.847666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e8
[   32.847938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.847998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.848067] page_type: f8(unknown)
[   32.848119] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.848246] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.848612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.848675] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.848732] head: 0bfffe0000000002 ffffc1ffc318fa01 00000000ffffffff 00000000ffffffff
[   32.848865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.848929] page dumped because: kasan: bad access detected
[   32.849389] 
[   32.849419] Memory state around the buggy address:
[   32.849462]  fff00000c63e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.849647]  fff00000c63e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.849707] >fff00000c63ea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.849752]                    ^
[   32.849797]  fff00000c63ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.849852]  fff00000c63ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.849907] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.219266] ==================================================================
[   32.219472] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.219645] Read of size 1 at addr fff00000c7751000 by task kunit_try_catch/226
[   32.219778] 
[   32.220773] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.221103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221170] Hardware name: linux,dummy-virt (DT)
[   32.221245] Call trace:
[   32.221304]  show_stack+0x20/0x38 (C)
[   32.221672]  dump_stack_lvl+0x8c/0xd0
[   32.221838]  print_report+0x118/0x608
[   32.221998]  kasan_report+0xdc/0x128
[   32.222321]  __kasan_check_byte+0x54/0x70
[   32.222494]  kmem_cache_destroy+0x34/0x218
[   32.222779]  kmem_cache_double_destroy+0x174/0x300
[   32.222907]  kunit_try_run_case+0x170/0x3f0
[   32.223020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.223145]  kthread+0x328/0x630
[   32.223699]  ret_from_fork+0x10/0x20
[   32.224039] 
[   32.224108] Allocated by task 226:
[   32.224322]  kasan_save_stack+0x3c/0x68
[   32.224474]  kasan_save_track+0x20/0x40
[   32.224929]  kasan_save_alloc_info+0x40/0x58
[   32.225116]  __kasan_slab_alloc+0xa8/0xb0
[   32.225329]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.225474]  __kmem_cache_create_args+0x178/0x280
[   32.225578]  kmem_cache_double_destroy+0xc0/0x300
[   32.226027]  kunit_try_run_case+0x170/0x3f0
[   32.226239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.226413]  kthread+0x328/0x630
[   32.226561]  ret_from_fork+0x10/0x20
[   32.226768] 
[   32.226821] Freed by task 226:
[   32.226900]  kasan_save_stack+0x3c/0x68
[   32.227016]  kasan_save_track+0x20/0x40
[   32.227112]  kasan_save_free_info+0x4c/0x78
[   32.227214]  __kasan_slab_free+0x6c/0x98
[   32.227311]  kmem_cache_free+0x260/0x468
[   32.227754]  slab_kmem_cache_release+0x38/0x50
[   32.227992]  kmem_cache_release+0x1c/0x30
[   32.228567]  kobject_put+0x17c/0x420
[   32.228810]  sysfs_slab_release+0x1c/0x30
[   32.229013]  kmem_cache_destroy+0x118/0x218
[   32.229254]  kmem_cache_double_destroy+0x128/0x300
[   32.229357]  kunit_try_run_case+0x170/0x3f0
[   32.229764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.230059]  kthread+0x328/0x630
[   32.230151]  ret_from_fork+0x10/0x20
[   32.230243] 
[   32.230303] The buggy address belongs to the object at fff00000c7751000
[   32.230303]  which belongs to the cache kmem_cache of size 208
[   32.231048] The buggy address is located 0 bytes inside of
[   32.231048]  freed 208-byte region [fff00000c7751000, fff00000c77510d0)
[   32.231610] 
[   32.231859] The buggy address belongs to the physical page:
[   32.232170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   32.232654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.233058] page_type: f5(slab)
[   32.233185] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.233692] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.234081] page dumped because: kasan: bad access detected
[   32.234170] 
[   32.234213] Memory state around the buggy address:
[   32.234285]  fff00000c7750f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   32.234381]  fff00000c7750f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.234477] >fff00000c7751000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.235034]                    ^
[   32.235195]  fff00000c7751080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.235382]  fff00000c7751100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235567] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.070604] ==================================================================
[   32.070810] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   32.071011] Read of size 1 at addr fff00000c7751000 by task kunit_try_catch/224
[   32.071137] 
[   32.071235] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   32.071456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.071525] Hardware name: linux,dummy-virt (DT)
[   32.071611] Call trace:
[   32.071670]  show_stack+0x20/0x38 (C)
[   32.072077]  dump_stack_lvl+0x8c/0xd0
[   32.072845]  print_report+0x118/0x608
[   32.073082]  kasan_report+0xdc/0x128
[   32.073245]  __asan_report_load1_noabort+0x20/0x30
[   32.073458]  kmem_cache_rcu_uaf+0x388/0x468
[   32.073571]  kunit_try_run_case+0x170/0x3f0
[   32.074125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.074294]  kthread+0x328/0x630
[   32.074446]  ret_from_fork+0x10/0x20
[   32.074601] 
[   32.074651] Allocated by task 224:
[   32.074732]  kasan_save_stack+0x3c/0x68
[   32.074838]  kasan_save_track+0x20/0x40
[   32.074954]  kasan_save_alloc_info+0x40/0x58
[   32.075088]  __kasan_slab_alloc+0xa8/0xb0
[   32.075192]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.075300]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.075392]  kunit_try_run_case+0x170/0x3f0
[   32.075488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.075602]  kthread+0x328/0x630
[   32.075686]  ret_from_fork+0x10/0x20
[   32.075781] 
[   32.076220] Freed by task 0:
[   32.076426]  kasan_save_stack+0x3c/0x68
[   32.076566]  kasan_save_track+0x20/0x40
[   32.076668]  kasan_save_free_info+0x4c/0x78
[   32.077036]  __kasan_slab_free+0x6c/0x98
[   32.077291]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.077400]  rcu_core+0x9f4/0x1e20
[   32.077725]  rcu_core_si+0x18/0x30
[   32.077824]  handle_softirqs+0x374/0xb28
[   32.077935]  __do_softirq+0x1c/0x28
[   32.078062] 
[   32.078133] Last potentially related work creation:
[   32.078222]  kasan_save_stack+0x3c/0x68
[   32.078336]  kasan_record_aux_stack+0xb4/0xc8
[   32.078421]  kmem_cache_free+0x120/0x468
[   32.078491]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.078586]  kunit_try_run_case+0x170/0x3f0
[   32.078668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.078763]  kthread+0x328/0x630
[   32.079050]  ret_from_fork+0x10/0x20
[   32.079202] 
[   32.079311] The buggy address belongs to the object at fff00000c7751000
[   32.079311]  which belongs to the cache test_cache of size 200
[   32.079462] The buggy address is located 0 bytes inside of
[   32.079462]  freed 200-byte region [fff00000c7751000, fff00000c77510c8)
[   32.079680] 
[   32.079760] The buggy address belongs to the physical page:
[   32.079889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   32.080069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.080230] page_type: f5(slab)
[   32.080332] raw: 0bfffe0000000000 fff00000c1112dc0 dead000000000122 0000000000000000
[   32.080464] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.080577] page dumped because: kasan: bad access detected
[   32.080661] 
[   32.080708] Memory state around the buggy address:
[   32.080793]  fff00000c7750f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.080915]  fff00000c7750f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.081016] >fff00000c7751000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.081110]                    ^
[   32.081186]  fff00000c7751080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.081754]  fff00000c7751100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.081870] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.563616] ==================================================================
[   31.564108] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.564494] Free of addr fff00000c774f001 by task kunit_try_catch/222
[   31.564721] 
[   31.564946] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   31.565425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.565600] Hardware name: linux,dummy-virt (DT)
[   31.565707] Call trace:
[   31.565944]  show_stack+0x20/0x38 (C)
[   31.566082]  dump_stack_lvl+0x8c/0xd0
[   31.566221]  print_report+0x118/0x608
[   31.566355]  kasan_report_invalid_free+0xc0/0xe8
[   31.566706]  check_slab_allocation+0xfc/0x108
[   31.567000]  __kasan_slab_pre_free+0x2c/0x48
[   31.567276]  kmem_cache_free+0xf0/0x468
[   31.567631]  kmem_cache_invalid_free+0x184/0x3c8
[   31.567862]  kunit_try_run_case+0x170/0x3f0
[   31.568051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.568204]  kthread+0x328/0x630
[   31.568393]  ret_from_fork+0x10/0x20
[   31.568600] 
[   31.568652] Allocated by task 222:
[   31.568727]  kasan_save_stack+0x3c/0x68
[   31.568824]  kasan_save_track+0x20/0x40
[   31.568924]  kasan_save_alloc_info+0x40/0x58
[   31.569026]  __kasan_slab_alloc+0xa8/0xb0
[   31.569564]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.569919]  kmem_cache_invalid_free+0x12c/0x3c8
[   31.570032]  kunit_try_run_case+0x170/0x3f0
[   31.570148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.570239]  kthread+0x328/0x630
[   31.570337]  ret_from_fork+0x10/0x20
[   31.570410] 
[   31.570456] The buggy address belongs to the object at fff00000c774f000
[   31.570456]  which belongs to the cache test_cache of size 200
[   31.570906] The buggy address is located 1 bytes inside of
[   31.570906]  200-byte region [fff00000c774f000, fff00000c774f0c8)
[   31.571087] 
[   31.571150] The buggy address belongs to the physical page:
[   31.571263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774f
[   31.571561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.571689] page_type: f5(slab)
[   31.571897] raw: 0bfffe0000000000 fff00000c1112c80 dead000000000122 0000000000000000
[   31.572217] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.572325] page dumped because: kasan: bad access detected
[   31.572393] 
[   31.572435] Memory state around the buggy address:
[   31.572517]  fff00000c774ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.572668]  fff00000c774ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.572821] >fff00000c774f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.572969]                    ^
[   31.573069]  fff00000c774f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.573178]  fff00000c774f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.573275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.735325] ==================================================================
[   29.735544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.735692] Read of size 1 at addr fff00000c4726c5f by task kunit_try_catch/149
[   29.735818] 
[   29.735921] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.736141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.736208] Hardware name: linux,dummy-virt (DT)
[   29.736284] Call trace:
[   29.736338]  show_stack+0x20/0x38 (C)
[   29.736479]  dump_stack_lvl+0x8c/0xd0
[   29.736592]  print_report+0x118/0x608
[   29.736698]  kasan_report+0xdc/0x128
[   29.736829]  __asan_report_load1_noabort+0x20/0x30
[   29.736999]  kmalloc_oob_left+0x2ec/0x320
[   29.737191]  kunit_try_run_case+0x170/0x3f0
[   29.737371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.737550]  kthread+0x328/0x630
[   29.737660]  ret_from_fork+0x10/0x20
[   29.737796] 
[   29.737838] Allocated by task 21:
[   29.737937]  kasan_save_stack+0x3c/0x68
[   29.738077]  kasan_save_track+0x20/0x40
[   29.738167]  kasan_save_alloc_info+0x40/0x58
[   29.738284]  __kasan_kmalloc+0xd4/0xd8
[   29.738362]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.738443]  build_sched_domains+0x32c/0x3768
[   29.738557]  partition_sched_domains+0x79c/0x1098
[   29.738649]  rebuild_sched_domains_locked+0x494/0xde0
[   29.738749]  cpuset_handle_hotplug+0xab0/0x1480
[   29.738824]  cpuset_update_active_cpus+0x18/0x30
[   29.738916]  sched_cpu_activate+0x2d0/0x388
[   29.739016]  cpuhp_invoke_callback+0x5b8/0x1620
[   29.739112]  cpuhp_thread_fun+0x230/0x5d8
[   29.739239]  smpboot_thread_fn+0x2e8/0x760
[   29.739377]  kthread+0x328/0x630
[   29.739485]  ret_from_fork+0x10/0x20
[   29.739605] 
[   29.739720] Freed by task 21:
[   29.739843]  kasan_save_stack+0x3c/0x68
[   29.739989]  kasan_save_track+0x20/0x40
[   29.740080]  kasan_save_free_info+0x4c/0x78
[   29.740211]  __kasan_slab_free+0x6c/0x98
[   29.740337]  kfree+0x214/0x3c8
[   29.740452]  build_sched_domains+0x1c64/0x3768
[   29.740587]  partition_sched_domains+0x79c/0x1098
[   29.740723]  rebuild_sched_domains_locked+0x494/0xde0
[   29.740861]  cpuset_handle_hotplug+0xab0/0x1480
[   29.740958]  cpuset_update_active_cpus+0x18/0x30
[   29.741034]  sched_cpu_activate+0x2d0/0x388
[   29.741120]  cpuhp_invoke_callback+0x5b8/0x1620
[   29.741219]  cpuhp_thread_fun+0x230/0x5d8
[   29.741314]  smpboot_thread_fn+0x2e8/0x760
[   29.741447]  kthread+0x328/0x630
[   29.741532]  ret_from_fork+0x10/0x20
[   29.741653] 
[   29.741723] The buggy address belongs to the object at fff00000c4726c40
[   29.741723]  which belongs to the cache kmalloc-16 of size 16
[   29.741885] The buggy address is located 15 bytes to the right of
[   29.741885]  allocated 16-byte region [fff00000c4726c40, fff00000c4726c50)
[   29.742056] 
[   29.742113] The buggy address belongs to the physical page:
[   29.742198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   29.742327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.742509] page_type: f5(slab)
[   29.742638] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   29.742800] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.742916] page dumped because: kasan: bad access detected
[   29.743000] 
[   29.743043] Memory state around the buggy address:
[   29.743126]  fff00000c4726b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.743250]  fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.743339] >fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   29.743412]                                                     ^
[   29.743511]  fff00000c4726c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.743610]  fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.743694] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.673672] ==================================================================
[   29.674739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.677241] Write of size 1 at addr fff00000c6466573 by task kunit_try_catch/147
[   29.677570] 
[   29.679788] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.680227] Tainted: [N]=TEST
[   29.680308] Hardware name: linux,dummy-virt (DT)
[   29.680924] Call trace:
[   29.681358]  show_stack+0x20/0x38 (C)
[   29.681816]  dump_stack_lvl+0x8c/0xd0
[   29.681987]  print_report+0x118/0x608
[   29.682100]  kasan_report+0xdc/0x128
[   29.682240]  __asan_report_store1_noabort+0x20/0x30
[   29.682366]  kmalloc_oob_right+0x5a4/0x660
[   29.682475]  kunit_try_run_case+0x170/0x3f0
[   29.682589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.682721]  kthread+0x328/0x630
[   29.682840]  ret_from_fork+0x10/0x20
[   29.683406] 
[   29.683517] Allocated by task 147:
[   29.683739]  kasan_save_stack+0x3c/0x68
[   29.683906]  kasan_save_track+0x20/0x40
[   29.684032]  kasan_save_alloc_info+0x40/0x58
[   29.684126]  __kasan_kmalloc+0xd4/0xd8
[   29.684355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.684468]  kmalloc_oob_right+0xb0/0x660
[   29.684588]  kunit_try_run_case+0x170/0x3f0
[   29.684688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.684852]  kthread+0x328/0x630
[   29.684967]  ret_from_fork+0x10/0x20
[   29.685152] 
[   29.685378] The buggy address belongs to the object at fff00000c6466500
[   29.685378]  which belongs to the cache kmalloc-128 of size 128
[   29.685669] The buggy address is located 0 bytes to the right of
[   29.685669]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.685856] 
[   29.686055] The buggy address belongs to the physical page:
[   29.686447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.688272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689466] page_type: f5(slab)
[   29.692063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.692953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.693338] page dumped because: kasan: bad access detected
[   29.693774] 
[   29.694757] Memory state around the buggy address:
[   29.696254]  fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.696475]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696665] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.696798]                                                              ^
[   29.697010]  fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.697117]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.697272] ==================================================================
[   29.712160] ==================================================================
[   29.712288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.712407] Read of size 1 at addr fff00000c6466580 by task kunit_try_catch/147
[   29.712529] 
[   29.712614] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.712827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712906] Hardware name: linux,dummy-virt (DT)
[   29.712986] Call trace:
[   29.713778]  show_stack+0x20/0x38 (C)
[   29.713927]  dump_stack_lvl+0x8c/0xd0
[   29.714072]  print_report+0x118/0x608
[   29.714214]  kasan_report+0xdc/0x128
[   29.714356]  __asan_report_load1_noabort+0x20/0x30
[   29.714487]  kmalloc_oob_right+0x5d0/0x660
[   29.714618]  kunit_try_run_case+0x170/0x3f0
[   29.714749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.714980]  kthread+0x328/0x630
[   29.715224]  ret_from_fork+0x10/0x20
[   29.715531] 
[   29.715689] Allocated by task 147:
[   29.716074]  kasan_save_stack+0x3c/0x68
[   29.716428]  kasan_save_track+0x20/0x40
[   29.716577]  kasan_save_alloc_info+0x40/0x58
[   29.716796]  __kasan_kmalloc+0xd4/0xd8
[   29.716950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.717477]  kmalloc_oob_right+0xb0/0x660
[   29.717570]  kunit_try_run_case+0x170/0x3f0
[   29.717650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717743]  kthread+0x328/0x630
[   29.717822]  ret_from_fork+0x10/0x20
[   29.717943] 
[   29.718009] The buggy address belongs to the object at fff00000c6466500
[   29.718009]  which belongs to the cache kmalloc-128 of size 128
[   29.718165] The buggy address is located 13 bytes to the right of
[   29.718165]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.718309] 
[   29.718351] The buggy address belongs to the physical page:
[   29.718445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.718617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.718796] page_type: f5(slab)
[   29.718953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.719137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.719273] page dumped because: kasan: bad access detected
[   29.719360] 
[   29.719425] Memory state around the buggy address:
[   29.719533]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.719689]  fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.719804] >fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.719918]                    ^
[   29.719980]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720082]  fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720744] ==================================================================
[   29.700568] ==================================================================
