Hay
Date
June 20, 2025, 12:38 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.657951] ==================================================================
[   32.658263] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.658726] Read of size 4 at addr fff00000c59d4a80 by task swapper/1/0
[   32.658901] 
[   32.659012] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.659240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.659325] Hardware name: linux,dummy-virt (DT)
[   32.659404] Call trace:
[   32.659476]  show_stack+0x20/0x38 (C)
[   32.659817]  dump_stack_lvl+0x8c/0xd0
[   32.660061]  print_report+0x118/0x608
[   32.660179]  kasan_report+0xdc/0x128
[   32.660290]  __asan_report_load4_noabort+0x20/0x30
[   32.660409]  rcu_uaf_reclaim+0x64/0x70
[   32.660638]  rcu_core+0x9f4/0x1e20
[   32.660740]  rcu_core_si+0x18/0x30
[   32.660833]  handle_softirqs+0x374/0xb28
[   32.661117]  __do_softirq+0x1c/0x28
[   32.661258]  ____do_softirq+0x18/0x30
[   32.661395]  call_on_irq_stack+0x24/0x30
[   32.661580]  do_softirq_own_stack+0x24/0x38
[   32.661709]  __irq_exit_rcu+0x1fc/0x318
[   32.661828]  irq_exit_rcu+0x1c/0x80
[   32.661935]  el1_interrupt+0x38/0x58
[   32.662338]  el1h_64_irq_handler+0x18/0x28
[   32.662452]  el1h_64_irq+0x6c/0x70
[   32.662813]  arch_local_irq_enable+0x4/0x8 (P)
[   32.663002]  do_idle+0x384/0x4e8
[   32.663107]  cpu_startup_entry+0x64/0x80
[   32.663268]  secondary_start_kernel+0x288/0x340
[   32.663440]  __secondary_switched+0xc0/0xc8
[   32.663593] 
[   32.663656] Allocated by task 209:
[   32.663725]  kasan_save_stack+0x3c/0x68
[   32.663857]  kasan_save_track+0x20/0x40
[   32.664059]  kasan_save_alloc_info+0x40/0x58
[   32.664156]  __kasan_kmalloc+0xd4/0xd8
[   32.664688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.665003]  rcu_uaf+0xb0/0x2d8
[   32.665075]  kunit_try_run_case+0x170/0x3f0
[   32.665150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.665230]  kthread+0x328/0x630
[   32.665299]  ret_from_fork+0x10/0x20
[   32.665437] 
[   32.665514] Freed by task 0:
[   32.665634]  kasan_save_stack+0x3c/0x68
[   32.665734]  kasan_save_track+0x20/0x40
[   32.665831]  kasan_save_free_info+0x4c/0x78
[   32.665928]  __kasan_slab_free+0x6c/0x98
[   32.666021]  kfree+0x214/0x3c8
[   32.666105]  rcu_uaf_reclaim+0x28/0x70
[   32.666196]  rcu_core+0x9f4/0x1e20
[   32.666288]  rcu_core_si+0x18/0x30
[   32.666371]  handle_softirqs+0x374/0xb28
[   32.666464]  __do_softirq+0x1c/0x28
[   32.666552] 
[   32.666654] Last potentially related work creation:
[   32.666736]  kasan_save_stack+0x3c/0x68
[   32.666866]  kasan_record_aux_stack+0xb4/0xc8
[   32.666987]  __call_rcu_common.constprop.0+0x74/0x8c8
[   32.667692]  call_rcu+0x18/0x30
[   32.667893]  rcu_uaf+0x14c/0x2d8
[   32.667981]  kunit_try_run_case+0x170/0x3f0
[   32.668071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668184]  kthread+0x328/0x630
[   32.668281]  ret_from_fork+0x10/0x20
[   32.668389] 
[   32.668726] The buggy address belongs to the object at fff00000c59d4a80
[   32.668726]  which belongs to the cache kmalloc-32 of size 32
[   32.669013] The buggy address is located 0 bytes inside of
[   32.669013]  freed 32-byte region [fff00000c59d4a80, fff00000c59d4aa0)
[   32.669165] 
[   32.669213] The buggy address belongs to the physical page:
[   32.669277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4
[   32.669642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.669993] page_type: f5(slab)
[   32.670107] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.670239] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.670342] page dumped because: kasan: bad access detected
[   32.670429] 
[   32.670485] Memory state around the buggy address:
[   32.670604]  fff00000c59d4980: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   32.670778]  fff00000c59d4a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   32.670931] >fff00000c59d4a80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671034]                    ^
[   32.671108]  fff00000c59d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671219]  fff00000c59d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.476269] ==================================================================
[   32.476876] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   32.477068] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207
[   32.477317] 
[   32.477557] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.478422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.478557] Hardware name: linux,dummy-virt (DT)
[   32.478769] Call trace:
[   32.478859]  show_stack+0x20/0x38 (C)
[   32.479002]  dump_stack_lvl+0x8c/0xd0
[   32.479580]  print_report+0x118/0x608
[   32.479732]  kasan_report+0xdc/0x128
[   32.480172]  __asan_report_load1_noabort+0x20/0x30
[   32.480506]  ksize_uaf+0x598/0x5f8
[   32.480638]  kunit_try_run_case+0x170/0x3f0
[   32.480739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.481359]  kthread+0x328/0x630
[   32.481525]  ret_from_fork+0x10/0x20
[   32.481940] 
[   32.482047] Allocated by task 207:
[   32.482265]  kasan_save_stack+0x3c/0x68
[   32.482512]  kasan_save_track+0x20/0x40
[   32.482635]  kasan_save_alloc_info+0x40/0x58
[   32.482950]  __kasan_kmalloc+0xd4/0xd8
[   32.483357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.483660]  ksize_uaf+0xb8/0x5f8
[   32.483789]  kunit_try_run_case+0x170/0x3f0
[   32.483894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484370]  kthread+0x328/0x630
[   32.484570]  ret_from_fork+0x10/0x20
[   32.484816] 
[   32.484975] Freed by task 207:
[   32.485122]  kasan_save_stack+0x3c/0x68
[   32.485286]  kasan_save_track+0x20/0x40
[   32.485395]  kasan_save_free_info+0x4c/0x78
[   32.485662]  __kasan_slab_free+0x6c/0x98
[   32.485907]  kfree+0x214/0x3c8
[   32.486171]  ksize_uaf+0x11c/0x5f8
[   32.486252]  kunit_try_run_case+0x170/0x3f0
[   32.486399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.486527]  kthread+0x328/0x630
[   32.486601]  ret_from_fork+0x10/0x20
[   32.486697] 
[   32.486775] The buggy address belongs to the object at fff00000c44dfc00
[   32.486775]  which belongs to the cache kmalloc-128 of size 128
[   32.486952] The buggy address is located 0 bytes inside of
[   32.486952]  freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80)
[   32.487134] 
[   32.487212] The buggy address belongs to the physical page:
[   32.487339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.487545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.487745] page_type: f5(slab)
[   32.487885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.488022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.488175] page dumped because: kasan: bad access detected
[   32.488283] 
[   32.488374] Memory state around the buggy address:
[   32.488441]  fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.488550]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.488671] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.488828]                    ^
[   32.488891]  fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.488999]  fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.489096] ==================================================================
[   32.459046] ==================================================================
[   32.459811] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   32.460193] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207
[   32.460417] 
[   32.460617] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.461153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.461263] Hardware name: linux,dummy-virt (DT)
[   32.461387] Call trace:
[   32.461743]  show_stack+0x20/0x38 (C)
[   32.462031]  dump_stack_lvl+0x8c/0xd0
[   32.462167]  print_report+0x118/0x608
[   32.462278]  kasan_report+0xdc/0x128
[   32.462392]  __kasan_check_byte+0x54/0x70
[   32.462508]  ksize+0x30/0x88
[   32.462622]  ksize_uaf+0x168/0x5f8
[   32.463231]  kunit_try_run_case+0x170/0x3f0
[   32.463519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.463877]  kthread+0x328/0x630
[   32.464063]  ret_from_fork+0x10/0x20
[   32.464216] 
[   32.464346] Allocated by task 207:
[   32.464547]  kasan_save_stack+0x3c/0x68
[   32.464774]  kasan_save_track+0x20/0x40
[   32.464866]  kasan_save_alloc_info+0x40/0x58
[   32.464942]  __kasan_kmalloc+0xd4/0xd8
[   32.465005]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.465084]  ksize_uaf+0xb8/0x5f8
[   32.465163]  kunit_try_run_case+0x170/0x3f0
[   32.465254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.465363]  kthread+0x328/0x630
[   32.466136]  ret_from_fork+0x10/0x20
[   32.466444] 
[   32.466557] Freed by task 207:
[   32.466731]  kasan_save_stack+0x3c/0x68
[   32.466837]  kasan_save_track+0x20/0x40
[   32.466926]  kasan_save_free_info+0x4c/0x78
[   32.467033]  __kasan_slab_free+0x6c/0x98
[   32.467129]  kfree+0x214/0x3c8
[   32.467212]  ksize_uaf+0x11c/0x5f8
[   32.467294]  kunit_try_run_case+0x170/0x3f0
[   32.467395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.467523]  kthread+0x328/0x630
[   32.467617]  ret_from_fork+0x10/0x20
[   32.467715] 
[   32.467764] The buggy address belongs to the object at fff00000c44dfc00
[   32.467764]  which belongs to the cache kmalloc-128 of size 128
[   32.467923] The buggy address is located 0 bytes inside of
[   32.467923]  freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80)
[   32.468088] 
[   32.468152] The buggy address belongs to the physical page:
[   32.468836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.469240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.469388] page_type: f5(slab)
[   32.469490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.469640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.469799] page dumped because: kasan: bad access detected
[   32.470012] 
[   32.470102] Memory state around the buggy address:
[   32.470223]  fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.470337]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470454] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.470555]                    ^
[   32.470640]  fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470757]  fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.470864] ==================================================================
[   32.490889] ==================================================================
[   32.491094] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.491267] Read of size 1 at addr fff00000c44dfc78 by task kunit_try_catch/207
[   32.491452] 
[   32.491580] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.491842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.491909] Hardware name: linux,dummy-virt (DT)
[   32.491991] Call trace:
[   32.492048]  show_stack+0x20/0x38 (C)
[   32.492175]  dump_stack_lvl+0x8c/0xd0
[   32.492289]  print_report+0x118/0x608
[   32.492428]  kasan_report+0xdc/0x128
[   32.492534]  __asan_report_load1_noabort+0x20/0x30
[   32.492693]  ksize_uaf+0x544/0x5f8
[   32.492800]  kunit_try_run_case+0x170/0x3f0
[   32.492924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493055]  kthread+0x328/0x630
[   32.493198]  ret_from_fork+0x10/0x20
[   32.493319] 
[   32.493388] Allocated by task 207:
[   32.493535]  kasan_save_stack+0x3c/0x68
[   32.493729]  kasan_save_track+0x20/0x40
[   32.493847]  kasan_save_alloc_info+0x40/0x58
[   32.493958]  __kasan_kmalloc+0xd4/0xd8
[   32.494070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.494170]  ksize_uaf+0xb8/0x5f8
[   32.494240]  kunit_try_run_case+0x170/0x3f0
[   32.494325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.494417]  kthread+0x328/0x630
[   32.494492]  ret_from_fork+0x10/0x20
[   32.494560] 
[   32.494595] Freed by task 207:
[   32.494672]  kasan_save_stack+0x3c/0x68
[   32.494813]  kasan_save_track+0x20/0x40
[   32.494924]  kasan_save_free_info+0x4c/0x78
[   32.495018]  __kasan_slab_free+0x6c/0x98
[   32.495104]  kfree+0x214/0x3c8
[   32.495200]  ksize_uaf+0x11c/0x5f8
[   32.495285]  kunit_try_run_case+0x170/0x3f0
[   32.495381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.495507]  kthread+0x328/0x630
[   32.495585]  ret_from_fork+0x10/0x20
[   32.495725] 
[   32.495796] The buggy address belongs to the object at fff00000c44dfc00
[   32.495796]  which belongs to the cache kmalloc-128 of size 128
[   32.496017] The buggy address is located 120 bytes inside of
[   32.496017]  freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80)
[   32.496177] 
[   32.496244] The buggy address belongs to the physical page:
[   32.496372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.496502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.496826] page_type: f5(slab)
[   32.496946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.497116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.497235] page dumped because: kasan: bad access detected
[   32.497316] 
[   32.497363] Memory state around the buggy address:
[   32.497437]  fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.497522]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.497647] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.497747]                                                                 ^
[   32.497895]  fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.498004]  fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.498099] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   32.422110] ==================================================================
[   32.422260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.422402] Read of size 1 at addr fff00000c44dfb7f by task kunit_try_catch/205
[   32.422537] 
[   32.422646] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.422983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.423170] Hardware name: linux,dummy-virt (DT)
[   32.423391] Call trace:
[   32.423466]  show_stack+0x20/0x38 (C)
[   32.423598]  dump_stack_lvl+0x8c/0xd0
[   32.423829]  print_report+0x118/0x608
[   32.424157]  kasan_report+0xdc/0x128
[   32.424406]  __asan_report_load1_noabort+0x20/0x30
[   32.424651]  ksize_unpoisons_memory+0x690/0x740
[   32.424857]  kunit_try_run_case+0x170/0x3f0
[   32.425050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.425195]  kthread+0x328/0x630
[   32.425287]  ret_from_fork+0x10/0x20
[   32.425389] 
[   32.425431] Allocated by task 205:
[   32.425960]  kasan_save_stack+0x3c/0x68
[   32.426092]  kasan_save_track+0x20/0x40
[   32.426190]  kasan_save_alloc_info+0x40/0x58
[   32.426292]  __kasan_kmalloc+0xd4/0xd8
[   32.426418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.426641]  ksize_unpoisons_memory+0xc0/0x740
[   32.426823]  kunit_try_run_case+0x170/0x3f0
[   32.426921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.427510]  kthread+0x328/0x630
[   32.427634]  ret_from_fork+0x10/0x20
[   32.427732] 
[   32.427780] The buggy address belongs to the object at fff00000c44dfb00
[   32.427780]  which belongs to the cache kmalloc-128 of size 128
[   32.427939] The buggy address is located 12 bytes to the right of
[   32.427939]  allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73)
[   32.428329] 
[   32.428393] The buggy address belongs to the physical page:
[   32.428741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.429085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.429385] page_type: f5(slab)
[   32.429589] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.429820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.429950] page dumped because: kasan: bad access detected
[   32.430036] 
[   32.430075] Memory state around the buggy address:
[   32.430154]  fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.430758]  fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430911] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.431106]                                                                 ^
[   32.431289]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.431437]  fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.431539] ==================================================================
[   32.399845] ==================================================================
[   32.400073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.400685] Read of size 1 at addr fff00000c44dfb73 by task kunit_try_catch/205
[   32.400879] 
[   32.401007] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.401210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.401282] Hardware name: linux,dummy-virt (DT)
[   32.401407] Call trace:
[   32.401458]  show_stack+0x20/0x38 (C)
[   32.401789]  dump_stack_lvl+0x8c/0xd0
[   32.401907]  print_report+0x118/0x608
[   32.402040]  kasan_report+0xdc/0x128
[   32.402192]  __asan_report_load1_noabort+0x20/0x30
[   32.402415]  ksize_unpoisons_memory+0x628/0x740
[   32.402547]  kunit_try_run_case+0x170/0x3f0
[   32.402689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.402822]  kthread+0x328/0x630
[   32.402938]  ret_from_fork+0x10/0x20
[   32.403063] 
[   32.403118] Allocated by task 205:
[   32.403192]  kasan_save_stack+0x3c/0x68
[   32.403377]  kasan_save_track+0x20/0x40
[   32.403647]  kasan_save_alloc_info+0x40/0x58
[   32.403879]  __kasan_kmalloc+0xd4/0xd8
[   32.403967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.404066]  ksize_unpoisons_memory+0xc0/0x740
[   32.404476]  kunit_try_run_case+0x170/0x3f0
[   32.404662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.404827]  kthread+0x328/0x630
[   32.404912]  ret_from_fork+0x10/0x20
[   32.404994] 
[   32.405035] The buggy address belongs to the object at fff00000c44dfb00
[   32.405035]  which belongs to the cache kmalloc-128 of size 128
[   32.405152] The buggy address is located 0 bytes to the right of
[   32.405152]  allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73)
[   32.405327] 
[   32.405585] The buggy address belongs to the physical page:
[   32.405728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.405879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.406019] page_type: f5(slab)
[   32.406127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.406259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.406375] page dumped because: kasan: bad access detected
[   32.406459] 
[   32.406504] Memory state around the buggy address:
[   32.406599]  fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.406919]  fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407161] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.407279]                                                              ^
[   32.407387]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407778]  fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407924] ==================================================================
[   32.410776] ==================================================================
[   32.410918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.411056] Read of size 1 at addr fff00000c44dfb78 by task kunit_try_catch/205
[   32.411191] 
[   32.411276] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.411516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.411584] Hardware name: linux,dummy-virt (DT)
[   32.411673] Call trace:
[   32.411725]  show_stack+0x20/0x38 (C)
[   32.412113]  dump_stack_lvl+0x8c/0xd0
[   32.412511]  print_report+0x118/0x608
[   32.412815]  kasan_report+0xdc/0x128
[   32.412981]  __asan_report_load1_noabort+0x20/0x30
[   32.413153]  ksize_unpoisons_memory+0x618/0x740
[   32.413307]  kunit_try_run_case+0x170/0x3f0
[   32.413462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.413654]  kthread+0x328/0x630
[   32.413837]  ret_from_fork+0x10/0x20
[   32.413953] 
[   32.413996] Allocated by task 205:
[   32.414069]  kasan_save_stack+0x3c/0x68
[   32.414420]  kasan_save_track+0x20/0x40
[   32.414510]  kasan_save_alloc_info+0x40/0x58
[   32.414601]  __kasan_kmalloc+0xd4/0xd8
[   32.414711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.414821]  ksize_unpoisons_memory+0xc0/0x740
[   32.414920]  kunit_try_run_case+0x170/0x3f0
[   32.415041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.415191]  kthread+0x328/0x630
[   32.415320]  ret_from_fork+0x10/0x20
[   32.415463] 
[   32.415516] The buggy address belongs to the object at fff00000c44dfb00
[   32.415516]  which belongs to the cache kmalloc-128 of size 128
[   32.415705] The buggy address is located 5 bytes to the right of
[   32.415705]  allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73)
[   32.415891] 
[   32.415943] The buggy address belongs to the physical page:
[   32.416073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.416475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.416816] page_type: f5(slab)
[   32.416903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.417043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.417367] page dumped because: kasan: bad access detected
[   32.417499] 
[   32.417560] Memory state around the buggy address:
[   32.417683]  fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.417827]  fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.417977] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.418123]                                                                 ^
[   32.418272]  fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.418388]  fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.418498] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.629592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.683803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.526484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.599826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.642024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.511546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.567350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.790079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   35.316050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   35.365486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   66.004868] ==================================================================
[   66.005334] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   66.005334] 
[   66.005483] Use-after-free read at 0x000000000499f380 (in kfence-#210):
[   66.005554]  test_krealloc+0x51c/0x830
[   66.005635]  kunit_try_run_case+0x170/0x3f0
[   66.005700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.005754]  kthread+0x328/0x630
[   66.005799]  ret_from_fork+0x10/0x20
[   66.005846] 
[   66.005878] kfence-#210: 0x000000000499f380-0x000000005342d898, size=32, cache=kmalloc-32
[   66.005878] 
[   66.005944] allocated by task 348 on cpu 1 at 66.001688s (0.004251s ago):
[   66.006030]  test_alloc+0x29c/0x628
[   66.006079]  test_krealloc+0xc0/0x830
[   66.006123]  kunit_try_run_case+0x170/0x3f0
[   66.006169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.006219]  kthread+0x328/0x630
[   66.006261]  ret_from_fork+0x10/0x20
[   66.006306] 
[   66.006334] freed by task 348 on cpu 1 at 66.002507s (0.003823s ago):
[   66.006403]  krealloc_noprof+0x148/0x360
[   66.006448]  test_krealloc+0x1dc/0x830
[   66.006493]  kunit_try_run_case+0x170/0x3f0
[   66.006536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.006585]  kthread+0x328/0x630
[   66.006640]  ret_from_fork+0x10/0x20
[   66.006687] 
[   66.006743] CPU: 1 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   66.006838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.006873] Hardware name: linux,dummy-virt (DT)
[   66.007106] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   65.917574] ==================================================================
[   65.917739] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   65.917739] 
[   65.917876] Use-after-free read at 0x00000000417c22da (in kfence-#209):
[   65.917949]  test_memcache_typesafe_by_rcu+0x280/0x560
[   65.918014]  kunit_try_run_case+0x170/0x3f0
[   65.918068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.918119]  kthread+0x328/0x630
[   65.918164]  ret_from_fork+0x10/0x20
[   65.918213] 
[   65.918243] kfence-#209: 0x00000000417c22da-0x000000003752297a, size=32, cache=test
[   65.918243] 
[   65.918303] allocated by task 346 on cpu 0 at 65.901284s (0.017014s ago):
[   65.918393]  test_alloc+0x230/0x628
[   65.918442]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   65.918493]  kunit_try_run_case+0x170/0x3f0
[   65.918540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.918590]  kthread+0x328/0x630
[   65.918648]  ret_from_fork+0x10/0x20
[   65.918697] 
[   65.918726] freed by task 346 on cpu 0 at 65.901515s (0.017206s ago):
[   65.918795]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   65.918847]  kunit_try_run_case+0x170/0x3f0
[   65.918893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.918943]  kthread+0x328/0x630
[   65.918985]  ret_from_fork+0x10/0x20
[   65.919031] 
[   65.919090] CPU: 0 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   65.919185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.919222] Hardware name: linux,dummy-virt (DT)
[   65.919265] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   45.437752] ==================================================================
[   45.438055] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   45.438055] 
[   45.438287] Invalid read at 0x00000000f783294c:
[   45.438478]  test_invalid_access+0xdc/0x1f0
[   45.438824]  kunit_try_run_case+0x170/0x3f0
[   45.439069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.439547]  kthread+0x328/0x630
[   45.439927]  ret_from_fork+0x10/0x20
[   45.440703] 
[   45.442530] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   45.442812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.442896] Hardware name: linux,dummy-virt (DT)
[   45.442989] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   45.201807] ==================================================================
[   45.202002] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.202002] 
[   45.202090] Corrupted memory at 0x00000000ba9ebc96 [ ! . . . . . . . . . . . . . . . ] (in kfence-#205):
[   45.202451]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.202511]  kunit_try_run_case+0x170/0x3f0
[   45.202561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.202636]  kthread+0x328/0x630
[   45.202694]  ret_from_fork+0x10/0x20
[   45.202743] 
[   45.202776] kfence-#205: 0x00000000c330d6d6-0x000000007767fccc, size=73, cache=kmalloc-96
[   45.202776] 
[   45.202840] allocated by task 336 on cpu 1 at 45.201322s (0.001513s ago):
[   45.202917]  test_alloc+0x29c/0x628
[   45.202966]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   45.203018]  kunit_try_run_case+0x170/0x3f0
[   45.203065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.203116]  kthread+0x328/0x630
[   45.203156]  ret_from_fork+0x10/0x20
[   45.203201] 
[   45.203231] freed by task 336 on cpu 1 at 45.201633s (0.001594s ago):
[   45.203343]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.203412]  kunit_try_run_case+0x170/0x3f0
[   45.203475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.203526]  kthread+0x328/0x630
[   45.203569]  ret_from_fork+0x10/0x20
[   45.203626] 
[   45.203684] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   45.203780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.203815] Hardware name: linux,dummy-virt (DT)
[   45.203858] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   44.993729] ==================================================================
[   44.993914] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   44.993914] 
[   44.994047] Out-of-bounds read at 0x00000000ae43ab13 (105B right of kfence-#203):
[   44.994128]  test_kmalloc_aligned_oob_read+0x238/0x468
[   44.994192]  kunit_try_run_case+0x170/0x3f0
[   44.994243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.994293]  kthread+0x328/0x630
[   44.994339]  ret_from_fork+0x10/0x20
[   44.994383] 
[   44.994414] kfence-#203: 0x00000000980e09ca-0x00000000f67e6062, size=73, cache=kmalloc-96
[   44.994414] 
[   44.994479] allocated by task 334 on cpu 1 at 44.993258s (0.001216s ago):
[   44.994570]  test_alloc+0x29c/0x628
[   44.994642]  test_kmalloc_aligned_oob_read+0x100/0x468
[   44.994706]  kunit_try_run_case+0x170/0x3f0
[   44.994753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.994802]  kthread+0x328/0x630
[   44.994842]  ret_from_fork+0x10/0x20
[   44.994889] 
[   44.994948] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   44.995046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.995082] Hardware name: linux,dummy-virt (DT)
[   44.995125] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   39.898226] ==================================================================
[   39.898353] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   39.898353] 
[   39.898435] Corrupted memory at 0x00000000c5fb41ce [ ! ] (in kfence-#154):
[   39.898594]  test_corruption+0x284/0x378
[   39.898686]  kunit_try_run_case+0x170/0x3f0
[   39.898739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.898789]  kthread+0x328/0x630
[   39.898834]  ret_from_fork+0x10/0x20
[   39.898879] 
[   39.898908] kfence-#154: 0x0000000005a0c077-0x00000000694aef21, size=32, cache=kmalloc-32
[   39.898908] 
[   39.898976] allocated by task 322 on cpu 0 at 39.897757s (0.001214s ago):
[   39.899051]  test_alloc+0x29c/0x628
[   39.899099]  test_corruption+0x198/0x378
[   39.899144]  kunit_try_run_case+0x170/0x3f0
[   39.899190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.899239]  kthread+0x328/0x630
[   39.899281]  ret_from_fork+0x10/0x20
[   39.899324] 
[   39.899351] freed by task 322 on cpu 0 at 39.897933s (0.001414s ago):
[   39.899431]  test_corruption+0x284/0x378
[   39.899484]  kunit_try_run_case+0x170/0x3f0
[   39.899531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.899582]  kthread+0x328/0x630
[   39.899638]  ret_from_fork+0x10/0x20
[   39.899687] 
[   39.899738] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.899832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.899868] Hardware name: linux,dummy-virt (DT)
[   39.899908] ==================================================================
[   40.313543] ==================================================================
[   40.313792] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.313792] 
[   40.313935] Corrupted memory at 0x000000008df178e9 [ ! ] (in kfence-#158):
[   40.314118]  test_corruption+0x1d8/0x378
[   40.314179]  kunit_try_run_case+0x170/0x3f0
[   40.314231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.314285]  kthread+0x328/0x630
[   40.314327]  ret_from_fork+0x10/0x20
[   40.314372] 
[   40.314401] kfence-#158: 0x000000009d326810-0x0000000012aac743, size=32, cache=test
[   40.314401] 
[   40.314469] allocated by task 324 on cpu 0 at 40.313275s (0.001189s ago):
[   40.314548]  test_alloc+0x230/0x628
[   40.314597]  test_corruption+0x198/0x378
[   40.314678]  kunit_try_run_case+0x170/0x3f0
[   40.314726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.314776]  kthread+0x328/0x630
[   40.314818]  ret_from_fork+0x10/0x20
[   40.314864] 
[   40.314891] freed by task 324 on cpu 0 at 40.313376s (0.001511s ago):
[   40.314965]  test_corruption+0x1d8/0x378
[   40.315015]  kunit_try_run_case+0x170/0x3f0
[   40.315059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.315110]  kthread+0x328/0x630
[   40.315151]  ret_from_fork+0x10/0x20
[   40.315197] 
[   40.315253] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   40.315347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.315383] Hardware name: linux,dummy-virt (DT)
[   40.315464] ==================================================================
[   40.105434] ==================================================================
[   40.105564] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   40.105564] 
[   40.105672] Corrupted memory at 0x000000001a4ed9f2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[   40.106043]  test_corruption+0x120/0x378
[   40.106107]  kunit_try_run_case+0x170/0x3f0
[   40.106163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.106218]  kthread+0x328/0x630
[   40.106262]  ret_from_fork+0x10/0x20
[   40.106309] 
[   40.106341] kfence-#156: 0x000000007fc521a9-0x0000000050adceef, size=32, cache=test
[   40.106341] 
[   40.106411] allocated by task 324 on cpu 0 at 40.105245s (0.001161s ago):
[   40.106515]  test_alloc+0x230/0x628
[   40.106567]  test_corruption+0xdc/0x378
[   40.106628]  kunit_try_run_case+0x170/0x3f0
[   40.106678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.106731]  kthread+0x328/0x630
[   40.106774]  ret_from_fork+0x10/0x20
[   40.106821] 
[   40.106849] freed by task 324 on cpu 0 at 40.105319s (0.001526s ago):
[   40.106922]  test_corruption+0x120/0x378
[   40.106969]  kunit_try_run_case+0x170/0x3f0
[   40.107016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.107067]  kthread+0x328/0x630
[   40.107109]  ret_from_fork+0x10/0x20
[   40.107155] 
[   40.107208] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   40.107302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.107339] Hardware name: linux,dummy-virt (DT)
[   40.107381] ==================================================================
[   39.587636] ==================================================================
[   39.587799] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   39.587799] 
[   39.587939] Corrupted memory at 0x000000009f349d14 [ ! . . . . . . . . . . . . . . . ] (in kfence-#151):
[   39.590535]  test_corruption+0x278/0x378
[   39.590718]  kunit_try_run_case+0x170/0x3f0
[   39.591212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.591670]  kthread+0x328/0x630
[   39.591789]  ret_from_fork+0x10/0x20
[   39.591897] 
[   39.591963] kfence-#151: 0x00000000d1853e9d-0x00000000929361b7, size=32, cache=kmalloc-32
[   39.591963] 
[   39.592111] allocated by task 322 on cpu 0 at 39.586844s (0.005258s ago):
[   39.592707]  test_alloc+0x29c/0x628
[   39.592896]  test_corruption+0xdc/0x378
[   39.593104]  kunit_try_run_case+0x170/0x3f0
[   39.593309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.593505]  kthread+0x328/0x630
[   39.593706]  ret_from_fork+0x10/0x20
[   39.593808] 
[   39.594055] freed by task 322 on cpu 0 at 39.587413s (0.006632s ago):
[   39.594359]  test_corruption+0x278/0x378
[   39.594478]  kunit_try_run_case+0x170/0x3f0
[   39.594586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.595168]  kthread+0x328/0x630
[   39.595438]  ret_from_fork+0x10/0x20
[   39.595672] 
[   39.595799] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.596432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.596514] Hardware name: linux,dummy-virt (DT)
[   39.596717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   39.377985] ==================================================================
[   39.378179] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.378179] 
[   39.378315] Invalid free of 0x000000006ad1da6c (in kfence-#149):
[   39.378441]  test_invalid_addr_free+0x1ac/0x238
[   39.378605]  kunit_try_run_case+0x170/0x3f0
[   39.378756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.378871]  kthread+0x328/0x630
[   39.378967]  ret_from_fork+0x10/0x20
[   39.379070] 
[   39.379133] kfence-#149: 0x000000002e90ffc6-0x0000000074af234e, size=32, cache=kmalloc-32
[   39.379133] 
[   39.379272] allocated by task 318 on cpu 0 at 39.377701s (0.001562s ago):
[   39.379440]  test_alloc+0x29c/0x628
[   39.379543]  test_invalid_addr_free+0xd4/0x238
[   39.379665]  kunit_try_run_case+0x170/0x3f0
[   39.379776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.379883]  kthread+0x328/0x630
[   39.379970]  ret_from_fork+0x10/0x20
[   39.380069] 
[   39.380182] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.380416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.380498] Hardware name: linux,dummy-virt (DT)
[   39.380591] ==================================================================
[   39.482999] ==================================================================
[   39.483602] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   39.483602] 
[   39.483900] Invalid free of 0x00000000a3c033e4 (in kfence-#150):
[   39.484537]  test_invalid_addr_free+0xec/0x238
[   39.484813]  kunit_try_run_case+0x170/0x3f0
[   39.485116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.485223]  kthread+0x328/0x630
[   39.485422]  ret_from_fork+0x10/0x20
[   39.485536] 
[   39.485683] kfence-#150: 0x00000000767935c9-0x0000000051f41279, size=32, cache=test
[   39.485683] 
[   39.485966] allocated by task 320 on cpu 0 at 39.482270s (0.003683s ago):
[   39.486273]  test_alloc+0x230/0x628
[   39.486493]  test_invalid_addr_free+0xd4/0x238
[   39.486720]  kunit_try_run_case+0x170/0x3f0
[   39.486932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.487129]  kthread+0x328/0x630
[   39.487319]  ret_from_fork+0x10/0x20
[   39.487493] 
[   39.487602] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.488263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.488460] Hardware name: linux,dummy-virt (DT)
[   39.488669] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   39.171870] ==================================================================
[   39.172098] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   39.172098] 
[   39.172686] Invalid free of 0x00000000d8d266d7 (in kfence-#147):
[   39.172982]  test_double_free+0x1bc/0x238
[   39.173293]  kunit_try_run_case+0x170/0x3f0
[   39.173422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.173770]  kthread+0x328/0x630
[   39.173953]  ret_from_fork+0x10/0x20
[   39.174146] 
[   39.174238] kfence-#147: 0x00000000d8d266d7-0x00000000e5db6a70, size=32, cache=kmalloc-32
[   39.174238] 
[   39.174808] allocated by task 314 on cpu 0 at 39.171006s (0.003790s ago):
[   39.175079]  test_alloc+0x29c/0x628
[   39.175315]  test_double_free+0xd4/0x238
[   39.175433]  kunit_try_run_case+0x170/0x3f0
[   39.175941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.176376]  kthread+0x328/0x630
[   39.176548]  ret_from_fork+0x10/0x20
[   39.176737] 
[   39.177033] freed by task 314 on cpu 0 at 39.171362s (0.005661s ago):
[   39.177526]  test_double_free+0x1ac/0x238
[   39.177649]  kunit_try_run_case+0x170/0x3f0
[   39.177746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.177862]  kthread+0x328/0x630
[   39.177962]  ret_from_fork+0x10/0x20
[   39.178075] 
[   39.178320] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.179155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.179367] Hardware name: linux,dummy-virt (DT)
[   39.179583] ==================================================================
[   39.274592] ==================================================================
[   39.274766] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   39.274766] 
[   39.275093] Invalid free of 0x000000009221f61d (in kfence-#148):
[   39.275393]  test_double_free+0x100/0x238
[   39.275560]  kunit_try_run_case+0x170/0x3f0
[   39.275686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.275791]  kthread+0x328/0x630
[   39.275882]  ret_from_fork+0x10/0x20
[   39.276303] 
[   39.276434] kfence-#148: 0x000000009221f61d-0x00000000a15598a2, size=32, cache=test
[   39.276434] 
[   39.276666] allocated by task 316 on cpu 0 at 39.273841s (0.002814s ago):
[   39.276819]  test_alloc+0x230/0x628
[   39.276895]  test_double_free+0xd4/0x238
[   39.276971]  kunit_try_run_case+0x170/0x3f0
[   39.277067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.277180]  kthread+0x328/0x630
[   39.277270]  ret_from_fork+0x10/0x20
[   39.277369] 
[   39.277439] freed by task 316 on cpu 0 at 39.274161s (0.003263s ago):
[   39.277654]  test_double_free+0xf0/0x238
[   39.277744]  kunit_try_run_case+0x170/0x3f0
[   39.277872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.277981]  kthread+0x328/0x630
[   39.278064]  ret_from_fork+0x10/0x20
[   39.278150] 
[   39.278552] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   39.279084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.279163] Hardware name: linux,dummy-virt (DT)
[   39.279245] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   38.858939] ==================================================================
[   38.859190] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.859190] 
[   38.859475] Use-after-free read at 0x00000000a2ac1171 (in kfence-#144):
[   38.859627]  test_use_after_free_read+0x114/0x248
[   38.859782]  kunit_try_run_case+0x170/0x3f0
[   38.859932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.860088]  kthread+0x328/0x630
[   38.860215]  ret_from_fork+0x10/0x20
[   38.860359] 
[   38.860415] kfence-#144: 0x00000000a2ac1171-0x00000000d4de7f48, size=32, cache=test
[   38.860415] 
[   38.860535] allocated by task 308 on cpu 0 at 38.858456s (0.002072s ago):
[   38.861025]  test_alloc+0x230/0x628
[   38.861147]  test_use_after_free_read+0xd0/0x248
[   38.861242]  kunit_try_run_case+0x170/0x3f0
[   38.861526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.861653]  kthread+0x328/0x630
[   38.861759]  ret_from_fork+0x10/0x20
[   38.861855] 
[   38.861932] freed by task 308 on cpu 0 at 38.858606s (0.003318s ago):
[   38.862372]  test_use_after_free_read+0xf0/0x248
[   38.862490]  kunit_try_run_case+0x170/0x3f0
[   38.862584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.862714]  kthread+0x328/0x630
[   38.862811]  ret_from_fork+0x10/0x20
[   38.862914] 
[   38.863021] CPU: 0 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   38.863228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.863303] Hardware name: linux,dummy-virt (DT)
[   38.863387] ==================================================================
[   38.755020] ==================================================================
[   38.755193] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.755193] 
[   38.755575] Use-after-free read at 0x00000000694fd192 (in kfence-#143):
[   38.755787]  test_use_after_free_read+0x114/0x248
[   38.756193]  kunit_try_run_case+0x170/0x3f0
[   38.756399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.756515]  kthread+0x328/0x630
[   38.756793]  ret_from_fork+0x10/0x20
[   38.756908] 
[   38.756966] kfence-#143: 0x00000000694fd192-0x000000004a50397f, size=32, cache=kmalloc-32
[   38.756966] 
[   38.757095] allocated by task 306 on cpu 0 at 38.754425s (0.002661s ago):
[   38.757252]  test_alloc+0x29c/0x628
[   38.757353]  test_use_after_free_read+0xd0/0x248
[   38.757496]  kunit_try_run_case+0x170/0x3f0
[   38.757605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.757869]  kthread+0x328/0x630
[   38.757971]  ret_from_fork+0x10/0x20
[   38.758168] 
[   38.758281] freed by task 306 on cpu 0 at 38.754556s (0.003714s ago):
[   38.758713]  test_use_after_free_read+0x1c0/0x248
[   38.758829]  kunit_try_run_case+0x170/0x3f0
[   38.758931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.759102]  kthread+0x328/0x630
[   38.759365]  ret_from_fork+0x10/0x20
[   38.759619] 
[   38.759872] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   38.760230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.760687] Hardware name: linux,dummy-virt (DT)
[   38.760857] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   38.652395] ==================================================================
[   38.652686] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.652686] 
[   38.653163] Out-of-bounds write at 0x00000000e8cfb8dd (1B left of kfence-#142):
[   38.653400]  test_out_of_bounds_write+0x100/0x240
[   38.653731]  kunit_try_run_case+0x170/0x3f0
[   38.653865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.654190]  kthread+0x328/0x630
[   38.654529]  ret_from_fork+0x10/0x20
[   38.654663] 
[   38.654722] kfence-#142: 0x00000000e308695d-0x0000000016591b12, size=32, cache=test
[   38.654722] 
[   38.654855] allocated by task 304 on cpu 0 at 38.651779s (0.003068s ago):
[   38.655501]  test_alloc+0x230/0x628
[   38.655682]  test_out_of_bounds_write+0xc8/0x240
[   38.655917]  kunit_try_run_case+0x170/0x3f0
[   38.656107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.656626]  kthread+0x328/0x630
[   38.656832]  ret_from_fork+0x10/0x20
[   38.657105] 
[   38.657261] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   38.657547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.657632] Hardware name: linux,dummy-virt (DT)
[   38.657764] ==================================================================
[   38.444134] ==================================================================
[   38.444365] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.444365] 
[   38.444951] Out-of-bounds write at 0x0000000065e1de00 (1B left of kfence-#140):
[   38.445111]  test_out_of_bounds_write+0x100/0x240
[   38.445223]  kunit_try_run_case+0x170/0x3f0
[   38.445312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.445409]  kthread+0x328/0x630
[   38.445497]  ret_from_fork+0x10/0x20
[   38.445603] 
[   38.445710] kfence-#140: 0x0000000072b50c07-0x000000006c2aba6c, size=32, cache=kmalloc-32
[   38.445710] 
[   38.445849] allocated by task 302 on cpu 0 at 38.443719s (0.002121s ago):
[   38.446020]  test_alloc+0x29c/0x628
[   38.446118]  test_out_of_bounds_write+0xc8/0x240
[   38.446225]  kunit_try_run_case+0x170/0x3f0
[   38.446323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.446433]  kthread+0x328/0x630
[   38.446526]  ret_from_fork+0x10/0x20
[   38.446939] 
[   38.447364] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   38.447657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.447775] Hardware name: linux,dummy-virt (DT)
[   38.447894] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   37.610454] ==================================================================
[   37.610647] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.610647] 
[   37.610841] Out-of-bounds read at 0x000000004cf86d4b (1B left of kfence-#132):
[   37.610993]  test_out_of_bounds_read+0x114/0x3e0
[   37.611116]  kunit_try_run_case+0x170/0x3f0
[   37.611221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.611333]  kthread+0x328/0x630
[   37.611449]  ret_from_fork+0x10/0x20
[   37.611540] 
[   37.611600] kfence-#132: 0x000000005b088a23-0x0000000018c2c7bb, size=32, cache=test
[   37.611600] 
[   37.611717] allocated by task 300 on cpu 0 at 37.610272s (0.001438s ago):
[   37.612300]  test_alloc+0x230/0x628
[   37.612515]  test_out_of_bounds_read+0xdc/0x3e0
[   37.612805]  kunit_try_run_case+0x170/0x3f0
[   37.613060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.613176]  kthread+0x328/0x630
[   37.613280]  ret_from_fork+0x10/0x20
[   37.613382] 
[   37.613490] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   37.613865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.613959] Hardware name: linux,dummy-virt (DT)
[   37.614044] ==================================================================
[   37.195286] ==================================================================
[   37.195872] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   37.195872] 
[   37.196236] Out-of-bounds read at 0x000000002306f07d (32B right of kfence-#128):
[   37.196623]  test_out_of_bounds_read+0x1c8/0x3e0
[   37.196925]  kunit_try_run_case+0x170/0x3f0
[   37.197303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.197686]  kthread+0x328/0x630
[   37.197894]  ret_from_fork+0x10/0x20