[   29.700884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.701060] Write of size 1 at addr fff00000c6466578 by task kunit_try_catch/147
[   29.701210] 
[   29.701326] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.701889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.701957] Hardware name: linux,dummy-virt (DT)
[   29.702032] Call trace:
[   29.702088]  show_stack+0x20/0x38 (C)
[   29.702205]  dump_stack_lvl+0x8c/0xd0
[   29.702314]  print_report+0x118/0x608
[   29.702424]  kasan_report+0xdc/0x128
[   29.702540]  __asan_report_store1_noabort+0x20/0x30
[   29.702664]  kmalloc_oob_right+0x538/0x660
[   29.702851]  kunit_try_run_case+0x170/0x3f0
[   29.703037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.703175]  kthread+0x328/0x630
[   29.703290]  ret_from_fork+0x10/0x20
[   29.703415] 
[   29.703460] Allocated by task 147:
[   29.703530]  kasan_save_stack+0x3c/0x68
[   29.703631]  kasan_save_track+0x20/0x40
[   29.703728]  kasan_save_alloc_info+0x40/0x58
[   29.703827]  __kasan_kmalloc+0xd4/0xd8
[   29.705553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.705761]  kmalloc_oob_right+0xb0/0x660
[   29.706013]  kunit_try_run_case+0x170/0x3f0
[   29.706452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.706725]  kthread+0x328/0x630
[   29.706923]  ret_from_fork+0x10/0x20
[   29.707152] 
[   29.707211] The buggy address belongs to the object at fff00000c6466500
[   29.707211]  which belongs to the cache kmalloc-128 of size 128
[   29.707783] The buggy address is located 5 bytes to the right of
[   29.707783]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.708373] 
[   29.708460] The buggy address belongs to the physical page:
[   29.708689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.708883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709003] page_type: f5(slab)
[   29.709107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.709244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.709721] page dumped because: kasan: bad access detected
[   29.709798] 
[   29.709840] Memory state around the buggy address:
[   29.709920]  fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710020]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710142] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.710238]                                                                 ^
[   29.710330]  fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710420]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.482149] ==================================================================
[   31.482448] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.482653] Free of addr fff00000c774d000 by task kunit_try_catch/220
[   31.482761] 
[   31.482867] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   31.483224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.483329] Hardware name: linux,dummy-virt (DT)
[   31.483441] Call trace:
[   31.483530]  show_stack+0x20/0x38 (C)
[   31.483659]  dump_stack_lvl+0x8c/0xd0
[   31.483831]  print_report+0x118/0x608
[   31.483958]  kasan_report_invalid_free+0xc0/0xe8
[   31.484107]  check_slab_allocation+0xd4/0x108
[   31.484232]  __kasan_slab_pre_free+0x2c/0x48
[   31.484336]  kmem_cache_free+0xf0/0x468
[   31.484446]  kmem_cache_double_free+0x190/0x3c8
[   31.484579]  kunit_try_run_case+0x170/0x3f0
[   31.484745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.484918]  kthread+0x328/0x630
[   31.485051]  ret_from_fork+0x10/0x20
[   31.485190] 
[   31.485230] Allocated by task 220:
[   31.485302]  kasan_save_stack+0x3c/0x68
[   31.485423]  kasan_save_track+0x20/0x40
[   31.485515]  kasan_save_alloc_info+0x40/0x58
[   31.485602]  __kasan_slab_alloc+0xa8/0xb0
[   31.485707]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.485784]  kmem_cache_double_free+0x12c/0x3c8
[   31.485867]  kunit_try_run_case+0x170/0x3f0
[   31.485965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.486101]  kthread+0x328/0x630
[   31.486267]  ret_from_fork+0x10/0x20
[   31.486370] 
[   31.486411] Freed by task 220:
[   31.486475]  kasan_save_stack+0x3c/0x68
[   31.486594]  kasan_save_track+0x20/0x40
[   31.486700]  kasan_save_free_info+0x4c/0x78
[   31.486787]  __kasan_slab_free+0x6c/0x98
[   31.486885]  kmem_cache_free+0x260/0x468
[   31.486992]  kmem_cache_double_free+0x140/0x3c8
[   31.487092]  kunit_try_run_case+0x170/0x3f0
[   31.487182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.487285]  kthread+0x328/0x630
[   31.487367]  ret_from_fork+0x10/0x20
[   31.487458] 
[   31.487519] The buggy address belongs to the object at fff00000c774d000
[   31.487519]  which belongs to the cache test_cache of size 200
[   31.487679] The buggy address is located 0 bytes inside of
[   31.487679]  200-byte region [fff00000c774d000, fff00000c774d0c8)
[   31.487816] 
[   31.487867] The buggy address belongs to the physical page:
[   31.487960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774d
[   31.488126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.488283] page_type: f5(slab)
[   31.488426] raw: 0bfffe0000000000 fff00000c1112b40 dead000000000122 0000000000000000
[   31.488560] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.488656] page dumped because: kasan: bad access detected
[   31.488726] 
[   31.488768] Memory state around the buggy address:
[   31.488881]  fff00000c774cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.488990]  fff00000c774cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.489095] >fff00000c774d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.489204]                    ^
[   31.489305]  fff00000c774d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.489445]  fff00000c774d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.489655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.280530] ==================================================================
[   31.280721] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.282087] Read of size 1 at addr fff00000c774a0c8 by task kunit_try_catch/218
[   31.282721] 
[   31.282818] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   31.283082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.283156] Hardware name: linux,dummy-virt (DT)
[   31.283247] Call trace:
[   31.283308]  show_stack+0x20/0x38 (C)
[   31.283912]  dump_stack_lvl+0x8c/0xd0
[   31.284084]  print_report+0x118/0x608
[   31.284208]  kasan_report+0xdc/0x128
[   31.284316]  __asan_report_load1_noabort+0x20/0x30
[   31.284912]  kmem_cache_oob+0x344/0x430
[   31.285136]  kunit_try_run_case+0x170/0x3f0
[   31.285338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.285600]  kthread+0x328/0x630
[   31.285703]  ret_from_fork+0x10/0x20
[   31.285800] 
[   31.286301] Allocated by task 218:
[   31.286528]  kasan_save_stack+0x3c/0x68
[   31.286658]  kasan_save_track+0x20/0x40
[   31.286821]  kasan_save_alloc_info+0x40/0x58
[   31.286972]  __kasan_slab_alloc+0xa8/0xb0
[   31.287473]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.287662]  kmem_cache_oob+0x12c/0x430
[   31.287993]  kunit_try_run_case+0x170/0x3f0
[   31.288305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.288424]  kthread+0x328/0x630
[   31.288622]  ret_from_fork+0x10/0x20
[   31.288823] 
[   31.288972] The buggy address belongs to the object at fff00000c774a000
[   31.288972]  which belongs to the cache test_cache of size 200
[   31.289344] The buggy address is located 0 bytes to the right of
[   31.289344]  allocated 200-byte region [fff00000c774a000, fff00000c774a0c8)
[   31.289516] 
[   31.289847] The buggy address belongs to the physical page:
[   31.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774a
[   31.290166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.290318] page_type: f5(slab)
[   31.290816] raw: 0bfffe0000000000 fff00000c1112a00 dead000000000122 0000000000000000
[   31.290997] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.291216] page dumped because: kasan: bad access detected
[   31.291303] 
[   31.291364] Memory state around the buggy address:
[   31.291520]  fff00000c7749f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.291713]  fff00000c774a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.291833] >fff00000c774a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.291946]                                               ^
[   31.292286]  fff00000c774a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.292405]  fff00000c774a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.292506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.191351] ==================================================================
[   31.191559] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.192890] Read of size 8 at addr fff00000c771ef40 by task kunit_try_catch/211
[   31.193476] 
[   31.193584] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   31.193863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.193949] Hardware name: linux,dummy-virt (DT)
[   31.194022] Call trace:
[   31.194076]  show_stack+0x20/0x38 (C)
[   31.194209]  dump_stack_lvl+0x8c/0xd0
[   31.194313]  print_report+0x118/0x608
[   31.194435]  kasan_report+0xdc/0x128
[   31.194532]  __asan_report_load8_noabort+0x20/0x30
[   31.194641]  workqueue_uaf+0x480/0x4a8
[   31.194746]  kunit_try_run_case+0x170/0x3f0
[   31.194836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.194967]  kthread+0x328/0x630
[   31.195089]  ret_from_fork+0x10/0x20
[   31.195213] 
[   31.195257] Allocated by task 211:
[   31.195330]  kasan_save_stack+0x3c/0x68
[   31.195481]  kasan_save_track+0x20/0x40
[   31.195605]  kasan_save_alloc_info+0x40/0x58
[   31.195708]  __kasan_kmalloc+0xd4/0xd8
[   31.195805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.195917]  workqueue_uaf+0x13c/0x4a8
[   31.196012]  kunit_try_run_case+0x170/0x3f0
[   31.196123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.196216]  kthread+0x328/0x630
[   31.196290]  ret_from_fork+0x10/0x20
[   31.196385] 
[   31.196435] Freed by task 32:
[   31.196508]  kasan_save_stack+0x3c/0x68
[   31.196637]  kasan_save_track+0x20/0x40
[   31.196737]  kasan_save_free_info+0x4c/0x78
[   31.196868]  __kasan_slab_free+0x6c/0x98
[   31.196996]  kfree+0x214/0x3c8
[   31.197100]  workqueue_uaf_work+0x18/0x30
[   31.197181]  process_one_work+0x530/0xf98
[   31.197297]  worker_thread+0x618/0xf38
[   31.197373]  kthread+0x328/0x630
[   31.197574]  ret_from_fork+0x10/0x20
[   31.197654] 
[   31.197756] Last potentially related work creation:
[   31.197817]  kasan_save_stack+0x3c/0x68
[   31.197927]  kasan_record_aux_stack+0xb4/0xc8
[   31.198070]  __queue_work+0x65c/0xfe0
[   31.198179]  queue_work_on+0xbc/0xf8
[   31.198378]  workqueue_uaf+0x210/0x4a8
[   31.198535]  kunit_try_run_case+0x170/0x3f0
[   31.198673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.198799]  kthread+0x328/0x630
[   31.198900]  ret_from_fork+0x10/0x20
[   31.199003] 
[   31.199852] The buggy address belongs to the object at fff00000c771ef40
[   31.199852]  which belongs to the cache kmalloc-32 of size 32
[   31.200080] The buggy address is located 0 bytes inside of
[   31.200080]  freed 32-byte region [fff00000c771ef40, fff00000c771ef60)
[   31.200451] 
[   31.200519] The buggy address belongs to the physical page:
[   31.200611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   31.200753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.200892] page_type: f5(slab)
[   31.201241] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.202009] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.202125] page dumped because: kasan: bad access detected
[   31.202200] 
[   31.202244] Memory state around the buggy address:
[   31.202348]  fff00000c771ee00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   31.202504]  fff00000c771ee80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.202640] >fff00000c771ef00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   31.202740]                                            ^
[   31.202824]  fff00000c771ef80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.202926]  fff00000c771f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.203013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.139439] ==================================================================
[   31.139719] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.140442] Read of size 4 at addr fff00000c771ed80 by task swapper/1/0
[   31.140659] 
[   31.140760] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   31.140992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.141062] Hardware name: linux,dummy-virt (DT)
[   31.141139] Call trace:
[   31.141203]  show_stack+0x20/0x38 (C)
[   31.141336]  dump_stack_lvl+0x8c/0xd0
[   31.141972]  print_report+0x118/0x608
[   31.142190]  kasan_report+0xdc/0x128
[   31.142529]  __asan_report_load4_noabort+0x20/0x30
[   31.142732]  rcu_uaf_reclaim+0x64/0x70
[   31.142926]  rcu_core+0x9f4/0x1e20
[   31.143147]  rcu_core_si+0x18/0x30
[   31.143453]  handle_softirqs+0x374/0xb28
[   31.143705]  __do_softirq+0x1c/0x28
[   31.143818]  ____do_softirq+0x18/0x30
[   31.143927]  call_on_irq_stack+0x24/0x30
[   31.144031]  do_softirq_own_stack+0x24/0x38
[   31.144136]  __irq_exit_rcu+0x1fc/0x318
[   31.144268]  irq_exit_rcu+0x1c/0x80
[   31.144431]  el1_interrupt+0x38/0x58
[   31.144601]  el1h_64_irq_handler+0x18/0x28
[   31.144772]  el1h_64_irq+0x6c/0x70
[   31.145158]  arch_local_irq_enable+0x4/0x8 (P)
[   31.145345]  do_idle+0x384/0x4e8
[   31.145509]  cpu_startup_entry+0x68/0x80
[   31.145623]  secondary_start_kernel+0x288/0x340
[   31.145927]  __secondary_switched+0xc0/0xc8
[   31.146266] 
[   31.146405] Allocated by task 209:
[   31.146489]  kasan_save_stack+0x3c/0x68
[   31.146606]  kasan_save_track+0x20/0x40
[   31.146702]  kasan_save_alloc_info+0x40/0x58
[   31.146798]  __kasan_kmalloc+0xd4/0xd8
[   31.146889]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.146993]  rcu_uaf+0xb0/0x2d8
[   31.147395]  kunit_try_run_case+0x170/0x3f0
[   31.147527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.147657]  kthread+0x328/0x630
[   31.147735]  ret_from_fork+0x10/0x20
[   31.147821] 
[   31.148261] Freed by task 0:
[   31.148369]  kasan_save_stack+0x3c/0x68
[   31.148524]  kasan_save_track+0x20/0x40
[   31.148635]  kasan_save_free_info+0x4c/0x78
[   31.148737]  __kasan_slab_free+0x6c/0x98
[   31.148827]  kfree+0x214/0x3c8
[   31.148921]  rcu_uaf_reclaim+0x28/0x70
[   31.149017]  rcu_core+0x9f4/0x1e20
[   31.149103]  rcu_core_si+0x18/0x30
[   31.149190]  handle_softirqs+0x374/0xb28
[   31.149317]  __do_softirq+0x1c/0x28
[   31.149443] 
[   31.149526] Last potentially related work creation:
[   31.149607]  kasan_save_stack+0x3c/0x68
[   31.150108]  kasan_record_aux_stack+0xb4/0xc8
[   31.150224]  __call_rcu_common.constprop.0+0x74/0x8c8
[   31.150526]  call_rcu+0x18/0x30
[   31.150916]  rcu_uaf+0x14c/0x2d8
[   31.151019]  kunit_try_run_case+0x170/0x3f0
[   31.151125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.151286]  kthread+0x328/0x630
[   31.151370]  ret_from_fork+0x10/0x20
[   31.151489] 
[   31.151558] The buggy address belongs to the object at fff00000c771ed80
[   31.151558]  which belongs to the cache kmalloc-32 of size 32
[   31.151715] The buggy address is located 0 bytes inside of
[   31.151715]  freed 32-byte region [fff00000c771ed80, fff00000c771eda0)
[   31.151883] 
[   31.151943] The buggy address belongs to the physical page:
[   31.152025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e
[   31.152165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.152348] page_type: f5(slab)
[   31.152501] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.152643] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.152760] page dumped because: kasan: bad access detected
[   31.152885] 
[   31.152929] Memory state around the buggy address:
[   31.153000]  fff00000c771ec80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.153101]  fff00000c771ed00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.153238] >fff00000c771ed80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.153344]                    ^
[   31.153420]  fff00000c771ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.153535]  fff00000c771ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.153633] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.940490] ==================================================================
[   30.940637] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.940772] Read of size 1 at addr fff00000c6466e78 by task kunit_try_catch/207
[   30.940912] 
[   30.941005] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.941226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.941299] Hardware name: linux,dummy-virt (DT)
[   30.941383] Call trace:
[   30.943681]  show_stack+0x20/0x38 (C)
[   30.943915]  dump_stack_lvl+0x8c/0xd0
[   30.944099]  print_report+0x118/0x608
[   30.945617]  kasan_report+0xdc/0x128
[   30.945744]  __asan_report_load1_noabort+0x20/0x30
[   30.945881]  ksize_uaf+0x544/0x5f8
[   30.946001]  kunit_try_run_case+0x170/0x3f0
[   30.946127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.946265]  kthread+0x328/0x630
[   30.947651]  ret_from_fork+0x10/0x20
[   30.947863] 
[   30.947925] Allocated by task 207:
[   30.948376]  kasan_save_stack+0x3c/0x68
[   30.948501]  kasan_save_track+0x20/0x40
[   30.948600]  kasan_save_alloc_info+0x40/0x58
[   30.949425]  __kasan_kmalloc+0xd4/0xd8
[   30.949647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.949816]  ksize_uaf+0xb8/0x5f8
[   30.949912]  kunit_try_run_case+0x170/0x3f0
[   30.950604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.950774]  kthread+0x328/0x630
[   30.950923]  ret_from_fork+0x10/0x20
[   30.951326] 
[   30.951522] Freed by task 207:
[   30.951642]  kasan_save_stack+0x3c/0x68
[   30.951751]  kasan_save_track+0x20/0x40
[   30.951847]  kasan_save_free_info+0x4c/0x78
[   30.951955]  __kasan_slab_free+0x6c/0x98
[   30.952345]  kfree+0x214/0x3c8
[   30.952656]  ksize_uaf+0x11c/0x5f8
[   30.952967]  kunit_try_run_case+0x170/0x3f0
[   30.953265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.953382]  kthread+0x328/0x630
[   30.953455]  ret_from_fork+0x10/0x20
[   30.953546] 
[   30.953598] The buggy address belongs to the object at fff00000c6466e00
[   30.953598]  which belongs to the cache kmalloc-128 of size 128
[   30.954061] The buggy address is located 120 bytes inside of
[   30.954061]  freed 128-byte region [fff00000c6466e00, fff00000c6466e80)
[   30.954679] 
[   30.954730] The buggy address belongs to the physical page:
[   30.954796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.955166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.955420] page_type: f5(slab)
[   30.955530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.955662] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.955776] page dumped because: kasan: bad access detected
[   30.955844] 
[   30.955903] Memory state around the buggy address:
[   30.956005]  fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.956109]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.956213] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.956341]                                                                 ^
[   30.956457]  fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.956573]  fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.956667] ==================================================================
[   30.907685] ==================================================================
[   30.907865] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.908021] Read of size 1 at addr fff00000c6466e00 by task kunit_try_catch/207
[   30.908146] 
[   30.908235] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.908458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.908523] Hardware name: linux,dummy-virt (DT)
[   30.908604] Call trace:
[   30.908660]  show_stack+0x20/0x38 (C)
[   30.908786]  dump_stack_lvl+0x8c/0xd0
[   30.908921]  print_report+0x118/0x608
[   30.909043]  kasan_report+0xdc/0x128
[   30.909158]  __kasan_check_byte+0x54/0x70
[   30.909274]  ksize+0x30/0x88
[   30.909377]  ksize_uaf+0x168/0x5f8
[   30.909487]  kunit_try_run_case+0x170/0x3f0