[   37.197994] 
[   37.198142] kfence-#128: 0x00000000588ebc03-0x00000000fb7e9da9, size=32, cache=kmalloc-32
[   37.198142] 
[   37.198443] allocated by task 298 on cpu 0 at 37.194118s (0.004310s ago):
[   37.198918]  test_alloc+0x29c/0x628
[   37.199037]  test_out_of_bounds_read+0x198/0x3e0
[   37.199142]  kunit_try_run_case+0x170/0x3f0
[   37.199247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.199363]  kthread+0x328/0x630
[   37.199470]  ret_from_fork+0x10/0x20
[   37.199571] 
[   37.200744] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   37.200873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.200910] Hardware name: linux,dummy-virt (DT)
[   37.200951] ==================================================================
[   37.091186] ==================================================================
[   37.091550] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.091550] 
[   37.091864] Out-of-bounds read at 0x00000000bb72c062 (1B left of kfence-#127):
[   37.092181]  test_out_of_bounds_read+0x114/0x3e0
[   37.092945]  kunit_try_run_case+0x170/0x3f0
[   37.093122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.093358]  kthread+0x328/0x630
[   37.093477]  ret_from_fork+0x10/0x20
[   37.093857] 
[   37.093944] kfence-#127: 0x00000000fb2057e8-0x00000000d7603e4d, size=32, cache=kmalloc-32
[   37.093944] 
[   37.094246] allocated by task 298 on cpu 0 at 37.090253s (0.003979s ago):
[   37.094572]  test_alloc+0x29c/0x628
[   37.094677]  test_out_of_bounds_read+0xdc/0x3e0
[   37.094774]  kunit_try_run_case+0x170/0x3f0
[   37.094883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.094998]  kthread+0x328/0x630
[   37.095164]  ret_from_fork+0x10/0x20
[   37.095752] 
[   37.096031] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   37.096453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.096526] Hardware name: linux,dummy-virt (DT)
[   37.096596] ==================================================================
[   38.028414] ==================================================================
[   38.028595] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   38.028595] 
[   38.028813] Out-of-bounds read at 0x000000008effb0dd (32B right of kfence-#136):
[   38.029153]  test_out_of_bounds_read+0x1c8/0x3e0
[   38.029366]  kunit_try_run_case+0x170/0x3f0
[   38.029929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.030106]  kthread+0x328/0x630
[   38.030218]  ret_from_fork+0x10/0x20
[   38.030432] 
[   38.030557] kfence-#136: 0x000000008f747a6f-0x00000000bbcad874, size=32, cache=test
[   38.030557] 
[   38.030719] allocated by task 300 on cpu 0 at 38.027728s (0.002982s ago):
[   38.030896]  test_alloc+0x230/0x628
[   38.030997]  test_out_of_bounds_read+0x198/0x3e0
[   38.031943]  kunit_try_run_case+0x170/0x3f0
[   38.032138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.032623]  kthread+0x328/0x630
[   38.032773]  ret_from_fork+0x10/0x20
[   38.033258] 
[   38.033453] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   38.033729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.034021] Hardware name: linux,dummy-virt (DT)
[   38.034154] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-kfree_sensitive
[   32.371356] ==================================================================
[   32.371600] BUG: KFENCE: invalid free in kfree_sensitive+0x80/0xb0
[   32.371600] 
[   32.371773] Invalid free of 0x000000004423a747 (in kfence-#94):
[   32.371885]  kfree_sensitive+0x80/0xb0
[   32.372069]  kmalloc_double_kzfree+0x168/0x308
[   32.372171]  kunit_try_run_case+0x170/0x3f0
[   32.372708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373036]  kthread+0x328/0x630
[   32.373131]  ret_from_fork+0x10/0x20
[   32.373222] 
[   32.373576] kfence-#94: 0x000000004423a747-0x0000000035fd8b96, size=16, cache=kmalloc-16
[   32.373576] 
[   32.373826] allocated by task 203 on cpu 1 at 32.362221s (0.011534s ago):
[   32.374070]  kmalloc_double_kzfree+0xb8/0x308
[   32.374194]  kunit_try_run_case+0x170/0x3f0
[   32.374294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.374406]  kthread+0x328/0x630
[   32.374961]  ret_from_fork+0x10/0x20
[   32.375103] 
[   32.375209] freed by task 203 on cpu 1 at 32.362433s (0.012765s ago):
[   32.375468]  kfree_sensitive+0x80/0xb0
[   32.375568]  kmalloc_double_kzfree+0x11c/0x308
[   32.375673]  kunit_try_run_case+0x170/0x3f0
[   32.376176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.376305]  kthread+0x328/0x630
[   32.376471]  ret_from_fork+0x10/0x20
[   32.376661] 
[   32.376868] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.377091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.377140] Hardware name: linux,dummy-virt (DT)
[   32.377201] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset
[   32.363187] ==================================================================
[   32.363449] BUG: KFENCE: use-after-free write in __memset+0xc/0x20
[   32.363449] 
[   32.363700] Use-after-free write at 0x000000004423a747 (in kfence-#94):
[   32.363934]  __memset+0xc/0x20
[   32.364041]  kmalloc_double_kzfree+0x168/0x308
[   32.364219]  kunit_try_run_case+0x170/0x3f0
[   32.364532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364681]  kthread+0x328/0x630
[   32.364813]  ret_from_fork+0x10/0x20
[   32.364909] 
[   32.364955] kfence-#94: 0x000000004423a747-0x0000000035fd8b96, size=16, cache=kmalloc-16
[   32.364955] 
[   32.365077] allocated by task 203 on cpu 1 at 32.362221s (0.002847s ago):
[   32.365259]  kmalloc_double_kzfree+0xb8/0x308
[   32.365363]  kunit_try_run_case+0x170/0x3f0
[   32.365552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.365681]  kthread+0x328/0x630
[   32.365841]  ret_from_fork+0x10/0x20
[   32.365949] 
[   32.366063] freed by task 203 on cpu 1 at 32.362433s (0.003617s ago):
[   32.366235]  kfree_sensitive+0x80/0xb0
[   32.366606]  kmalloc_double_kzfree+0x11c/0x308
[   32.366741]  kunit_try_run_case+0x170/0x3f0
[   32.366837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.367027]  kthread+0x328/0x630
[   32.367111]  ret_from_fork+0x10/0x20
[   32.367290] 
[   32.367483] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.368206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.368349] Hardware name: linux,dummy-virt (DT)
[   32.368442] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_2
[   31.948418] ==================================================================
[   31.948920] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0x170/0x2f8
[   31.948920] 
[   31.949076] Corrupted memory at 0x00000000eac2f912 [ ! . . . . . . . ] (in kfence-#90):
[   31.949515]  kmalloc_oob_memset_2+0x170/0x2f8
[   31.949672]  kunit_try_run_case+0x170/0x3f0
[   31.949776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.949855]  kthread+0x328/0x630
[   31.949912]  ret_from_fork+0x10/0x20
[   31.950009] 
[   31.950052] kfence-#90: 0x0000000052d7674d-0x0000000061d7358f, size=120, cache=kmalloc-128
[   31.950052] 
[   31.950183] allocated by task 183 on cpu 1 at 31.943890s (0.006285s ago):
[   31.950316]  kmalloc_oob_memset_2+0xb0/0x2f8
[   31.950397]  kunit_try_run_case+0x170/0x3f0
[   31.950476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.950576]  kthread+0x328/0x630
[   31.950974]  ret_from_fork+0x10/0x20
[   31.951062] 
[   31.951128] freed by task 183 on cpu 1 at 31.947978s (0.003137s ago):
[   31.951307]  kmalloc_oob_memset_2+0x170/0x2f8
[   31.951444]  kunit_try_run_case+0x170/0x3f0
[   31.951531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.951652]  kthread+0x328/0x630
[   31.951733]  ret_from_fork+0x10/0x20
[   31.951829] 
[   31.951952] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.952156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.952213] Hardware name: linux,dummy-virt (DT)
[   31.952282] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   31.203139] ==================================================================
[   31.203307] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   31.203307] 
[   31.203470] Corrupted memory at 0x000000006c1886f8 [ ! . . . . . . . ] (in kfence-#83):
[   31.211277]  kmalloc_track_caller_oob_right+0x224/0x488
[   31.211548]  kunit_try_run_case+0x170/0x3f0
[   31.211655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.211763]  kthread+0x328/0x630
[   31.211891]  ret_from_fork+0x10/0x20
[   31.211983] 
[   31.212054] kfence-#83: 0x00000000bdca6165-0x00000000d78515b9, size=120, cache=kmalloc-128
[   31.212054] 
[   31.212213] allocated by task 153 on cpu 1 at 31.196353s (0.015852s ago):
[   31.212920]  kmalloc_track_caller_oob_right+0x184/0x488
[   31.213039]  kunit_try_run_case+0x170/0x3f0
[   31.213134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.213629]  kthread+0x328/0x630
[   31.213851]  ret_from_fork+0x10/0x20
[   31.214021] 
[   31.215197] freed by task 153 on cpu 1 at 31.202678s (0.011803s ago):
[   31.215492]  kmalloc_track_caller_oob_right+0x224/0x488
[   31.215819]  kunit_try_run_case+0x170/0x3f0
[   31.216473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.216684]  kthread+0x328/0x630
[   31.216771]  ret_from_fork+0x10/0x20
[   31.217209] 
[   31.217304] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.217480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.217527] Hardware name: linux,dummy-virt (DT)
[   31.217581] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_oob_left
[   31.090111] ==================================================================
[   31.091709] BUG: KFENCE: out-of-bounds read in kmalloc_oob_left+0x160/0x320
[   31.091709] 
[   31.092504] Out-of-bounds read at 0x0000000041943519 (1B left of kfence-#82):
[   31.093015]  kmalloc_oob_left+0x160/0x320
[   31.093135]  kunit_try_run_case+0x170/0x3f0
[   31.093236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.093452]  kthread+0x328/0x630
[   31.093531]  ret_from_fork+0x10/0x20
[   31.094111] 
[   31.097200] kfence-#82: 0x0000000028cb2158-0x000000000f4ac183, size=15, cache=kmalloc-16
[   31.097200] 
[   31.097729] allocated by task 149 on cpu 1 at 31.088605s (0.008992s ago):
[   31.106506]  kmalloc_oob_left+0xb8/0x320
[   31.106789]  kunit_try_run_case+0x170/0x3f0
[   31.106876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.107016]  kthread+0x328/0x630
[   31.107101]  ret_from_fork+0x10/0x20
[   31.107801] 
[   31.108192] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.108523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.108689] Hardware name: linux,dummy-virt (DT)
[   31.108791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   36.656125] ==================================================================
[   36.656285] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   36.656445] Write of size 1 at addr fff00000c6515878 by task kunit_try_catch/296
[   36.656585] 
[   36.657387] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.658135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.658443] Hardware name: linux,dummy-virt (DT)
[   36.658522] Call trace:
[   36.658929]  show_stack+0x20/0x38 (C)
[   36.659809]  dump_stack_lvl+0x8c/0xd0
[   36.660030]  print_report+0x118/0x608
[   36.660242]  kasan_report+0xdc/0x128
[   36.660467]  __asan_report_store1_noabort+0x20/0x30
[   36.660662]  strncpy_from_user+0x270/0x2a0
[   36.661028]  copy_user_test_oob+0x5c0/0xec8
[   36.661231]  kunit_try_run_case+0x170/0x3f0
[   36.661360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.661562]  kthread+0x328/0x630
[   36.661839]  ret_from_fork+0x10/0x20
[   36.662207] 
[   36.662266] Allocated by task 296:
[   36.662350]  kasan_save_stack+0x3c/0x68
[   36.662583]  kasan_save_track+0x20/0x40
[   36.662812]  kasan_save_alloc_info+0x40/0x58
[   36.663009]  __kasan_kmalloc+0xd4/0xd8
[   36.663284]  __kmalloc_noprof+0x198/0x4c8
[   36.663403]  kunit_kmalloc_array+0x34/0x88
[   36.663502]  copy_user_test_oob+0xac/0xec8
[   36.664132]  kunit_try_run_case+0x170/0x3f0
[   36.664258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.664385]  kthread+0x328/0x630
[   36.664492]  ret_from_fork+0x10/0x20
[   36.664598] 
[   36.664676] The buggy address belongs to the object at fff00000c6515800
[   36.664676]  which belongs to the cache kmalloc-128 of size 128
[   36.664838] The buggy address is located 0 bytes to the right of
[   36.664838]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.665089] 
[   36.665182] The buggy address belongs to the physical page:
[   36.665318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.665562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.665975] page_type: f5(slab)
[   36.666075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.666369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.666500] page dumped because: kasan: bad access detected
[   36.666656] 
[   36.666711] Memory state around the buggy address:
[   36.666800]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.666995]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.667241] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.667469]                                                                 ^
[   36.668016]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.668166]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.670888] ==================================================================
[   36.635360] ==================================================================
[   36.635521] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   36.637148] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.637891] 
[   36.638082] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.639017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.639559] Hardware name: linux,dummy-virt (DT)
[   36.639680] Call trace:
[   36.640159]  show_stack+0x20/0x38 (C)
[   36.640422]  dump_stack_lvl+0x8c/0xd0
[   36.640605]  print_report+0x118/0x608
[   36.640756]  kasan_report+0xdc/0x128
[   36.640914]  kasan_check_range+0x100/0x1a8
[   36.641073]  __kasan_check_write+0x20/0x30
[   36.641171]  strncpy_from_user+0x3c/0x2a0
[   36.641263]  copy_user_test_oob+0x5c0/0xec8
[   36.641355]  kunit_try_run_case+0x170/0x3f0
[   36.641472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.641660]  kthread+0x328/0x630
[   36.641774]  ret_from_fork+0x10/0x20
[   36.641906] 
[   36.641958] Allocated by task 296:
[   36.642033]  kasan_save_stack+0x3c/0x68
[   36.642145]  kasan_save_track+0x20/0x40
[   36.642240]  kasan_save_alloc_info+0x40/0x58
[   36.642350]  __kasan_kmalloc+0xd4/0xd8
[   36.642480]  __kmalloc_noprof+0x198/0x4c8
[   36.643243]  kunit_kmalloc_array+0x34/0x88
[   36.643638]  copy_user_test_oob+0xac/0xec8
[   36.643753]  kunit_try_run_case+0x170/0x3f0
[   36.644537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.645105]  kthread+0x328/0x630
[   36.645566]  ret_from_fork+0x10/0x20
[   36.645722] 
[   36.645784] The buggy address belongs to the object at fff00000c6515800
[   36.645784]  which belongs to the cache kmalloc-128 of size 128
[   36.646223] The buggy address is located 0 bytes inside of
[   36.646223]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.646701] 
[   36.647214] The buggy address belongs to the physical page:
[   36.647364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.648071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.648231] page_type: f5(slab)
[   36.648774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.648896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.648983] page dumped because: kasan: bad access detected
[   36.649504] 
[   36.649814] Memory state around the buggy address:
[   36.650329]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.650858]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.651156] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.651471]                                                                 ^
[   36.651836]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.652052]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.652284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   36.518870] ==================================================================
[   36.519744] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   36.520030] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.520188] 
[   36.520356] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.520578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.520650] Hardware name: linux,dummy-virt (DT)
[   36.520733] Call trace:
[   36.520802]  show_stack+0x20/0x38 (C)
[   36.521306]  dump_stack_lvl+0x8c/0xd0
[   36.521515]  print_report+0x118/0x608
[   36.521653]  kasan_report+0xdc/0x128
[   36.521802]  kasan_check_range+0x100/0x1a8
[   36.521940]  __kasan_check_write+0x20/0x30
[   36.522368]  copy_user_test_oob+0x234/0xec8
[   36.522683]  kunit_try_run_case+0x170/0x3f0
[   36.522900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.523041]  kthread+0x328/0x630
[   36.523193]  ret_from_fork+0x10/0x20
[   36.523325] 
[   36.523385] Allocated by task 296:
[   36.523478]  kasan_save_stack+0x3c/0x68
[   36.523585]  kasan_save_track+0x20/0x40
[   36.523695]  kasan_save_alloc_info+0x40/0x58
[   36.523817]  __kasan_kmalloc+0xd4/0xd8
[   36.523926]  __kmalloc_noprof+0x198/0x4c8
[   36.524045]  kunit_kmalloc_array+0x34/0x88
[   36.524145]  copy_user_test_oob+0xac/0xec8
[   36.524247]  kunit_try_run_case+0x170/0x3f0
[   36.524382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.524484]  kthread+0x328/0x630
[   36.524661]  ret_from_fork+0x10/0x20
[   36.524938] 
[   36.524996] The buggy address belongs to the object at fff00000c6515800
[   36.524996]  which belongs to the cache kmalloc-128 of size 128
[   36.525208] The buggy address is located 0 bytes inside of
[   36.525208]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.525368] 
[   36.525422] The buggy address belongs to the physical page:
[   36.525739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.526006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.526144] page_type: f5(slab)
[   36.526261] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.526407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.526603] page dumped because: kasan: bad access detected
[   36.526805] 
[   36.526861] Memory state around the buggy address:
[   36.526961]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.527087]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.527549] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.527831]                                                                 ^
[   36.528443]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.528928]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.529096] ==================================================================
[   36.594303] ==================================================================
[   36.594468] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   36.594634] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.594774] 
[   36.594863] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.595098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.595169] Hardware name: linux,dummy-virt (DT)
[   36.595259] Call trace:
[   36.595619]  show_stack+0x20/0x38 (C)
[   36.595908]  dump_stack_lvl+0x8c/0xd0
[   36.596197]  print_report+0x118/0x608
[   36.596765]  kasan_report+0xdc/0x128
[   36.597022]  kasan_check_range+0x100/0x1a8
[   36.597314]  __kasan_check_read+0x20/0x30
[   36.597679]  copy_user_test_oob+0x3c8/0xec8
[   36.597796]  kunit_try_run_case+0x170/0x3f0
[   36.597912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.598403]  kthread+0x328/0x630
[   36.598523]  ret_from_fork+0x10/0x20
[   36.599195] 
[   36.599306] Allocated by task 296:
[   36.599513]  kasan_save_stack+0x3c/0x68
[   36.599650]  kasan_save_track+0x20/0x40
[   36.599740]  kasan_save_alloc_info+0x40/0x58
[   36.600097]  __kasan_kmalloc+0xd4/0xd8
[   36.600214]  __kmalloc_noprof+0x198/0x4c8
[   36.600388]  kunit_kmalloc_array+0x34/0x88
[   36.600524]  copy_user_test_oob+0xac/0xec8
[   36.600757]  kunit_try_run_case+0x170/0x3f0
[   36.601124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.601244]  kthread+0x328/0x630
[   36.601437]  ret_from_fork+0x10/0x20
[   36.601659] 
[   36.601724] The buggy address belongs to the object at fff00000c6515800
[   36.601724]  which belongs to the cache kmalloc-128 of size 128
[   36.601970] The buggy address is located 0 bytes inside of
[   36.601970]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.602303] 
[   36.602366] The buggy address belongs to the physical page:
[   36.602478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.602632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.602830] page_type: f5(slab)
[   36.603053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.603497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.603718] page dumped because: kasan: bad access detected
[   36.603879] 
[   36.604159] Memory state around the buggy address:
[   36.604273]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.604387]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.604622] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.604787]                                                                 ^
[   36.604918]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605302]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605589] ==================================================================
[   36.621437] ==================================================================
[   36.621589] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   36.622004] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.622136] 
[   36.622235] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.622470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.622550] Hardware name: linux,dummy-virt (DT)
[   36.622645] Call trace:
[   36.622714]  show_stack+0x20/0x38 (C)
[   36.622913]  dump_stack_lvl+0x8c/0xd0
[   36.623042]  print_report+0x118/0x608
[   36.623164]  kasan_report+0xdc/0x128
[   36.623304]  kasan_check_range+0x100/0x1a8
[   36.623439]  __kasan_check_read+0x20/0x30
[   36.623725]  copy_user_test_oob+0x4a0/0xec8
[   36.624087]  kunit_try_run_case+0x170/0x3f0
[   36.624208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.624420]  kthread+0x328/0x630
[   36.624541]  ret_from_fork+0x10/0x20
[   36.624690] 
[   36.624746] Allocated by task 296:
[   36.624830]  kasan_save_stack+0x3c/0x68
[   36.624940]  kasan_save_track+0x20/0x40
[   36.625036]  kasan_save_alloc_info+0x40/0x58
[   36.625120]  __kasan_kmalloc+0xd4/0xd8
[   36.625190]  __kmalloc_noprof+0x198/0x4c8
[   36.625292]  kunit_kmalloc_array+0x34/0x88
[   36.625386]  copy_user_test_oob+0xac/0xec8
[   36.625487]  kunit_try_run_case+0x170/0x3f0
[   36.625587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.625719]  kthread+0x328/0x630
[   36.625801]  ret_from_fork+0x10/0x20
[   36.626285] 
[   36.626386] The buggy address belongs to the object at fff00000c6515800
[   36.626386]  which belongs to the cache kmalloc-128 of size 128
[   36.628376] The buggy address is located 0 bytes inside of
[   36.628376]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.628476] 
[   36.628511] The buggy address belongs to the physical page:
[   36.628588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.628763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.629419] page_type: f5(slab)
[   36.629522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.629862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.629999] page dumped because: kasan: bad access detected
[   36.630272] 
[   36.630326] Memory state around the buggy address:
[   36.630478]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.630697]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.631179] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.631404]                                                                 ^
[   36.631617]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.632009]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.632177] ==================================================================
[   36.543586] ==================================================================
[   36.543828] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   36.544045] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.544188] 
[   36.544285] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.544658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.544742] Hardware name: linux,dummy-virt (DT)
[   36.544837] Call trace:
[   36.544904]  show_stack+0x20/0x38 (C)
[   36.545039]  dump_stack_lvl+0x8c/0xd0
[   36.545159]  print_report+0x118/0x608
[   36.545281]  kasan_report+0xdc/0x128
[   36.545381]  kasan_check_range+0x100/0x1a8
[   36.545479]  __kasan_check_read+0x20/0x30
[   36.545630]  copy_user_test_oob+0x728/0xec8
[   36.545782]  kunit_try_run_case+0x170/0x3f0
[   36.545893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.546001]  kthread+0x328/0x630
[   36.546081]  ret_from_fork+0x10/0x20
[   36.546178] 
[   36.546226] Allocated by task 296:
[   36.546297]  kasan_save_stack+0x3c/0x68
[   36.546416]  kasan_save_track+0x20/0x40
[   36.546511]  kasan_save_alloc_info+0x40/0x58
[   36.546663]  __kasan_kmalloc+0xd4/0xd8
[   36.546785]  __kmalloc_noprof+0x198/0x4c8
[   36.546915]  kunit_kmalloc_array+0x34/0x88
[   36.547050]  copy_user_test_oob+0xac/0xec8
[   36.547188]  kunit_try_run_case+0x170/0x3f0
[   36.547312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.547450]  kthread+0x328/0x630
[   36.547541]  ret_from_fork+0x10/0x20
[   36.547674] 
[   36.547729] The buggy address belongs to the object at fff00000c6515800
[   36.547729]  which belongs to the cache kmalloc-128 of size 128
[   36.547893] The buggy address is located 0 bytes inside of
[   36.547893]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.548086] 
[   36.548230] The buggy address belongs to the physical page:
[   36.548398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.548641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.548796] page_type: f5(slab)
[   36.548912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.549032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.549174] page dumped because: kasan: bad access detected
[   36.549243] 
[   36.549283] Memory state around the buggy address:
[   36.549388]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.549495]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549623] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.549731]                                                                 ^
[   36.549883]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550054]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550190] ==================================================================
[   36.579521] ==================================================================
[   36.580028] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   36.580198] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.580411] 
[   36.580724] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.581283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.581375] Hardware name: linux,dummy-virt (DT)
[   36.581571] Call trace:
[   36.581727]  show_stack+0x20/0x38 (C)
[   36.582304]  dump_stack_lvl+0x8c/0xd0
[   36.582460]  print_report+0x118/0x608
[   36.582577]  kasan_report+0xdc/0x128
[   36.583120]  kasan_check_range+0x100/0x1a8
[   36.583365]  __kasan_check_write+0x20/0x30
[   36.583597]  copy_user_test_oob+0x35c/0xec8
[   36.583741]  kunit_try_run_case+0x170/0x3f0
[   36.583869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.584010]  kthread+0x328/0x630
[   36.584621]  ret_from_fork+0x10/0x20
[   36.584894] 
[   36.584991] Allocated by task 296:
[   36.585274]  kasan_save_stack+0x3c/0x68
[   36.585632]  kasan_save_track+0x20/0x40
[   36.585750]  kasan_save_alloc_info+0x40/0x58
[   36.585854]  __kasan_kmalloc+0xd4/0xd8
[   36.586023]  __kmalloc_noprof+0x198/0x4c8
[   36.586134]  kunit_kmalloc_array+0x34/0x88
[   36.586326]  copy_user_test_oob+0xac/0xec8
[   36.586718]  kunit_try_run_case+0x170/0x3f0
[   36.587239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.587592]  kthread+0x328/0x630
[   36.587709]  ret_from_fork+0x10/0x20
[   36.587798] 
[   36.587856] The buggy address belongs to the object at fff00000c6515800
[   36.587856]  which belongs to the cache kmalloc-128 of size 128
[   36.588025] The buggy address is located 0 bytes inside of
[   36.588025]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.588198] 
[   36.588258] The buggy address belongs to the physical page:
[   36.588695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.588860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.588986] page_type: f5(slab)
[   36.589075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.589173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.589491] page dumped because: kasan: bad access detected
[   36.589690] 
[   36.589742] Memory state around the buggy address:
[   36.589870]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.590069]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.590190] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.590302]                                                                 ^
[   36.590448]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.590685]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.591053] ==================================================================
[   36.608066] ==================================================================
[   36.608338] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   36.608591] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296
[   36.608952] 
[   36.609050] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.609381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.609521] Hardware name: linux,dummy-virt (DT)
[   36.609654] Call trace:
[   36.609912]  show_stack+0x20/0x38 (C)
[   36.610053]  dump_stack_lvl+0x8c/0xd0
[   36.610172]  print_report+0x118/0x608
[   36.610290]  kasan_report+0xdc/0x128
[   36.610406]  kasan_check_range+0x100/0x1a8
[   36.610525]  __kasan_check_write+0x20/0x30
[   36.610976]  copy_user_test_oob+0x434/0xec8
[   36.611173]  kunit_try_run_case+0x170/0x3f0
[   36.611423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.612026]  kthread+0x328/0x630
[   36.612243]  ret_from_fork+0x10/0x20
[   36.612436] 
[   36.612493] Allocated by task 296:
[   36.612685]  kasan_save_stack+0x3c/0x68
[   36.612787]  kasan_save_track+0x20/0x40
[   36.612862]  kasan_save_alloc_info+0x40/0x58
[   36.613154]  __kasan_kmalloc+0xd4/0xd8
[   36.613278]  __kmalloc_noprof+0x198/0x4c8
[   36.613391]  kunit_kmalloc_array+0x34/0x88
[   36.613634]  copy_user_test_oob+0xac/0xec8
[   36.613843]  kunit_try_run_case+0x170/0x3f0
[   36.614054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.614167]  kthread+0x328/0x630
[   36.614571]  ret_from_fork+0x10/0x20
[   36.614826] 
[   36.614886] The buggy address belongs to the object at fff00000c6515800
[   36.614886]  which belongs to the cache kmalloc-128 of size 128
[   36.615067] The buggy address is located 0 bytes inside of
[   36.615067]  allocated 120-byte region [fff00000c6515800, fff00000c6515878)
[   36.615236] 
[   36.615293] The buggy address belongs to the physical page:
[   36.615379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.615546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.615688] page_type: f5(slab)
[   36.615805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.616495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.616693] page dumped because: kasan: bad access detected
[   36.616899] 
[   36.616953] Memory state around the buggy address:
[   36.617248]  fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.617379]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.617478] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.617591]                                                                 ^
[   36.617840]  fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.618088]  fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.618621] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   36.405894] ==================================================================
[   36.406034] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   36.406172] Write of size 8 at addr fff00000c6515778 by task kunit_try_catch/292
[   36.406297] 
[   36.406699] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.407025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.407150] Hardware name: linux,dummy-virt (DT)
[   36.407242] Call trace:
[   36.407335]  show_stack+0x20/0x38 (C)
[   36.407534]  dump_stack_lvl+0x8c/0xd0
[   36.407678]  print_report+0x118/0x608
[   36.407802]  kasan_report+0xdc/0x128
[   36.407918]  kasan_check_range+0x100/0x1a8
[   36.408037]  __kasan_check_write+0x20/0x30
[   36.408162]  copy_to_kernel_nofault+0x8c/0x250
[   36.408290]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   36.408545]  kunit_try_run_case+0x170/0x3f0
[   36.408947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409018]  kthread+0x328/0x630
[   36.409125]  ret_from_fork+0x10/0x20
[   36.409195] 
[   36.409221] Allocated by task 292:
[   36.409261]  kasan_save_stack+0x3c/0x68
[   36.409315]  kasan_save_track+0x20/0x40
[   36.409361]  kasan_save_alloc_info+0x40/0x58
[   36.409408]  __kasan_kmalloc+0xd4/0xd8
[   36.409452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.409498]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.409546]  kunit_try_run_case+0x170/0x3f0
[   36.409591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409697]  kthread+0x328/0x630
[   36.409792]  ret_from_fork+0x10/0x20
[   36.409884] 
[   36.409928] The buggy address belongs to the object at fff00000c6515700
[   36.409928]  which belongs to the cache kmalloc-128 of size 128
[   36.410047] The buggy address is located 0 bytes to the right of
[   36.410047]  allocated 120-byte region [fff00000c6515700, fff00000c6515778)
[   36.410183] 
[   36.410235] The buggy address belongs to the physical page:
[   36.410316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.410469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.410623] page_type: f5(slab)
[   36.410745] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.410890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.411009] page dumped because: kasan: bad access detected
[   36.411120] 
[   36.411177] Memory state around the buggy address:
[   36.411288]  fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.411431]  fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.411562] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.411671]                                                                 ^
[   36.411775]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.411892]  fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.412005] ==================================================================
[   36.395750] ==================================================================
[   36.396004] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   36.396238] Read of size 8 at addr fff00000c6515778 by task kunit_try_catch/292
[   36.396622] 
[   36.396769] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.397255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.397350] Hardware name: linux,dummy-virt (DT)
[   36.397429] Call trace:
[   36.397487]  show_stack+0x20/0x38 (C)
[   36.397619]  dump_stack_lvl+0x8c/0xd0
[   36.397732]  print_report+0x118/0x608
[   36.397893]  kasan_report+0xdc/0x128
[   36.398026]  __asan_report_load8_noabort+0x20/0x30
[   36.398181]  copy_to_kernel_nofault+0x204/0x250
[   36.398346]  copy_to_kernel_nofault_oob+0x158/0x418
[   36.398493]  kunit_try_run_case+0x170/0x3f0
[   36.398655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.398796]  kthread+0x328/0x630
[   36.398908]  ret_from_fork+0x10/0x20
[   36.399029] 
[   36.399090] Allocated by task 292:
[   36.399166]  kasan_save_stack+0x3c/0x68
[   36.399287]  kasan_save_track+0x20/0x40
[   36.399378]  kasan_save_alloc_info+0x40/0x58
[   36.399577]  __kasan_kmalloc+0xd4/0xd8
[   36.399775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.400117]  copy_to_kernel_nofault_oob+0xc8/0x418
[   36.400260]  kunit_try_run_case+0x170/0x3f0
[   36.400368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.400504]  kthread+0x328/0x630
[   36.400627]  ret_from_fork+0x10/0x20
[   36.400750] 
[   36.400908] The buggy address belongs to the object at fff00000c6515700
[   36.400908]  which belongs to the cache kmalloc-128 of size 128
[   36.401053] The buggy address is located 0 bytes to the right of
[   36.401053]  allocated 120-byte region [fff00000c6515700, fff00000c6515778)
[   36.401418] 
[   36.401521] The buggy address belongs to the physical page:
[   36.401630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515
[   36.401783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.401923] page_type: f5(slab)
[   36.402032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.402171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.402288] page dumped because: kasan: bad access detected
[   36.402373] 
[   36.402427] Memory state around the buggy address:
[   36.402533]  fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.402657]  fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.402996] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.403221]                                                                 ^
[   36.403366]  fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.403497]  fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.403791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   36.247320] ==================================================================
[   36.247556] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   36.247728] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/280
[   36.248096] 
[   36.248335] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.248617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.248686] Hardware name: linux,dummy-virt (DT)
[   36.248770] Call trace:
[   36.249022]  show_stack+0x20/0x38 (C)
[   36.249166]  dump_stack_lvl+0x8c/0xd0
[   36.249275]  print_report+0x310/0x608
[   36.249461]  kasan_report+0xdc/0x128
[   36.249596]  __asan_report_load1_noabort+0x20/0x30
[   36.249831]  vmalloc_oob+0x578/0x5d0
[   36.250025]  kunit_try_run_case+0x170/0x3f0
[   36.250152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.250280]  kthread+0x328/0x630
[   36.250697]  ret_from_fork+0x10/0x20
[   36.250853] 
[   36.251031] The buggy address belongs to the virtual mapping at
[   36.251031]  [ffff8000800fe000, ffff800080100000) created by:
[   36.251031]  vmalloc_oob+0x98/0x5d0
[   36.251278] 
[   36.251367] The buggy address belongs to the physical page:
[   36.251514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab5
[   36.251673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.251849] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.251988] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.252108] page dumped because: kasan: bad access detected
[   36.252206] 
[   36.252280] Memory state around the buggy address:
[   36.252364]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.252469]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.252876] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.253003]                                                              ^
[   36.253231]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.253383]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.253513] ==================================================================
[   36.255605] ==================================================================
[   36.256028] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   36.256240] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/280
[   36.256358] 
[   36.256690] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.256988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.257061] Hardware name: linux,dummy-virt (DT)
[   36.257160] Call trace:
[   36.257259]  show_stack+0x20/0x38 (C)
[   36.257381]  dump_stack_lvl+0x8c/0xd0
[   36.257510]  print_report+0x310/0x608
[   36.257622]  kasan_report+0xdc/0x128
[   36.257716]  __asan_report_load1_noabort+0x20/0x30
[   36.258136]  vmalloc_oob+0x51c/0x5d0
[   36.258312]  kunit_try_run_case+0x170/0x3f0
[   36.258536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.258686]  kthread+0x328/0x630
[   36.258806]  ret_from_fork+0x10/0x20
[   36.258934] 
[   36.259093] The buggy address belongs to the virtual mapping at
[   36.259093]  [ffff8000800fe000, ffff800080100000) created by:
[   36.259093]  vmalloc_oob+0x98/0x5d0
[   36.259529] 
[   36.259595] The buggy address belongs to the physical page:
[   36.259713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab5
[   36.259937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.260161] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.260287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.260385] page dumped because: kasan: bad access detected
[   36.260471] 
[   36.260789] Memory state around the buggy address:
[   36.260928]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.261069]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.261231] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.261380]                                                                 ^
[   36.261534]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.261675]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.261776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.938135] ==================================================================
[   35.938920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.939213] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.939446] 
[   35.939929] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.940784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.941437] Hardware name: linux,dummy-virt (DT)
[   35.941659] Call trace:
[   35.941759]  show_stack+0x20/0x38 (C)
[   35.941911]  dump_stack_lvl+0x8c/0xd0
[   35.942002]  print_report+0x118/0x608
[   35.942087]  kasan_report+0xdc/0x128
[   35.942170]  kasan_check_range+0x100/0x1a8
[   35.942272]  __kasan_check_write+0x20/0x30
[   35.942383]  kasan_atomics_helper+0xff0/0x4858
[   35.943623]  kasan_atomics+0x198/0x2e0
[   35.943976]  kunit_try_run_case+0x170/0x3f0
[   35.944623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.944799]  kthread+0x328/0x630
[   35.944922]  ret_from_fork+0x10/0x20
[   35.945161] 
[   35.945242] Allocated by task 276:
[   35.945418]  kasan_save_stack+0x3c/0x68
[   35.945856]  kasan_save_track+0x20/0x40
[   35.945943]  kasan_save_alloc_info+0x40/0x58
[   35.946087]  __kasan_kmalloc+0xd4/0xd8
[   35.946181]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.946279]  kasan_atomics+0xb8/0x2e0
[   35.946462]  kunit_try_run_case+0x170/0x3f0
[   35.946924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.947277]  kthread+0x328/0x630
[   35.947447]  ret_from_fork+0x10/0x20
[   35.947554] 
[   35.947795] The buggy address belongs to the object at fff00000c768c580
[   35.947795]  which belongs to the cache kmalloc-64 of size 64
[   35.948651] The buggy address is located 0 bytes to the right of
[   35.948651]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.948892] 
[   35.948945] The buggy address belongs to the physical page:
[   35.949013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.949113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.949220] page_type: f5(slab)
[   35.949320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.949454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.949571] page dumped because: kasan: bad access detected
[   35.950197] 
[   35.950392] Memory state around the buggy address:
[   35.950883]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.951233]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.951535] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.952157]                                      ^
[   35.952696]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952849]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952967] ==================================================================
[   35.860988] ==================================================================
[   35.861346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.861575] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.861739] 
[   35.861838] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.862071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.862509] Hardware name: linux,dummy-virt (DT)
[   35.862944] Call trace:
[   35.863016]  show_stack+0x20/0x38 (C)
[   35.863935]  dump_stack_lvl+0x8c/0xd0
[   35.864182]  print_report+0x118/0x608
[   35.864716]  kasan_report+0xdc/0x128
[   35.864869]  __asan_report_load8_noabort+0x20/0x30
[   35.864970]  kasan_atomics_helper+0x3f58/0x4858
[   35.865075]  kasan_atomics+0x198/0x2e0
[   35.865193]  kunit_try_run_case+0x170/0x3f0
[   35.865302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.865432]  kthread+0x328/0x630
[   35.865705]  ret_from_fork+0x10/0x20
[   35.866128] 
[   35.866331] Allocated by task 276:
[   35.866598]  kasan_save_stack+0x3c/0x68
[   35.867169]  kasan_save_track+0x20/0x40
[   35.867308]  kasan_save_alloc_info+0x40/0x58
[   35.867432]  __kasan_kmalloc+0xd4/0xd8
[   35.867941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.868074]  kasan_atomics+0xb8/0x2e0
[   35.868181]  kunit_try_run_case+0x170/0x3f0
[   35.868289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.868402]  kthread+0x328/0x630
[   35.869042]  ret_from_fork+0x10/0x20
[   35.869154] 
[   35.869201] The buggy address belongs to the object at fff00000c768c580
[   35.869201]  which belongs to the cache kmalloc-64 of size 64
[   35.869847] The buggy address is located 0 bytes to the right of
[   35.869847]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.870047] 
[   35.870444] The buggy address belongs to the physical page:
[   35.870858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.871030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.871174] page_type: f5(slab)
[   35.871286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.872014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.872545] page dumped because: kasan: bad access detected
[   35.873007] 
[   35.873067] Memory state around the buggy address:
[   35.873153]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.873258]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.873375] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.873482]                                      ^
[   35.874415]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.874568]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.874695] ==================================================================
[   36.007389] ==================================================================
[   36.007716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.008191] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.008798] 
[   36.008977] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.009170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.009224] Hardware name: linux,dummy-virt (DT)
[   36.009735] Call trace:
[   36.009844]  show_stack+0x20/0x38 (C)
[   36.010324]  dump_stack_lvl+0x8c/0xd0
[   36.010920]  print_report+0x118/0x608
[   36.011279]  kasan_report+0xdc/0x128
[   36.011403]  kasan_check_range+0x100/0x1a8
[   36.011879]  __kasan_check_write+0x20/0x30
[   36.012035]  kasan_atomics_helper+0x1190/0x4858
[   36.012528]  kasan_atomics+0x198/0x2e0
[   36.012900]  kunit_try_run_case+0x170/0x3f0
[   36.013283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.013788]  kthread+0x328/0x630
[   36.013904]  ret_from_fork+0x10/0x20
[   36.014001] 
[   36.014043] Allocated by task 276:
[   36.014560]  kasan_save_stack+0x3c/0x68
[   36.014780]  kasan_save_track+0x20/0x40
[   36.015195]  kasan_save_alloc_info+0x40/0x58
[   36.015412]  __kasan_kmalloc+0xd4/0xd8
[   36.015593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.015793]  kasan_atomics+0xb8/0x2e0
[   36.015885]  kunit_try_run_case+0x170/0x3f0
[   36.016443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.016576]  kthread+0x328/0x630
[   36.016939]  ret_from_fork+0x10/0x20
[   36.017222] 
[   36.017272] The buggy address belongs to the object at fff00000c768c580
[   36.017272]  which belongs to the cache kmalloc-64 of size 64
[   36.017428] The buggy address is located 0 bytes to the right of
[   36.017428]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.017592] 
[   36.017688] The buggy address belongs to the physical page:
[   36.017868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.018036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.018175] page_type: f5(slab)
[   36.018811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.018959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.019281] page dumped because: kasan: bad access detected
[   36.019953] 
[   36.020010] Memory state around the buggy address:
[   36.020106]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.020884]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.021082] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.021486]                                      ^
[   36.021570]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.021872]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.022117] ==================================================================
[   35.878699] ==================================================================
[   35.878856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.879003] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.879142] 
[   35.879237] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.880654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.880966] Hardware name: linux,dummy-virt (DT)
[   35.881333] Call trace:
[   35.881438]  show_stack+0x20/0x38 (C)
[   35.881997]  dump_stack_lvl+0x8c/0xd0
[   35.882714]  print_report+0x118/0x608
[   35.883174]  kasan_report+0xdc/0x128
[   35.883313]  kasan_check_range+0x100/0x1a8
[   35.883723]  __kasan_check_write+0x20/0x30
[   35.884057]  kasan_atomics_helper+0xe44/0x4858
[   35.884307]  kasan_atomics+0x198/0x2e0
[   35.885874]  kunit_try_run_case+0x170/0x3f0
[   35.886033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.886109]  kthread+0x328/0x630
[   35.886163]  ret_from_fork+0x10/0x20
[   35.886226] 
[   35.886255] Allocated by task 276:
[   35.886296]  kasan_save_stack+0x3c/0x68
[   35.886355]  kasan_save_track+0x20/0x40
[   35.886401]  kasan_save_alloc_info+0x40/0x58
[   35.886450]  __kasan_kmalloc+0xd4/0xd8
[   35.886495]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.886543]  kasan_atomics+0xb8/0x2e0
[   35.886586]  kunit_try_run_case+0x170/0x3f0
[   35.886707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.886831]  kthread+0x328/0x630
[   35.886924]  ret_from_fork+0x10/0x20
[   35.887252] 
[   35.887330] The buggy address belongs to the object at fff00000c768c580
[   35.887330]  which belongs to the cache kmalloc-64 of size 64
[   35.887664] The buggy address is located 0 bytes to the right of
[   35.887664]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.887857] 
[   35.888527] The buggy address belongs to the physical page:
[   35.888740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.889063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.889213] page_type: f5(slab)
[   35.889326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.889814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.890004] page dumped because: kasan: bad access detected
[   35.890100] 
[   35.890240] Memory state around the buggy address:
[   35.890390]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.890515]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.890643] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.890747]                                      ^
[   35.890854]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.891028]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.891139] ==================================================================
[   35.893368] ==================================================================
[   35.893848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.893992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.894096] 
[   35.894186] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.894354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.894419] Hardware name: linux,dummy-virt (DT)
[   35.894486] Call trace:
[   35.894535]  show_stack+0x20/0x38 (C)
[   35.894667]  dump_stack_lvl+0x8c/0xd0
[   35.894772]  print_report+0x118/0x608
[   35.894880]  kasan_report+0xdc/0x128
[   35.894995]  __asan_report_store8_noabort+0x20/0x30
[   35.896980]  kasan_atomics_helper+0x3e5c/0x4858
[   35.897216]  kasan_atomics+0x198/0x2e0
[   35.897331]  kunit_try_run_case+0x170/0x3f0
[   35.897438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.898573]  kthread+0x328/0x630
[   35.899172]  ret_from_fork+0x10/0x20
[   35.899435] 
[   35.899699] Allocated by task 276:
[   35.899790]  kasan_save_stack+0x3c/0x68
[   35.900347]  kasan_save_track+0x20/0x40
[   35.900507]  kasan_save_alloc_info+0x40/0x58
[   35.901069]  __kasan_kmalloc+0xd4/0xd8
[   35.901548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.901880]  kasan_atomics+0xb8/0x2e0
[   35.901981]  kunit_try_run_case+0x170/0x3f0
[   35.902359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.902861]  kthread+0x328/0x630
[   35.903317]  ret_from_fork+0x10/0x20
[   35.903689] 
[   35.903754] The buggy address belongs to the object at fff00000c768c580
[   35.903754]  which belongs to the cache kmalloc-64 of size 64
[   35.904274] The buggy address is located 0 bytes to the right of
[   35.904274]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.904455] 
[   35.904539] The buggy address belongs to the physical page:
[   35.904639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.904797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.904910] page_type: f5(slab)
[   35.904993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.905336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.905455] page dumped because: kasan: bad access detected
[   35.905735] 
[   35.905799] Memory state around the buggy address:
[   35.905928]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.906086]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.906199] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.906361]                                      ^
[   35.906745]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.906941]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.907083] ==================================================================
[   36.153527] ==================================================================
[   36.153694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.153849] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.153987] 
[   36.154079] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.154309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.154381] Hardware name: linux,dummy-virt (DT)
[   36.154918] Call trace:
[   36.155060]  show_stack+0x20/0x38 (C)
[   36.155323]  dump_stack_lvl+0x8c/0xd0
[   36.155521]  print_report+0x118/0x608
[   36.155971]  kasan_report+0xdc/0x128
[   36.156163]  __asan_report_load8_noabort+0x20/0x30
[   36.156364]  kasan_atomics_helper+0x3e10/0x4858
[   36.156573]  kasan_atomics+0x198/0x2e0
[   36.156767]  kunit_try_run_case+0x170/0x3f0
[   36.157198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.157309]  kthread+0x328/0x630
[   36.157406]  ret_from_fork+0x10/0x20
[   36.157529] 
[   36.157645] Allocated by task 276:
[   36.157754]  kasan_save_stack+0x3c/0x68
[   36.158005]  kasan_save_track+0x20/0x40
[   36.158479]  kasan_save_alloc_info+0x40/0x58
[   36.158594]  __kasan_kmalloc+0xd4/0xd8
[   36.159177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.159598]  kasan_atomics+0xb8/0x2e0
[   36.159975]  kunit_try_run_case+0x170/0x3f0
[   36.160129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.160650]  kthread+0x328/0x630
[   36.160895]  ret_from_fork+0x10/0x20
[   36.161011] 
[   36.161071] The buggy address belongs to the object at fff00000c768c580
[   36.161071]  which belongs to the cache kmalloc-64 of size 64
[   36.161232] The buggy address is located 0 bytes to the right of
[   36.161232]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.161363] 
[   36.161404] The buggy address belongs to the physical page:
[   36.161825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.162238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.162638] page_type: f5(slab)
[   36.162762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.163026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.163288] page dumped because: kasan: bad access detected
[   36.163381] 
[   36.163438] Memory state around the buggy address:
[   36.163529]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.163669]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.163796] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.163905]                                      ^
[   36.164540]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.164737]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.165073] ==================================================================
[   36.122503] ==================================================================
[   36.122656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.122778] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.122897] 
[   36.122990] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.123257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.123365] Hardware name: linux,dummy-virt (DT)
[   36.123475] Call trace:
[   36.123586]  show_stack+0x20/0x38 (C)
[   36.123771]  dump_stack_lvl+0x8c/0xd0
[   36.123939]  print_report+0x118/0x608
[   36.124101]  kasan_report+0xdc/0x128
[   36.124227]  kasan_check_range+0x100/0x1a8
[   36.124391]  __kasan_check_write+0x20/0x30
[   36.124499]  kasan_atomics_helper+0x1644/0x4858
[   36.124711]  kasan_atomics+0x198/0x2e0
[   36.124849]  kunit_try_run_case+0x170/0x3f0
[   36.124965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.125117]  kthread+0x328/0x630
[   36.125261]  ret_from_fork+0x10/0x20
[   36.125371] 
[   36.125419] Allocated by task 276:
[   36.125492]  kasan_save_stack+0x3c/0x68
[   36.125629]  kasan_save_track+0x20/0x40
[   36.125710]  kasan_save_alloc_info+0x40/0x58
[   36.125825]  __kasan_kmalloc+0xd4/0xd8
[   36.125922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.126014]  kasan_atomics+0xb8/0x2e0
[   36.126082]  kunit_try_run_case+0x170/0x3f0
[   36.126164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.126261]  kthread+0x328/0x630
[   36.126335]  ret_from_fork+0x10/0x20
[   36.126415] 
[   36.126469] The buggy address belongs to the object at fff00000c768c580
[   36.126469]  which belongs to the cache kmalloc-64 of size 64
[   36.126638] The buggy address is located 0 bytes to the right of
[   36.126638]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.126848] 
[   36.126913] The buggy address belongs to the physical page:
[   36.127003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.127150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.127283] page_type: f5(slab)
[   36.127427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.127561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.127674] page dumped because: kasan: bad access detected
[   36.127756] 
[   36.127803] Memory state around the buggy address:
[   36.127893]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.128013]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.128127] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.128233]                                      ^
[   36.128410]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128520]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128635] ==================================================================
[   35.919841] ==================================================================
[   35.919933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.920014] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.920076] 
[   35.920127] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.920231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.920267] Hardware name: linux,dummy-virt (DT)
[   35.921182] Call trace:
[   35.921270]  show_stack+0x20/0x38 (C)
[   35.921403]  dump_stack_lvl+0x8c/0xd0
[   35.921528]  print_report+0x118/0x608
[   35.921668]  kasan_report+0xdc/0x128
[   35.921781]  kasan_check_range+0x100/0x1a8
[   35.921902]  __kasan_check_write+0x20/0x30
[   35.923710]  kasan_atomics_helper+0xf20/0x4858
[   35.923793]  kasan_atomics+0x198/0x2e0
[   35.923851]  kunit_try_run_case+0x170/0x3f0
[   35.923940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924006]  kthread+0x328/0x630
[   35.924056]  ret_from_fork+0x10/0x20
[   35.924117] 
[   35.924144] Allocated by task 276:
[   35.924184]  kasan_save_stack+0x3c/0x68
[   35.924239]  kasan_save_track+0x20/0x40
[   35.924286]  kasan_save_alloc_info+0x40/0x58
[   35.924356]  __kasan_kmalloc+0xd4/0xd8
[   35.924404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.924452]  kasan_atomics+0xb8/0x2e0
[   35.924496]  kunit_try_run_case+0x170/0x3f0
[   35.924541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924593]  kthread+0x328/0x630
[   35.924707]  ret_from_fork+0x10/0x20
[   35.924795] 
[   35.924852] The buggy address belongs to the object at fff00000c768c580
[   35.924852]  which belongs to the cache kmalloc-64 of size 64
[   35.924986] The buggy address is located 0 bytes to the right of
[   35.924986]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.925067] 
[   35.925096] The buggy address belongs to the physical page:
[   35.925137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.925272] page_type: f5(slab)
[   35.925325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.925386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.925437] page dumped because: kasan: bad access detected
[   35.925477] 
[   35.925500] Memory state around the buggy address:
[   35.925544]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.925596]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.925724] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.925842]                                      ^
[   35.925916]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926001]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926077] ==================================================================
[   36.086038] ==================================================================
[   36.086106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.086182] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.086243] 
[   36.086292] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.086397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.086429] Hardware name: linux,dummy-virt (DT)
[   36.086473] Call trace:
[   36.086504]  show_stack+0x20/0x38 (C)
[   36.086566]  dump_stack_lvl+0x8c/0xd0
[   36.088393]  print_report+0x118/0x608
[   36.088548]  kasan_report+0xdc/0x128
[   36.088684]  kasan_check_range+0x100/0x1a8
[   36.088818]  __kasan_check_write+0x20/0x30
[   36.088936]  kasan_atomics_helper+0x147c/0x4858
[   36.089009]  kasan_atomics+0x198/0x2e0
[   36.089065]  kunit_try_run_case+0x170/0x3f0
[   36.089128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.089193]  kthread+0x328/0x630
[   36.089244]  ret_from_fork+0x10/0x20
[   36.089305] 
[   36.089331] Allocated by task 276:
[   36.089372]  kasan_save_stack+0x3c/0x68
[   36.089428]  kasan_save_track+0x20/0x40
[   36.089473]  kasan_save_alloc_info+0x40/0x58
[   36.089524]  __kasan_kmalloc+0xd4/0xd8
[   36.089567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.089639]  kasan_atomics+0xb8/0x2e0
[   36.089688]  kunit_try_run_case+0x170/0x3f0
[   36.089734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.089787]  kthread+0x328/0x630
[   36.089827]  ret_from_fork+0x10/0x20
[   36.089870] 
[   36.089898] The buggy address belongs to the object at fff00000c768c580
[   36.089898]  which belongs to the cache kmalloc-64 of size 64
[   36.089969] The buggy address is located 0 bytes to the right of
[   36.089969]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.090045] 
[   36.090073] The buggy address belongs to the physical page:
[   36.090116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.090183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.090248] page_type: f5(slab)
[   36.090300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.090360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.090412] page dumped because: kasan: bad access detected
[   36.090450] 
[   36.090473] Memory state around the buggy address:
[   36.090516]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.090569]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.090733] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.090942]                                      ^
[   36.091111]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.091351]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.091489] ==================================================================
[   36.115000] ==================================================================
[   36.115180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.115370] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.115576] 
[   36.115685] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.115911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.115977] Hardware name: linux,dummy-virt (DT)
[   36.116062] Call trace:
[   36.116126]  show_stack+0x20/0x38 (C)
[   36.116259]  dump_stack_lvl+0x8c/0xd0
[   36.116415]  print_report+0x118/0x608
[   36.116534]  kasan_report+0xdc/0x128
[   36.116692]  __asan_report_load8_noabort+0x20/0x30
[   36.116801]  kasan_atomics_helper+0x3db0/0x4858
[   36.116920]  kasan_atomics+0x198/0x2e0
[   36.117047]  kunit_try_run_case+0x170/0x3f0
[   36.117232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117368]  kthread+0x328/0x630
[   36.117505]  ret_from_fork+0x10/0x20
[   36.117640] 
[   36.117709] Allocated by task 276:
[   36.117810]  kasan_save_stack+0x3c/0x68
[   36.117918]  kasan_save_track+0x20/0x40
[   36.118020]  kasan_save_alloc_info+0x40/0x58
[   36.118125]  __kasan_kmalloc+0xd4/0xd8
[   36.118221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.118325]  kasan_atomics+0xb8/0x2e0
[   36.118415]  kunit_try_run_case+0x170/0x3f0
[   36.118516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.118640]  kthread+0x328/0x630
[   36.118752]  ret_from_fork+0x10/0x20
[   36.118836] 
[   36.118885] The buggy address belongs to the object at fff00000c768c580
[   36.118885]  which belongs to the cache kmalloc-64 of size 64
[   36.119022] The buggy address is located 0 bytes to the right of
[   36.119022]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.119159] 
[   36.119213] The buggy address belongs to the physical page:
[   36.119321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.119476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.119636] page_type: f5(slab)
[   36.119736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.119845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.119967] page dumped because: kasan: bad access detected
[   36.120051] 
[   36.120094] Memory state around the buggy address:
[   36.120184]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.120327]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.120448] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.120559]                                      ^
[   36.120666]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.120789]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.120897] ==================================================================
[   35.718712] ==================================================================
[   35.718905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.719044] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.719174] 
[   35.719282] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.719747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.719823] Hardware name: linux,dummy-virt (DT)
[   35.719908] Call trace:
[   35.719969]  show_stack+0x20/0x38 (C)
[   35.720096]  dump_stack_lvl+0x8c/0xd0
[   35.720155]  print_report+0x118/0x608
[   35.720214]  kasan_report+0xdc/0x128
[   35.720268]  kasan_check_range+0x100/0x1a8
[   35.721075]  __kasan_check_write+0x20/0x30
[   35.721221]  kasan_atomics_helper+0xa04/0x4858
[   35.721331]  kasan_atomics+0x198/0x2e0
[   35.721389]  kunit_try_run_case+0x170/0x3f0
[   35.721453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.721516]  kthread+0x328/0x630
[   35.721570]  ret_from_fork+0x10/0x20
[   35.721658] 
[   35.721686] Allocated by task 276:
[   35.721726]  kasan_save_stack+0x3c/0x68
[   35.721782]  kasan_save_track+0x20/0x40
[   35.721827]  kasan_save_alloc_info+0x40/0x58
[   35.721875]  __kasan_kmalloc+0xd4/0xd8
[   35.721918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.721967]  kasan_atomics+0xb8/0x2e0
[   35.722010]  kunit_try_run_case+0x170/0x3f0
[   35.722053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.722105]  kthread+0x328/0x630
[   35.722143]  ret_from_fork+0x10/0x20
[   35.722186] 
[   35.722213] The buggy address belongs to the object at fff00000c768c580
[   35.722213]  which belongs to the cache kmalloc-64 of size 64
[   35.722286] The buggy address is located 0 bytes to the right of
[   35.722286]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.722360] 
[   35.722389] The buggy address belongs to the physical page:
[   35.722431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.722496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.722562] page_type: f5(slab)
[   35.722654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.722805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.722995] page dumped because: kasan: bad access detected
[   35.723217] 
[   35.723343] Memory state around the buggy address:
[   35.723504]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.723636]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.723767] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.724728]                                      ^
[   35.725085]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.725585]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.725976] ==================================================================
[   36.100133] ==================================================================
[   36.100277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.100420] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.100541] 
[   36.100676] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.100898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.100971] Hardware name: linux,dummy-virt (DT)
[   36.101061] Call trace:
[   36.101133]  show_stack+0x20/0x38 (C)
[   36.101251]  dump_stack_lvl+0x8c/0xd0
[   36.101407]  print_report+0x118/0x608
[   36.101551]  kasan_report+0xdc/0x128
[   36.101934]  kasan_check_range+0x100/0x1a8
[   36.102215]  __kasan_check_write+0x20/0x30
[   36.102478]  kasan_atomics_helper+0x154c/0x4858
[   36.102591]  kasan_atomics+0x198/0x2e0
[   36.102693]  kunit_try_run_case+0x170/0x3f0
[   36.102817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.102945]  kthread+0x328/0x630
[   36.103076]  ret_from_fork+0x10/0x20
[   36.103196] 
[   36.103244] Allocated by task 276:
[   36.103324]  kasan_save_stack+0x3c/0x68
[   36.103449]  kasan_save_track+0x20/0x40
[   36.103549]  kasan_save_alloc_info+0x40/0x58
[   36.103674]  __kasan_kmalloc+0xd4/0xd8
[   36.103773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.103883]  kasan_atomics+0xb8/0x2e0
[   36.104019]  kunit_try_run_case+0x170/0x3f0
[   36.104166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.104286]  kthread+0x328/0x630
[   36.104399]  ret_from_fork+0x10/0x20
[   36.104492] 
[   36.104554] The buggy address belongs to the object at fff00000c768c580
[   36.104554]  which belongs to the cache kmalloc-64 of size 64
[   36.104702] The buggy address is located 0 bytes to the right of
[   36.104702]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.104889] 
[   36.104943] The buggy address belongs to the physical page:
[   36.105042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.105186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.105329] page_type: f5(slab)
[   36.105429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.105577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.105713] page dumped because: kasan: bad access detected
[   36.105800] 
[   36.105855] Memory state around the buggy address:
[   36.105946]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.106083]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.106195] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.106288]                                      ^
[   36.106382]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.106523]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.106692] ==================================================================
[   36.061475] ==================================================================
[   36.061646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.061793] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.062150] 
[   36.062262] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.062474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.062543] Hardware name: linux,dummy-virt (DT)
[   36.062641] Call trace:
[   36.062741]  show_stack+0x20/0x38 (C)
[   36.062984]  dump_stack_lvl+0x8c/0xd0
[   36.063160]  print_report+0x118/0x608
[   36.063330]  kasan_report+0xdc/0x128
[   36.063522]  kasan_check_range+0x100/0x1a8
[   36.063835]  __kasan_check_write+0x20/0x30
[   36.064007]  kasan_atomics_helper+0x1384/0x4858
[   36.064134]  kasan_atomics+0x198/0x2e0
[   36.064258]  kunit_try_run_case+0x170/0x3f0
[   36.064449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.064605]  kthread+0x328/0x630
[   36.064740]  ret_from_fork+0x10/0x20
[   36.064921] 
[   36.065001] Allocated by task 276:
[   36.065116]  kasan_save_stack+0x3c/0x68
[   36.065269]  kasan_save_track+0x20/0x40
[   36.065353]  kasan_save_alloc_info+0x40/0x58
[   36.065434]  __kasan_kmalloc+0xd4/0xd8
[   36.065725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.065861]  kasan_atomics+0xb8/0x2e0
[   36.065967]  kunit_try_run_case+0x170/0x3f0
[   36.066077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.066199]  kthread+0x328/0x630
[   36.066335]  ret_from_fork+0x10/0x20
[   36.066476] 
[   36.066567] The buggy address belongs to the object at fff00000c768c580
[   36.066567]  which belongs to the cache kmalloc-64 of size 64
[   36.066797] The buggy address is located 0 bytes to the right of
[   36.066797]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.066989] 
[   36.067081] The buggy address belongs to the physical page:
[   36.067181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.067330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.067481] page_type: f5(slab)
[   36.067589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.067720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.067939] page dumped because: kasan: bad access detected
[   36.068100] 
[   36.068150] Memory state around the buggy address:
[   36.068239]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.068369]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.068499] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.068625]                                      ^
[   36.068716]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.068814]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.068892] ==================================================================
[   36.107477] ==================================================================
[   36.107574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.107683] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.107747] 
[   36.107799] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.107905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.107937] Hardware name: linux,dummy-virt (DT)
[   36.107980] Call trace:
[   36.108011]  show_stack+0x20/0x38 (C)
[   36.108073]  dump_stack_lvl+0x8c/0xd0
[   36.108126]  print_report+0x118/0x608
[   36.108183]  kasan_report+0xdc/0x128
[   36.108236]  kasan_check_range+0x100/0x1a8
[   36.108291]  __kasan_check_write+0x20/0x30
[   36.108344]  kasan_atomics_helper+0x15b4/0x4858
[   36.108401]  kasan_atomics+0x198/0x2e0
[   36.108455]  kunit_try_run_case+0x170/0x3f0
[   36.108512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108575]  kthread+0x328/0x630
[   36.108717]  ret_from_fork+0x10/0x20
[   36.108895] 
[   36.108957] Allocated by task 276:
[   36.109051]  kasan_save_stack+0x3c/0x68
[   36.109146]  kasan_save_track+0x20/0x40
[   36.109217]  kasan_save_alloc_info+0x40/0x58
[   36.109293]  __kasan_kmalloc+0xd4/0xd8
[   36.109368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.109463]  kasan_atomics+0xb8/0x2e0
[   36.109558]  kunit_try_run_case+0x170/0x3f0
[   36.109673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.109778]  kthread+0x328/0x630
[   36.109871]  ret_from_fork+0x10/0x20
[   36.109969] 
[   36.110028] The buggy address belongs to the object at fff00000c768c580
[   36.110028]  which belongs to the cache kmalloc-64 of size 64
[   36.110188] The buggy address is located 0 bytes to the right of
[   36.110188]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.110362] 
[   36.110420] The buggy address belongs to the physical page:
[   36.111570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.111737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.111882] page_type: f5(slab)
[   36.111995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.112127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.112236] page dumped because: kasan: bad access detected
[   36.112361] 
[   36.112412] Memory state around the buggy address:
[   36.112544]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.112863]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.113000] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.113438]                                      ^
[   36.113590]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.113800]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.114016] ==================================================================
[   35.911630] ==================================================================
[   35.911783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.911925] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.912055] 
[   35.912152] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.912380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.912457] Hardware name: linux,dummy-virt (DT)
[   35.912540] Call trace:
[   35.912603]  show_stack+0x20/0x38 (C)
[   35.912783]  dump_stack_lvl+0x8c/0xd0
[   35.912913]  print_report+0x118/0x608
[   35.913032]  kasan_report+0xdc/0x128
[   35.913158]  kasan_check_range+0x100/0x1a8
[   35.913287]  __kasan_check_write+0x20/0x30
[   35.913407]  kasan_atomics_helper+0xeb8/0x4858
[   35.913533]  kasan_atomics+0x198/0x2e0
[   35.913673]  kunit_try_run_case+0x170/0x3f0
[   35.913787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.914053]  kthread+0x328/0x630
[   35.914177]  ret_from_fork+0x10/0x20
[   35.914288] 
[   35.914346] Allocated by task 276:
[   35.914517]  kasan_save_stack+0x3c/0x68
[   35.914928]  kasan_save_track+0x20/0x40
[   35.916532]  kasan_save_alloc_info+0x40/0x58
[   35.916594]  __kasan_kmalloc+0xd4/0xd8
[   35.916672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.916745]  kasan_atomics+0xb8/0x2e0
[   35.916790]  kunit_try_run_case+0x170/0x3f0
[   35.916839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.916893]  kthread+0x328/0x630
[   35.916933]  ret_from_fork+0x10/0x20
[   35.916986] 
[   35.917015] The buggy address belongs to the object at fff00000c768c580
[   35.917015]  which belongs to the cache kmalloc-64 of size 64
[   35.917090] The buggy address is located 0 bytes to the right of
[   35.917090]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.917165] 
[   35.917193] The buggy address belongs to the physical page:
[   35.917236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.917303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.917369] page_type: f5(slab)
[   35.917423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.917484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.917536] page dumped because: kasan: bad access detected
[   35.917576] 
[   35.917599] Memory state around the buggy address:
[   35.917717]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.917822]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.917940] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.918053]                                      ^
[   35.918121]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.918177]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.918226] ==================================================================
[   36.137606] ==================================================================
[   36.137749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.137878] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.138011] 
[   36.138105] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.138335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.138405] Hardware name: linux,dummy-virt (DT)
[   36.138494] Call trace:
[   36.139125]  show_stack+0x20/0x38 (C)
[   36.139471]  dump_stack_lvl+0x8c/0xd0
[   36.139798]  print_report+0x118/0x608
[   36.140117]  kasan_report+0xdc/0x128
[   36.140495]  kasan_check_range+0x100/0x1a8
[   36.140637]  __kasan_check_write+0x20/0x30
[   36.141168]  kasan_atomics_helper+0x16d0/0x4858
[   36.141307]  kasan_atomics+0x198/0x2e0
[   36.141780]  kunit_try_run_case+0x170/0x3f0
[   36.141911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.142119]  kthread+0x328/0x630
[   36.142244]  ret_from_fork+0x10/0x20
[   36.142508] 
[   36.142605] Allocated by task 276:
[   36.142812]  kasan_save_stack+0x3c/0x68
[   36.143195]  kasan_save_track+0x20/0x40
[   36.143354]  kasan_save_alloc_info+0x40/0x58
[   36.143681]  __kasan_kmalloc+0xd4/0xd8
[   36.143798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.143983]  kasan_atomics+0xb8/0x2e0
[   36.144187]  kunit_try_run_case+0x170/0x3f0
[   36.144513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.144843]  kthread+0x328/0x630
[   36.144953]  ret_from_fork+0x10/0x20
[   36.145158] 
[   36.145229] The buggy address belongs to the object at fff00000c768c580
[   36.145229]  which belongs to the cache kmalloc-64 of size 64
[   36.145355] The buggy address is located 0 bytes to the right of
[   36.145355]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.145740] 
[   36.145806] The buggy address belongs to the physical page:
[   36.145951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.146175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.146452] page_type: f5(slab)
[   36.146564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.146714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.146830] page dumped because: kasan: bad access detected
[   36.146918] 
[   36.147282] Memory state around the buggy address:
[   36.147381]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.147606]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.147867] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.148439]                                      ^
[   36.148556]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.148696]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.148809] ==================================================================
[   36.052006] ==================================================================
[   36.052091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.052174] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.052236] 
[   36.052290] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.052540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.052633] Hardware name: linux,dummy-virt (DT)
[   36.052729] Call trace:
[   36.052790]  show_stack+0x20/0x38 (C)
[   36.052859]  dump_stack_lvl+0x8c/0xd0
[   36.052919]  print_report+0x118/0x608
[   36.052975]  kasan_report+0xdc/0x128
[   36.053031]  kasan_check_range+0x100/0x1a8
[   36.053088]  __kasan_check_write+0x20/0x30
[   36.053140]  kasan_atomics_helper+0x12d8/0x4858
[   36.053197]  kasan_atomics+0x198/0x2e0
[   36.053251]  kunit_try_run_case+0x170/0x3f0
[   36.053309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.053371]  kthread+0x328/0x630
[   36.053422]  ret_from_fork+0x10/0x20
[   36.053482] 
[   36.053508] Allocated by task 276:
[   36.053547]  kasan_save_stack+0x3c/0x68
[   36.053601]  kasan_save_track+0x20/0x40
[   36.053865]  kasan_save_alloc_info+0x40/0x58
[   36.054171]  __kasan_kmalloc+0xd4/0xd8
[   36.054507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.054733]  kasan_atomics+0xb8/0x2e0
[   36.054817]  kunit_try_run_case+0x170/0x3f0
[   36.054895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.054995]  kthread+0x328/0x630
[   36.055081]  ret_from_fork+0x10/0x20
[   36.055180] 
[   36.055236] The buggy address belongs to the object at fff00000c768c580
[   36.055236]  which belongs to the cache kmalloc-64 of size 64
[   36.055699] The buggy address is located 0 bytes to the right of
[   36.055699]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.055908] 
[   36.056600] The buggy address belongs to the physical page:
[   36.056731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.056971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.057672] page_type: f5(slab)
[   36.057802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.058025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.058267] page dumped because: kasan: bad access detected
[   36.058392] 
[   36.058450] Memory state around the buggy address:
[   36.058877]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.059017]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.059140] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.059249]                                      ^
[   36.059346]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059483]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059594] ==================================================================
[   36.077360] ==================================================================
[   36.077451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.077545] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.077627] 
[   36.077720] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.077944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.078071] Hardware name: linux,dummy-virt (DT)
[   36.078162] Call trace:
[   36.078231]  show_stack+0x20/0x38 (C)
[   36.078355]  dump_stack_lvl+0x8c/0xd0
[   36.078474]  print_report+0x118/0x608
[   36.078591]  kasan_report+0xdc/0x128
[   36.078730]  kasan_check_range+0x100/0x1a8
[   36.078831]  __kasan_check_write+0x20/0x30
[   36.078916]  kasan_atomics_helper+0x1414/0x4858
[   36.079018]  kasan_atomics+0x198/0x2e0
[   36.079132]  kunit_try_run_case+0x170/0x3f0
[   36.079537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.079763]  kthread+0x328/0x630
[   36.080154]  ret_from_fork+0x10/0x20
[   36.080289] 
[   36.080341] Allocated by task 276:
[   36.080421]  kasan_save_stack+0x3c/0x68
[   36.080531]  kasan_save_track+0x20/0x40
[   36.080640]  kasan_save_alloc_info+0x40/0x58
[   36.080752]  __kasan_kmalloc+0xd4/0xd8
[   36.080845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.080948]  kasan_atomics+0xb8/0x2e0
[   36.081047]  kunit_try_run_case+0x170/0x3f0
[   36.081150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.081268]  kthread+0x328/0x630
[   36.081356]  ret_from_fork+0x10/0x20
[   36.081450] 
[   36.081508] The buggy address belongs to the object at fff00000c768c580
[   36.081508]  which belongs to the cache kmalloc-64 of size 64
[   36.082634] The buggy address is located 0 bytes to the right of
[   36.082634]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.082850] 
[   36.083743] The buggy address belongs to the physical page:
[   36.083862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.084511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.084924] page_type: f5(slab)
[   36.085030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.085109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.085165] page dumped because: kasan: bad access detected
[   36.085212] 
[   36.085253] Memory state around the buggy address:
[   36.085308]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085363]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085415] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.085462]                                      ^
[   36.085506]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.085558]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.085605] ==================================================================
[   36.130226] ==================================================================
[   36.130406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.130531] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.130663] 
[   36.130792] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.131038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.131113] Hardware name: linux,dummy-virt (DT)
[   36.131188] Call trace:
[   36.131243]  show_stack+0x20/0x38 (C)
[   36.131374]  dump_stack_lvl+0x8c/0xd0
[   36.131510]  print_report+0x118/0x608
[   36.131679]  kasan_report+0xdc/0x128
[   36.131838]  __asan_report_load8_noabort+0x20/0x30
[   36.131996]  kasan_atomics_helper+0x3df4/0x4858
[   36.132153]  kasan_atomics+0x198/0x2e0
[   36.132285]  kunit_try_run_case+0x170/0x3f0
[   36.132467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132596]  kthread+0x328/0x630
[   36.132716]  ret_from_fork+0x10/0x20
[   36.132901] 
[   36.132972] Allocated by task 276:
[   36.133056]  kasan_save_stack+0x3c/0x68
[   36.133196]  kasan_save_track+0x20/0x40
[   36.133302]  kasan_save_alloc_info+0x40/0x58
[   36.133415]  __kasan_kmalloc+0xd4/0xd8
[   36.133549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.133676]  kasan_atomics+0xb8/0x2e0
[   36.133769]  kunit_try_run_case+0x170/0x3f0
[   36.133879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.133990]  kthread+0x328/0x630
[   36.134072]  ret_from_fork+0x10/0x20
[   36.134152] 
[   36.134198] The buggy address belongs to the object at fff00000c768c580
[   36.134198]  which belongs to the cache kmalloc-64 of size 64
[   36.134355] The buggy address is located 0 bytes to the right of
[   36.134355]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.134529] 
[   36.134581] The buggy address belongs to the physical page:
[   36.134687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.134873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.135028] page_type: f5(slab)
[   36.135183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.135323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.135450] page dumped because: kasan: bad access detected
[   36.135540] 
[   36.135598] Memory state around the buggy address:
[   36.135736]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.135867]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.135995] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.136144]                                      ^
[   36.136274]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136423]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136529] ==================================================================
[   35.689979] ==================================================================
[   35.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.690136] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.690199] 
[   35.690247] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.690353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.690389] Hardware name: linux,dummy-virt (DT)
[   35.690430] Call trace:
[   35.690462]  show_stack+0x20/0x38 (C)
[   35.690525]  dump_stack_lvl+0x8c/0xd0
[   35.690581]  print_report+0x118/0x608
[   35.690890]  kasan_report+0xdc/0x128
[   35.691252]  __asan_report_load4_noabort+0x20/0x30
[   35.691365]  kasan_atomics_helper+0x42d8/0x4858
[   35.691528]  kasan_atomics+0x198/0x2e0
[   35.692267]  kunit_try_run_case+0x170/0x3f0
[   35.692693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.693021]  kthread+0x328/0x630
[   35.693234]  ret_from_fork+0x10/0x20
[   35.693539] 
[   35.693633] Allocated by task 276:
[   35.693714]  kasan_save_stack+0x3c/0x68
[   35.693808]  kasan_save_track+0x20/0x40
[   35.693907]  kasan_save_alloc_info+0x40/0x58
[   35.694010]  __kasan_kmalloc+0xd4/0xd8
[   35.694308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.694425]  kasan_atomics+0xb8/0x2e0
[   35.694549]  kunit_try_run_case+0x170/0x3f0
[   35.694834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.694966]  kthread+0x328/0x630
[   35.695060]  ret_from_fork+0x10/0x20
[   35.695158] 
[   35.695213] The buggy address belongs to the object at fff00000c768c580
[   35.695213]  which belongs to the cache kmalloc-64 of size 64
[   35.695402] The buggy address is located 0 bytes to the right of
[   35.695402]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.695600] 
[   35.695671] The buggy address belongs to the physical page:
[   35.695760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.695961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.696105] page_type: f5(slab)
[   35.696208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.696336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.696664] page dumped because: kasan: bad access detected
[   35.696846] 
[   35.696906] Memory state around the buggy address:
[   35.697380]                                      ^
[   35.700717]  print_report+0x118/0x608
[   35.703559]  __kasan_kmalloc+0xd4/0xd8
[   35.703657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.703743]  kasan_atomics+0xb8/0x2e0
[   35.703823]  kunit_try_run_case+0x170/0x3f0
[   35.703917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.704033]  kthread+0x328/0x630
[   35.704124]  ret_from_fork+0x10/0x20
[   35.704222] 
[   35.704276] The buggy address belongs to the object at fff00000c768c580
[   35.704276]  which belongs to the cache kmalloc-64 of size 64
[   35.705037] The buggy address is located 0 bytes to the right of
[   35.705037]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.705448] 
[   35.705737] The buggy address belongs to the physical page:
[   35.705862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.706110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.706312] page_type: f5(slab)
[   35.706460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.706604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.707107] page dumped because: kasan: bad access detected
[   35.708004] 
[   35.708150] Memory state around the buggy address:
[   35.708256]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.708376]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.708503] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.709216]                                      ^
[   35.709640]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709852]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709968] ==================================================================
[   36.041591] ==================================================================
[   36.041752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.041888] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.041995] 
[   36.042089] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.042467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.042803] Hardware name: linux,dummy-virt (DT)
[   36.042899] Call trace:
[   36.042971]  show_stack+0x20/0x38 (C)
[   36.043109]  dump_stack_lvl+0x8c/0xd0
[   36.043230]  print_report+0x118/0x608
[   36.043348]  kasan_report+0xdc/0x128
[   36.043483]  kasan_check_range+0x100/0x1a8
[   36.043618]  __kasan_check_write+0x20/0x30
[   36.043722]  kasan_atomics_helper+0x126c/0x4858
[   36.043837]  kasan_atomics+0x198/0x2e0
[   36.043956]  kunit_try_run_case+0x170/0x3f0
[   36.044069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.044202]  kthread+0x328/0x630
[   36.044380]  ret_from_fork+0x10/0x20
[   36.044497] 
[   36.044556] Allocated by task 276:
[   36.044670]  kasan_save_stack+0x3c/0x68
[   36.044786]  kasan_save_track+0x20/0x40
[   36.044871]  kasan_save_alloc_info+0x40/0x58
[   36.045253]  __kasan_kmalloc+0xd4/0xd8
[   36.045377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.045928]  kasan_atomics+0xb8/0x2e0
[   36.046071]  kunit_try_run_case+0x170/0x3f0
[   36.046168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.046255]  kthread+0x328/0x630
[   36.046317]  ret_from_fork+0x10/0x20
[   36.046422] 
[   36.046475] The buggy address belongs to the object at fff00000c768c580
[   36.046475]  which belongs to the cache kmalloc-64 of size 64
[   36.046633] The buggy address is located 0 bytes to the right of
[   36.046633]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.046788] 
[   36.046847] The buggy address belongs to the physical page:
[   36.046925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.047064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.047219] page_type: f5(slab)
[   36.047676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.048017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.048356] page dumped because: kasan: bad access detected
[   36.048452] 
[   36.048507] Memory state around the buggy address:
[   36.048595]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.048712]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.048783] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.048831]                                      ^
[   36.048876]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.048929]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.048976] ==================================================================
[   35.829134] ==================================================================
[   35.829269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.829959] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.830126] 
[   35.830227] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.830462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.830537] Hardware name: linux,dummy-virt (DT)
[   35.830637] Call trace:
[   35.831637]  show_stack+0x20/0x38 (C)
[   35.831824]  dump_stack_lvl+0x8c/0xd0
[   35.832332]  print_report+0x118/0x608
[   35.832507]  kasan_report+0xdc/0x128
[   35.832634]  __asan_report_load4_noabort+0x20/0x30
[   35.832739]  kasan_atomics_helper+0x3e04/0x4858
[   35.832860]  kasan_atomics+0x198/0x2e0
[   35.832976]  kunit_try_run_case+0x170/0x3f0
[   35.833117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.834308]  kthread+0x328/0x630
[   35.834820]  ret_from_fork+0x10/0x20
[   35.834977] 
[   35.835202] Allocated by task 276:
[   35.835601]  kasan_save_stack+0x3c/0x68
[   35.836108]  kasan_save_track+0x20/0x40
[   35.836276]  kasan_save_alloc_info+0x40/0x58
[   35.836386]  __kasan_kmalloc+0xd4/0xd8
[   35.836465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.836545]  kasan_atomics+0xb8/0x2e0
[   35.836641]  kunit_try_run_case+0x170/0x3f0
[   35.836749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.836872]  kthread+0x328/0x630
[   35.836962]  ret_from_fork+0x10/0x20
[   35.838004] 
[   35.838288] The buggy address belongs to the object at fff00000c768c580
[   35.838288]  which belongs to the cache kmalloc-64 of size 64
[   35.838654] The buggy address is located 0 bytes to the right of
[   35.838654]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.838846] 
[   35.838907] The buggy address belongs to the physical page:
[   35.839370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.839627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.839826] page_type: f5(slab)
[   35.839937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.840086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.840208] page dumped because: kasan: bad access detected
[   35.840297] 
[   35.840719] Memory state around the buggy address:
[   35.840838]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.841104]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.841890] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.842111]                                      ^
[   35.842563]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842718]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842833] ==================================================================
[   36.069504] ==================================================================
[   36.069643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.069780] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.069918] 
[   36.070009] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.070232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.070310] Hardware name: linux,dummy-virt (DT)
[   36.070403] Call trace:
[   36.070466]  show_stack+0x20/0x38 (C)
[   36.070598]  dump_stack_lvl+0x8c/0xd0
[   36.070734]  print_report+0x118/0x608
[   36.070893]  kasan_report+0xdc/0x128
[   36.071009]  __asan_report_load8_noabort+0x20/0x30
[   36.071136]  kasan_atomics_helper+0x3f04/0x4858
[   36.071406]  kasan_atomics+0x198/0x2e0
[   36.071914]  kunit_try_run_case+0x170/0x3f0
[   36.072078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072214]  kthread+0x328/0x630
[   36.072375]  ret_from_fork+0x10/0x20
[   36.072603] 
[   36.072725] Allocated by task 276:
[   36.072840]  kasan_save_stack+0x3c/0x68
[   36.072956]  kasan_save_track+0x20/0x40
[   36.073059]  kasan_save_alloc_info+0x40/0x58
[   36.073167]  __kasan_kmalloc+0xd4/0xd8
[   36.073264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.073350]  kasan_atomics+0xb8/0x2e0
[   36.073417]  kunit_try_run_case+0x170/0x3f0
[   36.073524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.073654]  kthread+0x328/0x630
[   36.073737]  ret_from_fork+0x10/0x20
[   36.073830] 
[   36.073973] The buggy address belongs to the object at fff00000c768c580
[   36.073973]  which belongs to the cache kmalloc-64 of size 64
[   36.074170] The buggy address is located 0 bytes to the right of
[   36.074170]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.074333] 
[   36.074399] The buggy address belongs to the physical page:
[   36.074482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.074749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.074933] page_type: f5(slab)
[   36.075069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.075213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.075344] page dumped because: kasan: bad access detected
[   36.075442] 
[   36.075606] Memory state around the buggy address:
[   36.075733]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075855]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076027] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.076183]                                      ^
[   36.076349]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.076472]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.076575] ==================================================================
[   35.750655] ==================================================================
[   35.750786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.750946] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.751279] 
[   35.751384] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.751647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.751727] Hardware name: linux,dummy-virt (DT)
[   35.751816] Call trace:
[   35.751873]  show_stack+0x20/0x38 (C)
[   35.751974]  dump_stack_lvl+0x8c/0xd0
[   35.752066]  print_report+0x118/0x608
[   35.752169]  kasan_report+0xdc/0x128
[   35.752275]  __asan_report_load4_noabort+0x20/0x30
[   35.752399]  kasan_atomics_helper+0x3dcc/0x4858
[   35.752520]  kasan_atomics+0x198/0x2e0
[   35.752661]  kunit_try_run_case+0x170/0x3f0
[   35.752788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.752922]  kthread+0x328/0x630
[   35.753037]  ret_from_fork+0x10/0x20
[   35.753167] 
[   35.753221] Allocated by task 276:
[   35.753315]  kasan_save_stack+0x3c/0x68
[   35.753447]  kasan_save_track+0x20/0x40
[   35.753550]  kasan_save_alloc_info+0x40/0x58
[   35.753653]  __kasan_kmalloc+0xd4/0xd8
[   35.753734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.753816]  kasan_atomics+0xb8/0x2e0
[   35.753894]  kunit_try_run_case+0x170/0x3f0
[   35.753986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754110]  kthread+0x328/0x630
[   35.754344]  ret_from_fork+0x10/0x20
[   35.754430] 
[   35.754478] The buggy address belongs to the object at fff00000c768c580
[   35.754478]  which belongs to the cache kmalloc-64 of size 64
[   35.754638] The buggy address is located 0 bytes to the right of
[   35.754638]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.754793] 
[   35.754846] The buggy address belongs to the physical page:
[   35.754913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.755346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.755525] page_type: f5(slab)
[   35.755633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.755774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.756221] page dumped because: kasan: bad access detected
[   35.756545] 
[   35.756599] Memory state around the buggy address:
[   35.756700]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.756927]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.757073] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.757185]                                      ^
[   35.757377]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.757511]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.757605] ==================================================================
[   35.967035] ==================================================================
[   35.967445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.967593] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.968178] 
[   35.968688] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.969163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.969357] Hardware name: linux,dummy-virt (DT)
[   35.969559] Call trace:
[   35.969627]  show_stack+0x20/0x38 (C)
[   35.969975]  dump_stack_lvl+0x8c/0xd0
[   35.970105]  print_report+0x118/0x608
[   35.970471]  kasan_report+0xdc/0x128
[   35.970664]  kasan_check_range+0x100/0x1a8
[   35.971246]  __kasan_check_write+0x20/0x30
[   35.971762]  kasan_atomics_helper+0x10c0/0x4858
[   35.972208]  kasan_atomics+0x198/0x2e0
[   35.972346]  kunit_try_run_case+0x170/0x3f0
[   35.972762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.973645]  kthread+0x328/0x630
[   35.973813]  ret_from_fork+0x10/0x20
[   35.974260] 
[   35.974365] Allocated by task 276:
[   35.974786]  kasan_save_stack+0x3c/0x68
[   35.975014]  kasan_save_track+0x20/0x40
[   35.975117]  kasan_save_alloc_info+0x40/0x58
[   35.975867]  __kasan_kmalloc+0xd4/0xd8
[   35.976185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.976295]  kasan_atomics+0xb8/0x2e0
[   35.976390]  kunit_try_run_case+0x170/0x3f0
[   35.976797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.977470]  kthread+0x328/0x630
[   35.977587]  ret_from_fork+0x10/0x20
[   35.977700] 
[   35.977885] The buggy address belongs to the object at fff00000c768c580
[   35.977885]  which belongs to the cache kmalloc-64 of size 64
[   35.978551] The buggy address is located 0 bytes to the right of
[   35.978551]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.979220] 
[   35.979312] The buggy address belongs to the physical page:
[   35.979669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.979843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.979978] page_type: f5(slab)
[   35.980102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.980247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.981336] page dumped because: kasan: bad access detected
[   35.981795] 
[   35.982008] Memory state around the buggy address:
[   35.982132]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.982269]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.982588] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.983295]                                      ^
[   35.983452]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.983675]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984359] ==================================================================
[   35.926582] ==================================================================
[   35.926719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.926841] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.926973] 
[   35.927064] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.927289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.927362] Hardware name: linux,dummy-virt (DT)
[   35.927464] Call trace:
[   35.927529]  show_stack+0x20/0x38 (C)
[   35.927654]  dump_stack_lvl+0x8c/0xd0
[   35.927748]  print_report+0x118/0x608
[   35.927859]  kasan_report+0xdc/0x128
[   35.927975]  kasan_check_range+0x100/0x1a8
[   35.928131]  __kasan_check_write+0x20/0x30
[   35.928244]  kasan_atomics_helper+0xf88/0x4858
[   35.928371]  kasan_atomics+0x198/0x2e0
[   35.928482]  kunit_try_run_case+0x170/0x3f0
[   35.928624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.928795]  kthread+0x328/0x630
[   35.928907]  ret_from_fork+0x10/0x20
[   35.929069] 
[   35.929124] Allocated by task 276:
[   35.929253]  kasan_save_stack+0x3c/0x68
[   35.929365]  kasan_save_track+0x20/0x40
[   35.929710]  kasan_save_alloc_info+0x40/0x58
[   35.929838]  __kasan_kmalloc+0xd4/0xd8
[   35.929960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.930120]  kasan_atomics+0xb8/0x2e0
[   35.930369]  kunit_try_run_case+0x170/0x3f0
[   35.930667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.930789]  kthread+0x328/0x630
[   35.930886]  ret_from_fork+0x10/0x20
[   35.930978] 
[   35.931167] The buggy address belongs to the object at fff00000c768c580
[   35.931167]  which belongs to the cache kmalloc-64 of size 64
[   35.931557] The buggy address is located 0 bytes to the right of
[   35.931557]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.932007] 
[   35.932269] The buggy address belongs to the physical page:
[   35.932385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.932753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.933157] page_type: f5(slab)
[   35.933356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.933795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.933992] page dumped because: kasan: bad access detected
[   35.934325] 
[   35.934387] Memory state around the buggy address:
[   35.934507]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.934642]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.934764] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.935155]                                      ^
[   35.935656]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935960]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.936141] ==================================================================
[   35.743879] ==================================================================
[   35.744433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.744575] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.744691] 
[   35.744782] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.745022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.745099] Hardware name: linux,dummy-virt (DT)
[   35.745189] Call trace:
[   35.745256]  show_stack+0x20/0x38 (C)
[   35.747664]  dump_stack_lvl+0x8c/0xd0
[   35.747789]  print_report+0x118/0x608
[   35.747853]  kasan_report+0xdc/0x128
[   35.747947]  kasan_check_range+0x100/0x1a8
[   35.748021]  __kasan_check_write+0x20/0x30
[   35.748077]  kasan_atomics_helper+0xad4/0x4858
[   35.748136]  kasan_atomics+0x198/0x2e0
[   35.748190]  kunit_try_run_case+0x170/0x3f0
[   35.748250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.748366]  kthread+0x328/0x630
[   35.748478]  ret_from_fork+0x10/0x20
[   35.748601] 
[   35.748668] Allocated by task 276:
[   35.748716]  kasan_save_stack+0x3c/0x68
[   35.748776]  kasan_save_track+0x20/0x40
[   35.748821]  kasan_save_alloc_info+0x40/0x58
[   35.748868]  __kasan_kmalloc+0xd4/0xd8
[   35.748914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.748961]  kasan_atomics+0xb8/0x2e0
[   35.749005]  kunit_try_run_case+0x170/0x3f0
[   35.749050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.749102]  kthread+0x328/0x630
[   35.749143]  ret_from_fork+0x10/0x20
[   35.749187] 
[   35.749213] The buggy address belongs to the object at fff00000c768c580
[   35.749213]  which belongs to the cache kmalloc-64 of size 64
[   35.749284] The buggy address is located 0 bytes to the right of
[   35.749284]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.749360] 
[   35.749389] The buggy address belongs to the physical page:
[   35.749431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.749497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.749564] page_type: f5(slab)
[   35.749638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.749704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.749754] page dumped because: kasan: bad access detected
[   35.749796] 
[   35.749819] Memory state around the buggy address:
[   35.749863]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.749916]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.749968] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.750015]                                      ^
[   35.750058]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.750107]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.750154] ==================================================================
[   36.166143] ==================================================================
[   36.166464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.166992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.167230] 
[   36.167430] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.167751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.168087] Hardware name: linux,dummy-virt (DT)
[   36.168409] Call trace:
[   36.168537]  show_stack+0x20/0x38 (C)
[   36.168850]  dump_stack_lvl+0x8c/0xd0
[   36.168980]  print_report+0x118/0x608
[   36.169149]  kasan_report+0xdc/0x128
[   36.169517]  kasan_check_range+0x100/0x1a8
[   36.170238]  __kasan_check_write+0x20/0x30
[   36.170406]  kasan_atomics_helper+0x175c/0x4858
[   36.170542]  kasan_atomics+0x198/0x2e0
[   36.170682]  kunit_try_run_case+0x170/0x3f0
[   36.170997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.171322]  kthread+0x328/0x630
[   36.171446]  ret_from_fork+0x10/0x20
[   36.172095] 
[   36.172357] Allocated by task 276:
[   36.172440]  kasan_save_stack+0x3c/0x68
[   36.172786]  kasan_save_track+0x20/0x40
[   36.173103]  kasan_save_alloc_info+0x40/0x58
[   36.173294]  __kasan_kmalloc+0xd4/0xd8
[   36.173371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.173494]  kasan_atomics+0xb8/0x2e0
[   36.173587]  kunit_try_run_case+0x170/0x3f0
[   36.173699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.173979]  kthread+0x328/0x630
[   36.174517]  ret_from_fork+0x10/0x20
[   36.174822] 
[   36.174973] The buggy address belongs to the object at fff00000c768c580
[   36.174973]  which belongs to the cache kmalloc-64 of size 64
[   36.175163] The buggy address is located 0 bytes to the right of
[   36.175163]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.176288] 
[   36.176367] The buggy address belongs to the physical page:
[   36.176454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.176565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.176661] page_type: f5(slab)
[   36.176720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.176782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.176831] page dumped because: kasan: bad access detected
[   36.176873] 
[   36.176897] Memory state around the buggy address:
[   36.176940]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.176994]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.177047] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.177094]                                      ^
[   36.177137]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177188]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177236] ==================================================================
[   35.710861] ==================================================================
[   35.710941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.711026] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.711085] 
[   35.711137] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.711244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.711277] Hardware name: linux,dummy-virt (DT)
[   35.711319] Call trace:
[   35.711351]  show_stack+0x20/0x38 (C)
[   35.711413]  dump_stack_lvl+0x8c/0xd0
[   35.711494]  print_report+0x118/0x608
[   35.711553]  kasan_report+0xdc/0x128
[   35.711624]  kasan_check_range+0x100/0x1a8
[   35.711725]  __kasan_check_write+0x20/0x30
[   35.711836]  kasan_atomics_helper+0x99c/0x4858
[   35.711923]  kasan_atomics+0x198/0x2e0
[   35.711981]  kunit_try_run_case+0x170/0x3f0
[   35.712054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.712145]  kthread+0x328/0x630
[   35.712198]  ret_from_fork+0x10/0x20
[   35.712258] 
[   35.712286] Allocated by task 276:
[   35.714719]  kasan_save_stack+0x3c/0x68
[   35.714856]  kasan_save_track+0x20/0x40
[   35.714958]  kasan_save_alloc_info+0x40/0x58
[   35.715076]  __kasan_kmalloc+0xd4/0xd8
[   35.715171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.715262]  kasan_atomics+0xb8/0x2e0
[   35.715308]  kunit_try_run_case+0x170/0x3f0
[   35.715358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.715445]  kthread+0x328/0x630
[   35.715518]  ret_from_fork+0x10/0x20
[   35.715562] 
[   35.715591] The buggy address belongs to the object at fff00000c768c580
[   35.715591]  which belongs to the cache kmalloc-64 of size 64
[   35.715746] The buggy address is located 0 bytes to the right of
[   35.715746]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.715925] 
[   35.715982] The buggy address belongs to the physical page:
[   35.716074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.716204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.716345] page_type: f5(slab)
[   35.716436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.716606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.716811] page dumped because: kasan: bad access detected
[   35.716958] 
[   35.717098] Memory state around the buggy address:
[   35.717190]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.717309]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.717437] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.717530]                                      ^
[   35.717633]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.717737]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.717834] ==================================================================
[   35.987305] ==================================================================
[   35.987486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.987997] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.988265] 
[   35.988839] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.989352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.989618] Hardware name: linux,dummy-virt (DT)
[   35.989783] Call trace:
[   35.990046]  show_stack+0x20/0x38 (C)
[   35.990436]  dump_stack_lvl+0x8c/0xd0
[   35.990657]  print_report+0x118/0x608
[   35.991555]  kasan_report+0xdc/0x128
[   35.992258]  kasan_check_range+0x100/0x1a8
[   35.992627]  __kasan_check_write+0x20/0x30
[   35.992739]  kasan_atomics_helper+0x1128/0x4858
[   35.992831]  kasan_atomics+0x198/0x2e0
[   35.993349]  kunit_try_run_case+0x170/0x3f0
[   35.994191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.994452]  kthread+0x328/0x630
[   35.995107]  ret_from_fork+0x10/0x20
[   35.995574] 
[   35.996108] Allocated by task 276:
[   35.996261]  kasan_save_stack+0x3c/0x68
[   35.997065]  kasan_save_track+0x20/0x40
[   35.997466]  kasan_save_alloc_info+0x40/0x58
[   35.997683]  __kasan_kmalloc+0xd4/0xd8
[   35.997994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.998202]  kasan_atomics+0xb8/0x2e0
[   35.998302]  kunit_try_run_case+0x170/0x3f0
[   35.998409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998534]  kthread+0x328/0x630
[   35.999748]  ret_from_fork+0x10/0x20
[   36.000166] 
[   36.000758] The buggy address belongs to the object at fff00000c768c580
[   36.000758]  which belongs to the cache kmalloc-64 of size 64
[   36.000914] The buggy address is located 0 bytes to the right of
[   36.000914]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.001083] 
[   36.001700] The buggy address belongs to the physical page:
[   36.002151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.002807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.003233] page_type: f5(slab)
[   36.003579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.004351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.004689] page dumped because: kasan: bad access detected
[   36.004981] 
[   36.005045] Memory state around the buggy address:
[   36.005151]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.005278]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.005805] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.006046]                                      ^
[   36.006125]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.006216]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.006294] ==================================================================
[   35.807990] ==================================================================
[   35.808120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.808250] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.808386] 
[   35.808480] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.808725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.808806] Hardware name: linux,dummy-virt (DT)
[   35.808896] Call trace:
[   35.808959]  show_stack+0x20/0x38 (C)
[   35.809090]  dump_stack_lvl+0x8c/0xd0
[   35.809218]  print_report+0x118/0x608
[   35.809338]  kasan_report+0xdc/0x128
[   35.809480]  __asan_report_load4_noabort+0x20/0x30
[   35.809624]  kasan_atomics_helper+0x3dd8/0x4858
[   35.809745]  kasan_atomics+0x198/0x2e0
[   35.809899]  kunit_try_run_case+0x170/0x3f0
[   35.810233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.810398]  kthread+0x328/0x630
[   35.810518]  ret_from_fork+0x10/0x20
[   35.810661] 
[   35.811269] Allocated by task 276:
[   35.811406]  kasan_save_stack+0x3c/0x68
[   35.811528]  kasan_save_track+0x20/0x40
[   35.811816]  kasan_save_alloc_info+0x40/0x58
[   35.811921]  __kasan_kmalloc+0xd4/0xd8
[   35.812027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.812135]  kasan_atomics+0xb8/0x2e0
[   35.812232]  kunit_try_run_case+0x170/0x3f0
[   35.812367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.812504]  kthread+0x328/0x630
[   35.812643]  ret_from_fork+0x10/0x20
[   35.812777] 
[   35.812855] The buggy address belongs to the object at fff00000c768c580
[   35.812855]  which belongs to the cache kmalloc-64 of size 64
[   35.813076] The buggy address is located 0 bytes to the right of
[   35.813076]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.813324] 
[   35.813391] The buggy address belongs to the physical page:
[   35.813482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.813640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.813783] page_type: f5(slab)
[   35.813909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.814100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.814262] page dumped because: kasan: bad access detected
[   35.814369] 
[   35.814416] Memory state around the buggy address:
[   35.814665]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.814946]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.815072] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.815676]                                      ^
[   35.816051]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.816276]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.816380] ==================================================================
[   36.179957] ==================================================================
[   36.180156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.180307] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.180445] 
[   36.180543] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.180767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.180845] Hardware name: linux,dummy-virt (DT)
[   36.180935] Call trace:
[   36.181003]  show_stack+0x20/0x38 (C)
[   36.181145]  dump_stack_lvl+0x8c/0xd0
[   36.181290]  print_report+0x118/0x608
[   36.181417]  kasan_report+0xdc/0x128
[   36.181539]  __asan_report_load8_noabort+0x20/0x30
[   36.182195]  kasan_atomics_helper+0x3e20/0x4858
[   36.182498]  kasan_atomics+0x198/0x2e0
[   36.182623]  kunit_try_run_case+0x170/0x3f0
[   36.182722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.182825]  kthread+0x328/0x630
[   36.183413]  ret_from_fork+0x10/0x20
[   36.183642] 
[   36.183769] Allocated by task 276:
[   36.183859]  kasan_save_stack+0x3c/0x68
[   36.183987]  kasan_save_track+0x20/0x40
[   36.184087]  kasan_save_alloc_info+0x40/0x58
[   36.184379]  __kasan_kmalloc+0xd4/0xd8
[   36.184514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.184635]  kasan_atomics+0xb8/0x2e0
[   36.184758]  kunit_try_run_case+0x170/0x3f0
[   36.184912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.185042]  kthread+0x328/0x630
[   36.185156]  ret_from_fork+0x10/0x20
[   36.185259] 
[   36.185313] The buggy address belongs to the object at fff00000c768c580
[   36.185313]  which belongs to the cache kmalloc-64 of size 64
[   36.185481] The buggy address is located 0 bytes to the right of
[   36.185481]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.185664] 
[   36.185719] The buggy address belongs to the physical page:
[   36.185814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.185958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.186564] page_type: f5(slab)
[   36.186738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.186884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.187001] page dumped because: kasan: bad access detected
[   36.187080] 
[   36.187311] Memory state around the buggy address:
[   36.187486]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.187654]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.187781] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.187891]                                      ^
[   36.188103]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.188194]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.188270] ==================================================================
[   35.844971] ==================================================================
[   35.845103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.845250] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.845388] 
[   35.845483] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.845739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.845822] Hardware name: linux,dummy-virt (DT)
[   35.845913] Call trace:
[   35.845982]  show_stack+0x20/0x38 (C)
[   35.847361]  dump_stack_lvl+0x8c/0xd0
[   35.847778]  print_report+0x118/0x608
[   35.848353]  kasan_report+0xdc/0x128
[   35.848492]  kasan_check_range+0x100/0x1a8
[   35.849125]  __kasan_check_read+0x20/0x30
[   35.849400]  kasan_atomics_helper+0xdd4/0x4858
[   35.850064]  kasan_atomics+0x198/0x2e0
[   35.850217]  kunit_try_run_case+0x170/0x3f0
[   35.850355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.850946]  kthread+0x328/0x630
[   35.851084]  ret_from_fork+0x10/0x20
[   35.851624] 
[   35.851695] Allocated by task 276:
[   35.852110]  kasan_save_stack+0x3c/0x68
[   35.852239]  kasan_save_track+0x20/0x40
[   35.852884]  kasan_save_alloc_info+0x40/0x58
[   35.853270]  __kasan_kmalloc+0xd4/0xd8
[   35.853541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.853652]  kasan_atomics+0xb8/0x2e0
[   35.853726]  kunit_try_run_case+0x170/0x3f0
[   35.853805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.853903]  kthread+0x328/0x630
[   35.853988]  ret_from_fork+0x10/0x20
[   35.854955] 
[   35.855043] The buggy address belongs to the object at fff00000c768c580
[   35.855043]  which belongs to the cache kmalloc-64 of size 64
[   35.855228] The buggy address is located 0 bytes to the right of
[   35.855228]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.855409] 
[   35.855481] The buggy address belongs to the physical page:
[   35.855573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.855732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.855867] page_type: f5(slab)
[   35.855977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.856190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.857146] page dumped because: kasan: bad access detected
[   35.857486] 
[   35.857539] Memory state around the buggy address:
[   35.857787]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858032]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858511] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.858653]                                      ^
[   35.859159]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859291]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859862] ==================================================================
[   35.728447] ==================================================================
[   35.728886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.729036] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.729783] 
[   35.730180] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.730587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.731135] Hardware name: linux,dummy-virt (DT)
[   35.731680] Call trace:
[   35.731763]  show_stack+0x20/0x38 (C)
[   35.731913]  dump_stack_lvl+0x8c/0xd0
[   35.732040]  print_report+0x118/0x608
[   35.734860]  kasan_report+0xdc/0x128
[   35.734985]  kasan_check_range+0x100/0x1a8
[   35.735120]  __kasan_check_write+0x20/0x30
[   35.735242]  kasan_atomics_helper+0xa6c/0x4858
[   35.735345]  kasan_atomics+0x198/0x2e0
[   35.735403]  kunit_try_run_case+0x170/0x3f0
[   35.735520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.735584]  kthread+0x328/0x630
[   35.735664]  ret_from_fork+0x10/0x20
[   35.735729] 
[   35.735756] Allocated by task 276:
[   35.735796]  kasan_save_stack+0x3c/0x68
[   35.735853]  kasan_save_track+0x20/0x40
[   35.735898]  kasan_save_alloc_info+0x40/0x58
[   35.735947]  __kasan_kmalloc+0xd4/0xd8
[   35.735990]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.736039]  kasan_atomics+0xb8/0x2e0
[   35.736080]  kunit_try_run_case+0x170/0x3f0
[   35.736128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.736180]  kthread+0x328/0x630
[   35.736218]  ret_from_fork+0x10/0x20
[   35.736261] 
[   35.736287] The buggy address belongs to the object at fff00000c768c580
[   35.736287]  which belongs to the cache kmalloc-64 of size 64
[   35.736385] The buggy address is located 0 bytes to the right of
[   35.736385]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.736459] 
[   35.736491] The buggy address belongs to the physical page:
[   35.736530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.736595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.736819] page_type: f5(slab)
[   35.737193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.737458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.737584] page dumped because: kasan: bad access detected
[   35.737707] 
[   35.738024] Memory state around the buggy address:
[   35.738343]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.738890]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.739681] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.739922]                                      ^
[   35.740270]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.740829]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.741065] ==================================================================
[   35.954092] ==================================================================
[   35.954232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.954796] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.955027] 
[   35.955405] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.955905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.956060] Hardware name: linux,dummy-virt (DT)
[   35.956302] Call trace:
[   35.956574]  show_stack+0x20/0x38 (C)
[   35.956878]  dump_stack_lvl+0x8c/0xd0
[   35.957130]  print_report+0x118/0x608
[   35.957284]  kasan_report+0xdc/0x128
[   35.957377]  kasan_check_range+0x100/0x1a8
[   35.957735]  __kasan_check_write+0x20/0x30
[   35.957948]  kasan_atomics_helper+0x1058/0x4858
[   35.958072]  kasan_atomics+0x198/0x2e0
[   35.958267]  kunit_try_run_case+0x170/0x3f0
[   35.958552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.959005]  kthread+0x328/0x630
[   35.959189]  ret_from_fork+0x10/0x20
[   35.959641] 
[   35.959803] Allocated by task 276:
[   35.960089]  kasan_save_stack+0x3c/0x68
[   35.960310]  kasan_save_track+0x20/0x40
[   35.960414]  kasan_save_alloc_info+0x40/0x58
[   35.960527]  __kasan_kmalloc+0xd4/0xd8
[   35.960634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.960844]  kasan_atomics+0xb8/0x2e0
[   35.961213]  kunit_try_run_case+0x170/0x3f0
[   35.961423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.961528]  kthread+0x328/0x630
[   35.961629]  ret_from_fork+0x10/0x20
[   35.961769] 
[   35.961871] The buggy address belongs to the object at fff00000c768c580
[   35.961871]  which belongs to the cache kmalloc-64 of size 64
[   35.962160] The buggy address is located 0 bytes to the right of
[   35.962160]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.962814] 
[   35.962939] The buggy address belongs to the physical page:
[   35.963170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.963499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.963921] page_type: f5(slab)
[   35.964266] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.964481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.964686] page dumped because: kasan: bad access detected
[   35.964794] 
[   35.964850] Memory state around the buggy address:
[   35.964951]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.965068]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.965160] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.965236]                                      ^
[   35.965307]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965408]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965511] ==================================================================
[   36.026284] ==================================================================
[   36.026447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.026602] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.027100] 
[   36.027425] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.027942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.028240] Hardware name: linux,dummy-virt (DT)
[   36.028717] Call trace:
[   36.028872]  show_stack+0x20/0x38 (C)
[   36.029314]  dump_stack_lvl+0x8c/0xd0
[   36.029850]  print_report+0x118/0x608
[   36.030047]  kasan_report+0xdc/0x128
[   36.030431]  kasan_check_range+0x100/0x1a8
[   36.030569]  __kasan_check_write+0x20/0x30
[   36.030836]  kasan_atomics_helper+0x11f8/0x4858
[   36.030978]  kasan_atomics+0x198/0x2e0
[   36.031094]  kunit_try_run_case+0x170/0x3f0
[   36.031232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.031381]  kthread+0x328/0x630
[   36.031513]  ret_from_fork+0x10/0x20
[   36.031658] 
[   36.031715] Allocated by task 276:
[   36.031799]  kasan_save_stack+0x3c/0x68
[   36.031930]  kasan_save_track+0x20/0x40
[   36.032039]  kasan_save_alloc_info+0x40/0x58
[   36.032149]  __kasan_kmalloc+0xd4/0xd8
[   36.032249]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.032953]  kasan_atomics+0xb8/0x2e0
[   36.033067]  kunit_try_run_case+0x170/0x3f0
[   36.033220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.033931]  kthread+0x328/0x630
[   36.034102]  ret_from_fork+0x10/0x20
[   36.034591] 
[   36.034687] The buggy address belongs to the object at fff00000c768c580
[   36.034687]  which belongs to the cache kmalloc-64 of size 64
[   36.034854] The buggy address is located 0 bytes to the right of
[   36.034854]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.035038] 
[   36.035106] The buggy address belongs to the physical page:
[   36.035521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.035902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.036195] page_type: f5(slab)
[   36.036329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.036715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.036850] page dumped because: kasan: bad access detected
[   36.037065] 
[   36.037318] Memory state around the buggy address:
[   36.037603]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037829]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.038234] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038399]                                      ^
[   36.039380]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.039502]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.039584] ==================================================================
[   36.189033] ==================================================================
[   36.189209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.189338] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.189497] 
[   36.189643] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.189965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.190063] Hardware name: linux,dummy-virt (DT)
[   36.190190] Call trace:
[   36.190276]  show_stack+0x20/0x38 (C)
[   36.190455]  dump_stack_lvl+0x8c/0xd0
[   36.190568]  print_report+0x118/0x608
[   36.190725]  kasan_report+0xdc/0x128
[   36.190849]  kasan_check_range+0x100/0x1a8
[   36.190980]  __kasan_check_write+0x20/0x30
[   36.191098]  kasan_atomics_helper+0x17ec/0x4858
[   36.191231]  kasan_atomics+0x198/0x2e0
[   36.191349]  kunit_try_run_case+0x170/0x3f0
[   36.191491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191643]  kthread+0x328/0x630
[   36.191745]  ret_from_fork+0x10/0x20
[   36.191870] 
[   36.191920] Allocated by task 276:
[   36.192199]  kasan_save_stack+0x3c/0x68
[   36.192331]  kasan_save_track+0x20/0x40
[   36.192433]  kasan_save_alloc_info+0x40/0x58
[   36.193114]  __kasan_kmalloc+0xd4/0xd8
[   36.193250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.193362]  kasan_atomics+0xb8/0x2e0
[   36.193458]  kunit_try_run_case+0x170/0x3f0
[   36.193577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.193744]  kthread+0x328/0x630
[   36.193872]  ret_from_fork+0x10/0x20
[   36.193996] 
[   36.194055] The buggy address belongs to the object at fff00000c768c580
[   36.194055]  which belongs to the cache kmalloc-64 of size 64
[   36.194224] The buggy address is located 0 bytes to the right of
[   36.194224]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.194401] 
[   36.194457] The buggy address belongs to the physical page:
[   36.194547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.194710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.194866] page_type: f5(slab)
[   36.194975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.195108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.195215] page dumped because: kasan: bad access detected
[   36.195326] 
[   36.195411] Memory state around the buggy address:
[   36.195564]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.195843]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.196243] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.196503]                                      ^
[   36.196597]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196714]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196798] ==================================================================
[   36.092624] ==================================================================
[   36.092762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.093945] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.094101] 
[   36.094189] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.094370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.094438] Hardware name: linux,dummy-virt (DT)
[   36.094524] Call trace:
[   36.094591]  show_stack+0x20/0x38 (C)
[   36.096551]  dump_stack_lvl+0x8c/0xd0
[   36.096639]  print_report+0x118/0x608
[   36.096732]  kasan_report+0xdc/0x128
[   36.096787]  kasan_check_range+0x100/0x1a8
[   36.096843]  __kasan_check_write+0x20/0x30
[   36.096898]  kasan_atomics_helper+0x14e4/0x4858
[   36.096956]  kasan_atomics+0x198/0x2e0
[   36.097010]  kunit_try_run_case+0x170/0x3f0
[   36.097071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.097135]  kthread+0x328/0x630
[   36.097186]  ret_from_fork+0x10/0x20
[   36.097246] 
[   36.097273] Allocated by task 276:
[   36.097312]  kasan_save_stack+0x3c/0x68
[   36.097368]  kasan_save_track+0x20/0x40
[   36.097414]  kasan_save_alloc_info+0x40/0x58
[   36.097464]  __kasan_kmalloc+0xd4/0xd8
[   36.097507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.097556]  kasan_atomics+0xb8/0x2e0
[   36.097600]  kunit_try_run_case+0x170/0x3f0
[   36.097671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.097724]  kthread+0x328/0x630
[   36.097764]  ret_from_fork+0x10/0x20
[   36.097807] 
[   36.097836] The buggy address belongs to the object at fff00000c768c580
[   36.097836]  which belongs to the cache kmalloc-64 of size 64
[   36.097908] The buggy address is located 0 bytes to the right of
[   36.097908]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.097985] 
[   36.098013] The buggy address belongs to the physical page:
[   36.098056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.098121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.098187] page_type: f5(slab)
[   36.098240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.098299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.098352] page dumped because: kasan: bad access detected
[   36.098390] 
[   36.098413] Memory state around the buggy address:
[   36.098456]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.098510]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.098562] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.098644]                                      ^
[   36.098785]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.098979]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.099124] ==================================================================
[   35.817458] ==================================================================
[   35.817596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.817739] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.817880] 
[   35.817975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.818212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.818286] Hardware name: linux,dummy-virt (DT)
[   35.818375] Call trace:
[   35.818437]  show_stack+0x20/0x38 (C)
[   35.818565]  dump_stack_lvl+0x8c/0xd0
[   35.818707]  print_report+0x118/0x608
[   35.818834]  kasan_report+0xdc/0x128
[   35.818955]  kasan_check_range+0x100/0x1a8
[   35.819082]  __kasan_check_write+0x20/0x30
[   35.819200]  kasan_atomics_helper+0xd3c/0x4858
[   35.819331]  kasan_atomics+0x198/0x2e0
[   35.819477]  kunit_try_run_case+0x170/0x3f0
[   35.819879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.820410]  kthread+0x328/0x630
[   35.820593]  ret_from_fork+0x10/0x20
[   35.820789] 
[   35.820868] Allocated by task 276:
[   35.820948]  kasan_save_stack+0x3c/0x68
[   35.821061]  kasan_save_track+0x20/0x40
[   35.821203]  kasan_save_alloc_info+0x40/0x58
[   35.821349]  __kasan_kmalloc+0xd4/0xd8
[   35.821482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.822197]  kasan_atomics+0xb8/0x2e0
[   35.823128]  kunit_try_run_case+0x170/0x3f0
[   35.823283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823455]  kthread+0x328/0x630
[   35.823531]  ret_from_fork+0x10/0x20
[   35.823606] 
[   35.823662] The buggy address belongs to the object at fff00000c768c580
[   35.823662]  which belongs to the cache kmalloc-64 of size 64
[   35.824436] The buggy address is located 0 bytes to the right of
[   35.824436]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.824752] 
[   35.824839] The buggy address belongs to the physical page:
[   35.824946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.825143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.825327] page_type: f5(slab)
[   35.825476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.825668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.825780] page dumped because: kasan: bad access detected
[   35.826092] 
[   35.826232] Memory state around the buggy address:
[   35.826335]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.826453]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.826572] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.826849]                                      ^
[   35.826949]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.827067]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.827168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   35.334830] ==================================================================
[   35.334966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   35.335761] Call trace:
[   35.337683]  ret_from_fork+0x10/0x20
[   35.341698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   35.179829] ==================================================================
[   35.180131] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   35.180629] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270
[   35.180907] 
[   35.181020] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.181218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.181274] Hardware name: linux,dummy-virt (DT)
[   35.181342] Call trace:
[   35.181852]  show_stack+0x20/0x38 (C)
[   35.182024]  dump_stack_lvl+0x8c/0xd0
[   35.182196]  print_report+0x118/0x608
[   35.182322]  kasan_report+0xdc/0x128
[   35.182442]  __asan_report_load1_noabort+0x20/0x30
[   35.182564]  strnlen+0x80/0x88
[   35.182683]  kasan_strings+0x478/0xb00
[   35.182825]  kunit_try_run_case+0x170/0x3f0
[   35.183160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.183349]  kthread+0x328/0x630
[   35.183484]  ret_from_fork+0x10/0x20
[   35.183803] 
[   35.183844] Allocated by task 270:
[   35.183899]  kasan_save_stack+0x3c/0x68
[   35.183970]  kasan_save_track+0x20/0x40
[   35.184041]  kasan_save_alloc_info+0x40/0x58
[   35.184092]  __kasan_kmalloc+0xd4/0xd8
[   35.184137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.184185]  kasan_strings+0xc8/0xb00
[   35.184229]  kunit_try_run_case+0x170/0x3f0
[   35.184274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184362]  kthread+0x328/0x630
[   35.184405]  ret_from_fork+0x10/0x20
[   35.184450] 
[   35.184476] Freed by task 270:
[   35.184511]  kasan_save_stack+0x3c/0x68
[   35.184556]  kasan_save_track+0x20/0x40
[   35.184602]  kasan_save_free_info+0x4c/0x78
[   35.184673]  __kasan_slab_free+0x6c/0x98
[   35.184718]  kfree+0x214/0x3c8
[   35.184757]  kasan_strings+0x24c/0xb00
[   35.184801]  kunit_try_run_case+0x170/0x3f0
[   35.184846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184896]  kthread+0x328/0x630
[   35.184935]  ret_from_fork+0x10/0x20
[   35.184978] 
[   35.185004] The buggy address belongs to the object at fff00000c7699cc0
[   35.185004]  which belongs to the cache kmalloc-32 of size 32
[   35.185076] The buggy address is located 16 bytes inside of
[   35.185076]  freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0)
[   35.185150] 
[   35.185179] The buggy address belongs to the physical page:
[   35.185222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699
[   35.185290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.185356] page_type: f5(slab)
[   35.185412] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.185475] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.214047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.217877] >fff00000c3f4e880: 00 04 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   35.223043] Hardware name: linux,dummy-virt (DT)
[   35.223709]  kunit_try_run_case+0x170/0x3f0
[   35.223834]  kthread+0x328/0x630
[   35.224298]  kunit_try_run_case+0x170/0x3f0
[   35.226717] 
[   35.229146] Memory state around the buggy address:
[   35.232316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   35.235146] 
[   35.236071]  kunit_try_run_case+0x170/0x3f0
[   35.237349] 
[   35.237764] page_type: f5(slab)
[   35.239021]  fff00000c3f4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.241564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.242938]  kthread+0x328/0x630
[   35.243663]  __kasan_kmalloc+0xd4/0xd8
[   35.245742] page dumped because: kasan: bad access detected
[   35.248781] 
[   35.249216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.250466]  kasan_bitops_generic+0x110/0x1c8
[   35.251926]  kunit_try_run_case+0x170/0x3f0
[   35.252932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f4e
[   35.257529] Write of size 8 at addr fff00000c3f4e8c8 by task kunit_try_catch/272
[   35.259218]  __kasan_check_write+0x20/0x30
[   35.260406]  kasan_save_track+0x20/0x40
[   35.261149]  kthread+0x328/0x630
[   35.262114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.266489] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.271829]  kasan_save_track+0x20/0x40
[   35.274083] The buggy address belongs to the object at fff00000c3f4e8c0
[   35.274083]  which belongs to the cache kmalloc-16 of size 16
[   35.277759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   35.161130] ==================================================================
[   35.161505] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   35.161931] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270
[   35.162347] 
[   35.162672] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.163239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.163356] Hardware name: linux,dummy-virt (DT)
[   35.163459] Call trace:
[   35.163534]  show_stack+0x20/0x38 (C)
[   35.163704]  dump_stack_lvl+0x8c/0xd0
[   35.163819]  print_report+0x118/0x608
[   35.163951]  kasan_report+0xdc/0x128
[   35.164078]  __asan_report_load1_noabort+0x20/0x30
[   35.164211]  strlen+0xa8/0xb0
[   35.164725]  kasan_strings+0x418/0xb00
[   35.164965]  kunit_try_run_case+0x170/0x3f0
[   35.165352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.165820]  kthread+0x328/0x630
[   35.166239]  ret_from_fork+0x10/0x20
[   35.166813] 
[   35.167055] Allocated by task 270:
[   35.167256]  kasan_save_stack+0x3c/0x68
[   35.167628]  kasan_save_track+0x20/0x40
[   35.168162]  kasan_save_alloc_info+0x40/0x58
[   35.168439]  __kasan_kmalloc+0xd4/0xd8
[   35.168685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.168839]  kasan_strings+0xc8/0xb00
[   35.168911]  kunit_try_run_case+0x170/0x3f0
[   35.168987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.169081]  kthread+0x328/0x630
[   35.169165]  ret_from_fork+0x10/0x20
[   35.169847] 
[   35.170037] Freed by task 270:
[   35.170185]  kasan_save_stack+0x3c/0x68
[   35.170320]  kasan_save_track+0x20/0x40
[   35.170419]  kasan_save_free_info+0x4c/0x78
[   35.170527]  __kasan_slab_free+0x6c/0x98
[   35.170645]  kfree+0x214/0x3c8
[   35.170743]  kasan_strings+0x24c/0xb00
[   35.170843]  kunit_try_run_case+0x170/0x3f0
[   35.171310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.171579]  kthread+0x328/0x630
[   35.172220]  ret_from_fork+0x10/0x20
[   35.172407] 
[   35.172483] The buggy address belongs to the object at fff00000c7699cc0
[   35.172483]  which belongs to the cache kmalloc-32 of size 32
[   35.172643] The buggy address is located 16 bytes inside of
[   35.172643]  freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0)
[   35.172767] 
[   35.172812] The buggy address belongs to the physical page:
[   35.173408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699
[   35.173800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.174145] page_type: f5(slab)
[   35.174269] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.174416] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.174538] page dumped because: kasan: bad access detected
[   35.174640] 
[   35.175104] Memory state around the buggy address:
[   35.175536]  fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.175681]  fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   35.176370] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.176602]                                                  ^
[   35.176859]  fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.177097]  fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.177211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   35.142219] ==================================================================
[   35.142399] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   35.142550] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270
[   35.143012] 
[   35.143209] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.143796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.143997] Hardware name: linux,dummy-virt (DT)
[   35.144159] Call trace:
[   35.144228]  show_stack+0x20/0x38 (C)
[   35.144646]  dump_stack_lvl+0x8c/0xd0
[   35.144743]  print_report+0x118/0x608
[   35.144848]  kasan_report+0xdc/0x128
[   35.144953]  __asan_report_load1_noabort+0x20/0x30
[   35.145082]  kasan_strings+0x95c/0xb00
[   35.145675]  kunit_try_run_case+0x170/0x3f0
[   35.145938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.146089]  kthread+0x328/0x630
[   35.146450]  ret_from_fork+0x10/0x20
[   35.146696] 
[   35.146777] Allocated by task 270:
[   35.146914]  kasan_save_stack+0x3c/0x68
[   35.147039]  kasan_save_track+0x20/0x40
[   35.147141]  kasan_save_alloc_info+0x40/0x58
[   35.147252]  __kasan_kmalloc+0xd4/0xd8
[   35.147348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.147474]  kasan_strings+0xc8/0xb00
[   35.147577]  kunit_try_run_case+0x170/0x3f0
[   35.147692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.147815]  kthread+0x328/0x630
[   35.147913]  ret_from_fork+0x10/0x20
[   35.148010] 
[   35.148069] Freed by task 270:
[   35.148424]  kasan_save_stack+0x3c/0x68
[   35.148773]  kasan_save_track+0x20/0x40
[   35.149039]  kasan_save_free_info+0x4c/0x78
[   35.149135]  __kasan_slab_free+0x6c/0x98
[   35.149239]  kfree+0x214/0x3c8
[   35.149329]  kasan_strings+0x24c/0xb00
[   35.149516]  kunit_try_run_case+0x170/0x3f0
[   35.149723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.149921]  kthread+0x328/0x630
[   35.150082]  ret_from_fork+0x10/0x20
[   35.150261] 
[   35.150355] The buggy address belongs to the object at fff00000c7699cc0
[   35.150355]  which belongs to the cache kmalloc-32 of size 32
[   35.150902] The buggy address is located 16 bytes inside of
[   35.150902]  freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0)
[   35.151251] 
[   35.151316] The buggy address belongs to the physical page:
[   35.151741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699
[   35.151976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.152209] page_type: f5(slab)
[   35.152465] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.152810] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.152986] page dumped because: kasan: bad access detected
[   35.153257] 
[   35.153341] Memory state around the buggy address:
[   35.153454]  fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.153577]  fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   35.153695] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.153805]                                                  ^
[   35.154043]  fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.154289]  fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.154847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   35.126081] ==================================================================
[   35.126269] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   35.126429] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270
[   35.126561] 
[   35.126736] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.127508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.127639] Hardware name: linux,dummy-virt (DT)
[   35.127779] Call trace:
[   35.127844]  show_stack+0x20/0x38 (C)
[   35.127984]  dump_stack_lvl+0x8c/0xd0
[   35.128090]  print_report+0x118/0x608
[   35.128215]  kasan_report+0xdc/0x128
[   35.128375]  __asan_report_load1_noabort+0x20/0x30
[   35.128495]  strcmp+0xc0/0xc8
[   35.128998]  kasan_strings+0x340/0xb00
[   35.129108]  kunit_try_run_case+0x170/0x3f0
[   35.129408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.129527]  kthread+0x328/0x630
[   35.129671]  ret_from_fork+0x10/0x20
[   35.129778] 
[   35.129825] Allocated by task 270:
[   35.129888]  kasan_save_stack+0x3c/0x68
[   35.129988]  kasan_save_track+0x20/0x40
[   35.130076]  kasan_save_alloc_info+0x40/0x58
[   35.130172]  __kasan_kmalloc+0xd4/0xd8
[   35.130318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.130439]  kasan_strings+0xc8/0xb00
[   35.130555]  kunit_try_run_case+0x170/0x3f0
[   35.130726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.130859]  kthread+0x328/0x630
[   35.130998]  ret_from_fork+0x10/0x20
[   35.131562] 
[   35.132042] Freed by task 270:
[   35.132173]  kasan_save_stack+0x3c/0x68
[   35.132343]  kasan_save_track+0x20/0x40
[   35.132466]  kasan_save_free_info+0x4c/0x78
[   35.132643]  __kasan_slab_free+0x6c/0x98
[   35.132736]  kfree+0x214/0x3c8
[   35.132805]  kasan_strings+0x24c/0xb00
[   35.132886]  kunit_try_run_case+0x170/0x3f0
[   35.132977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.133084]  kthread+0x328/0x630
[   35.133622]  ret_from_fork+0x10/0x20
[   35.133822] 
[   35.133904] The buggy address belongs to the object at fff00000c7699cc0
[   35.133904]  which belongs to the cache kmalloc-32 of size 32
[   35.134511] The buggy address is located 16 bytes inside of
[   35.134511]  freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0)
[   35.134750] 
[   35.134836] The buggy address belongs to the physical page:
[   35.135338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699
[   35.135524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.135797] page_type: f5(slab)
[   35.136157] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.136385] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.136631] page dumped because: kasan: bad access detected
[   35.136808] 
[   35.136870] Memory state around the buggy address:
[   35.137168]  fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.137264]  fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   35.137399] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.137500]                                                  ^
[   35.137764]  fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.137912]  fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   35.138078] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   35.080163] ==================================================================
[   35.080383] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   35.080557] Read of size 1 at addr fff00000c7699b18 by task kunit_try_catch/268
[   35.081151] 
[   35.081275] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.081701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.081888] Hardware name: linux,dummy-virt (DT)
[   35.082075] Call trace:
[   35.082158]  show_stack+0x20/0x38 (C)
[   35.082686]  dump_stack_lvl+0x8c/0xd0
[   35.083009]  print_report+0x118/0x608
[   35.083443]  kasan_report+0xdc/0x128
[   35.083802]  __asan_report_load1_noabort+0x20/0x30
[   35.084015]  memcmp+0x198/0x1d8
[   35.084168]  kasan_memcmp+0x16c/0x300
[   35.084298]  kunit_try_run_case+0x170/0x3f0
[   35.084413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.084524]  kthread+0x328/0x630
[   35.084640]  ret_from_fork+0x10/0x20
[   35.085059] 
[   35.085444] Allocated by task 268:
[   35.085823]  kasan_save_stack+0x3c/0x68
[   35.086181]  kasan_save_track+0x20/0x40
[   35.086302]  kasan_save_alloc_info+0x40/0x58
[   35.086686]  __kasan_kmalloc+0xd4/0xd8
[   35.087032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.087226]  kasan_memcmp+0xbc/0x300
[   35.087389]  kunit_try_run_case+0x170/0x3f0
[   35.087791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.088167]  kthread+0x328/0x630
[   35.088468]  ret_from_fork+0x10/0x20
[   35.088727] 
[   35.088790] The buggy address belongs to the object at fff00000c7699b00
[   35.088790]  which belongs to the cache kmalloc-32 of size 32
[   35.088960] The buggy address is located 0 bytes to the right of
[   35.088960]  allocated 24-byte region [fff00000c7699b00, fff00000c7699b18)
[   35.089143] 
[   35.089209] The buggy address belongs to the physical page:
[   35.089304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699
[   35.089505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.089931] page_type: f5(slab)
[   35.090418] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.090672] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.090830] page dumped because: kasan: bad access detected
[   35.090942] 
[   35.091063] Memory state around the buggy address:
[   35.091159]  fff00000c7699a00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   35.091285]  fff00000c7699a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.091402] >fff00000c7699b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.091526]                             ^
[   35.091625]  fff00000c7699b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.091767]  fff00000c7699c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.091873] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   35.030283] ==================================================================
[   35.030472] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   35.030649] Read of size 1 at addr ffff800080a57b4a by task kunit_try_catch/264
[   35.030784] 
[   35.030881] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.031124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.031186] Hardware name: linux,dummy-virt (DT)
[   35.031266] Call trace:
[   35.031321]  show_stack+0x20/0x38 (C)
[   35.031514]  dump_stack_lvl+0x8c/0xd0
[   35.031702]  print_report+0x310/0x608
[   35.031815]  kasan_report+0xdc/0x128
[   35.031926]  __asan_report_load1_noabort+0x20/0x30
[   35.032530]  kasan_alloca_oob_right+0x2dc/0x340
[   35.032723]  kunit_try_run_case+0x170/0x3f0
[   35.032880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.033017]  kthread+0x328/0x630
[   35.033129]  ret_from_fork+0x10/0x20
[   35.033255] 
[   35.033310] The buggy address belongs to stack of task kunit_try_catch/264
[   35.033445] 
[   35.033514] The buggy address belongs to the virtual mapping at
[   35.033514]  [ffff800080a50000, ffff800080a59000) created by:
[   35.033514]  kernel_clone+0x150/0x7a8
[   35.033727] 
[   35.033782] The buggy address belongs to the physical page:
[   35.033850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955
[   35.034161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.034317] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.034449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.034585] page dumped because: kasan: bad access detected
[   35.034687] 
[   35.034750] Memory state around the buggy address:
[   35.034840]  ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.034969]  ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.035128] >ffff800080a57b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   35.035227]                                               ^
[   35.035319]  ffff800080a57b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   35.035437]  ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   35.035540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   34.995246] ==================================================================
[   34.995489] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   34.995670] Read of size 1 at addr ffff800080a57b5f by task kunit_try_catch/262
[   34.995806] 
[   34.995903] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.996690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.996811] Hardware name: linux,dummy-virt (DT)
[   34.996900] Call trace:
[   34.996949]  show_stack+0x20/0x38 (C)
[   34.997065]  dump_stack_lvl+0x8c/0xd0
[   34.997178]  print_report+0x310/0x608
[   34.997301]  kasan_report+0xdc/0x128
[   34.997741]  __asan_report_load1_noabort+0x20/0x30
[   34.998043]  kasan_alloca_oob_left+0x2b8/0x310
[   34.998287]  kunit_try_run_case+0x170/0x3f0
[   34.998411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.998552]  kthread+0x328/0x630
[   34.999023]  ret_from_fork+0x10/0x20
[   34.999171] 
[   34.999234] The buggy address belongs to stack of task kunit_try_catch/262
[   34.999823] 
[   34.999930] The buggy address belongs to the virtual mapping at
[   34.999930]  [ffff800080a50000, ffff800080a59000) created by:
[   34.999930]  kernel_clone+0x150/0x7a8
[   35.000241] 
[   35.000488] The buggy address belongs to the physical page:
[   35.000539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955
[   35.000622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.000758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.000819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.000867] page dumped because: kasan: bad access detected
[   35.000904] 
[   35.000924] Memory state around the buggy address:
[   35.000965]  ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.001017]  ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.001064] >ffff800080a57b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   35.001109]                                                     ^
[   35.001156]  ffff800080a57b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   35.001205]  ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   35.001251] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   34.955030] ==================================================================
[   34.955791] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   34.956429] Read of size 1 at addr ffff800080a57c2a by task kunit_try_catch/260
[   34.956957] 
[   34.957300] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.958928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.959009] Hardware name: linux,dummy-virt (DT)
[   34.959092] Call trace:
[   34.959693]  show_stack+0x20/0x38 (C)
[   34.960037]  dump_stack_lvl+0x8c/0xd0
[   34.960237]  print_report+0x310/0x608
[   34.960353]  kasan_report+0xdc/0x128
[   34.960541]  __asan_report_load1_noabort+0x20/0x30
[   34.960715]  kasan_stack_oob+0x238/0x270
[   34.960886]  kunit_try_run_case+0x170/0x3f0
[   34.961060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.961383]  kthread+0x328/0x630
[   34.961482]  ret_from_fork+0x10/0x20
[   34.961605] 
[   34.962061] The buggy address belongs to stack of task kunit_try_catch/260
[   34.962783]  and is located at offset 138 in frame:
[   34.962952]  kasan_stack_oob+0x0/0x270
[   34.963933] 
[   34.964032] This frame has 4 objects:
[   34.964745]  [48, 49) '__assertion'
[   34.964862]  [64, 72) 'array'
[   34.964939]  [96, 112) '__assertion'
[   34.965307]  [128, 138) 'stack_array'
[   34.965534] 
[   34.966076] The buggy address belongs to the virtual mapping at
[   34.966076]  [ffff800080a50000, ffff800080a59000) created by:
[   34.966076]  kernel_clone+0x150/0x7a8
[   34.966306] 
[   34.966361] The buggy address belongs to the physical page:
[   34.966984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955
[   34.967141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.967619] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.967762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.968305] page dumped because: kasan: bad access detected
[   34.968625] 
[   34.968700] Memory state around the buggy address:
[   34.968800]  ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.968891]  ffff800080a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   34.968971] >ffff800080a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   34.969041]                                   ^
[   34.969399]  ffff800080a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   34.969869]  ffff800080a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   34.970035] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   34.899201] ==================================================================
[   34.899437] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   34.899662] Read of size 1 at addr ffff94c64644f68d by task kunit_try_catch/256
[   34.899810] 
[   34.899920] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.900156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.900238] Hardware name: linux,dummy-virt (DT)
[   34.900329] Call trace:
[   34.900394]  show_stack+0x20/0x38 (C)
[   34.900528]  dump_stack_lvl+0x8c/0xd0
[   34.900652]  print_report+0x310/0x608
[   34.900780]  kasan_report+0xdc/0x128
[   34.900895]  __asan_report_load1_noabort+0x20/0x30
[   34.901026]  kasan_global_oob_right+0x230/0x270
[   34.901153]  kunit_try_run_case+0x170/0x3f0
[   34.901315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.901477]  kthread+0x328/0x630
[   34.901604]  ret_from_fork+0x10/0x20
[   34.901764] 
[   34.901899] The buggy address belongs to the variable:
[   34.902005]  global_array+0xd/0x40
[   34.902126] 
[   34.902393] The buggy address belongs to the virtual mapping at
[   34.902393]  [ffff94c644610000, ffff94c646501000) created by:
[   34.902393]  paging_init+0x66c/0x7d0
[   34.902641] 
[   34.902936] The buggy address belongs to the physical page:
[   34.902994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c4f
[   34.903067] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   34.903165] raw: 03fffe0000002000 ffffc1ffc01f13c8 ffffc1ffc01f13c8 0000000000000000
[   34.903225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.903276] page dumped because: kasan: bad access detected
[   34.903312] 
[   34.903332] Memory state around the buggy address:
[   34.903374]  ffff94c64644f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.903445]  ffff94c64644f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   34.903509] >ffff94c64644f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   34.903554]                       ^
[   34.903591]  ffff94c64644f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   34.903670]  ffff94c64644f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.903719] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   34.801902] ==================================================================
[   34.802108] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.802278] Free of addr fff00000c59fbb01 by task kunit_try_catch/252
[   34.802395] 
[   34.802487] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.802735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.802809] Hardware name: linux,dummy-virt (DT)
[   34.802894] Call trace:
[   34.802958]  show_stack+0x20/0x38 (C)
[   34.803084]  dump_stack_lvl+0x8c/0xd0
[   34.803206]  print_report+0x118/0x608
[   34.803329]  kasan_report_invalid_free+0xc0/0xe8
[   34.803478]  check_slab_allocation+0xfc/0x108
[   34.803626]  __kasan_mempool_poison_object+0x78/0x150
[   34.803750]  mempool_free+0x28c/0x328
[   34.803900]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.804055]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.805938]  kunit_try_run_case+0x170/0x3f0
[   34.806127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.806573]  kthread+0x328/0x630
[   34.806784]  ret_from_fork+0x10/0x20
[   34.806907] 
[   34.806955] Allocated by task 252:
[   34.807029]  kasan_save_stack+0x3c/0x68
[   34.807137]  kasan_save_track+0x20/0x40
[   34.807249]  kasan_save_alloc_info+0x40/0x58
[   34.807343]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.807556]  remove_element+0x130/0x1f8
[   34.807865]  mempool_alloc_preallocated+0x58/0xc0
[   34.808083]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   34.808192]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.808289]  kunit_try_run_case+0x170/0x3f0
[   34.808418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.808532]  kthread+0x328/0x630
[   34.808808]  ret_from_fork+0x10/0x20
[   34.808926] 
[   34.809001] The buggy address belongs to the object at fff00000c59fbb00
[   34.809001]  which belongs to the cache kmalloc-128 of size 128
[   34.809206] The buggy address is located 1 bytes inside of
[   34.809206]  128-byte region [fff00000c59fbb00, fff00000c59fbb80)
[   34.809395] 
[   34.809559] The buggy address belongs to the physical page:
[   34.809668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb
[   34.809820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.809943] page_type: f5(slab)
[   34.810077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.810187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.810275] page dumped because: kasan: bad access detected
[   34.810334] 
[   34.810369] Memory state around the buggy address:
[   34.810647]  fff00000c59fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.810784]  fff00000c59fba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.810920] >fff00000c59fbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.811129]                    ^
[   34.811218]  fff00000c59fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.811323]  fff00000c59fbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.811449] ==================================================================
[   34.834163] ==================================================================
[   34.834352] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.834516] Free of addr fff00000c5a48001 by task kunit_try_catch/254
[   34.836080] 
[   34.836196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.836449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.836514] Hardware name: linux,dummy-virt (DT)
[   34.836597] Call trace:
[   34.836666]  show_stack+0x20/0x38 (C)
[   34.836780]  dump_stack_lvl+0x8c/0xd0
[   34.836837]  print_report+0x118/0x608
[   34.836895]  kasan_report_invalid_free+0xc0/0xe8
[   34.836950]  __kasan_mempool_poison_object+0xfc/0x150
[   34.837009]  mempool_free+0x28c/0x328
[   34.837059]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.837119]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   34.837179]  kunit_try_run_case+0x170/0x3f0
[   34.837235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.837294]  kthread+0x328/0x630
[   34.837341]  ret_from_fork+0x10/0x20
[   34.837399] 
[   34.837428] The buggy address belongs to the physical page:
[   34.837470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.837537] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.837592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.838071] page_type: f8(unknown)
[   34.838369] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.838656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.839067] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.839183] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.839852] head: 0bfffe0000000002 ffffc1ffc3169201 00000000ffffffff 00000000ffffffff
[   34.840250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.840356] page dumped because: kasan: bad access detected
[   34.840426] 
[   34.840460] Memory state around the buggy address:
[   34.840959]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.841128]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.841246] >fff00000c5a48000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.841353]                    ^
[   34.841427]  fff00000c5a48080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.841545]  fff00000c5a48100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.841665] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   34.719598] ==================================================================
[   34.720169] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.720481] Free of addr fff00000c59fb700 by task kunit_try_catch/246
[   34.720685] 
[   34.721009] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.721326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.721382] Hardware name: linux,dummy-virt (DT)
[   34.721451] Call trace:
[   34.721507]  show_stack+0x20/0x38 (C)
[   34.721731]  dump_stack_lvl+0x8c/0xd0
[   34.722037]  print_report+0x118/0x608
[   34.722298]  kasan_report_invalid_free+0xc0/0xe8
[   34.722602]  check_slab_allocation+0xd4/0x108
[   34.722817]  __kasan_mempool_poison_object+0x78/0x150
[   34.723101]  mempool_free+0x28c/0x328
[   34.723220]  mempool_double_free_helper+0x150/0x2e8
[   34.723621]  mempool_kmalloc_double_free+0xc0/0x118
[   34.723903]  kunit_try_run_case+0x170/0x3f0
[   34.724131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.724275]  kthread+0x328/0x630
[   34.724468]  ret_from_fork+0x10/0x20
[   34.724851] 
[   34.724918] Allocated by task 246:
[   34.724978]  kasan_save_stack+0x3c/0x68
[   34.725068]  kasan_save_track+0x20/0x40
[   34.725263]  kasan_save_alloc_info+0x40/0x58
[   34.725435]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.725694]  remove_element+0x130/0x1f8
[   34.725899]  mempool_alloc_preallocated+0x58/0xc0
[   34.726015]  mempool_double_free_helper+0x94/0x2e8
[   34.726190]  mempool_kmalloc_double_free+0xc0/0x118
[   34.726519]  kunit_try_run_case+0x170/0x3f0
[   34.726760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.726872]  kthread+0x328/0x630
[   34.727055]  ret_from_fork+0x10/0x20
[   34.727257] 
[   34.727330] Freed by task 246:
[   34.727549]  kasan_save_stack+0x3c/0x68
[   34.727763]  kasan_save_track+0x20/0x40
[   34.727856]  kasan_save_free_info+0x4c/0x78
[   34.727960]  __kasan_mempool_poison_object+0xc0/0x150
[   34.728383]  mempool_free+0x28c/0x328
[   34.728503]  mempool_double_free_helper+0x100/0x2e8
[   34.728835]  mempool_kmalloc_double_free+0xc0/0x118
[   34.728924]  kunit_try_run_case+0x170/0x3f0
[   34.729007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.729107]  kthread+0x328/0x630
[   34.729328]  ret_from_fork+0x10/0x20
[   34.729420] 
[   34.729477] The buggy address belongs to the object at fff00000c59fb700
[   34.729477]  which belongs to the cache kmalloc-128 of size 128
[   34.729578] The buggy address is located 0 bytes inside of
[   34.729578]  128-byte region [fff00000c59fb700, fff00000c59fb780)
[   34.729672] 
[   34.729704] The buggy address belongs to the physical page:
[   34.729741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb
[   34.729810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.729875] page_type: f5(slab)
[   34.729928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.729988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.730038] page dumped because: kasan: bad access detected
[   34.730073] 
[   34.730094] Memory state around the buggy address:
[   34.730136]  fff00000c59fb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.730188]  fff00000c59fb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.730239] >fff00000c59fb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.730285]                    ^
[   34.730318]  fff00000c59fb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.730367]  fff00000c59fb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.730413] ==================================================================
[   34.743116] ==================================================================
[   34.743301] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.743460] Free of addr fff00000c5a48000 by task kunit_try_catch/248
[   34.743550] 
[   34.743641] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.743828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.743890] Hardware name: linux,dummy-virt (DT)
[   34.743969] Call trace:
[   34.744133]  show_stack+0x20/0x38 (C)
[   34.744463]  dump_stack_lvl+0x8c/0xd0
[   34.744693]  print_report+0x118/0x608
[   34.744817]  kasan_report_invalid_free+0xc0/0xe8
[   34.745342]  __kasan_mempool_poison_object+0x14c/0x150
[   34.745525]  mempool_free+0x28c/0x328
[   34.745647]  mempool_double_free_helper+0x150/0x2e8
[   34.745756]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.745990]  kunit_try_run_case+0x170/0x3f0
[   34.746128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.746786]  kthread+0x328/0x630
[   34.746926]  ret_from_fork+0x10/0x20
[   34.747054] 
[   34.747112] The buggy address belongs to the physical page:
[   34.747204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.747350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.747509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.747683] page_type: f8(unknown)
[   34.747796] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.747928] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.748071] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.748253] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.748379] head: 0bfffe0000000002 ffffc1ffc3169201 00000000ffffffff 00000000ffffffff
[   34.748503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.749047] page dumped because: kasan: bad access detected
[   34.749237] 
[   34.749297] Memory state around the buggy address:
[   34.749424]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749549]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749655] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749730]                    ^
[   34.749788]  fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749878]  fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749979] ==================================================================
[   34.766759] ==================================================================
[   34.766959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.767511] Free of addr fff00000c5a48000 by task kunit_try_catch/250
[   34.767722] 
[   34.767856] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.768368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.768637] Hardware name: linux,dummy-virt (DT)
[   34.768769] Call trace:
[   34.768866]  show_stack+0x20/0x38 (C)
[   34.769066]  dump_stack_lvl+0x8c/0xd0
[   34.769398]  print_report+0x118/0x608
[   34.769501]  kasan_report_invalid_free+0xc0/0xe8
[   34.769670]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.769866]  mempool_free+0x24c/0x328
[   34.770109]  mempool_double_free_helper+0x150/0x2e8
[   34.770450]  mempool_page_alloc_double_free+0xbc/0x118
[   34.770703]  kunit_try_run_case+0x170/0x3f0
[   34.770919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.771099]  kthread+0x328/0x630
[   34.771204]  ret_from_fork+0x10/0x20
[   34.771533] 
[   34.771623] The buggy address belongs to the physical page:
[   34.771712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.771984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.772189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.772516] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.772655] page dumped because: kasan: bad access detected
[   34.772744] 
[   34.773055] Memory state around the buggy address:
[   34.773170]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773482]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773578] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773737]                    ^
[   34.773814]  fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.774029]  fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.774213] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   32.116100] ==================================================================
[   32.116749] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   32.117155] Read of size 18446744073709551614 at addr fff00000c596c704 by task kunit_try_catch/191
[   32.117357] 
[   32.117443] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.118044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.118184] Hardware name: linux,dummy-virt (DT)
[   32.118265] Call trace:
[   32.118770]  show_stack+0x20/0x38 (C)
[   32.118996]  dump_stack_lvl+0x8c/0xd0
[   32.119180]  print_report+0x118/0x608
[   32.119361]  kasan_report+0xdc/0x128
[   32.119488]  kasan_check_range+0x100/0x1a8
[   32.120075]  __asan_memmove+0x3c/0x98
[   32.120198]  kmalloc_memmove_negative_size+0x154/0x2e0
[   32.120327]  kunit_try_run_case+0x170/0x3f0
[   32.120557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120768]  kthread+0x328/0x630
[   32.121096]  ret_from_fork+0x10/0x20
[   32.121467] 
[   32.121529] Allocated by task 191:
[   32.121666]  kasan_save_stack+0x3c/0x68
[   32.121875]  kasan_save_track+0x20/0x40
[   32.121988]  kasan_save_alloc_info+0x40/0x58
[   32.122163]  __kasan_kmalloc+0xd4/0xd8
[   32.122335]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.122435]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   32.122543]  kunit_try_run_case+0x170/0x3f0
[   32.122654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.122769]  kthread+0x328/0x630
[   32.123423]  ret_from_fork+0x10/0x20
[   32.124149] 
[   32.124363] The buggy address belongs to the object at fff00000c596c700
[   32.124363]  which belongs to the cache kmalloc-64 of size 64
[   32.125201] The buggy address is located 4 bytes inside of
[   32.125201]  64-byte region [fff00000c596c700, fff00000c596c740)
[   32.125380] 
[   32.125564] The buggy address belongs to the physical page:
[   32.125703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c
[   32.125848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.126073] page_type: f5(slab)
[   32.126328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.126846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.127147] page dumped because: kasan: bad access detected
[   32.127496] 
[   32.127668] Memory state around the buggy address:
[   32.127798]  fff00000c596c600: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   32.128298]  fff00000c596c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.128746] >fff00000c596c700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.129013]                    ^
[   32.129292]  fff00000c596c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.129671]  fff00000c596c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.130297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   34.692331] ==================================================================
[   34.692597] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.692764] Read of size 1 at addr fff00000c5a48000 by task kunit_try_catch/244
[   34.692873] 
[   34.692960] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.693170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.693238] Hardware name: linux,dummy-virt (DT)
[   34.693367] Call trace:
[   34.693422]  show_stack+0x20/0x38 (C)
[   34.693526]  dump_stack_lvl+0x8c/0xd0
[   34.693652]  print_report+0x118/0x608
[   34.694049]  kasan_report+0xdc/0x128
[   34.694170]  __asan_report_load1_noabort+0x20/0x30
[   34.694324]  mempool_uaf_helper+0x314/0x340
[   34.694424]  mempool_page_alloc_uaf+0xc0/0x118
[   34.694554]  kunit_try_run_case+0x170/0x3f0
[   34.694765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.694922]  kthread+0x328/0x630
[   34.695021]  ret_from_fork+0x10/0x20
[   34.695161] 
[   34.695250] The buggy address belongs to the physical page:
[   34.695364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.695579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.695795] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.695960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.696108] page dumped because: kasan: bad access detected
[   34.696215] 
[   34.696265] Memory state around the buggy address:
[   34.696397]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.696495]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.696594] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.696705]                    ^
[   34.697159]  fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.697298]  fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.697441] ==================================================================