[   30.909603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.909784]  kthread+0x328/0x630
[   30.909928]  ret_from_fork+0x10/0x20
[   30.910038] 
[   30.910083] Allocated by task 207:
[   30.910156]  kasan_save_stack+0x3c/0x68
[   30.910268]  kasan_save_track+0x20/0x40
[   30.910367]  kasan_save_alloc_info+0x40/0x58
[   30.910472]  __kasan_kmalloc+0xd4/0xd8
[   30.910552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.910674]  ksize_uaf+0xb8/0x5f8
[   30.910790]  kunit_try_run_case+0x170/0x3f0
[   30.910927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.911082]  kthread+0x328/0x630
[   30.911185]  ret_from_fork+0x10/0x20
[   30.911300] 
[   30.911358] Freed by task 207:
[   30.911426]  kasan_save_stack+0x3c/0x68
[   30.911524]  kasan_save_track+0x20/0x40
[   30.911618]  kasan_save_free_info+0x4c/0x78
[   30.911716]  __kasan_slab_free+0x6c/0x98
[   30.911810]  kfree+0x214/0x3c8
[   30.911905]  ksize_uaf+0x11c/0x5f8
[   30.911976]  kunit_try_run_case+0x170/0x3f0
[   30.912049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.912176]  kthread+0x328/0x630
[   30.912258]  ret_from_fork+0x10/0x20
[   30.912371] 
[   30.912416] The buggy address belongs to the object at fff00000c6466e00
[   30.912416]  which belongs to the cache kmalloc-128 of size 128
[   30.912560] The buggy address is located 0 bytes inside of
[   30.912560]  freed 128-byte region [fff00000c6466e00, fff00000c6466e80)
[   30.912778] 
[   30.912860] The buggy address belongs to the physical page:
[   30.913168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.913360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.913506] page_type: f5(slab)
[   30.913633] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.913793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.913939] page dumped because: kasan: bad access detected
[   30.914037] 
[   30.914096] Memory state around the buggy address:
[   30.914204]  fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.914543]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.914655] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.914778]                    ^
[   30.914844]  fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.915148]  fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.915342] ==================================================================
[   30.923863] ==================================================================
[   30.924043] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.924187] Read of size 1 at addr fff00000c6466e00 by task kunit_try_catch/207
[   30.924315] 
[   30.924403] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.924624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.924690] Hardware name: linux,dummy-virt (DT)
[   30.924770] Call trace:
[   30.924831]  show_stack+0x20/0x38 (C)
[   30.924953]  dump_stack_lvl+0x8c/0xd0
[   30.925776]  print_report+0x118/0x608
[   30.926065]  kasan_report+0xdc/0x128
[   30.926187]  __asan_report_load1_noabort+0x20/0x30
[   30.926307]  ksize_uaf+0x598/0x5f8
[   30.926485]  kunit_try_run_case+0x170/0x3f0
[   30.927116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.927541]  kthread+0x328/0x630
[   30.927664]  ret_from_fork+0x10/0x20
[   30.927783] 
[   30.927840] Allocated by task 207:
[   30.927929]  kasan_save_stack+0x3c/0x68
[   30.928038]  kasan_save_track+0x20/0x40
[   30.928132]  kasan_save_alloc_info+0x40/0x58
[   30.928231]  __kasan_kmalloc+0xd4/0xd8
[   30.928334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.928440]  ksize_uaf+0xb8/0x5f8
[   30.928519]  kunit_try_run_case+0x170/0x3f0
[   30.928904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.929025]  kthread+0x328/0x630
[   30.929225]  ret_from_fork+0x10/0x20
[   30.929361] 
[   30.929431] Freed by task 207:
[   30.929531]  kasan_save_stack+0x3c/0x68
[   30.929667]  kasan_save_track+0x20/0x40
[   30.929800]  kasan_save_free_info+0x4c/0x78
[   30.929917]  __kasan_slab_free+0x6c/0x98
[   30.930018]  kfree+0x214/0x3c8
[   30.930103]  ksize_uaf+0x11c/0x5f8
[   30.930189]  kunit_try_run_case+0x170/0x3f0
[   30.930297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.930455]  kthread+0x328/0x630
[   30.930571]  ret_from_fork+0x10/0x20
[   30.930660] 
[   30.930715] The buggy address belongs to the object at fff00000c6466e00
[   30.930715]  which belongs to the cache kmalloc-128 of size 128
[   30.930880] The buggy address is located 0 bytes inside of
[   30.930880]  freed 128-byte region [fff00000c6466e00, fff00000c6466e80)
[   30.931032] 
[   30.931089] The buggy address belongs to the physical page:
[   30.931174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.931311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.931441] page_type: f5(slab)
[   30.931527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.932119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.932436] page dumped because: kasan: bad access detected
[   30.932566] 
[   30.932632] Memory state around the buggy address:
[   30.932759]  fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.932932]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.933083] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.933201]                    ^
[   30.933272]  fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.933408]  fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.933493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.853245] ==================================================================
[   30.853600] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.854941] Read of size 1 at addr fff00000c6466d73 by task kunit_try_catch/205
[   30.855354] 
[   30.855473] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.856199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.856279] Hardware name: linux,dummy-virt (DT)
[   30.856818] Call trace:
[   30.856941]  show_stack+0x20/0x38 (C)
[   30.857169]  dump_stack_lvl+0x8c/0xd0
[   30.857363]  print_report+0x118/0x608
[   30.857528]  kasan_report+0xdc/0x128
[   30.857652]  __asan_report_load1_noabort+0x20/0x30
[   30.857772]  ksize_unpoisons_memory+0x628/0x740
[   30.857883]  kunit_try_run_case+0x170/0x3f0
[   30.858001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.858747]  kthread+0x328/0x630
[   30.859369]  ret_from_fork+0x10/0x20
[   30.859732] 
[   30.859830] Allocated by task 205:
[   30.860001]  kasan_save_stack+0x3c/0x68
[   30.860192]  kasan_save_track+0x20/0x40
[   30.860294]  kasan_save_alloc_info+0x40/0x58
[   30.860404]  __kasan_kmalloc+0xd4/0xd8
[   30.860827]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.861096]  ksize_unpoisons_memory+0xc0/0x740
[   30.861205]  kunit_try_run_case+0x170/0x3f0
[   30.861760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.861892]  kthread+0x328/0x630
[   30.861979]  ret_from_fork+0x10/0x20
[   30.862066] 
[   30.862212] The buggy address belongs to the object at fff00000c6466d00
[   30.862212]  which belongs to the cache kmalloc-128 of size 128
[   30.862801] The buggy address is located 0 bytes to the right of
[   30.862801]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.863090] 
[   30.863157] The buggy address belongs to the physical page:
[   30.863359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.863589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.863775] page_type: f5(slab)
[   30.864099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.864502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.864716] page dumped because: kasan: bad access detected
[   30.864845] 
[   30.864912] Memory state around the buggy address:
[   30.864999]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.865110]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.865225] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.865659]                                                              ^
[   30.866340]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866469]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.867040] ==================================================================
[   30.870543] ==================================================================
[   30.870619] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.870695] Read of size 1 at addr fff00000c6466d78 by task kunit_try_catch/205
[   30.870756] 
[   30.870804] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.870959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.871019] Hardware name: linux,dummy-virt (DT)
[   30.871090] Call trace:
[   30.871199]  show_stack+0x20/0x38 (C)
[   30.871353]  dump_stack_lvl+0x8c/0xd0
[   30.871485]  print_report+0x118/0x608
[   30.871607]  kasan_report+0xdc/0x128
[   30.872410]  __asan_report_load1_noabort+0x20/0x30
[   30.872994]  ksize_unpoisons_memory+0x618/0x740
[   30.873382]  kunit_try_run_case+0x170/0x3f0
[   30.873693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.874417]  kthread+0x328/0x630
[   30.874826]  ret_from_fork+0x10/0x20
[   30.875055] 
[   30.875284] Allocated by task 205:
[   30.875358]  kasan_save_stack+0x3c/0x68
[   30.875470]  kasan_save_track+0x20/0x40
[   30.875567]  kasan_save_alloc_info+0x40/0x58
[   30.875713]  __kasan_kmalloc+0xd4/0xd8
[   30.875952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.876134]  ksize_unpoisons_memory+0xc0/0x740
[   30.876583]  kunit_try_run_case+0x170/0x3f0
[   30.876744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.876954]  kthread+0x328/0x630
[   30.877055]  ret_from_fork+0x10/0x20
[   30.877147] 
[   30.877301] The buggy address belongs to the object at fff00000c6466d00
[   30.877301]  which belongs to the cache kmalloc-128 of size 128
[   30.877537] The buggy address is located 5 bytes to the right of
[   30.877537]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.877931] 
[   30.877988] The buggy address belongs to the physical page:
[   30.878063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.878193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.878427] page_type: f5(slab)
[   30.878689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.879084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.879334] page dumped because: kasan: bad access detected
[   30.879419] 
[   30.879621] Memory state around the buggy address:
[   30.879823]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.880070]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880350] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.880574]                                                                 ^
[   30.880765]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880893]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.881327] ==================================================================
[   30.883735] ==================================================================
[   30.883867] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.885030] Read of size 1 at addr fff00000c6466d7f by task kunit_try_catch/205
[   30.885195] 
[   30.885294] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.885782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.886049] Hardware name: linux,dummy-virt (DT)
[   30.886485] Call trace:
[   30.886589]  show_stack+0x20/0x38 (C)
[   30.886808]  dump_stack_lvl+0x8c/0xd0
[   30.887011]  print_report+0x118/0x608
[   30.887315]  kasan_report+0xdc/0x128
[   30.887438]  __asan_report_load1_noabort+0x20/0x30
[   30.887565]  ksize_unpoisons_memory+0x690/0x740
[   30.887686]  kunit_try_run_case+0x170/0x3f0
[   30.887809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.887951]  kthread+0x328/0x630
[   30.888045]  ret_from_fork+0x10/0x20
[   30.888161] 
[   30.888200] Allocated by task 205:
[   30.888272]  kasan_save_stack+0x3c/0x68
[   30.888370]  kasan_save_track+0x20/0x40
[   30.888440]  kasan_save_alloc_info+0x40/0x58
[   30.888513]  __kasan_kmalloc+0xd4/0xd8
[   30.888572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.888649]  ksize_unpoisons_memory+0xc0/0x740
[   30.888727]  kunit_try_run_case+0x170/0x3f0
[   30.888996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.889254]  kthread+0x328/0x630
[   30.890637]  ret_from_fork+0x10/0x20
[   30.890726] 
[   30.890777] The buggy address belongs to the object at fff00000c6466d00
[   30.890777]  which belongs to the cache kmalloc-128 of size 128
[   30.890939] The buggy address is located 12 bytes to the right of
[   30.890939]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.891093] 
[   30.891135] The buggy address belongs to the physical page:
[   30.891213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.891338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.891446] page_type: f5(slab)
[   30.891528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.891637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.891734] page dumped because: kasan: bad access detected
[   30.891804] 
[   30.891840] Memory state around the buggy address:
[   30.893578]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.893707]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.893812] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.893926]                                                                 ^
[   30.894019]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894113]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894198] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.820736] ==================================================================
[   30.821580] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.822255] Free of addr fff00000c4726d20 by task kunit_try_catch/203
[   30.822694] 
[   30.823483] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.824959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.825148] Hardware name: linux,dummy-virt (DT)
[   30.825313] Call trace:
[   30.825377]  show_stack+0x20/0x38 (C)
[   30.826022]  dump_stack_lvl+0x8c/0xd0
[   30.826514]  print_report+0x118/0x608
[   30.826884]  kasan_report_invalid_free+0xc0/0xe8
[   30.827034]  check_slab_allocation+0xd4/0x108
[   30.827142]  __kasan_slab_pre_free+0x2c/0x48
[   30.827255]  kfree+0xe8/0x3c8
[   30.827453]  kfree_sensitive+0x3c/0xb0
[   30.827736]  kmalloc_double_kzfree+0x168/0x308
[   30.828010]  kunit_try_run_case+0x170/0x3f0
[   30.828287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.828758]  kthread+0x328/0x630
[   30.828858]  ret_from_fork+0x10/0x20
[   30.829083] 
[   30.829134] Allocated by task 203:
[   30.829329]  kasan_save_stack+0x3c/0x68
[   30.829564]  kasan_save_track+0x20/0x40
[   30.829919]  kasan_save_alloc_info+0x40/0x58
[   30.830161]  __kasan_kmalloc+0xd4/0xd8
[   30.830416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.830566]  kmalloc_double_kzfree+0xb8/0x308
[   30.830796]  kunit_try_run_case+0x170/0x3f0
[   30.831077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.831241]  kthread+0x328/0x630
[   30.831324]  ret_from_fork+0x10/0x20
[   30.831414] 
[   30.831469] Freed by task 203:
[   30.831540]  kasan_save_stack+0x3c/0x68
[   30.831638]  kasan_save_track+0x20/0x40
[   30.831731]  kasan_save_free_info+0x4c/0x78
[   30.831830]  __kasan_slab_free+0x6c/0x98
[   30.831936]  kfree+0x214/0x3c8
[   30.832474]  kfree_sensitive+0x80/0xb0
[   30.832606]  kmalloc_double_kzfree+0x11c/0x308
[   30.832990]  kunit_try_run_case+0x170/0x3f0
[   30.833236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.833536]  kthread+0x328/0x630
[   30.833623]  ret_from_fork+0x10/0x20
[   30.833833] 
[   30.834128] The buggy address belongs to the object at fff00000c4726d20
[   30.834128]  which belongs to the cache kmalloc-16 of size 16
[   30.834275] The buggy address is located 0 bytes inside of
[   30.834275]  16-byte region [fff00000c4726d20, fff00000c4726d30)
[   30.834430] 
[   30.834477] The buggy address belongs to the physical page:
[   30.834541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   30.834642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.834756] page_type: f5(slab)
[   30.835003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.835433] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.835806] page dumped because: kasan: bad access detected
[   30.836070] 
[   30.836202] Memory state around the buggy address:
[   30.836508]  fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.836868]  fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.837141] >fff00000c4726d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.837255]                                ^
[   30.837346]  fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.837508]  fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.837654] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.807398] ==================================================================
[   30.807597] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.807747] Read of size 1 at addr fff00000c4726d20 by task kunit_try_catch/203
[   30.808121] 
[   30.808217] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.808463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.808582] Hardware name: linux,dummy-virt (DT)
[   30.808801] Call trace:
[   30.808917]  show_stack+0x20/0x38 (C)
[   30.809212]  dump_stack_lvl+0x8c/0xd0
[   30.809666]  print_report+0x118/0x608
[   30.809823]  kasan_report+0xdc/0x128
[   30.809961]  __kasan_check_byte+0x54/0x70
[   30.810069]  kfree_sensitive+0x30/0xb0
[   30.810256]  kmalloc_double_kzfree+0x168/0x308
[   30.810407]  kunit_try_run_case+0x170/0x3f0
[   30.810555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.810722]  kthread+0x328/0x630
[   30.810833]  ret_from_fork+0x10/0x20
[   30.810992] 
[   30.811067] Allocated by task 203:
[   30.811162]  kasan_save_stack+0x3c/0x68
[   30.811299]  kasan_save_track+0x20/0x40
[   30.811385]  kasan_save_alloc_info+0x40/0x58
[   30.811477]  __kasan_kmalloc+0xd4/0xd8
[   30.811608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.811861]  kmalloc_double_kzfree+0xb8/0x308
[   30.812207]  kunit_try_run_case+0x170/0x3f0
[   30.812352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.812511]  kthread+0x328/0x630
[   30.812627]  ret_from_fork+0x10/0x20
[   30.812742] 
[   30.812790] Freed by task 203:
[   30.812863]  kasan_save_stack+0x3c/0x68
[   30.812964]  kasan_save_track+0x20/0x40
[   30.813052]  kasan_save_free_info+0x4c/0x78
[   30.813488]  __kasan_slab_free+0x6c/0x98
[   30.813624]  kfree+0x214/0x3c8
[   30.813756]  kfree_sensitive+0x80/0xb0
[   30.813857]  kmalloc_double_kzfree+0x11c/0x308
[   30.813968]  kunit_try_run_case+0x170/0x3f0
[   30.814160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.814263]  kthread+0x328/0x630
[   30.814474]  ret_from_fork+0x10/0x20
[   30.814630] 
[   30.814708] The buggy address belongs to the object at fff00000c4726d20
[   30.814708]  which belongs to the cache kmalloc-16 of size 16
[   30.814964] The buggy address is located 0 bytes inside of
[   30.814964]  freed 16-byte region [fff00000c4726d20, fff00000c4726d30)
[   30.815146] 
[   30.815226] The buggy address belongs to the physical page:
[   30.815350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   30.815542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.815684] page_type: f5(slab)
[   30.815812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.816361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.816478] page dumped because: kasan: bad access detected
[   30.816568] 
[   30.816619] Memory state around the buggy address:
[   30.816701]  fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.816938]  fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.817065] >fff00000c4726d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.817174]                                ^
[   30.817253]  fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.817796]  fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.817963] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   30.771201] ==================================================================
[   30.771392] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.771542] Read of size 1 at addr fff00000c7738528 by task kunit_try_catch/199
[   30.771668] 
[   30.771760] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.771992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.772059] Hardware name: linux,dummy-virt (DT)