[   34.588000] ==================================================================
[   34.588552] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.588972] Read of size 1 at addr fff00000c5a44000 by task kunit_try_catch/240
[   34.589146] 
[   34.589277] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.589509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.589562] Hardware name: linux,dummy-virt (DT)
[   34.589643] Call trace:
[   34.589911]  show_stack+0x20/0x38 (C)
[   34.590051]  dump_stack_lvl+0x8c/0xd0
[   34.590437]  print_report+0x118/0x608
[   34.590565]  kasan_report+0xdc/0x128
[   34.590699]  __asan_report_load1_noabort+0x20/0x30
[   34.590841]  mempool_uaf_helper+0x314/0x340
[   34.591005]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.591171]  kunit_try_run_case+0x170/0x3f0
[   34.591342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.591531]  kthread+0x328/0x630
[   34.591692]  ret_from_fork+0x10/0x20
[   34.591835] 
[   34.591917] The buggy address belongs to the physical page:
[   34.592044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a44
[   34.592265] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.592383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.592524] page_type: f8(unknown)
[   34.592639] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.592778] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.592908] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.593008] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.593105] head: 0bfffe0000000002 ffffc1ffc3169101 00000000ffffffff 00000000ffffffff
[   34.593216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.593324] page dumped because: kasan: bad access detected
[   34.593411] 
[   34.593511] Memory state around the buggy address:
[   34.593628]  fff00000c5a43f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.593948]  fff00000c5a43f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.594319] >fff00000c5a44000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.594954]                    ^
[   34.595292]  fff00000c5a44080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.595441]  fff00000c5a44100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.595543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.619311] ==================================================================
[   34.619485] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.619581] Read of size 1 at addr fff00000c7686240 by task kunit_try_catch/242
[   34.619965] 
[   34.620232] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.621199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.621302] Hardware name: linux,dummy-virt (DT)
[   34.621395] Call trace:
[   34.621461]  show_stack+0x20/0x38 (C)
[   34.621603]  dump_stack_lvl+0x8c/0xd0
[   34.621731]  print_report+0x118/0x608
[   34.621968]  kasan_report+0xdc/0x128
[   34.622373]  __asan_report_load1_noabort+0x20/0x30
[   34.622591]  mempool_uaf_helper+0x314/0x340
[   34.622882]  mempool_slab_uaf+0xc0/0x118
[   34.622988]  kunit_try_run_case+0x170/0x3f0
[   34.623769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.624072]  kthread+0x328/0x630
[   34.624277]  ret_from_fork+0x10/0x20
[   34.624542] 
[   34.624662] Allocated by task 242:
[   34.624735]  kasan_save_stack+0x3c/0x68
[   34.624943]  kasan_save_track+0x20/0x40
[   34.625126]  kasan_save_alloc_info+0x40/0x58
[   34.625314]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.625653]  remove_element+0x16c/0x1f8
[   34.625813]  mempool_alloc_preallocated+0x58/0xc0
[   34.625984]  mempool_uaf_helper+0xa4/0x340
[   34.626178]  mempool_slab_uaf+0xc0/0x118
[   34.626361]  kunit_try_run_case+0x170/0x3f0
[   34.626757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.626894]  kthread+0x328/0x630
[   34.626969]  ret_from_fork+0x10/0x20
[   34.627015] 
[   34.627040] Freed by task 242:
[   34.627076]  kasan_save_stack+0x3c/0x68
[   34.627120]  kasan_save_track+0x20/0x40
[   34.627164]  kasan_save_free_info+0x4c/0x78
[   34.627209]  __kasan_mempool_poison_object+0xc0/0x150
[   34.627256]  mempool_free+0x28c/0x328
[   34.627296]  mempool_uaf_helper+0x104/0x340
[   34.627339]  mempool_slab_uaf+0xc0/0x118
[   34.627379]  kunit_try_run_case+0x170/0x3f0
[   34.627441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.627503]  kthread+0x328/0x630
[   34.627540]  ret_from_fork+0x10/0x20
[   34.627581] 
[   34.627606] The buggy address belongs to the object at fff00000c7686240
[   34.627606]  which belongs to the cache test_cache of size 123
[   34.627896] The buggy address is located 0 bytes inside of
[   34.627896]  freed 123-byte region [fff00000c7686240, fff00000c76862bb)
[   34.628224] 
[   34.628282] The buggy address belongs to the physical page:
[   34.628738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107686
[   34.629012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.629436] page_type: f5(slab)
[   34.629589] raw: 0bfffe0000000000 fff00000c59f3500 dead000000000122 0000000000000000
[   34.629927] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.630064] page dumped because: kasan: bad access detected
[   34.630157] 
[   34.630922] Memory state around the buggy address:
[   34.631259]  fff00000c7686100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.632149]  fff00000c7686180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.632352] >fff00000c7686200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.632816]                                            ^
[   34.632929]  fff00000c7686280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.633043]  fff00000c7686300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.633123] ==================================================================
[   34.558589] ==================================================================
[   34.558813] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.558991] Read of size 1 at addr fff00000c59fb300 by task kunit_try_catch/238
[   34.559130] 
[   34.559231] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.559492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.559564] Hardware name: linux,dummy-virt (DT)
[   34.559653] Call trace:
[   34.559714]  show_stack+0x20/0x38 (C)
[   34.559835]  dump_stack_lvl+0x8c/0xd0
[   34.559967]  print_report+0x118/0x608
[   34.560082]  kasan_report+0xdc/0x128
[   34.560189]  __asan_report_load1_noabort+0x20/0x30
[   34.560835]  mempool_uaf_helper+0x314/0x340
[   34.561009]  mempool_kmalloc_uaf+0xc4/0x120
[   34.561175]  kunit_try_run_case+0x170/0x3f0
[   34.561324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.561450]  kthread+0x328/0x630
[   34.561550]  ret_from_fork+0x10/0x20
[   34.561670] 
[   34.561711] Allocated by task 238:
[   34.561779]  kasan_save_stack+0x3c/0x68
[   34.561866]  kasan_save_track+0x20/0x40
[   34.561973]  kasan_save_alloc_info+0x40/0x58
[   34.562061]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.562356]  remove_element+0x130/0x1f8
[   34.562467]  mempool_alloc_preallocated+0x58/0xc0
[   34.562572]  mempool_uaf_helper+0xa4/0x340
[   34.562727]  mempool_kmalloc_uaf+0xc4/0x120
[   34.562834]  kunit_try_run_case+0x170/0x3f0
[   34.562929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.563052]  kthread+0x328/0x630
[   34.563179]  ret_from_fork+0x10/0x20
[   34.563310] 
[   34.563378] Freed by task 238:
[   34.563501]  kasan_save_stack+0x3c/0x68
[   34.564004]  kasan_save_track+0x20/0x40
[   34.564122]  kasan_save_free_info+0x4c/0x78
[   34.564224]  __kasan_mempool_poison_object+0xc0/0x150
[   34.564783]  mempool_free+0x28c/0x328
[   34.564924]  mempool_uaf_helper+0x104/0x340
[   34.565092]  mempool_kmalloc_uaf+0xc4/0x120
[   34.565256]  kunit_try_run_case+0x170/0x3f0
[   34.565346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.565447]  kthread+0x328/0x630
[   34.565530]  ret_from_fork+0x10/0x20
[   34.565857] 
[   34.565910] The buggy address belongs to the object at fff00000c59fb300
[   34.565910]  which belongs to the cache kmalloc-128 of size 128
[   34.566122] The buggy address is located 0 bytes inside of
[   34.566122]  freed 128-byte region [fff00000c59fb300, fff00000c59fb380)
[   34.566340] 
[   34.566402] The buggy address belongs to the physical page:
[   34.566527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb
[   34.566719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.566862] page_type: f5(slab)
[   34.566963] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.567100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.567213] page dumped because: kasan: bad access detected
[   34.567298] 
[   34.567350] Memory state around the buggy address:
[   34.567488]  fff00000c59fb200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.567645]  fff00000c59fb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.567753] >fff00000c59fb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.567895]                    ^
[   34.568052]  fff00000c59fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.568407]  fff00000c59fb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.568765] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   34.478263] ==================================================================
[   34.478575] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.479139] Read of size 1 at addr fff00000c5a992bb by task kunit_try_catch/236
[   34.479681] 
[   34.479779] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.480014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.480085] Hardware name: linux,dummy-virt (DT)
[   34.480169] Call trace:
[   34.480227]  show_stack+0x20/0x38 (C)
[   34.481121]  dump_stack_lvl+0x8c/0xd0
[   34.481339]  print_report+0x118/0x608
[   34.481771]  kasan_report+0xdc/0x128
[   34.482317]  __asan_report_load1_noabort+0x20/0x30
[   34.482720]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.483112]  mempool_slab_oob_right+0xc0/0x118
[   34.483408]  kunit_try_run_case+0x170/0x3f0
[   34.483729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.484132]  kthread+0x328/0x630
[   34.484601]  ret_from_fork+0x10/0x20
[   34.484967] 
[   34.485008] Allocated by task 236:
[   34.485065]  kasan_save_stack+0x3c/0x68
[   34.485147]  kasan_save_track+0x20/0x40
[   34.485514]  kasan_save_alloc_info+0x40/0x58
[   34.486109]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.486262]  remove_element+0x16c/0x1f8
[   34.486362]  mempool_alloc_preallocated+0x58/0xc0
[   34.486461]  mempool_oob_right_helper+0x98/0x2f0
[   34.486567]  mempool_slab_oob_right+0xc0/0x118
[   34.487965]  kunit_try_run_case+0x170/0x3f0
[   34.488379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.488703]  kthread+0x328/0x630
[   34.488813]  ret_from_fork+0x10/0x20
[   34.488902] 
[   34.488946] The buggy address belongs to the object at fff00000c5a99240
[   34.488946]  which belongs to the cache test_cache of size 123
[   34.489071] The buggy address is located 0 bytes to the right of
[   34.489071]  allocated 123-byte region [fff00000c5a99240, fff00000c5a992bb)
[   34.489217] 
[   34.489272] The buggy address belongs to the physical page:
[   34.490266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99
[   34.490890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.491262] page_type: f5(slab)
[   34.491490] raw: 0bfffe0000000000 fff00000c59f33c0 dead000000000122 0000000000000000
[   34.492100] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.492282] page dumped because: kasan: bad access detected
[   34.492835] 
[   34.492894] Memory state around the buggy address:
[   34.492989]  fff00000c5a99180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.493097]  fff00000c5a99200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.493212] >fff00000c5a99280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.493308]                                         ^
[   34.493410]  fff00000c5a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493488]  fff00000c5a99380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493536] ==================================================================
[   34.417345] ==================================================================
[   34.417591] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.417738] Read of size 1 at addr fff00000c44dff73 by task kunit_try_catch/232
[   34.417808] 
[   34.417863] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.417976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.418009] Hardware name: linux,dummy-virt (DT)
[   34.418056] Call trace:
[   34.418090]  show_stack+0x20/0x38 (C)
[   34.418153]  dump_stack_lvl+0x8c/0xd0
[   34.418212]  print_report+0x118/0x608
[   34.418269]  kasan_report+0xdc/0x128
[   34.418323]  __asan_report_load1_noabort+0x20/0x30
[   34.418381]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.418437]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.418492]  kunit_try_run_case+0x170/0x3f0
[   34.418551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.418625]  kthread+0x328/0x630
[   34.418680]  ret_from_fork+0x10/0x20
[   34.418738] 
[   34.418761] Allocated by task 232:
[   34.418797]  kasan_save_stack+0x3c/0x68
[   34.418850]  kasan_save_track+0x20/0x40
[   34.418895]  kasan_save_alloc_info+0x40/0x58
[   34.418944]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.418996]  remove_element+0x130/0x1f8
[   34.419041]  mempool_alloc_preallocated+0x58/0xc0
[   34.419087]  mempool_oob_right_helper+0x98/0x2f0
[   34.419131]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.419176]  kunit_try_run_case+0x170/0x3f0
[   34.419245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.419298]  kthread+0x328/0x630
[   34.419334]  ret_from_fork+0x10/0x20
[   34.419375] 
[   34.419401] The buggy address belongs to the object at fff00000c44dff00
[   34.419401]  which belongs to the cache kmalloc-128 of size 128
[   34.419495] The buggy address is located 0 bytes to the right of
[   34.419495]  allocated 115-byte region [fff00000c44dff00, fff00000c44dff73)
[   34.419590] 
[   34.419639] The buggy address belongs to the physical page:
[   34.419701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   34.419784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.419867] page_type: f5(slab)
[   34.419934] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.420008] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   34.420066] page dumped because: kasan: bad access detected
[   34.420114] 
[   34.420136] Memory state around the buggy address:
[   34.420191]  fff00000c44dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.420257]  fff00000c44dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.420358] >fff00000c44dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.420458]                                                              ^
[   34.420541]  fff00000c44dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.420641]  fff00000c44e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.420729] ==================================================================
[   34.449189] ==================================================================
[   34.449389] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.449534] Read of size 1 at addr fff00000c5a42001 by task kunit_try_catch/234
[   34.449682] 
[   34.449775] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.450004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.450071] Hardware name: linux,dummy-virt (DT)
[   34.450144] Call trace:
[   34.450201]  show_stack+0x20/0x38 (C)
[   34.450353]  dump_stack_lvl+0x8c/0xd0
[   34.450505]  print_report+0x118/0x608
[   34.450679]  kasan_report+0xdc/0x128
[   34.450831]  __asan_report_load1_noabort+0x20/0x30
[   34.450994]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.451158]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   34.451279]  kunit_try_run_case+0x170/0x3f0
[   34.451451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.451633]  kthread+0x328/0x630
[   34.451721]  ret_from_fork+0x10/0x20
[   34.451834] 
[   34.451927] The buggy address belongs to the physical page:
[   34.452011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a40
[   34.452141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.452383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.452508] page_type: f8(unknown)
[   34.452565] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.452658] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.452798] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.452927] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.453043] head: 0bfffe0000000002 ffffc1ffc3169001 00000000ffffffff 00000000ffffffff
[   34.453135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.453213] page dumped because: kasan: bad access detected
[   34.453301] 
[   34.453345] Memory state around the buggy address:
[   34.453750]  fff00000c5a41f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.454090]  fff00000c5a41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.454309] >fff00000c5a42000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454419]                    ^
[   34.454489]  fff00000c5a42080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454595]  fff00000c5a42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   33.806679] ==================================================================
[   33.806893] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   33.807622] Read of size 1 at addr fff00000c1b9eb40 by task kunit_try_catch/226
[   33.808264] 
[   33.808423] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   33.808781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.808855] Hardware name: linux,dummy-virt (DT)
[   33.809326] Call trace:
[   33.809455]  show_stack+0x20/0x38 (C)
[   33.809802]  dump_stack_lvl+0x8c/0xd0
[   33.810122]  print_report+0x118/0x608
[   33.810396]  kasan_report+0xdc/0x128
[   33.810852]  __kasan_check_byte+0x54/0x70
[   33.811833]  kmem_cache_destroy+0x34/0x218
[   33.812352]  kmem_cache_double_destroy+0x174/0x300
[   33.812881]  kunit_try_run_case+0x170/0x3f0
[   33.813094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.813197]  kthread+0x328/0x630
[   33.813308]  ret_from_fork+0x10/0x20
[   33.813418] 
[   33.813455] Allocated by task 226:
[   33.813514]  kasan_save_stack+0x3c/0x68
[   33.813591]  kasan_save_track+0x20/0x40
[   33.813689]  kasan_save_alloc_info+0x40/0x58
[   33.813771]  __kasan_slab_alloc+0xa8/0xb0
[   33.813941]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.814176]  __kmem_cache_create_args+0x178/0x280
[   33.814351]  kmem_cache_double_destroy+0xc0/0x300
[   33.814451]  kunit_try_run_case+0x170/0x3f0
[   33.815162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.815353]  kthread+0x328/0x630
[   33.815466]  ret_from_fork+0x10/0x20
[   33.815566] 
[   33.815631] Freed by task 226:
[   33.815700]  kasan_save_stack+0x3c/0x68
[   33.815798]  kasan_save_track+0x20/0x40
[   33.815894]  kasan_save_free_info+0x4c/0x78
[   33.815993]  __kasan_slab_free+0x6c/0x98
[   33.816350]  kmem_cache_free+0x260/0x468
[   33.817012]  slab_kmem_cache_release+0x38/0x50
[   33.817106]  kmem_cache_release+0x1c/0x30
[   33.817175]  kobject_put+0x17c/0x420
[   33.817519]  sysfs_slab_release+0x1c/0x30
[   33.817601]  kmem_cache_destroy+0x118/0x218
[   33.817692]  kmem_cache_double_destroy+0x128/0x300
[   33.817777]  kunit_try_run_case+0x170/0x3f0
[   33.817863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.817949]  kthread+0x328/0x630
[   33.818021]  ret_from_fork+0x10/0x20
[   33.818138] 
[   33.818246] The buggy address belongs to the object at fff00000c1b9eb40
[   33.818246]  which belongs to the cache kmem_cache of size 208
[   33.818517] The buggy address is located 0 bytes inside of
[   33.818517]  freed 208-byte region [fff00000c1b9eb40, fff00000c1b9ec10)
[   33.818792] 
[   33.818867] The buggy address belongs to the physical page:
[   33.818957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b9e
[   33.819093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.819705] page_type: f5(slab)
[   33.819871] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   33.820122] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   33.820390] page dumped because: kasan: bad access detected
[   33.820559] 
[   33.820636] Memory state around the buggy address:
[   33.820729]  fff00000c1b9ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.820844]  fff00000c1b9ea80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   33.820954] >fff00000c1b9eb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.821054]                                            ^
[   33.821149]  fff00000c1b9eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.821311]  fff00000c1b9ec00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.821645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   33.565738] ==================================================================
[   33.565949] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   33.566124] Read of size 1 at addr fff00000c769b000 by task kunit_try_catch/224
[   33.566258] 
[   33.566353] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   33.566574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.567679] Hardware name: linux,dummy-virt (DT)
[   33.567842] Call trace:
[   33.567920]  show_stack+0x20/0x38 (C)
[   33.568067]  dump_stack_lvl+0x8c/0xd0
[   33.568541]  print_report+0x118/0x608
[   33.568850]  kasan_report+0xdc/0x128
[   33.569113]  __asan_report_load1_noabort+0x20/0x30
[   33.569216]  kmem_cache_rcu_uaf+0x388/0x468
[   33.569303]  kunit_try_run_case+0x170/0x3f0
[   33.569672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.569891]  kthread+0x328/0x630
[   33.570001]  ret_from_fork+0x10/0x20
[   33.570324] 
[   33.570395] Allocated by task 224:
[   33.570537]  kasan_save_stack+0x3c/0x68
[   33.570768]  kasan_save_track+0x20/0x40
[   33.571005]  kasan_save_alloc_info+0x40/0x58
[   33.571182]  __kasan_slab_alloc+0xa8/0xb0
[   33.571324]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.571652]  kmem_cache_rcu_uaf+0x12c/0x468
[   33.571752]  kunit_try_run_case+0x170/0x3f0
[   33.571997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572273]  kthread+0x328/0x630
[   33.572529]  ret_from_fork+0x10/0x20
[   33.572776] 
[   33.573087] Freed by task 0:
[   33.573266]  kasan_save_stack+0x3c/0x68
[   33.573400]  kasan_save_track+0x20/0x40
[   33.573490]  kasan_save_free_info+0x4c/0x78
[   33.573646]  __kasan_slab_free+0x6c/0x98
[   33.573911]  slab_free_after_rcu_debug+0xd4/0x2f8
[   33.574115]  rcu_core+0x9f4/0x1e20
[   33.574273]  rcu_core_si+0x18/0x30
[   33.574419]  handle_softirqs+0x374/0xb28
[   33.574735]  __do_softirq+0x1c/0x28
[   33.574938] 
[   33.574986] Last potentially related work creation:
[   33.575055]  kasan_save_stack+0x3c/0x68
[   33.575694]  kasan_record_aux_stack+0xb4/0xc8
[   33.575935]  kmem_cache_free+0x120/0x468
[   33.576030]  kmem_cache_rcu_uaf+0x16c/0x468
[   33.576374]  kunit_try_run_case+0x170/0x3f0
[   33.576478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.576588]  kthread+0x328/0x630
[   33.576819]  ret_from_fork+0x10/0x20
[   33.577042] 
[   33.577112] The buggy address belongs to the object at fff00000c769b000
[   33.577112]  which belongs to the cache test_cache of size 200
[   33.577547] The buggy address is located 0 bytes inside of
[   33.577547]  freed 200-byte region [fff00000c769b000, fff00000c769b0c8)
[   33.577683] 
[   33.577810] The buggy address belongs to the physical page:
[   33.578053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769b
[   33.578370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.578738] page_type: f5(slab)
[   33.578981] raw: 0bfffe0000000000 fff00000c1b9ea00 dead000000000122 0000000000000000
[   33.579358] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.579556] page dumped because: kasan: bad access detected
[   33.579726] 
[   33.579799] Memory state around the buggy address:
[   33.580041]  fff00000c769af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.580282]  fff00000c769af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.580466] >fff00000c769b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.580551]                    ^
[   33.580618]  fff00000c769b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.581030]  fff00000c769b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.581136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.256340] ==================================================================
[   33.256659] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   33.256915] Free of addr fff00000c59f8001 by task kunit_try_catch/222
[   33.257115] 
[   33.257447] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   33.257811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.257949] Hardware name: linux,dummy-virt (DT)
[   33.258069] Call trace:
[   33.258254]  show_stack+0x20/0x38 (C)
[   33.258877]  dump_stack_lvl+0x8c/0xd0
[   33.259355]  print_report+0x118/0x608
[   33.259618]  kasan_report_invalid_free+0xc0/0xe8
[   33.259897]  check_slab_allocation+0xfc/0x108
[   33.260047]  __kasan_slab_pre_free+0x2c/0x48
[   33.260168]  kmem_cache_free+0xf0/0x468
[   33.260671]  kmem_cache_invalid_free+0x184/0x3c8
[   33.260943]  kunit_try_run_case+0x170/0x3f0
[   33.261201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.261548]  kthread+0x328/0x630
[   33.261667]  ret_from_fork+0x10/0x20
[   33.261859] 
[   33.262023] Allocated by task 222:
[   33.262123]  kasan_save_stack+0x3c/0x68
[   33.262365]  kasan_save_track+0x20/0x40
[   33.262638]  kasan_save_alloc_info+0x40/0x58
[   33.263005]  __kasan_slab_alloc+0xa8/0xb0
[   33.263178]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.263508]  kmem_cache_invalid_free+0x12c/0x3c8
[   33.263831]  kunit_try_run_case+0x170/0x3f0
[   33.264034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.264299]  kthread+0x328/0x630
[   33.264450]  ret_from_fork+0x10/0x20
[   33.264542] 
[   33.264593] The buggy address belongs to the object at fff00000c59f8000
[   33.264593]  which belongs to the cache test_cache of size 200
[   33.264775] The buggy address is located 1 bytes inside of
[   33.264775]  200-byte region [fff00000c59f8000, fff00000c59f80c8)
[   33.264935] 
[   33.264989] The buggy address belongs to the physical page:
[   33.265167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f8
[   33.265546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.265779] page_type: f5(slab)
[   33.265949] raw: 0bfffe0000000000 fff00000c59f3140 dead000000000122 0000000000000000
[   33.266241] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.266640] page dumped because: kasan: bad access detected
[   33.266852] 
[   33.266951] Memory state around the buggy address:
[   33.267180]  fff00000c59f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.267453]  fff00000c59f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.267571] >fff00000c59f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.267701]                    ^
[   33.267780]  fff00000c59f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.267897]  fff00000c59f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.268571] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.159259] ==================================================================
[   33.160087] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.160513] Free of addr fff00000c7685000 by task kunit_try_catch/220
[   33.160667] 
[   33.160782] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   33.161012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.161094] Hardware name: linux,dummy-virt (DT)
[   33.161173] Call trace:
[   33.161220]  show_stack+0x20/0x38 (C)
[   33.161344]  dump_stack_lvl+0x8c/0xd0
[   33.161465]  print_report+0x118/0x608
[   33.161591]  kasan_report_invalid_free+0xc0/0xe8
[   33.161726]  check_slab_allocation+0xd4/0x108
[   33.161892]  __kasan_slab_pre_free+0x2c/0x48
[   33.162062]  kmem_cache_free+0xf0/0x468
[   33.162187]  kmem_cache_double_free+0x190/0x3c8
[   33.162310]  kunit_try_run_case+0x170/0x3f0
[   33.162441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.162620]  kthread+0x328/0x630
[   33.162719]  ret_from_fork+0x10/0x20
[   33.162834] 
[   33.162876] Allocated by task 220:
[   33.163699]  kasan_save_stack+0x3c/0x68
[   33.163836]  kasan_save_track+0x20/0x40
[   33.163927]  kasan_save_alloc_info+0x40/0x58
[   33.164029]  __kasan_slab_alloc+0xa8/0xb0
[   33.164115]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.164212]  kmem_cache_double_free+0x12c/0x3c8
[   33.164327]  kunit_try_run_case+0x170/0x3f0
[   33.164417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.164520]  kthread+0x328/0x630
[   33.164850]  ret_from_fork+0x10/0x20
[   33.164920] 
[   33.164958] Freed by task 220:
[   33.165025]  kasan_save_stack+0x3c/0x68
[   33.165109]  kasan_save_track+0x20/0x40
[   33.165262]  kasan_save_free_info+0x4c/0x78
[   33.165538]  __kasan_slab_free+0x6c/0x98
[   33.165662]  kmem_cache_free+0x260/0x468
[   33.165761]  kmem_cache_double_free+0x140/0x3c8
[   33.165860]  kunit_try_run_case+0x170/0x3f0
[   33.166036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.166261]  kthread+0x328/0x630
[   33.166342]  ret_from_fork+0x10/0x20
[   33.166710] 
[   33.167051] The buggy address belongs to the object at fff00000c7685000
[   33.167051]  which belongs to the cache test_cache of size 200
[   33.167348] The buggy address is located 0 bytes inside of
[   33.167348]  200-byte region [fff00000c7685000, fff00000c76850c8)
[   33.167843] 
[   33.168089] The buggy address belongs to the physical page:
[   33.168186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107685
[   33.168577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.168935] page_type: f5(slab)
[   33.169147] raw: 0bfffe0000000000 fff00000c1b9e8c0 dead000000000122 0000000000000000
[   33.169295] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.169400] page dumped because: kasan: bad access detected
[   33.169459] 
[   33.169491] Memory state around the buggy address:
[   33.169554]  fff00000c7684f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.169645]  fff00000c7684f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.170030] >fff00000c7685000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.170580]                    ^
[   33.170705]  fff00000c7685080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.170831]  fff00000c7685100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.170935] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.827329] ==================================================================
[   32.827550] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   32.828234] Read of size 1 at addr fff00000c59f60c8 by task kunit_try_catch/218
[   32.828819] 
[   32.829212] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.829805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.829876] Hardware name: linux,dummy-virt (DT)
[   32.829959] Call trace:
[   32.830018]  show_stack+0x20/0x38 (C)
[   32.830184]  dump_stack_lvl+0x8c/0xd0
[   32.830311]  print_report+0x118/0x608
[   32.830428]  kasan_report+0xdc/0x128
[   32.830545]  __asan_report_load1_noabort+0x20/0x30
[   32.831483]  kmem_cache_oob+0x344/0x430
[   32.831844]  kunit_try_run_case+0x170/0x3f0
[   32.831974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.832567]  kthread+0x328/0x630
[   32.832802]  ret_from_fork+0x10/0x20
[   32.833008] 
[   32.833056] Allocated by task 218:
[   32.833115]  kasan_save_stack+0x3c/0x68
[   32.833196]  kasan_save_track+0x20/0x40
[   32.833277]  kasan_save_alloc_info+0x40/0x58
[   32.833368]  __kasan_slab_alloc+0xa8/0xb0
[   32.834037]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.834304]  kmem_cache_oob+0x12c/0x430
[   32.834413]  kunit_try_run_case+0x170/0x3f0
[   32.834505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.834604]  kthread+0x328/0x630
[   32.835135]  ret_from_fork+0x10/0x20
[   32.835248] 
[   32.835540] The buggy address belongs to the object at fff00000c59f6000
[   32.835540]  which belongs to the cache test_cache of size 200
[   32.836133] The buggy address is located 0 bytes to the right of
[   32.836133]  allocated 200-byte region [fff00000c59f6000, fff00000c59f60c8)
[   32.836388] 
[   32.836555] The buggy address belongs to the physical page:
[   32.836662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f6
[   32.836899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.837019] page_type: f5(slab)
[   32.837607] raw: 0bfffe0000000000 fff00000c59f3000 dead000000000122 0000000000000000
[   32.837841] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   32.838050] page dumped because: kasan: bad access detected
[   32.838290] 
[   32.838359] Memory state around the buggy address:
[   32.838445]  fff00000c59f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.838736]  fff00000c59f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.838857] >fff00000c59f6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.838966]                                               ^
[   32.839065]  fff00000c59f6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.840335]  fff00000c59f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.840798] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.711354] ==================================================================
[   32.711579] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.712922] Read of size 8 at addr fff00000c59d4c40 by task kunit_try_catch/211
[   32.713046] 
[   32.713206] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.713480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.713596] Hardware name: linux,dummy-virt (DT)
[   32.713805] Call trace:
[   32.713946]  show_stack+0x20/0x38 (C)
[   32.714238]  dump_stack_lvl+0x8c/0xd0
[   32.714475]  print_report+0x118/0x608
[   32.714837]  kasan_report+0xdc/0x128
[   32.715176]  __asan_report_load8_noabort+0x20/0x30
[   32.715580]  workqueue_uaf+0x480/0x4a8
[   32.715871]  kunit_try_run_case+0x170/0x3f0
[   32.716048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.716262]  kthread+0x328/0x630
[   32.716463]  ret_from_fork+0x10/0x20
[   32.716704] 
[   32.716841] Allocated by task 211:
[   32.716920]  kasan_save_stack+0x3c/0x68
[   32.717271]  kasan_save_track+0x20/0x40
[   32.717359]  kasan_save_alloc_info+0x40/0x58
[   32.717436]  __kasan_kmalloc+0xd4/0xd8
[   32.717539]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.717650]  workqueue_uaf+0x13c/0x4a8
[   32.717741]  kunit_try_run_case+0x170/0x3f0
[   32.717840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.717969]  kthread+0x328/0x630
[   32.718128]  ret_from_fork+0x10/0x20
[   32.718281] 
[   32.718336] Freed by task 42:
[   32.718405]  kasan_save_stack+0x3c/0x68
[   32.718744]  kasan_save_track+0x20/0x40
[   32.718855]  kasan_save_free_info+0x4c/0x78
[   32.718966]  __kasan_slab_free+0x6c/0x98
[   32.719062]  kfree+0x214/0x3c8
[   32.719203]  workqueue_uaf_work+0x18/0x30
[   32.719302]  process_one_work+0x530/0xf98
[   32.719397]  worker_thread+0x618/0xf38
[   32.719883]  kthread+0x328/0x630
[   32.719999]  ret_from_fork+0x10/0x20
[   32.720102] 
[   32.721107] Last potentially related work creation:
[   32.721194]  kasan_save_stack+0x3c/0x68
[   32.721262]  kasan_record_aux_stack+0xb4/0xc8
[   32.721309]  __queue_work+0x65c/0xfe0
[   32.721382]  queue_work_on+0xbc/0xf8
[   32.721425]  workqueue_uaf+0x210/0x4a8
[   32.721468]  kunit_try_run_case+0x170/0x3f0
[   32.721513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.721564]  kthread+0x328/0x630
[   32.721600]  ret_from_fork+0x10/0x20
[   32.721688] 
[   32.721731] The buggy address belongs to the object at fff00000c59d4c40
[   32.721731]  which belongs to the cache kmalloc-32 of size 32
[   32.721882] The buggy address is located 0 bytes inside of
[   32.721882]  freed 32-byte region [fff00000c59d4c40, fff00000c59d4c60)
[   32.722040] 
[   32.722099] The buggy address belongs to the physical page:
[   32.722382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4
[   32.722526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.722680] page_type: f5(slab)
[   32.722951] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.723081] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.723190] page dumped because: kasan: bad access detected
[   32.723281] 
[   32.723323] Memory state around the buggy address:
[   32.723405]  fff00000c59d4b00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   32.723913]  fff00000c59d4b80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.724063] >fff00000c59d4c00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   32.724261]                                            ^
[   32.724367]  fff00000c59d4c80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724450]  fff00000c59d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724521] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   32.306994] ==================================================================
[   32.307493] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   32.307869] Read of size 1 at addr fff00000c596cda8 by task kunit_try_catch/199
[   32.308009] 
[   32.308152] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.308469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.308578] Hardware name: linux,dummy-virt (DT)
[   32.308667] Call trace:
[   32.308722]  show_stack+0x20/0x38 (C)
[   32.308913]  dump_stack_lvl+0x8c/0xd0
[   32.309287]  print_report+0x118/0x608
[   32.309607]  kasan_report+0xdc/0x128
[   32.309797]  __asan_report_load1_noabort+0x20/0x30
[   32.309976]  kmalloc_uaf2+0x3f4/0x468
[   32.310126]  kunit_try_run_case+0x170/0x3f0
[   32.310302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.310441]  kthread+0x328/0x630
[   32.310547]  ret_from_fork+0x10/0x20
[   32.310686] 
[   32.310732] Allocated by task 199:
[   32.310964]  kasan_save_stack+0x3c/0x68
[   32.311283]  kasan_save_track+0x20/0x40
[   32.311480]  kasan_save_alloc_info+0x40/0x58
[   32.311601]  __kasan_kmalloc+0xd4/0xd8
[   32.311752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.311867]  kmalloc_uaf2+0xc4/0x468
[   32.311977]  kunit_try_run_case+0x170/0x3f0
[   32.312101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312236]  kthread+0x328/0x630
[   32.312421]  ret_from_fork+0x10/0x20
[   32.312517] 
[   32.312572] Freed by task 199:
[   32.312654]  kasan_save_stack+0x3c/0x68
[   32.312956]  kasan_save_track+0x20/0x40
[   32.313048]  kasan_save_free_info+0x4c/0x78
[   32.313145]  __kasan_slab_free+0x6c/0x98
[   32.313254]  kfree+0x214/0x3c8
[   32.313367]  kmalloc_uaf2+0x134/0x468
[   32.313457]  kunit_try_run_case+0x170/0x3f0
[   32.313585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.313740]  kthread+0x328/0x630
[   32.313882]  ret_from_fork+0x10/0x20
[   32.314083] 
[   32.314157] The buggy address belongs to the object at fff00000c596cd80
[   32.314157]  which belongs to the cache kmalloc-64 of size 64
[   32.314444] The buggy address is located 40 bytes inside of
[   32.314444]  freed 64-byte region [fff00000c596cd80, fff00000c596cdc0)
[   32.314652] 
[   32.314711] The buggy address belongs to the physical page:
[   32.314792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c
[   32.314930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.315216] page_type: f5(slab)
[   32.315569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.315812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.315926] page dumped because: kasan: bad access detected
[   32.316012] 
[   32.316057] Memory state around the buggy address:
[   32.316144]  fff00000c596cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316254]  fff00000c596cd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316376] >fff00000c596cd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316482]                                   ^
[   32.316681]  fff00000c596ce00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   32.317036]  fff00000c596ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317144] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   32.262396] ==================================================================
[   32.262601] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   32.263201] Write of size 33 at addr fff00000c596cc00 by task kunit_try_catch/197
[   32.263446] 
[   32.263605] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.264202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.264384] Hardware name: linux,dummy-virt (DT)
[   32.264725] Call trace:
[   32.264806]  show_stack+0x20/0x38 (C)
[   32.264967]  dump_stack_lvl+0x8c/0xd0
[   32.265155]  print_report+0x118/0x608
[   32.265364]  kasan_report+0xdc/0x128
[   32.265700]  kasan_check_range+0x100/0x1a8
[   32.266001]  __asan_memset+0x34/0x78
[   32.266115]  kmalloc_uaf_memset+0x170/0x310
[   32.266253]  kunit_try_run_case+0x170/0x3f0
[   32.266395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.266592]  kthread+0x328/0x630
[   32.266774]  ret_from_fork+0x10/0x20
[   32.266957] 
[   32.267030] Allocated by task 197:
[   32.267136]  kasan_save_stack+0x3c/0x68
[   32.267287]  kasan_save_track+0x20/0x40
[   32.267398]  kasan_save_alloc_info+0x40/0x58
[   32.267522]  __kasan_kmalloc+0xd4/0xd8
[   32.267903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.268020]  kmalloc_uaf_memset+0xb8/0x310
[   32.268403]  kunit_try_run_case+0x170/0x3f0
[   32.268460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.268536]  kthread+0x328/0x630
[   32.268591]  ret_from_fork+0x10/0x20
[   32.268781] 
[   32.268837] Freed by task 197:
[   32.268914]  kasan_save_stack+0x3c/0x68
[   32.269029]  kasan_save_track+0x20/0x40
[   32.269125]  kasan_save_free_info+0x4c/0x78
[   32.269204]  __kasan_slab_free+0x6c/0x98
[   32.269269]  kfree+0x214/0x3c8
[   32.269326]  kmalloc_uaf_memset+0x11c/0x310
[   32.269442]  kunit_try_run_case+0x170/0x3f0
[   32.269540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.269664]  kthread+0x328/0x630
[   32.269756]  ret_from_fork+0x10/0x20
[   32.269842] 
[   32.269897] The buggy address belongs to the object at fff00000c596cc00
[   32.269897]  which belongs to the cache kmalloc-64 of size 64
[   32.270058] The buggy address is located 0 bytes inside of
[   32.270058]  freed 64-byte region [fff00000c596cc00, fff00000c596cc40)
[   32.270226] 
[   32.270282] The buggy address belongs to the physical page:
[   32.270358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c
[   32.270510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.271324] page_type: f5(slab)
[   32.271457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.271595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.272088] page dumped because: kasan: bad access detected
[   32.272189] 
[   32.272754] Memory state around the buggy address:
[   32.272862]  fff00000c596cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273109]  fff00000c596cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273471] >fff00000c596cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273681]                    ^
[   32.273824]  fff00000c596cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273937]  fff00000c596cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.274541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   32.218110] ==================================================================
[   32.218316] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   32.218472] Read of size 1 at addr fff00000c58d29a8 by task kunit_try_catch/195
[   32.218599] 
[   32.220105] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.221384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221914] Hardware name: linux,dummy-virt (DT)
[   32.222003] Call trace:
[   32.222102]  show_stack+0x20/0x38 (C)
[   32.222442]  dump_stack_lvl+0x8c/0xd0
[   32.222647]  print_report+0x118/0x608
[   32.222893]  kasan_report+0xdc/0x128
[   32.223188]  __asan_report_load1_noabort+0x20/0x30
[   32.224098]  kmalloc_uaf+0x300/0x338
[   32.224505]  kunit_try_run_case+0x170/0x3f0
[   32.224727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.224870]  kthread+0x328/0x630
[   32.224980]  ret_from_fork+0x10/0x20
[   32.225099] 
[   32.225141] Allocated by task 195:
[   32.225199]  kasan_save_stack+0x3c/0x68
[   32.225279]  kasan_save_track+0x20/0x40
[   32.225363]  kasan_save_alloc_info+0x40/0x58
[   32.226460]  __kasan_kmalloc+0xd4/0xd8
[   32.226917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.227496]  kmalloc_uaf+0xb8/0x338
[   32.227720]  kunit_try_run_case+0x170/0x3f0
[   32.227902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.228149]  kthread+0x328/0x630
[   32.228492]  ret_from_fork+0x10/0x20
[   32.229309] 
[   32.229378] Freed by task 195:
[   32.229492]  kasan_save_stack+0x3c/0x68
[   32.229727]  kasan_save_track+0x20/0x40
[   32.229945]  kasan_save_free_info+0x4c/0x78
[   32.230067]  __kasan_slab_free+0x6c/0x98
[   32.230284]  kfree+0x214/0x3c8
[   32.230382]  kmalloc_uaf+0x11c/0x338
[   32.231055]  kunit_try_run_case+0x170/0x3f0
[   32.231304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.231900]  kthread+0x328/0x630
[   32.232083]  ret_from_fork+0x10/0x20
[   32.232357] 
[   32.232473] The buggy address belongs to the object at fff00000c58d29a0
[   32.232473]  which belongs to the cache kmalloc-16 of size 16
[   32.232653] The buggy address is located 8 bytes inside of
[   32.232653]  freed 16-byte region [fff00000c58d29a0, fff00000c58d29b0)
[   32.232791] 
[   32.232840] The buggy address belongs to the physical page:
[   32.232906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2
[   32.234144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.234764] page_type: f5(slab)
[   32.235381] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.235599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.235721] page dumped because: kasan: bad access detected
[   32.236350] 
[   32.236538] Memory state around the buggy address:
[   32.236729]  fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.237115]  fff00000c58d2900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.237216] >fff00000c58d2980: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   32.237288]                                   ^
[   32.237353]  fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.237428]  fff00000c58d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.237878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   32.186812] ==================================================================
[   32.187093] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.187254] Read of size 64 at addr fff00000c596c904 by task kunit_try_catch/193
[   32.187791] 
[   32.187893] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.188118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.188180] Hardware name: linux,dummy-virt (DT)
[   32.188260] Call trace:
[   32.188374]  show_stack+0x20/0x38 (C)
[   32.188816]  dump_stack_lvl+0x8c/0xd0
[   32.188996]  print_report+0x118/0x608
[   32.189159]  kasan_report+0xdc/0x128
[   32.189334]  kasan_check_range+0x100/0x1a8
[   32.189505]  __asan_memmove+0x3c/0x98
[   32.189597]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   32.189719]  kunit_try_run_case+0x170/0x3f0
[   32.189992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.190149]  kthread+0x328/0x630
[   32.190260]  ret_from_fork+0x10/0x20
[   32.190461] 
[   32.190532] Allocated by task 193:
[   32.190721]  kasan_save_stack+0x3c/0x68