[   30.772143] Call trace:
[   30.772199]  show_stack+0x20/0x38 (C)
[   30.772327]  dump_stack_lvl+0x8c/0xd0
[   30.772452]  print_report+0x118/0x608
[   30.772567]  kasan_report+0xdc/0x128
[   30.772680]  __asan_report_load1_noabort+0x20/0x30
[   30.772810]  kmalloc_uaf2+0x3f4/0x468
[   30.772940]  kunit_try_run_case+0x170/0x3f0
[   30.773056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.773241]  kthread+0x328/0x630
[   30.773333]  ret_from_fork+0x10/0x20
[   30.773464] 
[   30.773504] Allocated by task 199:
[   30.773569]  kasan_save_stack+0x3c/0x68
[   30.773667]  kasan_save_track+0x20/0x40
[   30.773763]  kasan_save_alloc_info+0x40/0x58
[   30.773865]  __kasan_kmalloc+0xd4/0xd8
[   30.773960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.774106]  kmalloc_uaf2+0xc4/0x468
[   30.774196]  kunit_try_run_case+0x170/0x3f0
[   30.774292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.774395]  kthread+0x328/0x630
[   30.774477]  ret_from_fork+0x10/0x20
[   30.774566] 
[   30.774612] Freed by task 199:
[   30.774681]  kasan_save_stack+0x3c/0x68
[   30.774775]  kasan_save_track+0x20/0x40
[   30.774849]  kasan_save_free_info+0x4c/0x78
[   30.774958]  __kasan_slab_free+0x6c/0x98
[   30.775051]  kfree+0x214/0x3c8
[   30.775133]  kmalloc_uaf2+0x134/0x468
[   30.775207]  kunit_try_run_case+0x170/0x3f0
[   30.775326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.775428]  kthread+0x328/0x630
[   30.775502]  ret_from_fork+0x10/0x20
[   30.775588] 
[   30.775632] The buggy address belongs to the object at fff00000c7738500
[   30.775632]  which belongs to the cache kmalloc-64 of size 64
[   30.775793] The buggy address is located 40 bytes inside of
[   30.775793]  freed 64-byte region [fff00000c7738500, fff00000c7738540)
[   30.775942] 
[   30.775990] The buggy address belongs to the physical page:
[   30.776075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738
[   30.776233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.776394] page_type: f5(slab)
[   30.776499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.776621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.776713] page dumped because: kasan: bad access detected
[   30.776791] 
[   30.776835] Memory state around the buggy address:
[   30.776930]  fff00000c7738400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.777040]  fff00000c7738480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.777146] >fff00000c7738500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.777237]                                   ^
[   30.777315]  fff00000c7738580: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.777423]  fff00000c7738600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.777522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.741391] ==================================================================
[   30.741891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.742199] Write of size 33 at addr fff00000c7738380 by task kunit_try_catch/197
[   30.742360] 
[   30.742467] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.742913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.743015] Hardware name: linux,dummy-virt (DT)
[   30.743092] Call trace:
[   30.743181]  show_stack+0x20/0x38 (C)
[   30.743342]  dump_stack_lvl+0x8c/0xd0
[   30.743468]  print_report+0x118/0x608
[   30.743589]  kasan_report+0xdc/0x128
[   30.743708]  kasan_check_range+0x100/0x1a8
[   30.743829]  __asan_memset+0x34/0x78
[   30.743957]  kmalloc_uaf_memset+0x170/0x310
[   30.744080]  kunit_try_run_case+0x170/0x3f0
[   30.744202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.744338]  kthread+0x328/0x630
[   30.744449]  ret_from_fork+0x10/0x20
[   30.744573] 
[   30.744619] Allocated by task 197:
[   30.744707]  kasan_save_stack+0x3c/0x68
[   30.744847]  kasan_save_track+0x20/0x40
[   30.744941]  kasan_save_alloc_info+0x40/0x58
[   30.745035]  __kasan_kmalloc+0xd4/0xd8
[   30.745261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.745360]  kmalloc_uaf_memset+0xb8/0x310
[   30.745451]  kunit_try_run_case+0x170/0x3f0
[   30.746118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.746346]  kthread+0x328/0x630
[   30.746573]  ret_from_fork+0x10/0x20
[   30.746693] 
[   30.747183] Freed by task 197:
[   30.747278]  kasan_save_stack+0x3c/0x68
[   30.747476]  kasan_save_track+0x20/0x40
[   30.747598]  kasan_save_free_info+0x4c/0x78
[   30.747705]  __kasan_slab_free+0x6c/0x98
[   30.747887]  kfree+0x214/0x3c8
[   30.747973]  kmalloc_uaf_memset+0x11c/0x310
[   30.748057]  kunit_try_run_case+0x170/0x3f0
[   30.748133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.748212]  kthread+0x328/0x630
[   30.748280]  ret_from_fork+0x10/0x20
[   30.748363] 
[   30.748426] The buggy address belongs to the object at fff00000c7738380
[   30.748426]  which belongs to the cache kmalloc-64 of size 64
[   30.748568] The buggy address is located 0 bytes inside of
[   30.748568]  freed 64-byte region [fff00000c7738380, fff00000c77383c0)
[   30.749096] 
[   30.749175] The buggy address belongs to the physical page:
[   30.749289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738
[   30.749460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.749575] page_type: f5(slab)
[   30.749961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.750102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.750204] page dumped because: kasan: bad access detected
[   30.750269] 
[   30.750305] Memory state around the buggy address:
[   30.750368]  fff00000c7738280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.750462]  fff00000c7738300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.750560] >fff00000c7738380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.750658]                    ^
[   30.750737]  fff00000c7738400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.750835]  fff00000c7738480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.751264] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.703332] ==================================================================
[   30.703519] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.703673] Read of size 1 at addr fff00000c4726d08 by task kunit_try_catch/195
[   30.703793] 
[   30.704419] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.705173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.705257] Hardware name: linux,dummy-virt (DT)
[   30.705405] Call trace:
[   30.705491]  show_stack+0x20/0x38 (C)
[   30.705864]  dump_stack_lvl+0x8c/0xd0
[   30.706016]  print_report+0x118/0x608
[   30.706263]  kasan_report+0xdc/0x128
[   30.706382]  __asan_report_load1_noabort+0x20/0x30
[   30.707018]  kmalloc_uaf+0x300/0x338
[   30.707275]  kunit_try_run_case+0x170/0x3f0
[   30.707512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.707649]  kthread+0x328/0x630
[   30.707760]  ret_from_fork+0x10/0x20
[   30.707886] 
[   30.707932] Allocated by task 195:
[   30.708394]  kasan_save_stack+0x3c/0x68
[   30.708784]  kasan_save_track+0x20/0x40
[   30.709057]  kasan_save_alloc_info+0x40/0x58
[   30.709510]  __kasan_kmalloc+0xd4/0xd8
[   30.710447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.710631]  kmalloc_uaf+0xb8/0x338
[   30.710823]  kunit_try_run_case+0x170/0x3f0
[   30.711020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.711353]  kthread+0x328/0x630
[   30.711453]  ret_from_fork+0x10/0x20
[   30.711551] 
[   30.711647] Freed by task 195:
[   30.711801]  kasan_save_stack+0x3c/0x68
[   30.711994]  kasan_save_track+0x20/0x40
[   30.712092]  kasan_save_free_info+0x4c/0x78
[   30.712186]  __kasan_slab_free+0x6c/0x98
[   30.712312]  kfree+0x214/0x3c8
[   30.712436]  kmalloc_uaf+0x11c/0x338
[   30.713080]  kunit_try_run_case+0x170/0x3f0
[   30.713189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.713376]  kthread+0x328/0x630
[   30.713460]  ret_from_fork+0x10/0x20
[   30.713666] 
[   30.713766] The buggy address belongs to the object at fff00000c4726d00
[   30.713766]  which belongs to the cache kmalloc-16 of size 16
[   30.714036] The buggy address is located 8 bytes inside of
[   30.714036]  freed 16-byte region [fff00000c4726d00, fff00000c4726d10)
[   30.714301] 
[   30.714370] The buggy address belongs to the physical page:
[   30.714441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   30.714552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.714655] page_type: f5(slab)
[   30.714732] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.714838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.715689] page dumped because: kasan: bad access detected
[   30.715866] 
[   30.715954] Memory state around the buggy address:
[   30.716099]  fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.716263]  fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.716431] >fff00000c4726d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.716609]                       ^
[   30.716691]  fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.716826]  fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.717015] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.659731] ==================================================================
[   30.660892] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.661079] Read of size 64 at addr fff00000c7738084 by task kunit_try_catch/193
[   30.661776] 
[   30.662020] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.662247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.662302] Hardware name: linux,dummy-virt (DT)
[   30.662771] Call trace:
[   30.663111]  show_stack+0x20/0x38 (C)
[   30.663294]  dump_stack_lvl+0x8c/0xd0
[   30.663439]  print_report+0x118/0x608
[   30.663550]  kasan_report+0xdc/0x128
[   30.664064]  kasan_check_range+0x100/0x1a8
[   30.664389]  __asan_memmove+0x3c/0x98
[   30.664525]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   30.665013]  kunit_try_run_case+0x170/0x3f0
[   30.665282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.665506]  kthread+0x328/0x630
[   30.665610]  ret_from_fork+0x10/0x20
[   30.665727] 
[   30.665772] Allocated by task 193:
[   30.665830]  kasan_save_stack+0x3c/0x68
[   30.665941]  kasan_save_track+0x20/0x40
[   30.666352]  kasan_save_alloc_info+0x40/0x58
[   30.666465]  __kasan_kmalloc+0xd4/0xd8
[   30.666694]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.667017]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   30.667215]  kunit_try_run_case+0x170/0x3f0
[   30.667395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.667632]  kthread+0x328/0x630
[   30.667741]  ret_from_fork+0x10/0x20
[   30.668194] 
[   30.668256] The buggy address belongs to the object at fff00000c7738080
[   30.668256]  which belongs to the cache kmalloc-64 of size 64
[   30.668426] The buggy address is located 4 bytes inside of
[   30.668426]  allocated 64-byte region [fff00000c7738080, fff00000c77380c0)
[   30.668722] 
[   30.668870] The buggy address belongs to the physical page:
[   30.669033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738
[   30.669405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.669633] page_type: f5(slab)
[   30.669754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.669897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.670008] page dumped because: kasan: bad access detected
[   30.670079] 
[   30.670116] Memory state around the buggy address:
[   30.670183]  fff00000c7737f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.670591]  fff00000c7738000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.670846] >fff00000c7738080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.671149]                                            ^
[   30.671244]  fff00000c7738100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.671564]  fff00000c7738180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.671678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.637261] ==================================================================
[   30.637837] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.638071] Read of size 18446744073709551614 at addr fff00000c76e3e84 by task kunit_try_catch/191
[   30.638365] 
[   30.638507] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.638716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.639049] Hardware name: linux,dummy-virt (DT)
[   30.639209] Call trace:
[   30.639279]  show_stack+0x20/0x38 (C)
[   30.639401]  dump_stack_lvl+0x8c/0xd0
[   30.639528]  print_report+0x118/0x608
[   30.639667]  kasan_report+0xdc/0x128
[   30.639856]  kasan_check_range+0x100/0x1a8
[   30.640025]  __asan_memmove+0x3c/0x98
[   30.640177]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.640362]  kunit_try_run_case+0x170/0x3f0
[   30.640533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.640708]  kthread+0x328/0x630
[   30.640814]  ret_from_fork+0x10/0x20
[   30.640997] 
[   30.641069] Allocated by task 191:
[   30.641167]  kasan_save_stack+0x3c/0x68
[   30.641308]  kasan_save_track+0x20/0x40
[   30.641435]  kasan_save_alloc_info+0x40/0x58
[   30.641568]  __kasan_kmalloc+0xd4/0xd8
[   30.641700]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.641833]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.641944]  kunit_try_run_case+0x170/0x3f0
[   30.642031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.642162]  kthread+0x328/0x630
[   30.642238]  ret_from_fork+0x10/0x20
[   30.642323] 
[   30.642369] The buggy address belongs to the object at fff00000c76e3e80
[   30.642369]  which belongs to the cache kmalloc-64 of size 64
[   30.642524] The buggy address is located 4 bytes inside of
[   30.642524]  64-byte region [fff00000c76e3e80, fff00000c76e3ec0)
[   30.642689] 
[   30.642741] The buggy address belongs to the physical page:
[   30.642813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e3
[   30.642989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.643111] page_type: f5(slab)
[   30.643199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.643325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.643434] page dumped because: kasan: bad access detected
[   30.643520] 
[   30.643564] Memory state around the buggy address:
[   30.643642]  fff00000c76e3d80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.643745]  fff00000c76e3e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.643827] >fff00000c76e3e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.643957]                    ^
[   30.644029]  fff00000c76e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.644142]  fff00000c76e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.644243] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   30.603157] ==================================================================
[   30.603334] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.603471] Write of size 16 at addr fff00000c6466c69 by task kunit_try_catch/189
[   30.603852] 
[   30.604003] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.604234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.604304] Hardware name: linux,dummy-virt (DT)
[   30.604383] Call trace:
[   30.604438]  show_stack+0x20/0x38 (C)
[   30.604570]  dump_stack_lvl+0x8c/0xd0
[   30.604695]  print_report+0x118/0x608
[   30.604811]  kasan_report+0xdc/0x128
[   30.604939]  kasan_check_range+0x100/0x1a8
[   30.605061]  __asan_memset+0x34/0x78
[   30.605170]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.605292]  kunit_try_run_case+0x170/0x3f0
[   30.605694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.606021]  kthread+0x328/0x630
[   30.606255]  ret_from_fork+0x10/0x20
[   30.606424] 
[   30.606466] Allocated by task 189:
[   30.606526]  kasan_save_stack+0x3c/0x68
[   30.606845]  kasan_save_track+0x20/0x40
[   30.607046]  kasan_save_alloc_info+0x40/0x58
[   30.607152]  __kasan_kmalloc+0xd4/0xd8
[   30.607235]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.607346]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.607444]  kunit_try_run_case+0x170/0x3f0
[   30.607533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.607634]  kthread+0x328/0x630
[   30.607966]  ret_from_fork+0x10/0x20
[   30.608054] 
[   30.608184] The buggy address belongs to the object at fff00000c6466c00
[   30.608184]  which belongs to the cache kmalloc-128 of size 128
[   30.608505] The buggy address is located 105 bytes inside of
[   30.608505]  allocated 120-byte region [fff00000c6466c00, fff00000c6466c78)
[   30.608943] 
[   30.609127] The buggy address belongs to the physical page:
[   30.609361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.609735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.610069] page_type: f5(slab)
[   30.610169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.610309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.610413] page dumped because: kasan: bad access detected
[   30.610486] 
[   30.610529] Memory state around the buggy address:
[   30.610610]  fff00000c6466b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.610723]  fff00000c6466b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.610938] >fff00000c6466c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.611117]                                                                 ^
[   30.611321]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.611437]  fff00000c6466d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.611913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   30.572276] ==================================================================
[   30.572860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.573265] Write of size 8 at addr fff00000c6466b71 by task kunit_try_catch/187
[   30.573444] 
[   30.573548] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.573813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.573904] Hardware name: linux,dummy-virt (DT)
[   30.573985] Call trace:
[   30.574066]  show_stack+0x20/0x38 (C)
[   30.574194]  dump_stack_lvl+0x8c/0xd0
[   30.574352]  print_report+0x118/0x608
[   30.574479]  kasan_report+0xdc/0x128
[   30.574590]  kasan_check_range+0x100/0x1a8
[   30.574695]  __asan_memset+0x34/0x78
[   30.574796]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.574940]  kunit_try_run_case+0x170/0x3f0
[   30.575254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.575373]  kthread+0x328/0x630
[   30.575471]  ret_from_fork+0x10/0x20
[   30.575630] 
[   30.575692] Allocated by task 187:
[   30.575777]  kasan_save_stack+0x3c/0x68
[   30.575869]  kasan_save_track+0x20/0x40
[   30.575967]  kasan_save_alloc_info+0x40/0x58
[   30.576112]  __kasan_kmalloc+0xd4/0xd8
[   30.576208]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.576341]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.576433]  kunit_try_run_case+0x170/0x3f0
[   30.576524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.576628]  kthread+0x328/0x630
[   30.576735]  ret_from_fork+0x10/0x20
[   30.576824] 
[   30.576908] The buggy address belongs to the object at fff00000c6466b00
[   30.576908]  which belongs to the cache kmalloc-128 of size 128
[   30.577047] The buggy address is located 113 bytes inside of
[   30.577047]  allocated 120-byte region [fff00000c6466b00, fff00000c6466b78)
[   30.577261] 
[   30.577334] The buggy address belongs to the physical page:
[   30.577468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.577588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.578064] page_type: f5(slab)
[   30.578373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.578516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.578619] page dumped because: kasan: bad access detected
[   30.578696] 
[   30.578740] Memory state around the buggy address:
[   30.578814]  fff00000c6466a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.578913]  fff00000c6466a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.579556] >fff00000c6466b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.579630]                                                                 ^
[   30.579716]  fff00000c6466b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.579842]  fff00000c6466c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.579962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   30.536678] ==================================================================
[   30.537033] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.537308] Write of size 4 at addr fff00000c6466a75 by task kunit_try_catch/185
[   30.538693] 
[   30.538780] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.539029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.539112] Hardware name: linux,dummy-virt (DT)
[   30.539287] Call trace:
[   30.539377]  show_stack+0x20/0x38 (C)
[   30.539532]  dump_stack_lvl+0x8c/0xd0
[   30.540043]  print_report+0x118/0x608
[   30.540191]  kasan_report+0xdc/0x128
[   30.540433]  kasan_check_range+0x100/0x1a8
[   30.540861]  __asan_memset+0x34/0x78
[   30.541126]  kmalloc_oob_memset_4+0x150/0x300
[   30.541384]  kunit_try_run_case+0x170/0x3f0
[   30.541645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541937]  kthread+0x328/0x630
[   30.542034]  ret_from_fork+0x10/0x20
[   30.542158] 
[   30.542211] Allocated by task 185:
[   30.542359]  kasan_save_stack+0x3c/0x68
[   30.542653]  kasan_save_track+0x20/0x40
[   30.542759]  kasan_save_alloc_info+0x40/0x58
[   30.542941]  __kasan_kmalloc+0xd4/0xd8
[   30.543119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.543373]  kmalloc_oob_memset_4+0xb0/0x300
[   30.543568]  kunit_try_run_case+0x170/0x3f0
[   30.543756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.543946]  kthread+0x328/0x630
[   30.544312]  ret_from_fork+0x10/0x20
[   30.544419] 
[   30.544475] The buggy address belongs to the object at fff00000c6466a00
[   30.544475]  which belongs to the cache kmalloc-128 of size 128
[   30.544779] The buggy address is located 117 bytes inside of
[   30.544779]  allocated 120-byte region [fff00000c6466a00, fff00000c6466a78)
[   30.545143] 
[   30.545267] The buggy address belongs to the physical page:
[   30.545448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.545897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.546032] page_type: f5(slab)
[   30.546253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.546484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.546814] page dumped because: kasan: bad access detected
[   30.546921] 
[   30.546980] Memory state around the buggy address:
[   30.547060]  fff00000c6466900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.547273]  fff00000c6466980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547465] >fff00000c6466a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.547579]                                                                 ^
[   30.547752]  fff00000c6466a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547863]  fff00000c6466b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   30.484684] ==================================================================
[   30.484856] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.488283] Write of size 2 at addr fff00000c6466977 by task kunit_try_catch/183
[   30.488658] 
[   30.488758] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.490047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.490317] Hardware name: linux,dummy-virt (DT)
[   30.490711] Call trace:
[   30.491038]  show_stack+0x20/0x38 (C)
[   30.491356]  dump_stack_lvl+0x8c/0xd0
[   30.491598]  print_report+0x118/0x608
[   30.491903]  kasan_report+0xdc/0x128
[   30.492362]  kasan_check_range+0x100/0x1a8
[   30.492569]  __asan_memset+0x34/0x78
[   30.492795]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.493027]  kunit_try_run_case+0x170/0x3f0
[   30.493298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493974]  kthread+0x328/0x630
[   30.494491]  ret_from_fork+0x10/0x20
[   30.494960] 
[   30.495018] Allocated by task 183:
[   30.495248]  kasan_save_stack+0x3c/0x68
[   30.495576]  kasan_save_track+0x20/0x40
[   30.495678]  kasan_save_alloc_info+0x40/0x58
[   30.495779]  __kasan_kmalloc+0xd4/0xd8
[   30.495870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.495987]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.496077]  kunit_try_run_case+0x170/0x3f0
[   30.496173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.497566]  kthread+0x328/0x630
[   30.497998]  ret_from_fork+0x10/0x20
[   30.498286] 
[   30.498456] The buggy address belongs to the object at fff00000c6466900
[   30.498456]  which belongs to the cache kmalloc-128 of size 128
[   30.498955] The buggy address is located 119 bytes inside of
[   30.498955]  allocated 120-byte region [fff00000c6466900, fff00000c6466978)
[   30.499376] 
[   30.499546] The buggy address belongs to the physical page:
[   30.499756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.499919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.500044] page_type: f5(slab)
[   30.500144] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.500263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.500367] page dumped because: kasan: bad access detected
[   30.500445] 
[   30.500489] Memory state around the buggy address:
[   30.500938]  fff00000c6466800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.501675]  fff00000c6466880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.502509] >fff00000c6466900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.503140]                                                                 ^
[   30.503569]  fff00000c6466980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.503902]  fff00000c6466a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.504172] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.455071] ==================================================================
[   30.455246] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.455389] Write of size 128 at addr fff00000c6466800 by task kunit_try_catch/181
[   30.455499] 
[   30.455578] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.455765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.456995] Hardware name: linux,dummy-virt (DT)
[   30.457095] Call trace:
[   30.457155]  show_stack+0x20/0x38 (C)
[   30.457280]  dump_stack_lvl+0x8c/0xd0
[   30.457393]  print_report+0x118/0x608
[   30.457558]  kasan_report+0xdc/0x128
[   30.457677]  kasan_check_range+0x100/0x1a8
[   30.457795]  __asan_memset+0x34/0x78
[   30.457916]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.458035]  kunit_try_run_case+0x170/0x3f0
[   30.458154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.458270]  kthread+0x328/0x630
[   30.458355]  ret_from_fork+0x10/0x20
[   30.458462] 
[   30.458506] Allocated by task 181:
[   30.458577]  kasan_save_stack+0x3c/0x68
[   30.458677]  kasan_save_track+0x20/0x40
[   30.458766]  kasan_save_alloc_info+0x40/0x58
[   30.458861]  __kasan_kmalloc+0xd4/0xd8
[   30.458972]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.459074]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.459168]  kunit_try_run_case+0x170/0x3f0
[   30.459714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.459820]  kthread+0x328/0x630
[   30.459908]  ret_from_fork+0x10/0x20
[   30.461551] 
[   30.461612] The buggy address belongs to the object at fff00000c6466800
[   30.461612]  which belongs to the cache kmalloc-128 of size 128
[   30.461755] The buggy address is located 0 bytes inside of
[   30.461755]  allocated 120-byte region [fff00000c6466800, fff00000c6466878)
[   30.461863] 
[   30.461916] The buggy address belongs to the physical page:
[   30.461981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.462094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.462209] page_type: f5(slab)
[   30.462838] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.463031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.463288] page dumped because: kasan: bad access detected
[   30.463420] 
[   30.463471] Memory state around the buggy address:
[   30.463563]  fff00000c6466700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.463668]  fff00000c6466780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.463776] >fff00000c6466800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.463880]                                                                 ^
[   30.463985]  fff00000c6466880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464092]  fff00000c6466900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464191] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   30.420541] ==================================================================
[   30.420920] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.421314] Read of size 16 at addr fff00000c4726ce0 by task kunit_try_catch/179
[   30.421517] 
[   30.421690] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.421947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.422060] Hardware name: linux,dummy-virt (DT)
[   30.422401] Call trace:
[   30.422464]  show_stack+0x20/0x38 (C)
[   30.422848]  dump_stack_lvl+0x8c/0xd0
[   30.423105]  print_report+0x118/0x608
[   30.423414]  kasan_report+0xdc/0x128
[   30.423609]  __asan_report_load16_noabort+0x20/0x30
[   30.423721]  kmalloc_uaf_16+0x3bc/0x438
[   30.423829]  kunit_try_run_case+0x170/0x3f0
[   30.423945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.424121]  kthread+0x328/0x630
[   30.424433]  ret_from_fork+0x10/0x20
[   30.424692] 
[   30.424837] Allocated by task 179:
[   30.424962]  kasan_save_stack+0x3c/0x68
[   30.425339]  kasan_save_track+0x20/0x40
[   30.425626]  kasan_save_alloc_info+0x40/0x58
[   30.425803]  __kasan_kmalloc+0xd4/0xd8
[   30.425920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.426019]  kmalloc_uaf_16+0x140/0x438
[   30.426094]  kunit_try_run_case+0x170/0x3f0
[   30.426168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.426263]  kthread+0x328/0x630
[   30.426342]  ret_from_fork+0x10/0x20
[   30.426432] 
[   30.426480] Freed by task 179:
[   30.426548]  kasan_save_stack+0x3c/0x68
[   30.426645]  kasan_save_track+0x20/0x40
[   30.427342]  kasan_save_free_info+0x4c/0x78
[   30.427451]  __kasan_slab_free+0x6c/0x98
[   30.428135]  kfree+0x214/0x3c8
[   30.428275]  kmalloc_uaf_16+0x190/0x438
[   30.428488]  kunit_try_run_case+0x170/0x3f0
[   30.428662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.428853]  kthread+0x328/0x630
[   30.429077]  ret_from_fork+0x10/0x20
[   30.429177] 
[   30.429303] The buggy address belongs to the object at fff00000c4726ce0
[   30.429303]  which belongs to the cache kmalloc-16 of size 16
[   30.429751] The buggy address is located 0 bytes inside of
[   30.429751]  freed 16-byte region [fff00000c4726ce0, fff00000c4726cf0)
[   30.429971] 
[   30.430025] The buggy address belongs to the physical page:
[   30.430215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   30.430458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.430781] page_type: f5(slab)
[   30.431090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.431350] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.431575] page dumped because: kasan: bad access detected
[   30.431667] 
[   30.431713] Memory state around the buggy address:
[   30.432027]  fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.432187]  fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.432448] >fff00000c4726c80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   30.432663]                                                        ^
[   30.433000]  fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.433278]  fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.433490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   30.397348] ==================================================================
[   30.397632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.397821] Write of size 16 at addr fff00000c4726c80 by task kunit_try_catch/177
[   30.397956] 
[   30.398074] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.398268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.398334] Hardware name: linux,dummy-virt (DT)
[   30.398401] Call trace:
[   30.398450]  show_stack+0x20/0x38 (C)
[   30.398571]  dump_stack_lvl+0x8c/0xd0
[   30.398733]  print_report+0x118/0x608
[   30.398856]  kasan_report+0xdc/0x128
[   30.398996]  __asan_report_store16_noabort+0x20/0x30
[   30.399140]  kmalloc_oob_16+0x3a0/0x3f8
[   30.399278]  kunit_try_run_case+0x170/0x3f0
[   30.399396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.399539]  kthread+0x328/0x630
[   30.399641]  ret_from_fork+0x10/0x20
[   30.399766] 
[   30.399812] Allocated by task 177:
[   30.399897]  kasan_save_stack+0x3c/0x68
[   30.400040]  kasan_save_track+0x20/0x40
[   30.400133]  kasan_save_alloc_info+0x40/0x58
[   30.400242]  __kasan_kmalloc+0xd4/0xd8
[   30.400378]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.400476]  kmalloc_oob_16+0xb4/0x3f8
[   30.400560]  kunit_try_run_case+0x170/0x3f0
[   30.400653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.400769]  kthread+0x328/0x630
[   30.400849]  ret_from_fork+0x10/0x20
[   30.400964] 
[   30.401011] The buggy address belongs to the object at fff00000c4726c80
[   30.401011]  which belongs to the cache kmalloc-16 of size 16
[   30.401150] The buggy address is located 0 bytes inside of
[   30.401150]  allocated 13-byte region [fff00000c4726c80, fff00000c4726c8d)
[   30.401478] 
[   30.401539] The buggy address belongs to the physical page:
[   30.401614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726
[   30.401746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.401856] page_type: f5(slab)
[   30.401959] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   30.402300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.402472] page dumped because: kasan: bad access detected
[   30.402582] 
[   30.402628] Memory state around the buggy address:
[   30.402760]  fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.402869]  fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.402989] >fff00000c4726c80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.403087]                       ^
[   30.403159]  fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.403264]  fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.403370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.373279] ==================================================================
[   30.374255] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.374469] Read of size 1 at addr fff00000c46d1200 by task kunit_try_catch/175
[   30.374584] 
[   30.374668] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.374846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.374914] Hardware name: linux,dummy-virt (DT)
[   30.374997] Call trace:
[   30.375063]  show_stack+0x20/0x38 (C)
[   30.375171]  dump_stack_lvl+0x8c/0xd0
[   30.375273]  print_report+0x118/0x608
[   30.375379]  kasan_report+0xdc/0x128
[   30.375495]  __asan_report_load1_noabort+0x20/0x30
[   30.375621]  krealloc_uaf+0x4c8/0x520
[   30.375769]  kunit_try_run_case+0x170/0x3f0
[   30.375896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.376008]  kthread+0x328/0x630
[   30.376102]  ret_from_fork+0x10/0x20
[   30.376209] 
[   30.376256] Allocated by task 175:
[   30.376341]  kasan_save_stack+0x3c/0x68
[   30.376473]  kasan_save_track+0x20/0x40
[   30.376559]  kasan_save_alloc_info+0x40/0x58
[   30.377436]  __kasan_kmalloc+0xd4/0xd8
[   30.377530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.377618]  krealloc_uaf+0xc8/0x520
[   30.377685]  kunit_try_run_case+0x170/0x3f0
[   30.377767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.377865]  kthread+0x328/0x630
[   30.377953]  ret_from_fork+0x10/0x20
[   30.378028] 
[   30.378074] Freed by task 175:
[   30.378139]  kasan_save_stack+0x3c/0x68
[   30.378228]  kasan_save_track+0x20/0x40
[   30.378328]  kasan_save_free_info+0x4c/0x78
[   30.378423]  __kasan_slab_free+0x6c/0x98
[   30.378516]  kfree+0x214/0x3c8
[   30.378595]  krealloc_uaf+0x12c/0x520
[   30.378684]  kunit_try_run_case+0x170/0x3f0
[   30.378808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.378971]  kthread+0x328/0x630
[   30.379049]  ret_from_fork+0x10/0x20
[   30.379121] 
[   30.379158] The buggy address belongs to the object at fff00000c46d1200
[   30.379158]  which belongs to the cache kmalloc-256 of size 256
[   30.379268] The buggy address is located 0 bytes inside of
[   30.379268]  freed 256-byte region [fff00000c46d1200, fff00000c46d1300)
[   30.379424] 
[   30.379483] The buggy address belongs to the physical page:
[   30.379573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.379748] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.379919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.380038] page_type: f5(slab)
[   30.380126] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.380222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.380331] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.380434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.380578] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.380717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.380841] page dumped because: kasan: bad access detected
[   30.380976] 
[   30.381026] Memory state around the buggy address:
[   30.381130]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.381275]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.381392] >fff00000c46d1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.381475]                    ^
[   30.381533]  fff00000c46d1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.381629]  fff00000c46d1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.381705] ==================================================================
[   30.354459] ==================================================================
[   30.354640] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.354788] Read of size 1 at addr fff00000c46d1200 by task kunit_try_catch/175
[   30.355123] 
[   30.355223] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.356211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.356406] Hardware name: linux,dummy-virt (DT)
[   30.356567] Call trace:
[   30.356708]  show_stack+0x20/0x38 (C)
[   30.357028]  dump_stack_lvl+0x8c/0xd0
[   30.357190]  print_report+0x118/0x608
[   30.357309]  kasan_report+0xdc/0x128
[   30.357434]  __kasan_check_byte+0x54/0x70
[   30.357553]  krealloc_noprof+0x44/0x360
[   30.357661]  krealloc_uaf+0x180/0x520
[   30.357770]  kunit_try_run_case+0x170/0x3f0
[   30.357897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.358374]  kthread+0x328/0x630
[   30.358662]  ret_from_fork+0x10/0x20
[   30.359092] 
[   30.359309] Allocated by task 175:
[   30.359401]  kasan_save_stack+0x3c/0x68
[   30.359499]  kasan_save_track+0x20/0x40
[   30.359714]  kasan_save_alloc_info+0x40/0x58
[   30.359894]  __kasan_kmalloc+0xd4/0xd8
[   30.360080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.360393]  krealloc_uaf+0xc8/0x520
[   30.360489]  kunit_try_run_case+0x170/0x3f0
[   30.360589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.360706]  kthread+0x328/0x630
[   30.360791]  ret_from_fork+0x10/0x20
[   30.360910] 
[   30.360981] Freed by task 175:
[   30.361060]  kasan_save_stack+0x3c/0x68
[   30.361152]  kasan_save_track+0x20/0x40
[   30.361244]  kasan_save_free_info+0x4c/0x78
[   30.361341]  __kasan_slab_free+0x6c/0x98
[   30.361902]  kfree+0x214/0x3c8
[   30.362015]  krealloc_uaf+0x12c/0x520
[   30.362245]  kunit_try_run_case+0x170/0x3f0
[   30.362390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.363068]  kthread+0x328/0x630
[   30.363247]  ret_from_fork+0x10/0x20
[   30.363894] 
[   30.364053] The buggy address belongs to the object at fff00000c46d1200
[   30.364053]  which belongs to the cache kmalloc-256 of size 256
[   30.364322] The buggy address is located 0 bytes inside of
[   30.364322]  freed 256-byte region [fff00000c46d1200, fff00000c46d1300)
[   30.364469] 
[   30.364521] The buggy address belongs to the physical page:
[   30.364601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.364726] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.364840] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.364986] page_type: f5(slab)
[   30.365084] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.365204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.365328] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.366479] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.366910] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.367198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.367472] page dumped because: kasan: bad access detected