[   32.190840]  kasan_save_track+0x20/0x40
[   32.190933]  kasan_save_alloc_info+0x40/0x58
[   32.191031]  __kasan_kmalloc+0xd4/0xd8
[   32.191398]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.191554]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   32.191679]  kunit_try_run_case+0x170/0x3f0
[   32.191834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.191958]  kthread+0x328/0x630
[   32.192041]  ret_from_fork+0x10/0x20
[   32.192134] 
[   32.192185] The buggy address belongs to the object at fff00000c596c900
[   32.192185]  which belongs to the cache kmalloc-64 of size 64
[   32.192409] The buggy address is located 4 bytes inside of
[   32.192409]  allocated 64-byte region [fff00000c596c900, fff00000c596c940)
[   32.192599] 
[   32.192660] The buggy address belongs to the physical page:
[   32.192742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c
[   32.192905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.193023] page_type: f5(slab)
[   32.193362] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.193552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.193713] page dumped because: kasan: bad access detected
[   32.193797] 
[   32.193849] Memory state around the buggy address:
[   32.193956]  fff00000c596c800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   32.194074]  fff00000c596c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.194183] >fff00000c596c900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.194489]                                            ^
[   32.194694]  fff00000c596c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.194866]  fff00000c596ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.195019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   32.070623] ==================================================================
[   32.071382] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   32.071575] Write of size 16 at addr fff00000c44df969 by task kunit_try_catch/189
[   32.071719] 
[   32.071814] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.072037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.072107] Hardware name: linux,dummy-virt (DT)
[   32.072189] Call trace:
[   32.072249]  show_stack+0x20/0x38 (C)
[   32.073260]  dump_stack_lvl+0x8c/0xd0
[   32.074082]  print_report+0x118/0x608
[   32.074472]  kasan_report+0xdc/0x128
[   32.075008]  kasan_check_range+0x100/0x1a8
[   32.075336]  __asan_memset+0x34/0x78
[   32.075459]  kmalloc_oob_memset_16+0x150/0x2f8
[   32.076029]  kunit_try_run_case+0x170/0x3f0
[   32.076470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.076732]  kthread+0x328/0x630
[   32.076817]  ret_from_fork+0x10/0x20
[   32.076907] 
[   32.076945] Allocated by task 189:
[   32.077011]  kasan_save_stack+0x3c/0x68
[   32.077112]  kasan_save_track+0x20/0x40
[   32.078108]  kasan_save_alloc_info+0x40/0x58
[   32.078236]  __kasan_kmalloc+0xd4/0xd8
[   32.078647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.079009]  kmalloc_oob_memset_16+0xb0/0x2f8
[   32.079375]  kunit_try_run_case+0x170/0x3f0
[   32.079490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.079773]  kthread+0x328/0x630
[   32.080086]  ret_from_fork+0x10/0x20
[   32.080419] 
[   32.080729] The buggy address belongs to the object at fff00000c44df900
[   32.080729]  which belongs to the cache kmalloc-128 of size 128
[   32.081176] The buggy address is located 105 bytes inside of
[   32.081176]  allocated 120-byte region [fff00000c44df900, fff00000c44df978)
[   32.081588] 
[   32.081682] The buggy address belongs to the physical page:
[   32.081787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.082128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.082232] page_type: f5(slab)
[   32.082664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.082890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.083039] page dumped because: kasan: bad access detected
[   32.083150] 
[   32.083350] Memory state around the buggy address:
[   32.083547]  fff00000c44df800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.083675]  fff00000c44df880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084050] >fff00000c44df900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.084354]                                                                 ^
[   32.084477]  fff00000c44df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084814]  fff00000c44dfa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   32.013591] ==================================================================
[   32.013796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   32.013932] Write of size 8 at addr fff00000c44df871 by task kunit_try_catch/187
[   32.014031] 
[   32.014115] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   32.014337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.014450] Hardware name: linux,dummy-virt (DT)
[   32.014521] Call trace:
[   32.014572]  show_stack+0x20/0x38 (C)
[   32.014697]  dump_stack_lvl+0x8c/0xd0
[   32.014786]  print_report+0x118/0x608
[   32.014889]  kasan_report+0xdc/0x128
[   32.014995]  kasan_check_range+0x100/0x1a8
[   32.015128]  __asan_memset+0x34/0x78
[   32.015251]  kmalloc_oob_memset_8+0x150/0x2f8
[   32.015396]  kunit_try_run_case+0x170/0x3f0
[   32.015540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.015708]  kthread+0x328/0x630
[   32.015838]  ret_from_fork+0x10/0x20
[   32.015982] 
[   32.016038] Allocated by task 187:
[   32.016109]  kasan_save_stack+0x3c/0x68
[   32.016240]  kasan_save_track+0x20/0x40
[   32.016360]  kasan_save_alloc_info+0x40/0x58
[   32.016452]  __kasan_kmalloc+0xd4/0xd8
[   32.016526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.016628]  kmalloc_oob_memset_8+0xb0/0x2f8
[   32.016710]  kunit_try_run_case+0x170/0x3f0
[   32.016786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.016867]  kthread+0x328/0x630
[   32.016959]  ret_from_fork+0x10/0x20
[   32.017042] 
[   32.017088] The buggy address belongs to the object at fff00000c44df800
[   32.017088]  which belongs to the cache kmalloc-128 of size 128
[   32.017274] The buggy address is located 113 bytes inside of
[   32.017274]  allocated 120-byte region [fff00000c44df800, fff00000c44df878)
[   32.017436] 
[   32.017512] The buggy address belongs to the physical page:
[   32.017626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   32.017779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.017964] page_type: f5(slab)
[   32.018068] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.018204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.018331] page dumped because: kasan: bad access detected
[   32.018439] 
[   32.018501] Memory state around the buggy address:
[   32.018618]  fff00000c44df700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.018711]  fff00000c44df780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.018808] >fff00000c44df800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.018885]                                                                 ^
[   32.018978]  fff00000c44df880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.019071]  fff00000c44df900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.019185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   31.979622] ==================================================================
[   31.979816] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   31.979971] Write of size 4 at addr fff00000c44df775 by task kunit_try_catch/185
[   31.980100] 
[   31.980193] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.981244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.981332] Hardware name: linux,dummy-virt (DT)
[   31.981394] Call trace:
[   31.981447]  show_stack+0x20/0x38 (C)
[   31.981568]  dump_stack_lvl+0x8c/0xd0
[   31.981683]  print_report+0x118/0x608
[   31.981785]  kasan_report+0xdc/0x128
[   31.981879]  kasan_check_range+0x100/0x1a8
[   31.981983]  __asan_memset+0x34/0x78
[   31.982073]  kmalloc_oob_memset_4+0x150/0x300
[   31.982171]  kunit_try_run_case+0x170/0x3f0
[   31.982277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.982386]  kthread+0x328/0x630
[   31.982478]  ret_from_fork+0x10/0x20
[   31.982589] 
[   31.982649] Allocated by task 185:
[   31.982712]  kasan_save_stack+0x3c/0x68
[   31.982807]  kasan_save_track+0x20/0x40
[   31.982882]  kasan_save_alloc_info+0x40/0x58
[   31.982975]  __kasan_kmalloc+0xd4/0xd8
[   31.983064]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.983151]  kmalloc_oob_memset_4+0xb0/0x300
[   31.983234]  kunit_try_run_case+0x170/0x3f0
[   31.983320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.983426]  kthread+0x328/0x630
[   31.983508]  ret_from_fork+0x10/0x20
[   31.983591] 
[   31.983647] The buggy address belongs to the object at fff00000c44df700
[   31.983647]  which belongs to the cache kmalloc-128 of size 128
[   31.983765] The buggy address is located 117 bytes inside of
[   31.983765]  allocated 120-byte region [fff00000c44df700, fff00000c44df778)
[   31.983878] 
[   31.983947] The buggy address belongs to the physical page:
[   31.984032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.984257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.984520] page_type: f5(slab)
[   31.985431] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.985641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.985835] page dumped because: kasan: bad access detected
[   31.985920] 
[   31.985967] Memory state around the buggy address:
[   31.986049]  fff00000c44df600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.986163]  fff00000c44df680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.986276] >fff00000c44df700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.986375]                                                                 ^
[   31.986974]  fff00000c44df780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.987159]  fff00000c44df800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.987372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   31.916091] ==================================================================
[   31.916275] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.916519] Write of size 128 at addr fff00000c44df600 by task kunit_try_catch/181
[   31.917355] 
[   31.917409] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.917514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.917543] Hardware name: linux,dummy-virt (DT)
[   31.917582] Call trace:
[   31.917632]  show_stack+0x20/0x38 (C)
[   31.917752]  dump_stack_lvl+0x8c/0xd0
[   31.917848]  print_report+0x118/0x608
[   31.917919]  kasan_report+0xdc/0x128
[   31.918008]  kasan_check_range+0x100/0x1a8
[   31.918063]  __asan_memset+0x34/0x78
[   31.918110]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.918162]  kunit_try_run_case+0x170/0x3f0
[   31.918214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.918272]  kthread+0x328/0x630
[   31.918317]  ret_from_fork+0x10/0x20
[   31.918373] 
[   31.918398] Allocated by task 181:
[   31.918431]  kasan_save_stack+0x3c/0x68
[   31.918483]  kasan_save_track+0x20/0x40
[   31.918525]  kasan_save_alloc_info+0x40/0x58
[   31.918570]  __kasan_kmalloc+0xd4/0xd8
[   31.918624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.918674]  kmalloc_oob_in_memset+0xb0/0x2d0
[   31.918715]  kunit_try_run_case+0x170/0x3f0
[   31.918756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.918803]  kthread+0x328/0x630
[   31.918838]  ret_from_fork+0x10/0x20
[   31.918878] 
[   31.918902] The buggy address belongs to the object at fff00000c44df600
[   31.918902]  which belongs to the cache kmalloc-128 of size 128
[   31.918968] The buggy address is located 0 bytes inside of
[   31.918968]  allocated 120-byte region [fff00000c44df600, fff00000c44df678)
[   31.919035] 
[   31.919061] The buggy address belongs to the physical page:
[   31.919098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.919159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.919221] page_type: f5(slab)
[   31.919273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.919329] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.919376] page dumped because: kasan: bad access detected
[   31.919410] 
[   31.919449] Memory state around the buggy address:
[   31.919498]  fff00000c44df500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.919547]  fff00000c44df580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.919593] >fff00000c44df600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.920053]                                                                 ^
[   31.920183]  fff00000c44df680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.920304]  fff00000c44df700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.920410] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   31.894063] ==================================================================
[   31.894278] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.894433] Read of size 16 at addr fff00000c58d2980 by task kunit_try_catch/179
[   31.894593] 
[   31.894702] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.895013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.895107] Hardware name: linux,dummy-virt (DT)
[   31.895220] Call trace:
[   31.895305]  show_stack+0x20/0x38 (C)
[   31.895494]  dump_stack_lvl+0x8c/0xd0
[   31.895670]  print_report+0x118/0x608
[   31.895798]  kasan_report+0xdc/0x128
[   31.895943]  __asan_report_load16_noabort+0x20/0x30
[   31.896111]  kmalloc_uaf_16+0x3bc/0x438
[   31.896264]  kunit_try_run_case+0x170/0x3f0
[   31.896427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.896550]  kthread+0x328/0x630
[   31.896821]  ret_from_fork+0x10/0x20
[   31.897166] 
[   31.897211] Allocated by task 179:
[   31.897315]  kasan_save_stack+0x3c/0x68
[   31.897441]  kasan_save_track+0x20/0x40
[   31.897552]  kasan_save_alloc_info+0x40/0x58
[   31.897742]  __kasan_kmalloc+0xd4/0xd8
[   31.897841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.897929]  kmalloc_uaf_16+0x140/0x438
[   31.898012]  kunit_try_run_case+0x170/0x3f0
[   31.898157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.898252]  kthread+0x328/0x630
[   31.898325]  ret_from_fork+0x10/0x20
[   31.898405] 
[   31.898453] Freed by task 179:
[   31.898506]  kasan_save_stack+0x3c/0x68
[   31.898575]  kasan_save_track+0x20/0x40
[   31.898703]  kasan_save_free_info+0x4c/0x78
[   31.898804]  __kasan_slab_free+0x6c/0x98
[   31.898901]  kfree+0x214/0x3c8
[   31.899080]  kmalloc_uaf_16+0x190/0x438
[   31.899275]  kunit_try_run_case+0x170/0x3f0
[   31.899406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.899547]  kthread+0x328/0x630
[   31.899725]  ret_from_fork+0x10/0x20
[   31.899854] 
[   31.899900] The buggy address belongs to the object at fff00000c58d2980
[   31.899900]  which belongs to the cache kmalloc-16 of size 16
[   31.900110] The buggy address is located 0 bytes inside of
[   31.900110]  freed 16-byte region [fff00000c58d2980, fff00000c58d2990)
[   31.900268] 
[   31.900356] The buggy address belongs to the physical page:
[   31.900430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2
[   31.900655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.900848] page_type: f5(slab)
[   31.900991] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   31.901172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.901321] page dumped because: kasan: bad access detected
[   31.901422] 
[   31.901488] Memory state around the buggy address:
[   31.901602]  fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.901741]  fff00000c58d2900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   31.901825] >fff00000c58d2980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.901896]                    ^
[   31.901976]  fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.902075]  fff00000c58d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.902171] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   31.870275] ==================================================================
[   31.870476] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.870648] Write of size 16 at addr fff00000c58d2920 by task kunit_try_catch/177
[   31.870763] 
[   31.870850] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.871066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.871167] Hardware name: linux,dummy-virt (DT)
[   31.871263] Call trace:
[   31.871324]  show_stack+0x20/0x38 (C)
[   31.871477]  dump_stack_lvl+0x8c/0xd0
[   31.871587]  print_report+0x118/0x608
[   31.871733]  kasan_report+0xdc/0x128
[   31.871875]  __asan_report_store16_noabort+0x20/0x30
[   31.872029]  kmalloc_oob_16+0x3a0/0x3f8
[   31.872160]  kunit_try_run_case+0x170/0x3f0
[   31.872301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.872459]  kthread+0x328/0x630
[   31.872556]  ret_from_fork+0x10/0x20
[   31.872681] 
[   31.872723] Allocated by task 177:
[   31.872831]  kasan_save_stack+0x3c/0x68
[   31.872950]  kasan_save_track+0x20/0x40
[   31.873022]  kasan_save_alloc_info+0x40/0x58
[   31.873096]  __kasan_kmalloc+0xd4/0xd8
[   31.873174]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.873256]  kmalloc_oob_16+0xb4/0x3f8
[   31.873338]  kunit_try_run_case+0x170/0x3f0
[   31.873458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.873591]  kthread+0x328/0x630
[   31.873707]  ret_from_fork+0x10/0x20
[   31.873808] 
[   31.873855] The buggy address belongs to the object at fff00000c58d2920
[   31.873855]  which belongs to the cache kmalloc-16 of size 16
[   31.874017] The buggy address is located 0 bytes inside of
[   31.874017]  allocated 13-byte region [fff00000c58d2920, fff00000c58d292d)
[   31.874214] 
[   31.874289] The buggy address belongs to the physical page:
[   31.874398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2
[   31.874591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.874763] page_type: f5(slab)
[   31.874880] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   31.875064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.875210] page dumped because: kasan: bad access detected
[   31.875297] 
[   31.875360] Memory state around the buggy address:
[   31.875454]  fff00000c58d2800: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   31.875582]  fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.875734] >fff00000c58d2900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   31.875835]                                   ^
[   31.875921]  fff00000c58d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.876081]  fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.876190] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   31.819452] ==================================================================
[   31.820586] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   31.821153] Read of size 1 at addr fff00000c4497000 by task kunit_try_catch/175
[   31.821351] 
[   31.821644] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.822184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.822257] Hardware name: linux,dummy-virt (DT)
[   31.822747] Call trace:
[   31.822913]  show_stack+0x20/0x38 (C)
[   31.823240]  dump_stack_lvl+0x8c/0xd0
[   31.823524]  print_report+0x118/0x608
[   31.824877]  kasan_report+0xdc/0x128
[   31.825191]  __kasan_check_byte+0x54/0x70
[   31.825329]  krealloc_noprof+0x44/0x360
[   31.825461]  krealloc_uaf+0x180/0x520
[   31.825575]  kunit_try_run_case+0x170/0x3f0
[   31.825676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.825780]  kthread+0x328/0x630
[   31.825875]  ret_from_fork+0x10/0x20
[   31.826123] 
[   31.826257] Allocated by task 175:
[   31.826345]  kasan_save_stack+0x3c/0x68
[   31.826553]  kasan_save_track+0x20/0x40
[   31.826881]  kasan_save_alloc_info+0x40/0x58
[   31.827189]  __kasan_kmalloc+0xd4/0xd8
[   31.827388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.827766]  krealloc_uaf+0xc8/0x520
[   31.827869]  kunit_try_run_case+0x170/0x3f0
[   31.828404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.828640]  kthread+0x328/0x630
[   31.828784]  ret_from_fork+0x10/0x20
[   31.828861] 
[   31.828964] Freed by task 175:
[   31.829317]  kasan_save_stack+0x3c/0x68
[   31.829547]  kasan_save_track+0x20/0x40
[   31.829659]  kasan_save_free_info+0x4c/0x78
[   31.829756]  __kasan_slab_free+0x6c/0x98
[   31.829859]  kfree+0x214/0x3c8
[   31.829944]  krealloc_uaf+0x12c/0x520
[   31.830338]  kunit_try_run_case+0x170/0x3f0
[   31.830560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.830839]  kthread+0x328/0x630
[   31.830965]  ret_from_fork+0x10/0x20
[   31.831173] 
[   31.831460] The buggy address belongs to the object at fff00000c4497000
[   31.831460]  which belongs to the cache kmalloc-256 of size 256
[   31.831809] The buggy address is located 0 bytes inside of
[   31.831809]  freed 256-byte region [fff00000c4497000, fff00000c4497100)
[   31.832071] 
[   31.832220] The buggy address belongs to the physical page:
[   31.832429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.832836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.833012] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.833214] page_type: f5(slab)
[   31.833305] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.833394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.833483] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.833591] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.833727] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.833854] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.833959] page dumped because: kasan: bad access detected
[   31.834041] 
[   31.834091] Memory state around the buggy address:
[   31.834177]  fff00000c4496f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.834288]  fff00000c4496f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.834396] >fff00000c4497000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.834498]                    ^
[   31.834576]  fff00000c4497080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.835432]  fff00000c4497100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.835551] ==================================================================
[   31.840083] ==================================================================
[   31.840404] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   31.840556] Read of size 1 at addr fff00000c4497000 by task kunit_try_catch/175
[   31.841185] 
[   31.841468] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.841908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.842054] Hardware name: linux,dummy-virt (DT)
[   31.842216] Call trace:
[   31.842357]  show_stack+0x20/0x38 (C)
[   31.842735]  dump_stack_lvl+0x8c/0xd0
[   31.842929]  print_report+0x118/0x608
[   31.843307]  kasan_report+0xdc/0x128
[   31.843549]  __asan_report_load1_noabort+0x20/0x30
[   31.843846]  krealloc_uaf+0x4c8/0x520
[   31.843967]  kunit_try_run_case+0x170/0x3f0
[   31.844458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.844583]  kthread+0x328/0x630
[   31.844699]  ret_from_fork+0x10/0x20
[   31.844794] 
[   31.844830] Allocated by task 175:
[   31.844883]  kasan_save_stack+0x3c/0x68
[   31.844973]  kasan_save_track+0x20/0x40
[   31.845228]  kasan_save_alloc_info+0x40/0x58
[   31.845462]  __kasan_kmalloc+0xd4/0xd8
[   31.846099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.846434]  krealloc_uaf+0xc8/0x520
[   31.846546]  kunit_try_run_case+0x170/0x3f0
[   31.846659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.847114]  kthread+0x328/0x630
[   31.847213]  ret_from_fork+0x10/0x20
[   31.847386] 
[   31.847450] Freed by task 175:
[   31.847518]  kasan_save_stack+0x3c/0x68
[   31.847631]  kasan_save_track+0x20/0x40
[   31.847932]  kasan_save_free_info+0x4c/0x78
[   31.848222]  __kasan_slab_free+0x6c/0x98
[   31.848604]  kfree+0x214/0x3c8
[   31.848720]  krealloc_uaf+0x12c/0x520
[   31.848800]  kunit_try_run_case+0x170/0x3f0
[   31.848888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.849190]  kthread+0x328/0x630
[   31.849342]  ret_from_fork+0x10/0x20
[   31.849447] 
[   31.849497] The buggy address belongs to the object at fff00000c4497000
[   31.849497]  which belongs to the cache kmalloc-256 of size 256
[   31.849998] The buggy address is located 0 bytes inside of
[   31.849998]  freed 256-byte region [fff00000c4497000, fff00000c4497100)
[   31.850417] 
[   31.850509] The buggy address belongs to the physical page:
[   31.850665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.851072] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.851520] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.851707] page_type: f5(slab)
[   31.851814] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.851944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.852076] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.852206] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.852757] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.852964] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.853018] page dumped because: kasan: bad access detected
[   31.853055] 
[   31.853076] Memory state around the buggy address:
[   31.853116]  fff00000c4496f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.853165]  fff00000c4496f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.853212] >fff00000c4497000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.853258]                    ^
[   31.853291]  fff00000c4497080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.853337]  fff00000c4497100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.853379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   31.590453] ==================================================================
[   31.590583] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.590727] Write of size 1 at addr fff00000c44972eb by task kunit_try_catch/169
[   31.590855] 
[   31.590939] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.591152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.591217] Hardware name: linux,dummy-virt (DT)
[   31.591296] Call trace:
[   31.591355]  show_stack+0x20/0x38 (C)
[   31.591489]  dump_stack_lvl+0x8c/0xd0
[   31.591603]  print_report+0x118/0x608
[   31.592793]  kasan_report+0xdc/0x128
[   31.592925]  __asan_report_store1_noabort+0x20/0x30
[   31.593048]  krealloc_less_oob_helper+0xa58/0xc50
[   31.593242]  krealloc_less_oob+0x20/0x38
[   31.593528]  kunit_try_run_case+0x170/0x3f0
[   31.593824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.594078]  kthread+0x328/0x630
[   31.594574]  ret_from_fork+0x10/0x20
[   31.594699] 
[   31.594790] Allocated by task 169:
[   31.594878]  kasan_save_stack+0x3c/0x68
[   31.595146]  kasan_save_track+0x20/0x40
[   31.595376]  kasan_save_alloc_info+0x40/0x58
[   31.595626]  __kasan_krealloc+0x118/0x178
[   31.596033]  krealloc_noprof+0x128/0x360
[   31.596295]  krealloc_less_oob_helper+0x168/0xc50
[   31.596806]  krealloc_less_oob+0x20/0x38
[   31.596885]  kunit_try_run_case+0x170/0x3f0
[   31.596955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.597084]  kthread+0x328/0x630
[   31.597159]  ret_from_fork+0x10/0x20
[   31.597297] 
[   31.597467] The buggy address belongs to the object at fff00000c4497200
[   31.597467]  which belongs to the cache kmalloc-256 of size 256
[   31.597835] The buggy address is located 34 bytes to the right of
[   31.597835]  allocated 201-byte region [fff00000c4497200, fff00000c44972c9)
[   31.598097] 
[   31.598148] The buggy address belongs to the physical page:
[   31.598228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.598838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.599127] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.599468] page_type: f5(slab)
[   31.599574] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.599713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.599844] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.599970] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.600094] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.600216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.600750] page dumped because: kasan: bad access detected
[   31.600957] 
[   31.601026] Memory state around the buggy address:
[   31.601108]  fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.601272]  fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.601563] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.602494]                                                           ^
[   31.602752]  fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.603018]  fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.603354] ==================================================================
[   31.541560] ==================================================================
[   31.542320] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.542499] Write of size 1 at addr fff00000c44972d0 by task kunit_try_catch/169
[   31.542642] 
[   31.542733] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.542949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.543014] Hardware name: linux,dummy-virt (DT)
[   31.543093] Call trace:
[   31.543904]  show_stack+0x20/0x38 (C)
[   31.544229]  dump_stack_lvl+0x8c/0xd0
[   31.544604]  print_report+0x118/0x608
[   31.544949]  kasan_report+0xdc/0x128
[   31.545069]  __asan_report_store1_noabort+0x20/0x30
[   31.545284]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.545553]  krealloc_less_oob+0x20/0x38
[   31.545691]  kunit_try_run_case+0x170/0x3f0
[   31.545818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.546217]  kthread+0x328/0x630
[   31.546479]  ret_from_fork+0x10/0x20
[   31.546833] 
[   31.546884] Allocated by task 169:
[   31.547082]  kasan_save_stack+0x3c/0x68
[   31.547181]  kasan_save_track+0x20/0x40
[   31.547619]  kasan_save_alloc_info+0x40/0x58
[   31.547834]  __kasan_krealloc+0x118/0x178
[   31.548029]  krealloc_noprof+0x128/0x360
[   31.548272]  krealloc_less_oob_helper+0x168/0xc50
[   31.548413]  krealloc_less_oob+0x20/0x38
[   31.548774]  kunit_try_run_case+0x170/0x3f0
[   31.548909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.549008]  kthread+0x328/0x630
[   31.549219]  ret_from_fork+0x10/0x20
[   31.549441] 
[   31.549515] The buggy address belongs to the object at fff00000c4497200
[   31.549515]  which belongs to the cache kmalloc-256 of size 256
[   31.549833] The buggy address is located 7 bytes to the right of
[   31.549833]  allocated 201-byte region [fff00000c4497200, fff00000c44972c9)
[   31.550461] 
[   31.550538] The buggy address belongs to the physical page:
[   31.550781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.550939] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.551062] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.551752] page_type: f5(slab)
[   31.552073] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.552238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.552708] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.553083] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.553353] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.553502] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.553593] page dumped because: kasan: bad access detected
[   31.553663] 
[   31.553697] Memory state around the buggy address:
[   31.553757]  fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.554361]  fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.554756] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.555248]                                                  ^
[   31.555400]  fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.555542]  fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.555692] ==================================================================
[   31.558922] ==================================================================
[   31.559060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.559197] Write of size 1 at addr fff00000c44972da by task kunit_try_catch/169
[   31.559316] 
[   31.559403] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.560124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.560340] Hardware name: linux,dummy-virt (DT)
[   31.560581] Call trace:
[   31.560720]  show_stack+0x20/0x38 (C)
[   31.561030]  dump_stack_lvl+0x8c/0xd0
[   31.561221]  print_report+0x118/0x608
[   31.561348]  kasan_report+0xdc/0x128
[   31.561465]  __asan_report_store1_noabort+0x20/0x30
[   31.561606]  krealloc_less_oob_helper+0xa80/0xc50
[   31.561729]  krealloc_less_oob+0x20/0x38
[   31.561923]  kunit_try_run_case+0x170/0x3f0
[   31.562412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.562683]  kthread+0x328/0x630
[   31.562866]  ret_from_fork+0x10/0x20
[   31.563331] 
[   31.563391] Allocated by task 169:
[   31.564018]  kasan_save_stack+0x3c/0x68
[   31.564285]  kasan_save_track+0x20/0x40
[   31.564723]  kasan_save_alloc_info+0x40/0x58
[   31.564819]  __kasan_krealloc+0x118/0x178
[   31.564919]  krealloc_noprof+0x128/0x360
[   31.564998]  krealloc_less_oob_helper+0x168/0xc50
[   31.565174]  krealloc_less_oob+0x20/0x38
[   31.565281]  kunit_try_run_case+0x170/0x3f0
[   31.565394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.565500]  kthread+0x328/0x630
[   31.565579]  ret_from_fork+0x10/0x20
[   31.565708] 
[   31.565794] The buggy address belongs to the object at fff00000c4497200
[   31.565794]  which belongs to the cache kmalloc-256 of size 256
[   31.566350] The buggy address is located 17 bytes to the right of
[   31.566350]  allocated 201-byte region [fff00000c4497200, fff00000c44972c9)
[   31.566820] 
[   31.566879] The buggy address belongs to the physical page:
[   31.566970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.567217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.567455] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.567748] page_type: f5(slab)
[   31.567848] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.568289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.568573] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.568696] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.568788] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.569352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.569494] page dumped because: kasan: bad access detected
[   31.569576] 
[   31.569633] Memory state around the buggy address:
[   31.569817]  fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.570219]  fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.570487] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.570640]                                                     ^
[   31.570730]  fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.571045]  fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.571256] ==================================================================
[   31.527938] ==================================================================
[   31.528371] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.528563] Write of size 1 at addr fff00000c44972c9 by task kunit_try_catch/169
[   31.528769] 
[   31.528869] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.529278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.529539] Hardware name: linux,dummy-virt (DT)
[   31.529628] Call trace:
[   31.529691]  show_stack+0x20/0x38 (C)
[   31.529882]  dump_stack_lvl+0x8c/0xd0
[   31.530042]  print_report+0x118/0x608
[   31.530180]  kasan_report+0xdc/0x128
[   31.530299]  __asan_report_store1_noabort+0x20/0x30
[   31.530419]  krealloc_less_oob_helper+0xa48/0xc50
[   31.530541]  krealloc_less_oob+0x20/0x38
[   31.530661]  kunit_try_run_case+0x170/0x3f0
[   31.530784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.530917]  kthread+0x328/0x630
[   31.531022]  ret_from_fork+0x10/0x20
[   31.531141] 
[   31.531189] Allocated by task 169:
[   31.531260]  kasan_save_stack+0x3c/0x68
[   31.531361]  kasan_save_track+0x20/0x40
[   31.531461]  kasan_save_alloc_info+0x40/0x58
[   31.531560]  __kasan_krealloc+0x118/0x178
[   31.532664]  krealloc_noprof+0x128/0x360
[   31.533089]  krealloc_less_oob_helper+0x168/0xc50
[   31.533187]  krealloc_less_oob+0x20/0x38
[   31.533378]  kunit_try_run_case+0x170/0x3f0
[   31.533594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.533945]  kthread+0x328/0x630
[   31.534084]  ret_from_fork+0x10/0x20
[   31.534162] 
[   31.534207] The buggy address belongs to the object at fff00000c4497200
[   31.534207]  which belongs to the cache kmalloc-256 of size 256
[   31.534436] The buggy address is located 0 bytes to the right of
[   31.534436]  allocated 201-byte region [fff00000c4497200, fff00000c44972c9)
[   31.534863] 
[   31.534923] The buggy address belongs to the physical page:
[   31.535118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.535679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.535797] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.535948] page_type: f5(slab)
[   31.536144] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.536542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.536994] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.537122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.537320] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.537507] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.537636] page dumped because: kasan: bad access detected
[   31.537718] 
[   31.537763] Memory state around the buggy address:
[   31.537848]  fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.538056]  fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.538299] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.538715]                                               ^
[   31.538888]  fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.539055]  fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.539157] ==================================================================
[   31.729993] ==================================================================
[   31.730181] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.730342] Write of size 1 at addr fff00000c59ba0c9 by task kunit_try_catch/173
[   31.730475] 
[   31.730561] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.733576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.733741] Hardware name: linux,dummy-virt (DT)
[   31.734207] Call trace:
[   31.734286]  show_stack+0x20/0x38 (C)
[   31.734503]  dump_stack_lvl+0x8c/0xd0
[   31.734790]  print_report+0x118/0x608
[   31.735020]  kasan_report+0xdc/0x128
[   31.735281]  __asan_report_store1_noabort+0x20/0x30
[   31.735463]  krealloc_less_oob_helper+0xa48/0xc50
[   31.736116]  krealloc_large_less_oob+0x20/0x38
[   31.736278]  kunit_try_run_case+0x170/0x3f0
[   31.736490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.737114]  kthread+0x328/0x630
[   31.737272]  ret_from_fork+0x10/0x20
[   31.737514] 
[   31.737572] The buggy address belongs to the physical page:
[   31.737651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   31.738306] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.738491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.738788] page_type: f8(unknown)
[   31.739046] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.739223] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.739357] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.739900] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.740347] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff
[   31.740447] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.740737] page dumped because: kasan: bad access detected
[   31.741118] 
[   31.741388] Memory state around the buggy address:
[   31.741542]  fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.741679]  fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.741786] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.741877]                                               ^
[   31.741973]  fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.742735]  fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.743235] ==================================================================
[   31.785656] ==================================================================
[   31.785785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.785923] Write of size 1 at addr fff00000c59ba0eb by task kunit_try_catch/173
[   31.786054] 
[   31.786140] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.786359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.786430] Hardware name: linux,dummy-virt (DT)
[   31.786512] Call trace:
[   31.786569]  show_stack+0x20/0x38 (C)
[   31.786825]  dump_stack_lvl+0x8c/0xd0
[   31.786937]  print_report+0x118/0x608
[   31.787046]  kasan_report+0xdc/0x128
[   31.787100]  __asan_report_store1_noabort+0x20/0x30
[   31.787153]  krealloc_less_oob_helper+0xa58/0xc50
[   31.787207]  krealloc_large_less_oob+0x20/0x38
[   31.787259]  kunit_try_run_case+0x170/0x3f0
[   31.787312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.787369]  kthread+0x328/0x630
[   31.787424]  ret_from_fork+0x10/0x20
[   31.787504] 
[   31.787531] The buggy address belongs to the physical page:
[   31.787570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   31.787923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.788054] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.788254] page_type: f8(unknown)
[   31.788753] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.789017] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.789178] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.789336] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.789448] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff
[   31.789562] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.789663] page dumped because: kasan: bad access detected
[   31.789723] 
[   31.789760] Memory state around the buggy address:
[   31.789832]  fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.790286]  fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.790450] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.790587]                                                           ^
[   31.790696]  fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.790806]  fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.790916] ==================================================================
[   31.773990] ==================================================================
[   31.774396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.774693] Write of size 1 at addr fff00000c59ba0ea by task kunit_try_catch/173
[   31.774882] 
[   31.774978] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.775483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.775567] Hardware name: linux,dummy-virt (DT)
[   31.775706] Call trace:
[   31.775770]  show_stack+0x20/0x38 (C)
[   31.775966]  dump_stack_lvl+0x8c/0xd0
[   31.776135]  print_report+0x118/0x608
[   31.776262]  kasan_report+0xdc/0x128
[   31.776857]  __asan_report_store1_noabort+0x20/0x30
[   31.777171]  krealloc_less_oob_helper+0xae4/0xc50
[   31.777309]  krealloc_large_less_oob+0x20/0x38
[   31.777421]  kunit_try_run_case+0x170/0x3f0
[   31.777638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.777858]  kthread+0x328/0x630
[   31.778073]  ret_from_fork+0x10/0x20
[   31.778462] 
[   31.778535] The buggy address belongs to the physical page:
[   31.778648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   31.779209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.779408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.779768] page_type: f8(unknown)
[   31.779877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.780092] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.780292] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.780643] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.780858] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff
[   31.781072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.781309] page dumped because: kasan: bad access detected
[   31.781439] 
[   31.781703] Memory state around the buggy address:
[   31.781828]  fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.781946]  fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.782057] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.782157]                                                           ^
[   31.782513]  fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.782982]  fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.783328] ==================================================================
[   31.575414] ==================================================================
[   31.575567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.575717] Write of size 1 at addr fff00000c44972ea by task kunit_try_catch/169
[   31.576456] 
[   31.576683] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.577252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.577323] Hardware name: linux,dummy-virt (DT)
[   31.577434] Call trace:
[   31.577546]  show_stack+0x20/0x38 (C)
[   31.577847]  dump_stack_lvl+0x8c/0xd0
[   31.578103]  print_report+0x118/0x608
[   31.578245]  kasan_report+0xdc/0x128
[   31.578362]  __asan_report_store1_noabort+0x20/0x30
[   31.578476]  krealloc_less_oob_helper+0xae4/0xc50
[   31.578598]  krealloc_less_oob+0x20/0x38
[   31.579076]  kunit_try_run_case+0x170/0x3f0
[   31.579356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.580125]  kthread+0x328/0x630
[   31.580332]  ret_from_fork+0x10/0x20
[   31.580760] 
[   31.580811] Allocated by task 169:
[   31.580894]  kasan_save_stack+0x3c/0x68
[   31.581093]  kasan_save_track+0x20/0x40
[   31.581234]  kasan_save_alloc_info+0x40/0x58
[   31.581472]  __kasan_krealloc+0x118/0x178
[   31.581591]  krealloc_noprof+0x128/0x360
[   31.581698]  krealloc_less_oob_helper+0x168/0xc50
[   31.581795]  krealloc_less_oob+0x20/0x38
[   31.581884]  kunit_try_run_case+0x170/0x3f0
[   31.582078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.582180]  kthread+0x328/0x630
[   31.582585]  ret_from_fork+0x10/0x20
[   31.582818] 
[   31.582981] The buggy address belongs to the object at fff00000c4497200
[   31.582981]  which belongs to the cache kmalloc-256 of size 256
[   31.583286] The buggy address is located 33 bytes to the right of
[   31.583286]  allocated 201-byte region [fff00000c4497200, fff00000c44972c9)
[   31.583842] 
[   31.583897] The buggy address belongs to the physical page:
[   31.583991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.584225] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.584510] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.584837] page_type: f5(slab)
[   31.585096] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.585232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.585326] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.585886] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.586239] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.586500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.586644] page dumped because: kasan: bad access detected
[   31.586725] 
[   31.586770] Memory state around the buggy address:
[   31.587289]  fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.587538]  fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.587911] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.588105]                                                           ^