[   30.368221] 
[   30.368277] Memory state around the buggy address:
[   30.368512]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.369245]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.369450] >fff00000c46d1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.369706]                    ^
[   30.369814]  fff00000c46d1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.370401]  fff00000c46d1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.370502] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.139094] ==================================================================
[   30.139284] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.139425] Write of size 1 at addr fff00000c46d10ea by task kunit_try_catch/169
[   30.139581] 
[   30.139717] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.139946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.140013] Hardware name: linux,dummy-virt (DT)
[   30.140093] Call trace:
[   30.140150]  show_stack+0x20/0x38 (C)
[   30.140272]  dump_stack_lvl+0x8c/0xd0
[   30.140462]  print_report+0x118/0x608
[   30.140584]  kasan_report+0xdc/0x128
[   30.140682]  __asan_report_store1_noabort+0x20/0x30
[   30.140797]  krealloc_less_oob_helper+0xae4/0xc50
[   30.140982]  krealloc_less_oob+0x20/0x38
[   30.141102]  kunit_try_run_case+0x170/0x3f0
[   30.141230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.141373]  kthread+0x328/0x630
[   30.141523]  ret_from_fork+0x10/0x20
[   30.141721] 
[   30.141791] Allocated by task 169:
[   30.141898]  kasan_save_stack+0x3c/0x68
[   30.142049]  kasan_save_track+0x20/0x40
[   30.142183]  kasan_save_alloc_info+0x40/0x58
[   30.142283]  __kasan_krealloc+0x118/0x178
[   30.142388]  krealloc_noprof+0x128/0x360
[   30.142541]  krealloc_less_oob_helper+0x168/0xc50
[   30.142663]  krealloc_less_oob+0x20/0x38
[   30.142789]  kunit_try_run_case+0x170/0x3f0
[   30.142935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.143115]  kthread+0x328/0x630
[   30.143229]  ret_from_fork+0x10/0x20
[   30.143330] 
[   30.143371] The buggy address belongs to the object at fff00000c46d1000
[   30.143371]  which belongs to the cache kmalloc-256 of size 256
[   30.143507] The buggy address is located 33 bytes to the right of
[   30.143507]  allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9)
[   30.143655] 
[   30.143734] The buggy address belongs to the physical page:
[   30.143824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.143961] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.144072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.144194] page_type: f5(slab)
[   30.144287] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.144398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.144495] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.144625] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.144749] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.144870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.145004] page dumped because: kasan: bad access detected
[   30.145121] 
[   30.145242] Memory state around the buggy address:
[   30.145351]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.145493]  fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.145545] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.145611]                                                           ^
[   30.145722]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.145916]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.146017] ==================================================================
[   30.322969] ==================================================================
[   30.323255] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.323491] Write of size 1 at addr fff00000c77060eb by task kunit_try_catch/173
[   30.323826] 
[   30.324181] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.325167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.325243] Hardware name: linux,dummy-virt (DT)
[   30.325328] Call trace:
[   30.325388]  show_stack+0x20/0x38 (C)
[   30.326931]  dump_stack_lvl+0x8c/0xd0
[   30.327117]  print_report+0x118/0x608
[   30.327240]  kasan_report+0xdc/0x128
[   30.327357]  __asan_report_store1_noabort+0x20/0x30
[   30.327480]  krealloc_less_oob_helper+0xa58/0xc50
[   30.327599]  krealloc_large_less_oob+0x20/0x38
[   30.327711]  kunit_try_run_case+0x170/0x3f0
[   30.327835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.330621]  kthread+0x328/0x630
[   30.331548]  ret_from_fork+0x10/0x20
[   30.331914] 
[   30.331965] The buggy address belongs to the physical page:
[   30.332609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704
[   30.333288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.334043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.334663] page_type: f8(unknown)
[   30.335009] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.335143] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.335270] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.335391] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.336644] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff
[   30.337052] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.337157] page dumped because: kasan: bad access detected
[   30.337229] 
[   30.337274] Memory state around the buggy address:
[   30.337469]  fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.337529]  fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.337652] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.337784]                                                           ^
[   30.337937]  fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.338087]  fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.338173] ==================================================================
[   30.241652] ==================================================================
[   30.241852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.243057] Write of size 1 at addr fff00000c77060c9 by task kunit_try_catch/173
[   30.243285] 
[   30.243622] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.244379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.244448] Hardware name: linux,dummy-virt (DT)
[   30.244923] Call trace:
[   30.244985]  show_stack+0x20/0x38 (C)
[   30.245850]  dump_stack_lvl+0x8c/0xd0
[   30.246166]  print_report+0x118/0x608
[   30.246722]  kasan_report+0xdc/0x128
[   30.247228]  __asan_report_store1_noabort+0x20/0x30
[   30.247494]  krealloc_less_oob_helper+0xa48/0xc50
[   30.248013]  krealloc_large_less_oob+0x20/0x38
[   30.248527]  kunit_try_run_case+0x170/0x3f0
[   30.248986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.249228]  kthread+0x328/0x630
[   30.250164]  ret_from_fork+0x10/0x20
[   30.250326] 
[   30.250372] The buggy address belongs to the physical page:
[   30.250439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704
[   30.250562] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.251624] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.251847] page_type: f8(unknown)
[   30.252553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.252769] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.254241] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.254382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.254479] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff
[   30.254590] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.255640] page dumped because: kasan: bad access detected
[   30.256298] 
[   30.256578] Memory state around the buggy address:
[   30.257258]  fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.257992]  fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.258117] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.258353]                                               ^
[   30.259034]  fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.259420]  fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.259523] ==================================================================
[   30.147254] ==================================================================
[   30.147399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.147519] Write of size 1 at addr fff00000c46d10eb by task kunit_try_catch/169
[   30.147669] 
[   30.147958] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.148193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.148259] Hardware name: linux,dummy-virt (DT)
[   30.148342] Call trace:
[   30.148401]  show_stack+0x20/0x38 (C)
[   30.148669]  dump_stack_lvl+0x8c/0xd0
[   30.148810]  print_report+0x118/0x608
[   30.148945]  kasan_report+0xdc/0x128
[   30.149058]  __asan_report_store1_noabort+0x20/0x30
[   30.149185]  krealloc_less_oob_helper+0xa58/0xc50
[   30.149321]  krealloc_less_oob+0x20/0x38
[   30.149707]  kunit_try_run_case+0x170/0x3f0
[   30.150077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.150239]  kthread+0x328/0x630
[   30.150350]  ret_from_fork+0x10/0x20
[   30.150733] 
[   30.150801] Allocated by task 169:
[   30.151012]  kasan_save_stack+0x3c/0x68
[   30.151121]  kasan_save_track+0x20/0x40
[   30.151208]  kasan_save_alloc_info+0x40/0x58
[   30.151306]  __kasan_krealloc+0x118/0x178
[   30.151398]  krealloc_noprof+0x128/0x360
[   30.151486]  krealloc_less_oob_helper+0x168/0xc50
[   30.152099]  krealloc_less_oob+0x20/0x38
[   30.152397]  kunit_try_run_case+0x170/0x3f0
[   30.152555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.152765]  kthread+0x328/0x630
[   30.152931]  ret_from_fork+0x10/0x20
[   30.153164] 
[   30.153214] The buggy address belongs to the object at fff00000c46d1000
[   30.153214]  which belongs to the cache kmalloc-256 of size 256
[   30.153368] The buggy address is located 34 bytes to the right of
[   30.153368]  allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9)
[   30.153506] 
[   30.153557] The buggy address belongs to the physical page:
[   30.154151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.154475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.154595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.154712] page_type: f5(slab)
[   30.154981] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.155450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.155744] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.155981] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.156262] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.156410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.156756] page dumped because: kasan: bad access detected
[   30.156932] 
[   30.156976] Memory state around the buggy address:
[   30.157113]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.157404]  fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.157622] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.157766]                                                           ^
[   30.158137]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.158260]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.158354] ==================================================================
[   30.264938] ==================================================================
[   30.265448] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.266007] Write of size 1 at addr fff00000c77060d0 by task kunit_try_catch/173
[   30.266645] 
[   30.266758] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.267009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.267079] Hardware name: linux,dummy-virt (DT)
[   30.267176] Call trace:
[   30.267855]  show_stack+0x20/0x38 (C)
[   30.269041]  dump_stack_lvl+0x8c/0xd0
[   30.269224]  print_report+0x118/0x608
[   30.270080]  kasan_report+0xdc/0x128
[   30.270220]  __asan_report_store1_noabort+0x20/0x30
[   30.270331]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.270450]  krealloc_large_less_oob+0x20/0x38
[   30.270587]  kunit_try_run_case+0x170/0x3f0
[   30.270745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.271990]  kthread+0x328/0x630
[   30.272836]  ret_from_fork+0x10/0x20
[   30.273392] 
[   30.273482] The buggy address belongs to the physical page:
[   30.273807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704
[   30.273962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.274567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.274862] page_type: f8(unknown)
[   30.275118] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.275256] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.275803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.276297] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.276630] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff
[   30.277013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.277123] page dumped because: kasan: bad access detected
[   30.277816] 
[   30.278028] Memory state around the buggy address:
[   30.278235]  fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.278364]  fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.278472] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.278572]                                                  ^
[   30.278666]  fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.278770]  fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.278862] ==================================================================
[   30.285159] ==================================================================
[   30.285760] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.286462] Write of size 1 at addr fff00000c77060da by task kunit_try_catch/173
[   30.286989] 
[   30.287101] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.287901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.288250] Hardware name: linux,dummy-virt (DT)
[   30.288456] Call trace:
[   30.288517]  show_stack+0x20/0x38 (C)
[   30.288935]  dump_stack_lvl+0x8c/0xd0
[   30.289718]  print_report+0x118/0x608
[   30.289999]  kasan_report+0xdc/0x128
[   30.290120]  __asan_report_store1_noabort+0x20/0x30
[   30.290242]  krealloc_less_oob_helper+0xa80/0xc50
[   30.290364]  krealloc_large_less_oob+0x20/0x38
[   30.290464]  kunit_try_run_case+0x170/0x3f0
[   30.292533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.293487]  kthread+0x328/0x630
[   30.294075]  ret_from_fork+0x10/0x20
[   30.294651] 
[   30.294705] The buggy address belongs to the physical page:
[   30.294786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704
[   30.295900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.296824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.296992] page_type: f8(unknown)
[   30.297451] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.297670] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.298288] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.298589] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.298847] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff
[   30.299547] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.299924] page dumped because: kasan: bad access detected
[   30.300024] 
[   30.300071] Memory state around the buggy address:
[   30.300159]  fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.300269]  fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.300374] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.300473]                                                     ^
[   30.300570]  fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.300676]  fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.300771] ==================================================================
[   30.307958] ==================================================================
[   30.308091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.308232] Write of size 1 at addr fff00000c77060ea by task kunit_try_catch/173
[   30.308357] 
[   30.308445] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.308657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.308722] Hardware name: linux,dummy-virt (DT)
[   30.308798] Call trace:
[   30.308855]  show_stack+0x20/0x38 (C)
[   30.308986]  dump_stack_lvl+0x8c/0xd0
[   30.309678]  print_report+0x118/0x608
[   30.309816]  kasan_report+0xdc/0x128
[   30.309955]  __asan_report_store1_noabort+0x20/0x30
[   30.310180]  krealloc_less_oob_helper+0xae4/0xc50
[   30.310365]  krealloc_large_less_oob+0x20/0x38
[   30.310529]  kunit_try_run_case+0x170/0x3f0
[   30.310688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.310803]  kthread+0x328/0x630
[   30.311168]  ret_from_fork+0x10/0x20
[   30.311323] 
[   30.311375] The buggy address belongs to the physical page:
[   30.311728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704
[   30.311914] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.312078] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.312215] page_type: f8(unknown)
[   30.312307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.312585] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.312922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.313098] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.313267] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff
[   30.313492] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.313633] page dumped because: kasan: bad access detected
[   30.313713] 
[   30.313752] Memory state around the buggy address:
[   30.314095]  fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.314867]  fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.315351] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.315732]                                                           ^
[   30.316081]  fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.316311]  fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.317088] ==================================================================
[   30.114199] ==================================================================
[   30.114313] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.114429] Write of size 1 at addr fff00000c46d10d0 by task kunit_try_catch/169
[   30.114535] 
[   30.114615] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.114803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.114867] Hardware name: linux,dummy-virt (DT)
[   30.114987] Call trace:
[   30.115049]  show_stack+0x20/0x38 (C)
[   30.115175]  dump_stack_lvl+0x8c/0xd0
[   30.115297]  print_report+0x118/0x608
[   30.115428]  kasan_report+0xdc/0x128
[   30.115589]  __asan_report_store1_noabort+0x20/0x30
[   30.115756]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.115888]  krealloc_less_oob+0x20/0x38
[   30.116004]  kunit_try_run_case+0x170/0x3f0
[   30.116133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.116311]  kthread+0x328/0x630
[   30.116450]  ret_from_fork+0x10/0x20
[   30.116585] 
[   30.116630] Allocated by task 169:
[   30.116692]  kasan_save_stack+0x3c/0x68
[   30.116786]  kasan_save_track+0x20/0x40
[   30.116946]  kasan_save_alloc_info+0x40/0x58
[   30.117095]  __kasan_krealloc+0x118/0x178
[   30.117193]  krealloc_noprof+0x128/0x360
[   30.117279]  krealloc_less_oob_helper+0x168/0xc50
[   30.117383]  krealloc_less_oob+0x20/0x38
[   30.117490]  kunit_try_run_case+0x170/0x3f0
[   30.117582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.117723]  kthread+0x328/0x630
[   30.117851]  ret_from_fork+0x10/0x20
[   30.118184] 
[   30.118232] The buggy address belongs to the object at fff00000c46d1000
[   30.118232]  which belongs to the cache kmalloc-256 of size 256
[   30.118353] The buggy address is located 7 bytes to the right of
[   30.118353]  allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9)
[   30.118509] 
[   30.118561] The buggy address belongs to the physical page:
[   30.118628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.118730] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.118833] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.118992] page_type: f5(slab)
[   30.119094] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.119248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.119375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.119502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.119631] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.119746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.119844] page dumped because: kasan: bad access detected
[   30.119980] 
[   30.120022] Memory state around the buggy address:
[   30.120135]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.120341]  fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.120538] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.120687]                                                  ^
[   30.120859]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.121030]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.121277] ==================================================================
[   30.123350] ==================================================================
[   30.123473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.123593] Write of size 1 at addr fff00000c46d10da by task kunit_try_catch/169
[   30.123714] 
[   30.123802] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.124003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.124066] Hardware name: linux,dummy-virt (DT)
[   30.124143] Call trace:
[   30.124203]  show_stack+0x20/0x38 (C)
[   30.124763]  dump_stack_lvl+0x8c/0xd0
[   30.124902]  print_report+0x118/0x608
[   30.125009]  kasan_report+0xdc/0x128
[   30.125114]  __asan_report_store1_noabort+0x20/0x30
[   30.125285]  krealloc_less_oob_helper+0xa80/0xc50
[   30.125561]  krealloc_less_oob+0x20/0x38
[   30.125850]  kunit_try_run_case+0x170/0x3f0
[   30.126295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.126453]  kthread+0x328/0x630
[   30.126552]  ret_from_fork+0x10/0x20
[   30.126660] 
[   30.126703] Allocated by task 169:
[   30.126913]  kasan_save_stack+0x3c/0x68
[   30.127024]  kasan_save_track+0x20/0x40
[   30.127116]  kasan_save_alloc_info+0x40/0x58
[   30.127208]  __kasan_krealloc+0x118/0x178
[   30.127298]  krealloc_noprof+0x128/0x360
[   30.127460]  krealloc_less_oob_helper+0x168/0xc50
[   30.127583]  krealloc_less_oob+0x20/0x38
[   30.127675]  kunit_try_run_case+0x170/0x3f0
[   30.127763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.127880]  kthread+0x328/0x630
[   30.128393]  ret_from_fork+0x10/0x20
[   30.128467] 
[   30.128492] The buggy address belongs to the object at fff00000c46d1000
[   30.128492]  which belongs to the cache kmalloc-256 of size 256
[   30.128692] The buggy address is located 17 bytes to the right of
[   30.128692]  allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9)
[   30.128863] 
[   30.128924] The buggy address belongs to the physical page:
[   30.129007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.129140] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.129258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.129388] page_type: f5(slab)
[   30.129484] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.129610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.129734] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.129853] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.131557] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.131866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.132426] page dumped because: kasan: bad access detected
[   30.132793] 
[   30.132863] Memory state around the buggy address:
[   30.132952]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.133714]  fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.133832] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.134488]                                                     ^
[   30.134893]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135249]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135730] ==================================================================
[   30.101334] ==================================================================
[   30.101564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.102111] Write of size 1 at addr fff00000c46d10c9 by task kunit_try_catch/169
[   30.102272] 
[   30.102356] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.102548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.102897] Hardware name: linux,dummy-virt (DT)
[   30.103081] Call trace:
[   30.103186]  show_stack+0x20/0x38 (C)
[   30.103531]  dump_stack_lvl+0x8c/0xd0
[   30.103767]  print_report+0x118/0x608
[   30.104112]  kasan_report+0xdc/0x128
[   30.104237]  __asan_report_store1_noabort+0x20/0x30
[   30.104455]  krealloc_less_oob_helper+0xa48/0xc50
[   30.104728]  krealloc_less_oob+0x20/0x38
[   30.104989]  kunit_try_run_case+0x170/0x3f0
[   30.105115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.105245]  kthread+0x328/0x630
[   30.105346]  ret_from_fork+0x10/0x20
[   30.105741] 
[   30.105790] Allocated by task 169:
[   30.106585]  kasan_save_stack+0x3c/0x68
[   30.106710]  kasan_save_track+0x20/0x40
[   30.106835]  kasan_save_alloc_info+0x40/0x58
[   30.107024]  __kasan_krealloc+0x118/0x178
[   30.107111]  krealloc_noprof+0x128/0x360
[   30.107185]  krealloc_less_oob_helper+0x168/0xc50
[   30.107521]  krealloc_less_oob+0x20/0x38
[   30.107645]  kunit_try_run_case+0x170/0x3f0
[   30.107844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.108065]  kthread+0x328/0x630
[   30.108239]  ret_from_fork+0x10/0x20
[   30.108384] 
[   30.108457] The buggy address belongs to the object at fff00000c46d1000
[   30.108457]  which belongs to the cache kmalloc-256 of size 256
[   30.108613] The buggy address is located 0 bytes to the right of
[   30.108613]  allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9)
[   30.108765] 
[   30.108818] The buggy address belongs to the physical page:
[   30.108910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.109064] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.109235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.109458] page_type: f5(slab)
[   30.109556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.109743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.110241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.110659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.110770] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.110934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.111040] page dumped because: kasan: bad access detected
[   30.111100] 
[   30.111132] Memory state around the buggy address:
[   30.111190]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.111283]  fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.111379] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.111489]                                               ^
[   30.111637]  fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.111782]  fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.111925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.048908] ==================================================================
[   30.049150] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.049305] Write of size 1 at addr fff00000c46d0eeb by task kunit_try_catch/167
[   30.049474] 
[   30.049566] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.049794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.049864] Hardware name: linux,dummy-virt (DT)
[   30.049974] Call trace:
[   30.050039]  show_stack+0x20/0x38 (C)
[   30.050183]  dump_stack_lvl+0x8c/0xd0
[   30.050305]  print_report+0x118/0x608
[   30.050418]  kasan_report+0xdc/0x128
[   30.050548]  __asan_report_store1_noabort+0x20/0x30
[   30.050677]  krealloc_more_oob_helper+0x60c/0x678
[   30.050796]  krealloc_more_oob+0x20/0x38
[   30.050933]  kunit_try_run_case+0x170/0x3f0
[   30.051078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.051218]  kthread+0x328/0x630
[   30.051359]  ret_from_fork+0x10/0x20
[   30.051493] 
[   30.051541] Allocated by task 167:
[   30.051638]  kasan_save_stack+0x3c/0x68
[   30.051733]  kasan_save_track+0x20/0x40
[   30.051805]  kasan_save_alloc_info+0x40/0x58
[   30.051888]  __kasan_krealloc+0x118/0x178
[   30.051993]  krealloc_noprof+0x128/0x360
[   30.052076]  krealloc_more_oob_helper+0x168/0x678
[   30.052165]  krealloc_more_oob+0x20/0x38
[   30.052248]  kunit_try_run_case+0x170/0x3f0
[   30.052358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.052507]  kthread+0x328/0x630
[   30.052619]  ret_from_fork+0x10/0x20
[   30.052739] 
[   30.052807] The buggy address belongs to the object at fff00000c46d0e00
[   30.052807]  which belongs to the cache kmalloc-256 of size 256
[   30.053033] The buggy address is located 0 bytes to the right of
[   30.053033]  allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb)
[   30.053263] 
[   30.053314] The buggy address belongs to the physical page:
[   30.053395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.053546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.053680] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.053807] page_type: f5(slab)
[   30.053913] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.054026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.054162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.054230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.054290] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.054349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.054397] page dumped because: kasan: bad access detected
[   30.054436] 
[   30.054460] Memory state around the buggy address:
[   30.054507]  fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.054557]  fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.054604] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.054645]                                                           ^
[   30.054687]  fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.054734]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.054775] ==================================================================
[   30.055736] ==================================================================
[   30.055856] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.056252] Write of size 1 at addr fff00000c46d0ef0 by task kunit_try_catch/167
[   30.056374] 
[   30.056542] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.056760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.056832] Hardware name: linux,dummy-virt (DT)
[   30.056942] Call trace:
[   30.056998]  show_stack+0x20/0x38 (C)
[   30.057120]  dump_stack_lvl+0x8c/0xd0
[   30.057238]  print_report+0x118/0x608
[   30.057351]  kasan_report+0xdc/0x128
[   30.057472]  __asan_report_store1_noabort+0x20/0x30
[   30.057618]  krealloc_more_oob_helper+0x5c0/0x678
[   30.057742]  krealloc_more_oob+0x20/0x38
[   30.057865]  kunit_try_run_case+0x170/0x3f0
[   30.058010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.058141]  kthread+0x328/0x630
[   30.058234]  ret_from_fork+0x10/0x20
[   30.058346] 
[   30.058429] Allocated by task 167:
[   30.058685]  kasan_save_stack+0x3c/0x68
[   30.058839]  kasan_save_track+0x20/0x40
[   30.059078]  kasan_save_alloc_info+0x40/0x58
[   30.059257]  __kasan_krealloc+0x118/0x178
[   30.059419]  krealloc_noprof+0x128/0x360
[   30.059568]  krealloc_more_oob_helper+0x168/0x678
[   30.059897]  krealloc_more_oob+0x20/0x38
[   30.060134]  kunit_try_run_case+0x170/0x3f0
[   30.060224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060386]  kthread+0x328/0x630
[   30.060468]  ret_from_fork+0x10/0x20
[   30.060845] 
[   30.061001] The buggy address belongs to the object at fff00000c46d0e00
[   30.061001]  which belongs to the cache kmalloc-256 of size 256
[   30.061223] The buggy address is located 5 bytes to the right of
[   30.061223]  allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb)
[   30.061664] 
[   30.061727] The buggy address belongs to the physical page:
[   30.061818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0
[   30.062248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.062394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.062537] page_type: f5(slab)
[   30.062638] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.062765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.062898] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.063024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.063151] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff
[   30.063276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.063366] page dumped because: kasan: bad access detected
[   30.063424] 
[   30.063458] Memory state around the buggy address:
[   30.063524]  fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.063622]  fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.063726] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.063822]                                                              ^
[   30.065317]  fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065474]  fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065567] ==================================================================
[   30.195237] ==================================================================
[   30.195691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.195831] Write of size 1 at addr fff00000c77020f0 by task kunit_try_catch/171
[   30.195983] 
[   30.196336] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.196898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.196981] Hardware name: linux,dummy-virt (DT)
[   30.197074] Call trace:
[   30.197135]  show_stack+0x20/0x38 (C)
[   30.197257]  dump_stack_lvl+0x8c/0xd0
[   30.197383]  print_report+0x118/0x608
[   30.197493]  kasan_report+0xdc/0x128
[   30.198126]  __asan_report_store1_noabort+0x20/0x30
[   30.198347]  krealloc_more_oob_helper+0x5c0/0x678
[   30.199044]  krealloc_large_more_oob+0x20/0x38
[   30.199278]  kunit_try_run_case+0x170/0x3f0
[   30.199430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.199567]  kthread+0x328/0x630
[   30.199679]  ret_from_fork+0x10/0x20
[   30.200086] 
[   30.200413] The buggy address belongs to the physical page:
[   30.200494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700
[   30.201093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.201229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.201369] page_type: f8(unknown)
[   30.201627] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.201762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.201902] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.202383] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.202804] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff
[   30.202957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.203402] page dumped because: kasan: bad access detected
[   30.203509] 
[   30.203559] Memory state around the buggy address:
[   30.203697]  fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.203910]  fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.204138] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.204234]                                                              ^
[   30.204672]  fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.204793]  fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.204905] ==================================================================
[   30.182713] ==================================================================
[   30.182907] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.183077] Write of size 1 at addr fff00000c77020eb by task kunit_try_catch/171
[   30.183193] 
[   30.183286] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.183504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.183569] Hardware name: linux,dummy-virt (DT)
[   30.183647] Call trace:
[   30.183702]  show_stack+0x20/0x38 (C)
[   30.183827]  dump_stack_lvl+0x8c/0xd0
[   30.184393]  print_report+0x118/0x608
[   30.184585]  kasan_report+0xdc/0x128
[   30.184842]  __asan_report_store1_noabort+0x20/0x30
[   30.185372]  krealloc_more_oob_helper+0x60c/0x678
[   30.185724]  krealloc_large_more_oob+0x20/0x38
[   30.186146]  kunit_try_run_case+0x170/0x3f0
[   30.186225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.186286]  kthread+0x328/0x630
[   30.186335]  ret_from_fork+0x10/0x20
[   30.186391] 
[   30.186418] The buggy address belongs to the physical page:
[   30.186457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700
[   30.186519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.186571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.186634] page_type: f8(unknown)
[   30.186684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.186739] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.186792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.186843] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.186935] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff
[   30.187130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.187344] page dumped because: kasan: bad access detected
[   30.187456] 
[   30.187584] Memory state around the buggy address:
[   30.187957]  fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.189920]  fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.190054] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.190152]                                                           ^
[   30.190254]  fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.191045]  fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.191736] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   29.966470] ==================================================================
[   29.967049] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.967310] Free of addr fff00000c7700001 by task kunit_try_catch/161
[   29.967599] 
[   29.967831] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.968489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.968591] Hardware name: linux,dummy-virt (DT)
[   29.968740] Call trace:
[   29.968808]  show_stack+0x20/0x38 (C)
[   29.969111]  dump_stack_lvl+0x8c/0xd0
[   29.969339]  print_report+0x118/0x608
[   29.969555]  kasan_report_invalid_free+0xc0/0xe8
[   29.969990]  __kasan_kfree_large+0x5c/0xa8
[   29.970178]  free_large_kmalloc+0x68/0x150
[   29.970439]  kfree+0x270/0x3c8
[   29.970644]  kmalloc_large_invalid_free+0x108/0x270
[   29.970941]  kunit_try_run_case+0x170/0x3f0
[   29.971097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.971227]  kthread+0x328/0x630
[   29.971471]  ret_from_fork+0x10/0x20
[   29.971821] 
[   29.971894] The buggy address belongs to the physical page:
[   29.971969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700
[   29.972089] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.972365] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.972678] page_type: f8(unknown)
[   29.972869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.973068] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.973747] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.973984] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.974222] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff
[   29.974495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.974688] page dumped because: kasan: bad access detected
[   29.974764] 
[   29.974802] Memory state around the buggy address:
[   29.974880]  fff00000c76fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.975164]  fff00000c76fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.975274] >fff00000c7700000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.975450]                    ^
[   29.975513]  fff00000c7700080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.975603]  fff00000c7700100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.975722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.939500] ==================================================================
[   29.939946] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.940192] Read of size 1 at addr fff00000c7540000 by task kunit_try_catch/159
[   29.940372] 
[   29.940468] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.940992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.941097] Hardware name: linux,dummy-virt (DT)
[   29.941174] Call trace:
[   29.941244]  show_stack+0x20/0x38 (C)
[   29.941426]  dump_stack_lvl+0x8c/0xd0