[   31.588366]  fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.588449]  fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.588522] ==================================================================
[   31.762163] ==================================================================
[   31.762238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.762320] Write of size 1 at addr fff00000c59ba0da by task kunit_try_catch/173
[   31.762379] 
[   31.762423] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.762520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.762549] Hardware name: linux,dummy-virt (DT)
[   31.762587] Call trace:
[   31.762639]  show_stack+0x20/0x38 (C)
[   31.762732]  dump_stack_lvl+0x8c/0xd0
[   31.762833]  print_report+0x118/0x608
[   31.762942]  kasan_report+0xdc/0x128
[   31.763055]  __asan_report_store1_noabort+0x20/0x30
[   31.763179]  krealloc_less_oob_helper+0xa80/0xc50
[   31.763305]  krealloc_large_less_oob+0x20/0x38
[   31.763431]  kunit_try_run_case+0x170/0x3f0
[   31.763557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.763705]  kthread+0x328/0x630
[   31.763812]  ret_from_fork+0x10/0x20
[   31.763931] 
[   31.763983] The buggy address belongs to the physical page:
[   31.764064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   31.764205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.764324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.764676] page_type: f8(unknown)
[   31.765307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.765494] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.765718] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.766017] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.766138] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff
[   31.766250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.766456] page dumped because: kasan: bad access detected
[   31.766590] 
[   31.766663] Memory state around the buggy address:
[   31.766802]  fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.766982]  fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.767147] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.767246]                                                     ^
[   31.767356]  fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.767484]  fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.768149] ==================================================================
[   31.748391] ==================================================================
[   31.748978] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.749657] Write of size 1 at addr fff00000c59ba0d0 by task kunit_try_catch/173
[   31.749775] 
[   31.749923] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.750439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.750580] Hardware name: linux,dummy-virt (DT)
[   31.750819] Call trace:
[   31.750910]  show_stack+0x20/0x38 (C)
[   31.751050]  dump_stack_lvl+0x8c/0xd0
[   31.751667]  print_report+0x118/0x608
[   31.752065]  kasan_report+0xdc/0x128
[   31.752275]  __asan_report_store1_noabort+0x20/0x30
[   31.752846]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.753090]  krealloc_large_less_oob+0x20/0x38
[   31.753212]  kunit_try_run_case+0x170/0x3f0
[   31.753330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.753431]  kthread+0x328/0x630
[   31.753507]  ret_from_fork+0x10/0x20
[   31.753605] 
[   31.753667] The buggy address belongs to the physical page:
[   31.753746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   31.753887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.754007] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.754145] page_type: f8(unknown)
[   31.754247] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.754375] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.754498] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.757735] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.758395] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff
[   31.758671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.758784] page dumped because: kasan: bad access detected
[   31.758914] 
[   31.758985] Memory state around the buggy address:
[   31.759107]  fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.759218]  fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.759324] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.760360]                                                  ^
[   31.760484]  fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.760607]  fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.760720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   31.633461] ==================================================================
[   31.633658] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   31.633832] Write of size 1 at addr fff00000c60720eb by task kunit_try_catch/171
[   31.633997] 
[   31.634094] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.634366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.634438] Hardware name: linux,dummy-virt (DT)
[   31.634518] Call trace:
[   31.634815]  show_stack+0x20/0x38 (C)
[   31.634955]  dump_stack_lvl+0x8c/0xd0
[   31.635069]  print_report+0x118/0x608
[   31.635130]  kasan_report+0xdc/0x128
[   31.635181]  __asan_report_store1_noabort+0x20/0x30
[   31.635274]  krealloc_more_oob_helper+0x60c/0x678
[   31.635336]  krealloc_large_more_oob+0x20/0x38
[   31.635389]  kunit_try_run_case+0x170/0x3f0
[   31.635467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.635528]  kthread+0x328/0x630
[   31.635575]  ret_from_fork+0x10/0x20
[   31.635655] 
[   31.635686] The buggy address belongs to the physical page:
[   31.635725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070
[   31.635789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.635843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.635911] page_type: f8(unknown)
[   31.635964] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.636021] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.636077] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.636130] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.636184] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff
[   31.636238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.636283] page dumped because: kasan: bad access detected
[   31.636417] 
[   31.636491] Memory state around the buggy address:
[   31.636677]  fff00000c6071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.636897]  fff00000c6072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.637124] >fff00000c6072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.637861]                                                           ^
[   31.637999]  fff00000c6072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.638116]  fff00000c6072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.638216] ==================================================================
[   31.488270] ==================================================================
[   31.488522] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   31.488664] Write of size 1 at addr fff00000c4496cf0 by task kunit_try_catch/167
[   31.488771] 
[   31.488852] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.489327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.489695] Hardware name: linux,dummy-virt (DT)
[   31.489802] Call trace:
[   31.489928]  show_stack+0x20/0x38 (C)
[   31.490082]  dump_stack_lvl+0x8c/0xd0
[   31.490254]  print_report+0x118/0x608
[   31.490364]  kasan_report+0xdc/0x128
[   31.490898]  __asan_report_store1_noabort+0x20/0x30
[   31.491100]  krealloc_more_oob_helper+0x5c0/0x678
[   31.491311]  krealloc_more_oob+0x20/0x38
[   31.491488]  kunit_try_run_case+0x170/0x3f0
[   31.491696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.491835]  kthread+0x328/0x630
[   31.491937]  ret_from_fork+0x10/0x20
[   31.492064] 
[   31.492112] Allocated by task 167:
[   31.492183]  kasan_save_stack+0x3c/0x68
[   31.492564]  kasan_save_track+0x20/0x40
[   31.492796]  kasan_save_alloc_info+0x40/0x58
[   31.492974]  __kasan_krealloc+0x118/0x178
[   31.493138]  krealloc_noprof+0x128/0x360
[   31.493415]  krealloc_more_oob_helper+0x168/0x678
[   31.493505]  krealloc_more_oob+0x20/0x38
[   31.493585]  kunit_try_run_case+0x170/0x3f0
[   31.493852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.494076]  kthread+0x328/0x630
[   31.494178]  ret_from_fork+0x10/0x20
[   31.494350] 
[   31.494416] The buggy address belongs to the object at fff00000c4496c00
[   31.494416]  which belongs to the cache kmalloc-256 of size 256
[   31.494639] The buggy address is located 5 bytes to the right of
[   31.494639]  allocated 235-byte region [fff00000c4496c00, fff00000c4496ceb)
[   31.494895] 
[   31.495302] The buggy address belongs to the physical page:
[   31.495525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.495707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.495914] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.496140] page_type: f5(slab)
[   31.496320] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.496461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.496567] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.496672] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.496768] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.496876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.496979] page dumped because: kasan: bad access detected
[   31.497341] 
[   31.497404] Memory state around the buggy address:
[   31.497561]  fff00000c4496b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.497754]  fff00000c4496c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.498121] >fff00000c4496c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.498383]                                                              ^
[   31.498499]  fff00000c4496d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.498821]  fff00000c4496d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.498912] ==================================================================
[   31.473754] ==================================================================
[   31.473960] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   31.474108] Write of size 1 at addr fff00000c4496ceb by task kunit_try_catch/167
[   31.474218] 
[   31.474303] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.474538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.474630] Hardware name: linux,dummy-virt (DT)
[   31.474713] Call trace:
[   31.474966]  show_stack+0x20/0x38 (C)
[   31.475127]  dump_stack_lvl+0x8c/0xd0
[   31.475245]  print_report+0x118/0x608
[   31.475351]  kasan_report+0xdc/0x128
[   31.475637]  __asan_report_store1_noabort+0x20/0x30
[   31.475772]  krealloc_more_oob_helper+0x60c/0x678
[   31.475896]  krealloc_more_oob+0x20/0x38
[   31.476009]  kunit_try_run_case+0x170/0x3f0
[   31.476128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.476253]  kthread+0x328/0x630
[   31.476345]  ret_from_fork+0x10/0x20
[   31.476460] 
[   31.476898] Allocated by task 167:
[   31.476996]  kasan_save_stack+0x3c/0x68
[   31.477107]  kasan_save_track+0x20/0x40
[   31.477277]  kasan_save_alloc_info+0x40/0x58
[   31.477400]  __kasan_krealloc+0x118/0x178
[   31.477501]  krealloc_noprof+0x128/0x360
[   31.477817]  krealloc_more_oob_helper+0x168/0x678
[   31.478146]  krealloc_more_oob+0x20/0x38
[   31.478286]  kunit_try_run_case+0x170/0x3f0
[   31.478431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.478976]  kthread+0x328/0x630
[   31.479092]  ret_from_fork+0x10/0x20
[   31.479244] 
[   31.479307] The buggy address belongs to the object at fff00000c4496c00
[   31.479307]  which belongs to the cache kmalloc-256 of size 256
[   31.479537] The buggy address is located 0 bytes to the right of
[   31.479537]  allocated 235-byte region [fff00000c4496c00, fff00000c4496ceb)
[   31.479966] 
[   31.480405] The buggy address belongs to the physical page:
[   31.480509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496
[   31.481036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.481173] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.481553] page_type: f5(slab)
[   31.481967] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.482256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.482450] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001
[   31.482781] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.483141] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff
[   31.483334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.483566] page dumped because: kasan: bad access detected
[   31.483678] 
[   31.483727] Memory state around the buggy address:
[   31.483808]  fff00000c4496b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.483923]  fff00000c4496c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.484035] >fff00000c4496c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.484134]                                                           ^
[   31.484768]  fff00000c4496d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.484999]  fff00000c4496d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.485119] ==================================================================
[   31.639198] ==================================================================
[   31.639983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   31.640453] Write of size 1 at addr fff00000c60720f0 by task kunit_try_catch/171
[   31.640558] 
[   31.640646] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.642059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.642143] Hardware name: linux,dummy-virt (DT)
[   31.642224] Call trace:
[   31.642281]  show_stack+0x20/0x38 (C)
[   31.642412]  dump_stack_lvl+0x8c/0xd0
[   31.644197]  print_report+0x118/0x608
[   31.645359]  kasan_report+0xdc/0x128
[   31.645601]  __asan_report_store1_noabort+0x20/0x30
[   31.646129]  krealloc_more_oob_helper+0x5c0/0x678
[   31.646468]  krealloc_large_more_oob+0x20/0x38
[   31.647208]  kunit_try_run_case+0x170/0x3f0
[   31.647621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.648349]  kthread+0x328/0x630
[   31.649080]  ret_from_fork+0x10/0x20
[   31.649360] 
[   31.649415] The buggy address belongs to the physical page:
[   31.649877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070
[   31.650359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.650765] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.650915] page_type: f8(unknown)
[   31.651023] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.652400] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.653025] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.653728] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.653893] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff
[   31.654560] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.654844] page dumped because: kasan: bad access detected
[   31.654925] 
[   31.655640] Memory state around the buggy address:
[   31.655961]  fff00000c6071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.656411]  fff00000c6072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.656886] >fff00000c6072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.657178]                                                              ^
[   31.657397]  fff00000c6072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.657638]  fff00000c6072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.658174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   31.439984] ==================================================================
[   31.440277] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   31.440635] Read of size 1 at addr fff00000c59a0000 by task kunit_try_catch/165
[   31.440771] 
[   31.440863] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.441053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.441107] Hardware name: linux,dummy-virt (DT)
[   31.441178] Call trace:
[   31.441231]  show_stack+0x20/0x38 (C)
[   31.441355]  dump_stack_lvl+0x8c/0xd0
[   31.441478]  print_report+0x118/0x608
[   31.441597]  kasan_report+0xdc/0x128
[   31.441741]  __asan_report_load1_noabort+0x20/0x30
[   31.441853]  page_alloc_uaf+0x328/0x350
[   31.442094]  kunit_try_run_case+0x170/0x3f0
[   31.442239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.442373]  kthread+0x328/0x630
[   31.442469]  ret_from_fork+0x10/0x20
[   31.442589] 
[   31.442662] The buggy address belongs to the physical page:
[   31.442755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0
[   31.442914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.443033] page_type: f0(buddy)
[   31.443193] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000
[   31.443380] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   31.443545] page dumped because: kasan: bad access detected
[   31.443670] 
[   31.443734] Memory state around the buggy address:
[   31.443859]  fff00000c599ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.444015]  fff00000c599ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.444167] >fff00000c59a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.444298]                    ^
[   31.444359]  fff00000c59a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.444461]  fff00000c59a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.444555] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   31.400178] ==================================================================
[   31.400710] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   31.400920] Free of addr fff00000c6070001 by task kunit_try_catch/161
[   31.401280] 
[   31.401371] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.401569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.401662] Hardware name: linux,dummy-virt (DT)
[   31.401759] Call trace:
[   31.401835]  show_stack+0x20/0x38 (C)
[   31.401965]  dump_stack_lvl+0x8c/0xd0
[   31.402085]  print_report+0x118/0x608
[   31.402208]  kasan_report_invalid_free+0xc0/0xe8
[   31.404644]  __kasan_kfree_large+0x5c/0xa8
[   31.405526]  free_large_kmalloc+0x68/0x150
[   31.405666]  kfree+0x270/0x3c8
[   31.405772]  kmalloc_large_invalid_free+0x108/0x270
[   31.405887]  kunit_try_run_case+0x170/0x3f0
[   31.406020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.406140]  kthread+0x328/0x630
[   31.406239]  ret_from_fork+0x10/0x20
[   31.406434] 
[   31.406493] The buggy address belongs to the physical page:
[   31.406599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070
[   31.406753] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.407067] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.407482] page_type: f8(unknown)
[   31.407711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.408012] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.408279] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.408504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.408712] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff
[   31.408846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.408935] page dumped because: kasan: bad access detected
[   31.408993] 
[   31.409304] Memory state around the buggy address:
[   31.409396]  fff00000c606ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.409503]  fff00000c606ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.409651] >fff00000c6070000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.409746]                    ^
[   31.409815]  fff00000c6070080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.409924]  fff00000c6070100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.410104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   31.370146] ==================================================================
[   31.370338] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   31.370492] Read of size 1 at addr fff00000c767c000 by task kunit_try_catch/159
[   31.370705] 
[   31.370946] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.371587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.371708] Hardware name: linux,dummy-virt (DT)
[   31.371799] Call trace:
[   31.371895]  show_stack+0x20/0x38 (C)
[   31.372125]  dump_stack_lvl+0x8c/0xd0
[   31.372412]  print_report+0x118/0x608
[   31.372599]  kasan_report+0xdc/0x128
[   31.372696]  __asan_report_load1_noabort+0x20/0x30
[   31.373050]  kmalloc_large_uaf+0x2cc/0x2f8
[   31.373198]  kunit_try_run_case+0x170/0x3f0
[   31.373333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.373635]  kthread+0x328/0x630
[   31.373759]  ret_from_fork+0x10/0x20
[   31.373967] 
[   31.374057] The buggy address belongs to the physical page:
[   31.374220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767c
[   31.374681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.374947] raw: 0bfffe0000000000 ffffc1ffc3181c08 fff00000da498c80 0000000000000000
[   31.375231] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.375358] page dumped because: kasan: bad access detected
[   31.375873] 
[   31.375934] Memory state around the buggy address:
[   31.376027]  fff00000c767bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.376140]  fff00000c767bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.376684] >fff00000c767c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.376873]                    ^
[   31.377080]  fff00000c767c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.377225]  fff00000c767c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.377303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   31.320053] ==================================================================
[   31.320652] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   31.320937] Write of size 1 at addr fff00000c767e00a by task kunit_try_catch/157
[   31.321219] 
[   31.321313] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.321767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.321904] Hardware name: linux,dummy-virt (DT)
[   31.322115] Call trace:
[   31.322219]  show_stack+0x20/0x38 (C)
[   31.322363]  dump_stack_lvl+0x8c/0xd0
[   31.322481]  print_report+0x118/0x608
[   31.322600]  kasan_report+0xdc/0x128
[   31.323024]  __asan_report_store1_noabort+0x20/0x30
[   31.323391]  kmalloc_large_oob_right+0x278/0x2b8
[   31.323685]  kunit_try_run_case+0x170/0x3f0
[   31.323881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.324029]  kthread+0x328/0x630
[   31.324181]  ret_from_fork+0x10/0x20
[   31.324408] 
[   31.324665] The buggy address belongs to the physical page:
[   31.324758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767c
[   31.324873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.324960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.325489] page_type: f8(unknown)
[   31.325882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.326011] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.326247] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.326394] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.326522] head: 0bfffe0000000002 ffffc1ffc31d9f01 00000000ffffffff 00000000ffffffff
[   31.326704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.327123] page dumped because: kasan: bad access detected
[   31.327207] 
[   31.327351] Memory state around the buggy address:
[   31.327594]  fff00000c767df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.327853]  fff00000c767df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.328079] >fff00000c767e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.328186]                       ^
[   31.328266]  fff00000c767e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.328872]  fff00000c767e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.329009] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   31.278977] ==================================================================
[   31.279271] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   31.279462] Write of size 1 at addr fff00000c5979f00 by task kunit_try_catch/155
[   31.279697] 
[   31.279800] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.280039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.280107] Hardware name: linux,dummy-virt (DT)
[   31.280190] Call trace:
[   31.280248]  show_stack+0x20/0x38 (C)
[   31.280582]  dump_stack_lvl+0x8c/0xd0
[   31.280800]  print_report+0x118/0x608
[   31.280892]  kasan_report+0xdc/0x128
[   31.280989]  __asan_report_store1_noabort+0x20/0x30
[   31.281444]  kmalloc_big_oob_right+0x2a4/0x2f0
[   31.281713]  kunit_try_run_case+0x170/0x3f0
[   31.281964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.282243]  kthread+0x328/0x630
[   31.282350]  ret_from_fork+0x10/0x20
[   31.282471] 
[   31.282522] Allocated by task 155:
[   31.282593]  kasan_save_stack+0x3c/0x68
[   31.282711]  kasan_save_track+0x20/0x40
[   31.283234]  kasan_save_alloc_info+0x40/0x58
[   31.283354]  __kasan_kmalloc+0xd4/0xd8
[   31.283582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.283971]  kmalloc_big_oob_right+0xb8/0x2f0
[   31.284218]  kunit_try_run_case+0x170/0x3f0
[   31.284371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.284642]  kthread+0x328/0x630
[   31.284734]  ret_from_fork+0x10/0x20
[   31.284901] 
[   31.284957] The buggy address belongs to the object at fff00000c5978000
[   31.284957]  which belongs to the cache kmalloc-8k of size 8192
[   31.285171] The buggy address is located 0 bytes to the right of
[   31.285171]  allocated 7936-byte region [fff00000c5978000, fff00000c5979f00)
[   31.285294] 
[   31.285341] The buggy address belongs to the physical page:
[   31.285416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105978
[   31.285859] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.286086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.286414] page_type: f5(slab)
[   31.286676] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   31.286848] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   31.287303] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   31.287446] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   31.287747] head: 0bfffe0000000003 ffffc1ffc3165e01 00000000ffffffff 00000000ffffffff
[   31.288057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   31.288205] page dumped because: kasan: bad access detected
[   31.288285] 
[   31.288791] Memory state around the buggy address:
[   31.289084]  fff00000c5979e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.289293]  fff00000c5979e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.289502] >fff00000c5979f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.289594]                    ^
[   31.289668]  fff00000c5979f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.289747]  fff00000c597a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.289829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   31.185866] ==================================================================
[   31.186374] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   31.186559] Write of size 1 at addr fff00000c44df478 by task kunit_try_catch/153
[   31.186820] 
[   31.186918] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.187119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.187580] Hardware name: linux,dummy-virt (DT)
[   31.187730] Call trace:
[   31.187836]  show_stack+0x20/0x38 (C)
[   31.187980]  dump_stack_lvl+0x8c/0xd0
[   31.188094]  print_report+0x118/0x608
[   31.188207]  kasan_report+0xdc/0x128
[   31.188319]  __asan_report_store1_noabort+0x20/0x30
[   31.188444]  kmalloc_track_caller_oob_right+0x40c/0x488
[   31.188569]  kunit_try_run_case+0x170/0x3f0
[   31.188701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.188830]  kthread+0x328/0x630
[   31.188936]  ret_from_fork+0x10/0x20
[   31.189088] 
[   31.189130] Allocated by task 153:
[   31.189195]  kasan_save_stack+0x3c/0x68
[   31.189292]  kasan_save_track+0x20/0x40
[   31.189382]  kasan_save_alloc_info+0x40/0x58
[   31.189480]  __kasan_kmalloc+0xd4/0xd8
[   31.189558]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   31.189680]  kmalloc_track_caller_oob_right+0xa8/0x488
[   31.189770]  kunit_try_run_case+0x170/0x3f0
[   31.189862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.189944]  kthread+0x328/0x630
[   31.190000]  ret_from_fork+0x10/0x20
[   31.190071] 
[   31.190110] The buggy address belongs to the object at fff00000c44df400
[   31.190110]  which belongs to the cache kmalloc-128 of size 128
[   31.190216] The buggy address is located 0 bytes to the right of
[   31.190216]  allocated 120-byte region [fff00000c44df400, fff00000c44df478)
[   31.190896] 
[   31.190951] The buggy address belongs to the physical page:
[   31.191256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.191406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.191619] page_type: f5(slab)
[   31.191721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.191929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.192053] page dumped because: kasan: bad access detected
[   31.192191] 
[   31.192240] Memory state around the buggy address:
[   31.192362]  fff00000c44df300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.192470]  fff00000c44df380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.193088] >fff00000c44df400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.193203]                                                                 ^
[   31.193376]  fff00000c44df480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.193990]  fff00000c44df500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   31.146405] ==================================================================
[   31.146654] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   31.146821] Read of size 1 at addr fff00000c5949000 by task kunit_try_catch/151
[   31.146952] 
[   31.147043] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.147755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.147836] Hardware name: linux,dummy-virt (DT)
[   31.148013] Call trace:
[   31.148204]  show_stack+0x20/0x38 (C)
[   31.148507]  dump_stack_lvl+0x8c/0xd0
[   31.148783]  print_report+0x118/0x608
[   31.149147]  kasan_report+0xdc/0x128
[   31.149402]  __asan_report_load1_noabort+0x20/0x30
[   31.149673]  kmalloc_node_oob_right+0x2f4/0x330
[   31.149907]  kunit_try_run_case+0x170/0x3f0
[   31.150184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.150462]  kthread+0x328/0x630
[   31.150767]  ret_from_fork+0x10/0x20
[   31.150974] 
[   31.151053] Allocated by task 151:
[   31.151282]  kasan_save_stack+0x3c/0x68
[   31.151577]  kasan_save_track+0x20/0x40
[   31.151813]  kasan_save_alloc_info+0x40/0x58
[   31.151994]  __kasan_kmalloc+0xd4/0xd8
[   31.152093]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   31.152756]  kmalloc_node_oob_right+0xbc/0x330
[   31.153032]  kunit_try_run_case+0x170/0x3f0
[   31.153279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.153506]  kthread+0x328/0x630
[   31.153573]  ret_from_fork+0x10/0x20
[   31.153652] 
[   31.153690] The buggy address belongs to the object at fff00000c5948000
[   31.153690]  which belongs to the cache kmalloc-4k of size 4096
[   31.153823] The buggy address is located 0 bytes to the right of
[   31.153823]  allocated 4096-byte region [fff00000c5948000, fff00000c5949000)
[   31.154532] 
[   31.154672] The buggy address belongs to the physical page:
[   31.154915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105948
[   31.155281] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.155414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.155630] page_type: f5(slab)
[   31.155737] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.155868] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.156011] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   31.156142] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   31.156269] head: 0bfffe0000000003 ffffc1ffc3165201 00000000ffffffff 00000000ffffffff
[   31.156994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   31.158351] page dumped because: kasan: bad access detected
[   31.158518] 
[   31.158588] Memory state around the buggy address:
[   31.158717]  fff00000c5948f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.158832]  fff00000c5948f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.158951] >fff00000c5949000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.159055]                    ^
[   31.159137]  fff00000c5949080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.159253]  fff00000c5949100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.159361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   31.030562] ==================================================================
[   31.030723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   31.030865] Write of size 1 at addr fff00000c44df278 by task kunit_try_catch/147
[   31.030995] 
[   31.031074] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.031287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.031356] Hardware name: linux,dummy-virt (DT)
[   31.031469] Call trace:
[   31.031529]  show_stack+0x20/0x38 (C)
[   31.031666]  dump_stack_lvl+0x8c/0xd0
[   31.031785]  print_report+0x118/0x608
[   31.031903]  kasan_report+0xdc/0x128
[   31.032019]  __asan_report_store1_noabort+0x20/0x30
[   31.032145]  kmalloc_oob_right+0x538/0x660
[   31.032260]  kunit_try_run_case+0x170/0x3f0
[   31.032422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.032535]  kthread+0x328/0x630
[   31.032624]  ret_from_fork+0x10/0x20
[   31.032723] 
[   31.032763] Allocated by task 147:
[   31.032823]  kasan_save_stack+0x3c/0x68
[   31.034662]  kasan_save_track+0x20/0x40
[   31.034792]  kasan_save_alloc_info+0x40/0x58
[   31.034912]  __kasan_kmalloc+0xd4/0xd8
[   31.035025]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.035174]  kmalloc_oob_right+0xb0/0x660
[   31.035347]  kunit_try_run_case+0x170/0x3f0
[   31.035470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.035585]  kthread+0x328/0x630
[   31.035685]  ret_from_fork+0x10/0x20
[   31.035779] 
[   31.035834] The buggy address belongs to the object at fff00000c44df200
[   31.035834]  which belongs to the cache kmalloc-128 of size 128
[   31.036036] The buggy address is located 5 bytes to the right of
[   31.036036]  allocated 115-byte region [fff00000c44df200, fff00000c44df273)
[   31.036208] 
[   31.036262] The buggy address belongs to the physical page:
[   31.036346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.036553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.036859] page_type: f5(slab)
[   31.037057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.037176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.037680] page dumped because: kasan: bad access detected
[   31.037798] 
[   31.037928] Memory state around the buggy address:
[   31.038260]  fff00000c44df100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.038489]  fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038659] >fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.039148]                                                                 ^
[   31.039469]  fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.040366]  fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.040544] ==================================================================
[   31.020040] ==================================================================
[   31.020685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   31.022119] Write of size 1 at addr fff00000c44df273 by task kunit_try_catch/147
[   31.022266] 
[   31.023339] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.023574] Tainted: [N]=TEST
[   31.023627] Hardware name: linux,dummy-virt (DT)
[   31.023918] Call trace:
[   31.024136]  show_stack+0x20/0x38 (C)
[   31.024365]  dump_stack_lvl+0x8c/0xd0
[   31.024517]  print_report+0x118/0x608
[   31.024630]  kasan_report+0xdc/0x128
[   31.024728]  __asan_report_store1_noabort+0x20/0x30
[   31.024829]  kmalloc_oob_right+0x5a4/0x660
[   31.024916]  kunit_try_run_case+0x170/0x3f0
[   31.025015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.025097]  kthread+0x328/0x630
[   31.025147]  ret_from_fork+0x10/0x20
[   31.025355] 
[   31.025404] Allocated by task 147:
[   31.025546]  kasan_save_stack+0x3c/0x68
[   31.025654]  kasan_save_track+0x20/0x40
[   31.025705]  kasan_save_alloc_info+0x40/0x58
[   31.025750]  __kasan_kmalloc+0xd4/0xd8
[   31.025791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.025837]  kmalloc_oob_right+0xb0/0x660
[   31.025877]  kunit_try_run_case+0x170/0x3f0
[   31.025918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.025965]  kthread+0x328/0x630
[   31.026000]  ret_from_fork+0x10/0x20
[   31.026064] 
[   31.026137] The buggy address belongs to the object at fff00000c44df200
[   31.026137]  which belongs to the cache kmalloc-128 of size 128
[   31.026253] The buggy address is located 0 bytes to the right of
[   31.026253]  allocated 115-byte region [fff00000c44df200, fff00000c44df273)
[   31.026329] 
[   31.026429] The buggy address belongs to the physical page:
[   31.026663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.027022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.027382] page_type: f5(slab)
[   31.027899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.027979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.028114] page dumped because: kasan: bad access detected
[   31.028165] 
[   31.028196] Memory state around the buggy address:
[   31.028477]  fff00000c44df100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.028564]  fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.028642] >fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.028710]                                                              ^
[   31.028812]  fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.028862]  fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.028938] ==================================================================
[   31.043724] ==================================================================
[   31.043857] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.043991] Read of size 1 at addr fff00000c44df280 by task kunit_try_catch/147
[   31.044115] 
[   31.044199] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.045759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.045858] Hardware name: linux,dummy-virt (DT)
[   31.046807] Call trace:
[   31.046977]  show_stack+0x20/0x38 (C)
[   31.047235]  dump_stack_lvl+0x8c/0xd0
[   31.047524]  print_report+0x118/0x608
[   31.047692]  kasan_report+0xdc/0x128
[   31.048116]  __asan_report_load1_noabort+0x20/0x30
[   31.048807]  kmalloc_oob_right+0x5d0/0x660
[   31.049139]  kunit_try_run_case+0x170/0x3f0
[   31.049590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.050346]  kthread+0x328/0x630
[   31.050719]  ret_from_fork+0x10/0x20
[   31.051079] 
[   31.051126] Allocated by task 147:
[   31.051841]  kasan_save_stack+0x3c/0x68
[   31.052086]  kasan_save_track+0x20/0x40
[   31.052183]  kasan_save_alloc_info+0x40/0x58
[   31.052453]  __kasan_kmalloc+0xd4/0xd8
[   31.052590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.052768]  kmalloc_oob_right+0xb0/0x660
[   31.052852]  kunit_try_run_case+0x170/0x3f0
[   31.052947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.053077]  kthread+0x328/0x630
[   31.053155]  ret_from_fork+0x10/0x20
[   31.053222] 
[   31.053292] The buggy address belongs to the object at fff00000c44df200
[   31.053292]  which belongs to the cache kmalloc-128 of size 128
[   31.053452] The buggy address is located 13 bytes to the right of
[   31.053452]  allocated 115-byte region [fff00000c44df200, fff00000c44df273)
[   31.053652] 
[   31.053732] The buggy address belongs to the physical page:
[   31.053962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   31.054232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.054429] page_type: f5(slab)
[   31.054747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.055237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.055351] page dumped because: kasan: bad access detected
[   31.055441] 
[   31.056112] Memory state around the buggy address:
[   31.056517]  fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.056812]  fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.056896] >fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.056973]                    ^
[   31.057040]  fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.057863]  fff00000c44df380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.058161] ==================================================================
Failure - log-parser-boot - exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------
[  192.806705] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#1: test_ratelimit_/1565
[  192.807752] Modules linked in:
[  192.808087] CPU: 1 UID: 0 PID: 1565 Comm: test_ratelimit_ Tainted: G    B D W        N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[  192.808811] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  192.809215] Hardware name: linux,dummy-virt (DT)
[  192.809532] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  192.810014] pc : test_ratelimit_stress_child+0x160/0x1b8
[  192.810683] lr : test_ratelimit_stress_child+0x30/0x1b8
[  192.811194] sp : ffff8000893a7d90
[  192.811376] x29: ffff8000893a7d90 x28: 0000000000000000 x27: 0000000000000000
[  192.811970] x26: 1ffe000018fd1741 x25: 0000000000000000 x24: 0000000000000004
[  192.812654] x23: fff00000c7e8ba0c x22: fff00000c7ff48a8 x21: ffff94c63fd3bb50
[  192.813290] x20: fff00000c7e8ba00 x19: fff00000c7ff48a8 x18: 000000004b71b62a
[  192.813977] x17: 0000000000000001 x16: fff00000c6069c3c x15: fff00000ff616b08
[  192.814623] x14: 0000000000018fff x13: 1ffe00001b48e5cd x12: fffd80001b492849
[  192.815405] x11: 1ffe00001b492848 x10: fffd80001b492848 x9 : ffff94c642304e0c
[  192.816025] x8 : ffff8000893a7ae8 x7 : 0000000000000001 x6 : ffff8000893a7c00
[  192.816378] x5 : 0000000000000001 x4 : ffff94c6446243e0 x3 : 0000000000000000
[  192.817297] x2 : 1ffe000018ffe919 x1 : 0000000000000000 x0 : 0000000000000000
[  192.818587] Call trace:
[  192.819019]  test_ratelimit_stress_child+0x160/0x1b8 (P)
[  192.819411]  kthread+0x328/0x630
[  192.819730]  ret_from_fork+0x10/0x20
[  192.820013] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  120.598221] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/669
[  120.599835] Modules linked in:
[  120.600449] CPU: 1 UID: 0 PID: 669 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[  120.601587] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  120.601818] Hardware name: linux,dummy-virt (DT)
[  120.601988] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  120.602204] pc : intlog10+0x38/0x48
[  120.602379] lr : intlog10_test+0xe4/0x200
[  120.602535] sp : ffff800082417c10
[  120.602723] x29: ffff800082417c90 x28: 0000000000000000 x27: 0000000000000000
[  120.604019] x26: 1ffe000018b2d641 x25: 0000000000000000 x24: ffff800082417ce0
[  120.604719] x23: ffff800082417d00 x22: 0000000000000000 x21: 1ffff00010482f82
[  120.605381] x20: ffff94c6425ccf20 x19: ffff800080087990 x18: 00000000371ecb61
[  120.606711] x17: 0000000000000001 x16: fff00000da494d28 x15: fff00000da4840d8
[  120.607550] x14: fff00000c5f6bcd0 x13: 1ffe00001b492989 x12: ffff7298c8c83389
[  120.608435] x11: 1ffff298c8c83388 x10: ffff7298c8c83388 x9 : ffff94c63fc3e784
[  120.609472] x8 : ffff94c646419c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  120.610343] x5 : ffff700010482f82 x4 : 1ffff00010010f3a x3 : 1ffff298c84b99e4
[  120.611156] x2 : 1ffff298c84b99e4 x1 : 0000000000000003 x0 : 0000000000000000
[  120.611805] Call trace:
[  120.612088]  intlog10+0x38/0x48 (P)
[  120.612590]  kunit_try_run_case+0x170/0x3f0
[  120.613405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  120.613955]  kthread+0x328/0x630
[  120.614281]  ret_from_fork+0x10/0x20
[  120.614637] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  120.497478] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/651
[  120.501595] Modules linked in:
[  120.503216] CPU: 0 UID: 0 PID: 651 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[  120.504038] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  120.504232] Hardware name: linux,dummy-virt (DT)
[  120.504562] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  120.505404] pc : intlog2+0xd8/0xf8
[  120.505981] lr : intlog2_test+0xe4/0x200
[  120.506312] sp : ffff800082367c10
[  120.506532] x29: ffff800082367c90 x28: 0000000000000000 x27: 0000000000000000
[  120.507049] x26: 1ffe000018bba901 x25: 0000000000000000 x24: ffff800082367ce0
[  120.507925] x23: ffff800082367d00 x22: 0000000000000000 x21: 1ffff0001046cf82
[  120.509191] x20: ffff94c6425cce20 x19: ffff800080087990 x18: 000000003328d4c9
[  120.510142] x17: 00000000eb621b4e x16: 0000000000000100 x15: 00000000183fa90a
[  120.511085] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e589 x12: ffff7298c8c83389
[  120.512048] x11: 1ffff298c8c83388 x10: ffff7298c8c83388 x9 : ffff94c63fc3e984
[  120.513096] x8 : ffff94c646419c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  120.514011] x5 : ffff70001046cf82 x4 : 1ffff00010010f3a x3 : 1ffff298c84b99c4
[  120.514723] x2 : 1ffff298c84b99c4 x1 : 0000000000000003 x0 : 0000000000000000
[  120.515139] Call trace:
[  120.515275]  intlog2+0xd8/0xf8 (P)
[  120.515479]  kunit_try_run_case+0x170/0x3f0
[  120.515685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  120.515886]  kthread+0x328/0x630
[  120.516047]  ret_from_fork+0x10/0x20
[  120.516262] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[  504.013301] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[  503.582709] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[  119.071881] Internal error: Oops: 0000000096000005 [#1]  SMP
[  119.080512] Modules linked in:
[  119.081482] CPU: 0 UID: 0 PID: 543 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[  119.082920] Tainted: [B]=BAD_PAGE, [N]=TEST
[  119.083359] Hardware name: linux,dummy-virt (DT)
[  119.084234] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  119.085017] pc : kunit_test_null_dereference+0x70/0x170
[  119.085706] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  119.086382] sp : ffff800080ff7d30
[  119.086932] x29: ffff800080ff7d90 x28: 0000000000000000 x27: 0000000000000000
[  119.087738] x26: 1ffe000018b2dc41 x25: 0000000000000000 x24: 0000000000000004
[  119.088395] x23: fff00000c596e20c x22: ffff94c63fc2b228 x21: fff00000c3da2388
[  119.089386] x20: 1ffff000101fefa6 x19: ffff800080087990 x18: 00000000024ba1df
[  119.090230] x17: 000000003ab9253e x16: fff00000c606a03c x15: 0000000075d900e8
[  119.091071] x14: 00000000874ec3ea x13: 1ffe00001b4929cd x12: fffd80001909362c
[  119.091869] x11: 1ffe00001909362b x10: fffd80001909362b x9 : ffff94c63fc229d0
[  119.092741] x8 : ffff800080ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  119.093562] x5 : ffff7000101fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  119.094362] x2 : dfff800000000000 x1 : fff00000c849a880 x0 : ffff800080087990
[  119.095440] Call trace:
[  119.095745]  kunit_test_null_dereference+0x70/0x170 (P)
[  119.096459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  119.097064]  kthread+0x328/0x630
[  119.097461]  ret_from_fork+0x10/0x20
[  119.098248] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  119.099373] ---[ end trace 0000000000000000 ]---