[   29.941597]  print_report+0x118/0x608
[   29.941757]  kasan_report+0xdc/0x128
[   29.941884]  __asan_report_load1_noabort+0x20/0x30
[   29.942064]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.942225]  kunit_try_run_case+0x170/0x3f0
[   29.942386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.942550]  kthread+0x328/0x630
[   29.942670]  ret_from_fork+0x10/0x20
[   29.942837] 
[   29.942941] The buggy address belongs to the physical page:
[   29.943030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c7546600 pfn:0x107540
[   29.943418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.943914] raw: 0bfffe0000000000 fff00000da492c80 fff00000da492c80 0000000000000000
[   29.944022] raw: fff00000c7546600 0000000000000000 00000000ffffffff 0000000000000000
[   29.944107] page dumped because: kasan: bad access detected
[   29.944180] 
[   29.944217] Memory state around the buggy address:
[   29.944283]  fff00000c753ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.944368]  fff00000c753ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.944464] >fff00000c7540000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.944575]                    ^
[   29.944684]  fff00000c7540080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.944834]  fff00000c7540100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.944975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.915346] ==================================================================
[   29.915547] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.915703] Write of size 1 at addr fff00000c754200a by task kunit_try_catch/157
[   29.915827] 
[   29.916628] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.916884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916949] Hardware name: linux,dummy-virt (DT)
[   29.917029] Call trace:
[   29.917095]  show_stack+0x20/0x38 (C)
[   29.917239]  dump_stack_lvl+0x8c/0xd0
[   29.917310]  print_report+0x118/0x608
[   29.917364]  kasan_report+0xdc/0x128
[   29.917425]  __asan_report_store1_noabort+0x20/0x30
[   29.917646]  kmalloc_large_oob_right+0x278/0x2b8
[   29.917760]  kunit_try_run_case+0x170/0x3f0
[   29.917910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.918167]  kthread+0x328/0x630
[   29.918302]  ret_from_fork+0x10/0x20
[   29.918438] 
[   29.918537] The buggy address belongs to the physical page:
[   29.918623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c7546600 pfn:0x107540
[   29.918804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.918919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.919077] page_type: f8(unknown)
[   29.919166] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.919259] raw: fff00000c7546600 0000000000000000 00000000f8000000 0000000000000000
[   29.919360] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.919452] head: fff00000c7546600 0000000000000000 00000000f8000000 0000000000000000
[   29.919545] head: 0bfffe0000000002 ffffc1ffc31d5001 00000000ffffffff 00000000ffffffff
[   29.919654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.919787] page dumped because: kasan: bad access detected
[   29.919900] 
[   29.920052] Memory state around the buggy address:
[   29.920134]  fff00000c7541f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.920239]  fff00000c7541f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.920345] >fff00000c7542000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.920442]                       ^
[   29.920512]  fff00000c7542080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.921340]  fff00000c7542100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.921461] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.879454] ==================================================================
[   29.879778] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.879939] Write of size 1 at addr fff00000c646df00 by task kunit_try_catch/155
[   29.880048] 
[   29.880127] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.880684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.880760] Hardware name: linux,dummy-virt (DT)
[   29.880863] Call trace:
[   29.880950]  show_stack+0x20/0x38 (C)
[   29.881120]  dump_stack_lvl+0x8c/0xd0
[   29.881268]  print_report+0x118/0x608
[   29.881376]  kasan_report+0xdc/0x128
[   29.881478]  __asan_report_store1_noabort+0x20/0x30
[   29.881599]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.881722]  kunit_try_run_case+0x170/0x3f0
[   29.881893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.882077]  kthread+0x328/0x630
[   29.882201]  ret_from_fork+0x10/0x20
[   29.882300] 
[   29.882338] Allocated by task 155:
[   29.882423]  kasan_save_stack+0x3c/0x68
[   29.882521]  kasan_save_track+0x20/0x40
[   29.883233]  kasan_save_alloc_info+0x40/0x58
[   29.883338]  __kasan_kmalloc+0xd4/0xd8
[   29.883436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.883558]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.883679]  kunit_try_run_case+0x170/0x3f0
[   29.884361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.884498]  kthread+0x328/0x630
[   29.884626]  ret_from_fork+0x10/0x20
[   29.884708] 
[   29.884758] The buggy address belongs to the object at fff00000c646c000
[   29.884758]  which belongs to the cache kmalloc-8k of size 8192
[   29.884973] The buggy address is located 0 bytes to the right of
[   29.884973]  allocated 7936-byte region [fff00000c646c000, fff00000c646df00)
[   29.885189] 
[   29.885259] The buggy address belongs to the physical page:
[   29.885373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468
[   29.885490] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.885587] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.885858] page_type: f5(slab)
[   29.885967] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   29.886074] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.886175] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   29.886271] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.886373] head: 0bfffe0000000003 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff
[   29.886470] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.887025] page dumped because: kasan: bad access detected
[   29.887165] 
[   29.887208] Memory state around the buggy address:
[   29.887294]  fff00000c646de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.887397]  fff00000c646de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.887496] >fff00000c646df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887582]                    ^
[   29.887650]  fff00000c646df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887754]  fff00000c646e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.887856] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.843663] ==================================================================
[   29.843810] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   29.843953] Write of size 1 at addr fff00000c6466778 by task kunit_try_catch/153
[   29.844076] 
[   29.844164] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.844369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.844431] Hardware name: linux,dummy-virt (DT)
[   29.845691] Call trace:
[   29.845784]  show_stack+0x20/0x38 (C)
[   29.846204]  dump_stack_lvl+0x8c/0xd0
[   29.846866]  print_report+0x118/0x608
[   29.847369]  kasan_report+0xdc/0x128
[   29.847501]  __asan_report_store1_noabort+0x20/0x30
[   29.847925]  kmalloc_track_caller_oob_right+0x418/0x488
[   29.848291]  kunit_try_run_case+0x170/0x3f0
[   29.848452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.848592]  kthread+0x328/0x630
[   29.848758]  ret_from_fork+0x10/0x20
[   29.848997] 
[   29.849046] Allocated by task 153:
[   29.849192]  kasan_save_stack+0x3c/0x68
[   29.849286]  kasan_save_track+0x20/0x40
[   29.849383]  kasan_save_alloc_info+0x40/0x58
[   29.849472]  __kasan_kmalloc+0xd4/0xd8
[   29.850159]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.850340]  kmalloc_track_caller_oob_right+0x184/0x488
[   29.850675]  kunit_try_run_case+0x170/0x3f0
[   29.850842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.850977]  kthread+0x328/0x630
[   29.851116]  ret_from_fork+0x10/0x20
[   29.851210] 
[   29.851259] The buggy address belongs to the object at fff00000c6466700
[   29.851259]  which belongs to the cache kmalloc-128 of size 128
[   29.851694] The buggy address is located 0 bytes to the right of
[   29.851694]  allocated 120-byte region [fff00000c6466700, fff00000c6466778)
[   29.852542] 
[   29.852604] The buggy address belongs to the physical page:
[   29.852802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.852954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.853342] page_type: f5(slab)
[   29.853686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.853801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.853896] page dumped because: kasan: bad access detected
[   29.853964] 
[   29.854003] Memory state around the buggy address:
[   29.854075]  fff00000c6466600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.854520]  fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.854632] >fff00000c6466700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.855304]                                                                 ^
[   29.855837]  fff00000c6466780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.856030]  fff00000c6466800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.856327] ==================================================================
[   29.829548] ==================================================================
[   29.830046] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   29.830443] Write of size 1 at addr fff00000c6466678 by task kunit_try_catch/153
[   29.830634] 
[   29.830765] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.831469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.831671] Hardware name: linux,dummy-virt (DT)
[   29.832007] Call trace:
[   29.832078]  show_stack+0x20/0x38 (C)
[   29.832318]  dump_stack_lvl+0x8c/0xd0
[   29.832513]  print_report+0x118/0x608
[   29.832816]  kasan_report+0xdc/0x128
[   29.833104]  __asan_report_store1_noabort+0x20/0x30
[   29.833245]  kmalloc_track_caller_oob_right+0x40c/0x488
[   29.833593]  kunit_try_run_case+0x170/0x3f0
[   29.833761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.833971]  kthread+0x328/0x630
[   29.834125]  ret_from_fork+0x10/0x20
[   29.834366] 
[   29.834416] Allocated by task 153:
[   29.834510]  kasan_save_stack+0x3c/0x68
[   29.834638]  kasan_save_track+0x20/0x40
[   29.834820]  kasan_save_alloc_info+0x40/0x58
[   29.835018]  __kasan_kmalloc+0xd4/0xd8
[   29.835766]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.836005]  kmalloc_track_caller_oob_right+0xa8/0x488
[   29.836113]  kunit_try_run_case+0x170/0x3f0
[   29.836263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.836372]  kthread+0x328/0x630
[   29.836452]  ret_from_fork+0x10/0x20
[   29.836539] 
[   29.836584] The buggy address belongs to the object at fff00000c6466600
[   29.836584]  which belongs to the cache kmalloc-128 of size 128
[   29.836727] The buggy address is located 0 bytes to the right of
[   29.836727]  allocated 120-byte region [fff00000c6466600, fff00000c6466678)
[   29.836899] 
[   29.836952] The buggy address belongs to the physical page:
[   29.837040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.837173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.837302] page_type: f5(slab)
[   29.837402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.837549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.837642] page dumped because: kasan: bad access detected
[   29.837719] 
[   29.838216] Memory state around the buggy address:
[   29.838311]  fff00000c6466500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.838422]  fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.838632] >fff00000c6466600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.839202]                                                                 ^
[   29.839328]  fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.839468]  fff00000c6466700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.839567] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.776433] ==================================================================
[   29.776627] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.776786] Read of size 1 at addr fff00000c76c1000 by task kunit_try_catch/151
[   29.778394] 
[   29.778596] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.779039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.779189] Hardware name: linux,dummy-virt (DT)
[   29.779266] Call trace:
[   29.779809]  show_stack+0x20/0x38 (C)
[   29.780061]  dump_stack_lvl+0x8c/0xd0
[   29.780634]  print_report+0x118/0x608
[   29.780760]  kasan_report+0xdc/0x128
[   29.780889]  __asan_report_load1_noabort+0x20/0x30
[   29.781023]  kmalloc_node_oob_right+0x2f4/0x330
[   29.782079]  kunit_try_run_case+0x170/0x3f0
[   29.782360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.782577]  kthread+0x328/0x630
[   29.782691]  ret_from_fork+0x10/0x20
[   29.782920] 
[   29.782995] Allocated by task 151:
[   29.783325]  kasan_save_stack+0x3c/0x68
[   29.783616]  kasan_save_track+0x20/0x40
[   29.783837]  kasan_save_alloc_info+0x40/0x58
[   29.784033]  __kasan_kmalloc+0xd4/0xd8
[   29.784205]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   29.784311]  kmalloc_node_oob_right+0xbc/0x330
[   29.784397]  kunit_try_run_case+0x170/0x3f0
[   29.784954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.785093]  kthread+0x328/0x630
[   29.785247]  ret_from_fork+0x10/0x20
[   29.785355] 
[   29.785412] The buggy address belongs to the object at fff00000c76c0000
[   29.785412]  which belongs to the cache kmalloc-4k of size 4096
[   29.785980] The buggy address is located 0 bytes to the right of
[   29.785980]  allocated 4096-byte region [fff00000c76c0000, fff00000c76c1000)
[   29.786274] 
[   29.786332] The buggy address belongs to the physical page:
[   29.786645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0
[   29.787633] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.788080] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.788481] page_type: f5(slab)
[   29.788585] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.788712] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.788849] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.788987] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.790141] head: 0bfffe0000000003 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff
[   29.790456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   29.790571] page dumped because: kasan: bad access detected
[   29.790662] 
[   29.790711] Memory state around the buggy address:
[   29.791788]  fff00000c76c0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.792404]  fff00000c76c0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.793286] >fff00000c76c1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.793424]                    ^
[   29.793830]  fff00000c76c1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.794134]  fff00000c76c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.794693] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  113.436537] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/669
[  113.437703] Modules linked in:
[  113.438171] CPU: 0 UID: 0 PID: 669 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[  113.439447] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  113.440072] Hardware name: linux,dummy-virt (DT)
[  113.440472] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  113.441492] pc : intlog10+0x38/0x48
[  113.441920] lr : intlog10_test+0xe4/0x200
[  113.442669] sp : ffff800082077c10
[  113.443151] x29: ffff800082077c90 x28: 0000000000000000 x27: 0000000000000000
[  113.443985] x26: 1ffe000018cfa461 x25: 0000000000000000 x24: ffff800082077ce0
[  113.444615] x23: ffff800082077d00 x22: 0000000000000000 x21: 1ffff0001040ef82
[  113.445286] x20: ffffa881257dce20 x19: ffff800080087990 x18: 00000000ebcb8871
[  113.446104] x17: 00000000f36b2681 x16: 00000000cb7aa8eb x15: 00000000fd8c1a4c
[  113.447132] x14: 00000000fa783820 x13: 1ffe00001b48d989 x12: ffff7510252c8789
[  113.447943] x11: 1ffff510252c8788 x10: ffff7510252c8788 x9 : ffffa88122e3de04
[  113.448555] x8 : ffffa88129643c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  113.449202] x5 : ffff70001040ef82 x4 : 1ffff00010010f3a x3 : 1ffff51024afb9c4
[  113.450233] x2 : 1ffff51024afb9c4 x1 : 0000000000000003 x0 : 0000000000000000
[  113.450993] Call trace:
[  113.451271]  intlog10+0x38/0x48 (P)
[  113.451701]  kunit_try_run_case+0x170/0x3f0
[  113.452123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  113.452729]  kthread+0x328/0x630
[  113.453107]  ret_from_fork+0x10/0x20
[  113.453572] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  113.348084] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/651
[  113.349276] Modules linked in:
[  113.349784] CPU: 1 UID: 0 PID: 651 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[  113.350687] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  113.351437] Hardware name: linux,dummy-virt (DT)
[  113.351975] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  113.352387] pc : intlog2+0xd8/0xf8
[  113.352654] lr : intlog2_test+0xe4/0x200
[  113.353203] sp : ffff8000821b7c10
[  113.354666] x29: ffff8000821b7c90 x28: 0000000000000000 x27: 0000000000000000
[  113.355437] x26: 1ffe000018da2ca1 x25: 0000000000000000 x24: ffff8000821b7ce0
[  113.356191] x23: ffff8000821b7d00 x22: 0000000000000000 x21: 1ffff00010436f82
[  113.356920] x20: ffffa881257dcd20 x19: ffff800080087990 x18: 00000000933fbfa0
[  113.357652] x17: 00000000f6204915 x16: fff00000c5cda03c x15: fff00000ff616b08
[  113.358122] x14: 0000000000018fff x13: 1ffe00001b48d989 x12: ffff7510252c8789
[  113.358520] x11: 1ffff510252c8788 x10: ffff7510252c8788 x9 : ffffa88122e3e004
[  113.359283] x8 : ffffa88129643c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  113.360166] x5 : ffff700010436f82 x4 : 1ffff00010010f3a x3 : 1ffff51024afb9a4
[  113.360830] x2 : 1ffff51024afb9a4 x1 : 0000000000000003 x0 : 0000000000000000
[  113.361607] Call trace:
[  113.362132]  intlog2+0xd8/0xf8 (P)
[  113.362516]  kunit_try_run_case+0x170/0x3f0
[  113.363076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  113.363533]  kthread+0x328/0x630
[  113.363984]  ret_from_fork+0x10/0x20
[  113.364411] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[  112.065744] Internal error: Oops: 0000000096000005 [#1]  SMP
[  112.071426] Modules linked in:
[  112.072552] CPU: 0 UID: 0 PID: 543 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[  112.073709] Tainted: [B]=BAD_PAGE, [N]=TEST
[  112.074220] Hardware name: linux,dummy-virt (DT)
[  112.075077] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.075734] pc : kunit_test_null_dereference+0x70/0x170
[  112.076386] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.076815] sp : ffff800080f57d30
[  112.077193] x29: ffff800080f57d90 x28: 0000000000000000 x27: 0000000000000000
[  112.078539] x26: 1ffe000018c900c1 x25: 0000000000000000 x24: 0000000000000004
[  112.079439] x23: fff00000c648060c x22: ffffa88122e2a8a8 x21: fff00000c13a3808
[  112.080351] x20: 1ffff000101eafa6 x19: ffff800080087990 x18: 00000000fbd81b21
[  112.081040] x17: 0000000000000001 x16: fff00000da46cd28 x15: fff00000ff616b08
[  112.081932] x14: 0000000000018fff x13: 1ffe00001b48d989 x12: fffd8000191d83a4
[  112.082817] x11: 1ffe0000191d83a3 x10: fffd8000191d83a3 x9 : ffffa88122e22050
[  112.083484] x8 : ffff800080f57c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  112.084310] x5 : ffff7000101eafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  112.084852] x2 : dfff800000000000 x1 : fff00000c8ec1440 x0 : ffff800080087990
[  112.085971] Call trace:
[  112.086385]  kunit_test_null_dereference+0x70/0x170 (P)
[  112.087057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.087713]  kthread+0x328/0x630
[  112.088189]  ret_from_fork+0x10/0x20
[  112.089311] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  112.091036] ---[ end trace 0000000000000000 ]---